SlideShare a Scribd company logo
2
Most read
3
Most read
PACKET TRACER
RAFAT KHANDAKER
05/12/2016
SECURITY
.
ABSTRACT
In this lab I am going to simulate a situation where security is configured in order to
restrict or permit connection to network resources. Port sticky, static, dynamic mac configuration
will be used. I am also going to configure a network with an access list & group list to allow
connection to a server.
INTRODUCTION
Security is a largely contributed topic by cisco, especially due to the rise in cyber crimes.
Cisco switches and routers have quite a few features that allow them to be great and secure
network devices. Many protocols in cisco ios can prevent unauthorized connection to network
resources. Cisco has implemented layer 2 and layer 3 security within their devices.
At layer two, mac address can be statically assigned to individual ports in order to
prevent un-authorized devices to access the network. Cisco, also have other variation of
protocols to ease the job of a network administrator. Mac address can be dynamically learned on
a switchport, also can be configured with a limited number of devices. Mac-sticky is a protocol
that can allow an address to be dynamically learned without having to manually configure each
device on each port. other configurations can be made, such as setting an mac table aging timer,
which can allow one device to access the network at a time.
At layer 3, we can configure packet filtering, which is similar to a firewall of the cisco
device router or switch. An access-list can be configured to permit or deny certain IP address to
resources on the network and even port forward can be configured.
In this network each interface on switch will be configured to use port security as designated on
the diagram.
Configuration for fa1/1 on switch 0
Show run from switch 0 : fa1/1
No port security will be configured for the labtop connection. In this lab, I plan to simulate the
labtop connecting into a remote server with an access list.
Switch 1
show run from switch 1 :
Fa0/1 was configured with mac-sticky, dynamically learnt.
Fa0/2 was configured with static because it is connected to a server, more appropriate for the
network. security is set to shutdown because the server may play an important role in the
network and if the link was shut down, it would be easier to find the fault. Security is also a
concern because shutting down the port will allow network admins to view the configuration
setting as soon as a breach is made at this port.
ACCESS LIST CONFIGURATION ON ROUTER
The plan is to allow the laptop to connect into the server through the web but no other device can
be allowed to do that.
According to cisco's documentation, access lists have two types of configuration; standard and
Extended. Standard access lists only examine the packet's source address to permit or deny
traffic. Extended access lists allow the router to permit or deny traffic based on the packet's
source and destination IP address, along with specific ports and protocol. Access configuration
use source address and source Wildcard mask or inverse subnet.
Standard ACL ( 1 - 99 )
Extended ACL ( 100-199 )
Access Group command :
For this lab, I am going to configure the access list for the router to allow the laptop as the only
device to access the servers web address. The Fa1/0 interface will be configured to allow packets
into it's port. The fa0/0 interface will be configured to allow packets from the laptop to the
server..
as we can see here, access list is configured to allow the laptop's ip address to access the server's
ip on it's web port. All other hosts are denied access to the web server on port 80.
here is the final diagram:
To test the configuration:
Trial 1 : i failed consistently to get a connection into the router after configuring the access-list..
I troubleshooted the network to achieve layer 3 connectivity to the router and the server. I
failed..
I removed the access list from the router and successfully was able to ping the network.
I knew the problem was with the configuration of the access list, so i decided to research the
ACL issue.
I came across a documentation that states that access list configuration by defualt has an implicit
statement to deny all connection. So in other words... the access-list will go through all the rules
of the configuration settings, if all of the rules fail, then the implicit end statement will deny and
drop all connection to the router.
so to fix the configuration of my network i had to add these few commands to the access list:
the icmp tcp and udp protocols were irrelevant , matter of fact if i just used " ip" it would have
been enough. Just in-case, i permited those connections as well.
This is my full access-list config
TESTING WITH LAPTOP
connection to the router and server pings with success.
accessing the web server from the laptop also succeeds.
TESTING CONNECTIVITY WITH PC1
We can see here that the physical connectivity to the server succeeds, however, accessing the
webserver from the browser should fail due to the access list configuration.
attempting to access the server through the webserver fails due to packet filtering, ACL
configuration on the router.
CONCLUSION
I have successfuly configured this network with cisco security protocols. I was able to
troubleshoot all the problems found within this lab. I was able to enhance my knowledge about
ACL's. I learnt that ACL have a default implicit rule that was blocking my connection. I was able
to assign port security on each switch with ease.
Ad

Recommended

Packet Tracer: Routing protocols EIGRP and OSPF
Packet Tracer: Routing protocols EIGRP and OSPF
Rafat Khandaker
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-log
Rafat Khandaker
 
CCNA Packet Tracer 1.6.1
CCNA Packet Tracer 1.6.1
Rafat Khandaker
 
Packet Tracer: WAN, point to point links.
Packet Tracer: WAN, point to point links.
Rafat Khandaker
 
Securing Switch Access
Securing Switch Access
Netwax Lab
 
CCNA- Router on stick, VLAN and Trunking
CCNA- Router on stick, VLAN and Trunking
Rafat Khandaker
 
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
anilinvns
 
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2
Abdul Basit
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
anilinvns
 
Configuring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA Firewall
Harris Andrea
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
OSPF Internal Route Summarization
OSPF Internal Route Summarization
NetProtocol Xpert
 
lab1
lab1
guest575c3e
 
Types of interfaces in a Cisco Router
Types of interfaces in a Cisco Router
NetProtocol Xpert
 
How to make a simple application on packet tracer
How to make a simple application on packet tracer
Federal Urdu University of Arts,Science and technology
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Arz Sy
 
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
Eric Vanderburg
 
Networking
Networking
Pravesh Hidko
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN
NetProtocol Xpert
 
CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014
Đồng Quốc Vương
 
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
Naoto MATSUMOTO
 
VIRTUAL LANS
VIRTUAL LANS
anilinvns
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1
milkux
 
Gre tunnel pdf
Gre tunnel pdf
Rajesh Porwal
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
IPMAX s.r.l.
 
ASA Failover
ASA Failover
NetProtocol Xpert
 
Pt using packettracer
Pt using packettracer
ssusera4b34f
 
Telnet configuration
Telnet configuration
MdAlAmin187
 
Cisco router command configuration overview
Cisco router command configuration overview
3Anetwork com
 
Cisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 

More Related Content

What's hot (20)

INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
anilinvns
 
Configuring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA Firewall
Harris Andrea
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
OSPF Internal Route Summarization
OSPF Internal Route Summarization
NetProtocol Xpert
 
lab1
lab1
guest575c3e
 
Types of interfaces in a Cisco Router
Types of interfaces in a Cisco Router
NetProtocol Xpert
 
How to make a simple application on packet tracer
How to make a simple application on packet tracer
Federal Urdu University of Arts,Science and technology
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Arz Sy
 
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
Eric Vanderburg
 
Networking
Networking
Pravesh Hidko
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN
NetProtocol Xpert
 
CCNA 1 Chapter 6 v5.0 2014
CCNA 1 Chapter 6 v5.0 2014
Đồng Quốc Vương
 
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
Naoto MATSUMOTO
 
VIRTUAL LANS
VIRTUAL LANS
anilinvns
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1
milkux
 
Gre tunnel pdf
Gre tunnel pdf
Rajesh Porwal
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
IPMAX s.r.l.
 
ASA Failover
ASA Failover
NetProtocol Xpert
 
Pt using packettracer
Pt using packettracer
ssusera4b34f
 
Telnet configuration
Telnet configuration
MdAlAmin187
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
anilinvns
 
Configuring GRE Tunnel Through a Cisco ASA Firewall
Configuring GRE Tunnel Through a Cisco ASA Firewall
Harris Andrea
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
OSPF Internal Route Summarization
OSPF Internal Route Summarization
NetProtocol Xpert
 
Types of interfaces in a Cisco Router
Types of interfaces in a Cisco Router
NetProtocol Xpert
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
Arz Sy
 
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
Eric Vanderburg
 
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
Naoto MATSUMOTO
 
VIRTUAL LANS
VIRTUAL LANS
anilinvns
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1
milkux
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
IPMAX s.r.l.
 
Pt using packettracer
Pt using packettracer
ssusera4b34f
 
Telnet configuration
Telnet configuration
MdAlAmin187
 

Viewers also liked (11)

Cisco router command configuration overview
Cisco router command configuration overview
3Anetwork com
 
Cisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
Cisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Abdelkhalik Mosa
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
IT Tech
 
Cisco project ideas
Cisco project ideas
VIT University
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
CCNAResources
 
Router commands
Router commands
Akshay Bhardwaj
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
Saurav Pandey
 
Technical interview questions -networking
Technical interview questions -networking
rafiq123
 
Cisco router command configuration overview
Cisco router command configuration overview
3Anetwork com
 
Cisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
Cisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Abdelkhalik Mosa
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
IT Tech
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
CCNAResources
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
Saurav Pandey
 
Technical interview questions -networking
Technical interview questions -networking
rafiq123
 
Ad

Similar to CCNA Security configuration (20)

ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
NetProtocol Xpert
 
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
HamesKellor
 
Report on routing interface configuration
Report on routing interface configuration
DebjyotiSaha9
 
3 2
3 2
garybartecleo
 
Cap2 configuring switch
Cap2 configuring switch
Hector Camba Lainez
 
Creating a firewall in UBUNTU
Creating a firewall in UBUNTU
Mumbai University
 
VLAN, Trunk and 802.1q Router Configuration Objectiv.docx
VLAN, Trunk and 802.1q Router Configuration Objectiv.docx
dickonsondorris
 
Managed switches
Managed switches
dwight4
 
Switching
Switching
CYBERINTELLIGENTS
 
CCNA 2
CCNA 2
Asish Verma
 
Important cisco-chow-commands
Important cisco-chow-commands
ssusere31b5c
 
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
sufi1248
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configuration
IT Tech
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
friv4schoolgames
 
PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3
series09
 
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
juliennehar
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
robertguerra
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
robertguerra
 
Firewall
Firewall
Angga Racing
 
Zxdsl 9210 guide
Zxdsl 9210 guide
HARRY CHAN PUTRA
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
NetProtocol Xpert
 
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
HamesKellor
 
Report on routing interface configuration
Report on routing interface configuration
DebjyotiSaha9
 
Creating a firewall in UBUNTU
Creating a firewall in UBUNTU
Mumbai University
 
VLAN, Trunk and 802.1q Router Configuration Objectiv.docx
VLAN, Trunk and 802.1q Router Configuration Objectiv.docx
dickonsondorris
 
Managed switches
Managed switches
dwight4
 
Important cisco-chow-commands
Important cisco-chow-commands
ssusere31b5c
 
Exercise 4c stp rapid pvst+ question
Exercise 4c stp rapid pvst+ question
sufi1248
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configuration
IT Tech
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
friv4schoolgames
 
PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3
series09
 
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
TitleABC123 Version X1Film ListPSYCH650 Version 2.docx
juliennehar
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
robertguerra
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
robertguerra
 
Ad

Recently uploaded (20)

Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
ICT Frame Magazine Pvt. Ltd.
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
ENERGY CONSUMPTION CALCULATION IN ENERGY-EFFICIENT AIR CONDITIONER.pdf
ENERGY CONSUMPTION CALCULATION IN ENERGY-EFFICIENT AIR CONDITIONER.pdf
Muhammad Rizwan Akram
 
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Puppy jhon
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
The Future of Technology: 2025-2125 by Saikat Basu.pdf
The Future of Technology: 2025-2125 by Saikat Basu.pdf
Saikat Basu
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
Enabling BIM / GIS integrations with Other Systems with FME
Enabling BIM / GIS integrations with Other Systems with FME
Safe Software
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
ICT Frame Magazine Pvt. Ltd.
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
ENERGY CONSUMPTION CALCULATION IN ENERGY-EFFICIENT AIR CONDITIONER.pdf
ENERGY CONSUMPTION CALCULATION IN ENERGY-EFFICIENT AIR CONDITIONER.pdf
Muhammad Rizwan Akram
 
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Puppy jhon
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
The Future of Technology: 2025-2125 by Saikat Basu.pdf
The Future of Technology: 2025-2125 by Saikat Basu.pdf
Saikat Basu
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
Enabling BIM / GIS integrations with Other Systems with FME
Enabling BIM / GIS integrations with Other Systems with FME
Safe Software
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
Crypto Super 500 - 14th Report - June2025.pdf
Crypto Super 500 - 14th Report - June2025.pdf
Stephen Perrenod
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 

CCNA Security configuration

  • 1. PACKET TRACER RAFAT KHANDAKER 05/12/2016 SECURITY . ABSTRACT In this lab I am going to simulate a situation where security is configured in order to restrict or permit connection to network resources. Port sticky, static, dynamic mac configuration will be used. I am also going to configure a network with an access list & group list to allow connection to a server. INTRODUCTION Security is a largely contributed topic by cisco, especially due to the rise in cyber crimes. Cisco switches and routers have quite a few features that allow them to be great and secure network devices. Many protocols in cisco ios can prevent unauthorized connection to network resources. Cisco has implemented layer 2 and layer 3 security within their devices. At layer two, mac address can be statically assigned to individual ports in order to prevent un-authorized devices to access the network. Cisco, also have other variation of protocols to ease the job of a network administrator. Mac address can be dynamically learned on a switchport, also can be configured with a limited number of devices. Mac-sticky is a protocol that can allow an address to be dynamically learned without having to manually configure each device on each port. other configurations can be made, such as setting an mac table aging timer, which can allow one device to access the network at a time. At layer 3, we can configure packet filtering, which is similar to a firewall of the cisco device router or switch. An access-list can be configured to permit or deny certain IP address to resources on the network and even port forward can be configured.
  • 2. In this network each interface on switch will be configured to use port security as designated on the diagram. Configuration for fa1/1 on switch 0 Show run from switch 0 : fa1/1
  • 3. No port security will be configured for the labtop connection. In this lab, I plan to simulate the labtop connecting into a remote server with an access list. Switch 1 show run from switch 1 : Fa0/1 was configured with mac-sticky, dynamically learnt. Fa0/2 was configured with static because it is connected to a server, more appropriate for the network. security is set to shutdown because the server may play an important role in the network and if the link was shut down, it would be easier to find the fault. Security is also a concern because shutting down the port will allow network admins to view the configuration setting as soon as a breach is made at this port. ACCESS LIST CONFIGURATION ON ROUTER The plan is to allow the laptop to connect into the server through the web but no other device can be allowed to do that. According to cisco's documentation, access lists have two types of configuration; standard and Extended. Standard access lists only examine the packet's source address to permit or deny traffic. Extended access lists allow the router to permit or deny traffic based on the packet's source and destination IP address, along with specific ports and protocol. Access configuration use source address and source Wildcard mask or inverse subnet. Standard ACL ( 1 - 99 ) Extended ACL ( 100-199 ) Access Group command :
  • 4. For this lab, I am going to configure the access list for the router to allow the laptop as the only device to access the servers web address. The Fa1/0 interface will be configured to allow packets into it's port. The fa0/0 interface will be configured to allow packets from the laptop to the server.. as we can see here, access list is configured to allow the laptop's ip address to access the server's ip on it's web port. All other hosts are denied access to the web server on port 80. here is the final diagram: To test the configuration: Trial 1 : i failed consistently to get a connection into the router after configuring the access-list..
  • 5. I troubleshooted the network to achieve layer 3 connectivity to the router and the server. I failed.. I removed the access list from the router and successfully was able to ping the network. I knew the problem was with the configuration of the access list, so i decided to research the ACL issue. I came across a documentation that states that access list configuration by defualt has an implicit statement to deny all connection. So in other words... the access-list will go through all the rules of the configuration settings, if all of the rules fail, then the implicit end statement will deny and drop all connection to the router. so to fix the configuration of my network i had to add these few commands to the access list: the icmp tcp and udp protocols were irrelevant , matter of fact if i just used " ip" it would have been enough. Just in-case, i permited those connections as well. This is my full access-list config TESTING WITH LAPTOP
  • 6. connection to the router and server pings with success.
  • 7. accessing the web server from the laptop also succeeds. TESTING CONNECTIVITY WITH PC1
  • 8. We can see here that the physical connectivity to the server succeeds, however, accessing the webserver from the browser should fail due to the access list configuration.
  • 9. attempting to access the server through the webserver fails due to packet filtering, ACL configuration on the router. CONCLUSION I have successfuly configured this network with cisco security protocols. I was able to troubleshoot all the problems found within this lab. I was able to enhance my knowledge about ACL's. I learnt that ACL have a default implicit rule that was blocking my connection. I was able to assign port security on each switch with ease.