Task
Topology |
- Configure IP Address as per given in topology.
- Configure RIP and EIGRP as per given in topology.
- Make Sure PAT is enable on R2 and R3 for inside networks.
- Configure Site-2-Site VPN between R2 and R3. PC5 Communicate R12, R13 and R14 from VPN tunnel and Pc4 to R11 in VPN tunnel. Make sure Use isakmp key is netwaxlab.
- Configure SSH on R14 and Telnet R11, R12 and R13. Use Enable secret password as eincop and Local username as cisco and password as netwaxlab.
- PC5 access R13 with full permission. But PC5 only access all show command on R14.
- PC5 access R12 some commands like sh ip int brief, sh ip protocol, ping, sh run and sh ip interface.
- PC4 only access show history command on R11.
Solution
Task 2: Configure RIP and EIGRP as per given in topology.
On R2
=====
router rip
version 2
network 10.0.0.0
default-information originate
no auto-summary
exit
On R3
=====
router eigrp 100
redistribute static metric 1 1 1 1 1
network 10.0.30.0 0.0.0.255
network 10.0.31.0 0.0.0.255
no auto-summary
exit
On R4
=====
router rip
version 2
network 10.0.0.0
network 192.168.1.0
network 192.168.2.0
no auto-summary
exit
On R5
=====
router rip
version 2
network 10.0.0.0
network 192.168.3.0
network 192.168.4.0
no auto-summary
exit
On R10
======
router eigrp 100
network 10.0.30.0 0.0.0.255
network 192.168.5.0
no auto-summary
exit
On R11
======
router eigrp 100
network 10.0.31.0 0.0.0.255
no auto-summary
exit
On R12
======
router rip
version 2
network 192.168.1.0
no auto-summary
On R13
======
router rip
version 2
network 192.168.2.0
no auto-summary
On R14
======
router rip
version 2
network 192.168.3.0
no auto-summary
Task 3: Make Sure PAT is enable on R2 and R3 for inside networks.
On R2
=====
ip access-list extended NAT
permit ip 10.0.24.0 0.0.0.255 any
permit ip 10.0.25.0 0.0.0.255 any
permit ip 192.168.1.0 0.0.0.255 any
permit ip 192.168.2.0 0.0.0.255 any
permit ip 192.168.3.0 0.0.0.255 any
permit ip 192.168.4.0 0.0.0.255 any
exit
int f0/0
ip nat outside
exit
int se0/0
ip nat inside
exit
int se0/1
ip nat inside
exit
ip nat inside source list NAT interface FastEthernet0/0 overload
On R3
=====
ip access-list extended NAT
permit ip 10.0.31.0 0.0.0.255 any
permit ip 10.0.30.0 0.0.0.255 any
permit ip 192.168.5.0 0.0.0.255 any
exit
int f0/0
ip nat outside
exit
int se0/0
ip nat inside
exit
int se0/1
ip nat inside
exit
ip nat inside source list NAT interface FastEthernet0/0 overload
Task 4: Configure Site-2-Site VPN between R2 and R3. PC5 Communicate R12, R13 and R14 from VPN tunnel and Pc4 to R11 in VPN tunnel. Make sure Use isakmp key is netwaxlab.
On R2
=====
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
lifetime 1800
exit
crypto isakmp key netwaxlab address 21.55.47.3
crypto ipsec transform-set tset esp-3des esp-sha-hmac
exit
ip access-list extended VPN
permit ip host 192.168.1.100 host 192.168.5.100
permit ip host 192.168.2.100 host 192.168.5.100
permit ip host 192.168.3.100 host 192.168.5.100
permit ip host 192.168.4.100 host 10.0.31.11
exit
ip access-list extended NAT
deny ip host 192.168.1.100 host 192.168.5.100
deny ip host 192.168.2.100 host 192.168.5.100
deny ip host 192.168.3.100 host 192.168.5.100
deny ip host 192.168.4.100 host 10.0.31.11
exit
crypto map CMAP 10 ipsec-isakmp
set peer 21.55.47.3
set transform-set tset
match address VPN
exit
int f0/0
crypto map CMAP
exit
On R3
=====
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
lifetime 1800
exit
crypto isakmp key netwaxlab address 44.9.21.2
crypto ipsec transform-set tset esp-3des esp-sha-hmac
exit
ip access-list extended VPN
permit ip host 10.0.31.11 host 192.168.4.100
permit ip host 192.168.5.100 host 192.168.3.100
permit ip host 192.168.5.100 host 192.168.2.100
permit ip host 192.168.5.100 host 192.168.1.100
exit
ip access-list extended NAT
deny ip host 10.0.31.11 host 192.168.4.100
deny ip host 192.168.5.100 host 192.168.1.100
deny ip host 192.168.5.100 host 192.168.2.100
deny ip host 192.168.5.100 host 192.168.3.100
exit
crypto map CMAP 10 ipsec-isakmp
set peer 44.9.21.2
set transform-set tset
match address VPN
exit
int f0/0
crypto map CMAP
exit
Task 5: Configure SSH on R14 and Telnet R11, R12 and R13. Use Enable secret password as eincop and Local username as cisco and password as netwaxlab.
On R11
======
enable secret eincop
username cisco password netwaxlab
line vty 0 4
login local
exit
On R12
======
enable secret eincop
username cisco password netwaxlab
line vty 0 4
login local
exit
On R13
======
enable secret eincop
username cisco password netwaxlab
line vty 0 4
login local
exit
On R14
======
ip domain-name netwaxlab.com
username cisco password netwaxlab
crypto key generate rsa modulus 1024
line vty 0 4
transport input ssh
login local
exit
Task 6: PC5 access R13 with full permission. But PC5 only access all show command on R14.
On R14
======
aaa new-model
enable secret netwaxlab
enable view
config t
parser view R14
secret netwaxlab
command exec include all show
exit
Task 7: PC5 access R12 some commands like sh ip int brief, sh ip protocol, ping, sh run and sh ip interface.
On R12
======
aaa new-model
enable secret netwaxlab
enable view
config t
parser view R14
secret netwaxlab
command exec include sh ip int bri
command exec include sh ip int
command exec include sh ip protocol
command exec include ping
exit
Task 8: PC4 only access show history command on R11.
aaa new-model
enable secret netwaxlab
enable view
config t
parser view R14
secret netwaxlab
command exec include show history
exit
Great Post !Free Online Skill Test, e Tutorial, Video Tutorial & Training on CCNA,CCNP & CCIE-
ReplyDeleteHub4tech.com