RADIUS Server 10.10.10.10 10.10.10.0/24 Fa0/3 S1 Fa0/1 Fa0/2 PC-A 10.10.10.5 172.20.20.0/30 GO/0 S0/0/0 R2 R1 S0/0/0 DCE

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

RADIUS Server 10.10.10.10 10.10.10.0/24 Fa0/3 S1 Fa0/1 Fa0/2 PC-A 10.10.10.5 172.20.20.0/30 GO/0 S0/0/0 R2 R1 S0/0/0 DCE

Post by answerhappygod »

Radius Server 10 10 10 10 10 10 10 0 24 Fa0 3 S1 Fa0 1 Fa0 2 Pc A 10 10 10 5 172 20 20 0 30 Go 0 S0 0 0 R2 R1 S0 0 0 Dce 1
Radius Server 10 10 10 10 10 10 10 0 24 Fa0 3 S1 Fa0 1 Fa0 2 Pc A 10 10 10 5 172 20 20 0 30 Go 0 S0 0 0 R2 R1 S0 0 0 Dce 1 (58.49 KiB) Viewed 18 times
Part 1: Configure Basic Switch Security
· Configure the following on S1:
o Privileged EXEC mode encrypted password is
ciscoenpa44.
o Console line password is ciscoconpa44, exec-timeout is
10 minutes, and enable login.
o Password for the VTY lines is ciscovtypa44,
exec-timeout is 10 minutes, enable login, and add the logging
synchronous command.
o Encrypt all plaintext passwords.
· Configure the following on S3:
o An MOTD banner should include the word
unauthorized.
o Shut down all unused physical ports on the switch.
o Enable port security on F0/3, where the MAC address
should be dynamically learned and added to the running
configuration.
Part 2: Configure Basic Router Security
· Configure the following on R3:
o Minimum password length is 10 characters.
o Privileged EXEC mode encrypted password is
ciscoenpa44.
· Enable SSH connections on R3 as
follows:
o The domain name is skillsexam.com
o It will only allow 2 authentication attempts.
o It will timeout after 120 seconds.
o Create a user account of Admin03 in the local database
of the router with a secret password of Admin03pa44.
o The RSA key should be generated with 1024 modulus
bits.
o Only SSH is allowed on the VTY lines.
o Verify the SSH configuration SSH to R3 from the command
prompt of PC-B and PC-C.
Part 3: Configure AAA Authentication
· Configure AAA Local Authentication
on R2 as follows:
o Create a local user account of Admin02 with a secret
password of Admin02pa44.
o Enable AAA services.
o Configure a named list called Co-Login to authenticate
logins using local AAA.
o Configure the line console to use the defined named AAA
method.
o Verify the user EXEC login using the local
database.
Part 4: Configure Access Control Lists
· Configure a Numbered IP ACL 110 on
R3 as follows:
o Verify that PC-A can access both HTTP and HTTPS
services on the Web Server.
o Create a Numbered IP ACL 110 that permit any outside
host to only access HTTPS service on the Web Server.
o Apply the created access list to incoming traffic on
interface S0/0/1.
o Verify that PC-A can only access HTTPS service on the
Web Server; PC-A cannot access HTTP service anymore.
RADIUS Server 10.10.10.10 10.10.10.0/24 Fa0/3 S1 Fa0/1 Fa0/2 PC-A 10.10.10.5 172.20.20.0/30 GO/0 S0/0/0 R2 R1 S0/0/0 DCE S0/0/1 172.30.30.0/30 S0/0/1 DCE R3 GO/0 Fa0/1 Fa0/2 10.20.20.0/24 PC-B 10.20.20.5 S3 Fa0/4 Fa0/3 Web Server 10.20.20.10 · PC-C 10.20.20.6
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply