Routing and Switching Essentials Practice Skills Assessment Part I

CCNA Routing and Switching Routing and Switching Essentials v6.0 Routing and Switching Essentials Practice Skills Asses

Views 156 Downloads 3 File size 199KB

Report DMCA / Copyright

DOWNLOAD FILE

Recommend stories

Citation preview

CCNA Routing and Switching Routing and Switching Essentials v6.0

Routing and Switching Essentials Practice Skills Assessment Part I – Packet Tracer CCNA Routing and Switching Routing & Switching Essentials

Practice Skills Assessment Part I A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any exam windows during the exam. 2. Do not close Packet Tracer when you are done. It will close automatically. 3. Click the Submit Assessment button in the browser window to submit your work.

Introduction In this practice skills assessment, you will configure the [[orgName]] network. You will perform basic router configuration tasks, address router interfaces and hosts, and configure VLANs, trunking, and routing between VLANs. You will also configure and customize RIPv2 and control access to router vty lines with a standard named ACL. For a full list of tasks, see below. You are not required to configure the following: 

[[SW4name]]



[[SW5name]]



[[PC9name]]



[[PC10name]]



[[SRV1name]]



[[SRV2name]]



Hosts attached to [[SW3name]]

All IOS device configurations should be completed from a direct terminal connection to the device console. In addition, many values that are required to complete the configurations have not been given to you. In those cases, create the values that you need to complete the requirements. You will practice and be assessed on the following skills: © 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 1 of 7

Practice Skills Assessment Part I – Packet Tracer 

Configuration of initial device settings



Interface addressing



Configuration of VLANs and trunking



Routing between VLANs



Dynamic routing with RIPv2



Configuration of standard ACLs



Switch port security configuration



Remote switch management configuration



Syslog and NTP configuration

CCNA RSE v6.0

You will configure specific devices the following: [[R1name]]: 

Basic device configuration



Interface addressing



Routing between VLANs



RIPv2 routing



Standard numbered ACL on vty



Syslog logging with NTP timestamping

[[R2name]]: 

RIPv2 routing

[[SW1name]]: 

VLANs and trunking



Management interface

[[SW2name]]:

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 2 of 7

Practice Skills Assessment Part I – Packet Tracer 

VLANs and trunking



Port security



Management interface

CCNA RSE v6.0

[[SW3name]]: 

VLANs and trunking



Management interface

[[SW2name]] Hosts: 

IP addresses



Subnet masks



Default gateways

Topology

Addressing Table Use the following addresses to configure the network. Some addresses are preconfigured on devices that you are not required to configure, and are provided for reference purposes only. Device [[R1name]]

Interface S0/0/0 G0/0.5 G0/0.10 G0/0.15

Network/Address 10.1.1.1/30 192.168.1.0/28 first subnet, first address 192.168.1.0/28 second subnet, first address 192.168.1.0/28 third subnet, first address

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 3 of 7

Practice Skills Assessment Part I – Packet Tracer

CCNA RSE v6.0

G0/0.50 G0/0.99 G0/1 SVI SVI SVI S0/0/0 S0/0/1 G0/0

192.168.1.0/28 fourth subnet, first address No address required. 192.168.2.0/24, first address 192.168.1.0/28 fourth subnet, any available address 192.168.1.0/28 fourth subnet, any available address 192.168.1.0/28 fourth subnet, any available address 10.1.1.2/30 209.165.200.225/30 192.168.3.1/24

[[PC1name]]

NIC

192.168.1.0/28 first subnet, any available address

[[PC2name]]

NIC

192.168.1.0/28 second subnet, any available address

[[PC3name]]

NIC

192.168.1.0/28 third subnet, any available address

[[PC4name]]

NIC

192.168.1.0/28 fourth subnet, any available address

[[PC5name]]

NIC

192.168.1.0/28 first subnet, any available address

[[PC6name]]

NIC

192.168.1.0/28 second subnet, any available address

[[PC7name]]

NIC

192.168.1.0/28 third subnet, any available address

[[PC8name]]

NIC

192.168.1.0/28 fourth subnet, any available address

[[PC9name]] [[PC10name]] [[SRV1name]] [[SRV2name]]

NIC NIC NIC NIC

192.168.2.5/24 192.168.3.10/24 192.168.2.10/24 198.51.100.100

[[SW1name]] [[SW2name]] [[SW3name]] [[R2name]]

VLAN Table VLAN

Name

Network/Address

Port Assignments

5

[[VLAN5Name]]

192.168.1.0/28 first subnet

[[SW2name]]: Fa0/5 [[SW3name]]: Fa0/5

10

[[VLAN10Name]]

192.168.1.0/28 second subnet

[[SW2name]]: Fa0/10 [[SW3name]]: Fa0/10

15

[[VLAN15Name]]

192.168.1.0/28 third subnet

[[SW2name]]: Fa0/15 [[SW3name]]: Fa0/15

50

[[VLAN50Name]] (Management)

192.168.1.0/28 fourth subnet

[[SW1name]]: SVI [[SW2name]]: SVI, Fa0/20 [[SW3name]]: SVI, Fa0/20

Step1: Basic Device Configuration Complete a basic device configuration on the [[R1name]] router. Perform the following tasks:

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 4 of 7

Practice Skills Assessment Part I – Packet Tracer

CCNA RSE v6.0

a.

Disable DNS lookup.

b.

Configure the device with the name shown in the addressing table.

c.

Configure password encryption.

d.

Assign the encrypted type of privileged EXEC password.

e.

Configure a MOTD banner to warn users that unauthorized access is prohibited.

f.

Configure the console line so that router status messages will not interrupt command line input.

g.

Configure the console to require a password for access.

h.

Configure the VTY ports to only accept connections over SSH. Use the following values: Domain Name: cisco.com Local Username: admin User Password: class Modulus: 1024 Version: 2

The values for your SSH configuration must match these values exactly in order for you to receive credit for your configuration. Step 2: Interface Addressing [[R1name]] Activate and configure the G0/1 and S0/0/0 interfaces of the [[R1name]] router with the IP addresses given in the Addressing Table. The G0/0 interface will be configured later in the assessment. Configure descriptions for these interfaces. Step 3: VLANs and Trunking Configure the [[SW1name]], [[SW2name]], and [[SW3name]] switches with VLANs and trunking according to the values in the VLAN table. a.

Add the VLANs to the switches.

b.

Name the VLANs exactly as shown in the VLAN table.

. c.

Configure the links between the [[SW1name]], [[SW2name]], and [[SW3name]] switches as trunks. Configure the link between [[SW1name]] and [[R1name]] as a trunk. All trunking interfaces should be statically configured as trunks.

d.

Assign the appropriate ports to the VLANs.

Step 4: Routing Between VLANs Configure routing between VLANs on the [[R1name]] router. Use the information in the addressing and VLAN tables.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 5 of 7

Practice Skills Assessment Part I – Packet Tracer

CCNA RSE v6.0

Step 5: Access Control List Configuration Configure a named standard ACL that meets the following requirements: a.

The list should be named block15. The name must match this value exactly in order for you to receive credit for your work.

b.

Prevent any host with an address on the VLAN15 subnetwork from accessing the VLAN10 subnetwork.

c.

All other hosts should be permitted

d.

The list should have two statements. One statement for each requirement in steps 5b and 5c.

Step 6: Switch Virtual Interface (SVI) Configuration Configure the switch virtual management interfaces on [[SW1name]], [[SW2name]], and [[SW3name]]. Use the information in the addressing and VLAN tables for your configuration. All switches should be reachable from hosts on other networks for the purpose of this assessment. Step 7: Switch Port Security Configuration Improve network security by configuring the [[SW2name]] switch with the following. You are only required to configure these settings on this one switch for this assessment. a.

Disable ALL unused switch ports.

b.

Activate port security on all ports that have hosts connected.

c.

Allow only a maximum of two MAC addresses to access the active switch ports.

d.

Configure the switch ports to automatically learn the two allowed MAC addresses and record the addresses in the running configuration.

e.

Configure the switch ports so that, if the maximum number of addresses for each port is exceeded, packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed.

Step 8: Dynamic Routing Configure RIPv2 routing on [[R1name]] and [[R2name]]. a.

Configure RIPv2 on [[R1name]] and [[R2name]] so that all networks are reachable.

b.

Configure all LAN physical interfaces so that RIP updates are not sent out to the LANs.

c.

Be sure to use the version of RIP that supports classless routing.

d.

Prevent RIP from automatically summarizing networks.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 6 of 7

Practice Skills Assessment Part I – Packet Tracer e.

CCNA RSE v6.0

Configure RIP to automatically send the default route that is already configured on [[R2name]] to [[R1name]].

Step 9: Configure Network Monitoring Configure NTP and Syslog server logging on [[R1name]]. a.

Activate the logging and debug timestamp services.

b.

Configure [[R1name]] as an NTP client. The NTP server is [[SRV1name]] with the address of 192.168.2.10.

c.

Configure Syslog to send debug level messages to the [[SRV1name]] logging server.

Step 10: Configure Host Addressing Address the hosts that are connected to [[SW2name]] so that they have connectivity to the IP address of the [[SRV2name]] server on the Internet. Use the information provided in the Addressing Table. Last Updated: June, 2016 ID:[[nameIndex]] Version 1.0 Created in Packet Tracer 6.3 and PT Marvel 2.0.5 All contents are Copyright © 1992 - 2016 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 7 of 7