ISM Journal rUGVED
ISM Journal rUGVED
Practical 1
Aim: Packet Tracer - Configure Cisco Routers for Syslog, NTP, and SSH Operations.
Page1
TYIT_603_RUGVED
NTP Server
SYSLOG Server
Page2
TYIT_603_RUGVED
R1
Page3
TYIT_603_RUGVED
R2
Page4
TYIT_603_RUGVED
Page5
TYIT_603_RUGVED
R3
Page6
TYIT_603_RUGVED
PC1
Page7
TYIT_603_RUGVED
CLI
Page8
TYIT_603_RUGVED
Step l : Test connectivity. All devices should be able to ping all other IP addresses.
Step 2: Configure OSPF MD5 authentication for all the routers In area 0.
R1
Router#conf t
Router#conf t
Router(config)#hostname r1
r1(config)#router ospf 1
r1(config-router)#network 192.168.1.0 0.0.0.255 area 0
r1(config-router)#network 10.1.1.0 0.0.0.3 area 0
R2
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname r2
r2(config)#route ospf 1
r2(config-router)#network 10.1.1.0 0.0.0.3 area 0
r2(config-router)#network 10.2.2.0 0.0.0.3 area 0
Page9
TYIT_603_RUGVED
R3
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname r3
r3(config-if)#route ospf 1
r3(config-router)#network 192.168.3.0 0.0.0.255 area 0
r3(config-router)#network 10.2.2.0 0.0.0.3 area 0
Step 3: Configure the MD5 key for all the routers in area 0.
r1
r1(config)#interface s0/0/0
r1(config)#ip ospf message-digest-key 1 md5 MD5pa55
r2
r2(config)#interface s0/0/0
r2(config)#ip ospf message-digest-key 1 md5 MD5pa55
r2(config)#interface s0/0/1
r2(config)#ip ospf message-digest-key 1 md5 MD5pa55
r3
r3(config)#interface s0/0/1
r3(config)#ip ospf message-digest-key 1 md5 MD5pa55
P a g e 10
TYIT_603_RUGVED
P a g e 11
TYIT_603_RUGVED
P a g e 12
TYIT_603_RUGVED
P a g e 13
TYIT_603_RUGVED
Step 10: Connect to R3 using SSH on R2. To troubleshoot and maintain R3, the administrator at the ISP
must use SSH to access the router CLI. From the CLI of R2, enter the command to connect to R3 via SSH
version 2 using the SSHadmin user account. When prompted for the password, enter the password
configured for the administrator: ciscosshpa55.
ssh -v 2-1 SSHadmin 10.2.2.1
P a g e 14
TYIT_603_RUGVED
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 0, Adjacent neighbor count is 0
Suppress hello for 0 neighbor(s)
Message digest authentication enabled
No key configured, using default key id 0
Serial0/0/0 is up, line protocol is up
Internet address is 10.1.1.1/30, Area 0
Process ID 1, Router ID 192.168.1.1, Network Type POINT-TO-POINT, Cost: 64
Transmit Delay is 1 sec, State POINT-TO-POINT, Priority 0
No designated router on this network
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:03
Index 2/2, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Suppress hello for 0 neighbor(s)
Message digest authentication enabled
Youngest key id is 1
P a g e 15
TYIT_603_RUGVED
Practical 2
Aim: Configure AAA Authentication
P a g e 16
TYIT_603_RUGVED
Step 2 : Go to RI CLI.
P a g e 17
TYIT_603_RUGVED
P a g e 18
TYIT_603_RUGVED
Practical 3
Aim: Configuring Extended ACLs
Table :
P a g e 19
TYIT_603_RUGVED
P a g e 20
TYIT_603_RUGVED
P a g e 21
TYIT_603_RUGVED
Practical 4
Aim: Configure IP ACLs to Mitigate Attacks.
Table :
Device Interface IP Address Subnet Mask Default Switch
Gateway Port
R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 F0/5
S0/0/0(DCE) 10.1.1.1 255.255.255.252 N/A N/A
R2 S0/0/0 10.1.1.2 255.255.255.252 N/A N/A
S0/0/1(DCE) 10.2.2.2 255.255.255.252 N/A N/A
Lo0 192.168.2.1 255.255.255.0 N/A N/A
R3 G0/1 192.168.3.1 255.255.255.0 N/A S3 F0/5
S0/0/1 10.2.2.1 255.255.255.252 N/A N/A
PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 S1 F0/6
PC-C NIC 192.168.3.3 255.255.255.0 192.168.1.2 S3 F0/18
P a g e 22
TYIT_603_RUGVED
P a g e 23
TYIT_603_RUGVED
P a g e 24
TYIT_603_RUGVED
P a g e 25
TYIT_603_RUGVED
P a g e 26
TYIT_603_RUGVED
P a g e 27
TYIT_603_RUGVED
P a g e 28
TYIT_603_RUGVED
P a g e 29
TYIT_603_RUGVED
Practical 5
Aim: Configuring a Zone-Based Policy Firewall
Table :
P a g e 30
TYIT_603_RUGVED
P a g e 31
TYIT_603_RUGVED
P a g e 32
TYIT_603_RUGVED
Practical 6
Aim: Configure IOS Intrusion Prevention System (IPS) Using the CLI
P a g e 33
TYIT_603_RUGVED
P a g e 34
TYIT_603_RUGVED
P a g e 35
TYIT_603_RUGVED
P a g e 36
TYIT_603_RUGVED
P a g e 37
TYIT_603_RUGVED
P a g e 38
TYIT_603_RUGVED
Rl#write
Building configuration...
[OKI
Rl#reload Proceed with reload? [confirm]
Press enter
Step 3 making a directory
On rl make a directory in flash using mkdir command name the directory ipsdir
Rl#mkdir
Create directory filename [mkdirl?ipsdir Created dir flash:ipsdir
Step 4 configure the IPS signature storage location
On rl configure the ips signature storage location to the directory you just created
RI (config)#ip ips config location flash:ipsdir
Rl(config)#ip ips name iosips
Rl(config)#ip ips notify log
Rl(config)#service timestamp log datetime msec
Rl(config)#logging host 192.168.1.50
Rl(config)#ip ips signature-category
Rl(config-ips-category)#category all
Rl(config-ips-category-action)#retired true
Rl(config-ips-category-action)#exit
Rl(config-ips-category)#category ios_ips basic
Rl(config-ips-category-action)#retired false
Rl(config-ips-category-action)#exit
RI (config-ips-category)#exit
Do you want to accept these changes? [confirm]
Applying Category configuration to signatures
%1PS-6-ENGINE BUILDING: atomic-ip - 288 signatures - 6 of 13 engines
%IPS-6-ENGINE READY: atomic-ip - build time 30 ms - packets for this engine will be
scanned
P a g e 39
TYIT_603_RUGVED
RI (config-if)#exit
RI (config)#ip ips signature-definition
RI (config-sigdef)#signature 2004 0
RI (config-sigdef-sig)#status
Rl(config-sigdef-sig-status)#retired false
RI (config-sigdef-sig-status)#enable true
Rl(config-sigdef-sig-status)#exit
RI (config-sigdef-sig)#engin
Rl(config-sigdef-sig-engine)#event-action produce-alert
RI(config-sigdef-sig-engine)#R1(config-sigdef-sig-engine)#event-action deny-packet-inline RI
(config-sigdef-sig-engine)#exit
RI
RI
Do you want to accept these changes? [confirm]
01PS-6-ENGINE BUILDS STARTED:
%1PS-6-ENGINE BUILDING: atomic-ip - 303 signatures - 3 of 13 engines
0
olPS-6-ENGINE READY: atomic-ip - build time 480 ms - packets for this engine will be
scanned
%1PS-6-ALL ENGINE BUILDS COMPLETE: elapsed time 648 ms
RI (config)#do show ip ips all
OUTPUT
P a g e 40
TYIT_603_RUGVED
Practical 7
Aim: Layer 2 Security
A. layer two security Assign the central switch as the root bridge
B. Secure spanning tree parameter to prevent STP manipulation attract
Step I
Switch>en
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#spanning-tree vlan 1 root primary
Switch(config)#end step 2 go to sw-l SW-1>en
SW-1#sh spanning-tree
SW-1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
SW-1(config)#spanning-tree vlan 1 root secondary
SW-1(config)#interface range f0/23-24
SW-1(config-if-range)#spanning-tree guard root
SW-1(config-if-range)#end
sw-l#
%SYS-5-CONFIG I: Configured from console by console
sw-l#
SW-1#show spanning-tree
P a g e 41
TYIT_603_RUGVED
step 4 SW-A
SW-A(config)#interface range fO/1-4
SW-A(config-if-range)#spanning-tree portfast
SW-A(config-if-range)#interface range f0/1-22
SW-A(config-if-range)#switchport mode access
SW-A(config-if-range)#switchport port-security
SW-A(config-if-range)#switchport port-security maximum 2
SW-A(config-if-range)#switchport port-security violation shutdown SW-A(config-if-
range)#switchport port-security mac-address sticky
SW-A(config-if-range)#interface range f0/5-22
SW-A(config-if-range)#shutdown
SW-2#show port-security interface f0/1
step 4 SW-B
SW-A(config)#interface range fO/1-4
SW-A(config-if-range)#spanning-tree portfast
SW-A(config-if-range)#interface range f0/1-22
SW-A(config-if-range)#switchport mode access
SW-A(config-if-range)#switchport port-security
SW-A(config-if-range)#switchport port-security maximum 2
SW-A(config-if-range)#switchport port-security violation shutdown SW-A(config-if-
range)#switchport port-security mac-address sticky
SW-A(config-if-range)#interface range f0/5-22
SW-A(config-if-range)#shutdown
SW-2#show port-security interface f0/1
P a g e 42
TYIT_603_RUGVED
Output :
P a g e 43
TYIT_603_RUGVED
Practical 8
Aim: Implement Layer 2 VLAN Security.
P a g e 44
TYIT_603_RUGVED
Switch(config)#int fa0/2
Switch(config-if)#switchport access vlan 200
Switch(config-if)#switchport mode access
Switch(config-if)#int fa0/l
Switch(config-if)#switchport trunk native vlan 30
Switch(config-if)#switchport mode trunk Switch(config-if)#switchport nonegotiate Go to router
and give sub interface Router(config-if)#int g0/0.10
Router(config-subif)#int g0/0.20
Router(config-subif)#int g0/0.200
Router(config-subif)#description arealTmgmt
Router(config-subif)#ip address 192.168.200.1 255.255.255.0
Router(config-subif)#access list 101 deny ip 192.168.200.0 0.0.0.255 any
Router(config-subif)#exit
Router(config)#access-list 101 deny ip 192.168.200.0 0.0.0.255 any access-list 101 permit ip any
any access-list 102 permit ip host 192.168.200.10 any
Router(config-if)#int g0/0.10
Router(config-subif)#no ip address
Router(config-subif)#ip access-group 101 in
Router(config-subif)#description arealToffice
Router(config-subif)#no ip address Router(config-subif)#ip access-group 101 in
Router(config-subif)#int g0/0.20
Router(config-subif)#description arealTprod Router(config-subif)#no ip address
Router(config-subif)#ip access-group 101 in
Router(config-subif)#int g0/0.200
Router(config-subif)#description arealTmgmy
Router(config-subif)#encapsulation dotlQ 200
Router(config-subif)#ip address 192.168.200.1 255.255.255.0
Verify the configuration
l) Check connectivity from pc0 to router —should be successful
P a g e 45
TYIT_603_RUGVED
P a g e 46