SIC Practical Questions
SIC Practical Questions
CERTIFICATE
This is to certify that the work entered in this journal is as per syllabus for T.Y.BSc.IT Class Perscribed by University
of Mumbai and was done in the IT laboratory of Niranjana Majithia College of Commerce by Mr/Mrs
______________________________ of TYBSc.IT. bearing Seat No:
External Examiner
Address Table:
Default
Device Interface IP Address Subnet Mask
Gateway
G 0/0 192.168.1.1 255.255.255.0 N/A
R1
S 0/1/0 10.1.1.1 255.255.255.252 N/A
S 0/1/0 10.1.1.2 255.255.255.252 N/A
R2
S 0/1/1 10.2.2.2 255.255.255.252 N/A
G 0/0 192.168.3.1 255.255.255.0 N/A
R3
S 0/1/0 10.2.2.1 255.255.255.252 N/A
PC-A NIC 192.168.1.5 255.255.255.0 192.168.1.1
PC-B NIC 192.168.1.6 255.255.255.0 192.168.1.1
PC-C NIC 192.168.3.5 255.255.255.0 192.168.3.1
Step 3: Configure the MD5 key for all the routers in area 0.
Steps for part 3: Configure Routers to Log Messages to the Syslog Server
Step 1: Configure the routers to identify the remote host will receive logging messages. R1
R2
R3
Address Table:
➔ router configuration
Username:
touhid Password:
1234 R1>
Part 2: Configure Local AAA Authentication for vty Lines on R1
Practical 3:- Configure Extended ACLs – Scenario 1
Address Table:
Default
Device Interface IP Address Subnet Mask
Gateway
G 0/0 172.22.34.1 255.255.255.252 N/A
R1 S 0/1 172.22.34.65 255.255.255.252 N/A
S 0/2 172.22.34.97 255.255.255.252 N/A
Server NIC 172.22.34.62 255.255.255.0 172.22.34.1
PC1 NIC 172.22.34.66 255.255.255.0 172.22.34.68
PC1 NIC 172.22.34.98 255.255.255.0 172.22.34.97
Necessary step:
Step 1: Test connectivity. All devices should be able to ping all other IP addresses. ➔
Pc and Server configuration:
➔ Router Configuration:
Note: Check ping command from PC’s to Server and it should work
Part 1: Configure, Apply and Verify an Extended Numbered ACL
Step 1: Configure an ACL to permit FTP and ICMP.
Addressing Table:
Step 2: Configure ACL 120 to specifically permit and deny the specified Traffic.
192.168.1.3 (PC-A ip address)
IP Configuration
:- PC-A
PC-C
R1
R2
R3
Commands :-
SSH
Verification :-
Practical 6 :- Configuring IOS
Instruction Prevention System
Using CLI
Circuit Diagram :-
IP Configuration
:- PC0
PC1
PC2
Server0
Commands :-
R0
R1
Web Browser:-
PC0 – Server0
PC1 – Server0
Server0 – PC0
Server0 – PC1
Verification :-
Practical 7:- Layer 2 Security
guard root
SW-B(conf)#interface range
f0/3-6 # spanning-tree portfast
#exit
· OSPF 101
a. On R1, issue the show version command to view the Security Technology package license
information.
b. If the Security Technology package has not been enabled, use the following command to enable
the package.
d. Save the running-config and reload the router to enable the security license.
e. Verify that the Security Technology package has been enabled by using the show version
command.
Configure ACL 110 to identify the traffic from the LAN on R1 to the LAN on R3 as interesting. This
interesting traffic will trigger the IPsec VPN to be implemented when there is traffic between the R1
to R3 LANs. All other traffic sourced from the LANs will not be encrypted. Because of the implicit
deny all, there is no need to configure a deny ip any any statement.
Configure the crypto ISAKMP policy 10 properties on R1 along with the shared crypto key vpnpa55.
Refer to the ISAKMP Phase 1 table for the specific parameters to configure. Default values do not
have to be configured. Therefore, only the encryption method, key exchange method, and DH method
must be configured.
Note: The highest DH group currently supported by Packet Tracer is group 5. In a production
network, you would configure at least DH 14.
R1(config-isakmp)# group 5
R1(config-isakmp)# exit
b. Create the crypto map VPN-MAP that binds all of the Phase 2 parameters together. Use sequence
number 10 and identify it as an ipsec-isakmp map.
R1(config-crypto-map)# exit
Bind the VPN-MAP crypto map to the outgoing Serial 0/0/0 interface.
a. On R3, issue the show version command to verify that the Security Technology package license
information has been enabled.
b. If the Security Technology package has not been enabled, enable the package and reload R3.
Configure reciprocating parameters on R3. Configure ACL 110 identifying the traffic from the LAN
on R3 to the LAN on R1 as interesting.
Configure the crypto ISAKMP policy 10 properties on R3 along with the shared crypto key vpnpa55.
R3(config-isakmp)# group 5
R3(config-isakmp)# exit
b. Create the crypto map VPN-MAP that binds all of the Phase 2 parameters together. Use sequence
number 10 and identify it as an ipsec-isakmp map.
R3(config-crypto-map)# exit
Step 5: Configure the crypto map on the outgoing interface.
Bind the VPN-MAP crypto map to the outgoing Serial 0/0/1 interface. Note: This is not graded.
Issue the show crypto ipsec sa command on R1. Notice that the number of packets encapsulated,
encrypted, decapsulated, and decrypted are all set to 0.
On R1, re-issue the show crypto ipsec sa command. Notice that the number of packets is more than 0,
which indicates that the IPsec VPN tunnel is working.
Ping PC-B from PC-A. Note: Issuing a ping from router R1 to PC-C or R3 to PC-A is not interesting
traffic.
On R1, re-issue the show crypto ipsec sa command. Notice that the number of packets has not
changed, which verifies that uninteresting traffic is not encrypted.
Address Table:
Default
Device Interface IP Address Subnet Mask
Gateway
G0/0 209.165.200.225 255.255.255.248 N/A
R1 S0/0/0
10.1.1.1 255.255.255.252 N/A
(DCE)
S0/0/0 10.1.1.2 255.255.255.252 N/A
R2 S0/0/1
10.2.2.2 255.255.255.252 N/A
(DCE)
G0/1 172.16.3.1 255.255.255.0 N/A
R3
S0/0/1 10.2.2.1 255.255.255.252 N/A
VLAN 1
ASA 192.168.1.1 255.255.255.0 N/A
(E0/1)
VLAN 2
ASA 209.165.200.226 255.255.255.248 N/A
(E0/0)
VLAN 3
ASA 192.168.2.1 255.255.255.0 N/A
(E0/2)
DMZ
NIC 192.168.2.3 255.255.255.0 192.168.2.1
Server
PC-B NIC 192.168.1.3 255.255.255.0 192.168.1.1
PC-C NIC 172.16.3.3 255.255.255.0 172.16.3.1
Steps for Part 2: Configure ASA Settings and Interface Security Using
the CLI.
Step 1: Configure the hostname and domain name.
Step 2: Configure the enable mode password.
Step 3: Set the date and time.
Step 4: Configure the inside and outside interfaces.
● Configure a logical VLAN 1 interface for the inside network
(192.168.1.0/24) and set the security level to the highest setting of 100.
CCNAS-ASA(config)# interface vlan 1 CCNAS-ASA(config-if)#
nameif inside
CCNAS-ASA(config-if)# ip address 192.168.1.1 255.255.255.0 CCNAS-
ASA(config
if)# security-level 100
● Create a logical VLAN 2 interface for the outside network
(209.165.200.224/29), set the security level to the lowest setting of 0, and
enable the VLAN 2 interface.
CCNAS-ASA(config-if)# interface vlan 2
CCNAS-ASA(config-if)# nameif outside
CCNAS-ASA(config-if)# ip address 209.165.200.226 255.255.255.248 CCNAS
ASA(config-if)# security-level 0