How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank. |
NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.
|
Network Security (Version 1) – Network Security Hands on Skills Exam Assessment
Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only.
Topology
Addressing Table
Device | Interface | IP Address | Subnet Mask | Default Gateway |
---|---|---|---|---|
R1 | G0/0/0 | 64.100.1.1 | 255.255.255.252 | N/A |
G0/0/1 | 192.168.1.0 | 255.255.255.0 | N/A | |
R2 | G0/0/0 | 64.100.1.2 | 255.255.255.252 | N/A |
G0/0/1 | 64.100.3.2 | 255.255.255.252 | N/A | |
R3 | G0/0/0 | 64.100.3.1 | 255.255.255.252 | N/A |
G0/0/1.3 | 172.16.3.1 | 255.255.255.0 | N/A | |
G0/0/1.33 | 172.16.33.1 | 255.255.255.0 | N/A | |
S2 | VLAN 3 | 172.16.3.2 | 255.255.255.0 | 172.16.3.1 |
S3 | VLAN 3 | 172.16.3.3 | 255.255.255.0 | 172.16.3.1 |
PC-A | NIC | 192.168.1.10 | 255.255.255.0 | 192.168.1.1 |
PC-B | NIC | 172.16.3.10 | 255.255.255.0 | 172.16.3.1 |
PC-C | NIC | 172.16.33.10 | 255.255.255.0 | 172.16.33.1 |
Assessment Objectives
- Part 1: Secure Layer 2 Switches (25 points, 25 minutes)
- Part 2: Configure Secure Router Administrative Access (15 points, 15 minutes)
- Part 3: Configure a Site-To-Site IPsec VPN (30 points, 30 minutes)
- Part 4: Configure a Zone-Based Policy Firewall (30 points, 30 minutes)
Scenario
This Skills Assessment (SA) is the final practical exam for the Networking Security course. The exam is divided into four parts. The parts should be completed sequentially and signed off by your Answers before moving on to the next part.
In Part 1 you will load basic configuration and secure a Layer 2 switch. In Part 2, you will secure administrative access to network routers and configure OSPF authentication. In Part 3, you will configure Site-to-Site VPN between R1 and R3. In Part 4, you will configure zone-based policy firewall (ZPF) on an integrated service router (ISR).
Answers Note: The routers used with hands-on labs are Cisco 4221 with Cisco IOS XE Release 16.9.6 (universalk9 image). The switches used in the labs are Cisco Catalyst 2960+ with Cisco IOS Release 15.2(7) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and the output produced might vary from what is shown in this SA. Refer to the Router Interface Summary Table at the end of this document for the correct interface identifiers.
Answers Note: Sample scoring and estimated times for each exam are provided. These can be adjusted by the Answers as necessary to suit the testing environment. Total points for the exam are 100 and total time is estimated at 100 minutes. The Answers may elect to deduct points if excessive time is taken for a part of the assessment.
Note: Before you begin, ensure that the devices have been erased and have no startup configurations.
Required Resources
- 3 Routers (Cisco 4221 with Cisco XE Release 16.9.6 universal image or comparable with a Security Technology Package license)
- 2 Switches (Cisco 2960+ with Cisco IOS Release 15.2(7) lanbasek9 image or comparable)
- 3 PCs (Windows OS with a terminal emulation application, such as PuTTY or Tera Term installed)
- Console cables to configure Cisco networking devices
- Ethernet cables as shown in the topology
Part 1: Secure Layer 2 Switches
- Total points: 25
- Time: 25 minutes
Step 1: Configure the PCs.
Configure the IP address and default gateway for each PC according to the Addressing Table.
Step 2: Load provided device configurations.
Note: The following requirements are critical to successful completion of this SA.
S2 Startup Configuration
enable configure terminal hostname S2 no ip domain lookup interface vlan 3 ip add 172.16.3.2 255.255.255.0 no shutdown ip default-gateway 172.16.3.1 end
S3 Startup Configuration
enable configure terminal hostname S3 no ip domain lookup interface vlan 3 ip add 172.16.3.3 255.255.255.0 no shut ip default-gateway 172.16.3.1 end
R1 Startup Configuration
enable configure terminal host R1 no ip domain lookup interface GigabitEthernet0/0/0 description Link to R2 ip address 64.100.1.1 255.255.255.252 no shutdown interface GigabitEthernet0/0/1 description Link to R1 LAN ip address 192.168.1.1 255.255.255.0 no shutdown router ospf 1 passive-interface GigabitEthernet0/0/1 network 64.100.1.0 0.0.0.3 area 0 network 192.168.1.0 0.0.0.255 area 0 end
R2 Startup Configuration
enable configure terminal hostname R2 no ip domain lookup interface GigabitEthernet0/0/0 description Link to R1 ip address 64.100.1.2 255.255.255.252 no shutdown interface GigabitEthernet0/0/1 description Link to R3 ip address 64.100.3.2 255.255.255.252 no shutdown router ospf 1 network 64.100.1.0 0.0.0.3 area 0 network 64.100.3.0 0.0.0.3 area 0 username webuser privilege 15 algorithm-type scrypt secret webuserpass ip http server ip http secure-server ip http authentication local end
R3 Startup Configuration
enable config terminal hostname R3 no ip domain lookup interface GigabitEthernet0/0/0 description Link to R2 ip address 64.100.3.1 255.255.255.252 no shutdown interface GigabitEthernet0/0/1.3 description Link to VLAN 3 encapsulation dot1q 3 ip address 172.16.3.1 255.255.255.0 interface GigabitEthernet0/0/1.33 description Link to VLAN 33 encapsulation dot1q 33 ip address 172.16.33.1 255.255.255.0 interface GigabitEthernet0/0/1 no shutdown router ospf 1 network 64.100.3.0 0.0.0.3 area 0 network 172.16.0.0 0.0.255.255 area 0 passive-interface g0/0/1 end
Step 3: Secure Layer 2 Switches.
Note: The security features in this part of the exam will be configured on switch S2 and S3. However, in a production network, all switches would be secured.
In this step, you will configure security settings on the indicated switch using the CLI. Configuration tasks include the following:
Configuration Item or Task | Specification | Pts | Earned |
Assign and encrypt the privileged EXEC password. | Switch: S2
| 0.5 | |
Add a user to the local database for administrator access | Switch: S2
| 0.5 | |
Configure SSHv2. | Switch: S2
| 2 | |
Configure the AAA authentication settings. | Switch: S2
| 2 | |
Enhanced Login settings | Switch: S2
| 1 | |
Encrypt all passwords | Switch: S2 | 0.5 | |
Configure VTY lines to allow SSH access. | Switch: S2
| 0.5 | |
Create the VLAN list. | Switches: S2 & S3
| 0.5 | |
Configure trunk ports. | Interfaces:
Native VLAN: 99 | 2 | |
Disable trunking. | Switch: S2 & S3
| 1 | |
VLAN Assignments | VLAN 3: S2 F0/18 VLAN 33: S3 F0/18 | 1 | |
Enable PortFast and BPDU guard. | Switch: S2 & S3 Ports: F0/18 | 1 | |
Configure basic port security. | Switch: S2
(NETLAB+ user: maximum limit: 2)
| 2 | |
Disable unused ports on S2 and assign ports to VLAN 99. | Switch: S2
| 1 | |
Configure Loop guard. | Switch: S2
| 0.5 | |
Total | 16 |
NETLAB+ Note: Use a Maximum limit of 2 when configuring basic port security. Otherwise, the hidden Control Switch will cause a violation to occur and the port will be shutdown.
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
Assign and encrypt a privileged EXEC password. (Switch: S2 only) | enable algorithm-type scrypt secret cisco12345 | show run | inc enable Verify encryption type 9. |
Add a user in the local database for administrator access. (Switch: S2 only) | username admin01 privilege 15 algorithm-type scrypt secret admin01pass | show run | include username Verify username, privilege level, and encryption type. The password can be verified. |
Configure SSHv2. (Switch: S2 only) | ip domain-name netsec.com crypto key generate rsa general-keys modulus 1024 ip ssh version 2 ip ssh time-out 90 ip ssh authentication-retries 2 | show ip ssh |
Configure the AAA authentication settings. | aaa new-model aaa authentication login default local-case | show run | inc aaa |
Enhanced Login settings | login block-for 180 attempts 4 within 120 | show login |
Encrypt all passwords | service password-encryption | show run | incl password-e |
Configure VTY lines to allow SSH access. (Switch: S2 only) | line vty 0 15 transport input ssh exit | show run | section vty |
Create VLAN list. (Switches: S2 & S3) | vlan 3 name INSIDE vlan 33 name GUEST vlan 99 name NULL exit | show vlan |
Configure trunk ports. (Switches: S2 & S3) | Switch S2: interface range f0/3-4 switchport mode trunk switchport trunk native vlan 99 switchport nonegotiate Switch S3: interface range f0/1-2, f0/5 switchport mode trunk switchport trunk native vlan 99 switchport nonegotiate | show run | beg interface |
Disable trunking. (Switches: S2 & S3) | Switch S2: interface f0/18 switchport mode access switchport access vlan 3 Switch S3: interface f0/18 switchport mode access switchport access vlan 33 | show run interface f0/18 |
Enable PortFast and BPDU guard. (Switch: S2 & S3) | Switch S2: interface f0/18 spanning-tree portfast spanning-tree bpduguard enable Switch S3: interface f0/18 spanning-tree portfast spanning-tree bpduguard enable | show run interface f0/18 |
Configure basic port security. (Switch: S2 only) | interface f0/18 switchport port-security switchport port-security maximum 1 switchport port-security mac-address sticky switchport port-security violation shutdown | show port-security interface f0/18 |
Disable unused ports on S2 and assign ports to VLAN 99. (Switch: S2 only) | interface range f0/1-2, f0/5-17, f0/19-24, g0/1-2 switchport mode access switchport access vlan 99 shutdown | show ip interface brief (Determine whether interfaces are administratively down.) |
Configure Loop guard globally. (Switch: S2 only) | spanning-tree loopguard default | show spanning-tree summary (Determine whether Loopguard Default is enabled.) |
Troubleshoot as necessary to correct any issues discovered.
Step 4: Verify Network Connectivity.
Configuration Task | Specification | Pts | Earned |
Verify connectivity between PC-C and PC-B | 0.5 | ||
From PC-B and PC-C, SSH into S2 | SSH should be successful. | 0.5 | |
Total | 1 |
Answers Sign-Off Part 1:
Type your answers here.
Points for Part 1: (Total points 25)
Type your answers here.
Note: Do not proceed to Part 2 until your Answers has signed off on Part 1.
Part 2: Configure Secure Router Access
Total points: 15
Time: 15 minutes
In Part 2, you will secure administrative access on router R3. You will also configure OSPF routing protocol authentication between routers R2 and R3.
Step 1: Configure secure router administrative access.
In this step, you will secure administrative access on R3.
Configuration Item or Task | Specification | Pts | Earned |
Set minimum password length. | Minimum Length: 10 characters | 0.5 | |
Assign and encrypt a privileged EXEC password. | Password: cisco12345 Encryption type: 9 (scrypt) | 0.5 | |
Add a user in the local database for administrator access | Username: admin01 Privilege level: 15 Encryption type: 9 (scrypt) Password: admin01pass | 1 | |
Configure SSH. | Domain name: netsec.com RSA Keys size: 1024 Version: 2 Timeout: 90 seconds Authentication retries: 2 | 1 | |
Configure the AAA authentication settings. | Enable AAA Use local database as default setting. Use case-sensitive local username authentication | 2 | |
Enhanced Login settings | Block for three minutes after four failed attempts in two-minute period. | 1 | |
Encrypt all passwords | 0.5 | ||
Configure VTY lines to allow SSH access only | Allow only SSH access. | 0.5 | |
Verify SSH access to R3 from PCs | SSH should be successful. | 1 | |
Total | 8 |
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
Set minimum password length. | security passwords min-length 10 | show run | inc passwords |
Assign and encrypt a privileged EXEC password. | enable algorithm-type scrypt secret cisco12345 | show run | inc enable Verify encryption type 9. |
Add a user in the local database for administrator access. | username admin01 privilege 15 algorithm-type scrypt secret admin01pass | show run | include username Verify Username, Privilege level, and encryption type. The password can be verified. |
Configure SSH. | ip domain-name netsec.com crypto key generate rsa general-keys modulus 1024 ip ssh version 2 ip ssh time-out 90 ip ssh authentication-retries 2 | show ip ssh |
Configure the AAA authentication settings. | aaa new-model aaa authentication login default local-case | show run | inc aaa |
Enhanced Login settings | login block-for 180 attempts 4 within 120 | show login |
Encrypt all passwords | service password-encryption | show run | incl password-e |
Configure VTY lines to allow SSH access | line vty 0 4 transport input ssh exit | show run | sec vty |
Step 2: Configure OSPF authentication on R2 and R3.
Configuration Item or Task | Specification | Pts | Earned |
Configure key chain using SHA256 hashing | Routers: R2 & R3
| 4 | |
Apply the assigned the key chain to the appropriate interfaces | 2 | ||
Total | 6 |
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
Configure key chain using SHA256 hashing | key chain NetSec key 10 key-string NetSecOSPF cryptographic-algorithm hmac-sha-256 | show run | section key |
Apply the assigned the key chain to the appropriate interfaces | Router R2: interface g0/0/1 ip ospf authentication key-chain NetSec Router R3: interface g0/0/0 ip ospf authentication key-chain NetSec | Router R2: show ip ospf interface g0/0/1 Router R3: show ip ospf interface g0/0/0 |
Step 3: Verify connectivity.
Configuration Task | Specification | Pts | Earned |
Verify connectivity between PC-A and PC-B | 0.5 | ||
Verify connectivity between PC-A and PC-C | 0.5 | ||
Total | 1 |
Answers Sign-Off Part 2:
Type your answers here.
Points for Part 2: (Total points 15)
Type your answers here.
Note: Do not proceed to Part 3 until your Answers has signed off on Part 2.
Part 3: Configure a Site-to-Site VPN (30 points, 30 minutes)
Total points: 30 points
Time: 30 minutes
In this part, you will configure a Site-to-Site IPsec VPN between the routers R1 and R3. You will use the CLI to configure R1 and repeat the procedure for R3.
Step 1: Configure Site-to-Site VPN on R1 using CLI. (14 points, 15 minutes)
Configuration parameters include the following:
Configuration Item or Task | Specification | Pts | Earned |
Create an ISAKMP policy. | ISAKMP Policy Priority: 1 Authentication type: pre-share Encryption: aes 256 Hash algorithm: sha Diffie-Hellman Group Key Exchange: 24 | 5 | |
Configure the pre-shared key. | Preshare key: ciscopreshare Address:64.100.3.1 | 2 | |
Configure the IPsec transform set. | Tag: TRNSFRM-SET Cipher: aes 256 Hash function: ESP-SHA-HMAC | 2 | |
Define interesting traffic. | ACL: VPN-TRAFFIC Source Network: 192.168.1.0 /24 Destination Network: 172.16.30 /24 | 1 | |
Create a crypto map. | Crypto map name: CMAP Sequence number: 1 Type: ipsec-isakmp ACL to match: VPN-TRAFFIC Peer: 64.100.3.1 Pfs type: group24 Transform-set: TRNSFRM-SET | 3 | |
Apply crypto map to the interface. | Interface: G0/0/0 Crypto map name: CMAP | 1 | |
Total | 14 |
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
Create an ISAKMP policy. | crypto isakmp policy 1 authentication pre-share encryption aes 256 hash sha group 24 | show crypto isakmp policy |
Configure the pre-shared key. | crypto isakmp key ciscopreshare address 64.100.3.1 | show run | include crypto |
Configure the IPsec transform set. | crypto ipsec transform-set TRNSFRM-SET esp-aes 256 esp-sha-hmac | show run | include crypto |
Define interesting traffic. | ip access-list extended VPN-TRAFFIC permit ip 192.168.1.0 0.0.0.255 172.16.3.0 0.0.0.255 | show access-list |
Create a crypto map. | crypto map CMAP 1 ipsec-isakmp match address VPN-TRAFFIC set transform-set TRNSFRM-SET set peer 64.100.3.1 set pfs group24 | show crypto map |
Apply crypto map to interface. | interface g0/0/0 crypto map CMAP | show crypto map show run interface g0/0/0 |
Step 2: Configure Site-to-Site VPN on R3 using CLI. (12 points, 10 minutes)
Configuration Item or Task | Specification | Pts | Earned |
Create an ISAKMP policy. | ISAKMP Policy Priority: 1 Authentication type: pre-share Encryption: aes 256 Hash algorithm: sha Diffie-Hellman Group Key Exchange: 24 | 4 | |
Configure the pre-shared key. | Preshare key: ciscopreshare Address:64.100.1.1 | 2 | |
Configure the IPsec transform set. | Tag: TRNSFRM-SET ESP transform: R3-R1 Cipher: aes 256 Hash function: ESP-SHA-HMAC | 2 | |
Define interesting traffic. | ACL: VPN-TRAFFIC Source Network: 172.16.3.0 /24 Destination Network: 192.168.1.0 /24 | 1 | |
Create a crypto map. | Crypto map name: CMAP Sequence number: 1 Type: ipsec-isakmp ACL to match: VPN-TRAFFIC Peer: 64.100.1.1 Pfs type: group24 Transform-set: TRNSFRM-SET | 2 | |
Apply crypto map to the interface. | Interface: G0/0/0 Crypto map name: CMAP | 1 | |
Total | 12 |
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
---|---|---|
Create an ISAKMP policy. | crypto isakmp policy 1 authentication pre-share encryption aes 256 hash sha group 24 | show crypto isakmp policy |
Configure the pre-shared key. | crypto isakmp key ciscopreshare address 64.100.1.1 | show run | include crypto |
Configure the IPsec transform set. | crypto ipsec transform-set TRNSFRM-SET esp-aes 256 esp-sha-hmac | show run | include crypto |
Define interesting traffic. | ip access-list extended VPN-TRAFFIC permit ip 172.16.3.0 0.0.0.255 192.168.1.0 0.0.0.255 | show access-list |
Create a crypto map. | crypto map CMAP 1 ipsec-isakmp match address VPN-TRAFFIC set transform-set TRNSFRM-SET set peer 64.100.1.1 set pfs group24 | show crypto map |
Apply crypto map to interface. | Interface g0/0/0 crypto map CMAP | show crypto map show run interface g0/0/0 |
Step 3: Verify VPN Connection.
Configuration Task | Specification | Pts | Earned |
---|---|---|---|
Verify VPN connectivity between PC-A and PC-B | Use the correct commands to demonstrate the packet route | 1 | Blank |
Verify NO VPN connectivity between PC-A and PC-C | Use the correct commands to demonstrate the packet route | 1 | Blank |
Verify VPN operation | 2 | blank | |
Total | 4 | blank |
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
---|---|---|
Verify VPN connectivity between PC-A and PC-B | PC-A> tracert 172.16.3.10 | The tracepath from PC-A to PC-B: 192.168.1.1 > 64.100.3.1 > 172.16.3.10 |
Verify NO VPN connectivity between PC-A and PC-C | PC-A> tracert 172.16.33.10 | The path from PC-A to PC-C goes thru R2, not thru the VPN tunnel |
Verify the VPN operation. | show crypto isakmp sa show crypto ipsec sa |
Note: Before proceeding to Part 4, ask your Answers to verify the VPN configuration and functionality.
Answers Sign-Off Part 3:
Type your answers here.
Points for Part 3: (Total points 27):
Type your answers here.
Note: Do not proceed to Part 4 until your Answers has signed off on Part 3.
Part 4: Configure a Zone-Based Policy Firewall (30 points, 30 minutes)
Total points: 30 points
Time: 30 minutes
In this part, you will configure a zone-based policy firewall on R3.
– Computers in the R3 INSIDE network are considered trusted and are allowed to initiate any type of traffic (TCP, UDP or ICMP based traffic).
– Computers in the R3 GUEST network are considered untrusted and are allowed to initiate only web traffic (HTTP or HTTPS) to the OUTSIDE.
– No traffic initiated from the OUTSIDE, except VPN connection, should be allowed into the INSIDE networks.
Step 1: Configure ZPF for INSIDE to OUTSIDE (14 points, 12 minutes)
Configuration Item or Task | Specification | Pts | Earned |
Create the security zones. | Inside zone name: INSIDE Outside zone name: OUTSIDE | 2 | |
Create an inspect class map. | Class map name: INSIDE-PROTOCOLS Inspection type: match-any Protocols allowed: tcp,udp,icmp | 3 | |
Create an inspect policy map. | Policy map name: INSIDE-TO-OUTSIDE-PM Bind the class map to the policy map. Matched packets should be inspected. | 3 | |
Create a zone pair. | Zone pair name: INSIDE-TO-OUTSIDE-ZP Source zone: INSIDE Destination zone: OUTSIDE | 3 | |
Apply the policy map to the zone pair. | Zone pair name: INSIDE-TO-OUTSIDE-ZP Policy map name: INSIDE-TO-OUTSIDE-PM | 2 | |
Assign interfaces to the proper security zones. | Interface G0/0/1.3: INSIDE Interface G0/0/0: OUTSIDE | 2 | |
Total | 15 |
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
Create security zone names. | zone security INSIDE zone security OUTSIDE | show zone security |
Create an inspect class map. | class-map type inspect match-any INSIDE-PROTOCOLS match protocol tcp match protocol udp match protocol icmp | show class-map type inspect |
Create an inspect policy map. | policy-map type inspect INSIDE-TO-OUTSIDE-PM class type inspect INSIDE-PROTOCOLS inspect | show policy-map type inspect |
Create a zone pair. | zone-pair security INSIDE-TO-OUTSIDE-ZP source INSIDE destination OUTSIDE | show zone-pair security |
Apply the policy map to the zone pair. | service-policy type inspect INSIDE-TO-OUTSIDE-PM | show zone-pair security |
Assign interfaces to the proper security zones. | interface g0/0/1.3 zone-member security INSIDE interface g0/0/0 zone-member security OUTSIDE | show zone security or show policy-map type inspect zone-pair |
Troubleshoot as necessary to correct any issues discovered.
Step 2: Configure ZPF for GUEST to OUTSIDE (10 points, 8 minutes)
Configuration Item or Task | Specification | Pts | Earned |
Create the security zone. | GUEST zone name: GUEST | 1 | |
Create an inspect class map. | Class map name: GUEST-PROTOCOLS Inspection type: match-any Protocols allowed: http,https.dns | 2 | |
Create an inspect policy map. | Policy map name: GUEST-TO-OUTSIDE-PM Bind the class map to the policy map. Matched packets should be inspected. | 2 | |
Create a zone pair. | Zone pair name: GUEST-TO-OUTSIDE-ZP Source zone: GUEST Destination zone: OUTSIDE | 2 | |
Apply the policy map to the zone pair. | Zone pair name: GUEST-TO-OUTSIDE-ZP Policy map name: GUEST-TO-OUTSIDE-PM | 2 | |
Assign interfaces to the proper security zones. | Interface G0/0/1.33: GUEST | 1 | |
Total | 10 |
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
Create security zone names. | zone security GUEST | show run | section zone security |
Create an inspect class map. | class-map type inspect match-any GUEST-PROTOCOLS match protocol http match protocol https match protocol dns | show class-map type inspect |
Create an inspect policy map. | policy-map type inspect GUEST-TO-OUTSIDE-PM class type inspect GUEST-PROTOCOLS inspect | show policy-map type inspect |
Create a zone pair. | zone-pair security GUEST-TO-OUTSIDE-ZP source GUEST destination OUTSIDE | show zone-pair security |
Apply the policy map to the zone pair. | service-policy type inspect GUEST-TO-OUTSIDE-PM | show zone-pair security |
Assign interfaces to the proper security zones. | interface g0/0/1.33 zone-member security GUEST | show zone security |
Step 3: Configure ZPF for OUTSIDE to INSIDE (5 points, 7 minutes)
Configuration Item or Task | Specification | Pts | Earned |
Create a named ACL to allow R1 VPN traffic through to VLAN 3 | Name: REMOTE-TRAFFIC Source: 192.168.1.0 /24 Destination: 172.16.3.0 /24 | 1 | |
Create an inspect class map. | Class map name: OUTSIDE-TRAFFIC Inspection type: match-all Access group allowed: REMOTE-TRAFFIC | 1 | |
Create an inspect policy map. | Policy map name: OUTSIDE-TO-INSIDE-PM Bind the class map to the policy map. Matched packets should be inspected. | 1 | |
Create a zone pair. | Zone pair name: OUTSIDE-TO-INSIDE-ZP Source zone: INSIDE Destination zone: OUTSIDE | 1 | |
Apply the policy map to the zone pair. | Zone pair name: OUTSIDE-TO-INSIDE-ZP Policy map name: OUTSIDE-TO-INSIDE-PM | 1 | |
Total | 5 |
Troubleshoot as necessary to correct any issues discovered.
Configuration Item or Task | Configuration Commands | Verification Commands |
Create ACL to allow R1 VPN traffic through | ip access-list extended REMOTE-TRAFFIC permit ip 192.168.1.0 0.0.0.255 172.16.3.0 0.0.0.255 | show access-list REMOTE-TRAFFIC |
Create an inspect class map. | class-map type inspect match-all OUTSIDE-TRAFFIC match access-group name REMOTE-TRAFFIC | show class-map type inspect |
Create an inspect policy map. | policy-map type inspect OUTSIDE-TO-INSIDE-PM class type inspect OUTSIDE-TRAFFIC inspect | show policy-map type inspect |
Create a zone pair. | zone-pair security OUTSIDE-TO-INSIDE-ZP source OUTSIDE destination INSIDE | show zone-pair security |
Apply the policy map to the zone pair. | service-policy type inspect OUTSIDE-TO-INSIDE-PM | show zone-pair security |
Step 4: Verify ZPF functionality.
Configuration Task | Specification | Pts | Earned |
---|---|---|---|
Verify all PCs can access web browser on R2 | 1 | Blank | |
Verify VPN connection between PC-A and PC-B | 1 | Blank | |
Verify No OUTSIDE traffic into INSIDE zone, except via VPN | 1 | Blank | |
Total | 3 | blank |
Troubleshoot as necessary to correct any issues discovered.
Answers Sign-Off Part 4:
Type your answers here.
Points for Part 1: (Total points 30)
Type your answers here.
Router Interface Summary Table
Router Model | Ethernet Interface #1 | Ethernet Interface #2 | Serial Interface #1 | Serial Interface #2 |
1900 | Gigabit Ethernet 0/0 (G0/0) | Gigabit Ethernet 0/1 (G0/1) | Serial 0/0/0 (S0/0/0) | Serial 0/0/1 (S0/0/1) |
2900 | Gigabit Ethernet 0/0 (G0/0) | Gigabit Ethernet 0/1 (G0/1) | Serial 0/0/0 (S0/0/0) | Serial 0/0/1 (S0/0/1) |
4221 | Gigabit Ethernet 0/0/0 (G0/0/0) | Gigabit Ethernet 0/0/1 (G0/0/1) | Serial 0/1/0 (S0/1/0) | Serial 0/1/1 (S0/1/1) |
4300 | Gigabit Ethernet 0/0/0 (G0/0/0) | Gigabit Ethernet 0/0/1 (G0/0/1) | Serial 0/1/0 (S0/1/0) | Serial 0/1/1 (S0/1/1) |
Blank Line, No additional information
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be a fiber optic interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface.
Device Configs
Router R1
R1# show run brief Building configuration… Current configuration : 1795 bytes ! version 16.9 service timestamps debug datetime msec service timestamps log datetime msec platform qfp utilization monitor load 80 platform punt-keepalive disable-kernel-core ! hostname R1 ! boot-start-marker boot-end-marker ! no aaa new-model ! no ip domain lookup ! login on-success log ! subscriber templating multilink bundle-name authenticated ! spanning-tree extend system-id ! redundancy mode none ! crypto isakmp policy 1 encr aes 256 authentication pre-share group 24 crypto isakmp key ciscopreshare address 64.100.3.1 ! crypto ipsec transform-set TRNSFRM-SET esp-aes 256 esp-sha-hmac mode tunnel ! crypto map CMAP 1 ipsec-isakmp set peer 64.100.3.1 set transform-set TRNSFRM-SET set pfs group24 match address VPN-TRAFFIC ! interface GigabitEthernet0/0/0 description Link to R2 ip address 64.100.1.1 255.255.255.252 negotiation auto crypto map CMAP ! interface GigabitEthernet0/0/1 description Link to R1 LAN ip address 192.168.1.1 255.255.255.0 negotiation auto ! interface Serial0/1/0 no ip address ! interface Serial0/1/1 no ip address ! router ospf 1 passive-interface GigabitEthernet0/0/1 network 64.100.1.0 0.0.0.3 area 0 network 192.168.1.0 0.255.255.255 area 0 ! ip forward-protocol nd no ip http server ip http secure-server ! ip access-list extended VPN-TRAFFIC permit ip 192.168.1.0 0.0.0.255 172.16.3.0 0.0.0.255 ! control-plane ! line con 0 transport input none stopbits 1 line aux 0 stopbits 1 line vty 0 4 login ! end
Router R2
R2# show run brief Building configuration… Current configuration : 1543 bytes ! version 16.9 service timestamps debug datetime msec service timestamps log datetime msec platform qfp utilization monitor load 80 platform punt-keepalive disable-kernel-core ! hostname R2 ! boot-start-marker boot-end-marker ! no aaa new-model ! no ip domain lookup ! login on-success log ! subscriber templating ! multilink bundle-name authenticated ! key chain NetSec key 10 key-string NetSecOSPF cryptographic-algorithm hmac-sha-256 ! spanning-tree extend system-id ! username webuser privilege 15 secret 5 $1$t1x6$But2s0WOVK7oxozoIkMsX1 ! redundancy mode none ! interface GigabitEthernet0/0/0 description Link to R1 ip address 64.100.1.2 255.255.255.252 negotiation auto ! interface GigabitEthernet0/0/1 description Link to R3 ip address 64.100.3.2 255.255.255.252 ip ospf authentication key-chain NetSec negotiation auto ! router ospf 1 network 64.100.1.0 0.0.0.3 area 0 network 64.100.3.0 0.0.0.3 area 0 ! ip forward-protocol nd ip http server ip http authentication local ip http secure-server ! control-plane ! line con 0 transport input none stopbits 1 line aux 0 stopbits 1 line vty 0 4 login ! end
Router R3
R3# show run brief Building configuration… Current configuration : 4195 bytes ! version 16.9 service timestamps debug datetime msec service timestamps log datetime msec platform qfp utilization monitor load 80 platform punt-keepalive disable-kernel-core ! hostname R3 ! boot-start-marker boot-end-marker ! security passwords min-length 10 enable secret 9 $9$5d06ThFZdLHxBy$A56qWeaP9g6Znb3d2iImMN5KFH87FS4Ds4GMiaMocBQ ! aaa new-model ! aaa authentication login default local-case ! aaa session-id common ! no ip domain lookup ip domain name netsec.com ! login block-for 180 attempts 4 within 120 login on-success log ! subscriber templating ! multilink bundle-name authenticated ! key chain NetSec key 10 key-string 7 032A5E1F350A22637D393F cryptographic-algorithm hmac-sha-256 ! spanning-tree extend system-id ! username admin01 privilege 15 secret 9 $9$DeZoOK/8DhxDdi$EvM6XnDQxwyxKIqDWmeVv5q53jDflVihZ/z4u.o0O7c ! redundancy mode none ! class-map type inspect match-all OUTSIDE-TRAFFIC match access-group name REMOTE-TRAFFIC class-map type inspect match-any GUEST-PROTOCOLS match protocol http match protocol https match protocol dns class-map type inspect match-any INSIDE-PROTOCOLS match protocol tcp match protocol udp match protocol icmp ! policy-map type inspect OUTSIDE-TO-INSIDE-PM class type inspect OUTSIDE-TRAFFIC inspect class class-default policy-map type inspect INSIDE-TO-OUTSIDE-PM class type inspect INSIDE-PROTOCOLS inspect class class-default policy-map type inspect GUEST-TO-OUTSIDE-PM class type inspect GUEST-PROTOCOLS inspect class class-default ! zone security INSIDE zone security OUTSIDE zone security GUEST zone-pair security GUEST-TO-OUTSIDE-ZP source GUEST destination OUTSIDE service-policy type inspect GUEST-TO-OUTSIDE-PM zone-pair security INSIDE-TO-OUTSIDE-ZP source INSIDE destination OUTSIDE service-policy type inspect INSIDE-TO-OUTSIDE-PM zone-pair security OUTSIDE-TO-INSIDE-ZP source OUTSIDE destination INSIDE service-policy type inspect OUTSIDE-TO-INSIDE-PM ! crypto isakmp policy 1 encr aes 256 authentication pre-share group 24 crypto isakmp key ciscopreshare address 64.100.1.1 ! crypto ipsec transform-set TRNSFRM-SET esp-aes 256 esp-sha-hmac mode tunnel ! crypto map CMAP 1 ipsec-isakmp set peer 64.100.1.1 set transform-set TRNSFRM-SET set pfs group24 match address VPN-TRAFFIC ! interface GigabitEthernet0/0/0 description Link to R2 ip address 64.100.3.1 255.255.255.252 zone-member security OUTSIDE ip ospf authentication key-chain NetSec negotiation auto crypto map CMAP ! interface GigabitEthernet0/0/1 no ip address negotiation auto ! interface GigabitEthernet0/0/1.3 description Link to VLAN 3 encapsulation dot1Q 3 ip address 172.16.3.1 255.255.255.0 zone-member security INSIDE ! interface GigabitEthernet0/0/1.33 description Link to VLAN 33 encapsulation dot1Q 33 ip address 172.16.33.1 255.255.255.0 zone-member security GUEST ! router ospf 1 passive-interface GigabitEthernet0/0/1 network 64.100.3.0 0.0.0.3 area 0 network 172.16.0.0 0.0.255.255 area 0 ! ip forward-protocol nd ip http server ip http authentication local ip http secure-server ! ip ssh time-out 90 ip ssh authentication-retries 2 ip ssh version 2 ! ip access-list extended REMOTE-TRAFFIC permit ip 192.168.1.0 0.0.0.255 172.16.3.0 0.0.0.255 ip access-list extended VPN-TRAFFIC permit ip 172.16.3.0 0.0.0.255 192.168.1.0 0.0.0.255 ! control-plane ! line con 0 transport input none stopbits 1 line aux 0 stopbits 1 line vty 0 4 transport input ssh ! end
Switch S2
S2# show run brief Building configuration… Current configuration : 3695 bytes ! version 15.2 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname S2 ! boot-start-marker boot-end-marker ! enable secret 9 $9$YayOy4FgblvfMJ$CZODl3OsdsFV/cCXv0SuVcXnrC4k7RhAb52T4wlgaNM ! username admin01 privilege 15 secret 9 $9$C6qz0LLIjxwWh2$QhZnu4nwKyDdv3WgOpAG4yKjk7jaEZuIKX.EzZkDiU2 aaa new-model aaa authentication login default local-case ! aaa session-id common system mtu routing 1500! ! no ip domain-lookup ip domain-name netsec.com login block-for 180 attempts 4 within 120 ! spanning-tree mode rapid-pvst spanning-tree loopguard default spanning-tree extend system-id ! vlan internal allocation policy ascending ! interface FastEthernet0/1 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/2 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/3 switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate ! interface FastEthernet0/4 switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate ! interface FastEthernet0/5 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/6 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/7 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/8 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/9 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/10 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/11 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/12 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/13 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/14 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/15 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/16 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/17 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/18 switchport access vlan 3 switchport mode access switchport port-security maximum 1 switchport port-security mac-address sticky 0050.569c.5f78 switchport port-security spanning-tree portfast edge spanning-tree bpduguard enable ! interface FastEthernet0/19 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/20 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/21 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/22 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/23 switchport access vlan 99 switchport mode access shutdown ! interface FastEthernet0/24 switchport access vlan 99 switchport mode access shutdown ! interface GigabitEthernet0/1 switchport access vlan 99 switchport mode access shutdown ! interface GigabitEthernet0/2 switchport access vlan 99 switchport mode access shutdown ! interface Vlan1 no ip address shutdown ! interface Vlan3 ip address 172.16.3.2 255.255.255.0 ! ip default-gateway 172.16.3.1 ip http server ip http secure-server ip ssh time-out 90 ip ssh authentication-retries 2 ip ssh version 2 ! line con 0 line vty 0 4 login local transport input ssh line vty 5 15 login local transport input ssh ! end
Switch S3
S3# show run brief Building configuration… Current configuration : 4040 bytes ! version 15.0 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption service call-home ! hostname S3 ! boot-start-marker boot-end-marker ! ! no aaa new-model system mtu routing 1500 ! no ip domain-lookup login on-success log ! spanning-tree mode rapid-pvst spanning-tree extend system-id ! vlan internal allocation policy ascending ! interface FastEthernet0/1 switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate ! interface FastEthernet0/2 switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate ! interface FastEthernet0/3 ! interface FastEthernet0/4 ! interface FastEthernet0/5 switchport trunk native vlan 99 switchport mode trunk switchport nonegotiate ! interface FastEthernet0/6 ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 switchport access vlan 33 switchport mode access spanning-tree portfast spanning-tree bpduguard enable ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address ! interface Vlan3 ip address 172.16.3.3 255.255.255.0 ! ip default-gateway 172.16.3.1 ip http server ip http secure-server ! line con 0 logging synchronous stopbits 1 line vty 0 4 login line vty 5 15 login ! end