CIS230_3.11_Router Security_Lab

docx

School

ECPI University, Greensboro *

*We aren’t endorsed by this school

Course

230

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

6

Uploaded by corada5995

Report
Task Summary Required Actions v Create Standard Access List 5 v/ Permit Network 192.168.1.0 0.0.0.255 v/ Permit Network 192.168.2.0 0.0.0.255 v/ Permit Network 192.168.3.0 0.0.0.255 v Apply Access List 5to VTY lines 0-4 Hide Details Apply to VTY 0 for inbound traffic [+ Apply to VTY 1 for inbound traffic [+ Apply to VTY 2 for inbound traffic [+ ] Apply to VTY 3 for inbound traffic [+] Apply to VTY 4 for inbound traffic v Save your changes in the startup-config file Hide Details Save the permit192.168.1.0 0.0.0.255 statement k3 save the permit192.168.2.0 0.0.0.255 statement k3 save the permit192.168.3.0 0.0.0.255 statement [+] Apply access list 5 to VTY lines 0-4 Complete this lab as follows: 1. Enter the configuration mode for the router: a. From the exhibit, select the router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, create a standard numbered access list using number 5. Add a permit statement for each network to the access list. a. Type access-list 5 permit 192.168.1.0 0.0.0.255 and then press Enter. b. Type access-list 5 permit 192.168.2.0 0.0.0.255 and then press Enter. c. Type access-list 5 permit 192.168.3.0 0.0.0.255 and then press Enter. 3. Apply the access list to VTY lines 0-4. Filter incoming traffic. a. Type line vty 0 4 and then press Enter. b. Type access-class 5 in and then press Enter. c. Press Ctrl + Z. 4. Save your changes in the startup-config file. a. Type copy run start and then press Enter. b. Press Enter to begin building the configuration. c. Press Enter.
Task Summary Required Actions v/ Add permit any to Access List 11 Hide Details kd Add the permit any statement E3 Make the statement the last in the list v Save your changes in the startup-config file Hide Details Save the permit statement k3 save the statement as the last in the list Explanation Complete this lab as follows: 1. Enter the configuration mode for the Fiji router: a. From the exhibit, select the Fiji router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, add a permit any statement to Access List 11 to allow all traffic other than the restricted traffic. a. Type access-list 11 permit any and press Enter. b. Press Ctrl + Z. 3. Save your changes in the startup-config file. a. Type copy run start and then press Enter. b. Press Enter to begin building the configuration. c. Press Enter. Task Summary Required Actions v/ Create Standard Access List 25 v Deny Host 199.68.111.199 v Deny Host 202.177.9.1 v Deny Host 211.55.67.11 V' Permit all other hosts Hide Details Add the permit any statement k3 Make the statement last in the list v Apply Access List 25 to the s0/0/0 interface
Complete this lab as follows: 1. Enter the configuration mode for the router: a. From the exhibit, select the router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, create a standard numbered access list using number 25. Add statements to the access list to block traffic to the required hosts. a. Type access-list 25 deny host 199.68.111.199 and press Enter. b. Type access-list 25 deny host 202.177.9.1 and press Enter. c. Type access-list 25 deny host 211.55.67.11 and press Enter. 3. From the terminal, add a statement to allow all other traffic from all other hosts, by typing access-list 25 permit any and pressing Enter. 4. From the terminal, apply Access List 25 to the Serial0/0/0 interface to filter incoming traffic. a. Type int s0/0/0 and press Enter. b. Type ip access-group 25 in and press Enter. c. Type Ctrl + Z. Which of the following should be configured on the router to filter traffic at the router level? SSH = Access control list Telnet Anti-spoofing rules You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with the username admin01 and the password P@ssWOrd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? Use encrypted Type 7 passwords. = Move the router to a secure server room. Change the default administrative username and password. Use a Telnet client to access the router configuration.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Which of the following happens by default when you create and apply a new ACL on a router? ACLs are not created on a router. The ACL is ignored until applied. All traffic is permitted. = All traffic is blocked. Which type of ACL should be placed as close to the source as possible? Basic Advanced =5 Extended Standard You are deploying a brand new router. After you change the factory default settings, what should you do next? Configure SSH to access the router configuration. Configure anti-spoofing rules. = Update the firmware. Secure the configuration file.
Which of the following can make passwords useless on a router? Storing the router configuration file in a secure location = Not controlling physical access to the router Using the MD5 hashing algorithm to encrypt the password Using SSH to remotely connect to a router You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID for access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a username of admin and a password of P@ssWO0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.) Use encrypted Type 7 passwords. Use an SSH client to access the router configuration. Use a web browser to access the router configuration using an HTTP connection. Use TFTP to back up the router configuration to a remote location. Change the default administrative username and password.
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a locked server closet. You use an FTP client to regularly back up the router configuration to a remote server in an encrypted file. You access the router configuration interface from a notebook computer that is connected to the router's console port. You've configured the device with the username admin01 and the password P@ssWO0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? Use an SSH client to access the router configuration. Use SCP to back up the router configuration to a remote location. Use encrypted Type 7 passwords. Move the router to a secure data center. You have configured your ACL to block outgoing traffic from a device with the IP address 192.168.1.52. Which type of ACL have you configured? Basic Extended = Standard Advanced Which of the following does a router use to determine where packets are forwarded to? = Routing table Access control list Firewall Anti-spoofing rules
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help