9.4.1.2 Packet Tracer - Skills Integration Challenge

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to all in this video we are going to see the packet race or activity skills integration challenge before coming to our activity in France if you like to get my future uploading video info into your Gmail you can subscribe this channel right now well coming to our activity here we can see a trussing table also we can see the lands and port assignments table coming to the addressing table here we can see the device admin - SW this is nothing but the switch here we can see it's our st. only the IP address and here we can see not mentioned this subnet to mask also the default gateway no we will go through the scenario of this packet tracer activity this culminating activity includes many of the skills that you have acquired during this course first you will complete the documentation for the network so make sure you have a printed version of the instructions during implementation you will configure VLAN trunking port security and SSH or remote access on a switch then you will implement internal VLAN routing and net on a router finally you will use your documentation to verify your implementation by testing in d2 int connectivity right now we will go through the documentation you are all required to fully document the network you will need a printout of this instruction set which will include an unlabeled the topology diagram na we are going to use this activity label all the device names network addresses and other important information that packet tracer generated complete the etre sink table and VLANs and put assignments table yes we will do that fill in any blanks in the implementation and verification steps the information is supplied when you launch the packet restore activity coming to our spreadsheet - here we can see our a trussing table also VLANs and deport assignments table first of all we are going to fill the details of VLAN santé port assignments table here we are going to fill this network details of each VLAN number coming to our topology here we can see those details wheel and 15 wheel and 30 wheel and 45 and VLAN 60 and there are a network atras so very easily we can fill this a detail sphere here we can see the network details of this VLANs and port assignments table now we are going to identify the subject to mask and default gateway of this device admin - SW here we can see the interface VLAN 60 so coming to our Avilan sandport assignments table here we can see VLAN number 60 and the network 'trust 10.10.5.3 know - 146 is assailed from this network 10.14 4 also we can see the prefix length here slash 28 so here we get the SATA to mask that is right 255.255.255.0 now we will find - the default gateway coming to a topology here we can see this device admin - SW switch is connected to this router admin and here we can see the interface Gigabit Ethernet 0/0 coming to our spreadsheet here we can see that the sub interfaces of a VLAN number with villain number 60 that is Gigabit Ethernet 0 slash 0 dot 60 and here we can see the IP or trust of that sub interface 10.10.5.3 gateway for this device will be this IP atras so we will give that here tendo 10 - 10 to 1 4 5 now we will come to implementation not all devices in the topology except admin and admin - SW and IT support are fully configured you do not have access to the other routers you can access all the servers and PCs for testing purpose implement to following requirements using your documentation coming to the device admin - SW here we can see that it's a switch configure a remote management access including IP accessing and SSH domain is cisco.com user or admin with the password let me in crypto key lengths offer 1024 SSH version - limited to two authentication attempts and a 60 second timeout clear text passwords should be encrypted so we will do this first first of all we will configure IP address so for this device that mean - SW with a default gateway coming to the device that mean - SW enable configure terminal here we will go to the interface VLAN 60 and we will set the IP atras 10 dot 10.30 146 and the subnet mask 255.255.255.0 no shut exit and we will set the IP default gateway 10.10 dot dot - 1 4 5 now we will set a domain name IP domain name as specified the cisco.com and we will give a crypto key generate RSA here we are going to give a 1024 yes and now we are going to set the username as admin and the password at us let me in also IP ssh version 2 IP ssh authentication or a trice has specified - also we have to set the IP ssh time out 60 seconds we'll go to line vty 0 to 15 login local and we have to give transport input SSH now we are going to encrypt all plaintext passwords using we have to go to global configuration mode and here we are to give a salaries password encryption we will see the next two requirements configure name and assign VLANs ports should be manually configured as access ports also we have to configure trunking first of all we are going to create these VLANs VLAN 15 servers will end 30 pcs within 45 minute - and a VLAN 60 management we learn 15 named us servers then the havilland 30 name a species and Terry have a wheel and a 45 named us nature also we have a wheel and 60 named as management now we will assign VLANs to the port's as per our VLANs and put a seaman's table here we can see from faster third 0/1 till the faster third 0/10 we have to assemble a number 30 so we will do that first except chanta we will go to this interface or cell range faster third 0/1 till 10 so to porter models access and switch abort access VLAN 30 next isa faster third 0 / 11 till 0/20 VLAN number ace of 15 exit interface arranged faster third 0 / 11 till 20 support a modest access support access VLAN 15 next to her we can see the interface Gigabit Ethernet to 0 / 1 which is a native VLAN coming to our topology here we can see the interface Gigabit Ethernet 0 / 1 which is connecting to this router at Mynt to the interface the Gigabit Ethernet 0/0 so here are this interface Gigabit Ethernet 0 / 1 we are going to make the mode as a trunk coming to switch exit and we will go to that interface Gigabit Ethernet 0/1 and here are the Modi's trunk also support a trunk we have to set the native VLAN 45 coming to the next two requirements implement port security on fastethernet 0/1 allow to my cut results that are automatically added to the configuration file then a detector the port should not be disabled but a syslog message should be captured if a violation occurs right so we will do that coming to the topology on this switch admin - SW here we can see that specified interface fastethernet 0/1 so here we are going to implement that is specified for security coming to configuration so we will exit from here and we will go to that interface fastethernet 0/1 and we will let the switch port port security 3 given priority it's a port security then such a port port security maximum as specified at - and switch a port port security MAC addresses Tiki support the port security violation a specified or a strict coming to the last requirement in this admin - SW disable all other and used 2 ports coming towards spreadsheet here we can see we used in this switch interfaces from fastethernet 0/1 till 20 also we used one gigabit eternity rose last one so here we can see and use the port's from faster third 0 / 21 till 24 also 1 Gigabit Ethernet 0 / 2 so we will let shut down these interfaces coming to admin we will exceed hunt we will go to these interfaces ass arrange a faster thir net 0/20 one till 24 also we have one gigabit ethernet 0/2 we are going to shut down these interfaces here we can see that 23 24 and Gigabit Ethernet 0 / 2 now we will see the requirements off the device admin here we can see that a router configure inter VLAN routing first of all we will configure the sub interface Gigabit Ethernet 0 / 0.15 here we can see the IP address and the subnet to mask coming to admin enable configure terminal we have to go to this sub interface so a Gigabit Ethernet 0 / 0.15 here we are going to give you n capsulation dot1q as 15 and I will set the IP address here is the HS and the subject mask 255.255.255.0 for coming through the next sub interface if you give it a thorough co-star 0.30 here we can see the IP address and subnet mask door - 192 hexxit interface' Giga be deterrent zeroes slash 0.30 the encapsulation dot1q 30 IP address and the subnet mask 255.255.255.0 192 coming to the next sub interface 0.45 here we can see the IP address and the Sun to mask dot two four zero coming to the router exceed interface a Gigabit Ethernet 0 slash 0.45 encapsulation dot1q 45 you and it's a native VLAN so we have to given it to you IP address so here is that under sub to mask 255.255.255.0 coming to the last sub interface that is Gigabit Ethernet 0/0 Road 60 here we can see the IP address and the subnet mask here exceed interface Gigabit Ethernet 0 / 0 dot 60 encapsulation dot1q wheel and 60 then the IP address here is that and this subnet mask 255.255.255.0 the topology here we can see this interface is down so we are going to give a notional command for the interface Gigabit Ethernet 0/0 so that all the sub interface also will be up we will exit and we will go to the interface Gigabit Ethernet 0 / 0 and we will give a no-shit command and here we can see all the sub interfaces change its tapes stay to up so dot 15 0 30 0.45 0.60 coming to the next configuration configure DHCP services for VLAN 30 use LAN as the case sensitive in name for the pool so here we can see for the VLAN the network address at tender tender 10.1 92 / 26 so coming to the configuration we will exit and here we will create the IP dhcp pool name as a LAN as specified then here we have seen the network that is 10 Torr 10.10 dot dot to mask 255.255.255.0 192 also we have to set the default to router so this is for the VLAN 30 coming to our spreadsheet - here we can see the sub interface Gigabit Ethernet 0 / 0 dot 30 IP at Russ we will copy these Aras and to coming to admin and we will paste it here is the default router coming to the next requirement implement routing use OSPF process ID 1 and router ID 1.1.11 configure one Network statement for the enter tender tender tender 0/24 atra space disabled interfaces that should not send OSPF messages also configure a default route to the internet coming to the router exit router OSPF process ID as specified 1 the router ID 1 dot 1.2 1.1 then we have to give the network as a summarized network they given a tender tender tender 0 and the wild-card bits they're given here we can see it says last 24 or so the wild they got a bit 0 dot 0 dot 0 dot 2 5 5 & 2 area 0 also we will let set the passive interface a Gigabit Ethernet 0/0 now we are going to set a default or route to the Internet coming to a topology here we can see the interface the exit interface here we can see serial 0 / 1 / 0 which is going to the internet or from this router admin so now we will configure that exceed IP route 0.0.0.0 space 0.0.0.0 space and the exit interface Syria 0 / 1 / 0 coming to the next requirement implement NAT configure a standard one statement ACL number one all IP addresses belonging to the tender tender 10.0 / 24 at rest place are allowed yes we can do that here we are going to create access list 1 and we are going to permit here we are going to give it a summarize to a truss that is a tender tender 10.0 and the wildin are the bits 0 dot 0 dot 0 dot 2 5 5 coming to the next requirement or refer to your documentation and to configure static NAT for the file server coming to a topology here we can see a file server and also we can see the inside a trust enter 10th or 10.2 162 and outside a truss / 98.1 3 3.21 9.13 0 so we will configure that coming to a router admin here we are going to give IP not toriel to give inside right and then source static and then we have seen this actress local IP address that is a tender tender 10.2 one six two then we have to give you the global IP address inside global IP a trust that is one 98.21 33.2 one ninth or two one three zero no we have to set the direction so coming to the topology here we can see these interfaces going to the internet so this interface that is the serial 0 / 1 / 0 we have to give an IEP net outside and the other interfaces here we can see serial as 0 / 0 / 0 or so oh this is 0 0 / 0 / 0 and this is a serial 0 / 0 / 1 + 2 V how one a Gigabit Ethernet 0 / 0 but here we can see we configure this as a sub interface so we have to give the direction as IP net inside for these two sub interfaces 0.15 and the 0.30 coming to the configuration you do one by one first of all we will go to the interface serial as euro / or 1 star 0 here we have a IP NAT outside then we have a interface serial 0 / 0 / 0 IP not inside then we have a interface oops will exit and we will give interface serial 0 / 0 / 1 IP not inside also we will go to the sub interfaces interface Gigabit Ethernet 0 / 0.15 your IP NAT inside also we have a 0.30 I pee not inside coming to the next to requirement configure dynamic NAT with the pad using a pool name of your choice its last 30 masks and these two public addresses one 98.21 double 3.21 9.2 128 and to 129 well coming to the router here we are going to give IP not pool and a name here I am going to give a and n then the start IP address here is that also the end IP address 129 then the network net mask has specified 255.255.255.0 2 also IP not inside source the list we created is one pool and the pool name here we given as a n n overlord coming to the last requirement IT support verify IT support has received a full addressing information from admin right here we can see IT support the stop IP configuration and here we are going to give a DHCP requesting IP address here we can see that yes it's received now we will come to verification all devices should now be able to ping or other devices if not troubleshoot your configurations to isolate and solve problems a few tests include verify your remote access to admin - SW by using SSH from a PC we will try to access this admin - SW using SSH from this PC first of all we will get the IP address of this admin - SW here is that does top command prompt so we are going to give a SSH then the username as admin and the target to here is that yes it's prompted for the password we given I let me in yes so be able to access this admin - SW next ISA verify VLANs are assigned to appropriate ports and the port security is in force so coming to our switch here we will give enable and show VLAN brief and here we can see the details all the interfaces are assigned to the collective VLAN also we will give a show port security then the interface fastethernet 0/1 and here we can see the details port security is enabled violation mod is or restrict and the maximum mica trust - total MAC addresses it's already connected 1 next is a verify OSPF neighbors and a complete routing table right coming to aunt min we will see our route so IP route and here we can see the details here we can see the static route what we said also hola Dora ISP of route right next is a very fine at translations and statics outside hosts should be able to access file server at the public address so here we can see your file server with the public address one and 8.13 three-toed two one nine two two one three zero we will access this FTP server from this outside host command prompt here we are going to give FTP and the public address username is cisco password is cisco yes be able to access this FTP server now we will try to access this web server from this IT support using this atra 64 or 100 or two one five zero ten web browser and here is the address yes we are getting the web server now we will check in add translations and this router admin show IP to translations and to here we can see the details we try to access a FTP also we accessed HTTP document any problems you encountered and to the solutions in the troubleshooting documentation table below anywhere we done everything correct well that's all in this packet place or activity skills integration challenge here we can see the completion status 70 out of 70 a friend City how in need out please comment below also if we liked my video give a thump and - don't forget to subscribe the channel so that you will get latest uploading video information directly into your Gmail thank you
Info
Channel: Tech Acad
Views: 48,695
Rating: undefined out of 5
Keywords: Access Control List
Id: aLl9wlOzKOs
Channel Id: undefined
Length: 29min 16sec (1756 seconds)
Published: Tue Mar 20 2018
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.