Packet Tracer - Skills Integration Challenge - 11.5.1.2

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to all this video we are going to discuss this packet tracer activity skills interation challenge before coming to this packet tracer activity firms if you are watching our channel first time or if you like to get this type of technical videos in future consider subscribing also don't forget to enable that Bell icon near to the subscribe button so that you will get notification message whenever we upload a new video right coming back to our packet tracer activity here we can see our addressing table and here we can see this error arising table is incomplete to be how to complete this errors in table right coming to the requirement so here we can see ipv4 addressing create subnets that meet the hosts requirements using 192.168.0.0 slash 24 and here we can see staff 100 host sales 50 house IT 25 house or so guest network to be added later with 25 house also we can see document with the assigned ipv4 addresses in that dressing table and here we can see all the details we just copied to a spreadsheet okay then record the sunnat' for guest network coming to a topology here also we can see the same requirements mentioned here for staff hundred horse and here we can see for sales a 50 horse also for IT department 25 horse also we have to keep 25 horse for guest coming toward a spreadsheet to here we can see the given IP address its 192.168.0.0 slash 24 and here we can see the first row requirements are for staff record 100 host and here we can say network actress we planned 192.168.0.0 turn d5 that means we will get a total of 126 usable IP atrás and here we can see the broadcast actress 192.168.0 to 120 7/25 know coming to as sales have ever created 50 horse and here we can see the next IP address the network address after 127 it's a 192.168.0.1 28 / 26 so here we get a total a 64 address including it work address and broadcast address so we get 62 usable IP address and here we can see the range network actress is a 192.168.0 - 128 and here we can see the broadcast actress 192.168.0.1 91 coming to the next or Ackerman's i t25 a host and here we can see with the remaining subnet 192.168.0 - 192 we given / 27 so that we get 30 usable IP address in this subnet and here we can see the broadcast address 192.168.0 - through 3 and finally for the guest 25 host and here we can see 192.168.0 2 - for the last subnet till 192.168.0 - 5 5 now coming to our topology on this route or we want to see the interfaces it's connected ok so we will go to options preferences and here we will give this option always show poor labels in logical workspace here we can see this staff network is connected to give up a deterent 0/0 sales connected to gigabit the current 0 / 1 + iit is connected to gigabit ethernet co-stars - no coming towards perch schita we will complete this addressing table here on our one the interface a g0 star zero it's for the staff and here we can see the network actress so we will use the first usable IP address so for this interface it's a 0.1 then we have to get a second to mask sure we can see the prefix is a slash 25 so the 70 set 255 dot 255 dot 255 dot to 128 next ISA gigabit a third 0 / 1 which is connected to a sales network and here we can see the network address we will copy it and we will use the first usable IP address here of all this interface it's 0 to 129 then this to mask here we can see the prefix is slash 26 so here the Santa mask is 255 dot 255 dot 255 dot 192 next is a gigabit 1/3 0 / 2 which is connected to this IT Network sure we can see the network address we will use the first usable IP address here it's a 193 and it's something to mask here we can see it's a prefix is this last 27 so previous to mask will be 255 dot 255 dot 255 dot 2 24 next we will assign the second usable IP address of for these hooches s1 s2 and s3 so coming to our spreadsheet here we can see s1 which is in the network staff sure we will copy this IP address and sub to mask here then we can edit it it's a 0.2 then we have to give the default a gateway is the IP address of this interface G 0/0 next - so cheese is - which is in sales network so we can copy this address sure we have it to give the next IP address it's 1:30 then we have to give the default gateway it's here sure we can see that in topology is to the default gateway will be the IP address of this interface gigabit the third 0/1 on this router r1 know coming to s3 which is connected to IT networks g0 stands true we can copy this address then an extra second a usable IP address it's 194 then the default gateway it's 193 next we will assign IP 'trust for these into devices we will use the third usable IP address or from each subnet coming to our spreadsheet here we can see stuff okay here we can use the theory usable IP address we can copy this IP address here and the address is 192.168.0 three remaining everything correct next devices sales we will a copy these IP archers that is a as to coming to sales here we will use the next IP address it's 131 something to mask and default the gateway it's correct then coming to IT sure we can copy this IP address here we will change this address 194 to 195 something to mask and default the gateway it same now we can see our addressing table is a fully a better write what is next PC configurations configur the assigned ipv4 address subnet mask and default gateway settings on the staff sales and IT pcs using your addressing scheme yes we can do that first of all we will assign IP address for the device staff coming to our spreadsheet okay now here we will go to desktop IP configuration and here we will say in the IP address here we can see staff IP address is here we'll copy this address then the sudden to mask its 128 fourth octet then the default gateway its 0.1 now we will go to sales disturb IP configuration then coming to our spreadsheet sales so here we can see the IP address then this up to mask the fourth octet is 192 and to here we can see the default gateway it's 129 0.1 29 right now we will go to IT the stop IP configuration IT here we can see the IP address will copy researchers then this happened to mask 224 and coming to default the Gateway it's a 193 correct next is our scene ipv6 unicast and a link local addresses and default gateway to the staff sales and IT networks according to that dressing-table yes we will do that first of all we will go to staff IP configuration and here we can see ipv6 configuration we will get the ipv6 address of our staff from our addressing table here we can see that then the prefix it's 64 then we can see the default gateway right next we will go to sales IP configuration here we can see sales we will copy this ipv6 address then the prefixes are 64 and here we can see it's a default gateway coming to IT IP configuration here we can see IEP v6 atras star 64 ipv6 gateway it's here now coming to the next configuration r1 configurations configure the device name according to the addressing table okay sure we can see our one you will go to CLI enable configure terminal we will set the hostname as our run next is a disable DNS lookup ok we can do that we have to give a no IP domain lookup here we can see that we have to type domain lookup right next is a scene Cisco enp a55 as the encrypted privileged x ik mode password ok that means we are going to enable a secret so we will copy this password here we are going to give enable secret then the password it's here next is assign Cisco conp fi5 as the console password and enable login ok we will copy this password then we will go to line console 0 and we will set the password as specified it's your login next is our occur that a minimum of 10 characters be used for all passwords yes that can be done we will exit we have a security right password password some minimum length so here are specified at 10 okay we can give 10 you know I'm length off or how can write so here we can give 10 next is a encrypt all plaintext passwords we can use the command service password encryption next is create a banner that wants anyone accessing the device that unauthorized access is prohibited make sure to include the word warning in the banner okay we can do that banner motd we have to start with the delimiter will give warning also we will end with the same delimiter Akshay's configure all the Gigabit Ethernet interfaces configure the ipv4 addresses according to your addressing scheme also configure the ipv6 addresses according to the addressing table now we are going to set a IP address for each interfaces gigabit eternal 0 / 0 0 / 1 & 0 / 2 as per our addressing table we will do that first of all we will go to the interface Gigabit Ethernet 0 / 0 then we will set the IP address here we can see the address better we will copy it also we can see the Sun to mask then no shutdown I think no need to give this notion own command because all these interfaces are up here we can see that now we will go to the next interface we can exit we will go to the interface G 0 / 1 and we will set the IP address here we can see the address we will copy it then this submit to mask ok now we'll go to the interface we can go directly from this interface mode interface we cover the third 0 / 2 we have to give the IP address it's here than the mask right even be able to set the ipv6 address also okay then we will let set for this interface g0 / - first here we can see that we will copy this address it's ipv6 address okay also here we can see the ipv6 link local address Xavier to configure it ipv6 address link local now we will go to G 0 / 1 ok and we will set the ipv6 address G 0 / 1 I P v6 cetera so here we can see that also we will set this ipv6 a link local address it's here ipv6 address fe80 double colon 1 as lin local know we will go to interface g 0 / 0 and we will set ipv6 address it's here also we will set ipv6 atras link-local yes here we configured ipv4 and ipv6 addresses according to an addressing table no we will go to the next two requirements configure SSH on our one first of all set the domain name to CCNA - lab calm ok we will copy it we will exit from here IP domain name it's here next is generate a 1 0 to 4 bit RSA key we can do that crypto key generate RSA how many bits in the modulus 1 0 to 4 as specified next is configure the vty lines for SSH access and use the local user profiles for authentication ok coming to the configuration here we will go to line vty 0 to 15 we'll go to all the lines you will give a login local also we can give a transport input SSH right and actually so create a user admin one with a privilege level of 15 using the encrypted password for admin 1 PA 505 coming to the configuration we will exit you create the username as admin 1 under here we will give a secret and here we can see that password we will copy it okay next is configure the console and btv lines to log out after five minutes of inactivity and block anyone for three minutes who fails to log in after four atoms within a two minute period okay we can do that coming to the configuration here we can give login block for a 180 seconds attempts afore given 120 seconds and now for configuring this inactivity we have to go to each lines so first of all we will go to line vty 0 to 15 and here we will give x''k timeout timeout in minutes it's fire time out in seconds so we can give zero okay you will exit and we will go to line console 0 here also we will do the same exact timeout 5-minute zero seconds what can right so are we complete to this r1 configuration now we will go to a switch configurations configure the device name according to the addressing table ok so we will go to s1 CLI enable configure a terminal hostname as s1 now we will go to use 2 CL I enable configure terminal hostname as s2 next is s 3 CL I enable configure terminal hostname as s3 next is configure the SVA interface with ipv4 address and submit to mask according to your addressing scheme ok we can do that first of all we will go to yes one coming to her dressing table here we can see yes one we have to a set IP address for the interface vlan1 yes when IP address it's here we'll copy this address we will go to the interface vlan1 you will set the IP address then this subnet to mask it's here ok no shutdown no coming to us to interface vlan1 IP address it's here subject to mask then no shutdown now coming to es3 sure we can see the IEP at shows you have to go to the interface vlan1 IP address then they suffered to a mask it's here no shutdown right next we have to configure the default gateway okay come on two years one you will exit and here we have to set the IEP default gateway yes one default the gateways here okay now we will go to yes to exit IP default gateway it's here coming to us three exit IP default gateway yes three defaulting it weights here next is disable DNS lookup okay we can do that coming to an s-1 no IP domain lookup okay coming to s - CL I know IP domain lookup coming to s3 CL I know IP domain lookup next is insane Cisco enp a55 you as the encrypted privileged x ik mode password okay it's a secret password we can give that coming to s1 CLI enable secret coming to s to enable secret and coming to us three enable secret password next is assign a Cisco conp fi fi you as the console password and enable Logan okay we will a copy this password then coming two years one CLI line console 0 it'll set the password as specified then login now coming to s2 line console 0 password login coming to s3 line console 0 password login next is to configure the console and vty lines to log out after five minutes of inactivity ok we can do that - coming to us one CLI I now we are in line console so here we can give x''k timeout 5 minutes 0 seconds also we'll go to line line vty not can solve ok line vty 0 to 15 and here also we are going to give exit timeout 5 minutes 0 seconds now we will go to guess to CLI now we are in line console x'q timeout 5 minutes 0 second will go to line vty 0 to 15 x'q timeout 5 minutes 0 seconds now we will go to s3 we are in console x'q timeout five minute zero second also will go to line vty 0 to 15 x ik timeout 5 minute zero seconds coming to the last configuration on also just encrypt all plaintext passwords yes we can do that licks it and here we have to give a surveys password encryption now we will go to s to CLI exit surveys password encryption and coming to s3 CLI exit surveys password - encryption finally we are going to verify the connectivity using the web browser from staff sales and IT pcs navigate to www.ppsd.com and here is the URL we are waiting for the webpage yes it's working right so now we will go to sales a browser and here will give the URL yes we get the webpage now coming to IT a browser yes it's working next is using the web browser from staff sales and IT PCs navigate to a www dot c 6 . PKA ok we can verify that come and do stuff a browser it's working coming to sales a processor ok it's working and coming to IT it's working and finally all pieces should be able to ping all the devices ok so we will try to ping these pieces each other will get the IP address of sales it's here coming to staff command prompt it's working even we can try to ipv6 atrás we will copy this ipv6 address and to coming to sales command prompt ping to here is the address it's working ok that's all in this a packet race or activity skills integration challenge here actually we have seen all the basic configurations on different devices here we can see our completion status it's 100 percentage terms if you have any doubt any suggestions please comment below and if you liked our video give a thumb and share with all your friends and stay tuned for the future technical videos we will meet again with the next video thank you
Info
Channel: Tech Acad
Views: 5,744
Rating: undefined out of 5
Keywords: CISCO, CCNA, CCNA Routing and Switching, CCNA Certification, CCENT, ICND1, Networking
Id: SKCsnrKXe4c
Channel Id: undefined
Length: 36min 53sec (2213 seconds)
Published: Thu Sep 12 2019
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.