Question: , 11,11, Networking CISCO Academy Lab - Secure Network Devices Topology Addressing Table Objectives Bart 1: Centigure Banie Devien Bettinga hart 2: Cenfigure Banie Security

 , 11,11, Networking CISCO Academy Lab - Secure Network Devices TopologyAddressing Table Objectives Bart 1: Centigure Banie Devien Bettinga hart 2: CenfigureBanie Security Masseres on the Router Rart 3: Cenfigure Bataie Security Maasurnsan the Bwitch Background f Scenario In tha lib, ysu wil conllgurethe relhork terites in the bapology is actept SSH anssiarow far remste

, 11,11, Networking CISCO Academy Lab - Secure Network Devices Topology Addressing Table Objectives Bart 1: Centigure Banie Devien Bettinga hart 2: Cenfigure Banie Security Masseres on the Router Rart 3: Cenfigure Bataie Security Maasurns an the Bwitch Background f Scenario In tha lib, ysu wil conllgure the relhork terites in the bapology is actept SSH anssiarow far remste will then lest the ancurty maideuresi lo zerily that they are pruperly implemaried atd marking correcty. Cacm IOS werwon, the commarda irealabie and the dutpul produced might vicy from what bi shawn in the latri. Pefer to the Foacter haterfica Burmmicy Tible it the end od the lab lar the cormect irterfica identlfera. Nobe: Make iure fhat the roukera ind swizches hive been erimed ind hive no alartup conligurations. If you are utaun, cartinet psur instruder. Required Resources + 1 Bwitch (Cisco 2l60 with Chaso IDS Rakase 15.2(2) lartaiciak image or camparabie) + 1 PC irdawi wibh a varminal emulalon poggam, auch ina Fena Ferm - Corriala cablas za canfigure the Clico los tervices via the cortasha porta * Etharnal ciakai ai whown in the bapolsqy Instructions Part 1: Configure Basic Device Settings In Piwt 1, pou will aat up the ralwork lspalogy ind conligune biaicic antinga, such is the inlarface If Step 1: Cable the network as shown in the topology. Mhach the devises ahown in the lapalogy and eable iak nosesiary. Step 2: Initialize and reload the router and switch. Step 3: Configure the router and switch. a. Corbala irts fhe davioa and aruble ptivleged ExEC msda. b. Asigign the devise nume accouthing to the Addresiding Tible. theugh they wave hombharna. d. Asoign dass iaw the prileged EXEC ertrypled paiawavd. e. Assign daso it the carsole paasward ind enable login. f. Asign dass in the VTY puriword and arable logn. 9. Creube a barner that watrs irrpene accinaing the dervice thal unielloriced aocess is prahibied. h. Configure and actiale the covolt intarfico an the ruuler using the irformabs cartained in the Adtreniare fubla IFor moded L. Configure the defiult Svi an the swikch with the if addresi informabisn woserding to tha Adtreaing Tible. [For seitah. Step 4: Configure PC.A. b. Configure a defiut gutewiy for PC-A. Step 5: Verity network oonnecthity. Fing R1 and 81 from PC-A. If arry af the pings thit, baublikoal the carnecton. Part 2: Configure Basic Security Measures on the Router Step 1: Configure security measures. a. Enerypt all dear-baet passmarth. b. Configure the apalam sa nequire a minimum 12-chackclat puriwword. 2) Bel the carsole passward la sebeolicok' 3) Beat the vty lhe paisward la sebeotrvTY* d. Configure the rouke to wocopt anly SSH contecisma from remsie locitions Lab - Secure Metwork Beviess 1) Conllgure the usemairne SSHiadmin with at enerypled password of SSHAdmin2odt 2) Tha rauler a doman narre should be sal lo cuna-lab.com 3) The kay modulua whoud be 10024 bita. 1) Uaers shauld be discontecbed aflar 5 minules of inactivily. Part 3: Configure security measures. Step 1: Verify that all unused ports are disabled. Mry uruaed parta that are rat in an iedrinistritively down stale shauld be dsabled using the ahutdown comtind in interfices corflgeridas mode. Step 2: Verify that your security measures have been implemented oorrectly. a. Uae Tari Term on RC-A ba bainal lo Ri. Dsent Re1 aciegt the Fainat carnecton? Eaplain. b. Uae Tari Tarm on RC.A la SSH la R.1 Dsent R1 acmegt the SSH contedian? e. Intentenaly mistype the user ind pasiwatd inlarmatian la aee it login acteso ba blociod iller two irlermeth. What happened itter you haled la logn the aecond Ime? exarrple below, the ahow login cammand wis iasued within the 120 seoard lopin bloclurg pariod ind sesends. S5HAdnin2020 for he pasavard. Mier you suctesiluly lagged in, what wai d spilyed? within do seoardi? Eaplain. 9. Iasua the show running-conflg commarid a! thw ptivieged ExEC prompt lo view the security aettrga you hare apglied. Part 4: Configure Basic Security Measures on the Switch Step 1: Configure security measures. a. Enerppt al dear-but passmarth. b. Corfigure the apalam to requine a mirimum 12 duarictar passwerd 2) Bet the carsule passward ta sebsollicon 3) Bet the vty line paiswatd la sebcotrvTr' d. Configure the iwith to isospt anly 9SH contecism from rensie locations. 1) Conlgure the usemarme SSHadmin with at enerppled passwserd of SSHAdminatat 2) The iwithes domain narre shsuld be sat to cini-lab.com 3) The key modulua whould be 1024 bla. 1) Uann shauld be dacontected aflar 5 minutes of inactvity. 2) The iwith shauld nat wilow logra for 2 minukan if 3 folkd logn ialempta aceur with 1 mitusa. f. Daubie al oil the unumed parti. Step 2: Verity all unused ports are disabled. Swith parta ire enabled, by dafaul stul dawn al parta that are nat in use on the which. a. You cin verfy the swikch port atatus using the shaw lp interfieen brint command. b. Uae the intarface range command ls ahul dawn mulipie inlarfican at a tima. c. Verfy that al inictien intedases have bean idministritively atul dawn. Step 3: Verity that your security measures have been implemented oorrectly. a. Varfy that Telnat has bean diabled an fe swich. blocked. c. Aher the 30 anconts tai aspired, S8H to 81 iggien ind log in wivg the SEHadmin usatrume and SSHAdntr2oze for he passivard. Ded the banner ippear aflar pou sussessfuly logpod intpe your wawera here. d. Eribar privileged EXEC mode using feiacelPfore ai the puibword. e. Isaun the ahow running-tonfig command at thw proileged EXEC prompt to viaw the security settinga you hime appled. Reflection Questions comtinst? Router Interface Summary Table wasd in Cboa los tommanda to rapremant the inlartace. , 11,11, Networking CISCO Academy Lab - Secure Network Devices Topology Addressing Table Objectives Bart 1: Centigure Banie Devien Bettinga hart 2: Cenfigure Banie Security Masseres on the Router Rart 3: Cenfigure Bataie Security Maasurns an the Bwitch Background f Scenario In tha lib, ysu wil conllgure the relhork terites in the bapology is actept SSH anssiarow far remste will then lest the ancurty maideuresi lo zerily that they are pruperly implemaried atd marking correcty. Cacm IOS werwon, the commarda irealabie and the dutpul produced might vicy from what bi shawn in the latri. Pefer to the Foacter haterfica Burmmicy Tible it the end od the lab lar the cormect irterfica identlfera. Nobe: Make iure fhat the roukera ind swizches hive been erimed ind hive no alartup conligurations. If you are utaun, cartinet psur instruder. Required Resources + 1 Bwitch (Cisco 2l60 with Chaso IDS Rakase 15.2(2) lartaiciak image or camparabie) + 1 PC irdawi wibh a varminal emulalon poggam, auch ina Fena Ferm - Corriala cablas za canfigure the Clico los tervices via the cortasha porta * Etharnal ciakai ai whown in the bapolsqy Instructions Part 1: Configure Basic Device Settings In Piwt 1, pou will aat up the ralwork lspalogy ind conligune biaicic antinga, such is the inlarface If Step 1: Cable the network as shown in the topology. Mhach the devises ahown in the lapalogy and eable iak nosesiary. Step 2: Initialize and reload the router and switch. Step 3: Configure the router and switch. a. Corbala irts fhe davioa and aruble ptivleged ExEC msda. b. Asigign the devise nume accouthing to the Addresiding Tible. theugh they wave hombharna. d. Asoign dass iaw the prileged EXEC ertrypled paiawavd. e. Assign daso it the carsole paasward ind enable login. f. Asign dass in the VTY puriword and arable logn. 9. Creube a barner that watrs irrpene accinaing the dervice thal unielloriced aocess is prahibied. h. Configure and actiale the covolt intarfico an the ruuler using the irformabs cartained in the Adtreniare fubla IFor moded L. Configure the defiult Svi an the swikch with the if addresi informabisn woserding to tha Adtreaing Tible. [For seitah. Step 4: Configure PC.A. b. Configure a defiut gutewiy for PC-A. Step 5: Verity network oonnecthity. Fing R1 and 81 from PC-A. If arry af the pings thit, baublikoal the carnecton. Part 2: Configure Basic Security Measures on the Router Step 1: Configure security measures. a. Enerypt all dear-baet passmarth. b. Configure the apalam sa nequire a minimum 12-chackclat puriwword. 2) Bel the carsole passward la sebeolicok' 3) Beat the vty lhe paisward la sebeotrvTY* d. Configure the rouke to wocopt anly SSH contecisma from remsie locitions Lab - Secure Metwork Beviess 1) Conllgure the usemairne SSHiadmin with at enerypled password of SSHAdmin2odt 2) Tha rauler a doman narre should be sal lo cuna-lab.com 3) The kay modulua whoud be 10024 bita. 1) Uaers shauld be discontecbed aflar 5 minules of inactivily. Part 3: Configure security measures. Step 1: Verify that all unused ports are disabled. Mry uruaed parta that are rat in an iedrinistritively down stale shauld be dsabled using the ahutdown comtind in interfices corflgeridas mode. Step 2: Verify that your security measures have been implemented oorrectly. a. Uae Tari Term on RC-A ba bainal lo Ri. Dsent Re1 aciegt the Fainat carnecton? Eaplain. b. Uae Tari Tarm on RC.A la SSH la R.1 Dsent R1 acmegt the SSH contedian? e. Intentenaly mistype the user ind pasiwatd inlarmatian la aee it login acteso ba blociod iller two irlermeth. What happened itter you haled la logn the aecond Ime? exarrple below, the ahow login cammand wis iasued within the 120 seoard lopin bloclurg pariod ind sesends. S5HAdnin2020 for he pasavard. Mier you suctesiluly lagged in, what wai d spilyed? within do seoardi? Eaplain. 9. Iasua the show running-conflg commarid a! thw ptivieged ExEC prompt lo view the security aettrga you hare apglied. Part 4: Configure Basic Security Measures on the Switch Step 1: Configure security measures. a. Enerppt al dear-but passmarth. b. Corfigure the apalam to requine a mirimum 12 duarictar passwerd 2) Bet the carsule passward ta sebsollicon 3) Bet the vty line paiswatd la sebcotrvTr' d. Configure the iwith to isospt anly 9SH contecism from rensie locations. 1) Conlgure the usemarme SSHadmin with at enerppled passwserd of SSHAdminatat 2) The iwithes domain narre shsuld be sat to cini-lab.com 3) The key modulua whould be 1024 bla. 1) Uann shauld be dacontected aflar 5 minutes of inactvity. 2) The iwith shauld nat wilow logra for 2 minukan if 3 folkd logn ialempta aceur with 1 mitusa. f. Daubie al oil the unumed parti. Step 2: Verity all unused ports are disabled. Swith parta ire enabled, by dafaul stul dawn al parta that are nat in use on the which. a. You cin verfy the swikch port atatus using the shaw lp interfieen brint command. b. Uae the intarface range command ls ahul dawn mulipie inlarfican at a tima. c. Verfy that al inictien intedases have bean idministritively atul dawn. Step 3: Verity that your security measures have been implemented oorrectly. a. Varfy that Telnat has bean diabled an fe swich. blocked. c. Aher the 30 anconts tai aspired, S8H to 81 iggien ind log in wivg the SEHadmin usatrume and SSHAdntr2oze for he passivard. Ded the banner ippear aflar pou sussessfuly logpod intpe your wawera here. d. Eribar privileged EXEC mode using feiacelPfore ai the puibword. e. Isaun the ahow running-tonfig command at thw proileged EXEC prompt to viaw the security settinga you hime appled. Reflection Questions comtinst? Router Interface Summary Table wasd in Cboa los tommanda to rapremant the inlartace

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!