CCNA 4 Chapter 5 SIC Access Control List and SNMP Configuration PT Skills Assessment

CCNA 4 Chapter 5 SIC Access Control List and SNMP Configuration PT Skills Assessment

CCNA Routing and Switching
Connecting Networks 6.0 – Chapter 5 Skills Integration Challenge

Chapter 5 SIC: Access Control List and SNMP Configuration

FORM 0

ccna-4-chapter-5-sic-access-control-list-and-snmp-configuration-pt-skills-assessment-1

A few things to keep in mind while completing this activity:

  1. Do not use the browser Back button or close or reload any Exam windows during the exam.
  2. Do not close Packet Tracer when you are done. It will close automatically.
  3. Click the Submit Assessment button to submit your work.

Introduction

In this practice Packet Tracer Skills Based Assessment, you will:

  • Configure SNMP community strings.
  • Configure standard and extended IPv4 ACLs to filter network traffic.
  • Configure an IPv6 ACLs to filter network traffic.

Addressing Table
ccna-4-chapter-5-sic-access-control-list-and-snmp-configuration-pt-skills-assessment-2

Step 1: Configure SNMP Community Strings on the HQ router.

a.  Configure a Read Only SNMP community string hq-monitor.
b.  Configure a Read/Write SNMP community string hq-inside.

Step 2: Configure an ACL for NAT on the HQ router.

a.  Configure standard access list numbered 1 to allow NAT for hosts in network 192.168.10.0 /24.

Step 3: Configure a standard ACL to restrict remote access to the HQ router.

a.  Configure a standard ACL numbered 12 to restrict remote access to HQ.

  • Allow only the HQ-Admin-PC to access the HQ router remotely via VTY.
  • All other remote connections should fail.

Step 4: Configure two extended ACLs to restrict access to SNMP operation on the HQ router.

a.  Configure an extended ACL named SNMPACCESS.

  • The SNMP operation runs UDP on port 161.
  • Allow only the HQ-Admin-PC to access the HQ router for the SNMP connection.
  • SNMP connections from other hosts on the HQ LAN should fail.
  • Allow all other IP traffic.
  • Apply this ACL on the HQ router, G0/0 interface.

b.  Configure an extended ACL named SNMPDENY.

  • Deny any hosts to make connections to SNMP on the HQ router.
  • Allow all other IP traffic.
  • Apply this ACL on the HQ router, G0/1 interface.

Step 5: Configure an extended ACL to restrict access to the HQ LAN from the Internet.

a.  Configure an extended IPv4 ACL named INTOHQ.

  • Allow any hosts from the Internet to access the HQ DNS Svr. There should be two ACEs, one for TCP and the other UDP. Both use port 53.
  • Allow any hosts from the Internet to access the HQ Web Svr. Only port 80 is needed.
  • Allow return TCP traffic from the Internet that was initiated from the hosts in the HQ networks to pass (with the established keyword).
  • Apply the ACL to the HQ S0/0/0 interface.

Step 6: Configure an extended ACL to restrict access to the DMZ network.

a.  Configure an extended IPv4 ACL named IN-DMZ.

  • Allow any hosts to access the HQ DNS Svr. There should be two ACEs, one for TCP and the other UDP. Both use port 53.
  • Allow any hosts to access the HQ Web Svr. Only port 80 is needed.
  • Allow only the HQ-Admin-PC to have FTP access to the HQ Web Svr. There should be two ACEs, for ports 20 and 21.
  • Apply the ACL to the HQ G0/1 interface.

Step 7: Configure an IPv6 ACL to restrict access to the DMZ network from the Branch Network. (Please note, the order of ACL statements is significant only because of the scoring need in Packet Tracer).

a.  Configure an IPv6 ACL named DMZFTP.

  • Deny any hosts in the Branch network to access the SNMP operation of the HQ router.
  • Allow only BR-Admin-PC to have FTP access to the HQ Web Svr. There should be two ACEs, for ports 20 and 21.
  • Allow any hosts in the Branch Network to access the HQ Web Svr. Only port 80 is needed.
  • Apply the ACL to the HQ router S0/0/1 interface.

 Step 8: Connectivity Tests

  • HQ-Admin-PC can access FTP service on HQ Web Svr.
  • HQ-User-PC cannot access FTP service on HQ Web Svr.
  • BR-Admin-PC can access FTP service on HQ Web Svr with its IPv6 address.
  • BR-User-PC cannot access FTP service on HQ Web Svr with its IPv6 address.
  • HQ-Admin-PC, HQ-User-PC, and External-PC can access HQ Web Svr with URL www.hq.com
  • HQ-Admin-PC, HQ-User-PC, and External-PC can access External Web Srv with URL www.ext-web.com
  • BR-Admin-PC and BR-User-PC can access HQ Web Svr with its IPv6 address
  • BR-Admin-PC and BR-User-PC can access External Web Srv with URL www.ext-web.com

SOLUTION – HQ Router config script (ANON)

FORM 1

ccna-4-chapter-5-sic-access-control-list-and-snmp-configuration-pt-skills-assessment-3

A few things to keep in mind while completing this activity:

  1. Do not use the browser Backbutton or close or reload any Exam windows during the exam.
  2. Do not close Packet Tracer when you are done. It will close automatically.
  3. Click the Submit Assessmentbutton to submit your work.

Introduction

In this practice Packet Tracer Skills Based Assessment, you will:

  • Configure SNMP community strings.
  • Configure standard and extended IPv4 ACLs to filter network traffic.
  • Configure an IPv6 ACLs to filter network traffic.

Addressing Table
ccna-4-chapter-5-sic-access-control-list-and-snmp-configuration-pt-skills-assessment-4

Step 1: Configure SNMP Community Strings on the Central router.

a.  Configure a Read Only SNMP community string hq-monitor.
b.  Configure a Read/Write SNMP community string hq-inside.

Step 2: Configure an ACL for NAT on the Central router.

a.  Configure standard access list numbered 1 to allow NAT for hosts in network 192.168.10.0 /24.
Access-list 1 permit 192.168.10.0 0.0.0.255

Step 3: Configure a standard ACL to restrict remote access to the Central router.

a.  Configure a standard ACL numbered 12 to restrict remote access to Central.

  • Allow only the County-Admin-PC to access the Central router remotely via VTY.
  • All other remote connections should fail.

Step 4: Configure two extended ACLs to restrict access to SNMP operation on the Central router.

a.  Configure an extended ACL named SNMPACCESS.

  • The SNMP operation runs UDP on port 161.
  • Allow only the County-Admin-PC to access the Central router for the SNMP connection.
  • SNMP connections from other hosts on the Central LAN should fail.
  • Allow all other IP traffic.
  • Apply this ACL on the Central router, G0/0 interface.

b.  Configure an extended ACL named SNMPDENY.

  • Deny any hosts to make connections to SNMP on the Central router.
  • Allow all other IP traffic.
  • Apply this ACL on the Central router, G0/1 interface.

Step 5: Configure an extended ACL to restrict access to the Central LAN from the Internet.

a.  Configure an extended IPv4 ACL named INTOHQ.

  • Allow any hosts from the Internet to access the County DNS Svr. There should be two ACEs, one for TCP and the other UDP. Both use port 53.
  • Allow any hosts from the Internet to access the County Web Svr. Only port 80 is needed.
  • Allow return TCP traffic from the Internet that was initiated from the hosts in the Central networks to pass (with the establishedkeyword).
  • Apply the ACL to the Central S0/0/0 interface.

Step 6: Configure an extended ACL to restrict access to the DMZ network.

a.  Configure an extended IPv4 ACL named IN-DMZ.

  • Allow any hosts to access the County DNS Svr. There should be two ACEs, one for TCP and the other UDP. Both use port 53.
  • Allow any hosts to access the County Web Svr. Only port 80 is needed.
  • Allow only the County-Admin-PC to have FTP access to the County Web Svr. There should be two ACEs, for ports 20 and 21.
  • Apply the ACL to the Central G0/1 interface.

Step 7: Configure an IPv6 ACL to restrict access to the DMZ network from the City Network. (Please note, the order of ACL statements is significant only because of the scoring need in Packet Tracer).

a.  Configure an IPv6 ACL named DMZFTP.

  • Deny any hosts in the Branch network to access the SNMP operation of the Central router.
  • Allow only City-Admin-PC to have FTP access to the County Web Svr. There should be two ACEs, for ports 20 and 21.
  • Allow any hosts in the City Network to access the County Web Svr. Only port 80 is needed.
  • Apply the ACL to the Central router S0/0/1 interface.

Step 8: Connectivity Tests

  • County-Admin-PC can access FTP service on County Web Svr.
  • County-User-PC cannot access FTP service on County Web Svr.
  • City-Admin-PC can access FTP service on County Web Svr with its IPv6 address.
  • City-User-PC cannot access FTP service on County Web Svr with its IPv6 address.
  • County-Admin-PC, County-User-PC, and External-PC can access County Web Svr with URL www.hq.com
  • County-Admin-PC, County-User-PC, and External-PC can access External Web Srv with URL www.ext-web.com
  • City-Admin-PC and City-User-PC can access County Web Svr with its IPv6 address
  • City-Admin-PC and City-User-PC can access External Web Srv with URL www.ext-web.com

SOLUTION – HQ Router config script (ANON)

FORM 2

ccna-4-chapter-5-sic-access-control-list-and-snmp-configuration-pt-skills-assessment-5

A few things to keep in mind while completing this activity:

  1. Do not use the browser Back button or close or reload any Exam windows during the exam.
  2. Do not close Packet Tracer when you are done. It will close automatically.
  3. Click the Submit Assessment button to submit your work.

Introduction

In this practice Packet Tracer Skills Based Assessment, you will:

  • Configure SNMP community strings.
  • Configure standard and extended IPv4 ACLs to filter network traffic.
  • Configure an IPv6 ACLs to filter network traffic.

Addressing Table
ccna-4-chapter-5-sic-access-control-list-and-snmp-configuration-pt-skills-assessment-6

Step 1: Configure SNMP Community Strings on the Main router.

a.  Configure a Read Only SNMP community string hq-monitor.
b.  Configure a Read/Write SNMP community string hq-inside.

Step 2: Configure an ACL for NAT on the Main router.

a.  Configure standard access list numbered 1 to allow NAT for hosts in network 192.168.10.0 /24.

Step 3: Configure a standard ACL to restrict remote access to the Main router.

a.  Configure a standard ACL numbered 12 to restrict remote access to Main.

  • Allow only the SD-Admin-PC to access the Main router remotely via VTY.
  • All other remote connections should fail.

Step 4: Configure two extended ACLs to restrict access to SNMP operation on the Main router.

a.  Configure an extended ACL named SNMPACCESS.

  • The SNMP operation runs UDP on port 161.
  • Allow only the SD-Admin-PC to access the Main router for the SNMP connection.
  • SNMP connections from other hosts on the SD LAN should fail.
  • Allow all other IP traffic.
  • Apply this ACL on the Main router, G0/0 interface.

b.  Configure an extended ACL named SNMPDENY.

  • Deny any hosts to make connections to SNMP on the Main router.
  • Allow all other IP traffic.
  • Apply this ACL on the Main router, G0/1 interface.

Step 5: Configure an extended ACL to restrict access to the SD LAN from the Internet.

a.  Configure an extended IPv4 ACL named INTOHQ.

  • Allow any hosts from the Internet to access the SD DNS Svr. There should be two ACEs, one for TCP and the other UDP. Both use port 53.
  • Allow any hosts from the Internet to access the SD Web Svr. Only port 80 is needed.
  • Allow return TCP traffic from the Internet that was initiated from the hosts in the Main networks to pass (with the established keyword).
  • Apply the ACL to the Main S0/0/0 interface.

Step 6: Configure an extended ACL to restrict access to the DMZ network.

a.  Configure an extended IPv4 ACL named IN-DMZ.

  • Allow any hosts to access the SD DNS Svr. There should be two ACEs, one for TCP and the other UDP. Both use port 53.
  • Allow any hosts to access the SD Web Svr. Only port 80 is needed.
  • Allow only the SD-Admin-PC to have FTP access to the SD Web Svr. There should be two ACEs, for ports 20 and 21.
  • Apply the ACL to the Main G0/1 interface.

Step 7: Configure an IPv6 ACL to restrict access to the DMZ network from the HS Network. (Please note, the order of ACL statements is significant only because of the scoring need in Packet Tracer).

a.  Configure an IPv6 ACL named DMZFTP.

  • Deny any hosts in the Branch network to access the SNMP operation of the Main router.
  • Allow only HS-Admin-PC to have FTP access to the SD Web Svr. There should be two ACEs, for ports 20 and 21.
  • Allow any hosts in the HS Network to access the SD Web Svr. Only port 80 is needed.
  • Apply the ACL to the Main router S0/0/1 interface.

 Step 8: Connectivity Tests

  • SD-Admin-PC can access FTP service on SD Web Svr.
  • SD-User-PC cannot access FTP service on SD Web Svr.
  • HS-Admin-PC can access FTP service on SD Web Svr with its IPv6 address.
  • HS-User-PC cannot access FTP service on SD Web Svr with its IPv6 address.
  • SD-Admin-PC, SD-User-PC, and External-PC can access SD Web Svr with URL www.hq.com
  • SD-Admin-PC, SD-User-PC, and External-PC can access External Web Srv with URL www.ext-web.com
  • HS-Admin-PC and HS-User-PC can access SD Web Svr with its IPv6 address
  • HS-Admin-PC and HS-User-PC can access External Web Srv with URL www.ext-web.com

SOLUTION – HQ Router config script (ANON)

 

About the author

James Palmer

Leave a Comment