CIS230_3

.docx

School

ECPI University, Greensboro *

*We aren’t endorsed by this school

Course

230

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

6

Uploaded by corada5995

Report
Task Summary Required Actions v Create Standard Access List 5 v/ Permit Network 192.168.1.0 0.0.0.255 v/ Permit Network 192.168.2.0 0.0.0.255 v/ Permit Network 192.168.3.0 0.0.0.255 v Apply Access List 5to VTY lines 0-4 Hide Details Apply to VTY 0 for inbound traffic [+ Apply to VTY 1 for inbound traffic [+ Apply to VTY 2 for inbound traffic [+ ] Apply to VTY 3 for inbound traffic [+] Apply to VTY 4 for inbound traffic v Save your changes in the startup-config file Hide Details Save the permit192.168.1.0 0.0.0.255 statement k3 save the permit192.168.2.0 0.0.0.255 statement k3 save the permit192.168.3.0 0.0.0.255 statement [+] Apply access list 5 to VTY lines 0-4 Complete this lab as follows: 1. Enter the configuration mode for the router: a. From the exhibit, select the router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, create a standard numbered access list using number 5. Add a permit statement for each network to the access list. a. Type access-list 5 permit 192.168.1.0 0.0.0.255 and then press Enter. b. Type access-list 5 permit 192.168.2.0 0.0.0.255 and then press Enter. c. Type access-list 5 permit 192.168.3.0 0.0.0.255 and then press Enter. 3. Apply the access list to VTY lines 0-4. Filter incoming traffic. a. Type line vty 0 4 and then press Enter. b. Type access-class 5 in and then press Enter. c. Press Ctrl + Z. 4. Save your changes in the startup-config file. a. Type copy run start and then press Enter. b. Press Enter to begin building the configuration. c. Press Enter.
Task Summary Required Actions v/ Add permit any to Access List 11 Hide Details kd Add the permit any statement E3 Make the statement the last in the list v Save your changes in the startup-config file Hide Details Save the permit statement k3 save the statement as the last in the list Explanation Complete this lab as follows: 1. Enter the configuration mode for the Fiji router: a. From the exhibit, select the Fiji router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, add a permit any statement to Access List 11 to allow all traffic other than the restricted traffic. a. Type access-list 11 permit any and press Enter. b. Press Ctrl + Z. 3. Save your changes in the startup-config file. a. Type copy run start and then press Enter. b. Press Enter to begin building the configuration. c. Press Enter. Task Summary Required Actions v/ Create Standard Access List 25 v Deny Host 199.68.111.199 v Deny Host 202.177.9.1 v Deny Host 211.55.67.11 V' Permit all other hosts Hide Details Add the permit any statement k3 Make the statement last in the list v Apply Access List 25 to the s0/0/0 interface
Complete this lab as follows: 1. Enter the configuration mode for the router: a. From the exhibit, select the router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, create a standard numbered access list using number 25. Add statements to the access list to block traffic to the required hosts. a. Type access-list 25 deny host 199.68.111.199 and press Enter. b. Type access-list 25 deny host 202.177.9.1 and press Enter. c. Type access-list 25 deny host 211.55.67.11 and press Enter. 3. From the terminal, add a statement to allow all other traffic from all other hosts, by typing access-list 25 permit any and pressing Enter. 4. From the terminal, apply Access List 25 to the Serial0/0/0 interface to filter incoming traffic. a. Type int s0/0/0 and press Enter. b. Type ip access-group 25 in and press Enter. c. Type Ctrl + Z. Which of the following should be configured on the router to filter traffic at the router level? SSH = Access control list Telnet Anti-spoofing rules You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with the username admin01 and the password P@ssWOrd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? Use encrypted Type 7 passwords. = Move the router to a secure server room. Change the default administrative username and password. Use a Telnet client to access the router configuration.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help