CCNA Security 2.0 PT Practice SA – Part 1
A few things to keep in mind while completing this activity:
- Do not use the browser Back button or close or reload any exam windows during the exam.
- Do not close Packet Tracer when you are done. It will close automatically.
- Click the Submit Assessment button to submit your work.
Introduction
In this practice Packet Tracer Skills Based Assessment, you will:
- configure basic device hardening and secure network management
- configure port security and disable unused switch ports
- configure an IOS IPS
- configure a Zone-based Policy Firewall (ZPF) to implement security policies
Addressing Table
Device | Interface | IP Address | Subnet Mask | Gateway | DNS server |
Internet | S0/0/0 | 209.165.200.225 | 255.255.255.252 | n/a | |
S0/0/1 | 192.31.7.1 | 255.255.255.252 | n/a | ||
G0/0 | 192.135.250.1 | 255.255.255.0 | n/a | ||
Public Svr | NIC | 192.135.250.5 | 255.255.255.0 | 192.135.250.1 | |
External | S0/0/0 | 192.31.7.2 | 255.255.255.252 | n/a | |
G0/0 | 192.31.7.62 | 255.255.255.224 | n/a | ||
External Web Svr | NIC | 192.31.7.35 | 255.255.255.224 | 192.31.7.62 | 192.135.250.5 |
External User | NIC | 192.31.7.33 | 255.255.255.224 | 192.31.7.62 | 192.135.250.5 |
CORP | S0/0/0 | 209.165.200.226 | 255.255.255.252 | n/a | |
S0/0/1 | 209.165.200.254 | 255.255.255.252 | n/a | ||
Internal | S0/0/1 | 209.165.200.253 | 255.255.255.252 | n/a | |
G0/0 | 10.1.1.254 | 255.255.255.0 | n/a | ||
G0/1.10 | 172.16.10.254 | 255.255.255.0 | n/a | ||
G0/1.25 | 172.16.25.254 | 255.255.255.0 | n/a | ||
G0/1.99 | 172.16.99.1 | 255.255.255.0 | n/a | ||
DMZ DNS Svr | NIC | 10.1.1.5 | 255.255.255.0 | 10.1.1.254 | 192.135.250.5 |
DMZ Web Svr | NIC | 10.1.1.2 | 255.255.255.0 | 10.1.1.254 | 10.1.1.5 |
PC0 | NIC | 172.16.10.5 | 255.255.255.0 | 172.16.10.254 | 10.1.1.5 |
PC1 | NIC | 172.16.10.10 | 255.255.255.0 | 172.16.10.254 | 10.1.1.5 |
AAA/NTP/Syslog Svr | NIC | 172.16.25.2 | 255.255.255.0 | 172.16.25.254 | 10.1.1.5 |
PC2 | NIC | 172.16.10.15 | 255.255.255.0 | 172.16.10.254 | 10.1.1.5 |
Net Admin | NIC | 172.16.25.5 | 255.255.255.0 | 172.16.25.254 | 10.1.1.5 |
Note: Appropriate verification procedures should be taken after each configuration task to ensure that it has been properly implemented.
Step 1: Configure Basic Device Hardening for the CORP and the Internal Routers.
- Configure the CORP and the Internal routers to only accept passwords with a minimum length of 10 characters.
- Configure an encrypted privileged level password of ciscoclass.
- Enable password encryption for all clear text passwords in the configuration file.
- Configure the console port and all vty lines with the following requirements:Note: Both the CORP and the Internal routers are already configured with the username CORPADMIN and password Ciscoccnas.
- Use the local database for login.
- Disconnect after being idle for 20 minutes.
- Disable the CDP protocol on the CORP router on the link to the Internet router.
Step 2: Configure Secure Network Management for the CORP Router.
- Configure the IOS login enhancement for all vty lines with the following requirements:
- Disable logins for 30 seconds after 3 failed login attempts within 60 seconds.
Step 3: Configure Secure Network Management for the Internal Router.
- Configure the Internal router:
- as an NTP client to the AAA/NTP/Syslog server
- to update the router calendar (hardware clock) from the NTP time source
- to timestamp log messages
- to send logging messages to the AAA/NTP/Syslog server
- Configure the IOS login enhancement for all vty lines with the following requirements:
- Disable logins for 30 seconds after 3 failed login attempts within 60 seconds.
- Log any failed or successful login to the syslog server.
- Configure the Internal router to accept SSH connections. Use the following guidelines:Note: Internal is already configured with the username SSHAccess and the secret password ciscosshaccess.
- The domain name is theccnas.com.
- RSA encryption key pair using a modulus of 1024
- SSH version 2, timeout of 90 seconds, and 2 authentication retries
- All vty lines accept only SSH connections.
- Configure the Internal router with server-based AAA authentication and verify its functionality:Note: The AAA server is already configured with RADIUS service, a username CORPSYS, and the password LetSysIn.
- The key to connect to the RADIUS server is corpradius.
- AAA authentication uses the RADIUS server as the default for console line and vty lines access.
- The local database is used as the backup if the RADIUS server connection cannot be established.
Step 4: Configure ACLs on the Internal Router to Implement Secure Management Access.
- Create ACL 12 to implement the security policy regarding the access to the vty lines:
- Only users logged on to the Net Admin PC are allowed access to the vty lines.
Step 5: Configure Device Hardening for Switch1 and Switch4
- Access Switch1 and Switch4 with username CORPADMIN, password Ciscoccnas, and the enable secret password of ciscoclass.
- Configure Switch1 to protect against STP attacks.
- Configure PortFast on FastEthernet ports 0/1 to 0/22.
- Enable BPDU guard on FastEthernet ports 0/1 to 0/22.
- Configure Switch1 port security and disable unused ports.
- Set the maximum number of learned MAC addresses to 2 on FastEthernet ports 0/1 to 0/22. Allow the MAC address to be learned dynamically and to be retained in the running-config. Shutdown the port if a violation occurs.
- Disable unused ports (Fa0/2-4, Fa0/6-10, Fa0/13-22).
- Configure the trunk link on Fa0/23 and Fa0/24 on both Switch1 and Switch4
- Disable DTP negotiation on the trunking ports.
- Set the native VLAN as VLAN 50 for the trunk links.
Step 6: Configure an IOS IPS on the Internal Router.
- On the Internal router, if asked to login, then login as CORPSYS with password LetSysIn. The enable secret password is ciscoclass.
- Use the IPS signature storage location at flash:.
- Create an IPS rule named corpips.
- Configure the IOS IPS to use the signature categories. Retire the all signature category and unretire the ios_ips basic category.
- Apply the IPS rule to the Gi0/0 interface in the out direction.
- Modify the ios_ips basic category. Unretire the echo request signature (signature 2004, subsig 0); enable the signature; modify the signature event-action to produce an alert and deny packets that match the signature.
- Verify that IPS is working properly. Net Admin in the internal network cannot ping DMZ Web Svr. DMZ Web Svr, however, can ping Net Admin.
Step 7: Configure ZPF on the CORP Router.
- Access the CORP router with username CORPADMIN, password Ciscoccnas, and the enable secret password of ciscoclass.
- Create the firewall zones.
- Create an internal zone named CORP-INSIDE.
- Create an external zone named INTERNET.
- Define a traffic class to allow traffic from the Internal network to access services in the Internet.
- Create a class map using the option of class map type inspect with the match-any keyword. Name the class map INSIDE_PROTOCOLS.
- Match the protocols, http, tcp, udp, icmp, dns (Please note, the order of match statements is significant only because of the scoring need in Packet Tracer.)
- Specify firewall policies to allow internal hosts to access Internet.
- Create a policy map named INSIDE_TO_INTERNET.
- Use the INSIDE_PROTOCOLS class map.
- Specify the action of inspect for this policy map.
- Define a traffic class to allow traffic from the Internet to access services in the DMZ network.
- Create a class map using the option of class map type inspect with the match-any keyword. Name the class map DMZ_WEB.
- Match the protocols, http and dns (Please note, the order of match statements is significant only because of the scoring need in Packet Tracer.)
- Specify firewall policy to allow Internet traffic to access DMZ services.
- Create a policy map named INTERNET_TO_DMZWEB.
- Use the DMZ_WEB class map.
- Specify the action of pass for this policy map.
- Apply the firewall.
- Create a pair of zones named IN_TO_OUT_ZONE with the source as CORP-INSIDE and destination as INTERNET.
- Specify the policy map INSIDE_TO_INTERNET for handling the traffic between the two zones.
- Create a pair of zones named INTERNET_TO_DMZ_ZONE with the source as INTERNET and destination as CORP-INSIDE.
- Assign interfaces to the appropriate security zones.
- Verify the ZPF configuration.
- The External user can access the URLs http://www.theccnas.com and http://ift.tt/2esqc2O.
- The External user cannot ping the DMZ Web Svr.
- The PCs in the internal network can ping and access the External Web Svr URL.
CCNA Security 2.0 PT Practice SA – Part 1 question and answer will be revealed in this post. Hopefully this will helps you guys to pass this CCNA Security 2.0 Packet Tracer Practice SA Part 1 successfully. However, our current answer now only 84% correct. If you have complete 100% answer, please comment below or email to me.
CORP config
Internal Config
Switch1 Config
Switch4 Config
switchport mode trunk
switchport nonegotiate
switchport trunk native vlan 50
To ending:
Network:Internal:RADIUS Client:RADIUS Server Hosts:0
Network:Internal:VTY Lines:0:Access Class In
Network:Internal:ACL:12
Network:Internal:IPS:Signature:Retired
Network:Internal:IPS:Signature:Icmp Signature Id
Network:Internal:IPS:Signature:Icmp Sub Id
Update from Commenter for 100%
access-list 12 permit host 172.16.25.5
line vty 0 15
access-class 12 in
exit
For Internal Config is continuing with:
interface Gi0/0
ip ips corpips out
exit
(config)#ip ips signature-definition
(config-sigdef)# signature 2004 0
(config-sigdef-sig)# status
(config-sigdef-sig-status)# retired false
(config-sigdef-sig-status)# enable true
(config-sigdef-sig-status)# exit
(config-sigdef-sig)# engine
(config-sigdef-sig-engine)# event-action produce-alert
(config-sigdef-sig-engine)# event-action deny-packet-inline
(config-sigdef-sig-engine)# exit
(config-sigdef-sig)# exit
(config-sigdef)# exit
(config)# exit
If you want to score a 100%, you must put one single line authentication aaa (first line) :
aaa authentication login default group radius local –> good
aaa authentication login default local ————> bad, because if you put both lines you delete the first line, that is the correct option.
from http://www.ccna5.net/
I made the changes and got 95%.
ReplyDeleteI removed this line,
aaa authentication login default local
and I added other lines below.
I got this:
AAA Authentication 0 5
Network:Internal:Console Line:AAA Method List Name Correct
Network:Internal:VTY Lines:0:AAA Method List Name Correct
Network:Internal:AAA:Authentication:1 Correct
Network:Internal:AAA:New-model Correct
Network:Internal:RADIUS Client:RADIUS Server Hosts:0 Incorrect
This one works. I got 100%
ReplyDeleteRouter CORP
configure terminal
security passwords min-length 10
enable secret ciscoclass
service password-encryption
line console 0
login local
exec-timeout 20 0
line vty 0 15
login local
exec-timeout 20 0
exit
interface serial0/0/0
no cdp enable
login block-for 30 attempts 3 within 60
zone security CORP-INSIDE
exit
zone security INTERNET
exit
class-map type inspect match-any INSIDE_PROTOCOLS
match protocol http
match protocol tcp
match protocol udp
match protocol icmp
match protocol dns
exit
policy-map type inspect INSIDE_TO_INTERNET
class type inspect INSIDE_PROTOCOLS
inspect
exit
exit
class-map type inspect match-any DMZ_WEB
match protocol http
match protocol dns
exit
policy-map type inspect INTERNET_TO_DMZWEB
class type inspect DMZ_WEB
pass
exit
exit
zone-pair security IN_TO_OUT_ZONE source CORP-INSIDE destination INTERNET
service-policy type inspect INSIDE_TO_INTERNET
exit
zone-pair security INTERNET_TO_DMZ_ZONE source INTERNET destination CORP-INSIDE
service-policy type inspect INTERNET_TO_DMZWEB
exit
interface serial0/0/0
zone-member security INTERNET
exit
interface serial0/0/1
zone-member security CORP-INSIDE
exit
Router INTERNAL
configure terminal
security passwords min-length 10
enable secret ciscoclass
service password-encryption
login on-failure log
login on-success log
line console 0
login local
exec-timeout 20 0
line vty 0 15
login local
exec-timeout 20 0
exit
interface serial0/0/0
no cdp enable
login block-for 30 attempts 3 within 60
ntp server 172.16.25.2 key 0
ntp update-calendar
service timestamps log datetime msec
logging host 172.16.25.2
ip domain-name theccnas.com
crypto key generate rsa
1024
ip ssh version 2
ip ssh time-out 90
ip ssh authentication-retries 2
line vty 0 4
transport input ssh
exit
line vty 5 15
transport input ssh
exit
aaa new-model
Radius-server host 172.16.25.2 key corpradius
aaa authentication login default group radius local
aaa authorization exec default local
line vty 0 4
login authentication default
line vty 5 15
login authentication default
line con 0
login authentication default
exit
access-list 12 permit host 172.16.25.5
line vty 0 15
access-class 12 in
exit
ip ips config location flash:
ip ips name corpips
ip ips signature-category
category all
retired true
exit
category ios_ips basic
retired false
exit
exit
interface Gi0/0
ip ips corpips out
exit
ip ips signature-definition
signature 2004 0
status
retired false
enable true
exit
engine
event-action produce-alert
event-action deny-packet-inline
exit
exit
exit
exit
Switch 1
configure terminal
interface range fastEthernet0/1-22
spanning-tree portfast
spanning-tree bpduguard enable
switchport port-security
switchport port-security violation shutdown
switchport port-security mac-address sticky
switchport port-security maximum 2
exit
interface range fastethernet 0/2-4
shutdown
interface range fastethernet 0/6-10
shutdown
interface range fastethernet 0/13-22
shutdown
exit
interface range fa0/23-24
switchport nonegotiate
switchport trunk native vlan 50
Switch 4
configure terminal
interface range fa0/23-24
switchport mode trunk
switchport nonegotiate
switchport trunk native vlan 50