Uploaded by kathsguy

mock test 1InstructionsENSA f69228ec-c375-4636-8052-6d8efecb4d63 82793

advertisement
LAB Instructions
Device
R1
R2
R3
PC1
PC2
Server1
Interface
F0/0
F0/1
Se0/0/0
F0/0
Se0/0/0
Se0/0/0
Se0/0/1
Se0/1/0
NIC
NIC
NIC
IP
10.192.103.1
10.192.103.129
10.192.101.1
10.192.104.1
10.192.102.1
10.192.100.2
10.192.101.2
10.192.102.2
10.192.103.2
10.192.103.130
10.192.104.2
Subnet
255.255.255.128
255.255.255.128
255.255.255.252
255.255.255.0
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.128
255.255.255.128
255.255.255.0
Default Gateway
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
10.192.103.1
10.192.103.129
10.192.104.1
(PART - 1)
Configure ip addresses on all devices in the network. Run OSPF on R1, R2 and R3.
• All the hosts in the network must be able to ping each other.
(PART - 2)
Create ACL 150
• PC1 should not be able to access the web (only http).
• However, make sure that HTTPS connection is successful.
Create ACL 1
• Only devices from LAN 3 should be able to access VTY line in R3
Create named ACL Blocked_V. This name must match.
• Only Server2 should be able to access VTY line in R4. (Note: R4 enable password: cisco)
(PART - 3)
Configure NAT overload or PAT on R3
• Create two ACLs using ACL number 10 to permit ip addresses that belongs to LAN 1
and LAN 3
• Link ACL 10 to the WAN facing interface for NAT
• Configure appropriate inside and outside area.
• Verify NAT by looking at the nat translations on R3.
Download