Lab 4.6.2 Challenge Security Configuration
Lab 4.6.2 Challenge Security Configuration
Lab 4.6.2 Challenge Security Configuration
Topology Diagram
Addressing Table
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 4
CCNA Exploration
Accessing the WAN: Enterprise Network Security Lab 4.6.2: Challenge Security Configuration
Learning Objectives
Upon completion of this lab, you will be able to:
• Cable a network according to the topology diagram
• Erase the startup configuration and reload a router to the default state
• Perform basic configuration tasks on a router
• Configure and activate interfaces
• Configuring basic router security
• Disable unused Cisco services and interfaces
• Protect enterprise networks from basic external and internal attacks
• Understand and manage Cisco IOS configuration files and Cisco file system
• Set up and use Cisco SDM (Security Device Manager) to configure basic router security .
Scenario
In this lab, you will configure security using the network shown in the topology diagram. If you
need assistance, refer to the Basic Security lab. However, try to do as much on your own as
possible. For this lab, do not use password protection or login on any console lines because they
might cause accidental logout. However, you should still secure the console line using other
means. Use ciscoccna for all passwords in this lab.
Step 1: Cable a network that is similar to the one in the topology diagram.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 4
CCNA Exploration
Accessing the WAN: Enterprise Network Security Lab 4.6.2: Challenge Security Configuration
Step 3: Test the PC configuration by pinging the default gateway from each PC and the
TFPT server.
Step 1: Configure secure passwords and AAA authentication using a local database.
Create a secure password for router access. Create the username ccna to store locally on the
router. Configure the router to use the local authentication database. Remember to use
ciscoccna for all passwords in this lab.
Step 3: Verify that connection attempts are denied after the failed attempt limit is reached.
Step 1: Configure SNMP logging to the syslog server at 192.168.10.250 on all devices.
Step 2: Log all messages with severity level 4 to the syslog server.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 4
CCNA Exploration
Accessing the WAN: Enterprise Network Security Lab 4.6.2: Challenge Security Configuration
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 4