Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Exam Network

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Exam

Course Name Network Section Made 1

Student Name Student ID

Time 6 days Grade

Topology

Addressing Table
Device Interface IP Address Subnet Mask Gateway DNS server
S0/0/0 209.165.200.225 255.255.255.252 n/a n/a
S0/0/1 192.31.7.1 255.255.255.252 n/a n/a
Internet
S0/1/0 198.133.219.1 255.255.255.252 n/a n/a
Gi0/0 192.135.250.1 255.255.255.0 n/a n/a
S0/0/0 209.165.200.226 255.255.255.252 n/a n/a
CORP
Gi0/0 209.165.200.254 255.255.255.240 n/a n/a

Fahad Alshehri Page 1 of 3


Exam

Device Interface IP Address Subnet Mask Gateway DNS server


VLAN 1 192.168.1.1 255.255.255.0 n/a

CORP-ASA VLAN 2 209.165.200.253 255.255.255.240 n/a


VLAN 3 10.1.1.254 255.255.255.0 n/a
Gi0/0 192.168.1.2 255.255.255.0 n/a
Gi0/1.10 172.16.10.254 255.255.255.0 n/a
Internal
Gi0/1.25 172.16.25.254 255.255.255.0 n/a

Gi0/1.99 172.16.99.254 255.255.255.0 n/a

S0/0/0 198.133.219.2 255.255.255.252 n/a n/a


Branch
Gi0/0 198.133.219.62 255.255.255.224 n/a n/a
S0/0/0 192.31.7.2 255.255.255.252 n/a n/a
External
Gi0/0 192.31.7.62 255.255.255.224 n/a n/a
Public Svr NIC 192.135.250.5 255.255.255.0 192.135.250.1 n/a
External Web NIC 192.31.7.35 255.255.255.224 192.31.7.62 192.135.250.5
Svr
External PC NIC 192.31.7.33 255.255.255.224 192.31.7.62 192.135.250.5
Internal-DNS Svr NIC 172.16.25.2 255.255.255.0 172.16.25.254 10.1.1.5
NTP/Syslog Svr NIC 209.165.200.252 255.255.255.240 209.165.200.254

DMZ DNS Svr NIC 10.1.1.5 255.255.255.0 10.1.1.254 192.135.250.5


DMZ Web Svr NIC 10.1.1.2 255.255.255.0 10.1.1.254 10.1.1.5
PC0 NIC 172.16.10.5 255.255.255.0 172.16.10.254 172.16.25.2
PC1 NIC 172.16.10.10 255.255.255.0 172.16.10.254 172.16.25.2
Net Admin NIC 172.16.25.5 255.255.255.0 172.16.25.254 172.16.25.2
Admin PC NIC 198.133.219.35 255.255.255.224 198.133.219.62 192.135.250.5

Note: Appropriate verification procedures should be taken after each configuration task to ensure that it has been
properly implemented.
Step 1: Configure Basic Device Hardening for the CORP Router.
a. Configure the CORP router to accept only passwords with a minimum length of 10 characters.
b. Configure an encrypted privileged level password of ciscoclass.
c. Enable password encryption for all clear text passwords in the configuration file.
d. Configure the console line and all vty lines 0 to 15 with the following requirements:
Note: CORP is already configured with the username CORPADMIN and the secret password
Ciscoccnas.

Fahad Alshehri Page 2 of 3


Exam

Fahad Alshehri Page 3 of 3

You might also like