Important to protect network routers because the failure

Assignment Help Computer Network Security
Reference no: EM133996801

Network Security Implementation

Task 1
Securing the Router for Administrative Access

Objective
Securing the Router for Administrative Access

In this lab, you will perform the following tasks:
Task 1: Configure Basic Device Settings
Cable the network as shown in the topology.
Configure basic IP addressing for routers and PCs.
Configure OSPF routing.
Configure PC hosts.
Verify connectivity between hosts and routers.
Task 2: Control Administrative Access for Routers
Configure and encrypt all passwords.
Configure a login-warning banner.
Configure enhanced username password security.
Configure an SSH server on a router.
Configure an SSH client and verify connectivity.
Configure an SCP server on a router.

Background

The router is a critical component in any network. It controls the movement of data into and out of the network and between devices within the network. It is particularly important to protect network routers because the failure of a routing device could make sections of the network, or the entire network, inaccessible. Controlling access to routers and enabling reporting on routers is critical to network security and should be part of a comprehensive security policy.

In this lab, you will build a multi-router network and configure the routers and hosts. Use various CLI tools to secure local and remote access to the routers, analyze potential vulnerabilities, and take steps to mitigate them. Enable management reporting to monitor router configuration changes.

Task 1: Configure Basic Device Settings
Perform all the given task in Packet tracer.
Students should perform the steps in this task individually.
In Task 1, set up the network topology and configure basic settings, such as interface IP addresses.
Step 1: Deploy router in Packet Tracer.
Attach the devices, as shown in the topology diagram, and connection, as necessary.
Step 2: Configure basic settings for each router.
Configure host names as shown in the topology plus your student ID.
Configure interface IP addresses as shown in the IP Addressing Table.
R1 Config
R1-S0000#conf t
Enter configuration commands, one per line. End with CNTL/Z. R1-S0000(config)#interface f0/1
R1-S0000(config-if)#ip address 192.168.1.1 255.255.255.0 R1-S0000(config-if)#no shutdown
R1-S0000(config-if)#exit
R1-S0000(config)#interface s0/0
R1-S0000(config-if)#ip address 10.1.1.1 255.255.255.252 R1-S0000(config-if)#no shutdown
R1-S0000(config-if)#exit R1-S0000(config)#exit
R1-S0000#copy running-config startup-config Destination filename [startup-config]?
R3 Config
R3-S0000#conf t
Enter configuration commands, one per line. End with CNTL/Z. R3-S0000(config)#interface f0/1
R3-S0000(config-if)#ip address 192.168.3.1 255.255.255.0 R3-S0000(config-if)#no shutdown
R3-S0000(config-if)#exit
R3-S0000(config)#interface s0/1
R3-S0000(config-if)#ip address 10.2.2.1 255.255.255.252 R3-S0000(config-if)#no shutdown
R3-S0000(config-if)#exit R3-S0000(config)#exit
R3-S0000#copy running-config startup-config Destination filename [startup-config]?
R2 Config
R2-S0000#conf t
Enter configuration commands, one per line. End with CNTL/Z. R2-S0000(config)#interface s0/0

R2-S0000(config-if)#ip address 10.1.1.2 255.255.255.252 R2-S0000(config-if)#no shutdown
R2-S0000(config-if)#exit
R2-S0000(config)#interface s0/1
R2-S0000(config-if)#ip address 10.2.2.2 255.255.255.252 R2-S0000(config-if)#no shutdown
R2-S0000(config-if)#exit R2-S0000(config)#exit
R2-S0000#copy running-config startup-config Destination filename [startup-config]?

Configure a clock rate for routers with a DCE serial cable attached to their serial interface. R1-STUDENTID is shown here as an example.
R1-S0000# Conf t
R1-S0000(config)# interface S0/0
R1-S0000(config-if)# clock rate 64000 R1-S0000(config-if)# Exit
R1-S0000(config)# Exit R3:
R3-S000 # Conf t
R3-S0000(config)# interface S0/1
R3-S0000(config-if)# clock rate 64000 R3-S0000(config-if)# Exit
R3-S0000(config)# Exit R2:
R2-S000 # Conf t
R2-S0000(config)# interface S0/0
R2-S0000(config-if)# clock rate 64000 R2-S0000(config-if)# exit
R2-S0000(config)# interface S0/1
R2-S0000(config-if)# clock rate 64000 R2-S0000(config-if)# Exit

R2-S0000(config)# Exit
To prevent the router from attempting to translate incorrectly entered commands as though they were host names, disable DNS lookup. R1-STUDENTID is shown here as an example.
R1-S000 # Conf t
R1-S0000(config)# no ip domain-lookup R1-S0000(config-if)# Exit
R1-S0000(config)# Exit R2:
R2-S000 # Conf t
R2-S0000(config)# no ip domain-lookup R2-S0000(config-if)# Exit
R2-S0000(config)# Exit R3:
R3-S000 # Conf t
R3-S0000(config)# no ip domain-lookup R3-S0000(config-if)# Exit
R3-S0000(config)# Exit
Step 3: Configure OSPF routing on the routers.
Use the router ospf command in global configuration mode to enable OSPF on R1-STUDENTID. R1-S0000(config)# Conf t
R1-S0000(config)# router ospf 1
Configure the network statements for the networks on R1-STUDENTID. Use an area ID of 0. R1-S0000(config-router)# network 192.168.1.0 0.0.0.255 area 0
R1-S0000(config-router)# network 10.1.1.0 0.0.0.3 area 0 R1-S0000(config-if)# Exit
R1-S0000(config)# Exit
Configure OSPF on R2-STUDENTID and R3-STUDENTID. R3:

R3-S0000# Conf t
R3-S0000(config)# router ospf 1
R3-S0000(config-router)# network 192.168.3.0 0.0.0.255 area 0
R3-S0000(config-router)# network 10.2.2.0 0.0.0.3 area 0 R3-S0000(config-if)# Exit
R3-S0000(config)# Exit


R2:
R2-S0000# Conf t
R2-S0000(config)# router ospf 1
R2-S0000(config-router)# network 10.1.1.0 0.0.0.3 area 0
R2-S0000(config-router)# network 10.2.2.0 0.0.0.3 area 0 R2-S0000(config-if)# Exit
R2-S0000(config)# Exit


Issue the passive-interface command to change the f0/1 interface on R1-STUDENTID and R3-STUDENTID to passive.
R1-S0000# Conf t
R1-S0000(config)# router ospf 1
R1-S0000(config-router)# passive-interface f0/1 R1-S0000(config-if)# Exit
R1-S0000(config)# Exit R3:
R3-S0000# Conf t
R3-S0000(config)# router ospf 1
R3-S0000(config-router)# passive-interface f0/1 R3-S0000(config-if)# Exit
R3-S0000(config)# Exit
Step 4: Verify OSPF neighbors and routing information.
Issue the show ip ospf neighbor command to verify that each router lists the other routers in the network as neighbors.
R1-S0000 # show ip ospf neighbor

Step 5: Configure PC host IP settings.
How to configure IP address in PC

There are following steps involved to configure an IP Address to PC:
Step1: Open the Cisco Packet Tracer.
Step2: Drag and drop PC from the bottom of the interface into the middle of the working area.
Step3: Click on PC ->Config Gateway like 192.168.1.1

Configure both PC-A and PC-C as demonstrated Step 6: Verify connectivity between PC-A and PC-C. Ping from R1-STUDENTID to R3-STUDENTID.
If the pings are not successful, troubleshoot the basic device configurations before continuing.
Ping from PC-A, on the R1-STUDENTID-STUDENTID LAN, to PC-C, on the R3-STUDENTID LAN.
If the pings are not successful, troubleshoot the basic device configurations before continuing.
Note: If you can ping from PC-A to PC-C you have demonstrated that OSPF routing is configured and functioning correctly. If you cannot ping but the device interfaces are up and IP addresses are correct, use the show run, show ip ospf neighbor, and show ip route commands to help identify routing protocol-related problems. No AI shortcuts — Only authentic assignment help from real expert tutors.

Step 7: Save the basic running configuration for each router.
Save the basic running configuration for the routers as text files on your PC. These text files can be used to restore configurations later in the lab.

Reference no: EM133996801

Questions Cloud

Which condition is indicated by these ecg findings : A 50-year-old male patient presents with chest pain and an electrocardiogram (ECG) showing new ST-segment. Which condition is indicated by these ECG findings?
What are two typsidebar interaction : What are two typsidebar interaction. Press tab to begin. In this condition, you provide the learner with multiple reinforcing items, zero demands,
Create a plan of action to overcome identified challenges : Create a plan of action to overcome identified challenges or take advantage of identified opportunities in the context of access, quality, and cost.
Explain exponential smoothing in analyzing-predicting future : Explain exponential smoothing in analyzing and predicting the future. Why is it important to understand how regression can be used to forecast an event?
Important to protect network routers because the failure : Critical component in any network. It controls the movement of data into and out of the network and between devices within the network
Was this study true experiment or quasi-experiment : Placing children in time-out can be an effective form of punishment. Was this study a true experiment or a quasi-experiment?
How you incorporate principles of interprofessional practice : Discuss what benefits of interprofessional practice. How you incorporate principles of interprofessional practice in your role as a nurse on such a care team.
What is function of gluteal femoral fat : What is the function of gluteal femoral fat? What was the relationship between female WHR and cognitive performance?
Discuss what you think it means to be a teacher leader : Discuss what you think it means to be a teacher leader. How is being a teacher leader different from being a teacher?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd