Author: CCNA Exam Answers

16.5.2 Lab – Secure Network Devices Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Objectives Part 1: Configure Basic Device Settings Part 2: Configure Basic Security Measures on the Router Part 3: Configure Basic Security Measures on the Switch Background / Scenario It is recommended that all network devices be configured with at least a minimum set of best practice security commands. This includes end user devices, servers, and network devices, such as routers and switches. In this lab, you will…

Read More

16.4.7 Lab – Configure Network Devices with SSH Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Objectives Part 1: Configure Basic Device Settings Part 2: Configure the Router for SSH Access Part 3: Configure the Switch for SSH Access Part 4: SSH from the CLI on the Switch Background / Scenario In the past, Telnet was the most common network protocol used to remotely configure network devices. Telnet does not encrypt the information between the client and server. This allows a…

Read More

16.2.6 Lab – Research Network Security Threats Objectives Part 1: Explore the SANS Website Part 2: Identify Recent Network Security Threats Part 3: Detail a Specific Network Security Threat Background / Scenario To defend a network against attacks, an administrator must identify external threats that pose a danger to the network. Security websites can be used to identify emerging threats and provide mitigation options for defending a network. One of the most popular and trusted sites for defending against computer and network security threats is SysAdmin, Audit, Network, Security (SANS). The SANS site provides multiple resources, including a list of…

Read More

15.4.8 Lab – Observe DNS Resolution Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail Servers Background / Scenario The Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is used. Common protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol over Secure Socket Layer (HTTPS), and File Transfer Protocol…

Read More

13.3.2 Lab – Use Ping and Traceroute to Test Network Connectivity Topology Addressing Table Device Interface IP Address / Prefix Default Gateway R1 G0/0/0 64.100.0.2 /30 N/A 2001:db8:acad::2 /64 fe80::2 R1 G0/0/1 192.168.1.1 /24 N/A 2001:db8:acad:1::1 /64 fe80::1 ISP G0/0/0 64.100.0.1 /30 N/A 2001:db8:acad::1 /64 fe80::1 ISP G0/0/1 209.165.200.225 /27 N/A 2001:db8:acad:200::225 /64 fe80::225 S1 VLAN 1 192.168.1.2 /24 192.168.1.1 2001db8:acad:1::2 /64 fe80::1 fe80::10 PC-A NIC 2001:db8:acad:1::10 /64 fe80::1 64.100.0.2 /30 N/A External NIC 209.165.200.226 /27 209.165.200.225 2001:DB8:ACAD:200::226 /64 FE80::225 Objectives Part 1: Build and Configure the Network Part 2: Use Ping Command for Basic Network Testing Part 3: Use…

Read More

12.9.2 Lab – Configure IPv6 Addresses on Network Devices Topology Addressing Table Device Interface IPv6 Address Prefix Length Default Gateway R1 G0/0/0 2001:db8:acad:a::1 64 N/A G0/0/1 2001:db8:acad:1::1 64 N/A S1 VLAN 1 2001:db8:acad:1::b 64 N/A PC-A NIC 2001:db8:acad:1::3 64 fe80::1 PC-B NIC 2001:db8:acad:a::3 64 fe80::1 Objectives Part 1: Set Up Topology and Configure Basic Router and Switch Settings Part 2: Configure IPv6 Addresses Manually Part 3: Verify End-to-End Connectivity Background / Scenario In this lab, you will configure hosts and device interfaces with IPv6 addresses. You will issue show commands to view IPv6 unicast addresses. You will also verify end-to-end…

Read More

12.7.4 Lab – Identify IPv6 Addresses Topology Objectives Part 1: Practice with Different Types of IPv6 Addresses Part 2: Examine a Host IPv6 Network Interface and Address Background / Scenario With the depletion of the Internet Protocol version 4 (IPv4) network address space and the adoption and transition to IPv6, networking professionals must understand how both IPv4 and IPv6 networks function. Many devices and applications already support IPv6. This includes extensive Cisco device Internetwork Operating System (IOS) support and workstation/server operating system support, such as that found in Windows and Linux. This lab focuses on IPv6 addresses and the components…

Read More

11.10.2 Lab – Design and Implement a VLSM Addressing Scheme Topology Objectives Part 1: Examine Network Requirements Part 2: Design the VLSM Address Scheme Part 3: Cable and Configure the IPv4 Network Background / Scenario Variable Length Subnet Mask (VLSM) was designed to avoid wasting IP addresses. With VLSM, a network is subnetted and then re-subnetted. This process can be repeated multiple times to create subnets of various sizes based on the number of hosts required in each subnet. Effective use of VLSM requires address planning. In this lab, use the 192.168.33.128/25 network address to develop an address scheme for…

Read More

11.6.6 Lab – Calculate IPv4 Subnets Objectives Part 1: Determine IPv4 Address Subnetting Part 2: Calculate IPv4 Address Subnetting Background / Scenario The ability to work with IPv4 subnets and determine network and host information based on a given IP address and subnet mask is critical to understanding how IPv4 networks operate. The first part is designed to reinforce how to compute network IP address information from a given IP address and subnet mask. When given an IP address and subnet mask, you will be able to determine other information about the subnet. Instructor Note: This activity can be done…

Read More

10.4.4 Lab – Build a Switch and Router Network Topology Addressing Table Device Interface IP Address / Prefix Default Gateway R1 G0/0/0 192.168.0.1 /24 N/A 2001:db8:acad::1/64 fe80::1 G0/0/1 192.168.1.1 /24 N/A 200:db8:acad:1::1/64 fe80::1 S1 VLAN 1 192.168.1.2 /24 192.168.1.1 PC-A NIC 192.168.1.3 /24 192.168.1.1 2001:db8:acad:1::3/64 fe80::1 PC-B NIC 192.168.0.3 /24 192.168.0.1 2001:db8:acad::3/64 fe80::1 Objectives Part 1: Set Up the Topology and Initialize Devices Part 2: Configure Devices and Verify Connectivity Background / Scenario This is a comprehensive lab to review previously covered IOS commands. In this lab, you will cable the equipment as shown in the topology diagram. You will…

Read More

7.3.7 Lab – View the Switch MAC Address Table Topology Addressing Table Device Interface IP Address Subnet Mask S1 VLAN 1 192.168.1.11 255.255.255.0 S2 VLAN 1 192.168.1.12 255.255.255.0 PC-A NIC 192.168.1.1 255.255.255.0 PC-B NIC 192.168.1.2 255.255.255.0 Objectives Part 1: Build and Configure the Network Part 2: Examine the Switch MAC Address Table Background / Scenario The purpose of a Layer 2 LAN switch is to deliver Ethernet frames to host devices on the local network. The switch records host MAC addresses that are visible on the network, and maps those MAC addresses to its own Ethernet switch ports. This process…

Read More

7.2.7 Lab – View Network Device MAC Addresses Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 1 192.168.1.2 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Objectives Part 1: Configure Devices and Verify Connectivity Part 2: Display, Describe, and Analyze Ethernet MAC Addresses Background / Scenario Every device on an Ethernet LAN is identified by a Layer 2 MAC address. This address is assigned by the manufacturer and stored in the firmware of the NIC. This lab will explore and analyze the components that make up a MAC address, and how you can find this information…

Read More