CCNA Access List Sim



Similar documents
Lab Configure Cisco IOS Firewall CBAC

Lab Developing ACLs to Implement Firewall Rule Sets

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Cisco Configuring Commonly Used IP ACLs

Lab Diagramming Intranet Traffic Flows

Adding an Extended Access List

LAB II: Securing The Data Path and Routing Infrastructure

Lab Characterizing Network Applications

This Technical Support Note shows the different options available in the Firewall menu of the ADTRAN OS Web GUI.

Lab Exercise Configure the PIX Firewall and a Cisco Router

Troubleshooting the Firewall Services Module

Lab QoS Classification and Policing Using CAR

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security

Configuring Static and Dynamic NAT Simultaneously

Implementing Network Address Translation and Port Redirection in epipe

Lab Analyzing Network Traffic

Firewall Technologies. Access Lists Firewalls

Lab Advanced Telnet Operations

Chapter 3 Using Access Control Lists (ACLs)

Lab Diagramming External Traffic Flows

How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net

Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.

Enabling Remote Access to the ACE

Lab Configuring PAT with SDM and Static NAT using Cisco IOS Commands

8 steps to protect your Cisco router

Lab 6.1 Configuring a Cisco IOS Firewall Using SDM

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Security and Access Control Lists (ACLs)

Configuring Server Load Balancing

Firewall Firewall August, 2003

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Lab - Configure a Windows 7 Firewall

allow all such packets? While outgoing communications request information from a

Lab Load Balancing Across Multiple Paths

How To Lower Data Rate On A Network On A 2Ghz Network On An Ipnet 2 (Net 2) On A Pnet 2 On A Router On A Gbnet 2.5 (Net 1) On An Uniden Network On

Table of Contents. Configuring IP Access Lists

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

Troubleshooting the Firewall Services Module

Router Lab Reference Guide

Troubleshooting IP Routing

3.1 Connecting to a Router and Basic Configuration

Lab Creating a Logical Network Diagram

Firewall Stateful Inspection of ICMP

CCIE R&S Lab Workbook Volume I Version 5.0

Firewall VPN Router. Quick Installation Guide M73-APO09-380

BASIC ANALYSIS OF TCP/IP NETWORKS

Multi-Homing Dual WAN Firewall Router

LAB Configuring NAT. Objective. Background/Preparation

Lab Configuring Access Policies and DMZ Settings

Skills Assessment Student Training Exam

IOS Zone Based Firewall Step-by-Step Basic Configuration

Securing Networks with PIX and ASA

Configuring Class Maps and Policy Maps

Lab - Configure a Windows Vista Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6.

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

SUBNETTING SCENARIO S

Implementing Secure Converged Wide Area Networks (ISCW)

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting

Lab 5.5 Configuring Logging

12. Firewalls Content

Lab Configuring OSPF with Loopback Addresses

Linux MPS Firewall Supplement

Lab 2 - Basic Router Configuration

Configuring Network Address Translation (NAT)

Linux MDS Firewall Supplement

DSL-G604T Install Guides

CCNA Discovery Working at a Small to Medium Business or ISP Student Packet Tracer Lab Manual

Configuring a Backup Path Test Using Network Monitoring

Virtual Fragmentation Reassembly

How Does Ping Really Work?

Configuring Network Address Translation

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

Effect of Windows XP Firewall on Network Simulation and Testing

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Expert Reference Series of White Papers. The Basics of Configuring and Using Cisco Network Address Translation

co Characterizing and Tracing Packet Floods Using Cisco R

Lab Organizing CCENT Objectives by OSI Layer

Lab 8.4.3a Managing Cisco IOS Images with TFTP

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Firewall Defaults and Some Basic Rules

F-SECURE MESSAGING SECURITY GATEWAY

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Configuring MAC ACLs

The information in this document is based on these software and hardware versions:

ICND IOS CLI Study Guide (CCENT)

CSCE 465 Computer & Network Security

Lab Creating a Network Map using CDP Instructor Version 2500

GLBP Gateway Load Balancing Protocol

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Configuring Network Address Translation

GregSowell.com. Mikrotik Security

Chapter 4 Rate Limiting

IP Filter/Firewall Setup

Transcription:

1 P a g e CCNA Access List Sim Question An administrator is trying to ping and telnet from Switch to Router with the results shown below: Switch> Switch> ping 10.4.4.3 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.4.4.3,timeout is 2 seconds:.u.u.u Success rate is 0 percent (0/5) Switch> Switch> telnet 10.4.4.3 Trying 10.4.4.3 % Destination unreachable; gateway or host down Switch> Click the console connected to Router and issue the appropriate commands to answer the questions. Answer and Explanation For this question we only need to use the show running-config command to answer all the questions below Router>enable Router#show running-config

2 P a g e

3 P a g e

4 P a g e

5 P a g e Question 1: Which will fix the issue and allow ONLY ping to work while keeping telnet disabled? A Correctly assign an IP address to interface fa0/1 B Change the ip access-group command on fa0/0 from in to out C Remove access-group 106 in from interface fa0/0 and add access-group 115 in. D Remove access-group 102 out from interface s0/0/0 and add access-group 114 in E Remove access-group 106 in from interface fa0/0 and add access-group 104 in Answer: E Explanation: Let s have a look at the access list 104: The question does not ask about ftp traffic so we don t care about the two first lines. The 3rd line denies all telnet traffic and the 4th line allows icmp traffic to be sent (ping). Remember that the access list 104 is applied on the inbound direction so the 5th line access-list 104 deny icmp any any echo-reply will not affect our icmp traffic because the echo-reply message will be sent over the outbound direction. Question 2: What would be the effect of issuing the command ip access-group 114 in to the fa0/0 interface? A Attempts to telnet to the router would fail B It would allow all traffic from the 10.4.4.0 network C IP traffic would be passed through the interface but TCP and UDP traffic would not D Routing protocol updates for the 10.4.4.0 network would not be accepted from the fa0/0 interface Answer: B

6 P a g e Explanation: From the output of access-list 114: access-list 114 permit ip 10.4.4.0 0.0.0.255 any we can easily understand that this access list allows all traffic (ip) from 10.4.4.0/24 network Question 3: What would be the effect of issuing the command access-group 115 in on the s0/0/1 interface? A No host could connect to Router through s0/0/1 B Telnet and ping would work but routing updates would fail. C FTP, FTP-DATA, echo, and www would work but telnet would fail D Only traffic from the 10.4.4.0 network would pass through the interface Answer: A Explanation: First let s see what was configured on interface S0/0/1: Recall that each interface only accepts one access-list, so when using the command ip access-group 115 in on the s0/0/1 interface it will overwrite the initial access-list 102. Therefore any telnet connection will be accepted (so we can eliminate answer C). B is not correct because if telnet and ping can work then routing updates can, too. D is not correct because access-list 115 does not mention about 10.4.4.0 network. So the most reasonable answer is A. But here raise a question The wildcard mask of access-list 115, which is 255.255.255.0, means that only host with ip addresses in the form of x.x.x.0 will be accepted. But we all know that x.x.x.0 is likely to be a network address so the answer A: no host could connect to Router through s0/0/1 seems right But what will happen if we don t use a subnet mask of 255.255.255.0? For example we can use an ip address of 10.45.45.0 255.255.0.0, such a host with that ip address exists and we can connect to the router through that host. Now answer A seems incorrect! Please comment if you have any idea for this sim!

7 P a g e CCNA Access List Sim 2 Question A network associate is adding security to the configuration of the Corp1 router. The user on host C should be able to use a web browser to access financial information from the Finance Web Server. No other hosts from the LAN nor the Core should be able to use a web browser to access this server. Since there are multiple resources for the corporation at this location including other resources on the Finance Web Server, all other traffic should be allowed. The task is to create and apply a numberd access-list with no more than three statements that will allow ONLY host C web access to the Finance Web Server. No other hosts will have web access to the Finance Web Server. All other traffic is permitted. Access to the router CLI can be gained by clicking on the appropriate host. All passwords have been temporarily set to cisco. The Core connection uses an IP address of 198.18.196.65 The computers in the Hosts LAN have been assigned addresses of 192.168.33.1 192.168.33.254 Host A 192.168.33.1 Host B 192.168.33.2 Host C 192.168.33.3 Host D 192.168.33.4 The servers in the Server LAN have been assigned addresses of 172.22.242.17 172.22.242.30 The Finance Web Server is assigned an IP address of 172.22.242.23 The Public Web Server is assigned an IP address of 172.22.242.17

8 P a g e Answer and Explanation Corp1>enable (you may enter cisco as it passwords here) We should create an access-list and apply it to the interface which is connected to the Server LAN because it can filter out traffic from both Sw-2 and Core networks. The Server LAN network has been assigned addresses of 172.22.242.17 172.22.242.30 so we can guess the interface connected to them has an IP address of 172.22.242.30 (.30 is the number shown in the figure). Use the show running-config command to check which interface has the IP address of 172.22.242.30. Corp1#show running-config

9 P a g e We learn that interface FastEthernet0/1 is the interface connected to Server LAN network. It is the interface we will apply our access-list (for outbound direction). Corp1#configure terminal Our access-list needs to allow host C 192.168.33.3 to the Finance Web Server 172.22.242.23 via web (port 80) Corp1(config)#access-list 100 permit tcp host 192.168.33.3 host 172.22.242.23 eq 80 Deny other hosts access to the Finance Web Server via web Corp1(config)#access-list 100 deny tcp any host 172.22.242.23 eq 80 All other traffic is permitted Corp1(config)#access-list 100 permit ip any any Apply this access-list to Fa0/1 interface (outbound direction) Corp1(config)#interface fa0/1 Corp1(config-if)#ip access-group 100 out Notice: We have to apply the access-list to Fa0/1 interface (not Fa0/0 interface) so that the access-list can filter traffic coming from the Core network. In the real exam, just click on host C and open its web browser. In the address box type http://172.22.242.23 to check if you are allowed to access Finance Web Server or not. If your configuration is correct then you can access it. Click on other hosts (A, B and D) and check to make sure you can t access Finance Web Server from these hosts. Finally, save the configuration

10 P a g e Corp1(config-if)#end Corp1#copy running-config startup-config (This configuration only prevents hosts from accessing Finance Web Server via web but if this server supports other traffic like FTP, SMTP then other hosts can access it, too.) Notice: In the real exam, you might be asked to allow other host (A, B or D) to access the Finance Web Server so please read the requirement carefully. Some modifications: permit host B from accessing finance server access-list 100 permit ip host 192.168.33.2 host 172.22.242.23 deny host B from accessing the OTHER server (not the whole network) access-list 100 deny ip host 192.168.33.2 172.22.242.16 0.0.0.15 permit everything else permit ip any any Only allow Host C to to access the financial server access-list 100 permit ip host 192.168.33.3 host 172.22.242.23 Not allow anyone else in any way communicate with the financial server access-list 100 deny ip any host 172.22.242.23 Allow all other traffic permit ip any any - Host C should be able to use a web browser(http)to access the Finance Web Server access-list 100 permit tcp host 192.168.33.3 host 172.22.242.23 eq 80 - Other types of access from host C to the Finance Web Server should be blocked All access from hosts in the Core or local LAN to the Finance Web Server should be blocked access-list 100 deny ip any host 172.22.242.23 (because the requirement says we can not use more than 3 statements so we have to use any here for the hosts in the Core and hosts in local LAN) - All hosts in the Core and local LAN should be able to access the Public Web Server * access-list 100 permit ip any host <IP of Public Web Server> (If the question asks this, surely it has to give you the IP of Public Web Server) but in the exam you should use access-list 100 permit ip any any Host C should be able to use a web browser to access the financial web server access-list 100 permit tcp host 192.168.33.3 host 172.22.242.23 eq 80

11 P a g e Other types of access from host C to the finance web server should be blocked access-list 100 deny ip host 192.168.33.3 host 172.22.242.23 All hosts in the core and on the local LAN should be able to access the Public web server * access-list 100 permit ip any host <IP of Public Web Server> (The IP of Public Web Server will surely be given in this question) but in the exam you should use access-list 100 permit ip any any * There are some reports about the command of All hosts in the core and on the local LAN should be able to access the Public web server saying that the correct command should be access-list 100 permit ip any any, not access-list 100 permit ip any host (IP of Public Web Server). Although I believe the second command is better but maybe you should use the first command access-list 100 permit ip any any instead as some reports said they got 100% when using this command (even if the question gives you the IP address of Public Web Server). It is a bug in this sim. (Note: Don t forget to apply this access list to the suitable interface or you will lose points interface fa0/1 ip access-group 100 out And in the exam, they may slightly change the requirements, for example host A, host B instead of host C so make sure you read the requirement carefully and use the access-list correctly) LAB: http://www.9tut.com/download/9tut.com_ccna_access_list_sim.pkt