Assignment on Network Topology

Verified

Added on  2021/05/31

|21
|658
|103
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network Topology

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Task 1: Configure Basic Device Setting
In Router R1,
Document Page
In Router R3,
Document Page
In Router R2,

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Set IP in PC
PC-A
PC-B
PC-C
Document Page
Verify Connectivity between PC-A and R3
Ping from R1 to R3
Ping from PC-A to PC-C
PC-A Ping request transferred to default gateway IP (192.168.1.1). Default Gateway is
R1 for PC-A. R1 is configured the default routing. This ping request transferred 10.1.1.2(R2). In
R2, Three static routes are configured. This IP address belong to 192.168.33.0 network. So this
request transferred to R3. Then It reached PC-C. PC-C replied via R3 to R2 using default
routing. In R2, it verified the network. The reply IP address belong to 192.168.1.0 network. So
this reply reached to PC-A via R1
Document Page
Configure User Account, encrypted password and crypto keys for SSH
In Router R1,

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
In Router R3,
Document Page
Part 2 – Configuring a Zone Based Policy Firewall
Step 1: Verify end-to-end network connectivity
Ping from R1 to R3
Ping from PC-A to PC-C
Ping from PC-A to PC-B
Document Page
Display R3 Running Configuration
View IP Interface configuration
View IP Route

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
View Running Configuration
Document Page
Document Page
Security Access in R3
User Name is admin01
Password is cisco12345
Creating the Security Zones
Creating Security Policies
Create Class Map

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Create Policy Map
Create the Zone Pairs
Verify the Zone Pairs
Applying Security Policies
Document Page
Verify the zone pair Security configuration
Document Page
View Zone Pair, their Policy Maps, Class Maps and match counters
Assign interfaces to the Proper Security Zones

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Verify the Zone Interface Assignment
Document Page
About Self Zone
Self-zone is the default zone. It states the router itself as a separate security zone.
Why is R3 displaying a zone named “self”?
All router has default zone which has named as “self”
Significance of this zone
It has only exception to the default “deny all” policy. Self-zone allows all the traffic to
any router interface until explicitly denied
Part 3: ZPF Verification
Traffic Originating on the Internet
Ping from PC-A to PC-B
We did not configure to allow ICMP packet to INSIDE zone. Deny all is the Default
configuration in self-zone. So it could not be pinged from PC-A to PC-B
Ping from PC-A to PC-C
We did not configure to allow ICMP packet to INSIDE zone. Deny all is the Default
configuration in self-zone. So it could not be pinged from PC-A to PC-C
Document Page
Ping from PC-B to PC-A
We configured to allow the TCP, UDP and ICMP in INSIDE zone. So it can be
communicated PC-B to PC-A
Ping from PC-C to PC-A
We configured to allow the HTTP, HTTPS and DNS in CONFROOM zone. It does not
allow ICMP packets. So it cannot be communicated PC-B to PC-A

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Self-Zone Verification
Ping from PC-A to R3 Fa0/1 interface
This traffic is not entered into CONFROOM or INSIDE zone. It belongs to self-zone.
This self zone is not configured any deny or allow only policy. So that I can communicate from
PC-A to R3 Fa0/1 interface
Ping from PC-C to R3 Fa0/1 interface
This traffic is the local router interface. It is inbound connection. It also belongs to self-
zone. It does not affect with INSIDE zone policy. So it can communicate from PC-C to R3 Fa0/1
Document Page
References:
User Guide for Cisco Security Manager 4.1 - Managing Zone-based Firewall Rules
[Cisco Security Manager 4.1]. (2015, August 20). Retrieved from
https://www.cisco.com/c/en/us/td/docs/security/security_management/
cisco_security_manager/security_manager/4-1/user/guide/CSMUserGuide_wrapper/
fwzbf.html
GNS3 and Cisco Zone-Based Policy Firewall – Part I. (2016, February 08). Retrieved
from http://resources.intenseschool.com/gns3-and-cisco-zone-based-policy-firewall-part-
i/
Simple Zone Based IOS Firewall (GNS3 Lab). (2011, April 24). Retrieved from
https://www.m00nie.com/2011/03/simple-zone-based-ios-firewall-gns3-lab/
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]