Network Topology Configuration: Firewall and Security Verification

Verified

Added on  2021/05/31

|21
|658
|103
Practical Assignment
AI Summary
This assignment solution details the configuration of a network topology, encompassing basic device settings in routers R1, R2, and R3, along with IP address assignments for PCs PC-A, PC-B, and PC-C. It verifies network connectivity through ping tests and configures static routes. The solution further delves into setting up user accounts, encrypted passwords, and crypto keys for SSH. Part 2 focuses on configuring a zone-based policy firewall in R3, including creating security zones, policies, class maps, and zone pairs. It also covers assigning interfaces to zones and verifying the configurations. Part 3 verifies the firewall's functionality, testing traffic originating from the internet and the self-zone. The solution includes references to relevant Cisco documentation and GNS3 lab guides.
Document Page
Network Topology
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Task 1: Configure Basic Device Setting
In Router R1,
Document Page
In Router R3,
Document Page
In Router R2,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Set IP in PC
PC-A
PC-B
PC-C
Document Page
Verify Connectivity between PC-A and R3
Ping from R1 to R3
Ping from PC-A to PC-C
PC-A Ping request transferred to default gateway IP (192.168.1.1). Default Gateway is
R1 for PC-A. R1 is configured the default routing. This ping request transferred 10.1.1.2(R2). In
R2, Three static routes are configured. This IP address belong to 192.168.33.0 network. So this
request transferred to R3. Then It reached PC-C. PC-C replied via R3 to R2 using default
routing. In R2, it verified the network. The reply IP address belong to 192.168.1.0 network. So
this reply reached to PC-A via R1
Document Page
Configure User Account, encrypted password and crypto keys for SSH
In Router R1,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
In Router R3,
Document Page
Part 2 – Configuring a Zone Based Policy Firewall
Step 1: Verify end-to-end network connectivity
Ping from R1 to R3
Ping from PC-A to PC-C
Ping from PC-A to PC-B
Document Page
Display R3 Running Configuration
View IP Interface configuration
View IP Route
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
View Running Configuration
Document Page
chevron_up_icon
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]