AppendixB Lab1 FinalConfigurations


!************************************************ !* * !* Lab 1 Final Solutions for all Devices * !* * !************************************************ !******************************** !* * !* R1 Final Solution Config * !* * !******************************** service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R1 no logging console enable password cisco no aaa new-model ip source-route ip cef no ip domain lookup ip domain name cisco.com no ipv6 cef ! crypto key generate rsa exportable label gdoikeys modulus 1024 crypto key generate rsa exportable label myCA modulus 1024 ! ! ! ! ! ! ! ! ! ! crypto pki server myCA database level complete issuer-name CN=myCA.cisco.com grant auto lifetime ca-certificate 365 database url flash: no shutdown ! crypto pki trustpoint myCA revocation-check crl rsakeypair myCA ! ! ! crypto isakmp policy 10 hash md5 authentication pre-share group 2 ! crypto isakmp policy 20 encr aes hash md5 authentication pre-share group 2 crypto isakmp key cisco address 0.0.0.0 0.0.0.0 ! ! crypto ipsec transform-set cisco esp-3des esp-md5-hmac mode transport crypto ipsec transform-set gdoitrans esp-aes esp-sha-hmac ! crypto ipsec profile dmvpn set transform-set cisco ! crypto ipsec profile gdoi_profile set security-association lifetime seconds 36000 set transform-set gdoitrans ! crypto gdoi group lab1getvpn identity number 123 server local rekey retransmit 30 number 2 rekey authentication mypubkey rsa gdoikeys rekey transport unicast sa ipsec 1 profile gdoi_profile match address ipv4 101 replay time window-size 10 address ipv4 192.168.3.11 ! ! ! load protocol flash:ip.phdf load protocol flash:tcp.phdf ! ip tcp synwait-time 5 ! class-map type access-control match-all TCP23classmap match field TCP dest-port eq 23 match field IP dest-addr eq 10.1.1.1 class-map type stack match-all matchTCPstack match field IP protocol eq 6 next TCP ! ! policy-map type access-control dropTCP23 class TCP23classmap drop policy-map type access-control blockTCP23 class matchTCPstack service-policy dropTCP23 ! interface Loopback0 ip address 10.1.1.1 255.255.255.0 ! interface Loopback1 ip address 11.11.11.11 255.255.255.255 ! interface Tunnel1 bandwidth 1000 ip address 172.1.0.1 255.255.255.0 no ip redirects ip mtu 1360 no ip next-hop-self eigrp 100 ip nhrp authentication cisco ip nhrp map multicast dynamic ip nhrp network-id 11 ip nhrp holdtime 300 no ip split-horizon eigrp 100 delay 1100 tunnel source GigabitEthernet0/0 tunnel mode gre multipoint tunnel key 11 tunnel protection ipsec profile dmvpn ! interface GigabitEthernet0/0 ip address 192.168.3.11 255.255.255.0 no shutdown ! interface GigabitEthernet0/1 ip address 192.168.2.11 255.255.255.0 no shutdown ! interface Serial0/0/0 no ip address shutdown clock rate 2000000 ! interface Serial0/0/1 no ip address shutdown clock rate 2000000 ! router eigrp 100 network 11.11.11.0 0.0.0.255 network 172.1.0.0 0.0.0.255 no auto-summary ! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 192.168.2.1 ip route 10.0.0.0 255.0.0.0 192.168.3.10 ip route 172.17.0.0 255.255.0.0 192.168.3.10 ip route 192.168.0.0 255.255.0.0 192.168.3.10 ip http server no ip http secure-server ! ! ! access-list 1 permit 10.5.5.5 access-list 1 permit 192.168.2.12 access-list 1 permit 192.168.9.10 access-list 101 permit ip 172.17.0.0 0.0.255.255 172.17.0.0 0.0.255.255 access-list 120 permit ip host 192.168.64.6 any access-list 120 permit ip any host 192.168.64.6 ! ! ! control-plane service-policy type access-control input blockTCP23 ! ! line con 0 exec-timeout 0 0 password cisco logging synchronous login line aux 0 exec-timeout 0 0 password cisco logging synchronous login transport input telnet line vty 0 4 exec-timeout 0 0 password cisco logging synchronous login transport input telnet ! ntp authentication-key 1 md5 cisco ntp authenticate ntp trusted-key 1 ntp source Loopback0 ntp access-group peer 1 ntp master 5 end !******************************** !* * !* R2 Final Solution Config * !* * !******************************** service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R2 enable password cisco ! aaa new-model aaa authentication login vtyauthen group tacacs+ aaa authentication login conauthen none aaa authorization exec vtyexec group tacacs+ ip source-route ip cef no ip domain lookup ip domain name cisco.com no ipv6 cef ! crypto isakmp policy 10 hash md5 authentication pre-share group 2 crypto isakmp key cisco address 0.0.0.0 0.0.0.0 ! ! crypto ipsec transform-set cisco esp-3des esp-md5-hmac mode transport ! crypto ipsec profile dmvpn set transform-set cisco ! ip tcp synwait-time 5 ! class-map match-all copp match access-group 101 match not access-group 102 ! ! policy-map copp class copp drop ! ! ! ! ! interface Loopback0 ip address 10.2.2.2 255.255.255.0 ! interface Loopback1 ip address 22.22.22.22 255.255.255.0 ! interface Tunnel1 bandwidth 1000 ip address 172.1.0.2 255.255.255.0 no ip redirects ip mtu 1360 ip nhrp authentication cisco ip nhrp map multicast 192.168.3.11 ip nhrp map 172.1.0.1 192.168.3.11 ip nhrp network-id 11 ip nhrp holdtime 300 ip nhrp nhs 172.1.0.1 delay 1100 tunnel source GigabitEthernet0/0 tunnel mode gre multipoint tunnel key 11 tunnel protection ipsec profile dmvpn ! interface GigabitEthernet0/0 ip address 192.168.4.11 255.255.255.0 no shutdown ! interface GigabitEthernet0/1 ip address 192.168.5.11 255.255.255.0 no shutdown ! interface Serial0/0/0 no ip address shutdown ! interface Serial0/0/1 no ip address shutdown ! router eigrp 100 network 22.22.22.0 0.0.0.255 network 172.1.0.0 0.0.0.255 no auto-summary ! router ospf 1 log-adjacency-changes ! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 192.168.4.10 ip http server no ip http secure-server ! ! ! access-list 101 permit icmp any any access-list 102 permit icmp 10.0.0.0 0.255.255.255 any access-list 102 permit icmp 172.16.0.0 0.15.255.255 any access-list 102 permit icmp 192.168.0.0 0.0.255.255 any ! tacacs-server host 192.168.2.14 tacacs-server key cisco ! control-plane service-policy input copp ! line con 0 exec-timeout 0 0 password cisco logging synchronous login authentication conauthen line aux 0 exec-timeout 0 0 password cisco logging synchronous transport input telnet line vty 0 4 exec-timeout 0 0 password cisco authorization exec vtyexec logging synchronous login authentication vtyauthen transport input telnet ! parser view netop secret 5 $1$.SqL$qcRMtupOtbjMledzQJwp20 commands configure include all ip route commands configure include all router commands configure include all interface commands configure include ip commands exec include configure terminal commands exec include configure commands exec include all show ! parser view secop secret 5 $1$o6m5$CtYHwt2EPE4/iKqHCTvEn. commands configure include all radius-server commands configure include all tacacs-server commands configure include all interface commands configure include all zone-pair commands configure include all zone commands configure include all policy-map commands configure include all class-map commands configure include all crypto commands configure include all aaa commands exec include configure terminal commands exec include configure commands exec include all show ! end !******************************** !* * !* R3 Final Solution Config * !* * !******************************** service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R3 enable password cisco no aaa new-model ip source-route ip cef no ip domain lookup ip domain name cisco.com no ipv6 cef ! crypto isakmp policy 10 encr aes hash md5 authentication pre-share group 2 crypto isakmp key cisco address 0.0.0.0 0.0.0.0 ! ! crypto gdoi group lab1getvpn identity number 123 server address ipv4 192.168.3.11 ! ! crypto map gdoi 10 gdoi set group lab1getvpn ! ip tcp synwait-time 5 ! interface Loopback0 ip address 10.3.3.3 255.255.255.0 ! interface Loopback10 ip address 172.17.3.3 255.255.255.0 ! interface GigabitEthernet0/0 no ip address shutdown ! interface GigabitEthernet0/1 ip address 192.168.9.3 255.255.255.0 ip ospf authentication message-digest ip ospf message-digest-key 1 md5 cisco crypto map gdoi no shutdown ! interface Serial0/0/0 ip address 192.168.35.3 255.255.255.0 encapsulation ppp ip ospf network point-to-point no fair-queue no shutdown ! interface Serial0/0/1 no ip address shutdown ! router ospf 1 log-adjacency-changes network 10.3.3.0 0.0.0.255 area 0 network 172.17.3.0 0.0.0.255 area 0 network 192.168.9.0 0.0.0.255 area 0 network 192.168.35.0 0.0.0.255 area 0 ! ip http server no ip http secure-server ! line con 0 exec-timeout 0 0 password cisco logging synchronous login line aux 0 exec-timeout 0 0 password cisco logging synchronous login transport input telnet line vty 0 4 exec-timeout 0 0 password cisco logging synchronous login transport input telnet ! end !******************************** !* * !* R4 Final Solution Config * !* * !******************************** service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R4 enable password cisco no aaa new-model ip source-route ip cef ! no ip domain lookup ip domain name cisco.com no ipv6 cef ! frame-relay switching ! crypto isakmp policy 10 hash md5 authentication pre-share group 2 crypto isakmp key cisco address 0.0.0.0 0.0.0.0 ! ! crypto ipsec transform-set cisco esp-3des esp-md5-hmac mode transport ! crypto ipsec profile dmvpn set transform-set cisco ! ip tcp synwait-time 5 ! interface Loopback0 ip address 10.4.4.4 255.255.255.0 ! interface Loopback1 ip address 44.44.44.44 255.255.255.0 ! interface Tunnel1 bandwidth 1000 ip address 172.1.0.4 255.255.255.0 no ip redirects ip mtu 1360 ip nhrp authentication cisco ip nhrp map multicast 192.168.3.11 ip nhrp map 172.1.0.1 192.168.3.11 ip nhrp network-id 11 ip nhrp nhs 172.1.0.1 delay 1100 tunnel source Serial0/0/0 tunnel mode gre multipoint tunnel key 11 tunnel protection ipsec profile dmvpn ! interface GigabitEthernet0/0 no ip address shutdown ! interface GigabitEthernet0/1 ip address 192.168.9.4 255.255.255.0 ip ospf authentication message-digest ip ospf message-digest-key 1 md5 cisco no shutdown ! interface Serial0/0/0 ip address 192.168.64.4 255.255.255.0 encapsulation frame-relay ip ospf network point-to-point clock rate 2000000 frame-relay map ip 192.168.64.6 64 broadcast frame-relay intf-type dce no shutdown ! interface Serial0/0/1 no ip address shutdown clock rate 2000000 ! router eigrp 100 network 44.44.44.0 0.0.0.255 network 172.1.0.0 0.0.0.255 no auto-summary ! router ospf 1 log-adjacency-changes network 10.4.4.0 0.0.0.255 area 0 network 192.168.9.0 0.0.0.255 area 0 network 192.168.64.0 0.0.0.255 area 0 ! ip http server no ip http secure-server ! ! control-plane host management-interface GigabitEthernet0/1 allow http telnet management-interface Serial0/0/0 allow telnet ! ! control-plane ! ! line con 0 exec-timeout 0 0 password cisco logging synchronous login line aux 0 exec-timeout 0 0 password cisco logging synchronous login transport input telnet line vty 0 4 exec-timeout 0 0 password cisco logging synchronous login transport input telnet ! end !******************************** !* * !* R5 Final Solution Config * !* * !******************************** service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption no service dhcp ! hostname R5 logging buffered 4096 no logging console enable password cisco no aaa new-model ip source-route ip cef no ip bootp server no ip domain lookup ip domain name cisco.com no ipv6 cef ! frame-relay switching ! parameter-map type regex emailid pattern joe@myemail.com ! crypto pki trustpoint cisco enrollment url http://10.1.1.1:80 serial-number revocation-check none ! ! ! crypto pki certificate map mycert 10 issuer-name co myca subject-name co asa2 ! ! crypto isakmp policy 10 encr 3des hash md5 group 2 crypto isakmp identity dn crypto isakmp profile isakmpprofile ca trust-point cisco match certificate mycert ! ! crypto ipsec transform-set cisco esp-3des esp-sha-hmac ! crypto map cisco local-address Loopback1 crypto map cisco 10 ipsec-isakmp set peer 192.168.9.10 set transform-set cisco set isakmp-profile isakmpprofile match address 109 ! ! ! ip finger ip tcp synwait-time 5 ip ssh version 1 ! class-map type inspect match-all icmp match protocol icmp class-map type inspect http match-any webtunneling match request port-misuse tunneling class-map type inspect match-all smtp match protocol smtp class-map type inspect match-any central_remote match access-group 101 class-map type inspect match-any other match protocol telnet match protocol ssh class-map type inspect match-any web match protocol http class-map type inspect smtp match-all largemail match sender address regex emailid match data-length gt 10000000 ! ! policy-map type inspect http dropwebtunneling class type inspect http webtunneling reset policy-map type inspect central_remote class type inspect central_remote inspect class class-default drop policy-map type inspect smtp droplargemail class type inspect smtp largemail reset policy-map type inspect remote_central class type inspect web inspect service-policy http dropwebtunneling class type inspect icmp inspect police rate 20000 burst 2000 class type inspect other inspect class type inspect smtp inspect service-policy smtp droplargemail class class-default drop ! zone security REMOTE zone security CENTRAL zone-pair security central_remote source CENTRAL destination REMOTE service-policy type inspect central_remote zone-pair security remote_central source REMOTE destination CENTRAL service-policy type inspect remote_central ! ! ! ! interface Loopback0 ip address 10.5.5.5 255.255.255.0 ! interface Loopback1 ip address 192.168.55.5 255.255.255.0 ! interface Loopback5 ip address 10.55.55.55 255.255.255.255 ip nat inside ip virtual-reassembly ! interface GigabitEthernet0/0 no ip address shutdown ! interface GigabitEthernet0/1 ip address 192.168.11.10 255.255.255.0 ntp broadcast no shutdown ! interface Serial0/0/0 ip address 192.168.35.5 255.255.255.0 ip nat outside ip virtual-reassembly zone-member security REMOTE encapsulation ppp ip ospf network point-to-point no fair-queue clock rate 2000000 crypto map cisco no shutdown ! interface Serial0/0/1 ip address 192.168.65.5 255.255.255.0 ip nat outside ip virtual-reassembly zone-member security CENTRAL encapsulation frame-relay ip ospf network point-to-point clock rate 2000000 frame-relay map ip 192.168.65.6 65 broadcast frame-relay intf-type dce crypto map cisco no shutdown ! router ospf 1 log-adjacency-changes network 10.5.5.0 0.0.0.255 area 0 network 10.55.55.0 0.0.0.255 area 0 network 192.168.35.0 0.0.0.255 area 0 network 192.168.55.0 0.0.0.255 area 0 network 192.168.65.0 0.0.0.255 area 0 ! ip forward-protocol nd ip http server no ip http secure-server ! ! ip nat inside source route-map s0 interface Serial0/0/0 overload ip nat inside source route-map s1 interface Serial0/0/1 overload ! access-list 101 permit ip any any access-list 102 permit ip host 10.55.55.55 any access-list 109 permit ip host 10.5.5.5 host 10.8.8.8 ! ! ! ! route-map s1 permit 10 match ip address 102 match interface Serial0/0/1 ! route-map s0 permit 10 match ip address 102 match interface Serial0/0/0 ! ! ! ! line con 0 exec-timeout 0 0 password cisco logging synchronous login line aux 0 exec-timeout 0 0 password cisco logging synchronous login transport input telnet line vty 0 4 exec-timeout 0 0 password cisco logging synchronous login transport input telnet ! process cpu threshold type total rising 75 interval 5 ntp authentication-key 1 md5 cisco ntp authenticate ntp trusted-key 1 ntp server 10.1.1.1 key 1 source Loopback0 end ! Following steps will enroll & install CA certificate once CA server is UP ! ! crypto key generate rsa exportable modulus 1024 ! crypto pki authenticate cisco ! crypto pki enroll cisco ! end !******************************** !* * !* R6 Final Solution Config * !* * !******************************** service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R6 logging buffered 4096 enable password cisco no aaa new-model ip source-route ip cef no ip domain lookup ip domain name cisco.com no ipv6 cef ! ! crypto isakmp policy 10 encr aes hash md5 authentication pre-share group 2 crypto isakmp key cisco address 0.0.0.0 0.0.0.0 ! ! crypto gdoi group lab1getvpn identity number 123 server address ipv4 192.168.3.11 ! ! crypto map gdoi 10 gdoi set group lab1getvpn ! ip tcp synwait-time 5 ! ! interface Loopback0 ip address 10.6.6.6 255.255.255.0 ! interface Loopback10 ip address 172.17.6.6 255.255.255.0 ! interface Loopback20 ip address 50.50.50.50 255.255.255.255 ! interface GigabitEthernet0/0 ip address 192.168.7.11 255.255.255.0 no shutdown ! interface GigabitEthernet0/1 ip address 192.168.6.11 255.255.255.0 no shutdown ! interface Serial0/0/0 ip address 192.168.64.6 255.255.255.0 ip verify unicast source reachable-via any encapsulation frame-relay ip ospf network point-to-point snmp trap ip verify drop-rate no fair-queue frame-relay map ip 192.168.64.4 64 broadcast crypto map gdoi no shutdown ! interface Serial0/0/1 ip address 192.168.65.6 255.255.255.0 ip verify unicast source reachable-via any encapsulation frame-relay ip ospf network point-to-point snmp trap ip verify drop-rate frame-relay map ip 192.168.65.5 65 broadcast no shutdown ! router ospf 1 log-adjacency-changes redistribute connected metric 1 subnets redistribute static metric 1 subnets network 10.6.6.0 0.0.0.255 area 0 network 172.17.6.0 0.0.0.255 area 0 network 192.168.64.0 0.0.0.255 area 0 network 192.168.65.0 0.0.0.255 area 0 ! ip forward-protocol nd ip route 10.1.1.0 255.255.255.0 192.168.6.10 ip route 10.2.2.0 255.255.255.0 192.168.6.10 ip route 10.7.7.0 255.255.255.0 192.168.7.10 ip route 172.16.1.0 255.255.255.0 192.168.7.10 ip route 192.168.2.0 255.255.255.0 192.168.6.10 ip route 192.168.3.0 255.255.255.0 192.168.6.10 ip route 192.168.4.0 255.255.255.0 192.168.6.10 ip route 192.168.5.0 255.255.255.0 192.168.6.10 ip route 192.168.8.0 255.255.255.0 192.168.7.10 no ip http server no ip http secure-server ! ! ! access-list 101 deny icmp host 10.55.55.55 any access-list 101 deny icmp host 192.168.65.5 any access-list 101 deny icmp host 192.168.35.5 any access-list 101 permit ip any any access-list 120 permit ip any host 192.168.3.11 ! ! ! line con 0 exec-timeout 0 0 password cisco logging synchronous login line aux 0 exec-timeout 0 0 password cisco logging synchronous login transport input telnet line vty 0 4 exec-timeout 0 0 password cisco logging synchronous login transport input telnet ! end !******************************** !* * !* Sw1 Final Solution Config * !* * !******************************** no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Sw1 enable password cisco ! aaa new-model aaa authentication login vtyauthen group tacacs+ aaa authentication login conauthen none ip subnet-zero ip routing no ip domain-lookup ip domain-name cisco.com ! errdisable recovery cause bpduguard errdisable recovery interval 60 spanning-tree mode pvst spanning-tree loopguard default spanning-tree portfast default spanning-tree portfast bpduguard default spanning-tree extend system-id ! vlan access-map abc 10 action drop match ip address 101 vlan access-map abc 20 action forward ! ip tcp synwait-time 5 ! interface Loopback0 ip address 10.7.7.7 255.255.255.0 ! interface Loopback1 ip address 172.16.1.1 255.255.255.0 ! interface FastEthernet0/1 switchport access vlan 3 switchport mode access ! interface FastEthernet0/2 switchport access vlan 4 switchport mode access ! interface FastEthernet0/3 ! interface FastEthernet0/4 ! interface FastEthernet0/5 ! interface FastEthernet0/6 switchport access vlan 102 switchport mode access ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 switchport access vlan 101 switchport mode access ! interface FastEthernet0/11 switchport trunk encapsulation dot1q switchport mode trunk ! interface FastEthernet0/12 switchport access vlan 201 switchport mode access ! interface FastEthernet0/13 no switchport ip address 192.168.8.11 255.255.255.0 storm-control broadcast level 80.00 60.00 ! interface FastEthernet0/14 ! interface FastEthernet0/15 switchport access vlan 2 switchport mode access ! interface FastEthernet0/16 switchport trunk encapsulation dot1q switchport trunk allowed vlan 101,102 switchport mode trunk ! interface FastEthernet0/17 switchport trunk encapsulation dot1q switchport trunk allowed vlan 201,202 switchport mode trunk ! interface FastEthernet0/18 ! interface FastEthernet0/19 ! interface FastEthernet0/20 switchport access vlan 2 switchport mode access ! interface FastEthernet0/21 ! interface FastEthernet0/22 switchport access vlan 2 switchport mode access ! interface FastEthernet0/23 switchport access vlan 2 switchport mode access ! interface FastEthernet0/24 switchport trunk encapsulation dot1q switchport mode trunk ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address shutdown ! ip classless ip route 0.0.0.0 0.0.0.0 192.168.8.10 ip http server ip http secure-server ! ! access-list 101 permit ip host 192.168.4.11 host 192.168.3.11 access-list 101 permit ip host 192.168.4.11 host 192.168.64.4 tacacs-server host 192.168.2.14 tacacs-server directed-request tacacs-server key cisco ! ! line con 0 exec-timeout 0 0 password cisco logging synchronous login authentication conauthen line vty 0 4 exec-timeout 0 0 password cisco logging synchronous login authentication vtyauthen transport input telnet line vty 5 15 ! end Sw1# show vtp status VTP Version : running VTP2 Configuration Revision : 15 Maximum VLANs supported locally : 1005 Number of existing VLANs : 15 VTP Operating Mode : Server VTP Domain Name : ccie VTP Pruning Mode : Disabled VTP V2 Mode : Enabled VTP Traps Generation : Disabled MD5 digest : 0x7C 0x7F 0x19 0xCB 0xF0 0xB7 0x9A 0xB6 Configuration last modified by 192.168.11.11 at 6-18-09 13:06:36 Local updater ID is 192.168.8.11 on interface Fa0/13 (first layer3 interface found) Sw1# Sw1# Sw1#show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/7 Fa0/8, Fa0/9, Fa0/14, Fa0/18 Fa0/19, Fa0/21, Gi0/1, Gi0/2 2 VLAN0002 active Fa0/15, Fa0/20, Fa0/22, Fa0/23 3 VLAN0003 active Fa0/1 4 VLAN0004 active Fa0/2 5 VLAN0005 active 9 VLAN0009 active 50 VLAN0050 active 101 VLAN0101 active Fa0/10 102 VLAN0102 active Fa0/6 201 VLAN0201 active Fa0/12 202 VLAN0202 active 1002 fddi-default act/unsup 1003 trcrf-default act/unsup 1004 fddinet-default act/unsup 1005 trbrf-default act/unsup !******************************** !* * !* Sw2 Final Solution Config * !* * !******************************** no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname Sw2 no logging console enable password cisco no aaa new-model ip subnet-zero ip routing no ip domain-lookup ip domain-name cisco.com ! ip dhcp snooping vlan 50 ip dhcp snooping ip arp inspection vlan 50 ip arp inspection validate src-mac ip ! key chain cisco key 1 key-string cisco ! ip tcp synwait-time 5 ! interface Loopback0 ip address 10.8.8.8 255.255.255.0 ! interface FastEthernet0/1 switchport access vlan 2 switchport mode access ! interface FastEthernet0/2 switchport access vlan 5 switchport mode access ! interface FastEthernet0/3 switchport access vlan 9 switchport mode access ! interface FastEthernet0/4 switchport access vlan 9 switchport mode access ! interface FastEthernet0/5 no switchport ip address 192.168.11.11 255.255.255.0 ntp broadcast client ! interface FastEthernet0/6 switchport access vlan 202 switchport mode access ! interface FastEthernet0/7 switchport mode access dot1x pae authenticator dot1x port-control auto dot1x host-mode multi-host dot1x violation-mode shutdown dot1x max-req 3 dot1x reauthentication dot1x guest-vlan 5 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 switchport access vlan 9 switchport mode access ! interface FastEthernet0/11 no switchport ip address 192.168.10.11 255.255.255.0 ip authentication mode eigrp 10 md5 ip authentication key-chain eigrp 10 cisco ! interface FastEthernet0/12 switchport access vlan 9 switchport mode access ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 switchport access vlan 50 switchport mode access ip arp inspection trust ip arp inspection limit rate 10 ip dhcp snooping trust ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 switchport trunk encapsulation dot1q switchport mode trunk ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address shutdown ! ! router eigrp 10 no auto-summary network 10.8.8.0 0.0.0.255 network 192.168.10.0 ! ip classless ip http server ip http secure-server control-plane ! ! line con 0 exec-timeout 0 0 password cisco logging synchronous login line vty 0 4 exec-timeout 0 0 password cisco logging synchronous login transport input telnet line vty 5 15 login ! ntp clock-period 36028956 end Sw2# show vtp status VTP Version : running VTP2 Configuration Revision : 15 Maximum VLANs supported locally : 1005 Number of existing VLANs : 15 VTP Operating Mode : Server VTP Domain Name : ccie VTP Pruning Mode : Disabled VTP V2 Mode : Enabled VTP Traps Generation : Disabled MD5 digest : 0x7C 0x7F 0x19 0xCB 0xF0 0xB7 0x9A 0xB6 Configuration last modified by 192.168.11.11 at 6-18-09 13:06:36 Local updater ID is 192.168.11.11 on interface Fa0/5 (first layer3 interface found) Sw2# Sw2#show vlan brief VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------- 1 default active Fa0/7, Fa0/8, Fa0/9, Fa0/13 Fa0/14, Fa0/16, Fa0/17, Fa0/18 Fa0/19, Fa0/20, Fa0/21, Fa0/22 Fa0/23, Gi0/1, Gi0/2 2 VLAN0002 active Fa0/1 3 VLAN0003 active 4 VLAN0004 active 5 VLAN0005 active Fa0/2 9 VLAN0009 active Fa0/3, Fa0/4, Fa0/10, Fa0/12 50 VLAN0050 active Fa0/15 101 VLAN0101 active 102 VLAN0102 active 201 VLAN0201 active 202 VLAN0202 active Fa0/6 1002 fddi-default act/unsup 1003 trcrf-default act/unsup 1004 fddinet-default act/unsup 1005 trbrf-default act/unsup Sw2# Sw2# !******************************** !* * !* ASA1 System Context * !* Final Solution Configuration * !* * !******************************** mode multiple !***************************************************** ! Convert to Multi-mode, ASA will reboot at this point !***************************************************** ! hostname ASA1 enable password cisco no mac-address auto ! interface Ethernet0/0 no shutdown ! interface Ethernet0/1 no shutdown ! interface Ethernet0/1.1 vlan 3 ! interface Ethernet0/1.2 vlan 4 ! interface Ethernet0/2 no shutdown ! interface Ethernet0/3 no shutdown ! interface Management0/0 no shutdown ! no failover ! admin-context admin context admin allocate-interface Management0/0 mgmt config-url disk0:/admin ! context abc1 allocate-interface Ethernet0/0 outside allocate-interface Ethernet0/3 inside config-url disk0:/abc1 ! context abc2 allocate-interface Ethernet0/1.1 inside allocate-interface Ethernet0/1.2 dmz2 allocate-interface Ethernet0/2 outside config-url disk0:/abc2 ! prompt hostname context : end !******************************** !* * !* ASA1 abc1 Context * !* Final Solution Configuration * !* * !******************************** change context abc1 ! hostname abc1 enable password cisco passwd cisco names ! interface outside nameif outside security-level 0 ip address 192.168.7.10 255.255.255.0 ! interface inside nameif inside security-level 100 ip address 192.168.8.10 255.255.255.0 ! access-list 100 extended permit icmp any any access-list 100 extended permit tcp any host 172.16.1.1 eq www access-list 100 extended permit tcp any host 172.16.1.1 eq https access-list 100 extended permit tcp any host 192.168.8.11 eq telnet icmp unreachable rate-limit 1 burst-size 1 static (inside,outside) 172.16.1.1 172.16.1.1 netmask 255.255.255.255 access-group 100 in interface outside route outside 0.0.0.0 0.0.0.0 192.168.7.11 1 route inside 10.7.7.0 255.255.255.0 192.168.8.11 1 route inside 172.16.1.0 255.255.255.0 192.168.8.11 1 sysopt noproxyarp outside service resetinbound crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 telnet timeout 5 ssh timeout 5 no threat-detection statistics tcp-intercept ! class-map webserver443 match port tcp eq https class-map inspection_default match default-inspection-traffic class-map webserver80 match port tcp eq www ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp policy-map webserver class webserver443 set connection embryonic-conn-max 50 per-client-embryonic-max 5 class webserver80 set connection embryonic-conn-max 50 per-client-embryonic-max 5 ! service-policy global_policy global service-policy webserver interface outside : end !******************************** !* * !* ASA1 abc2 Context * !* Final Solution Configuration * !* * !******************************** change context abc2 ! hostname abc2 enable password cisco passwd cisco names ! interface inside nameif inside security-level 100 ip address 192.168.3.10 255.255.255.0 ! interface dmz2 nameif dmz2 security-level 50 ip address 192.168.4.10 255.255.255.0 ! interface outside nameif outside security-level 0 ip address 192.168.6.10 255.255.255.0 ! regex filterIMregex "yusuf@hotmail.com" access-list 100 extended permit icmp any any access-list 100 extended permit udp host 10.5.5.5 host 10.1.1.1 eq ntp access-list 100 extended permit udp host 192.168.9.10 host 10.1.1.1 eq ntp access-list 100 extended permit tcp any host 10.1.1.1 eq www access-list 100 extended permit esp any any access-list 100 extended permit udp any any eq isakmp access-list 100 extended permit udp host 192.168.9.3 host 192.168.3.11 eq 848 access-list 100 extended permit udp host 192.168.6.11 host 192.168.3.11 eq 848 access-list 100 extended permit udp host 192.168.64.6 host 192.168.3.11 eq 848 access-list 100 extended permit tcp host 192.168.4.11 host 192.168.2.14 eq tacacs access-list 100 extended permit tcp any host 192.168.4.11 eq telnet access-list 100 extended permit tcp host 192.168.8.11 host 192.168.2.14 eq tacacs access-list 100 extended permit tcp any any eq telnet access-list 101 extended permit tcp host 10.1.1.1 host 10.6.6.6 eq telnet access-list 102 extended permit tcp any host 10.6.6.6 eq telnet icmp unreachable rate-limit 1 burst-size 1 global (outside) 1 192.168.6.61 global (outside) 2 192.168.6.62 nat (inside) 1 access-list 101 nat (inside) 2 access-list 102 access-group 100 in interface dmz2 access-group 100 in interface outside route outside 0.0.0.0 0.0.0.0 192.168.6.11 1 route inside 10.1.1.0 255.255.255.0 192.168.3.11 1 route dmz2 10.2.2.0 255.255.255.0 192.168.4.11 1 route inside 192.168.2.0 255.255.255.0 192.168.3.11 1 route dmz2 192.168.5.0 255.255.255.0 192.168.4.11 1 crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 no threat-detection statistics tcp-intercept ! class-map type inspect im match-all filterIMclassmap match protocol msn-im match login-name regex filterIMregex match service file-transfer class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map type inspect im filterIMpolicy parameters class filterIMclassmap drop-connection policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp inspect im filterIMpolicy ! service-policy global_policy global : end [OK] !******************************** !* * !* ASA2 Final Solution Config * !* * !******************************** hostname ASA2 domain-name cisco.com enable password cisco passwd cisco ! interface Ethernet0/0 no nameif no security-level no ip address no shutdown ! interface Ethernet0/1 nameif inside security-level 100 ip address 192.168.10.10 255.255.255.0 authentication key eigrp 10 key-id 1 authentication mode eigrp 10 md5 no shutdown ! interface Ethernet0/2 no nameif no security-level no ip address no shutdown ! interface Ethernet0/3 shutdown no nameif no security-level no ip address ! interface Management0/0 shutdown no nameif no security-level no ip address management-only ! interface Redundant1 member-interface Ethernet0/0 member-interface Ethernet0/2 nameif outside security-level 0 ip address 192.168.9.10 255.255.255.0 ospf message-digest-key 1 md5 ospf authentication message-digest no shutdown ! dns server-group DefaultDNS domain-name cisco.com access-list 100 extended permit icmp any any access-list 101 extended permit ip host 10.8.8.8 host 10.5.5.5 ip local pool SSLpool 192.168.111.1-192.168.111.50 mask 255.255.255.0 no failover icmp unreachable rate-limit 1 burst-size 1 static (outside,inside) 192.168.10.6 10.6.6.6 netmask 255.255.255.255 access-group 100 in interface outside ! router eigrp 10 no auto-summary network 192.168.10.0 255.255.255.0 redistribute ospf 1 metric 1 1 1 1 1 ! router ospf 1 network 192.168.9.0 255.255.255.0 area 0 log-adj-changes redistribute eigrp 10 metric 1 subnets ! route outside 0.0.0.0 0.0.0.0 192.168.9.4 1 track 1 route outside 0.0.0.0 0.0.0.0 192.168.9.3 2 dynamic-access-policy-record DfltAccessPolicy snmp-server enable traps snmp authentication linkup linkdown coldstart sla monitor 444 type echo protocol ipIcmpEcho 10.4.4.4 interface outside num-packets 3 frequency 5 sla monitor schedule 444 life forever start-time now crypto ipsec transform-set cisco esp-3des esp-sha-hmac crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto map cisco 10 match address 101 crypto map cisco 10 set peer 192.168.55.5 crypto map cisco 10 set transform-set cisco crypto map cisco 10 set security-association lifetime seconds 28800 crypto map cisco 10 set security-association lifetime kilobytes 4608000 crypto map cisco 10 set trustpoint cisco crypto map cisco interface outside crypto ca trustpoint cisco enrollment url http://10.1.1.1:80 serial-number crl configure crypto isakmp enable outside crypto isakmp policy 10 authentication rsa-sig encryption 3des hash md5 group 2 lifetime 86400 ! track 1 rtr 444 reachability telnet timeout 5 ssh timeout 5 console timeout 0 threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept ntp authentication-key 1 md5 cisco ntp authenticate ntp trusted-key 1 ntp server 10.1.1.1 key 1 webvpn enable outside svc image disk0:/anyconnect-win-2.3.0254-k9.pkg 1 svc enable tunnel-group-list enable group-policy SSLclient internal group-policy SSLclient attributes dns-server value 192.168.2.14 vpn-tunnel-protocol svc default-domain value cisco.com address-pools value SSLpool username lab1user password cisco username lab1user attributes service-type remote-access tunnel-group 192.168.55.5 type ipsec-l2l tunnel-group 192.168.55.5 ipsec-attributes trust-point cisco tunnel-group svc type remote-access tunnel-group svc general-attributes default-group-policy SSLclient tunnel-group svc webvpn-attributes group-alias lab1 enable ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! service-policy global_policy global prompt hostname context ! Following steps will enroll & install CA certificate once CA server is UP ! ! crypto key generate rsa modulus 1024 ! crypto ca authenticate cisco ! crypto ca enroll cisco ! end : end [OK] !******************************** !* * !* IPS Final Solution Config * !* * !******************************** service interface physical-interfaces GigabitEthernet0/0 admin-state enabled subinterface-type inline-vlan-pair subinterface 1 vlan1 101 vlan2 102 exit exit exit physical-interfaces GigabitEthernet0/1 admin-state enabled subinterface-type inline-vlan-pair subinterface 1 vlan1 201 vlan2 202 exit exit exit exit ! ------------------------------ service host network-settings host-ip 192.168.2.12/24,192.168.2.11 host-name IPS telnet-option enabled access-list 10.1.1.0/24 access-list 192.168.2.0/24 exit time-zone-settings offset 0 standard-time-zone-name UTC exit ntp-option enabled ntp-keys 1 md5-key cisco ntp-servers 10.1.1.1 key-id 1 exit exit ! ------------------------------ service signature-definition sig0 signatures 2000 0 alert-severity medium engine atomic-ip event-action produce-alert exit status enabled true exit exit signatures 2004 0 alert-severity medium engine atomic-ip event-action produce-alert exit status enabled true exit exit signatures 60000 0 alert-severity high sig-fidelity-rating 100 sig-description sig-name kazaa exit engine string-udp event-action produce-alert|deny-attacker-inline regex-string [Kk][Aa][Zz][Aa][Aa] service-ports 1214 direction to-service exit status enabled true exit exit exit ! ------------------------------ service signature-definition sig2 application-policy http-policy http-enable true max-outstanding-http-requests-per-connection 5 exit exit signatures 2000 0 alert-severity medium engine atomic-ip event-action produce-alert exit status enabled true exit exit signatures 2004 0 alert-severity medium engine atomic-ip event-action produce-alert exit status enabled true exit exit exit ! ------------------------------ service web-server enable-tls true port 8000 exit ! ------------------------------ service analysis-engine virtual-sensor vs0 physical-interface GigabitEthernet0/0 subinterface-number 1 exit virtual-sensor vs2 signature-definition sig2 physical-interface GigabitEthernet0/1 subinterface-number 1 exit exit

Wyszukiwarka

Podobne podstrony:
AppendixD Lab2 FinalConfigurations
AppendixA Lab1 InitialConfigurations
Lab1 RoboWorks
Cisco Press CCNP Routing Exam Certification Guide Appendix
APD lab1
Linux IPCHAINS HOWTO Appendix Differences between ipchains and ipfwadm
appendixb
appendix a
Appendix II (2)
AppendixIII
AppendixL
APPEND
function stream filter append
lab1 wprowadzenie
lab1 sprawko
lab1(3)
appendixa (3)
Cisco Broadband Operating System Appendix A
appendixA

więcej podobnych podstron