CCNA 2 Skills-Based Assessment
Student name ______Date ______Start time ______
Circle one:
Location: Anniston or Boaz
Circle one:
Version 1 2 3 4 5 6 7 8 9 10
Anniston 3 192.168.3.0 /24 192.168.3.1 3
Instructor provided information:(given by the teacher/instructor)
The WAN IP network address is192.168.3.0 with a subnet mask of
255.255.255.0 (but take the less bit’s nececcary for your subnets)
The local LAN has been assigned an IP network address of
14.38.20.0
Each subnet of the above network needs to accommodate 14host addresses.
Use the 3th usable subnet for the LAN. Do not use subnet zero as the first subnet.
The IGRP AS number is 3.
14 hosts 2^4 = 16 (-2 not usable) 14 usable ip’s 4 bits to use :
192.168.3.16 is the first usable subnet
This exam will occur in stages. Each element is a set of instructions that needs to be accomplished.
The instructor will initial each task as it is completed. Proceed to the next task only after the instructor
has approved the current task.
The six elements of this exam are:
1. Basic planning
2. Security planning
3. Cabling
4. Basic configuration
5. Security configuration
6. Troubleshooting
The scenario is that Gadsden (GAD) is regional headquarters of the company. Anniston and Boaz arebranch offices. Each network associate (student) will be responsible for a single branch office. Theinternetwork team leader (instructor) is responsible for the regional router (GAD).A network address and specific number of hosts per subnet has been assigned for the local LAN. Fromthe instructor provided information, the subnet address, the subnet mask, the first and last usableaddresses, and the broadcast address for each site’s LAN need to be determined.
CCNA 2 Hands-on Version Assignment
Router Segment Final Version
Router segment / Final version number / Wan network address / Gad router interface address / Igrp asAnniston / 1 / 192.168.1.0 /24 / 192.168.1.1 / 1
Anniston / 2 / 192.168.2.0 /24 / 192.168.2.1 / 2
Anniston / 3 / 192.168.3.0 /24 / 192.168.3.1 / 3
Anniston / 4 / 192.168.4.0 /24 / 192.168.4.1 / 4
Anniston / 5 / 192.168.5.0 /24 / 192.168.5.1 / 5
Anniston / 6 / 192.168.6.0 /24 / 192.168.6.1 / 6
Anniston / 7 / 192.168.7.0 /24 / 192.168.7.1 / 7
Anniston / 8 / 192.168.8.0 /24 / 192.168.8.1 / 8
Anniston / 9 / 192.168.9.0 /24 / 192.168.9.1 / 9
Anniston / 10 / 192.168.10.0 /24 / 192.168.10.1 / 10
Boaz / 1 / 192.168.1.101 /24 / 192.168.101.1 / 101
Boaz / 2 / 192.168.2.102 /24 / 192.168.102.1 / 102
Boaz / 3 / 192.168.3.103 /24 / 192.168.103.1 / 103
Boaz / 4 / 192.168.4.104/24 / 192.168.104.1 / 104
Boaz / 5 / 192.168.5.105 /24 / 192.168.105.1 / 105
Boaz / 6 / 192.168.6.106 /24 / 192.168.106.1 / 106
Boaz / 7 / 192.168.7.107 /24 / 192.168.107.1 / 107
Boaz / 8 / 192.168.8.108 /24 / 192.168.108.1 / 108
Boaz / 9 / 192.168.9.109 /24 / 192.168.109.1 / 109
Boaz / 10 / 192.168.10.110 /24 / 192.168.110.1 / 110
Step 1: Basic Planning Time: 20 minutes Points ______
Using the chart below, plan the first 10 usable subnets of the LAN network address that was providedby the instructor.
Subnet / Subnet address / Subnetmask (/X) / First host / Last host / broadcast1 / 14.38.20.0 / /16 / 14.38.20.1 / 14.38.20.14 / 14.38.20.15
2 / 14.38.10.16 / /16 / 14.38.10.17 / 14.38.10.30 / 14.38.10.31
3 / 14.38.10.32 / /16 / 14.38.10.33 / 14.38.10.46 / 14.38.10.47
4 / 14.38.10.48 / /16 / 14.38.10.49 / 14.38.10.62 / 14.38.10.63
5 / 14.38.10.64 / /16 / 14.38.10.65 / 14.38.10.78 / 14.38.10.79
6 / 14.38.10.80 / /16 / 14.38.10.81 / 14.38.10.94 / 14.38.10.95
7 / 14.38.10.96 / /16 / 14.38.10.97 / 14.38.10.110 / 14.38.10.111
8 / 14.38.10.112 / /16 / 14.38.10.113 / 14.38.10.126 / 14.38.10.127
9 / 14.38.10.128 / /16 / 14.38.10.129 / 14.38.10.142 / 14.38.10.143
10 / 14.38.10.144 / /16 / 14.38.10.145 / 14.38.10.156 / 14.38.10.159
The WAN interface of GAD is assigned the lowest usable address in the subnetwork.
Identify and use the second lowest usable WAN address for the S0, or S0/0, interface of the assignedrouter 192.168.3.2 For security reasons, the IP addresses of the assigned subnet are split in two groups. The productionworkstations will be assigned the lower half of the IP addresses. The network devices andmanagement stations will be assigned the upper half of the IP addresses. The Ethernet router interfaceis to be assigned the highest usable address.
Identify the required IP address of the Ethernet interface on the assigned router.
14.38.10.33(based on exam version number and subnet assignment)
The host configurations must also be planned. Using the chart below, complete the host information.
Branch:Anniston or Boaz
IP address range 3th subnet : from ip 14.38.10.33 to ip 14.38.10.46 + 1 broadcastaddress
ipBytesbits
So 14.38.10.33 14.38.10. 00010001
14.38.10.34 14.38.10. 00010010
14.38.10.35 14.38.10. 00010011
14.38.10.36 14.38.10. 00010100
14.38.10.37 14.38.10. 00010101
14.38.10.38 14.38.10. 00010110
14.38.10.39 14.38.10. 00010111
14.38.10.40 14.38.10. 00011000
14.38.10.41 14.38.10. 00011001
14.38.10.42 14.38.10. 00011010
14.38.10.43 14.38.10. 00011011
14.38.10.44 14.38.10. 00011100
14.38.10.45 14.38.10. 00011101
14.38.10.46 14.38.10. 00011110
14.38.10.47 14.38.10. 00011111(this is broadcast and don’t count for ip-address)
ProductionHostRange(Lower half)
ipBytesbits
So 14.38.10.33 14.38.10. 00010001
14.38.10.34 14.38.10. 00010010
14.38.10.35 14.38.10. 00010011
14.38.10.36 14.38.10. 00010100
14.38.10.37 14.38.10. 00010101
14.38.10.38 14.38.10. 00010110
14.38.10.39 14.38.10. 00010111
ManagementHostRange(Upper half)
ipBytesbits
So 14.38.10.40 14.38.10. 00011000
14.38.10.41 14.38.10. 00011001
14.38.10.42 14.38.10. 00011010
14.38.10.43 14.38.10. 00011011
14.38.10.44 14.38.10. 00011100
14.38.10.45 14.38.10. 00011101
14.38.10.46 14.38.10. 00011110
14.38.10.47 14.38.10. 00011111
Production Host (take the first usable ip address)
IP address 14.38.10.34 coz 14.38.10.33 is for the fastethernet interface of the LAN router
Subnet Mask 255.255.255.0
Default Gateway 192.168.3.2
Management Host
IP address 14.38.10.40
Subnet Mask 255.255.255.0
Default Gateway 192.168.3.2
Step 2: Security Planning Time: 30 minutes Points ______
There are several security concerns in the internetwork. Develop Access Control Lists (ACLs) to
address security issues. The following are the concerns:
putting up your EIGRP:
Because some routers of sisco aren’t all the same they don’t all support IGRP that’s why you have to use RIP or EIGRP. EIGRP you could use the same as IGRP!
I shose EIGRP
enable
router1#config t
(config-f)#router1 eigrp 25 (this number is for your autonomisch system if you have more than 1 access-list you have more routers to configure you have to put each time the same number!)
(config-router)# network 14.38.10.0
(config-router)# network 192.168.3.0
This you do also for your GAD router! But only these:
(config-f)#router1 eigrp 25
(config-router)# network 192.168.3.0 this is because you have only to make the left or the right part of the network construction. You have or Anniston or Boaz so you don’t have to be able to ping from a pc of the subnet of boaz to a pc of the subnet of Anniston.
1. The company has an Intranet Web server host that all systems can reach at IP address 172.16.0.1with only HTTP access. No other protocols will be permitted to this site.
2. The company also has a server pool in the 209.0.0.0/24 network. The server pool addresses aredivided in half. The servers in the upper half of the address range are reachable only by managementhosts using all possible IP protocols. The servers in the upper half of the address range are notreachable by production hosts using all IP protocols The servers in the lower half of the address rangeare reachable by all LAN hosts using all possible IP protocols. The servers should not be accessible byany other hosts.
3. The company has discovered an Internet Web server at 198.0.0.1 that is known to contain viruses.All hosts are to be banned from reaching this site.
4. All other traffic should be permitted to any destination.These security requirements should be accomplished with a single access list. Plan the access listrequired to accomplish these tasks, to which interface this will be applied, and the direction the list willbe applied.
Place the ACL plan information below:
1) access-list 101 permit tcp 127.16.0.1 255.255.255.255 any eq 80
access-list 101 deny ip 172.16.0.1 255.255.255.255 any
2)this is the hardest acl-instruction and I can’t make it sorry
3access-list 101 deny ip host 198.0.0.1 255.255.255.255 any
4 access-list 101 permit ip any any
Step 3: Cabling Time: 10 minutes Points ______
I hope you can do this !
Step 4: Basic Configuration Time: 15 minutes Points ______
Apply a basic configuration to the router. This configuration should include all the normal configurationitems. These items include but are not limited to router name, passwords, interface descriptions,routing, host table, and a banner to be displayed before login.
The management workstation and the production workstation should also be configured with the
appropriate information.Routing and connectivity should be verified before notifying the instructor.Before proceeding to the next step have the instructor approve this step.
Router Anniston
Enable
router1# config t
config-t# hostname Anniston
config-t# interface fastethernet 0/0
config-int# ipaddress 14.38.20.33 255.255.255.0
config-int#no shutdown
config-int# exit
config-t# interface serial 0/0
config-int# ipaddress 192.168.3.2
config-int# no shutdown
you don’t have to set the clockrate because the DTE is on the side of GAD and GAD is configured by the teachers!
Step 5: Security Configuration Time: 15 minutes Points ______
After the basic functionality is in place, security needs to be added to the configuration. Using thesecurity requirement and planning from previous steps, implement and test these basic securityfunctions.The listed security requirements should be verified before notifying the instructor.Before proceeding to the next step have the instructor approve this step.
implementing the acl
enable
anniston#config t
config-t# interface serial 0/0
config-int# ip-accessgroup 101 in
if you use IN then you will set the statements within your subnet!, everything that is going out of your subnet that will be checked by your acl! If you use OUT you do the same with alle traffic that enters you subnet!
Step 6: Troubleshooting Time: 10 minutes Points ______
the teacher will ask you to leave for a couple off minutes and will change something to your configuration. You will have to correct the mistake so your network works proper again.
Some handy commands:
Show running-config
Show ip route
show interfaces
show acces-lists
show interface serial 0/0
copy runnin-config startup-config
erase running-config
enable password “sisco”
enable secret “class”
hostname “Anniston”