Lab3 Cciesecv4 Questionset
Lab3 Cciesecv4 Questionset
Lab3 Cciesecv4 Questionset
REAL LABS
www.cciesecuritylabs.com
voicelabs.com1 CCIE
CCIESECURITYLABS.COM
First Release
5-Aug-2013
Initial Guidelines 1. Read all of the questions in a section before you start the configuration. It is even recommended that you read the entire lab exam before you proceed with any configuration. 2. Exam questions have dependencies on others. Read through the entire workbook to help identify these questions and the best order of configuration. Section do not have to be completed in the order presented in the workbook. 3. Most questions include verification output that can be used to check your solutions. Highlighted section in output verification displays MUST be matched to ensure correctness. 4. If you need clarification of the meaning of a questions, or if you suspect that there may be hardware issues in your equipment, contact the onsite lab proctor as soon as possible. 5. The equipment on the rack assigned to you is physically cabled, so do NOT tamper with it. Before starting the exam, confirm that all devices in you rack are in working order. During the exam, if any device is locked or inaccessible for any reason, you must recover it. When you finish the exam, ensure that all devices are accessible to the grading proctor. A device that is not accessible for grading cannot be marked and may cause you to lose substantial points. 6. Knowledge of implementation and troubleshooting techniques is part of the lab exam. 7. Points are awarded only for working configurations. Towards the end of the exam, you should test the functionality of all sections of the exam. 8. You will be presented with preconfigured routers and switches in your topology. The routers and switches are preconfigured with basic IP addressing, hostname, enable password (cisco), switching, VTP, VLANs, Frame Relay DLCI mapping, IP routing and Console port configuration. Do NOT change any of the pre configurations at any time, unless the change is specified in a question. 9. Throughout the exam, assume these values for variables if required: - YY is your two-digit rack number. For example, the YY value for Rack 01 is 01 and for Rack 11 is 11 - SS is your Site ID for the lab exam location, Read the next page for your location. - BB is the backbone number. For example, the BB value for Backbone 2 is 2. Backbone subnets use the following address convention: 150.BB.YY.0/24. Do NOT change backbone addresses unless you are instructed to do so. - X is your router number. For example, the value of X for Router 1 is 1, for Switch 1 & 2 is 7 & 8 respectively CCIESECURITYLABS.COM CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
- Z is any number. 10. You are allowed to add static and default routes (if required) on any device. 11. In any configuration where additional addressing is indicated in the Lab Topology Diagram, Ensure that additional addressing does not conflict with a network that is already used in your topology. Routing Protocols preconfigured are shown in the Lab Routing Diagram. 12. Full access to the VMWare ESXi Server from your workstation is provided. Use the username admin and the password cisco to log in. You can add, modify or delete any settings on the Cisco Secure ACS, Test-PC and Cisco ISEs as required in the question. 13. All device names, access information and username/password combinations are summarized on the following pages. Do NOT change these settings.
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
12.2SE/15.0(x)SE Cisco ASA 5500 Series Adaptive Security Appliances OS Software Versions 8.2x, 8.4x, 8.6x Cisco IPS Software Release 7.x Cisco VPN Client Software for Windows, Release 5.x Cisco Secure ACS System software version 5.3x Cisco WLC 2500 Series software 7.2x Cisco Aironet 1200 series AP Cisco IOS Software Release 12.4J(x) Cisco WSA S-series software version 7.1x Cisco ISE 3300 series software version 1.1x Cisco NAC Posture Agent v4.X Cisco AnyConnect Client v3.0X
CCIESECURITYLABS.COM CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
Topology 4 : layer 2
To be attached soon...
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
www.cciesecuritylabs.com www.cciesecuritylabs.com Topology 5 : LOGICAL www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com www.cciesecuritylabs.com
www.cciesecuritylabs.com
www.cciesecuritylabs.com
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
OUR CCIE SECURITY ENGINEERS ARE AVAILABLE ON GOOGE TALK CHAT for support any questions related to our workbooks at ([email protected])
YOUR GATEWAY TO SUCCESS TOWARDS CCIE LAB ACTIVE CLIENTS WILL GET VERY SPECIAL DISCOUNTS ON OTHER CCIE TRACKS KINDLY VISIT FOR FURTHER INFORMATION
CCIE R&S ----> WWW.CCIERNSLABS.COM CCIE SECURITY ----> WWW.CCIESECURITYLABS.COM CCIE WIRELESS ----> WWW.CCIEWIRELESSLABS.COM CCIE DATACENTER ----> WWW.CCIEDATACENTERLABS.COM CCIE VOICE ----> WWW.CCIEVOICELABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
Use exact names and numbers as shown in the table. 2) Add static routes as follows: Interface inside dmz 3) Configure NTP ASA should use SW1 to source its time. Verify your solutions by successfully pinging the following R3#ping 7.7.8.3 R3#ping 150.1.7.20 R3#ping 7.7.19.1 R3#ping 7.7.4.1 Network Configure a Default Route 7.7.11.0/24 Next Hop 7.7.4.1 7.7.8.3
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
The config-url file should be saved on the disk:0 You can permit ICMP traffic from any to any on both contexts. You can modify the Catalyst switch configuration to complete this task. When the task is completed, ensure that you are able to ping all major subnets within your network, including the ISE1 150.1.7.20 Use exact names and numbers as shown in the table Context c1 initialization details: Interface Gi 0/2 Gi 0/0 Type Not Shared Not Shared Nameif inside outside Switch Vlans 3 33 Sec Level 100 0 IP Address 7.7.3.10/24 7.7.33.10/24
Context c1 routing configuration details: Interface inside outside Network 0.0.0.0/0 7.7.0.0/16 Next Hop 7.7.3.8 7.7.55.3
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
Context c2 initialization details: Interface Gi 0/3 Gi 0/1 Type Shared Shared Nameif Inside Outside Switch Vlans 8 5 Sec Level 100 0 IP Address 7.7.8.10/24 7.7.5.10/24
Context c2 routing configuration details: Interface Inside outside Network 7.7.0.0/16 0.0.0.0 Next Hop 7.7.8.12 7.7.5.3
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
2) Configure a Secured OSPF process 1 Configure OSPF area 1 to establish neighborship Assign network 7.7.99.0 to area 1 Assign network 7.7.14.0 to area 0 Make sure the default route originated from R6 should be installed in the Routing Table Ensure that networks 10.10.110.0/24 and 10.10.120.0/24 (SW6) are added to the routing table on ASA4 but are not propagated into area 0.
3) Configure SLA monitor If traffic destined for network 150.1.7.0/24 via outside interface, does not have reachability to 7.7.6.6 then the traffic should be diverted using backup interface. Configure max-timeout to 2 seconds.
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
2) Configure Static Port Mapping on ASA3 using the following information SW1 is hosting HTTP and TELENT using the 20.20.20.1 (loopback 1). Using Static port mapping translate 20.20.20.1 to 7.7.8.20 for HTTP traffic arriving from dmz interface and translate 20.20.20.1 to 7.7.3.20 for TELNET traffic arriving from outside interface Verify your solution using packet-tracer command
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
The username and password for the Cisco IPS console are cisco and 123cisco123. DO NOT CHANGE THEM. Use the console to initialize the Cisco IPS sensor appliance using the details in this table Ensure that the Management0/0 interface is up and functioning (refer to the Lab Topology diagram). You can modify Cisco Catalyst switches configuration if required. Create the following users in IPS
Account Type Admin Service Username Password wlc Cisco123 monitor test123
Ensure that the Cisco IPS sensor is able to ping the default gateway and Test-PC: IPS# ping 7.7.4.1 IPS# ping 150.1.7.100 Ensure that the following ping and telnet connection is successful from SW1 SW1# ping 7.7.4.100 SW1# telnet 7.7.4.100
CCIESECURITYLABS.COM CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
2.2 Deploy the Cisco IPS Sensor Using an In-line VLAN Pair
Configure the Cisco IPS appliance using these guidelines: I) G0/0 port connected to SW5 should be in promiscuous mode using virtual sensor vs0 II) Configure the interface pairing as shown in the Lab Topology diagram and assign vs2 Parameters Interface Vlan Settings Gig 0/2 & Gig 0/3 Vlan 33 & Vlan 55
You are allowed to modify the switch parameters as appropriate to achieve this task. Refer to the lab diagram for the required information. You may access the IPS management GUI (IME) either from your Test-PC or your local Candidate PC to help with the task. The IME password is Cisc0123. You are allowed to adjust any firewall and/or routing configuration to ensure that this works. Ensure that the sensor is passing traffic successfully. For testing, ensure that this ping from R6 is passing through the sensor with the packets being displayed on the sensor console. IPS# packet display gigabitethernet0/0 R6#ping 7.7.4.1 However ensure that this ping from R6 is not passing through the sensor IPS# packet display gigabitethernet0/0 R6#ping 7.7.8.3
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
Verify by configuration as follows R6# test aaa group tacas cisco cisco legacy.
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
You may have to reboot WSA after configuration of WCCP if the ASA reports following event in the logs: WCCP-EVNT: D90: Here_I_An packet from 7.7.4.150 ignored: bad web-cache id. Use the following to verify your solution from the Test-PC, and then check HTTP requests on R3 for the address of the WSA:
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
3.2
Troubleshoot GET VPN solution for traffic traversing between 10.10.x.0/24 (loopback of R1,R4 and R5) networks. R2 is must be used as the keyserver and R1, R4 and R5 are group members Verifying using the following commands R2# sh crypto gdoi group GETVPN R2# sh crypto gdoi ks policy R2# sh crypto gdoi ks members R2# sh crypto isakmp sa R2# sh crypto ipsec sa
CCIESECURITYLABS.COM
First Release
5-Aug-2013
R4# sh crypto gdoi gm acl R4# sh crypto gdoi gm rekey R4# sh crypto gdoi group GETVPN
11
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
The Test-PC must be allowed to connect through the authenticated Cisco IP Phone 1. SW 6 G1/0/1 should have been configured to support a voice & data Vlan 2. Configure and Authorization Profile and Authorization Policy rule for the Test-PC on ISE1 using the following info
CCIESECURITYLABS.COM CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
Attribute Group Name Username/Password Access Type Common Tasks DACL Name DACL Policy Vlan
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
2. Configure an Authorization Profile and Authorization Policy rule as follows Parameters Name Description Access Type Common Tasks Web Authentication ACL DACL Name DACL Policy Settings Guest Permit Guest User Access_Accept Centralized
Web-Auth
3. Configure SW6 G1/0/1 for web authentication support which will enable the Test-PC to authenticate via centralized web authentication server and receive an authorization Policy
Verify your solution by disabling the dot1z authentication on test-PC and authenticate via the centralized web authentication server and match the below output. SW6# show authentication session interface gig1/0/1
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
YOUR GATEWAY TO SUCCESS TOWARDS CCIE LAB ACTIVE CLIENTS WILL GET VERY SPECIAL DISCOUNTS ON OTHER CCIE TRACKS KINDLY VISIT FOR FURTHER INFORMATION CCIE R&S ----> WWW.CCIERNSLABS.COM CCIE SECURITY ----> WWW.CCIESECURITYLABS.COM CCIE WIRELESS ----> WWW.CCIEWIRELESSLABS.COM CCIE DATACENTER ----> WWW.CCIEDATACENTERLABS.COM CCIE VOICE ----> WWW.CCIEVOICELABS.COM
LAUNCHED!!!
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM
First Release
5-Aug-2013
CCIESECURITYLABS.COM
CCIESECURITYLABS.COM