Test Project: IT Network Systems Administration
Test Project: IT Network Systems Administration
Network technologies knowledge has become essential nowadays for people who want to build a successful career in
any IT engineering field. This test project contains a lot of challenges from real life experience, primarily IT integration
and IT outsourcing. If you are able to complete this project with the high score, you are definitely ready to implement
network infrastructure for any multi-branch enterprise.
Eligibility Criteria- Competitors born on or after 01 Jan 1997 are only eligible to attend the Competition
This test project is designed using a variety of network technologies that should be familiar from the Linux Microsoft
and Cisco certification tracks. Tasks are broken down into following configuration sections:
WS-TASK-A Network
WS-TASK-B Network
WS-TASK-C Network
Preface
Section A-Test Project
Section B-Network Infrastructure Design (Tool and equipment including raw material)
Section C-Marking Scheme
Section D- Instruction for Competitors
Section E- Health, Safety and Environment
SECTION A
WS-TASK A – NETWORK
COMPETITOR INSTRUCTION
Resources that will be necessary for the future migration, preparing for secure connectivity between the new domain
and the old domain - which will involve setting up a VPN server.
INTRODUCTION
The competition has a fixed start and finish time. You must decide how to best divide your time.
Please do not touch the VMware configuration as well as the configuration of the VM itself except the CD-ROM /
HDD drives
FOLDER PATHS
LOGIN
Username: root / LDAP-Users
Password: essci18
Domain: ESSCI.com
System Tools
• Install CURL
• Install SSH daemon and allow root access
Login Banner
Must be shown before the login prompt. Must appear for local and network logins.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
World Skills 2018 – Delhi (India)
WS-TASK A
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
General Tasks
Settings
Configure the system as mentioned as instruction.
Differences between the pre-installed system and the requested system configuration may exist.
DMZ ZONE
SSC-MAIL
Load balancer (HAPROXY)
Configure a HTTP/HTTPS load balancer for “www.india-east.cloud”, which is hosted by wsc-c-saopaulo and
wsc-c-leipzig. Connect to back ends by using HTTPS and make sure that certificates are fully trusted (no browser or
other certificate errors).
DNS
• Install Bind9.
o Configure a forward zone called “www.india-east.cloud”.
▪ Create for each host an A record to the respective IP
▪ Create a CNAME record for ‘www’ that points to the appropriate host that serves websites
for all clients
▪ Create a CNAME record for ‘mail’ that points to the mail server
▪ Create the appropriate MX records
▪ Create a CNAME record for ‘ftp’ that points to the ftp server
▪ Create a CNAME record for ‘files’ to access the DFS shares
o Configure a forward zone called “competition.in”
▪ Create the appropriate records for email to work
o Configure a reverse zone for the IP range defined in DMZ network.
MAIL
• Install Postfix and Dovecot.
o Configure SMTPS and IMAPS server for "india-east.cloud" and “competition.in” domain using
certificates issued by SSC-CA.
o Configure mail directory in /home/[user]/Maildir.
o Authentication has to be done through LDAP
▪ Make sure that the corresponding local user do not exist
▪ Allow only users from the OU “mail”.
o Enable SMTP submission (TLS tcp/587).
▪ Disable port tcp/25
o Enable secure IMAP (TLS tcp/143)
• Install Apache
o Configure a HTTPS-only website for "www.india-east.cloud" domain and “localhost” using
certificates issued by SSC-CA.
o The website page should display the following message:
▪ “Welcome to the India east cloud on [HOSTNAME]”.
▪ Add the hostname dynamically with PHP
o Add the HTTP header “X-Served-By” with the server hostname as the value.
o Install rsync on SSC-web1 and synchronize /var/www directory (recursive) from SSC-web1 to SSC-
web2, automatically every minute.
▪ To run the script don’t use crontab, solve it within the script only
▪ Script must be running while assessing the test project
▪ Make the script available in ‘/root/web_sync.sh’
o Make sure that PHP scripts can be run
▪ index.php should be first priority for index files
o Install the appropriate Redis module for PHP
o Create a password protected (basic authentication) subfolder “redis”
▪ Use user skills18 with password Skills18 to authenticate
o Add a PHP script with the name “index.php” inside the redis folder
▪ Add the following content the “index.php”
• <?php
• $redis = new Redis();
• $redis->connect(<server>);
• $content = $redis->get(<key>);
• echo $content;
• ?>
System
• Configure the disks and partitions
o Add three disks to the system (chose the appropriate type and size by yourself)
o Create a RAID 5 array and partition them with EXT4
o Mount the new array to /files (file access must be possible automatically after system start)
File Shares
• Install and use Samba for the following tasks
o Authentication is done by “SSC-CA”, local users are not permitted
o Home directory of the respective user (authenticated user against Samba)
▪ Not visible (nobody)
▪ Accessible only for the authenticated user through “\\[server]\[user]”
▪ The home share is only accessible from the client’s subnet
▪ Local data path: /files/users/[user]
FTP
• Setup FTP with PureFTP
o Use a virtual user configuration (not system users)
▪ User: skills18-ftp / Password: Skills18
▪ Home directory: “/files/users/skills18-ftp”
o The virtual user has to be mapped to the system user/group “ftpuser/ftpgroup”
o Per user only one active concurrent session is allowed
o Only allow explicit SSL / TLS (ftpes://)
o File renaming is not allowed
CACTI Monitoring
• Install Cacti monitoring service
• Change the administrator’s password to “Skills18”
• Add a graph of SCC-Mail network traffic
PING MONITORING
• Install Icinga monitoring service, use password “Skills18” as the password for “skilladmin”.
• Setup a basic ICMP ping monitor SSC-SMB.
• When monitoring fails, after 60 seconds send a notification to [email protected].
SYSTEM
• Create a script (shell or php) with the name ‘index_update.*’ in the folder ‘/root’
• The script should update the redis entry (created above) with the current date and the mentioned time. The
same command as above can be used for shell scripts or
$content = $redis->get('skills18:index'); if you prefer php
• Schedule the execution of the script
o Every two minutes where the execution must happen on odd-minutes
• Create a script ‘ftp_listing.sh’ in the folder ‘/root’ that lists the content of the ftp user
Client Zone
SSC-Clients
Install and configure the following services. Make sure that all LDAP users in OU “Misc” can login locally; users from
other OU must not be allowed to login locally.
E-mail
• Use Icedove as the e-mail client and configure using the user “skills18”.
o Configure to use [email protected]
o Send an email to [email protected]
o Use IMAP to connect to the mailbox
Web
• Use Firefox as the web browser.
o Make sure that www.insia-east.cloud is accessible.
o No certificate warning
o Shows appropriate content
FTP
• Use FileZilla as FTP-client
o Make sure that a connection to SSC-Clients (ftp.india-east.cloud) can be established.
Samba
• Make sure that users can access the file shares from SSC-Clients
o Mount DFS share to /mnt/dfs
o You must be able to access both shares (public, private) through DFS
Login
• Add offline capabilities
• After LDAP is offline, it should still be possible for users to access the host within one minute
Add the india-east.cloud CA certificate as trusted, so that no certificate warnings are shown for all the above
SSC-IPSEC
E-mail
• Use Icedove as the e-mail client and configure using the user “skills18”.
o Configure to use [email protected]
o Send an email to [email protected]
o Use IMAP to connect to the mailbox
VPN
• Install a VPN client for (L2TP/IPSEC)
o Connect to WSC-P-STGALLEN using any of the VPN-Users.
o Create a script on “/root/vpn.sh start | stop” to start and stop the VPN connection.
Add the wsc17.cloud CA certificate as trusted, so that no certificate warnings are shown for all the above.
Contents
This Test Project consists of the following document/file:
1. Build a new domain (RUSSIA.net) which will eventually host all the users and computers for the next competition
2. Maintain connectivity and access to resources between the new domain and the old domain (UAE.net) while the
transition is being made
3. Copy some of the users and data from the old domain to the new one
4. Setup a new site-to-site connection
Quick Specifications
Internet
INET
AE-REMOTE
AE-EDGE RU-EDGE
AE-DC RU-DC
UAE.net RUSSIA.net
Part 1 – RUSSIA.net
In Part 1 you will be responsible for preparing the new domain prior to performing the migration. This will involve
building the RUSSIA.net domain, including all of the resources that will be necessary for the future migration,
preparing for secure connectivity between the new domain and the old domain - which will involve setting up a VPN
server and a multi-tier PKI infrastructure.
NOTE: Refer to the diagram on the last page for quick specification reference, as well as the configuration table.
Please use the default configuration if you are not given the details
All local and domain users on ALL machines should have a password of "P@ssw0rd" unless otherwise
specified. Pre-supplied machines that the competitor needs to logon to will also be pre-configured with
this password.
All supplied software and files needed to complete this project can be found in C:\software on the
competitor computer.
Install/Configure
Active Directory
• Configure this server as the initial domain controller for RUSSIA.net
• Configure an ONE-WAY (Forest) trust between the domains RUSSIA.net and UAE.net
• Users from RUSSIA.net must have access to resources from UAE.net but not vice versa
DHCP
• Configure DHCP for the clients
• Mode: Load balancer
• Partner Server: RU-FILES
• State Switchover: 10 minutes
• Range 172.16.0.150-180
• Set the appropriate scope options for both DNS servers and default gateway
DNS
• Configure DNS for RUSSIA.net
• Create a reverse Zone for the 172.16.0.0/24 network
• Add static records for ALL RU-xx servers
GPO
• Disable "first sign in Animation" on all Windows 10 Clients
• Members of the RU-Users_Experts group must be members of the local admin group on all Windows 10
computers in the domain
• www.russia.net must be the default homepage in IE Explorer and Edge browser
• Install the Windows_10_Creators_Update_ADMX.msi to make Edge group policies available!
• Disable Recycle Bin on the Desktop for all domain users except users in "RU-Users_Experts" Group and domain
administrators
• Disable changing the screen saver for all domain users except users in "RU-Users_Experts" Group and domain
administrators
• Disable changing the background picture for all domain users except users in "RU-Users_Experts" Group and
domain administrators
• Redirect (Folder redirection) only for all users in the Expert group "my Documents" and the "Desktop" to RU-Files
-> d:\shares\redirected
• share path: \\ru-files.russia.net\redirected\%username%
• Create a fine grained password policy required 7 character non-complex passwords for regular users, 8
characters complex password for members of the RU-Users_Experts group
• Disable “enforce minimum password age”
Users/Groups
• Create OUs named "Expert", "Competitor", "Manager" and "Visitor"
• Create the following AD groups:
• RU-Users_Experts
• RU-Users_Competitors
• RU-Users_Managers
• RU-Users_Visitors
• RU-Project_Budget-R
• RU-Project_Budget-W
• RU-Project_Intranet-R
• RU-Project_Intranet-W
• RU-Project_Logistics-R
• RU-Project_Logistics-W
• RU-DAClients
NOTE: This is a required list of groups and OUs that have to be created in the domain. If you believe that you should
create additional groups to perform the tasks you can create them.
• Create the users from the excel sheet RU-Users.xlsx (c:\software) on the competitor machine
• Fill up all fields in the Active Directory user object and add the users to the corresponding RU-Users_xx groups, RU-
Project_xx groups and OUs
• Create for every user a home drive in on RU-Files d:\shares\users.
• Connect the home drive automatically to drive U: -> \\ru-files.russia.net\users$\%username%
NOTE: if you are unable to do import all the users from the Excel file create at least the following users manually
Install/Configure
• Install a Windows Server 2016 (no GUI) from ISO
• When creating the VM, build with 4 drives
• 1 System drive (c:\)
• Size 25 GB
• 1 Raid 5 array with the remaining three drives (d:\)
• Size 10 GB in total
• Rename to RU-FILES
• Configure the network settings as per configuration table/network diagram
• Modify the default Firewall rules to allow ICMP (ping) traffic
• Join to RUSSIA.net domain
Shares
• Create shares for departments (Competitors, Experts and Managers)
• on RU-FILES -> d:\shares\departments
• \\RU-Files\Experts --> d:\shares\departments\Experts
• \\RU-Files\Competitors --> d:\shares\departments\Competitors
• \\RU-Files\Managers --> d:\shares\departments\Managers
• Create a share for projects in RU-FILES -> d:\shares\projects
• Create the following folders in d:\shares\projects
• Budget
• Intranet
• Logistics
• Set the permissions for these folders according to the table in the appendix
• Map the project share (\\ru-files.russia.net\projects) to P:\ for all users except the Visitor group
• Users should see only the folders in P:\ where they have permissions to access them (Access-based Enumeration)
Active Directory
• Promote this server as a DC for RUSSIA.net (but not a GC)
DFS
• Create a Namespace with the name “dfs”
• Add RU-DC as the second server for this Namespace
• Create DFS links for the department shares (Experts, Competitors, Managers)
• Create a DFS Replication to implement a backup of the department shares on RU-DC. The shares should be
replicated/backed up like this:
• RU-Files: D:\shares\departments\Experts RU-DC: C:\backup\Experts
• RU-Files: D:\shares\departments\Competitors RU-DC: C:\backup\Competitors
• RU-Files: D:\shares\departments\Managers RU-DC: C:\backup\Managers
• Map the department shares depending on the corresponding group (RU-Users_Experts, RU-Users_Competitors,
RU-Users_Managers) to drive G: using the DFS Namespace
DHCP
• Install and configure DHCP
• Mode: Load balancer
• Partner Server: RU-DC
• State Switchover time: 10 minutes
DNS
Quota/Screening
• Make sure that unauthorized users get the following error message, when they want to access one of the
three department shares (Experts, Competitors and Managers) they are not allowed to!
o Expert share:
▪ Error message: “Access only for EXPERTS allowed”
o Competitor share:
▪ Error message: “Access only for COMPETITORS allowed”
o Manager share:
▪ Error message: “Access only for MANAGERS allowed”
IIS
• Create a website for the managers (use the provided html file as the default page from C:\software on the
competitor computer)
• This website should be accessible via managers.russia.net
• Only users in the in RU-Users_Managers group should have access to the website using "user certificate
based authentication"
Install/Configure
Install AD CS services
• standalone Root CA – Use default key length, hash, etc. if not specified
• Name: RUSSIA Root CA
• Lifetime: 10 years
• CRL location: http://RU-SUBCA.russia.net/certenroll/<caname><crlnamesuffix><deltacrlallowed>.crl
• AIA location: http://RU-SUBCA.russia.net/certenroll/<serverdnsname>_<caname><certificatename>.crt
• Create certificate revocation list, and necessary root certificates for RU-SUBCA, and export them to RU-
SUBCA, via share or any other method
• Approve subordinate Certificate request from RU-SUBCA
• Take the server offline when not in use (disable the network interface only)
Install/Configure
Note: Set the power settings to "never sleep" for all Windows 10 clients
Install/Configure
NOTE: for testing the Direct Access connection you have to switch this client to the INTERNET Network
Part 2 – UAE.net
In Part 2 you will responsible for making the existing infrastructure available for remote clients, connectivity to the
new domain and maintaining the website information for both
NOTE: Refer to the diagram on the last page for quick specification reference, as well as the configuration table.
Please use the default configuration if you are not given the details
Local, domain and existing passwords will be "P@ssw0rd"
Install/Configure
• All user with "Expert" in the "Job Title:" should have duplicate accounts created for them in the RUSSIA.net
domain (we are not using GPMT – so it is not a migration just a re-creation of the user accounts)
o Copied Users should be placed to OU "Migration" in RUSSIA.net
o Set the password to "WorldSkills2018mig"
o Copy the necessary home folders from AE-DC to RU-FILES d:\shares\migrated
o Set the necessary permissions on these copied folders/shares (only the user itself and domain
administrators should have access to these homefolders)
o Map the home folder to drive S:\ automatically (\\RU-Files\migrated$\%username%)
o Disable the copied users in UAE.net and move them to a new OU called MIGRATED on AE-DC
AD
• Create the following three users in OU “Users”. They are necessary for the following work tasks.
o RDS_user1
o RDS_user2
Shares
• DNS records should point to the correct IP addresses for both www.UAE.net and www.RUSSIA.net
• DNS records should point to the correct IP address to the RemoteApp website.
IIS
Install/Configure
Note: Set the power settings to "never sleep" for all Windows 10 clients
Install/Configure
Install/Configure
• Modify the default Firewall rules to allow ICMP (ping) traffic
• DO NOT join this client to any domain
VPN
• Configure the VPN client settings for all users on this computer
o Connect the VPN using the public IP of AE-EDGE
o Use IKEv2 protocol with machine certificate authentication
Use this client for testing the "external" access to the websites
NOTE: Refer to the diagram on the last page for quick specification reference, as well as the configuration table.
Please use the default configuration if you are not given the details
Install/Configure
DNS/IIS
• Create the appropriate resource records (DNS) for external access to the Direct Access server in the
RUSSIA.net domain and also for www.UAE.net and www.RUSSIA.net websites access.
Install/Configure
VPN
Site-to-Site VPN
Install/Configure
Site-to-Site VPN
Machines indicated as being preinstalled with "Yes – configured" will have the operating system installed and
Hostname and network settings configured.
Shares/Permission Table
Sharename Location Read access group Read/Write access group
Budget RU-Files -> D:\shares\projects RU-Budget-R RU-Budget-W
Intranet RU-Files -> D:\shares\projects RU-Intranet-R RU-Intranet-W
Logistics RU-Files -> D:\shares\projects RU-Logistics-R RU-Logistics-W
• Basic configuration
• Switching
• WAN
• Routing
• Services
• Security
• Monitoring and backup
• WAN and VPN
All sections are independent but all together they build very complex network infrastructure. Some tasks are pretty
simple and straightforward; others may be tricky. You may see that some technologies are expected to work on top
of other technologies. For example, IPv6 routing is expected to run on top of configured VPNs, which are, in turn,
expected to run on top of IPv4 routing, which is, in turn, expected to run on top of PPPoE, and so on. It is important
to understand that if you are unable to come up with a solution in the middle of such technology stack it doesn’t mean
that the rest of your work will not be graded at all. For example, you may not configure IPv4 routing that is required
for VPN because of IP reachability but you can use static routes and then continue to work with VPN configuration
and everything that runs on top. You won’t receive points for IPv4 routing in this case but you will receive points for
everything that you made operational on top as long as functional testing is successful.
As mentioned above, do not waste your time if you’re stuck with some tasks. You can use temporary solution (if you
have technology stack dependency) and continue to work with other tasks, this may allow you to go back afterwards
and fix things that are not working properly if you still have time. In addition, we recommend that you to check all
your previous work when you complete following modules.
The RADIUS server is already preconfigured with rsyslog, freeradius, tftpd and snmpd to save your time, you are only
required to complete the necessary configuration from your side.
Marking Scheme
Marking scheme is designed in the way that every configuration aspect is graded only once. For example, in the
“Basic configuration” section you are required to configure hostnames for all devices but it will be checked on only
one device and graded only once. The same configuration aspect may be checked and graded more than once if it’s
done with different configuration options for different devices or for different device classes. For example, in the
“Basic configuration” section you are required to configure local AAA model for all devices but it differs for BR3
router and FW1, FW2 firewalls.
Any details about how and from which exact devices experts will perform checking and grading of your work are
contained in “How to Mark” document. These details are subject to 30% changes as well as the aspects in marking
scheme.
NOTE: Refer to the diagram on the last page for quick specification reference.
Please use the default configuration if you are not given the details.
All user account on ALL machines should have a password of Skill39 unless otherwise specified. Pre-supplied
virtual machines that the competitor needs to logon to will also be pre-configured with this password.
Use the default account and password for Cisco VIRL.
All supplied software and files needed to complete this project can be found in the software.iso file in the
datastore.
You are reminded to extract configuration in VM Maestro before you leave the competition site.
Switching configuration
1. Configure VTP version 2 on SW1, SW2 and SW3. Use SW3 as VTP server, SW1 and SW2 as clients. Use WSI as
VTP domain name and 2018 as a password. VLAN database on all switches should contain following VLANs:
a. VLAN 101 with name LAN1.
b. VLAN 102 with name LAN2.
c. VLAN 103 with name EDGE.
2. On SW1, SW2 and SW3 switches configure dynamic trunking protocol:
a. For Gi1/1-2 ports on SW3 switch configure mode that will listen for trunk negotiation but won’t
initiate it itself.
b. For Gi1/1 ports on SW1 switch and for Gi1/2 ports on SW2 switch configure mode that will initiate
trunk negotiation.
c. Configure ports Gi0/1-3 on SW1 and SW2 for traffic transmission using IEEE 802.1q protocol.
3. Configure link aggregation between switches SW1 and SW2. Use following port-channel number 1.
a. SW1 switch should use PAgP desirable mode.
b. SW2 switch should use PAgP auto mode.
4. Configure spanning tree protocol:
a. For ALL switches use STP protocol version which is compatible with 802.1w standard.
b. SW1 switch should be STP root in VLAN 101. In case of SW1 failure, SW2 should become a root.
c. SW3 switch should be STP root in VLAN 102. In case of SW3 failure, SW1 should become a root.
d. SW2 switch should be STP root in VLAN 103. In case of SW2 failure, SW3 should become a root.
e. For traffic transmission in VLANs 101, 102 and 103 on SW1 and SW2 use ports that are not
participating in channel-groups.
5. Turn on security mechanism that prevents STP root change on SW1 port which is connected to RADIUS VM.
In case a superior BPDU arrives on this port, the port should transfer to root-inconsistent state.
6. Configure port on SW2 switch which is connected to PC1 VM so that it goes to Forwarding state without
waiting for STP recalculation.
7. LAN1 subnet traffic between HQ1 router and SW3 switch should be forwarded without IEEE 802.1q tag.
Routing configuration
1. Configure EIGRP with AS number 2018 on ISP, HQ1, HQ2, BR2 and BR3 routers according to the routing
diagram. Enable routing updates authentication. Use MD5 algorithm with WSI key.
2. Configure BGP on ISP, HQ1, HQ2, BR2 and BR3 according to the routing diagram.
a. Routers HQ1 and HQ2 should exchange routing updates using iBGP
b. Configure route filtering so that route 209.136.0.0/16 won’t be present in routing table on HQ1
router.
3. Configure OSPFv2 on HQ1, HQ2, BR2, BR3 routers and FW1, FW2 firewalls according to the routing diagram.
4. Configure OSPFv3 on HQ1, HQ2, BR2 and BR3 routers according to the routing diagram. Router HQ1 should
be configured as DR, HQ2 — as BDR.
5. On BR2 router configure OSPF route redistribution for Loopback30 subnet into EIGRP AS 2018.
6. Configure routing policy on HQ1 router so that ICMP and UDP traffic from Loopback101 subnet to Loopback30
subnet goes through ISP router.
Services configuration
1. Configure dynamic port translation on HQ1 and HQ2 routers for LAN1 subnet so that all internal IPv4
addresses are translated into IPv4 address of the interface which is connected to the INET11 and INET22
subnets respectively.
2. Configure first-hop redundancy protocols on HQ1 and HQ2 routers:
a. Configure GLBP group for LAN1 subnet:
i. Group number 101
ii. Use 192.168.10.252 as the virtual IP address
iii. Configure priority 151 for HQ1 router and 101 for HQ2 router.
b. Configure HSRP group for LAN2 subnet:
i. Group number 201
ii. Use 192.168.20.252 as the virtual IP address
iii. Configure priority 121 for HQ1 router and 111 for HQ2 router.
iv. Configure MD5 authentication. Key string is “cisco1”
3. Configure DHCP using following parameters:
a. On HQ1 router for LAN subnet:
i. Network address — 192.168.10.0/24;
ii. Default gateway — virtual IP address of GLBP group;
iii. DNS server — 192.168.10.10;
iv. Exclude first 50 usable addresses from DHCP pool.
v. DHCP server should assigned 192.168.10.10 to the “RADIUS” server.
vi. Make sure “RADIUS” server and “PC01” are configured as DHCP clients.
Security configuration
1. Configure role-based access control on BR3 router:
a. Create user1, user2, user3, user4 and user5 with cisco1 password.
i. user1 should be authorized to issue all privileged mode commands except “show version”
and “show ip route” but should be able to issue “show ip *” commands.
ii. user2 should be authorized to issue all user (unprivileged) mode commands including “show
version” but not “show ip route”.
b. Create view-context “show_view”:
i. Include “show version” command
ii. Include all unprivileged commands of “show ip *”
iii. Include “who” command
iv. user3 should land in this context after successful authentication on local or remote console.
c. Create view-context “ping_view”:
i. Include “ping” command
ii. Include “traceroute” command
iii. user4 should land in this context after successful authentication on local or remote console.
d. Create superview-context that combines these 2 contexts. user5 should land in this superview-
context after successful authentication on local or remote console.
e. Make sure that users cannot issue any other commands within contexts that are assigned to them
(except show banner and show parser, which are implicitly included in any view).
2. On port of SW2 switch which is connected to PC1 VM enable and configure port-security using following
parameters:
a. Maximum MAC addresses — 2
b. MAC addresses should be automatically saved in running configuration.
c. In case of policy violation, security message should be displayed on the console; port should not go to
err-disabled state.
3. Turn on DHCP snooping on SW1 switch for LAN1 subnet. Use internal flash to keep DHCP-snooping database.
4. Turn on dynamic ARP inspection on SW1 for LAN1 subnet. Create access control list that permits static IP
address 192.168.10.10 for RADIUS server.
RUSSIA.net
172.16.0.0/24
RU-FILES Specifications: RU-DC Specifications:
Windows Server 2016 (no GUI) Windows Server 2016
Domain Controller Domain Controller
DHCP Failover Active Directory
DNS DHCP Failover
FileServices DNS
IIS vSwitch: RUSSIA.net RU-EDGE Specifications:
172.16.0.2/24 172.16.0.1/24 Windows Server 2016 (no GUI)
RRAS
172.16.0.250/24 Direct Access
Site-to-Site VPN
DHCP
INET
200.100.50.200/24
Specifications:
Windows Server 2016
IIS
DNS
vSwitch: Internet DHCP
Simulate Internet Connection
AE-IIS Specifications:
AE-DC Specifications:
Windows Server 2016 (no GUI)
IIS
Windows Server 2016
Domain Controller
Internet
Active Directory
DHCP 200.100.50.0/24
DNS
200.100.50.101/24
172.19.0.3/24 172.19.0.1/24
Specifications:
172.19.0.250/24 Windows Server 2016
RRAS
172.19.0.4/24 Site-to-Site VPN
Client VPN
DHCP
AE-EDGE
Specifications:
vSwitch: UAE.net
Specifications:
Windows 10
Windows Server 2016
Mgmt Workstation
RDS Services
Testing RDS
AE-CLIENT AE-RDS
UAE.net
172.19.0.0/24
RU-EDGE RU-FILES RU-DC RU-SUBCA RU-ROOTCA RU-CLIENT AE-CLIENT AE-RDS AE-IIS AE-DC AE-EDGE AE-EDGE RU-EDGE AE-REMOTE INET
Hyper-V
Host Computer
RU-HOST
Windows Server 2016
Hyper-V Role installed 10.10.10.2/24
RU-MGMT
Windows 10
Hyper-V management configured
Highspec/Host-PC
• Intel i7 processor
• 64GB RAM
• 500GB SSD-Drive
• 1x24 inch LED-Monitor
• US Keyboard
• Mouse
WS-TASK-C: NETWORK DIAGRAM
NETWORK INDIA
L1 DIAGRAM
Network India
L3 Diagram
Section C: Network Infrastructure Design & configuration (Tool and equipment
including raw material)
WS-TASK A: Configuration Table
OPERATION
HOSTNAME DOMAIN IP ADDRESS(ES) PREINSTALLED
SYSTEM
DMZ Zone (10.1.1.0/24)
Internet (172.16.1.0/24)
10.1.1.1/24 (VLAN10) Yes – configured
10.2.1.1/24 (VLAN20)
10.2.2.1/24 (VLAN30)
SSC-Firewall Firewall
10.2.3.1/24 (VLAN40)
10.2.4.100-120 (VPN)
172.16.1.254/24 (Internet)
India-east.cloud 172.16.1.10/24(Internet) Yes – configured
SSC-IPSEC Linux Server
10.2.4.1xx/24 (VPN)
LDAP Users
If you are unable to setup SSC-Firewall properly, use the direct IP address of SSC-mail and adjust firewall accordingly.
You will lose those points.
SSC-Mail
Basic Configuration (Hostname, IP, Banner, Keyboard,
1.1
Locale, Curl and SSH) 0.5
1.2 HAproxy load balancing 0.5
1.3 Forwardzone: india-east.cloud 0.5
1.4 A records for india-east.cloud 0.5
1.5 A record, DNS Reverse 0.5
1.6 Mail directory
0.5
1.7 LDAP User not local
0.5
1.8 Certificates SMTPS e IMAPS
0.5
FTP enabled only Debian Linux
1.9 For all Server and 0.5
Firewall clients network SNAT not working from another Client
1.10
networks 0.5
SSC-Web1
1.16
Subfolder authentication 0.5
SSC-Web2
Basic Configuration (Hostname, IP, Banner,Keyboard,
1.17
Locale, Curl and SSH) 0.5
Basic Configuration (Hostname, IP, Banner,Keyboard,
1.18
Locale, Curl and SSH) 0.5
1.19 Root login and LDAP Users 0.5
1.20 SSH Login permissions 0.5
1.21 RAID 5 1
1.22 Samba – Login 0.5
1.23 Samba - Home directory restriction 0.5
Debian Linux
1.24 DFS configured for \\WSC-I-LONDON\dfs For all Server and 0.5
Client
1.25 FTP - Virtual user, session 0.5
SSC-MON
SSC-TASK B: Network
RU-DC
0.40
1.1 Trust Relationship to AE domain
1.00
1.2 Trust relationship functional test
0.50
1.3 DHCP configuration
0.40
1.4 DHCP partnership
1.00
1.5 DNS on both machines all records front and back
0.50
1.6 Creation of OU's
0.50
1.7 Creation of Groups
1.00
1.8 Creation of Users from spreadsheet
RU-Daclients members, from ru-edge, correct users in all 0.50
1.9 groups
1.00
1.10 Migrated users
0.50
1.11 Migrated user files copied with perms
0.40
1.12 All migrated users there?
Windows Server
0.90
1.13 DFS namespace & replication 2016
RU-Files
0.50
1.14 setup as per diagram
0.50
1.15 Check disks, RAID array
0.40
1.16 DC but not GC
1.00
1.17 Check shares – departments
Windows Server
0.50
1.18 setup as per diagram 2016
RU-ROOTCA
CA setup 1.00
1.19
Windows Server
CA offline 0.50
1.20 2016
RU-SUBCA
CA Setup - enterprise sub ca 0.40
1.21
CA issued by ROOTCA 0.80
1.22
Template and auto enrollment 1.00
1.23
CRL 0.50
1.24
Windows Server
CA Setup - enterprise sub ca 0.50
1.25 2016
RU-CLIENT
ping all 'round for firewall rules 0.50
1.26
joined domain 0.40
1.27
RSAT tools installed and available 0.30
1.28
disable first sign on GPO 0.40
1.29
managers website v1 0.40
1.30
local admin GPO, import user password 0.60
1.31
GPO expert 0.50
1.32
fine-grained passwordv1 0.50
1.33
fine-grained passwordv2 0.50
1.34
GPOs non expert 0.50
1.35
default home page – edge 0.50
1.36
Home folders csv imported users 1.00
1.37
project share map 0.50
1.38
project share perms 0.40
1.39
Customized error messages 0.60
1.40 Windows 10
managers website v2 0.40
1.41
DFS check 0.40
1.42
visitor user 0.30
1.43
RU-FILES as NCA (connection assistant) server 0.40
1.44
connect.russia.net as DA name 0.40
1.45
DA testing 1.00
1.46
Customized error messages 0.60
1.47
AE-DC
0.40
1.48 find expert users - moved and in migration folder
0.50
1.49 expert users all disabled
0.40
1.50 RDS users
Windows Server
0.40
1.51 DNS - check records for both websites 2016
AE-IIS
path of websites 0.40
1.52
Path and contents of russia website? 0.40
1.53
certs from RU-SUBCA 0.40
1.54
Windows Server
path of websites 0.40
1.55 2016
AE-RDS
setup as per diagram 0.40
1.56
Windows Server
RDS installed 0.40
1.57 2016
INET
DNS Server "create A-records" Windows Server 0.40
1.58 2016
AE-Edge
RRAS installed - configured? 0.50
1.59
NAT-port mapping 0.40
1.60
Site to Site VPN 1.00
1.61
Site to Site VPN 0.50
1.62
Windows Server
s2s functional 0.40
1.63 2016
RU-EDGE
DA Installed 0.40
1.64
Windows Server
connect.russia.net as DA name 0.50
1.65 2016
VPN tunnel? 1.00
1.66
VPN authentication 0.50
1.67
AE-REMOTE
connect to VPN for UAE 0.60
1.68
connect to AE websites 0.40
1.69
Joined to domain? 0.40
1.70
Windows Server
connect to AE websites 0.50
1.71 2016
40
Total marks
SSC-TASK C: Network
Aspect Mark
Marking Criteria or Description Requirement Max Mark
ID Awarded
Basic config
1.1 Hostname Cisco Routers 0.35
1.2 Domain name 0.35
Switching
1.13 VTP Test from SW3 VTP server to SW1 Client Cisco layer 3 and 0.45
layer 2 Switches
1.14 DTP interface status 0.50
Routing
1.22 EIGRP Cisco Routers 0.60
Security
1.40 Command privilege levels: user1 Cisco Router or 0.50
layer 3 switches
1.41 Command privilege levels: user2 0.50
Total 30
2. All participants, technicians and supporting staff will wear the required protective Personnel clothing.
3. All participants will assume liability for all risks of injury and damage to property, loss of property, which might be
associated with or result from participation in the event. The organizers will not be liable for any damage; however
in case of Injury the competitor will immediately inform the immediate organizer for medical attention