SIC Manual
SIC Manual
CERTIFICATE
This is to certify that
SIDDIQUI MOHAMMED SHARIQUE MOHAMMMED
SHAFIQUE
(Exam Seat No. 36) of T. Y. B. Sc. Information Technology class has satisfactory
completed his project/Assignment/Practical on SECURITY IN COMPUTING
for the partial fulfilment of the Degree Bachelor of Science in Information
Technology as prescribed by University of Mumbai.
For academic Year 2022 -2023.
Addressing Table
5
R1(config)# router ospf 1
R1(config-router)# area 0 authentication message-digest
R2(config)# router ospf 1
R2(config-router)# area 0 authentication message-digest
R3(config)# router ospf 1
R3(config-router)# area 0 authentication message-digest
Addressing Table
Username: Admin1
Password: admin1pa55 R1>
R1(config)# ip domain-name ccnasecurity.com
Username: Admin2
Password: admin2pa55
R2>
R3(config)# username Admin3 secret admin3pa55
R3(config)# radius-server host 192.168.3.2 R3(config)# radius-server key radiuspa55
R3(config)# aaa new-model
R3(config)# aaa authentication login default group radius local
R3(config)# line console 0
R3(config-line)# login authentication default
R3(config-line)# end
%SYS-5-CONFIG_I: Configured from console by console
R3# exit
Addressing Table
a) From global configuration mode on R1, enter the following command to determine the
first valid number for an extended access list.
R1(config)# access-list ?
<1-99> IP standard access list
<100-199> IP extended access list
e) Notice that we could filter just for PC1 by using the host keyword or we could allow any
host. In this case, any device is allowed that has an address belonging to the
172.22.34.64/27 network. Enter the network address, followed by a question mark.
R1(config)# access-list 100 permit tcp 172.22.34.64 ?
A.B.C.D Source wildcard bits
f) Calculate the wildcard mask determining the binary opposite of a subnet mask.
11111111.11111111.11111111.11100000 = 255.255.255.224
00000000.00000000.00000000.00011111 = 0.0.0.31
h) Configure the destination address. In this scenario, we are filtering traffic for a single
destination, which is the server. Enter the host keyword followed by the server’s IP
address.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62 ?
dscp Match packets with given dscp value eq Match only packets on a given port
number established gt Match only packets with a greater port number lt Match only
packets with a lower port number neq Match only packets not on a given port number
precedence Match packets with given precedence value range Match only packets in the
range of port numbers <cr>
i) Notice that one of the options is <cr> (carriage return). In other words, you can press
Enter and the statement would permit all TCP traffic. However, we are only permitting
FTP traffic; therefore, enter the eq keyword, followed by a question mark to display the
available options. Then, enter ftp and press Enter.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62
eq ?
<0-65535> Port number ftp File Transfer Protocol (21) pop3 Post Office Protocol v3
(110) smtp Simple Mail Transport Protocol (25) telnet Telnet (23)
www World Wide Web (HTTP, 80)
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62
eq ftp
j) Create a second access list statement to permit ICMP (ping, etc.) traffic from PC1 to
Server. Note that the access list number remains the same and no particular type of
ICMP traffic needs to be specified.
R1(config)# access-list 100 permit icmp 172.22.34.64 0.0.0.31 host 172.22.34.62
a. Ping from PC1 to Server. If the pings are unsuccessful, verify the IP addresses before
continuing.
b. FTP from PC1 to Server. The username and password are both cisco.
PC> ftp 172.22.34.62
c. Exit the FTP service of the Server.
ftp> quit
d. Ping from PC1 to PC2. The destination host should be unreachable, because the
traffic was not explicitly permitted.
R1(config)# ip access-list ?
Extended Access List standard Access List
255.255.255.255
- 255.255.255.240
-----------------
= 0. 0. 0. 15
R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 ?
Addressing Table
R3(config)#
0.255.255.255 eq 22 host
192.168.3.3
0.255.255.255 eq 22 host
192.168.3.3
R3(config)# access-list 100 deny ip 10.0.0.0 0.255.255.255 any
R3(config)# access-list 100 deny ip 172.16.0.0 0.15.255.255 any
R3(config)# access-list 100 deny ip 192.168.0.0 0.0.255.255 any
R3(config)# access-list 100 deny ip 127.0.0.0 0.255.255.255 any
R3(config)# access-list 100 permit ip any any
R3(config)#access-list 100 deny ip 127.0.0.0.0.255.255.255 any
Addressing Table
R1(config)# deny tcp any host 2001:DB8:1:30::30 eq www
R1(config)# deny tcp any host 2001:DB8:1:30::30 eq 443
R1(config)# permit ipv6 any any
R1(config)# interface GigabitEthernet0/1
R1(config-if)# ipv6 traffic-filter BLOCK_HTTP in
R3(config-pmap-c)# exit
R3(config-pmap)# exit
Addressing Table
b. Ping from C1 to C2 and issue the command show port-security interface f0/1 again to
verify that the switch has learned the MAC address for C1.