[go: up one dir, main page]

0% found this document useful (0 votes)
22 views4 pages

MCS502 Tutorial 3

This tutorial outlines the steps to implement security protocols in a small network using Cisco Packet Tracer, including the configuration of a router, switch, and two PCs. Key tasks involve setting up the network, configuring IP addresses, implementing SSH for secure management, and applying Access Control Lists (ACLs) to control traffic. The final steps include testing the configuration and submitting documentation of the work done.

Uploaded by

yashdesai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

MCS502 Tutorial 3

This tutorial outlines the steps to implement security protocols in a small network using Cisco Packet Tracer, including the configuration of a router, switch, and two PCs. Key tasks involve setting up the network, configuring IP addresses, implementing SSH for secure management, and applying Access Control Lists (ACLs) to control traffic. The final steps include testing the configuration and submitting documentation of the work done.

Uploaded by

yashdesai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

MCS502 Intro to Cyber and Network Security

Tutorial 3

Task 1: Implementing Security Protocols using Cisco Packet Tracer


We will configure a small network with a router, switch, and two PCs, and implement
security protocols such as SSH for secure remote management and ACLs (Access
Control Lists) to control traffic.

Step 1. Setting Up the Network

1. Open Cisco Packet Tracer


• Launch Cisco Packet Tracer on your computer

2. Create a new network topology


• Start a new project by clicking on File > New

3. Add devices to the workspace


• Router:
i. From the device list at the bottom, select Routers
ii. Drag and drop a router (e.g., 1941) into the workspace
• Switch:
i. From the device list, select Switches
ii. Drag and drop a router (e.g., 2960) into the workspace
• PCs:
i. From the device list, select End Devices
ii. Drag and drop two PCs into the workspace

4. Connect the devices


• Router to Switch:
i. Click on the Connections icon (lightning bolt)
ii. Choose a copper straight-through cable
iii. Click on the router, select GigabitEthernet0/0, then click on the switch and
select any available port (e.g. FastEthernet0/1)
• PCs to Switch:
i. Connect each PC to the switch using the same method. Use FastEthernet0
on each PC and any available port on the switch (e.g., FastEthernet0/2 for
PC0 and FastEthernet0/3 for PC1)
Step 2. Configure Basic Settings

1. Configure IP Addresses
• PC0:
i. Click on PC0, go to the Desktop tab, and open IP Configuration
ii. Set the IP address to 192.168.1.2 and the subnet mask to 255.255.255.0
• PC1:
i. Click on PC1, go to the Desktop tab, and open IP Configuration
ii. Set the IP address to 192.168.1.3 and the subnet mask to 255.255.255.0

2. Configure the router


• Click on the router and click CLI to access the command-line interface.
• Enter configuration mode

• Configure GigabitEthernet0/0

• Set up a default gateway for the switch

Step 3. Implement SSH for Secure Remote Management

1. Generate RSA Keys:


• In the router CLI, generate RSA keys for SSH:

• Specify the modulus size (e.g. 1024 bits):


2. Configure SSH:
• Enable SSH and configure a domain name:

3. Create a user for SSH Access:


• Create a user with a password:

4. Enable SSH Version 2:


• Ensure SSH version 2 is enabled:

Step 4. Implement Access Control Lists (ACLs)

1. Create ACL to Permit Traffic:


• Create a standard ACL to permit traffic from a specific host (e.g. PC0)

2. Apply the ACL to an interface:


• Apply the ACL to the GigabitEthernet0/0 interface to control incoming traffic:

Step 5. Test the Configuration

1. Test SSH Access:


• From PC0, open the Command Prompt and use the ssh command to connect
to the router
• Enter the password adminpassword when prompted

2. Test ACL Functionality:


• From PC1, attempt to ping the router’s IP address:

• The ping should be blocked if the ACL is correctly configured.

Step 6. Save the Configuration

1. Save the router configuration:


• In the router CLI, save the configuration

Task 2: Submit your work


1. Take a screenshot of your packet tracer application with one router and two PCs
• Please also take screenshot(s) of your router configuration (step 2), SSH (step
3), ACL (step 4), and test configuration (step 5).

2. Put your screenshots into one document.

3. Submit your document and completed Cisco packet tracer file.

You might also like