MCS502 Intro to Cyber and Network Security
Tutorial 3
Task 1: Implementing Security Protocols using Cisco Packet Tracer
We will configure a small network with a router, switch, and two PCs, and implement
security protocols such as SSH for secure remote management and ACLs (Access
Control Lists) to control traffic.
Step 1. Setting Up the Network
1. Open Cisco Packet Tracer
• Launch Cisco Packet Tracer on your computer
2. Create a new network topology
• Start a new project by clicking on File > New
3. Add devices to the workspace
• Router:
i. From the device list at the bottom, select Routers
ii. Drag and drop a router (e.g., 1941) into the workspace
• Switch:
i. From the device list, select Switches
ii. Drag and drop a router (e.g., 2960) into the workspace
• PCs:
i. From the device list, select End Devices
ii. Drag and drop two PCs into the workspace
4. Connect the devices
• Router to Switch:
i. Click on the Connections icon (lightning bolt)
ii. Choose a copper straight-through cable
iii. Click on the router, select GigabitEthernet0/0, then click on the switch and
select any available port (e.g. FastEthernet0/1)
• PCs to Switch:
i. Connect each PC to the switch using the same method. Use FastEthernet0
on each PC and any available port on the switch (e.g., FastEthernet0/2 for
PC0 and FastEthernet0/3 for PC1)
Step 2. Configure Basic Settings
1. Configure IP Addresses
• PC0:
i. Click on PC0, go to the Desktop tab, and open IP Configuration
ii. Set the IP address to 192.168.1.2 and the subnet mask to 255.255.255.0
• PC1:
i. Click on PC1, go to the Desktop tab, and open IP Configuration
ii. Set the IP address to 192.168.1.3 and the subnet mask to 255.255.255.0
2. Configure the router
• Click on the router and click CLI to access the command-line interface.
• Enter configuration mode
• Configure GigabitEthernet0/0
• Set up a default gateway for the switch
Step 3. Implement SSH for Secure Remote Management
1. Generate RSA Keys:
• In the router CLI, generate RSA keys for SSH:
• Specify the modulus size (e.g. 1024 bits):
2. Configure SSH:
• Enable SSH and configure a domain name:
3. Create a user for SSH Access:
• Create a user with a password:
4. Enable SSH Version 2:
• Ensure SSH version 2 is enabled:
Step 4. Implement Access Control Lists (ACLs)
1. Create ACL to Permit Traffic:
• Create a standard ACL to permit traffic from a specific host (e.g. PC0)
2. Apply the ACL to an interface:
• Apply the ACL to the GigabitEthernet0/0 interface to control incoming traffic:
Step 5. Test the Configuration
1. Test SSH Access:
• From PC0, open the Command Prompt and use the ssh command to connect
to the router
• Enter the password adminpassword when prompted
2. Test ACL Functionality:
• From PC1, attempt to ping the router’s IP address:
• The ping should be blocked if the ACL is correctly configured.
Step 6. Save the Configuration
1. Save the router configuration:
• In the router CLI, save the configuration
Task 2: Submit your work
1. Take a screenshot of your packet tracer application with one router and two PCs
• Please also take screenshot(s) of your router configuration (step 2), SSH (step
3), ACL (step 4), and test configuration (step 5).
2. Put your screenshots into one document.
3. Submit your document and completed Cisco packet tracer file.