CNT 125 Campus - Risk Management Lab Completed
CNT 125 Campus - Risk Management Lab Completed
Brown
CNT 125 Campus - Risk Management Lab
For the lab today are you a white hat or black hat hacker? ________________________________
1
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Part 1: Subnet Planning
ACME Adhesive Company® needs their network subnetted to help organize the network. Their network is
using the 160.60.0.0 network. You will need to assist them with the additional subnetting they need to complete
their network configuration. A map of their network is located in the enclosed material. Please view that map to
understand the construction of their network.
1. View the map contained in this lab. This company needs ______ subnets.
2. The network # for the network is: 160.60.0.0
(Note: Use as much of this chart as needed to get the subnets necessary for the Lab)
SN # Usable host range SN BA
3. Now take the subnets that you have planned and apply them to the network map (next page) so you have
a plan on how to connect and configure their network.
2
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Gi0/1
FA0/1 IP Address: 160.60.64.2
IP Address: 160.60.64.1 Subnet Mask: 255.255.192.0
Subnet Mask: 255.255.192.0
0
IP Address: 160.60.0.1
Subnet Mask: 255.255.192.0
160.60.64.0
IP Address: 160.60.128.1
Subnet Mask: 255.255.192.0
160.60.0.0
160.60.128.0
IP Address: 160.60.0.10
Subnet Mask: 255.255.192.0
Default Gateway: 160.60.0.1 IP Address: 160.60.128.10
Subnet Mask: 255.255.192.0
Default Gateway: 160.60.128.1
FastEthernet 0/1
Connected Port: FastEthernet 0/1
3
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Part 2 – Physical Connectivity
Layer 1 Use the map as a guide – connect your network together as it is being shown.
Connectivity ● Pay attention to the port #'s being used on devices
Type text here ● Pay attention to the cables being used
○ Reminder - between unlike devices = straight through
○ Reminder - between link devices = crossover
● PCs can be connected to any switch port for this lab
● Use your Lab Notes or look at previous labs for configuration help
● Troubleshooting Tip … if the hostname entered is not correct … repeat the command with the
correct name
Cisco Switch ● Configure an IP Address on the Switch on Interface VLAN 1 for remote access and
Assigning an management purposes
IP Address
● Use the Network Map as a Guide for the IP Address to use
● Make sure to “Turn the IP Address On” after assigning the IP Address
● Use your Lab Notes or look at previous labs for configuration help
● Troubleshooting Tip … if the IP & SNM entered is not correct … repeat the command with the
correct IP & SNM - this will “overwrite” the incorrect IP & SNM and fix the error.
Cisco Switch ● Configure a Banner Message (MOTD - Message of the Day) that will be displayed
Configuring when a remote connection is established.
Banner switch# config t
Message switch(config)# banner motd $_____________$
● The symbol at the beginning and end denote that “between” is the message of the day
● Use the device hostname in the banner message
● Example: banner motd $Welcome to the Bottom Switch$
Cisco Switch ● Switch should be configured with default gateway if switch will be managed remotely
Assigning from networks not directly connected
Default ● default gateway is first Layer 3 device (router) on the same management VLAN
Gateway ● switch will forward IP packets with destination IP addresses outside local network to
the default gateway
switch# config t
switch(config)# ip default-gateway 160.60.___.____
● Use Default Gateway IP Address noted on Map for each switch
4
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Cisco Switch ● Use the command to show your current running configuration
● Check carefully for any errors - make any necessary corrections
View Config
● Use your Lab Notes or look at previous labs for configuration help
Cisco Switch ● Use the command to copy your current running configuration in RAM to the startup
configuration in NVRAM
Save Config
● Use your Lab Notes or look at previous labs for configuration help
Repeat Above Steps for the other switch in the network
Cisco ● Configure a Banner Message (MOTD - Message of the Day) that will be displayed
Router when a remote connection is established.
Configuring router# config t
Banner router(config)# banner motd $_____________$
Message ● The symbol at the beginning and end denote that “between” is the message of the day
● Use the device hostname in the banner message
● Example: banner motd $Welcome to the 2811 Router$
Repeat Above Steps for the other Router in the network
NOTE: You can move the blue console cable to the other router console port and continue to
use the same/active PUTTY connection created !!!
5
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Cisco 2811 Router - Interface IP Address Configuration
Cisco Router - ● Use the Network Map as a Guide for the Port to configure
2811 Model ● Select the LAN Interface (port connected to Switch)
● Use the Network Map as a Guide for IP Address to configure
LAN Interface ● Configure the IP Address and Subnet Mask
IP Address ● Make sure to “Turn the Port On” after configuring the IP
(The LAN Port
Connected to ● Use your Lab Notes or look at previous labs for configuration help
Switch)
● Troubleshooting Tip … if the IP & SNM entered is not correct … repeat the command with the
correct IP & SNM - this will “overwrite” the incorrect IP & SNM and fix the error.
Cisco Router - ● Use the Network Map as a Guide for the Port to configure
2811 Model ● Select the WAN Interface (port connected to other Router)
● Use the Network Map as a Guide for IP Address to configure
WAN Interface ● Configure the IP Address and Subnet Mask
IP Address ● Make sure to “Turn the Port On” after configuring the IP
(The WAN Port
connected to other ● Use your Lab Notes or look at previous labs for configuration help
router)
● Troubleshooting Tip … if the IP & SNM entered is not correct … repeat the command with the
correct IP & SNM - this will “overwrite” the incorrect IP & SNM and fix the error.
Cisco Router - ● Use the Network Map as a Guide for the Port to configure
4221 Model ● Select the WAN Interface (port connected to other Router)
● Use the Network Map as a Guide for IP Address to configure
WAN Interface ● Configure the IP Address and Subnet Mask
IP Address ● Make sure to “Turn the Port On” after configuring the IP
(The WAN Port
connected to other ● Use your Lab Notes or look at previous labs for configuration help
router)
● Troubleshooting Tip … if the IP & SNM entered is not correct … repeat the command with the
correct IP & SNM - this will “overwrite” the incorrect IP & SNM and fix the error.
6
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Configuring OSPF Routing Protocol
Cisco Router ● Use the Network Map as a Guide for the Networks (Subnets) to configure
● Configure the OSPF routing protocol
OSPF Routing ● Configure the Networks (subnets) that will participate in OSPF Routing making
Protocol sure to use the Inverse Mask for each Network (Subnet)
Enabled
● Use your Lab Notes or look at previous labs for configuration help
● Troubleshooting Tip … if there is an error in the Network entered … repeat the
entire command (copy & paste can help) with “No” at the beginning of the
command and that will remove the wrong entry … Then … Re-enter the correct
network
Complete the OSPF Configuration for BOTH Routers
Check Link If the router & switch ports being used have link lights … excellent … continue on
Lights If the router & switch ports being used DO NOT have link lights … Use the
Troubleshooting Tips Shown At the end of the lab to help with connectivity.
7
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
If these PING tests were not successful … Use the Troubleshooting Tips Shown At the
end of the lab to help with connectivity.
If these PING tests were not successful … Use the Troubleshooting Tips Shown At the
end of the lab to help with connectivity.
If All Networks are NOT in the routing table … Use the Troubleshooting Tips Shown At
the end of the lab to help with connectivity.
8
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
5 - Configuring Enable Password, Local User Account & Telnet Access for Switches
When configuring remote access, some security will be needed on the device. This security will include a
password to be able to enter Enable mode on the device along with a user account that will be needed to be able
to connect to the device remotely.
Configuring a Password for Enable Mode
Cisco Switch Console in to your Switch
Cisco Switch ● Use the command to show your current running configuration
● Check carefully for any errors - make any necessary corrections
View your
Configuration ● Use your Lab Notes or look at previous labs for configuration help
Cisco Switch ● Use the command to copy your current running configuration in RAM to the startup
configuration in NVRAM
Save your
Configuration ● Use your Lab Notes or look at previous labs for configuration help
Complete for BOTH Switches
9
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
6 - Configuring Enable Password, Local User Account & SSH Access for Routers
When configuring remote access, some security will be needed on the device. This security will include a
password to be able to enter Enable mode on the device along with a user account that will be needed to be able
to connect to the device remotely.
Configuring a Password for Enable Mode
Cisco Router router(config)# enable secret class
● Sets the enable password to class and then encrypts the password
Create ● CHECK FOR TYPOS … BEFORE … Hitting Enter !!!
Password for ● Exercise caution when setting passwords - you can lock yourself out of the device if
Enable Mode not careful - CHECK FOR TYPOS !!!
Cisco Router ● Use the command to show your current running configuration
● Check carefully for any errors - make any necessary corrections
View your
Configuration ● Use your Lab Notes or look at previous labs for configuration help
Cisco Router ● Use the command to copy your current running configuration in RAM to the
startup configuration in NVRAM
Save your
Configuration ● Use your Lab Notes or look at previous labs for configuration help
Complete for BOTH Routers
11
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
8 – Use a Client Computer to Remote Access into a Switch via Telnet
Now that the network is up and running and has remote access enabled for the switches, routers and a client PC
…. let's do some remote connections. Again, remember, this allows work, repairs, troubleshooting on remote
devices in a network.
Remote Access On your Windows PC#1 on the Left Side of the Map … we will use Putty to Telnet into a
into Cisco Cisco Switch
Switch via ● Locate Windows PC#1
Telnet ● Close any open Putty Sessions
● Open a New Putty
(Do this from ● Select the Connection Type: Telnet
Windows PC#1 ● Input the IP Address of a Switch in your network: 160.60.___.____
on the Left Side ● Click Open
of the Map) ● When prompted for username - input the username (this will be your first name)
of the local account created on this switch
● When prompted for password - input the password of the local account created -
password
● Use the enable command
● When prompted for password - input the password configured for Enable Access:
class
● Take note of the Prompt name that is displayed. You are using a “client PC” to
remotely connect into a switch for admin work !!! This connection is using the
NIC and connecting through the network to the switch. So the PC could be in
one city and the network device could be in another city!
● Type the show run command to view the switch configuration
● Close out the Putty session
● Feel Free to Try the Other Switch in the Network
9 – Examine Protocol Traffic from Remote Access into Switch via Telnet
Now that the network is up and running and has remote access enabled for the switches, routers and a client PC
….…. let's examine the protocol traffic generated by remote connections of Telnet.
Remote Access On your Windows PC#1 on the Left Side of the Map … we will use Putty to Telnet into a
into Cisco Cisco Switch
Switch via ● Locate Windows PC#1
Telnet ● Close any open Putty Sessions
● Open a new Wireshark session
(Do this from ● Select your NIC
Windows PC#1 ● Start a session to capture the Telnet connection to the cisco Switch on your network
on the Left Side ● Open a New Putty
of the Map) ● Select the Connection Type: Telnet
● Input the IP Address of a Switch: 160.60.___.____
● Click Open
12
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
● Type the show run command to view the switch configuration and use the
space bar to view all of the configuration.
13
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
11 – Examine Protocol Traffic from Remote Access into Router via SSH
Now that the network is up and running and has remote access enabled for the switches, routers and a client PC
…. let's examine the protocol traffic generated by remote connections of SSH.
Remote Access On your Windows PC#1 … SSH with Putty into Cisco Router
into Cisco 4221 ● Locate Windows PC#1
Router via SSH ● Close any open Putty Sessions
● Open a new Wireshark session
(Do this from ● Select your NIC
Windows PC#1 ● Start a session to capture the SSH connection to a cisco router
on the Left Side ● Open a New Putty session
of the Map) ● Select the Connection Type: SSH
● Input the IP Address of the a Router: 160.60.__.__
● Click Open
● When prompted for username - input the username (your name)
● When prompted for password - input the password (password)
● Use the enable command
● When prompted for password - input Enable password: class
● Use show run and space bar to view router configuration
● Stop the Wireshark session
● Close the Putty Session
14
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
12 – Examine Protocol Traffic from Remote Access into Workstation via RDP
Now that the network is up and running and has remote access enabled for a workstation …. let's examine the
protocol traffic generated by remote connections of RDP.
Remote Access (You will use PC#1 on the left side of the map to do a Remote Connection via RDP to
into Windows PC#2 on the right side of the map)
PC#2 via RDP
Remote Access into Windows Client via RDP
(You will use ● Make sure Both Windows PC’s are “awake”
PC#1 on the left ● Locate Windows PC#1 on the left side of the map
side of the map to ● Open Wireshark
do a Remote ● Select your NIC
Connection via ● Start a session to capture the RDP connection to the windows client
RDP to PC#2 on ● Open remote desktop connection
the right side of ○ click windows icon and type remote desktop connection
the map) ● Input IP address for Windows Client #2 on Right Side: 160.60.__.__
● Click connect
● Input the student account
○ Username: cnt-student
○ Password: cntclass
● Accept the certificate
● Watch BOTH PCs when this is completed
● You should now be controlling this client machine - Work with it for a few minutes
(Continued on next page)
15
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
16
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Device While you have the Nmap results … save these for submission to D2L:
Assessment ● Open a new notepad file
(Security Audit ○ click windows icon
with Nmap) ○ type notepad and launch application
● In Nmap highlight all of the scan results under the Nmap Output tab … and
Gather Proof of copy the scan results (use enter or right-click copy)
Device Security ● In Notepad Paste the scan results
Assessment ● Save Notepad file to desktop with name router-nmap-scan.txt
● Click save
● Find file on desktop … open with a text editor and view results
● Save the scan results for submission to D2L.
● Close your Nmap scan after your results are saved
Feel Free to complete a few more NMAP Scans of devices in your network -
● Repeat the NMAP Scan on one of the switches …
● Repeat the NMAP Scan on the PC that has RDP enabled …
(You do not need to save these results)
17
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Cisco Switch ● Use the command to show your current running configuration
● Check carefully for any errors - make any necessary corrections
View your
Configuration ● Use your Lab Notes or look at previous labs for configuration help
Cisco Switch ● Use the command to copy your current running configuration in RAM to the
startup configuration in NVRAM
Save your
Configuration ● Use your Lab Notes or look at previous labs for configuration help
Complete for BOTH Switches
Shutting off unused switch ports can prevent unauthorized users from accessing resources on your network.
(Think about a visitor plugging into a network jack in the hallway/lobby of a building - if the switch port
associated with that network jack is “turned off” that visitor has no access to network resources.)
18
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
19
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Linux VM Start Linux VM (or CNT 120 Linux VM) …. Watch messages displayed in Putty
This will ADD a second MAC address to switch port - it violates security setting on port
(Create a MAC ● What is being displayed? ______________________________
Address issue on ● What is happening? _____________________________
Switch Port)
Switch Switch Port Link Light for Port #5
Observe Link ● What is the status? ______________________________
Lights ● Why is it acting this way? ___________________
Switch Console Using Putty Console Window …..
switch# show run
View the Port ● this will show the current config on the switch
Security Settings ● NOTE: Observe the MAC Address listed for port 5
Switch Console Using Putty Console Window …..
switch# show port-security
View the Port ● this will show the current port security on your switch
Security Settings ● NOTE: Observe the port #’s listed
on Switch ● NOTE: Observe the “1” under the MAX Mac Count Column for all Ports
● NOTE: Observe the “1” under the Current Addr Count Column for Port 5
● NOTE: Observe the “1” under the Security Violation Count Column for Port 5
Switch Console Using Putty Console Window …..
switch# show port-security interface fa0/5
View the Port ● NOTE: Observe the settings and MAC
Security Settings ● NOTE: Observe the Violation Count
on a Specific Port ● NOTE: Observe the following
○ Port Security, Violation Mode, Max MAC Address, Total MAC Address, Sticky
MAC Address, Last Source Address, Violation Count
Switch Console Using Putty Console Window …..
switch# show interface fa0/5
View Status of ● NOTE: Observe the status under the first line of the output - up or down status
Shutdown Port ● NOTE: Observe the Disabled Message on the first line
Implementing Port Security on switch ports can prevent unauthorized users from accessing resources on your
network by either spoofing MAC addresses or connecting additional devices (like a hub or switch) to gain
access to the network. (Think about a visitor plugging a hub or switch into an outlet in an employee
office/location and then connecting their laptop/device into that new hub or switch. When our network switch
senses an additional MAC address on that port, it will shut the port down.)
20
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
21
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Make sure you have the following before cleaning up your network devices:
● risk-routing-table.txt - routing table as result of show ip route command
● telnet-wireshark.pcapng - wireshark capture of telnet session
● ssh-wireshark.pcapng - wireshark capture of SSH session
● rdp-wireshark.pcapng - wireshark capture of RDP session
● router-nmap-scan.txt - nmap scan of router
● risk-2811-config.txt - 2811 router configuration
● risk-4221-config.txt - 4221 router configuration
● risk-top-sw-config.txt - 2960 top switch configuration
● risk-bot-sw-config.txt - 2960 bottom switch configuration
16 – Lab Clean-Up
You are now going to clear off the device configuration and clean up your lab station.
Cisco Switches ● Connect the console cable to each switch and complete the following
switch> enable
Erase switch# erase startup-config (or …. erase start )
Configuration (This erases the contents of NVRAM on the switch – when the switch reboots or powers down it will
have no configuration in memory, so on next boot it will load a blank switch)
Cisco Routers ● Connect the console cable back to each router and complete the following
router> enable
Delete router# config t
Encryption Key router(config)# crypto key zeroize rsa
and Erase ● Accept with “Y” for Yes
Configuration ● This is deleting the RSA encryption key created during config
router(config)# exit
router# erase startup-config (or …. erase start )
(This erases the contents of NVRAM on the router – when the router reboots or powers down it will
have no configuration in memory, so on next boot it will load a blank router.)
22
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
23
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
17 – Lab Submission
You are now going to submit the files gathered during the lab to D2L.
24
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
Troubleshooting Tips
If … after trying these troubleshooting tips, these PING tests for the PC were not
successful … now Ask for Help
25
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
If your PC Check these items on your PC … and the Other PC in the Network as well
CANNOT PING 1. Check the cables are connected to correct ports - be 100% sure !
to device across 2. Make sure that IP, SNM and DFG are correct - Check for Typos and then Verify at a
WAN link (to command prompt …. ipconfig
PC in another 3. Make sure this IP Address does not conflict with other devices in the network -
network) correct the necessary IP Address if it does
4. Make sure extra NICs (wireless for example) are turned off on the PC
5. Try to PING the other PC …
a. If it Works - Excellent
b. If it does not Work … Continue …
Check these items on Router(s) … you will most likely need to check BOTH (ALL)
1. Check the items listed in the troubleshooting section for checking Link Lights
2. Issue a show run and view the IP Address & SNM set on each port
a. refer back to troubleshooting tips to change IP & SNM that are not correct
b. You may need to remove an IP Address that was assigned to a wrong port -
this will require the use of the no command
i. configure terminal
ii. interface ___
iii. no ip address
c. re-enter the correct IP & SNM for this port and issue a no shutdown
3. Issue a show run and make sure all Networks (Subnets) are listed with the Routing
Protocol Configuration
a. Make sure the Network or Subnet # is correct (and inverse mask)
b. You may need to ADD a network/subnet to the Routing Protocol Config - go
back to the appropriate Routing Protocol Configuration section of the Lab
and ADD the missing network/subnet
c. You may need to REMOVE a network/subnet from the Routing Protocol
Config - go back to the appropriate Routing Protocol Configuration section
of the Lab to help
i. copy the incorrect line of routing protocol config
ii. start the routing protocol configuration (go back into that mode)
iii. type the no command and then paste in the incorrect line and hit
enter - this will remove the incorrect line of config
Try the PING Test again
If … after trying these troubleshooting tips, these PING tests for the PC were not
successful … now Ask for Help
26
CNT 125 Campus - Risk Management Lab Created by: Mr. D. Brown
If you need to When you are working with Port Security - if you have a port that shuts down due to a MAC
reset your port Address violation, you can reset the port to bring it back online using the following
after having a sequence.
Port-Security
Violation that Remove the device(s) from the port causing the Violation and then issue the following
shuts down the commands at the Switch Console Connection:
port
2960_Top_Sw(config)# interface ______
2960_Top_Sw(config-if)# no switchport port-security
2960_Top_Sw(config-if)# shutdown
2960_Top_Sw(config-if)# no shutdown
2960_Top_Sw(config-if)# switchport port-security
27