![]() ![]() You may need to click inside the cells to see the messages. Note : All the events have been recorded however, the time stamps are incorrect. Within the established SSH session, configure a Loopback 0 interface on R1 then disable it.S2(config)# logging 10.0.1.254 Part 3: Generate Logged Events Step 1: Change the status of interfaces to create event logs. From the remote SSH session, configure S2 to send log events to the Sysl og server. ![]() From the remote SSH session, configure S 1 to send log events to the Sysl og server.From the remote SSH session, configure R1 to send log events to the Sysl og server.Step 2: Configure the intermediary devices to use the Syslog service. Turn the Syslog service on and move the window so you can monitor activity.Part 2: Configure Syslog Service Step 1: Enable the Syslog service. Leave all the established SSH sessions open for NTP and Syslog configurations.From the command prompt of a laptop or PC, access R1 via SSH using the user account configured in the previous step.Repeat and access S2 (10.0.2.2) via SSH using the credentials SSHuser / SSHuserpass.From the command prompt of another laptop or PC, access S1 via SSH using the username SSHuser and password SSHuserpass.In this step, you will establish an SSH session to the network devices. R 1 (config)# login block-for 600 attempts 4 within 120 Step 2: Verify SSH access. Block anyone for five minutes who fails to log in after four attempts within a two-minute period.Set the EXEC mode timeout to 5 minutes on the vty lines.Configure all vty lines for SSH access and use the local user profiles for authentication.Create a user of your choice with a strong encrypted password.Set a domain name of your choice on R1.From the Admin PC, click Terminal within the Desktop tab.The privileged EXEC password for all the network devices is cisco12345. In this part, you will access the router R1 via the console port to configure secure remote access SSH. Instructions Part 1: Configure Remote Access Y ou will remote access the devices to enable and use the Syslog service and the NTP service so that the network administrator is able to monitor the network more effectively. In this activity, you will configure secure remote access for the router. Addressing Tableīlank Line, No additional information Objectives Packet Tracer – Configure Cisco Devices for Syslog, NTP, and SSH Operations (Answers Version)Īnswers Note : Red font color or g ray highlights indicate text that appears in the instructor copy only. ![]() ![]() Network Security Student Lab Source Files Answersĥ.2.5 Lab – Configure Administrative Roles AnswersĦ.2.7 Lab – Configure Automated Security Features AnswersĦ.3.6 Lab – Basic Device Configuration and OSPF Authentication AnswersĦ.7.11 Lab – Configure Cisco IOS Resilience Management and Reporting Answersħ.2.5 Lab – Configure Local AAA Authentication Answersħ.4.7 Lab – Install the Virtual Machine Answersħ.4.8 Lab – Configure Server-Based Authentication with RADIUS Answers Network Security Packet Tracer Activity Files AnswersĦ.3.7 Packet Tracer – Configure OSPF Authentication AnswersĦ.6.4 Packet Tracer – Configure and Verify NTP AnswersĦ.7.12 Packet Tracer – Configure Cisco Devices for Syslog, NTP, and SSH Operations Answersħ.2.6 Packet Tracer – Configure Local AAA for Console and VTY Access Answersħ.4.9 Packet Tracer – Configure Server-based Authentication with TACACS+ and RADIUS Answers ![]()
0 Comments
Leave a Reply. |