CCNA 2 v6.0 RSE Chapter 7 SIC Skills Assessment

CCNA 2 v6.0 Routing & Switching Essentials

RSE Chapter 7 SIC: VLANs, Trunking, and Router-on-a-Stick

A few things to keep in mind while completing this activity:

  1. Do not use the browser Back button or close or reload any exam windows during the exam.
  2. Do not close Packet Tracer when you are done. It will close automatically.
  3. Click the Submit Assessment button in the browser window to submit your work.

Introduction

In this practice skills assessment, you will configure the Science LLC network with VLANs, Trunking, inter-VLAN routing, and IPv4 standard ACLs. As part of this process, you will perform basic VLAN configuration tasks, address router interfaces and hosts, and implement two ACLs.

You are not required to configure the Quark switch, or any of the servers.

Note: In order to keep the assessment activity as brief as possible, you will only be partially configuring some devices, as directed in the instructions. In a real network, all devices would be fully configured to function in the network. You are only responsible for completing the tasks covered in the instructions. Any configuration that you do beyond the requirements will not result in additional credit.

All IOS device configurations should be completed from a direct terminal connection to the device console. In addition, many values that are required to complete the configurations have not been given to you. In those cases, create the values that you need to complete the requirements.

You will practice and be assessed on the following skills:

  • Configuration of initial device settings
  • IPv4 address assignment
  • Configuration and addressing of device interfaces
  • Configuration of VLANs on three switches
  • Configuration of trunking and inter-VLAN routing
  • Configuration of ACL to limit device access

Requirements by device:

Router Atom:

  • Configuration of initial router settings
  • Interface configuration and IPv4 addressing

Switch Neutron:

  • Configuration of VLANs
  • Configuration of VLAN trunking
  • Configuration of interfaces into VLAN
  • Configuration of IP address for the Management VLAN

Switch Proton:

  • Configuration of VLANs
  • Configuration of VLAN trunking
  • Configuration of interfaces into VLAN
  • Configuration of IP address for the Management VLAN

Switch Electron:

  • Configuration of VLANs
  • Configuration of VLAN trunking
  • Configuration of interfaces into VLAN
  • Configuration of IP address for the Management VLAN

PC hosts:

  • Pv4 full addressing

Addressing Table

Note: You are provided with the networks that interfaces should be configured on. Unless you are told to do differently in the detailed instructions below, you are free to choose the host addresses to assign.

VLAN Assignment Table

Instructions

Step 1: Determine Addressing

Determine the IP addresses that you will use for the required interfaces on the three switch SVIs, and the six LAN hosts. Use the information in the addressing table.

  • Select the switch SVI addresses.
  • The interfaces on the Atomrouter that are used to route the VLANs should be addressed with the last usable IP address in the subnet.
  • Assign valid host addresses to the LAN hosts according to the Addressing Table and VLAN assignment.
Step 2: Configure initial device setting on Neutron and Atom

Configure Neutron and Atom with all initial configurations that you have learned in the course so far:

  • Configure the switch hostname: Neutron.
  • Configure the router hostname: Atom.
  • Prevent the router from attempting to resolve unrecognized CLI entries as domain names.
  • Protect device configurations from unauthorized access with the encrypted password cisco.
  • Secure the router and switch console and remote access lines with password cisco.
  • Prevent all passwords from being viewed in clear text in device configuration files.
Step 3: Configure VLANs

Configure four VLANs on the NeutronProton, and Electron switches using the values in the addressing table.

Step 4: Assign Switch Interfaces to VLANs

Configure FastEthernet interfaces on Proton and Electron according to the following guidelines:

  • Interfaces Fa0/1 – Fa0/5 are assigned to VLAN 20
  • Interfaces Fa0/6 – Fa0/10 are assigned to VLAN 40
  • Interfaces Fa0/11 – Fa0/15 are assigned to VLAN 60
Step 5: Configure the Switches for Remote Management

Configure the SVIs of the NeutronProton, and Electron switches using the information in the VLAN and Addressing Tables. Configure the IP address for the Management VLAN and the default-gateway IP address. Configure the SVIs so that they will be reachable by devices on other networks after the network has been fully configured.

 Step 6: Configure VLAN Trunking

Configure VLAN trunking between the NeutronProton, and Electron switches.

  • Manuallyconfigure the VTP domain name to School on the Neutron, Proton, and Electron switches.
  • Manuallyconfigure the trunking ports on the Neutron, Proton, and Electron switches.
Step 7: Configure inter-VLAN Routing

Use the information in the Addressing and VLAN tables to configure inter-VLAN routing on Atom according to the following guidelines:

  • Configure inter-VLAN routing among VLANs 20, 40, 60 and 88 through Gi0/0 subinterfaces.
  • Configure inter-VLAN routing for VLANs 250 and 254 through Gi0/1 subinterfaces.
Step 8: Configure Host Addressing

Address the hosts according to the values in the addressing table. Use a DNS server address of 172.16.254.252. All hosts should be able to reach the www.cisco.com server.

Step 9: Configure Access Control Lists

You will configure two access control lists on the Atom router. The ACL specifications are as follows:

a. Restrict access to the vty lines on Atom.

  • Create a numberedstandard ACL using number 10. Be sure that you use this number exactly as it appears in these instructions.
  • Allow only hosts on the ProductionVLAN to access the vty lines of Atom.
  • No other internal and Internet hosts should be able to access the vty lines of Atom.
  • Your solution should consist of a single ACL statement.

b. Restrict access to the internal web server

  • Create a named standard ACL using the name INT-WEB. Be sure that you use this name exactly as it appears in these instructions.
  • Allow hosts on the Researchand Production VLANs to reach the internal administrative web server at int.com.
  • No other internal and Internet hosts should be able to access the internal administrative web server.
  • Your solution should consist of two ACL statements.
 Step 10: Verify Connectivity

Verify your configurations according to the following guidelines:

    • Hosts in VLANs 20, 40, and 60 can ping each other.
    • Hosts in VLANs 20, 40, and 60 can visit the external web server www.cisco.com.
    • Hosts in VLAN 40 and 60 can visit the administrative web server www.int.com.
    • Hosts in VLAN 60 can telnet into Atom
    • Hosts in VLANs 20 and 40 cannot telnet to Atom.

Intructions – Answer 100%

Router 1: HQ or Atom

[[R1name]]#enable
[[R1name]]#conf ter
[[R1name]](config)#hostname HQ (or Atom)
HQ(config)#no ip domain-lookup 
HQ(config)#enable secret cisco

HQ(config)#line console 0
HQ(config-line)#password cisco
HQ(config-line)#login

HQ(config-line)#line vty 0 15
HQ(config-line)#password cisco
HQ(config-line)#login
HQ(config-line)#exit

HQ(config)#int g0/0.20
HQ(config-subif)#encapsulation dot1Q 20
HQ(config-subif)#ip address 172.16.20.254 255.255.255.0

HQ(config-subif)#int g0/0.40
HQ(config-subif)#encapsulation dot1Q 40
HQ(config-subif)#ip address 172.16.40.254 255.255.255.0

HQ(config-subif)#int g0/0.60
HQ(config-subif)#encapsulation dot1Q 60
HQ(config-subif)#ip address 172.16.60.254 255.255.255.0

HQ(config-subif)#int g0/0.88
HQ(config-subif)#encapsulation dot1Q 88
HQ(config-subif)#ip address 172.16.88.254 255.255.255.0

HQ(config-subif)#int g0/0
HQ(config-if)#no sh

HQ(config-if)#int g0/1.250
HQ(config-subif)#encapsulation dot1Q 250
HQ(config-subif)#ip address 172.16.250.254 255.255.255.0

HQ(config-subif)#int g0/1.254
HQ(config-subif)#encapsulation dot1Q 254
HQ(config-subif)#ip address 172.16.254.254 255.255.255.0

HQ(config-subif)#int g0/1
HQ(config-if)#no shutdown 
HQ(config-if)#exit

HQ(config)#access-list 10 permit 172.16.60.0 0.0.0.255
HQ(config)#access-list 10 deny any
HQ(config)#ip access-list standard INT-WEB
HQ(config-std-nacl)#permit 172.16.40.0 0.0.0.255
HQ(config-std-nacl)#permit 172.16.60.0 0.0.0.255

HQ(config-std-nacl)#exit 
HQ(config)#line vty 0 15
HQ(config-line)#access-class 10 in
HQ(config-line)#exit 

HQ(config)#int g0/1.250
HQ(config-subif)#ip access-group INT-WEB out 
HQ(config-subif)#

Switch 1: Mgmt or Neutron

[[SW1name]]>en
[[SW1name]]#conf ter
[[SW1name]](config)#hostname Mgmt (or Neutron)
Mgmt(config)#no ip domain-lookup 
Mgmt(config)#enable secret cisco
Mgmt(config)#line console 0
Mgmt(config-line)#password cisco
Mgmt(config-line)#login
Mgmt(config-line)#line vty 0 15
Mgmt(config-line)#password cisco
Mgmt(config-line)#login
Mgmt(config-line)#exit 
Mgmt(config)#service password-encryption 
Mgmt(config)#vlan 20
Mgmt(config-vlan)#name Clerical
Mgmt(config-vlan)#vlan 40
Mgmt(config-vlan)#name Acct
Mgmt(config-vlan)#vlan 60
Mgmt(config-vlan)#name HR
Mgmt(config-vlan)#vlan 88
Mgmt(config-vlan)#name NetAdmin
Mgmt(config-vlan)#exit

Mgmt(config)#int vlan 88
Mgmt(config-if)#ip add 172.16.88.253 255.255.255.0
Mgmt(config-if)#no shutdown 
Mgmt(config-if)#exit 
Mgmt(config)#ip default-gateway 172.16.88.254
Mgmt(config)#vtp domain School

Mgmt(config)#int g0/1
Mgmt(config-if)#switchport mode trunk 
Mgmt(config-if)#int range f0/23-24
Mgmt(config-if-range)#switchport mode trunk 
Mgmt(config-if-range)#

Switch 2: Acct or Proton

[[SW2name]]>en
[[SW2name]]#conf ter
[[SW2name]](config)#hostname Acct (or Proton)
Acct(config)#vlan 20
Acct(config-vlan)#name Clerical
Acct(config-vlan)#vlan 40
Acct(config-vlan)#name Acct
Acct(config-vlan)#vlan 60
Acct(config-vlan)#name HR
Acct(config-vlan)#vlan 88
Acct(config-vlan)#name NetAdmin
Acct(config-vlan)#exit

Acct(config)#int range fastEthernet 0/1-5
Acct(config-if-range)#switchport mode access 
Acct(config-if-range)#switchport access vlan 20
Acct(config-if-range)#int range fastEthernet 0/6-10
Acct(config-if-range)#switchport mode access 
Acct(config-if-range)#switchport access vlan 40
Acct(config-if-range)#int range fastEthernet 0/11-15
Acct(config-if-range)#switchport mode access 
Acct(config-if-range)#switchport access vlan 60
Acct(config-if-range)#exit
Acct(config)#int vlan 88
Acct(config-if)#ip add 172.16.88.252 255.255.255.0
Acct(config-if)#no sh
Acct(config-if)#no shutdown 
Acct(config-if)#exit
Acct(config)#ip default-gateway 172.16.88.254
Acct(config)#vtp domain School
Acct(config)#

Acct(config)#int f0/23
Acct(config-if)#switchport mode trunk 
Acct(config-if)#

Switch 3: HR or Electron

[[SW3name]]>en
[[SW3name]]#conf ter
[[SW3name]](config)#hostname HR (or Electron)
HR(config)#vlan 20
HR(config-vlan)#name Clerical
HR(config-vlan)#vlan 40
HR(config-vlan)#name Acct
HR(config-vlan)#vlan 60
HR(config-vlan)#name HR
HR(config-vlan)#vlan 88
HR(config-vlan)#name NetAdmin
HR(config-vlan)#exit

HR(config)#int range fa0/1-5
HR(config-if-range)#switchport mode access 
HR(config-if-range)#switchport access vlan 20
HR(config-if-range)#int range fa0/6-10
HR(config-if-range)#switchport mode access 
HR(config-if-range)#switchport access vlan 40
HR(config-if-range)#int range fa0/11-15
HR(config-if-range)#switchport mode access 
HR(config-if-range)#switchport access vlan 60
HR(config-if-range)#exit
HR(config)#int vlan 88
HR(config-if)#ip add 172.16.88.251 255.255.255.0
HR(config-if)#no shutdown 
HR(config-if)#exit 

HR(config)#ip default-gateway 172.16.88.254
HR(config)#vtp domain School

HR(config)#int f0/24
HR(config-if)#switchport mode trunk
0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x