/zxc/

Writeup LKSN ITNSA NTB 2021 - Network Actual & Future Network

Estimated Reading time: 43 minutes


Table Of Contents


Introduction

This write-up is based on the first of three questions titled “Actual Networks & Future Networks” from the NTB LKSN competition by ITNSA in 2021.

I discovered these questions while searching for lab exercises for CCNA. They consist of 20 questions that require configuring a Server, Router, Wireless Router, and Client Verification.

The skills required to solve these problems include:

This question is in .PKA format, which can be opened using Cisco Packet Tracer version 8.1.

For those interested, the questions can be downloaded from ITNSA.

Topology ITNSA Module A Cisco Packet Tracer Troubleshooting

Task 1: HQ MATARAM Server Configuration

  1. Set the IP addressing and default gateway and DNS on the HQ Server with the following conditions:
IP Address HQ Mataram Server
Gateway and DNS HQ Mataram Server
  1. Enable HTTP and HTTPS services.
Enable HTTP and HTTPS services HQ Mataram Server
  1. Enable AAA service and configure Network Configuration with Server Radius type and User Setup as given in the table below:
Client Name Client IP Key
WLC_HQ 10.0.13.4 SMKHebat2021
HQ 10.0.14.1 NTBJawara2021
Username Password
hrd1 hrd1
hrd2 hrd2
mkt1 mkt1
mkt2 mkt2
adminHQ LksNTB2021
supportHQ mandalika
Enable AAA Service HQ Mataram Server

Completed Points: 8%

Back to top


Task 2: HQ MATARAM Router Configuration

  1. Set the router’s hostname with the name “HQ”.
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname HQ
  1. Set the encapsulation protocol on the Serial0/0/0 interface connected to the ISP router through PPP and use PPP authentication using CHAP with the password “LksNTB”.
HQ(config)#int s0/0/0
HQ(config-if)#encapsulation ppp
HQ(config-if)#ppp authentication chap 
HQ(config)#username ISP password LksNTB
  1. Configure the IP addressing on the Serial0/0/0 interface connected to the ISP router with the second IP address from subnet 192.0.2.16/29.
HQ(config)#int s0/0/0
HQ(config-if)#ip address 192.0.2.18 255.255.255.248
HQ(config-if)#no shut
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up
HQ(config-if)#description TO ISP
  1. Configure the IP addressing on the GigabitEthernet0/1 interface connected to the HQ Server with the first IP address from subnet 10.0.14.0/30.
HQ(config)#int g0/1
HQ(config-if)#ip address 10.0.14.1 255.255.255.252
HQ(config-if)#no shut
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up
HQ(config-if)#description TO HQ Server
  1. Create a subinterface on the GigabitEthernet0/0 interface that implements the IEEE 802.1Q encapsulation protocol and configure the router-on-stick for VLAN communication.
    The following conditions are used to assign IP addresses to each subinterface:

    • Subinterface GigabitEthernet0/0.11 for VLAN 11 HRD with the first IP address of the subnet address 10.0.11.0/24.
    • Subinterface GigabitEthernet0/0.12 for VLAN 12 MARKETING with the first IP address of the subnet address 10.0.12.0/24.
    • Subinterface GigabitEthernet0/0.13 for VLAN 13 NATIVE is configured as a native VLAN and utilizes the first IP address in the subnet address 10.0.13.0/24.
HQ(config)#int g0/0
HQ(config-if)#description ROUTER-ON-STICK
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
HQ(config-if)#no shut
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to up

HQ(config-if)#int g0/0.11
%LINK-5-CHANGED: Interface GigabitEthernet0/0.11, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0.11, changed state to up
HQ(config-subif)#description VLAN 11 HRD
HQ(config-subif)#encapsulation dot1Q 11 
HQ(config-subif)#ip address 10.0.11.1 255.255.255.0

HQ(config)#int g0/0.12
%LINK-5-CHANGED: Interface GigabitEthernet0/0.12, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0.12, changed state to up
HQ(config-subif)#description VLAN 12 MARKETING
HQ(config-subif)#encapsulation dot1Q 12
HQ(config-subif)#ip address 10.0.12.1 255.255.255.0

HQ(config)#int g0/0.13
%LINK-5-CHANGED: Interface GigabitEthernet0/0.13, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0.13, changed state to up
HQ(config-subif)#description VLAN 13 NATIVE
HQ(config-subif)#encapsulation dot1Q 13 native 
HQ(config-subif)#ip address 10.0.13.1 255.255.255.0
  1. Creating a DHCP Server:

    • Pool name “HRD” for VLAN 11 with subnet 10.0.11.0/24.
    • Pool name “MARKETING” for VLAN 12 with subnet 10.0.12.0/24.
    • Pool name “NATIVE” for VLAN 13 with subnet 10.0.13.0/24.

    The TCP/IP parameters configured on each pool are as follows:

    • The DHCP Client obtains the default gateway by using the first IP address of each VLAN.
    • DNS for the entire pool utilizes the DNS ROOT Server’s IP address, which is 192.0.2.1.
    • The IP address distribution of the Wireless Controller WLC HQ is also carried out for the “NATIVE” pool, specifically using the fourth IP address of the 10.0.13.0/24 subnet, so that the LeighWeight Access Point (LWAP) can register automatically.

    For each pool, specify the IP address that is not leased to the DHCP Client:

    • The initial IP address of the VLAN 11 HRD and VLAN 12 MARKETING subnet addresses.
    • The first through fourth IP addresses of VLAN 13 NATIVE’s subnet addresses.
HQ(config)#ip dhcp pool HRD
HQ(dhcp-config)#network 10.0.11.0 255.255.255.0
HQ(dhcp-config)#default-router 10.0.11.1
HQ(dhcp-config)#dns-server 192.0.2.1

HQ(config)#ip dhcp pool MARKETING
HQ(dhcp-config)#network 10.0.12.0 255.255.255.0
HQ(dhcp-config)#default-router 10.0.12.1
HQ(dhcp-config)#dns-server 192.0.2.1

HQ(config)#ip dhcp pool NATIVE
HQ(dhcp-config)#network 10.0.13.0 255.255.255.0
HQ(dhcp-config)#default-router 10.0.13.1
HQ(dhcp-config)#dns-server 192.0.2.1
HQ(dhcp-config)#option 43 ip 10.0.13.4
        
HQ(config)#ip dhcp excluded-address 10.0.11.1
HQ(config)#ip dhcp excluded-address 10.0.12.1
HQ(config)#ip dhcp excluded-address 10.0.13.1 10.0.13.4
  1. Set the default route to the ISP using the gateway of the first IP address in the subnet 192.0.2.16/29 used by the ISP router’s Serial0/0/0 interface.
HQ(config)#ip route 0.0.0.0 0.0.0.0 192.0.2.17
  1. Create an Extended Named ACL with the name “ALLOW-INTERNET” and the following conditions:

    • Allow any source to send queries to the DNS server with the Public IP address 192.0.2.1 to translate domain names to IP addresses and vice versa.
    • Allow Internet access ONLY to the gmail.com email service with a Public IP address of 192.0.2.5 for all hosts in VLAN 11 HRD with a subnet address of 10.0.11.0/24.
      Ensure that only emails from gmail.com can be sent and received by the hosts on that VLAN.
    • Allow Internet connectivity to all hosts on VLAN 12 MARKETING with subnet address 10.0.12.0/24 and VLAN 13 NATIVE with subnet address 10.0.13.0/24.
HQ(config)#ip access-list extended ALLOW-INTERNET
HQ(config-ext-nacl)#permit udp any host 192.0.2.1 eq 53 (Query DNS) 
HQ(config-ext-nacl)#permit tcp 10.0.11.0 0.0.0.255 192.0.2.5 0.0.0.0 eq 25  (Email)
HQ(config-ext-nacl)#permit tcp 10.0.11.0 0.0.0.255 192.0.2.5 0.0.0.0 eq 110 (Email) 
HQ(config-ext-nacl)#permit tcp 10.0.12.0 0.0.0.255 0.0.0.0 255.255.255.255  (Internet)
HQ(config-ext-nacl)#permit tcp 10.0.13.0 0.0.0.255 0.0.0.0 255.255.255.255  (Internet)
  1. Set NAT Overload or Port Address Translation (PAT) for Standard Named ACL “ALLOW-INTERNET”.
HQ(config)#int s0/0/0
HQ(config-if)#ip nat outside
HQ(config)#int ra g0/0.11 - g0/0.13
HQ(config-if-range)#ip nat inside
HQ(config)#ip nat inside source list ALLOW-INTERNET interface s0/0/0 overload
  1. Set static NAT so that ONLY HTTP and HTTPS services on the HQ server with Private IP address 10.0.14.2 are translated to Public IP address 192.0.2.19.
HQ(config)#ip nat inside source static 10.0.14.2 192.0.2.19
HQ(config)#int g0/1
HQ(config-if-range)#ip nat inside
  1. Set up the HQ router to synchronize time with the NTP Server at IP address 192.0.2.2 and use md5 authentication with key 46 and password “NTBHebat2021”.
HQ(config)#ntp server 192.0.2.2 key 46
HQ(config)#ntp authentication-key 46 md5 NTBHebat2021
HQ(config)#ntp trusted-key 46
  1. Set the privilege mode password with the secret “LksNTB2021”.
HQ(config)#enable secret LksNTB2021
  1. Set the DNS server of the HQ router with IP address 192.0.2.1.
HQ(config)#ip name-server 192.0.2.1
  1. Enable SSH version 2 on the HQ router with the domain name “mandalika.id” and create RSA keys with modulus 1024.
HQ(config)#ip domain-name mandalika.id
HQ(config)#ip ssh version 2
HQ(config)#crypto key generate rsa general-keys modulus 1024
% You already have RSA keys defined named HQ.mandalika.id
% They will be replaced.

% The key modulus size is 1024 bits
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
HQ(config)#
*Jul 22 14:10:45.255: %SSH-5-ENABLED: SSH 2 has been enabled
  1. Create a local authentication account on the HQ router with username “admin” and password “LksNTB2021”.
    This account is a backup when authentication to the Radius server has problems.
HQ(config)#username admin privilege 15 secret LksNTB2021
HQ(config)#line vty 0 4
HQ(config-line)#login local
HQ(config-line)#transport input ssh
HQ(config)#line console 0
HQ(config-line)#login local
HQ(config)#line aux 0
HQ(config-line)#login local
  1. Enabled the AAA feature on the HQ router and set the default authentication to use the “local” database.
HQ(config)#aaa new-model
HQ(config)#aaa authentication login default local
  1. Creating a user login authentication list with the name “SERVER-AAA” that uses the Radius authentication method first, followed by “local”.
HQ(config)#aaa authentication login SERVER-AAA group RADIUS local
  1. Connect to the Radius Server with the second IP address of the subnet 10.0.14.0/30 and use the secret “NTBJawara2021”.
HQ(config)#radius server SERVER-AAA 
HQ(config-RADIUS-server)#address ipv4 10.0.14.2 auth-port 1645
HQ(config-RADIUS-server)#key NTBJawara2021
  1. Set the HQ router to only accept remote access via SSH with a maximum number of sessions for 5 (five) users simultaneously and using the authentication list “SERVER-AAA”.
HQ(config)#line vty 0 4
HQ(config-line)#login authentication SERVER-AAA
HQ(config-line)#session-limit 5
  1. Set the console access to the router also to use the authentication list “SERVER-AAA” AUTHENTICATION LIST.
HQ(config)#line con 0
HQ(config-line)#login authentication SERVER-AAA
  1. Verify the configuration that has been done to ensure that it is following the requirements.
HQ#sh run
Building configuration...

Current configuration : 2932 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname HQ
!
enable secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
ip dhcp excluded-address 10.0.11.1
ip dhcp excluded-address 10.0.12.1
ip dhcp excluded-address 10.0.13.1 10.0.13.4
!
ip dhcp pool HRD
network 10.0.11.0 255.255.255.0
default-router 10.0.11.1
dns-server 192.0.2.1
ip dhcp pool MARKETING
network 10.0.12.0 255.255.255.0
default-router 10.0.12.1
dns-server 192.0.2.1
ip dhcp pool NATIVE
network 10.0.13.0 255.255.255.0
default-router 10.0.13.1
dns-server 192.0.2.1
!
aaa new-model
!
aaa authentication login SERVER-AAA group RADIUS local 
aaa authentication login default local 
!
no ip cef
no ipv6 cef
!
username ISP password 0 LksNTB
username admin privilege 15 secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
license udi pid CISCO1941/K9 sn FTX1524O1D2-
license boot module c1900 technology-package securityk9
!
ip ssh version 2
ip domain-name mandalika.id
ip name-server 192.0.2.1
!
spanning-tree mode pvst
!
interface GigabitEthernet0/0
description ROUTER-ON-STICK
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/0.11
description VLAN 11 HRD
encapsulation dot1Q 11
ip address 10.0.11.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/0.12
description VLAN 12 MARKETING
encapsulation dot1Q 12
ip address 10.0.12.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/0.13
description VLAN 13 NATIVE
encapsulation dot1Q 13 native
ip address 10.0.13.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/1
description TO HQ SERVER
ip address 10.0.14.1 255.255.255.252
ip nat inside
duplex auto
speed auto
!
interface Serial0/0/0
description TO ISP
ip address 192.0.2.18 255.255.255.248
encapsulation ppp
ppp authentication chap
ip nat outside
!
interface Serial0/0/1
no ip address
clock rate 2000000
shutdown
!
interface Vlan1
no ip address
shutdown
!
ip nat inside source list ALLOW-INTERNET interface Serial0/0/0 overload
ip nat inside source static 10.0.14.2 192.0.2.19 
ip classless
ip route 0.0.0.0 0.0.0.0 192.0.2.17 
!
ip flow-export version 9
!
ip access-list extended ALLOW-INTERNET
permit udp any host 192.0.2.1 eq domain
permit tcp 10.0.11.0 0.0.0.255 host 192.0.2.5 eq smtp
permit tcp 10.0.11.0 0.0.0.255 host 192.0.2.5 eq pop3
permit tcp 10.0.12.0 0.0.0.255 any
permit tcp 10.0.13.0 0.0.0.255 any
!
no cdp run
!
radius server SERVER-AAA
address ipv4 10.0.14.2 auth-port 1645
key NTBJawara2021
radius server 10.0.14.2
address ipv4 10.0.14.2 auth-port 1645
key NTBJawara2021
!
line con 0
login authentication SERVER-AAA
!
line aux 0
!
line vty 0 4
session-limit 5
login authentication SERVER-AAA
transport input ssh
!
ntp authentication-key 46 md5 080F786C211C071606595C567B 7
ntp trusted-key 46
ntp server 192.0.2.2 key 46
!
end

HQ#

Completed Points: 19%

Back to top


Task 3: SW_HQ_L1 Switch Configuration at HQ MATARAM

  1. Set the hostname of the Switch with the name “SW_HQ_L1”.
Switch>en
Switch#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Switch(config)#hostname SW_HQ_L1
  1. Set the VTP with the domain name “MANDALIKA” and password using “LksNTB”.
SW_HQ_L1(config)#vtp domain MANDALIKA
Changing VTP domain name from NULL to MANDALIKA
SW_HQ_L1(config)#vtp password LksNTB
Setting device VLAN database password to LksNTB
  1. Creating new VLANs, among others:
    • VLAN 11 with the name HRD.
    • VLAN 12 with the name MARKETING.
    • VLAN 13 with the name NATIVE.
SW_HQ_L1(config)#vlan 11
SW_HQ_L1(config-vlan)#name HRD
SW_HQ_L1(config-vlan)#vlan 12
SW_HQ_L1(config-vlan)#name MARKETING
SW_HQ_L1(config-vlan)#vlan 13
SW_HQ_L1(config-vlan)#name NATIVE
SW_HQ_L1#sh vlan
VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
11   HRD                              active    
12   MARKETING                        active    
13   NATIVE                           active    
  1. Set the IP addressing on the VLAN 13 interface with the second IP address of the subnet address 10.0.13.0/24.
SW_HQ_L1(config)#int vlan 13
%LINK-5-CHANGED: Interface Vlan13, changed state to up
SW_HQ_L1(config-if)#ip address 10.0.13.2 255.255.255.0
  1. Set the default gateway using the first IP address of the subnet address 10.0.13.0/24, one of the IP addresses on the HQ router, so that it can communicate with different networks.
SW_HQ_L1(config)#ip default-gateway 10.0.13.1
  1. Assign port FastEthernet0/1 to be a member of VLAN 13.
SW_HQ_L1(config)#int fa0/1 
SW_HQ_L1(config-if)#switchport mode access 
SW_HQ_L1(config-if)#switchport access vlan 13
%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan13, changed state to up
  1. Enable port mode to trunk for interfaces FastEthernet0/10, FastEthernet0/11, GigabitEthernet0/1 and GigabitEthernet0/2. Notes: VLAN 13 is enabled as a native VLAN.
SW_HQ_L1(config)#int ra fa0/10 - fa0/11
SW_HQ_L1(config-if-range)#switchport mode trunk 
SW_HQ_L1(config-if-range)#switchport trunk native vlan 13 
SW_HQ_L1(config-if-range)#switchport trunk allowed vlan 11,12,13

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed state to up

SW_HQ_L1(config)#int ra g0/1 - g0/2
SW_HQ_L1(config-if-range)#switchport mode trunk
SW_HQ_L1(config-if-range)#switchport trunk native vlan 13 
SW_HQ_L1(config-if-range)#switchport trunk allowed vlan 11,12,13

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/2, changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/2, changed state to up
  1. Verify the configuration that has been done to ensure that it is following the requirements.
SW_HQ_L1#sh run
Building configuration...

Current configuration : 1591 bytes
!
version 15.0
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname SW_HQ_L1
!
spanning-tree mode pvst
spanning-tree extend system-id
!
interface FastEthernet0/1
switchport access vlan 13
switchport mode access
!
interface FastEthernet0/10
switchport trunk native vlan 13
switchport trunk allowed vlan 11-13
switchport mode trunk
!
interface FastEthernet0/11
switchport trunk native vlan 13
switchport trunk allowed vlan 11-13
switchport mode trunk
!
interface GigabitEthernet0/1
switchport trunk native vlan 13
switchport trunk allowed vlan 11-13
switchport mode trunk
!
interface GigabitEthernet0/2
switchport trunk native vlan 13
switchport trunk allowed vlan 11-13
switchport mode trunk
!
interface Vlan1
no ip address
shutdown
!
interface Vlan13
ip address 10.0.13.2 255.255.255.0
!
ip default-gateway 10.0.13.1
!
line con 0
!
line vty 0 4
login
line vty 5 15
login
!
end

SW_HQ_L1#

Completed Points: 5%

Back to top


Task 4: SW_HQ_L2 Switch Configuration at HQ MATARAM

  1. Set the hostname of the Switch with the name “SW_HQ_L2”.
Switch#en
Switch#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Switch(config)#hostname SW_HQ_L2
  1. Set up VTP with Client mode, domain name “MANDALIKA” and password using “LksNTB”.
SW_HQ_L2(config)#vtp mode client 
Setting device to VTP CLIENT mode.
SW_HQ_L2(config)#vtp domain MANDALIKA
Changing VTP domain name from NULL to MANDALIKA
SW_HQ_L2(config)#vtp password LksNTB
Setting device VLAN database password to LksNTB
  1. Set the IP addressing on interface VLAN 13 with the third IP address from subnet address 10.0.13.0/24.
SW_HQ_L2(config)#int vlan 13
SW_HQ_L2(config-if)#ip address 10.0.13.3 255.255.255.0
  1. Set the default gateway using the first IP address of the subnet address 10.0.13.0/24, one of the IP addresses on the HQ router, so that it can communicate with different networks.
SW_HQ_L2(config)#ip default-gateway 10.0.13.1
  1. Enable port mode to trunk for the FastEthernet0/20 and GigabitEthernet0/2 interfaces.
    Notes: VLAN 13 is enabled as a native VLAN.
SW_HQ_L2(config)#int fa0/20
SW_HQ_L2(config-if)#switchport mode trunk
SW_HQ_L2(config-if-range)#switchport trunk native vlan 13 
SW_HQ_L2(config-if-range)#switchport trunk allowed vlan 11,12,13
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/20, changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/20, changed state to up

SW_HQ_L2(config-if)#int g0/2
SW_HQ_L2(config-if)#switchport mode trunk
SW_HQ_L2(config-if-range)#switchport trunk native vlan 13 
SW_HQ_L2(config-if-range)#switchport trunk allowed vlan 11,12,13
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/2, changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/2, changed state to up
  1. Verify the configuration that has been done to ensure that it is following the requirements
SW_HQ_L2#sh run
Building configuration...

Current configuration : 1354 bytes
!
version 15.0
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname SW_HQ_L2
!
spanning-tree mode pvst
spanning-tree extend system-id
!
interface FastEthernet0/20
switchport trunk native vlan 13
switchport trunk allowed vlan 11-13
switchport mode trunk
!
interface GigabitEthernet0/2
switchport trunk native vlan 13
switchport trunk allowed vlan 11-13
switchport mode trunk
!
interface Vlan1
no ip address
shutdown
!
interface Vlan13
ip address 10.0.13.3 255.255.255.0
!
ip default-gateway 10.0.13.1
!
line con 0
!
line vty 0 4
login
line vty 5 15
login
!
end

SW_HQ_L2#

Completed Points: 3%

Back to top


Task 5: Admin2 PC Configuration and Verification at HQ MATARAM

  1. Set up the DHCP Client on the Admin2 PC at the MATARAM head office.
    Ensure the PC successfully obtains dynamic IP addressing from the DHCP Server.
PC Admin2 Successful obtained DHCP
  1. Verify PC Admin2 to Switch SW_HQ_L1 and Router HQ using Simple PDU.
    Make sure the connection is successful.
SimplePDU connection to SW and RouterHQ Successful

Completed Points: 0%

Back to top


Task 6: WLC Configuration at HQ MATARAM

  1. Perform the initial setup on the WLC HQ using the browser from the PC Admin1 desktop by entering the WLC’s IP address, which is http://192.168.1.1.
    Create a new administrator account with the username “admin” and the password “LksNTB2021.”
Initial WLC Setup at PC Admin1
  1. Configure the Controller with the following conditions:

    • System Name: WLC_HQ
    • Management IP Address: using the 4th IP address from subnet 10.0.13.0/24
    • Default Gateway: using the 1st IP address from subnet 10.0.13.0/24
    • Management VLAN ID: 1
    • WLAN configuration with Network Name “TEST” and Passphrase “LksNTB2021”.
Wireless Setup for WLC HQ
Controller Setup for WLC HQ
  1. After the initial setup is completed, the WLC_HQ configuration can be done through a browser from the PC_Admin2 desktop by accessing the IP address of the WLC via HTTPS, https://10.0.13.4.
    Login using username “admin” and password “LksNTB2021”.
Access WLC from PC Admin2
  1. Delete the WLAN with Network Name “TEST”.
Delete WLAN TEST
  1. Configure a new VLAN interface on the WLC with the following requirements:
Interface VLAN Port IP Address Gateway
INT-WLAN-11 11 1 10.0.11.254/24 10.0.11.1
INT-WLAN-12 12 1 10.0.12.254/24 10.0.12.1
WLC HQ VLAN 11
WLC HQ VLAN 12
  1. Configure the WLC to authenticate WLAN users using a RADIUS server with the subnet’s second IP address, 10.0.14.0/30, and the shared secret “SMKHebat2021”.
WLC HQ Radius Setup
  1. Configure a new WLAN on the WLC with the following requirements:
Profile Name SSID ID Interface FlexConnect
PROF-WLAN-11-HRD HRD-MANDALIKA 1 INT-WLAN-11 Local Switching & Local Auth
PROF-WLAN-12-MARKETING MARKETING-MANDALIKA 2 INT-WLAN-12 Local Switching & Local Auth
WLC HQ WLAN 11 HRD SETUP
WLC HQ WLAN 11 FLEX SETUP
WLC HQ WLAN 11 AAA SETUP
WLC HQ WLAN 12 MARKETING SETUP
WLC HQ WLAN 12 FLEX SETUP
WLC HQ WLAN 12 AAA SETUP
  1. Use WPA2-Enterprise to secure each WLAN.
WLC HQ WLAN 11 SECURITY SETUP
WLC HQ WLAN 12 SECURITY SETUP

Completed Points: 8%

Back to top


Task 7: LWAP Configuration at HQ MATARAM

  1. Configure IP addressing dynamically or as a DHCP Client on LWAP_HQ_L1 and LWAP_HQ_L2.
    Double-check the setup to ensure that each LWAP has received dynamic IP addresses from the DHCP Server.
LWAP HQ L1 DHCP Success
LWAP HQ L1 DHCP 2 Success
LWAP HQ L2 DHCP Success
LWAP HQ L2 DHCP 2 Success
  1. Also, check that the CWAP Status of each LWAP indicates that it has successfully connected to the IP address of the WLC HQ and provides two WLANs, HRD-MANDALIKA and MARKETING-MANDALIKA.
LWAP HQ L1 CAPWAP Success
LWAP HQ L1 CAPWAP Success

Completed Points: 0%

Back to top


Task 8: End Device Configuration and Verification on HRD and MARKETING VLANs at HQ MATARAM

  1. Set the DHCP Client on the Wireless0 interface of each End Device on VLAN HRD and MARKETING, namely Laptop_HRD1, Laptop_HRD2, Laptop_MKT1, and Laptop_MKT2, to get dynamic IP addressing from the DHCP Server.

    Use an authentication account as mentioned in the table below:
    Connect Laptop_HRD1 and Laptop_HRD2 in VLAN HRD to LWAP with SSID “HRD-MANDALIKA” and Wireless Security Configuration WPA2-Enterprise.

Login Name Password Device Name
hrd1 hrd1 Laptop_HRD1
hrd2 hrd2 Laptop_HRD2

LAPTOP HRD1 DHCP Success
LAPTOP HRD2 DHCP Success

Connect Laptop_MKT1 and Laptop_MKT2 in VLAN MARKETING to LWAP with SSID “MARKETING-MANDALIKA” with Wireless Security Configuration WPA2-Enterprise.
Use an authentication account, as shown in the following table:

Login Name Password Device Name
mkt1 mkt1 Laptop_MKT1
mkt2 mkt2 Laptop_MKT2
LAPTOP MKT1 DHCP Success
LAPTOP MKT2 DHCP Success
  1. Using a simple PDU, check the connections between each laptop and the other laptop in the HQ MATARAM.
    Check that the connection is working properly.
SimplePDU from LAPTOP 1 and LAPTOP 2
  1. Check the Internet connection of Laptop_HRD1 and Laptop_HRD2 in VLAN MARKETING by sending an email to external@gmail.com.
    The title and email message used for testing can be chosen independently.
    Check that the email is properly sent from Laptop HRD1 and Laptop HRD2.
LAPTOP HRD1 and LAPTOP HRD2 send email to external@gmail.com
  1. Verify that the emails sent from Laptop_HRD1 and Laptop_HRD2 were successfully received via PC Client Internet on the Internet subnet.
    Respond to each of these emails.
PC Client internet successfully received email from LAPTOP1 and LAPTOP2
  1. Verify that the email has been downloaded successfully from Laptop_HRD1 and Laptop_HRD2.
LAPTOP HRD1 and LAPTOP HRD2 succesfuly reply email from PC Client Internet
  1. Verify the Internet connection of Laptop_MKT1 and Laptop_MKT2 in VLAN MARKETING using a browser by visiting ntbprov.go.id, ditpsmk.net, gmail.com, and universitasbumigora.ac.id.
    Check that the connection is working properly.
LAPTOP MKT1 and LAPTOP MKT2 successfuly access gmail.com and universitasbumigora.ac.id
LAPTOP MKT1 and LAPTOP MKT2 successfuly access ntbprov.go.id and ditpsmk.net

Completed Points: 0%

Back to top


Task 9: BRANCH SUMBAWA Server Configuration

  1. Set the IP addressing and default gateway and DNS on the BRANCH Server with the following conditions:
IP Address BRANCH Sumbawa Server
Gateway and DNS BRANCH Sumbawa Server
  1. Enable HTTP and HTTPS services.
Enable HTTP and HTTPS services BRANCH Sumbawa Server
  1. Enable AAA service and configure Network Configuration with Server Radius type and User Setup as given in the table below:
Client Name Client IP Key
BRANCH 10.0.13.4 SMKHebat2021
SW_BRANCH 10.0.14.1 NTBJawara2021
WRT_BRANCH 10.10.15.3 SMKBisa2021
Username Password
sales1 hrd1
sales2 hrd2
engineer1 mkt1
engineer2 mkt2
adminBRANCH LksNTB2021
helpdeskBRANCH mandalika
Enable AAA Service HQ Mataram Server

Completed Points: 10%

Back to top


Task 10: BRANCH SUMBAWA Router Configuration

  1. Set the router’s hostname with the name “BRANCH”.
Router>en
Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#hostname BRANCH
  1. Set the encapsulation protocol on the Serial0/0/1 interface connected to the ISP router through PPP and use PPP authentication using CHAP with the password “LksNTB”.
BRANCH(config)#int s0/0/1
BRANCH(config-if)#encapsulation ppp
BRANCH(config-if)#ppp authentication chap
BRANCH(config-if)#exit
BRANCH(config)#username ISP password LksNTB
  1. Configure the IP addressing on the Serial0/0/1 interface connected to the ISP router with the second IP address from subnet 192.0.2.24/29.
BRANCH(config)#int s0/0/1
BRANCH(config-if)#ip address 192.0.2.26 255.255.255.248
BRANCH(config-if)#no shut
%LINK-5-CHANGED: Interface Serial0/0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/1, changed state to up
  1. Create a subinterface on the GigabitEthernet0/0 interface that implements the IEEE 802.1Q encapsulation protocol and configure the router-on-stick for VLAN communication.
    The following conditions are used to assign IP addresses to each subinterface:

    • Subinterface GigabitEthernet0/0.1 for VLAN 1 NATIVE with the first IP address of the subnet address 10.0.15.0/29.
    • Subinterface GigabitEthernet0/0.2 for VLAN 2 SALES with the first IP address of the subnet address 10.0.15.16/28.
BRANCH(config)#int g0/0
BRANCH(config-if)#description ROUTER-ON-STICK
BRANCH(config-if)#no shut
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to up

%LINK-5-CHANGED: Interface GigabitEthernet0/0.1, changed state to up
BRANCH(config)#int g0/0.1
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0.1, changed state to up
BRANCH(config-subif)#encapsulation dot1Q 1
BRANCH(config-subif)#ip address 10.0.15.1 255.255.255.248

BRANCH(config)#int g0/0.2
%LINK-5-CHANGED: Interface GigabitEthernet0/0.2, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0.2, changed state to up
BRANCH(config-subif)#encapsulation dot1Q 2
BRANCH(config-subif)#ip address 10.0.15.17 255.255.255.240
BRANCH(config-subif)#description SALES
BRANCH(config-subif)#exit
  1. Creating a DHCP Server:

    • Pool name “SALES” for VLAN 11 with subnet 10.0.15.16/28.

    TCP/IP parameters are set:

    • The pool includes the default gateway, which uses the subnet’s initial IP address, 10.0.15.16/28.
    • DNS server at 192.0.2.1.
    • Set the first IP address of subnet 10.0.15.16/28 to not be leased to DHCP Client.
BRANCH(config)#ip dhcp pool SALES
BRANCH(dhcp-config)#network 10.0.15.16 255.255.255.240
BRANCH(dhcp-config)#default-router 10.0.15.17
BRANCH(dhcp-config)#dns-server 192.0.2.1
BRANCH(config)#ip dhcp excluded-address 10.0.15.17
  1. Set the default route to the ISP using the gateway of the first IP address in the subnet 192.0.2.24/29 used by the ISP router’s Serial0/0/1 interface.
BRANCH(config)#ip route 0.0.0.0 0.0.0.0 192.0.2.25    
  1. Create a Standard Named ACL called “ALLOW-INTERNET” that permits Internet access to all hosts on subnet addresses 10.0.15.0/29 and 10.0.15.16/28.
BRANCH(config)#ip access-list standard ALLOW-INTERNET
BRANCH(config-std-nacl)#permit 10.0.15.0 0.0.0.7
BRANCH(config-std-nacl)#permit 10.0.15.16 0.0.0.15
  1. Set NAT Overload or Port Address Translation (PAT) for Standard Named ACL “ALLOW-INTERNET”.
BRANCH(config)#int s0/0/1
BRANCH(config-if)#ip nat outside
BRANCH(config)#int ra g0/0.1 - g0/0.2
BRANCH(config-if-range)#ip nat inside
BRANCH(config)#ip nat inside source list ALLOW-INTERNET interface s0/0/1 overload
  1. Set static NAT so that ONLY HTTP and HTTPS services on the BRANCH server with Private IP address 10.0.15.4 are translated to Public IP address 192.0.2.27.
BRANCH(config)#ip nat inside source static 10.0.15.4 192.0.2.27
  1. Set up the BRANCH router to synchronize time with the NTP Server at IP address 192.0.2.2 and use md5 authentication with key 46 and password “NTBHebat2021”.
BRANCH(config)#ntp server 192.0.2.2 key 46
BRANCH(config)#ntp authentication-key 46 md5 NTBHebat2021
BRANCH(config)#ntp trusted-key 46
  1. Set the privilege mode password with the secret “LksNTB2021”.
BRANCH(config)#enable secret LksNTB2021
  1. Set the DNS server of the BRANCH router with IP address 192.0.2.1.
BRANCH(config)#ip name-server 192.0.2.1
  1. Enable SSH version 2 on the BRANCH router with the domain name “branch.mandalika.id” and create RSA keys with modulus 1024.
BRANCH(config)#ip domain-name branch.mandalika.id
BRANCH(config)#ip ssh version 2
BRANCH(config)#crypto key generate rsa general-keys modulus 1024
% You already have RSA keys defined named BRANCH.branch.mandalika.id
% They will be replaced.

% The key modulus size is 1024 bits
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
%SSH-5-ENABLED: SSH 2 has been enabled
  1. Create a local authentication account on the BRANCH router with username “admin” and password “LksNTB2021”. This account is a backup when authentication to the Radius server has problems.
BRANCH(config)#username admin privilege 15 secret LksNTB2021
BRANCH(config)#line vty 0 4
BRANCH(config-line)#login local
BRANCH(config-line)#transport input ssh
BRANCH(config)#line console 0
BRANCH(config-line)#login local
BRANCH(config)#line aux 0
BRANCH(config-line)#login local
  1. Enabled the AAA feature on the BRANCH router and set the default authentication to use the “local” database.
BRANCH(config)#aaa new-model 
BRANCH(config)#aaa authentication login default local
  1. Creating a user login authentication list with the name “SERVER-AAA” that uses the Radius authentication method first, followed by “local”.
BRANCH(config)#aaa authentication login SERVER-AAA group RADIUS local 
  1. Connect to the RADIUS Server with the fourth IP address from subnet 10.0.15.0/29 and use the secret “NTBJawara2021”.
BRANCH(config)#RADIUS server SERVER-AAA
BRANCH(config-RADIUS-server)#address ipv4 10.0.15.4 auth-port 1645
BRANCH(config-RADIUS-server)#key NTBJawara2021
  1. Set the BRANCH router to only accept remote access via SSH with a maximum number of sessions for 5 (five) users simultaneously and using the authentication list “SERVER-AAA”.
BRANCH(config)#line vty 0 4
BRANCH(config-line)#login authentication SERVER-AAA
BRANCH(config-line)#session-limit 5
  1. Set the console access to the router also to use the authentication list “SERVER-AAA” AUTHENTICATION LIST.
BRANCH(config)#line con 0
BRANCH(config-line)#login authentication SERVER-AAA
  1. Verify the configuration that has been done to ensure that it is by the requirements.
BRANCH#sh run
Building configuration...

Current configuration : 2271 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname BRANCH
!
enable secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
ip dhcp excluded-address 10.0.15.17
!
ip dhcp pool SALES
network 10.0.15.16 255.255.255.240
default-router 10.0.15.17
dns-server 192.0.2.1
!
aaa new-model
!
aaa authentication login SERVER-AAA group RADIUS local 
aaa authentication login default local 
!
no ip cef
no ipv6 cef
!
username ISP password 0 LksNTB
username admin privilege 15 secret 5 $1$mERr$MmdodDsCCQflw.d5M6q3C.
!
license udi pid CISCO1941/K9 sn FTX15243J7P-
license boot module c1900 technology-package securityk9
!
ip ssh version 2
ip domain-name branch.mandalika.id
ip name-server 192.0.2.1
!
spanning-tree mode pvst
!
interface GigabitEthernet0/0
description ROUTER-ON-STICK
no ip address
ip nat inside
duplex auto
speed auto
!
interface GigabitEthernet0/0.1
encapsulation dot1Q 1 native
ip address 10.0.15.1 255.255.255.248
ip nat inside
!
interface GigabitEthernet0/0.2
description SALES
encapsulation dot1Q 2
ip address 10.0.15.17 255.255.255.240
ip nat inside
!
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
no ip address
clock rate 2000000
shutdown
!
interface Serial0/0/1
description TO ISP
ip address 192.0.2.26 255.255.255.248
encapsulation ppp
ppp authentication chap
ip nat outside
!
interface Vlan1
no ip address
shutdown
!
ip nat inside source list ALLOW-INTERENT interface Serial0/0/1 overload
ip nat inside source static 10.0.15.4 192.0.2.27 
ip classless
ip route 0.0.0.0 0.0.0.0 192.0.2.25 
!
ip flow-export version 9
!
ip access-list standard ALLOW-INTERNET
permit 10.0.15.0 0.0.0.7
permit 10.0.15.16 0.0.0.15
!
RADIUS server SERVER-AAA
address ipv4 10.0.15.4 auth-port 1645
key NTBJawara2021
RADIUS server 10.0.15.4
address ipv4 10.0.15.4 auth-port 1645
key NTBJawara2021
!
line con 0
login authentication SERVER-AAA
!
line aux 0
!
line vty 0 4
session-limit 5
login authentication SERVER-AAA
transport input ssh
!
ntp authentication-key 46 md5 080F786C211C071606595C567B 7
ntp trusted-key 46
ntp server 192.0.2.2 key 46
!
end

BRANCH#

Completed Points: 11%

Back to top


Task 11: SW_BRANCH Switch Configuration at BRANCH SUMBAWA

  1. Set the hostname of the Switch with the name “SW_BRANCH”.
Switch>en
Switch#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Switch(config)#hostname SW_BRANCH
  1. Set the IP addressing on the VLAN 1 interface with the second IP address of the subnet address 10.0.15.0/29.
SW_BRANCH(config)#int vlan 1
SW_BRANCH(config-if)#ip address 10.0.15.2 255.255.255.248
SW_BRANCH(config-if)#no shut
%LINK-5-CHANGED: Interface Vlan1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up
  1. Set the default gateway using the first IP address of the subnet address 10.0.15.0/24, one of the IP addresses on the HQ router, so that it can communicate with different networks.
SW_BRANCH(config)#ip default-gateway 10.0.15.1
  1. Set 802.1x authentication to use a Radius AAA server with the fourth IP address of subnet 10.0.15.0/29, port 1645, and secret “NTBHebat2021.”
SW_BRANCH(config)#dot1x system-auth-control 
SW_BRANCH(config)#aaa new-model
SW_BRANCH(config)#aaa authentication dot1x default group RADIUS 
SW_BRANCH(config)#RADIUS-server host 10.0.15.4 auth-port 1645 key NTBHebat2021       
  1. Create a new VLAN with ID 2 and the name SALES.
SW_BRANCH(config)#vlan 2
SW_BRANCH(config-vlan)#name SALES
  1. Assign FastEthernet0/1 and FastEthernet0/2 ports to be members of VLAN 2.
SW_BRANCH(config)#int ra fa0/1 - fa0/2
SW_BRANCH(config-if-range)#switchport mode access
SW_BRANCH(config-if-range)#switchport access vlan 2
  1. Assign FastEthernet0/1 and FastEthernet0/2 ports to run EAPoL (802.1x).
SW_BRANCH(config)#int ra fa0/1 - fa0/2
SW_BRANCH(config-if-range)#authentication port-control auto
SW_BRANCH(config-if-range)#dot1x pae authenticator
  1. Enable trunk port mode for the GigabitEthernet0/2 interface attached to the BRANCH SUMBAWA router.
SW_BRANCH(config)#int g0/2
SW_BRANCH(config-if)#switchport mode trunk 
SW_BRANCH(config-if)#description BRANCH SUMBAWA
  1. Verify the configuration that has been done to ensure that it is following the requirements.
SW_BRANCH#
%SYS-5-CONFIG_I: Configured from console by console

SW_BRANCH#sh run 
Building configuration...

Current configuration : 1551 bytes
!
version 15.0
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname SW_BRANCH
!
aaa new-model
!
aaa authentication dot1x default group RADIUS 
!
dot1x system-auth-control
spanning-tree mode pvst
spanning-tree extend system-id
!
interface FastEthernet0/1
switchport access vlan 2
switchport mode access
authentication port-control auto
dot1x pae authenticator
!
interface FastEthernet0/2
switchport access vlan 2
switchport mode access
authentication port-control auto
dot1x pae authenticator
!
interface GigabitEthernet0/2
description BRANCH SUMBAWA
switchport mode trunk
!
interface Vlan1
ip address 10.0.15.2 255.255.255.248
!
ip default-gateway 10.0.15.1
!
RADIUS-server host 10.0.15.4 auth-port 1645 key NTBHebat2021
!
line con 0
login
!
line vty 0 4
line vty 5 15
!
end

SW_BRANCH#

Completed Points: 3%

Back to top


Task 12: DHCP Client Configuration and Internet Connection Verification on VLAN 2 SALES PC at BRANCH SUMBAWA

  1. Configure each PC in VLAN 2 SALES Sumbawa BRANCH as a DHCP client and enable 802.1x security features with authentication accounts, as shown in the table below:
PC User Key
PC_Sales1 sales1 sales1
PC_Sales2 sales2 sales2
  1. Verify that each PC on each VLAN has received a dynamic IP address from the DHCP Server.
DHCP PC SALES1 using 802.1x auth
DHCP PC SALES2 using 802.1x auth
  1. Using Simple PDU, verify the connection between PC SALES1 and PC SALES2 as well as the BRANCH SUMBAWA router.
    Check that the connection is working properly.
DHCP PC SALES1 using 802.1x auth
  1. Use a browser to test the Internet connection of each PC in VLAN 2 SALES by visiting ntbprov.go.id, ditpsmk.net, gmail.com, and universitasbumigora.ac.id.
    Check that the connection is working properly.
Client access to ntbprov.go.id and ditpsmk.net is success
DHCP PC SALES1 using 802.1x auth
  1. After completing the NAT configuration on the HQ MATARAM router, access to the HQ Server can be verified by visiting “mandalika.id” Check that the connection is working properly.
Client access to mandalika.id is success

Completed Points: 0%

Back to top


Task 13: WRT_BRANCH Wireless Router Configuration at BRANCH SUMBAWA

  1. In Internet Setup, configure the IP addressing statically or manually using the following conditions:

    • Use the third IP address from subnet 10.0.15.0/29.
    • The default gateway uses the first IP address of subnet 10.0.15.0/29.
    • The DNS server is using 192.0.2.1.
WRT Internet Setup
  1. In Network Setup, configure the IP addressing statically or manually to the first IP address in subnet 10.0.15.128/25.
WRT Network Setup
  1. Enable the DHCP Server feature and assign dynamically distributed IP addresses to DHCP Clients beginning with the first IP address in subnet 10.0.15.128/25 for a maximum of 100 users.
    The DNS Server option is set to 192.0.2.1.
WRT DHCP Setup
  1. Configure the Wireless feature with the following conditions:

    • Network mode “Wireless-G Only”
    • Wireless network identifier name or SSID “ENGINEER-MANDALIKA”
    • Channel 6
    • Enable the SSID Broadcast feature.
    • WPA2 Enterprise security mode with AES encryption
    • Radius Server uses the fourth IP address from subnet 10.0.15.0/29 with the shared secret “SMKBisa2021”.
WRT Wireless Setup
WRT Security Setup

Completed Points: 4%

Back to top


Task 14: End Device Configuration and Verification at WLAN ENGINEER BRANCH SUMBAWA

  1. Set the DHCP Client on the Wireless0 interface of each End Device on the WLAN ENGINEER subnet, namely Tablet_ENGINEER1 and Tablet_ENGINEER2, to get dynamic IP addressing from the DHCP Server.

    Connect each Tablet on the ENGINEER WLAN subnet to the Wireless Access Point (AP) with the SSID “ENGINEER-MANDALIKA” and the Wireless Security Configuration WPA2-Enterprise.
    Use an authentication account as mentioned in the table below:

Device Login Name Password
Tablet_ENGINEER1 engineer1 engineer1
Tablet_ENGINEER2 engineer2 engineer2
Tablet Engineer1 Setup
Tablet Engineer2 Setup

Completed Points: 2%

Back to top


Task 15: VPN configuration on an HQ MATARAM router using GRE over IPSec and OSPF

  1. Create an Extended Named ACL with the name “INTERESTING-TRAFFIC” for:

    • Allow GRE traffic from source IP address 192.0.2.18 to destination IP address 192.0.2.26.
    • Identify IP traffic from HQ MATARAM Server, 10.0.14.2, to VLAN 2 SALES on BRANCH SUMBAWA router with subnet address 10.0.15.0/29 to the IP address as interesting traffic.
    • Identify as interesting traffic IP traffic from VLAN 11 HRD at HQ with subnet address 10.0.11.0/24 to BRANCH Server with address 10.0.15.4.
    • Identify as interesting traffic IP traffic from VLAN 12 MARKETING at HQ with subnet address 10.0.12.0/24 to the BRANCH Server with address 10.0.15.4.
HQ(config)#ip access-list extended INTERESTING-TRAFFIC
HQ(config-ext-nacl)#permit gre host 192.0.2.18 host 192.0.2.26
HQ(config-ext-nacl)#permit tcp 10.0.15.0 0.0.0.7 host 10.0.14.2
HQ(config-ext-nacl)#permit tcp 10.0.11.0 0.0.0.255 host 10.0.15.4
HQ(config-ext-nacl)#permit tcp 10.0.12.0 0.0.0.255 host 10.0.15.4
  1. Configure IKE Phase 1 ISAKMP policy with priority 46 and IKE Phase 2 IPSec policy with sequence 46 on the HQ MATARAM router using the conditions shown in table A & B below:

Table A. Parameter ISAKMP Phase 1 Policy

Parameter Router HQ MATARAM
Key Distribution Method ISAKMP
Encryption Algorithm AES 256
Hash Algorithm SHA-1
Authentication Method pre-share
Key Exchange DH 5
ISAKMP Key Mandalika
HQ(config)#crypto isakmp policy 46
HQ(config-isakmp)#encr aes 256
HQ(config-isakmp)#hash sha
HQ(config-isakmp)#authentication pre-share 
HQ(config-isakmp)#group 5 
HQ(config)#crypto isakmp key Mandalika address 192.0.2.26

Table B. Parameter ISAKMP Phase 2 Policy

Parameter Router HQ MATARAM
Transform Set Name HQ-SET
ESP Encryption esp-aes
ESP Authentication esp-sha-hmac
Peer IP Address 192.0.2.26
Traffic Encrypted Extended ACL “INTERESTING-TRAFFIC”
Crypto Map Name HQ-MAP
SA Establishment ipsec-isakmp
HQ(config)#crypto ipsec transform-set HQ-SET esp-aes esp-sha-hmac 
HQ(config)#crypto map HQ-MAP 46 ipsec-isakmp 
% NOTE: This new crypto map will remain disabled until a peer 
and a valid access list have been configured.
HQ(config-crypto-map)#set peer 192.0.2.26
HQ(config-crypto-map)#set transform-set HQ-SET
HQ(config-crypto-map)#match address INTERESTING-TRAFFIC
  1. Configure the crypto map on the outgoing Serial0/0/0 interface.
HQ(config)#int s0/0/0
HQ(config-if)#crypto map HQ-MAP
*Jan  3 07:16:26.785: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
  1. Configure a GRE Tunnel over IPSec with the following parameters:

    • Use the first IP address of the subnet 10.0.14.4/30 to set the IP address of the tunnel interface 46.
    • Configure interface Serial0/0/0 as the source and IP address 192.0.2.26 as the destination for tunnel interface 46’s endpoint.
HQ(config)#int tunnel 46
%LINK-5-CHANGED: Interface Tunnel46, changed state to up
HQ(config-if)#ip address 10.0.14.5 255.255.255.252
HQ(config-if)#tunnel source serial 0/0/0
HQ(config-if)#tunnel destination 192.0.2.26
HQ(config-if)#tunnel mode gre ip 
  1. Add the subnet addresses 10.0.14.0/30, 10.0.14.5/30, 10.0.11.0/24, and 10.0.12.0/24 as part of the OSPF area 0 network in the OSPF routing protocol process-id 46.
HQ(config)#router ospf 46
HQ(config-router)#default-information originate 
HQ(config-router)#log-adjacency-changes 
HQ(config-router)#network 10.0.14.0 0.0.0.3 area 0
HQ(config-router)#network 10.0.14.5 0.0.0.3 area 0
HQ(config-router)#network 10.0.11.0 0.0.0.255 area 0
HQ(config-router)#network 10.0.12.0 0.0.0.255 area 0
  1. Verify the configuration to confirm that it complies with the requirements.
HQ#sh run
Building configuration...

Current configuration : 3814 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname HQ
!
enable secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
ip dhcp excluded-address 10.0.11.1
ip dhcp excluded-address 10.0.12.1
ip dhcp excluded-address 10.0.13.1 10.0.13.4
!
ip dhcp pool HRD
network 10.0.11.0 255.255.255.0
default-router 10.0.11.1
dns-server 192.0.2.1
ip dhcp pool MARKETING
network 10.0.12.0 255.255.255.0
default-router 10.0.12.1
dns-server 192.0.2.1
ip dhcp pool NATIVE
network 10.0.13.0 255.255.255.0
default-router 10.0.13.1
dns-server 192.0.2.1
!
aaa new-model
!
aaa authentication login SERVER-AAA group RADIUS local 
aaa authentication login default local 
!
no ip cef
no ipv6 cef
!
username ISP password 0 LksNTB
username admin privilege 15 secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
license udi pid CISCO1941/K9 sn FTX1524O1D2-
license boot module c1900 technology-package securityk9
!
crypto isakmp policy 46
encr aes 256
authentication pre-share
group 5
!
crypto isakmp key Mandalika address 192.0.2.26
!
crypto ipsec transform-set HQ-SET esp-aes esp-sha-hmac
!
crypto map HQ-MAP 46 ipsec-isakmp 
set peer 192.0.2.26
set transform-set HQ-SET 
match address INTERESTING-TRAFFIC
!
ip ssh version 2
ip domain-name mandalika.id
ip name-server 192.0.2.1
!
spanning-tree mode pvst
!
interface Tunnel46
ip address 10.0.14.5 255.255.255.252
mtu 1476
tunnel source Serial0/0/0
tunnel destination 192.0.2.26
!
interface GigabitEthernet0/0
description ROUTER-ON-STICK
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/0.11
description VLAN 11 HRD
encapsulation dot1Q 11
ip address 10.0.11.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/0.12
description VLAN 12 MARKETING
encapsulation dot1Q 12
ip address 10.0.12.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/0.13
description VLAN 13 NATIVE
encapsulation dot1Q 13 native
ip address 10.0.13.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/1
description TO HQ SERVER
ip address 10.0.14.1 255.255.255.252
ip nat inside
duplex auto
speed auto
!
interface Serial0/0/0
description TO ISP
ip address 192.0.2.18 255.255.255.248
encapsulation ppp
ppp authentication chap
ip nat outside
crypto map HQ-MAP
!
interface Serial0/0/1
no ip address
clock rate 2000000
shutdown
!
interface Vlan1
no ip address
shutdown
!
router ospf 46
log-adjacency-changes
network 10.0.14.0 0.0.0.3 area 0
network 10.0.14.4 0.0.0.3 area 0
network 10.0.11.0 0.0.0.255 area 0
network 10.0.12.0 0.0.0.255 area 0
default-information originate
!
ip nat inside source list ALLOW-INTERNET interface Serial0/0/0 overload
ip nat inside source static 10.0.14.2 192.0.2.19 
ip classless
ip route 0.0.0.0 0.0.0.0 192.0.2.17 
!
ip flow-export version 9
!
ip access-list extended ALLOW-INTERNET
permit udp any host 192.0.2.1 eq domain
permit tcp 10.0.11.0 0.0.0.255 host 192.0.2.5 eq smtp
permit tcp 10.0.11.0 0.0.0.255 host 192.0.2.5 eq pop3
ip access-list extended INTERESTING-TRAFFIC
permit tcp 10.0.12.0 0.0.0.255 any
permit tcp 10.0.13.0 0.0.0.255 any
permit gre host 192.0.2.18 host 192.0.2.26
permit ip 10.0.15.0 0.0.0.7 host 10.0.14.2
permit ip 10.0.11.0 0.0.0.255 host 10.0.15.4
permit ip 10.0.12.0 0.0.0.255 host 10.0.15.4
!
no cdp run
!
RADIUS server SERVER-AAA
address ipv4 10.0.14.2 auth-port 1645
key NTBJawara2021
RADIUS server 10.0.14.2
address ipv4 10.0.14.2 auth-port 1645
key NTBJawara2021
!
line con 0
login authentication SERVER-AAA
!
line aux 0
!
line vty 0 4
session-limit 5
login authentication SERVER-AAA
transport input ssh
!
ntp authentication-key 46 md5 080F786C211C071606595C567B 7
ntp trusted-key 46
ntp server 192.0.2.2 key 46
!
end

HQ#

Completed Points: 8%

Back to top


Task 16: VPN configuration on a BRANCH SUMBAWA router using GRE over IPSec and OSPF

  1. Create an Extended Named ACL with the name “INTERESTING-TRAFFIC” for:

    • Allow GRE traffic from source IP address 192.0.2.26 to destination IP address 192.0.2.18.
    • Identify as interesting traffic IP traffic from VLAN 2 SALES on the BRANCH SUMBAWA router with subnet address 10.0.15.0/29 to the IP address of the HQ MATARAM Server, which is 10.0.14.2.
    • Identify as interesting traffic IP traffic from the BRANCH Server with address 10.0.15.4 to VLAN 11 HRD with subnet address 10.0.11.0/24 at HQ MATARAM.
    • Identify as interesting traffic IP traffic from the BRANCH Server with address 10.0.15.4 to VLAN 12 MARKETING with subnet address 10.0.12.0/24 at HQ MATARAM.
BRANCH(config)#ip access-list extended INTERESTING-TRAFFIC    
BRANCH(config-ext-nacl)#permit gre host 192.0.2.26 host 192.0.2.18
BRANCH(config-ext-nacl)#permit ip 10.0.15.0 0.0.0.7 host 10.0.14.2
BRANCH(config-ext-nacl)#permit ip 10.0.11.0 0.0.0.255 host 10.0.15.4
BRANCH(config-ext-nacl)#permit ip 10.0.12.0 0.0.0.255 host 10.0.15.4
  1. Configure IKE Phase 1 ISAKMP policy with priority 46 and IKE Phase 2 IPSec policy with sequence 46 on the BRANCH SUMBAWA router using the conditions shown in table A & B below:

Table A. Parameter ISAKMP Phase 1 Policy

Parameter ROUTER BRANCH SUMBAWA
Key Distribution Method ISAKMP
Encryption Algorithm AES256
Hash Algorithm SHA-1
Authentication Method pre-share
Key Exchange DH 5
ISAKMP Key Mandalika
BRANCH(config)#crypto isakmp policy 46
BRANCH(config-isakmp)#encr aes 256
BRANCH(config-isakmp)#hash sha
BRANCH(config-isakmp)#authentication pre-share 
BRANCH(config-isakmp)#group 5 
BRANCH(config)#crypto isakmp key Mandalika address 192.0.2.18

Table B. Parameter ISAKMP Phase 2 Policy

Parameter ROUTER BRANCH SUMBAWA
Transform Set Name BRANCH-SET
ESP Encryption esp-aes
ESP Authentication SHA-1
Peer IP Address 192.0.2.18
Traffic Encrypted Extended ACL “INTERESTING-TRAFFIC”
Crypto Map Name BRANCH-MAP
SA Establishment ipsec-isakmp
BRANCH(config)#crypto ipsec transform-set BRANCH-SET esp-aes esp-sha-hmac 
BRANCH(config)#crypto map BRANCH-MAP 46 ipsec-isakmp 
% NOTE: This new crypto map will remain disabled until a peer 
and a valid access list have been configured.
BRANCH(config-crypto-map)#set peer 192.0.2.18
BRANCH(config-crypto-map)#set transform-set BRANCH-SET
BRANCH(config-crypto-map)#match address INTERESTING-TRAFFIC
  1. Configure the crypto map on the outgoing Serial0/0/1 interface.
BRANCH(config)#int s0/0/1
BRANCH(config-if)#crypto map BRANCH-MAP
*Jan  3 07:16:26.785: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
  1. Configure a GRE Tunnel over IPSec with the following parameters:

    • Use the second IP address of the subnet 10.0.14.4/30 to set the IP address of the tunnel interface 46.
    • Configure interface Serial0/0/1 as the source and IP address 192.0.2.26 as the destination for tunnel interface 46’s endpoint.
BRANCH(config)#int tunnel 46
%LINK-5-CHANGED: Interface Tunnel46, changed state to up
BRANCH(config-if)#ip address 10.0.14.6 255.255.255.252
BRANCH(config-if)#tunnel source serial 0/0/1
BRANCH(config-if)#tunnel destination 192.0.2.18
BRANCH(config-if)#tunnel mode gre ip 
  1. Add the subnet addresses 10.0.14.0/30, 10.0.15.0/29 and 10.0.15.16/28 as part of the OSPF area 0 network in the OSPF routing protocol process-id 46.
BRANCH(config)#router ospf 46
BRANCH(config-router)#default-information originate 
BRANCH(config-router)#log-adjacency-changes 
BRANCH(config-router)#network 10.0.14.4 0.0.0.3 area 0
BRANCH(config-router)#network 10.0.15.0 0.0.0.7 area 0
BRANCH(config-router)#network 10.0.15.16 0.0.0.15 area 0
  1. Verify the configuration to confirm that it complies with the requirements.
BRANCH#sh run
Building configuration...

Current configuration : 3133 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname BRANCH
!
enable secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
ip dhcp excluded-address 10.0.15.17
!
ip dhcp pool SALES
network 10.0.15.16 255.255.255.240
default-router 10.0.15.17
dns-server 192.0.2.1
!
aaa new-model
!
aaa authentication login SERVER-AAA group RADIUS local 
aaa authentication login default local 
!
no ip cef
no ipv6 cef
!
username ISP password 0 LksNTB
username admin privilege 15 secret 5 $1$mERr$MmdodDsCCQflw.d5M6q3C.
!
license udi pid CISCO1941/K9 sn FTX15243J7P-
license boot module c1900 technology-package securityk9
!
crypto isakmp policy 46
encr aes 256
authentication pre-share
group 5
!
crypto isakmp key Mandalika address 192.0.2.18
!
crypto ipsec transform-set BRANCH-SET esp-aes esp-sha-hmac
!
crypto map BRANCH-MAP 46 ipsec-isakmp 
set peer 192.0.2.18
set transform-set BRANCH-SET 
match address INTERESTING-TRAFFIC
!
ip ssh version 2
ip domain-name branch.mandalika.id
ip name-server 192.0.2.1
!
spanning-tree mode pvst
!
interface Tunnel46
ip address 10.0.14.6 255.255.255.252
mtu 1476
tunnel source Serial0/0/1
tunnel destination 192.0.2.18
!
interface GigabitEthernet0/0
description ROUTER-ON-STICK
no ip address
ip nat inside
duplex auto
speed auto
!
interface GigabitEthernet0/0.1
encapsulation dot1Q 1 native
ip address 10.0.15.1 255.255.255.248
ip nat inside
!
interface GigabitEthernet0/0.2
description SALES
encapsulation dot1Q 2
ip address 10.0.15.17 255.255.255.240
ip nat inside
!
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
no ip address
clock rate 2000000
shutdown
!
interface Serial0/0/1
description TO ISP
ip address 192.0.2.26 255.255.255.248
encapsulation ppp
ppp authentication chap
ip nat outside
crypto map BRANCH-MAP
!
interface Vlan1
no ip address
shutdown
!
router ospf 46
log-adjacency-changes
network 10.0.14.4 0.0.0.3 area 0
network 10.0.15.0 0.0.0.7 area 0
network 10.0.15.16 0.0.0.15 area 0
default-information originate
!
ip nat inside source list ALLOW-INTERNET interface Serial0/0/1 overload
ip nat inside source static 10.0.15.4 192.0.2.27 
ip classless
ip route 0.0.0.0 0.0.0.0 192.0.2.25 
!
ip flow-export version 9
!
ip access-list standard ALLOW-INTERNET
permit 10.0.15.0 0.0.0.7
permit 10.0.15.16 0.0.0.15
ip access-list extended INTERESTING-TRAFFIC
permit gre host 192.0.2.26 host 192.0.2.18
permit ip 10.0.15.0 0.0.0.7 host 10.0.14.2
permit ip 10.0.11.0 0.0.0.255 host 10.0.15.4
permit ip 10.0.12.0 0.0.0.255 host 10.0.15.4
!
RADIUS server SERVER-AAA
address ipv4 10.0.15.4 auth-port 1645
key NTBJawara2021
RADIUS server 10.0.15.4
address ipv4 10.0.15.4 auth-port 1645
key NTBJawara2021
!
login authentication SERVER-AAA
line con 0
!
line aux 0
!
line vty 0 4
session-limit 5
login authentication SERVER-AAA
transport input ssh
!
ntp authentication-key 46 md5 080F786C211C071606595C567B 7
ntp trusted-key 46
ntp server 192.0.2.2 key 46
!
end

BRANCH#

Completed Points: 8%

Back to top


Task 17: Verification of VPN Connection from End Device at HQ MATARAM

  1. Use Simple PDU to verify the connection between the End Device on VLAN SALES and WLAN ENGINEER at BRANCH SUMBAWA and the End Device on VLAN HRD and MARKETING at HQ MATARAM.
    Check that the connection is working properly.
Simple PDU from VLAN Sales and WLAN Engineer to VLAN HRD and Marketing
  1. Use a browser to verify access to HTTP and HTTPS services on the HQ MATARAM Server by entering the addresses http://10.0.14.2 and https://10.0.14.2 from the End Device on VLAN SALES and WLAN ENGINEER from BRANCH SUMBAWA.
    Check that HTTP and HTTPS services can be accessed.
HTTP and HTTPS Access from VLAN Sales and WLAN Engineer
  1. Access the FTP service on the BRANCH Server using the FTP Client by entering the address 10.0.15.4 from the End Device on the HRD and MARKETING VLAN of HQ MATARAM.
    For FTP authentication, the user is “lks” and the password is “ntb."
    Check that the FTP service can be accessed.
FTP Access to BRANCH Server from VLAN HRD and Marketing

Completed Points: 0%

Back to top


Task 18: Verification of VPN Connection from End Device at BRANCH SUMBAWA

  1. Verification the connection using Simple PDU from the End Device located on VLAN SALES and WLAN ENGINEER from BRANCH SUMBAWA to the End Device located on VLAN HRD and MARKETING at HQ MATARAM.
    Make sure the connection is successful.
Simple PDU from VLAN Sales and WLAN Engineer to VLAN HRD and Marketing
  1. Verification of access to HTTP and HTTPS services located at SERVER HQ MATARAM using a browser by accessing the addresses http://10.0.14.2 and https://10.0.14.2 from the End Device located on VLAN SALES and WLAN ENGINEER from BRANCH SUMBAWA.
    Make sure HTTP and HTTPS services can be accessed.
HTTP and HTTPS Access to HQ Mataram Server from VLAN Sales and WLAN Engineer
  1. Access the FTP service on the HQ Server using the FTP Client by entering the address 10.0.14.2 from the End Device on the SALES VLAN and WLAN ENGINEER of BRANCH SUMBAWA.
    The user for FTP authentication is “lks” with password “ntb”.
    Make sure the FTP service can be accessed.
FTP Access to HQ Server from VLAN Sales and WLAN Engineer

Completed Points: 0%

Back to top


Task 19: RBAC Configuration at router HQ MATARAM

  1. Create a view called “support” and set its password to “mandalika”.
HQ(config)#parser view support
HQ(config-view)#%PARSER-6-VIEW_CREATED: view 'support' successfully created.
HQ(config-view)#secret 5 mandalika
  1. Configure the view to only run the “ping” and “traceroute” commands, as well as any commands that begin with “show”.
HQ(config-view)#commands exec include ping
HQ(config-view)#commands exec include traceroute
HQ(config-view)#commands exec include all show
  1. Verify the configuration that has been done to ensure that it is following the requirements.
parser view support
secret 5 $1$mERr$CuHT/qBH1YqIQvmMYg1Ev/
commands exec include ping
commands exec include all show
commands exec include traceroute

Completed Points: 1%

Back to top


Task 20: RBAC Configuration at router BRANCH SUMBAWA

  1. Create a view called “helpdesk” and set its password to “mandalika”.
BRANCH(config)#parser view helpdesk
BRANCH(config-view)#%PARSER-6-VIEW_CREATED: view 'helpdesk' successfully created.
BRANCH(config-view)#secret 0 mandalika
  1. Configure a view that can only run the “show ip protocols,” “display ip route,” “show ip interface short,” “ping,” and “traceroute” commands.
BRANCH(config-view)#commands exec include show ip protocols
BRANCH(config-view)#commands exec include show ip route
BRANCH(config-view)#commands exec include show ip interface brief
BRANCH(config-view)#commands exec include ping
BRANCH(config-view)#commands exec include traceroute
  1. Verify the configuration that has been carried out to ensure that it is following the requirements.
parser view helpdesk
secret 5 $1$mERr$CuHT/qBH1YqIQvmMYg1Ev/
commands exec include show
commands exec include show ip
commands exec include show ip interface
commands exec include show ip interface brief
commands exec include show ip protocols
commands exec include show ip route
commands exec include traceroute

Completed Points: 1%

Back to top


Complete Configuration

Task Finished

Router HQ MATARAM

HQ#show run
Building configuration...

Current configuration : 3971 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname HQ
!
enable secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
ip dhcp excluded-address 10.0.11.1
ip dhcp excluded-address 10.0.12.1
ip dhcp excluded-address 10.0.13.1 10.0.13.4
!
ip dhcp pool HRD
network 10.0.11.0 255.255.255.0
default-router 10.0.11.1
dns-server 192.0.2.1
ip dhcp pool MARKETING
network 10.0.12.0 255.255.255.0
default-router 10.0.12.1
dns-server 192.0.2.1
ip dhcp pool NATIVE
network 10.0.13.0 255.255.255.0
default-router 10.0.13.1
dns-server 192.0.2.1
!
aaa new-model
!
aaa authentication login SERVER-AAA group RADIUS local 
aaa authentication login default local 
!
no ip cef
no ipv6 cef
!
username ISP password 0 LksNTB
username admin privilege 15 secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
license udi pid CISCO1941/K9 sn FTX1524O1D2-
license boot module c1900 technology-package securityk9
!
crypto isakmp policy 46
encr aes 256
authentication pre-share
group 5
!
crypto isakmp key Mandalika address 192.0.2.26
!
crypto ipsec transform-set HQ-SET esp-aes esp-sha-hmac
!
crypto map HQ-MAP 46 ipsec-isakmp 
set peer 192.0.2.26
set transform-set HQ-SET 
match address INTERESTING-TRAFFIC
!
ip ssh version 2
ip domain-name mandalika.id
ip name-server 192.0.2.1
!
spanning-tree mode pvst
!
interface Tunnel46
ip address 10.0.14.5 255.255.255.252
mtu 1476
tunnel source Serial0/0/0
tunnel destination 192.0.2.26
!
interface GigabitEthernet0/0
description ROUTER-ON-STICK
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/0.11
description VLAN 11 HRD
encapsulation dot1Q 11
ip address 10.0.11.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/0.12
description VLAN 12 MARKETING
encapsulation dot1Q 12
ip address 10.0.12.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/0.13
description VLAN 13 NATIVE
encapsulation dot1Q 13 native
ip address 10.0.13.1 255.255.255.0
ip nat inside
!
interface GigabitEthernet0/1
description TO HQ SERVER
ip address 10.0.14.1 255.255.255.252
ip nat inside
duplex auto
speed auto
!
interface Serial0/0/0
description TO ISP
ip address 192.0.2.18 255.255.255.248
encapsulation ppp
ppp authentication chap
ip nat outside
crypto map HQ-MAP
!
interface Serial0/0/1
no ip address
clock rate 2000000
shutdown
!
interface Vlan1
no ip address
shutdown
!
router ospf 46
log-adjacency-changes
network 10.0.14.0 0.0.0.3 area 0
network 10.0.14.4 0.0.0.3 area 0
network 10.0.11.0 0.0.0.255 area 0
network 10.0.12.0 0.0.0.255 area 0
default-information originate
!
ip nat inside source list ALLOW-INTERNET interface Serial0/0/0 overload
ip nat inside source static 10.0.14.2 192.0.2.19 
ip classless
ip route 0.0.0.0 0.0.0.0 192.0.2.17 
!
ip flow-export version 9
!
ip access-list extended ALLOW-INTERNET
permit udp any host 192.0.2.1 eq domain
permit tcp 10.0.11.0 0.0.0.255 host 192.0.2.5 eq smtp
permit tcp 10.0.11.0 0.0.0.255 host 192.0.2.5 eq pop3
permit tcp 10.0.12.0 0.0.0.255 any
permit tcp 10.0.13.0 0.0.0.255 any
ip access-list extended INTERESTING-TRAFFIC
permit gre host 192.0.2.18 host 192.0.2.26
permit ip 10.0.15.0 0.0.0.7 host 10.0.14.2
permit ip 10.0.11.0 0.0.0.255 host 10.0.15.4
permit ip 10.0.12.0 0.0.0.255 host 10.0.15.4
!
no cdp run
!
RADIUS server SERVER-AAA
address ipv4 10.0.14.2 auth-port 1645
key NTBJawara2021
RADIUS server 10.0.14.2
address ipv4 10.0.14.2 auth-port 1645
key NTBJawara2021
!
line con 0
login authentication SERVER-AAA
!
line aux 0
!
line vty 0 4
session-limit 5
login authentication SERVER-AAA
transport input ssh
!
parser view support
secret 5 $1$mERr$CuHT/qBH1YqIQvmMYg1Ev/
commands exec include ping
commands exec include all show
commands exec include traceroute
!
ntp authentication-key 46 md5 080F786C211C071606595C567B 7
ntp trusted-key 46
ntp server 192.0.2.2 key 46
!
end


HQ#

Router BRANCH SUMBAWA

BRANCH#sh run
Building configuration...

Current configuration : 3484 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname BRANCH
!
enable secret 5 $1$mERr$ix/GaeUGI2eMcE7/bu9c2/
!
ip dhcp excluded-address 10.0.15.17
!
ip dhcp pool SALES
network 10.0.15.16 255.255.255.240
default-router 10.0.15.17
dns-server 192.0.2.1
!
aaa new-model
!
aaa authentication login SERVER-AAA group RADIUS local 
aaa authentication login default local 
!
no ip cef
no ipv6 cef
!
username ISP password 0 LksNTB
username admin privilege 15 secret 5 $1$mERr$MmdodDsCCQflw.d5M6q3C.
!
license udi pid CISCO1941/K9 sn FTX15243J7P-
license boot module c1900 technology-package securityk9
!
crypto isakmp policy 46
encr aes 256
authentication pre-share
group 5
!
crypto isakmp key Mandalika address 192.0.2.18
!
crypto ipsec transform-set BRANCH-SET esp-aes esp-sha-hmac
!
crypto map BRANCH-MAP 46 ipsec-isakmp 
set peer 192.0.2.18
set transform-set BRANCH-SET 
match address INTERESTING-TRAFFIC
!
ip ssh version 2
ip domain-name branch.mandalika.id
ip name-server 192.0.2.1
!
spanning-tree mode pvst
!
interface Tunnel46
ip address 10.0.14.6 255.255.255.252
mtu 1476
tunnel source Serial0/0/1
tunnel destination 192.0.2.18
!
interface GigabitEthernet0/0
description ROUTER-ON-STICK
no ip address
ip nat inside
duplex auto
speed auto
!
interface GigabitEthernet0/0.1
encapsulation dot1Q 1 native
ip address 10.0.15.1 255.255.255.248
ip nat inside
!
interface GigabitEthernet0/0.2
description SALES
encapsulation dot1Q 2
ip address 10.0.15.17 255.255.255.240
ip nat inside
!
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
no ip address
clock rate 2000000
shutdown
!
interface Serial0/0/1
description TO ISP
ip address 192.0.2.26 255.255.255.248
encapsulation ppp
ppp authentication chap
ip nat outside
crypto map BRANCH-MAP
!
interface Vlan1
no ip address
shutdown
!
router ospf 46
log-adjacency-changes
network 10.0.14.4 0.0.0.3 area 0
network 10.0.15.0 0.0.0.7 area 0
network 10.0.15.16 0.0.0.15 area 0
default-information originate
!
ip nat inside source list ALLOW-INTERNET interface Serial0/0/1 overload
ip nat inside source static 10.0.15.4 192.0.2.27 
ip classless
ip route 0.0.0.0 0.0.0.0 192.0.2.25 
!
ip flow-export version 9
!
ip access-list standard ALLOW-INTERNET
permit 10.0.15.0 0.0.0.7
permit 10.0.15.16 0.0.0.15
ip access-list extended INTERESTING-TRAFFIC
permit gre host 192.0.2.26 host 192.0.2.18
permit ip 10.0.15.0 0.0.0.7 host 10.0.14.2
permit ip 10.0.11.0 0.0.0.255 host 10.0.15.4
permit ip 10.0.12.0 0.0.0.255 host 10.0.15.4
!
RADIUS server SERVER-AAA
address ipv4 10.0.15.4 auth-port 1645
key NTBJawara2021
RADIUS server 10.0.15.4
address ipv4 10.0.15.4 auth-port 1645
key NTBJawara2021
!
line con 0
login authentication SERVER-AAA
!
line aux 0
!
line vty 0 4
session-limit 5
login authentication SERVER-AAA
transport input ssh
!
parser view helpdesk
secret 5 $1$mERr$CuHT/qBH1YqIQvmMYg1Ev/
commands exec include ping
commands exec include show
commands exec include show ip
commands exec include show ip interface
commands exec include show ip interface brief
commands exec include show ip protocols
commands exec include show ip route
commands exec include traceroute
!
ntp authentication-key 46 md5 080F786C211C071606595C567B 7
ntp trusted-key 46
ntp server 192.0.2.2 key 46
!
end


BRANCH#

Summary

It was enjoyable for me, specifically the VPN section, because I rarely use it in my daily work.

Unfortunately, I ran into issues where the “WLAN ENGINEER” section could not be pinged from the client at HQ MATARAM, while the “WLAN ENGINEER” could ping towards the HQ MATARAM client.

My guess is in the OSPF section.

Finally, I was unable to complete the task completely, either due to a Packet Tracer problem or an incorrect setting.

Please let me know if you spot any setting problems or typos. Thank you very much.


Back to top