/zxc/

Writeup LKSN ITNSA NTB 2021 - Packet Tracer Troubleshoot

Estimated Reading time: 6 minutes


Table Of Contents


Introduction

Hello, everyone. Today’s post is based on the second of three questions titled “Packet Tracer Troubleshooting” that will be part of the NTB LKSN competition from ITNSA in 2021.

Unlike the previous question, this time, we are asked to troubleshoot the configuration of network devices with a predetermined network topology using Cisco Packet Tracer.

The required skills to solve this problem include:

Let’s try it out. as usual, this question is answered with Cisco Packet Tracer.

Those who want to try it can get it from this ITNSA.

Topology for ITNSA NTB Module B Cisco Troubleshoot PKT

Troubleshooting 1 (Point: 25)

Questions: Both hosts on LAN BRANCH1 and LAN BRANCH2 were unable to communicate with one another.
However, each BRANCH’s Internet connection to the Internet was successful.

Answers: There is a typo in the ospf section of the network section 192.168.0.2/30 in BRANCH1.
There is a missing ospf section in the network section 192.168.3.0/24 in BRANCH2.

BRANCH1

Configuration :

BRANCH1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
BRANCH1(config)#router ospf 1
BRANCH1(config-router)#network 192.168.0.2 0.0.0.3 area 0
BRANCH1(config-router)#no network 192.168.0.2 0.0.0.0 area 0
23:09:50: %OSPF-5-ADJCHG: Process 1, Nbr 203.0.113.18 on Tunnel0 from FULL to DOWN, Neighbor Down: Interface down or detached

23:09:50: %OSPF-5-ADJCHG: Process 1, Nbr 203.0.113.18 on Tunnel0 from LOADING to FULL, Loading Done

Before :

BRANCH1#sh run | section ospf
router ospf 1
 log-adjacency-changes
 network 192.168.0.2 0.0.0.0 area 0
 network 192.168.2.0 0.0.0.255 area 0

After :

BRANCH1(config-router)#do sh run | section ospf
router ospf 1
 log-adjacency-changes
 network 192.168.2.0 0.0.0.255 area 0
 network 192.168.0.0 0.0.0.3 area 0

BRANCH2

Configuration :

BRANCH2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
BRANCH2(config)#router ospf 1
BRANCH2(config-router)#network 192.168.3.0 0.0.0.255 area 0
23:09:36: %OSPF-5-ADJCHG: Process 1, Nbr 203.0.113.18 on Tunnel0 from LOADING to FULL, Loading Done

Before :

BRANCH2#sh run | section ospf
router ospf 1
 log-adjacency-changes
 network 192.168.0.4 0.0.0.3 area 0

After :

router ospf 1
 log-adjacency-changes
 network 192.168.0.4 0.0.0.3 area 0
 network 192.168.3.0 0.0.0.255 area 0

Simple PDU

Simple PDU from each other client and branch

PING

Ping from each other client

OSPF

Show IP Route from OSPF BRANCH 1
Show IP Route from OSPF HQ
Show IP Route from OSPF BRANCH 2

Back to top


Troubleshooting 2 (Point: 25)

Questions: The HQ, BRANCH1 and BRANCH2 routers were unable to synchronize their clocks with the Internet’s Network Time Protocol (NTP) server.

Answers: So I checked the configuration in ROOT DNS + NTP Server in the “Services > NTP” section and found that the password is “cisco” while HQ, BRANCH1 and BRANCH2 use “c1sc0,” indicating that there is an error in the password section.


NTP Server Password

NTP Server password

ROUTER HQ

Configuration :

HQ#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
HQ(config)#ntp authentication-key 1 md5 cisco

Before :

HQ#sh ntp associations

address         ref clock       st   when     poll    reach  delay  offset    disp
 ~203.0.113.1   .AUTH.          16   -        64      0      0.00   0.00      16000.00
 * sys.peer, # selected, + candidate, - outlyer, x falseticker, ~ configured

HQ#sh run | section tp
ntp authentication-key 1 md5 08221D5D0A49 7
ntp trusted-key 1
ntp server 203.0.113.1 key 1

After :

HQ(config)#do sh ntp associations

address         ref clock       st   when   poll    reach  delay  offset           disp
 ~203.0.113.1   127.127.1.1     1    14     16      1      17.00  899589635000.00  0.00
 * sys.peer, # selected, + candidate, - outlyer, x falseticker, ~ configured

HQ(config)#do sh run | section ntp
ntp authentication-key 1 md5 0822455D0A16 7
ntp trusted-key 1
ntp server 203.0.113.1 key 1

BRANCH1

Configuration :

BRANCH1#en
BRANCH1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
BRANCH1(config)#ntp authentication-key 1 md5 cisco 

Before :

BRANCH1#sh ntp associations 

address         ref clock       st   when     poll    reach  delay   offset   disp
 ~203.0.113.1   .AUTH.          16   -        64      0      0.00    0.00     16000.00
 * sys.peer, # selected, + candidate, - outlyer, x falseticker, ~ configured

BRANCH1#sh run | section ntp 
ntp authentication-key 1 md5 08221D5D0A49 7
ntp trusted-key 1
ntp server 203.0.113.1 key 1

After :

BRANCH1(config)#do sh ntp associations

address         ref clock       st   when  poll reach  delay  offset            disp
 ~203.0.113.1   127.127.1.1     1    5     16   1      19.00  899589634999.00   0.00
 * sys.peer, # selected, + candidate, - outlyer, x falseticker, ~ configured

BRANCH1(config)#do sh run | section ntp
ntp authentication-key 1 md5 0822455D0A16 7
ntp trusted-key 1
ntp server 203.0.113.1 key 1

BRANCH2

Configuration :

BRANCH2#en
BRANCH2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
BRANCH2(config)#ntp authentication-key 1 md5 cisco 

Before :

BRANCH2#sh ntp associations

address         ref clock       st   when     poll    reach  delay   offset   disp
 ~203.0.113.1   .AUTH.          16   -        64      0      0.00    0.00     16000.00
 * sys.peer, # selected, + candidate, - outlyer, x falseticker, ~ configured

BRANCH2#sh run | section ntp
ntp authentication-key 1 md5 08221D5D0A49 7
ntp trusted-key 1
ntp server 203.0.113.1 key 1

After :

BRANCH2(config)#do sh run | section ntp
ntp authentication-key 1 md5 0822455D0A16 7
ntp trusted-key 1
ntp server 203.0.113.1 key 1

BRANCH2(config)#do sh run | section ntp
ntp authentication-key 1 md5 0822455D0A16 7
ntp trusted-key 1
ntp server 203.0.113.1 key 1

Back to top


Troubleshooting 3 (Point: 25)

Questions: The network administrator has configured a Radius-based authentication system for Router HQ on the HQ Server.
However, Network administrators can only access Router HQ through console and SSH access using local user accounts.

Answers: There was a typo in the HQ router side configuration, and the RADIUS service was not enabled in the ServerHQ section.

ROUTER HQ

Configuration :

/// First, we need to delete old configuration
HQ(config)#no radius-server host 192.168.1.253 auth-port 1645
HQ(config)#no radius-server key PaSSwOrd
HQ(config)#do sh run | section radius
aaa authentication login SERVER-AAA group radius local
/// Then, we add new configuration
HQ(config)#radius server 192.168.1.254
HQ(config-radius-server)#address ipv4 192.168.1.254 auth-port 1645
HQ(config-radius-server)#key Pa55w0rd
 WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type
*Sep 09 21:25:23.129: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type

Before :

HQ#sh run | section radius
aaa authentication login SERVER-AAA group radius local 
radius-server host 192.168.1.253 auth-port 1645
radius-server key PaSSwOrd
radius server 192.168.1.253
 address ipv4 192.168.1.253 auth-port 1645

After :

HQ(config)#do sh run | sectio radius
aaa authentication login SERVER-AAA group radius local 
radius server 192.168.1.254
 address ipv4 192.168.1.254 auth-port 1645
 key Pa55w0rd

SERVERHQ Radius

Before :

Radius Server before turn on Service for AAA

After :

Radius Server after turn on Service for AAA

Login Success :

Radius login success

Back to top


Troubleshooting 4 (Point: 25)

Questions: All hosts on LAN HQ, BRANCH1 and BRANCH2 of PT. AR, as well as Internet Client PCs on the Internet subnet, are unable to access the ntbprov.go.id site, but can access other sites.

Answers: Assign port Ethernet0/1 to VLAN 3.
In object-network server-dmz, change the interface in out.

ASA-NTBPROV

Configuration :

ciscoasa>en
ciscoasa#conf t
ciscoasa(config)#int eth0/1
ciscoasa(config-if)#switchport access vlan 3
ciscoasa(config-if)#exit
ciscoasa(config)#object network server-dmz
ciscoasa(config-network-object)#nat (dmz,outside) static 203.0.113.34

Before :

Firewall before configuration
DMZ before configuration

After :

Firewall after configuration
DMZ after configuration

Verification :

Client can access ntbprov.go.id

Back to top


Summary

The questions aren’t too difficult, but I had trouble with a bug (?) in question 1.

In BRANCH1, the error “ISAKMP (0:1): Cannot start Aggressive mode, trying Main mode” appears on occasion.
At HQ, the error “%CRYPTO-4-RECVD PKT INV SPI: decaps: received IPSEC packet has invalid spi for” appears.

It occurs when I reload a.PKT file, so I must reload several times to avoid the bug.

I may update this post if I figure out how to fix these two bugs.


Back to top