CCNASv2 SKillsAssessment-A Student Training
CCNASv2 SKillsAssessment-A Student Training
CCNASv2 SKillsAssessment-A Student Training
0
Skills Assessment - A
Topology
Assessment Objectives
Part 1: Verify Network Connectivity (1 points, 5 minutes)
Part 2: Configure Secure Router Administrative Access (17 points, 15 minutes)
Part 3: Configure a Zone-Based Policy Firewall (14 points, 10 minutes)
Part 4: Configure an Intrusion Prevention System (15 points, 10 minutes)
Part 5: Secure Layer 2 Switches (22 points, 20 minutes)
Part 6: Configure ASA Basic Management and Firewall Settings (17 points, 15 minutes)
Part 7: Configure the ASA for SSL VPN Remote Access Using ASDM (14 points, 15 minutes)
Scenario
This Skills Assessment (SA) is the final practical exam of student training for the CCNA Security course. The
exam is divided into seven parts. The parts should be completed sequentially, and signed off by your
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 11
CCNA Security Skills Assessment Student Training
instructor before moving on to the next part. In Part 1, you will verify that the basic device settings have been
preconfigured by the instructor. In Part 2, you will secure a network router using the command line interface
(CLI) to configure various IOS features including AAA and SSH. In Part 3 and 4, you will configure a zone-
based policy firewall (ZPF) and intrusion prevention using the Cisco IOS intrusion prevention system (IPS) on
an integrated service router (ISR) using the CLI. In Part 5, you will configure and secure layer 2 switches
using the CLI. In Parts 6 and 7, you will configure the ASA management and firewall settings using the CLI
and implement an SSL Remote Access VPN using ASDM.
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
3 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 ASA 5505 (OS version 9.2(3) and ASDM version 7.4(1) and Base license or comparable)
3 PCs (Windows 7 with a terminal emulation program, such as Tera Term)
Console cable to configure the Cisco IOS devices via the console ports
Ethernet and Serial cables as shown in the topology
Ping the G0/1 interface on R1 from PC-C. See Topology for specific settings. 1/2
Ping interface S0/0/1 on R1 from R3. See Topology for specific settings. 1/2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 11
CCNA Security Skills Assessment Student Training
Note: Before proceeding to Part 3, ask your instructor to verify R3’s configuration and functionality.
Instructor Sign-Off Part 2: ______________________
Points: _________ of 17
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 11
CCNA Security Skills Assessment Student Training
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 11
CCNA Security Skills Assessment Student Training
Set the storage location for the IPS signatures. Location: IPSDIR on flash 1
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 11
CCNA Security Skills Assessment Student Training
Interface: S0/0/0
Apply the IPS rule to the interface.
Direction: in 2
Protocol: TFTP
IP Address of TFTP server: 172.30.3.3
Copy the S854 signature from PC-C.
Signature: IOS-S854-CLI.pkg
Compile signatures after they are loaded: idconf 3
Note: Before attempting the TFTP copy, the Tftpd32 software on PC-C needs to be running with the directory
set to the location of the file: IOS-S854-CLI.pkg.
Troubleshoot as necessary to correct any issues.
Note: Before proceeding to Part 5, ask your instructor to verify your IPS configuration and functionality.
Instructor Sign-Off Part 4: ______________________
Points: _________ of 15
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 11
CCNA Security Skills Assessment Student Training
Switch: S2
Assign and encrypt a privileged EXEC
Password: cisco12345 1/2
password.
Encryption type: 9 (scrypt)
Switch: S2
Username: Admin01
Add a user in the local database for
Privilege level: 15 1
administrator access.
Encryption type: 9 (scrypt)
Password: admin01pass
Switch: S2
Configure an MOTD banner. 1/2
Banner: Unauthorized Access is Prohibited!
Disable HTTP and HTTP secure server. Switch: S2 1
Switch: S2
Domain name: ccnassecurity.com
RSA keys size: 1024
Configure SSH. 2
Version: 2
Timeout: 90 seconds
Authentication retries: 2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 11
CCNA Security Skills Assessment Student Training
Switch: S2
Port: F0/18
Configure basic port security. Maximum limit: 1 3
Remember the MAC address.
Violation Action: Shutdown
NETLAB+ Note: Use a Maximum limit of 2 when configuring basic port security. Otherwise, the hidden
Control Switch will cause a violation to occur and the port will be shutdown.
Troubleshoot as necessary to correct any issues.
Note: Before proceeding to Part 6, ask your instructor to verify your switch configuration and functionality.
Instructor Sign-Off Part 5: ______________________
Points: _________ of 22
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 11
CCNA Security Skills Assessment Student Training
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 11
CCNA Security Skills Assessment Student Training
Part 7: Configure the ASA for SSL VPN Remote Access Using ASDM
Total points: 14
Time: 15 minutes
In Part 7, you will configure an AnyConnect SSL remote access VPN on the ASA using ASDM. You will then
use a browser on PC-C to connect and download the Cisco AnyConnect Secure Mobility Client software
located on the ASA. After the software has downloaded, you will manually install the AnyConnect software to
PC-C and use it to establish a remote SSL VPN connection to the ASA.
Step 1: Configure SSL VPN settings on the ASA using the ASDM from PC-B.
Use a browser on PC-B to establish an ASDM session to the ASA. After the session is established, use the
AnyConnect VPN Wizard to configure the ASA to allow SSL VPN client connections. Configuration
parameters include the following:
Connection: HTTPS
IP address: 192.168.10.1
Use a browser on PC-B, and connect
Username: Admin01 1
to the ASA.
Password: admin01pass
Note: You will need to accept all security messages.
Connection profile name: ANYCONNECT-SSL-VPN
VPN access interface: outside
VPN protocols: SSL only.
Client images: anyconnect-win-4.1.00028-k9.pkg
Username: VPNuser
Password: VPNuserpa55
Use the AnyConnect VPN Wizard to IP address pool name: VPN-POOL
configure the ASA to accept SSL VPN
IP address pool starting address: 192.168.10.201 7
connections from the Cisco
AnyConnect Secure Mobility Client. IP address pool ending address: 192.168.10.210
IP address pool subnet mask: 255.255.255.0
DNS server: 10.20.30.40
Domain name: ccnasecurity.com
Exempt VPN traffic from NAT: Enable
Inside interface: inside
Local network: any4
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 11
CCNA Security Skills Assessment Student Training
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/0/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces, identify the type of router, and how many
interfaces the router has. There is no way to effectively list all of the combinations of configurations for each
router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the
device. This table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 11