Troubleshooting Lab - Question T1 Real Labs v5.0
Troubleshooting Lab - Question T1 Real Labs v5.0
Troubleshooting Lab - Question T1 Real Labs v5.0
www.passsecuritylabs.com
www.passseclabs.com 1 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
www.passseclabs.com 2 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
1. We highly discourage sharing of the workbook hence the workbooks are mapped to Laptop/Desktop
MAC address. If one tries to open the workbook on other desktop or laptop than the registered MAC
address; account will get locked and we will not unlock it for any reasons.
2. The workbook does not have print access; kindly do not request to enable to print access.
3. One will be provided with free updates up to 90 days from the date of purchase, post that one need
to renew his/her account to access the latest update. Post 90 days the workbooks will cease to open.
4. If one wish to renew their subscription/account, you need to renew within 90 days or before the
account gets expired. Post 90 days one can renew their account however the renewal will be
considered has a new purchase. Hence we encourage one to renew within 90 days of the purchase.
5. The renewal cost is 1999 USD if one pay within 90 days, if one fail to renew then the cost will be
equivalent of a new purchase. (The renewal price can be changed at any time, without informing the
client)
6. Every workbook is uniquely identified for each user with hidden words. If one shares his/her
workbooks with others, and if the system detects the share, the account will be banned and we will not
entertain any explanation of any sort.
8. We do require CSCO ID, CCIE number and Official email id for security purposes. One should have
CCIE written passed and CCIE lab should be booked within 90 days. We do not sell without these
details. We do background verification of the details provided, so request to give us the correct CSCO
ID and official email id.
9. The workbooks are in secured pdf format and delivered via email.
10. License is provided for only one Device. And we don’t give license again if the device crashes or
company security policies. Please install license on the device cautiously as the license will not be
provided again.
11. We do support devices running Windows OS, Mac OS, Android and Mac iOS only
12. We do not provide Refund in any circumstances once the product is sold.
www.passseclabs.com 3 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
13. This policy is in effect from 23 November 2016 and in immediate effect for new clients and new
renewals. Old clients will continue with the old Policies until the accounts get expired.
14. If there is any update, one will receive the update automatically on their registered email-id.
15. For any future update you can check our update page on www.passccdelabs.com
www.passseclabs.com 4 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Logical Topology
www.passseclabs.com 5 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 1:
From the “client_pc” user is unable to establish Anyconnect SSL VPN session to ASAs with FQDN of
“asa1.cisco.com”. Fix the breaks so that user can establish Anyconnect session from the “client_pc”
Note:
Tunnel Credentials: Username: ccie, Password: ccie
VPN session should be terminated on ASA1_V being an Active ASA in the pair.
VPN session should be in established state when you have ended the Troubleshooting module.
Total Breaks: 3
www.passseclabs.com 6 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 2:
It has been reported that network administrator from R16 can open TELNET session to Server1 but
Firewall at R17 failed to inspect that session. Also same telnet session from R15 appears to be
inspected from outside to inside.
Fix the issues so that R17 able to inspect session from R16 and session R15 from inside to outside.
Note:
Server1 TELNET Credentials: cisco/cisco
Total Breaks: 2
www.passseclabs.com 7 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 3:
It has been reported that after establishing Anyconnect SSL VPN session from “”client_pc” to ASA1 the
HTTP traffic for server1 and server2 is not getting redirected to WSA. Fix the issues so that web traffic
originated from “client_pc” gets redirected to WSA.
Notes:
Use FireFox from “client_pc” for incident verification
Server1 and Server2 Web Credentials: cisco/cisco
Total Breaks: 4
Dependency on: incident 1
www.passseclabs.com 8 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 4:
A ticked has been opened for the DMVPN implemented in which there is no reachability between the
protected networks 192.168.5.x and 192.168.6.x, see below output. Fix the issue so that secure
connectivity is established between the two networks.
Total Breaks: 1
www.passseclabs.com 9 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 5:
It has been reported that Site-1 and Site-2 not encrypting traffic between networks 192.168.13.0/24
and 192.167.14.0/24 using VRF-Aware GETVPN. Fix the issue so that Site-1 and Site-2 able to secure
traffic between the two networks.
Total Breaks: 2
www.passseclabs.com 10 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 6:
A ticket has been opened complaining there is no reachability from R8 to Server1 and Server2. Fix the
issue so that the reachability is established.
Total Breaks: 1
www.passseclabs.com 11 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 7:
It has been reported that user “cisco” using Dot1x failed to connect to the network from “dot1x_pc”.
Fix the issues so that user “cisco” is able to connect to the network. Make sure after the connection is
established you can browse to “server2.cisco.com” and ping “server1.cisco.com” from “dot1x_pc”.
Note:
Server2 Web Credentials: cisco/cisco
Total Breaks: 3
www.passseclabs.com 12 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 8:
The “mab_pc” is unable to connect to the network using MAB, fix the issues so that “mab_pc” is able
to authenticate and authorize using MAB and able to connect to the network. Make sure after the
connection is establish you can browse “server1.cisco.com” and able to ping “server2.cisco.com” from
“mab_pc”.
Notes:
Server1 Web Credentials: cisco/cisco
Total Breaks: 2
www.passseclabs.com 13 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
Incident 9:
R15 and R19 unable to get DHCP address from DHCP server configured on R18. Fix the issues so that
R15 and R19 can DHCP address and able to ping each other.
Total Breaks: 2
www.passseclabs.com 14 www.ccieseclabs.com
www.passsecuritylabs.com Final Release T1:10-Mar-2018
www.passseclabs.com 15 www.ccieseclabs.com