19.07.2013 Views

CCNP TSHOOT 6.0 - The Cisco Learning Network

CCNP TSHOOT 6.0 - The Cisco Learning Network

CCNP TSHOOT 6.0 - The Cisco Learning Network

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CCNP</strong>v6 <strong>TSHOOT</strong><br />

Task 2: Trouble Ticket Lab 9-1 TT-B<br />

Step 1: Review trouble ticket Lab 9-1 TT-B.<br />

As a further security measure, your company has decided to implement SSH and only allow vty access to key<br />

networking devices from specific management workstations. As a pilot, router R3 will be configured to allow<br />

SSH access from only PC-C (on the R3 LAN) and prevent remote access from any host other than PC-C. For<br />

testing purposes, host PC-C will be used as a management workstation and will be assigned a static address<br />

of 10.1.80.100. Login from PC-C to R3 must be authenticated by the RADIUS server running on SRV1. No<br />

other hosts in the network should be able to access R3 via SSH.<br />

A colleague of yours configured an ACL and SSH access on R3, but due to sporadic hardware issues with<br />

R3, she decided to replace R3 with a comparable router. She says that she backed up the configuration from<br />

the old router to a USB flash drive and loaded it into the new router. Now she is unable to connect to R3 using<br />

SSH from PC-C.<br />

On the RADIUS server, she created a test user named raduser with a password of RadUserpass. <strong>The</strong><br />

implementation plan specifies RADIUS as the primary method of authentication with local authentication as<br />

the backup method.<br />

She has asked for your help in diagnosing and solving the problem.<br />

Step 2: Load the device trouble ticket configuration files for TT-B.<br />

Using the procedure described in Lab 3-1, verify that the lab configuration files are present in flash. Load the<br />

proper configuration files as indicated in the Device Configuration File table.<br />

Note: <strong>The</strong> following device access methods are in effect after installing RADIUS on SRV1 and loading the<br />

configuration files:<br />

• Console access requires no username or password.<br />

• Telnet and SSH require username admin and password adminpa55 (except for R3).<br />

• <strong>The</strong> enable password is ciscoenpa55.<br />

Device Configuration File Table<br />

Device Name File to Load Notes<br />

ALS1 Lab91-ALS1-TT-B-Cfg.txt<br />

DLS1 Lab91-DLS1-TT-B-Cfg.txt<br />

DLS2 Lab91-DLS2-TT-B-Cfg.txt<br />

R1 Lab91-R1-TT-B-Cfg.txt<br />

R2 Lab91-R2-TT-B-Cfg.txt<br />

R3 Lab91-R3-TT-B-Cfg.txt<br />

SRV1 N/A Static IP: 10.1.50.1/24<br />

Default gateway: 10.1.50.254<br />

PC-B N/A DHCP<br />

PC-C N/A Static IP: 10.1.80.100/24<br />

Default gateway: 10.1.80.1<br />

All contents are Copyright © 1992–2010 <strong>Cisco</strong> Systems, Inc. All rights reserved. This document is <strong>Cisco</strong> Public Information. Page 6 of 22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!