19.07.2013 Views

CCNP TSHOOT 6.0 - Cisco Learning Home

CCNP TSHOOT 6.0 - Cisco Learning Home

CCNP TSHOOT 6.0 - Cisco Learning Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CCNP</strong>v6 <strong>TSHOOT</strong><br />

Task 2: Trouble Ticket Lab 9-1 TT-B<br />

Step 1: Review trouble ticket Lab 9-1 TT-B.<br />

As a further security measure, your company has decided to implement SSH and only allow vty access to key<br />

networking devices from specific management workstations. As a pilot, router R3 will be configured to allow<br />

SSH access from only PC-C (on the R3 LAN) and prevent remote access from any host other than PC-C. For<br />

testing purposes, host PC-C will be used as a management workstation and will be assigned a static address<br />

of 10.1.80.100. Login from PC-C to R3 must be authenticated by the RADIUS server running on SRV1. No<br />

other hosts in the network should be able to access R3 via SSH.<br />

A colleague of yours configured an ACL and SSH access on R3, but due to sporadic hardware issues with<br />

R3, she decided to replace R3 with a comparable router. She says that she backed up the configuration from<br />

the old router to a USB flash drive and loaded it into the new router. Now she is unable to connect to R3 using<br />

SSH from PC-C.<br />

On the RADIUS server, she created a test user named raduser with a password of RadUserpass. The<br />

implementation plan specifies RADIUS as the primary method of authentication with local authentication as<br />

the backup method.<br />

She has asked for your help in diagnosing and solving the problem.<br />

Step 2: Load the device trouble ticket configuration files for TT-B.<br />

Using the procedure described in Lab 3-1, verify that the lab configuration files are present in flash. Load the<br />

proper configuration files as indicated in the Device Configuration File table.<br />

Note: The following device access methods are in effect after installing RADIUS on SRV1 and loading the<br />

configuration files:<br />

• Console access requires no username or password.<br />

• Telnet and SSH require username admin and password adminpa55 (except for R3).<br />

• The enable password is ciscoenpa55.<br />

Device Configuration File Table<br />

Device Name File to Load Notes<br />

ALS1 Lab91-ALS1-TT-B-Cfg.txt<br />

DLS1 Lab91-DLS1-TT-B-Cfg.txt<br />

DLS2 Lab91-DLS2-TT-B-Cfg.txt<br />

R1 Lab91-R1-TT-B-Cfg.txt<br />

R2 Lab91-R2-TT-B-Cfg.txt<br />

R3 Lab91-R3-TT-B-Cfg.txt<br />

SRV1 N/A Static IP: 10.1.50.1/24<br />

Default gateway: 10.1.50.254<br />

PC-B N/A DHCP<br />

PC-C N/A Static IP: 10.1.80.100/24<br />

Default gateway: 10.1.80.1<br />

All contents are Copyright © 1992–2010 <strong>Cisco</strong> Systems, Inc. All rights reserved. This document is <strong>Cisco</strong> Public Information. Page 6 of 22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!