Category: Network Security 1.0

6.3.7 Packet Tracer – Configure OSPF Authentication Answers

6.3.7 Packet Tracer – Configure OSPF Authentication (Answeers Version) Tolology: Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/0 10.1.1.1 255.255.255.252 N/A N/A G0/0/1 192.168.1.1 255.255.255.0 N/A S1F0/5 R2 G0/0/0 10.1.1.2 255.255.255.252 N/A N/A G0/0/1 10.2.2.2 255.255.255.252 N/A N/A R3 G0/0/0 10.2.2.1 255.255.255.252 …

21.7.6 Optional Lab – Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI Answers

21.7.6 Optional Lab – Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI Answers Topology Topology Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/0 172.16.3.1 255.255.255.0 N/A S3 F0/5 G0/0/1 209.165.200.225 255.255.255.248 ASA G1/1 ASA G1/1 (OUTSIDE) 209.165.200.226 255.255.255.248 N/A R1 G0/0/1 …

19.5.6 Lab – Configure a Site-to-Site VPN Answers

19.5.6 Lab – Configure a Site-to-Site VPN Answers Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 F0/5 G0/0/0 10.1.1.1 255.255.255.252 N/A N/A R2 G0/0/0 10.1.1.2 255.255.255.252 N/A N/A G0/0/1 10.2.2.2 255.255.255.252 N/A N/A R3 G0/0/1 192.168.3.1 255.255.255.0 N/A …

17.2.7 Lab – Certificate Authority Stores Answers

17.2.7 Lab – Certificate Authority Stores Answers Objectives Part 1: Certificates Trusted by Your Browser Part 2: Checking for Man-In-Middle Background / Scenario As the web evolved, so did the need for security. HTTPS (where the ā€˜Sā€™ stands for security) along with the concept of a Certificate Authority …

16.1.6 Lab – Hashing Things Out Answers

16.1.6 Lab – Hashing Things Out Answers Objectives Part 1: Hashing a Text File with OpenSSL Part 2: Verifying Hashes Background / Scenario Hash functions are mathematical algorithms designed to take data as input and generate a fixed-size, unique string of characters, also known as the hash. Designed …