From year to year, Cisco has actually updated many type of versions through distinction questions. The latest variation is variation 6.0 in 2018. What is your version? It depends on your instructor developing your course. We recommfinish you to go thought all variation if you are not clear. While you take digital test via netacad.com, You may acquire random questions from all variation. Each version have actually 1 to 10 different questions or even more. After you testimonial all concerns, You have to practice through our digital test system by go to "Online Test" attach listed below.

You are watching: 1.3.1.3 packet tracer - skills integration challenge

Version 5.02Version 5.03Version 6.0Online Assessment
Chapter 1 ExamChapter 1 ExamChapter 1 ExamOnline Test
Next Chapter
Chapter 2 ExamChapter 2 ExamChapter 2 ExamOnline Test
Lab Activities
1.2.1.7 Packet Tracer – Compare 2960 and also 3560 Switches
1.3.1.3 Packet Tracer – Skills Integration Challenge

Packet Tracer – Skills Integration Challenge (Answer Version)

Answer Note: Red font shade or gray highlights indicate text that appears in the Answer copy just.

Topology


*
*

1.3.1.3 Packet Tracer – Skills Integration Challenge


Addressing Table

Answer Note: The student variation has blanks in place of all variables displayed in red double brackets.

DeviceInterfaceIP AddressSubnet MaskDefault Gateway
<>G0/0.15<><>N/A
G0/0.30<><>N/A
G0/0.45<><>N/A
G0/0.60<><>N/A
S0/0/0<>255.255.255.252N/A
S0/0/1<>255.255.255.252N/A
S0/1/0<>255.255.255.252N/A
<>G0/0<><>N/A
S0/0/0<>255.255.255.252N/A
S0/0/1<>255.255.255.252N/A
<>G0/0<><>N/A
S0/0/0<>255.255.255.252N/A
S0/0/1<>255.255.255.252N/A
<>VLAN 60<><><>
<>NICDHCP AssignedDHCP AssignedDHCP Assigned

VLANs and Port Assignments Table

VLAN Number – NamePort assignmentNetwork
15 – ServersF0/11 – F0/20<>
30 – PCsF0/1 – F0/10<>
45 – NativeG0/1<>
60 – ManagementVLAN 60<>

Scenario

This activity contains many kind of of the abilities that you have actually gained in the time of your CCNA research studies. First, you will certainly finish the documentation for the netoccupational. Make certain you have a published variation of the instructions. Throughout implementation, you will connumber VLANs, trunking, port defense and also SSH remote access on a switch. Then, you will implement inter-VLAN routing and NAT on a router. Finally, you will certainly usage your documentation to verify your implementation by trial and error end-to-finish connectivity.

Documentation

You are forced to fully document the netoccupational. You will need a print out of this instruction collection, which will include an unlabeled topology diagram:

Label all the device names, netoccupational addresses and various other crucial indevelopment that Packet Tracer produced.Complete the Addressing Table and also VLANs and also Port Assignments Table.Fill in any blanks in the Implementation and Verification actions. The information is provided as soon as you launch the Packet Tracer activity.

Implementation

Note: All gadgets in the topology except <>, <>, and also <> are fully configured. You execute not have actually accessibility to the various other routers. You deserve to accessibility all the servers and Computers for testing functions.

Implement to complying with needs using your documentation:

<>

Connumber remote management access including IP addressing and SSH:Domain is cisco.comEnable trick ciscoenpassUser <> via password <>Crypto essential size of 1024SSH variation 2, limited to 2 authentication attempts and a 60 second timeoutPlainmessage passwords must be encrypted.Connumber, name and assign VLANs. Ports must be manually configured as access ports.Connumber trunking.Implement port security:On F0/1, enable 2 MAC addresses that are instantly added to the configuration file when detected. The port need to not be disabled, however a syslog message need to be caught if a violation occurs.Disable all various other unprovided ports.

<>

Connumber inter-VLAN routing.Connumber DHCP solutions for VLAN 30. Use LAN as the case-sensitive name for the pool.Implement routing:Use RIPv2.Configure one netjob-related statement for the entire <> attend to area.Disable interfaces that must not sfinish RIPv2 messeras.Configure a default course to the Net.Implement NAT:Configure a conventional, one statement ACL number 1. All IP addresses belonging to the <> address room are enabled.Refer to your documentation and also configure static NAT for the Data Server.Configure dynamic NAT through PAT using a pool name of your choice, a /30 mask, and these 2 public addresses:

<>

<>

Verify <> has got complete addressing information from <>.

Verification

All gadgets must now be able to ping all other gadgets. If not, troubleshoot your configurations to isolate and also solve problems. A few tests include:

Verify remote access to <> by using SSH from a PC.Verify VLANs are assigned to appropriate ports and port defense is in pressure.Verify a complete routing table.Verify NAT translations and also statics.Outside Host should be able to access Data Server at the public resolve.Inside Computers must have the ability to accessibility Net Server.Document any kind of difficulties you encountered and also the options in the Troubleshooting Documentation table listed below.

Troubleshooting Documentation

ProblemSolution

Suggested Scoring Rubric

Packet Tracer scores 75 points. Documentation is worth 25 points.

See more: Cher Lloyd Craig Monk - Cher Lloyd Husband Craig Monk

ID:<><>

*****************************************************

ISOMORPH ID KEY:

ID = XY where;

X = indexAdds for /24 private resolve space

Y = indexNAMES for tool names

Note: Each seed includes variables that are independent

of the various other seeds. You perform not need to test all the

various combicountries.

=======================================================

ISOMORPH ID = 00

=======================================================

!HQ-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!enableconf tint vlan 60ip include 172.16.15.10 255.255.255.248no shureminder default-gateway 172.16.15.9vlan 15name Serversvlan 30name PCsvlan 45name Nativevlan 60name Managementinterface variety f0/1 - 10switchport mode accessswitchport access vlan 30interconfront f0/1switchport port-securityswitchport port-protection maximum 2switchport port-security mac-attend to stickyswitchport port-defense violation restrictinterchallenge array f0/11 - 20switchport mode accessswitchport access vlan 15interconfront g0/1switchport mode trunkswitchport trunk native vlan 45interconfront array f0/21 - 24 , g0/2shutdownip domain-name cisco.comcrypto key gen rsa1024permit secret ciscoenpassuser HQadmin pass ciscoclassservice password-encryptionip ssh variation 2ip ssh auth 2ip ssh time 60line vty 0 15login localtransfer input sshend

=======================================================

ISOMORPH ID = 11

=======================================================

!Admin!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!enableconf guideline dhcp excluded-attend to 10.10.10.193ip dhcp pool LANnetwork 10.10.10.192 255.255.255.192default-rexternal 10.10.10.193interface GigabitEthernet0/0no shutdowninterconfront GigabitEthernet0/0.15encapsulation dot1Q 15ip address 10.10.10.161 255.255.255.224ip nat insideinterface GigabitEthernet0/0.30encapsulation dot1Q 30ip deal with 10.10.10.193 255.255.255.192ip nat insideinterface GigabitEthernet0/0.45encapsulation dot1Q 45 nativeip address 10.10.10.129 255.255.255.240interconfront GigabitEthernet0/0.60encapsulation dot1Q 60ip deal with 10.10.10.145 255.255.255.240rexternal ripvariation 2no auto-summarypassive-interface GigabitEthernet0/0.15passive-interface GigabitEthernet0/0.30passive-interconfront GigabitEthernet0/0.45passive-interface GigabitEthernet0/0.60passive-interchallenge Serial0/1/0netoccupational 10.0.0.0interconfront s0/0/0ip nat insideinterconfront s0/0/1ip nat insideinterconfront s0/1/0ip nat outsideip nat pool TEST 198.133.219.128 198.133.219.129 netmask 255.255.255.252ip nat inside source list 1 pool TEST overloadip nat inside resource static 10.10.10.162 198.133.219.130ip route 0.0.0.0 0.0.0.0 Serial0/1/0access-list 1 permit 10.10.10.0 0.0.0.255end!!!!!!!!!!!!!!!!!!!!!!!!

!Admin-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!enableconf color vlan 60ip add 10.10.10.146 255.255.255.240no shupointer default-gatemethod 10.10.10.145vlan 15name Serversvlan 30name PCsvlan 45name Nativevlan 60name Managementinterface variety f0/1 - 10switchport mode accessswitchport access vlan 30interconfront f0/1switchport port-securityswitchport port-security maximum 2switchport port-defense mac-attend to stickyswitchport port-defense violation restrictinterconfront array f0/11 - 20switchport mode accessswitchport accessibility vlan 15interface g0/1switchport mode trunkswitchport trunk indigenous vlan 45interchallenge range f0/21 - 24 , g0/2shutdownip domain-name cisco.comcrypto vital gen rsa1024allow trick ciscoenpassuser Admin pass letmeincompany password-encryptionip ssh version 2ip ssh auth 2ip ssh time 60line vty 0 15login localdeliver input sshend

===============================================================

ISOMORPH ID: 22

===============================================================

!Central!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!enableconf guideline dhcp excluded-attend to 192.168.45.129ip dhcp pool LANnetwork-related 192.168.45.128 255.255.255.192default-rexternal 192.168.45.129interchallenge GigabitEthernet0/0no shutdowninterconfront GigabitEthernet0/0.15encapsulation dot1Q 15ip deal with 192.168.45.65 255.255.255.192ip nat insideinterconfront GigabitEthernet0/0.30encapsulation dot1Q 30ip resolve 192.168.45.129 255.255.255.192ip nat insideinterface GigabitEthernet0/0.45encapsulation dot1Q 45 nativeip address 192.168.45.17 255.255.255.240interface GigabitEthernet0/0.60encapsulation dot1Q 60ip address 192.168.45.33 255.255.255.240rexternal rippassive-interface GigabitEthernet0/0.15passive-interchallenge GigabitEthernet0/0.30passive-interconfront GigabitEthernet0/0.45passive-interface GigabitEthernet0/0.60passive-interchallenge Serial0/1/0netjob-related 192.168.45.0no auto-summaryvariation 2interchallenge s0/0/0ip nat insideinterconfront s0/0/1ip nat insideinterchallenge s0/1/0ip nat outsideip nat pool TEST 64.100.32.56 64.100.32.57 netmask 255.255.255.252ip nat inside resource list 1 pool TEST overloadip nat inside resource static 192.168.45.66 64.100.32.58ip route 0.0.0.0 0.0.0.0 Serial0/1/0access-list 1 permit 192.168.45.0 0.0.0.255end!!!!!!!!!!!!!!!!!!!!!!!!

!Cnt-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!enableconf tint vlan 60ip include 192.168.45.34 255.255.255.240no shupointer default-gatemeans 192.168.45.33vlan 15name Serversvlan 30name PCsvlan 45name Nativevlan 60name Managementinterface variety f0/1 - 10switchport mode accessswitchport access vlan 30interchallenge fa0/1switchport port-securityswitchport port-protection maximum 2switchport port-defense mac-address stickyswitchport port-protection violation restrictinterface selection f0/11 - 20switchport mode accessswitchport access vlan 15interconfront g0/1switchport mode trunkswitchport trunk aboriginal vlan 45interconfront range f0/21 - 24 , g0/2shutdownip domain-name cisco.comcrypto crucial gen rsa1024permit secret ciscoenpassuser CAdmin pass itsasecretbusiness password-encryptionip ssh version 2ip ssh auth 2ip ssh time 60line vty 0 15login localdeliver input sshend