From year to year, Cisco has updated plenty of versions with difference questions. The latest version is version 6.0 in 2018. What is her version? It counts on your instructor producing your class. We recommend you to go thought all variation if you space not clear. While friend take online test v netacad.com, friend may acquire random inquiries from every version. Every version have actually 1 to 10 various questions or more. After you review all questions, You have to practice v our virtual test mechanism by go to "Online Test" link below.

You are watching: 9.4.1.2 packet tracer - skills integration challenge

Version 5.02Version 5.03Version 6.0Online Assessment
Chapter 9 ExamChapter 9 ExamChapter 9 ExamOnline Test
Next Chapter
Chapter 10 ExamChapter 10 ExamChapter 10 ExamOnline Test
Lab Activities
 9.1.2.6 Packet Tracer – investigating NAT Operation
 9.2.1.4 Packet Tracer – Configuring revolution NAT
 9.2.2.5 Packet Tracer – Configuring Dynamic NAT
 9.2.3.6 Packet Tracer – Implementing Static and Dynamic NAT
 9.2.4.4 Packet Tracer – Configuring harbor Forwarding ~ above a Wireless Router
 9.3.1.4 Packet Tracer – Verifying and Troubleshooting NAT Configurations
 9.4.1.2 Packet Tracer – an abilities Integration Challenge

Packet Tracer – skills Integration challenge (Answer Version)

Answer Note: Red font shade or gray highlights show text that shows up in the price copy only.

Topology


*
*

9.4.1.2 Packet Tracer – an abilities Integration Challenge


Addressing Table

Answer Note: The college student version has blanks in location of every variables presented in double brackets.

DeviceInterfaceIP AddressSubnet MaskDefault Gateway
<>G0/0.15<><>N/A
G0/0.30<><>N/A
G0/0.45<><>N/A
G0/0.60<><>N/A
S0/0/0<>255.255.255.252N/A
S0/0/1<>255.255.255.252N/A
S0/1/0<>255.255.255.252N/A
<>G0/0<><>N/A
S0/0/0<>255.255.255.252N/A
S0/0/1<>255.255.255.252N/A
<>G0/0<><>N/A
S0/0/0<>255.255.255.252N/A
S0/0/1<>255.255.255.252N/A
<>VLAN 60<><><>
<>NICDHCP AssignedDHCP AssignedDHCP Assigned

VLANs and also Port Assignments Table

VLAN Number – NamePort assignmentNetwork
15 – ServersF0/11 – F0/20<>
30 – PCsF0/1 – F0/10<>
45 – NativeG0/1<>
60 – ManagementVLAN 60<>

Scenario

This culminating task includes numerous of the an abilities that you have actually acquired throughout this course. First, friend will complete the documentation for the network. Make sure you have actually a published version that the instructions. During implementation, you will configure VLANs, trunking, harbor security and SSH remote access on a switch. You will certainly then implement inter-VLAN routing and also NAT top top a router. Finally, you will usage your documentation come verify her implementation by experimentation end-to-end connectivity.

Documentation

You are compelled to fully paper the network. Friend will require a publish out of this instruction set, i beg your pardon will encompass an unlabeled topology diagram:

Label every the an equipment names, network addresses and other crucial information the Packet Tracer generated.Complete the Addressing Table and VLANs and Port Assignments Table.Fill in any blanks in the Implementation and Verification steps. The details is supplied once you beginning the Packet Tracer activity.

Implementation

Note: All tools in the topology except <>, <>, and <> are fully configured. You carry out not have access to the various other routers. You can access all the servers and PCs for trial and error purposes.

Implement to following requirements using your documentation:

<>

Configure far management access including IP addressing and also SSH:Domain is cisco.comUser <> through password <>Crypto crucial length that 1024SSH version 2, minimal to 2 authentication attempts and also a 60 2nd timeout making use of the adhering to commands:ip ssh variation 2ip ssh authentication-retries 2ip ssh time-out 60Clear message passwords need to be encrypted.Configure, name and also assign VLANs. Ports must be manually configured as access ports.Configure trunking.Implement harbor security:On F0/1, allow 2 MAC addresses that room automatically included to the configuration record when detected. The port should not be disabled, however a syslog message have to be caught if a violation occurs.Disable all other unused ports.

<>

Configure inter-VLAN routing.Configure DHCP services for VLAN 30. Use LAN as the case-sensitive name for the pool.Implement routing:Use RIPv2 as the routing protocol.Configure one network statement because that the entire <> resolve space.Disable interfaces that should not send RIPv2 messages.Configure a default path to the Internet.Implement NAT:Configure a standard, one explain ACL number 1. All IP addresses belonging to the <> address space are allowed.Refer to your documentation and configure static NAT because that the file Server.Configure dynamic NAT v PAT making use of a swimming pool name of your choice, a /30 mask, and these two public addresses:

<>

<>

Verify <> has received complete addressing details from <>.

Verification

All gadgets should now have the ability to ping all various other devices. If not, troubleshoot your configurations to isolate and also solve problems. A couple of tests include:

Verify remote access to <> by making use of SSH from a PC.Verify VLANs are assigned to suitable ports and port defense is in force.Verify RIP neighbors and also a complete routing table.Verify NAT translations and statics.Outside hold should be able to access File Server at the public address.Inside PCs have to be able to access Web Server.Document any type of problems you encountered and also the options in the Troubleshooting Documentation table below.

Troubleshooting Documentation

ProblemSolution

Suggested Scoring Rubric

Packet Tracer scores 70 points. Documentation is precious 30 points.

See more: How To Tell If A Raccoon Is Male Or Female Raccoons, How To Tell A Male From A Female Raccoon

ID:<><>

*****************************************************ISOMORPH identifier KEY:ID = XY where;X = indexAdds because that /24 private attend to spaceY = indexNAMES for machine namesNote: each seed has variables that space independentof the other seeds. You perform not must test all thevarious combinations.

!!!!!!!!!!!!!!!!!!!!!!!! !HQ-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ! en conf t int vlan 60 ip add 172.16.15.10 255.255.255.248 no close up door ip default-gateway 172.16.15.9 vlan 15 name Servers vlan 30 name pcs vlan 45 name indigenous vlan 60 name monitoring interface selection fa0/1 - 10 switchport mode access switchport accessibility vlan 30 interface fa0/1 switchport port-security switchport port-security preferably 2 switchport port-security mac-address difficult switchport port-security violation border interface selection fa0/11 - 20 switchport mode access switchport accessibility vlan 15 user interface g0/1 switchport mode trunk switchport trunk native vlan 45 interface variety fa0/21 - 24 , g0/2 shutdown ip domain-name cisco.com crypto key gen rsa 1024 user HQadmin happen ciscoclass business password-encryption ip ssh version 2 ip ssh auth 2 ip ssh time 60 line vty 0 15 login local transport input ssh

======================================================= ISOMORPH id = 11 ======================================================= !Admin!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! en conf t ip dhcp swimming pool LAN network 10.10.10.192 255.255.255.192 default-router 10.10.10.193 interface GigabitEthernet0/0 no shutdown user interface GigabitEthernet0/0.15 encapsulation dot1Q 15 ip resolve 10.10.10.161 255.255.255.224 ip nat inside user interface GigabitEthernet0/0.30 encapsulation dot1Q 30 ip attend to 10.10.10.193 255.255.255.192 ip nat inside interface GigabitEthernet0/0.45 encapsulation dot1Q 45 indigenous ip deal with 10.10.10.129 255.255.255.240 interface GigabitEthernet0/0.60 encapsulation dot1Q 60 ip address 10.10.10.145 255.255.255.240 router rip variation 2 passive-interface GigabitEthernet0/0 network 172.16.0.0 user interface s0/0/0 ip nat inside user interface s0/0/1 ip nat inside interface s0/1/0 ip nat exterior ! ip nat pool TEST 198.133.219.128 198.133.219.129 netmask 255.255.255.252 ip nat inside resource list 1 swimming pool TEST overload ip nat inside resource static 10.10.10.162 198.133.219.130 ip route 0.0.0.0 0.0.0.0 Serial0/1/0 access-list 1 permit 10.10.10.0 0.0.0.255 finish wr

!!!!!!!!!!!!!!!!!!!!!!!! !Admin-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! en conf t int vlan 60 ip add 10.10.10.146 255.255.255.240 no shut ip default-gateway 10.10.10.145 vlan 15 surname Servers vlan 30 name computers vlan 45 name native vlan 60 name administration interface range fa0/1 - 10 switchport mode access switchport access vlan 30 interface fa0/1 switchport port-security switchport port-security preferably 2 switchport port-security mac-address difficult switchport port-security violation border interface variety fa0/11 - 20 switchport mode access switchport accessibility vlan 15 interface g0/1 switchport setting trunk switchport trunk indigenous vlan 45 interface range fa0/21 - 24 , g0/2 shutdown ip domain-name cisco.com crypto an essential gen rsa 1024 user Admin happen letmein company password-encryption ip ssh variation 2 ip ssh auth 2 ip ssh time 60 heat vty 0 15 login local transport input ssh

=============================================================== ISOMORPH ID: 22 =============================================================== !Central!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! en conf t ip dhcp pool LAN network 192.168.45.128 255.255.255.192 default-router 192.168.45.129 interface GigabitEthernet0/0 no shutdown interface GigabitEthernet0/0.15 encapsulation dot1Q 15 ip deal with 192.168.45.65 255.255.255.192 ip nat inside user interface GigabitEthernet0/0.30 encapsulation dot1Q 30 ip attend to 192.168.45.129 255.255.255.192 ip nat inside interface GigabitEthernet0/0.45 encapsulation dot1Q 45 native ip attend to 192.168.45.17 255.255.255.240 user interface GigabitEthernet0/0.60 encapsulation dot1Q 60 ip deal with 192.168.45.33 255.255.255.240 router rip version 2 passive-interface GigabitEthernet0/0 network 172.16.0.0 interface s0/0/0 ip nat inside user interface s0/0/1 ip nat inside user interface s0/1/0 ip nat outside ! ip nat pool TEST 64.100.32.56 64.100.32.57 netmask 255.255.255.252 ip nat inside resource list 1 swimming pool TEST overload ip nat inside resource static 192.168.45.66 64.100.32.58 ip path 0.0.0.0 0.0.0.0 Serial0/1/0 access-list 1 permit 192.168.45.0 0.0.0.255 end wr

!!!!!!!!!!!!!!!!!!!!!!!! !Cnt-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! en conf t int vlan 60 ip add 192.168.45.34 255.255.255.240 no shut ip default-gateway 192.168.45.33 vlan 15 name Servers vlan 30 name computers vlan 45 name aboriginal vlan 60 name management interface variety fa0/1 - 10 switchport mode access switchport access vlan 30 interface fa0/1 switchport port-security switchport port-security preferably 2 switchport port-security mac-address sticky switchport port-security violation limit interface selection fa0/11 - 20 switchport mode access switchport access vlan 15 user interface g0/1 switchport setting trunk switchport trunk indigenous vlan 45 interface selection fa0/21 - 24 , g0/2 shutdown ip domain-name cisco.com crypto an essential gen rsa 1024 user CAdmin pass itsasecret company password-encryption ip ssh version 2 ip ssh auth 2 ip ssh time 60 line vty 0 15 login local transport intake ssh