2.1 Sometimes you just do what they tell you to do.

3.2 I would have interpreted that as VTI not sure on the answer

4.2 sometimes I have noticed it is best to enable NTP.  After NTP is working 
then enable authentication

5.3 is a problem with our translation of the topology.  Choose another device.

6.0 that would be a question for the proctor

7.1 be careful on restrictions.  

 

Regards,

 

Tyson Scott - CCIE #13513 R&S, Security, and SP

Managing Partner / Sr. Instructor - IPexpert, Inc.

Mailto:  <mailto:[email protected]> [email protected]

Telephone: +1.810.326.1444, ext. 208

Live Assistance, Please visit:  <http://www.ipexpert.com/chat> 
www.ipexpert.com/chat

eFax: +1.810.454.0130

 

IPexpert is a premier provider of Self-Study Workbooks, Video on Demand, Audio 
Tools, Online Hardware Rental and Classroom Training for the Cisco CCIE (R&S, 
Voice, Security & Service Provider) certification(s) with training locations 
throughout the United States, Europe, South Asia and Australia. Be sure to 
visit our online communities at  <http://www.ipexpert.com/communities> 
www.ipexpert.com/communities and our public website at  
<http://www.ipexpert.com/> www.ipexpert.com

 

From: [email protected] 
[mailto:[email protected]] On Behalf Of Jimmy Larsson
Sent: Tuesday, June 29, 2010 4:36 PM
To: OSL Security
Subject: [OSL | CCIE_Security] Notes from my attempt on Yusufs Lab 1

 

Dudes

 

I did an attempt on Yusufs Lab 1 a few days ago. Below are my notes from that 
session. I would very much like feedbacks on these from those of you who has 
worked thru the lab already.

 

Q2.1 – configure NAT on ASA:s. Do not enable NAT Control. Configure static 
identity nat on context abc1 for web server.

Why configure identity nat? There is no NAT configured on the device, whats the 
purpose of adding a “static (i,o) 10.7.7.7 10.7.7.7.7″ statement? It works both 
with and without it.

Q2.1 – “Configure static NAT on ASA2 such that Sw2 can reach dest R6 Lo0 
interface using local address 192.168.10.6″

this is an ugly one! I did source translation (Telnet from Sw2:s real address 
TO 192.168.10.6) but I was supposed to do destination translation (telnet FROM 
Sw2:s natted source address 192.168.10.6). It´s SO easy to misinterprete the 
questions!

Q3.2 – “Configure IPSEC on ASA2 and R5. Configure high-availability IPsec 
peering in such wah tyat it should continue to work if euther WAN link on R5 
goes down. You are not allowed to configure multiple crypto maps of mutiple 
peer statements. Only one crypto map with one peer statement is allowed on bith 
sides”.
In my opinion “high availability IPsec” is plain IPsec on router spiced up with 
HSRP redundancy and RRI. But here is no HSRP involved since the the requirement 
is to esablish ipsec between one ASA and one router.

My solution to this was to create a new loopback on R5, route the remote 
network (Sw2 lo0) to that loopback and apply the crypto map on this loopback. I 
guess the drawback with this is routing ALL traffic destined for Sw2 Lo0 to the 
loopback interface, not only traffic hitting the crypto map (sourced R5 lo0). I 
doubt that my solution would get any points on the real lab… But either way 
have the desired results, imho.

Q4.2 – “configure NTP on IPS Sensor”

I was unable to configure NTP. Got the same error message both in IDM and CLI:
“Error: Authenticaion failed – invalid NTP key value or ID”

This happened in CLI:


IPS(config)# service host
IPS(config-hos)# ntp-option enabled
IPS(config-hos-ena)# ntp-keys 1 md5-key cisco
IPS(config-hos-ena)# ntp-servers 10.1.1.1 key-id 1
IPS(config-hos-ena)# exit
IPS(config-hos)# exit
Apply Changes?[yes]: yes
Error: Authentication failed - invalid NTP key value or ID

There is obviously communications because these ntp debugs shows up on the NTP 
server R1:


R1#
Jun 27 12:54:52.811: NTP message received from 192.168.2.12 on interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.811: NTP Core(DEBUG): ntp_receive: message received
Jun 27 12:54:52.811: NTP Core(DEBUG): ntp_receive: peer is 0x00000000, next 
action is 3.
Jun 27 12:54:52.811: NTP Core(DEBUG): ntp_receive: doing fast answer to client.
Jun 27 12:54:52.811: NTP message sent to 192.168.2.12, from interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.811: NTP message received from 192.168.2.12 on interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.815: NTP Core(DEBUG): ntp_receive: message received
Jun 27 12:54:52.815: NTP Core(DEBUG): ntp_receive: peer is 0x00000000, next 
action is 3.
Jun 27 12:54:52.815: NTP Core(DEBUG): ntp_receive: doing fast answer to client.
Jun 27 12:54:52.815: NTP message sent to 192.168.2.12, from interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.815: NTP message received from 192.168.2.12 on interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.815: NTP Core(DEBUG): ntp_receive: message received
Jun 27 12:54:52.815: NTP Core(DEBUG): ntp_receive: peer is 0x00000000, next 
action is 3.
Jun 27 12:54:52.815: NTP Core(DEBUG): ntp_receive: doing fast answer to client.
Jun 27 12:54:52.815: NTP message sent to 192.168.2.12, from interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.819: NTP message received from 192.168.2.12 on interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.819: NTP Core(DEBUG): ntp_receive: message received
Jun 27 12:54:52.819: NTP Core(DEBUG): ntp_receive: peer is 0x00000000, next 
action is 3.
Jun 27 12:54:52.819: NTP Core(DEBUG): ntp_receive: doing fast answer to client.
Jun 27 12:54:52.819: NTP message sent to 192.168.2.12, from interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.919: NTP message received from 192.168.2.12 on interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.919: NTP Core(DEBUG): ntp_receive: message received
Jun 27 12:54:52.919: NTP Core(DEBUG): ntp_receive: peer is 0x00000000, next 
action is 3.
Jun 27 12:54:52.923: NTP Core(DEBUG): ntp_receive: doing fast answer to client.
Jun 27 12:54:52.923: NTP message sent to 192.168.2.12, from interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.923: NTP message received from 192.168.2.12 on interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.923: NTP Core(DEBUG): ntp_receive: message received
Jun 27 12:54:52.923: NTP Core(DEBUG): ntp_receive: peer is 0x00000000, next 
action is 3.
Jun 27 12:54:52.923: NTP Core(DEBUG): ntp_receive: doing fast answer to client.
Jun 27 12:54:52.923: NTP message sent to 192.168.2.12, from interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.927: NTP message received from 192.168.2.12 on interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.927: NTP Core(DEBUG): ntp_receive: message received
Jun 27 12:54:52.927: NTP Core(DEBUG): ntp_receive: peer is 0x00000000, next 
action is 3.
Jun 27 12:54:52.927: NTP Core(DEBUG): ntp_receive: doing fast answer to client.
Jun 27 12:54:52.927: NTP message sent to 192.168.2.12, from interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.927: NTP message received from 192.168.2.12 on interface 
'Loopback0' (10.1.1.1).
Jun 27 12:54:52.927: NTP Core(DEBUG): ntp_receive: message received
Jun 27 12:54:52.927: NTP Core(DEBUG): ntp_receive: peer is 0x00000000, next 
action is 3.
Jun 27 12:54:52.927: NTP Core(DEBUG): ntp_receive: doing fast answer to client.
Jun 27 12:54:52.927: NTP message sent to 192.168.2.12, from interface 
'Loopback0' (10.1.1.1).

Q5.1 Typo. “Configure AAA auth on Sw1″ and “Add Sw2 ip address 192.168.8.11″. 
It should be Sw1 everywhere in this task.

Q5.2 CLI views assigned from ACS.
It feels abit weird that there is no pound-sign in the prompt when getting into 
a custom view:


R6#telnet 192.168.4.11
Trying 192.168.4.11 ... Open

Username: netop
Password:

R2>sh pars view
Current view is 'netop'
R2>configure
Configuring from terminal, memory, or network [terminal]? t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)>

Q5.3 Configure Sw2 Fa0/7 for 802.1x
Really? I was expecting the port to configure to be unused/down. Sw2 Fa0/7 is 
the trunk to R1. Enabling port-control here would kill alotá traffic in my 
network, right?  ;) 
<http://blogg.kvistofta.nu/wp-includes/images/smilies/icon_wink.gif> 

Q6.0 configure CoPP on R2 allowing ping source from RFC1918-addresses only.
I created an acl, class-map and policy-map but I applied on “control-plane 
host” instead of “control-plane”. For verification Yusuf runs “show policy-map 
control-plane” which in my solution would give an empty output. But is there 
any difference in my solution and Yusufs? We are talking about icmp pings TO 
the router, why not apply int to the CoP host?

Q7.1 Web server protection.
The task was to limit the number of incoming embryonics to an internal web 
server, on ASA. Of course with limitations on how to ackomplish it. I missed 
the “Do not use ACL” which made me fail. Yusufs solution was to do “match port” 
in the class-map but instead I matched an access-group. To my defense I must 
say that “match port” would put the same limits on ALL incoming tpc/80-traffic 
not only the one destined for our web server.

 

 


-- 
-------
Jimmy Larsson
Ryavagen 173
s-26030 Vallakra
Sweden
http://blogg.kvistofta.nu
-------

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to