Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
UsingMultiuserMode
Routingprotocol
ID
AreaNo.
Subnet/wildcard
mask
Subnet/wildcard
mask
192.168.1.3
server.com
OSPF
1
10
192.168.1.0/
0.0.0.255
10.0.0.0/
0.255.255.255
Table2.6RouterRTRparameters
dns-server192.16;.1.3
domain-nameserver.com
-
routerospf1
-
network192.16;.1.00.0.0.255area10
network10.0.0.00.255.255.255area
10
Step;.SetupSSHserverinrouterRTRaccordingtothegivenassumptions.TheIOS
systemcommandsarepresentedinthelastcolumnofthetable.
SSHDomain
TheRSAkeylength
SSHAccount
admin1
admin456
server.com
1024
usernameadmin1privilege15secretadmin456
ipdomain-nameserver.com
cryptokeygeneratersa
Table2.7SSHparameters
Step9.SetupAAA(RADIUS)authenticationforSSHinRTRrouteraccordingtothe
givenassumptions.TheIOSsystemcommandsarepresentedinthelastcolumnofthe
table.
RADIUSserver’s
address
RADIUSserver’s
key
Theinclusionofthe
authenticationfor
SSH
192.168.1.5
Krakers456
-
radius-serverhost192.16;.1.5
radius-serverkeyKrakers456
aaanew-model
aaaauthenticationlogindefaultgroup
radiuslocal
linevty04
loginauthenticationdefaulttransport
inputssh
Table2.;AAA(RADIUS)parameters
Step10.Ready-madetopologyshouldberecordedinthefileexercise1-internal-
network-topology-in-the-server-room.pkt
2.3Creatingexternalnetworks(Exercise2)
Part1.Preparingandconfiguringexternaltopologies
30