Copy and paste the following corrections from your Configuring a Dedicated VPN Using a Tunnel and Data Encryption lab below, Task S, Step 3: After you create the access list, enter the Do Show Access-List command to verb’ the access list is correct. Paste a copy of the output below. (I point) * “*Professor, I’m using the Windows build in Snipping tool.
This is much easier, cleaner, and more simple than print screen copy paste resize lalalalalala please let me know if this Will be a legitimacy issue so maybe I could like type my name in the next line of code or something for you to know)Question: What is the purpose of the access list when configuring a VPN? (Hint) Read and study the explanations within the lab for assistance. (2 points) The access list is used to define the subnet (traffic) that should use the VPN and also the allowed number of pip’s permitted. Task 10, Step 1: Paste a screens showing the sequence of commands that you used to issue the “extended Ring” command on the Branch router, (1 point) Question: Why was it necessary to use the extended Ping command as opposed to the simple version of the command? (Hint) Read and study the explanations thin the lab for assistance. 2 points) This is because we have configured out access list to define VPN traffic only if it’s coming from the 10. 1 , I . 0/24 subnet, Because of this, we need to override the pre-established ping protocol rules which use the outgoing interface address as the source. Task 10, Step 2′ paste a screens showing the output of the “show crypto map” on the Branch router (ENGAGED).
(1 point) Question: According to the crypto map, What is the network address Of the traffic allowed to traverse the VPN? (Hint) Read and study the explanations within the ABA for assistance. 2 points) The network address Of traffic allowed to traverse should be coming from the 10. 1. 1. 0/24 subnet and traversing to a destination of 172. 16.
1. 0/24 Task 10, Step 4: Paste a screens below showing the contents of the crypto map on the Head-Office router (ENGAGED). (1 point) Question: Which network device corresponds to the “peer specified in the crypto map? (Hint) Read and study the explanations within the lab for assistance, (2 points) The peer device associated with this crypto map is 192. 1683. 2 and is ENGAGED Managing Remote Access Sessions lab (20 points)Review the grading rubric below, and then complete the work for each step as indicated. Category Section 2 Managing Remote Access Sessions-? 20 points Task 1: step 11 Task 1: step 17 Task 1: step 24 Task 1: step 26 Related Explanations or Responses In your own words, summarize what you have learned about managing remote access sessions.
What Vass accomplished in this lab; what you learned by performing it; how it relates to this week’s Tacos and other course material; and, just as important, how you feel it will benefit you in your academic and professional career. 8 mints) The Week 1 A assignment was a great learning experience on how to configure and access router consoles. We learned everything from simply accessing the router console to encrypting the configuring and establishing crypto map assignments. I really enjoyed learning the manual commands for everything, especially creating and sending out shared keys. While work with VPN connections for my job, don’t get many opportunities to do or learn these commands and I feel that learning it the way we did line con Throughout the lab has given mea new tool in my shed to see and understand behind the scenes ND how things work.Copy and paste the following corrections from your Managing Remote Access Sessions lab below. Task 1, Step 11: Paste a screens tooth output of the Show Terminal command executed from router ENGAGED.
Remember to press the spacer when you see the “-?more-?” at the bottom to the screen to continue the output. It may take two screen captures to obtain all of the information. (l point) Question: What command was used to modify the size of the history buffer and from what command prompt was it issued? (Hint) Read and study the explanations within the lab for assistance. Points) The command use to increase the size of the history input from the command prompt was #history size 100 which increased the amount Of lines shown to 100_ This command prompt is issued from the confining line “line con O”. Task 1, Step 17: Paste a screens showing the output Of the Show Sessions command issued from router ENGAGED. (1 point) Question: What is the significance of the placement of the asterisk in the output of the Show Sessions command? (Hint) Read and study the explanations within the lab for assistance. 2 points) The asterisk signifies the last telnet session I seed Task 1, Step 24: Paste a screens of the output of the Show Users command issued from router ENGAGED. (1 point) Question: Notice that the user field is blank.
What configuration modification could have been made that would have required a specific surname to be entered? (Hint) Read and study the explanations within the lab for assistance. (2 points) The user field could have been filled by configuring telnet to use a surname and password combination instead of just a password. In doing so a surname would show up in the user field instead of it being blank.Task I, Step 26: Paste a screens Of the output Of the Show Sessions command issued from router ENGAGED. (1 point) Question: At this point, there is only one entry in the session list.
What command is used to terminate a remote connection when you are at the remote device’s command prompt? (1 point) The command to disconnect a remote device in this scenario is Disconnect 2 Question: What command is used to terminate a remote connection from the local device? (1 point) The command to disconnect a local session is simply Exit (Hint) Read and study the explanations within the lab for assistance.