![]() ![]() Lab – Configuring Zone-Based Policy Firewalls (Instructor Version) Appendix – Multiple Interfaces under the Same Zone (optional).Step 1: Traffic originating on the Internet.Task 1: Verify ZPF Firewall Functionality.Step 5: Assign Interfaces to the Proper Security Zones.Task 2: Create a Zone-Based Policy Firewall.Step 2: Display the R3 running configurations.Step 1: Verify end-to-end network connectivity.Task 1: Verify Current Router Configurations.Part 2: Configuring a Zone-Based Policy Firewall (ZPF).Step 8: Save the basic running configuration for all three routers.Step 7: Configure a user account, encrypted passwords and crypto keys for SSH.Step 6: Verify basic network connectivity.Step 4: Configure static routes on R1, R2, and R3.Step 2: Configure basic settings for each router.Step 1: Cable the network as shown in the topology. ![]() Lab – Configuring Zone-Based Policy Firewalls (Instructor Version). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |