Public - Resetting and Checking the DH310B/SET264 hardware

Cisco ASA

Testing the ASA Firewall

  1. Power off and power on the ASA appliance by removing the power cable from the rear of the device, then re-inserting it
  2. Connect to P-1 for the ASA on the patch panel
  3. Connect the WAN port for the ASA to Port 22 on the patch panel above the POD switch
  4. DHCP should give you a 192.168.1.x IP address
  5. Open https://192.168.1.1/ and ignore the certificate error
  6. Select "Run ASDM"
  7. Allow it to run
  8. It will say its untrusted, click "Continue"
  9. Click "Run" again
  10. Leave the username and password blank, click "OK"
  11. Under wizard run "Startup Wizard"
  12. Select "Modify existing settings"
  13. Leave at defaults on this page
  14. Leave the next page at defaults
  15. Leave the next page at the defaults
  16. Select use Outside IP Address, and enter in the Outside and Inside IP Addresses from the table below. Use an Outside mask of 255.255.255.240 and inside mask of 255.255.255.0

     

    Inside

    Outside

    Blue Pod

    192.168.61.1

    84.204.141.12

    Yellow Pod

    192.168.51.1

    89.22.200.12

    White Pod

    192.168.41.1

    119.187.223.12

    Red Pod

    192.168.31.1

    196.137.23.12

    Orange Pod

    192.168.21.1

    201.205.148.12

    Green Pod

    192.168.11.1

    220.51.79.12

  17. Change the DHCP to match the network used on the inside LANJust use Google DNS for the DNS servers, the ones used in the actual lab only work if the lab is connected to Verizon
  18. Leave it on "Enable PAT"
  19. Change ASDM allowed IP to match the DHCP for the internal interface
  20. Click "Finish"
  21. It'll say "Error" sending command. Click "Close"
  22. Add a default route to the WAN interface
  23. Close ASDM
  24. Disconnect and reconnect Ethernet to P-1


Resetting the ASA to classroom defaults via command line

  1. Connect to the COM port with your console cable
  2. Open putty/hyperterminal/terraterm to the COM port connect to it
  3. Type in "enable"Press <enter>, there should be no password
  4. Run "config t" to enter configure mode
  5. Run "configure factory-default" to reset the asa to factory defaults
  6. Run "copy run start" to save the factory defaults

  1. Run "reload" to load the startup config
  2. Connect an Ethernet cable and open ASDM at https://192.168.1.1
  3. No username or password
  4. Click "Do not enable Smart Call Home"
  5. Click the "Save" button

If ASDM doesn't load

  1. Enter configuration mode by running "enable", press <enter> for no password, then "config t"
  2. Run "asdm image flash:?"
  3. Type in "asdm image flash:/asd-<tab>" which should auto complete the image name
  4. Run "copy run start" to save the image change
  5. Run "reload" to test the config change


Dell Sonicwall

Testing the Dell Sonicwall

  1. Connect to the LAN port on the Sonicwall
  2. Look for your default gateway, if the Sonicwall has been reset to factory defaults it will be 192.168.168.168
  3. Open that url in IE or Firefox https://192.168.168.168
    1. Chrome doesn't allow you to skip the cipher mismatch easily
    2. Skip the SSL error
  4. Login to the sonicwall interface
    1. The default username and password is : admin/password
  5. At this point the device is verified operational

Thorough testing – WAN Connectivity

  1. Open the Network group on the left side, then the interfaces panel
    1. Change the WAN IP address to match below
      1. The gateway is the same as the WAN IP but ending in .1
      2. Subnet mask is /28 or 255.255.255.240
      3. The DNS servers are the standard Comcast ones of 75.75.75.75
    2. Change the LAN IP address to match the PODs Ips
      1. You will lose connectivity when it applies, just run an ipconfig /release and ipconfig /renew

        POD

        LAN

        WAN – Default gateway is .1

        Blue

        192.168.62.1

        84.204.141.5

        Yellow

        192.168.52.1

        89.22.200.5

        White

        192.168.42.1

        119.187.223.5

        Red

        192.168.32.1

        196.137.23.5

        Orange

        192.168.22.1

        201.205.148.5


    3. Connect the WAN link to the port 22 on the patch panel for uplink
    4. Verify from your machine you can ping the default gateway of the WAN link

Thorough Testing – VPN

  1. Get the Sonicwall registration key from portal for your POD
    1. Open System/Licenses in the Sonicwall
    2. Paste the key in and click "Submit"
  2. Open the Users/Local Users on the sonicwall
    1. Add a new user…
      1. Give it a name and password
      2. Under VPN Access add "LAN Subnets"
      3. Click OK
  3. Open the VPN/Settings panel on the sonicwall
    1. Enable the "WAN GroupVPN" VPN
    2. Click the Edit button next to the "WAN GroupVPN" under Configure
    3. Store the Shared Secret part, you will need this, then close the Window
  4. Connect your machine or another machine to the normal switch
    1. You should no longer have access to the sonicwall management
    2. Download the sonicwall VPN client from http://help.mysonicwall.com/Applications/vpnclient/
    3. Install it
    4. The new connection wizard will automatically open, click Next
    5. Enter in the WAN address of your SonicWall device
    6. Click "Finish"
  5. The Client should pop up
    1. Click Enable for the connection for your device
    2. Enter in the Shared Secret you stored above
    3. Enter in the username and password for your user you made
      1. If the license was not previously entered correctly,you will get an error, and the log will show this
    4. If the license is correct you should be connected

Resetting the SonicWall – Web UI

  1. Open System/Settings
    1. Click the boot icon next to "Current Firmware with Factory Default Settings"
  2. It will reboot and be back to 192.168.168.168 as an IP

Resetting the Sonicwall – Physical

  1. Power off the sonicwall
  2. Insert a paperclip into the reset button
  3. Power on the sonicwall while leaving the reset button pressed in
  4. Once the test light stops blinking you can remove the paperclip

Cisco RV042

Testing the RV042

  1. Connect your machine to the LAN port on the RV042
  2. Connect the WAN port of the RV042 to port 22 on the patch panel
  3. Look at the default gateway for your machine and open it in the web browser
    1. The default password is admin/admin
  4. Configure the IP's like so

    POD

    LAN

    WAN – Default gateway is .1

    Blue

    192.168.63.1

    84.204.141.2

    Yellow

    192.168.53.1

    89.22.200.2

    White

    192.168.43.1

    119.187.223.2

    Red

    192.168.33.1

    196.137.23.2

    Orange

    192.168.23.1

    201.205.148.2

    1. Once configured it should look like this
  5. Make sure you can ping the default gateway

Resetting the RV042

  1. Use a paperclip to hold in the reset button for 30 seconds on the back of the device