Cisco CCNA Lab Guide
Cisco CCNA Lab Guide
Cisco CCNA Lab Guide
Introduction ............................................................................................................................................ 4
How the Lab Works ................................................................................................................................. 4
Get the Complete Course........................................................................................................................ 4
About the Author .................................................................................................................................... 5
04 The IOS Operating System - Lab Exercise........................................................................................... 6
11 Cisco Device Functions Lab Exercise ............................................................................................. 20
12 The Life of a Packet - Lab Exercise ................................................................................................... 27
12 The Life of a Packet Answer Key ................................................................................................... 29
13 The Cisco Troubleshooting Methodology - Lab Exercise ................................................................. 32
13 The Cisco Troubleshooting Methodology Answer Key ................................................................. 34
14 Cisco Router and Switch Basics - Lab Exercise ................................................................................. 40
14 Cisco Router and Switch Basics - Answer Key .................................................................................. 43
15 Cisco Device Management - Lab Exercise ........................................................................................ 50
15 Cisco Device Management - Answer Key ......................................................................................... 53
16 Routing Fundamentals - Lab Exercise .............................................................................................. 63
16 Routing Fundamentals - Answer Key ............................................................................................... 66
17 Dynamic Routing Protocols Lab Exercise ...................................................................................... 81
17 Dynamic Routing Protocols - Answer Key ........................................................................................ 86
18 Connectivity Troubleshooting Lab Exercise ................................................................................ 109
18 Connectivity Troubleshooting - Answer Key .................................................................................. 111
19-1 RIP Configuration Lab Exercise ................................................................................................ 116
19-1 RIP Configuration - Answer Key .................................................................................................. 118
20-1 EIGRP Configuration Lab Exercise ............................................................................................ 127
20-1 EIGRP Configuration - Answer Key.............................................................................................. 130
21-1 OSPF Configuration Lab Exercise ............................................................................................. 146
21-1 OSPF Configuration - Answer Key ............................................................................................... 150
23-1 VLAN and Inter-VLAN Routing Configuration Lab Exercise...................................................... 169
23-1 VLAN and Inter-VLAN Routing Configuration - Answer Key ....................................................... 172
24-1 DHCP Configuration Lab Exercise............................................................................................. 181
24-1 DHCP Configuration - Answer Key .............................................................................................. 184
25-1 HSRP Configuration Lab Exercise ............................................................................................. 189
25-1 HSRP Configuration - Answer Key ............................................................................................... 192
26-1 Spanning Tree Troubleshooting Lab Exercise .......................................................................... 199
26-1 Spanning Tree Troubleshooting - Answer Key ............................................................................ 202
27-1 EtherChannel Configuration Lab Exercise ................................................................................ 213
27-1 EtherChannel Configuration - Answer Key ................................................................................. 215
28-1 Port Security Configuration Lab Exercise .................................................................................... 224
28-1 Port Security Configuration Answer Key..................................................................................... 226
29-1 ACL Configuration Lab Exercise................................................................................................ 231
29-1 ACL Configuration - Answer Key ................................................................................................. 234
30-1 NAT Configuration Lab Exercise ............................................................................................... 245
30-1 NAT Configuration - Answer Key ................................................................................................ 249
31 IPv6 Addressing Configuration - Lab Exercise ................................................................................ 260
31 IPv6 Addressing Configuration - Answer Key ................................................................................. 262
32-1 IPv6 Routing Configuration - Lab Exercise .................................................................................. 274
32-1 IPv6 Routing Configuration - Answer Key ................................................................................... 278
33-1 WAN Configuration Lab Exercise ............................................................................................. 312
33-1 WAN Configuration - Answer Key ............................................................................................... 316
34-1 BGP Configuration Lab Exercise ............................................................................................... 325
34-1 BGP Configuration - Answer Key ................................................................................................ 327
35-1 Cisco Device Security Configuration Lab Exercise.................................................................... 334
35-1 Cisco Device Security Configuration - Answer Key ..................................................................... 338
36 Network Device Management Lab Exercise ............................................................................... 345
36 Network Device Management Answer Key ................................................................................ 347
SPECIAL OFFER Cisco CCNA Complete Course ................................................................................. 352
SPECIAL OFFER AlphaPrep 10 Day Trial............................................................................................ 356
The information contained in this guide is for informational purposes only. Any advice that I give is my opinion based on my
own experience. You should always seek the advice of a professional before acting on something that I have published or
recommended.
The material in this guide may include information, products or services by third parties. Third Party Materials comprise of
the products and opinions expressed by their owners. As such, I do not assume responsibility or liability for any Third Party
material or opinions. You are responsible for complying with any legal requirements such as licensing of Third Party
software.
No part of this publication shall be reproduced, transmitted, or sold in whole or in part in any form, without the prior
written consent of the author. All trademarks and registered trademarks appearing in this guide are the property of their
respective owners.
Introduction
Thanks very much for taking the time to download this free eBook. It contains complete
configuration lab exercises and solutions to help you pass the Cisco CCNA Routing and
Switching 200-125 exam. You can also use it as a configuration reference for Cisco routers
and switches. I hope you can make use of it to expand your networking knowledge and
further your career.
For practice tests I recommend AlphaPrep. They partner with Cisco and the CCNA test
provider Pearson to bring you the most accurate preparation tests, and their advanced test
engine lets you know when youre ready for the exam. Click here for a 10 day trial.
About the Author
Im Neil Anderson, you can visit my blog at www.flackbox.com
to learn about Cloud and Data Center technologies.
The main focus of my current role is delivery of technical
training and development of course content for large enterprise
and service provider customers such as Cisco, NetApp, Verizon
and IBM.
I dropped out of school with no qualifications or future plans at
the age of 15. When I got a little bit older and wiser I realised I
should make a career for myself so I learned about IT
technologies through books and online resources. Its my
passion now to help others do the same.
Connect with me on social media:
04 The IOS Operating System - Lab Exercise
This lab explores basic navigation of the Cisco IOS operating system CLI (Command Line
Interface). Only a single device is required.
This lab is a guided walkthrough of the IOS command line interface. Exercises for later
sections will be split into two parts - first the tasks for you to complete on your own (without
step by step instructions), and then an answer key showing you the solution.
Download the 04 The IOS Operating System.pkt file here. Open in Packet Tracer to load
the lab.
Please watch my short free course showing how to install and use Packet Tracer and GNS3
first if you havent used the software before:
GNS3 and Packet Tracer Installation course
Connect To Your Device
Observe the device going through the bootup process in the command line output. This is
possible because we are using a console connection (we could not see this if we connected
to an IP address on the device.)
If prompted to enter the initial configuration dialog after the device has booted up, enter no.
Notice that you are in User Exec mode as indicated by the Router> prompt. (Router will be
replaced with the device hostname after you configure one.)
Router>
Enter a question mark to explore the commands that are available in User Exec mode.
Router>?
Exec commands:
<1-99> Session number to resume
connect Open a terminal connection
disable Turn off privileged commands
disconnect Disconnect an existing network connection
enable Turn on privileged commands
exit Exit from the EXEC
logout Exit from the EXEC
ping Send echo messages
resume Resume an active network connection
show Show running system information
ssh Open a secure shell client connection
telnet Open a telnet connection
terminal Set terminal line parameters
traceroute Trace route to destination
Only a very limited set of informational commands are available in User Exec mode and we
wont typically be working here.
RouterX>show run
^
% Invalid input detected at '^' marker.
show run is a valid command but should be run at Privileged Exec mode, not User Exec, so
the command fails.
This is the most common issue to trip up beginners at the IOS command line. If you see the
invalid input error then check you are at the correct level for the command you are trying to
run.
Exploring Privileged Exec (Enable) Mode
and Context Sensitive Help
Enter Privileged Exec mode. This mode is often commonly known as Enable mode. Notice
that the prompt changes to Router#
Router>enable
Router#
Router#disable
Router>
Router>en
Router#
Command abbreviation only works when you enter letters which could only match one
unique command. Attempt to return to User Exec mode by entering the command di
Router#di
% Ambiguous command: "di"
Check to see all the possible commands which begin with the letters di
Router#di?
dir disable disconnect
We can see that the shortest combination we could use for Disable would be disa
We can access detailed informational and debug output in Privileged Exec mode.
Check to see all commands that begin with sh
Router#sh?
Show
show is the only command that begins with sh so we can use that as the abbreviation.
Enter sh ? to see all available show commands. Notice that we have now included a space
before the question mark. This enters context sensitive help for the show command.
Router#sh ?
aaa Show AAA values
access-lists List access lists
arp Arp table
cdp CDP information
class-map Show QoS Class Map
clock Display the system clock
controllers Interface controllers status
crypto Encryption module
debugging State of each debugging option
dhcp Dynamic Host Configuration Protocol status
dot11 IEEE 802.11 show information
file Show filesystem information
flash: display information about flash: file system
flow Flow information
frame-relay Frame-Relay information
history Display the session command history
hosts IP domain-name, lookup style, nameservers, and host
table
interfaces Interface status and configuration
ip IP information
ipv6 IPv6 information
license Show license information
line TTY line information
--More
Press the Enter key when you see More to cycle through the additional output one line
at a time.
- Output truncated -
history Display the session command history
hosts IP domain-name, lookup style, nameservers, and host
table
interfaces Interface status and configuration
ip IP information
ipv6 IPv6 information
license Show license information
line TTY line information
lldp LLDP information
--More
One line at a time is a very slow way to view additional output so press the Space Bar to
cycle through it one page at a time instead.
- Output truncated -
sessions Information about Telnet connections
snmp snmp statistics
spanning-tree Spanning tree topology
ssh Status of SSH server connections
standby standby configuration
startup-config Contents of startup configuration
storm-control Show storm control configuration
tcp Status of TCP connections
tech-support Show system information for Tech-Support
--More
Keep hitting the Space Bar until you reach the end of the output.
- Output truncated -
standby standby configuration
startup-config Contents of startup configuration
storm-control Show storm control configuration
tcp Status of TCP connections
tech-support Show system information for Tech-Support
terminal Display terminal configuration parameters
users Display information about terminal lines
version System hardware and software status
vlan-switch VTP VLAN status
vtp Configure VLAN database
Router#sh
Check the possible options for the show aaa command. (Were using aaa for illustrative
purposes here. Dont worry about the meaning of the individual aaa commands, theyre not
important for this exercise.)
Router#sh aaa ?
local Show AAA local method options
sessions Show AAA sessions as seen by AAA Session MIB
user Show users active in AAA subsystem
Context sensitive help can be very useful if youre not sure about the exact command you
need to use. Unfortunately its use may be disabled in the simulator questions on the CCNA
exam so youll need to actually know the commands.
Enter sh aaa us and then hit the Tab key to see Tab completion in action.
Router#sh aaa user
The Tab key will complete a partially entered command for you. Again this will only work if
youve entered enough letters to be a unique match.
Notice that you do not get any output when you enter the command. This is not an error -
AAA has not been configured. The CLI simply returns to the Enable prompt because there is
nothing to show.
Here we made a typo. The CLI warns us that invalid input was detected and shows us the
location of the typo is at the o of usor. We typed usor instead of user.
Router#sh aaa
% Incomplete command.
The router warns us that weve entered an incomplete command, we need to enter
additional input. We could enter sh aaa ? again to see the available options.
Explore Global Configuration Mode
Enter Global Configuration mode. (The command can be abbreviated to conf t.)
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
Global Configuration mode is where we can enter configuration which affects the device as a
whole (as opposed to configuring a particular interface for example).
Add a couple of host entries. (Dont worry what this command does for now, were going to
use it to illustrate command history in a second.)
Attempt to change the hostname of the device to Router1 by entering the command
Router1.
Router(config)#R1
^
% Invalid input detected at '^' marker.
Oops we forgot to enter the hostname keyword at the start of the command.
Hit the Up Arrow on your keyboard to cycle back to the previous command.
Router(config)#R1
Enter Ctrl-A to bring the cursor to the beginning of the line and change the entry to
hostname Router1. This is quicker than typing the command again.
(We can also use Ctrl-E to bring the cursor to the end of the line, and the left and right
arrows to move the cursor one character at a time.)
Router(config)#hostname R1
R1(config)#
Notice that the command prompt changes to show the routers hostname.
Hit the Up Arrow repeatedly to cycle back through your previous command history, and then
the Down Arrow to cycle back again. Notice that command history is specific to your current
level in the command hierarchy - only the commands you previously entered in Global
Configuration mode are shown.
Enter the command show ip interface brief to check which interfaces are available in the
router.
You receive the invalid input detected error message but we havent made a typo. Were
getting the error because you have to be at the correct level whenever you enter a
command. Were in Global Configuration mode but show commands are run in Privileged
Exec mode.
We can override this for show commands by entering do at the start of the command. This
works from any level in the command hierarchy.
Enter the correct command to check what interfaces are available from Global Configuration
mode.
Notice that the prompt changes to indicate you are in Interface Configuration mode.
R1(config-if)#exit
R1(config)#
Drop all the way back down to Privilege Exec mode with a single command.
R1(config-if)#end
R1#
The end command drops back down to Privilege Exec mode from any level. You can also
achieve this by entering Ctrl-C
R1#show running-config
Building configuration...
Note that the IOS command line is not case sensitive, except when we pipe commands.
Here we entered Hostname with a capital letter at the start, but this is not how it is shown in
the configuration. The router could find no instance of Hostname so it returns no output.
View all configuration lines which do not include the word interface.
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#hostname RouterX
RouterX(config)#
Notice that when you enter a command in IOS it takes effect immediately, we can see the
command prompt changes to show the new hostname.
Save the current running configuration so it will be applied next time the router is reloaded.
[OK]
RouterX#show start
Using 742 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname RouterX
!
Writing running-config........
%Error opening tftp://10.10.10.10/RouterX-confg (Timed out)
(The command will try to run for a while and then time out and fail because we didnt set up
connectivity to a TFTP server in the lab.)
Reload the device and check it comes back up with the expected configuration with
hostname RouterX.
RouterX#reload
Proceed with reload? [confirm]
11 Cisco Device Functions Lab Exercise
This lab explores the MAC address table on Cisco IOS switches and routing table on Cisco
IOS routers.
This lab is a guided walkthrough of Cisco device functions. You will explore the commands
used here in much more detail as you go through the rest of the course.
Lab Topology
Download the 11 Cisco Device Functions.pkt file here. Open in Packet Tracer to load the
lab.
3) Verify connectivity between the routers by pinging R2, R3 and R4 from R1.
R1#ping 10.10.10.2
R1#ping 10.10.10.3
R1#ping 10.10.10.4
R2#ping 10.10.10.3
R2#ping 10.10.10.4
6) Repeat on SW2.
Devices in a real world network tend to be chatty and send traffic frequently, this causes the
MAC address table to update (you may see less entries in Packet Tracer).
9) View the routing table on R1. What routes are present and why?
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
The router has a connected route for the 10.10.10.0/24 network and a local route for
10.10.10.1/32. These routes were automatically created when the IP address 10.10.10.1/24
was configured on interface GigabitEthernet0/0
10) Configure IP address 10.10.20.1/24 on interface GigabitEthernet0/1
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
The router has routes for both interfaces and can route traffic between hosts on the
10.10.10.0/24 and 10.10.20.0/24 networks.
12) Configure a static route to 10.10.30.0/24 with a next hop address of 10.10.10.2
The router has routes to its locally connected networks, and also to 10.10.30.0/24 which is
available via 10.10.10.2
12 The Life of a Packet - Lab Exercise
This lab explores DNS configuration on Cisco routers and the ARP cache.
Lab Topology
Download the 12 The Life of a Packet.gns3project file here. Open in GNS3 to load the lab.
This configures the lab topology as shown above and adds static routes between R1 and
R3.
You can learn the theory for this section and shortcut your path to CCNA certification by
getting my CCNA Complete course. Get the course for only $10 USD (thats a massive 97%
discount) with this link:
https://www.udemy.com/ccna-complete/?couponCode=DISCOUNTCEB
Configure R3 as a DNS Server
2) Add host entries for R1, R2 and R3 using the IP addresses shown in the topology
diagram. Use 10.10.10.2 as R2s IP address.
4) Verify that you can ping R2 and R3 from R1 using their hostnames.
5) Do you expect to see an entry for R3 in the ARP cache of R1? Why or why not?
R3(config)#ip domain-lookup
R3(config)#ip name-server 10.10.20.1
R3(config)#ip domain-name flackbox.lab
R3(config)#ip dns server
2) Add host entries for R1, R2 and R3. Use 10.10.10.2 as R2s IP address.
R1(config)#ip domain-lookup
R1(config)#ip name-server 10.10.20.1
R1(config)#ip domain-list flackbox.lab
4) Verify that you can ping R2 and R3 from R1 using their hostnames.
R1#ping R2
Translating "R2"...domain server (10.10.20.1) [OK]
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
R1#ping R3
Translating "R3"...domain server (10.10.20.1) [OK]
5) Do you expect to see an entry for R3 in the ARP cache of R1? Why or why not?
ARP requests use broadcast traffic so they are not forwarded by a router. R1 will have
entries in its ARP cache for all hosts it has seen on its directly connected networks
(10.10.10.0/24).
R1 is not directly connected to the 10.10.20.0/24 network so it will not have an entry in the
ARP cache for R3 at 10.10.20.1.
R1 can reach R3 via R2s IP address 10.10.10.2 this IP address is included in the ARP
cache.
R1#sh arp
R3#show arp
Lab Topology
This configures the lab topology as shown above with R3 as a DNS server and adds static
routes between R1 and R3.
Troubleshoot Connectivity to DNS Server
1) R3 has just been configured as a DNS server for the Flackbox.lab domain. Members
of staff have complained that DNS is not working.
2) From R1, use Telnet to check if the DNS service appears operational on R3
3) When you have verified that DNS is not working, troubleshoot and fix the problem.
Note that there may be more than one issue causing the problem.
13 The Cisco Troubleshooting Methodology Answer
Key
This lab tests your network troubleshooting skills.
1) R3 has just been configured as a server for the Flackbox.lab domain. Members of
staff have complained that DNS is not working.
2) From R1, use Telnet to check if the DNS service appears operational on R3
R1#telnet 10.10.20.1 53
Trying 10.10.20.1, 53 ...
% Destination unreachable; gateway or host down
3) When you have verified that DNS is not working, troubleshoot and fix the problem.
Note that there may be more than one issue causing the problem.
There is more than one way to troubleshoot the issue. A suggested workflow is shown
below.
1. Was it working before? If so, has something changed which could cause the
problem? This will usually direct you to the cause.
This question is not particularly useful for our example as the DNS server has just been
brought online for the first time.
2. Is the problem affecting everybody or just one particular user? If its affecting just one
user, the likelihood is that the problem is at their end.
In this case the problem is affecting all users, so the problem is likely on the server end or
with the network.
The error message when we tried to Telnet was Destination unreachable, so it looks like a
connectivity issue.
Ping from R1 to R3.
R1#ping 10.10.20.1
The ping fails at the network layer so there is little point in checking the DNS service at
higher layers until we fix this problem.
Rather than checking connectivity hop by hop, we can possibly save a little time by using
traceroute.
R1#traceroute 10.10.20.1
The traceroute got as far as R2, which lets us know that R1 has the correct route to get to
R3, and the problem is probably between R2 and R3.
R2(config)#interface f1/0
R2(config-if)#no shut
R1#ping 10.10.20.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.20.1, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms
R1#ping R3.flackbox.lab
The error message tells us the problem if we take the time to really read it R1 is using
10.10.10.1 as its DNS server, but the correct address is 10.10.20.1.
R1#ping R3.flackbox.lab
We know we have connectivity and the DNS server configured correctly on R1, so the
problem looks like its on R3.
R1#telnet 10.10.20.1 53
Trying 10.10.20.1, 53 ...
% Connection refused by remote host
R3#sh run
Building configuration...
ip domain name flackbox.lab
ip host R1 10.10.10.1
ip host R2 10.10.10.2
ip host R3 10.10.20.1
ip host R1.flackbox.lab 10.10.10.1
ip host R2.flackbox.lab 10.10.10.2
ip host R3.flackbox.lab 10.10.20.1
ip name-server 10.10.20.1
!
ip dns server
!
truncated
That looks better. Time to test it from R1 again. We try telnet to port 53 first.
R1#telnet 10.10.20.1 53
Trying 10.10.20.1, 53 ... Open
Open shows that R3 is listening on port 53. The final check is to verify by pinging by FQDN.
R1#ping R3.flackbox.lab
Translating "R3.flackbox.lab"...domain server (10.10.20.1) [OK]
To summarise the issues: port FastEthernet1/0 was shut down on R2, R1 was using the
wrong IP address for the DNS server, and the DNS service was not running on R3.
Problems in the real world are usually caused by just one error rather than three as in this
case. This can still occur though, particularly when a new service is being deployed.
14 Cisco Router and Switch Basics - Lab Exercise
In this lab you will complete a basic configuration on a switch, verify Cisco Discovery
Protocol CDP and analyse the effects of interface speed and duplex configuration.
Lab Topology
Download the 14 Cisco Router and Switch Basics.pkt file here. Open in Packet Tracer to
load the lab.
Cisco Router and Switch Initial Configuration
10) On SW1, verify that speed and duplex are automatically negotiated to 100 Mbps full
duplex on the link to R1
11) Manually configure full duplex and FastEthernet speed on the link to R2
CDP Configuration
13) Verify the directly attached Cisco neighbors using Cisco Discovery Protocol
15) Flush the CDP cache on R1 by entering the no cdp run then cdp run commands in
global configuration mode
17) Verify the status of the switch port connected to R2 with the show ip interface
brief command. It should show status and protocol up/up.
18) Shut down the interface connected to R2 and issue a show ip interface
brief command again. The status and protocol should show administratively
down/down.
19) Bring the interface up again. Verify the speed and duplex setting.
20) Set the duplex to half on Switch 1. Leave the settings as they are on R2.
25) Check if the interface is operational on R2. What is the status of the interface?
14 Cisco Router and Switch Basics - Answer Key
In this lab you will complete a basic configuration on a switch, verify Cisco Discovery
Protocol CDP and analyse the effects of interface speed and duplex configuration.
Router(config)#hostname R1
R1(config)#
Router(config)#hostname R2
R2(config)#
Switch(config)#hostname SW1
SW1(config)#
R1(config)#interface FastEthernet0/0
R1(config-if)#ip address 10.10.10.1 255.255.255.0
R1(config-if)#no shutdown
R2(config)#interface FastEthernet0/0
R2(config-if)#ip address 10.10.10.2 255.255.255.0
R1(config-if)#no shutdown
6) Give SW1 the management IP address 10.10.10.10/24
SW1(config)#interface vlan1
SW1(config-if)#ip address 10.10.10.10 255.255.255.0
R1(config-if)#no shutdown
SW1#ping 10.10.10.2
11) Manually configure full duplex and FastEthernet speed on the link to R2
SW1#show version
Cisco IOS Software, C2960 Software (C2960-LANBASE-M), Version
12.2(25)FX, RELEASE SOFTWARE (fc1)
CDP Configuration
13) Verify the directly attached Cisco neighbors using Cisco Discovery Protocol
15) Flush the CDP cache on R1 by entering the no cdp run then cdp run commands in
global configuration mode
R1#
Switch Troubleshooting
17) Verify the status of the switch port connected to R2 with the show ip interface
brief command. It should show status and protocol up/up.
18) Shut down the interface connected to R2 and issue a show ip interface
brief command again. The status and protocol should show administratively
down/down.
19) Bring the interface up again. Verify the speed and duplex setting.
20) Set the duplex to half on Switch 1. Leave the settings as they are on R2.
SW1(config-if)#duplex half
SW1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to
down
SW1(config)#int f0/2
SW1(config-if)#duplex full
SW1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to
up
SW1(config)#int f0/2
SW1(config-if)#speed 10
SW1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to
down
25) Check if the interface is operational on R2. What is the status of the interface?
Use Cisco Packet Tracer for this exercise. The generic server in Packet Tracer (as shown in
the topology diagram below) has built-in TFTP server software.
Lab Topology
Download the 15 Cisco Device Management.pkt file here. Open in Packet Tracer to load
the lab.
Factory Reset
1) View the running configuration on R1. Note that the hostname and interface have
been configured
4) The router should boot into the Setup Wizard. Exit out of the wizard and then confirm
the startup and running configurations are empty.
5) Paste the configuration for R1 from the 15 Cisco Device Management.zip file back
into the configuration and save
Password Recovery
7) Configure the router to boot into the rommon prompt on next reload, and reboot the
router. In a real world scenario you would enter the Break sequence on the keyboard
when first powering up the router to access the rommon prompt
8) Configure the router to ignore the startup-config when booting up, and reload the
router
9) The router should boot into the Setup Wizard. Exit out of the wizard
10) What do you expect to see if you view the running and startup configurations?
Confirm this.
11) Copy the startup config to the running config. Do not miss this step or you will factory
reset the router!
13) Ensure the router will reboot normally on the next reload and you will be able to
access the router
15) Backup the running configuration to Flash on R1. Use a suitable name for the
backup file. Verify the configuration has been backed up.
16) Backup the R1 startup configuration to the TFTP server. Use a suitable name for the
backup file. Verify the configuration has been backed up.
17) Backup the IOS system image on R1 to the TFTP server. Verify the configuration
has been backed up.
19) Use Internet search to find system recovery instructions for your model of router.
Recover the system image using the TFTP server.
20) If you are using the latest version of Packet Tracer the download will time out
because the GigabitEthernet interface stays down in rommon mode. You have
completed this part of the lab once you have entered the tftpdnld command.
23) Reboot and verify the switch is running the new software version
15 Cisco Device Management - Answer Key
In this lab you will perform a factory reset, password recovery, configuration backup, and
system image backup and recovery on a Cisco router. You will also perform an IOS upgrade
on a Cisco switch.
Factory Reset
1) View the running configuration on R1. Note that the hostname and interface have
been configured.
R1#sh run
Building configuration...
R1#write erase
Erasing the nvram filesystem will remove all configuration
files! Continue? [confirm]
[OK]
Erase of nvram: complete
%SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram
R1#reload
Proceed with reload? [confirm]
3) Watch the boot up process as the router boots
4) The router should boot into the Setup Wizard. Exit out of the wizard and then confirm
the startup and running configurations are empty.
Router>enable
Router#show run
Building configuration...
hostname Router
!
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
shutdown
Router#show start
startup-config is not present
5) Paste the configuration for R1 from the 15 Cisco Device Management.zip file back
into the configuration and save
Router#configure terminal
Router(config)#hostname R1
R1(config)#!
R1(config)#interface GigabitEthernet0/0
R1(config-if)# ip address 10.10.10.1 255.255.255.0
R1(config-if)# duplex auto
R1(config-if)# speed auto
R1(config-if)# no shutdown
R1(config-if)#!
R1(config-if)#line con 0
R1(config-line)# exec-timeout 30 0
R1(config-line)#end
R1#copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
Password Recovery
7) Configure the router to boot into the rommon prompt on next reload, and reboot the
router. (In a real world scenario you would enter the Break sequence on the
keyboard when first powering up the router to access the rommon prompt)
R1(config)#config-register 0x2120
R1(config)#end
Router#copy start run
R1#reload
Proceed with reload? [confirm]
8) Configure the router to ignore the startup-config when booting up, and reload the
router
10) What do you expect to see if you view the running and startup configurations?
Confirm this.
The running configuration should be empty because the router bypassed loading the startup
config on boot up. The startup config should remain unchanged and all previous
configuration should still be there.
Router#sh run
Building configuration...
hostname Router
!
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
Router#sh start
!
hostname R1
!
enable secret 5 $1$mERr$J2XZHMOgpVVXdLjC9lYtE1
!
interface GigabitEthernet0/0
ip address 10.10.10.1 255.255.255.0
duplex auto
speed auto
11) Copy the startup config to the running config. Do not miss this step or you will factory
reset the router!
Router(config)#config-register 0x2102
Router(config)#end
Router#copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
Router#reload
Proceed with reload? [confirm]
R1>en
R1#sh run
Building configuration...
hostname R1
!
interface GigabitEthernet0/0
ip address 10.10.10.1 255.255.255.0
duplex auto
speed auto
Configuration Backup
15) Backup the running configuration to Flash on R1. Use a suitable name for the
backup file. Verify the configuration has been backed up.
R1#show flash
16) Backup the R1 startup configuration to the TFTP server. Use a suitable name for the
backup file. Verify the configuration has been backed up.
17) Backup the IOS system image on R1 to the TFTP server. Verify the configuration
has been backed up.
R1#show flash
Writing c2900-universalk9-mz.SPA.151-
4.M4.bin...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 33591768 bytes]
18) Delete the system image from Flash and reload.
R1#delete flash:c2900-universalk9-mz.SPA.151-4.M4.bin
Delete filename [c2900-universalk9-mz.SPA.151-4.M4.bin]?
Delete flash:/c2900-universalk9-mz.SPA.151-4.M4.bin? [confirm]
R1#reload
Proceed with reload? [confirm]
http://www.cisco.com/c/en/us/td/docs/routers/access/1900/software/configuration/guide/Soft
ware_Configuration/appendixCrommon.html is the first hit when searching for Cisco 2900
rommon recovery.
IP_ADDRESS: 10.10.10.1
IP_SUBNET_MASK: 255.255.255.0
DEFAULT_GATEWAY: 10.10.10.1
TFTP_SERVER: 10.10.10.10
TFTP_FILE: c2900-universalk9-mz.SPA.151-4.M4.bin
Invoke this command for disaster recovery only.
WARNING: all existing data in all partitions on flash will be
lost!
.....[TIMED OUT]
TFTP: Operation terminated.
20) If you are using the latest version of Packet Tracer the download will time out
because the GigabitEthernet interface stays down in rommon mode. You have
completed this part of the lab once you have entered the tftpdnld command.
This is as far as we can go with this part of the lab. Youve seen how to recover the system
image, the only thing left to do in a real world scenario after the download has completed is:
SW1#sh version
Cisco IOS Software, C2960 Software (C2960-LANBASE-M), Version
12.2(25)FX
Accessing tftp://10.10.10.10/c2960-lanbasek9-mz.150-
2.SE4.bin....
Loading c2960-lanbasek9-mz.150-2.SE4.bin from 10.10.10.10:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 4670455 bytes]
SW1#show flash
Directory of flash:/
SW1#config t
SW1(config)#boot system c2960-lanbasek9-mz.150-2.SE4.bin
23) Reboot and verify the switch is running the new software version
SW1#reload
Proceed with reload? [confirm]
SW1#show version
Cisco IOS Software, C2960 Software (C2960-LANBASEK9-M), Version
15.0(2)SE4, RELEASE SOFTWARE (fc1)
16 Routing Fundamentals - Lab Exercise
In this lab you will configure and verify connected, local, static, summary and default routes.
You will also examine the effect of longest prefix match routing.
Lab Topology
Download the 16 Routing Fundamentals.gns3project file here. Open in GNS3 to load the
lab.
You can learn the theory for this section and shortcut your path to CCNA certification by
getting my CCNA Complete course. Get the course for only $10 USD (thats a massive 97%
discount) with this link:
https://www.udemy.com/ccna-complete/?couponCode=DISCOUNTCEB
1) Configure the PCs with an IP address and default gateway according to the Lab
Topology diagram
3) Verify routes have been automatically added for the connected and local networks
(note that local routes only appear from IOS 15)
Static Routes
8) Configure static routes on R1, R2, R3 and R4 to allow connectivity between all their
subnets. Use /24 prefixes for each network.
Summary Routes
14) Verify the routing table on R1 does not contain /24 routes to remote subnets.
17) Do not add any additional routes. Does PC1 have reachability to the FastEthernet
2/0 interface on R5? If so, which path will the traffic take?
18) Ensure reachability over the shortest possible path from R5 to all directly connected
networks on R1. Achieve this with a single command.
19) Verify the path traffic takes from PC1 to the FastEthernet 2/0 interface on R5.
20) Verify the path the return traffic takes from R5 to PC1.
21) Ensure that traffic between PC1 and the FastEthernet 2/0 interface on R5 takes the
most direct path in both directions.
22) Verify that traffic between PC1 and the FastEthernet 2/0 interface on R5 takes the
most direct path in both directions.
24) Ensure that all PCs have a route out to the internet through the Internet Service
Provider connection on R4. (Note that the lab does not actually have Internet
connectivity.)
25) Traffic between PC1 and the internet should be load balanced over R2 and R5.
16 Routing Fundamentals - Answer Key
In this lab you will configure and verify connected, local, static, summary and default routes.
You will also examine the effect of longest prefix match routing.
1) Configure the PCs with an IP address and default gateway according to the Lab
Topology diagram
R1(config)#int f0/0
R1(config-if)#ip address 10.0.0.1 255.255.255.0
R1(config-if)#no shut
R1(config-if)#int f1/0
R1(config-if)#ip address 10.0.1.1 255.255.255.0
R1(config-if)#no shut
R1(config-if)#int f2/0
R1(config-if)#ip address 10.0.2.1 255.255.255.0
R1(config-if)#no shut
R1(config-if)#int f3/0
R1(config-if)#ip address 10.0.3.1 255.255.255.0
R1(config-if)#no shut
3) Verify routes have been automatically added for the connected and local networks
(note that local routes only appear from IOS 15)
R1#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
Ping from PC1 to PC2 should be successful as both PCs are in networks which R1 is directly
connected to.
Ping from PC1 to PC3 should fail as R1 does not have a route to the 10.1.2.0 network.
Static Routes
R2(config)#int f0/0
R2(config-if)#ip add 10.0.0.2 255.255.255.0
R2(config-if)#no shut
R2(config-if)#int f1/0
R2(config-if)#ip add 10.1.0.2 255.255.255.0
R2(config-if)#no shut
R3(config)#int f1/0
R3(config-if)#ip add 10.1.0.1 255.255.255.0
R3(config-if)#no shut
R3(config-if)#int f0/0
R3(config-if)#ip add 10.1.1.2 255.255.255.0
R3(config-if)#no shut
R4(config)#int f0/0
R4(config-if)#ip add 10.1.1.1 255.255.255.0
R4(config-if)#no shut
R4(config-if)#int f1/0
R4(config-if)#ip add 10.1.2.1 255.255.255.0
R4(config-if)#no shut
R4(config-if)#int f2/0
R4(config-if)#ip add 10.1.3.1 255.255.255.0
R4(config-if)#no shut
8) Configure static routes on R1, R2, R3 and R4 to allow connectivity between all their
subnets. Use /24 prefixes for each network.
Ping verifies two way reachability so we have now verified full connectivity.
10) Verify the path traffic takes from PC1 to PC3.
Summary Routes
A summary route to 10.1.0.0/16 will add all remote subnets with one command.
R1#sh ip route
R5(config)#int f2/0
R5(config-if)#ip add 10.1.3.2 255.255.255.0
R5(config-if)#no shut
R5(config-if)#int f3/0
R5(config-if)#ip add 10.0.3.2 255.255.255.0
R5(config-if)#no shut
17) Do not add any additional routes. Does PC1 have reachability to the FastEthernet
2/0 interface on R5? If so, which path will the traffic take?
The summary route on R1 to 10.1.0.0/16 will provide a route to R5 over the path R1 > R2 >
R3 > R4 > R5, but R5 does not have a route back to R1.
Traceroute will show replies from R1 > R2 > R3 > R4 before failing.
Add a summary route on R5 for all the directly connected networks on R1.
19) Verify the path traffic takes from PC1 to the FastEthernet 2/0 interface on R5.
20) Verify the path the return traffic takes from R5 to PC1.
R5#traceroute 10.0.1.10
Type escape sequence to abort.
Tracing the route to 10.0.1.10
VRF info: (vrf in name/id, vrf out name/id)
1 10.0.3.1 16 msec 20 msec 20 msec
2 10.0.1.10 32 msec 28 msec 32 msec
Traffic takes the path R5 > R1. This shows that routers make independent decisions based
on their routing table and it is possible (though not common) for return traffic to take an
asynchronous path.
21) Ensure that traffic between PC1 and the FastEthernet 2/0 interface on R5 takes the
most direct path in both directions.
Traffic to 10.1.3.0/24 will now match two routes in the routing table.
R5#traceroute 10.0.1.10
Type escape sequence to abort.
Tracing the route to 10.0.1.10
VRF info: (vrf in name/id, vrf out name/id)
1 10.0.3.1 20 msec 16 msec 20 msec
2 10.0.1.10 32 msec 28 msec 32 msec
Default Route and Load Balancing
R4(config)#int f3/0
R4(config-if)#ip add 203.0.113.1 255.255.255.0
R4(config-if)#no shut
24) Ensure that all PCs have a route out to the internet through the Internet Service
Provider connection on R4. (Note that the lab does not actually have Internet
connectivity.)
R4#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
The routing table will show that R1 will load balance traffic over both paths.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
R4s routing table should show both paths back to 10.0.1.0/24 and 10.0.2.0/24
R4#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
Lab Topology
Download the 17 Dynamic Routing Protocols.gns3project file here. Open in GNS3 to load
the lab.
Routing Protocol Updates
1) Enter the commands below on each router to provision a basic RIPv1 configuration
and enable RIP on every interface.
router rip
network 10.0.0.0
no auto-summary
2) Debug the routing protocol updates on R1. Observe the updates being sent and
received. What kind of traffic is used (unicast, broadcast or multicast)?
router rip
version 2
6) Check that RIP routes have been added to R1 and it has a route to every subnet in
the lab.
7) Why are there two routes to the 10.1.1.0/24 network in the routing table?
9) Enter the commands below on each router to provision a basic OSPF configuration
and enable OSPF on every interface.
router ospf 1
network 10.0.0.0 0.255.255.255 area 0
10) Are RIP routes included in the routing table on R1? Why or why not?
11) Why is there now only one route to the 10.1.1.0/24 network?
12) Disable interface FastEthernet 0/0 on R2. What do you expect to happen to R1s
routing table?
14) Aside from the next hop address, what else has changed on the routing table?
15) View the OSPF database on R1. What is different between it and the RIP database?
Why?
no router ospf 1
19) Why is there only one route on R1 to the 10.1.1.0/24 network now?
20) Make the required change so that there are two routes to the 10.1.1.0/24 network in
the routing table on R1.
21) Enter the commands below on each router to provision a basic EIGRP configuration
and enable EIGRP on every interface.
22) What changes do you expect to see in the routing tables? Why?
25) Why is there only one route to the 10.1.1.0/24 network on R1?
26) Disable RIP and EIGRP on R5 with the commands below.
27) Configure the network so that there is still connectivity between all subnets if the link
between R1 and R2 goes down. Accomplish this with six commands. Do not enable
EIGRP on R5 but note that the routing protocol is expected to be enabled there in the
future.
28) What changes do you expect to see to the routing table on R1?
30) Verify that traffic from PC1 to PC3 still goes via R2.
37) Enter the commands below on R5 to provision a basic EIGRP configuration and
enable EIGRP on every interface.
Loopback Interfaces
40) Enter the commands below on each router to include the loopback interfaces in
EIGRP.
41) Verify the loopback interfaces are in the routing table on R1.
43) Enter the command below to verify that R1 has established EIGRP adjacencies with
R2 and R5.
44) Verify that traffic from R5 to the directly connected interfaces on R1 goes via the
FastEthernet 3/0 interface.
45) Enter the commands below to configure the loopback interface and the link to R5 as
passive interfaces on R1.
46) What changes do you expect to see in the routing table on R5 and why?
1) Enter the commands below on each router to provision a basic RIPv1 configuration
and enable RIP on every interface.
router rip
network 10.0.0.0
no auto-summary
2) Debug the routing protocol updates on R1. Observe the updates being sent and
received. What kind of traffic is used (unicast, broadcast or multicast)?
The updates are being sent on the broadcast address 255.255.255.255. All hosts on the
subnet must process the packets.
R1#debug ip rip
RIP protocol debugging is on
R1#
*Jul 4 03:43:55.455: RIP: sending v1 update to 255.255.255.255 via
FastEthernet3/0 (10.0.3.1)
router rip
version 2
4) What kind of traffic is used for the updates now?
The updates are being sent on the RIPv2 multicast address 224.0.0.9. Only RIPv2 routers
will process the packets beyond layer 3.
R1#undebug all
All possible debugging has been turned off
6) Check that RIP routes have been added to R1 and it has a route to every subnet in
the lab.
R1#show ip route
7) Why are there two routes to the 10.1.1.0/24 network in the routing table?
Two paths to 10.1.1.0/24 have an equal metric a hop count of 2. Both routes are installed
in the routing table and the router will perform Equal Cost Load Balancing between the next
hops of 10.0.3.2 and 10.0.0.2.
Comparing Routing Protocols
9) Enter the commands below on each router to provision a basic OSPF configuration
and enable OSPF on every interface.
router ospf 1
network 10.0.0.0 0.255.255.255 area 0
10) Are RIP routes included in the routing table on R1? Why or why not?
The RIP routes are replaced by OSPF because its Administrative Distance of 110 is
preferred to RIPs AD of 120.
R1#show ip route
OSPF uses cost as its metric which takes into account interface bandwidth. The interfaces
on R5 have a configured bandwidth of 10Mbps. The interfaces along the top path of the
network topology all have the default FastEthernet bandwidth of 100Mbps so this route is
preferred. All traffic will go via the next hop 10.0.0.2.
12) Disable interface FastEthernet 0/0 on R2. What do you expect to happen to R1s
routing table?
OSPF will reconverge. The routes to the 10.1.0.0 networks via R2 will be removed from the
routing table and replaced with routes via R5.
R1#sh ip route
The new routes have a higher metric. This is why they were not in the routing table when the
path via R2 was up.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
RIP is a Distance Vector routing protocol so it only knows its directly connected neighbors
and the lists of networks those neighbors have advertised.
OSPF is a Link State routing protocol so it knows the state of every link on every router in its
area.
no router ospf 1
Yes. RIP is still running so RIP routes will replace the removed OSPF routes in the routing
table.
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
A hop count of 2.
19) Why is there only one route on R1 to the 10.1.1.0/24 network now?
20) Make the required change so that there are two routes to the 10.1.1.0/24 network in
the routing table on R1.
R2(config)#interface f0/0
R2(config-if)#no shut
21) Enter the commands below on each router to provision a basic EIGRP configuration
and enable EIGRP on every interface.
22) What changes do you expect to see in the routing tables? Why?
The RIP routes will be replaced by EIGRP because its Administrative Distance of 90 is
preferred to RIPs AD of 120.
23) Verify the changes to the routing table on R1.
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
25) Why is there only one route to the 10.1.1.0/24 network on R1?
EIGRP uses a composite metric which takes into account interface bandwidth and delay.
The interfaces on R5 have a configured bandwidth of 10Mbps. The interfaces along the top
path of the network topology all have the default FastEthernet bandwidth of 100Mbps so this
route is preferred. All traffic will go via the next hop 10.0.0.2.
26) Disable RIP and EIGRP on R5 with the commands below.
27) Configure the network so that there is still connectivity between all subnets if the link
between R1 and R2 goes down. Accomplish this with six commands. Do not enable
EIGRP on R5 but note that the routing protocol is expected to be enabled there in the
future.
Floating static routes need to be added as a backup to the EIGRP routes. These routes
would normally be preferred to the route learned via EIGRP because static routes have a
better Administrative Distance of 1 by default. Set the AD to be higher than EIGRPs AD of
90.
R5 is not running EIGRP so it is not currently necessary to set the Administrative Distance
for its routes to 95. It is required to prevent the floating static routes from being preferred
when EIGRP is enabled in the future however.
The summary route will be added to the routing table but not used because it has a prefix
length of /16, compared to the EIGRP routes which have a longer prefix length of /24.
If individual floating static routes had been added for each of the /24 destination networks
then these would not have appeared in the routing table (unless a link went down) because
EIGRP has a better Administrative Distance.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
R2(config)#interface f0/0
R2(config-if)#shutdown
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
R2(config)#interface f0/0
R2(config-if)#no shutdown
37) Enter the commands below on R5 to provision a basic EIGRP configuration and
enable EIGRP on every interface.
Loopback Interfaces
R1(config)#interface loopback0
R1(config-if)#ip address 192.168.0.1 255.255.255.255
R2(config)#interface loopback0
R2(config-if)#ip address 192.168.0.2 255.255.255.255
R3(config)#interface loopback0
R3(config-if)#ip address 192.168.0.3 255.255.255.255
R4(config)#interface loopback0
R4(config-if)#ip address 192.168.0.4 255.255.255.255
R5(config)#interface loopback0
R5(config-if)#ip address 192.168.0.5 255.255.255.255
39) Is there connectivity to the loopback interfaces from the PCs? Why or why not?
There is no connectivity from the PCs to the loopback interfaces because they are not in the
routing tables of the routers (apart from the local loopback interface on each router). The
loopback interfaces are not in the routing tables because they are in the 192.168.0.0/24
range which has not been included in the routing protocol.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
40) Enter the commands below on each router to include the loopback interfaces in
EIGRP.
41) Verify the loopback interfaces are in the routing table on R1.
R1#sh ip route
43) Enter the command below to verify that R1 has established EIGRP adjacencies with
R2 and R5.
R5#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
46) What changes do you expect to see in the routing table on R5 and why?
The EIGRP adjacency between R1 and R5 will go down. All EIGRP routes via R1 will be
removed from the routing table and replaced with routes via R4.
Configuring the loopback interface as a passive interface on R1 does not affect any routing
tables but is a best practice.
R5#show ip route
Lab Topology
3) Determine the issue and fix it to restore connectivity between PC1 and PC3.
IP SLA Configuration
5) How long does PC3 have to respond to the ping before it is marked as failed.
6) Leave the task to run for around a minute and then check for any connectivity
failures.
18 Connectivity Troubleshooting - Answer Key
In this lab you will troubleshoot a connectivity issue and configure IP SLA.
Troubleshoot Connectivity
Connectivity is down.
The first thing to do is check that R3 has a route to PC3s network 10.1.2.0/24
R3#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
The network is not in the routing table. From the show ip route command we can
also see that static routes are being used. We need to add a static route for the
10.1.2.0/24 network with R4 as the next hop.
IP SLA Configuration
Use the interface on PC1s subnet as the source interface and set the ping to be sent every
6 seconds.
R1(config)#ip sla 1
R1(config-ip-sla)#icmp-echo 10.1.2.10 source-ip 10.0.1.1
R1(config-ip-sla-echo)#frequency 6
R1(config-ip-sla-echo)#exit
R1(config)#ip sla schedule 1 life forever start-time now
5) How long does PC3 have to respond to the ping before it is marked as failed.
5 seconds.
Lab Topology
Download the 19-1 RIP Configuration.gns3project file here. Open in GNS3 to load the lab.
RIP Configuration
1) Enable RIPv2 on every router. Ensure all networks except 203.0.113.0/24 are
advertised. Do not perform any summarisation.
3) Enable summarisation using a /16 mask on the routers which are at the boundary of
the 10.0.0.0/16 and 10.1.0.0/16 networks.
4) What change do you expect to see on R1s routing table? Verify this (give the routing
table a couple of minutes to converge).
5) Will R4s routes to the 10.0.x.x networks mirror R1s routes to the 10.1.x.x networks?
Verify this.
6) Verify that routing is working by checking that PC1 has connectivity to PC3.
7) Ensure that all routers have a route to the 203.0.113.0/24 network. Internal routes
must not advertised to the Service Provider at 203.0.113.2.
9) Configure a default static route on R4 to the Internet via the service provider at
203.0.113.2
10) Ensure that all other routers learn via RIP how to reach the Internet.
12) Set the RIP timers to half their current settings on all routers.
19-1 RIP Configuration - Answer Key
In this lab you will configure the RIPv2 routing protocol.
RIP Configuration
1) Enable RIPv2 on every router. Ensure all networks except 203.0.113.0/24 are
advertised. Do not perform any summarisation.
On every router:
R1(config)#router rip
R1(config-router)#version 2
R1(config-router)#no auto-summary
R1(config-router)#network 10.0.0.0
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
3) Enable summarisation using a /16 mask on the routers which are at the boundary of
the 10.0.0.0/16 and 10.1.0.0/16 networks.
R2(config)#int f0/0
R2(config-if)#ip summary-address rip 10.1.0.0 255.255.0.0
R2(config)#int f1/0
R2(config-if)#ip summary-address rip 10.0.0.0 255.255.0.0
R5(config)#int f3/0
R5(config-if)#ip summary-address rip 10.1.0.0 255.255.0.0
R5(config)#int f2/0
R5(config-if)#ip summary-address rip 10.0.0.0 255.255.0.0
4) What change do you expect to see on R1s routing table? Verify this (give the routing
table a couple of minutes to converge).
R1 will have a single /16 summary route to the 10.1.0.0 networks rather than individual /24
routes. The routes will use Equal Cost Multi Path through routers R2 and R5.
R1#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
No. R4 will have a 10.0.0.0/16 summary route with a single next hop of 10.1.3.2 on R5 and a
hop count of 1. It will not load balance traffic through R2 as well because that path would
have a hop count of 2. (R4 is not directly adjacent to R2 as R1 is, it is an extra hop away.)
R4#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
7) Ensure that all routers have a route to the 203.0.113.0/24 network. Internal routes
must not be advertised to the Service Provider at 203.0.113.2.
The 203.0.113.0/24 network must be added to the RIP process on R4, and interface
FastEthernet 3/0 facing the service provider configured as a passive interface to avoid
sending out internal network information.
R4(config)#router rip
R4(config-router)#passive-interface f3/0
R4(config-router)#network 203.0.113.0
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
9) Configure a default static route on R4 to the Internet via the service provider at
203.0.113.2
10) Ensure that all other routers learn via RIP how to reach the Internet.
R4(config)#router rip
R4(config-router)#default-information originate
11) Verify all routers have a route to the Internet.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
On all routers:
R1(config)#router rip
R1(config-router)#timers basic 15 90 90 120
20-1 EIGRP Configuration Lab Exercise
In this lab you will configure the EIGRP routing protocol.
Lab Topology
Download the 20-1 EIGRP Configuration.gns3project file here. Open in GNS3 to load the
lab.
EIGRP Basic Configuration
1) Enable EIGRP AS 100 on every router. Ensure all networks except 203.0.113.0/24
are advertised.
EIGRP Summarisation
6) Enable summarisation using a /16 mask on the routers which are at the boundary of
the 10.0.0.0/16 and 10.1.0.0/16 networks.
7) What change do you expect to see on R1s routing table? Verify this (give the routing
table a few seconds to converge).
8) Will R4s routes to the 10.0.x.x networks mirror R1s routes to the 10.1.x.x networks?
Verify this.
9) Verify that routing is working by checking that PC1 has connectivity to PC3.
10) Remove the summary routes on the routers which are at the boundary of the
10.0.0.0/16 and 10.1.0.0/16 networks.
Successors and Feasible Successors
11) There are two possible paths which R1 could use to reach the 10.1.2.0/24 network
either through R2 or R5. Which route is in the routing table?
12) What are the Reported Distance and Feasible Distance of the path to 10.1.2.0/24?
14) What are the Reported Distance and Feasible Distance of the other path?
EIGRP Metric
15) Traffic from R1 to the 10.1.2.0/24 network takes the path via R5. Change this to go
via R2 instead. The path via R5 must be a Feasible Successor.
16) Verify that traffic to the 10.1.2.0/24 network from R1 goes via R2.
18) Ensure that all routers have a route to the 203.0.113.0/24 network. Internal routes
must not be advertised to the Service Provider at 203.0.113.2.
19) Verify that all routers have a path to the 203.0.113.0/24 network.
20) Configure a default static route on R4 to the Internet via the service provider at
203.0.113.2
21) Ensure that all other routers learn via EIGRP how to reach the Internet.
1) Enable EIGRP AS 100 on every router. Ensure all networks except 203.0.113.0/24
are advertised.
On every router:
R1(config)#interface loopback0
R1(config-if)#ip add 192.168.0.1 255.255.255.255
The Router ID is 10.0.3.1. This was the highest IP address on the router when EIGRP was
enabled. The Router ID will change to the Loopback address 192.168.0.1 when the EIGRP
process restarts.
R1#sh ip proto
*** IP Routing is NSF aware ***
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
EIGRP Summarisation
6) Enable summarisation using a /16 mask on the routers which are at the boundary of
the 10.0.0.0/16 and 10.1.0.0/16 networks.
R2(config)#int f0/0
R2(config-if)#ip summary-address eigrp 100 10.1.0.0 255.255.0.0
R2(config)#int f1/0
R2(config-if)#ip summary-address eigrp 100 10.0.0.0 255.255.0.0
R5(config)#int f3/0
R5(config-if)#ip summary-address eigrp 100 10.1.0.0 255.255.0.0
R5(config)#int f2/0
R5(config-if)#ip summary-address eigrp 100 10.0.0.0 255.255.0.0
7) What change do you expect to see on R1s routing table? Verify this (give the routing
table a few seconds to converge).
R1 will have a single /16 summary route to the 10.1.0.0 networks rather than individual /24
routes. The routes will use Equal Cost Multi Path through routers R2 and R5.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
No. R4 will have a 10.0.0.0/16 summary route with a single next hop of 10.1.3.2 on R5. It will
not load balance traffic through R2 as well because that path would have a higher metric.
(R4 is not directly adjacent to R2 as R1 is, it is an extra hop away.)
R4#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
10) Remove the summary routes on the routers which are at the boundary of the
10.0.0.0/16 and 10.1.0.0/16 networks.
Individual routes for all networks will be restored in the routing tables.
R2(config-if)#int f0/0
R2(config-if)#no ip summary-address eigrp 100 10.1.0.0 255.255.0.0
R2(config-if)#int f1/0
R2(config-if)#no ip summary-address eigrp 100 10.0.0.0 255.255.0.0
R5(config-if)#int f3/0
R5(config-if)#no ip summary-address eigrp 100 10.1.0.0 255.255.0.0
R5(config-if)#int f2/0
R5(config-if)#no ip summary-address eigrp 100 10.0.0.0 255.255.0.0
Successors and Feasible Successors
11) There are two possible paths which R1 could use to reach the 10.1.2.0/24 network
either through R2 or R5. Which route is in the routing table?
R1#sh ip route
No. Show ip eigrp topology only shows the path via R5.
14) What are the Reported Distance and Feasible Distance of the other path?
Use the show ip eigrp topology all-links to see information on Non-Successor Routes.
The Reported Distance from R2 (33280) is not less than the Feasible Distance of the
Successor Route via R5 (also 33280), so it is not a Feasible Successor.
15) Traffic from R1 to the 10.1.2.0/24 network takes the path via R5. Change this to go
via R2 instead. The path via R5 must be a Feasible Successor.
Increasing the delay on the links via R5 will cause the route via R2 to be preferred. Note you
could alternatively reduce the delay on the links via R2. You could also have changed the
bandwidth configured on the links, but changing delay is the recommended method.
I double the delay to 200 usec (note the command is delay 20, not 200). You need to set the
delay high enough that the path to R2 will have a better metric, but not too high because we
need the path via R5 to have a low enough Reported Distance to be a Feasible Successor.
R1(config)#int f3/0
R1(config-if)#delay 20
R5(config)#int f2/0
R5(config-if)#delay 20
R5(config)#int f3/0
R5(config-if)#delay 20
R4(config)#int f2/0
R4(config-if)#delay 20
16) Verify that traffic to the 10.1.2.0/24 network from R1 goes via R2.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
18) Ensure that all routers have a route to the 203.0.113.0/24 network. Internal routes
must not be advertised to the Service Provider at 203.0.113.2.
The 203.0.113.0/24 network must be added to the EIGRP process on R4, and interface
FastEthernet 3/0 facing the service provider configured as a passive interface to avoid
sending out internal network information.
19) Verify that all routers have a path to the 203.0.113.0/24 network.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
20) Configure a default static route on R4 to the Internet via the service provider at
203.0.113.2
21) Ensure that all other routers learn via EIGRP how to reach the Internet.
Configure EIGRP summary routes on R4 to inject the default static route into EIGRP.
Summary routes should be configured on the interfaces facing R3 and R5.
R4(config-router)#int f0/0
R4(config-if)#ip summary-address eigrp 100 0.0.0.0 0.0.0.0
R4(config-router)#int f2/0
R4(config-if)#ip summary-address eigrp 100 0.0.0.0 0.0.0.0
22) Verify all routers have a route to the Internet.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
Lab Topology
Download the 21-1 OSPF Configuration.gns3project file here. Open in GNS3 to load the
lab.
You can learn the theory for this section and shortcut your path to CCNA certification by
getting my CCNA Complete course. Get the course for only $10 USD (thats a massive 97%
discount) with this link:
https://www.udemy.com/ccna-complete/?couponCode=DISCOUNTCEB
OSPF Basic Configuration
2) Enable single area OSPF on every router. Ensure all networks except 203.0.113.0/24
are advertised.
5) Verify all 10.x.x.x networks and loopbacks are in the routers routing tables.
6) Set the reference bandwidth so that a 100 Gbps interface will have a cost of 1.
7) What will the OSPF cost be on the FastEthernet links? Verify this.
8) What effect does this have on the cost to the 10.1.2.0/24 network from R1?
OSPF Cost
9) There are two possible paths which R1 could use to reach the 10.1.2.0/24 network
either through R2 or R5. Which route is in the routing table?
10) Change this so that traffic from R1 to 10.1.2.0/24 will be load balanced via both R2
and R5.
11) Verify that traffic to the 10.1.2.0/24 network from R1 is load balanced via both R2
and R5.
Default Route Injection
12) Ensure that all routers have a route to the 203.0.113.0/24 network. Internal routes
must not be advertised to the Service Provider at 203.0.113.2.
13) Verify that all routers have a path to the 203.0.113.0/24 network.
14) Configure a default static route on R4 to the Internet via the service provider at
203.0.113.2
15) Ensure that all other routers learn via OSPF how to reach the Internet.
Multi-Area OSPF
17) Convert the network to use multi-area OSPF. R3 and R4 should be backbone
routers, R1 a normal router in Area 1, and R2 and R5 ABRs as shown in the diagram
below.
19) Verify the routers have formed adjacencies with each other.
20) What change do you expect to see on R1s routing table? Verify this (give the
routing table a few seconds to converge).
21) Do you see less routes in R1s routing table? Why or why not?
22) Configure summary routes on the Area Border Routers for the 10.0.0.0/16 and
10.1.0.0/16 networks.
23) Verify R1 now sees a single summary route for 10.1.0.0/16 rather than individual
routes for the 10.1.x.x networks.
24) Verify R1 is receiving a summary route for the 10.1.0.0/16 network from both R2 and
R5.
25) R1 is routing traffic to 10.1.0.0/16 via R2 only. Why is it not load balancing the traffic
through both R2 and R5?
21-1 OSPF Configuration - Answer Key
In this lab you will configure the OSPF routing protocol.
On every router:
R1(config)#interface loopback0
R1(config-if)#ip address 192.168.0.1 255.255.255.255
2) Enable single area OSPF on every router. Ensure all networks except 203.0.113.0/24
are advertised.
On every router:
R1(config)#router ospf 1
R1(config-router)#network 10.0.0.0 0.255.255.255 area 0
R1(config-router)#network 192.168.0.0 0.0.0.255 area 0
You can use different network statements, as long as they cover the range of IP addresses
configured on the router interfaces.
3) What do you expect the OSPF Router ID to be on R1? Verify this.
R1#sh ip protocols
*** IP Routing is NSF aware ***
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
R1(config)#router ospf 1
R1(config-router)#auto-cost reference-bandwidth 100000
7) What will the OSPF cost be on the FastEthernet links? Verify this.
8) What effect does this have on the cost to the 10.1.2.0/24 network from R1?
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
OSPF Cost
9) There are two possible paths which R1 could use to reach the 10.1.2.0/24 network
either through R2 or R5. Which route is in the routing table?
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
10) Change this so that traffic from R1 to 10.1.2.0/24 will be load balanced via both R2
and R5.
Since we changed the reference bandwidth, all interfaces have a cost of 1000. The current
path from R1 > R5 > R4 has a cost of 3000 (the cost of the destination interface itself is also
counted in the total cost).
The easiest way to configure both paths to have the same cost is to configure the links from
R1 > R5 and R5 > R4 to have a cost of 1500 each. (R1 > R5 = 1500, plus R5 > R4 = 1500,
plus cost of 10.1.2.0/24 interface on R4 = 1000. Total = 4000).
R1(config)#int f3/0
R1(config-if)#ip ospf cost 1500
R5(config)#int f2/0
R5(config-if)# ip ospf cost 1500
R5(config)#int f3/0
R5(config-if)# ip ospf cost 1500
R4(config)#int f2/0
R4(config-if)# ip ospf cost 1500
11) Verify that traffic to the 10.1.2.0/24 network from R1 is load balanced via both R2
and R5.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
12) Ensure that all routers have a route to the 203.0.113.0/24 network. Internal routes
must not be advertised to the Service Provider at 203.0.113.2.
The 203.0.113.0/24 network must be added to the OSPF process on R4, and interface
FastEthernet 3/0 facing the service provider configured as a passive interface to avoid
sending out internal network information.
R4(config)#router ospf 1
R4(config-router)#passive-interface f3/0
R4(config-router)#network 203.0.113.0 0.0.0.255 area 0
13) Verify that all routers have a path to the 203.0.113.0/24 network.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
14) Configure a default static route on R4 to the Internet via the service provider at
203.0.113.2
15) Ensure that all other routers learn via OSPF how to reach the Internet.
R4(config)#router ospf 1
R4(config-router)#default-information originate
16) Verify all routers have a route to the Internet.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
17) Convert the network to use multi-area OSPF. R3 and R4 should be backbone
routers, R1 a normal router in Area 1, and R2 and R5 ABRs as shown in the diagram
below.
R1(config)#router ospf 1
R1(config-router)#network 10.0.0.0 0.255.255.255 area 1
R1(config-router)#network 192.168.0.0 0.0.0.255 area 1
R2(config)#router ospf 1
R2(config-router)#no network 10.0.0.0 0.255.255.255 area 0
R2(config-router)#network 10.1.0.0 0.0.0.255 area 0
R2(config-router)#network 10.0.0.0 0.0.0.255 area 1
R5(config)#router ospf 1
R5(config-router)#no network 10.0.0.0 0.255.255.255 area 0
R5(config-router)#network 10.1.3.0 0.0.0.255 area 0
R5(config-router)#network 10.0.3.0 0.0.0.255 area 1
20) What change do you expect to see on R1s routing table? Verify this (give the
routing table a few seconds to converge).
The networks beyond R2 and R5 will appear as Inter Area routes (apart from the default
route which will appear as an external route as it was redistributed into OSPF).
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
21) Do you see less routes in R1s routing table? Why or why not?
R1 has the same amount of routes in its routing table because OSPF does not perform
automatic summarisation. You must configure manual summarisation to reduce the size of
the routing table.
22) Configure summary routes on the Area Border Routers for the 10.0.0.0/16 and
10.1.0.0/16 networks.
R2(config)#router ospf 1
R2(config-router)#area 0 range 10.1.0.0 255.255.0.0
R2(config-router)#area 1 range 10.0.0.0 255.255.0.0
R5(config-if)#router ospf 1
R5(config-router)#area 0 range 10.1.0.0 255.255.0.0
R5(config-router)#area 1 range 10.0.0.0 255.255.0.0
23) Verify R1 now sees a single summary route for 10.1.0.0/16 rather than individual
routes for the 10.1.x.x networks.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
25) R1 is routing traffic to 10.1.0.0/16 via R2 only. Why is it not load balancing the traffic
through both R2 and R5?
We configured the link from R1 to R5 to have a higher cost than the link from R1 to R2
earlier.
Lab Topology
Download the 23-1 VLAN and Inter-VLAN Routing Configuration.pkt file here. Open in
Packet Tracer to load the lab.
VTP, Access and Trunk Ports
1) All routers and switches are in a factory default state. View the VLAN database on
SW1 to verify no VLANs have been added.
2) View the default switchport status on the link from SW1 to SW2.
6) SW3 must learn VLAN information from SW1. VLANs should not be edited on SW3.
9) Configure the trunk links to use VLAN 199 as the native VLAN for better security.
10) Configure the switchports connected to the PCs with the correct VLAN configuration.
13) Configure interface FastEthernet0/0 on R1 as the default gateway for the Eng PCs.
14) Configure interface FastEthernet0/1 on R1 as the default gateway for the Sales PCs.
15) Configure SW2 to support inter-VLAN routing using R1 as the default gateway.
19) Configure SW2 to support inter-VLAN routing using R1 as the default gateway.
23) Configure SVIs on SW2 to support inter-VLAN routing between the Eng and Sales
VLANs.
1) All routers and switches are in a factory default state. View the VLAN database on
SW1 to verify no VLANs have been added.
2) View the default switchport status on the link from SW1 to SW2.
The trunking mode is set to dynamic auto and the interface is currently in the access port
operational mode using the default VLAN 1.
3) Configure the links between switches as trunks.
SW1(config)#int g0/1
SW1(config-if)#switch mode trunk
SW2(config)#int g0/1
SW2(config-if)#switch trunk encap dot1q
SW2(config-if)#switch mode trunk
SW2(config-if)#int g0/2
SW2(config-if)#switch trunk encap dot1q
SW2(config-if)#switch mode trunk
SW3(config)#int g0/2
SW3(config-if)#switch mode trunk
6) SW3 must learn VLAN information from SW1. VLANs should not be edited on SW3.
VLANs must be configured on the VTP Server SW1 and on VTP Transparent SW2. VTP
Client SW3 will learn the VLANs from SW1.
SW1(config)#vlan 10
SW1(config-vlan)#name Eng
SW1(config-vlan)#vlan 20
SW1(config-vlan)#name Sales
SW1(config-vlan)#vlan 199
SW1(config-vlan)#name Native
SW2(config)#vlan 10
SW2(config-vlan)#name Eng
SW2(config-vlan)#vlan 20
SW2(config-vlan)#name Sales
SW2(config-vlan)#vlan 199
SW2(config-vlan)#name Native
SW1(config)#interface gig0/1
SW1(config-if)#switch trunk native vlan 199
SW2(config)#int gig0/1
SW2(config-if)#switch trunk native vlan 199
SW2(config-if)#int gig0/2
SW2(config-if)#switch trunk native vlan 199
SW3(config)#int gig0/2
SW3(config-if)#switch trunk native vlan 199
10) Configure the switchports connected to the PCs with the correct VLAN configuration.
13) Configure interface FastEthernet0/0 on R1 as the default gateway for the Eng PCs.
14) Configure interface FastEthernet0/1 on R1 as the default gateway for the Sales PCs.
15) Configure SW2 to support inter-VLAN routing using R1 as the default gateway.
R1(config)#int f0/1
R1(config-if)#shutdown
19) Configure SW2 to support inter-VLAN routing using R1 as the default gateway.
R1(config)#int f0/0
R1(config-if)#shutdown
SW2(config)#ip routing
23) Configure SVIs on SW2 to support inter-VLAN routing between the Eng and Sales
VLANs.
SW2(config)#interface vlan 10
SW2(config-if)#ip address 10.10.10.1 255.255.255.0
SW2(config-if)#interface vlan 20
SW2(config-if)#ip address 10.10.20.1 255.255.255.0
24) Verify the Eng1 PC has connectivity to Sales1.
24-1 DHCP Configuration Lab Exercise
In this lab you will perform a DHCP configuration for a small campus network. You will
configure a routers outside interface as a DHCP client. You will then set up DCHP services,
using a Cisco router first and then an external DHCP server. The external DHCP server is
inside the campus LAN but outside the router.
Note that the external DHCP server at 10.10.20.10 will not be used until the last part of the
lab.
Lab Topology
Download the 24-1 DHCP Configuration.pkt file here. Open in Packet Tracer to load the lab.
Cisco DHCP Client
1) You have not acquired a static public IP address from the Internet service provider.
Configure the outside interface FastEthernet 0/0 on R1 to receive its IP address
using DHCP. The Service Provider is already configured and you have no access to
it.
2) Verify that R1 received its public IP address via DHCP (you may need to wait a few
minutes for the address to be assigned).
4) Enable the DHCP service on R1 so it gives out IP addresses to the PCs in the
10.10.10.0/24 subnet. Leave IP addresses 10.10.10.1 10 free to be assigned to
servers and printers. 10.10.20.10 is the DNS server.
6) Verify the clients can ping the DNS server by its hostname DNSserver (it might take
some time for DNS to resolve the hostname).
8) Cleanup remove the DHCP server configuration on R1. You will use an external
DHCP server instead in the next section.
9) Enter the command ipconfig /release on the PCs to release their IP addresses.
10) Enter the command ipconfig /renew on the PCs and verify they can no longer
obtain an IP address via DHCP
External DHCP Server
11) The server at 10.10.20.10 has been configured as a DHCP server with a scope of IP
addresses for the 10.10.10.0/24 subnet, but the PCs there are not receiving IP
addresses. Why is this?
12) Configure the network to allow the PCs to receive their IP addresses from the DHCP
server.
Note that the external DHCP server at 10.10.20.10 will not be used until the last part of the
lab.
1) You have not acquired a static public IP address from the Internet service provider.
Configure the outside interface FastEthernet 0/0 on R1 to receive its IP address
using DHCP. The Service Provider is already configured and you have no access to
it.
R1(config)#interface f0/0
R1(config-if)#ip address dhcp
R1(config-if)#no shutdown
2) Verify that R1 received its public IP address via DHCP (you may need to wait a few
minutes for the address to be assigned).
The DHCP server is at 203.0.113.1. We can get this information by viewing the DHCP lease
information.
4) Enable the DHCP service on R1 so it gives out IP addresses to the PCs in the
10.10.10.0/24 subnet. Leave IP addresses 10.10.10.1 10 free to be assigned to
servers and printers. 10.10.20.10 is the DNS server.
6) Verify the clients can ping the DNS server by its hostname DNSserver (it might take
some time for DNS to resolve the hostname).
9) Enter the command ipconfig /release on the PCs to release their IP addresses.
10) Enter the command ipconfig /renew on the PCs and verify they can no longer
obtain an IP address via DHCP
11) The server at 10.10.20.10 has been configured as a DHCP server with a scope of IP
addresses for the 10.10.10.0/24 subnet, but the PCs there are not receiving IP
addresses. Why is this?
DHCP requests use broadcast traffic. R1 is not forwarding the requests on to the DHCP
server as routers do not forward broadcast traffic by default.
12) Configure the network to allow the PCs to receive their IP addresses from the DHCP
server.
On the interface where they are received, configure the router to forward DHCP requests to
the server.
R1(config)#interface f0/1
R1(config-if)#ip helper-address 10.10.20.10
13) Verify the clients received their IP information via DHCP.
25-1 HSRP Configuration Lab Exercise
In this lab you will configure and test HSRP for a small campus network.
Lab Topology
Download the 25-1 HSRP Configuration.pkt file here. Open in Packet Tracer to load the lab.
Basic HSRP
1) Configure basic HSRP for the 10.10.10.0/24 network using the IP addresses shown
in the topology diagram.
2) Wait for HSRP to come up on both routers and then check which is the active router.
3) Verify that the PCs can ping their default gateway using the HSRP address
10.10.10.1.
4) Verify that the PCs have upstream connectivity via their HSRP default gateway. Ping
SP1 at 203.0.113.1
5) What is the MAC address on the physical interface of the active router?
7) Verify the PCs are using the virtual MAC address for their default gateway.
8) Configure HSRP so that R1 will be the preferred router. Use a single command.
11) Run a continuous ping to the HSRP IP address from PC1 with the ping 10.10.10.1
n 1000 command.
13) View the ping output on PC1. You should see a few dropped pings as R2 transitions
to active following the outage of R1.
15) Wait for R1 to complete booting and HSRP to come up. Verify R1 transitions to
HSRP active because pre-emption is enabled.
16) Hit Ctrl-C to cancel the ping on PC1. If you scroll back you should see a dropped
ping or two as R1 transitioned back to HSRP active.
25-1 HSRP Configuration - Answer Key
In this lab you will configure and test HSRP for a small campus network.
Basic HSRP
1) Configure basic HSRP for the 10.10.10.0/24 network using the IP addresses shown
in the topology diagram.
Check to see if the physical IP addresses for the HSRP interface GigabitEthernet0/1 have
been configured on R1 and R2.
R1(config)#interface g0/1
R1(config-if)#ip address 10.10.10.2 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#standby 1 ip 10.10.10.1
Repeat on R2. Use a different physical address and the same virtual IP address.
R2(config)#interface g0/1
R2(config-if)#ip address 10.10.10.3 255.255.255.0
R2(config-if)#no shutdown
R2(config-if)#standby 1 ip 10.10.10.1
2) Wait for HSRP to come up on both routers and then check which is the active router.
Both routers have the same default priority so the router with the highest IP address will be
preferred. If you complete the configuration on both routers before HSRP comes up then R2
will be active.
R1#show standby
GigabitEthernet0/1 - Group 1
State is Standby
7 state changes, last state change 00:16:34
Virtual IP address is 10.10.10.1
Active virtual MAC address is 0000.0C07.AC01
Local virtual MAC address is 0000.0C07.AC01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 0.327 secs
Preemption disabled
Active router is 10.10.10.3
Standby router is local
Priority 100 (default 100)
Group name is hsrp-Gig0/1-1 (default)
3) Verify that the PCs can ping their default gateway using the HSRP address
10.10.10.1.
4) Verify that the PCs have upstream connectivity via their HSRP default gateway. Ping
SP1 at 203.0.113.1
5) What is the MAC address on the physical interface of the active router?
R2#show standby
GigabitEthernet0/1 - Group 1
State is Active
6 state changes, last state change 00:16:22
Virtual IP address is 10.10.10.1
Active virtual MAC address is 0000.0C07.AC01
Local virtual MAC address is 0000.0C07.AC01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.475 secs
Preemption disabled
Active router is local
Standby router is 10.10.10.2
Priority 100 (default 100)
Group name is hsrp-Gig0/1-1 (default)
7) Verify the PCs are using the virtual MAC address for their default gateway.
8) Configure HSRP so that R1 will be the preferred router. Use a single command.
R1(config)#interface g0/1
R1(config-if)#standby 1 priority 110
R1#show standby
GigabitEthernet0/1 - Group 1
State is Standby
7 state changes, last state change 00:06:06
Virtual IP address is 10.10.10.1
Active virtual MAC address is 0000.0C07.AC01
Local virtual MAC address is 0000.0C07.AC01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 0.782 secs
Preemption disabled
Active router is 10.10.10.3
Standby router is local
Priority 110 (configured 110)
Group name is hsrp-Gig0/1-1 (default)
10) Ensure that R1 is the active router. Do not reboot.
R1(config)#int g0/1
R1(config-if)#standby 1 preempt
R1#show standby
GigabitEthernet0/1 - Group 1
State is Active
9 state changes, last state change 00:27:09
Virtual IP address is 10.10.10.1
Active virtual MAC address is 0000.0C07.AC01
Local virtual MAC address is 0000.0C07.AC01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 1.275 secs
Preemption enabled
Active router is local
Standby router is 10.10.10.3, priority 100 (expires in 8 sec)
Priority 110 (configured 110)
Group name is hsrp-Gig0/1-1 (default)
Test HSRP
11) Run a continuous ping to the HSRP IP address from PC1 with the ping 10.10.10.1
n 1000 command.
R2#show standby
GigabitEthernet0/1 - Group 1
State is Active
9 state changes, last state change 00:33:44
Virtual IP address is 10.10.10.1
Active virtual MAC address is 0000.0C07.AC01
Local virtual MAC address is 0000.0C07.AC01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 0.074 secs
Preemption disabled
Active router is local
Standby router is unknown, priority 110
Priority 100 (default 100)
Group name is hsrp-Gig0/1-1 (default)
15) Wait for R1 to complete booting and HSRP to come up. Verify R1 transitions to
HSRP active because pre-emption is enabled.
R1#show standby
GigabitEthernet0/1 - Group 1
State is Active
5 state changes, last state change 00:00:38
Virtual IP address is 10.10.10.1
Active virtual MAC address is 0000.0C07.AC01
Local virtual MAC address is 0000.0C07.AC01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.533 secs
Preemption enabled
Active router is local
Standby router is 10.10.10.3
Priority 110 (configured 110)
Group name is hsrp-Gig0/1-1 (default)
16) Hit Ctrl-C to cancel the ping on PC1. If you scroll back you should see a dropped
ping or two as R1 transitioned back to HSRP active.
26-1 Spanning Tree Troubleshooting Lab Exercise
Spanning Tree is enabled by default. In this lab you will troubleshoot Spanning Tree for a
small campus network.
Lab Topology
Load the Startup Configurations
IMPORTANT: Before loading the lab exercise, disable Show Link Lights in Packet Tracer.
(You can change it back at the end of the lab.)
Download the 26-1 STP Troubleshooting.pkt file here. Open in Packet Tracer to load the
lab.
Troubleshooting the Spanning Tree Protocol
1) The Network Operations Centre has reported that traffic is not following the most
direct path from the branch office PCs to the Internet. Your task at this stage is to
verify this.
Your task is to report which path traffic is currently taking from both PC1 and
PC2 to 203.0.113.9. Do not change any configuration.
26-1 Spanning Tree Troubleshooting - Answer Key
In this lab you will troubleshoot Spanning Tree for a small campus network.
1) The Network Operations Centre has reported that traffic is not following the most
direct path from the branch office PCs to the Internet. Your task at this stage is to
verify this.
Your task is to report which path traffic is currently taking from both PC1 and
PC2 to 203.0.113.9. Do not change any configuration.
There is not a set order of actions to troubleshoot this scenario. Troubleshooting in a logical
fashion will however make it easier and quicker. This is how I would do it.
Check which router is the HSRP active gateway for the 10.10.10.0/24 network.
R1#show standby
GigabitEthernet0/1 - Group 1
State is Active
7 state changes, last state change 00:28:52
Virtual IP address is 10.10.10.1
Active virtual MAC address is 0000.0C07.AC01
Local virtual MAC address is 0000.0C07.AC01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.276 secs
Preemption enabled
Active router is local
Standby router is 10.10.10.3, priority 100 (expires in 7 sec)
Priority 110 (configured 110)
Group name is hsrp-Gig0/1-1 (default)
R1 has been preconfigured with a higher HSRP priority and pre-emption enabled.
Check the PCs have connectivity to 203.0.113.9. Ping from both PCs.
Check which Layer 3 path the PCs are using to get to 203.0.113.9. Run traceroute on
both PCs.
The PCs are taking the most direct path via their HSRP default gateway to get to
203.0.113.9. The Layer 3 configuration and operations all look good.
Check which VLAN the PCs are in on the Acc3 and Acc4 switches.
On CD1 and CD2, check the switch ports connecting to the routers have also been
configured as access ports in VLAN 10.
CD1#sh run
! truncated
interface GigabitEthernet0/1
switchport access vlan 10
switchport mode access
On all switches, check the interfaces connecting switches have been configured as
trunks with matching native VLANs.
CD1#sh run
! truncated
!
interface FastEthernet0/21
switchport trunk native vlan 199
switchport mode trunk
!
interface FastEthernet0/24
switchport trunk native vlan 199
switchport mode trunk
!
interface GigabitEthernet0/2
switchport trunk native vlan 199
switchport mode trunk
The existing HSRP and VLAN configuration looks good.
The next thing to verify is Spanning Tree. One of the central core/distribution
switches should be used as the Root Bridge to ensure Layer 2 traffic uses the most
direct path over the network.
Acc3 is the Root Bridge. That is not good. Check to see if this is because it has a
configured Bridge Priority.
Bridge Priority has not been configured on Acc3. Check the other switches.
We learned that Acc3s MAC address is 0001.C962.D43D from the output of the
show spanning tree vlan 10 command we ran on it.
Verify that all switches have matching Spanning Tree Root Bridge information. They
should all have the same default Bridge Priority value (as one was not manually
set), and agree that Acc3 has the lowest MAC address and is the Root Bridge.
CD1s MAC address is 0090.0CA0.3902. It agrees that Acc3 is the Root Bridge.
CD2s MAC address is 0090.0C16.7A9B. It agrees that Acc3 is the Root Bridge.
Acc4s MAC address is 0060.708A.D564. It agrees that Acc3 is the Root Bridge.
We were asked to report on the forwarding paths currently being used. Use the
output of the show spanning-tree vlan 10 commands on each switch to diagram
the Spanning Tree.
Acc3 is the Root Bridge so all its ports are Designated Ports.
Add each switchs Root Port to the diagram. The Port value in the Root ID section
of the show spanning-tree vlan 10 output shows this information.
The port on the other side of Root Ports is always a Designated Port. Label F0/24
on CD2 as a Designated Port in the diagram.
The links which are left must be blocking. These are CD1 G0/2 to CD2 G0/2, and
CD1 F0/21 to Acc4 F0/21. Check which side is blocking from the output of the
show spanning-tree vlan 10 commands.
CD1 G0/2 is the blocking Alternate port, CD2 G0/2 is the forwarding Designated
Port.
CD1 F0/21 is the forwarding Designated Port, Acc4 F0/21 is the blocking Alternate
port.
We can see that PC1 will take the path PC1 > Acc3 > CD1 > R1 to reach its HSRP
default gateway. This is the most direct path and is good.
The end to end path from PC1 to 203.0.113.9 is PC1 > Acc3 > CD1 > R1 > SP1
PC2 however will use the path PC2 > Acc4 > CD2 > Acc3 > CD1 > R1. This is not
the most direct path as traffic is transiting CD2 and Acc3 rather than going directly
over the link from Acc4 to CD1.
The end to end path from PC2 to 203.0.113.9 is PC2 > Acc4 > CD2 > Acc3 >
CD1 > R1 > SP1
We can verify the path being used by checking the MAC address tables on the
switches. First verify the HSRP virtual MAC address.
R1#sh standby
GigabitEthernet0/1 - Group 1
State is Active
5 state changes, last state change 00:00:30
Virtual IP address is 10.10.10.1
Active virtual MAC address is 0000.0C07.AC01
Then clear the ARP cache on PC2, and ping the virtual MAC address to generate
traffic.
Then check the MAC address table on Acc4.
We can see that the HSRP virtual MAC address 0000.0c07.ac01 is reached
through interface F0/24 to CD2, rather than on the direct link to CD1 over interface
F0/21.
We can go hop by hop using the show mac address-table command to verify the
traffic path end to end across the switched network.
27-1 EtherChannel Configuration Lab Exercise
In this lab you will configure Etherchannel links in a campus LAN.
Lab Topology
Download the 27-1 EtherChannel Configuration.pkt file here. Open in Packet Tracer to load
the lab.
LACP EtherChannel Configuration
1) The access layer switches Acc3 and Acc4 both have two FastEthernet uplinks. How
much total bandwidth is available between the PCs attached to Acc3 and the PCs
attached to Acc4?
2) Convert the existing uplinks from Acc3 to CD1 and CD2 to LACP EtherChannel.
Configure descriptions on the port channel interfaces to help avoid confusion later.
4) Convert the existing uplinks from Acc4 to CD1 and CD2 to PAgP EtherChannel.
(Note that in a real world environment you should always use LACP if possible.)
6) Convert the existing uplinks between CD1 and CD2 to static EtherChannel.
8) How much total bandwidth is available between the PCs attached to Acc3 and the
PCs attached to Acc4 now?
27-1 EtherChannel Configuration - Answer Key
In this lab you will configure EtherChannel links in a campus LAN.
1) The access layer switches Acc3 and Acc4 both have two FastEthernet uplinks. How
much total bandwidth is available between the PCs attached to Acc3 and the PCs
attached to Acc4?
Spanning tree shuts down all but one uplink on both switches so the total bandwidth
available between them is a single FastEthernet link 100 Mbps.
2) Convert the existing uplinks from Acc3 to CD1 and CD2 to LACP EtherChannel.
Configure descriptions on the port channel interfaces to help avoid confusion later.
The uplinks go to two separate redundant switches at the core/distribution layer so we need
to configure two EtherChannels, one to CD1 and one to CD2.
Well configure the Acc3 side of the EtherChannel to CD1 first. Dont forget to set the native
VLAN on the new port channel interface.
The port channels should show flags (SU) (Layer 2, in use) with member ports (P) (in port-
channel). Verify on both sides of the port channel.
Acc3:
CD1:
CD2:
PAgP EtherChannel Configuration
4) Convert the existing uplinks from Acc4 to CD1 and CD2 to PAgP EtherChannel.
(Note that in a real world environment you should always use LACP if possible.)
Its good practice to use the same port channel number on both sides of the link. CD1 is
already using port channel 1 to Acc3, and CD2 is using port channel 2 to Acc3. From Acc4
to CD1 well use port channel 2, and from Acc4 to CD2 well use port channel 1.
Next configure the Acc4 side of the EtherChannel to CD1. Remember to use a different port
channel number.
The port channels should show flags (SU) (Layer 2, in use) with member ports (P) (in port-
channel). Verify on both sides of the port channel.
On the core/distribution layer switches you should see both the LACP and PAgP port
channels up.
Acc4:
CD1:
CD2:
Static EtherChannel Configuration
6) Convert the existing uplinks between CD1 and CD2 to static EtherChannel.
Port channels 1 and 2 are already in use so well use port channel 3.
CD1:
CD2:
8) How much total bandwidth is available between the PCs attached to Acc3 and the
PCs attached to Acc4 now?
The port channels from the Acc3 and Acc4 switches towards the root bridge CD1 are up and
forwarding. Spanning tree shuts down the port channels toward CD2 to prevent a loop.
The port channels from Acc3 and Acc4 facing the root bridge comprise two FastEthernet
interfaces, so the total bandwidth available between the PCs attached to the different access
layer switches is 200 Mbps.
28-1 Port Security Configuration Lab Exercise
In this lab you will configure Port Security on a small campus network.
Lab Topology
Download the 28-1 Port Security Configuration.pkt file here. Open in Packet Tracer to load
the lab.
Disable Unused Ports
1) Disable all unused ports on SW1. This prevents unauthorised hosts plugging in to
them to gain access to the network.
2) Configure port security on interface FastEthernet 0/1. Allow a maximum of two MAC
addresses and manually add PC1s MAC address to the configuration.
3) Enable Port Security on interface FastEthernet 0/2 with the default settings.
1) Disable all unused ports on SW1. This prevents unauthorised hosts plugging in to
them to gain access to the network.
2) Configure port security on interface FastEthernet 0/1. Allow a maximum of two MAC
addresses and manually add PC1s MAC address to the configuration.
We need to discover PC1s MAC address. We can get this information from the PC itself or
from the switch. Use ipconfig /all to find it on the PC.
Use show mac address-table to find it on the switch. Use ping to generate some traffic from
the PC if it does not show up in the MAC address table.
You need to make the interface an access port before the switch will accept Port Security
configuration. No VLANs are configured on the switch or specified in the lab task so leave it
in the default VLAN 1.
SW1(config)#int f0/1
SW1(config-if)#switch mode access
SW1(config-if)#switchport port-security
SW1(config-if)#switchport port-security maximum 2
SW1(config-if)#switchport port-security mac-address 0000.1111.1111
3) Enable Port Security on interface FastEthernet 0/2 with the default settings.
SW1(config)#int f0/2
SW1(config-if)#switch mode access
SW1(config-if)#switchport port-security
4) Use a show port-security command to verify the MAC address on PC2.
You may have to ping from PC2 first to generate some traffic.
PC1, PC2 and PC3 are Cisco IOS routers mimicking end hosts. They have been configured
with IP addresses and a default static route to R1 as their default gateway.
Lab Topology
Download the 29-1 ACL Configuration.gns3project file here. Open in GNS3 to load the lab.
Numbered Standard ACL
1) Verify that all PCs have connectivity to each other, to R1 and to R2.
2) Configure and apply a numbered standard ACL on R1 which denies traffic from all
hosts in the 10.0.2.0/24 subnet to R2.
The PCs in the 10.0.1.0/24 and 10.0.2.0/24 subnets must maintain connectivity to
each other.
4) Configure and apply a numbered extended ACL on R1 which permits Telnet access
from PC1 to R2. Telnet to R2 must be denied for all other PCs in the network.
5) Test that traffic is secured exactly as required. Use the command telnet 10.0.0.2
from the PCs to test and the password Flackbox. Type exit to leave the Telnet
session.
7) Remove the numbered extended ACL you just configured from the interface. Do not
delete the ACL.
Permit Telnet from PC1 to R2. Telnet to R2 must be denied for all other PCs in the
network.
Permit ping from PC2 to R2. Ping to R2 must be denied for all other PCs in the
network.
All other connectivity must be maintained.
PC1, PC2 and PC3 are Cisco IOS routers mimicking end hosts. They have been configured
with IP addresses and a default static route to R1 as their default gateway.
1) Verify that all PCs have connectivity to each other, to R1 and to R2.
PC1#ping 10.0.1.11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.1.11,
timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip
min/avg/max = 8/19/40 ms
PC1#ping 10.0.2.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.2.10,
timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip
min/avg/max = 20/34/48 ms
PC1#ping 10.0.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.1.1, t
imeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip
min/avg/max = 16/20/24 ms
PC1#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, t
imeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip
min/avg/max = 40/43/56 ms
We have already verified connectivity between the PCs in both subnets. Ping R1 and R2
from PC3.
PC3#ping 10.0.2.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.2.1, t
imeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip
min/avg/max = 12/18/20 ms
PC3#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, t
imeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip
min/avg/max = 36/40/44 ms
2) Configure and apply a numbered standard ACL on R1 which denies traffic from all
hosts in the 10.0.2.0/24 subnet to R2.
The PCs in the 10.0.1.0/24 and 10.0.2.0/24 subnets must maintain connectivity to
each other.
The PCs in the 10.0.1.0/24 subnet must maintain connectivity to R2.
The task specifies that a numbered standard ACL be used on R1. This checks the source
address only. This prevents us from configuring an ACL inbound on the F2/0 interface which
denies traffic to R2 but permits it to the 10.0.1.0/24 network that would require an extended
ACL.
The only way the task can be completed is by applying the ACL outbound on the F0/0
interface facing R2.
Configure a numbered standard ACL that denies traffic from 10.0.2.0/24. Do not forget to
permit from 10.0.1.0/24 as the implicit deny any at the end of the ACL would block the traffic
otherwise.
R1(config)#interface f0/0
R1(config-if)#ip access-group 1 out
PC1#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 40/44/60
ms
PC3 should not be able to ping R2.
PC3#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
UUUUU
Success rate is 0 percent (0/5)
PC3#ping 10.0.1.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.1.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/39/40
ms
PC3#ping 10.0.1.11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.1.11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/39/40
ms
Numbered Extended ACL
4) Configure and apply a numbered extended ACL on R1 which permits Telnet access
from PC1 to R2. Telnet to R2 must be denied for all other PCs in the network.
All traffic from the 10.0.2.0/24 subnet to R2 is already denied by the numbered standard ACL
we configured.
We need to create an ACL which will allow Telnet traffic to R2 at 10.0.0.2 from PC1 at
10.0.1.10 but deny it from all other hosts in the 10.0.1.0/24 subnet.
The implicit deny all at the end of the ACL would block Telnet traffic from the other hosts to
R2, but it would also block all other traffic from the 10.0.1.0/24 subnet including other
applications to R2 and traffic to the 10.0.2.0/24 subnet. We need to explicitly block the Telnet
traffic but allow other traffic.
The access list should be applied as close to the source as possible, so apply it inbound on
interface F1/0. We already have an outbound ACL on F0/0 so we could not apply it there
anyway.
R1(config)#interface f1/0
R1(config-if)#ip access-group 100 in
5) Test that traffic is secured exactly as required. Use the command telnet 10.0.0.2
from the PCs to test and the password Flackbox. Type exit to leave the Telnet
session.
PC1#telnet 10.0.0.2
Trying 10.0.0.2 ... Open
PC2#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 32/42/60
ms
PC2#telnet 10.0.0.2
Trying 10.0.0.2 ...
% Destination unreachable; gateway or host down
PC3 should not be able to ping or Telnet to R2.
PC3#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
UUUUU
Success rate is 0 percent (0/5)
PC3#telnet 10.0.0.2
Trying 10.0.0.2 ...
% Destination unreachable; gateway or host down
PC3#ping 10.0.1.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.1.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/39/40
ms
PC3#ping 10.0.1.11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.1.11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/39/40
ms
6) How many Telnet packets were permitted by the ACL?
show access-list to check the hit counts. Note that your values may be different.
7) Remove the numbered extended ACL you just configured from the interface. Do not
delete the ACL.
R1(config)#int f1/0
R1(config-if)#no ip access-group 100 in
Permit Telnet from PC1 to R2. Telnet to R2 must be denied for all other PCs in the
network.
Permit ping from PC2 to R2. Ping to R2 must be denied for all other PCs in the
network.
All other connectivity must be maintained.
All traffic from the 10.0.2.0/24 subnet to R2 is already denied by the numbered standard ACL
we configured.
We do need to configure an ACL to secure traffic from the 10.0.1.0/24 subnet.
R1(config)#int f1/0
R1(config-if)#ip access-group F1/0_in in
PC1#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
UUUUU
Success rate is 0 percent (0/5)
PC1#telnet 10.0.0.2
Trying 10.0.0.2 ... Open
Password:
R2>
PC2#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/39/40
ms
PC2#telnet 10.0.0.2
Trying 10.0.0.2 ...
% Destination unreachable; gateway or host down
PC3#ping 10.0.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
UUUUU
Success rate is 0 percent (0/5)
PC3#telnet 10.0.0.2
Trying 10.0.0.2 ...
% Destination unreachable; gateway or host down
PC3 should be able to ping PC1 and PC2.
PC3#ping 10.0.1.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.1.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/39/40
ms
PC3#ping 10.0.1.11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.1.11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/39/40
ms
30-1 NAT Configuration Lab Exercise
In this lab you will configure static and dynamic Network Address Translation, and Port
Address Translation.
PC1, PC2, Int-S1 (internal server 1) and Ext-S1 (external server 1) are Cisco IOS routers
mimicking end hosts. They have been configured with IP addresses and a default static
route to their default gateways.
R1 is the WAN edge router at your company, it has a default route pointing to the Service
Provider router SP1.
You have bought the range of public IP addresses 203.0.113.0/28.
203.0.113.1 is assigned to the Service Provider default gateway SP1, 203.0.113.2 is
assigned to the Internet facing F0/0 interface on your router R1.
203.0.113.3 203.0.113.14 are your remaining available public IP addresses.
Note that entries in the NAT translation table age out quickly. Send the traffic again if
you do not see the expected results in the table.
Lab Topology
Download the 30-1 NAT Configuration.gns3project file here. Open in GNS3 to load the lab.
Static NAT
1) Int-S1 is your companys web server. It must be reachable from external customers
browsing the Internet. Configure NAT on R1 so that external customers can reach
the server using the public IP address 203.0.113.3. Do not change any IP addressing
or routing information.
3) Ping Ext-S1 from Int-S1 to check the NAT rule is working and you have connectivity.
4) Check the debug output on Ext-S1 and verify the ping echo reply was sent to Int-S1s
global address 203.0.113.3.
5) Telnet to 203.0.113.3 port 80 from Ext-S1 to verify that external customers on the
Internet can reach your web server.
You will see the output shown below if your configuration is working:
EXT-S1#telnet 203.0.113.3 80
Trying 203.0.113.3, 80 ... Open
6) Verify the ping and Telnet connections appear in the NAT translation table. Note that
entries age out quickly so generate the traffic again if you did not check the table
quickly enough.
7) Type exit to break the Telnet connection on Ext-S1. You should see the output
shown below:
EXT-S1#telnet 203.0.113.3 80
Trying 203.0.113.3, 80 ... Open
exit
HTTP/1.1 400 Bad Request
Date: Mon, 21 Aug 2017 19:39:32 GMT
Server: cisco-IOS
Accept-Ranges: none
9) Turn on NAT debugging on R1. Ping Ext-S1 from PC1. View the debug output on R1.
You should see NAT entries for the 5 pings. Which global address was PC1
translated to?
10) Check the ICMP debug output on Ext-S1 and verify the ping echo reply was sent to
PC1s global address.
11) Verify the ping connection appears in the NAT translation table.
12) When all the addresses in the pool 203.0.113.4 to 203.0.113.12 have been
allocated, what will happen when the next PC tries to send traffic to an external host?
13) Enable Port Address Translation so that the last IP address in the range can be
reused when all IP addresses have been allocated to clients.
14) Cleanup: Completely remove the access list and all NAT configuration from R1. Use
the commands show run | section nat and show access-list to verify all
configuration is removed.
15) Your company no longer has a range of public IP addresses. Instead you will receive
a single public IP address via DHCP from your service provider.
16) Bring the interface back up and wait for DHCP. What IP address is it assigned?
17) Configure NAT on R1 so that PCs in the 10.0.2.0/24 subnet have connectivity to
external networks on a first come first served basis. Allow multiple PCs to reuse the
IP address on interface F0/0 on R1. Ensure that NAT continues to work if the DHCP
address assigned by the provider changes.
18) Turn on NAT debugging on R1. Open a Telnet session from PC1 to Ext-S1, using
the password Flackbox.
19) View the debug output on R1. Which global IP address and source port was PC1
translated to?
20) Open a Telnet session from PC2 to Ext-S1. Which global IP address and source port
is PC2 translated to?
PC1, PC2, Int-S1 (internal server 1) and Ext-S1 (external server 1) are Cisco IOS routers
mimicking end hosts. They have been configured with IP addresses and a default static
route to their default gateways.
R1 is the WAN edge router at your company, it has a default route pointing to the Service
Provider router SP1.
Note that entries in the NAT translation table age out quickly. Send the traffic again if
you do not see the expected results in the table.
Static NAT
1) Int-S1 is your companys web server. It must be reachable from external customers
browsing the Internet. Configure NAT on R1 so that external customers can reach
the server using the public IP address 203.0.113.3. Do not change any IP addressing
or routing information.
Int-S1 needs a fixed public IP address so we must configure static NAT. Configure the F0/0
interface facing the Internet as the NAT outside interface.
R1(config)#int f0/0
R1(config-if)#ip nat outside
R1(config)#int f1/0
R1(config-if)#ip nat inside
Configure a static NAT rule mapping the inside local address 10.0.1.10 to the global IP
address 203.0.113.3.
EXT-S1#debug ip icmp
3) Ping Ext-S1 from Int-S1 to check the NAT rule is working and you have connectivity.
INT-S1#ping 203.0.113.20
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 203.0.113.20, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 52/58/60
ms
4) Check the debug output on Ext-S1 and verify the ping echo reply was sent to Int-S1s
global address 203.0.113.3.
EXT-S1#
*Aug 21 20:38:50.691: ICMP: echo reply sent, src 203.0.113.20, dst
203.0.113.3, topology BASE, dscp 0 topoid 0
*Aug 21 20:38:50.743: ICMP: echo reply sent, src 203.0.113.20, dst
203.0.113.3, topology BASE, dscp 0 topoid 0
*Aug 21 20:38:50.803: ICMP: echo reply sent, src 203.0.113.20, dst
203.0.113.3, topology BASE, dscp 0 topoid 0
*Aug 21 20:38:50.863: ICMP: echo reply sent, src 203.0.113.20, dst
203.0.113.3, topology BASE, dscp 0 topoid 0
*Aug 21 20:38:50.923: ICMP: echo reply sent, src 203.0.113.20, dst
203.0.113.3, topology BASE, dscp 0 topoid 0
EXT-S1#
5) Telnet to 203.0.113.3 port 80 from Ext-S1 to verify that external customers on the
Internet can reach your web server.
You will see the output shown below if your configuration is working:
EXT-S1#telnet 203.0.113.3 80
Trying 203.0.113.3, 80 ... Open
6) Verify the ping and Telnet connections appear in the NAT translation table. Note that
entries age out quickly so generate the traffic again if you did not check the table
quickly enough.
Your output should look similar to below. The source port numbers may be different.
7) Type exit to break the Telnet connection on Ext-S1. You should see the output
shown below:
EXT-S1#telnet 203.0.113.3 80
Trying 203.0.113.3, 80 ... Open
exit
HTTP/1.1 400 Bad Request
Date: Mon, 21 Aug 2017 19:39:32 GMT
Server: cisco-IOS
Accept-Ranges: none
We already set the F0/0 interface facing the Internet as the NAT outside interface when we
configured static NAT for Int-S1.
R1(config)#int f0/0
R1(config-if)#ip nat outside
Configure the F2/0 interface facing the PCs as a NAT inside interface.
R1(config)#int f2/0
R1(config-if)#ip nat inside
Configure the pool of global addresses.
Create an access list which references the internal IP addresses we want to translate.
Associate the access list with the NAT pool to complete the configuration.
PC1 will be translated to the first available address in the pool, 203.0.113.4.
R1#debug ip nat
IP NAT debugging is on
PC1#ping 203.0.113.20
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 203.0.113.20, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 56/59/60
ms
R1#
EXT-S1#
*Aug 21 22:00:19.411: ICMP: echo reply sent, src 203.0.113.20, dst 203.0.113.4,
topology BASE, dscp 0 topoid 0
*Aug 21 22:00:19.551: ICMP: echo reply sent, src 203.0.113.20, dst 203.0.113.4,
topology BASE, dscp 0 topoid 0
*Aug 21 22:00:19.599: ICMP: echo reply sent, src 203.0.113.20, dst 203.0.113.4,
topology BASE, dscp 0 topoid 0
*Aug 21 22:00:19.659: ICMP: echo reply sent, src 203.0.113.20, dst 203.0.113.4,
topology BASE, dscp 0 topoid 0
*Aug 21 22:00:19.719: ICMP: echo reply sent, src 203.0.113.20, dst 203.0.113.4,
topology BASE, dscp 0 topoid 0
11) Verify the ping connection appears in the NAT translation table.
12) When all the addresses in the pool 203.0.113.4 to 203.0.113.12 have been
allocated, what will happen when the next PC tries to send traffic to an external host?
It will not get a global IP address because they have all been given out. The traffic will fail.
The user could try again after waiting for a translation to time out and its global address to be
released back into the pool.
13) Enable Port Address Translation so that the last IP address in the range can be
reused when all IP addresses have been allocated to clients.
R1(config)#int f0/0
R1(config-if)#no ip nat outside
R1(config-if)#int f1/0
R1(config-if)#no ip nat inside
R1(config-if)#int f2/0
R1(config-if)#no ip nat inside
R1(config-if)#no ip nat inside source static 10.0.1.10 203.0.113.3
R1(config)#end
R1#clear ip nat translation *
R1#config t
R1(config)#no ip nat inside source list 1 pool Flackbox overload
R1(config)#no ip nat pool Flackbox 203.0.113.4 203.0.113.12 netmask
255.255.255.240
R1(config)#no access-list 1
R1#show access-list
R1#
Port Address Translation PAT
15) Your company no longer has a range of public IP addresses. Instead you will receive
a single public IP address via DHCP from your service provider.
R1(config)#int f0/0
R1(config-if)#shutdown
R1(config-if)#no ip address
R1(config-if)#ip address dhcp
16) Bring the interface back up and wait for DHCP. What IP address is it assigned?
R1(config)#int f0/0
R1(config-if)#no shutdown
Configure the F0/0 interface facing the Internet as the NAT outside interface.
R1(config)#int f0/0
R1(config-if)#ip nat outside
R1(config)#int f2/0
R1(config-if)#ip nat inside
Create an access list which references the internal IP addresses we want to translate.
Associate the access list with the outside interface and enable PAT to complete the
configuration.
18) Turn on NAT debugging on R1. Open a Telnet session from PC1 to Ext-S1, using
the password Flackbox.
PC1#telnet 203.0.113.20
Trying 203.0.113.20 ... Open
Password:
EXT-S1>
19) View the debug output on R1. Which global IP address and source port was PC1
translated to?
PC1 is translated to the address on R1s F0/0 interface, 203.0.113.13. The source port may
be a different number for you.
20) Open a Telnet session from PC2 to Ext-S1. Which global IP address and source port
is PC2 translated to?
PC2 is also translated to 203.0.113.13, but a different source port number using PAT.
PC2#telnet 203.0.113.20
Trying 203.0.113.20 ... Open
User Access Verification
Password:
EXT-S1>
Routers R1, R2 and R3 have been configured with IPv4 addresses and connectivity has
been established with between all networks.
PC1 and PC2 are Cisco IOS routers mimicking end hosts. They have been configured with
IPv4 addresses and an IPv4 default static route to their default gateways.
Lab Topology
Download the 31 IPv6 Addressing.gns3project file here. Open in GNS3 to load the lab.
Verify IPv4 Connectivity
1) Verify R1, R2, R3, PC1 and PC2 have been configured with IPv4 addresses as
shown in the topology diagram.
2) View the routing tables on R1, R2 and R3 to verify connectivity has been established
between all networks. What routing protocol is being used?
3) Verify PC1 and PC2 have been configured with the correct default gateway.
IPv6 Addressing
5) Configure global unicast IPv6 addresses on R1, R2, and R3, according to the
network topology diagram. Do not enable ipv6 unicast-routing.
6) Configure global unicast EUI-64 IPv6 addresses on the FastEthernet 0/0 interfaces
on PC1 and PC2.
7) Will the routers have IPv6 link local addresses on the interfaces where you just
configured global unicast addresses? What about the other interfaces? Verify this.
8) Note down the EUI-64 global unicast addresses on PC1 and PC2.
9) Configure link local addresses on R1, R2 and R3. For each router, use the address
shown below on each of its interfaces.
R1: FE80::1/64
R2: FE80::2/64
R3: FE80::3/64
10) Verify the global unicast and link local addresses have been configured correctly on
R1, R2 and R3.
Routers R1, R2 and R3 have been configured with IPv4 addresses and connectivity has
been established with between all networks.
PC1 and PC2 are Cisco IOS routers mimicking end hosts. They have been configured with
IPv4 addresses and an IPv4 default static route to their default gateways.
1) Verify R1, R2, R3, PC1 and PC2 have been configured with IPv4 addresses as
shown in the topology diagram.
R1#show ip route
! codes truncated
R3#show ip route
! codes truncated
PC1#show ip route
! codes truncated
PC2#show ip route
! codes truncated
PC1#ping 10.10.3.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.3.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 80/80/84
ms
IPv6 Addressing
5) Configure global unicast IPv6 addresses on R1, R2, and R3, according to the
network topology diagram. Do not enable ipv6 unicast-routing.
R1(config)#int f2/0
R1(config-if)#ipv6 address 2001:db8::1/64
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#int f0/0
R1(config-if)#ipv6 address 2001:db8:0:1::1/64
R1(config-if)#no shutdown
R3(config)#int f1/0
R3(config-if)#ipv6 address 2001:db8:0:2::1/64
R3(config-if)#no shut
R3(config-if)#exit
R3(config)#int f2/0
R3(config-if)#ipv6 address 2001:db8:0:3::1/64
R3(config-if)#no shut
6) Configure global unicast EUI-64 IPv6 addresses on the FastEthernet 0/0 interfaces
on PC1 and PC2.
PC1(config)#int f0/0
PC1(config-if)#ipv6 address 2001:db8::/64 eui-64
PC1(config-if)#no shut
PC2(config)#int f0/0
PC2(config-if)#ipv6 address 2001:db8:0:3::/64 eui-64
PC2(config-if)#no shut
7) Will the routers have IPv6 link local addresses on the interfaces where you just
configured global unicast addresses? What about the other interfaces? Verify this.
EUI-64 link local addresses will be automatically configured when IPv6 is enabled on the
interfaces (by applying the global unicast addresses). The other interfaces will not have link
local addresses.
8) Note down the EUI-64 global unicast addresses on PC1 and PC2.
Note that these addresses are generated based on the interface MAC address and may be
different in your lab.
9) Configure link local addresses on R1, R2 and R3. For each router, use the address
shown below on each of its interfaces.
R1: FE80::1/64
R2: FE80::2/64
R3: FE80::3/64
R1(config)#int f0/0
R1(config-if)#ipv6 address fe80::1 link-local
R1(config-if)#exit
R1(config)#int f2/0
R1(config-if)#ipv6 address fe80::1 link-local
R2(config)#int f0/0
R2(config-if)#ipv6 address fe80::2 link-local
R2(config-if)#exit
R2(config)#int f1/0
R2(config-if)#ipv6 address fe80::2 link-local
R3(config)#int f1/0
R3(config-if)#ipv6 address fe80::3 link-local
R3(config-if)#exit
R3(config)#int f2/0
R3(config-if)#ipv6 address fe80::3 link-local
10) Verify the global unicast and link local addresses have been configured correctly on
R1, R2 and R3.
R2#ping fe80::1
Output Interface: FastEthernet0/0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to FE80::1, timeout is 2 seconds:
Packet sent with a source address of FE80::2%FastEthernet0/0
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 16/22/40
ms
R2#ping fe80::3
Output Interface: FastEthernet1/0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to FE80::3, timeout is 2 seconds:
Packet sent with a source address of FE80::2%FastEthernet1/0
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 20/26/52
ms
12) View the IPv6 neighbors known by R2.
Note that your output may be different depending on what IPv6 traffic has been seen
recently by R2.
You will configure static routes, OSPF and EIGRP. Note that in a real world environment you
would pick one of these options rather than configuring all of them.
Routers R1, R2 and R3 have been configured with IPv4 and IPv6 addresses. IPv4 routing
has been configured on the existing network but IPv6 routing has not.
PC1 and PC2 are Cisco IOS routers mimicking end hosts. They have been configured with
IPv4 and IPv6 addresses and default static routes to their default gateways have been
added for both IPv4 and IPv6.
Lab Topology
Download the 32-1 IPv6 Routing Configuration.gns3project file here. Open in GNS3 to load
the lab.
IPv4 and IPv6 Addressing Verification
1) Verify IPv4 and IPv6 addresses have been configured on R1, R2, R3, PC1 and PC2
according to the lab topology diagram. PC1 and PC2 use EUI-64 addresses for IPv6
and 10.10.x.10 for IPv4. Note that the EUI-64 addresses may be different in your lab.
2) Verify PC1 has been configured to use R1 as its default gateway for IPv4.
3) Verify PC2 has been configured to use R3 as its default gateway for IPv4.
6) Verify which IPv6 dynamic routing protocols are running on R1, R2 and R3. Do not
use the show run command.
7) Use the show run | include ipv6 route command on R1, R2 and R3 to verify if they
have been configured with IPv6 static routes.
8) Do you expect to see any routes in the IPv6 routing tables? Why or why not? Verify
this.
9) Do you expect PC1 to be able to ping PC2 on its IPv6 address? Why or why not?
Verify this.
Static Routing
12) Verify PC1 and PC2 can ping their default gateways.
14) PC1 has reachability to its default gateway R1, and R2 has a route to the
2001:db8::/64 network. Do you expect PC1 be able to ping R2 on 2001:db8:0:1::2?
Why or why not? Verify this.
15) Fix the problem to allow PC1 to ping R2 on 2001:db8:0:1::2. Enter the command
which will fix the problem on R1, R2 and R3.
16) Verify PC1 can ping R2 on 2001:db8:0:1::2 now.
17) Will PC1 be able to ping PC2 by IPv6 address? Why or why not? Verify this.
18) Configure static routes to allow reachability between all IPv6 networks.
20) Verify PC1 can now ping PC2 by its IPv6 address.
21) Cleanup: Remove the static IPv6 routes on R1, R2 and R3.
22) Verify there are only connected and local routes in R1, R2 and R3s IPv6 routing
tables.
OSPFv2 Configuration
23) Enable a loopback interface on R1, R2 and R3. Use the IPv4 address
192.168.0.x/32, where x is the router number. For example 192.168.0.3/32 on R3.
24) Enable single area OSPFv2 on every router. Ensure all networks are advertised.
25) What do you expect the OSPF Router ID to be on R1? Verify this.
26) Verify the routers have formed adjacencies with each other.
27) Do you expect to see OSPF routes in R1, R2 and R3s IPv4 routing tables? Why or
why not? Verify this.
28) Configure IPv6 addresses on the existing loopback interfaces on R1, R2 and R3.
Use the address 2001:db8:1:x::1/64, where x is the router number. For example
2001:db8:1:3::1/64 on R3.
29) Enable single area OSPFv3 on every router. Ensure all networks are advertised.
Configure the loopbacks as passive interfaces.
30) What do you expect the OSPF Router ID to be on R1? Verify this.
31) Manually set the Router ID on R1 to be the highest loopback address.
32) Verify the routers have formed adjacencies with each other.
33) Do you expect to see OSPF routes in R1, R2 and R3s IPv6 routing tables? Why or
why not? Verify this.
36) Enable EIGRP for IPv6 using AS 100 on every router. Ensure all networks are
advertised. Configure the loopbacks as passive interfaces.
37) What do you expect the EIGRP Router ID to be on R1? Verify this.
39) Verify the routers have formed adjacencies with each other.
40) Do you expect EIGRP routes to be in the routers IPv6 routing tables? Why or why
not? Verify this.
You will configure static routes, OSPF and EIGRP. Note that in a real world environment you
would pick one of these options rather than configuring all of them.
Routers R1, R2 and R3 have been configured with IPv4 and IPv6 addresses. IPv4 routing
has been configured on the existing network but IPv6 routing has not.
PC1 and PC2 are Cisco IOS routers mimicking end hosts. They have been configured with
IPv4 and IPv6 addresses and default static routes to their default gateways have been
added for both IPv4 and IPv6.
1) Verify IPv4 and IPv6 addresses have been configured on R1, R2, R3, PC1 and PC2
according to the lab topology diagram. PC1 and PC2 use EUI-64 addresses for IPv6
and 10.10.x.10 for IPv4. Note that the EUI-64 addresses may be different in your lab.
FastEthernet0/0 [up/up]
FE80::1
2001:DB8:0:1::1
unassigned
FastEthernet2/0 [up/up]
FE80::1
2001:DB8::1
Unassigned
FastEthernet0/0 [up/up]
FE80::2
2001:DB8:0:1::2
FastEthernet1/0 [up/up]
FE80::2
2001:DB8:0:2::2
unassigned
unassigned
unassigned
FastEthernet1/0 [up/up]
FE80::3
2001:DB8:0:2::1
FastEthernet2/0 [up/up]
FE80::3
2001:DB8:0:3::1
Unassigned
FastEthernet0/0 [up/up]
FE80::C804:36FF:FE98:0
2001:DB8::C804:36FF:FE98:0
unassigned
unassigned
Unassigned
FastEthernet0/0 [up/up]
FE80::C805:CFF:FE28:0
2001:DB8:0:3:C805:CFF:FE28:0
unassigned
unassigned
unassigned
2) Verify PC1 has been configured to use R1 as its default gateway for IPv4.
PC1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
PC2#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
R1#show ip route
R3#show ip route
PC1#ping 10.10.3.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.3.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 80/80/84
ms
6) Verify which IPv6 dynamic routing protocols are running on R1, R2 and R3. Do not
use the show run command.
The routers are not running any IPv6 dynamic routing protocol.
The routers have not been configured with any IPv6 static routes.
8) Do you expect to see any routes in the IPv6 routing tables? Why or why not? Verify
this.
The routers have been configured with IPv6 addresses so connected and local routes will
appear in the routing table.
C 2001:DB8::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8::1/128 [0/0]
via FastEthernet2/0, receive
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::1/128 [0/0]
via FastEthernet0/0, receive
L FF00::/8 [0/0]
via Null0, receive
R2#sh ipv6 route
IPv6 Routing Table - default - 5 entries
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::2/128 [0/0]
via FastEthernet0/0, receive
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::2/128 [0/0]
via FastEthernet1/0, receive
L FF00::/8 [0/0]
via Null0, receive
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::1/128 [0/0]
via FastEthernet1/0, receive
C 2001:DB8:0:3::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8:0:3::1/128 [0/0]
via FastEthernet2/0, receive
L FF00::/8 [0/0]
via Null0, receive
9) Do you expect PC1 to be able to ping PC2 on its IPv6 address? Why or why not?
Verify this.
No IPv6 routing has been configured so there is no connectivity between different IPv6
subnets. (Note that PC2s EUI-64 IPv6 address may be different in your lab. Use show ipv6
interface brief to check its address.)
PC1#ping 2001:DB8:0:3:C805:CFF:FE28:0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8:0:3:C805:CFF:FE28:0,
timeout is 2 seconds:
Static Routing
12) Verify PC1 and PC2 can ping their default gateways.
PC1#ping 2001:db8::1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8::1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 20/31/44
ms
PC2#ping 2001:DB8:0:3::1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8:0:3::1, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 16/26/56
ms
14) PC1 has reachability to its default gateway R1, and R2 has a route to the
2001:db8::/64 network. Do you expect PC1 be able to ping R2 on 2001:db8:0:1::2?
Why or why not? Verify this.
PC1 cannot ping R2 on 2001:db8:0:1::2 because ipv6 unicast-routing has not been enabled
on the routers.
PC1#ping 2001:db8:0:1::2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8:0:1::2, timeout is 2
seconds:
.....
Success rate is 0 percent (0/5)
15) Fix the problem to allow PC1 to ping R2 on 2001:db8:0:1::2. Enter the command
which will fix the problem on R1, R2 and R3.
R1(config)#ipv6 unicast-routing
R2(config)#ipv6 unicast-routing
R3(config)#ipv6 unicast-routing
16) Verify PC1 can ping R2 on 2001:db8:0:1::2 now.
PC1#ping 2001:db8:0:1::2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8:0:1::2, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 60/60/64
ms
17) Will PC1 be able to ping PC2 by IPv6 address? Why or why not? Verify this.
PC1 cannot ping PC2 because routing has not been configured between the 2001:db8::/64
and 2001:db8:0:3::/64 networks.
PC1#ping 2001:DB8:0:3:C805:CFF:FE28:0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8:0:3:C805:CFF:FE28:0,
timeout is 2 seconds:
UUUUU
Success rate is 0 percent (0/5)
18) Configure static routes to allow reachability between all IPv6 networks.
OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2, l - LISP
C 2001:DB8::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8::1/128 [0/0]
via FastEthernet2/0, receive
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::1/128 [0/0]
via FastEthernet0/0, receive
S 2001:DB8:0:2::/64 [1/0]
via 2001:DB8:0:1::2
S 2001:DB8:0:3::/64 [1/0]
via 2001:DB8:0:1::2
L FF00::/8 [0/0]
via Null0, receive
R2#sh ipv6 route
IPv6 Routing Table - default - 7 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2, l - LISP
S 2001:DB8::/64 [1/0]
via 2001:DB8:0:1::1
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::2/128 [0/0]
via FastEthernet0/0, receive
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::2/128 [0/0]
via FastEthernet1/0, receive
S 2001:DB8:0:3::/64 [1/0]
via 2001:DB8:0:2::1
L FF00::/8 [0/0]
via Null0, receive
R3#sh ipv6 route
IPv6 Routing Table - default - 7 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2, l - LISP
S 2001:DB8::/64 [1/0]
via 2001:DB8:0:2::2
S 2001:DB8:0:1::/64 [1/0]
via 2001:DB8:0:2::2
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::1/128 [0/0]
via FastEthernet1/0, receive
C 2001:DB8:0:3::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8:0:3::1/128 [0/0]
via FastEthernet2/0, receive
L FF00::/8 [0/0]
via Null0, receive
20) Verify PC1 can now ping PC2 by its IPv6 address.
PC1#ping 2001:DB8:0:3:C805:CFF:FE28:0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8:0:3:C805:CFF:FE28:0,
timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 80/80/84
ms
21) Cleanup: Remove the static IPv6 routes on R1, R2 and R3.
22) Verify there are only connected and local routes in R1, R2 and R3s IPv6 routing
tables.
OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2, l - LISP
C 2001:DB8::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8::1/128 [0/0]
via FastEthernet2/0, receive
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::1/128 [0/0]
via FastEthernet0/0, receive
L FF00::/8 [0/0]
via Null0, receive
R2#sh ipv6 route
! codes truncated
IPv6 Routing Table - default - 5 entries
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::2/128 [0/0]
via FastEthernet0/0, receive
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::2/128 [0/0]
via FastEthernet1/0, receive
L FF00::/8 [0/0]
via Null0, receive
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::1/128 [0/0]
via FastEthernet1/0, receive
C 2001:DB8:0:3::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8:0:3::1/128 [0/0]
via FastEthernet2/0, receive
L FF00::/8 [0/0]
via Null0, receive
OSPFv2 Configuration
23) Enable a loopback interface on R1, R2 and R3. Use the IPv4 address
192.168.0.x/32, where x is the router number. For example 192.168.0.3/32 on R3.
R1(config)#int loop 0
R1(config-if)#ip add 192.168.0.1 255.255.255.255
R2(config)#int loop 0
R2(config-if)#ip add 192.168.0.2 255.255.255.255
R3(config)#int loop 0
R3(config-if)#ip add 192.168.0.3 255.255.255.255
24) Enable single area OSPFv2 on every router. Ensure all networks are advertised.
R1(config)#router ospf 1
R1(config-router)#network 10.10.0.0 0.0.255.255 area 0
R1(config-router)#network 192.168.0.0 0.0.0.255 area 0
R2(config)#router ospf 1
R2(config-router)#network 10.10.0.0 0.0.255.255 area 0
R2(config-router)#network 192.168.0.0 0.0.0.255 area 0
R3(config)#router ospf 1
R3(config-router)#network 10.10.0.0 0.0.255.255 area 0
R3(config-router)#network 192.168.0.0 0.0.0.255 area 0
You can use different network statements, as long as they cover the range of IP addresses
configured on the router interfaces.
25) What do you expect the OSPF Router ID to be on R1? Verify this.
R1#sh ip protocols
*** IP Routing is NSF aware ***
26) Verify the routers have formed adjacencies with each other.
OSPF routes will be in the routing table for the loopback interfaces only, as they are not
being advertised by EIGRP. EIGRP and OSPF are both enabled for the 10.10.0.0/16
networks and EIGRP has a better administrative distance.
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
28) Configure IPv6 addresses on the existing loopback interfaces on R1, R2 and R3.
Use the address 2001:db8:1:x::1/64, where x is the router number. For example
2001:db8:1:3::1/64 on R3.
R1(config)#int loop 0
R1(config-if)#ipv6 add 2001:db8:1:1::1/64
R2(config)#int loop 0
R2(config-if)#ipv6 add 2001:db8:1:2::1/64
R3(config)#int loop 0
R3(config-if)#ipv6 add 2001:db8:1:3::1/64
29) Enable single area OSPFv3 on every router. Ensure all networks are advertised.
Configure the loopbacks as passive interfaces.
30) What do you expect the OSPF Router ID to be on R1? Verify this.
The Router ID is in the format of an IPv4 address (not an IPv6 address). The highest
loopback address is used by default, 192.168.0.1
33) Do you expect to see OSPF routes in R1, R2 and R3s IPv6 routing tables? Why or
why not? Verify this.
OSPF routes will be in the routing table for all IPv6 networks. EIGRP is configured for IPv4
but not for IPv6. (Note that OSPFv3 advertises loopback interfaces as /128 by default.)
C 2001:DB8::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8::1/128 [0/0]
via FastEthernet2/0, receive
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::1/128 [0/0]
via FastEthernet0/0, receive
O 2001:DB8:0:2::/64 [110/2]
via FE80::2, FastEthernet0/0
O 2001:DB8:0:3::/64 [110/3]
via FE80::2, FastEthernet0/0
C 2001:DB8:1:1::/64 [0/0]
via Loopback0, directly connected
L 2001:DB8:1:1::1/128 [0/0]
via Loopback0, receive
O 2001:DB8:1:2::1/128 [110/1]
via FE80::2, FastEthernet0/0
O 2001:DB8:1:3::1/128 [110/2]
via FE80::2, FastEthernet0/0
L FF00::/8 [0/0]
via Null0, receive
O 2001:DB8::/64 [110/2]
via FE80::1, FastEthernet0/0
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::2/128 [0/0]
via FastEthernet0/0, receive
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::2/128 [0/0]
via FastEthernet1/0, receive
O 2001:DB8:0:3::/64 [110/2]
via FE80::3, FastEthernet1/0
O 2001:DB8:1:1::1/128 [110/1]
via FE80::1, FastEthernet0/0
C 2001:DB8:1:2::/64 [0/0]
via Loopback0, directly connected
L 2001:DB8:1:2::1/128 [0/0]
via Loopback0, receive
O 2001:DB8:1:3::1/128 [110/1]
via FE80::3, FastEthernet1/0
L FF00::/8 [0/0]
via Null0, receive
R3#sh ipv6 route
IPv6 Routing Table - default - 11 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2, l - LISP
O 2001:DB8::/64 [110/3]
via FE80::2, FastEthernet1/0
O 2001:DB8:0:1::/64 [110/2]
via FE80::2, FastEthernet1/0
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::1/128 [0/0]
via FastEthernet1/0, receive
C 2001:DB8:0:3::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8:0:3::1/128 [0/0]
via FastEthernet2/0, receive
O 2001:DB8:1:1::1/128 [110/2]
via FE80::2, FastEthernet1/0
O 2001:DB8:1:2::1/128 [110/1]
via FE80::2, FastEthernet1/0
C 2001:DB8:1:3::/64 [0/0]
via Loopback0, directly connected
L 2001:DB8:1:3::1/128 [0/0]
via Loopback0, receive
L FF00::/8 [0/0]
via Null0, receive
34) Verify end to end connectivity by pinging PC2 from PC1.
PC1#ping 2001:DB8:0:3:C805:CFF:FE28:0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8:0:3:C805:CFF:FE28:0,
timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 72/78/80
ms
PC1#traceroute 2001:DB8:0:3:C805:CFF:FE28:0
Type escape sequence to abort.
Tracing the route to 2001:DB8:0:3:C805:CFF:FE28:0
36) Enable EIGRP for IPv6 using AS 100 on every router. Ensure all networks are
advertised. Configure the loopbacks as passive interfaces.
As with OSPFv3, the Router ID is in the format of an IPv4 address (not an IPv6 address).
The highest loopback address is used by default, 192.168.0.1
Interfaces:
FastEthernet0/0
FastEthernet2/0
Loopback0 (passive)
38) Manually set the Router ID on R1 to be the highest loopback address.
39) Verify the routers have formed adjacencies with each other.
FE80::3
FE80::1
40) Do you expect EIGRP routes to be in the routers IPv6 routing tables? Why or why
not? Verify this.
The routes learned via EIGRP will replace the OSPF routes as they have a better
Administrative Distance. (Note that OSPFv3 advertises loopback interfaces as /128 by
default. These routes will main in the routing table as they have a longer prefix match than
the /64 learned via EIGRP)
OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2, l - LISP
C 2001:DB8::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8::1/128 [0/0]
via FastEthernet2/0, receive
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::1/128 [0/0]
via FastEthernet0/0, receive
D 2001:DB8:0:2::/64 [90/30720]
via FE80::2, FastEthernet0/0
D 2001:DB8:0:3::/64 [90/33280]
via FE80::2, FastEthernet0/0
C 2001:DB8:1:1::/64 [0/0]
via Loopback0, directly connected
L 2001:DB8:1:1::1/128 [0/0]
via Loopback0, receive
D 2001:DB8:1:2::/64 [90/156160]
via FE80::2, FastEthernet0/0
O 2001:DB8:1:2::1/128 [110/1]
via FE80::2, FastEthernet0/0
D 2001:DB8:1:3::/64 [90/158720]
via FE80::2, FastEthernet0/0
O 2001:DB8:1:3::1/128 [110/2]
via FE80::2, FastEthernet0/0
L FF00::/8 [0/0]
via Null0, receive
OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2, l - LISP
D 2001:DB8::/64 [90/30720]
via FE80::1, FastEthernet0/0
C 2001:DB8:0:1::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:DB8:0:1::2/128 [0/0]
via FastEthernet0/0, receive
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::2/128 [0/0]
via FastEthernet1/0, receive
D 2001:DB8:0:3::/64 [90/30720]
via FE80::3, FastEthernet1/0
D 2001:DB8:1:1::/64 [90/156160]
via FE80::1, FastEthernet0/0
O 2001:DB8:1:1::1/128 [110/1]
via FE80::1, FastEthernet0/0
C 2001:DB8:1:2::/64 [0/0]
via Loopback0, directly connected
L 2001:DB8:1:2::1/128 [0/0]
via Loopback0, receive
D 2001:DB8:1:3::/64 [90/156160]
via FE80::3, FastEthernet1/0
O 2001:DB8:1:3::1/128 [110/1]
via FE80::3, FastEthernet1/0
L FF00::/8 [0/0]
via Null0, receive
OE2 - OSPF ext 2, ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2, l - LISP
D 2001:DB8::/64 [90/33280]
via FE80::2, FastEthernet1/0
D 2001:DB8:0:1::/64 [90/30720]
via FE80::2, FastEthernet1/0
C 2001:DB8:0:2::/64 [0/0]
via FastEthernet1/0, directly connected
L 2001:DB8:0:2::1/128 [0/0]
via FastEthernet1/0, receive
C 2001:DB8:0:3::/64 [0/0]
via FastEthernet2/0, directly connected
L 2001:DB8:0:3::1/128 [0/0]
via FastEthernet2/0, receive
D 2001:DB8:1:1::/64 [90/158720]
via FE80::2, FastEthernet1/0
O 2001:DB8:1:1::1/128 [110/2]
via FE80::2, FastEthernet1/0
D 2001:DB8:1:2::/64 [90/156160]
via FE80::2, FastEthernet1/0
O 2001:DB8:1:2::1/128 [110/1]
via FE80::2, FastEthernet1/0
C 2001:DB8:1:3::/64 [0/0]
via Loopback0, directly connected
L 2001:DB8:1:3::1/128 [0/0]
via Loopback0, receive
L FF00::/8 [0/0]
via Null0, receive
PC1#ping 2001:DB8:0:3:C805:CFF:FE28:0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001:DB8:0:3:C805:CFF:FE28:0,
timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 72/78/80
ms
33-1 WAN Configuration Lab Exercise
In this lab you will configure Wide Area Network connectivity for a company with offices in
New York and Boston.
You will configure PPP with PAP authentication for a single leased line in New York site 1.
You will configure MultiLink PPP with CHAP authentication for New York site 2.
You will configure PPPoE for the DSL connection in the Boston office.
Finally you will configure a GRE tunnel between New York site 1 and Boston.
The SP1 and SP2 routers have already been configured at the service provider.
Lab Topology
Download the 33-1 WAN Configuration.gns3project file here. Open in GNS3 to load the lab.
Host Setup
1) Configure the IP address and default gateway on PC1, PC2 and Ext_S1 as shown:
2) Configure the leased line from router NY-CPE1 to the service provider router SP1
according to the network topology diagram.
Interface Serial 4/0 is used on both sides of the link.
The service provider has instructed you to configure PPP with PAP authentication
using the username NY1 and password Flackbox.
Configure one way authentication, do not authenticate the service provider.
Configure a bandwidth of 128kbps.
5) Configure a default static route for Internet access over the leased line.
6) Ping the external server at 203.0.113.18 from NY-CPE1 to verify Internet access.
7) Do you expect PC1 to be able to ping the external server at 203.0.113.18? Why or
why not? Verify this.
MultiLink PPP with CHAP Authentication
8) Configure a MultiLink PPP leased line from router BOS-CPE to the service provider
router SP2 according to the network topology diagram.
Interfaces Serial 4/0 and 4/1 are used on both sides of the link.
The service provider has instructed you to configure PPP with two way CHAP
authentication using the password Flackbox2. The service provider routers
hostname is SP2.
Configure a bandwidth of 256kbps.
11) Configure a default static route for Internet access over the leased line.
12) Ping the external server at 203.0.113.18 from NY-CPE2 to verify Internet access.
PPPoE
13) Configure PPPoE from router BOS-CPE to the service provider router SP2
according to the network topology diagram.
Interface FastEthernet 0/0 is used on both sides of the link.
The service provider has instructed you to configure PPP with CHAP authentication
using the password Flackbox3.
Configure one way authentication, do not authenticate the service provider.
17) Ping the external server at 203.0.113.18 from BOS-CPE to verify Internet access.
GRE
18) Configure a GRE tunnel between NY-CPE1 and BOS-CPE. Use IP addresses in the
192.168.0.0/30 subnet for the tunnel interfaces.
19) The tunnel interfaces will be up as long as the underlying physical interfaces are up.
Verify the tunnel setup and connectivity by pinging the tunnel interface on BOS-CPE
from NY-CPE1.
20) Do you expect PC1 in New York to be able to ping PC2 in Boston? Why or why not?
Verify this.
21) Verify the tunnel interface appears in the routing tables on NY-CPE1 and BOS-CPE.
22) Enable single area OSPF on NY-CPE1 and BOS-CPE. Ensure that the PCs in New
York site 1 and Boston have connectivity to each other. Do not enable OSPF on the
Internet facing FastEthernet 0/0 interface.
23) Ping PC2 from PC1 to verify connectivity through the GRE tunnel.
33-1 WAN Configuration - Answer Key
In this lab you will configure Wide Area Network connectivity for a company with offices in
New York and Boston.
You will configure PPP with PAP authentication for a single leased line in New York site 1.
You will configure MultiLink PPP with CHAP authentication for New York site 2.
You will configure PPPoE for the DSL connection in the Boston office.
Finally you will configure a GRE tunnel between New York site 1 and Boston.
The SP1 and SP2 routers have already been configured at the service provider.
Host Setup
1) Configure the IP address and default gateway on PC1, PC2 and Ext_S1 as shown:
2) Configure the leased line from router NY-CPE1 to the service provider router SP1
according to the network topology diagram.
Interface Serial 4/0 is used on both sides of the link.
The service provider has instructed you to configure PPP with PAP authentication
using the username NY1 and password Flackbox.
Configure one way authentication, do not authenticate the service provider.
Configure a bandwidth of 128kbps.
NY-CPE1(config)#int s4/0
NY-CPE1(config-if)#ip add 203.0.113.2 255.255.255.252
NY-CPE1(config-if)#encapsulation ppp
NY-CPE1(config-if)#ppp pap sent-username NY1 password Flackbox
NY-CPE1(config-if)#bandwidth 128
NY-CPE1(config-if)#no shutdown
NY-CPE1#ping 203.0.113.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 203.0.113.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 48/52/56
ms
5) Configure a default static route for Internet access over the leased line.
6) Ping the external server at 203.0.113.18 from NY-CPE1 to verify Internet access.
NY-CPE1#ping 203.0.113.18
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 203.0.113.18, timeout is 2
seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max =
72/157/404 ms
7) Do you expect PC1 to be able to ping the external server at 203.0.113.18? Why or
why not? Verify this.
PC1 is using a private IP address and NAT has not been configured so it will not be able to
ping the external server.
At this point we would normally configure NAT to allow Internet connectivity from the PCs in
New York site 1 (and also configure security) but it is not required in this lab.
MultiLink PPP with CHAP Authentication
8) Configure a MultiLink PPP leased line from router BOS-CPE to the service provider
router SP2 according to the network topology diagram.
Interfaces Serial 4/0 and 4/1 are used on both sides of the link.
The service provider has instructed you to configure PPP with two way CHAP
authentication using the password Flackbox2. The service provider routers
hostname is SP2.
Configure a bandwidth of 256kbps.
BOS-CPE(config)#interface multilink 1
BOS-CPE(config-if)#ip address 203.0.113.10 255.255.255.252
BOS-CPE(config-if)#ppp multilink
BOS-CPE(config-if)#ppp multilink group 1
BOS-CPE(config-if)#ppp authentication chap
BOS-CPE(config-if)#bandwidth 256
BOS-CPE(config-if)#exit
BOS-CPE#ping 203.0.113.9
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 203.0.113.9, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 48/52/60
ms
11) Configure a default static route for Internet access over the leased line.
12) Ping the external server at 203.0.113.18 from NY-CPE2 to verify Internet access.
BOS-CPE#ping 203.0.113.18
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 203.0.113.18, timeout is 2
seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max =
52/139/388 ms
PPPoE
13) Configure PPPoE from router BOS-CPE to the service provider router SP2
according to the network topology diagram.
Interface FastEthernet 0/0 is used on both sides of the link.
The service provider has instructed you to configure PPP with CHAP authentication
using the password Flackbox3.
Configure one way authentication, do not authenticate the service provider.
NY-CPE2(config)#interface dialer1
NY-CPE2(config-if)#dialer pool 1
NY-CPE2(config-if)#encapsulation ppp
NY-CPE2(config-if)#ip address negotiated
NY-CPE2(config-if)#ppp chap password Flackbox3
NY-CPE2(config)#interface f0/0
NY-CPE2(config-if)#no ip address
NY-CPE2(config-if)#pppoe-client dial-pool-number 1
NY-CPE2(config-if)#no shutdown
NY-CPE2#ping 203.0.113.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 203.0.113.5, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 48/54/68
ms
17) Ping the external server at 203.0.113.18 from BOS-CPE to verify Internet access.
NY-CPE2#ping 203.0.113.18
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 203.0.113.18, timeout is 2
seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max =
52/178/512 ms
GRE
18) Configure a GRE tunnel between NY-CPE1 and BOS-CPE. Use IP addresses in the
192.168.0.0/30 subnet for the tunnel interfaces.
NY-CPE1(config)#interface Tunnel1
NY-CPE1(config-if)#ip address 192.168.0.1 255.255.255.252
NY-CPE1(config-if)#tunnel source 203.0.113.2
NY-CPE1(config-if)#tunnel destination 203.0.113.10
BOS-CPE(config)#interface Tunnel1
BOS-CPE(config-if)#ip address 192.168.0.2 255.255.255.252
BOS-CPE(config-if)#tunnel source 203.0.113.10
BOS-CPE(config-if)#tunnel destination 203.0.113.2
19) The tunnel interfaces will be up as long as the underlying physical interfaces are up.
Verify the tunnel setup and connectivity by pinging the tunnel interface on BOS-CPE
from NY-CPE1.
NY-CPE1#ping 192.168.0.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.0.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max =
80/89/104 ms
20) Do you expect PC1 in New York to be able to ping PC2 in Boston? Why or why not?
Verify this.
PC1 will not be able to ping PC2. The GRE tunnel is up but routing has not been
configured to send any traffic over the tunnel.
NY-CPE1#sh ip route
! Codes truncated
BOS-CPE#sh ip route
! Codes truncated
NY-CPE1(config)#router ospf 1
NY-CPE1(config-router)#network 10.0.0.0 0.0.255.255 area 0
NY-CPE1(config-router)#network 192.168.0.0 0.0.0.3 area 0
BOS-CPE(config)#router ospf 1
BOS-CPE(config-router)#network 10.0.0.0 0.0.255.255 area 0
BOS-CPE(config-router)#network 192.168.0.0 0.0.0.3 area 0
You can use different wildcard masks in the network statements as long as the
FastEthernet1/0 and Tunnel1 interfaces are matched.
23) Ping PC2 from PC1 to verify connectivity through the GRE tunnel.
The MPLS Layer 3 VPN has already been provisioned on the service providers routers.
Your task is to configure the customer CE routers.
Lab Topology
Download the 34-1 BGP Configuration.gns3project file here. Open in GNS3 to load the lab.
You can learn the theory for this section and shortcut your path to CCNA certification by
getting my CCNA Complete course. Get the course for only $10 USD (thats a massive 97%
discount) with this link:
https://www.udemy.com/ccna-complete/?couponCode=DISCOUNTCEB
Host Setup
1) Configure the IP address and default gateway on PC1 and PC2 as shown:
PC1> ip 10.0.0.10/24 10.0.0.1
eBGP Configuration
2) Verify IP addresses have already been configured on the CEs inside LAN interfaces.
5) Configure eBGP sessions on the CE routers. Use BGP AS 65001. The service
provider AS is 65000. Advertise the internal 10.0.x.x networks in BGP.
6) Verify the BGP sessions with the PE routers are established successfully.
7) On NY-CE, verify the 10.0.1.0/24 network in Boston has been learned via BGP and is
in the BGP table. (Note the service provider router has been configured to also
advertise the 192.168.0.4/30 network in Boston).
8) On BOS-CE, verify the 10.0.0.0/24 network in New York has been learned via BGP
and is in the BGP table. (Note the service provider router has been configured to also
advertise the 192.168.0.0/30 network in New York).
9) Verify NY-CE has routes to the 10.0.1.0/24 and 192.168.0.4/30 networks in Boston in
its routing table, with PE1 as the next hop.
10) Verify BOS-CE has routes to the 10.0.0.0/24 and 192.168.0.0/30 networks in New
York in its routing table, with PE2 as the next hop.
The WAN connectivity will be provided via a service providers MPLS Layer 3 VPN service.
eBGP will be used as the CE-PE routing protocol.
The MPLS Layer 3 VPN has already been provisioned on the service providers routers.
Your task is to configure the customer CE routers.
Host Setup
1) Configure the IP address and default gateway on PC1 and PC2 as shown:
eBGP Configuration
2) Verify IP addresses have already been configured on the CEs inside LAN interfaces.
BOS-CE(config)#int f0/0
BOS-CE(config-if)#ip address 192.168.0.6 255.255.255.252
BOS-CE(config-if)#no shutdown
NY-CE#ping 192.168.0.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 44/52/68
ms
BOS-CE#ping 192.168.0.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.0.5, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 44/48/56
ms
5) Configure eBGP sessions on the CE routers. Use BGP AS 65001. The service
provider AS is 65000. Advertise the internal 10.0.x.x networks in BGP.
Ensure you use the correct /24 subnet masks when entering the network statements. BGP
will not advertise a route unless an exact match is found in the routing table.
6) Verify the BGP sessions with the PE routers are established successfully.
7) On NY-CE, verify the 10.0.1.0/24 network in Boston has been learned via BGP and is
in the BGP table. (Note the service provider router has been configured to also
advertise the 192.168.0.4/30 network in Boston).
NY-CE#show bgp
BGP table version is 5, local router ID is 10.0.0.1
BOS-CE#show bgp
BGP table version is 5, local router ID is 10.0.1.1
9) Verify NY-CE has routes to the 10.0.1.0/24 and 192.168.0.4/30 networks in Boston in
its routing table, with PE1 as the next hop.
NY-CE#show ip route
! Codes truncated
BOS-CE#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
Lab Topology
Download the 35-1 Cisco Device Security Configuration.pkt file here. Open in Packet
Tracer to load the lab.
Secure Privileged Exec Mode
6) Do you expect to be able to enter Privileged Exec mode using the password
Flackbox2? Why or why not? Verify this.
7) Show the running configuration on R1. Can you read the enable password and secret
in plain text?
8) Ensure that passwords will not show in plain text in the output of show commands.
9) Verify the enable password is now encrypted when you show the running
configuration.
10) Enable synchronous logging on R1 and ensure administrators are logged out after
15 minutes of activity on the console and virtual terminal lines 0-15.
11) Allow the administrator workstation at 10.0.0.10 to Telnet into R1 using the
password Flackbox3. Ensure no other host has Telnet access to the router.
12) Ensure that users attempting to Telnet into the router see the message Authorised
users only
13) Verify you can Telnet into R1 from PC1 and enter Privileged Exec mode. Close the
Telnet session when done.
16) Verify you are prompted for a username and password when you attempt to Telnet
to the router.
17) Allow the administrator workstation at 10.0.0.10 to SSH into R1. Use the domain
name flackbox.com and a 768 bit key.
18) Verify you can SSH into R1 from PC1. Close the session when done.
19) Do you expect to be able to SSH to R1 from PC2? Why or why not? Verify this.
20) You can currently access R1 using either Telnet or SSH. Telnet is an insecure
protocol as all communication is sent in plain text. Configure R1 so that only SSHv2
remote access is allowed.
21) Verify you cannot Telnet into R1 from PC1 but can SSH. Exit when done.
22) What username and password do you need to use to login when you connect
directly to R1 with a console cable?
23) Configure R1 to require no username but a password of Flackbox5 to login over the
console connection.
24) Verify you can access R1 over the console connection and enter Privileged Exec
mode.
25) Configure R1 to synchronise its time with the NTP server at 10.0.1.100. Set the
timezone as Pacific Standard Time which is 8 hours before UTC.
26) Check the current time on the router and verify it is synchronised with the NTP
server.
Switch Management
27) Configure SW2 with IP address 10.0.1.50 for management on VLAN 1. Ensure the
switch has connectivity to other IP subnets.
(Note that it is best practice to NOT use VLAN 1 for any production traffic in a real
world network and we would normally have a separate dedicated IP subnet for
management traffic. We are using VLAN 1 in our lab environment to simplify the
topology)
35-1 Cisco Device Security Configuration - Answer Key
In this lab you will secure administrative access to the Cisco router in a small campus
network.
R1#exit
R1>enable
Password:Flackbox2
R1#
6) Do you expect to be able to enter Privileged Exec mode using the password
Flackbox2? Why or why not? Verify this.
You cannot enter Privileged Exec mode using the enable password because it has been
superseded by the enable secret.
R1>enable
Password:Flackbox2
Password:Flackbox1
R1#
7) Show the running configuration on R1. Can you read the enable password and secret
in plain text?
The enable password is shown in plain text but the enable secret is encrypted.
R1#show run
Building configuration...
8) Ensure that passwords will not show in plain text in the output of show commands.
R1(config)#service password-encryption
9) Verify the enable password is now encrypted when you show the running
configuration.
R1#show running-config
Building configuration...
10) Enable synchronous logging on R1 and ensure administrators are logged out after
15 minutes of activity on the console and virtual terminal lines 0-15.
R1(config)#line console 0
R1(config-line)#logging synchronous
R1(config-line)#exec-timeout 15
R1(config)#line vty 0 15
R1(config-line)#logging synchronous
R1(config-line)#exec-timeout 15
11) Allow the administrator workstation at 10.0.0.10 to Telnet into R1 using the
password Flackbox3. Ensure no other host has Telnet access to the router.
R1(config)#line vty 0 15
R1(config-line)#login
R1(config-line)#password Flackbox3
R1(config-line)#access-class 1 in
12) Ensure that users attempting to Telnet into the router see the message Authorised
users only
13) Verify you can Telnet into R1 from PC1 and enter Privileged Exec mode. Close the
Telnet session when done.
Password: Flackbox3
R1>enable
Password: Flackbox1
R1#exit
16) Verify you are prompted for a username and password when you attempt to Telnet
to the router.
Username: admin
Password: Flackbox4
R1>exit
18) Verify you can SSH into R1 from PC1. Close the session when done.
19) Do you expect to be able to SSH to R1 from PC2? Why or why not? Verify this.
You will not be able to SSH to R1 from PC2. Telnet and SSH access are both controlled by
the line vty configuration which has an access list applied only allowing access from PC1.
20) You can currently access R1 using either Telnet or SSH. Telnet is an insecure
protocol as all communication is sent in plain text. Configure R1 so that only SSHv2
remote access is allowed.
R1(config)#line vty 0 15
R1(config-line)#transport input ssh
R1(config-line)#exit
R1(config)#ip ssh version 2
21) Verify you cannot Telnet into R1 from PC1 but can SSH. Exit when done.
22) What username and password do you need to use to login when you connect
directly to R1 with a console cable?
No username and password are currently required to login to the console. The virtual
terminal lines which control Telnet and SSH access have been secured but console access
not.
23) Configure R1 to require no username but a password of Flackbox5 to login over the
console connection.
R1(config)#line console 0
R1(config-line)#login
% Login disabled on line 0, until 'password' is set
R1(config-line)#password Flackbox5
24) Verify you can access R1 over the console connection and enter Privileged Exec
mode.
R1(config-line)#end
R1#logout
25) Configure R1 to synchronise its time with the NTP server at 10.0.1.100. Set the
timezone as Pacific Standard Time which is 8 hours before UTC.
26) Check the current time on the router and verify it is synchronised with the NTP
server.
R1#show clock
16:19:36.51 PST Mon Oct 2 2017
Switch Management
27) Configure SW2 with IP address 10.0.1.50 for management on VLAN 1. Ensure the
switch has connectivity to other IP subnets.
(Note that it is best practice to NOT use VLAN 1 for any production traffic in a real
world network and we would normally have a separate dedicated IP subnet for
management traffic. We are using VLAN 1 in our lab environment to simplify the
topology).
SW2(config)#int vlan 1
SW2(config-if)#ip address 10.0.1.50 255.255.255.0
SW2(config-if)#no shutdown
SW2(config-if)#exit
SW2(config)#ip default-gateway 10.0.1.1
36 Network Device Management Lab Exercise
You will configure Syslog and SNMP (Simple Network Management Protocol) logging in this
lab exercise. The NMS server is acting as an external Syslog and SNMP destination (note
the server has not actually been configured as a Syslog or SNMP server.)
Lab Topology
Download the 36 Network Device Management.gns3project file here. Open in GNS3 to load
the lab.
Syslog
1) Configure R1 so it will show emergency, alerts and critical severity events when you
are connected with a console cable.
2) Configure R1 so it will show emergency, alerts, critical and error severity level events
when you are logged in with an SSH session.
3) Configure R1 so it will show events from all severity levels when you issue the show
logging command.
4) If you shut down interface FastEthernet 0/0 then bring it back up again do you expect
to see logging messages in your console session? Why or why not? Verify this.
5) If you shut down interface FastEthernet 0/0 then bring it back up again do you expect
to see messages in the logging buffer? Why or why not? Verify this.
6) Configure R1 so it will show events from all severity levels to the external Syslog
server at 10.0.0.100.
7) Verify you have set the correct severity level for the different logging locations.
8) Configure R1 to use your email address as the SNMP contact. Use Flackbox Lab as
the SNMP location.
9) Configure SNMP on R1. Use Flackbox1 as the Read Only community string, and
Flackbox2 as the Read Write community string.
10) Configure R1 to send SNMP traps to the server at 10.0.0.100 when there is a
configuration change on the router. Use the community string Flackbox3.
11) Shut down then bring back up the FastEthernet 0/0 interface. Verify an SNMP trap is
sent to 10.0.0.100.
36 Network Device Management Answer Key
You will configure Syslog and SNMP (Simple Network Management Protocol) logging in this
lab exercise. The NMS server is acting as an external Syslog and SNMP destination (note
the server has not actually been configured as a Syslog or SNMP server.)
Syslog
1) Configure R1 so it will show emergency, alerts and critical severity events when you
are connected with a console cable.
You can use the descriptive name or numerical level when configuring logging levels.
2) Configure R1 so it will show emergency, alerts, critical and error severity level events
when you are logged in with an SSH session.
3) Configure R1 so it will show events from all severity levels when you issue the show
logging command.
4) If you shut down interface FastEthernet 0/0 then bring it back up again do you expect
to see logging messages in your console session? Why or why not? Verify this.
You will not see log messages because you are logging critical and more severe level
messages to the console. Shutting down and bringing up an interface is informational
severity.
R1(config)#int f0/0
R1(config-if)#shutdown
R1(config-if)#no shutdown
5) If you shut down interface FastEthernet 0/0 then bring it back up again do you expect
to see messages in the logging buffer? Why or why not? Verify this.
You will see messages because you have enabled debugging severity level to send all
severity level messages to the logging buffer.
R1#show logging
Syslog logging: enabled (0 messages dropped, 0 messages rate-
limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)
6) Configure R1 so it will show events from all severity levels to the external Syslog
server at 10.0.0.100.
R1(config)#logging 10.0.0.100
R1(config)#logging trap debugging
7) Verify you have set the correct severity level for the different logging locations.
R1#show logging
Syslog logging: enabled (0 messages dropped, 0 messages rate-
limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)
8) Configure R1 to use your email address as the SNMP contact. Use Flackbox Lab as
the SNMP location.
9) Configure SNMP on R1. Use Flackbox1 as the Read Only community string, and
Flackbox2 as the Read Write community string.
10) Configure R1 to send SNMP traps to the server at 10.0.0.100 when there is a
configuration change on the router. Use the community string Flackbox3.
11) Shut down then bring back up the FastEthernet 0/0 interface. Verify an SNMP trap is
sent to 10.0.0.100.
R1(config)#int f0/0
R1(config-if)#shutdown
R1(config-if)#no shutdown
R1#show snmp
Chassis: 4279256517
Contact: neil@flackbox.com
Location: Flackbox Lab
0 SNMP packets input
0 Bad SNMP version errors
0 Unknown community name
0 Illegal operation for community name supplied
0 Encoding errors
0 Number of requested variables
0 Number of altered variables
0 Get-request PDUs
0 Get-next PDUs
0 Set-request PDUs
0 Input queue packet drops (Maximum queue size 1000)
4 SNMP packets output
0 Too big errors (Maximum packet size 1500)
0 No such name errors
0 Bad values errors
0 General errors
0 Response PDUs
4 Trap PDUs
I suggest speaking to your manager at work to expense the cost. This training will
significantly boost your value to the business, and any manager Ive ever worked for would
agree to pay $10 for this quality of training in a heartbeat. This investment in you is a no
brainer for your company.
Anyone who wants to pass the Cisco CCNA Routing and Switching 200-125 exam
and start or improve a career in networking.
IT helpdesk engineers who are interested in careers such as network engineers,
network administrators, systems administrators, or solution architects. This course
can help start your career journey into these fields.
Network engineers who are not Cisco CCNA certified or who have an expired
certification. Even if youre an experienced professional, youll fill gaps in your
knowledge and master concepts like IPv6, EIGRP, OSPF, and BGP in this course.
IT professionals who want a comprehensive resource on Cisco networking theory,
configuration and troubleshooting.