Lab Manual For CCNP
Lab Manual For CCNP
Lab Manual For CCNP
LAB MANUAL
ROUTING
Module 1 – EIGRP
EIGRP LABS INDEX
R1 R2
E0 S 0/2/0 S0 E0
R1
R2
Lab Objective:
Task 1
R1 R2
Verification :
R1#show ip route
R1 R2
R3
E0 S0 S1 S0
S0/2
E0
E0
R1
R2
R3
Task 1
Configure EIGRP according to the above scenario. Configure R1 ( S0, E0 ), R2 ( S1, S0,
E0 ) in EIGRP AS 100 and R3 ( S0/2 ) in EIGRP AS 200. Do not advertise network
30.0.0.0 in EIGRP process. R1 wants to send packets to network 30.0.0.0. Use the Ip
default-network command to accomplish this task. Also disable auto-summary.
R1 R2
R3
Verification :
R1#show ip route
The output displays network 2.0.0.0 as a D* route in the routing table as this is candidate
default-route established in R1 to reach network 30.0.0.0.
R1 # ping 30.1.1.1
Result: 100% success
Lab 3 – Route Summarization with EIGRP
R1 R2
R3
E0 S0/2/0 S1 S0 Loopback 1-8
S0/2
E0 E0
R1
R2
R3
Task 1
Configure the following Loopback Interfaces on R3 and advertise them under EIGRP:
Loopback 1: 172.168.0.1/24
Loopback 2: 172.168.1.1/24
Loopback 3: 172.168.2.1/24
Loopback 4: 172.168.3.1/24
Loopback 5: 172.168.4.1/24
Loopback 6: 172.168.5.1/24
Loopback 7: 172.168.6.1/24
Loopback 8: 172.168.7.1/24
R3
Interface loopback 1
Ip address 172.168.0.1 255.255.255.0
Interface loopback 2
Ip address 172.168.1.1 255.255.255.0
Interface loopback 3
Ip address 172.168.2.1 255.255.255.0
Interface loopback 4
Ip address 172.168.3.1 255.255.255.0
Interface loopback 5
Ip address 172.168.4.1 255.255.255.0
Interface loopback 6
Ip address 172.168.5.1 255.255.255.0
Interface loopback 7
Ip address 172.168.6.1 255.255.255.0
Interface loopback 8
Ip address 172.168.7.1 255.255.255.0
Configure EIGRP on R1 and R2. Advertise the directly connected networks in EIGRP in
AS 100. Disable auto-summary. Also configure route summarization so that only one
summary route is advertised to R1.
R1 R2
Int s0
Ip summary-address eigrp 100 172.168.0.0
255.255.248.0
Verification :
R1#show ip route
C 1.0.0.0/8 is directly connected, Serial0/2/0
D 2.0.0.0/8 [90/2681856] via 1.1.1.2, 00:00:02, Serial0/2/0
D 20.0.0.0/8 [90/2195456] via 1.1.1.2, 00:00:02, Serial0/2/0
172.168.0.0/21 is subnetted, 1 subnets
D 172.168.0.0 [90/2809856] via 1.1.1.2, 00:00:02, Serial0/2/0
C 10.0.0.0/8 is directly connected, FastEthernet0/0
D 30.0.0.0/8 [90/2707456] via 1.1.1.2, 00:00:02, Serial0/2/0
R2#show ip route
C 1.0.0.0/8 is directly connected, Serial0
C 2.0.0.0/8 is directly connected, Serial1
C 20.0.0.0/8 is directly connected, Ethernet0
172.168.0.0/16 is variably subnetted, 9 subnets, 2 masks
D 172.168.4.0/24 [90/2297856] via 2.2.2.2, 00:07:13, Serial1
D 172.168.5.0/24 [90/2297856] via 2.2.2.2, 00:07:08, Serial1
D 172.168.6.0/24 [90/2297856] via 2.2.2.2, 00:07:04, Serial1
D 172.168.7.0/24 [90/2297856] via 2.2.2.2, 00:06:56, Serial1
D 172.168.0.0/24 [90/2297856] via 2.2.2.2, 00:06:49, Serial1
D 172.168.0.0/21 is a summary, 00:01:24, Null0
D 172.168.1.0/24 [90/2297856] via 2.2.2.2, 00:07:33, Serial1
D 172.168.2.0/24 [90/2297856] via 2.2.2.2, 00:07:25, Serial1
D 172.168.3.0/24 [90/2297856] via 2.2.2.2, 00:07:18, Serial1
D 10.0.0.0/8 [90/2172416] via 1.1.1.1, 00:01:30, Serial0
D 30.0.0.0/8 [90/2195456] via 2.2.2.2, 00:08:03, Serial1
With route summarization on R2 a summary route is created pointing to null 0
Lab 4 – Load balancing across Equal Cost Path
R1 R2
S0 S0
E0 E0
S1
S1
R2
R3
Lab Objective:
Task 1
Configure EIGRP AS 100 as per the above scenario and verify load balancing using the
traceroute command on R3 :
R2 R3
Verification :
R3#show ip route
R3#traceroute 20.1.1.1
1 1.1.1.1 32 msec
2.2.2.1 20 msec *
R3#traceroute 20.1.1.1
1 2.2.2.1 20 msec
1.1.1.1 28 msec *
Lab 5 – Load balancing across Unequal Cost
Path
(Scenario Based On Lab 4)
Interface IP Address Configuration
R2
R3
Task 1
Configure EIGRP AS 100 as per the above scenario. Make the links unequal cost paths
using the bandwidth command in interface mode and verify load balancing .
R1 R2
Interface S 0
Bandwidth 800
The variance multiplier set in the variance command when multiplied by the successor
FD, must be greater than the feasible successor FD. Thus the feasible successors whose
FD is less than the above calculated value are installed in the routing table.
Verification :
The output displays 2 routes installed in the topology table with 2 different costs.
R2#show ip route
R2#show ip route
R1 R2
E0 S1 S0 E0
R1
R2
Lab Objective:
Task 1
Configure MD5 authentication for the links. Use cisco123 as the key-string with a key-id
of 1.
R1 R2
Int S1 Int S 0
Ip authentication mode eigrp 100 md5 Ip authentication mode eigrp 100 md5
Ip authentication key-chain eigrp 100 chain1 Ip authentication key-chain eigrp 100 chain 2
Verification
With EIGRP Authentication:
R1 R2
R3
E0 S0 S1/0 S1 Loopback 0 - 3
S1/0
E 0/0 E0
R1
R2
R3
Task 1
Configure EIGRP AS 100 as per the above scenario on R1, R2 and R3. Disable auto-
summary. Only one summary route must be advertised to R2 and R1
R1 R2
Interface s 1/0
Ip summary-address eigrp 100 172.168.0.0
255.255.252.0
Verification :
R2#show ip route
The output displays directly connected routes, summary route and Eigrp routes.
Task 2 :
Configure Eigrp Stub on R3, preventing R3 to send any routes to R2, but R2 receives
routes from R1.
R3
Verification :
R2#show ip route
The output displays only network 10.0.0.0 (eigrp route) coming from R1 but no eigrp
routes from R3.
Task 3 :
Configure Eigrp Stub on R3, allowing R3 to send only connected routes to R2, but R2
receives any routes from R1.
R3
Verification :
R2#show ip route
Task 4 :
Configure Eigrp Stub on R3, allowing only summary routes from R3 to R2, but R2
receives any routes from R1.
R3
Verification :
R2#show ip route
The output displays only summary route from R3, and also all routes from R1.
Task 5 :
Configure Eigrp Stub on R3, allowing connected and summary routes from R3 to R2,
but R2 receives any routes from R1.
R3
Verification :
R2#show ip route
The output displays both connected and summary routes from R3 , as the command eigrp
stub defaults to ”eigrp stub connected summary”.
Task 6 :
R1 R2
R3
E0 S0 S1/0 S1/1 Loopback 0 - 3
S1/0
E0
E 0/0
FA0/0
FA 0/1
R4
R1
R2
R3
R4
Lab Objective :
Configure EIGRP in AS 100 on R1, R2, R3. Advertise only interface fa0/0 on R4 in
EIGRP AS 100. Configure static route in R3 to reach network 40.0.0.0 via 30.1.1.1.
Redistribute the static route in EIGRP AS 100.
R3
Verification :
R2#show ip route
C 2.0.0.0/8 is directly connected, Serial1/0
C 3.0.0.0/8 is directly connected, Serial1/1
C 20.0.0.0/8 is directly connected, Ethernet0/0
D EX 40.0.0.0/8 [170/256514560] via 3.3.3.2, Serial1/1
D 10.0.0.0/8 [90/20537600] via 2.2.2.1, Serial1/0
The output displays only directly connected of R1, R2 and redistributed static route from
R3, but blocking connected routes and summary routes from R3.
The output also displays the redistributed route as an external EIGRP route with AD
value of 170.
Lab 8– Redistribute EIGRP with RIPv2
R1 R2
R3
S0 S0 S1
S0
E0
E0 Loopback 0 E0
R1
R2
R3
Task 1
R2
Router rip
Version 2
Network 2.0.0.0
Network 40.0.0.0
No auto-summary
Redistribute eigrp 100 metric 10
Verification :
R1#show ip route
R2#show ip route
The output displays that RIP routes are advertised in R1 EIGRP AS 100 as ‘D EX’ routes.
EIGRP routes are advertised in RIP as ‘R’ routes.
Lab 9 – Redistributing EIGRP with OSPF
R1 R2
R3
S0 S0 S1
S0
E0
E0 E0
R1
R2
R3
Task 1 :
R1 R3
Router ospf 1
Router eigrp 100 Network 2.2.2.2 0.0.0.0 area 0
Network 1.0.0.0 Network 30.0.0.0 0.255.255.255 area 1
Network 10.0.0.0
No auto-summary
R2
Router ospf 1
Network 2.2.2.1 0.0.0.0 area 0
Network 20.0.0.0 0.255.255.255 area 0
Redistribute eigrp 100 metric 10 subnets
Verification :
R1#show ip route
R2#show ip route
R3#show ip route
R1 R2
E0 S0 S0 E0
R1
R2
Task 1 :
Configure EIGRP AS 100 and do not advertise network 10.0.0.0 and network 20.0.0.0
and redistribute network 10.0.0.0 and 20.0.0.0 into EIGRP.
R1 R2
Verification :
R1#show ip route
C 1.0.0.0/8 is directly connected, Serial0/2/0
D EX 20.0.0.0/8 [170/256514560] via 1.1.1.2, 00:00:40, Serial0/2/0
C 10.0.0.0/8 is directly connected, FastEthernet0/0
R2#show ip route
4. CONFIGURE STUB
6. CONFIGURE NSSA
R1 R2
R3
S0 S0 S1
S0
E0
E0 E0
R1
R2
R3
Lab Objective:
R1 R2
R3
Router ospf 1
Network 2.2.2.2 0.0.0.0 area 0
Network 30.0.0.0 0.255.255.255 area 0
Verification :
R1 # show ip route
The symbol indicated by a dash [-] represents that the neighbor is on the serial interface
and DR and BDR are not used on point-to-point interfaces.
R1 # show ip ospf
Configure OSPF in Area 0. Advertise all networks on all routers. Hard Code the Router-
id based on the following Loop back ip address:
R1 Loopback 0 6.6.6.6
R2 Loopback 0 7.7.7.7
R3 Loopback 0 8.8.8.8
R1 R2
R3
int loopback 0
ip address 8.8.8.8 255.255.255.255
Router ospf 1
Network 8.8.8.8 0.0.0.0 area 0
Verification :
This output displays that router-id chosen is 6.6.6.6 as it is the loopback address.
Repeat the same on router2 with loopback address as 7.7.7.7 and on router 3 with
loopback as 8.8.8.8 and verify using show ip OSPF command
Task 3
Configure OSPF in Area 0. Advertise all networks on all routers. Hard Code the Router-
id based on the following :
R1 3.3.3.3
R2 4.4.4.4
R3 5.5.5.5
R1 R2
Router ospf 1 Router ospf 1
Router-id 3.3.3.3 Router-id 4.4.4.4
Network 1.1.1.1 0.0.0.0 area 0 Network 1.1.1.2 0.0.0.0 area 0
Network 10.0.0.0 0.255.255.255 area 0 Network 2.2.2.1 0.0.0.0 area 0
Network 6.6.6.6 0.0.0.0 area 0 Network 20.0.0.0 0.255.255.255 area 0
Network 7.7.7.7 0.0.0.0 area 0
R3
Router ospf 1
Router-id 5.5.5.5
Network 2.2.2.2 0.0.0.0 area 0
Network 30.0.0.0 0.255.255.255 area 0
Network 8.8.8.8 0.0.0.0 area 0
Verification :-
R1#show ip ospf
This output displays that 3.3.3.3 router-id takes preference over physical and loopback
interface.
Lab 2 – Configuring OSPF in Multiple Areas
R1
R2
R3
Task 1
R1 R2
R3
Router ospf 1
Network 2.2.2.2 0.0.0.0 area2
Network 30.0.0.0 0.255.255.255 area2
Verification :
R1# show ip route
R2#show ip route
R3#show ip route
Task 2
Configure OSPF as per task 1 and manipulate the Hello-interval time on R1
R1
int s0
ip ospf hello-interval 5
Verification :
-------Nil------
There will be no neighbor relationship because of hello-interval mismatch.
This can be verified by using ‘debug ip ospf events’ command, where the output displays
a mismatch hello parameter statement.
*May 28 09:20:31.403: OSPF: Rcv hello from 20.1.1.1 area 0 from Serial0/2/0 1.1.
1.2
*May 28 09:20:31.403: OSPF: Mismatched hello parameters from 1.1.1.2
*May 28 09:20:31.403: OSPF: Dead R 40 C 20, Hello R 10 C 5
The output displays a mismatch hello parameter statement.
Lab 3 – Configuring ABR and ASBR
R1
R2
R3
Task 1
R1 R2
R1#show ip route
Note: If we want OE1 routes then the redistribute command should be configured using
metric-type
R2
Router ospf 1
Redistribute eigrp 100 metric-type 1 metric
10 subnets
.R1#show ip route
R1
R2
R3
Task 1
R1 R2
Router ospf 1
Network 2.2.2.2 0.0.0.0 area2
Network 30.0.0.0 0.255.255.255 area2
R2
Router eigrp100
Network 20.0.0.0
No auto-summary
Router ospf 1
Redistribute eigrp 100 metric 10 subnets
Verification :
R3#show ip route
The output displays inter-area routes (O IA) and OSPF external type 2
(O E2).
R2 R3
Router ospf 1 Router ospf 1
Area 1 stub Area 1 stub
R3#show ip route
The output displays default route and inter-area routes, both designated with (OIA) in the
routing table.
Default route is denoted as (O* IA).
Mar 1 03:12:42.491: OSPF: Rcv hello from 30.1.1.1 area 1 from Serial1 2.2.2.2
*Mar 1 03:12:42.491: OSPF: Hello from 2.2.2.2 with mismatched Stub/Transit area
option bit
R1
R2
R3
Task 1
R1 R2
R3
Router ospf 1
Network 2.2.2.2 0.0.0.0 area2
Network 30.0.0.0 0.255.255.255 area2
R2
Router eigrp100
Network 20.0.0.0
No auto-summary
Router ospf 1
Redistribute eigrp 100 metric 10 subnets
Verification :
R3#show ip route
The output displays inter-area (O IA) and external type 2 (O E2) routes.
Now, to block both the summary net link-states and type-5 external link-states, configure
Area 1 as total stub .
Task 3
R2 R3
R3#show ip route
Inter-area and external routes are not visible in the routing table, but they are accessible
via the inter-area default route (O * IA).
R1
R2
R3
Task 1
R1 R2
R3
Router ospf 1
Network 2.2.2.2 0.0.0.0 area2
R2
Router eigrp100
Network 20.0.0.0
No auto-summary
Router ospf 1
Redistribute eigrp 100 metric 10 subnets
R1 R3
Verification :
R3#show ip route
The OSPF database displays summary net link states, type-5 external net link states.
Now, configure NSSA on R2 & R3, where R3 acts as NSSA ASBR that generates type-7
LSA and R2 acts as NSSA ABR that converts the type-7 LSA into type-5 LSA, when it
leaves the NSSA area.
Task 4
R2 R3
R3#show ip route
The output displays ‘O N2’ and ‘O* N2’ routes in the routing table.
No Type-5 External Link States but allows Special Type-7 External Link State
R2#show ip route
R1#show ip route
R1
R2
R3
Task 1
R1 R2
R3
Router ospf 1
Network 2.2.2.2 0.0.0.0 area2
R2
Router eigrp100
Network 20.0.0.0
No auto-summary
Router ospf 1
Redistribute eigrp 100 metric 10 subnets
R1 R3
Verification :
R3#show ip route
The OSPF database displays summary net link states, type-5 external net link states.
Task 4 :
R2 R3
R3#show ip route
No Type-5 External Link States, no Type-3 Summary link but allows Special Type-7
External Link State .
E0 E0
R1
R2
R3
Loopback 0 – 172.168.0.1/24
Loopback 1 – 172.168.1.1/24
Loopback 2– 172.168.2.1/24
Loopback 3 – 172.168.3.1/24
Advertise these newly created loopbacks in OSPF using the network command. Make
sure they appear in the routing table using a /24 mask. These routes should be seen as a
single summarized route outside of area 1.
R3 R2
Int loopback 1
Ip add 172.168.1.1 255.255.255. 0
Ip ospf network point-to-point
Int loopback 2
Ip add 172.168.2.1 255.255.255. 0
Ip ospf network point-to-point
Int loopback 3
Ip add 172.168.3.1 255.255.255. 0
Ip ospf network point-to-point
Router ospf 1
Network 172.168.0.0 0.0.255.255 area 1
Network 2.2.2.2 0.0.0.0 area 1
Network 30.0.0.0 0.255.255 area 1
R1#show ip route
The output displays a smaller routing table by displaying only one summarized route for
the contiguous networks.
Task 2 : Configure Route Summarization At ASBR
Loopback 0 – 172.168.0.1/24
Loopback 1 – 172.168.1.1/24
Loopback 2– 172.168.2.1/24
Loopback 3 – 172.168.3.1/24
Advertise these newly created loopbacks in EIGRP AS 100 using the network command
and redistribute these networks into OSPF Area 1. These routes should be seen as a single
summarized route.
R3
Int loopback 0
Ip add 172.168.0.1 255.255.255. 0
Ip ospf network point-to-point
Int loopback 1
Ip add 172.168.1.1 255.255.255. 0
Ip ospf network point-to-point
Int loopback 2
Ip add 172.168.2.1 255.255.255. 0
Ip ospf network point-to-point
Int loopback 3
Ip add 172.168.3.1 255.255.255. 0
Ip ospf network point-to-point
Router ospf 1
Network 2.2.2.2 0.0.0.0 area 1
Network 30.0.0.0 0.255.255 area 1
Router ospf 1
Redistribute eigrp 100 metric 10 subnets
Summary-address 172.168.0.0 255.255.252.0
Verification :
R2#show ip route
R3#show ip route
The output displays a summary route pointing to interface null 0 on R3 routing table.
This is automatically generated by default, when manual summarization is configured so
as to prevent routing loops.
Lab 9 – Configuring OSPF Virtual Links
R1 R2
R3
S0/2/0 S0 S1
S0
E0
E0 E0
R1
R2
R3
Task 1 :
R1 R2
Verification :
R1#show ip route
The output displays net 20.0.0.0 as ‘O’ and net 2.0.0.0 as ‘O IA’, but there is no net
30.0.0.0, as it is not connected to area0.
We need to configure virtual links between R2 & R3 and this area that connects to area0
is called the transit area.
Task 2 :
R2 R3
R1#show ip route
The output displays virtual-link to other router and as well, ‘DoNotAge’ option set.
Task 3 : Configure Virtual Link when area connecting two backbone areas.
R1 R2
R3
Router ospf 1
Network 2.2.2.2 0.0.0.0 area 0
Network 30.0.0.0 0.255.255.255 area 0
Verification :
R2#show ip route
R3#show ip route
When we check the routing table on R3, the output does not have network 10.0.0.0 in the
routing table.
Task 4 :
R1 R2
R1#show ip route
R2#show ip route
R3#show ip route
Now, when we verify the routing table on R1, R2, R3, we see that all O IA routes are
advertised as ‘O’ routes as the routers assume that the networks belong to the same area
because of the virtual link.
R1 R2
E0 S 0/2/0 S0 E0
R1
R2
Lab Objective:
Task 1
All routers should Authenticate Routing updates using the simple password
authentication method. Use a key-string of cisco123.
R1
Router ospf 1
Network 1.1.1.1 0.0.0.0 area 0
Network 10.0.0.0 0.255.255.255 area 0
Int s 0/2/0
Ip ospf authentication-key cisco123
Ip ospf authentication
R2
Router ospf 1
Network 1.1.1.2 0.0.0.0 area 0
Network 20.0.0.0 0.255.255.255 area 0
Int s0
Ip ospf authentication-key cisco123
Ip ospf authentication
Verification :
R1#show ip route
R1
Router ospf 1
Network 1.1.1.1 0.0.0.0 area 0
Network 10.0.0.0 0.255.255.255 area 0
Int S0/2/0
Ip ospf message-digest-key 1 md5 cisco123
Ip ospf authentication message-digest
R2
Router ospf 1
Network 1.1.1.2 0.0.0.0 area 0
Network 20.0.0.0 0.255.255.255 area 0
Int S0
Ip ospf message-digest-key 1 md5 cisco123
Ip ospf authentication message-digest
Verification :
If there is mismatch in key or password, there will not be OSPF neighbor relationship
established between the two routers.
R1#show ip route
R3
E0
E0
R2 SW1
F 0/0
R1
R1
R2
R3
Lab Objective:
Task
Configure OSPF as per the above scenario.
R1 R2
Router ospf 1
Network 30.0.0.0 0.255.255.255 area 0
Verification :
The DR & BDR election can be verified by using the following commands
6. ORIGIN ATTRIBUTE
7. WEIGHT ATTRIBUTE
8. LOCAL PREFERENCE
R2 E0
S0
S1
S0 S0
R1 R3
S1
S1 E0
E0
BGP AS 200
R1
R2
R3
Lab Objective:
Task 1
Configure a BGP neighbor relationship between R1, R2 and R3. R1 should be in AS 200,
R2 should be in AS 100 and R3 should be in AS 200.
R1 R2
Verification :
The output displays that BGP neighbors have established a TCP connection.
R1#show ip route
The output states that the BGP routes denoted as ‘B’ in the routing table.
R1#show ip bgp
Loopback 0
S0
S1
S0 S0
R1 R3
S1
S1
E0 Loopback 0
E0
Loopback 0 BGP AS 100
R1
R2
R3
Lab Objective:
Task 1
Configure a BGP neighbor relationship between R1, R2 and R3. All routers should be
configured in AS 100. Establish the neighbor relationship based on Loopback 0
addresses. Configure EIGRP as the routing protocol in AS 100. Advertise all loopback
networks under EIGRP.
R1 R2
Verification :
The output displays that neighbors established a TCP connection between them.
Lab 3 – ebgp-Multihop
R1 R2
S0/2/0 S0
FA0/0
S E0
BGP AS 100 1
BGP AS 200
R1
R2
Lab Objective:
Task 1 :
R1 R2
Ip route 20.1.1.1 255.0.0.0 1.1.1.2 Ip route 10.1.1.1 255.0.0.0 1.1.1.1
Verification :
S0/2/0
Loopback 0 S0 Loopback 0
R1 R2
E0 S1
S0/2/1 E0
S
BGP AS 100 1 BGP AS 200
R1
R2
Lab Objective:
Task 1 :
Verification :
R1#show ip route
Routing table displays two choices to reach the next hop 75.75.75.75, one via 2.2.2.2 and
the other via 1.1.1.2.
R1#traceroute 75.75.75.75
Type escape sequence to abort.
Tracing the route to 75.75.75.75
1 2.2.2.2 16 msec
1.1.1.2 16 msec *
R1#traceroute 75.75.75.75
1 1.1.1.2 24 msec
2.2.2.2 16 msec
E0 E0 E0
R1
R2
R3
Task 1 :
R3
R1 advertises network 10.0.0.0 to R2 with the next hop of 1.1.1.1 and R2 advertises
network 20.0.0.0 to R1 with the next hop of 1.1.1.2.
For iBGP, the protocol states that the next hop that eBGP advertises, should be carried
into iBGP, because of this rule, R2 advertises network 10.0.0.0 to its iBGP peer R3 with a
next hop of 1.1.1.1. Therefore for R3, the next hop to reach network 10.0.0.0 is via
1.1.1.1 and not 2.2.2.1.
Make sure that R3 can reach network 10.0.0.0 via IGP, otherwise R3 drops packets with
the destination of 10.0.0.0 or advertise via network commands in BGP.
Verification :
R3#show ip route
The output on R3 displays that the network 10.0.0.0 can be reached via 1.1.1.1.
Task 2 :
Configure BGP such that R2 advertises its updates to iBGP peers via 2.2.2.1 instead of
1.1.1.1. You can use the next-hop-self command to accomplish this task.
R2
Verification :
R3#show ip route
The output displays that for R3 to reach network 10.0.0.0 is via 2.2.2.1 because of the
next-hop-self command. R2 advertises network 10.0.0.0 via 2.2.2.1 to R3, instead of
carrying the next-hop advertised by eBGP.
E0 E0 E0
R1
R2
R3
Lab Objective:
Task 1 :
Configure BGP on all the three routers. Do not advertise network 30.0.0.0 on R3 in BGP,
instead create static route on R2 to reach 30.0.0.0 via 2.2.2.2 and redistribute this static
route into BGP.
R1 R3
Verification :
R1#show ip bgp
R1 reaches 2.0.0.0 via ‘200 i’ means that the next AS path is 200 and the origin of the
route is IGP.
R1 also reaches 30.0.0.0 via ‘200 ?’, means that the next AS is 200 and that the origin is
incomplete and is a redistributed static route.
R2 E0
S0
S1
S0 S0
R1 R3
S1 S1 E0
E0
BGP AS 100 BGP AS 300
R1
R2
R3
Lab Objective:
Task 1 :
Configure AS 200 such that all traffic destined for network 3.0.0.0 should go through R3.
Use the Weight attribute to accomplish this task.
R1 R3
Verification :
R2#show ip route
The output displays that R2 has been forced to use R3 as the next-hop to reach network
3.0.0.0
The output displays two paths and shows the path via 2.2.2.2 as the best path choosen
because of the highest weight set to that path.
The output displays two paths and shows the path via 2.2.2.2 as the best path choosen
because of the highest weight set to that path.
Task 2 :
Configure route-map using weight attribute to manipulate the routing information on R2.
R2
Verification :
R2#sh ip route
The routing table displays that R2 is learning network 10.0.0.0 via 2.2.2.2 and network
30.0.0.0 via 1.1.1.1
The output displays the best path to reach network 30.0.0.0 from R2 is via 1.1.1.1,
because of the highest weight attribute set to that path.
The output displays the best path to reach network 10.0.0.0 from R2 is via 2.2.2.2,
because of the highest weight attribute set to that path.
R2 E0
S0
S1
S0 S0
R1 R3
S1
S1 E0
E0
BGP AS 100
R1
R2
R3
Lab Objective:
Task 1 :
Configure AS 100 such that all traffic destined for AS 200 should go through R2. Use
Local-Preference Attribute to accomplish this task.
R1 R3
Verification :
R3#show ip route
200
2.2.2.1 from 2.2.2.1 (20.1.1.1)
Origin IGP, metric 0, localpref 500, valid, external, best
Local
3.3.3.1 from 3.3.3.1 (10.1.1.1)
Origin IGP, metric 0, localpref 100, valid, internal
The output displays that path 2.2.2.1 is the best path, because of the highest local
preference value over the other path.
Task 2 :
R3
Verification :
R3#show ip route
B 1.0.0.0/8 [200/0] via 3.3.3.1, 00:02:17
C 2.0.0.0/8 is directly connected, Serial0
C 3.0.0.0/8 is directly connected, Serial1
B 20.0.0.0/8 [200/0] via 1.1.1.2, 00:01:41
B 10.0.0.0/8 [200/0] via 3.3.3.1, 00:02:17
C 30.0.0.0/8 is directly connected, Ethernet0
The output displays that path 1.1.1.2 is the best path, because of the highest local
preference value over the other path.
R1
R2
R3
Lab Objective:
Task 1 :
All ingress (incoming) traffic to AS 200 should use the path through R3 using the MED
attribute. Configure the MED on R1 to 100 and Configure the MED on R3 to 50. Lower
MED will be preferred.
R1 R3
Verification :
R2#show ip route
The output displays that network 10.0.0.0 & 30.0.0.0 are learnt via 2.2.2.2 because of the
lowest MED value set to this path.
The output displays best path 2.2.2.2 with a metric 50 lower than other path.
E0 E0 E0
R1
R2
R3
Lab Objective:
Task 1 :
Configure BGP and OSPF as per the above scenario. Redistribute OSPF into BGP and
verify the metric values displayed in the output by default .
R1 R2
R3
Router ospf 1
Network 2.2.2.1 0.0.0.0 area 0
Network 30.0.0.0 0.255.255.255 area 0
Verification :
R1#show ip route
The output displays routes 2.0.0.0 and 20.0.0.0 with a metric of ‘0’ as they are directly
connected to R2 and when passed to R1 travel with a metric of ‘0’.
Task 2 :
Configure BGP and OSPF as per the above scenario. Redistribute OSPF into BGP using a
metric value of 5.
R2
Router ospf 1
Network 2.2.2.1 0.0.0.0 area 0
Network 20.0.0.0 0.255.255.255 area 0
Router bgp 100
Neighbor 1.1.1.1 remote-as 100
Network 1.0.0.0
No synchronization
Redistribute ospf 1 metric 5
Verification :
R1#show ip route
The output displays network 30.0.0.0 changed to metric of 5. But observe that network
2.0.0.0 and 20.0.0.0 still remain with a metric of ‘0’ as they are not displayed as
redistributed routes instead they are learn’t as connected routes on R2.
Task 3 :
Configure BGP and OSPF as per the above scenario. Redistribute OSPF into BGP using a
metric value of 5 and also redistribute connected routes with a metric set to 50.
R2
Router ospf 1
Network 2.2.2.1 0.0.0.0 area 0
Network 20.0.0.0 0.255.255.255 area 0
Verification :
R1#show ip route
The output displays network 30.0.0.0 changed to metric of ‘5’. Also network 2.0.0.0 and
20.0.0.0 with a metric of ‘50’.
Task 4 :
Configure BGP and OSPF as per the above scenario. Redistribute OSPF into BGP and
use the default-metric command to change the metric.
R2
Router ospf 1
Network 2.2.2.1 0.0.0.0 area 0
Network 20.0.0.0 0.255.255.255 area 0
Verification :
R1#show ip route
The output displays network 30.0.0.0 with a metric value changed to 75.
E0
S1 E0 E0
S1
BGP AS 100 BGP AS 200 BGP AS 300
AS 100
S1
R4
S0
E0
BGP AS 400
R1
Interface IP Address Subnet Mask
S0 1.1.1.1 255.0.0.0
S1 3.3.3.1 255.0.0.0
E0 10.1.1.1 255.0.0.0
R2
R3
R4
Lab Objective:
Task 1 :
R1 R2
R3 R4
Router bgp 300 Router bgp 400
Neighbor 2.2.2.1 remote-as 200 Neighbor 4.4.4.2 remote-as 300
Neighbor 4.4.4.1 remote-as 400 Neighbor 3.3.3.1 remote-as 100
Network 2.0.0.0 Network 3.0.0.0
Network 4.0.0.0 Network 4.0.0.0
Network 30.0.0.0 Network 40.0.0.0
No synchronization No synchronization
Verification :
R4#show ip route
The output displays that network 30.0.0.0 is reached via 4.4.4.2 from R4 as it is the
shortest path when compared to the other path via 3.3.3.1.
Task 2 :
Manipulate the path to reach network 30.0.0.0 on R4. You can use as-path prepend
command using route-map to accomplish this task.
R4
Access-list 1 permit 30.0.0.0
0.255.255.255
Verification :
R4#show ip route
The output displays that network 30.0.0.0 is reached via 3.3.3.1 from R4 as it is the
shortest path when compared to the other path via 4.4.4.2.
Lab 12 – BGP Neighbor MD5 Authentication
R1 R2
S0 S0
E0
S E0
BGP AS 100 1
BGP AS 200
R1
R2
Lab Objective:
Task 1 :
Configure BGP on all the routers. Configure R1 in AS 100 and R2 in AS 200. Configure
MD5 Authentication between R1 and R2 using a password of cisco123.
R1 R2
R1#show ip route
Authentication mismatch:
S0
E0
R2 R1
S0
S0
S1
S2
E0 E0
R4
S0
E0 Loopback 0
BGP AS 100
R1
R2
R3
R4
Lab Objective:
Task 1 :
Configure BGP on all the routers. Configure R1 in AS 200 and configure R2, R3 and R4 in AS
100. Configure the loopbacks as per the scenario and advertise in BGP. Also configure route-map
blocking network 10.0.0.0 from being advertised to iBGP peers. You can use peer-group to
accomplish these tasks.
R1 R2
E0 E0
S1 E0
Loopback 1 – 5
S0
R3
E0
BGP AS 300
R1
R3
R4
Lab Objective:
Task 1 :
Configure BGP on all the routers. Create loopbacks on R3 as per the above scenario and
advertise them under BGP.
Loopback 1 – 172.1.0.1/16
Loopback 2 – 172.2.0.1/16
Loopback 3 – 172.3.0.1/16
Loopback 4 – 172.4.0.1/16
Loopback 5 – 172.5.0.1/16
R3
interface Loopback1
ip address 172.1.0.1 255.255.0.0
interface Loopback2
ip address 172.2.0.1 255.255.0.0
interface Loopback3
ip address 172.3.0.1 255.255.0.0
interface Loopback4
ip address 172.4.0.1 255.255.0.0
interface Loopback4
ip address 172.5.0.1 255.255.0.0
Task 2
Configure Route Aggregation on R3 such that these routes are summarized as a single
route.
R3
Verification :
R1#show ip route
B 1.0.0.0/8 [20/0] via 3.3.3.2, 00:15:39
B 2.0.0.0/8 [20/0] via 3.3.3.2, 00:16:38
C 3.0.0.0/8 is directly connected, Serial0
B 20.0.0.0/8 [20/0] via 3.3.3.2, 00:15:39
B 172.1.0.0/16 [20/0] via 3.3.3.2, 00:08:03
B 172.2.0.0/16 [20/0] via 3.3.3.2, 00:08:03
B 172.3.0.0/16 [20/0] via 3.3.3.2, 00:08:03
B 172.4.0.0/16 [20/0] via 3.3.3.2, 00:08:03
B 172.5.0.0/16 [20/0] via 3.3.3.2, 00:07:03
B 40.0.0.0/8 [20/0] via 3.3.3.2, 00:16:38
C 10.0.0.0/8 is directly connected, Ethernet0
B 30.0.0.0/8 [20/0] via 3.3.3.2, 00:08:51
B 172.0.0.0/13 [20/0] via 3.3.3.2, 00:00:34
The routing table displays the prefix route (172.0.0.0/13) and also all the specific-routes.
Task 3
Configure Route Aggregation on R3 such that these routes are summarized as a single
route. Only the Summary route should be send to R3’s neighbors
R3
Router bgp 300
Aggregate-address 172.0.0.0 255.248.0.0 summary-only
Verification :
R1#show ip route
The output displays only the prefix route (172.0.0.0/13) and suppresses all the specific
routes.
Task 4
Configure Route Aggregation on R3 such that these routes are summarized as a single
route. Only the Summary route and the 172.1.0.0, 172.2.0.0 and 172.3.0.0 route should be
send to R3’s neighbor, blocking 172.4.0.0 and 172.5.0.0 routes.
R3
Verification :
R1#show ip route
R2#show ip bgp
Task 5
Configure Route Aggregation on R3 such that these routes are summarized as a single
route. Configure route-map and set the attribute origin to the route-map and implement in
BGP process such that the aggregate address appears as incomplete route.
R3
Route-map map1
Set origin incomplete
Router bgp 300
Aggregate-address 172.0.0.0 255.248.0.0 attribute-map map1
Verification :
2. CONFIGURE TRUNKING
8. IMPLEMENTING MSTP
F 0/2 F 0/4
SW1
PC2 PC4
F 0/1 F 0/3
PC1 PC3
SW1
Task 1
Create VLAN 2 and VLAN 3 and assign name SALES and FINANCE to each VLAN.
Configure ports fa 0/2 –fa 0/4 as access-ports and assign VLAN 2 to ports fa 0/1 and
fa0/3. Assign VLAN 3 to ports fa 0/2 and fa 0/4. Configure VLANs using the database
mode.
SW1
Vlan database
Vlan 2
vlan 2 name sales
Vlan 3
Vlan 3 name finance
Int fa0/1
Switchport mode access
Switchport access vlan2
Int fa0/2
Switchport mode access
Switchport access vlan3
Int fa0/3
Switchport mode access
Switchport access vlan2
Int fa0/4
Switchport mode access
Switchport access vlan3
Verification :
Name: Fa0/1
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
The output displays VLAN 2, name SALES assigned to ports fa 0/1 and fa 0/3. Also
VLAN 3, name FINANCE assigned to ports fa 0/2 and fa 0/4.
From PC 1:
Ping is successful.
From PC 1:
Ping not successful.
Task 2
Create VLAN 2 and VLAN 3 and assign name SALES and FINANCE to each VLAN.
Configure ports fa 0/2 –fa 0/4 as access-ports and assign VLAN 2 to ports fa 0/1 and
fa0/3. Assign VLAN 3 to ports fa 0/2 and fa 0/4. Configure VLANs using the global
configuration mode.
SW1
Vlan 2
name sales
Vlan 3
name finance
Int fa0/1
Switchport mode access
Switchport access vlan2
Int fa0/2
Switchport mode access
Switchport access vlan3
Int fa0/3
Switchport mode access
Switchport access vlan2
Int fa0/4
Switchport mode access
Switchport access vlan3
Lab 2 – Configure Trunking
F 0/1 F 0/2
SW1
PC1 PC2
F 0/11
F 0/11
SW2
F 0/1 F 0/2
PC3 PC4
SW1
SW2
SW1
Vlan 2
name sales
Vlan 3
name finance
Int fa0/1
Switchport mode access
Switchport access vlan2
Int fa0/2
Switchport mode access
Switchport access vlan3
Int fa0/11
shutdown
Switchport trunk encapsulation isl
Switchport mode trunk
No shutdown
SW2
Vlan 2
name sales
Vlan 3
name finance
Int fa0/1
Switchport mode access
Switchport access vlan2
Int fa0/2
Switchport mode access
Switchport access vlan3
Int fa0/11
shutdown
Switchport trunk encapsulation isl
Switchport mode trunk
No shutdown
Verification :
Name: Fa0/11
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: trunk
Administrative Trunking Encapsulation: isl
Operational Trunking Encapsulation: isl
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
From PC 1
Ping successful.
From PC 1:
Task 2
Int fa0/11
shutdown
Switchport trunk encapsulation dot1q
Switchport mode trunk
No shutdown
SW2
Int fa0/11
shutdown
Switchport trunk encapsulation dot1q
Switchport mode trunk
No shutdown
Verification :
Name: Fa0/11
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
The output displays mode as trunk and encapsulation used is dot1q, and the default native
vlan is vlan1 which is used to carry the untagged frames across.
From PC 1
Ping successful.
Verifying connectivity between PC 1 and PC 4 (i.e PC’s in different vlan):
From PC 1:
R1
E0
SW1
PC3 PC4
F 0/1 F 0/2
PC1 PC2
SW1
R1
Task 1
Create VLAN 10 and assign to ports fa 0/1 and fa 0/2. Create VLAN 20 and assign to
ports fa 0/3 and fa 0/4. Configure port fa 0/5 as dot1q trunk. Use sub-interfaces on
interface e 0 on R1 to accomplish this task.
R1
Int e 0
No ip address
Int e 0/0.10
Encapsulation dotlq 10
Ip address 10.1.1.1 255.0.0.0
Int e 0/0.20
Encapsulation dotlq 20
Ip address 20.1.1.1 255.0.0.0
SW1
Vlan 10
Name sales
Vlan 20
Name finance
Int fa 0/1
Switchport mode access
Switchport access vlan 10
Int fa 0/2
Switchport mode access
Switchport access vlan 10
Int fa 0/3
Switchport mode access
Switchport access vlan 20
Int fa 0/4
Switchport mode access
Switchport access vlan 20
Int fa 0/5
Shutdown
Switchport trunk encapsulation dotlq
Switchport mode trunk
Switchport nonegotiate
No shutdown
Verification :
From PC 1 (10.1.1.2) :
Ping successful which means inter-vlan communication is working properly.
Name: Fa0/5
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Task 2
Implementing inter-vlan communication on a multilayer switch. Create VLAN 10 and
assign to ports fa 0/1 and fa 0/2. Create VLAN 20 and assign to ports fa 0/3 and fa 0/4.
Configure SVI and assign Ip address.
20.1.1.2/24 VLAN 20 20.1.1.3/24 VLAN 20
F 0/3 F 0/4
SW1
PC3 PC4
F 0/1 F 0/2
PC1 PC2
SW1
Ip routing
Interface vlan 10
Ip address 10.1.1.1 255.0.0.0
No shutdown
Interface vlan 20
Ip address 20.1.1.1 255.0.0.0
No shutdown
Verification :
From PC 1 (10.1.1.2) :
Task 1
Configure Switch1 as the VTP Server and the other Switch (SW2) as VTP Client. Use
CISCO as the Domain name. Authenticate the relationship using CISCO123 as the
password.
Switch1 Switch2
Task 2
Create VLANs 2,3,4, and 5 on SW1 (VTP SERVER) and name them as aaa, bbb, ccc,
ddd.
Switch1
Vlan 2
Name aaa
Vlan 3
Name bbb
Vlan 4
Name ccc
Vlan 5
Name ddd
Verification :
The output displays vtp revision number, configuration revision number, vtp operation
mode and vtp domain name.
VTP Version :2
Configuration Revision : 15
Maximum VLANs supported locally : 1005
Number of existing VLANs :9
VTP Operating Mode : Client
VTP Domain Name : CISCO
The output displays vtp revision number, configuration revision number, vtp operation
mode and vtp domain name.
SW1 SW2
F 0/11 F 0/11
Task 1
Configure Switch1 as the VTP Server and the other Switch (SW2) as VTP Client.
Configure SW1 to be the STP root for VLAN 1. Change the forward delay time such that
the port transitions from listening to learning state in just 6 seconds instead of the default
of 15 seconds. Configure ports fa 0/9 and fa 0/11 as dot1q trunks on both the switches.
Switch1 Switch2
Verification :
SW1#show spanning-tree vlan 1
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 24577
Address 0014.a82f.a680
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 6 sec
The output displays that SW1 is the root bridge and forward delay time is 6 seconds.
The output displays the transition of ports from listening to learning in just 6 seconds
instead of the default of 15 seconds.
Task 2
20.1.1.2/24 VLAN 20 20.1.1.3/24 VLAN 20
F 0/3 F 0/4
SW1
PC3 PC4
F 0/1 F 0/2
PC1 PC2
Switch1
Verification :
The output displays that port fa0/1 is in portfast mode and also we see that BPDU’s are
sent
Verify the transition by shutting down interface fa 0/1 and again bringing the interface up.
The output displays port fa 0/1 jumps to forwarding state from blocking immediately
because of portfast enabled on that port.
Task 3
Configure SW1 to quickly switch its root port in the event of an uplink failure. Trunking
should be configured between the switches.
Switch1
spanning-tree uplinkfast
Verification :
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000f.34f4.f080
Cost 3019
Port 11 (FastEthernet0/11)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
The output displays cost of ports increased by 3000 & priority of the bridge has increased
to 49152.
Verify the transition from blocking to forwarding :
Shutdown the port fa0/9 which is in the forwarding state.
00:47:18: STP: UFAST: removing prev root port Fa0/9 VLAN0001 port-id 8009
The output displays the transition of port fa0/11 from blocking to forwarding in one
second.
Task 4
SW1 SW2
F 0/9 F 0/9
Configure portfast on port fa 0/9 between SW1 and SW2. (By default all ports on the
switch are in dynamic desirable mode, they autonegotiate to become trunk. Portfast
should not be enabled on trunk as there is a possibility of loops, we need to shutdown the
port fa 0/9 and enable portfast on both the switches on port fa 0/9). Enable BPDU guard
on port fa 0/9 of SW1 to stop BPDU’s on that port.
Switch1 Switch2
Now bring the port fa 0/9 on both switches to up. As soon as the BPDU’s are being sent
on the port . The port enabled with BPDU guard will immediately come into err-disable
state .
Verification :
Console messages on SW1 when the bpdu’s are received on the bpduguard enabled port
fa0/9
The output displays the port as (err-disabled) state. But the BPDU’s are sent out of this
port, it doesn’t affect that feature.
Task 5
R1
E 0/0
F 0/3
F 0/9 F 0/9
SW1 SW2
F 0/11 F 0/11
R1 Switch1
Verification :
The output displays the port as (err-disabled) state. But the BPDU’s are sent out of this
port, it doesn’t affect that feature.
SW1#debug spanning-tree events
The output displays that as soon as BPDU received on port fa0/3, it is disabled because of
the BPDU guard enabled on that port.
Task 6
(Scenario Based on Task 5)
Configure portfast on port fa0/3 on sw1. Enable BPDU filter on port fa0/3 on sw1.
Configure R1 to send BPDUs to port fa0/3 on sw1.
R1 Switch1
Verification :
The output displays BPDU filter enabled and no BPDU’s sent or received
Task 7
F 0/9 F 0/9
SW1 SW2
F 0/11 F 0/11
Configure SW1 to be the root for VLAN 1. Configure root guard feature on SW1 port
fa0/9, fa0/11.
Switch1
Verification :
Switch2
As root guard is enabled on SW1, the ports on SW1 change to root inconsistent ports,
thus blocking the port when superior BPDUs are received on SW1.
Task 8
(Scenario Based on Task 7)
Configure SW1 to the root bridge for vlan1. Configure loop guard on SW2, i.e., on the
switch that is not the root bridge. Configure ports fa0/9 & fa0/11 between SW1 and SW2
as trunk ports.
Switch1 Switch2
Verification :
SW2#show spanning-tree interface fastEthernet 0/9 detail
Switch1
Int fa0/9
Spanning-tree bpdufilter enable
BPDU’s will be stopped on SW1 and the port changes to loop inconsistent.
The loop inconsistent state indicates that the port is not receiving any BPDU’s or not
sending any BPDU’s through the port.
Switch1 Switch2
Verification :
VLAN0002
Spanning tree enabled protocol ieee
Root ID Priority 24578
----------Output Omitted----------
The output displays that SW1 is root for VLAN 2 i.e both ports fa 0/9 and fa 0/11 are in
forwarding state.
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 24578
----------Output Omitted---------
Task 2
(Scenario Based on Task 1)
Configure dotlq trunk between SW1 and SW2 on ports fa0/9 and fa0/11. Configure VTP
on both the switches to propagate VLAN information. Create VLANs 1 to 6 on SW1
(server). Allow VLANs 2, 4, 6 on port fao/9 on SW1 & SW2. Allow VLANs 1, 3, 5 on
port fao/11 on SW1 & SW2.
Switch1 Switch2
Verification :
VLAN0002
Spanning tree enabled protocol ieee
Root ID Priority 32770
Address 000f.34f4.f080
Cost 19
Port 9 (FastEthernet0/9)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
The output displays that port fa0/9 is in forwarding state as vlans 2 is configured to allow
on port fa0/9.
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 32771
Address 000f.34f4.f080
Cost 19
Port 11 (FastEthernet0/11)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
The output displays that port fa0/11 is in forwarding state as vlan 3 is configured to allow
on port fa0/11. Thus load balancing is achieved.
Lab 7 – Implementing MSTP
Configure dotlq trunks on ports fa0/9 and fa0/11. Configure VTP to propagate VLAN
information. Configure instance 1 MSTP and map VLANs 1, 2, 3. Configure instance 2
MSTP and map VLANs 4, 5, 6. Make SW1 the STP root for instances 1, 2.
Switch1 Switch
Verification :
Task 2
(Scenario Based On Task 1)
Configure MSTP on SW1 & SW2. Make SW1 the STP root for instance 1. Make SW2
the STP root for instance 2. Configure MST instance 1 and map VLANs 1 - 3. Configure
MST instance 2 and map VLANs 4 - 6.
Switch1 Switch2
Verification :
The output displays that sw1 acts as the root bridge for vlans 1-3 only.
This can be verified from the output that ports fa0/9 and fa0/11 are in forwarding state
only for vlans 1-3 whereas one port forwarding and other blocking for vlans 4-6 on the
same switch.
The output displays that sw2 acts as the root bridge for vlans 4-6 only.
This can be verified from the output that ports fa0/9 and fa0/11 are in forwarding state
only for vlans 4-6 whereas one port forwarding and other blocking for vlans 1-3 on the
same switch.
SW1 SW2
F 0/11 F 0/11
Task 1
Configure L 2 trunk between SW1 & SW2 using default encapsulation on ports fa0/9,
fa0/11.
Configure ether channel between SW1 and SW2 on interfaces fa0/9, fa0/11, without
using negotiation protocols.
Configure interfaces fa0/9, fa0/11 on SW1 & SW2 in channel group 1 with a mode of
“on”.
Switch1 Switch2
Verification :
Name: Po1
Switchport: Enabled
Administrative Mode: dynamic desirable
Operational Mode: trunk
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: isl
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
By default all interfaces are in dynamic desirable mode which automatically negotiates to
become trunk if not specified.
The output displays default ISL trunking for this port-channel.
The output displays the port-channel interface as trunk instead of individual ports.
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
This bridge is the root
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Task 2
(Scenario Based On Task 1)
Configure L 2 trunk between SW1 & SW2 using dot1q or isl encapsulation on ports fa
0/7 , fa 0/9, fa 0/11.
Configure ether channel between SW1 and SW2 on interfaces fa 0/7, fa0/9, fa0/11. Both
switches SW1 and SW2 should initiate negotiation via PAgP.
Switch1 Switch2
Int range fa0/7 , fa0/9 , fa0/11 Int range fa0/7 , fa0/9 , fa0/11
Channel-group 1 mode desirable Channel-group 1 mode desirable
Verification :
The output displays protocol as “PAgP” and Po1 (SU) (port-channel 1) created for ports
fa0/7, fa0/9, fa0/11, where s : layer 2, U : in use.
Name: Po1
Switchport: Enabled
Administrative Mode: dynamic desirable
Operational Mode: trunk
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: isl
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
The output displays that this interface port-channel 1 has automatically negotiated to
become trunk.
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000f.34f4.f080
Cost 9
Port 65 (Port-channel1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Task 3
(Scenario Based On Task 1)
Configure L 2 trunk between SW1 & SW2 using dot1q or isl encapsulation on ports
fa 0/7 , fa 0/9, fa 0/11.
Configure ether channel between SW1 and SW2 on interfaces fa 0/7, fa0/9, fa0/11. Both
switches SW1 and SW2 should initiate negotiation via LAcP.
Switch1 Switch2
Int range fa0/7 , fa0/9 , fa0/11 Int range fa0/7 , fa0/9 , fa0/11
Channel-group 1 mode active Channel-group 1 mode active
Verification :
The output displays protocol as “LACP” and po1 (SU) (port-channel 1) created for ports
fa0/7, fa0/9, fa0/11.
Task 4
(Scenario Based On Task 1)
Switch1 Switch2
Interface range fa0/7, fa0/9, fa0/11 Interface range fa0/7, fa0/9, fa0/11
Switchport mode access Switchport mode access
Switchport access vlan 100 Switchport access vlan 100
Channel-group 1 mode on Channel-group 1 mode on
Verification :
The output displays no protocol and po1 (SU) created for ports fa0/7, fa0/9, fa0/11, where
:
P = Port-channel, s = layer 2, U = in use.
Task 5
(Scenario Based On Task 1)
To configure Layer 3 ether-channel, create the port channel logical interface, assign ip
address and then put the ethernet interfaces into the port-channel.
Switch1 Switch2
Interface range fa0/7, fa0/9, fa0/11 Interface range fa0/7, fa0/9, fa0/11
No switchport No switchport
No ip address No ip address
Channel-group 1 mode on Channel-group 1 mode on
Verification :
SW1#ping 100.0.0.2
S0
S1
F 0/5
E 0/0 E 0/0
PC1
RIP
R1
R2
SW1
Task 1
R2 R3
Verification :
The output displays that this is the standby router and the active router is (10.1.1.1), the virtual ip
is (10.1.1.10) and this router configured to preempt.
R2#show ip arp
From PC1:
Traceroute command displays that the packet reaches 10.1.1.1 (active router) and reaches
20.1.1.1.
Traceroute command displays that the packet reaches 10.1.1.2 (standby router becomes
active) and then reaches 20.1.1.1.
Task 2
Configure tracking on R2, so that in case of failure of S 1/0, the priority is decreased
automatically, so that the standby router takes the active role.
R2
Int e0/0
Standby 1 track s1/0 150
Verification :
R2#show standby brief
P indicates configured to preempt.
|
Interface Grp Prio P State Active addr Standby addr Group addr
Et0/0 1 200 P Active local 10.1.1.2 10.1.1.10
The output displays that this is the standby router and the active router is (10.1.1.1), the virtual ip
is (10.1.1.10) and this router configured to preempt.
From PC1:
Traceroute command displays that the packet reaches 10.1.1.1 (active router) and reaches
20.1.1.1.
The priority is decreased to 50 from 200 automatically, and the router becomes standby
for the HSRP group.
The traceroute command displays that the packets are sent via 10.1.1.2 (standby becomes
active) because of higher priority value.
S0
S1
SW1
S 0/2 S1
F 0/3 F 0/1
R2 R3
F 0/5
FA 0/0 E 0/0
PC1
RIP
R1
R2
SW1
Task 1
R2 R3
Verification :
Interface Grp Pri Time Own Pre State Master addr Group addr
FastEthernet0/0 1 200 12218 Y Master 10.1.1.1 10.1.1.10
The output displays that this router is master and virtual ip address is 10.1.1.10
Interface Grp Pri Time Own Pre State Master addr Group addr
Ethernet0/0 1 100 12609 Y Backup 10.1.1.1 10.1.1.10
When packets sent to network 20.1.1.1 from PC1 (10.1.1.3), the packet first reaches
10.1.1.1 (master) and finally reaches the destination.
Interface Grp Pri Time Own Pre State Master addr Group addr
Ethernet0/0 1 100 3609 Y Master 10.1.1.2 10.1.1.10
From PC1:
When traceroute from PC1 to 20.1.1.1, the output displays that packet is reaching
20.1.1.1 via 10.1.1.2.
S0
S1
S 0/2 SW1 S1
F 0/3 F 0/1
R2 R3
FA 0/0 E 0/0
F 0/5 F 0/7
PC1 PC2
RIP
R1
R2
SW1
Task 1
R2 R3
Verification :
Interface Grp Fwd Pri State Address Active router Standby route
Fa0/0 1 - 200 Active 10.1.1.10 local 10.1.1.2
R2#show glbp
FastEthernet0/0 - Group 1
State is Active
2 state changes, last state change 00:11:30
Virtual IP address is 10.1.1.10
Hello time 250 msec, hold time 750 msec
Next hello sent in 0.000 secs
Redirect time 600 sec, forwarder time-out 14400 sec
Preemption enabled, min delay 0 sec
Active is local
Standby is 10.1.1.2, priority 100 (expires in 0.530 sec)
Priority 200 (configured)
Weighting 100 (default 100), thresholds: lower 1, upper 100
Load balancing: round-robin
Group members:
0001.4289.a241 (10.1.1.2)
0006.534b.7090 (10.1.1.1) local
There are 2 forwarders (1 active)
Forwarder 1
State is Active
1 state change, last state change 00:11:20
MAC address is 0007.b400.0101 (default)
Owner ID is 0006.534b.7090
Redirection enabled
Preemption enabled, min delay 30 sec
Active is local, weighting 100
Forwarder 2
State is Listen
MAC address is 0007.b400.0102 (learnt)
Owner ID is 0001.4289.a241
Redirection enabled, 599.800 sec remaining (maximum 600 sec)
Time to live: 14399.800 sec (maximum 14400 sec)
Preemption enabled, min delay 30 sec
Active is 10.1.1.2 (primary), weighting 100 (expires in 0.546 sec)
The output displays that the active router takes its default MAC address, whereas the
second forwarder learns the MAC address from the default gateway (active forwarding
router) (i.e. R2). Load balancing is achieved in round-robin algorithm.
How To verify :
Traceroute from PC1 to 20.0.0.0 network, the packet is send via R2.
Traceroute from PC2 to 20.0.0.0 network, the packet is send via R2.
If R2 is busy then the packet is send via R3, which is verified from the above output
( traceroute 20.1.1.1 from PC2)
From PC1:
From PC2: