0% found this document useful (0 votes)
217 views15 pages

3.6.1.2 Packet Tracer - Skills Integration Challenge

The document discusses configuring a network for the XYZ Corporation using various WAN technologies. It includes requirements to configure interface addressing, SSH, PPP, DHCP, default routing, eBGP, GRE tunneling, and OSPF routing on routers REMOTE, HQ, and BRANCH. It also requires verifying connectivity from PCs on different subnets to a DNS server. A configuration script is provided to configure some of these settings on the BRANCH and HQ routers.

Uploaded by

ANDRESSRCO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
217 views15 pages

3.6.1.2 Packet Tracer - Skills Integration Challenge

The document discusses configuring a network for the XYZ Corporation using various WAN technologies. It includes requirements to configure interface addressing, SSH, PPP, DHCP, default routing, eBGP, GRE tunneling, and OSPF routing on routers REMOTE, HQ, and BRANCH. It also requires verifying connectivity from PCs on different subnets to a DNS server. A configuration script is provided to configure some of these settings on the BRANCH and HQ routers.

Uploaded by

ANDRESSRCO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA

ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Unidad 1: Tarea 1 – Conocer las Diferentes Tecnologías


WAN

Oscar Arturo Gomez Gualteros


Código: 80140235
Grupo: 2150521_6
Presentado a: Ing. Efraín Alejandro Pérez
Universidad Nacional Abierta y a Distancia – UNAD

CEADJAG
Gestión de Redes de Acceso de Telecomunicaciones
Acceso a la WAN (MOD4 - CISCO) 2150521_6
Bogotá, Octubre de 2018
1
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

3.6.1.2 Packet Tracer - Skills Integration Challenge

Packet Tracer – Skills Integration Challenge (Instructor Version)


Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.

Topology

2
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

S0/0/0 209.165.201.1 255.255.255.252 N/A


ISP-1
S0/1/0 209.165.201.9 255.255.255.252 N/A
S0/0/0 209.165.201.17 255.255.255.252 N/A
ISP-2
S0/1/1 209.165.201.13 255.255.255.252 N/A
S0/0/0 209.165.201.21 255.255.255.252 N/A
ISP-3 S0/1/0 209.165.201.10 255.255.255.252 N/A
S0/1/1 209.165.201.14 255.255.255.252 N/A
S0/0/0 209.165.201.2 255.255.255.252 N/A
REMOTE G0/0 192.168.20.1 255.255.255.0 N/A
Tunnel 10 10.1.1.1 255.255.255.252 N/A
S0/0/0 209.165.201.18 255.255.255.252 N/A
HQ G0/0 192.168.30.1 255.255.255.0 N/A
Tunnel 10 10.1.1.2 255.255.255.252 N/A
S0/0/0 209.165.201.22 255.255.255.252 N/A
BRANCH
G0/0 192.168.10.1 255.255.255.0 N/A
PC1 NIC DHCP 192.168.10.1
PC2 NIC 192.168.20.10 255.255.255.0 192.168.20.1
PC3 NIC DHCP 192.168.30.1
DNS Server NIC 192.168.30.250 255.255.255.0 192.168.30.1

Background / Scenario
In this skills integration challenge, the XYZ Corporation uses a combination of
eBGP, PPP, and GRE WAN connections. Other technologies include DHCP, default
routing, OSPF for IPv4, and SSH configurations.

Requirements
Note: The user EXEC password is cisco and the privileged EXEC
password is class. Interface Addressing

 Configure interface addressing as needed on appropriate devices.


o Use the topology table to implement addressing on routers REMOTE, HQ, and BRANCH.
o Configure PC1 and PC3 to use DHCP.

SSH
 Configure HQ to use SSH for remote access.

3
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

o Set the modulus to 2048. The domain name is CISCO.com.


o The username is admin and the password is secureaccess.
o Only SSH should be allowed on the VTY lines.
o Modify the SSH defaults: version 2; 60-second timeout; two retries.

PPP
 Configure the WAN link from BRANCH to the ISP-3 router using PPP
encapsulation and CHAP authentication.
o Create a user ISP-3 with the password of cisco.
 Configure the WAN link from HQ to the ISP-2 router using PPP encapsulation and CHAP
authentication.
o Create a user ISP-2 with the
password of cisco. DHCP
 On BRANCH, configure a DHCP pool for the BRANCH LAN using the following requirements:
o Exclude the first 5 IP addresses in the range.
o The case-sensitive pool name is LAN.
o Include the DNS server attached to the HQ LAN as part of the DHCP configuration.
 Configure PC1 to use DHCP.
 On HQ, configure a DHCP pool for the HQ LAN using the following requirements:
o Exclude the first 10 IP addresses in the range.
o The case-sensitive pool name is LAN.
o Include the DNS server attached to the HQ LAN as part of the DHCP configuration.
 Configure PC3 to use DHCP.

Default Routing
 Configure REMOTE with a default route to the ISP-1 router. Use the Next-Hop IP as an
argument.

eBGP Routing
 Configure BRANCH with eBGP routing.
o Configure BRANCH to peer with ISP-3.
o Add BRANCH’s internal network to BGP
 Configure HQ with eBGP routing.
o Configure HQ to peer with ISP-2.
o Add HQ’s internal network to BGP.

GRE Tunneling
 Configure REMOTE with a tunnel interface to send IP traffic over GRE to HQ.
o Configure Tunnel 10 with appropriate addressing information.
o Configure the tunnel source with the local exit interface.
o Configure the tunnel destination with the appropriate endpoint IP address.
 Configure HQ with a tunnel interface to send IP traffic over GRE to REMOTE.

4
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

o Configure Tunnel 10 with appropriate addressing information.


o Configure the tunnel source with the local exit interface.
Configure the tunnel destination with the appropriate endpoint IP address.

OSPF Routing
 Because the REMOTE LAN should have connectivity to the HQ LAN, configure OSPF
across the GRE tunnel.
o Configure OSPF process 100 on the REMOTE router.
o REMOTE should advertise the LAN network via OSPF.
o REMOTE should be configured to form an adjacency with HQ over the GRE tunnel.
o Disable OSPF updates on appropriate interfaces.
 Because the HQ LAN should have connectivity to the REMOTE LAN, configure OSPF
across the GRE tunnel.
o Configure OSPF process 100 on the HQ router.
o HQ should advertise the LAN network via OSPF.
o HQ should be configured to form an adjacency with REMOTE over the GRE tunnel.
o Disable OSPF updates on appropriate interfaces.

Connectivity
 Verify full connectivity from PC2 to the DNS Server.
 Verify full connectivity from PC1 to the DNS Server.

Script

Branch

Enable
Config t
username ISP-3
password cisco
interface g0/0
ip add 192.168.10.1 255.255.255.0
nos
hut
dow
n
int
erf
ace
s0/
0/0
ip add 209.165.201.22 255.255.255.252
encapsulation ppp
ppp authentication chap
no shutdown

5
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

ip dhcp excluded-address 192.168.10.1


192.168.10.5 ip dhcp pool LAN
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server
192.168.30.25
0 router bgp
65010
neighbor 209.165.201.21 remote-as 65535
network 192.168.10.0 mas
255.255.255.0 end

6
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

HQ

Enable
Config t
interface Tunnel10

ip address 10.1.1.2 255.255.255.252


tunnel mode gre ip
tunnel destination 209.165.201.2
tunnel source s0/0/0
no shutdown
interface GigabitEthernet0/0
ip address 192.168.30.1 255.255.255.0
no
shutdown
interfac
e
Serial0/
0/0
ip address 209.165.201.18 255.255.255.252
encapsulation ppp
ppp
authenticat
ion chap no
shutdown
ip domain-name CISCO.com
username admin password
secureaccess username
ISP-2 password cisco
crypto key generate rsa
2048
ip ssh version 2
ip ssh
authentication-
retries 2 ip ssh
time-out 60
line vty 0 4
transport input ssh
ip dhcp excluded-address 192.168.30.1
192.168.30.10 ip dhcp pool LAN
network 192.168.30.0 255.255.255.0
default-router 192.168.30.1
dns-server
192.168.30.25
0 router bgp
65020
neighbor 209.165.201.17 remote-as 65535

7
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

network 192.168.30.0 mask


255.255.255.0 router ospf
100
network 192.168.30.0 0.0.0.255 area 0
network 10.1.1.0 0.0.0.3 area 0
passive-
interface
g0/0 end

8
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Remote

Enable
Config t
interface s0/0/0
ip add 209.165.201.2 255.255.255.0
no
shutdo
wn
interf
ace
tunnel
10
ip address 10.1.1.1 255.255.255.252
tunnel mode gre ip
tunnel destination 209.165.201.18
tunnel source s0/0/0
no shutdown
interface g0/0
ip address 192.168.20.1 255.255.255.0
no shutdown
ip route 0.0.0.0 0.0.0.0 209.165.201.1
router ospf 100
network 192.168.20.0 0.0.0.255 area 0
network 10.1.1.0 0.0.0.3 area 0
passive-
interface
g0/0
end

9
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

10
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Activity Results

11
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

12
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

13
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Conclusiones

1. Se comprende claramente los conceptos de las tecnologías de acceso WAN


realizando configuraciones DHCP, PPP, Conexiones de sucursales de servicios
en VPN implementando el túnel GRE y el análisis en la calidad del servicio (QoS).

2. A través de las simulaciones logramos entender cómo podemos estructurar y


modelar sistemas y responder a ciertas interrogantes del comportamiento de un
sistema real.

3. Las simulaciones desarrolladas en esta actividad nos permitieron implementar y


evidenciar procedimientos llevados gracias a los conocimientos previos y a la
investigación realizada.

4. El uso de estas herramientas nos permiten como futuros profesionales y


diseñadores de red tener una percepción más acertada a cerca de las topologías ,
tecnologías, equipos y configuraciones que se adapten mejor a la aplicación de un
diseño determinado.

14
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Referencias

CISCO SYSTEM. (2018). Capítulo 1. Conceptos de la WAN https://static-course-


assets.s3.amazonaws.com/ConnectNet6/es/index.html#1.0.1.1

CISCO SYSTEM. (2018). Capítulo 2. Conexión punto a punto. Recuperado


de https://static-course-
assets.s3.amazonaws.com/ConnectNet6/es/index.html#2.0.1.1

CISCO SYSTEM. (2018). Capítulo 3. Conexiones de sucursal. Recuperado


de https://static-course-
assets.s3.amazonaws.com/ConnectNet6/es/index.html#3.0.1.1

Hallberg, B. (2003). Conexiones entre WAN. Fundamentos de redes (pp. 79 –90).


McGraw-Hill Interamericana. Recuperado
de http://bibliotecavirtual.unad.edu.co:2077/lib/unadsp/reader.action?ppg=104&docID
=10433903&tm=1498778916673

UNAD (2014). Configuración de Switches y Routers [OVA]. Recuperado


de: https://1drv.ms/u/s!AmIJYei-NT1IhgL9QChD1m9EuGqC

15

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy