CCIE Enterprise Infrastructure - A Complete Guide: Authored by
CCIE Enterprise Infrastructure - A Complete Guide: Authored by
Complete Guide
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 CCIE Enterprise Infrastructure – A
CCDE # 20110020 Complete Guide
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Configuring Layer 2 Technologies –
CCDE # 20110020 Ethernet Switching
SW1
Hostname SW1
!
Interface range E 0/2-3
switchport trunk encapsulation dot1q
switchport mode trunk
SW3
Hostname SW3
!
Interface range E 0/0-1
switchport trunk encapsulation dot1q
switchport mode trunk
Task 2 – Verification
o Verify the Spanning-tree status on SW1 & SW3 by using the “Show
Spanning-tree” command.
o What is the status of the ports on the Root Bridge?
o What is the status of the ports on the non-root bridge?
Physical Diagram
SW1
Task 2 – Verification
SW2
Task 2 – Verification
SW1
o Configure SW2, SW3 & SW4 as the VTP Clients in a Domain called
KBITS.
o Configure is with VTP v2.
o Configure a password of kbits@123.
SW2
Task 3 – Verification
o Verify the VTP Status on the devices using the "Show vtp status"
command.
o Configure the following VLANs: 10, 20, 30, 40, 50, 60, 70 & 80.
SW1
VLAN 10,20,30,40,50,60,70,80
Task 2 – Verification
SW1
Task 2 – Configure Root Bridge selection for VLANs 50, 60, 70 & 80
SW2
Task 3 – Verification
SW1
o Configure SW1 as the preferred Root Switch for MST 1 with SW2
as the backup Root Switch.
o Do not use the "Root Primary" or "Root Secondary" option to
accomplish this step.
SW1
o Configure SW2 as the preferred Root Switch for MST 2 with SW1
as the backup Root Switch.
o Do not use the Priority command to accomplish this task.
SW2
Task 3 – Verification
SW1
SW2
Interface e 1/0
switchport mode access
switchport access vlan 20
SW3
Interface e 0/2
switchport trunk encapsulation dot1q
switchport mode trunk
SW2
Interface e 1/1
switchport mode access
switchport access vlan 30
SW1
ip routing
!
interface vlan 30
ip address 192.168.30.11 255.255.255.0
no shut
SW3
Interface e 0/3
switchport mode access
switchport access vlan 40
SW1
ip routing
!
interface vlan 40
ip address 192.168.40.11 255.255.255.0
no shut
SW4
Interface e 0/3
switchport mode access
switchport access vlan 50
SW2
ip routing
!
interface vlan 50
ip address 192.168.50.22 255.255.255.0
no shut
SW2
ip routing
!
interface vlan 60
ip address 192.168.60.22 255.255.255.0
no shut
SW3
ip routing
!
interface vlan 60
ip address 192.168.60.33 255.255.255.0
no shut
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
32 of 655
Task 7 – Assign ports to VLAN 70 based on the Logical and Physical
Diagram
SW3
Interface e 1/0
switchport mode access
switchport access vlan 70
SW2
Interface e 1/2
switchport mode access
switchport access vlan 70
SW3
ip routing
!
interface vlan 70
ip address 192.168.70.33 255.255.255.0
no shut
SW1
Interface e 1/2
switchport mode access
switchport access vlan 80
SW4
Interface e 0/2
switchport mode access
switchport access vlan 80
Interface Configuration
R1
R2
R4
R5
R6
SW1
SW2
R1
Interface E 0/0
ip address 192.168.10.1 255.255.255.0
duplex full
no shut
Interface E 0/1
ip address 192.168.20.1 255.255.255.0
duplex full
no shut
Interface Loopback0
ip address 1.1.1.1 255.0.0.0
R2
Interface E 0/0
ip address 192.168.10.2 255.255.255.0
duplex full
no shut
Interface E 0/1
ip address 192.168.30.2 255.255.255.0
duplex full
no shut
Interface Loopback0
ip address 2.2.2.2 255.0.0.0
R3
Interface E 0/0
no shut
duplex full
Interface E0/0.1
encapsulation dot1q 20
ip address 192.168.20.3 255.255.255.0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
37 of 655
Interface E0/0.2
encapsulation dot1q 50
ip address 192.168.50.3 255.255.255.0
!
Interface E 0/1
ip address 192.168.80.3 255.255.255.0
duplex full
no shut
Interface Loopback0
ip address 3.3.3.3 255.0.0.0
R4
Interface E 0/0
ip address 192.168.40.4 255.255.255.0
duplex full
no shut
Interface E 0/1
ip address 192.168.50.4 255.255.255.0
duplex full
no shut
Interface Loopback0
ip address 4.4.4.4 255.0.0.0
R5
Interface E 0/0
ip address 192.168.80.5 255.255.255.0
duplex full
no shut
Interface E 0/1
ip address 192.168.70.5 255.255.255.0
duplex full
no shut
Interface Loopback0
ip address 5.5.5.5 255.0.0.0
R6
Interface E 0/0
ip address 192.168.70.6 255.255.255.0
duplex full
no shut
Interface Loopback0
ip address 6.6.6.6 255.0.0.0
SW1
interface loop0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
38 of 655
ip address 11.11.11.11 255.0.0.0
SW2
interface loop0
ip address 22.22.22.22 255.0.0.0
SW3
interface loop0
ip address 33.33.33.33 255.0.0.0
R1
Task 3 – Verification
o Verify that all the Loopback routes are available in the Routing
table and reachable.
o Configuring all the ports that are connected towards the routers
such that they bypass the STP Listening and Learning states.
o They should go into the STP Forwarding state immediately after
been plugged in.
SW1
SW1
SW1
Physical Diagram
SW1
Physical Diagram
SW1
Interface port-channel20
Description Connection towards SW4
Spanning-tree guard root
Physical Diagram
SW1
SW1
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Configuring EIGRP
CCDE # 20110020
Interface Configuration
R1
R3
R4
R5
R6
R7
R8
R1
Hostname R1
!
Interface E 0/0
ip address 192.1.12.1 255.255.255.0
no shut
!
Interface E 0/1
ip address 192.1.13.1 255.255.255.0
no shut
!
Interface Loopback1
ip address 101.1.4.1 255.255.255.0
!
Interface Loopback2
ip address 101.1.5.1 255.255.255.0
!
Interface Loopback3
ip address 101.1.6.1 255.255.255.0
!
Interface Loopback4
ip address 101.1.7.1 255.255.255.0
!
router eigrp 111
network 192.1.12.0
network 192.1.13.0
network 101.0.0.0
R2
Hostname R2
!
Interface E 0/0
ip address 192.1.12.2 255.255.255.0
no shut
!
Interface E 0/1
ip address 192.1.24.2 255.255.255.0
no shut
!
Interface E 0/2
ip address 192.1.25.2 255.255.255.0
no shut
!
Interface E 0/3
ip address 10.10.10.2 255.255.255.0
no shut
!
Interface Loopback1
ip address 202.1.4.1 255.255.255.0
!
Interface Loopback2
ip address 202.1.5.1 255.255.255.0
!
Interface Loopback3
ip address 202.1.6.1 255.255.255.0
!
Interface Loopback4
ip address 202.1.7.1 255.255.255.0
!
Interface Loopback5
ip address 10.1.4.1 255.255.255.0
!
Interface Loopback6
ip address 10.1.5.1 255.255.255.0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
60 of 655
!
Interface Loopback7
ip address 10.1.6.1 255.255.255.0
!
Interface Loopback8
ip address 10.1.7.1 255.255.255.0
!
router eigrp 111
network 192.1.12.0
network 192.1.24.0
network 192.1.25.0
network 10.10.10.0 0.0.0.255
network 10.1.0.0 0.0.255.255
network 202.1.4.0
network 202.1.5.0
network 202.1.6.0
network 202.1.7.0
R3
Hostname R3
!
Interface E 0/0
ip address 192.1.13.3 255.255.255.0
no shut
!
Interface E 0/1
ip address 192.1.34.3 255.255.255.0
no shut
!
Interface E 0/2
ip address 192.1.36.3 255.255.255.0
no shut
!
Interface Loopback1
ip address 203.1.4.1 255.255.255.0
!
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
61 of 655
Interface Loopback2
ip address 203.1.5.1 255.255.255.0
!
Interface Loopback3
ip address 203.1.6.1 255.255.255.0
!
Interface Loopback4
ip address 203.1.7.1 255.255.255.0
!
router eigrp 111
network 192.1.13.0
network 192.1.34.0
network 192.1.36.0
network 203.1.0.0 0.0.255.255
R4
Hostname R4
!
Interface E 0/0
ip address 192.1.24.4 255.255.255.0
no shut
!
Interface E 0/1
ip address 192.1.45.4 255.255.255.0
no shut
!
Interface E 0/2
ip address 192.1.34.4 255.255.255.0
no shut
!
Interface E 0/3
ip address 192.1.47.4 255.255.255.0
no shut
!
Interface Loopback1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
62 of 655
ip address 104.1.8.1 255.255.255.0
!
Interface Loopback2
ip address 104.1.9.1 255.255.255.0
!
Interface Loopback3
ip address 104.1.10.1 255.255.255.0
!
Interface Loopback4
ip address 104.1.11.1 255.255.255.0
!
router eigrp 111
network 192.1.24.0
network 192.1.34.0
network 192.1.45.0
network 192.1.47.0
network 104.1.0.0 0.0.255.255
R5
Hostname R5
!
Interface E 0/0
ip address 192.1.25.5 255.255.255.0
no shut
!
Interface E 0/1
ip address 192.1.45.5 255.255.255.0
no shut
!
Interface Loopback1
ip address 205.1.4.1 255.255.255.0
!
Interface Loopback2
ip address 205.1.5.1 255.255.255.0
!
Interface Loopback3
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
63 of 655
ip address 205.1.6.1 255.255.255.0
!
Interface Loopback4
ip address 205.1.7.1 255.255.255.0
!
router eigrp 111
network 192.1.25.0
network 192.1.45.0
network 205.1.0.0 0.0.255.255
R6
Hostname R6
!
Interface E 0/0
ip address 192.1.36.6 255.255.255.0
no shut
!
Interface E 0/1
ip address 192.1.67.6 255.255.255.0
no shut
!
Interface Loopback1
ip address 101.1.60.1 255.255.255.0
!
Interface Loopback2
ip address 101.1.61.1 255.255.255.0
!
Interface Loopback3
ip address 101.1.62.1 255.255.255.0
!
Interface Loopback4
ip address 101.1.63.1 255.255.255.0
!
router eigrp 111
network 192.1.36.0
network 192.1.67.0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
64 of 655
network 101.1.0.0 0.0.255.255
R7
Hostname R7
!
Interface E 0/0
ip address 192.1.47.7 255.255.255.0
no shut
!
Interface E 0/1
ip address 192.1.67.7 255.255.255.0
no shut
!
Interface Loopback1
ip address 101.1.72.1 255.255.255.0
!
Interface Loopback2
ip address 101.1.73.1 255.255.255.0
!
Interface Loopback3
ip address 101.1.74.1 255.255.255.0
!
Interface Loopback4
ip address 101.1.75.1 255.255.255.0
!
router eigrp 111
network 192.1.47.0
network 192.1.67.0
network 101.1.0.0 0.0.255.255
R8
Hostname R8
!
Interface E 0/0
ip address 10.10.10.8 255.255.255.0
no shut
!
Interface Loopback1
ip address 10.1.8.1 255.255.255.0
!
Interface Loopback2
ip address 10.1.9.1 255.255.255.0
!
Interface Loopback3
ip address 10.1.10.1 255.255.255.0
!
Interface Loopback4
ip address 10.1.11.1 255.255.255.0
!
router eigrp 111
network 0.0.0.0
o Configure all routers in EIGRP 111 such that they do not send
updates on links that do not have other routers, basically
Loopbacks.
o Use the minimum number of passive interface commands to
accomplish the task.
R1 R2
R1 R2
R1 R2
Task 1 – Verifying Equal Cost Load Balancing between R1, R2, R3 &
R4.
R2
R5
R1 R6
R2 R8
R2 R8
R1 R2
R1
Interface E 0/0
Ip summary-address eigrp 111 101.1.4.0 255.255.252.0
!
Interface E 0/1
Ip summary-address eigrp 111 101.1.4.0 255.255.252.0
R2
Interface E 0/0
Ip summary-address eigrp 111 10.1.4.0 255.255.252.0
Ip summary-address eigrp 111 102.1.4.0 255.255.252.0
Ip summary-address eigrp 111 202.1.4.0 255.255.252.0
!
Interface E 0/1
Ip summary-address eigrp 111 10.1.4.0 255.255.252.0
Ip summary-address eigrp 111 102.1.4.0 255.255.252.0
Ip summary-address eigrp 111 202.1.4.0 255.255.252.0
!
Interface E 0/2
Ip summary-address eigrp 111 10.1.4.0 255.255.252.0
Ip summary-address eigrp 111 102.1.4.0 255.255.252.0
Ip summary-address eigrp 111 202.1.4.0 255.255.252.0
!
Interface E 0/3
Ip summary-address eigrp 111 10.1.4.0 255.255.252.0
Ip summary-address eigrp 111 102.1.4.0 255.255.252.0
Ip summary-address eigrp 111 202.1.4.0 255.255.252.0
R3
Interface E 0/0
Ip summary-address eigrp 111 203.1.4.0 255.255.252.0
!
Interface E 0/1
Ip summary-address eigrp 111 203.1.4.0 255.255.252.0
!
Interface E 0/2
Ip summary-address eigrp 111 203.1.4.0 255.255.252.0
R4
Interface E 0/0
Ip summary-address eigrp 111 104.1.8.0 255.255.252.0
!
Interface E 0/1
Ip summary-address eigrp 111 104.1.8.0 255.255.252.0
!
Interface E 0/2
Ip summary-address eigrp 111 104.1.8.0 255.255.252.0
R5
Interface E 0/0
Ip summary-address eigrp 111 205.1.4.0 255.255.252.0
!
Interface E 0/1
Ip summary-address eigrp 111 205.1.4.0 255.255.252.0
R6
Interface E 0/0
Ip summary-address eigrp 111 101.1.60.0 255.255.252.0
!
Interface E 0/1
Ip summary-address eigrp 111 101.1.60.0 255.255.252.0
R7
Interface E 0/0
Ip summary-address eigrp 111 107.1.72.0 255.255.252.0
!
Interface E 0/1
Ip summary-address eigrp 111 107.1.72.0 255.255.252.0
R8
Interface E 0/0
Ip summary-address eigrp 111 10.1.8.0 255.255.252.0
Ip summary-address eigrp 111 108.1.4.0 255.255.252.0
R7
R8
Interface loopback401
Ip address 178.1.1.1 255.255.255.0
Interface loopback402
Ip address 178.1.2.1 255.255.255.0
Interface loopback403
Ip address 178.1.3.1 255.255.255.0
Interface loopback404
Ip address 178.1.4.1 255.255.255.0
!
Router eigrp 111
Network 178.1.0.0
Task 2
R2 should block the 178.1.1.0/24 & 178.1.4.0/24 networks from coming
in from R8.
R2
Task 3
Configure the following Loopback Interfaces on R3:
R3
Interface loopback401
Ip address 173.1.1.1 255.255.255.0
Interface loopback402
Ip address 173.1.2.1 255.255.255.0
Interface loopback403
Ip address 173.1.3.1 255.255.255.0
Interface loopback404
Ip address 173.1.4.1 255.255.255.0
Interface loopback405
Ip address 173.1.5.1 255.255.255.0
Interface loopback406
Ip address 173.1.6.1 255.255.255.0
Interface loopback407
Ip address 173.1.7.1 255.255.255.0
Interface loopback408
Ip address 173.1.8.1 255.255.255.0
!
Router eigrp 111
Network 173.1.0.0
Task 4
R3 should only send routes from the 173.1.X.0 range that have an even
number in the 3rd Octet to all its neighbors. Use the minimum number of
lines possible to accomplish this task.
R3
Task 1
Configure the following Loopback Interfaces on R5 and advertise them
under EIGRP 111:
R5
Interface loopback401
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
86 of 655
Ip address 175.50.1.1 255.255.255.0
Interface loopback402
Ip address 175.50.2.1 255.255.255.0
Interface loopback403
Ip address 175.50.3.1 255.255.255.0
Interface loopback404
Ip address 205.1.1.33 255.255.255.224
Interface loopback405
Ip address 205.1.1.65 255.255.255.240
!
Router eigrp 111
Network 175.50.0.0
Network 205.1.1.0
Task 2
Configure R2 & R4 such that they receive prefixes with a prefix-length of
8 to 24 from R5. Do not configure the filtering on R5.
R2
Task 3
Configure the following Loopback Interfaces on R6 and advertise them
under EIGRP 111:
R6
Interface loopback401
Ip address 176.1.32.1 255.255.224.0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
87 of 655
Interface loopback402
Ip address 176.1.64.1 255.255.240.0
Interface loopback403
Ip address 176.1.80.1 255.255.248.0
Interface loopback404
Ip address 176.1.96.1 255.255.255.0
!
Router eigrp 111
Network 176.1.0.0
Task 4
Configure R6 such it does not send networks in the 176.1.0.0/16 major
network range that have a mask greater than 20.
R6
R1
R1
R4
Task 2
Configure MD5 authentication between R2 & R8. Use a Key Chain R2R8
with a key string of 28 and a key string of Cisco@28.
R2
Interface Configuration
R1
R2
R3
R4
R5
R6
R7
R8
R10
R11
R12
R13
R1
router rip
version 2
no auto-summary
network 192.1.18.0
network 201.1.4.0
network 201.1.5.0
network 201.1.6.0
network 201.1.7.0
R8
router rip
version 2
no auto-summary
network 192.1.18.0
network network 10.0.0.0
R1
Task 3 – Configure EIGRP 200 between R3, R4, R5, R6 & R7.
R3
R4
R5
Router ospf 1
Router-id 0.0.0.5
Network 192.1.50.0 0.0.0.255 area 0
Network 205.1.4.0 0.0.0.255 area 0
Network 205.1.5.0 0.0.0.255 area 0
Network 205.1.6.0 0.0.0.255 area 0
Network 205.1.7.0 0.0.0.255 area 0
R10
Router ospf 1
Router-id 0.0.0.10
Network 192.1.50.0 0.0.0.255 area 0
Network 10.1.0.0 0.0.255.255 area 0
Task 6 – Configure OSPF in Area 0 between R6, R7, R11, R12 & R13.
R6
Router ospf 1
Router-id 0.0.0.6
Network 192.1.61.0 0.0.0.255 area 0
Network 206.1.4.0 0.0.0.255 area 0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
110 of 655
Network 206.1.5.0 0.0.0.255 area 0
Network 206.1.6.0 0.0.0.255 area 0
Network 206.1.7.0 0.0.0.255 area 0
R7
Router ospf 1
Router-id 0.0.0.7
Network 192.1.71.0 0.0.0.255 area 0
Network 207.1.4.0 0.0.0.255 area 0
Network 207.1.5.0 0.0.0.255 area 0
Network 207.1.6.0 0.0.0.255 area 0
Network 207.1.7.0 0.0.0.255 area 0
R11
Router ospf 1
Router-id 0.0.0.11
Network 192.1.61.0 0.0.0.255 area 0
Network 192.1.113.0 0.0.0.255 area 0
Network 10.1.0.0 0.0.255.255 area 0
R12
Router ospf 1
Router-id 0.0.0.12
Network 192.1.71.0 0.0.0.255 area 0
Network 192.1.123.0 0.0.0.255 area 0
Network 10.1.0.0 0.0.255.255 area 0
R13
Router ospf 1
Router-id 0.0.0.13
Network 192.1.113.0 0.0.0.255 area 0
Network 192.1.123.0 0.0.0.255 area 0
Network 10.1.0.0 0.0.255.255 area 0
Task 1
You would like to provide reachability between the Static Routing and
EIGRP 200 domains. Configure Route Redistribution of Static Routes on
R4. R9 is already configured with a Default Route towards R4.
R4
Verification:
➢ Try Pinging 10.1.96.1 (R9’s Loopback) from R5. Are you successful?
➢ Try Pinging 192.1.49.9 (R9’s E0/0 IP) from R5. Are you successful?
R4
Route-map RC
Match interface E0/3
!
Router eigrp 200
Redistribute connected route-map RC
Task 1
You would like to provide reachability between the RIPv2 and EIGRP 100
domains. Configure Mutual Route Redistribution of RIPv2 & EIGRP on
R1. Use a metric of your choice.
R1
OR
Task 1
You would like to provide reachability between the EIGRP 100 and
EIGRP 200 domains. Configure Mutual Route Redistribution on R3 to
redistribute between the 2 domains.
R3
Task 1
You would like to provide reachability between the EIGRP 200 and OSPF
by performing redistribution on R5. We will look at the redistribution for
the bigger OSPF domain in a later lab.
R5
Task 1
Networks 202.1.4.0/24 & 202.1.6.0/24 networks should not be
redistributed into EIGRP 200. Re-configure Redistribution on R3 to fullfil
the requirement.
R3
R4
Task 1
You are required to block the RIPv2 routes from propagating into the
OSPF domain and vice-versa. Use a Mechanism that ensures that if new
routes are added into the RIP or OSPF domains, they continue to get
blocked from propagating to each other without having to do any further
configurations.
Route-map R2E
Set tag 123
!
Router eigrp 100
Redistribute rip metric 1000 100 255 1 1500 route-map R2E
R5
Route-map O2E
Set tag 456
!
Router eigrp 200
Redistribute ospf 1 metric 10 10 10 10 10 route-map O2E
R1
Task 1
EIGRP 200 & OSPF (Southbound) need to redundancy with
Redistribution. Redistribution needs to be configured on R6 & R7. R6
should be the preferred router to connect the 2 domains. Make sure that
the routes are blocked from coming back into the Source Domain.
R3
interface Ethernet0/1
bfd interval 300 min_rx 300 multiplier 3
!
Router eigrp 200
Bfd interface e 0/1
R4
interface Ethernet0/0
bfd interval 300 min_rx 300 multiplier 3
!
interface Ethernet0/1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
124 of 655
bfd interval 300 min_rx 300 multiplier 3
!
interface Ethernet0/2
bfd interval 300 min_rx 300 multiplier 3
!
Router eigrp 200
Bfd all-interface
R5
interface Ethernet0/0
bfd interval 300 min_rx 300 multiplier 3
!
interface Ethernet0/1
bfd interval 300 min_rx 300 multiplier 3
!
Router eigrp 200
Bfd all-interface
R6
interface Ethernet0/0
bfd interval 300 min_rx 300 multiplier 3
!
Router eigrp 200
Bfd interface E0/0
R7
interface Ethernet0/0
bfd interval 300 min_rx 300 multiplier 3
!
Router eigrp 200
Bfd interface E0/0
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Configuring OSPF
CCDE # 20110020
R1
R2
R5
R6
R8
Task 1
Configure OSPF all the Broadcast Multi-Access (BMA) Ethernet network
in Area 10. Enable OSPF on all loopbacks on all routers. Hard Code the
Router-id based on the following:
R1 – 0.0.0.1
R2 – 0.0.0.2
R3 – 0.0.0.3
R4 – 0.0.0.4
R6 – 0.0.0.6
R7 – 0.0.0.7
R11 – 0.0.0.11
R1 R2
Task 2
Configure the routers such that R1 becomes the DR and R2 as the BDR
on the 192.1.100.0/24 Network. R3 should be the DR & R4 should be
the BDR for the 192.1.103.0/24 network.
R1 R2
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
129 of 655
Interface E 0/0 Interface E 0/0
Ip ospf priority 100 Ip ospf priority 50
R3 R4
Note: Issue the Clear ip ospf process command to reset the OSPF
process for the change to take effect.
Task 1
Run OSPF as your Routing Protocol on the Serial Networks between R2,
R4 & R5 in Area 10. Enable OSPF on the Loopback interface on R5.
Configure the Router ID of R5 as 0.0.0.5.
R2
router ospf 1
network 192.1.101.0 0.0.0.255 area 10
R4
router ospf 1
network 192.1.102.0 0.0.0.255 area 10
R5
router ospf 1
router-id 0.0.0.5
network 5.0.0.0 0.255.255.255 area 10
network 192.1.101.0 0.0.0.255 area 10
network 192.1.102.0 0.0.0.255 area 10
Task 1
Configure R7, R8 & R9 in Area 0. Don’t enable the Loopback Interface of
R9 in OSPF. The Router ID’s for R8 & R9 should be 0.0.0.8 & 0.0.0.9
respectively. Make sure that the neighbor relationships in Area 0 are
established bypassing the DR & BDR election wait time.
R7
router ospf 1
network 192.1.78.0 0.0.0.255 area 0
!
Interface E 0/1
Ip ospf network point-to-point
R8
router ospf 1
router-id 0.0.0.8
network 8.0.0.0 0.255.255.255 area 0
network 192.1.78.0 0.0.0.255 area 0
network 192.1.89.0 0.0.0.255 area 0
!
Interface E 0/0
Ip ospf network point-to-point
!
Interface E 0/1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
132 of 655
Ip ospf network point-to-point
R9
router ospf 1
router-id 0.0.0.9
network 192.1.89.0 0.0.0.255 area 0
Task 2
Make sure that all OSPF Loopbacks networks appear with the Interface
mask. They should not appear as a Host Route.
R1 R2
Task 1
Configure Unicast-based OSPF between R6 & R7.
R6
Interface E 0/1
Ip ospf network non-broadcast
!
Router ospf 1
Neighbor 192.1.67.7
R6
Interface E 0/1
Ip ospf network non-broadcast
!
Router ospf 1
Neighbor 192.1.67.6
Task 1
Configure EIGRP in AS 111 between R9 & R10. Enable all loopbacks on
the 2 routers in EIGRP.
R9
Task 2
Configure Mutual Route Redistribution between OSPF & EIGRP on R9.
Use Seed Metrics of your choice.
R9
Verification:
R1
R2
R4
R5
R6
R8
Task 1
Configure OSPF in Area 0 between R1, R2 & R3. Besides the physical
links, enable the Loopback 0 interfaces of all 3 routers in Area 0.
Loopbacks should be advertised with the Interface Mask. Hard Code the
Router-id based on the following:
R1 – 0.0.0.1
R2 – 0.0.0.2
R3 – 0.0.0.3
R1 R2
Router OSPF 1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
139 of 655
Router-id 0.0.0.3
Network 3.0.0.0 0.255.255.255 area 0
Network 192.1.13.0 0.0.0.255 area 0
!
Interface Loopback0
Ip ospf network point-to-point
Task 2
Configure OSPF in Area 10 between R2, R4, R10 & R11. Besides the
physical links, enable the Loopback 1 interface on R2 and all the
loopbacks of the other 3 routers in Area 10. Loopbacks should be
advertised with the Interface Mask. Hard Code the Router-id based on
the following:
R4 – 0.0.0.4
R10 – 0.0.0.10
R11 – 0.0.0.11
R2 R4
R3 R5
Router OSPF 1
Router-id 0.0.0.6
Network 6.0.0.0 0.255.255.255 area 20
Network 192.1.56.0 0.0.0.255 area 20
!
Interface Loopback0
Ip ospf network point-to-point
R1 R7
Task 5
Configure EIGRP is AS 222 between R6 & R9. Enable all loopbacks on R9
in EIGRP 222. Enable Loopback 1 on R6 in EIGRP 222.
R6 R9
Task 6
Configure Mutual Redistribution between the appropriate routers to
allow end-to-end connectivity between all routing domains. Use Seed
metric of your choice.
R1 R6
Task 1
Configure Route Summarization on the appropriate ABR to summarize
all the R11 Loopbacks.
R2
Router ospf 1
Area 10 range 111.111.100.0 255.255.252.0
Task 1
Configure Route Summarization on the appropriate ASBR to summarize
all the routes from the 107.0.0.0/8 major network towards OSPF. Use
the longest mask for Route Summarization.
R1
Router ospf 1
Summary-address 107.7.72.0 255.255.252.0
Task 1
Configure LSA Filtering such that network 4.0.0.0/8 is not allowed to
leave Area 10.
R2
Task 1
Configure the most secure authentication on all routers in Area's 0. Use
a key of 1 and a key-string ccie123.
R1
interface E 0/0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 ccie123
!
interface E 0/1
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 ccie123
R2
interface E 0/0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 ccie123
R3
Task 2
Configure text authentication on all routers in 10. Use a key-string
cisco.
R2
interface E 0/1
ip ospf authentication
ip ospf authentication-key cisco
R4
interface E 0/0
ip ospf authentication
ip ospf authentication-key cisco
!
interface E 0/1
ip ospf authentication
ip ospf authentication-key cisco
R10
interface E 0/0
ip ospf authentication
ip ospf authentication-key cisco
!
interface E 0/1
ip ospf authentication
ip ospf authentication-key cisco
R11
interface E 0/0
ip ospf authentication
ip ospf authentication-key cisco
Task 1
Configure Area 10 such that it does not receive any External Routes. It
should maintain connectivity to the External Routes. (Stub Area)
R2 R4
Task 2
This step is a continuation of Task 1. Area 10 should also block Inter-
Area routes maintaining reachability to them. (Totally Stubby Area)
R2
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
148 of 655
Router ospf 1
Area 10 stub no-summary
Note: The ABR will block the Inter-Area Routes from getting
propagating into Area 10. Instead R2 will inject a default route
instead. This is a Totally Stubby Area. Verify it on R4, R10 & R11 by
checking the Routing table.
Task 3
Configure Area 20 such that it does not receive any external routes from
the backbone. The External routes from EIGRP 222 should continue to
be received in Area 20 and propagated into the Backbone. (NSSA Area)
R3
Router ospf 1
Area 20 nssa
R5
Router ospf 1
Area 20 nssa
R6
Router ospf 1
Area 20 nssa
Note: The ABR will block the External routes from the Backbone
(EIGRP). Area 20 will continue to receive the external routes from
EIGRP 222 as N routes. These routes will continue to be propagated
towards the backbone. The ABR will convert the N routes into E
routes as it propagates it into the Backbone. You will receive
reachability to the External Routes from the Backbone as the ABR
does not inject a default route in this configuration.
Task 4
This step is a continuation of Task 3. Configure Area 20 such that the
previous requirement is maintained but Area 20 should also have
reachability to the external routes from the backbone (EIGRP Routes).
(NSSA-Stub Area)
R3
Router ospf 1
Area 20 stub default-information-originate
Note: This builds on the NSSA area by regaining reachability to the
Backbone external routes. This is done by having the ABR injecting
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
149 of 655
the default route into Area 20.
Task 5
Configure Area 20 such that the Inter-Area routes are also blocked in
addition to the external routes from the backbone. (NSSA-Totally
Stubby Area)
R3
Router ospf 1
Area 20 nssa no-summary
R1
R2
R4
R5
R6
Task 1
Configure OSPF in Area 0 between R1, R7 & R8. Besides the physical
links, enable the Loopback 0 interfaces of all 3 routers in Area 0.
Loopbacks should be advertised with the Interface Mask. Hard Code the
Router-id based on the following:
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
152 of 655
R1 – 0.0.0.1
R7 – 0.0.0.7
R8 – 0.0.0.8
R1 R7
Router OSPF 1
Router-id 0.0.0.8
Network 8.0.0.0 0.255.255.255 area 0
Network 192.1.18.0 0.0.0.255 area 0
!
Interface Loopback0
Ip ospf network point-to-point
Task 2
Configure OSPF in Area 10 between R1, R2 & R3. Besides the physical
links, enable the Loopback 0 interfaces of R2 & R3 in Area 10. R1
Loopback1 should also be enabled in area 10. Loopbacks should be
advertised with the Interface Mask. Hard Code the Router-id based on
the following:
R2 – 0.0.0.2
R3 – 0.0.0.3
R1 R2
Router OSPF 1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
153 of 655
Router-id 0.0.0.3
Network 3.0.0.0 0.255.255.255 area 10
Network 192.1.13.0 0.0.0.255 area 10
!
Interface Loopback0
Ip ospf network point-to-point
Task 3
Configure OSPF in Area 20 between R3, R4 & R5. Besides the physical
links, enable the Loopback 0 interfaces of R4 & R5 in Area 20. R3
Loopback1 should also be enabled in area 20. Loopbacks should be
advertised with the Interface Mask. Hard Code the Router-id based on
the following:
R4 – 0.0.0.4
R5 – 0.0.0.5
R3 R4
Router OSPF 1
Router-id 0.0.0.5
Network 5.0.0.0 0.255.255.255 area 20
Network 192.1.45.0 0.0.0.255 area 20
!
Interface Loopback0
Ip ospf network point-to-point
R1
router ospf 1
area 10 virtual-link 0.0.0.3
R3
router ospf 1
area 10 virtual-link 0.0.0.1
Task 5
Configure OSPF in Area 30 between R5 & R6. Besides the physical links,
enable the Loopback 0 interfaces of R6 in Area 30. R5 Loopback1 should
also be enabled in area 30. Loopbacks should be advertised with the
Interface Mask. Hard Code the Router-id based on the following:
R6 – 0.0.0.6
R5 R6
Task 6
Configure a Virtual Link between the appropriate devices to allow Area
30 to communicate to the rest of the network.
R3
router ospf 1
area 20 virtual-link 0.0.0.5
R5
router ospf 1
area 20 virtual-link 0.0.0.3
Task 1
Configure BFD between all routers in area 0. Configure the BFD Interface
interval to be 300 for sending and receiving. A neighbor should be
deemed dead is the router misses 3 hellos.
R1 R7
Interface E 0/0
bfd interval 300 min_rx 300 multiplier 3
!
Router ospf 1
bfd all-interfaces
R1
Task 1
Configure OSPF in Area 0 between R1, R2, R3 & R4. Besides the physical
links, enable the Loopback 0 interfaces of all 4 routers in Area 0.
Loopbacks should be advertised with the Interface Mask. Hard Code the
Router-id based on the following:
R1 – 0.0.0.1
R2 – 0.0.0.2
R3 – 0.0.0.3
R4 – 0.0.0.4
R1 R2
R1 R2
R3 R4
Task 3
Verify the routing table and CEF on R1 for Network 4.0.0.0/8. It should
have a single path via R2 (Lower cost)
R1
R1
Router ospf 1
fast-reroute per-prefix enable area 0 prefix-priority low
R2
Router ospf 1
fast-reroute per-prefix enable area 0 prefix-priority low
R3
Router ospf 1
fast-reroute per-prefix enable area 0 prefix-priority low
R4
Router ospf 1
fast-reroute per-prefix enable area 0 prefix-priority low
Task 5
Verify the routing table and CEF on R1 for Network 4.0.0.0/8. It should
have a repair path via R3 (higher cost) installed and ready in case the
lower cost route goes down.
R1
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Configuring BGP
CCDE # 20110020
R1
R3 R5
Task 2
Configure a BGP neighbor relationship between R4 and R6. R4 should be
in AS 200 and R6 should be in AS 600. Advertise the loopback networks
in BGP. Hard-code the Router ID for the BGP routers as 44.44.44.44 for
R4 and 66.66.66.66 for R6.
R4 R6
Task 1
Configure a Static route on R1 & R2 to reach each others Loopback 99
via the 2 directed connected links.
R1
Task 2
Configure a BGP neighbor relationship between R1 & R2 in AS 100 & AS
200 respectively. Use Loopback99 address for the peering.
R1 R2
Task 1
Inject Loopback0 & Loopback1 networks on R1 into BGP. Make sure that
the routes appear with an origin code of “i” in the BGP table.
R1
Task 1
Configure MD5 Authentication between all eBGP peers using a password
of ccie123.
R1 R2
Task 1
Configure IS-IS as the IGP to route the Loopback10 networks within AS
200. Configure IS-IS with a 24-bit metric. The IS-IS neighbors should
maintain a Level-2 database only. Use the following for the NET address:
R2 – 49.0000.2222.2222.2222.00
R3 – 49.0000.3333.3333.3333.00
R4 – 49.0000.4444.4444.4444.00
R2 R3
Router isis
Net 49.0000.4444.4444.4444.00
Is-type level-2
Metric-style wide
!
Interface loopback10
Ip router isis
!
Interface E 0/0
Ip router isis
!
Interface E 0/1
Ip router isis
Task 2
Configure an iBGP neighbor relationship between R2 & R3. The neighbor
relationship should be configured with redundancy in mind. Make sure
that the eBGP routes are propagated and injected into the BGP table.
R2 R2
Task 3
Configure an iBGP neighbor relationship between R3 & R4. The neighbor
relationship should be configured with redundancy in mind. Make sure
that the eBGP routes are propagated and injected into the BGP table.
R3 R4
➢ Try the reachability between the AS 100 & AS 600 loopbacks? Are
they reachable?
Task 4
Re-configure R3 such that it propagates the routes from R2 towards R4
and vice versa. Use Peer-group to accomplish this task.
R3
Verification:
➢ Try the reachability between the AS 100 & AS 600 loopbacks? Are
they reachable?
Task 5
You would like the RR to be an “inline RR”. This is for the purpose of
future Data Filtering. Configure R3 to accomplish this.
R3
Task 1
Create the following Loopbacks on R2
Loopback 1 – 192.2.1.1/24
Loopback 2 – 192.2.2.1/24
Loopback 3 – 192.2.3.1/24
Loopback 4 – 192.2.4.1/24
Loopback 5 – 192.2.5.1/24
Loopback 6 – 192.2.6.1/24
Loopback 7 – 192.2.7.1/24
Loopback 8 – 192.2.8.1/24
R2
interface Loopback1
ip address 192.2.1.1 255.255.255.0
!
interface Loopback2
ip address 192.2.2.1 255.255.255.0
!
interface Loopback3
ip address 192.2.3.1 255.255.255.0
!
interface Loopback4
ip address 192.2.4.1 255.255.255.0
!
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
172 of 655
interface Loopback5
ip address 192.2.5.1 255.255.255.0
!
interface Loopback6
ip address 192.2.6.1 255.255.255.0
!
interface Loopback7
ip address 192.2.7.1 255.255.255.0
!
interface Loopback8
ip address 192.2.8.1 255.255.255.0
Task 2
Advertise the newly created routes in BGP. Do not use the network
command to accomplish this. These routes should have an origin code of
“igp”.
R2
R2
Task 4
Configure R3 such that it blocks all the 192.2.X.0 routes that have an
even number in the third octet from propagating from R2. Use the
distribute-list command to accomplish this task.
R3
Task 1
Create the following Loopbacks on R3
Loopback 1 – 150.3.16.1/20
Loopback 2 – 150.3.36.1/22
Loopback 3 – 150.3.40.1/22
Loopback 4 – 150.3.50.1/23
Loopback 5 – 150.3.65.1/24
Loopback 6 – 150.13.0.1/16
Loopback 7 – 150.14.64.1/18
R3
interface Loopback1
ip address 150.3.16.1 255.255.240.0
!
interface Loopback2
ip address 150.3.36.1 255.255.252.0
!
interface Loopback3
ip address 150.3.40.1 255.255.252.0
!
interface Loopback4
ip address 150.3.50.1 255.255.254.0
!
interface Loopback5
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
175 of 655
ip address 150.3.65.1 255.255.255.0
!
interface Loopback6
ip address 150.13.0.1 255.255.0.0
!
interface Loopback7
ip address 150.14.64.1 255.255.192.0
Task 2
Advertise the newly created routes in BGP using the Network command.
R3
Task 3
Configure R2 such that it blocks all the 150.X.X.0 routes that have a
subnet mask between 17 and 23 bits coming in from R3.
R2
Task 1
Configure BGP such that AS 500 does not use AS 200 as a transit AS.
Configuration should be done in AS 500.
R5
Task 2
Configure BGP such that AS 100 does not use AS 200 to get AS 500
routes. Configuration should be done in AS 200. You are only allowed a
single line in the AS-path filter.
R2
Task 1
Create the following Loopbacks on R3 and advertise them under BGP:
Loopback 1 – 203.1.4.1/24
Loopback 2 – 203.1.5.1/24
Loopback 3 – 203.1.6.1/24
Loopback 4 – 203.1.7.1/24
R3
interface Loopback1
ip address 203.1.4.1 255.255.255.0
!
interface Loopback2
ip address 203.1.5.1 255.255.255.0
!
interface Loopback3
ip address 203.1.6.1 255.255.255.0
!
interface Loopback4
ip address 203.1.7.1 255.255.255.0
!
Router BGP 200
Network 203.1.4.0
Network 203.1.5.0
Network 203.1.6.0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
178 of 655
Network 203.1.7.0
Task 2
Configure Route Aggregation on R3 such that these routes are
summarized as a single route. Only the Summary route should be send
to R3’s neighbors.
R3
Task 1
Create the following Loopbacks on R4 and advertise them under BGP:
Loopback 1 – 204.1.4.1/24
Loopback 2 – 204.1.5.1/24
Loopback 3 – 204.1.6.1/24
Loopback 4 – 204.1.7.1/24
R4
interface Loopback1
ip address 204.1.4.1 255.255.255.0
!
interface Loopback2
ip address 204.1.5.1 255.255.255.0
!
interface Loopback3
ip address 204.1.6.1 255.255.255.0
!
interface Loopback4
ip address 204.1.7.1 255.255.255.0
!
Router BGP 200
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
180 of 655
Network 204.1.4.0
Network 204.1.5.0
Network 204.1.6.0
Network 204.1.7.0
Task 2
Configure Route Aggregation on R4 such that these routes are
summarized as a single route. Only the Summary Route should be sent
towards the eBGP neighbor (R6). Only the Specific Routes should be sent
towards the iBGP neighbor (R3). The routes should not be seen as
suppressed on R4.
R4
Task 1
Create the following Loopbacks on R2 and advertise them under BGP:
Loopback 1 – 202.1.4.1/24
Loopback 2 – 202.1.5.1/24
Loopback 3 – 202.1.6.1/24
Loopback 4 – 202.1.7.1/24
R2
interface Loopback1
ip address 202.1.4.1 255.255.255.0
!
interface Loopback2
ip address 202.1.5.1 255.255.255.0
!
interface Loopback3
ip address 202.1.6.1 255.255.255.0
!
interface Loopback4
ip address 202.1.7.1 255.255.255.0
!
Router BGP 234
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
182 of 655
Network 202.1.4.0
Network 202.1.5.0
Network 202.1.6.0
Network 202.1.7.0
Task 2
Configure Route Aggregation on R2 such that these routes are
summarized as a single route. Only the Summary route and the
202.1.5.0 route should be send to R2’s neighbors. The other specific
routes should be seen as suppressed on R2.
R2
R1
R4
R5
R6
R8
R9
R10
R11
R1 R2
Task 2
Configure iBGP neighbor relationships between R1 & R2 in AS 12.
Configure the neighbor relationship based on a private loopback address.
Use EIGRP 12 as the underlay IGP.
R1 R2
R1 R3
Task 4
Configure eBGP neighbor relationships between R2 in AS 12 and R4 in
AS 1000. Advertise all public loopback networks on R4 in BGP.
R2 R4
Task 5
Configure iBGP neighbor relationships between R3 & R4 in AS 1000.
Configure the neighbor relationship based on the physical link.
R3 R4
R3 R6
Task 7
Configure iBGP neighbor relationships between R3 & R5 in AS 1000.
Configure the neighbor relationship based on the physical link.
R3 R5
Task 8
Configure eBGP neighbor relationships between R4 in AS 1000 with R7 &
R8 in AS 2000. Advertise all public loopback networks in BGP on R7 &
R8.
R7 R8
R7 R8
Router isis
Net 49.0000.9999.9999.9999.00
Is-type level-2
!
Interface E 0/0
Ip router isis
!
Interface E 0/1
Ip router isis
!
Interface Loopback10
Ip router isis
!
Router BGP 2000
Network 9.0.0.0
Network 99.9.9.0 mask 255.255.255.0
Neighbor IBGP peer-group
Neighbor IBGP remote-as 2000
Task 10
Configure eBGP neighbor relationships between R9 in AS 2000 and R11
in AS 110. Advertise all public loopback networks on R11 in BGP.
R9
Task 1
Configure AS 2000 such that it prefers the Link between R4-R7 for traffic
leaving AS 2000 towards AS 1000.
R7
R8
Task 1
Configure AS 2000 such that it prefers the Link between R4-R8 for traffic
entering AS 2000 from AS 1000.
R7
Task 1
Configure R8 such that all traffic towards AS1000 should use the Link
between R4 & R8 as the preferred link. This should only affect the local
router and not the rest of the AS.
R8
route-map SETWT
set weight 88
!
router bgp 2000
neighbor 192.1.48.4 route-map SETWT in
Task 1
De-configure the Route-map from the previous 3 labs. This is done so
that we can accomplish the same tasks using the AS-Path attribute
R7
No route-map SETATT
No route-map SETMED
!
router bgp 2000
no neighbor 192.1.47.4 route-map SETATT in
no neighbor 192.1.47.4 route-map SETMED out
R8
No route-map SETATT
No route-map SETWT
!
router bgp 2000
no neighbor 192.1.48.4 route-map SETATT in
no neighbor 192.1.48.4 route-map SETWT in
R8
Task 3
Configure AS 2000 such that it prefers the Link between R4-R8 for traffic
entering AS2000 from AS1000. Use the AS-Path attribute to accomplish
this task.
R7
Task 1
AS110 wants to limit the propagation of 111.0.0.0/8 network to AS2000
only. AS2000 should not export this route outside AS2000. Use the
appropriate Community attribute to accomplish this.
R11
Task 1
AS110 wants to limit the propagation of 112.112.1112.0/24 network to
R9 only. R9 should not forward this network to anyone including the
iBGP Neighbors. Use the appropriate Community attribute to accomplish
this.
R11
Task 1
De-configure the Route-map from the previous 3 labs. This is done so
that we have all the routes present for the next set of labs.
R8
no route-map SETAS
!
router bgp 2000
no neighbor 192.1.48.4 route-map SETAS in
R7
no route-map SETCOMM
!
router bgp 110
no neighbor 192.1.190.9 route-map SETCOMM out
R7
Interface Loopback99
ip address 10.77.77.77 255.255.255.255
!
router bgp 2000
network 10.77.77.77 mask 255.255.255.255
Task 3
Configure a route-map on R8 to classify the route that will be
conditionally advertised.
R8
Task 4
Configure a route-map on R8 to call an ACL that will indicate the
absence of the 10.77.77.77/32 route.
R8
Task 5
Configure the Conditional Advertisement of the 111.0.0.0/8 &
112.112.112.0/24 routes from R8 to R4 only if R7 is down.
R8
Task 1
Configure R10 to allow it to inject multiple routes on the Links between
R10-R1 & R10-R2 (eBGP Neighbors).
R10
Task 2
Configure R9 to allow it to inject multiple routes on the Links between
R9-R7 & R9-R8 (iBGP Neighbors).
R9
R3
Task 1
Check the routing table of R6. Does it have all the routes from AS2000 &
AS110?
Task 2
Configure R3 to redistribute iBGP routes into IGP.
R3
Task 1
Configure R3 as the Route Reflector between R4 & R5. Make sure to
change the next-hop to R3.
R3
R1
R2
R4
R5
R6
R7
R9
R11
R12
Task 1
Configure EIGRP 111 as the underlay IGP to route the Loopback 10
networks on the underlay networks.
R1 R2
Task 2
Configuring iBGP between the ASBR (R1,R2,R3 & R4) and the RR (R9)
based on Loopbacks. Configure R9 such that it accepts neighbor
requests from any router from the 172.16.1.0/24 subnet. Authenticate
the neighbor relationship with a password of ccie12353. Advertise the
Loopback 0 networks on ASBRs in BGP.
R1 R2
R1
Task 1
Configure a relationship between the Customer (R12) and AS 800. The
Customer should use AS 65012 as the AS #. Advertise the Loopback 0
network on R12.
R8
Task 2
Configure R8 such that it removes the Private AS # from the AS Path
before propagating the route towards AS 1000
R8
Task 1
Configure a relationship between the Customer (R11) and AS 500. The
Customer should use AS 65011 as the AS #. Advertise the Loopback 0
network on R11.
R5
Task 2
Configure R5 such that it removes the Private AS # from the AS Path
before propagating the route towards AS 1000
R5
R11
Task 1
Configure BFD using a send and receive interval of 350 ms. A neighbor is
deemed dead if 3 hellos are missed. Configure it for the following eBGP
neighbor relationships:
R1 - R5
R2 - R6
R3 - R7
R4 - R8
R1
Interface E 0/2
bfd interval 350 min_rx 350 multiplier 3
!
router bgp 1000
neighbor 192.1.15.5 fall-over bfd
R5
Interface E 0/0
bfd interval 350 min_rx 350 multiplier 3
!
router bgp 500
neighbor 192.1.15.1 fall-over bfd
R2
Interface E 0/0
bfd interval 350 min_rx 350 multiplier 3
!
router bgp 600
neighbor 192.1.26.2 fall-over bfd
R3
Interface E 0/2
bfd interval 350 min_rx 350 multiplier 3
!
router bgp 1000
neighbor 192.1.37.7 fall-over bfd
R7
Interface E 0/0
bfd interval 350 min_rx 350 multiplier 3
!
router bgp 700
neighbor 192.1.37.3 fall-over bfd
R4
Interface E 0/2
bfd interval 350 min_rx 350 multiplier 3
!
router bgp 1000
neighbor 192.1.48.8 fall-over bfd
R8
Interface E 0/0
bfd interval 350 min_rx 350 multiplier 3
!
router bgp 800
neighbor 192.1.48.4 fall-over bfd
R1
R2
R4
R5
R6
R8
R9
R10
R11
R13
R14
R15
Task 1
Configure the underlay IGP as EIGRP in AS 1000 between R1, R2 & R3.
These routers represent their respective Sub-AS’s.
R1 R2
R1 R4
Task 3
Configure the underlay IGP as EIGRP in Sub-AS 65002 between R2, R6
& R7. Advertise the links with the Sub-AS and the Loopback 10 networks
in EIGRP.
R1 R6
R3 R8
Task 5
Configure AS 65001 with iBGP. Configure R1 as the RR. Set the
relationship based on Loopback10. The Confederation Identifier is 1000.
R1 is peering up only with 65002 in its confederation.
R1
R2
R3
R4 R10
R1
Verification:
Use Ping to verify end-to-end reachability between AS’s 10,11,12,13 & 14
via AS 1000.
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Configuring IPv6
CCDE # 20110020
Task 1
Configure Headquarters with IPv6 addressing based on the Network
Diagram. The Network between R4 & R6 will remain as IPv4 only.
Configure the rest of the routers with IPv6 addressing based on the
Network Diagram. Configure a default route on the Edge Router (R1)
towards the ISP.
R1
ipv6 unicast-routing
!
Interface E 0/0
ipv6 address 2000:1234:1111::1/64
no shut
!
Interface E 0/1
ipv6 address 2000:1234:ABCD:01FF::1/64
no shut
!
ipv6 route ::/0 2000:1234:1111::9
R4
ipv6 unicast-routing
!
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
227 of 655
Interface E 0/0
ipv6 address 2000:1234:ABCD:01FF::4/64
no shut
!
Interface E 0/1
ipv6 address 2000:1234:ABCD:0100::4/64
no shut
R5
ipv6 unicast-routing
!
Interface E 0/0
ipv6 address 2000:1234:ABCD:0100::5/64
no shut
!
Interface Loopback1
ipv6 address 2000:1234:ABCD:0101::5/64
!
Interface Loopback2
ipv6 address 2000:1234:ABCD:0102::5/64
!
Interface Loopback3
ipv6 address 2000:1234:ABCD:0103::5/64
!
Interface Loopback4
ipv6 address 2000:1234:ABCD:0104::5/64
!
Interface Loopback5
ipv6 address 2000:1234:ABCD:0105::5/64
!
Interface Loopback6
ipv6 address 2000:1234:ABCD:0106::5/64
!
Interface Loopback7
ipv6 address 2000:1234:ABCD:0107::5/64
Task 2
Configure Site#1 with IPv6 addressing based on the Network Diagram.
Configure a default route on the Edge Router (R2) towards the ISP.
R2
Interface E 0/0
ipv6 address 2000:1234:2222::2/64
no shut
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
228 of 655
!
Interface E 0/1
ipv6 address 2000:1234:ABCD:02FF::2/64
no shut
!
ipv6 route ::/0 2000:1234:2222::9
R7
ipv6 unicast-routing
!
Interface E 0/0
ipv6 address 2000:1234:ABCD:02FF::7/64
no shut
!
Interface Loopback1
ipv6 address 2000:1234:ABCD:0200::7/64
!
Interface Loopback2
ipv6 address 2000:1234:ABCD:0201::7/64
!
Interface Loopback3
ipv6 address 2000:1234:ABCD:0202::7/64
!
Interface Loopback4
ipv6 address 2000:1234:ABCD:0203::7/64
Task 3
Configure Site#2 with IPv6 addressing based on the Network Diagram.
R3
ipv6 unicast-routing
!
Interface E 0/1
ipv6 address 2000:1234:ABCD:03FF::3/64
no shut
R8
ipv6 unicast-routing
!
Interface E 0/0
ipv6 address 2000:1234:ABCD:03FF::8/64
no shut
!
Interface Loopback1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
229 of 655
ipv6 address 2000:1234:ABCD:0300::8/64
!
Interface Loopback2
ipv6 address 2000:1234:ABCD:0301::8/64
!
Interface Loopback3
ipv6 address 2000:1234:ABCD:0302::8/64
!
Interface Loopback4
ipv6 address 2000:1234:ABCD:0303::8/64
Task 4
Configure IPv4 IP Addresses based on the network diagram. Configure
Static Routing to provide full reachability for IPv4 networks. You are
allowed to use static routes.
R1
Interface E 0/0
Ip address 200.1.1.1 255.255.255.0
No shut
!
Interface E 0/1
Ip address 20.1.14.1 255.255.255.0
No shut
!
Ip route 0.0.0.0 0.0.0.0 200.1.1.9
Ip route 20.1.45.0 255.255.255.0 20.1.14.4
Ip route 6.1.1.0 255.255.255.0 20.1.14.4
R2
Interface E 0/0
Ip address 99.1.1.2 255.255.255.0
No shut
!
Interface E 0/1
Ip address 20.1.27.2 255.255.255.0
No shut
!
Ip route 0.0.0.0 0.0.0.0 99.1.1.9
R3
Interface E 0/0
Ip address 199.1.1.3 255.255.255.0
No shut
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
230 of 655
!
Interface E 0/1
Ip address 20.1.38.3 255.255.255.0
No shut
!
Ip route 0.0.0.0 0.0.0.0 199.1.1.9
R4
Interface E 0/0
Ip address 20.1.14.4 255.255.255.0
No shut
!
Interface E 0/1
Ip address 20.1.45.4 255.255.255.0
No shut
!
Interface E 0/2
Ip address 192.168.1.4 255.255.255.0
No shut
!
Ip route 0.0.0.0 0.0.0.0 20.1.14.1
Ip route 6.1.1.0 255.255.255.0 192.168.1.6
R5
Interface E 0/0
Ip address 20.1.45.5 255.255.255.0
No shut
!
Ip route 0.0.0.0 0.0.0.0 20.1.45.4
R6
Interface E 0/0
Ip address 192.168.1.6 255.255.255.0
No shut
!
Interface Loo1
Ip address 6.1.1.1 255.255.255.255
!
Interface Loo2
Ip address 6.1.1.2 255.255.255.255
!
Interface Loo3
Ip address 6.1.1.3 255.255.255.255
!
Ip route 0.0.0.0 0.0.0.0 192.168.1.4
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
231 of 655
!
Line vty 0 4
Password cisco
Login
Transport input all
R7
Interface E 0/0
Ip address 20.1.27.7 255.255.255.0
No shut
!
Ip route 0.0.0.0 0.0.0.0 20.1.27.2
R8
Interface E 0/0
Ip address 20.1.38.8 255.255.255.0
No shut
!
Ip route 0.0.0.0 0.0.0.0 20.1.38.3
R9
Interface E 0/0
Ip address 200.1.1.9 255.255.255.0
No shut
!
Interface E 0/1
Ip address 99.1.1.9 255.255.255.0
No shut
!
Interface E 0/2
Ip address 199.1.1.9 255.255.255.0
No shut
!
Ip route 20.1.14.0 255.255.255.0 200.1.1.1
Ip route 20.1.45.0 255.255.255.0 200.1.1.1
Ip route 6.1.1.0 255.255.255.0 200.1.1.1
Ip route 20.1.27.0 255.255.255.0 99.1.1.2
Ip route 20.1.38.0 255.255.255.0 199.1.1.3
Task 1
Configure Headquarters with OSPFv3 within the HQ Site. Use X.X.X.X.
as the router-id. (X stands for the Router #). Enable all the IPv6
addresses within the HQ site in OSPF. Have R1 inject a default route
towards R4. The loopback interfaces should appear in the routing table
using the interface mask.
R1
Task 1
Configure EIGRP 222 within Site#1. Use X.X.X.X. as the router-id. (X
stands for the Router #). Enable all the IPv6 addresses within Site#1 in
EIGRP. Configure a default route on R7 towards R2.
R2
Task 1
Configure IS-IS within Site#1 based on the diagram. Use
XXXX.XXXX.XXXX. as the System-id. (X stands for the Router #). Enable
all the IPv6 addresses within Site#1 in IS-IS. Configure the Routers as
Level-2 Routers with a metric-style of wide. Configure a default route on
R7 towards R2.
R3
router isis
net 49.0000.3333.3333.3333.00
is-type level-2-only
metric-style wide
!
address-family ipv6
multi-topology
!
Interface E 0/1
Ipv6 router isis
R8
router isis
net 49.0000.8888.8888.8888.00
is-type level-2-only
metric-style wide
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
237 of 655
!
address-family ipv6
multi-topology
!
Interface E 0/0
Ipv6 router isis
!
Interface Loopback 1
Ipv6 router isis
!
Interface Loopback 2
Ipv6 router isis
!
Interface Loopback 3
Ipv6 router isis
!
Interface Loopback 4
Ipv6 router isis
!
Ipv6 route ::/0 2000:1234:ABCD:03FF::3
Task 1
Configure BGP between R1 & R9. Configure R1 in AS 111. Redistribute
the internal networks to BGP and vice versa.
R1
R2
Task 1
Configure a IPv6IP tunnel to connect R1 to R3. Use the
2000:1234:ABCD:01FE::/64 as the Tunnel Network. Enable the Tunnel
Interface in OSPF.
R1
Interface tunnel 1
tunnel source 200.1.1.1
tunnel destination 199.1.1.3
tunnel mode ipv6ip
ipv6 address 2000:1234:ABCD:01FE::1/64
ipv6 ospf 1 area 0
R3
Interface tunnel 1
tunnel source 199.1.1.3
tunnel destination 200.1.1.1
tunnel mode ipv6ip
ipv6 address 2000:1234:ABCD:01FE::3/64
ipv6 ospf 1 area 0
R3
Task 3
Configure route redistribution on R1 between OSPF and BGP for external
OSPF routes as well.
R1
Task 1
Enable NAT64 on all Interfaces on R4.
R4
Interface E0/0
nat64 enable
!
Interface E0/1
nat64 enable
!
Interface E0/2
nat64 enable
Task 2
Dedicate an IPv6 network prefix for NAT64
R4
R4
Task 4
Configure Static NAT for IPv4 Servers. Translate to the following:
➢ 6.1.1.1 – 2000:1234:ABCD:0400::1
➢ 6.1.1.2 – 2000:1234:ABCD:0400::2
➢ 6.1.1.2 – 2000:1234:ABCD:0400::3
R4
Task 5
Configure Dynamic PAT for your networks (2000:1234:ABCD::/64 to a
pool of 10.10.10.1 & 10.10.10.2.
R4
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Configuring Virtual Private
CCDE # 20110020 Networks (VPNs)
R1
R2
R3
R1 R3
Task 2
Configure a Point-to-Point GRE tunnel between R1 and R3. Use
192.168.13.0/24 as the Tunnel Network IP.
R1
Interface Tunnel 1
Ip add 192.168.13.1 255.255.255.0
Tunnel source 199.1.1.1
Tunnel destination 200.1.1.3
R3
Interface Tunnel 1
Ip add 192.168.13.3 255.255.255.0
Tunnel source 200.1.1.3
Tunnel destination 199.1.1.1
Task 3
Configure EIGRP in AS 13 to route the internal networks (Loopbacks) on
the GRE Tunnel between R1 and R3.
R1
Router EIGRP 13
No auto-summary
Network 192.168.13.0
Network 10.0.0.0
R3
Router EIGRP 13
No auto-summary
Network 192.168.13.0
Network 10.0.0.0
Task 1
Configure IPSec to encrypt the traffic passing thru the GRE tunnel. Make
sure the packet does not duplicate the IP addresses in the Header. Use
the following parameters for the IPSec Tunnel:
➢ ISAKMP Parameters
o Authentication : Pre-shared
o Encryption : 3DES
o Group : 2
o Hash : MD5
o Pre-Shared Key : cisco
➢ IPSec Parameters
o Encryption : ESP-3DES
o Authentication : ESP-SHA-HMAC
R1
Task 1
Convert the Existing GRE/IPSec tunnel into a Native IPSec tunnel by
changing the Tunnel mode to IPSec.
R1
Interface Tunnel 1
Tunnel mode ipsec ipv4
R3
Interface Tunnel 1
Tunnel mode ipsec ipv4
R1
R2
R4
R5
R6
Task 1
Configure Defaut routes on R1 – R5 pointing towards R6 (ISP).
R1 R2
➢ NHRP Parameters
o NHRP ID – 100
o NHRP Authentication key – cisco
➢ Tunnel Parameters
o Tunnel Authentication Key : 100
R1
Interface Tunnel 1
Ip address 192.168.1.1 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 1234
R2
Interface Tunnel 1
Ip address 192.168.1.2 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 100
R3
Interface Tunnel 1
Ip address 192.168.1.3 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 100
R4
Interface Tunnel 1
Ip address 192.168.1.4 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
253 of 655
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 100
R5
Interface Tunnel 1
Ip address 192.168.1.5 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 100
Task 3
Configure NHRP Mapping allowing all devices to connect to each other
directly for Unicast traffic. Configure Multicast mappings in such a way
that all devices use R1 as the routing hub.
R1
Interface Tunnel 1
Ip nhrp map 192.168.1.2 192.1.20.2
Ip nhrp map 192.168.1.3 192.1.30.3
Ip nhrp map 192.168.1.4 192.1.40.4
Ip nhrp map 192.168.1.5 192.1.50.5
Ip nhrp map Multicast 192.1.20.2
Ip nhrp map Multicast 192.1.30.3
Ip nhrp map Multicast 192.1.40.4
Ip nhrp map Multicast 192.1.50.5
R2
Interface Tunnel 1
Ip nhrp map 192.168.1.1 192.1.10.1
Ip nhrp map 192.168.1.3 192.1.30.3
Ip nhrp map 192.168.1.4 192.1.40.4
Ip nhrp map 192.168.1.5 192.1.50.5
Ip nhrp map Multicast 192.1.10.1
R3
Interface Tunnel 1
Ip nhrp map 192.168.1.1 192.1.10.1
Ip nhrp map 192.168.1.2 192.1.20.2
Ip nhrp map 192.168.1.4 192.1.40.4
Ip nhrp map 192.168.1.5 192.1.50.5
Ip nhrp map Multicast 192.1.10.1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
254 of 655
R4
Interface Tunnel 1
Ip nhrp map 192.168.1.1 192.1.10.1
Ip nhrp map 192.168.1.2 192.1.20.2
Ip nhrp map 192.168.1.3 192.1.30.3
Ip nhrp map 192.168.1.5 192.1.50.5
Ip nhrp map Multicast 192.1.10.1
R5
Interface Tunnel 1
Ip nhrp map 192.168.1.1 192.1.10.1
Ip nhrp map 192.168.1.2 192.1.20.2
Ip nhrp map 192.168.1.3 192.1.30.3
Ip nhrp map 192.168.1.4 192.1.40.4
Ip nhrp map Multicast 192.1.10.1
Task 4
Configure EIGRP in AS 100 to route the internal networks (Loopbacks)
on the GRE Tunnel on all the MGRE Routers. Disable Split horizon on R1
to allow it propagate routes from the Spoke routers to the other spoke
routers.
Note: You might need to bounce the Tunnel interface to make the
Routing work. Bring up the Hub router before the Spoke Routers.
R1
Task 1
De-Configure the Tunnels created in the previous Lab.
R1 R2
No Interface Tunnel 1
➢ NHRP Parameters
o NHRP ID – 100
o NHRP Authentication key – cisco
o NHS : R1
o Routing Hub: R1 [Configure the multicast mapping to
accommodate routing protocols]
➢ Tunnel Parameters
o Tunnel Authentication Key : 100
R1
Interface Tunnel 1
Ip address 192.168.1.1 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Ip nhrp map multicast dynamic
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 100
R2
Interface Tunnel 1
Ip address 192.168.1.2 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Ip nhrp nhs 192.168.1.1
Ip nhrp map 192.168.1.1 192.1.10.1
Ip nhrp map multicast 192.1.10.1
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 100
R3
Interface Tunnel 1
Ip address 192.168.1.3 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Ip nhrp nhs 192.168.1.1
Ip nhrp map 192.168.1.1 192.1.10.1
Ip nhrp map multicast 192.1.10.1
Tunnel source E 0/0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
258 of 655
Tunnel mode gre multipoint
Tunnel key 100
R4
Interface Tunnel 1
Ip address 192.168.1.4 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Ip nhrp nhs 192.168.1.1
Ip nhrp map 192.168.1.1 192.1.10.1
Ip nhrp map multicast 192.1.10.1
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 100
Task 3
Configure EIGRP in AS 100 to route the internal networks (Loopbacks)
on the GRE Tunnel on all the MGRE Routers. Disable Split horizon on R1
to allow it propagate routes from the Spoke routers to the other spoke
routers.
R1
Interface Tunnel 1
No ip split-horizon eigrp 100
!
Router EIGRP 100
No auto-summary
Network 192.168.1.0
Network 10.0.0.0
R2
Task 1
Disable the Hub from changing the next-hop attribute on the hub.
R1
Interface Tunnel 1
No ip next-hop-self eigrp 100
Note: Check the Routing table. The next-hop attribute for the Spoke-
routes is unchanged by the hub and is directly pointing to the spoke
Tunnel IP. This causes the spokes to do a NHRP resolution directly for
the spoke. Although the resolution packet will go thru the hub, the
actual packet will take the direct path. Use the traceroute command to
verify this.
Task 1
Change the Next-hop back to Self. All routes should again have a next-
hop pointing to the Hub [ DMVPN Phase I]
R1
Interface Tunnel 1
ip next-hop-self eigrp 100
Task 2
Configure NHRP Redirection on the Hub such that the Hub should push
down a dynamic mapping to the spokes for the spoke internal routes.
Configure the spokes to accept the mapping.
R1
Interface Tunnel 1
Ip nhrp redirect
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
262 of 655
R2
Interface Tunnel 1
Ip nhrp shortcut
R3
Interface Tunnel 1
Ip nhrp shortcut
R4
Interface Tunnel 1
Ip nhrp shortcut
Note: Check the Routing table. The next-hop attribute is pointing to the
hun. Do a traceroute from the R2 to R4. You will notice the first trace
goes thru the hub. This is due to the routing table pointing towards the
Hub. The hub detects that the spokes are both connected on the same
tunnel interface, hence sends a NHRP redirect message to both of them.
The NHRP redirect message contains the mapping for the destination
public IP for the internal networks.
Task 1
Configure a Static Tunnel between R1 and R5. R5 should be configured
with a Tunnel IP address of 192.168.1.5/24 using the Tunnel parameters
specified on the other routers (R1 – R4 – Lab 5). Enable EIGRP on R5.
R5
Interface Tunnel 1
Ip address 192.168.1.5 255.255.255.0
Ip nhrp network-id 100
Ip nhrp authentication cisco
Ip nhrp map 192.168.1.1 192.1.10.1
Ip nhrp map multicast 192.1.10.1
Tunnel source E 0/0
Tunnel mode gre multipoint
Tunnel key 100
No ip split-horizon eigrp 100
!
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
264 of 655
router eigrp 100
Network 192.168.1.0
Network 10.0.0.0
R1
Interface Tunnel1
Ip nhrp map 192.168.1.5 192.1.50.5
Ip nhrp map multicast 192.1.50.5
Task 2
Configure R5 as another NHS in your network. Configure R2, R3 & R4 to
use R5 as the NHS Server and a Routing hub as well.
R2
Interface Tunnel1
Ip nhrp nhs 192.168.1.5
Ip nhrp map 192.168.1.5 192.1.50.5
Ip nhrp map multicast 192.1.50.5
R3
Interface Tunnel1
Ip nhrp nhs 192.168.1.5
Ip nhrp map 192.168.1.5 192.1.50.5
Ip nhrp map multicast 192.1.50.5
R4
Interface Tunnel1
Ip nhrp nhs 192.168.1.5
Ip nhrp map 192.168.1.5 192.1.50.5
Ip nhrp map multicast 192.1.50.5
R5
Interface Tunnel 1
Ip nhrp map multicast dynamic
No ip split-horizon eigrp 100
Ip nhrp redirect
Note: You should now see routes from both Routing hubs. Although, it
sees 2 entries, the Data path will be direct due to Phase III.
Task 1
Configure IPSec to encrypt the traffic passing thru the tunnel. Make sure
the packet does not duplicate the IP addresses in the Header. Use the
following parameters for the IPSec Tunnel:
➢ ISAKMP Parameters
o Authentication : Pre-shared
o Encryption : 3DES
o Group : 2
o Hash : MD5
o Pre-Shared Key : cisco
➢ IPSec Parameters
o Encryption : ESP-3DES
o Authentication : ESP-SHA-HMAC
R1
R2
R3
R1 R3
Task 2
Configure a Site-to-Site Flex VPN to encrypt traffic from 10.1.X.0/24
networks on R1 (Loopback 0 & Loopback 1) to the 10.3.X.0/24 on R3
(Loopback 0 & Loopback 1). Do not create a Static VTI on R1. It should
be created dynamically based on an incoming connection from R3.
Task 3
Use the following Parameters for the Tunnel between R1 and R3:
R1
int Loopback11
ip add 192.168.1.1 255.255.255.0
!
int virtual-template 1 type tunnel
ip unnumbered Loopback11
tunnel source 199.1.1.1
tunnel mode ipsec ipv4
!
crypto ikev2 proposal PROP_1
integrity sha1
group 2
encryption 3des
!
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
271 of 655
crypto ikev2 policy POL_1
proposal PROP_1
!
crypto ikev2 keyring KR_R3
peer R3
address 0.0.0.0
pre-shared local cisco
pre-shared remote cisco
!
crypto ikev2 profile PROF_1
match identity remote address 0.0.0.0
authentication remote pre-share
authentication local pre-share
keyring local KR_R3
!
crypto ipsec transform-set ABC esp-3des esp-md5-hmac
!
crypto ipsec profile ABC
set transform-set ABC
set ikev2-profile PROF_1
!
int virtual-template 1 type tunnel
tunnel protection ipsec profile ABC
!
crypto ikev2 profile PROF_1
virtual-template 1
!
router eigrp 100
network 10.0.0.0
network 192.168.1.0
R3
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Configuring MPLS-based
CCDE # 20110020 Networking
R1
R4
R5
R6
R7
R8
R1 R2
Task 2
Configure MPLS on all the physical links in the SP Network. Use LDP to
distribute labels. The LDP neighbour relationships should be formed
based on the most reliable interface. The Labels should be assigned from
the range X00 – X99, where X is the router number.
R1 R2
Task 1
All LDP neighbor relationships should be authenticated using a
password of ccie12353.
R1
Note:
Save the Configs on all the routers. Do not save the configs during the
labs. At the completion of this lab, reload the routers without saving.
This will allow you to do the next lab based on the same topology.
R1
Task 2
Configure a VRF Cust-A with a RD value of 1000:1 on R1 and R4. Use
the same extended community for your Route-target import and export.
Assign this VRF to the links that connect to Cust-A sites on R1 and R4.
R1 R4
Task 3
Configure a static route on R1 in the Cust-A vrf to reach the 10.5.5.0 on
R5. Inject this route into BGP such that it should be reachable from
Cust-A VRF on R4. Configure a default Route on R5 towards R1.
R1
Task 4
Configure a static route on R4 in the Cust-A vrf to reach the 10.8.8.0 on
R8. Inject this route into BGP such that it should be reachable from
Cust-A VRF on R1. Configure a default Route on R8 towards R4.
R4
Task 5
Configure a VRF Cust-B with a RD value of 1000:2 on R1 and R4. Use
the same extended community for your Route-target import and export.
Assign this VRF to the links that connect to Cust-B sites on R1 and R4.
R1 R4
R1
Task 7
Configure a static route on R4 in the CUST-B vrf to reach the 10.7.7.0 on
R7. Inject this route into BGP such that it should be reachable from
CUST-B VRF on R1. Configure a default Route on R7 towards R4.
R4
NOTE:
Reload the Routers without saving the configs. This will setup the
topology for the next lab.
Note:
Save the Configs on all the routers. Do not save the configs during the
labs. At the completion of this lab, reload the routers without saving.
This will allow you to do the next lab based on the same topology.
R1
Task 2
Configure a VRF Cust-A with a RD value of 1000:1 on R1 and R4. Use
the same extended community for your Route-target import and export.
Assign this VRF to the links that connect to Cust-A sites on R1 and R4.
R1 R4
Task 3
Configure EIGRP 100 as the Routing Protocol between R5 and R1-vrf
Cust-A. Advertise all the routes on R5 in EIGRP. Advertise the VRF link
in EIGRP on R1 under the appropriate address family. Make sure the
VRF Cust-A on R4 has reachability to routes learned from R5.
R1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
285 of 655
Router EIGRP 1
!
Address-family ipv4 vrf Cust-A Autonomous-system 100
Network 192.1.15.0
Redistribute BGP 1000 metric 10 10 10 10 10
!
Router BGP 1000
!
Address-family ipv4 vrf Cust-A
Redistribute eigrp 100
R5
Task 4
Configure EIGRP 100 as the Routing Protocol between R4 and R8-vrf
CUST-A. Advertise all the routes on R8 in EIGRP. Advertise the VRF link
in RIP on R4 under the appropriate address family. Make sure the VRF
CUST-A on R1 has reachability to routes learned from R8.
R4
Router EIGRP 1
!
Address-family ipv4 vrf Cust-A Autonomous-system 100
Network 192.1.48.0
Redistribute BGP 1000 metric 10 10 10 10 10
!
Router BGP 1000
!
Address-family ipv4 vrf Cust-A
Redistribute eigrp 100
R8
R1 R4
Task 6
Configure EIGRP 200 as the Routing Protocol between R6 and R1-vrf
Cust-B. Advertise all the routes on R6 in EIGRP 200. Advertise the VRF
link in EIGRP on R1 under the appropriate address family. Make sure
the VRF Cust-B on R4 has reachability to routes learned from R6.
R1
Router EIGRP 1
!
Address-family ipv4 vrf Cust-B Autonomous-system 200
Network 192.1.16.0
Redistribute BGP 100 metric 10 10 10 10 10
!
Router BGP 1000
!
Address-family ipv4 vrf Cust-B
Redistribute eigrp 200
R6
Task 7
Configure EIGRP 222 as the Routing Protocol between R7 and R4-vrf
Cust-B. Advertise all the routes on R7 in EIGRP 222. Advertise the VRF
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
287 of 655
link in EIGRP on R4 under the appropriate address family. Make sure
the VRF Cust-B on R1 has reachability to routes learned from R7.
R4
Router EIGRP 1
!
Address-family ipv4 vrf Cust-B Autonomous-system 222
Network 192.1.47.0
Redistribute BGP 1000 metric 10 10 10 10 10
!
Router BGP 1000
!
Address-family ipv4 vrf Cust-B
Redistribute eigrp 2222
R7
NOTE:
Reload the Routers without saving the configs. This will setup the
topology for the next lab.
Note:
Save the Configs on all the routers. Do not save the configs during the
labs. At the completion of this lab, reload the routers without saving.
This will allow you to do the next lab based on the same topology.
R1
Task 2
Configure a VRF Cust-A with a RD value of 1000:1 on R1 and R4. Use
the same extended community for your Route-target import and export.
Assign this VRF to the links that connect to Cust-A sites on R1 and R4.
R1 R4
R1
Task 4
Configure BGP as the Routing Protocol between R8 and R4-vrf Cust-A.
Advertise all the routes on R8 in BGP. Configure R8 with an AS # of
65008. Configure the BGP neighbor relationship on R4 for the Cust-A
VRF. Make sure the VRF Cust-A on R1 has reachability to routes learned
from R8.
R4
Router 65008
Network 10.8.8.0 mask 255.255.255.0
Neighbor 192.1.48.4 remote-as 1000
R1 R4
Task 6
Configure BGP as the Routing Protocol between R6 and R1-vrf Cust-B.
Advertise all the routes on R6 in BGP. Configure R6 with an AS # of
65006. Configure the BGP neighbor relationship on R1 for the Cust-B
VRF. Make sure the VRF Cust-B on R4 has reachability to routes learned
from R6.
R1
R4
NOTE:
Reload the Routers without saving the configs. This will setup the
topology for the next lab.
Note:
Save the Configs on all the routers. Do not save the configs during the
labs. At the completion of this lab, reload the routers without saving.
This will allow you to do the next lab based on the same topology.
R1
Task 2
Configure a VRF Cust-A with a RD value of 1000:1 on R1 and R4. Use
the same extended community for your Route-target import and export.
Assign this VRF to the links that connect to Cust-A sites on R1 and R4.
R1 R4
R1
Task 4
Configure BGP as the Routing Protocol between R8 and R4-vrf Cust-A.
Advertise all the routes on R8 in BGP. Configure R8 with an AS # of
65001. Configure the BGP neighbor relationship on R4 for the Cust-A
VRF. Make sure the VRF Cust-A on R1 has reachability to routes learned
from R8.
R4
Router 65001
Network 10.8.8.0 mask 255.255.255.0
Neighbor 192.1.48.4 remote-as 1000
R1
Task 6
Configure a VRF Cust-B with a RD value of 1000:2 on R1 and R4. Use
the same extended community for your Route-target import and export.
Assign this VRF to the links that connect to Cust-B sites on R1 and R4.
R1 R4
R1
Task 8
Configure BGP as the Routing Protocol between R7 and R4-vrf Cust-B.
Advertise all the routes on R7 in BGP. Configure R7 with an AS # of
65002. Configure the BGP neighbor relationship on R4 for the Cust-B
VRF. Make sure the VRF Cust-B on R1 has reachability to routes learned
from R7.
R4
R6
NOTE:
Reload the Routers without saving the configs. This will setup the
topology for the next lab.
Note:
Save the Configs on all the routers. Do not save the configs during the
labs. At the completion of this lab, reload the routers without saving.
This will allow you to do the next lab based on the same topology.
R1
Task 2
Configure a VRF Cust-A with a RD value of 1000:1 on R1 and R4. Use
the same extended community for your Route-target import and export.
Assign this VRF to the links that connect to Cust-A sites on R1 and R4.
R1 R4
R1
Router ospf 1
Network 10.5.5.0 0.0.0.255 area 0
Network 192.1.15.0 0.0.0.255 area 0
Task 4
Configure OSPF as the PE-CE Routing protocol in Area 0 between R4 &
R8. Advertise all networks on R8 in OSPF. Enable the R4-R8 link on R4
under the Cust-A VRF. Use OSPF process ID 58 on R4. Make sure the
VRF Cust-A on R1 has reachability to routes learned from R8.
R4
Router ospf 1
Network 10.8.8.0 0.0.0.255 area 0
Network 192.1.48.0 0.0.0.255 area 0
R1 R4
Task 6
Configure OSPF as the PE-CE Routing protocol in Area 0 between R1 &
R6. Advertise all networks on R6 in OSPF. Enable the R1-R6 link on R1
under the Cust-B VRF. Use OSPF process ID 6 on R1. Make sure the
VRF Cust-B on R4 has reachability to routes learned from R6.
R1
Router ospf 1
Network 10.6.6.0 0.0.0.255 area 0
Network 192.1.16.0 0.0.0.255 area 0
R4
Router ospf 1
Network 10.7.7.0 0.0.0.255 area 0
Network 192.1.47.0 0.0.0.255 area 0
NOTE:
For the Cust-A VRF, the OSPF routes form the other site appears as O IA
(Inter-Area) routes. This is since PE Routers are using the same process
ID (58). The MPLS network is treated as the OSPF Super-Backbone.
For the Cust-B VRF, the OSPF routes form the other site appears as O
E2 (External) routes. This is since PE Routers are using different Process
ID for the Address Family OSPF process.
Task 1
Configure a Domain-id under OSPF for Cust-B VRF on R1 and R4 as
0.0.0.67 to ensure that OSPF routes are injected as O IA routes on the
Customer Routers.
R1
NOTE:
For the Cust-B VRF, the OSPF routes from the other site now appear as
O IA routes.
Task 1
Configure a Link between R6 and R7 as 10.67.67.0/24. Advertise this
link in OSPF. E 0/1 on both routers to connect. As this is a backup
(backdoor) link, set the cost on both sides to be 1000.
R6 R7
• R1 – Loopback 67 – 172.16.67.1/32
• R4 – Loopback 67 – 172.16.67.4/32
R1
Interface Loopback 67
Ip vrf forwarding Cust-B
Ip address 172.16.67.1 255.255.255.255
!
Router BGP 1000
!
Address-family ipv4 vrf Cust-B
Network 172.16.67.1 mask 255.255.255.255
R4
Interface Loopback 67
Ip vrf forwarding Cust-B
Ip address 172.16.67.4 255.255.255.255
!
Router BGP 1000
!
Address-family ipv4 vrf Cust-B
Network 172.16.67.4 mask 255.255.255.255
Task 3
Traffic between Cust-B Sites should be using the new link (Back door)
although the cost is much higher than the MPLS cloud. You would like
the traffic to go thru the MPLS link instead. Configure a Sham-Link
between R1 and R4 based on the new Loopbacks created in the previous
step.
R1
Task 1
Configure R1 such that it sets the RT for the 10.5.5.0/24 route in the
Cust-A vrf using a Route-Target of 1000:99. These routes will be later
imported into Cust-B.
R1
R1
Task 3
Configure R1 Cust-A & Cust-B vrf’s to export routes using the Route-
map create in the previous steps. Also import the common RT to allow
routes to be inter-exchanged between them.
R1
Task 4
Configure R4 such that it sets the RT for the 10.8.8.0/24 route in the
Cust-A vrf using a Route-Target of 1000:99. These routes will be later
imported into Cust-B.
R4
R4
Task 6
Configure R4 Cust-A & Cust-B vrf’s to export routes using the Route-
map create in the previous steps. Also import the common RT to allow
routes to be inter-exchanged between them.
R4
NOTE:
Reload the Routers without saving the configs. This will setup the
topology for the next lab.
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Implementing SD-WAN
CCDE # 20110020
Interface Configuration
HQ
MPLS Cloud
HQ Router
Hostname HQ
!
Interface E 0/0
ip address 199.1.1.14 255.255.255.240
no shut
!
Interface E 0/1
ip address 199.1.1.30 255.255.255.240
no shut
!
Interface E 0/2
ip address 192.168.101.1 255.255.255.0
no shut
!
Interface E 0/3
ip address 192.1.101.1 255.255.255.0
no shut
!
router ospf 1
network 192.168.101.0 0.0.0.255 area 0
network 199.1.1.0 0.0.0.255 area 0
passive-interface default
no passive-interface E0/2
!
Router bgp 65001
Neighbor 192.1.1.17 remote-as 65001
Redistribute ospf 1
!
ip route 0.0.0.0 0.0.0.0 192.1.101.254
no ip domain-lookup
!
line con 0
exec-timeout 0 0
logging synchronous
!
hostname MPLS
!
interface Ethernet0/0
ip address 192.168.101.254 255.255.255.0
no shut
!
interface Ethernet0/1
ip address 192.168.102.254 255.255.255.0
no shut
!
interface Ethernet0/2
ip address 192.168.103.254 255.255.255.0
no shut
!
interface Ethernet0/3
ip address 192.168.104.254 255.255.255.0
no shut
!
interface Ethernet1/0
ip address 192.168.105.254 255.255.255.0
no shut
!
router ospf 1
network 192.168.101.0 0.0.0.255 area 0
network 192.168.102.0 0.0.0.255 area 0
network 192.168.103.0 0.0.0.255 area 0
network 192.168.104.0 0.0.0.255 area 0
network 192.168.105.0 0.0.0.255 area 0
no ip domain lookup
!
line con 0
exec-timeout 0 0
logging synchronous
!
hostname Internet
!
interface Ethernet0/0
ip address 192.1.101.254 255.255.255.0
no shut
!
interface Ethernet0/1
ip address 192.1.102.254 255.255.255.0
no shut
!
interface Ethernet0/2
ip address 192.1.103.254 255.255.255.0
no shut
!
interface Ethernet0/3
ip address 192.1.104.254 255.255.255.0
no shut
!
interface Ethernet1/0
ip address 192.1.105.254 255.255.255.0
no shut
!
ip route 199.1.1.0 255.255.255.0 192.1.101.1
IP Address: 192.168.1.5
Subnet Mask: 255.255.255.0
IP Address: 199.1.1.5
Subnet Mask: 255.255.255.240
Default Gateway: 199.1.1.14
▪ Host-name : vManage1
▪ Organization: KBITS
▪ System-IP: 10.1.1.101
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vManage
config
!
system
host-name vManage1
system-ip 10.1.1.101
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
319 of 655
vbond 199.1.1.3
!
commit
▪ vpn 0
- Interface eth1
- IP Address: 199.1.1.1/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
- IP Address: 192.168.1.1/24
vManage
config
!
vpn 0
no interface eth0
interface eth1
ip address 199.1.1.1/28
tunnel-interface
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.1/24
no shut
!
commit
➢ Browse to http://192.168.1.5/certsrv
➢ Set the CSR Parameters with the Organization name, City, State,
Country. Set the Time to 3 Years and save.
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
▪ Host-name : vBond1
▪ Organization: KBITS
▪ System-IP: 10.1.1.103
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vBond
config
!
system
host-name vBond1
system-ip 10.1.1.103
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3 local
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
324 of 655
!
Commit
▪ vpn 0
- Interface ge0/0
- IP Address: 199.1.1.3/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Encapsulation: IPSec
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
- IP Address: 192.168.1.3/24
vBond
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 199.1.1.3/28
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.3/24
no shut
!
commit
o IP Address: 199.1.1.3
o Username: Admin
o Password: Admin
o Check Generate CSR
o Click OK
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
326 of 655
➢ Click “Request a Certificate”.
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
▪ Host-name : vSmart1
▪ Organization: KBITS
▪ System-IP: 10.1.1.102
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vSmart
config
!
system
host-name vSmart1
system-ip 10.1.1.102
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
328 of 655
!
Commit
▪ vpn 0
- Interface Eth1
- IP Address: 199.1.1.2/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
- IP Address: 192.168.1.2/24
vSmart
config
!
vpn 0
no interface eth0
interface eth1
ip address 199.1.1.2/28
tunnel-interface
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.2/24
no shut
!
Commit
o IP Address: 199.1.1.2
o Username: Admin
o Password: Admin
o Check Generate CSR
o Click OK
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
330 of 655
➢ Click “Request a Certificate”.
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
➢ Select the file you downloaded from the PNP Portal. Upload it and
check the Validate option.
vEDGE-1
▪ Host-name : vEdge1
▪ Organization: KBITS
▪ System-IP: 10.2.2.201
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge1
config
!
system
host-name vEdge1
system-ip 10.2.2.201
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
commit
▪ vpn 0
- Interface ge0/0
- IP Address: 199.1.1.17/28
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.30
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge1
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 199.1.1.17/28
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
333 of 655
no shut
ip route 0.0.0.0/0 199.1.1.30
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
commit
vEDGE-2
▪ Host-name : vEdge2
▪ Organization: KBITS
▪ System-IP: 10.2.2.202
▪ Site ID: 2
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-2
config
!
system
host-name vEdge2
system-ip 10.2.2.202
site-id 2
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
commit
▪ vpn 0
- Interface ge0/0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
334 of 655
- IP Address: 192.168.102.2/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.102.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge2
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.102.2/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.102.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
commit
vEDGE-3
▪ Host-name : vEdge3
▪ Organization: KBITS
▪ System-IP: 10.2.2.203
▪ Site ID: 3
▪ vbond Address: 199.1.1.3
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
335 of 655
▪ Timezone: Based on the appropriate Timezone
vEdge-3
config
!
system
host-name vEdge3
system-ip 10.2.2.203
site-id 3
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.103.3/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.103.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge3
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.103.3/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
336 of 655
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.103.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
Commit
vEDGE-4
▪ Host-name : vEdge4
▪ Organization: KBITS
▪ System-IP: 10.2.2.204
▪ Site ID: 4
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-4
config
!
system
host-name vEdge4
system-ip 10.2.2.204
site-id 4
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge4
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.104.4/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.104.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
Commit
vEDGE-1
Task 1 – Upload the Root Certificate to the vEdge
o IP Address : 199.1.1.17
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 1st
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.102.2
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 2nd
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.103.3
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 3rd
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.104.4
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 4th
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
cEDGE-1
Task 1 – Configuring the System Component
▪ Host-name : cEdge5
▪ Organization: KBITS
▪ System-IP: 10.2.2.205
▪ Site ID: 5
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
cEdge1
config-transaction
!
hostname cEdge1
!
system
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
344 of 655
system-ip 10.2.2.205
site-id 5
organization-name KBITS
vbond 199.1.1.3
exit
!
clock timezone GST 4
commit
▪ GigabitEthernet1 Parameters
o IP Address: 192.168.105.5/24
o Default Route: 192.168.105.254
▪ Tunnel Parameters Parameters
o Tunnel Interface: Tunnel1
o Tunnel Source: GigabitEthernet1
o Tunnel Mode: SDWAN
▪ SDWAN Interface Parameters
o Interface: GigabitEthernet1
o Encapsulation: IPSec
o Color: default
o Tunnel Services (All, NetConf, SSHD)
cEdge1
config-transaction
!
interface GigabitEthernet1
no shutdown
ip address 192.168.105.5 255.255.255.0
!
ip route 0.0.0.0 0.0.0.0 192.168.105.254
!
interface Tunnel1
no shutdown
ip unnumbered GigabitEthernet1
tunnel source GigabitEthernet1
tunnel mode sdwan
exit
!
sdwan
interface GigabitEthernet1
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
345 of 655
tunnel-interface
encapsulation ipsec
color default
allow-service all
allow-service sshd
allow-service netconf
exit
exit
commit
cEDGE-1
Task 1 – Upload the Root Certificate to the cEdge
➢ Note and use the Chassis Number and Token number for the 1st
CSR Device from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : MPLS
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/1
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : BIZ-Internet
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Dynamic
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/0
Advanced
o OSPF Network Type: Point-to-Point
➢ Click Add to add the Interface and Click Add to add OSPF.
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
356 of 655
➢ Click Save to save the Template.
Basic Information
o System -> VE-System
➢ Click Attach.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Type Show Ip route on vEdge2 to verify that you are receiving OSPF
routes from the MPLS Router.
Interface Configuration
Site-1
Site-2
Site-4
Site-5
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-1
!
Interface E 0/0
ip address 192.168.11.11 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.11.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.12.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.13.1 255.255.255.0
ip ospf network point-to-point
!
router ospf 1
network 192.168.11.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-2
!
Interface E 0/0
ip address 192.168.20.22 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.21.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.22.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.23.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback4
ip address 172.16.234.2 255.255.255.255
ip ospf network point-to-point
!
router ospf 1
network 192.168.20.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-3
!
Interface E 0/0
ip address 192.168.30.33 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.31.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.32.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.33.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback4
ip address 172.16.234.3 255.255.255.255
ip ospf network point-to-point
!
router ospf 1
network 192.168.30.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-4
!
Interface E 0/0
ip address 192.168.40.44 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.41.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.42.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.43.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback4
ip address 172.16.234.4 255.255.255.255
ip ospf network point-to-point
!
router ospf 1
network 192.168.40.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-5
!
Interface E 0/0
ip address 192.168.50.55 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.51.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.52.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.53.1 255.255.255.0
ip ospf network point-to-point
!
router ospf 1
network 192.168.50.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
Basic Configuration
o VPN -> Global : 1
o Name -> Global : Data VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/2
o IPv4 Address -> Static -> Device Specific
Redistribution
o Protocol : OMP
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/2
➢ Click Add to add the Interface and Click Add to add OSPF.
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF : BR-VE-OSPF-VPN1
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Type Show Ip route on vEdge2 to verify that you are receiving OSPF
routes from the Internal Site Router.
➢ Click Attach.
➢ Click on “…” towards the right-hand side for both devices, one at a
time click Edit Device Template.
➢ Click Update.
vEdge-4
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Type Show Ip route on Internal Site Routers to verify that you are
receiving OSPF routes from the other Sites.
VPN 0
Task 1 – Configure a VPN Template for HQ vEdge-Cloud Devices for
VPN 0
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
374 of 655
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Default
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o AS Number -> Global : 65001
Neighbor
➢ Click Add to add the Interface and Click Add to add BGP Neighbor.
VPN 512
Task 1 – Configure a VPN Template to be used by HQ vEdge-Cloud
Devices for VPN 512
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Dynamic
VPN 1
Task 1 – Configure a VPN Template for HQ vEdge-Cloud Devices for
VPN 1
Basic Configuration
o VPN -> Global : 1
o Name -> Global : Data VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/2
o IPv4 Address -> Static -> Device Specific
Redistribution
o Protocol : OMP
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/2
➢ Click Add to add the Interface and Click Add to add OSPF.
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : HQ-VE-VPN-VPN1
o VPN Interface : HQ-VE-VPNINT-VPN1-G2
o OSPF : HQ-VE-OSPF-VPN1
➢ Click Attach.
➢ Click Update.
➢ Type Show Ip route on vEdge2 to verify that you are receiving OSPF
routes from the MPLS Router.
➢ Type Show Ip route on Internal Site Routers to verify that you are
receiving OSPF routes from the other Sites.
VPN 0
Task 1 – Configure a VPN Template by CSR for VPN 0
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
382 of 655
➢ Click Save to save the Template.
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : GigabitEthernet1
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Default
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : GigabitEthernet2
o IPv4 Address -> Static -> Device Specific
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: GigabitEthernet1
o OSPF Network Type: Point-to-Point
➢ Click Add to add the Interface and Click Add to add OSPF.
VPN 512
Task 1 – Configure a VPN Template to be used by CSR for VPN 512
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : GigabitEthernet4
o IPv4 Address -> Dynamic
VPN 1
Task 1 – Configure a VPN Template for CSR for VPN 1
Basic Configuration
o VPN -> Global : 1
o Name -> Global : Data VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : GigabitEthernet3
o IPv4 Address -> Static -> Device Specific
Redistribution
o Protocol : OMP
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: GigabitEthernet3
➢ Click Add to add the Interface and Click Add to add OSPF.
Basic Information
o System -> CE-System
➢ Click Attach.
➢ Click Update.
➢ Type Show Ip route on cEdge1 to verify that you are receiving OSPF
routes from the MPLS Router.
➢ Type Show Ip route on Internal Site Routers to verify that you are
receiving OSPF routes from the other Sites.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Global : 199.1.1.14
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth1
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> default
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Static -> Device-Specific
Basic Information
o System -> VE-System
➢ Click Attach.
➢ Click Update.
Requirements:
➢ Los Angeles & London Sites should use the MPLS Transport for Telnet
Traffic and the Biz-Internet Transport for Web Traffic.
➢ Telnet Should have a SLA based on the following:
o Loss – 5%
o Latency – 200
o Jitter – 100ms
➢ Web Should have a SLA based on the following:
o Loss – 10%
o Latency – 500
o Jitter – 100ms
➢ Create the Sites for Los Angeles and London.
➢ Create the VPN for VPN ID 1.
➢ Click SLA Class and select New SLA Class list. Create 2 policies
based on the following:
o Name : SLA-Telnet
o Loss : 5%
o Latency : 200
o Jitter : 100ms
o Name : SLA-Web
o Loss : 10%
o Latency : 500
o Jitter : 100ms
➢ Click VPN and select New VPN list. Create 1 policy based on the
following:
o Name : VPN1
o ID : 1
➢ Click Site and select New Site list. Create 2 policies based on the
following:
o Name : London
o Site ID : 3
Telnet Sequence
Match Conditions:
o Protocol : 6
o Port : 23
Action
o SLA Class List: SLA-Telnet
o Color : mpls
o Backup Preferred Color: biz-internet
Web Sequence
Match Conditions:
o Protocol : 6
o Port : 80
Action
o SLA Class List: SLA-Web
o Color : biz-internet
o Backup Preferred Color: mpls
➢ Click Next to move to the “Apply Policy to Sites and VPNs” Page.
➢ The TELNET-WEB-Policy will be there. Click “New Site List and VPN
List” button.
➢ Click Add.
➢ Verify the policy by using the Monitor -> Network -> vEdge2 ->
Troubleshooting -> Simulate Flows Tool.
➢ Telnet from Los Angeles or London should only use the mpls
transport.
➢ Web from Los Angeles or London should only use the biz-internet
transport.
➢ Normal Ping from Los Angeles or London should use both the
Transports.
Requirements:
o Name : Chat-Apps
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
398 of 655
o Appls: Aol-Messenger, MSN-Messenger & WhatsApp Messenger
➢ Click SLA Class and select New SLA Class list. Create a policy based
on the following:
o Name : SLA-CHATS
o Loss : 25%
o Latency : 600
o Jitter : 100ms
➢ Click Site and select New Site list. Create a policy based on the
following:
o Name : Rome
o Site ID : 4
Telnet Sequence
Match Conditions:
o Application List: Chat-Apps
Action
o SLA Class List: SLA-CHATS
o Color : mpls
o Backup Preferred Color: biz-internet
Web Sequence
Match Conditions:
o Protocol : 6
o Port : 80
Action
o SLA Class List: SLA-Web
o Color : biz-internet
o Strict: Checked
➢ The CHAT-Policy will be there. Click “New Site List and VPN List”
button.
➢ Click Add.
➢ Verify the policy by using the Monitor -> Network -> vEdge3 ->
Troubleshooting -> Simulate Flows Tool.
Requirements:
➢ Rome should only the MPLS TLOC as the preferred color while
communicating to Los Angeles. The Internet TLOC should be backup
TLOC.
➢ Click TLOCs and select New TLOC list. Create a policy based on the
following:
o Name : LA-TLOC-MPLS-INT
o TLOC#1:
• IP Address: 10.2.2.202
• Color: MPLS
• Encapsulation: IPSec
• Preference: 300
o TLOC#2:
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
402 of 655
• IP Address: 10.2.2.202
• Color: Biz-internet
• Encapsulation: IPSec
• Preference: 200
Route Sequence
Match Conditions:
o Site List: LosAngeles
o VPN List: VPN1
Action
o TLOC/TLOC List: LA-MPLS-INT
o Click Save Match and Actions to save the Sequence.
Default Sequence
Action
o Accept
➢ Click “Import Existing” and select the LA-MPLS-INT from the drop-
down list and click Import.
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
403 of 655
➢ Click Policy Application on the Top of the page.
➢ Click Add.
Requirements:
➢ Click Prefix and select New Prefix list. Create a policy based on the
following:
o Name : PL-234
o Prefix List Entry: 172.16.234.0/24 le 32
➢ Click Site and select New Site list. Create a policy based on the
following:
o Name : Dubai
o Site ID : 1
Route Sequence
Match Conditions:
o Prefix List: PL-234
Action: Reject
Default Sequence
Action
o Accept
➢ Click Add.
Interface Configuration
Cloud Edge
MPLS Cloud
WAN Setup
Task 1 – Cloud Edge Router Configuration
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Cloud Edge
!
Vlan 199
!
Interface range E 0/0-3
Switchport mode access
Switchport access vlan 199
!
Interface VLAN 199
ip address 199.1.1.14 255.255.255.240
no shut
!
Interface E 1/0
ip address 192.1.100.1 255.255.255.240
no shut
!
Interface E 1/1
ip address 192.168.100.1 255.255.255.0
no shut
!
router ospf 1
network 192.168.100.0 0.0.0.255 area 0
network 199.1.1.0 0.0.0.255 area 0
passive-interface default
no passive-interface E 1/1
!
ip route 0.0.0.0 0.0.0.0 192.1.100.254
no ip domain-lookup
!
line con 0
exec-timeout 0 0
logging synchronous
!
hostname MPLS
!
interface Ethernet0/0
ip address 192.168.100.254 255.255.255.0
no shut
!
interface Ethernet0/1
ip address 192.168.11.254 255.255.255.0
no shut
!
interface Ethernet0/2
ip address 192.168.12.254 255.255.255.0
no shut
!
interface Ethernet0/3
ip address 192.168.21.254 255.255.255.0
no shut
!
router ospf 1
network 192.168.100.0 0.0.0.255 area 0
network 192.168.11.0 0.0.0.255 area 0
network 192.168.12.0 0.0.0.255 area 0
network 192.168.21.0 0.0.0.255 area 0
no ip domain lookup
!
line con 0
exec-timeout 0 0
logging synchronous
!
hostname Internet
!
interface Ethernet0/0
ip address 192.1.100.254 255.255.255.0
no shut
!
interface Ethernet0/1
ip address 192.1.11.254 255.255.255.0
no shut
!
interface Ethernet0/2
ip address 192.1.12.254 255.255.255.0
no shut
!
interface Ethernet0/3
ip address 192.1.22.254 255.255.255.0
no shut
!
interface Ethernet1/0
ip address 192.1.31.254 255.255.255.0
no shut
!
ip route 199.1.1.0 255.255.255.0 192.1.100.1
IP Address: 192.168.1.5
Subnet Mask: 255.255.255.0
IP Address: 199.1.1.5
Subnet Mask: 255.255.255.240
Default Gateway: 199.1.1.14
▪ Host-name : vManage1
▪ Organization: KBITS
▪ System-IP: 10.1.1.101
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vManage
config
!
system
host-name vManage1
system-ip 10.1.1.101
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface eth1
- IP Address: 199.1.1.1/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.14
vManage
config
!
vpn 0
no interface eth0
interface eth1
ip address 199.1.1.1/28
tunnel-interface
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.1/24
no shut
!
commit
➢ Browse to http://192.168.1.5/certsrv
➢ Set the CSR Parameters with the Organization name, City, State,
Country. Set the Time to 3 Years and save.
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
▪ Host-name : vBond1
▪ Organization: KBITS
▪ System-IP: 10.1.1.103
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vBond
config
!
system
host-name vBond1
system-ip 10.1.1.103
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3 local
!
Commit
▪ vpn 0
- Interface ge0/0
- IP Address: 199.1.1.3/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Encapsulation: IPSec
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
- IP Address: 192.168.1.3/24
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 199.1.1.3/28
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.3/24
no shut
!
Commit
o IP Address: 199.1.1.3
o Username: Admin
o Password: Admin
o Check Generate CSR
o Click OK
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
▪ Host-name : vSmart1
▪ Organization: KBITS
▪ System-IP: 10.1.1.102
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vSmart
config
!
system
host-name vSmart1
system-ip 10.1.1.102
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface Eth1
- IP Address: 199.1.1.2/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
421 of 655
- IP Address: 192.168.1.2/24
vSmart
config
!
vpn 0
no interface eth0
interface eth1
ip address 199.1.1.2/28
tunnel-interface
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.2/24
no shut
!
Commit
o IP Address: 199.1.1.2
o Username: Admin
o Password: Admin
o Check Generate CSR
o Click OK
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
➢ Select the file you downloaded from the PNP Portal. Upload it and
check the Validate option.
vEDGE-1
▪ Host-name : vEdge1
▪ Organization: KBITS
▪ System-IP: 10.2.2.201
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge1
config
!
system
host-name vEdge1
system-ip 10.2.2.201
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
commit
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
424 of 655
Task 2 – Configure the vpn parameters
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.11.1/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.11.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge1
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.11.1/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.11.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
commit
▪ Host-name : vEdge2
▪ Organization: KBITS
▪ System-IP: 10.2.2.202
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-2
config
!
system
host-name vEdge2
system-ip 10.2.2.202
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
commit
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.12.2/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.12.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
426 of 655
vEdge2
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.12.2/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.102.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
commit
vEDGE-3
▪ Host-name : vEdge3
▪ Organization: KBITS
▪ System-IP: 10.2.2.203
▪ Site ID: 2
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-3
config
!
system
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
427 of 655
host-name vEdge3
system-ip 10.2.2.203
site-id 2
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.21.3/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.21.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge3
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.21.3/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.21.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
428 of 655
Commit
vEDGE-4
▪ Host-name : vEdge4
▪ Organization: KBITS
▪ System-IP: 10.2.2.204
▪ Site ID: 2
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-4
config
!
system
host-name vEdge4
system-ip 10.2.2.204
site-id 2
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface Ge0/1
- IP Address: 192.1.22.4/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.22.254
▪ vpn 512
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
429 of 655
- Interface eth0
- IP Address: DHCP Client
vEdge4
config
!
vpn 0
no interface eth0
interface ge0/1
ip address 192.1.22.4/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.22.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
Commit
o IP Address : 192.168.11.1
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 1st
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.12.2
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 2nd
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.21.3
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 3rd
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.1.22.4
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 4th
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
Interface Configuration
ASAv1
Firewall Configuration
Task 1 – Interface Configuration and Default Routing on ASA in Los
Angeles
Hostname ASAv1
!
Interface Gig 0/0
Nameif Outside
ip address 192.1.31.10 255.255.255.0
no shut
!
Interface Gig 0/1
Nameif Inside
ip address 192.168.31.10 255.255.255.240
no shut
!
Route Outside 0.0.0.0 0.0.0.0 192.1.31.254
ASAv Firewall
▪ Host-name : vEdge5
▪ Organization: KBITS
▪ System-IP: 10.2.2.205
▪ Site ID: 3
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-5
config
!
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
437 of 655
system
host-name vEdge5
system-ip 10.2.2.205
site-id 3
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.31.5/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.31.10
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge5
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.31.5/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.31.10
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
438 of 655
!
Commit
ASAv
o IP Address : 192.1.31.5
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 5th
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
System
VPN 0
Basic Configuration
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
440 of 655
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : Biz-internet
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
VPN512
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Dynamic
VPN 1
Basic Configuration
o VPN -> Global : 1
o Name -> Global : Data VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/2
o IPv4 Address -> Static -> Device Specific
Redistribution
o Protocol : OMP
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/2
➢ Click Add to add the Interface and Click Add to add OSPF.
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF: BR-VE-OSPF-VPN1
➢ Click Attach.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
No ip domain-lookup
!
Hostname R3
!
Interface E 0/0
Ip address 172.16.30.33 255.255.255.0
No shut
!
Interface loopback1
Ip address 172.16.31.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback2
Ip address 172.16.32.1 255.255.255.0
Ip ospf network point-to-point
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
445 of 655
!
Interface loopback3
Ip address 172.16.33.1 255.255.255.0
Ip ospf network point-to-point
!
Router ospf 1
Network 172.16.0.0 0.0.255.255 area 0
Verification
➢ Verify the configuration on vEdge5. You can do that by verify OSPF
Neighbor relationship with the MPLS Router by issuing the Show ospf
neighbor command on vEdge5.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
447 of 655
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : Mpls
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/1
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : Biz-Internet
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/3
o IPv4 Address -> Static -> Device Specific
Advanced
o TLOC Extension: Device Specific
Area Configuration
o Area Number -> Global : 0
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF: BR-VE-OSPF-VPN1
➢ Click Attach.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/0
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF: BR-VE-OSPF-VPN1
➢ Click Attach.
➢ Wait for it to update the device. It should come back with Status of
Success.
No ip domain-lookup
!
Hostname R2
!
Interface E 0/0
Ip address 172.16.20.22 255.255.255.0
No shut
!
Interface loopback1
Ip address 172.16.21.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback2
Ip address 172.16.22.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback3
Ip address 172.16.23.1 255.255.255.0
Ip ospf network point-to-point
!
Router ospf 1
Network 172.16.0.0 0.0.255.255 area 0
Verification
➢ Verify the configuration on vSmart. You can do that by making sure
that you are receiving 2 TLOCS for vEdge3 and 2 TLOCS for vEdge4.
The command to verify is show omp tlocs.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
455 of 655
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : Mpls
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/1
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : Biz-Internet
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/0
Basic Information
o System -> VE-System
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
457 of 655
Transport & Management
o VPN 0 : BR1-VE-VPN-VPN0
o VPN Interface : BR1-VE-VPNINT-VPN0-G0
o VPN Interface : BR1-VE-VPNINT-VPN0-G1
o OSPF: BR1-VE-OSPF-VPN0
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF: BR-VE-OSPF-VPN1
➢ Click Attach.
vEdge1
o Default Gateway for VPN0 : 192.1.11.254
o Interface IP for ge0/0 :192.168.11.1/24
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
458 of 655
o Interface IP for ge0/1 :192.1.11.1/24
o Interface IP for ge0/2 :172.16.10.1/24
o Timezone: Asia/Dubai
o Hostname : vEdge-1
o System IP : 10.2.2.201
o Site ID : 1
vEdge2
o Default Gateway for VPN0 : 192.1.12.254
o Interface IP for ge0/0 :192.168.12.2/24
o Interface IP for ge0/1 :192.1.12.2/24
o Interface IP for ge0/2 :172.16.10.2/24
o Timezone: Asia/Dubai
o Hostname : vEdge-2
o System IP : 10.2.2.202
o Site ID : 1
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
No ip domain-lookup
!
Hostname R1
!
Interface E 0/0
Ip address 172.16.10.11 255.255.255.0
No shut
!
Interface loopback1
Ip address 172.16.11.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback2
Ip address 172.16.12.1 255.255.255.0
Ip ospf network point-to-point
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
459 of 655
!
Interface loopback3
Ip address 172.16.13.1 255.255.255.0
Ip ospf network point-to-point
!
Router ospf 1
Network 172.16.0.0 0.0.255.255 area 0
Verification
➢ Verify the configuration on vEdge1 & vEdge2. You can do that by
verify OSPF Neighbor relationship with the MPLS Router by issuing
the Show ospf neighbor command on vEdge1 & vEdge2.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Global : 199.1.1.14
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth1
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> default
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Static -> Device-Specific
Basic Information
o System -> VE-System
➢ Click Attach.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Los Angeles & London Sites are communicating to each other directly.
You can verify this by checking the routes. The routes should be
pointing directly at the TLOCs of the Branch Sites directly.
➢ All traffic between the sites should be forwarded via the HQ Site
Dubai. Use a TLOC list to accomplish this task.
➢ Click VPN and select New VPN list. Create 1 policy based on the
following:
o Name : VPN1
o ID : 1
➢ Click Site and select New Site list. Create 2 policies based on the
following:
o Name : Dubai
o Site ID : 1
o Name : London
o Site ID : 2
➢ Click TLOC and select New TLOC list. Create 1 policies based on the
following:
o Name : TLOC-Dubai
o TLOCs
• 10.2.2.201 – mpls – IPSec – 500
• 10.2.2.202 – mpls – IPSec – 500
• 10.2.2.201 – biz-internet – IPSec – 400
• 10.2.2.202 – biz-internet – IPSec – 400
Default
Action
o Accept
➢ Click Next on the “Configure Traffic Rules” page as we are not using
any Control Policies. You will move to the “Apply Policy to Sites and
VPNs” Page.
➢ Click Add.
➢ You can verify this by doing checking the routes. The routes should
be pointing directly at the TLOCs of Dubai and all traffic will be
forwarded thru Dubai.
Requirements:
➢ Click Class Map and select New Class Map. Create 3 Class-Maps
based on the following:
o Name : CM-Priority
o Queue : 0
o Name : CM-Web
o Site ID : 1
o Name : CM-Best-Effort
o Site ID : 2
➢ Click Access Lists and select Add IPv4 ACL. Create an ACL with a
name of QOS-ACL with the following “Traffic to Class Map” Mappings
o Traffic: DSCP – 46
o Class-Map: CM-Priority
o Traffic: Rest
o Class-Map: CM-Best-Effort
Requirements:
o Queue 1
▪ Bandwidth reservation - 30%
▪ Scheduling - wrr
▪ Drop - Random Early Detection
o Queue 2
▪ Bandwidth reservation - 30%
▪ Scheduling - wrr
▪ Drop - Tail
o Queue 1
▪ Bandwidth reservation - 30%
▪ Scheduling - wrr
▪ Drop - Random Early Detection
o Queue 2
▪ Bandwidth reservation - 30%
▪ Scheduling - wrr
▪ Drop - Tail
➢ Click “Import QoS Map”. Select QOS-MAP from the drop-down list
and click Import. Click Next.
➢ Select QOS-ACL from the drop-down list and click Import. Click
Next.
➢ Click Edit
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Implementing SDA
CCDE # 20110020
RADIUS
➢ Click Save
ERS
➢ Click Save
pxGrid
➔ pxGrid
➢ Save
Settings (Icon) -> System Settings -> Settings -> Authentication &
Policy Servers -> Add
Click Apply
Policy -> Group-Based Access Control -> Scalable Groups -> Start
Migration (In Message)
➔ Yes to accept
9300CB
no ip domain lookup
!
line con 0
logg sync
no exec-timeout
!
hostname 9300CB
!
Interface Gig 1/0/1
switchport mode trunk
!
vlan 199
!
ip routing
!
interface VLAN 199
ip address 192.168.100.2 255.255.255.0
no shut
!
ip route 0.0.0.0 0.0.0.0 192.168.100.1
9300CB
9300CB
Fusion Router
hostname Fusion
!
Interface Gig 1/0/10
switchport trunk encapsulation dot1q
switchport mode trunk
!
vlan 199
!
ip routing
!
interface VLAN 199
ip address 192.168.100.1 255.255.255.0
no shut
Netmetric
Lab 4 – DNAC Design - Network Hierarchy
– Site & Building
Desgin -> Network Hierarchy -> Add Site -> Add Area
Desgin -> Network Hierarchy -> Add Site -> Add Building
➔ Building Name: HQ
➔ Parent: Los Angeles
➔ Address: 2640 Main Street, Irvine, California 92614, US
➔ Click Save
➔ Click ISE
➔ Click NTP
➔ Click OK
➔ Check Client/Endpoint
CLIENT/ENDPOINT
➔ Servers: ISE
➔ Protocols: RADIUS
➔ DHCP: 10.10.101.230
➔ NTP: 10.10.101.230
5. Time Zone
➔ Click Save
Note: Click to make sure you are setting it at the Global Level
CLI Credentials
➔ Name: FabricAdmin
➔ Username: kbits
➔ Password: Cisco@123
➔ Enable Password: Cisco@123
➔ Click Save
➔ Name: RO
➔ Community: public
➔ Name: RW
➔ Community: private
➔ Click Save
➔ Click Save
Note: Click to make sure you are setting it at the Global Level
➔ Click on Add
➔ Name: LA_OVERLAY_POOL
➔ Type: Generic
➔ IP Addres Space: (IPv4)
➔ Subnet: 172.16.0.0
➔ Prefix-length: /16
➔ Click Save
➔ Click on Add
➔ Name: LA_UNDERLAY_POOL
➔ Type: Generic
➔ IP Addres Space: (IPv4)
➔ Subnet: 172.20.0.0
➔ Prefix-length: /16
➔ Click Save
NTP
ISE DHCP
DNAC
.215
F
Fusion Router
G 1/0/10
192.168.100.0/24
G 1/0/1
Loopback999
B C 192.168.1.1/32
G 1/0/2 G 1/0/3
192.168.11.0/24 192.168.22.0/24
E G 1/0/2 G 1/0/3 E
Loopback999 Loopback999
192.168.1.2/32 192.168.1.3/32
9300CB
Ip routing
!
Interface Gig 1/0/2
no switchport
ip address 192.168.11.2 255.255.255.0
no shut
!
interface Loopback999
ip address 192.168.1.2 255.255.255.255
no shut
9300E2
Ip routing
!
Interface Gig 1/0/3
no switchport
ip address 192.168.22.3 255.255.255.0
no shut
!
interface Loopback999
ip address 192.168.1.3 255.255.255.255
no shut
9300E1
9300E1
NTP
ISE DHCP
DNAC
.215
F
Fusion Router
G 1/0/10
192.168.100.0/24
G 1/0/1
Loopback999
B C 192.168.1.1/32
G 1/0/2 G 1/0/3
192.168.11.0/24 192.168.22.0/24
E G 1/0/2 G 1/0/3 E
Loopback999 Loopback999
192.168.1.2/32 192.168.1.3/32
Fusion Router
Router ospf 1
Router-id 0.0.0.100
Network 192.168.100.0 0.0.0.255 area 0
Network 10.10.101.0 0.0.0.255 area 0
Passive-interface vlan 101
9300CB
Router ospf 1
Router-id 0.0.0.1
Network 192.168.1.0 0.0.0.255 area 0
Network 192.168.11.0 0.0.0.255 area 0
Network 192.168.22.0 0.0.0.255 area 0
Network 192.168.100.0 0.0.0.255 area 0
9300E1
Router ospf 1
Router-id 0.0.0.2
Network 192.168.1.0 0.0.0.255 area 0
Network 192.168.11.0 0.0.0.255 area 0
9300E2
Router ospf 1
Router-id 0.0.0.3
Network 192.168.1.0 0.0.0.255 area 0
Network 192.168.22.0 0.0.0.255 area 0
NTP
ISE DHCP
DNAC
.215
F
Fusion Router
G 1/0/10
192.168.100.0/24
G 1/0/1
Loopback999
B C 192.168.1.1/32
G 1/0/2 G 1/0/3
192.168.11.0/24 192.168.22.0/24
E G 1/0/2 G 1/0/3 E
Loopback999 Loopback999
192.168.1.2/32 192.168.1.3/32
Note: Click to make sure you are setting it at the Global Level
IP Address/Range
Credentials
➔ CLI: kbits/FabricAdmin
➔ SNMPv2c Read: RO
➔ SNMPv2c Write: RW
➔ Uncheck SNMPv3
➔ Click Assign
9300CB
no ip domain lookup
!
line con 0
logg sync
no exec-timeout
!
hostname 9300CB
!
Interface Gig 1/0/1
switchport mode trunk
!
vlan 199
!
ip routing
!
interface VLAN 199
ip address 192.168.100.2 255.255.255.0
no shut
!
ip route 0.0.0.0 0.0.0.0 192.168.100.1
9300CB
9300CB
Note: Click to make sure you are setting it at the Global Level
IP Address/Range
Credentials
➔ CLI: kbits/FabricAdmin
➔ SNMPv2c Read: RO
➔ SNMPv2c Write: RW
➔ Uncheck SNMPv3
➔ Click Assign
Design -> Network Settings -> IP Address Pools -> Global -> Los
Angeles -> HQ
➔ Click Reserve
➔ Select UNDERLAY_GLOBAL
➔ Click Save
Design -> Network Settings -> Device Credentials -> Global -> Los
Angeles -> HQ
➔ Click Save
Fusion Router
Provision -> Inventory -> Action -> Provision -> LAN AUTOMATION ->
Start
Provision -> Inventory -> Action -> Provision -> LAN AUTOMATION
Status
➔ Select -> Global -> Los Angeles -> HQ & Check "Apply to all
devices"
➔ Click Assign
Note: The devices are now available for Device Role Assignment
under the HQ Fabric
➔ Name: IT_VN_DATA1_POOL
➔ Prefix Length: /24
➔ IPv4 Subnet: 172.16.1.0
➔ DHCP Server: 10.10.101.230
➔ Name: IT_VN_DATA2_POOL
➔ Prefix Length: /24
➔ IPv4 Subnet: 172.16.2.0
➔ DHCP Server: 10.10.101.230
➔ Name: IT_VN_VOICE_POOL
➔ Prefix Length: /24
➔ IPv4 Subnet: 172.16.101.0
➔ DHCP Server: 10.10.101.230
➔ Name: SALES_VN_DATA1_POOL
➔ Prefix Length: /24
➔ IPv4 Subnet: 172.16.3.0
➔ DHCP Server: 10.10.101.230
➔ Name: SALES_VN_DATA2_POOL
➔ Prefix Length: /24
➔ IPv4 Subnet: 172.16.4.0
➔ DHCP Server: 10.10.101.230
➔ Name: SALES_VN_VOICE_POOL
➔ Prefix Length: /24
➔ IPv4 Subnet: 172.16.102.0
➔ DHCP Server: 10.10.101.230
➔ Name: L3HANDOFF_POOL
➔ Prefix Length: /24
➔ IPv4 Subnet: 172.20.2.0/24
➔ Name: IT_VN
➔ Name: SALES_VN.
➔ Name: L3HANDOFF
➔ Transit/Type: IP-Based
➔ Protocol: BGP
➔ Type: ASPlain
➔ AS #: 65001 (Fusion Router AS)
➔ Click Save
➔ Name: HQ_FABRIC
➔ Add all except for Default
➔ Click Add
Authentication Template
➔ Select: IT_VN
➔ Add the following Pools:
➔ Click Save
➔ Select: SALES_VN
➔ Add the following Pools:
➔ Click Save
➔ Select 9300CB
➔ Pool: L3HANDOFF
➔ Click Add
➔ Select L3HANDOFF
➔ Click “Add” to add the Interface G 1/0/1
➔ Click Add
➔ Click Save
Note: The Device should turn Blue indicating that it is in the Fabric
➔ Select HQ-1
➔ Click Add
➔ Select HQ-2
➔ Click Add
➔ Click Save
Note: The Device should turn Blue indicating that it is in the Fabric
Fusion Router
!
vrf definition SALES_VN
rd 1:4100
!
address-family ipv4
route-target export 1:4100
route-target import 1:4100
exit-address-family
Fusion Router
vlan 3001-3003
!!! You might need to enable VTP Transparent Mode to make it work
!
interface Vlan3001
description vrf interface to External router
ip address 172.20.2.2 255.255.255.252
no shut
!
interface Vlan3002
description vrf interface to External router
vrf forwarding IT_VN
ip address 172.20.2.6 255.255.255.252
no shut
!
interface Vlan3003
description vrf interface to External router
vrf forwarding SALES_VN
ip address 172.20.2.10 255.255.255.252
no shut
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
527 of 655
3. Configure BGP between Fusion & Border
Fusion Router
Fusion Router
Fusion Router
➔ Name: IT_DATA1
➔ Name: IT_DATA2
➔ Name: IT_VOICE
➔ Name: SALES_DATA1
➔ Name: SALES_DATA2
➔ Name: SALES_VOICE
➔ Name: IT1
➔ Password: Cisco@123
➔ Group: IT_DATA1
➔ Name: IT2
➔ Password: Cisco@123
➔ Group: IT_DATA2
➔ Name: SALES1
➔ Password: Cisco@123
➔ Group: SALES_DATA1
➔ Name: SALES2
➔ Password: Cisco@123
➔ Group: SALES_DATA2
➔ Name: IT-DATA1-PROF
➔ VLAN: IT-VN-DATA1 (Copy from DNAC)
➔ Name: IT-DATA2-PROF
➔ VLAN: IT-VN-DATA2 (Copy from DNAC)
➔ Name: SALES-DATA1-PROF
➔ VLAN: IT-VN-SALES1 (Copy from DNAC)
➔ Name: SALES-DATA2-PROF
➔ VLAN: SALES-VN-DATA2 (Copy from DNAC)
Policy -> Policy Sets -> default -> Authorization Policies -> Insert at
the Top
➔ Name: IT-DATA1-POLICY
➔ Identity Group: IT_DATA1
➔ Authentication Method: Wired_802.1x
➔ Permission: IT-DATA1-PROF
➔ Name: IT-DATA2-POLICY
➔ Identity Group: IT_DATA2
➔ Authentication Method: Wired_802.1x
➔ Permission: IT-DATA2-PROF
➔ Name: SALES-DATA1-POLICY
➔ Identity Group: SALES_DATA1
➔ Authentication Method: Wired_802.1x
➔ Permission: SALES-DATA1-PROF
➔ Name: SALES-DATA2-POLICY
➔ Identity Group: SALES_DATA2
➔ Authentication Method: Wired_802.1x
➔ Permission: SALES-DATA2-PROF
Access Server
Access Server
Access Server
Policy -> Group Based Access Control -> Scalabe Groups -> Create
➔ Name: IT-DATA1
➔ SGT: 6001
➔ VN: IT_VN
➔ Name: IT-DATA2
➔ SGT: 6002
➔ VN: IT_VN
Policy -> Policy Sets -> default -> Authorization Policies -> Edit the
following Policies
➔ Name: IT-DATA1-POLICY
➔ Identity Group: IT_DATA1
➔ Authentication Method: Wired_802.1x
➔ Permission: IT-DATA1-PROF
➔ Security Group: IT-DATA1
➔ Name: IT-DATA1-POLICY
➔ Identity Group: IT_DATA1
➔ Authentication Method: Wired_802.1x
➔ Permission: IT-DATA1-PROF
➔ Security Group: IT-DATA1
➢ Click on the Policy Matrix box that intersects IT-DATA1 & IT-
DATA2.
Verification:
➢ Click on the Policy Matrix box that intersects IT-DATA1 & IT-
DATA2.
➔ Name: IT_DATA1_2_IT_DATA2
➔ Rules:
o 1. Permit – TCP/80
o 2. Permit – TCP/443
o 3. Permit – CIFS
o Default Action : Deny
o
➢ Click Save.
➢ Click on the Policy Matrix box that intersects IT-DATA1 & IT-
DATA2.
➢ Select “IT_DATA1_2_IT_DATA2”.
Verification:
➢ Click on Provision -> Fabric -> HQ_Fabric -> Host Onboarding ->
Virtual Networks -> IT_VN -> Select IT-VN-DATA1 -> Click
Action.
Border Switch
Click Provision -> Fabric -> HQ_Fabric -> Fabric Infrastructure ->
Click Border -> Click Configure -> Select Layer 2 Hand off -> Click
IT_VN.
➢ Click Add
Fusion Router
Vlan 555
!
Interface vlan 555
Ip add 172.16.1.70 255.255.255.0
No shut
➢ Click Tools -> Template Editor -> “+” -> Create Template
➔ Name: Basic
➔ Project: Cloud DayN Templates
➔ Device Type: Switches & Hubs
➔ Software Type: IOS-XE
➔ Click Save
➢ Click Tools -> Template Editor -> Cloud DayN Templates ->
Basic
➢ Click Design -> Network Profiles -> Add -> Switching -> DayN
Template -> “+” -> Switches & Hubs -> Basic (Under Templates)
➢ Click Save.
➢ Click Assign.
➢ Click Next
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 IP Services & Security
CCDE # 20110020
R1
R2
R3
R5
Task 1
Configure Default Routes on R3, R4 & R5 pointing towards R2. Configure
a default route on R2 pointing towards R1. Configure Statice Routes on
R1 for the 192.1.23.0/24, 192.1.24.0/24 & 192.1.25.0/24 networks with
R2 as the next hop.
R1 R2
Task 2
Configure R2 as a Zone-Based Firewall. Create the following zones on R2:
R2
R2
Interface E 0/0
zone-member security OUTSIDE
!
Interface E 0/1
zone-member security INSIDE
Interface E 0/2
zone-member security INSIDE
!
Interface E 0/3
zone-member security DMZ
o HTTP
o HTTPS
o SMTP
o FTP
o DNS
o TFTP
o Telnet
o SSH
o ICMP
R2
Task 5
RDP (TCP/3389) should also be allowed to communicate from INSIDE to
OUTSIDE.
R2
o HTTP
o HTTPS
o SMTP
o DNS
o Telnet
o SSH
o ICMP
R2
o HTTP – 192.1.25.11
o DNS – 192.1.25.12
o SMTP – 192.1.25.13
o Telnet – 192.1.25.5
R2
R1
R2
R4
Task 1
Create a VLAN 100 on SW-100. Assign all port on SW-100 to VLAN 100.
SW1
Vlan 100
!
Interface range E 0/0-3, E1/0-3
Switchport mode access
Switchport access vlan 100
Task 2
Configure EIGRP in AS 100 between R1, R2, R3 & R4. Enable EIGRP on
all interfaces on all routers.
R1 R2
o Group ID: 1
o Virtual IP: 192.168.100.254
o Priority: R1 (105); R2 (100 – Default)
o Preemption: Enabled on both
o Authentication: MD5 using a key of kbits@123
R1
Interface E 0/1
Standby version 2
Standby 1 ip 192.168.100.254
Standby 1 priority 105
Standby 1 preempt
Standby 1 authentication md5 key-string kbits@123
R2
Interface E 0/1
Standby version 2
Standby 1 ip 192.168.100.254
Standby 1 preempt
Standby 1 authentication md5 key-string kbits@123
Task 4
Configure HSRP to track the E 0/0 interface. If it goes down on the active
HSRP router for this group, it should decrement the priority by 20 and
the other router should become the Active HSRP router.
R1
o Group ID: 2
o Virtual IP: 192.168.100.253
o Priority: R2 (105); R1 (100 – Default)
o Preemption: Enabled on both
o Authentication: MD5 using a key of kbits@123
R1
Interface E 0/1
Standby 2 ip 192.168.100.253
Standby 2 preempt
Standby 2 authentication md5 key-string kbits@123
R2
Interface E 0/1
Standby 2 ip 192.168.100.253
Standby 2 priority 105
Standby 2 preempt
Standby 2 authentication md5 key-string kbits@123
Task 6
HSRP is tracking E 0/0 interface using a Track ID of 11. If E 0/0 goes
down on the active HSRP router for this group, it should decrement the
priority by 20 and the other router should become the Active HSRP
router.
R1
Interface E 0/1
standby 2 track 11 decrement 20
R2
Interface E 0/1
standby 2 track 11 decrement 20
Verification:
Verify the HSRP status by issuing the “Show standby brief” command
on both routers.
Task 1
De-Configure HSRP on R1 & R2.
R1 R2
o Group ID: 1
o Virtual IP: 192.168.100.254
o Priority: R1 (105); R2 (100 – Default)
o Preemption: Enabled on both
o Authentication: MD5 using a key of kbits@123
R1
Interface E 0/1
vrrp 1 ip 192.168.100.254
vrrp 1 priority 105
vrrp 1 authentication md5 key-string kbits@123
R2
Interface E 0/1
vrrp 1 ip 192.168.100.254
vrrp 1 authentication md5 key-string kbits@123
Task 3
Tracking is enabled for E 0/0 interface based on the previous lab using a
Track ID of 11. If E 0/0 goes down on the Master VRRP router for this
group, it should decrement the priority by 20 and the other router
should become the Master router.
R1
Interface E 0/1
vrrp 1 track 11 decrement 20
R2
Interface E 0/1
vrrp 1 track 11 decrement 20
Task 4
Configure VRRP between R1 and R2 on the 192.168.100.0 segment. Use
the following parameters for Group 2.
o Group ID: 2
o Virtual IP: 192.168.100.253
o Priority: R2 (105); R1 (100-Default)
o Preemption: Enabled on both
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
569 of 655
o Authentication: MD5 using a key of kbits@123
R1
Interface E 0/1
vrrp 2 ip 192.168.100.253
vrrp 2 authentication md5 key-string kbits@123
R2
Interface E 0/1
vrrp 2 ip 192.168.100.253
vrrp 2 priority 105
vrrp 2 authentication md5 key-string kbits@123
Task 5
Tracking is enabled for E 0/0 interface based on the previous lab using a
Track ID of 11. If E 0/0 goes down on the Master VRRP router for this
group, it should decrement the priority by 20 and the other router
should become the Master router.
R1
Interface E 0/1
vrrp 2 track 11 decrement 20
R2
Interface E 0/1
vrrp 2 track 11 decrement 20
Verification:
Verify the HSRP status by issuing the “Show standby brief” command
on both routers.
Task 1
Configure R1 as the DHCP Server a scope for network 192.168.100.0/24
using the following parameters:
o Excluded Addresses:
▪ 192.168.100.1 – 192.168.100.20
▪ 192.168.100.251 – 192.168.100.254
o Default Gateway: 192.168.100.253
o DNS Server: 192.168.100.2
R1
Task 2
Configure PC-1 to receive an IP Address automatically (DHCP).
Verification:
Verify the configuration on the PC using the “IPConfig” command. Also,
use the “Tracert 10.4.4.4” command to check the flow of traffic. It
should use R2 as it should be the Master router for Standby group 2
(Default Router: 192.168.100.253)
Task 1
Configure R1 as the DHCP Server a scope for network 192.168.200.0/24
using the following parameters:
o Excluded Addresses:
▪ 192.168.200.1 – 192.168.200.20
o Default Gateway: 192.168.200.3
o DNS Server: 192.168.100.2
R1
R3
No Ip forward-protocol udp 37
No Ip forward-protocol udp 49
No Ip forward-protocol udp 53
No Ip forward-protocol udp 69
No Ip forward-protocol udp 137
No Ip forward-protocol udp 138
!
Interface E 0/1
Ip helper-address 192.168.100.1
Task 3
Configure PC-2 to receive an IP Address automatically (DHCP).
Verification:
Verify the configuration on the PC using the “IPConfig” command. Also,
use the “Ping 10.4.4.4” command to check connectivity towards R4.
Task 1
R1 is the only DHCP Server in the environment. It does not support
Option-82. Configure SW-100 such that it only allows DHCP replies from
R1 in VLAN 100.
SW-100
Ip dhcp snooping
Ip dhcp snooping vlan 100
no ip dhcp snooping information option
!
Interface E 0/0
Ip dhcp snooping trust
Task 2
Configure the port on SW-100 connected towards R3 E0/0 also as a
trusted port as it is acting as a DHCP Relay Agent.
SW-100
Task 3
Use the “IPConfig /release” command to release the assigned address
on PC-1 & PC-2.
Verification:
You should be assigned addresses from the DHCP Server.
Task 1
R4 is in Dubai. Dubai is 4 hours ahead of GMT. Configure the Timezone
on R4. Set the time based on Dubai. Configure R4 as the NTP Master
with a stratum of 4. It should use Loopback0 as the NTP Source.
R4
R1
Task 3
Authenticate the NTP Associations between the routers using a Key of 11
and key-string of kbits@123.
R4
Ntp authenticate
Ntp authentication-key 11 md5 kbits@123
Ntp trusted-key 11
R1
Ntp authenticate
Ntp authentication-key 11 md5 kbits@123
Ntp trusted-key 11
Ntp server 10.4.4.4 key 11
R2
Ntp authenticate
Ntp authentication-key 11 md5 kbits@123
Ntp trusted-key 11
Ntp server 10.4.4.4 key 11
Task 1
Configure R1, R2, R3, and R4 to communicate with ISE for AAA Services.
R4 should use the Loopback 0 interface to communicate to ISE. All the
devices should use a secret key of kbits@123.
R1
Aaa new-model
!
Tacacs server ISE
Address ipv4 192.168.100.10
key kbits@123
R2
Aaa new-model
!
Tacacs server ISE
Aaa new-model
!
Tacacs server ISE
Address ipv4 192.168.100.10
key kbits@123
R4
Aaa new-model
!
Tacacs server ISE
Address ipv4 192.168.100.10
key kbits@123
!
Ip tacacs source-interface Loopback0
Task 2
Create a username admin1 with a password of admin1 in the local
database. Assign it a privilege level of 15. This needs to be configured on
all the routers.
R1
R1
Task 4
Configure all routers to use ISE-SVRS for login authentication. Use a
Named-list called T-AUTHEN. T-AUTHEN should use ISE-SVRS as the
primary authentication and Local Database for fallback authentication.
Enable Telnet & SSH on the Routers and have them use T-AUTHEN for
authentication.
R1
Task 5
Configure all routers to use the ISE-SVRS for Exec authorization. Use a
named list called T-AUTHOR. T-AUTHOR should use ISE-SVRS as the
primary exec authorization and Local Database for fallback
authorization. Have Telnet & SSH use T-AUTHOR for authorization.
R1
R1
!
Line vty 0 4
Accounting exec T-ACCT
Accounting command 15 T-ACCT
R2
!
Line vty 0 4
Accounting exec T-ACCT
Accounting command 15 T-ACCT
R3
!
Line vty 0 4
Accounting exec T-ACCT
Accounting command 15 T-ACCT
R4
!
Line vty 0 4
Accounting exec T-ACCT
Accounting command 15 T-ACCT
Logical Topology
R1
R2
R4
Task 1
Configure EIGRP in AS 111 between R1, R2 & R4. Enable all interfaces
on all 3 routers in EIGRP. Configure the E 0/1 interfaces on R1 & R2 as
passive-interfaces.
R1 R2
Task 2
Configure and enable an SLA object on R3 with the following parameters:
o SLA Object #: 33
o Destination IP: 4.2.2.2
o Source-IP: 192.1.10.1
o Protocol: ICMP Echo
o Frequenct: 20
R3
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
586 of 655
Ip route 4.2.2.2 255.255.255.255 192.1.10.1
!
ip sla 33
icmp-echo 4.2.2.2 source-ip 192.1.10.3
frequency 20
!
ip sla schedule 33 start-time now life forever
Task 3
Configure a Track object 33. It have a state of “UP” based on the state of
SLA 33.
R3
Task 4
Configure floating default static routes via R1 or R2. R1 should be used
as the preferred default route if track object 33 has a state of “UP”.
R3
Verification:
o Verify that the Default Route installed in the routing table is via
R1. Verify the connectivity by pinging 199.1.1.1.
o Verify that the Default Route installed in the routing table is via
R2. Verify the connectivity by pinging 199.1.1.1.
o Verify that the Default Route installed in the routing table is via
R1. Verify the connectivity by pinging 199.1.1.1.
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
587 of 655
Lab 10 – Configuring Dynamic NAT
Logical Topology
R1
R2
Task 1
Configure a Default routes on R2 pointing towards R1. Configure a
Default routes on R3 pointing towards R2.
R2
Task 2
Configure Routing for Internal networks between R2 & R3. Use EIGRP in
AS 111 as the routing protocol.
R2
R1
Task 4
Configure R2 for NAT. Enable the E 0/0 interface as the Outside
interface for NAT. Enable the E 0/1 interface as the Inside interface for
NAT.
R2
Verification:
Logical Topology
R2
Verification:
Logical Topology
o 192.168.3.1 – 192.1.10.31
o 192.168.3.2 – 192.1.10.32
o 192.168.3.3 – 192.1.10.33
R2
Verification:
Logical Topology
R2
Verification:
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Quality of Service (QoS)
CCDE # 20110020
R1
R2
R3
R1 R3
Task 2
Configure R1 for Rate Limiting (Policing) for traffic originating from the
1.1.1.0/24 network going towards the Internet using the following
parameters:
• ICMP traffic should be limited to 450 kbps
• FTP traffic should be limited to 2 mbps
R1
Task 1
Configure R3 Ethernet interface for Bandwidth Reservation using the
following:
• HTTP and HTTPS traffic = Reserve 30% of the Bandwidth
• Telnet Traffic = Reserve 10% of the Bandwidth
R3
Task 1
Configure R3 Ethernet interface for LLQ using the following:
• SSH Traffic = 15% of the bandwidth. SSH traffic should use LLQ.
R3
Verification:
Task 1
Configure R1 Ethernet interface for QoS using the following criteria:
• Configure Policing such that HTTP downloading is policed at 100
kbps for *.gif or *.jpg files.
R1
Task 1
Configure R1 such that all FTP or TFTP traffic going towads 1.3.0.0/16
network should have a minimum reserved bandwidth of 256 kbps and
should be shaped to the 512 kbps.
R1
Task 1
Any traffic that is destined to either of the URLs specified below should
be prioritized from the 1.3.2.0/24 network should be prioritized going
towards the Internet. Set the priority percent to 20.
▪ Cisco.com
▪ Kbits.live
R3
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Multicast-Routing
CCDE # 20110020
R1
R2
R3
R1 R3
Task 2
Configure PIM dense mode on the routers.
R1 R3
Ip multicast-routing Ip multicast-routing
! !
Int E 0/0 Int E 0/0
Ip pim dense-mode Ip pim dense-mode
! !
Int Loopback0 Int Loopback0
Ip pim dense-mode Ip pim dense-mode
Int Loopback1 Int Loopback1
Ip pim dense-mode Ip pim dense-mode
R2
Ip multicast-routing
!
Int E 0/0
Ip pim dense-mode
!
Int E 0/1
Ip pim dense-mode
!
Int Loopback0
Ip pim dense-mode
!
Int Loopback1
Ip pim dense-mode
Copyrights Kbits 2015-2025
Website: http://www.kbits.live; Email: kb@kbits.live
609 of 655
Task 3
Configure R1 & R3 to join the multicast group 224.1.1.3 on the Loopback
0 interfaces.
R1 R3
Task 4
Configure R1, R2 & R3 to join the multicast group 224.1.2.3 on the
Loopback 1 interfaces.
R1 R3
Int Loopback 1
Ip igmp join-group 224.1.2.3
Verification:
o Ping 224.1.1.3 from R2. You should receive a reply from R1 & R3.
o Ping 224.1.2.3 from R2. You should receive a reply from all 3
routers.
R1 R2
Interface loopback0
Ip pim sparse-mode
!
Interface loopback1
Ip pim sparse-mode
!
Int E 0/0
Ip pim sparse-mode
!
Ip pim rp-address 1.2.1.1
Verification:
o Ping 224.1.1.3 from R2. You should receive a reply from R1 & R3.
o Ping 224.1.2.3 from R2. You should receive a reply from all 3
routers.
Task 1
De-configure R2 (1.2.1.1) as the Static RP on all 3 Routers.
R1 R2
Task 2
Configure R1 to be the RP for Multicast groups 224.1.1.3, and R2 to be
the RP for the groups 224.1.2.3. These two RPs should use their
Loopback 0 interface for this purpose.
R1 R2
Verification:
o Ping 224.1.1.3 from R2. You should receive a reply from R1 & R3.
o Ping 224.1.2.3 from R2. You should receive a reply from all 3
routers.
Task 1
Configure R1 Loopback 0 and R3 loopback 0 to to join the following
Multicast groups:
R1 R3
Verification:
o Ping any of the new joined Multicast groups from R2. Are you
receiving a reply?
R1 R2
Interface F 0/0
Ip pim sparse-dense-mode
!
Interface F 0/1
Ip pim sparse-dense-mode
Task 1
De-configure R1 & R2 as the Static RP on all 3 Routers.
R1 R2
R2
Verification:
o Ping 224.1.1.3 from R2. You should receive a reply from R1 & R3.
o Ping 224.1.2.3 from R2. You should receive a reply from all 3
routers.
Task 1
De-configure Auto-RP on all 3 Routers.
R2
R2
Verification:
o Ping 224.1.1.3 from R2. You should receive a reply from R1 & R3.
o Ping 224.1.2.3 from R2. You should receive a reply from all 3
routers.
R1
R2
R3
R4
R6
Task 1
Configure EIGRP 100 on all routers and advertise all the directly
connected networks.
R1 R2
R1 R2
Ip multicast-routing Ip multicast-routing
! !
Interface Loopback 0 Interface Loopback 0
Ip pim sparse-mode Ip pim sparse-mode
Ip igmp join-group 224.1.2.3 Ip igmp join-group 224.1.2.3
Ip igmp join-group 224.12.34.56 Ip igmp join-group 224.12.34.56
! !
Interface E 0/0 Interface E 0/0
Ip pim sparse-mode Ip pim sparse-mode
! !
Ip pim rp-address 1.3.1.1 Interface E 0/1
Ip pim sparse-mode
!
Ip pim rp-address 1.3.1.1
R3
Ip multicast-routing
!
Interface Loopback 0
Ip pim sparse-mode
Ip igmp join-group 224.1.2.3
Ip igmp join-group 224.12.34.56
!
Interface E 0/0
Ip pim sparse-mode
!
Interface E 0/1
Ip pim sparse-mode
!
Ip pim rp-address 1.3.1.1
Verification:
R4 R5
Ip multicast-routing Ip multicast-routing
! !
Interface Loopback 0 Interface Loopback 0
Ip pim sparse-mode Ip pim sparse-mode
Ip igmp join-group 224.4.5.6 Ip igmp join-group 224.4.5.6
Ip igmp join-group 224.12.34.56 Ip igmp join-group 224.12.34.56
! !
Interface E 0/0 Interface E 0/0
Ip pim sparse-mode Ip pim sparse-mode
! !
Interface E 0/1 Interface E 0/1
Ip pim sparse-mode Ip pim sparse-mode
! !
Ip pim rp-address 1.4.1.1 Ip pim rp-address 1.4.1.1
R6
Ip multicast-routing
!
Interface Loopback 0
Ip pim sparse-mode
Ip igmp join-group 224.4.5.6
Ip igmp join-group 224.12.34.56
!
Interface E 0/0
Ip pim sparse-mode
!
Interface E 0/1
Ip pim sparse-mode
!
Ip pim rp-address 1.4.1.1
Verification:
R3
Verification:
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Automation & Python
CCDE # 20110020 Programming
R1
R2
R4
Task 1
Configure EIGRP as the Routing protocol in AS 111 between R1, R2, R3
& R4. Enable all interfaces on all 3 routers in EIGRP.
R1 R2
R1
Ip domain-name kbits.live
Crypto key generate rsa modulus 1024
!
Username khawar privilege 15 password cisco
!
Line vty 0 4
Login loca
Transport input telnet ssh
R2
Ip domain-name kbits.live
Crypto key generate rsa modulus 1024
!
Username khawar privilege 15 password cisco
!
Line vty 0 4
Login loca
Transport input telnet ssh
R3
Ip domain-name kbits.live
Crypto key generate rsa modulus 1024
!
Username khawar privilege 15 password cisco
!
Line vty 0 4
Login loca
Transport input telnet ssh
R4
Ip domain-name kbits.live
Crypto key generate rsa modulus 1024
!
Username khawar privilege 15 password cisco
!
Line vty 0 4
Login loca
Transport input telnet ssh
R1
Verification:
o The EEM Applet should bring the interface back up and display
the message on the console.
Task 1
Configure an EEM Applet on R2 such it notifies the Support Team that
the EIGRP neighbor relationship with R1 has gone down in EIGRP AS
111. Use the following parameters for the applet:
R2
Admin PC
ab = Telnet('172.25.1.1')
ab.write(b'khawar\n')
ab.write(b'cisco\n')
ab.write(b'term len 0\n')
ab.write(cmd.encode('ascii') + b'\n')
ab.write(b'exit\n')
print (ab.read_all().decode('ascii'))
Verification:
o Run the script. It will prompt you for the Command. Type a
command of your choice (Example: show ip interface brief)
Admin PC
ab = Telnet('172.25.1.1')
ab.write(b'khawar\n')
ab.write(b'cisco\n')
ab.write(b'config t\n')
ab.write(b'Interface Loopback99\n')
ab.write(b'ip address 99.99.99.99 255.0.0.0\n')
ab.write(b'end\n')
ab.write(b'sh ip int brief\n')
ab.write(b'exit\n')
print (ab.read_all().decode('ascii'))
Verification:
Admin PC
ab = Telnet('172.25.1.1')
ab.write(b'khawar\n')
ab.write(b'cisco\n')
ab.write(b'config t\n')
ab.write(b'Interface ' + Interface.encode('ascii') + b'\n')
ab.write(b'IP Address ' + Ipaddr.encode('ascii') + b' ' + SMask.encode('ascii') + b'\n')
ab.write(b'end\n')
ab.write(b'sh ip int brief\n')
ab.write(b'exit\n')
print (ab.read_all().decode('ascii'))
Admin PC
ab = Telnet(HOST)
ab.write(USER.encode('ascii') + b'\n')
ab.write(PASS.encode('ascii') + b'\n')
ab.write(b'config t\n')
ab.write(b'Interface ' + Interface.encode('ascii') + b'\n')
ab.write(b'IP Address ' + Ipaddr.encode('ascii') + b' ' + SMask.encode('ascii') + b'\n')
ab.write(b'end\n')
ab.write(b'sh ip int brief\n')
ab.write(b'exit\n')
print (ab.read_all().decode('ascii'))
➢ Hostname: 172.25.1.2
➢ Username: khawar
➢ Password: cisco
➢ Interface Name: Loopback55
➢ IP Address: 55.2.2.2
➢ Subnet Mask: 255.0.0.0
Admin PC
ABC = {
'device_type': 'cisco_ios',
'host': 172.25.1.1,
'username': 'khawar',
'password': 'cisco',
'port' : 22, # optional, defaults to 22
'secret': 'cisco', # optional, defaults to ''
}
MYSSH = ConnectHandler(**ABC)
Verification:
Admin PC
ABC = {
'device_type': 'cisco_ios',
'host': HOST,
'username': user,
'password': getpass(),
'port' : 22, # optional, defaults to 22
'secret': 'cisco', # optional, defaults to ''
}
myconnect = ConnectHandler(**ABC)
➢ Hostname: 172.25.1.3
➢ Username: khawar
➢ Password: cisco
172.25.1.1
172.25.1.2
172.25.1.3
172.25.1.4
Admin PC
net_connect = ConnectHandler(**Router)
net_connect.disconnect()
Admin PC
ROUTER = {
'device_type': 'cisco_ios',
'ip': '172.25.1.1',
'username': 'khawar',
'password': 'cisco'
}
net_connect = ConnectHandler(**ROUTER)
net_connect.disconnect()
172.25.1.1
172.25.1.2
172.25.1.3
172.25.1.4
Admin PC
net_connect = ConnectHandler(**Router)
net_connect.disconnect()
o Verify that the files are created for all the routers in your folder.