CCNA Routing and Switching: Connecting Networks: Instructor Packet Tracer Manual
CCNA Routing and Switching: Connecting Networks: Instructor Packet Tracer Manual
Connecting Networks
Instructor Packet Tracer Manual
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6
Packet Tracer – Skills Integration Challenge - OSPF
Addressing Table
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6
Packet Tracer – Skills Integration Challenge - OSPF
2001:DB8:A:209::2/64 FE80::5
10.10.10.10 255.255.255.192 10.10.10.1
Intranet NIC
2001:DB8:A:10::10/64 FE80::1
DHCP assigned DHCP assigned
PC1 - PC6 NIC
Auto Config Auto Config
Scenario
Your business has just expanded into a different town and needs to expand its presence across the Internet.
You are tasked with completing the upgrades to the enterprise network, which includes dual-stacked IPv4 and
IPv6, and a variety of addressing and routing technologies.
Requirements
Note: Although not required, adding additional labeling to the topology may help you as you proceed. All
names and passwords are case-sensitive.
Basic Device Configuration
Configure the following on R1 and R4.
- Set the device names to match the Addressing Table.
- Set cisco as the encrypted privileged EXEC mode password.
- Set a banner MOTD which includes the word warn.
- Set the IPv4 and IPv6 addresses according to the Addressing Table.
- Assign the link local address to each interface.
SSH
Configure SSH on R4.
- Set a domain name of R4.
- Create a user of admin with an encrypted password of cisco.
- Create a 2,048-bit RSA key.
- Configure all vty lines to use SSH and a local login.
DHCPv4
Configure R4 to act as a DHCP server for its LAN.
- Create a DHCP pool using the name R4.
- Assign the appropriate addressing information to the pool including the 209.165.44.2 as the DNS
server.
- Prevent the address used by the router from being distributed to end devices.
NAT
Configure NAT/PAT on R4 so that all devices on the LAN use the IP address on the Serial 0/0/1 to
access the Internet.
- Use a single statement in access list 1 to define the addresses that will participate in NAT. Allow only
the 10.10.4.0/24 address space.
- Enable NAT/PAT using the access list.
- Configure the appropriate interfaces as NAT inside or outside.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6
Packet Tracer – Skills Integration Challenge - OSPF
Device Configs
Router R1
enable
configure terminal
hostname R1
enable secret cisco
ipv6 unicast-routing
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6
Packet Tracer – Skills Integration Challenge - OSPF
interface GigabitEthernet0/0
ip address 10.10.10.1 255.255.255.192
ip nat inside
ipv6 address FE80::1 link-local
ipv6 address 2001:DB8:A:10::1/64
ipv6 ospf 1 area 0
no shutdown
interface Serial0/0/0
ip address 64.102.139.2 255.255.255.0
ip nat outside
ipv6 address FE80::1 link-local
ipv6 address 2001:DB8:A:64::2/64
ipv6 ospf 1 area 0
no shutdown
interface Serial0/0/1
ip address 10.10.1.1 255.255.255.252
ip nat inside
ipv6 address FE80::1 link-local
ipv6 address 2001:DB8:B:1::1/64
ipv6 ospf 1 area 0
clock rate 4000000
no shutdown
interface Serial0/1/0
ip address 10.10.1.5 255.255.255.252
ip nat inside
ipv6 address FE80::1 link-local
ipv6 address 2001:DB8:B:2::1/64
ipv6 ospf 1 area 0
clock rate 4000000
no shutdown
router ospf 1
passive-interface GigabitEthernet0/0
network 10.10.10.0 0.0.0.63 area 0
network 10.10.1.0 0.0.0.3 area 0
network 10.10.1.4 0.0.0.3 area 0
default-information originate
ipv6 router ospf 1
router-id 1.1.1.1
ip nat pool R1 64.102.139.4 64.102.139.7 netmask 255.255.255.252
ip nat inside source list 1 pool R1 overload
ip nat inside source static tcp 10.10.10.10 80 64.102.139.2 80
ip nat inside source static tcp 10.10.10.10 443 64.102.139.2 443
ip route 0.0.0.0 0.0.0.0 64.102.139.1
ipv6 route ::/0 Serial0/0/0
access-list 1 permit 10.10.0.0 0.0.255.255
banner motd ^CWarning^C
end
copy running-config startup-config
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6
Packet Tracer – Skills Integration Challenge - OSPF
Router R4
enable
configure terminal
hostname R4
enable secret cisco
ip dhcp excluded-address 10.10.4.1
ip dhcp pool R4
network 10.10.4.0 255.255.255.0
default-router 10.10.4.1
dns-server 209.165.44.2
ipv6 unicast-routing
username admin secret cisco
ip domain-name R4
interface GigabitEthernet0/0
ip address 10.10.4.1 255.255.255.0
ip nat inside
ipv6 address FE80::4 link-local
ipv6 address 2001:DB8:A:4::1/64
no shutdown
interface Serial0/0/1
ip address 64.103.17.2 255.255.255.252
ip nat outside
ipv6 address FE80::4 link-local
ipv6 address 2001:DB8:A:103::2/64
no shutdown
ip nat inside source list 1 interface Serial0/0/1 overload
ip route 0.0.0.0 0.0.0.0 Serial0/0/1
ipv6 route ::/0 Serial0/0/1
access-list 1 permit 10.10.4.0 0.0.0.255
banner motd ^CWarning^C
line vty 0 4
login local
transport input ssh
crypto key generate rsa
yes
2048
end
copy running-config startup-config
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6
Packet Tracer – Skills Integration Challenge - EIGRP (Instructor
Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Note: This activity and the similar Packet Tracer - Skills Integration Challenge - OSPF activity are meant as
resources for you to determine what skills you may not have yet mastered from the previous courses. Refer to
your notes and previous content if you need assistance. But it may be fun initially to see just how much you
retained.
Instructor Note: This activity is provided solely as a method for assessing student mastery from previous
courses. It can be used as a tool to advise the student on remediation strategies.
Topology
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8
Packet Tracer – Skills Integration Challenge - EIGRP
Addressing Table
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 8
Packet Tracer – Skills Integration Challenge - EIGRP
10 Students F0/5-11
20 Faculty/Staff F0/12-17, G0/1-2
30 Guest(Default) F0/18-24
88 Management N/A
99 Native F0/1-4
Scenario
You are a network technician new to a company that has lost its last technician in the middle of a system
upgrade. You are tasked with completing upgrades to the network infrastructure that has two locations. Half of
the enterprise network uses IPv4 addressing and the other half uses IPv6 addressing. The requirements also
include a variety of routing and switching technologies.
Requirements
You have console access to Branch3, Branch7, and S3. You can remotely access other devices with the
username admin and password adminpass. The password for accessing privileged EXEC mode is class.
IPv4 Addressing
Finish designing the IPv4 addressing scheme. Subnets already assigned are using the 192.168.1.0/24
address space. Use the remaining space to meet the following criteria:
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 8
Packet Tracer – Skills Integration Challenge - EIGRP
- 120 hosts for the Student VLAN attached to the Branch3 G0/0.10 interface.
- 60 hosts for the Faculty/Staff VLAN attached to the Branch3 G0/0.20 interface.
Configure inter-VLAN routing and assign the first available address from each subnet to subinterfaces on
the Branch3 router.
Assign the second available address in the Faculty/Staff VLAN to Host-B.
IPv4 Routing
Configure EIGRP for IPv4 on Branch3.
- Enable EIGRP 22.
- Advertise each of the directly connected networks and disable automatic summarization.
- Prevent routing updates from being sent out the LAN interfaces.
- Configure a summary route for the Branch3 LANs and advertise the route to Branch1 and Branch2.
Configure a directly connected default route on Branch1 pointing to the ISP and propagate it within the
EIGRP updates.
DHCP
Configure Branch3 to act as a DHCP server for VLAN 10 on S3.
- The case-sensitive pool name is Students.
- The DNS server is 209.165.201.14.
- Exclude the first 10 addresses from the pool.
Configure Branch1 to receive an IPv4 address from the ISP.
IPv6 Routing
Configure EIGRP for IPv6 on Branch7.
- Enable IPv6 routing and EIGRP for IPv6 using ASN 222.
- Assign router ID 7.7.7.7.
- Advertise directly connected networks.
- Configure IPv6 summary routes for the LANs and advertise them to directly connected routers.
Configure a fully specified default route on Branch4 pointing to the ISP and propagate it within the
EIGRP updates.
Basic Switch Security
Configure S3 with the following security settings.
- Banner MOTD that includes the word warning.
- Console port login and password of cisco.
- Encrypted enable password of class.
- Encrypt plain text passwords.
- Shut down all unused ports.
Enable port security on S3 on the interfaces that the PCs are connected to.
- Configure as access ports.
- Only allow 1 host per port.
- Enable dynamic learning that stores the MAC address in the running configuration.
- Ensure that port violations disable ports.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 8
Packet Tracer – Skills Integration Challenge - EIGRP
Device Configs
Router Branch1
enable
configure terminal
interface g0/0
ip address dhcp
router eigrp 22
redistribute static
ip route 0.0.0.0 0.0.0.0 g0/0
end
copy running-config startup-config
Router Branch3
enable
configure terminal
interface g0/0.10
encapsulation dot1q 10
ip address 192.168.1.1 255.255.255.128
interface g0/0.20
encapsulation dot1q 20
ip address 192.168.1.129 255.255.255.192
interface s0/0/0
ip summary-address eigrp 22 192.168.0.0 255.255.254.0 5
interface s0/0/1
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 8
Packet Tracer – Skills Integration Challenge - EIGRP
Router Branch4
enable
configure terminal
ipv6 route ::/0 Serial0/1/0 2001:DB8:5::1
ipv6 router eigrp 222
redistribute static
end
copy running-config startup-config
Router Branch7
enable
configure terminal
ipv6 unicast-routing
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 8
Packet Tracer – Skills Integration Challenge - EIGRP
interface g0/0
ipv6 eigrp 222
interface g0/1
ipv6 eigrp 222
interface s0/0/0
ipv6 eigrp 222
ipv6 summary-address eigrp 222 2001:db8:a::/47
interface s0/0/1
ipv6 eigrp 222
ipv6 summary-address eigrp 222 2001:db8:a::/47
ipv6 router eigrp 222
eigrp router-id 7.7.7.7
no shutdown
end
copy running-config startup-config
Switch S1
enable
configure terminal
spanning-tree vlan 10,20 root secondary
spanning-tree vlan 30 root primary
interface GigabitEthernet0/1
switchport trunk native vlan 99
switchport mode trunk
end
copy running-config startup-config
Switch S3
enable
configure terminal
enable secret class
service password-encryption
spanning-tree mode rapid-pvst
spanning-tree vlan 10,20 root primary
spanning-tree vlan 30 root secondary
vlan 10
name Students
vlan 20
name Faculty/Staff
vlan 30
name Guest(Default)
vlan 88
name Management
vlan 99
name Native
interface range f0/5-24, g0/1-2
shutdown
interface range f0/1-2
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 8
Packet Tracer – Skills Integration Challenge - EIGRP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 8
Packet Tracer – Troubleshooting Serial Interfaces (Instructor
Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Diagnose and Repair the Physical Layer
Part 2: Diagnose and Repair the Data Link Layer
Part 3: Diagnose and Repair the Network Layer
Scenario
You have been asked to troubleshoot WAN connections for a local telephone company (Telco). The Telco
router should communicate with four remote sites, but none of them are working. Use your knowledge of the
OSI model and a few general rules to identify and repair the errors in the network.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Packet Tracer – Troubleshooting Serial Interfaces
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Packet Tracer – Troubleshooting Serial Interfaces
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Packet Tracer – Configuring PAP and CHAP Authentication
(Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Review Routing Configurations
Part 2: Configure PPP as the Encapsulation Method
Part 3: Configure PPP Authentication
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Packet Tracer – Configuring PAP and CHAP Authentication
Background
In this activity, you will practice configuring PPP encapsulation on serial links. You will also configure PPP PAP
authentication and PPP CHAP authentication.
Step 3: Configure R3 to use PPP encapsulation with R1, R2, and ISP.
Enter the appropriate commands on R3:
R3(config)# interface s0/0/0
R3(config-if)# encapsulation ppp
R3(config)# interface s0/0/1
R3(config-if)# encapsulation ppp
R3(config)# interface s0/1/0
R3(config-if)# encapsulation ppp
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Packet Tracer – Configuring PAP and CHAP Authentication
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Packet Tracer – Troubleshooting PPP with Authentication
(Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Diagnose and Repair the Physical Layer
Part 2: Diagnose and Repair the Data Link Layer
Part 3: Diagnose and Repair the Network Layer
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Troubleshooting PPP with Authentication
Scenario
The routers at your company were configured by an inexperienced network engineer. Several errors in the
configuration have resulted in connectivity issues. Your boss has asked you to troubleshoot and correct the
configuration errors and document your work. Using your knowledge of PPP and standard testing methods,
find and correct the errors. Make sure that all of the serial links use PPP CHAP authentication, and that all of
the networks are reachable. The passwords are cisco and class.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Troubleshooting PPP with Authentication
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Troubleshooting PPP with Authentication
Step 2: Verify full connectivity by tracing a path from PC1 and PC3 to the web server.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Packet Tracer – Skills Integration Challenge (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5
Packet Tracer – Skills Integration Challenge
Addressing Table
Background
This activity allows you to practice a variety of skills including configuring VLANs, PPP with CHAP, static and
default routing, using IPv4 and IPv6. Due to the sheer number of graded elements, you can click Check
Results and Assessment Items to see if you correctly entered a graded command. Use the cisco and class
passwords to access privileged EXEC modes of the CLI for routers and switches.
Requirements
Addressing
The addressing scheme uses the 192.168.1.0/24 address space. Additional address space is available
between VLAN 15 and VLAN 1. VLAN 25 needs enough addresses for 50 hosts. Determine the subnet
and complete the subnet table below.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 5
Packet Tracer – Skills Integration Challenge
1 192.168.1.192 255.255.255.224 20
15 192.168.1.0 255.255.255.128 100
25 192.168.1.128 255.255.255.192 50
99 192.168.1.224 255.255.255.224 20
Complete the Addressing Table by assigning the following addresses to VLAN 25:
- R2 G0/0.25 - First IPv4 address
nd
- PC25 - 2 IPv4 address
- L25 - Last IPv4 address
Configure IPv4 addressing on the necessary end devices.
On R2, create and apply IPv4 and IPv6 addressing to the G0/0.25 subinterface.
VLANs
On S1, create VLAN 86 and name it BlackHole.
Configure S1 ports in static mode with the following requirements:
- F0/1 is the native trunk for VLAN 99.
- F0/7 - F0/18 as access ports in VLAN 15.
- F0/19 - F0/24 as access ports in VLAN 25.
- G0/1 - 2 and F0/2 - F0/6 are unused. They should be properly secured and assigned to the
BlackHole VLAN.
On R2, configure inter-VLAN routing. VLAN 99 is the native VLAN.
PPP
Configure R1 and R2 to use PPP with CHAP for the shared link. The password for CHAP is cisco.
Routing
On R1, configure IPv4 and IPv6 default routes using the appropriate exit interface.
On R2, configure an IPv6 default route using the appropriate exit interface.
Configure IPv4 OSPF using the following requirements:
- Use process ID 1.
- Routers R1 and R2 are in area 0.
- R1 uses router ID 1.1.1.1.
- R2 uses router ID 2.2.2.2.
- Advertise specific subnets.
- On R1, propagate the IPv4 default route created.
Configure IPv6 OSPF using the following requirements:
- Use process ID 1.
- Routers R1 and R2 are in area 0.
- Configure OSPF on appropriate interfaces on R1 and R2.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 5
Packet Tracer – Skills Integration Challenge
Connectivity
All devices should be able to ping the web server.
Scripts
Configure PC25 and L25 with IPv4 Addressing
Router R1
enable
config t
ipv6 unicast-routing
username R2 password 0 cisco
interface Serial0/0/0
encapsulation ppp
ppp authentication chap
ipv6 ospf 1 area 0
router ospf 1
network 10.1.1.0 0.0.0.3 area 0
default-information originate
router-id 1.1.1.1
ipv6 router ospf 1
router-id 1.1.1.1
ip route 0.0.0.0 0.0.0.0 Serial0/0/1
ipv6 route ::/0 Serial0/0/1
end
copy running-config startup-config
Router R2
enable
config t
ipv6 unicast-routing
username R1 password 0 cisco
int g0/0
no shut
interface GigabitEthernet0/0.1
encapsulation dot1Q 1
ip add 192.168.1.193 255.255.255.224
ipv6 ospf 1 area 0
interface GigabitEthernet0/0.15
encapsulation dot1Q 15
ip add 192.168.1.1 255.255.255.128
ipv6 ospf 1 area 0
interface GigabitEthernet0/0.25
encapsulation dot1Q 25
ip address 192.168.1.129 255.255.255.192
ipv6 address FE80::2 link-local
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 5
Packet Tracer – Skills Integration Challenge
Switch S1
en
conf t
vlan 86
name BlackHole
exit
interface FastEthernet0/1
switchport trunk native vlan 99
switchport mode trunk
interface range Gig0/1 - 2 , FastEthernet0/2 - 6
switchport access vlan 86
switchport mode access
shutdown
interface range FastEthernet0/7 - 18
switchport access vlan 15
switchport mode access
interface range FastEthernet0/19 - 24
switchport access vlan 25
switchport mode access
end
copy running-config startup-config
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 5
Packet Tracer – Configuring Static Frame Relay Maps (Instructor
Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Configure Frame Relay
Part 2: Configure Static Frame Relay Maps and LMI Types
Scenario
In this activity, you will configure two static Frame Relay maps. Although the LMI type is autosensed on the
routers, you will statically assign the type by manually configuring the LMI.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Packet Tracer – Configuring Static Frame Relay Map
Step 2: Configure Frame Relay encapsulation on the S0/0/0 interfaces of R2 and R3.
R2(config)# interface s0/0/0
R2(config-if)# encapsulation frame-relay
Step 2: Configure ANSI as the LMI type on R1, R2, and R3.
Enter the following command on the serial interface for each router:
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Packet Tracer – Configuring Static Frame Relay Map
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Packet Tracer – Configuring Frame Relay Point-to-Point
Subinterfaces (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Configure Frame Relay
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Packet Tracer – Configuring Frame Relay Point-to-Point Subinterfaces
Scenario
In this activity, you will configure Frame Relay with two subinterfaces on each router to reach the other two
routers. You will also configure EIGRP and verify end-to-end connectivity.
Step 2: Configure Frame Relay encapsulation on the S0/0/0 interfaces of R2 and R3.
R2(config)# interface s0/0/0
R2(config-if)# encapsulation frame-relay
R2(config-if)# no shutdown
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Packet Tracer – Configuring Frame Relay Point-to-Point Subinterfaces
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Packet Tracer – Skills Integration Challenge (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5
Packet Tracer – Skills Integration Challenge
Addressing Table
Device Interface IPv4 Address Subnet Mask Default Gateway
DLCI Mappings
From / To R1 R2 R3 R4
R1 - 102 103 104
R2 201 - 203 204
R3 301 302 - 304
R4 401 402 403 -
Background
This activity allows you to practice a variety of skills, including configuring Frame Relay, PPP with CHAP,
EIGRP, static, and default routing.
Requirements
R1
Configure R1 to use PPP with CHAP on the link to the Internet. ISP is the router hostname. The
password for CHAP is cisco.
Configure a default route to the Internet. Use the exit interface.
Configure a static route to the LAN on R4. Use the next-hop IP address.
Configure EIGRP.
- Use AS number 100.
- Advertise the entire 10.0.0.0/8 network and disable automatic summarization.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 5
Packet Tracer – Skills Integration Challenge
R2 and R3
Configure EIGRP.
- Use AS number 100.
- Advertise the entire 10.0.0.0/8 network and disable automatic summarization.
- Do not send EIGRP messages out the LAN interfaces.
Configure full mesh Frame Relay.
- Configure Frame Relay encapsulation.
- Configure a map to each of the other routers. The PVC to R4 uses IETF encapsulation.
- The LMI type is ANSI.
R4
Configure static and default routing.
- Configure a static route for each of the LANs on R2 and R3. Use the next-hop IP address.
- Configure a default route to R1. Use the next-hop IP address.
Configure full mesh Frame Relay.
- Configure Frame Relay encapsulation using IETF.
- Configure a map to each of the other routers.
- The LMI type is ANSI.
Configuration Scripts
Router R1
en
conf t
username ISP password 0 cisco
interface Serial0/0/0
encapsulation frame-relay
frame-relay map ip 10.0.0.2 102 broadcast
frame-relay map ip 10.0.0.3 103 broadcast
frame-relay map ip 10.0.0.4 104 broadcast ietf
frame-relay lmi-type ansi
interface Serial0/0/1
encapsulation ppp
ppp authentication chap
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 5
Packet Tracer – Skills Integration Challenge
Router R2
en
conf t
interface Serial0/0/0
encapsulation frame-relay
frame-relay map ip 10.0.0.1 201 broadcast
frame-relay map ip 10.0.0.3 203 broadcast
frame-relay map ip 10.0.0.4 204 broadcast ietf
frame-relay lmi-type ansi
router eigrp 100
network 10.0.0.0
no auto-summary
passive-interface g0/0
end
copy run start
Router R3
en
conf t
interface Serial0/0/0
encapsulation frame-relay
frame-relay map ip 10.0.0.1 301 broadcast
frame-relay map ip 10.0.0.2 302 broadcast
frame-relay map ip 10.0.0.4 304 broadcast ietf
frame-relay lmi-type ansi
router eigrp 100
network 10.0.0.0
no auto-summary
passive-interface g0/0
end
copy run start
Router R4
en
conf t
interface Serial0/0/0
encapsulation frame-relay ietf
frame-relay map ip 10.0.0.1 401 broadcast
frame-relay map ip 10.0.0.2 402 broadcast
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 5
Packet Tracer – Skills Integration Challenge
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 5
Packet Tracer – Investigating NAT Operation (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Investigate NAT Operation Across the Intranet
Part 2: Investigate NAT Operation Across the Internet
Part 3: Conduct Further Investigations
Scenario
As a frame travels across a network, the MAC addresses may change. IP addresses can also change when a
packet is forwarded by a device configured with NAT. In this activity, we will investigate what happens to IP
addresses during the NAT process.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Packet Tracer – Investigating NAT Operation
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Packet Tracer – Investigating NAT Operation
e. Click Capture / Forward until the PDU is over R2. Record the source and destination IP addresses in the
outbound packet. To what devices do those addresses belong? 64.104.223.2 and 10.10.10.2 WRS and
centralserver.pka.
f. On R2, run the following command and match the IP addresses and ports recorded above to the correct
line of output:
R2# show ip nat translations
g. Return to Realtime mode. Did all of the web pages appear in the browsers? Yes.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Packet Tracer – Configuring Static NAT (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Test Access without NAT
Part 2: Configure Static NAT
Part 3: Test Access with NAT
Scenario
In IPv4 configured networks, clients and servers use private addressing. Before packets with private
addressing can cross then Internet, they need to be translated to public addressing. Servers that are
accessed from outside the organization are usually assigned both a public and a private static IP address. In
this activity, you will configure static NAT so that outside devices can access and inside server at its public
address.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Packet Tracer – Configuring Static NAT
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Packet Tracer – Configuring Dynamic NAT (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Configure Dynamic NAT
Part 2: Verify NAT Implementation
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Packet Tracer – Configuring Dynamic NAT
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Packet Tracer – Implementing Static and Dynamic NAT (Instructor
Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Configure Dynamic NAT with PAT
Part 2: Configure Static NAT
Part 3: Verify NAT Implementation
Step 3: Associate the named ACL with the NAT pool and enable PAT.
R2(config)# ip nat inside source list R2NAT pool R2POOL overload
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Packet Tracer – Implementing Static and Dynamic NAT
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Packet Tracer – Configuring Port Forwarding on a Linksys Router
(Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Configure Port Forwarding
Part 2: Verify Remote Connectivity to ServerA
Scenario
Your friend wants to play a game with you on your server. Both of you are at your respective homes,
connected to the Internet. You need to configure your SOHO (Small Office, Home Office) router to port
forward HTTP requests to your server so that your friend can access the game lobby web page.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 1
Packet Tracer – Verifying and Troubleshooting NAT
Configurations (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Isolate Problems
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Packet Tracer – Verifying and Troubleshooting NAT Configurations
Scenario
A contractor restored an old configuration to a new router running NAT. But, the network has changed and a
new subnet was added after the old configuration was backed up. It is your job to get the network working
again.
Step 4: Ping Server1 from PC1, PC2, L1, L2, and R2.
Record the success of each ping. Ping any other machines as needed.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Packet Tracer – Verifying and Troubleshooting NAT Configurations
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Packet Tracer – Skills Integration Challenge (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10
Packet Tracer – Skills Integration Challenge
Addressing Table
Instructor Note: The student version has blanks in place of all variables shown in double brackets.
Scenario
This culminating activity includes many of the skills that you have acquired during this course. First, you will
complete the documentation for the network. So make sure you have a printed version of the instructions.
During implementation, you will configure VLANs, trunking, port security and SSH remote access on a switch.
Then, you will implement inter-VLAN routing and NAT on a router. Finally, you will use your documentation to
verify your implementation by testing end-to-end connectivity.
Documentation
You are required to fully document the network. You will need a print out of this instruction set, which will
include an unlabeled topology diagram:
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 10
Packet Tracer – Skills Integration Challenge
- Label all the device names, network addresses and other important information that Packet Tracer
generated.
- Complete the Addressing Table and VLANs and Port Assignments Table.
- Fill in any blanks in the Implementation and Verification steps. The information is supplied when
you launch the Packet Tracer activity.
Implementation
Note: All devices in the topology except [[R1Name]], [[S1Name]], and [[PC1Name]] are fully configured. You
do not have access to the other routers. You can access all the servers and PCs for testing purposes.
Implement to following requirements using your documentation:
[[S1Name]]
Configure remote management access including IP addressing and SSH:
- Domain is cisco.com
- User [[UserText]] with password [[UserPass]]
- Crypto key length of 1024
- SSH version 2, limited to 2 authentication attempts and a 60 second timeout
- Clear text passwords should be encrypted.
Configure, name and assign VLANs. Ports should be manually configured as access ports.
Configure trunking.
Implement port security:
- On Fa0/1, allow 2 MAC addresses that are automatically added to the configuration file when
detected. The port should not be disabled, but a syslog message should be captured if a violation
occurs.
- Disable all other unused ports.
[[R1Name]]
Configure inter-VLAN routing.
Configure DHCP services for VLAN 30. Use LAN as the case-sensitive name for the pool.
Implement routing:
- Use OSPF process ID 1 and router ID 1.1.1.1
- Configure one network statement for the entire [[DisplayNet]] address space
- Disable interfaces that should not send OSPF messages.
- Configure a default route to the Internet.
Implement NAT:
- Configure a standard, one statement ACL number 1. All IP addresses belonging to the [[DisplayNet]]
address space are allowed.
- Refer to your documentation and configure static NAT for the File Server.
- Configure dynamic NAT with PAT using a pool name of your choice, a /30 mask, and these two public
addresses:
[[NATPoolText]]
[[PC1Name]]
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 10
Packet Tracer – Skills Integration Challenge
Verification
All devices should now be able to ping all other devices. If not, troubleshoot your configurations to isolate and
solve problems. A few tests include:
Verify remote access to [[S1Name]] by using SSH from a PC.
Verify VLANs are assigned to appropriate ports and port security is in force.
Verify OSPF neighbors and a complete routing table.
Verify NAT translations and statics.
- Outside Host should be able to access File Server at the public address.
- Inside PCs should be able to access Web Server.
Document any problems you encountered and the solutions in the Troubleshooting Documentation
table below.
Troubleshooting Documentation
Problem Solution
ID:[[indexAdds]][[indexNames]]
*****************************************************
ISOMORPH ID KEY:
ID = XY where;
X = indexAdds for /24 private address space
Y = indexNAMES for device names
Note: Each seed contains variables that are independent
of the other seeds. You do not need to test all the
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 10
Packet Tracer – Skills Integration Challenge
various combinations.
=======================================================
ISOMORPH ID = 00
=======================================================
!HQ!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
en
conf t
ip dhcp pool LAN
network 172.16.15.32 255.255.255.224
default-router 172.16.15.33
interface GigabitEthernet0/0
no shutdown
interface GigabitEthernet0/0.15
encapsulation dot1Q 15
ip address 172.16.15.17 255.255.255.240
ip nat inside
interface GigabitEthernet0/0.30
encapsulation dot1Q 30
ip address 172.16.15.33 255.255.255.224
ip nat inside
interface GigabitEthernet0/0.45
encapsulation dot1Q 45 native
ip address 172.16.15.1 255.255.255.248
interface GigabitEthernet0/0.60
encapsulation dot1Q 60
ip address 172.16.15.9 255.255.255.248
router ospf 1
router-id 1.1.1.1
passive-interface GigabitEthernet0/0
network 172.16.15.0 0.0.0.255 area 0
!
ip nat pool TEST 209.165.200.225 209.165.200.226 netmask 255.255.255.252
ip nat inside source list 1 pool TEST overload
ip nat inside source static 172.16.15.18 209.165.200.227
ip route 0.0.0.0 0.0.0.0 Serial0/1/0
access-list 1 permit 172.16.15.0 0.0.0.255
interface s0/0/0
ip nat inside
interface s0/0/1
ip nat inside
interface s0/1/0
ip nat outside
end
wr
!!!!!!!!!!!!!!!!!!!!!!!!
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 10
Packet Tracer – Skills Integration Challenge
!HQ-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!
en
conf t
int vlan 60
ip add 172.16.15.10 255.255.255.248
no shut
ip default-gateway 172.16.15.9
vlan 15
name Servers
vlan 30
name PCs
vlan 45
name Native
vlan 60
name Management
interface range fa0/1 - 10
switchport mode access
switchport access vlan 30
interface fa0/1
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
interface range fa0/11 - 20
switchport mode access
switchport access vlan 15
interface g0/1
switchport mode trunk
switchport trunk native vlan 45
interface range fa0/21 - 24 , g0/2
shutdown
ip domain-name cisco.com
crypto key gen rsa
1024
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 10
Packet Tracer – Skills Integration Challenge
=======================================================
ISOMORPH ID = 11
=======================================================
!Admin!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
en
conf t
ip dhcp pool LAN
network 10.10.10.192 255.255.255.192
default-router 10.10.10.193
interface GigabitEthernet0/0
no shutdown
interface GigabitEthernet0/0.15
encapsulation dot1Q 15
ip address 10.10.10.161 255.255.255.224
ip nat inside
interface GigabitEthernet0/0.30
encapsulation dot1Q 30
ip address 10.10.10.193 255.255.255.192
ip nat inside
interface GigabitEthernet0/0.45
encapsulation dot1Q 45 native
ip address 10.10.10.129 255.255.255.240
interface GigabitEthernet0/0.60
encapsulation dot1Q 60
ip address 10.10.10.145 255.255.255.240
router ospf 1
router-id 1.1.1.1
passive-interface GigabitEthernet0/0
network 10.10.10.0 0.0.0.255 area 0
interface s0/0/0
ip nat inside
interface s0/0/1
ip nat inside
interface s0/1/0
ip nat outside
!
ip nat pool TEST 198.133.219.128 198.133.219.129 netmask 255.255.255.252
ip nat inside source list 1 pool TEST overload
ip nat inside source static 10.10.10.162 198.133.219.130
ip route 0.0.0.0 0.0.0.0 Serial0/1/0
access-list 1 permit 10.10.10.0 0.0.0.255
end
wr
!!!!!!!!!!!!!!!!!!!!!!!!
!Admin-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 10
Packet Tracer – Skills Integration Challenge
en
conf t
int vlan 60
ip add 10.10.10.146 255.255.255.240
no shut
ip default-gateway 10.10.10.145
vlan 15
name Servers
vlan 30
name PCs
vlan 45
name Native
vlan 60
name Management
interface range fa0/1 - 10
switchport mode access
switchport access vlan 30
interface fa0/1
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
interface range fa0/11 - 20
switchport mode access
switchport access vlan 15
interface g0/1
switchport mode trunk
switchport trunk native vlan 45
interface range fa0/21 - 24 , g0/2
shutdown
ip domain-name cisco.com
crypto key gen rsa
1024
===============================================================
ISOMORPH ID: 22
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 10
Packet Tracer – Skills Integration Challenge
===============================================================
!Central!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
en
conf t
ip dhcp pool LAN
network 192.168.45.128 255.255.255.192
default-router 192.168.45.129
interface GigabitEthernet0/0
no shutdown
interface GigabitEthernet0/0.15
encapsulation dot1Q 15
ip address 192.168.45.65 255.255.255.192
ip nat inside
interface GigabitEthernet0/0.30
encapsulation dot1Q 30
ip address 192.168.45.129 255.255.255.192
ip nat inside
interface GigabitEthernet0/0.45
encapsulation dot1Q 45 native
ip address 192.168.45.17 255.255.255.240
interface GigabitEthernet0/0.60
encapsulation dot1Q 60
ip address 192.168.45.33 255.255.255.240
router ospf 1
router-id 1.1.1.1
passive-interface GigabitEthernet0/0
network 192.168.45.0 0.0.0.255 area 0
interface s0/0/0
ip nat inside
interface s0/0/1
ip nat inside
interface s0/1/0
ip nat outside
!
ip nat pool TEST 64.100.32.56 64.100.32.57 netmask 255.255.255.252
ip nat inside source list 1 pool TEST overload
ip nat inside source static 192.168.45.66 64.100.32.58
ip route 0.0.0.0 0.0.0.0 Serial0/1/0
access-list 1 permit 192.168.45.0 0.0.0.255
end
wr
!!!!!!!!!!!!!!!!!!!!!!!!
!Cnt-Sw!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
en
conf t
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 10
Packet Tracer – Skills Integration Challenge
int vlan 60
ip add 192.168.45.34 255.255.255.240
no shut
ip default-gateway 192.168.45.33
vlan 15
name Servers
vlan 30
name PCs
vlan 45
name Native
vlan 60
name Management
interface range fa0/1 - 10
switchport mode access
switchport access vlan 30
interface fa0/1
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
interface range fa0/11 - 20
switchport mode access
switchport access vlan 15
interface g0/1
switchport mode trunk
switchport trunk native vlan 45
interface range fa0/21 - 24 , g0/2
shutdown
ip domain-name cisco.com
crypto key gen rsa
1024
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 10
Packet Tracer – Configuring VPNs (Optional) (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9
Packet Tracer – Configuring VPNs (Optional)
Parameters R1 R3
Parameters R1 R3
Objectives
Part 1: Enable Security Features
Part 2: Configure IPsec Parameters on R1
Part 3: Configure IPsec Parameters on R3
Part 4: Verify the IPsec VPN
Scenario
In this activity, you will configure two routers to support a site-to-site IPsec VPN for traffic flowing from their
respective LANs. The IPsec VPN traffic will pass through another router that has no knowledge of the VPN.
IPsec provides secure transmission of sensitive information over unprotected networks such as the Internet.
IPsec acts at the network layer, protecting and authenticating IP packets between participating IPsec devices
(peers), such as Cisco routers.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 9
Packet Tracer – Configuring VPNs (Optional)
Note: Both the user EXEC and privileged EXEX pass word is cisco.
a. Issue the show version command in the user EXEC or privileged EXEC mode to verify that the Security
Technology Package license is activated.
----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
-----------------------------------------------------------------
ipbase ipbasek9 Permanent ipbasek9
security None None None
uc None None None
data None None None
----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
-----------------------------------------------------------------
ipbase ipbasek9 Permanent ipbasek9
security securityk9 Evaluation securityk9
uc None None None
data None None None
d. Repeat Steps 1a to 1c with R3.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 9
Packet Tracer – Configuring VPNs (Optional)
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 9
Packet Tracer – Configuring VPNs (Optional)
interface: Serial0/0/0
Crypto map tag: VPN-MAP, local addr 10.1.1.2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 9
Packet Tracer – Configuring VPNs (Optional)
interface: Serial0/0/0
Crypto map tag: VPN-MAP, local addr 10.1.1.2
Configuration Scripts
Router R1
en
conf t
license boot module c2900 technology-package securityk9
yes
end
copy ru st
reload
en
conf t
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 9
Packet Tracer – Configuring VPNs (Optional)
service password-encryption
hostname R1
enable secret cisco
crypto isakmp policy 10
encr aes
authentication pre-share
group 2
crypto isakmp key cisco address 10.2.2.2
crypto ipsec transform-set VPN-SET esp-3des esp-sha-hmac
crypto map VPN-MAP 10 ipsec-isakmp
description VPN conection to R3
set peer 10.2.2.2
set transform-set VPN-SET
match address 110
ip name-server 0.0.0.0
spanning-tree mode pvst
interface gig0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
no shut
interface Serial0/0/0
ip address 10.1.1.2 255.255.255.252
clock rate 128000
crypto map VPN-MAP
no shut
router eigrp 100
passive-interface FastEthernet0/0
network 10.1.1.0 0.0.0.3
network 192.168.1.0
no auto-summary
access-list 110 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
banner motd ~
************ AUTHORIZED ACCESS ONLY *************
UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED.~
logging trap debugging
line con 0
password cisco
login
line aux 0
line vty 0 4
password cisco
login
end
copy ru st
Router R3
en
conf t
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 9
Packet Tracer – Configuring VPNs (Optional)
reload
en
conf t
no service timestamps log datetime msec
no service timestamps debug datetime msec
service password-encryption
hostname R3
enable secret cisco
crypto isakmp policy 10
encr aes
authentication pre-share
group 2
crypto isakmp key cisco address 10.1.1.2
crypto ipsec transform-set VPN-SET esp-3des esp-sha-hmac
crypto map VPN-MAP 10 ipsec-isakmp
description VPN connection to R1
set peer 10.1.1.2
set transform-set VPN-SET
match address 110
ip name-server 0.0.0.0
spanning-tree mode pvst
interface gig0/1
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
no shut
interface Serial0/0/1
ip address 10.2.2.2 255.255.255.252
crypto map VPN-MAP
no shut
router eigrp 100
passive-interface FastEthernet0/1
network 10.2.2.0 0.0.0.3
network 192.168.3.0
no auto-summary
ip classless
access-list 110 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
banner motd ~
************ AUTHORIZED ACCESS ONLY *************
UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED.~
line con 0
password 7 cisco
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 9
Packet Tracer – Configuring VPNs (Optional)
login
line vty 0 4
password 7 cisco
login
end
copy ru st
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 9
Packet Tracer – Configuring GRE (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Verify Router Connectivity
Part 2: Configure GRE Tunnels
Part 3: Verify PC Connectivity
Scenario
You are the network administrator for a company which wants to set up a GRE tunnel to a remote office. Both
networks are locally configured, and need only the tunnel configured.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Configuring GRE
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Configuring GRE
Device Configs
Router RA
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname RA
license udi pid CISCO2911/K9 sn FTX15242579
spanning-tree mode pvst
interface Tunnel0
ip address 10.10.10.1 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 209.165.122.2
tunnel mode gre ip
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 64.103.211.2 255.255.255.252
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
ip classless
ip route 192.168.2.0 255.255.255.0 10.10.10.2
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
line con 0
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Configuring GRE
line aux 0
line vty 0 4
login
end
Router RB
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
license udi pid CISCO2911/K9 sn FTX152497Z4
spanning-tree mode pvst
interface Tunnel0
ip address 10.10.10.2 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 64.103.211.2
tunnel mode gre ip
interface GigabitEthernet0/0
ip address 192.168.2.1 255.255.255.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 209.165.122.2 255.255.255.252
!
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
ip classless
ip route 192.168.1.0 255.255.255.0 10.10.10.1
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
line con 0
line aux 0
line vty 0 4
login
end
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Packet Tracer – Troubleshooting GRE (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Find and Correct All Network Errors
Verify Connectivity
Scenario
A junior network administrator was hired to set up a GRE tunnel between two sites and was unable to complete
the task. You have been asked to correct configuration errors in the company network.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Troubleshooting GRE
Device Configs
Router RA
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname RA
interface Tunnel0
ip address 192.168.1.1 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 64.103.211.2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Troubleshooting GRE
Router RB
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname RB
interface Tunnel0
ip address 192.168.1.2 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 209.165.122.2
tunnel mode gre ip
interface GigabitEthernet0/0
ip address 172.31.1.1 255.255.255.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
duplex auto
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Troubleshooting GRE
speed auto
shutdown
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 64.103.211.2 255.255.255.252
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
ip route 172.31.0.0 255.255.255.0 192.168.1.1
line con 0
line aux 0
line vty 0 4
login
end
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Packet Tracer –Configuring GRE over IPsec (Optional) (Instructor
Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
Addressing Table
Objectives
Part 1: Verify Router Connectivity
Part 2: Enable Security Features
Part 3: Configure IPSec Parameters
Part 4: Configure GRE Tunnels over IPSec
Part 5: Verify Connectivity
Scenario
You are the network administrator for a company which wants to set up a GRE tunnel over IPsec to remote
offices. All networks are locally configured, and need only the tunnel and the encryption configured.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
-----------------------------------------------------------------
ipbase ipbasek9 Permanent ipbasek9
security securityk9 Evaluation securityk9
uc None None None
data None None None
d. Repeat Steps 1a to 1c with R2 and R3.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
Configuration Scripts
Router R1
license boot module c2900 technology-package securityk9
access-list 101 permit ip 10.0.0.0 0.255.255.255 172.16.0.0 0.0.3.255
access-list 101 permit ip 10.0.0.0 0.255.255.255 172.16.4.0 0.0.3.255
crypto isakmp policy 101
encryption aes
authentication pre-share
group 5
exit
crypto isakmp key cisco address 64.100.13.2
crypto isakmp key cisco address 64.102.46.2
crypto ipsec transform-set R1_Set esp-aes esp-sha-hmac
crypto map R1_Map 101 ipsec-isakmp
set peer 64.100.13.2
set peer 64.102.46.2
set transform-set R1_Set
match address 101
interface S0/0/0
crypto map R1_Map
interface Tunnel 0
ip address 192.168.0.1 255.255.255.252
tunnel source serial 0/0/0
tunnel destination 64.100.13.2
tunnel mode gre ip
ip route 172.16.0.0 255.255.252.0 192.168.0.2
interface Tunnel 1
ip address 192.168.0.5 255.255.255.252
tunnel source serial 0/0/0
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
Router R2
license boot module c2900 technology-package securityk9
access-list 101 permit ip 172.16.0.0 0.0.3.255 10.0.0.0 0.255.255.255
crypto isakmp policy 101
encryption aes
authentication pre-share
group 5
exit
crypto isakmp key cisco address 209.165.118.2
crypto ipsec transform-set R2_Set esp-aes esp-sha-hmac
crypto map R2_Map 101 ipsec-isakmp
set peer 209.165.118.2
set transform-set R2_Set
match address 101
interface Serial0/0/0
crypto map R2_Map
interface Tunnel0
ip address 192.168.0.2 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 209.165.118.2
tunnel mode gre ip
ip route 10.0.0.0 255.0.0.0 192.168.0.1
Router R3
license boot module c2900 technology-package securityk9
access-list 101 permit ip 172.16.4.0 0.0.3.255 10.0.0.0 0.255.255.255
crypto isakmp policy 101
encryption aes
authentication pre-share
group 5
exit
crypto isakmp key cisco address 209.165.118.2
crypto ipsec transform-set R3_Set esp-aes esp-sha-hmac
crypto map R3_Map 101 ipsec-isakmp
set peer 209.165.118.2
set transform-set R3_Set
match address 101
interface S0/0/0
crypto map R3_Map
interface Tunnel 0
ip address 192.168.0.6 255.255.255.252
tunnel source serial 0/0/0
tunnel destination 209.165.118.2
tunnel mode gre ip
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
Device Configs
Router R1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R1
crypto isakmp policy 101
encr aes
authentication pre-share
group 5
crypto isakmp key cisco address 64.100.13.2
crypto isakmp key cisco address 64.102.46.2
crypto ipsec transform-set R1_Set esp-aes esp-sha-hmac
crypto map R1_Map 101 ipsec-isakmp
set peer 64.100.13.2
set peer 64.102.46.2
set transform-set R1_Set
match address 101
license udi pid CISCO2911/K9 sn FTX15241LLM
license boot module c2900 technology-package securityk9
spanning-tree mode pvst
interface Tunnel0
ip address 192.168.0.1 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 64.100.13.2
tunnel mode gre ip
interface Tunnel1
ip address 192.168.0.5 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 64.102.46.2
tunnel mode gre ip
interface GigabitEthernet0/0
ip address 10.0.0.1 255.0.0.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
Router R2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R2
crypto isakmp policy 102
encr aes
authentication pre-share
group 5
crypto isakmp key cisco address 209.165.118.2
crypto ipsec transform-set R1_R2_Set esp-aes esp-sha-hmac
crypto map R1_R2_Map 102 ipsec-isakmp
set peer 209.165.118.2
set transform-set R1_R2_Set
match address 102
license udi pid CISCO2911/K9 sn FTX15249J0B
license boot module c2900 technology-package securityk9
spanning-tree mode pvst
interface Tunnel0
ip address 192.168.0.2 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 209.165.118.2
tunnel mode gre ip
interface GigabitEthernet0/0
ip address 172.16.0.1 255.255.252.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
duplex auto
speed auto
shutdown
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 64.100.13.2 255.255.255.252
crypto map R1_R2_Map
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
ip route 10.0.0.0 255.0.0.0 192.168.0.1
access-list 102 permit ip 172.16.0.0 0.0.3.255 10.0.0.0 0.255.255.255
line con 0
line aux 0
line vty 0 4
login
end
Router R3
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R3
crypto isakmp policy 103
encr aes
authentication pre-share
group 5
crypto isakmp key cisco address 209.165.118.2
crypto ipsec transform-set R1_R3_Set esp-aes esp-sha-hmac
crypto map R1_R3_Map 103 ipsec-isakmp
set peer 209.165.118.2
set transform-set R1_R3_Set
match address 103
license udi pid CISCO2911/K9 sn FTX1524446J
license boot module c2900 technology-package securityk9
spanning-tree mode pvst
interface Tunnel0
ip address 192.168.0.6 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 209.165.118.2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 12
Packet Tracer – Configuring GRE Over IPsec (Optional)
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 12
Packet Tracer – Skills Integration Challenge (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Skills Integration Challenge
Addressing Table
Device Interface IPv4 Address Subnet Mask Default Gateway
DLCI Mappings
From / To HQ R1 R2
HQ - 103 102
R1 301 - 302
R2 201 203 -
Background
This activity allows you to practice a variety of skills, including configuring Frame Relay, PPP with CHAP, NAT
overloading (PAT), and GRE tunnels. The routers are partially configured for you.
Requirements
Note: You only have console access to router R1 and telnet access to router HQ. The username is admin
and the password is adminpass for telnet access.
R1
Configure full mesh Frame Relay.
- Configure Frame Relay encapsulation.
- Configure a map to each of the other routers using the broadcast keyword.
- The LMI type is ANSI.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Skills Integration Challenge
HQ
Configure HQ to use PPP with CHAP on the link to the Internet. ISP is the router hostname. The
password for CHAP is cisco.
Configure GRE tunnels to the other routers.
- Configure the source port and the destination address.
- Configure the IP address for the tunnel interface according to the Addressing Table.
Configure NAT to share the public IP address configured on interface s0/0/1 with the entire class A
private range.
- Configure access-list 1 for use with NAT.
- Identify the inside and outside interfaces.
Device Configs
Router R1
enable
configure terminal
interface s0/0/0
encapsulation frame-relay
frame-relay map ip 10.0.0.1 301 broadcast
frame-relay map ip 10.0.0.2 302 broadcast
frame-relay lmi-type ansi
interface tunnel 0
ip address 192.168.1.6 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.0.0.1
interface tunnel 1
ip address 192.168.1.9 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.0.0.2
end
copy running-config startup-config
Router HQ
enable
configure terminal
username ISP password cisco
username admin password adminpass
interface s0/0/0
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Skills Integration Challenge
ip nat inside
interface s0/0/1
encapsulation ppp
ppp authentication chap
ip nat outside
interface tunnel 0
ip address 192.168.1.1 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.0.0.2
interface tunnel 1
ip address 192.168.1.5 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.0.0.3
ip nat inside source list 1 interface s0/0/1 overload
access-list 1 permit 10.0.0.0 0.255.255.255
line con 0
password ciscopass
login
end
copy running-config startup-config
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Packet Tracer – Configuring Syslog and NTP (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Configure Syslog Service
Part 2: Generate Logged Events
Part 3: Manually Set Switch Clocks
Part 4: Configure NTP Service
Part 5: Verify Timestamped Logs
Scenario
In this activity, you will enable and use the Syslog service and the NTP service so that the network
administrator is able to monitor the network more effectively.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Packet Tracer – Configuring Syslog and NTP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Packet Tracer – Configuring Syslog and NTP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Packet Tracer – Troubleshooting Challenge - Documenting the
Network (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
Addressing Table
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
Objectives
Part 1: Test Connectivity
Part 2: Discover PC Configuration Information
Part 3: Discover the Configuration Information of the Default Gateway
Part 4: Discover Routes and Neighbors in the Network
Part 5: Draw the Network Topology
Background / Scenario
This activity covers the steps to take to discover a network using primarily the Telnet, show cdp neighbors
detail, and show ip route commands. This is Part I of a two-part activity. Part II is Packet Tracer -
Troubleshooting Challenge - Using Documentation to Solve Issues.
The topology you see when you open the Packet Tracer activity does not reveal all of the details of the
network. The details have been hidden using the cluster function of Packet Tracer. The network infrastructure
has been collapsed, and the topology in the file shows only the end devices. Your task is to use your
knowledge of networking and discovery commands to learn about the full network topology and document it.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
Step 4: Document the hostname and interface configuration of the PC1 gateway router in the
addressing table.
Step 4: Telnet to the neighbor and discover directly connected Cisco devices.
a. Telnet to the neighbor and use the show cdp neighbors detail command to discover other directly
connected Cisco devices.
b. You should see three devices listed this time. The PC1 gateway router may be listed for each
subinterface.
Note: Use the show interfaces command on the switches to determine the subnet mask information.
Step 5: Document the hostnames and IP addresses of the neighbors and test connectivity.
Document and ping the new neighbors you have discovered. Remember, the first two or three pings fail while
ARP resolves MAC addresses.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
Step 6: Telnet to each neighbor and check for additional Cisco devices.
Telnet to each of the new neighbors you have discovered, and use the show cdp neighbors detail
command to check for any additional Cisco devices. The access password is cisco.
Topology Answer
This topology is a screenshot from the answer network in the PKA. The student’s topology can look quite
different, but the connections should all be the same. A good class exercise is to have the students compare their
correct topology diagrams to see the benefits and limitations of different layouts. This will also help them to
understand that there can be many excellent ways to represent the same network.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
Device Configs
Router R1
R1#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R1
enable secret class
spanning-tree mode pvst
interface Gig0/0
ip address 10.4.1.1 255.255.255.0
duplex auto
speed auto
interface Gig0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.4 255.255.255.248
encapsulation frame-relay
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
no ip address
shutdown
router eigrp 1
passive-interface Gig0/0
network 10.0.0.0
no auto-summary
ip classless
line con 0
password cisco
login
line aux 0
line vty 0 4
password cisco
login
end
Router R2
R2#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R2
enable secret class
spanning-tree mode pvst
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
interface GigabitEthernet0/0.100
encapsulation dot1Q 100
ip address 10.3.100.1 255.255.255.0
interface GigabitEthernet0/0.105
encapsulation dot1Q 105 native
ip address 10.3.105.1 255.255.255.0
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.3 255.255.255.248
encapsulation frame-relay
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
router eigrp 1
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
network 10.0.0.0
no auto-summary
ip classless
line con 0
password cisco
login
line aux 0
line vty 0 4
password cisco
login
end
Router R3
R3#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R3
enable secret class
spanning-tree mode pvst
interface Gig0/0
no ip address
duplex auto
speed auto
interface Gig0/0.5
encapsulation dot1Q 5 native
ip address 10.2.5.1 255.255.255.0
interface Gig0/0.15
encapsulation dot1Q 15
ip address 10.2.15.1 255.255.255.0
interface Gig0/0.25
encapsulation dot1Q 25
ip address 10.2.25.1 255.255.255.0
interface Gig0/0.35
encapsulation dot1Q 35
ip address 10.2.35.1 255.255.255.0
interface Gig0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.2 255.255.255.248
encapsulation frame-relay
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
shutdown
router eigrp 1
network 10.0.0.0
no auto-summary
ip classless
line con 0
password cisco
login
line aux 0
line vty 0 4
password cisco
login
end
Router R4
R4#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R4
enable secret class
spanning-tree mode pvst
interface Gig0/0
ip address 10.5.1.1 255.255.255.0
duplex auto
speed auto
interface Gig0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.5 255.255.255.248
encapsulation frame-relay
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
router eigrp 1
passive-interface Gig0/0
network 10.0.0.0
no auto-summary
ip classless
line con 0
password cisco
login
line aux 0
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
line vty 0 4
password cisco
login
end
Router R5
R5#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R5
enable secret class
spanning-tree mode pvst
interface Gig0/0
ip address 10.1.100.1 255.255.255.0
duplex auto
speed auto
interface Gig0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.1 255.255.255.248
encapsulation frame-relay
ip nat inside
interface Serial0/0/1
ip address 209.165.201.2 255.255.255.252
ip nat outside
no cdp enable
interface Vlan1
no ip address
shutdown
router eigrp 1
passive-interface Gig0/0
passive-interface Serial0/0/1
network 10.0.0.0
default-information originate
no auto-summary
ip nat pool LAN 209.165.202.128 209.165.202.159 netmask 255.255.255.224
ip nat inside source list 1 pool LAN overload
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0/1
access-list 1 permit 10.0.0.0 0.255.255.255
line con 0
password cisco
login
line aux 0
line vty 0 4
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
password cisco
login
end
Router ISP
ISP#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname ISP
spanning-tree mode pvst
interface Gig0/0
ip address 209.165.200.225 255.255.255.252
duplex auto
speed auto
interface Gig0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 209.165.201.1 255.255.255.252
clock rate 64000
interface Serial0/0/1
no ip address
interface Serial0/2/0
no ip address
interface Serial0/2/1
no ip address
interface Vlan1
no ip address
shutdown
ip classless
ip route 209.165.202.128 255.255.255.224 Serial0/0/0
no cdp run
line con 0
line aux 0
line vty 0 4
login
end
Switch S1
S1#sh run
hostname S1
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
interface FastEthernet0/2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
interface FastEthernet0/3
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S2
S2#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S2
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
switchport trunk native vlan 105
switchport mode trunk
interface FastEthernet0/2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
Switch S3
S3#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
no service password-encryption
hostname S3
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
interface FastEthernet0/2
switchport trunk native vlan 105
switchport mode trunk
interface FastEthernet0/3
switchport trunk native vlan 105
switchport mode trunk
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
switchport access vlan 100
switchport mode access
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
interface Vlan105
ip address 10.3.105.22 255.255.255.0
ip default-gateway 10.3.1.1
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
login
end
Switch S4
S4#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S4
enable secret class
spanning-tree mode pvst
spanning-tree vlan 1,5,15,25,35 priority 4096
interface FastEthernet0/1
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/2
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/3
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/4
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/5
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
no ip address
shutdown
interface Vlan5
ip address 10.2.5.21 255.255.255.0
ip default-gateway 10.2.5.1
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S5
S5#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S5
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/2
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/3
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/4
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
interface Vlan5
ip address 10.2.5.23 255.255.255.0
ip default-gateway 10.2.5.1
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S6
S6#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S6
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/2
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/3
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/4
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/5
interface FastEthernet0/6
switchport access vlan 15
switchport mode access
interface FastEthernet0/7
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
switchport access vlan 25
switchport mode access
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
switchport access vlan 35
switchport mode access
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
interface Vlan5
ip address 10.2.5.22 255.255.255.0
ip default-gateway 10.2.5.1
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S7
S7#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S7
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
interface FastEthernet0/2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 19
Packet Tracer – Troubleshooting Challenge - Documenting the Network
interface FastEthernet0/3
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
line con 0
line vty 0 4
login
line vty 5 15
login
end
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 19
Packet Tracer – Troubleshooting Enterprise Networks 1 (Instructor
Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Packet Tracer – Troubleshooting Enterprise Networks 1
Addressing Table
Background
This activity uses a variety of technologies you have encountered during your CCNA studies, including VLANs,
STP, routing, inter-VLAN routing, DHCP, NAT, PPP, and Frame Relay. Your task is to review the requirements,
isolate and resolve any issues, and then document the steps you took to verify the requirements.
Requirements
VLANs and Access
S2 is the spanning-tree root for VLAN 1, 10, and 20. S3 is the spanning-tree root for VLAN 30 and 88.
The trunk links connecting the switches are in native VLAN 99.
R3 is responsible for inter-VLAN routing and serves as the DHCP server for VLANs 10, 20, and 30.
Routing
Each router is configured with EIGRP and uses AS 22.
R2 is configured with a default route pointing to the ISP and redistributes the default route.
NAT is configured on R2 and no untranslated addresses are permitted to cross the Internet.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Packet Tracer – Troubleshooting Enterprise Networks 1
WAN Technologies
The serial link between R1 and R2 uses Frame Relay.
The serial link between R2 and R3 uses HDLC encapsulation.
The serial link between R1 and R3 uses PPP with CHAP.
Connectivity
Devices should be configured according to the Addressing Table.
Every device should be able to ping every other device.
Troubleshooting Documentation
Verification Documentation
Capture output from verification commands and provide documentation proving that each of the requirements has
been satisfied.
Instructor’s Note: The answer key for this section is left blank because there are many ways to verify the
requirements.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Packet Tracer – Troubleshooting Enterprise Networks 2 (Instructor
Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Troubleshooting Enterprise Networks 2
Addressing Table
Background
This activity uses IPv6 configurations that include DHCPv6, EIGRPv6, and IPv6 default routing. Your task is to
review the requirements, isolate and resolve any issues, and then document the steps you took to verify the
requirements.
Requirements
DHCPv6
Host_A and Host_B are assigned through IPv6 DHCP configured on R1.
IPv6 Routing
Each router is configured with IPv6 EIGRP and uses AS 100.
R3 is advertising a summary route to R2 and R1 for the two R3 LANs.
R2 is configured with a fully specified default route pointing to the ISP.
Connectivity
Devices should be configured according to the Addressing Table.
Every device should be able to ping every other device.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Troubleshooting Enterprise Networks 2
Troubleshooting Documentation
R2 The default route has the incorrect next- no ipv6 route ::/0 GigabitEthernet0/0
hop address configured. 2001:DB8:ACAD:F::
ipv6 route ::/0 GigabitEthernet0/1
2001:DB8:ACAD:F::1
R2 IPv6 EIGRP is configured with the wrong int g0/0
autonomous system. no ipv6 eigrp 1000
ipv6 eigrp 100
R3 IPv6 EIGRP 100 is shutdown. ipv6 router eigrp 100
no shutdown
R3 EIGRP summary address is incorrectly int s0/0/0
advertised on S0/0/1. no ipv6 summary-address eigrp 100
2001:DB8:CAFE::/65 5
ipv6 summary-address eigrp 100
2001:DB8:CAFÉ:2::/63 5
int s0/0/1
no ipv6 summary-address eigrp 100
2001:DB8:CAFE::/65 5
ipv6 summary-address eigrp 100
2001:DB8:CAFE:2::/63 5
Verification Documentation
Capture output from verification commands and provide documentation proving that each of the requirements has
been satisfied.
Note: Some EIGRPv6 commands are not scored in Packet Tracer v6.0.1. Your instructor will verify that all
requirements are met.
Instructor’s Note: The answer key for this section is left blank because there are many ways to verify the
requirements. For grading purposes, note that the EIGRPv6 summary routes are not graded in Packet Tracer.
Also, Packet Tracer does not grade the next hop address in the fully specified IPv6 default route. Check the
student’s file to verify configurations.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Troubleshooting Enterprise Networks 2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Packet Tracer – Troubleshooting Enterprise Networks 3 (Instructor
Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5
Packet Tracer – Troubleshooting Enterprise Networks 3
Addressing Table
Background
This activity uses a variety of technologies you have encountered during your CCNA studies, including routing,
port security, EtherChannel, DHCP, NAT, PPP, and Frame Relay. Your task is to review the requirements, isolate
and resolve any issues, and then document the steps you took to verify the requirements.
Note: This activity begins with a partial score.
Requirements
DHCP
R1 is the DHCP server for the R1 LAN.
Switching Technologies
Port security is configured to only allow PC1 to access S1's F0/3 interface. All violations should disable
the interface.
Link aggregation using EtherChannel is configured on S2, S3, and S4.
Routing
All routers are configured with OSPF process ID 1 and no routing updates should be sent across
interfaces that do not have routers connected.
R2 is configured with a default route pointing to the ISP and redistributes the default route.
NAT is configured on R2 and no untranslated addresses are permitted to cross the Internet.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 5
Packet Tracer – Troubleshooting Enterprise Networks 3
WAN Technologies
The serial link between R1 and R2 uses Frame Relay.
The serial link between R2 and R3 uses HDLC encapsulation.
The serial link between R1 and R3 uses PPP with PAP.
Connectivity
Devices should be configured according to the Addressing Table.
Every device should be able to ping every other device.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 5
Packet Tracer – Troubleshooting Enterprise Networks 3
Troubleshooting Documentation
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 5
Packet Tracer – Troubleshooting Enterprise Networks 3
Verification Documentation
Capture output from verification commands and provide documentation proving that each of the requirements has
been satisfied.
Instructor’s Note: The answer key for this section is left blank because there are many ways to verify the
requirements.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 5
Packet Tracer – Troubleshooting Challenge - Using
Documentation to Solve Issues (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
Addressing Table
Objectives
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
Scenario
This is Part II of a two-part activity. Part I is Packet Tracer - Troubleshooting Challenge - Documenting
the Network, which you should have completed earlier in the chapter. In Part II, you will use your
troubleshooting skills and documentation from Part I to solve connectivity issues between PCs.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
“down”. Investigate S0/0/0 with the show interface command. The encapsulation is set to PPP instead of
Frame Relay.
Solution 4: Change the S0/0/0 interface encapsulation on R1 from PPP to Frame Relay with the
encapsulation frame-relay command. All PCs should now be able to ping each other.
Problem 5: PCs still cannot ping the www.cisco.pka server. From any device, test connectivity and then telnet
to R5. Investigate the interface status with the show ip interface brief command. The S0/0/1 interface is
administratively down.
Solution 5: Activate the S0/0/1 interface on R5 with the no shutdown command.
Problem 6: PCs still can’t ping the www.cisco.pka server. However, PCs can ping the DNS server. The
problem is either with the R5 configuration or the ISP configuration. Because you do not have access to the
ISP router, check the configuration on R5. The show run command reveals that R5 is using NAT. The
configuration is missing the NAT statement that binds the NAT pool to the access list.
Solution 6: Configure R5 with the ip nat inside source list 1 pool LAN overload command.
Step 5: Make changes based on your solutions from the previous step.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
Device Configs
Router R1
R1#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R1
enable secret class
spanning-tree mode pvst
interface Gig0/0
ip address 10.4.1.1 255.255.255.0
duplex auto
speed auto
interface Gig0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.4 255.255.255.248
encapsulation frame-relay
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
router eigrp 1
passive-interface Gig0/0
network 10.0.0.0
no auto-summary
ip classless
line con 0
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
password cisco
login
line aux 0
line vty 0 4
password cisco
login
end
Router R2
R2#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R2
enable secret class
spanning-tree mode pvst
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
interface GigabitEthernet0/0.100
encapsulation dot1Q 100
ip address 10.3.100.1 255.255.255.0
interface GigabitEthernet0/0.105
encapsulation dot1Q 105 native
ip address 10.3.105.1 255.255.255.0
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.3 255.255.255.248
encapsulation frame-relay
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
router eigrp 1
network 10.0.0.0
no auto-summary
ip classless
line con 0
password cisco
login
line aux 0
line vty 0 4
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
password cisco
login
end
Router R3
R3#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R3
enable secret class
spanning-tree mode pvst
interface Gig0/0
no ip address
duplex auto
speed auto
interface Gig0/0.5
encapsulation dot1Q 5 native
ip address 10.2.5.1 255.255.255.0
interface Gig0/0.15
encapsulation dot1Q 15
ip address 10.2.15.1 255.255.255.0
interface Gig0/0.25
encapsulation dot1Q 25
ip address 10.2.25.1 255.255.255.0
interface Gig0/0.35
encapsulation dot1Q 35
ip address 10.2.35.1 255.255.255.0
interface Gig0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.2 255.255.255.248
encapsulation frame-relay
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
router eigrp 1
network 10.0.0.0
no auto-summary
ip classless
line con 0
password cisco
login
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
line aux 0
line vty 0 4
password cisco
login
end
Router R4
R4#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname R4
enable secret class
spanning-tree mode pvst
interface Gig0/0
ip address 10.5.1.1 255.255.255.0
duplex auto
speed auto
interface Gig0/1
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 10.1.0.5 255.255.255.248
encapsulation frame-relay
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
router eigrp 1
passive-interface Gig0/0
network 10.0.0.0
no auto-summary
ip classless
line con 0
password cisco
login
line aux 0
line vty 0 4
password cisco
login
end
Router R5
R5#sh run
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
Router ISP
ISP#sh run
no service timestamps log datetime msec
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
Switch S1
S1#sh run
hostname S1
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
interface FastEthernet0/2
interface FastEthernet0/3
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S2
S2#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S2
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
switchport trunk native vlan 105
switchport mode trunk
interface FastEthernet0/2
switchport trunk native vlan 105
switchport mode trunk
interface FastEthernet0/3
switchport trunk native vlan 105
switchport mode trunk
interface FastEthernet0/4
interface FastEthernet0/5
switchport access vlan 100
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
Switch S3
S3#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S3
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
interface FastEthernet0/2
switchport trunk native vlan 105
switchport mode trunk
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
interface FastEthernet0/3
switchport trunk native vlan 105
switchport mode trunk
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
switchport access vlan 100
switchport mode access
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
interface Vlan105
ip address 10.3.105.22 255.255.255.0
ip default-gateway 10.3.1.1
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S4
S4#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
hostname S4
enable secret class
spanning-tree mode pvst
spanning-tree vlan 1,5,15,25,35 priority 4096
interface FastEthernet0/1
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/2
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/3
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/4
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/5
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
interface Vlan5
ip address 10.2.5.21 255.255.255.0
ip default-gateway 10.2.5.1
line con 0
password cisco
login
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S5
S5#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S5
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/2
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/3
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/4
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
interface Vlan1
no ip address
shutdown
interface Vlan5
ip address 10.2.5.23 255.255.255.0
ip default-gateway 10.2.5.1
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S6
S6#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S6
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/2
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/3
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/4
switchport trunk native vlan 5
switchport mode trunk
interface FastEthernet0/5
interface FastEthernet0/6
switchport access vlan 15
switchport mode access
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
switchport access vlan 25
switchport mode access
interface FastEthernet0/12
interface FastEthernet0/13
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
switchport access vlan 35
switchport mode access
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
interface Vlan5
ip address 10.2.5.22 255.255.255.0
ip default-gateway 10.2.5.1
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
end
Switch S7
S7#sh run
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname S7
enable secret class
spanning-tree mode pvst
interface FastEthernet0/1
interface FastEthernet0/2
interface FastEthernet0/3
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 19
Packet Tracer – Troubleshooting Challenge - Using Documentation to Solve Issues
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface Vlan1
no ip address
shutdown
line con 0
line vty 0 4
login
line vty 5 15
login
end
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 19
Packet Tracer – CCNA Skills Integration Challenge
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Default Gateway
Device Interface IP Address Subnet Mask DLCI Mapping
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 7
Packet Tracer – CCNA Skills Integration Challenge
VLAN Network
Number Address VLAN Name Port Mappings
Scenario
In this comprehensive CCNA skills activity, the XYZ Corporation uses a combination of Frame Relay and PPP
for WAN connections. Other technologies include NAT, DHCP, static and default routing, EIGRP for IPv4,
inter-VLAN routing, and VLAN configurations. Security configurations include SSH, port security, switch
security, and ACLs.
Requirements
Note: The user EXEC password is cisco and the privileged EXEC password is class.
SSH
Configure HQ to use SSH for remote access.
- Set the modulus to 2048. The domain name is CCNASkills.com.
- The username is admin and the password is adminonly.
- Only SSH should be allowed on VTY lines.
- Modify the SSH defaults: version 2; 60-second timeout; two retries.
Frame Relay
Configure Frame Relay between HQ and B1.
- Refer to the Addressing Table for the IP address, subnet mask, and DLCI.
- HQ uses a point-to-point subinterface and DLCI 41 to connect to B1.
- The LMI type must be manually configured as q933a for HQ and B1.
PPP
Configure the WAN link from HQ to the Internet using PPP encapsulation and CHAP authentication.
- Create a user ISP with the password of cisco.
Configure the WAN link from HQ to NewB using PPP encapsulation and PAP authentication.
- HQ is the DCE side of the link. You choose the clock rate.
- Create a user NewB with the password of cisco.
NAT
Configure static and dynamic NAT on HQ
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 7
Packet Tracer – CCNA Skills Integration Challenge
- Allow all addresses for the 10.0.0.0/8 address space to be translated using a standard access list
named NAT.
- XYZ Corporation owns the 209.165.200.240/29 address space. The pool, HQ, uses addresses .241
to .245 with a /29 mask.
- The WWW.pka website at 10.0.1.2 is registered with the public DNS system at IP address
209.165.200.246 and should be accessible from the Outside Host.
DHCP
On B1, configure a DHCP pool for the Sales VLAN 20 using the following requirements:
- Exclude the first 10 IP addresses in the range.
- The case-sensitive pool name is VLAN20.
- Include the DNS server attached to the HQ LAN as part of the DHCP configuration.
Configure the Sales PC to use DHCP.
Static and Default Routing
Configure HQ with a default route to the Internet and a static route to the NewB LAN. Use the exit
interface as an argument.
EIGRP Routing
Configure and optimize HQ and B1 with EIGRP routing.
- Use autonomous system 100 and disable automatic summarization.
- HQ should advertise the static and default router to B1.
- Disable EIGRP updates on appropriate interfaces.
- Manually summarize EIGRP routes so that the B1 router only advertises the 10.1.0.0/16 address
space to HQ.
Inter-VLAN Routing
Configure B1 for inter-VLAN routing.
- Using the addressing table for branch routers, configure and activate the LAN interface for inter-VLAN
routing. VLAN 99 is the native VLAN.
VLANs and Trunking Configurations
Configure trunking and VLANs on B1-S2.
- Create and name the VLANs listed in the VLAN Configuration and Port Mappings table on B1-S2
only.
- Configure the VLAN 99 interface and default gateway.
- Assign VLANs to the appropriate access ports.
- Set trunking mode to on for Fa0/1 - Fa0/4.
- Disable all unused ports and assign the BlackHole VLAN.
Port Security
Use the following policy to establish port security on the B1-S2 access ports:
- Allow one MAC addresses to be learned on the port.
- Configure the first learned MAC address to stick to the configuration.
- Set the port to shut down if there is a security violation.
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 7
Packet Tracer – CCNA Skills Integration Challenge
Device Configs
Router HQ
enable
conf t
username ISP password cisco
username NewB password cisco
username admin password adminonly
ip domain-name CCNASkills.com
crypto key generate rsa
1024
line vty 0 16
transport input ssh
login local
ip ssh version 2
ip ssh authentication-retries 2
ip ssh time-out 60
interface Gig0/0
ip nat inside
interface Serial0/0/0
encapsulation frame-relay
frame-relay lmi-type q933a
no shut
interface Serial0/0/0.41 point-to-point
ip address 10.255.255.1 255.255.255.252
frame-relay interface-dlci 41
ip nat inside
interface Serial0/0/1
description Link to NewB
ip address 10.255.255.253 255.255.255.252
encapsulation ppp
ppp authentication pap
ppp pap sent-username HQ password cisco
ip nat inside
no shut
interface Serial0/1/0
description Link to ISP
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7
Packet Tracer – CCNA Skills Integration Challenge
encapsulation ppp
ppp authentication chap
ip access-group HQINBOUND in
ip nat outside
router eigrp 100
passive-interface Gig0/0
passive-interface Serial0/0/1
passive-interface Serial0/1/0
network 10.0.0.0
redistribute static
no auto-summary
ip nat pool HQ 209.165.200.241 209.165.200.245 netmask 255.255.255.248
ip nat inside source list NAT pool HQ overload
ip nat inside source static 10.0.1.2 209.165.200.246
ip route 0.0.0.0 0.0.0.0 Serial0/1/0
ip route 10.4.5.0 255.255.255.0 Serial0/0/1
ip access-list standard NAT
permit 10.0.0.0 0.255.255.255
ip access-list extended HQINBOUND
permit tcp any host 209.165.200.246 eq www
permit tcp any any established
permit icmp any any echo-reply
deny ip any any
line vty 0 15
login local
transport input ssh
end
Router B1
enable
conf t
ip dhcp excluded-address 10.1.20.1 10.1.20.10
ip dhcp pool VLAN20
network 10.1.20.0 255.255.255.0
default-router 10.1.20.1
dns-server 10.0.1.4
interface Gig0/0
no shut
interface Gig0/0.10
description Admin VLAN 10
encapsulation dot1Q 10
ip address 10.1.10.1 255.255.255.0
interface Gig0/0.20
description Sales VLAN 20
encapsulation dot1Q 20
ip address 10.1.20.1 255.255.255.0
interface Gig0/0.30
description Production VLAN 30
encapsulation dot1Q 30
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 7
Packet Tracer – CCNA Skills Integration Challenge
Switch B1-S2
enable
conf t
vlan 10
name Admin
vlan 20
name Sales
vlan 30
name Production
vlan 99
name Mgmt&Native
vlan 999
name BlackHole
interface range FastEthernet0/1-4
switchport trunk native vlan 99
switchport mode trunk
interface range fa0/5,fa0/7-10,fa0/12-15,fa0/17-24,g0/1-2
description Unused port
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/6
switchport access vlan 10
switchport mode access
switchport port-security
switchport port-security mac-address sticky
interface FastEthernet0/11
switchport access vlan 20
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7
Packet Tracer – CCNA Skills Integration Challenge
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7