ICND2 v3 Students Lab Manual
ICND2 v3 Students Lab Manual
Topology
Addressing Table
Objectives
Part 1: Configure and Verify DTP
Part 2: Configure and Verify VTP
Background / Scenario
As the number of switches in a network increases, the administration necessary to manage the VLANs and
trunks can be challenging. To ease some of the VLAN and trunking configurations, VLAN trunking protocol
(VTP) allows a network administration to automate the management of VLANs. Trunk negotiation between
network devices is managed by the Dynamic Trunking Protocol (DTP),
(DTP), and is automatically enabled on
Catalyst 2960 and Catalyst 3560 switches.
© 2019 Cisco and/or its affiliates.. All rights reserved. This document is Cisco Public.
Packet Tracer – Configure VLANs, VTP and DTP
In this activity, you will configure trunk links between the switches. You will configure a VTP server and VTP
clients in the same VTP domain. You will also observe the VTP behavior when a switch is in VTP transparent
mode. You will assign ports to VLANs and verify end-to-end connectivity with the same VLAN.
2
Packet Tracer – Configure VLANs, VTP and DTP
3
Packet Tracer – Configure VLANs, VTP and DTP
4
Packet Tracer – Configure VLANs, VTP and DTP
10 Red
20 Blue
30 Yellow
c. Verify the addition of the new VLANs. Enter show vlan brief at the privileged EXEC mode.
Which VLANs are configured on S1?
____________________________________________________________________________________
VLANs 1, 10, 20, 30, 99, and 999.
d. Confirm configuration changes using the show vtp status command on S1 and S2 to confirm that the
VTP mode and domain are configured correctly. Output for S2 is shown here:
S2# show vtp status
VTP Version : 2
Configuration Revision : 6
Maximum VLANs supported locally : 255
Number of existing VLANs : 10
VTP Operating Mode : Client
VTP Domain Name : CCNA
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
5
Packet Tracer – Configure VLANs, VTP and DTP
6
Packet Tracer – Configure VLANs, VTP and DTP
S2 F0/1 – 8
S3 F0/1 – 8 VLAN 10 (Red) 192.168.10.0 /24
S2 F0/9 – 16
S3 F0/9 – 16 VLAN 20 (Blue) 192.168.20.0 /24
S2 F0/17 – 24
S3 F0/17 – 24 VLAN 30 (Yellow) 192.168.30.0 /24
Script
Switch S1
enable
config t
vtp mode server
vtp domain CCNA
vtp password cisco
vlan 10
name Red
vlan 20
name Blue
vlan 30
name Yellow
interface g0/1
switchport mode dynamic desirable
switchport trunk native vlan 999
interface g0/2
switchport mode trunk
7
Packet Tracer – Configure VLANs, VTP and DTP
Switches S2 and S3
enable
config t
vtp mode client
vtp domain CCNA
vtp password cisco
interface g0/1
switchport mode dynamic desirable
switchport trunk native vlan 999
interface g0/2
switchport mode trunk
switchport trunk native vlan 999
interface range f0/1 - 8
switchport mode access
switchport access vlan 10
interface range f0/9 -16
switchport mode access
switchport access vlan 20
interface range f0/17 - 24
switchport mode access
switchport access vlan 30
end
8
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: LocateNetwork Problems
Part 2: Implement the Solution
Part 3: Verify Network Connectivity
Scenario
In this activity, you will troubleshoot connectivity problems caused by improper configurations related to
VLANs and inter-VLAN routing.
9
Packet Tracer – Configure VLANs, VTP and DTP
Documentation Table
Problems Solutions
10
Packet Tracer – Configure VLANs, VTP and DTP
Lab 2.2.3.3–TroubleshootVTP
oubleshootVTP and DTP
Topology
Addressing Table
Objectives
Part 1: Troubleshoot DTP
Part 2: Troubleshoot VTP
Background / Scenario
In this activity, the switches S2 and S3 are not implementing VTP information. You will verify that DTP and
VTP configurations are correctly implemented. When all the issues are resolved, the PCs in the same VLAN
will be able to communicate with each other.
11
Packet Tracer – Configure VLANs, VTP and DTP
a. Enter show interfaces trunk at the privileged EXEC prompt on all the switches to determine the status of
the trunk links.How many trunk links are configured currently?
____________________________________________________________________________________
There are noworking trunk links between the switches.
b. Enter show interfaces g0/1 switchport at the privileged EXEC prompt on S1. Do the same for g0/2
interface on S1.
What is the operational mode on the GigabitEthernet interfaces on S1? ______________Static access
c. Repeat the commands for g0/1 on S2 and g0/2 on S3.
Correct the trunk links. Record the commands you used to correct the trunking issue.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
S1(config)# interface range g0/1 - 2
S1(config-if-range)#switchport mode trunk
Part 2: TroubleshootVTP
12
Packet Tracer – Configure VLANs, VTP and DTP
S2 F0/1
S3 F0/8 VLAN 10 (Staff) 172.16.10.0/24
S2 F0/9
S3 F0/16 VLAN 20 (Student) 172.16.20.0 /24
S2 F0/17
S3 F0/24 VLAN 30 (Faculty) 172.16.30.0 /24
13
Packet Tracer – Configure VLANs, VTP and DTP
Using the table above, correct the VLAN assignments on S2 and S3. Record the VLAN assignment
configurationsbelow.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
S2(config)# interface f0/1
S2(config-if)#switchport access vlan 10
S2(config-if)#interface f0/9
S2(config-if)#switchport access vlan 20
S2(config-if)#interface f0/17
S2(config-if)#switchport access vlan 30
S3(config)# interface f0/8
S3(config-if)#switchport access vlan 10
S3(config-if)#interface f0/16
S3(config-if)#switchport access vlan 20
S3(config-if)#interface f0/24
S2(config-if)#switchport access vlan 30
Script
Switch S1
enable
config t
vtp mode server
vtp domain CCNA
vtp password cisco
interface range g0/1 - 2
switchport mode trunk
end
Switch S2
enable
config t
vtp mode client
vtp domain CCNA
vtp password cisco
interface g0/1
switchport mode trunk
interface f0/1
14
Packet Tracer – Configure VLANs, VTP and DTP
Switch S3
enable
config t
vtp mode client
vtp domain CCNA
vtp password cisco
interface g0/2
switchport mode trunk
interface f0/8
switchport access vlan 10
interface f0/16
switchport access vlan 20
interface f0/24
switchport access vlan 30
end
15
Packet Tracer – Configure VLANs, VTP and DTP
Lab 2.3.1.5–Configure
Configure Layer 3 Switching and Inter-VLAN
Inter VLAN Routing
Topology
16
Packet Tracer – Configure VLANs, VTP and DTP
Addressing Table
Objectives
Part 1: Configure Layer 3 Switching
Part 2: Configure Inter-VLAN Routing
Background / Scenario
A multilayer switch like the Cisco Catalyst 3560 is capable of both Layer 2 switching and Layer 3 routing. One
of the advantages of using a multilayer switch is this dual functionality. A benefit for a small-to medium-sized
company would be the ability to purchase a single multilayer switch instead of separate switching and routing
network devices. Capabilities of a multilayer switch include the ability to route from one VLAN to another
using multiple switched virtual interfaces (SVIs), as well as the ability to convert a Layer 2 switchport to a
Layer 3 interface.
17
Packet Tracer – Configure VLANs, VTP and DTP
10 Staff
20 Student
30 Faculty
18
Packet Tracer – Configure VLANs, VTP and DTP
Script
MLS
enable
config t
ip routing
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
switchport mode trunk
interface GigabitEthernet0/2
no switchport
ip address 209.165.200.225 255.255.255.252
vlan 10
name Staff
vlan 20
name Student
vlan 30
name Faculty
interface Vlan10
ip address 192.168.10.254 255.255.255.0
no shutdown
interface Vlan20
ip address 192.168.20.254 255.255.255.0
no shutdown
interface Vlan30
ip address 192.168.30.254 255.255.255.0
no shutdown
interface Vlan99
ip address 192.168.99.254 255.255.255.0
no shutdown
19
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Configure VLANs
Part 2: ConfigureSpanning Tree PVST+and Load Balancing
Part 3: ConfigurePortFast and BPDU Guard
20
Packet Tracer – Configure VLANs, VTP and DTP
Background
In this activity, you will configure VLANs and trunks, and examine and configure the Spanning Tree Protocol
primary and secondary root bridges. You will also optimize the switched topology using PVST+, PortFast, and
BPDU guard.
Task 1: Enable the user ports on S1, S2, and S3 in access mode.
Refer to the topology diagram to determine which switch ports (S1, S2,and S3) are activated for end-user
device access. These three ports will be configured for access mode and enabled with the no shutdown
command.
S1(config)#interface f0/6
S1(config-if)#switchport mode access
S1(config-if)#no shutdown
S2(config)#interface f0/18
S2(config-if)#switchport mode access
S2(config-if)#no shutdown
S3(config)#interface f0/11
S3(config-if)#switchport mode access
S3(config-if)#no shutdown
S2(config)# vlan 10
S2(config-vlan)# vlan 20
S2(config-vlan)# vlan 30
S2(config-vlan)# vlan 40
S2(config-vlan)# vlan 50
S2(config-vlan)# vlan 60
S2(config-vlan)# vlan 70
S2(config-vlan)# vlan 80
S2(config-vlan)# vlan 99
21
Packet Tracer – Configure VLANs, VTP and DTP
S3(config)# vlan 10
S3(config-vlan)# vlan 20
S3(config-vlan)# vlan 30
S3(config-vlan)# vlan 40
S3(config-vlan)# vlan 50
S3(config-vlan)# vlan 60
S3(config-vlan)# vlan 70
S3(config-vlan)# vlan 80
S3(config-vlan)# vlan 99
Task 6: Configure the management interface on all three switches with an address.
S1(config)#interface vlan99
S1(config-if)#ip address 172.31.99.1 255.255.255.0
22
Packet Tracer – Configure VLANs, VTP and DTP
S2(config)#interface vlan99
S2(config-if)#ip address 172.31.99.2 255.255.255.0
S3(config)#interface vlan99
S3(config-if)#ip address 172.31.99.3 255.255.255.0
Verify that the switches are correctly configured by pinging between them.
23
Packet Tracer – Configure VLANs, VTP and DTP
S2(config)#interface f0/18
S2(config-if-range)#spanning-tree portfast
S3(config)#interface f0/11
S3(config-if-range)#spanning-tree portfast
S2(config)#interfacef0/18
S2(config-if)#spanning-tree bpduguard enable
S3(config)#interface f0/11
S3(config-if)#spanning-tree bpduguard enable
24
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Configure VLANs
25
Packet Tracer – Configure VLANs, VTP and DTP
Background
In this activity, you will configure VLANs and trunks, Rapid Spanning Tree PVST+, primary and secondary
root bridges, and examine the configuration results. You will also optimize the network by configuring
PortFast, and BPDU Guard on edge ports.
S2(config)# vlan 10
S2(config-vlan)# vlan 20
S2(config-vlan)# vlan 30
S2(config-vlan)# vlan 40
S2(config-vlan)# vlan 50
S2(config-vlan)# vlan 60
S2(config-vlan)# vlan 70
S2(config-vlan)# vlan 80
S2(config-vlan)# vlan 99
S3(config)# vlan 10
S3(config-vlan)# vlan 20
S3(config-vlan)# vlan 30
S3(config-vlan)# vlan 40
S3(config-vlan)# vlan 50
26
Packet Tracer – Configure VLANs, VTP and DTP
S3(config-vlan)# vlan 60
S3(config-vlan)# vlan 70
S3(config-vlan)# vlan 80
S3(config-vlan)# vlan 99
Task 6: Configure the management interface on all three switches with an address.
S1(config)#interface vlan99
S1(config-if)#ip address 172.17.99.11 255.255.255.0
S2(config)#interface vlan99
S2(config-if)#ip address 172.17.99.12 255.255.255.0
S3(config)#interface vlan99
S3(config-if)#ip address 172.17.99.13 255.255.255.0
Verify that the switches are correctly configured by pinging between them.
27
Packet Tracer – Configure VLANs, VTP and DTP
28
Packet Tracer – Configure VLANs, VTP and DTP
29
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Objectives
Part 1: Configure Basic Switch Settings
Part 2: Configure an EtherChannel with Cisco PAgP
Part 3: Configure an 802.3ad LACP EtherChannel
Part 4: Configure a Redundant EtherChannel Link
Background
Three switches have just been installed. There are redundant uplinks between the switches. Usually, only one
of these links could be used; otherwise, a bridging loop might occur.However, using only one link utilizes only
half of the available bandwidth. EtherChannel allows up to eight redundant links to be bundled together into
one logical link. In this lab, you will configure Port Aggregation Protocol (PAgP), a Cisco EtherChannel
protocol, and Link Aggregation Control Protocol (LACP), an IEEE802.3adopen standard version of
EtherChannel.
Switch(config)# hostname S2
Switch(config)# hostname S3
Step 2: Configure all required ports as trunks, depending on the connections between devices.
Note: If the ports are configured with dynamic auto mode, and you do not set the mode of the ports to
trunk, the links do not form trunks and remain access ports. The default mode on a 2960 switch is
dynamic auto.
S1(config)# interface range g0/1 - 2
S1(config-if-range)#switchport mode trunk
30
Packet Tracer – Configure VLANs, VTP and DTP
<output omitted>
Step 2: On both switches, add ports F0/21 and F0/22 to Port Channel 1 with the channel-group 1 mode
desirable command. The mode desirable option enables the switch to actively negotiate to form a PAgP
link.
S1(config)# interface range f0/21 – 22
S1(config-if-range)#shutdown
S1(config-if-range)#channel-group 1 mode desirable
S1(config-if-range)#no shutdown
31
Packet Tracer – Configure VLANs, VTP and DTP
Step 3: Configure the logical interface to become a trunk by first entering the interface port-channel
numbercommand and then the switchport mode trunk command. Add this configuration to both
switches.
Instructor Note:Packet Tracer 6.0.1 does not grade the switchport mode trunk command in port-
channel interfaces.
S1(config)# interface port-channel 1
S1(config-if)#switchport mode trunk
Instructor Note:Packet Tracer 6.0.1 does not grade the switchport mode trunk command in port-
channel interfaces.
S3(config)# interface port-channel 1
S3(config-if)#switchport mode trunk
32
Packet Tracer – Configure VLANs, VTP and DTP
------+-------------+-----------+----------------------------------------
1 Po1(SU) PAgPF0/21(P) F0/22(P)
Step 2: If the EtherChannel does not come up, shut down the physical interfaces on both ends of the
EtherChannel and then bring them back up again. This involves using the shutdown command on those
interfaces, followed by a no shutdown command a few seconds later.
The show interfaces trunk and show spanning-tree commands also show the port channel as one
logical link.
S1# show interfaces trunk
Port Mode Encapsulation Status Native vlan
Gig0/1 on 802.1q trunking 1
Gig0/2 on 802.1q trunking 1
Po1 on 802.1q trunking 1
<output omitted>
33
Packet Tracer – Configure VLANs, VTP and DTP
S1(config-if-range)#shutdown
S1(config-if-range)#channel-group 2 mode active
S1(config-if-range)#no shutdown
S1(config-if-range)#interface port-channel 2
S1(config-if)#switchport mode trunk
34
Packet Tracer – Configure VLANs, VTP and DTP
Step 2: On switch S3, add ports F0/23 and F0/24 to Port Channel 3 with the channel-group 3 mode active
command. The active option indicates that you want the switch to use LACP unconditionally. Statically
configure Port Channel 3 as a trunk interface.
Instructor Note:Packet Tracer 6.0.1 does not grade the switchport mode trunk command in port-
channel interfaces.
S3(config)# interface range f0/23 - 24
S3(config-if-range)#shutdown
S3(config-if-range)#channel-group 3 mode active
S3(config-if-range)#no shutdown
S3(config-if-range)#interface port-channel 3
S3(config-if)#switchport mode trunk
35
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Objectives
Part 1: Examine the Physical Layer and Correct Switch Port Mode Issues
Part 2:Identify and Correct Port Channel Assignment Issues
Part 3:Identify and Correct Port Channel Protocol Issues
Background
Four switches were recently configured by a junior technician. Users are complaining that the network is
running slow and would like you to investigate.
Part 1: Examine the Physical Layer and Correct Switch Port Mode Issues
36
Packet Tracer – Configure VLANs, VTP and DTP
37
Packet Tracer – Configure VLANs, VTP and DTP
38
Packet Tracer – Configure VLANs, VTP and DTP
Lab 4.3.4.4-Troubleshoot
Troubleshoot HSRP
Topology
Addressing Table
Objective
In this activity, you will troubleshoot and resolve the HSRP issues in the network. You will also verify that all
the HSRP configurations meet the network requirement.
39
Packet Tracer – Configure VLANs, VTP and DTP
Background / Scenario
Currently the users can access www.cisco.pka. The network has been updated to use HSRP to ensure the
network availability to the users. You must verify that the users can still access the website if one of the
routers is down. R1 should always be the active router if it is functioning.
Network Requirement:
HSRP virtual router is 192.168.1.254.
HSRP standby group is 1.
DNS server is 209.165.202.157.
R1 should always be the active router when it is functioning properly.
R2 uses the default HSRP priority.
All users should be able to access www.cisco.pka as long as one of the routers is functioning.
Troubleshooting Process
40
Packet Tracer – Configure VLANs, VTP and DTP
Running Scripts
R1 Configuration
interface g0/1
no standby 11
standby 1 ip 192.168.1.254
standby 1 priority 101
standby 1 preempt
R2 Configuration
interface g0/1
no standby 111
standby 1 ip 192.168.1.254
41
Packet Tracer – Configure VLANs, VTP and DTP
Lab 6-2-2-4–Configuring
Configuring Basic EIGRP with IPv4
Topology
Addressing Table
Objectives
Part 1: Configure EIGRP
Part 2: Verify EIGRP Routing
42
Packet Tracer – Configure VLANs, VTP and DTP
Background
In this activity, you will implement basic EIGRP configurations including network commands, passive interfaces
and disabling automatic summarization. You will then verify your EIGRP configuration using a variety of show
commands and testing end-to-end connectivity.
43
Packet Tracer – Configure VLANs, VTP and DTP
R3(config-router)# no auto-summary
Note: Prior to IOS 15 auto-summary had to be manually disabled.
44
Packet Tracer – Configure VLANs, VTP and DTP
45
Packet Tracer – Configure VLANs, VTP and DTP
Lab 6.4.3.4–Configuring
Configuring Basic EIGRP with IPv6
Topology
Addressing Table
Objectives
Part 1: Configure EIGRP for IPv6 Routing
Part 2: Verify IPv6 EIGRPfor IPv6 Routing
46
Packet Tracer – Configure VLANs, VTP and DTP
Scenario
In this activity, you will configure the network with EIGRP routing for IPv6. You will also assign router IDs,
configure passive interfaces, verify the network is fully converged, and display routing information usingshow
commands.
EIGRP for IPv6 has the same overall operation and features as EIGRP for IPv4. There are a few major
differences between them:
EIGRP for IPv6 is configured directly on the router interfaces.
With EIGRP for IPv6, a router-id is required on each router or the routing process will not start.
The EIGRP for IPv6 routing process uses a “shutdown” feature.
R2(config)#ipv6 unicast-routing
R3(config)#ipv6 unicast-routing
47
Packet Tracer – Configure VLANs, VTP and DTP
R2(config)#int g0/0
R2(config-if)#ipv6 eigrp 1
R2(config)#int s0/0/0
R2(config-if)#ipv6 eigrp 1
R2(config)#int s0/0/1
R2(config-if)#ipv6 eigrp 1
R3(config)#int g0/0
R3(config-if)#ipv6 eigrp 1
R3(config)#int s0/0/0
R3(config-if)#ipv6 eigrp 1
R3(config)#int s0/0/1
R3(config-if)#ipv6 eigrp 1
c. Verify the parameters and current state of the active IPv6 routing protocol
processes.
Use the command show ipv6 protocols to verify the configured parameter.
48
Packet Tracer – Configure VLANs, VTP and DTP
Lab 7.1.2.4–Propagating
Propagating a Default Route in EIGRP for IPv4 and
IPv6
Topology
49
Packet Tracer – Configure VLANs, VTP and DTP
Addressing Table
Objectives
Part 1: Propagate an IPv4 Default Route
Part 2: Propagate an IPv6 Default Route
Part 3: Verify Connectivity to Outside Hosts
Scenario
In this activity, you will configure and propagate a default route in EIGRP for IPv4 and IPv6 networks. EIGRP
is already configured. However, you are required to configure an IPv4 and an IPv6 default route. Then, you
will configure the EIGRP routing process to propagate the default route to downstream EIGRP neighbors.
Finally, you will verify the default routes by pinging hosts outside the EIGRP routing domain.
50
Packet Tracer – Configure VLANs, VTP and DTP
51
Packet Tracer – Configure VLANs, VTP and DTP
EX ::/0 [170/7289856]
via FE80::1, Serial0/0/1
52
Packet Tracer – Configure VLANs, VTP and DTP
Lab 7.2.3.5–Troubleshooting
Troubleshooting EIGRP for IPv4
Topology
Addressing Table
Default
Device Interface IP Address Subnet Mask Gateway
Scenario
In this activity, you will troubleshoot EIGRP neighbor issues. Use show commands to identify errors in the
network configuration. Then, you will document the errors you discover and implement an appropriate
solution. Finally, you will verify full end-to-end
end connectivity is restored.
53
Packet Tracer – Configure VLANs, VTP and DTP
Troubleshooting Process
1. Use testing commands to discover connectivity problems in the network and document the problem in
the Documentation Table.
2. Use verification commands to discover the source of the problem and devise an appropriate solution
to implement. Document the proposed solution in the Documentation Table.
3. Implement each solution one at a time and verify if the problem is resolved. Indicate the resolution
status in the Documentation Table.
4. If the problem is not resolved, it may be necessary to first remove the implemented solution before
returning to Step 2.
5. Once all identified problems are resolved, test for full end-to-end connectivity.
Documentation Table
54
Packet Tracer – Configure VLANs, VTP and DTP
Lab 8.2.2.7–Configuring
Configuring OSPFv2 in a Single Area
Topology
Addressing Table
Objectives
Part 1: Configure OSPFv2 Routing
Part 2: Verify the Configurations
Background
In this activity, the IP addressing is already configured. Youare responsible for configuring the three router
topology with basic single area OSPFv2 and then verifying connectivity between end devices.
55
Packet Tracer – Configure VLANs, VTP and DTP
!--------------------------
!R1
!--------------------------
ena
conf t
!
router ospf 10
router-id 1.1.1.1
network 172.16.1.0 0.0.0.255 area 0
network 172.16.3.0 0.0.0.3 area 0
network 192.168.10.4 0.0.0.3 area 0
passive-interface GigabitEthernet0/0
!
end
!--------------------------
!R2
!--------------------------
ena
conf t
!
router ospf 10
router-id 2.2.2.2
56
Packet Tracer – Configure VLANs, VTP and DTP
!--------------------------
!R3
!--------------------------
ena
conf t
!
router ospf 10
router-id 3.3.3.3
network 192.168.1.0 0.0.0.255 area 0
network 192.168.10.4 0.0.0.3 area 0
network 192.168.10.8 0.0.0.3 area 0
passive-interface GigabitEthernet0/0
!
end
57
Packet Tracer – Configure VLANs, VTP and DTP
Lab 8.3.3.5–Configuring
Configuring Basic OSPFv3 in a Single Area
.
Topology
Addressing Table
Objectives
Part 1: Configure OSPFv3 Routing
Part 2: Verify Connectivity
Background
In this activity, the IPv6 addressing is already configured. You are responsible for configuring the three router
topology with basic single area OSPFv3 and then verifying connectivity between end devices.
58
Packet Tracer – Configure VLANs, VTP and DTP
SCRIPT
!R1
!--------------------------
ena
conf t
!
ipv6 unicast-routing
!
ipv6 router ospf 10
router-id 1.1.1.1
auto-cost reference-bandwidth 1000
passive-interface GigabitEthernet 0/0
end
clear ipv6 ospf process
y
59
Packet Tracer – Configure VLANs, VTP and DTP
conf t
!
interface GigabitEthernet 0/0
ipv6 ospf 10 area 0
!
interface Serial0/0/0
ipv6 ospf 10 area 0
!
interface Serial0/0/1
ipv6 ospf 10 area 0
!
end
!--------------------------
!R2
!--------------------------
ena
conf t
!
ipv6 unicast-routing
!
ipv6 router ospf 10
router-id 2.2.2.2
auto-cost reference-bandwidth 1000
passive-interface GigabitEthernet 0/0
end
clear ipv6 ospf process
y
conf t
!
interface GigabitEthernet 0/0
ipv6 ospf 10 area 0
!
interface Serial0/0/0
ipv6 ospf 10 area 0
!
60
Packet Tracer – Configure VLANs, VTP and DTP
interface Serial0/0/1
ipv6 ospf 10 area 0
!
end
!--------------------------
!R3
!--------------------------
ena
conf t
!
ipv6 unicast-routing
!
ipv6 router ospf 10
router-id 3.3.3.3
auto-cost reference-bandwidth 1000
passive-interface GigabitEthernet 0/0
end
clear ipv6 ospf process
y
conf t
!
interface GigabitEthernet 0/0
ipv6 ospf 10 area 0
!
interface Serial0/0/0
ipv6 ospf 10 area 0
!
interface Serial0/0/1
ipv6 ospf 10 area 0
!
end
61
Packet Tracer – Configure VLANs, VTP and DTP
Lab 9.2.2.6–Configuring
ring Multiarea OSPFv2
Topology
Addressing Table
OSPFv2
Device Interface IP Address Subnet Mask Area
Objectives
Part 1: Configure Multiarea OSPFv2
Part 2:Verify
Verify and Examine Multiarea OSPFv2
62
Packet Tracer – Configure VLANs, VTP and DTP
Background
In this activity, you will configure multiarea OSPFv2. The network is already connected and interfaces are
configured with IPv4 addressing. Your job is to enable multiarea OSPFv2, verify connectivity, and examine
the operation of multiarea OSPFv2.
63
Packet Tracer – Configure VLANs, VTP and DTP
show ip route
show ip ospf database
show ip ospf interface
show ip ospf neighbor
Reflection Questions
1. Which router(s) are internal routers? R2
2. Which router(s) are backbone routers? R1, R2, and R3 are all backbone routers.
3. Which router(s) are area border routers? R1 and R3
4. Which router(s) are autonomous system routers? None, all active interfaces on all three routers connect to an
OSPF area.
5. Which routers are generating Type 1 LSAs? All OSPF routers generate Type 1 LSAs.
6. Which routers are generating Type 2 LSAs? Hidden routers in each of the areas that are DRs are. Router IDs
4.4.4.4, 5.5.5.5, 6.6.6.6, 9.9.9.9
7. Which routers are generating Type 3 LSAs? R1 and R3 because each is an ABR and needs to flood area
information from one area to the other.
8. Which routers are generating Type 4 and 5 LSAs? None, because there is not an ASBR in the network.
9. How many inter area routes does each router have? R1 and R3 have two IAs and R2 has 4 IAs.
10. Why would there usually be an ASBR in this type of network? ASBR is used to connect external routing
domains.
64
Packet Tracer – Configure VLANs, VTP and DTP
Lab 9.2.2.7–Configuring
ring Multiarea OSPFv3
.
Topology
Addressing Table
G0/0 2001:DB8:1:A1::1/64 1
G0/1 2001:DB8:1:A2::1/64 1
RA
S0/0/0 2001:DB8:1:AB::2/64 0
Link-Local FE80::A N/A
G0/0 2001:DB8:1:B1::1/64 0
S0/0/0 2001:DB8:1:AB::1/64 0
RB
S0/0/1 2001:DB8:1:BC::1/64 0
Link-Local FE80::B N/A
G0/0 2001:DB8:1:C1::1/64 2
G0/1 2001:DB8:1:C2::1/64 2
RC
S0/0/1 2001:DB8:1:BC::2/64 0
Link-Local FE80::C N/A
65
Packet Tracer – Configure VLANs, VTP and DTP
Objectives
Part 1: Configure OSPFv3
Part 2: Verify Multiarea OSPFv3 Operations
Background
In this activity, you will configure multiarea OSPFv3. The network is already connected and interfaces are
configured with IPv6 addressing. Your job is to enable multiarea OSPFv3, verify connectivity and examine the
operation of multiareaOSPFv3.
66
Packet Tracer – Configure VLANs, VTP and DTP
67
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Examine DR and BDR Changing Roles
Part 2: Modify OSPF Priority and Force Elections
Scenario
In this activity, you will examine DR and BDR roles and watch the roles change when there is a change in the
network. You will then modify the priority to control the roles and force a new election. Finally, you will verify
routers are filling the desired roles.
68
Packet Tracer – Configure VLANs, VTP and DTP
69
Packet Tracer – Configure VLANs, VTP and DTP
RB: 100
RC: 1 (This is the default priority)
70
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Propagate a Default Route
Part 2: Verify Connectivity
71
Packet Tracer – Configure VLANs, VTP and DTP
Background
In this activity, you will configure an IPv4 default route to the Internet and propagate that default route to other
OSPF routers. You will then verify the default route is in downstream routing tables and that hosts can now
access a web server on the Internet.
72
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Modify OSPF Default Settings
Part 2: Verify Connectivity
73
Packet Tracer – Configure VLANs, VTP and DTP
Scenario
In this activity, OSPF is already configured and all end devices currently have full connectivity. You will modify
the default OSPF routing configurations by changing the hello and dead timers and adjusting the bandwidth of
a link. Then you will verify that full connectivity is restored for all end devices.
74
Packet Tracer – Configure VLANs, VTP and DTP
10.2.2.3 –Troubleshooting
Troubleshooting Single-Area
Single OSPFv2
Topology
Addressing Table
Scenario
In this activity, you will troubleshoot OSPF routing issues using ping and show commands to identify errors in
the network configuration. Then, you will document the errors you discover and implement an appropriate
solution. Finally, you will verify end-to
to-end connectivity is restored.
75
Packet Tracer – Configure VLANs, VTP and DTP
Troubleshooting Process
1. Use testing commands to discover connectivity problems in the network and document the problem in
the Documentation Table.
2. Use verification commands to discover the source of the problem and devise an appropriate solution
to implement. Document the proposed solution in the Documentation Table.
3. Implement each solution one at a time and verify if the problem is resolved. Indicate the resolution
status in the Documentation Table.
4. If the problem is not resolved, it may be necessary to first remove the implemented solution before
returning to Step 2.
5. Once all identified problems are resolved, test for end-to-end connectivity.
Documentation Table
76
Packet Tracer – Configure VLANs, VTP and DTP
Lab 10.2.4.3–TroubleshootMultiarea
TroubleshootMultiarea OSPFv2
Topology
77
Packet Tracer – Configure VLANs, VTP and DTP
Addressing Table
Objectives
Troubleshoot a multiarea OSPFv2 network.
Background / Scenario
A largeorganization has recently decided to change the network from single-area OSPFv2 to multiarea
OSPFv2.As a result, the network is no longer functioning correctly and communication through much of the
network has failed. As a network administrator, you must troubleshoot the problem, fix the multiarea OSPFv2
implementation, and restore communication throughout the network. To do this, you are given the Addressing
Table above, showing all of the routers in the network including their interface IP addresses and subnet
masks. You are told that in Area 1 communication to the 192.168.4.0/24 network is down and that router R2 is
unable to form an OSPF adjacency with router R1. In Area 2, communication to the 172.16.1.64/27 and
172.16.1.96/24 networks has been lost and router R4 is unable to form an adjacency. Area 0 is behaving as
expected.
78
Packet Tracer – Configure VLANs, VTP and DTP
79
Packet Tracer – Configure VLANs, VTP and DTP
Yes. ABR2 shows two neighbors with neighbor IDs 3.3.3.3 and 7.7.7.7. R3 is neighbor ID 3.3.3.3
because it shows it is connected on interface G0/1.
3. Because ABR2 has formed a neighbor relationship with R3, the problem may lay with the OSPFv2
configurations on either R3 or R4. Console into R3 and check the OSPFv2 configurations in the running-
configuration.
Are there any problems withthe R3 OSPFv2 routing process configurations?
____________________________________________________________________________________
Yes, the network statement for the 172.16.1.64 network is incorrectly configured in Area 0 instead of Area
2.
4. To correct the problem, replace the OSPF routing process network statement that places the
172.16.1.64/24 subnet in Area 0 and change it to Area 2.
R3# configure terminal
R3(config)# router ospf 1
R3(config-router)#no network 172.16.1.64 0.0.0.31 area 0
R3(config-router)#network 172.16.1.64 0.0.0.31 area 2
Did a syslog message appear in the R3 console reporting an OSPF adjacency change? What does this
signify?
____________________________________________________________________________________
Yes, the syslog message was: %OSPF-5-ADJCHG: Process 1, Nbr 4.4.4.4 on GigabitEthernet0/0 from
LOADING to FULL. This signifies that an adjacency was formed with R4.
5. Verify that the R3 routing table has routes to all of the networks in all of the OSPF areas.
Are any routes missing? If so, which ones?
____________________________________________________________________________________
Yes, the routes to the 192.168.x.x networks are missing.
6. It appears that R3 is missing the OSPFv2 interarea 192.168.0.0/21 summary route. To solve this
problem, completely remove the OSPFv2 routing process from router R3 and then re-add it.
R3# configure terminal
R3(config)# no router ospf 1
R3(config)# router ospf 1
R3(config-router)#router-id 3.3.3.3
R3(config-router)#network 172.16.1.32 0.0.0.31 area 2
R3(config-router)#network 172.16.1.64 0.0.0.31 area 2
7. Now verify that the R3 routing table has learned the OSPF interarea summary route to the 192.168.0.0/21
subnet.
Is the OSPF interarea route to the 192.168.0.0/21 subnet in the routing table?
____________________________________________________________________________________
Yes.
80
Packet Tracer – Configure VLANs, VTP and DTP
Topology
81
Packet Tracer – Configure VLANs, VTP and DTP
Addressing Table
Objectives
Troubleshoot a multiarea OSPFv3 network.
Background / Scenario
A largeorganization has recently decided to implement a multiarea OSPFv3 network.As a result, the network
is no longer functioning correctly and communication through much of the network has failed. As a network
administrator you must troubleshoot the problem, fix the multiarea OSPFv3 implementation, and restore
communication throughout the network. To do this, you are given the Addressing Table above, showing all of
the routers in the network including their interface IPv6 addresses. You are told that in Area 1, R2 is unable to
form OSPF adjacencies. In Area 0 and Area 2, three routers ABR2, R3 and R4 have not been able to form
OSPF adjacencies. Lastly, ABR1 and R1 have not received default route information.
.
82
Packet Tracer – Configure VLANs, VTP and DTP
If the problem has been corrected a syslog message should appear in the R2 console showing an OSPF
adjacency change from LOADING to FULL.State if the problem has been corrected, and if so, what is the
Nbr address?
____________________________________________________________________________________
Yes, there is a successful adjacency change to FULL with Nbr 1.1.1.1.
83
Packet Tracer – Configure VLANs, VTP and DTP
84
Packet Tracer – Configure VLANs, VTP and DTP
3. Check the IPv6 routing tables of ABR1 and ABR2 to see if the default route was discovered through
OSPFv3.
Looking at the output of the show ipv6 route, did the router learn of the default route from OSPFv3? If
so, list the line or lines that signify this.
____________________________________________________________________________________
Yes. OE2 ::/0 [110/1] via FE80::7, Serial0/0/0.
85
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Review Routing Configurations
Part 2: Configure PPP as the Encapsulation Method
Part 3: Configure PPP Authentication
86
Packet Tracer – Configure VLANs, VTP and DTP
Background
In this activity, you will practice configuring PPP encapsulation on serial links. You will also configure PPP PAP
authentication and PPP CHAP authentication.
87
Packet Tracer – Configure VLANs, VTP and DTP
88
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Diagnose and Repair the Physical Layer
Part 2: Diagnose and Repair the Data Link Layer
Part 3: Diagnose and Repair the Network Layer
89
Packet Tracer – Configure VLANs, VTP and DTP
Scenario
The routers at your company were configured by an inexperienced network engineer. Several errors in the
configuration have resulted in connectivity issues. Your boss has asked you to troubleshoot and correct the
configuration errors and document your work. Using your knowledge of PPP and standard testing methods,
find and correct the errors. Make sure that all of the serial links use PPP CHAP authentication, and that all of
the networks are reachable. The passwords are cisco and class.
90
Packet Tracer – Configure VLANs, VTP and DTP
R2(config)#interface s0/0/1
R2(config-if)# encapsulation ppp
91
Packet Tracer – Configure VLANs, VTP and DTP
b. Verify full connectivity by tracing a path from PC1 and PC3 to the web server.
92
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Verify Router Connectivity
Part 2: Configure GRE Tunnels
Part 3: Verify PC Connectivity
Scenario
You are the network administrator for a company which wants to set up a GRE tunnel to a remote office. Both
networks are locally configured, and need only the tunnel configured.
93
Packet Tracer – Configure VLANs, VTP and DTP
94
Packet Tracer – Configure VLANs, VTP and DTP
Device Configs
Router RA
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname RA
license udi pid CISCO2911/K9 sn FTX15242579
spanning-tree mode pvst
interface Tunnel0
ip address 10.10.10.1 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 209.165.122.2
tunnel mode gre ip
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 64.103.211.2 255.255.255.252
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
ip classless
ip route 192.168.2.0 255.255.255.0 10.10.10.2
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
line con 0
95
Packet Tracer – Configure VLANs, VTP and DTP
line aux 0
line vty 0 4
login
end
Router RB
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
license udi pid CISCO2911/K9 sn FTX152497Z4
spanning-tree mode pvst
interface Tunnel0
ip address 10.10.10.2 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 64.103.211.2
tunnel mode gre ip
interface GigabitEthernet0/0
ip address 192.168.2.1 255.255.255.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 209.165.122.2 255.255.255.252
!
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
ip classless
ip route 192.168.1.0 255.255.255.0 10.10.10.1
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
line con 0
line aux 0
line vty 0 4
login
end
96
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Find and Correct All Network Errors
Verify Connectivity
Scenario
A junior network administrator was hired to set up a GRE tunnel between two sites and was unable to complete
the task. You have been asked to correct configuration errors in the company network.
97
Packet Tracer – Configure VLANs, VTP and DTP
Verify Connectivity
Device Configs
Router RA
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname RA
interface Tunnel0
ip address 192.168.1.1 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 64.103.211.2
98
Packet Tracer – Configure VLANs, VTP and DTP
Router RB
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname RB
interface Tunnel0
ip address 192.168.1.2 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 209.165.122.2
tunnel mode gre ip
interface GigabitEthernet0/0
ip address 172.31.1.1 255.255.255.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
duplex auto
99
Packet Tracer – Configure VLANs, VTP and DTP
speed auto
shutdown
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
shutdown
interface Serial0/0/0
ip address 64.103.211.2 255.255.255.252
interface Serial0/0/1
no ip address
shutdown
interface Vlan1
no ip address
shutdown
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0/0
ip route 172.31.0.0 255.255.255.0 192.168.1.1
line con 0
line aux 0
line vty 0 4
login
end
100
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Objectives
Configure and verify eBGP between two autonomous systems.
Background / Scenario
In this activity, you will configure and verify the operation of eBGP between autonomous systems 65001 and
65002. ACME Inc. is a company that has a partnership with Other Company and must exchange routes. Both
companies have their own autonomous systems and will use ISP as the transit AS to reach each other.
Note: Only companies with very large networks can afford their own autonomous system.
101
Packet Tracer – Configure VLANs, VTP and DTP
Address Table
102
Packet Tracer – Configure VLANs, VTP and DTP
Configure OtherCo1 to form an eBGP adjacency with ISP2, the ISP border router facing OtherCo1. Other
Company is under AS 65002 while ISP is under AS 65003. Use the 1.1.1.9 as the neighbor IP address of
ISP2 and make sure to add Other Company’s internal network 172.16.10.0/24 to BGP.
OtherCo1(config)# router bgp 65002
OtherCo1(config-router)#neighbor 1.1.1.9 remote-as 65003
OtherCo1(config-router)#network 172.16.10.0 mask 255.255.255.0
Scripts
ACME1 Configuration
router bgp 65001
neighbor 1.1.1.1 remote-as 65003
network 192.168.0.0 mask 255.255.255.0
OtherCo1 Configuration
router bgp 65002
neighbor 1.1.1.9 remote-as 65003
network 172.16.10.0 mask 255.255.255.0
103
Packet Tracer – Configure VLANs, VTP and DTP
Lab 14.1.3.5–Configure
Configure Standard IPv4 ACLs
Topology
104
Packet Tracer – Configure VLANs, VTP and DTP
Addressing Table
Objectives
Restrict traffic on the network by configuring standard IPv4 ACLs.
Background / Scenario
An organization has recently decided to restrict traffic using standard IPv4 ACLs. As the network
administrator, it is your job to configure two standard IPv4 ACLs to restrict traffic to the Pink LAN and the Blue
LAN (see PT Topology Diagram). You must also configure a named standard IPv4 ACL to restrict remote
access to router R1. Router interfaces and default/static routes have already been configured. Remote SSH
access has also been enabled on the routers. You will need the following access information for console,
VTY, and privileged EXEC mode:
Username: admin01
Password: ciscoPA55
Enable secret: secretPA55
105
Packet Tracer – Configure VLANs, VTP and DTP
3. Permit only the first half of hosts on the Yellow LAN, so they can reach the Pink LAN
4. Permit all of the hosts on the Blue LAN to reach the Pink LAN
Access list 10 should be configured on the correct router, and applied to the correct interface and in the right
direction.
106
Packet Tracer – Configure VLANs, VTP and DTP
____________________________________________________________________________________
To insert or remove an ACE on a specific line enter the ACL using the ip access-list keywords and arguments
as if the numbered ACL was a named ACL.
What line did you enter the ACE on?
____________________________________________________________________________________
Answers may vary but inserting the ACE on lines 1 through 9 would all work.
Reflection
This lab features two standard ACLs to restrict traffic to the Pink and Blue LANs. Could you create 2 more
standard ACLs to restrict traffic to the Yellow and Green ACLs and which router would those ACLs need to be
created on?
_______________________________________________________________________________________
_______________________________________________________________________________________
Yes, you could create a standard ACL for G0/0 and G0/1 on router R1 to restrict access to the Yellow and
Green LANs.
Script
R1
ip access-list standard ADMIN_VTY
permit 192.168.2.50
line vty 0 4
access-class ADMIN_VTY in
R2
access-list 10 remark ACL_TO_PINK_LAN
access-list 10 permit host 192.168.2.50
access-list 10 permit 192.168.1.0 0.0.0.127
107
Packet Tracer – Configure VLANs, VTP and DTP
108
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Configure, Apply and Verify an Extended Numbered ACL
Part 2: Configure, Apply and Verify an Extended Named ACL
Background / Scenario
Two employees need access to services provided by the server. PC1 only needs FTP access while PC2 only
needs web access. Both computers are able to ping the server, but not each other.
109
Packet Tracer – Configure VLANs, VTP and DTP
R1(config)# access-list ?
<1-99> IP standard access list
<100-199> IP extended access list
2. Add 100 to the command,followed by a question mark.
R1(config)# access-list 100 ?
deny Specify packets to reject
permit Specify packets to forward
remark Access list entry comment
3. To permit FTP traffic, enter permit,followed by a question mark.
R1(config)# access-list 100 permit ?
ahp Authentication Header Protocol
eigrp Cisco's EIGRP routing protocol
esp Encapsulation Security Payload
gre Cisco's GRE tunneling
icmp Internet Control Message Protocol
ip Any Internet Protocol
ospf OSPF routing protocol
tcp Transmission Control Protocol
udp User Datagram Protocol
4. This ACL permits FTP and ICMP. ICMP is listed above, but FTP is not, because FTP uses TCP. So you
enter TCP. Enter tcp to further refine the ACL help.
R1(config)# access-list 100 permit tcp ?
A.B.C.D Source address
any Any source host
host A single source host
5. Notice that we could filter just for PC1 by using the hostkeywordor we could allow any host. In this case,
any device is allowed that has an address belonging to the 172.22.34.64/27 network. Enter the network
address, followed by a question mark.
R1(config)# access-list 100 permit tcp 172.22.34.64 ?
A.B.C.D Source wildcard bits
6. Calculate the wildcard maskdetermining the binary opposite of a subnet mask.
11111111.11111111.11111111.11100000 = 255.255.255.224
00000000.00000000.00000000.00011111 = 0.0.0.31
7. Enter the wildcard mask, followed by a question mark.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 ?
A.B.C.D Destination address
any Any destination host
eq Match only packets on a given port number
gt Match only packets with a greater port number
host A single destination host
lt Match only packets with a lower port number
neq Match only packets not on a given port number
range Match only packets in the range of port numbers
110
Packet Tracer – Configure VLANs, VTP and DTP
8. Configure the destination address. In this scenario, we are filtering traffic for a single destination, the
server. Enter thehost keywordfollowed by the server’s IP address.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host
172.22.34.62 ?
dscp Match packets with given dscp value
eq Match only packets on a given port number
established established
gt Match only packets with a greater port number
lt Match only packets with a lower port number
neq Match only packets not on a given port number
precedence Match packets with given precedence value
range Match only packets in the range of port numbers
<cr>
9. Notice that one of the options is <cr>(carriage return). In other words, you canpress Enter and the
statement would permit all TCP traffic. However, we are only permitting FTP traffic; therefore, enter the
eqkeyword, followed by a question mark to display the available options. Then, enter ftp and press Enter.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host
172.22.34.62 eq ?
<0-65535> Port number
ftp File Transfer Protocol (21)
pop3 Post Office Protocol v3 (110)
smtp Simple Mail Transport Protocol (25)
telnet Telnet (23)
www World Wide Web (HTTP, 80)
R1(config)#access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62
eq ftp
10. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC1 to Server. Note that
the access list number remains the same and a specific type of ICMP traffic does not need to be
specified.
R1(config)# access-list 100 permit icmp 172.22.34.64 0.0.0.31 host
172.22.34.62
11. All other traffic is denied, by default.
111
Packet Tracer – Configure VLANs, VTP and DTP
ftp>quit
4. Ping fromPC1 to PC2. The destination host should be unreachable, because the traffic was not explicitly
permitted.
5. Finish the statement by specifying the server address as you did in Part 1 and filtering www traffic.
R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 host 172.22.34.62 eq www
6. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC2 to Server. Note:The
prompt remains the same and a specific type of ICMP traffic does not need to be specified.
R1(config-ext-nacl)# permit icmp 172.22.34.96 0.0.0.15 host 172.22.34.62
7. All other traffic is denied, by default. Exit out of extended named ACL configuration mode.
112
Packet Tracer – Configure VLANs, VTP and DTP
3. Open the web browser onPC2 and enter the IP address of Serveras the URL. The connection should be
successful.
113
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Configure, Apply and Verify an Extended Numbered ACL
Part 2: Reflection Questions
Background / Scenario
In this scenario, devices on one LAN are allowed to remotely access devices in another LAN using the Telnet
protocol.Besides ICMP, all traffic from other networks is denied.
114
Packet Tracer – Configure VLANs, VTP and DTP
Reflection Questions
1. How was PCA able to bypass access list 199 and Telnet to SWC?Two steps were used: First, PCA used
Telnet to access SWB. From SWB, Telnet was allowed to SWC.
115
Packet Tracer – Configure VLANs, VTP and DTP
2. What could have been done to prevent PCA from accessing SWC indirectly, while allowing PCB Telnet
access to SWC?Access list 199 should have been written to deny Telnet traffic from the 10.101.117.48 /29
network while permitting ICMP. It should have been placed on G0/0 of RTA.
116
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Configure a Named Extended ACL
Part 2: Apply and Verify the Extended ACL
Background / Scenario
In this scenario, specific devices on the LAN are allowed to various services on servers located on the
Internet.
117
Packet Tracer – Configure VLANs, VTP and DTP
Block HTTP and HTTPS access from PC1 to Server1 and Server2. The servers are inside the cloud
and you only know their IP addresses.
Block FTP access from PC2 to Server1 and Server2.
Block ICMP access from PC3 to Server1 and Server2.
Note: For scoring purposes, you must configure the statements in the order specified in the following steps.
a. Deny PC1 to access HTTP and HTTPS services on Server1 and Server2.
1. Create an extended IP access list named ACL which will deny PC1 access to the HTTP and HTTPS
services of Server1 and Server2. Because it is impossible to directly observe the subnet of servers on
the Internet, four rules are required.
What is the command to begin the named ACL?
ip access-list extended ACL
2. Record the statement that denies access from PC1 to Server1, only for HTTP (port 80).
deny tcp host 172.31.1.101 host 64.101.255.254 eq 80
3. Record the statement that denies access from PC1 to Server1, only for HTTPS (port 443).
deny tcp host 172.31.1.101 host 64.101.255.254 eq 443
4. Record the statement that denies access from PC1 to Server2, only for HTTP.
deny tcp host 172.31.1.101 host 64.103.255.254 eq 80
5. Record the statement that deniesaccess from PC1 to Server2, only for HTTPS.
deny tcp host 172.31.1.101 host 64.103.255.254 eq 443
118
Packet Tracer – Configure VLANs, VTP and DTP
e. Apply the ACL to the correct interface and in the correct direction.
1. What are the commands you need to apply the ACL to the correct interface and in the correct direction?
interface g0/0
ip access-group ACL in
119
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Configure, Apply, and Verifyan IPv6 ACL
Part 2: Configure, Apply, and Verify a Second IPv6 ACL
120
Packet Tracer – Configure VLANs, VTP and DTP
121
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Troubleshoot ACL Issue 1
Part 2: Troubleshoot ACL Issue 2
Part 3: Troubleshoot ACL Issue 3
122
Packet Tracer – Configure VLANs, VTP and DTP
Scenario
This network is meant to have the following three policies implemented:
Hosts from the 192.168.0.0/24 network are unable to access anyTCP service of Server3.
Hosts from the 10.0.0.0/8 network are unable to access the HTTP service of Server1.
Hosts from the 172.16.0.0/16 network are unable to access the FTP service of Server2.
Note:All FTP usernames and passwords are “cisco”.
No other restrictions should be in place. Unfortunately, the rules that have been implemented are not working
correctly. Your task is to find and fix the errors related to the access lists on R1.
b. Implement a solution.
Make an adjustment to access list 192_to_10 to fix the problem.
123
Packet Tracer – Configure VLANs, VTP and DTP
1. View the running configuration onR1. Examine access list 10_to_172 and its placement on the interfaces.
Is the access list placed on the correct interface and in the correct direction? Is there any statement in the
list that permits or denies traffic to other networks? Are the statements in the correct order?
2. Run other tests as necessary.
e. Implement a solution.
Make an adjustment to access list 10_to_172 to fix the problem.
b. Implement a solution.
Make an adjustment to access list 172_to_192 to fix the problem.
124
Packet Tracer – Configure VLANs, VTP and DTP
Possible Earned
Question Location Points Points
Documentation Score 10
Packet Tracer Score 90
Total Score 100
125
Packet Tracer – Configure VLANs, VTP and DTP
Topology
Addressing Table
Objectives
Part 1: Troubleshoot HTTP Access
Part 2: Troubleshoot FTP Access
Part 3: Troubleshoot SSH Access
126
Packet Tracer – Configure VLANs, VTP and DTP
Scenario
The following three polices have been implemented on the network:
Hosts from the 2001:DB8:CAFÉ::/64 network do not have HTTP access to the other networks.
Hosts from the 2001:DB8:CAFÉ:1::/64 network are prevented from access to the FTP service on Server2.
Hosts from the 2001:DB8:CAFE:1::/64 and 2001:DB8:CAFE:2::/64 networks are prevented from
accessing R1via SSH.
No other restrictions should be in place. Unfortunately, the rules that have been implemented are not working
correctly. Your task is to find and fix the errors related to the access lists on R1.
Note: To access R1 and the FTP servers, use the username user01 and password user01pass.
b. Implement a solution.
Make adjustments to access liststo fix the problem.
R1(config)# ipv6 access-list G0-ACCESS
R1(config-ipv6-acl)# permit ipv6 any any
127
Packet Tracer – Configure VLANs, VTP and DTP
PC>ftp 2001:db8:cafe:2::2
2. View the running configuration on R1. Examine access listG1-ACCESS and its placement on the
interfaces. Is the access list placed on the correct port in the correct direction? Is there any statement in
the list that permits or denies traffic to other networks? Are the statements in the correct order?
3. Run other tests as necessary.
e. Implement a solution.
Make adjustments to access lists to fix the problem.
R1(config)# interface GigabitEthernet0/1
R1(config-if)# no ipv6 traffic-filter G1-ACCESS out
R1(config-if)# ipv6 traffic-filter G1-ACCESS in
h. Implement a solution.
Make adjustments to access lists to fix the problem.
R1(config)# no ipv6 access-list G2-ACCESS
R1(config)# ipv6 access-list G2-ACCESS
R1(config-ipv6-acl)# deny tcp 2001:DB8:CAFE:2::/64 any eq 22
R1(config-ipv6-acl)# permit ipv6 any any
128
Packet Tracer – Configure VLANs, VTP and DTP
Possible Earned
Question Location Points Points
Documentation Score 10
Packet Tracer Score 90
Total Score 100
Script
R1 Configuration
ipv6 access-list G0-ACCESS
permit ipv6 any any
no ipv6 access-list G2-ACCESS
ipv6 access-list G2-ACCESS
deny tcp 2001:DB8:CAFE:2::/64 any eq 22
permit ipv6 any any
interface GigabitEthernet0/1
no ipv6 traffic-filter G1-ACCESS out
ipv6 traffic-filter G1-ACCESS in
129
Packet Tracer – Configure VLANs, VTP and DTP
Topology
130
Packet Tracer – Configure VLANs, VTP and DTP
Addressing Table
Background
This activity uses a variety of technologies you have encountered during your CCNA studies, including VLANs,
STP, routing, inter-VLAN routing, DHCP, NAT, and PPP. Your task is to review the requirements, isolate and
resolve any issues, and then document the steps you took to verify the requirements.
Requirements
VLANs and Access
S2 is the spanning-tree root for VLAN 1, 10, and 20. S3 is the spanning-tree root for VLAN 30 and 88.
The trunk links connecting the switches are in native VLAN 99.
R3 is responsible for inter-VLAN routing and serves as the DHCP server for VLANs 10, 20, and 30.
Routing
Each router is configured with EIGRP and uses AS 22.
R2 is configured with a default route pointing to the ISP and redistributes the default route.
NAT is configured on R2 and no untranslated addresses are permitted to cross the Internet.
131
Packet Tracer – Configure VLANs, VTP and DTP
WAN Technologies
The serial link between R1 and R2 uses Frame Relay.
The serial link between R2 and R3 uses HDLC encapsulation.
The serial link between R1 and R3 uses PPP with CHAP.
Connectivity
Devices should be configured according to the Addressing Table.
Every device should be able to ping every other device.
Troubleshooting Documentation
Verification Documentation
Capture output from verification commands and provide documentation proving that each of the requirements has
been satisfied.
132
Packet Tracer – Configure VLANs, VTP and DTP
Topology
133
Packet Tracer – Configure VLANs, VTP and DTP
Addressing Table
Background
This activity uses IPv6 configurationsthat include DHCPv6, EIGRPv6, and IPv6 default routing. Your task is to
review the requirements, isolate and resolve any issues, and then document the steps you took to verify the
requirements.
Requirements
DHCPv6
Host_A and Host_B are assigned through IPv6 DHCP configured on R1.
IPv6 Routing
Each router is configured with IPv6 EIGRP and uses AS 100.
R3 is advertising a summary route to R2 and R1 for the twoR3 LANs.
R2 is configured with a fully specified default route pointing to the ISP.
Connectivity
Devices should be configured according to the Addressing Table.
Every device should be able to ping every other device.
134
Packet Tracer – Configure VLANs, VTP and DTP
Troubleshooting Documentation
R2 The default route has the incorrect next- no ipv6 route ::/0 GigabitEthernet0/0
hop address configured. 2001:DB8:ACAD:F::
ipv6 route ::/0 GigabitEthernet0/1
2001:DB8:ACAD:F::1
R2 IPv6 EIGRP is configured with the wrong int g0/0
autonomous system. no ipv6 eigrp 1000
ipv6 eigrp 100
R3 IPv6 EIGRP 100 is shutdown. ipv6 router eigrp 100
no shutdown
R3 EIGRP summary address is incorrectly int s0/0/0
advertised on S0/0/1. no ipv6 summary-address eigrp 100
2001:DB8:CAFE::/65 5
ipv6 summary-address eigrp 100
2001:DB8:CAFÉ:2::/63 5
int s0/0/1
no ipv6 summary-address eigrp 100
2001:DB8:CAFE::/65 5
ipv6 summary-address eigrp 100
2001:DB8:CAFE:2::/63 5
Verification Documentation
Capture output from verification commands and provide documentation proving that each of the requirements has
been satisfied.
Note: Some EIGRPv6 commands are not scored in Packet Tracer v6.0.1. Your instructor will verify that all
requirements are met.
135
Packet Tracer – Configure VLANs, VTP and DTP
Topology
136
Packet Tracer – Configure VLANs, VTP and DTP
Addressing Table
Background
This activity uses a variety of technologies you have encountered during your CCNA studies, including routing,
port security, EtherChannel, DHCP, NAT, PPP, and Frame Relay. Your task is to review the requirements, isolate
and resolve any issues, and then document the steps you took to verify the requirements.
Note: This activity begins with a partial score.
Requirements
DHCP
R1 is the DHCP server for the R1 LAN.
Switching Technologies
Port security is configured to only allow PC1 to access S1's F0/3 interface. All violations should disable
the interface.
Link aggregation using EtherChannel is configured on S2, S3, and S4.
Routing
All routers are configured with OSPFprocess ID 1 and no routing updates should be sent across
interfaces that do not have routers connected.
R2 is configured with a default route pointing to the ISP and redistributes the default route.
NAT is configured on R2 and no untranslated addresses are permitted to cross the Internet.
137
Packet Tracer – Configure VLANs, VTP and DTP
WAN Technologies
The serial link between R1 and R2 uses Frame Relay.
The serial link between R2 and R3 uses HDLC encapsulation.
The serial link between R1 and R3 uses PPP with PAP.
Connectivity
Devices should be configured according to the Addressing Table.
Every device should be able to ping every other device.
138
Packet Tracer – Configure VLANs, VTP and DTP
Troubleshooting Documentation
139
Packet Tracer – Configure VLANs, VTP and DTP
Verification Documentation
Capture output from verification commands and provide documentation proving that each of the requirements has
been satisfied.
140