Sunteți pe pagina 1din 4

Cisco Instructor Fast Track Practical Test 2 Topology Diagram

VLAN Table VLAN 10 20 30 Name Marketing Finance IT Network 10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

DLCI Mappings Table From/To Core R3 R4 Core N/A 305 405 R3 503 N/A 403 R4 504 304 N/A

IP Addressing Table Device R1 Interface Fa0/0.10 Fa0/0.20 Fa0/0.30 S0/0/0 Fa0/0 R2 S0/0/0 Fa0/0 S0/0/0 Fa0/0 S0/0/0 S0/0/0 S0/0/1 S0/1/0 S0/1/1 ISP Server 1 Server 2 PC1 PC2 PC3 PC4 PC5 PC6 Fa0/0 S0/0/0 NIC NIC NIC NIC NIC NIC NIC NIC IP Address Subnet Mask Gateway 192.168.1.1 192.168.1.1

100.1.1.9 192.168.1.1 100.1.1.13 10.1.4.1 100.1.1.3 10.1.5.1 100.1.1.4

R3 R4

255.255.255.25 2 255.255.255.24 8 255.255.255.25 2 255.255.255.0 255.255.255.24 8 255.255.255.0 255.255.255.24 8 255.255.255.24 8 255.255.255.25 2 255.255.255.0 255.255.255.24 8 255.255.255.24 8 DHCP DHCP DHCP DHCP DHCP 255.255.255.0

Core

100.1.1.5 200.1.1.253 201.1.1.1 192.168.1.2 192.168.1.3

201.1.1.2

201.1.1.1

DHCP Pool Table Pool Name P1 P2 P3 P4 P5 Network 10.1.1.0 10.1.2.0 10.1.3.0 10.1.4.0 10.1.5.0

IP Address Assignment Assign the first host address of each VLAN to the sub-interface of router R1. Others Use 64000 as the clock rate. Use FSKTM for any password Task 1: Switch and Server Configurations Configure the hostname for S1. Create the VLANs on S1 based on the table and then configure the appropriate interfaces as access port or trunk port. Assign the static IP to the Server 1, Server 2 and PC6. Task 2: Routers Configurations Configure the hostname for R1 and assign the IP address to the appropriate interfaces. Configure Inter-VLAN routing on R1. Then, configure PPP PAP Authentication on the Serial link between R1 and Core. Configure the hostname for R2 and assign the IP address to the appropriate interfaces. Then, configure PPP CHAP Authentication on the serial link between R2 and Core. Configure the hostname for R3 and assign the IP address to the appropriate interfaces. Then, configure frame relay encapsulation using static mapping. Configure the hostname for R4 and assign the IP address to the appropriate interfaces. Then, configure frame relay encapsulation using static mapping. R4 is using the IETF encapsulation. Configure the hostname for Core and assign the IP address to the appropriate interfaces. Then, configure frame relay encapsulation for S0/1/0 using static mapping. The Frame Relay Cloud is using ANSI as the LMI Type. Configure the hostname for ISP and assign the IP address to the appropriate interfaces. Task 3: DHCP Configurations Configure the DHCP on Core router base on the DHCP Pool table. Exclude the first 5 IP addresses from each pool. Configure the default gateway for each pool. Task 4: NAT Configurations Configure the static NAT for Server 1 (200.1.1.249) and Server 2 (200.1.1.250).

Create a pool name NAT-POOL that translates other private IP addresses to an available IP address in the 200.1.1.225 200.1.1.238 range. Use access-list 5 for all the addresses that are eligible to be translated. Task 5: Routing Configure RIP version 2 on R1, R2, R3 and R4. Disable routing updates to the LANs. Configure RIP version 2 on Core router. Advertise all subnets except 200.1.1.252 network. Disable routing updates to ISP. Configure a default route on Core router using the exit-interface argument to send all default traffic to ISP. Propagate the default route to the neighbors. Configure two static routes on the ISP router to the global IP addresses of Core router using the exit-interface argument. The global IP addresses are used for Static NAT and Dynamic NAT. Task 6: ACL Configurations Configure an access-list 1 that prohibits traffic from 10.1.4.0 network from reaching 10.1.1.0 network. Apply the ACL on the appropriate router and interface. Configure an access-list 2 that prohibits traffic from 10.1.2.0 network from reaching 10.1.5.0 network. Apply the ACL on the appropriate router and interface. Configure an access-list 101 that block 10.1.3.0 network to access the FTP service on Server 1 but allow Web access to the Server 1. All other access from 10.1.3.0 network should be denied. Apply the ACL on the appropriate router and interface. Configure an access-list 102 that block 10.1.4.0 network to access to Server 2. All other access should be allowed. Apply the ACL on the appropriate router and interface. Configure an access-list 103 that allow Web access from PC6 to the Server 1. All other access should be denied. Apply the ACL on the appropriate router and interface.

S-ar putea să vă placă și