Sunteți pe pagina 1din 14

CCNA Routing and Switching

Scaling Networks
Practice Skills Assessment - EIGRP

A few things to keep in mind while completing this activity:


1. Do not use the browser Back button or close or reload any exam windows during
the exam.
2. Do not close Packet Tracer when you are done. It will close automatically.
3. Click the Submit Assessment button in the browser window to submit your
work.
Introduction
In this practice skills assessment, you will configure the [[orgname]] network with EIGRP routing and
enhanced switching. The network is configured with both IPv4 and IPv6 on all devices. This will allow you
to implement routing in both EIGRP for IPv4 and EIGRP for IPv6. Your goal is to achieve full connectivity
between all LAN hosts and the remote [[servname]] in both IPv4 and IPv6. For a full list of tasks, see
below.

You are not required to configure the following:

 The [[LANname]] network switches


 Most of the network hosts and the [[servname]]
 The [[cloudname]]

All IOS device configurations should be completed from a direct terminal connection to the device
console.

You will practice and be assessed on the following skills:

 Configuration of IPv4 and IPv6 default routes


 Configuration of EIGRP for IPv4
 Configuration of EIGRP for IPv6
 Customization of EIGRP for IPv4 and EIGRP for IPv6

You will configure specific devices with the following:


Router [[R1name]]:

 IPv4 and IPv6 default route


 EIGRP for IPv4 and EIGRP for IPv6
 Router ID
 Interface bandwidth
 Redistribution of default routes

Router [[R2name]]:

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
 EIGRP for IPv4 and EIGRP for IPv6
 HSRP
 Interface bandwidth
 EIGRP for IPv4 passive interface

Router [[R2-2name]]:

 IPv4 default route


 HSRP

Router [[R3name]]:

 EIGRP for IPv4 and EIGRP for IPv6


 Router ID
 Interface bandwidth
 EIGRP for IPv4 passive interfaces

Switch [[S1name]]:

 RPVST+ activation
 RPVST primary root bridge priority
 EtherChannel channel groups
 Static trunking with native VLAN
 DTP
 VTP

Switch [[S2name]]:

 RPVST+ activation
 PortFast
 BPDU Guard
 EtherChannel channel groups
 Static trunking with native VLAN
 DTP
 VTP

Switch [[S3name]]:

 RPVST+ activation
 RPVST secondary root bridge priority
 EtherChannel channel groups
 Static trunking with native VLAN
 DTP
 VTP

PC [[PC1name]]:

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
 Default gateway

PC [[PC4name]]:

 Default gateway

Topology

Addressing Table
Use the following addresses to configure the network. Some addresses are preconfigured on devices that
you are not required to configure, and are provided for reference purposes only.

Device Interface Address Information

192.168.100.9/30
S0/0/0 2001:DB8:1A::1/64
FE80::1 link local

192.168.100.21/30
[[R1name]] S0/0/1 2001:DB8:1B::1/64
FE80::1 link local

203.0.113.18/30
S0/1/0 2001:DB8:99::2/64
FE80::1 link local

[[R2name]] S0/0/0 192.168.100.10/30

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
2001:DB8:1A::2/64
FE80::2 link local

192.168.100.33/30
S0/0/1 2001:DB8:2::1/64
FE80::2 link local
10.1.0.3/24
G0/0 2001:DB8:20::3/64
FE80::2 link local

203.0.113.22/30
S0/0/0 2001:DB8:100::2/64
FE80::22 link local
[[R2-2name]]
10.1.0.2/24
G0/0 2001:DB8:20::2/64
FE80::22 link local
192.168.100.34/30
S0/0/0 2001:DB8:2::2/64
FE80::3 link local
192.168.100.22/30
S0/0/1 2001:DB8:1B::2/64
FE80::3 link local

S0/1/0 2001:DB8:E::2/64

[[R3name]] 10.10.0.1/24
G0/0.10 2001:DB8:3:10::1/64
FE80::3 link local

10.15.0.1/24
G0/0.15 2001:DB8:3:15::1/64
FE80::3 link local
10.20.0.1/24
G0/0.20 2001:DB8:3:20::1/64
FE80::3 link local

[[Extname]] N/A 2001:DB8:E::1/64

Instructions

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
Part I: EIGRP and HSRP Configuration
Step 1-1: Configure default static routes.

1. Configure IPv4 and IPv6 default static routes on the [[R1name]] router to the [[cloudname]]. Use
the outgoing interface value in your configuration.

Ip route 0.0.0.0 0.0.0.0 s0/1/0

Ipv6 unicast-routing
Ipv6 route ::/0 s0/1/0
2. Configure the [[R2-2name]] router with an IPv4 default route to the [[cloudname]] using the
outgoing interface value.

Ip route 0.0.0.0 0.0.0.0 s0/0/0

Step 1-2: Configure EIGRP for IPv4


On the [[R1name]], [[R2name]], and [[R3name]] routers only, configure EIGRP for IPv4.

1. Use an AS number of 99 for all EIGRP routers.

[[R1name]]

Router eigrp 99
Do show ip route connected
Network 192.168.100.8 0.0.0.3
Network 192.168.100.20 0.0.0.3
Eirgrp Router-id 1.1.1.1

[[R2name]]

Router eigrp 99
Do show ip route connected
Network 10.1.0.0 0.0.0.255
Network 192.168.100.8 0.0.0.3
Network 192.168.100.32 0.0.0.3
Eirgrp Router-id 2.2.2.2

[[R3name]]

Router eigrp 99
Do show ip route connected
Network 10.10.0.0 0.0.0.255
Network 10.15.0.0 0.0.0.255
Network 10.20.0.0 0.0.0.255
Network 192.168.100.20 0.0.03
Eirgrp Router-id 3.3.3.3

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
2. Activate routing for the appropriate networks. Use inverse masks that specify only addresses
within the networks.
3. Set the router IDs as follows:
o [[R1name]]: 1.1.1.1
o [[R2name]]: 2.2.2.2
o [[R3name]]: 3.3.3.3

Step 1-3: Configure EIGRP for IPv6.


Configure EIGRP for IPv6 on the [[R1name]], [[R2name]], and [[R3name]] routers.

1. Use an AS number of 99 for all EIGRP routers.

[[R1name]],
Ipv6 unicast-routing
Ipv6 router eirgrp 99
Eigrp router-id 1.1.1.1
No shutdown
Exit
Do show ipv6 interface brief
Interface s0/0/0
Ipv6 eigrp 99
Interface s0/0/1
Ipv6 eigrp 99
[[R2name]]
Ipv6 unicast-routing
Ipv6 router eirgrp 99
Eigrp router-id 2.2.2.2
No shutdown
Exit
Do show ipv6 interface brief
Interface s0/0/1
Ipv6 eigrp 99
Interface s0/0/0
Ipv6 eigrp 99
Interface g0/0
Ipv6 eigrp 99
[[R3name]]
Ipv6 unicast-routing
Ipv6 router eirgrp 99
Eigrp router-id 3.3.3.3
No shutdown
Exit
Do show ipv6 interface brief
Interface g0/0.10
Ipv6 eigrp 99
Interface g0/0.15
Ipv6 eigrp 99
Interface g0/0.20
Ipv6 eigrp 99
Interface s0/0/0
Ipv6 eigrp 99
Interface s0/0/1
Ipv6 eigrp 99
Interface s0/1/0
Ipv6 eigrp 99

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
2. Activate routing for the appropriate networks. Note that router [[R2-2name]] does not use EIGRP
routing.
3. Set the router IDs as follows:
o [[R1name]]: 1.1.1.1
o [[R2name]]: 2.2.2.2
o [[R3name]]: 3.3.3.3

Important: Your EIGRP for IPv6 configuration can only be checked for this assessment indirectly. After
you have completed your configuration, in order to get credit for EIGRP for IPv6 routing, you must do the
following:

1. On host [[PC2name]], go to the Desktop tab and open the Command Prompt.
2. Enter telnet 2001:DB8:E::1
3. If your EIGRP for IPv6 configuration is correct, you should be able to reach the [[Extname]] router
with the address above. Authenticate your Telnet session with the password cisco.
4. Move to privileged EXEC mode using the password admin.
5. Activate the G0/0 interface of the router.
6. Exit the Telnet session.

telnet 2001:DB8:E::1
cisco
enable
config t
interface g0/0
no shutdown
exit
In your score report, for EIGRP for IPv6 interface activation, you will see an item for activation of the
router [[Extname]] G0/0 interface. If you got this item correct, you have correctly activated EIGRPv6 on
the required routers.

Step 1-4: Customize EIGRP for IPv4 operation.


Customize EIGRP for IPv4 as follows:

1. Set the interface bandwidth for the two EIGRP interfaces on router [[R1name]] to match the
interface clock speed.

Show interfaces s0/0/0


Show controllers s0/0/0
Config t
Interface s0/0/0
Bandwidth 2000
Interface s0/0/1
Bandwidth 2000

2. Set the interface bandwidth for the serial interfaces on routers [[R2name]] and [[R3name]] to
match the bandwidth of the interfaces on router [[R1name]].

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
[[R2name]]

Interface s0/0/0
Bandwidth 2000

[[R3name]]

Interface s0/0/1
Bandwidth 2000

3. Configure all LAN interfaces, both physical and virtual, so that EIGRP messages are not sent into
the LANs.

[[R2name]]

Router eigrp 99
Passive-interface g0/0

[[R3name]]

Router eigrp 99
Passive-interface g0/0.10
Passive-interface g0/0.15
Passive-interface g0/0.20

4. Configure [[R1name]] so that the static default route is automatically shared with the other
EIGRP routers.

Router eigrp 99
Redistribute static

Step 1-5: Customize EIGRP for IPv6 operation.


Configure the [[R1name]] router to automatically share the IPv6 static route with the other EIGRP for
IPv6 routers.
Ipv6 router eigrp 99
Redistribute static

Step 1-6: Configure HSRP as follows:


Configure the [[R2name]] and [[R2-2name]] routers with HSRP. In this scenario, the hosts on the
[[LANname]] network are to be dual-homed. In other words, if the active [[R2name]] router fails, the
[[LANname]] network hosts will use the [[R2-2name]] router as their gateway. Although connectivity to the
rest of the [[orgname]] network will not be available, the hosts will be able to access the Internet through
the [[R2-2name]] router, because HSRP will switch to using it as the default gateway for the hosts. You
will configure [[R2name]] as the active router, and [[R2-2name]] as the backup using HSRP.

Requirements:

1. Configure router [[R2name]] with HSRP as follows:


o The group number is 1.
o Virtual gateway IP address: 10.1.0.1

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
o The router should immediately become the active router.
o The priority should be 150.

Interfaceg0/0
Standby 1 ip 10.1.0.1
Standby 1 preempt
Standby 1 priority 150
Standby version 2

2. Configure router [[R2-2name]] as follows:


o Virtual gateway IP address: 10.1.0.1
o Leave all other HSRP values at the default.

Interface g0/0
Standby 1 ip 10.1.0.1
Standy version 2

3. In order for the [[R2-2name]] router to provide connectivity to the Internet, it requires a default
route to be configured as you are directed in Step 1-1 above. This router is not configured with
EIGRP.
4. Configure hosts [[PC1name]] and [[PC4name]] with the correct default gateway addresses.

10.1.0.1 gateway

Part II: Enhanced Switching Technologies


Step 2-1: Configure link aggregation with EtherChannel.
Configure the three EtherChannel links between switches [[S1name]], [[S2name]], and [[S3name]]:

Port
Chann Device Interfaces
el
Fa0/3
[[S1name]]
Fa0/4
1
Fa0/3
[[S2name]]
Fa0/4
Fa0/5
[[S1name]]
Fa0/6
2
Fa0/5
[[S3name]]
Fa0/6
Fa0/1
[[S2name]]
Fa0/2
3
Fa0/1
[[S3name]]
Fa0/2

1. Configure EtherChannels with the LACP protocol using the information in the table.
2. Both sides of the channel should ask if the other side is willing to participate in the channel.

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
[[S1name]]
Interface range f0/3-4
Channel-group 1 mode active
Interface range f0/5-6
Channel-group 2 mode active

[[S2name]]
Interface range f0/3-4
Channel-group 1 mode active
Interface range f0/1-2
Channel-group 3 mode active

[[S3name]]
Interface range f0/5-6
Interface-group 2 mode active
Interface range f0/1-2
Interface-group 3 mode active

Step 2-2: Configure Trunking.


Configure trunking as follows:

1. The trunk between [[R3name]] and [[S1name]] should be active.

[[R3name]]
Interface g0/0
No shutdown

[[S1name]]

Interface g0/1
No shutdown

2. The trunk between [[R3name]] and [[S1name]] should use the native VLAN value preconfigured
on [[R3name]].

[[R3name]]

Do show run
Vlan 99 native

[[S1name]]

Interface g0/1
Switchport mode trunk
Shitchport trunk native vlan 99

3. Configure all of the port channel interfaces as static trunks with the appropriate native VLAN.

[[S1name]]

Interface g0/1
Switchport nonegotiate

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
4. Disable DTP negotiation on all of the trunks.

[[S1name]]

Interface range f0/3-4


Switchport mode trunk
Shitchport trunk native vlan 99

Interface port-channel 1
Switchport mode trunk
Shitchport trunk native vlan 99
Switchport nonegotiate

Interface range f0/5-6


Switchport mode trunk
Shitchport trunk native vlan 99

Interface port-channel 2
Switchport mode trunk
Shitchport trunk native vlan 99
Switchport nonegotiate

[[S2name]]

Interface range f0/3-4


Switchport mode trunk
Shitchport trunk native vlan 99

Interface port-channel 1
Switchport mode trunk
Shitchport trunk native vlan 99
Switchport nonegotiate

Interface range f0/1-2


Switchport mode trunk
Shitchport trunk native vlan 99

Interface port-channel 3
Switchport mode trunk
Shitchport trunk native vlan 99
Switchport nonegotiate

[[S3name]]

Interface range f0/5-6


Switchport mode trunk
Shitchport trunk native vlan 99

Interface port-channel 2
Switchport mode trunk
Shitchport trunk native vlan 99
Switchport nonegotiate

Interface range f0/1-2


Switchport mode trunk

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
Shitchport trunk native vlan 99

Interface port-channel 3
Switchport mode trunk
Shitchport trunk native vlan 99
Switchport nonegotiate

Step 2-3: Configure VTP.


Configure switches [[S1name]], [[S2name]], and [[S3name]] with VTP as follows:

1. Switch [[S1name]] should be the only VTP server in the domain.

[[S1name]]
Vtp server
Vtp domain vtpdomain
Vtp password vtppass
Vtp version 2

2. The other switches in the domain should be configured as clients.

[[S2name]]
Vtp cliente
Vtp domain vtpdomain
Vtp password vtppass
Vtp version 2

[[S3name]]
Vtp client
Vtp domain vtpdomain
Vtp password vtppass
Vtp version 2

Use the following values:

o VTP domain: [[vtpdomain]]


o VTP Password: [[vtppass]

Note: In order for the VLANs to be distributed from the VTP server to the client switches, you may need
to take action to increment the VTP revision number. This can be done by adding and deleting a VLAN on
the VTP server after the switches in the domain have complete VTP configurations and trunking is
operating correctly.

[[S1name]]
Vlan 555
No vlan 555

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
Step 2-4: Configure RPVST.
Configure switches [[S1name]], [[S2name]], and [[S3name]] with RPVST+ as follows:

1. All of the switches should use Rapid Spanning Tree Protocol.

[[S1name]]

Spanning-tree mode rapid-pvst

[[S2name]]

Spanning-tree mode rapid-pvst

[[S3name]]

Spanning-tree mode rapid-pvst

2. Switch [[S1name]] should be configured as the root bridge for VLANs 10, 15, and 20 with a
priority value of 24576.

[[S1name]]

Spanning-tree vlan 10,15,20 priority 24576

3. Switch [[S3name]] should be configured as the secondary root bridge for VLANs 10, 15, and 20
with a priority value of 28672.

[[S3name]]

Spanning-tree vlan 10,15,20 priority 28672

4. Switch [[S2name]] should be left with its default priority.

[[S2name]]

No se modifica el spanning-trre

Step 2-5: Configure PortFast and BPDU Guard.


Configure only switch [[S2name]] as follows:

1. Configure all of the access ports that are assigned to VLANs with BPDU Guard.
2. Configure the same ports with PortFast.

[[S2name]]
Do show run
Interface range f0/10-24
Spanning-tree bpduguard enable
Spanning-tree portfast

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information
If EIGRP is configured properly, full adjacencies should be formed between all routers in the EIGRP AS.
The hosts on the LANs should be able to communicate with the hosts on all other LANs and the
[[servname]] using both IPv4 and IPv6.

Ping 192.10.2.10

Ping 2001:192::10:

Last Updated: July, 2016


ID:[[nameindex]]

Version 1.0 Created in Packet Tracer 6.3 and PT Marvel 2.0.5


All contents are Copyright © 1992 - 2016 Cisco Systems, Inc. All rights reserved. This document is Cisco
Public Information.

All contents are Copyright © 1992–2017 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information

S-ar putea să vă placă și