Sunteți pe pagina 1din 89

This document is exclusive property of Cisco Systems, Inc.

Permission is granted to
print and copy this document for non-commercial distribution and exclusive use by
instructors in the CCNA Discovery Introducing Routing and Switching in the
Enterprise course as part of an official Cisco Networking Academy.
CCNA Discovery
Introducing Routing and Switching in the Enterprise

1.1.2 Traffic Flow in an Enterprise Network

Objectives
• Develop an understanding of the basic functions of Packet Tracer.
• Model a simple network and observe traffic behavior on the network.
• Create a simple Ethernet network using 3 hosts and a hub.
• Observer data flow of ARP broadcasts and pings.

Background / Preparation
Create a logical network diagram with 3 PCs and a hub, connected with straight-through cables.

Step 1: Build the network


The bottom left hand corner of the screen displays the icons that represent device categories or groups, such as
Routers, Switches, or End Devices. Moving the cursor over the device categories will show options to the right. To
select a device, first select the device category and then select the option that is required.

a. Select End Devices from the options in the bottom left-hand corner. Drag and drop 3 Generic PCs onto
your design area.

b. Select Switches from the options in the bottom left-hand corner. Add a 2950-24 switch to the design
area.

c. Select Connections from the bottom left-hand corner and choose Copper Straight-Through connect
each PC to the switch.

1. PC0 connects to Fast Ethernet 0/1


2. PC1 connects to Fast Ethernet 0/2
3. PC2 connects to Fast Ethernet 0/3

Step 2: Configure network devices

a. Select a PC and choose the Desktop tab.

b. Select IP Configuration.

c. Set the IP Address, Subnet Mask, and Default Gateway.

d. Repeat steps a – c for each PC.

Device IP Address Subnet Mask Default Gateway


PC0 192.168.1.10 255.255.255.0 192.168.1.1
PC1 192.168.1.11 255.255.255.0 192.168.1.1
PC2 192.168.1.12 255.255.255.0 192.168.1.1

Step 3: Observe traffic flow

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

a. Switch to Simulation Mode by selecting the tab that is partially hidden behind the Real Time tab in the
bottom right-hand corner. The tab has the icon of a stopwatch on it.

b. Select Edit Filters and ensure that only ARP and ICMP are selected.

c. Add a Simple PDU by clicking the closed envelope on the right vertical toolbar. Move to PC0 and click to
establish the source. Move to PC3 and click to establish the destination.

Notice that two envelopes are now positioned beside PC-A. One envelop is ICMP, while the other is ARP.
The Event List in the Simulation Panel will identify exactly which envelop represents ICMP and which
represents an ARP.

d. Select Auto Capture / Play and observe the entire ARP and ICMP communication.

Below the Auto / Capture button is a horizontal bar, with a vertical button that controls the speed of the
simulation. Dragging the button to the right will speed up the simulation, while dragging is to the left will slow
down the simulation.

Step 4: View ARP Tables.

a. Select PC0 and choose the Desktop tab.

b. Select the Command Prompt and type the command arp -a.

Notice that the MAC address for PC2 is in the table.

c. Examine the ARP tables for PC1 and PC2.

Reflection
a. Why is the ARP table for PC2 empty?

_______________________________________________________________________________________

_______________________________________________________________________________________

b. If a ping was to be sent from PC0 to PC2 right now, would an ARP packet be generated?

_______________________________________________________________________________________

_______________________________________________________________________________________

c. If a ping was to be sent from PC0 to PC3 right now, would an ARP packet be generated?

_______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

2.3.3 Basic Router Configuration Using CLI

Objective

• Use the CLI to perform basic router configurations.


• Verify configurations and connectivity.

Background / Preparation

A small company has expanded its office into another building. You must configure the routers so that traffic can
transverse between the two networks.

Required File: Basic Router Configuration Using CLI.pka

Step 1: Configure device hostnames

a. Set the hostname on the MainOffice Router


1. Select the MainOffice router.
2. Enter into global configuration.
3. Enter hostname MainOffice.
4. Exit to privilege-Exec mode.
5. Save the configurations. Enter copy running-config startup-config.

b. Set the hostname on the Rmt_Site1 Router


1. Select the Rmt_Site1 router.
2. Enter into global configuration.
3. Enter hostname Rmt_Site1.
4. Exit to privilege-Exec mode.
5. Save the configurations. Enter copy running-config startup-config.

Step 2: Configure router interfaces

a. Configure the Serial interface on the MainOffice router.


1. Select the MainOffice router.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

2. Enter into global configuration.


3. Configure the Serial 0/1/0 interface. Enter interface serial 0/1/0.
4. Set the IP address. Enter ip address 192.168.1.1 255.255.255.252.
5. Set the clock rate. Enter clock rate 64000.
6. Enable the interface. Enter no shutdown.

b. Configure the Fast Ethernet interface on the MainOffice router.


1. Enter interface fastethernet 0/0.
2. Set the IP address. Enter ip address 192.168.2.1 255.255.255.0.
3. Enable the interface. Enter no shutdown.
4. Exit to privilege-Exec mode.
5. Save the configurations. Enter copy running-config startup-config.

c. Configure the Serial interface on the Rmt_Site1 router.


1. Select the Rmt_Site1 router.
2. Enter into global configuration.
3. Configure the Serial 0/1/0 interface. Enter interface serial 0/1/0.
4. Set the IP address. Enter ip address 192.168.1.2 255.255.255.252.
5. Enable the interface. Enter no shutdown.

d. Configure the Fast Ethernet interface on the Rmt_Site1 router.


1. Configure the Fast Ethernet 0/0 interface. Enter interface fastethernet 0/0.
2. Set the IP address. Enter ip address 192.168.3.1 255.255.255.0.
3. Enable the interface. Enter no shutdown.
4. Exit to privilege-Exec mode.
5. Save the configurations. Enter copy running-config startup-config.

Step 3: Configure the RIP routing protocol

a. Configure RIP version 2 on the MainOffice router.


1. Select the MainOffice router.
2. Enter into global configuration.
3. Enable RIP. Enter router rip.
4. Set the RIP version. Enter version 2.
5. Configure the networks to advertise.
MainOffice(config-router)#network 192.168.1.0
MainOffice(config-router)#network 192.168.2.0
6. Exit to privilege-Exec mode.
7. Save the configurations. Enter copy running-config startup-config.

b. Configure RIP version 2 on the Rmt_Site1 router.


1. Select the Rmt_Site1 router.
2. Enter into global configuration.
3. Enable RIP. Enter router rip.
4. Set the RIP version. Enter version 2.
5. Configure the networks to advertise.
MainOffice(config-router)#network 192.168.1.0
MainOffice(config-router)#network 192.168.3.0
6. Exit to privilege-Exec mode.
7. Save the configurations. Enter copy running-config startup-config.

Step 4: Configure enable, console and vty passwords

a. Select the MainOffice router.


1. Enter into global configuration.
2. Set the enable secret password to cisco123. Enter enable secret cisco123.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

3. Enter into the console line. Enter line console 0.


4. Set the console password to class. Enter password class.
5. Enter login.
6. Enter into the vty lines. Enter line vty 0 4.
7. Set the vty password to class. Enter password class.
8. Enter login.
9. Exit to privilege-Exec mode.
10. Save the configurations. Enter copy running-config startup-config.

b. Select the Rmt_Site1 router.


1. Enter into global configuration.
2. Set the enable secret password to cisco123. Enter enable secret cisco123.
3. Enter into the console line. Enter line console 0.
4. Set the console password to class. Enter password class.
5. Enter login.
6. Enter into the vty lines. Enter line vty 0 4.
7. Set the vty password to class. Enter password class.
8. Enter login.
9. Exit to privilege-Exec mode.
10. Save the configurations. Enter copy running-config startup-config.

Step 5: Verify configurations and connectivity

a. Show the running configuration for the MainOffice router using the show running-config command.
b. Find the hostname, passwords, ip address, and routing protocol configurations.
c. Show the running configuration for the Rmt_Site1 router using the show running-config command.
d. Find the hostname, passwords, ip address, and routing protocol configurations.
e. Ping PC1 from the Command Prompt on PC0:

PC>ping 192.168.3.3

f. Trace the network path from PC0 to PC1 from the Command Prompt on PC0:

PC>tracert 192.168.3.3

g. Choose Check Results.

Reflection
a. What commands are used to enter into Fast Ethernet 0/0, when starting at the user-Exec prompt?

__________________________________________________________________________

__________________________________________________________________________

b. Which interface must be configured with the clock rate command? (DCE or DTE)
__________________________________________________________________________

__________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

2.3.5 Basic Switch Configuration Using CLI

Objective

• Perform basic switch configurations and


• Verify connectivity

Background/Preparation
As the network administrator you have been assigned a task from the help desk ticketing system. You must
complete basic switch configurations at two sites. Once complete the senior network engineer has requested that
connectivity is tested before closing the ticket. Complete the configuration of Switch0 and Switch1 with the steps
provided. Rotuer0 and Router1 are already installed and configured properly.

Required file: Basic Switch Configuration Using CLI.pka

Step 1: Configure Switch0


a. Configure the hostname.
1. Click on Switch0 and choose the CLI tab
2. Enter enable
3. Enter configure terminal
4. Enter hostname Switch0

b. Configure the enable secret password.


1. Enter enable secret cisco

c. Configure Interface VLAN 1.


1. Enter interface vlan 1
2. Enter ip address 192.168.10.254 255.255.255.0
3. Enter no shutdown
4. Enter exit

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

d. Configure the default gateway.


1. Enter ip default-gateway 192.168.10.1

e. Configure the console and vty lines.


1. Enter line con 0
2. Enter password cisco
3. Enter login
4. Enter line vty 0 4
5. Enter login
6. Enter password cisco
7. Enter exit

f. Configure Fast Ethernet interfaces.


1. Enter interface fastethernet0/1
2. Enter switchport mode access
3. Enter no shut
4. Enter exit

g. Save the configuration.


1. Enter copy running-config startup-config

Step 2: Configure Switch 1


a. Configure the hostname
1. Click on Switch1 and choose the CLI tab.
2. Enter enable
3. Enter configure terminal
4. Enter hostname Switch1

b. Configure the enable secret password.


1. Enter enable secret cisco

c. Configure interface VLAN 1.


1. Enter interface vlan 1
2. Enter ip address 192.168.20.254 255.255.255.0
3. Enter no shutdown
4. Enter exit

d. Configure the default gateway.


1. Enter ip default-gateway 192.168.20.1

e. Configure the console and vty lines


1. Enter line con 0
2. Enter password cisco
3. Enter login
4. Enter line vty 0 4
5. Enter login
6. Enter password cisco
7. Enter exit
f. Configure Fast Ethernet interfaces
1. Enter interface fastethernet0/1
2. Enter switchport mode access
3. Enter no shut
4. Enter exit

g. Save the configuration.


1. Enter copy running-config startup-config

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 5: Verify Connectivity


a. From the command prompt on PC0
1. Enter ping 192.168.10.1
2. Enter ping 192.168.10.254
3. Enter ping 192.168.20.1

b. From the command prompt on PC1


1. Enter ping 192.168.20.1
2. Enter ping 192.168.20.254
3. Enter ping 192.168.10.1

c. Ping PC1 from PC0

Reflection

a. Do you need to have interface VLAN1 configured with an ip address to ping from PC1 to PC0?

b. What would happen if 5 people tried to telnet to either one of the switches?

c. The CLI command "enable password" creates a password that is clear text, what is the command to
make the enable password encrypted?

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

3.2.1 Disabling Redundant Links to Avoid Switching Loops

Objective
• Identify and disable redundant links

Background / Preparation
The network engineering department has just recently installed the cabling to provide redundancy within the
Enterprise network. One Gigabit Ethernet connection was installed from the Core switch to Switch 4. There
was also one Fast Ethernet connection installed from Switch 3 to Switch 4.

Required file: Disabling Redundant Links to Avoid Switching Loops.pka

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 1: Identify redundant links and disable redundant links

The redundant links will be managed manually by an administrator in the event of an outage related to a link
going down. You have been tasked to determine which port should be disabled so that only one path to each
switch is active, thus preventing a switching loop. The following requirements have been provided to assist in
the decision as to which ports should be disabled.
• All direct links to the Core switch shall remain active.
• Switches shall utilize the path which has the least number of hops to the Core switch.
• Switches which have identical hops shall utilize the path with the highest cumulative bandwidth.
• Disable the port furthest from the Core switch.
a. Select the switch or switches that require ports to be disabled.

b. Disable the ports that meet the requirements.

Step 2: Test connectivity

a. Select PC0 and ping PC1.

b. Select PC0 and ping PC2.

c. Select PC0 and ping PC3.

d. Select PC0 and ping PC4.

e. Select PC0 and ping PC5.

f. Choose Check Results.

Reflection

a. What are some problems that may be caused by redundant links?

____________________________________________________________________________

____________________________________________________________________________

b. What are some benefits of implementing redundant links?

____________________________________________________________________________

____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
Curriculum Name
Course Name: Chapter Name

3.5.2 Configuring a VTP Domain

Objective
• Properly configure a VTP Domain
• Configure VLANs on a VTP server and observe the change on the VTP client

Background / Preparation
Configuring a VTP domain for your Enterprise network is an effective way to configure and maintain VLANs
on the network. As the network administrator for the XYZ Company, you have been asked to set up a working
VTP environment at one your remote sites. This will allow you and your team to maintain VLANs from your
main office more efficiently.

Required file: Configuring a VTP Domain.pka

Step 1: Configure the VTP Server

a. Click on the VTP Server switch and choose the CLI tab.

b. Enter into global configuration.

c. Set the VTP domain to Discovery. Enter vtp domain Discovery.

d. Set the VTP mode to server. Enter vtp mode server.

Note: The message “Device mode already VTP SERVER” is displayed. By default a switch is set as a
VTP server.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Curriculum Name
Course Name: Chapter Name

e. Set the VTP password to Cisco123. Enter vtp password Cisco123

f. Exit back to privilege-exec and save the configurations.

Step 2: Configure a switch as a VTP client

a. Click on the VTP Client1 switch and choose the CLI tab.

b. Enter into global configuration.

c. Set the VTP domain to Discovery. Enter vtp domain Discovery.

d. Set the VTP mode to Client. Enter vtp mode client.

e. Set the VTP password to Cisco123. Enter vtp password Cisco123.

f. Exit back to privilege-Exec and save the configurations.

g. Repeat Steps b – f for the VTP Client2 and the VTP Client3 switch.

Step 3: Configure a transparent VTP switch

a. Click on the VTP Transparent switch and choose the CLI tab.

b. Enter into global configuration.

c. Set the VTP domain to Discovery. Enter vtp domain Discovery.

d. Set the VTP mode to Transparent. Enter vtp mode transparent.

e. Set the VTP password to Cisco123. Enter vtp password Cisco123.

f. Exit back to privilege-Exec and save the configurations

Step 4: Configure a new VLAN on the VTP Server

a. Click on the VTP Server switch and choose the CLI tab.

b. Enter into global configuration

c. Create a new VLAN. Enter vlan 10.

d. Name the VLAN Research. Enter name Research.

e. Exit back to privilege-exec and save the configurations.

Step 5: Verify VTP Configurations


a. Click on the VTP Server switch and choose the CLI tab.

b. Enter into privilege-Exec mode.

c. Verify that the VTP mode is Server and the domain is Discovery. Enter show vtp status.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
Curriculum Name
Course Name: Chapter Name

d. Verify that the VTP password is set to Cisco123. Enter show vtp password.

e. Verify that VLAN 10 is created. Enter show VLAN.

f. Click on the VTP Client1 switch and choose the CLI tab.

g. Verify the VTP mode, domain, password, and configured VLANs with the commands from steps c – e

h. Repeat step g for the VTP Client2 and VTP Client3 switches.

The switches should show VLAN 10 even though you have not configured that VLAN on the switch. Only
the VTP Server switch has been configured with VLAN 10, but because the switches are all properly
configured in the same VTP domain, all VTP clients will have the same VLAN database as the VTP
server.

Step 5: Add client workstations to the new VLAN and verify connectivity

a. Click on the VTP Client2 switch and add Fast Ethernet 0/1 to VLAN 10

1. Switch(config)# interface fastethernet 0/1

2. Switch(config-if)# switchport mode access

3. Switch(config-if)# switchport access vlan 10

b. Click on the VTP Client3 switch and add Fast Ethernet 0/1 to VLAN 10

1. Switch(config)# interface fastethernet 0/1

2. Switch(config-if)# switchport mode access

3. Switch(config-if)# switchport access vlan 10

c. Using the Command Prompt, ping PC1 from PC0. The ping should be successful.
d. Choose Check Results.

Reflection

a. What VTP mode is a switch set to by default?

____________________________________________________________________________

____________________________________________________________________________

b. What three commands are required to configure and integrate a new switch into an existing VTP
domain?

____________________________________________________________________________

____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

3.5.2 Adding a Switch to a VTP Domain

Objective

• Configure the VTP Domain, Mode, and Password.


• Clear the VTP Revision Number and add a switch to an existing VTP Domain.
• Use show commands to verify VTP configuration.

Background / Preparation

A company has expanded its office space on the 1st floor. The expansion requires a new switch to be added to
accommodate the additional workstations. They are using the equipment from a closed branch to complete the
expansion. The senior network administrator has tasked you to configure a new switch so that it participates in the
VTP domain.

VTP updates occur every 300 seconds. After properly configuring your new switch as a member of the VTP
domain it may take a few minutes to converge.

Required file: Adding a Switch to a VTP Domain.pka

Step 1: Verify current revision number on the VTP server and new switch

a. Select the VTP Server switch and select the CLI tab.
b. Enter into privilege-Exec.
c. Verify the existing configuration revision. Enter show vtp status.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

d. Select the 1st_Floor3 switch.


e. Verify the existing configuration revision. Enter show vtp status.

Does the configuration revision need to be reset on the new switch? ______________

Step 2: Connect the new switch to the network

a. Connect Fast Ethernet 0/24 on the 1st_Floor3 switch to Fast Ethernet 0/23 on the 1st_Floor2 switch.
b. Set both Fast Ethernet 0/24 on the 1st_Floor3 switch and Fast Ethernet 0/23 on the 1st_Floor2 switch
as a trunk port.
c. Save the configuration on both switches.

Step 3: Configure the VTP Domain, mode and password.

a. Select the 1st_Floor3 switch


b. Set the VTP Domain to Cisco.
c. Set the VTP mode to client.
d. Set the VTP password to password.
e. Save the configuration.

Step 4: Verify VTP Operation

a. Select the VTP Server switch.


b. Enter into privilege-Exec.
c. View the VLAN database. Enter show vlan.
d. Select the 1st_Floor3 switch.
e. Enter into privilege-Exec
f. View the VLAN database. Enter show vlan.

With VTP configured properly the VLAN database on the VTP Server switch and the 1st_Floor3 switch should be
identical. VTP Server only send updates every 300 seconds. Depending on where the VTP update timer is when
you complete the configuration you may have to wait up to 5 minutes for the 1st_Floor3 switch to update.

g. Choose Check Results.

Reflection

a. What would be the affect of adding a new switch to an existing network, with VTP properly configured as a
server and the configuration revision number is higher than that currently on the rest of the switches?

_____________________________________________________________________________

_____________________________________________________________________________

b. Why did the uplink to the new switch have to be set as a trunk?

_____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

_____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

3.5.3 Configuring Wireless and Voice VLANs

Objective

• Create separate VLANs for the wireless and voice devices


• Verify connectivity

Background / Preparation

An installation team has just completed installing wireless APs and voice over IP phones across your network.
The APs, phones, and workstations have all been configured with the proper IP settings. You have been
tasked to configure the switches to separate the devices into three VLANs.

Required file: Configuring Wireless and Voice VLANs.pka

Step 1: Create a VTP domain

VTP Domain – Cisco

VTP Password – class

Select Switch 1 and configure it as the VTP server.

Select Switch 2 and configure it as a VTP client.

Select Switch 3 and configure it as a VTP client.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 2: Create VLANS

Create three VLANs with following information.

• VLAN 20 – Name Data

• VLAN 30 – Name Wireless

• VLAN 40 – Name Voice

a. Select Switch 1 (VTP Server).

b. Create the 3 necessary VLANs.

c. Select the other switches and ensure the VLANs have propagated from Switch 1.

Step 3: Assign the devices to the correct ports

a. Assign Fast Ethernet 0/1 to VLAN 20 on Switch 2 and Switch 3.

b. Assign Fast Ethernet 0/9 to VLAN 40 on Switch 2 and Switch 3.

c. Assign Fast Ethernet 0/17 to VLAN 30 on Switch 2 and Switch 3.

d. Ensure the devices are in the correct VLANs.

Step 4: Test Connectivity

a. Select PC0 and ping PC1

b. Select PC0 and ping Wireless Router 1.

c. Select PC1 and ping Wireless Router 2.

d. Choose Check Results.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
Curriculum Name
Course Name: Chapter Name

3.5.4 Planning and Building an Enterprise Network

Objective
• Plan, design, and build a large enterprise network utilizing multiple VLANs, inter-VLAN routing, and
VTP domains

Background / Preparation

A new remote site has been acquired by your company and the network needs to be built. You must plan,
design, and build the network to meet company standards. The following equipment has been provided.

• One Cisco 2960 switch has been purchased for each of the 3 floors

• One Cisco 1841 router has been purchased as the Integrated Service Router (ISR)

Required file: Planning and Building an Enterprise Network.pka

Step 1: Connecting the network

a. Utilize the first Fast Ethernet interface on the ISR router to connect to the last Fast Ethernet interface
on the Floor 1 switch.

b. Connect Gigabit Ethernet 1/1 on the Floor 1 switch to Gigabit Ethernet 1/1 on the Floor 2 switch.

c. Connect Gigabit Ethernet 1/2 on the Floor 2 switch to Gigabit Ethernet 1/1 on the Floor 3 switch.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 4
Curriculum Name
Course Name: Chapter Name

Step 2: Configure basic switch and router configurations

Utilize the following table to configure the ISR router, Floor 1, Floor 2, and Floor 3 switches.
ISR Router Floor 1 Switch Floor 2 Switch Floor 3 Switch
Hostname ISR_Rtr Floor1_Sw Floor2_Sw Floor3_Sw
Enable password cisco123 cisco123 cisco123 cisco123
VTY password class class class class
Console password class class class class
a. Set the hostname on all four devices

b. Set the enable password on all four devices

c. Set the password for the vty 0 through 4 lines and enable login on all four devices.

d. Set the password for the console line and enable login on all four devices.

Step 3: Configure the interfaces connecting the router and switches

a. Set the interfaces connecting the Floor 1, Floor 2, and Floor 3 switches as a trunk port.

b. Set the interface on the Floor 1 switch connecting to the ISR router as a trunk port.

c. Enable the interface on the ISR router connecting to the Floor 1 switch.

d. Create and configure three sub-interfaces on the ISR routers Fast Ethernet 0/0 interface. Use the
following table.

1. Set the encapsulation for each sub-interface

2. Set the IP address for each sub-interface


Sub Interface Encapsulation IP Address Subnet Mask
Fastethernet 0/0.20 dot1q 192.168.20.1 255.255.255.0
Fastethernet 0/0.25 dot1q 192.168.25.1 255.255.255.0
Fastethernet 0/0.30 dot1q 192.168.30.1 255.255.255.0

Step 4: Configure a VTP Domain

Utilize the following table to configure the Floor 1, Floor 2, and Floor 3 switches.
VTP Domain SiteX
VTP Password ciscoVTP

a. Configure the Floor 2 and Floor 3 switches as VTP clients.


1. Set the VTP domain.
2. Set the VTP mode.
3. Set the VTP password.

b. Configure the Floor 1 switch as a VTP server.


1. Set the VTP domain.
2. Set the VTP mode.
3. Set the VTP password.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 4
Curriculum Name
Course Name: Chapter Name

Step 5: Configure VLANs

Utilize the following table to configure the VLANs from the VTP server.
VLAN Number VLAN Name
20 Admin
25 Management
30 Finance

Step 6: Add switch ports to the appropriate VLAN

a. Configure the Floor 1 switch so that Fast Ethernet 0/1 is on VLAN 20.

b. Configure the Floor 2 switch so that Fast Ethernet 0/1 is on VLAN 25.

c. Configure the Floor 3 switch so that Fast Ethernet 0/1 is on VLAN 30.

Step 7: Connect and configure client workstations

a. Connect PC0 to the Floor 1 switch on Fast Ethernet 0/1.

b. Connect PC1 to the Floor 2 switch on Fast Ethernet 0/1.

c. Connect PC2 to the Floor 3 switch on Fast Ethernet 0/1.

Step 8: Verify connectivity

a. Using the Command Prompt, ping PC1 and PC2 from PC0.

b. Using the Command Prompt, ping PC0 and PC2 from PC1.

c. Using the Command Prompt, ping PC0 and PC1 from PC2.

d. Choose Check Results.

Reflection

a. What is the advantage of using VTP to manage VLANs?

____________________________________________________________________________

____________________________________________________________________________

b. What are some advantages and disadvantages of implementing VLANs?

____________________________________________________________________________

____________________________________________________________________________

c. What is required for host on different VLANs to communicate with each other?

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 4
Curriculum Name
Course Name: Chapter Name

____________________________________________________________________________

____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 4
CCNA Discovery
Introducing Routing and Switching in the Enterprise

4.4.3 Configuring and Verifying Static NAT

Objective
• Configure static NAT
• Configure inside and outside NAT interfaces
• Verify connectivity

Background / Preparation
The academic institution you are currently interning at has a Research and Development (R&D) subnet
currently configured with private IP addresses. The configuration does not currently utilize static or dynamic
NAT to allow communication outside of the Border router. A new application being developed has provided a
need for one workstation on the R&D subnet to communicate with a remote workstation at a different
institution. You have been tasked to configure the Border router with static NAT so that the two workstations
can communicate. The following information has been provided by the network engineering department.

• NAT Inside Address 192.168.1.10

• NAT Outside Address 209.165.202.6

Required file: Configuring and Verifying Static NAT.pka

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 1: Configure static NAT

a. Select the Border router.

b. Enter configuration mode.

c. Enter ip nat inside source static 192.168.1.10 209.165.202.6

Step 2: Configure the inside and outside NAT interface

a. Configure Fast Ethernet 0/0 as the NAT inside interface.

b. Enter ip nat inside

c. Configure Serial 0/1/0 as the NAT outside interface.

d. Enter ip nat outside

Step 3: Test connectivity

a. Select the R&D_1 workstation and ping the Rmt_Wks.

b. Select the R&D_2 workstation and ping the Rmt_Wks.

c. Choose Check Results.

Reflection

a. Why was the R&D_2 workstation unable to ping the Rmt_Wks?

____________________________________________________________________________

____________________________________________________________________________

b. Can static NAT be used to translate a public IP addresses to another public IP address verses
translating a private IP address to a public IP address?

____________________________________________________________________________

____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

4.4.3 Configuring and Verifying Dynamic NAT

Objective
• Configure dynamic NAT
• Configure inside and outside NAT interfaces
• Verify connectivity

Background / Preparation
The academic institution you are currently interning at has a Research and Development (R&D) subnet
currently configured with private IP addresses. The configuration does not currently utilize static or dynamic
NAT to allow communication outside of the Border router. A new application being developed has provided a
need for all workstations on the R&D subnet to communicate with a remote workstation at a different
institution. You have been tasked to configure the Border router with dynamic NAT. The following information
has been provided by the network engineering department.

• Address pool: 209.165.202.5 to 209.165.202.30

• Access list number: 10

• Pool Name: public

Required file: Configuring and Verifying Dynamic NAT.pka

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 1: Configure dynamic NAT

a. Select the Border router.

b. Enter configuration mode.

c. Enter access-list 10 permit 192.168.1.0 0.0.0.255

d. Enter ip nat pool public 209.165.202.5 209.165.202.30 netmask 255.255.255.224

e. Enter ip nat inside source list 10 pool public

Step 2: Configure the inside and outside NAT interface

a. Configure Fast Ethernet 0/0 as the NAT inside interface.

b. Enter ip nat inside

c. Configure Serial 0/1/0 as the NAT outside interface.

d. Enter ip nat outside

Step 3: Test connectivity

a. Select the R&D_1 workstation and ping the Rmt_Wks.

b. Select the R&D_2 workstation and ping the Rmt_Wks.

c. Choose Check Results.

Reflection

a. When will a host release an outside global address back to the pool for use by other host?

____________________________________________________________________________

____________________________________________________________________________

b. What device maintains the translation between internal local and internal global address?

a. Source host

b. Destination host

c. Router

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

5.1.2 Creating a Redundant Network

Objective
• Create an efficient and reliable network design with redundancy

Background / Preparation
Recently the New York router failed and the entire east coast operations lost 16 hours of production. The
estimated cost of the outage was $600,000. The network engineering office has been provided additional money
to create a more redundant network in an attempt to minimize future outages.

The head of design office has tasked you as the lead designer. With a budget of $5400 for monthly fees, you
must meet the following requirements.

1. A minimum of three T-1 links must connect the east and west coast operations.
2. Each router must have at least one 64Kb redundant link.
3. Each router must also have at least two paths between the east and west coast operations.
4. The failure of one device should not affect the connectivity of another site.

The east coast consist of the New York, Miami, Atlanta, Boston, and Buffalo routers, while the west coast consist
of the Phoenix, Denver, Boise, Seattle, and Oakland routers.

Cost for new circuits:


$400 month - 64Kb circuit
$1900 month - 1.544Mb (T-1) circuit

Required file: Creating a Redundant Network.pka

Step 1: Determine the minimum number of links to meet the requirements


a. Identify the two links to meet requirement 1.
b. Determine the cost of those two links.
c. Identify the required links to meet requirement 2, 3, and 4.
d. Determine if the design is within budget.

Step 2: Implement the design

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

a. Create the links that will meet requirement 1 based on the design.
b. Create the links that will meet requirement 2, 3, and 4 based on the design.

Step 3: Verify the design


a. Do three paths between the east and west coast operations exist?
b. Does each site have at least two links?
c. Does each site on the east coast have two paths to the west coast?
d. Does each site on the west coast have two paths to the east coast?
e. Will one device failure affect multiple sites?

Reflection
a. What network topology was implemented before adding redundancy?

_______________________________________________________________________________________

_______________________________________________________________________________________

b. What network topology is now implemented after adding redundancy?

_______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

5.1.3 Investigating Connected, Static, and Dynamic Routing

Objective
• Identify directly connected routes in converged network.
• Identify static routes in a converged network.
• Identify dynamic routes in a converged network.

Background / Preparation
The network administrator has recently hired you to assist in maintaining the routed network. As an experienced
network administrator you know that learning the network configuration is extremely important. The network
administrator has given you access to all the routers so that you can view the routing tables.

Note
This is a discovery lab. Grading will not be conducted.

Required File: Investigating Connected, Static, and Dynamic Routing.pka

Step 1: Identify Directly Connected Routes


a. Select the Phoenix1 router.
1. Enter into privilege-Exec.
2. View the routing table. Enter show ip route
3. Identify the directly connected routes.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

b. Select the Denver router.


1. Enter into privilege-Exec.
2. View the routing table. Enter show ip route
3. Identify the directly connected routes.

Step 2: Identify Static Routes


a. Select the Phoenix2 router.
1. Enter into privilege-Exec.
2. View the routing table. Enter show ip route
3. Identify the static routes.

b. Select the Dallas router.


1. Enter into privilege-Exec.
2. View the routing table. Enter show ip route
3. Identify the static routes.

Step 3: Identify Dynamic Routes


a. Select the Denver router.
1. Enter into privilege-Exec.
2. View the routing table. Enter show ip route
3. Identify the dynamic routes.

b. Select the Dallas router.


1. Enter into privilege-Exec.
2. View the routing table. Enter show ip route
3. Identify the dynamic routes.

Reflection

a. How many directly connected routes were in the Denver routers routing table?

_______________________________________________________________________________________

_______________________________________________________________________________________

b. What was the next hop IP address for the static routes in the Phoenix2 routers routing table?

_______________________________________________________________________________________

_______________________________________________________________________________________

c. Based on the routing table from the Denver router, what routing protocol is being used?

_______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

5.1.4 Configuring Static Routes

Objective

• Configure static routes.


• Identify the different types of routes in a routing table.
• Verify configuration and connectivity.

Background / Preparation

A small company has two offices located in different buildings. Both offices need access to each other and the
Web Server which is hosted by their ISP. You must configure static routes on all three routers to establish
communications.

Required File: Configuring Static Routes.pka

Step 1: Configure Static Routes

a. Select the Branch router.


b. Enter into configuration mode and create the three required static routes.
1. Enter ip route 209.165.200.224 255.255.255.224 192.168.2.130
2. Enter ip route 192.168.2.64 255.255.255.192 192.168.2.130
3. Enter ip route 209.165.201.0 255.255.255.252 192.168.2.130
4. Exit to privilege-Exec.
5. Save the configuration. Enter copy running-config startup-config

c. Select the HQ router.


d. Enter into configuration mode and create the two required static routes.
1. Enter ip route 192.168.2.192 255.255.255.192 192.168.2.129
2. Enter ip route 209.165.200.224 255.255.255.224 209.165.201.1
3. Exit to privilege-Exec
4. Save the configuration. Enter copy running-config startup-config

e. Select the ISP router.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

f. Enter into configuration mode and create the two required static routes.
1. Enter ip route 192.168.2.64 255.255.255.192 209.165.201.2
2. Enter ip route 192.168.2.192 255.255.255.192 209.165.201.2
3. Enter ip route 192.168.2.128 255.255.255.192 209.165.201.2
4. Exit to privilege-Exec
5. Save the configuration. Enter copy running-config startup-config

Step 2: Verify configurations and connectivity

a. Select each router and view the routing table. Enter show ip route.

b. Ensure the routing tables are correct.

c. Ping PC2 from the Command Prompt of PC1.

PC>ping 192.168.2.126

d. Trace route from PC1 to the Web Server from the Command Prompt.

PC>tracert 209.165.200.254

e. Navigate to www.cisco.com from the Web Browser on PC1


f. Choose Check Results.

Reflection

a. What is the difference the C and the S codes next to the routes in the routing table?

b. What command is used to create a static route to the 192.168.10.0 255.255.255.0 network, when the next
hop 172.16.200.1?

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

5.1.5 Configuring Default Routes

Objective

• Configure default routes.


• Verify configuration and connectivity.

Background / Preparation

Your company has recently installed a new Cisco 1841 router as its border device. They have leased a 64 Kbps
circuit for each office from the local ISP. Since all traffic that is not local must be routed to the ISP router, the
senior network administrator has decided that a default route to the ISP router will be configured. You have been
assigned the ticket to complete this configuration.

Required File: Configuring Default Routes.pka

Step 1: Configure Default Route

a. Select the Border1 router.


b. View the routing table. Enter show ip route
c. Select the Border2 router.
d. View the routing table. Enter show ip route

Note:
Currently the routing tables only contain routing information for the two locally connected networks and
the Gateway of last resort is not set.

Step 2: Configure the Border1 router

a. Select the Border1 router.


b. Enter into configuration mode.
c. Configure the default route with next hop address. Enter ip route 0.0.0.0 0.0.0.0 172.16.2.1
d. Exit to privilege-Exec mode.
e. Save the configuration. Enter copy running-config startup-config

Step 3: Configure the Border2 router

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

a. Select the Border2 router.


b. Enter into configuration mode.
c. Configure the default route exit interface parameter. Enter ip route 0.0.0.0 0.0.0.0 s0/1/1
d. Exit to privilege-Exec mode.
e. Save the configuration. Enter copy running-config startup-config

Step 4: Verify configurations and connectivity

a. Select the Border1 router and view the routing table. Enter show ip route
b. Select the Border2 router and view the routing table. Enter show ip route

Note:
The routing table now contains routing information for the two locally connected networks, a default route
and the Gateway of last resort is set to 172.16.2.1.

c. Select PC0 and enter into the Command Prompt.


d. Ping the DNS Server.

PC0>ping 10.10.10.250

e. Choose Check Results.

Reflection

a. What are two ways a default route can be configured?

____________________________________________________________________________________

____________________________________________________________________________________

b. How can you identify if a default route is configured when viewing the routing table?

____________________________________________________________________________________

____________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

5.2.4 Routing Between Discontiguous Networks

Objective
• Observe the differences between RIP Version 1 and Version 2
• Configure RIP Version 1 and Version 2

Background / Preparation
The XYZ Company has recently expanded its business to include an Uptown office. Currently the company has a
downtown office and the corporate headquarters office, which contains the Core Router. The network
administrators have used static routing up to this point, but want to convert to the RIP routing protocol with the
addition of the Uptown office. The Core_Rtr and Downtown router have already been configured with RIP Version
1.

Since the conversion from static routes to RIP Version 1, the connectivity between the corporate headquarters
and the Downtown office has been down. The senior network administrator is currently troubleshooting the issue
and has tasked you to configure the Uptown router. The two 64 Kbps circuits have already been installed and
configured. You must configure the LAN interfaces and the routing protocol. The following configuration table has
been provided to assist in the configuration and troubleshooting of the network.

Required File: Routing Between Discontiguous Networks.pka

Uptown Router
Interface IP Address Subnet Mask Network
Fast Ethernet 0/0 192.168.2.17 255.255.255.240 192.168.2.16
Fast Ethernet 0/1 192.168.1.33 255.255.255.224 192.168.1.32
Serial 0/0/0 172.16.1.5 255.255.255.252 172.16.1.4
Serial 0/1/0 172.16.1.2 255.255.255.252 172.16.1.0

Step 1: Configure the Uptown router and verify connectivity


a. Select the Uptown router.
1. Set the hostname to Uptown.
2. Configure Fast Ethernet 0/0.
3. Configure Fast Ethernet 0/1.
4. Configure RIP Version 1.
5. Configure the networks to advertise.
6. Save the configuration.

b. Verify RIP configuration


1. View the routing table. Enter show ip route
2. View the RIP database. Enter show ip rip database

c. Select PC3 and verify connectivity.


1. Ping PC2 from the command prompt.
2. Ping PC1 from the command prompt.
3. Ping PC5 from the command prompt.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

The connectivity within the Uptown office seems to be working, but you are experiencing the same problem that
the corporate headquarters and Downtown office are experiencing. After conducting some research on RIP, you
have discovered that RIP Version 1 does not support VLSM. The current configuration of your network utilizes
VLSM. Further research has indicated the RIP Version 2 does support VLSM. You have contacted the senior
network administrator and provided the information. You have now been tasked to change RIP to version 2 on all
three routers.

Step 2: Configure routers with RIP Version 2


a. Select the Downtown router.
1. Configure RIP Version 2.

b. Select the Uptown router.


1. Configure RIP Version 2.

c. Select the Core_Rtr router.


1. Configure RIP Version 2.

Step 3: Verify connectivity


a. Select the Uptown router.
1. View the routing table. Enter show ip route
2. Compare the routing table to the previous RIP Version 1 routing table. The output below represents
the routing table when the Uptown router was configured with RIP version 1.

172.16.0.0/30 is subnetted, 3 subnets


C 172.16.1.0 is directly connected, Serial0/1/0
C 172.16.1.4 is directly connected, Serial0/0/0
R 172.16.1.8 [120/1] via 172.16.1.6, 00:00:18, Serial0/0/0
[120/1] via 172.16.1.1, 00:00:05, Serial0/1/0
192.168.1.0/27 is subnetted, 1 subnets
C 192.168.1.32 is directly connected, FastEthernet0/1
192.168.2.0/28 is subnetted, 1 subnets
C 192.168.2.16 is directly connected, FastEthernet0/0

3. View the RIP database. Enter show ip rip database


4. Compare the routing table to the previous RIP Version 1 RIP database. The output below represents
the RIP database when the Uptown router was configured with RIP version 1.

172.16.1.0/30 directly connected, Serial0/1/0


172.16.1.4/30 directly connected, Serial0/0/0
172.16.1.8/30
[1] via 172.16.1.6, 00:00:07, Serial0/0/0
[1] via 172.16.1.1, 00:00:20, Serial0/1/0
192.168.1.32/27 directly connected, FastEthernet0/1
192.168.2.16/28 directly connected, FastEthernet0/0

b. Select PC3 and verify connectivity.


1. Ping PC2 from the command prompt.
2. Ping PC1 from the command prompt.
3. Ping PC5 from the command prompt.
4. Choose Check Results.

Reflection
a. What is the maximum hop count that the RIP routing protocol can support?

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

_______________________________________________________________________________________

b. Why would an expanding company want to make the switch from static routes to routing protocols?
_______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

5.2.5 Troubleshooting RIPv2

Objective
• Troubleshoot and resolve configuration issues related to RIP.

Background / Preparation
The network administrators of this corporate network have decided to convert their legacy flat network into a
segmented network. They have divided each floor into separate VLANs. The decision was to use RIPv2 as the
routing protocol. All the equipment has been installed, however; users are complaining that they cannot reach the
Corporation Web server.

Required file: Troubleshooting RIPv2.pka

Step 1: View current configuration and the status of connectivity


a. Select the 1st Floor PC.
1. Ping the default gateway address.
2. Navigate to the website www.cisco.com.
3. Ping 192.168.3.2, the web server address.
4. View the IP configuration and note which network the PC is on.

b. Select the 2nd Floor PC.


1. Ping the default gateway address.
2. Navigate to the website www.cisco.com.
3. Ping 192.168.3.2, the web server address.
4. View the IP configuration and note which network the PC is on.

Step 2: View router configurations and make necessary configuration changes


a. View the Corp_RT routers configuration.
1. Select the Corp_RT router.
2. View the routers running configuration.
3. Note the ip addresses, routing protocols, and network statements.
4. View the routing table. Enter show ip route
5. Make any changes to the routers configuration that may be necessary.

b. View the Corp_Edge routers configuration.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

1. Select the Corp_Edge router.


2. View the routers running configuration.
3. Observe the ip addresses, routing protocols, and network statements.
4. Enter show ip route
5. Make any changes to the routers configuration that may be necessary.
Step 3: Verify connectivity
a. Select the 1st Floor PC and ping 192.168.3.2, the web server address.
b. Navigate to the website www.cisco.com.
c. Select the 2nd Floor PC, and ping 192.168.3.2, the web server address
d. Navigate to the website www.cisco.com.
e. Choose Check Results.

Reflection

a. What were the configuration changes that you made to establish connectivity to the web server?

__________________________________________________________________________

__________________________________________________________________________

b. On the Corp_Edge router enter the command show ip rip database. What routes were learn by the RIP
routing protocol

__________________________________________________________________________

__________________________________________________________________________

c. What command would show you the RIP updates in real-time?

__________________________________________________________________________

__________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

5.4.2 Configuring EIGRP and EIGRP Summary Routes

Objective

• Perform EIGRP manual route summarization.

Background / Preparation

As the network administrator you have been assigned a task from the senior network engineer to remove auto-
summarization and configure manual summarization on the R3 router.

Note:
Before beginning the lab ensure that the network is fully converged. All links should be green.

Required file: Configuring EIGRP and EIGRP Summary Routes.pka

Step 1: Remove auto summarization

a. Select the R3 router.


1. View the routing table with auto summary enabled. Enter show ip route and annotate the routes.

b. Select the R1 router.


1. Enter into privilege-Exec.
2. Enter router eigrp 1.
3. Disable auto summary. Enter no auto-summary.
4. Repeat steps 2 and 3 on the R2 and R3 routers.

Step 2: Configure manual summarization

a. Select the R3 router.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

b. Enter privilege-Exec.
c. Configure manual summarization on interface serial 0/0/0. Enter interface serial 0/0/0.
d. Enter ip summary-address eigrp 1 192.168.0.0 255.255.0.0.
e. Configure manual summarization on interface serial 0/0/1. Enter interface serial 0/0/1.
f. Enter ip summary-address eigrp 1 192.168.0.0 255.255.0.0.

Step 3: Confirm route summarization and verify connectivity

a. Compare the R3 routers routing table to the one below. Enter show ip route.
b. This represents the routing table of the R3 router, when auto summary was enabled.

D 172.16.0.0/16 [90/2172416] via 192.168.10.9, 00:00:35, Serial0/0/1


[90/2172416] via 192.168.10.5, 00:00:30, Serial0/0/0
C 192.168.1.0/24 is directly connected, FastEthernet0/0
192.168.10.0/24 is variably subnetted, 3 subnets, 2 masks
D 192.168.10.0/24 is a summary, 00:00:30, Null0
C 192.168.10.4/30 is directly connected, Serial0/0/0
C 192.168.10.8/30 is directly connected, Serial0/0/1

c. Select PC1 and go to the command prompt.


d. Ping PC3 (192.168.1.10).
e. Choose Check Results.

Reflection

a. What is the benefit in using default summarization?

__________________________________________________________________________

__________________________________________________________________________

b. What would be a situation where some subnets need to be summarized?

__________________________________________________________________________

__________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
Curriculum Name
Course Name: Chapter Name

5.4.3 Verifying and Troubleshooting EIGRP Operation

Objective
• Apply the troubleshooting techniques related to EIGRP to identify configuration issues.
• Identify and correct EIGRP configuration issues.

Background / Preparation

As the network administrator for the XYZ Company, you have been asked to set up a lab mockup of your
network for testing and implementation of new hardware. You have added all the IP addresses to the router
interfaces and configured the routing protocols. You decided to use EIGRP 10 as the routing protocol. After
conducting pings to all the devices you found that PC1 and PC4 cannot ping any of the other PC’s in the lab.

Required file: Verifying and Troubleshooting EIGRP Operation.pka

Step 1: Determine the status of connectivity

a. Select PC1 and ping the default gateway.

b. Ping the Fast Ethernet 0/1 interface on the Chicago router.

The ping was unsuccessful identifying a potential problem between the Chicago and Chicago1 routers.

c. Select the Chicago router and enter into privilege-Exec.

1. Enter show ip protocols

2. Enter show running-config

d. Select the Chicago1 router and enter into privilege-Exec.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Curriculum Name
Course Name: Chapter Name

1. Enter show ip protocols

2. Enter show running-config

The Chicago router is configured with EIGRP as the routing protocol and an autonomous system number
of 10. The Chicago1 router does not have any routing protocol or static routes configured.

e. Select PC4 and ping the default gateway.

f. Ping the Fast Ethernet 0/0 interface on the Denver router.

The ping was unsuccessful identifying a potential problem between the Denver and Denver1 router.

g. Select the Denver router and enter into privilege-Exec.

1. Enter show ip eigrp neighbors

2. Enter show running-config

h. Select the Denver1 router and enter into privilege-Exec.

1. Enter show ip eigrp neighbors

2. Enter show running-config

The Denver1 router is configured with the EIGRP routing protocol and an autonomous system number of
100. The Denver router is configured with the EIGRP routing protocol and an autonomous system
number of 10.

Step 2: Configure EIGRP properly on the Chicago1 and Denver1 Routers

a. Select the Chicago1 and enter into configuration mode.

1. Configure EIGRP with the correct autonomous system number.

2. Advertise the proper networks.

b. Select the Denver1 and enter into configuration mode.

1. Configure EIGRP with the correct autonomous system number.

2. Advertise the proper networks.

Step 3: Verify connectivity

a. Enter show ip eigrp traffic on the Chicago1 and Denver1 routers.

b. Enter show ip eigrp topology on the Chicago1 and Denver1 routers.

c. Conduct pings from PC1 to PC2, PC3, and PC4.

d. Conduct pings from PC4 to PC1, PC2, and PC3.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
Curriculum Name
Course Name: Chapter Name

e. Choose Check Results.

Reflection

a. What does the command debug eigrp packet show you?

____________________________________________________________________________________

____________________________________________________________________________________

b. What does the command debug eigrp fsm show you?

____________________________________________________________________________________

____________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

7.2.1 Viewing WAN Encapsulation

Objective
• Observe PPP encapsulation
• Observer HDLC encapsulation

Background / Preparation
Before starting the lab, ensure that the network is converged. All the link lights should be green.

Note
This is a discovery lab. Grading will not be conducted.

Required File: Viewing WAN Encapsulation.pka

Step 1: View PPP Encapsulation


a. Switch to Simulation Mode.
b. Ensure Scenerio0 is the active simulation.
c. Select the Capture Forward twice. The frame should be on the R4 router.
d. Select the frame and observe the encapsulation.

The inbound frame was Ethernet, while the outbound frame is being encapsulated with PPP.

e. Select the Capture Forward once. The frame should be on the R3 router.
f. Select the frame and observe the encapsulation.

The inbound frame was PPP, while the outbound frame will be Ethernet.

Step 2: View HDLC Encapsulation

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

a. Select Scenerio1.
b. Select the Capture Forward twice. The frame should be on the R3 router.
c. Select the frame and observe the encapsulation.

The inbound frame was Ethernet, while the outbound frame is being encapsulated with HDLC.

d. Select the Capture Forward once. The frame should be on the R1 router.
e. Select the frame and observe the encapsulation.

The inbound frame was HDLC, while the outbound frame will be Ethernet.

Reflection

a. What layer adds header information specific to the physical network link and the result is a frame?

_______________________________________________________________________________________

_______________________________________________________________________________________

b. Name two WAN encapsulation protocols?

_______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

8.3.5 Configuring and Verifying Standard Named ACLs

Objective

• Create standard named access list


• Test access list functionality

Background / Preparation

The senior network administrator has tasked you to create a standard named access list to prevent access to a
file server. All clients from one network and one specific workstation from a different network should be denied
access.

Required File: Configuring and Verifying Standard Named ACLs.pka

Step 1: Verify current connectivity


a. Select PC0.
1. Ping the Web Server.
2. Ping the File Server.
b. Select PC1.
1. Ping the Web Server.
2. Ping the File Server.
c. Select PC2.
1. Ping the Web Server.
2. Ping the File Server.

All three workstations should be able to ping both the Web and File server.

Step 2: Create a standard named access list


a. Select the R1 router.
b. Enter configuration mode.
c. Create a standard named access list.
1. Enter ip access-list standard File_Server_Restrictions

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

2. Enter deny 192.168.20.0 0.0.0.255


3. Enter deny host 192.168.10.3
4. Enter permit any
d. Exit to configuration mode.
e. Apply the access list outbound on the sub-interface Fast Ethernet 0/1.1.
1. Enter interface fastethernet 0/1.1
2. Enter ip access-group File_Server_Restrictions out
f. Save the configurations.

Step 3: Verify ACLs are working properly

a. Select PC0.
1. Ping the Web Server.
2. Ping the File Server.
b. Select PC1.
1. Ping the Web Server.
2. Ping the File Server.

c. Select PC2.
1. Ping the Web Server.
2. Ping the File Server.

All three workstations should be able to ping the Web Server, but only PC1 should be able to ping the File
Server.

d. Choose Check Results.

Reflection

a. Could you have used the command ip access-group File_Server_Restrictions in instead of ip access-
group File_Server_Restrictions out and get the same results?

_______________________________________________________________________________________

_______________________________________________________________________________________

b. Could you have used a number instead of the name File_Server_Restrictions when you created the
ACL? If so, what range would the number have to between?

_______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

8.3.6 Planning, Configuring, and Verifying Standard, Extended, and


Named ACLs

Objective

• Configure VTY access list for remote access security


• Create standard, extended and named ACLs for better network security

Background / Preparation

The network maintenance shop needs access to a router recently installed in London. You must configure an
ACL to grant them telnet access to the router while denying access to everyone else. Additional access list must
be created on the London and DC routers to meet the below requirements.
• Allow all London clients’ access to the London server and all other users must be blocked.
• Allow all DC clients’ access to the DC server and all other users must be blocked.

The enable password is admin.

Required File: Planning, Configuring, and Verifying Standard, Extended, and Named ACLs.pka

Step 1: Create access-list to restrict VTY access


a. Select the London router.
b. Configure the vty 0 thru 4 lines for login. The password should be set to cisco123.
c. Create a standard access-list which allows telnet access for any client on the maintenance subnet.
1. Number the access-list 10.
2. Maintenance subnet is 172.16.50.0 255.255.255.0.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 4
CCNA Discovery
Introducing Routing and Switching in the Enterprise

d. Apply the access-list to vty lines 0 thru 4.


1. Enter into configuration mode.
2. Enter line vty 0 4
3. Enter access-class 10 in
e. Save the configurations.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 4
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 2: Create extended access-list on the DC router

a. Plan and create access lists numbered on the DC router which meets the following requirements.
1. Create 1 outbound access list numbered 150 and apply to the interface Fast Ethernet 0/1.1
2. Create 1 outbound access list numbered 160 and apply to the interface Fast Ethernet 0/1.2

Clients Source Resources Destination Permit Deny Protocol


172.16.100.0 172.16.20.0
London Clients 255.255.255.0
London Resources
255.255.255.0
X All
172.16.10.0 172.16.20.100
DC Clients 255.255.255.0
London Server
255.255.255.255
X HTTP Only
172.16.10.0 172.16.100.0
DC Clients 255.255.255.0
London Resources
255.255.255.0
X ICMP
172.16.10.0 172.16.30.0
DC Clients 255.255.255.0
DC Resources
255.255.255.0
X All
172.16.100.0 172.16.30.100
London Clients 255.255.255.0
DC Server
255.255.255.255
X HTTP Only
172.16.100.0 172.16.10.0
London Clients 255.255.255.0
DC Resources
255.255.255.0
X ICMP

b. Save the configurations.

Step 3: Create a named access-list on the London router

a. Plan and create a named access list on the London router that meets the following requirements. Name
the access-list ICMP.

Clients Source Resources Destination Permit Deny Protocol


172.16.10.0 172.16.100.0
DC Clients 255.255.255.0
London Clients
255.255.255.0
X ICMP
172.16.10.0 172.16.100.0
DC Clients 255.255.255.0
London Clients
255.255.255.0
X All

b. Apply the access list to the Serial interface as an inbound ACL.


c. Save the configurations.

Step 4: Verify configured access-list

1. Verify the vty restrictions placed on the London router.


1. Select the Maint PC and telnet to the London router.
2. Select PC2 and telnet to the London router.

Telnet from the Maint PC should be successful and the telnet from PC2 should be denied.

2. Verify the extended access-list on the DC router.


1. Select PC2 and browse to the DC server (172.16.30.100).
2. Ping the DC server (172.16.30.100).
3. Select PC1 and browse to the London server (172.16.20.100).
4. Ping the London server (172.16.30.100).

Browsing should be successful, while ping should be unsuccessful.

3. Verify the named access-list on the London router.


1. Select PC2 and ping PC1.
2. Browse from PC2 to Server0 (172.16.100.250).

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 4
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Ping should be successful, but browsing should time out.

4. Choose Check Results.

Reflection

a. What is the significance of the “out” at the end of the line of an ip access-group statement?

________________________________________________________________________

________________________________________________________________________

b. What is the difference in the commands between adding an ACL on a specific interface and the VTY?

________________________________________________________________________

________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 4
CCNA Discovery
Introducing Routing and Switching in the Enterprise

8.4.1 Configuring and Verifying Extended ACLs to Filter on Port


Numbers

Objective

• Configure an extended ACL to filter on port numbers


• Verify that the extended ACL is working

Background / Preparation

The security office has instructed you to increase security into the server farm. The Senior Network Engineer
only wants to allow web and DNS traffic into the 10.10.10.0 network. All other traffic should be denied into the
10.10.10.0 network.

Required file: Configuring and Verifying Extended ACLs to Filter on Port Numbers.pka

Step 1: Verify current connectivity

a. Ping the DNS server (10.10.10.250) from PC0.

b. Ping the Web server (10.10.10.254) from PC0.

c. Repeat steps a - b on PC1.

Step 2: Build an extended ACL

a. Select the ISP router.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

b. Enter into configuration mode.

c. Create an extended access-list numbered 100.

1. Enter access-list 100 permit tcp any host 10.10.10.254 eq 80

2. Enter access-list 100 permit udp any host 10.10.10.250 eq 53

3. Enter access-list 100 deny ip any any

d. Apply the access list as an outbound ACL on Fast Ethernet 0/0.

Step 3: Test the access list

d. Ping the DNS server (10.10.10.250) from PC0.

e. Ping the Web server (10.10.10.254) from PC0.

f. Navigate to www.cisco.com from PC0.

g. Repeat steps a-c on PC1.

The pings should be unsuccessful, if you are able to navigate to www.cisco.com then ACL has been
configured properly to allow HTTP and DNS traffic is allowed.

h. Choose Check Results.

Reflection

a. What are the most common abbreviations used to specify a port condition?

___________________________________________________________________________________

___________________________________________________________________________________

b. Finish the following ACL to allow TCP port ranges 20-80.

ip access-list 100 permit tcp any 192.168.1.0 0.0.0.255 ___________________________

c. What is the implied statement at the end of all access-lists?

____________________________________________________________________________________

____________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

8.4.5 Configuring and Verifying Extended ACLs with a DMZ

Objective

• Allow DNS and HTTP only with extended access list


• Deny Telnet and ICMP with extended access list
• Verify that the access list are working properly

Background / Preparation

As the network administrator for the XYZ Company, you have been asked to increase security between your
VLANs and server farm. The server farm consist of both web and DNS servers. The Senior Network Engineer
only wants to allow web and DNS traffic into the server farm. You have also been tasked to deny telnet and
ICMP between VLAN 10 and VLAN 20.

Required file: 8.4.5 Configuring and Verifying Extended ACLs with a DMZ.pka
Device Interface IP Address Subnet Mask
PC0 Fast Ethernet 172.16.3.3 255.255.255.0
PC1 Fast Ethernet 172.16.1.3 255.255.255.0
Border1 Fast Ethernet 0/0.1 172.16.3.1 255.255.255.0
Fast Ethernet 0/0.2 172.16.1.1 255.255.255.0
Fast Ethernet 0/1 10.10.10.1 255.255.255.0
Web Server Fast Ethernet 10.10.10.254 255.255.255.0
DNS Server Fast Ethernet 10.10.10.250 255.255.255.0

Step 1: Determine current connectivity

a. Select PC0 and ping PC1.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

b. Select PC0 and telnet to the Border1 router.

c. Select PC1 and ping PC0.

d. Select PC1 and telnet to the Border1 router.

e. Select PC1 and ping the Web Server by URL (www.cisco.com).

f. Navigate to www.cisco.com from both PC1 and PC0.

Step 2: Build an extended ACL to allow Web and DNS

a. Select the Border1 router.

b. Enter configuration mode.

c. Create an access list numbered 110 which permits the HTTP and DNS protocols for any host, but
denies all other IP traffic into the server farm.

Web Server IP Address: 10.10.10.254

DNS Server IP Address: 10.10.10.250

d. Apply the ACL outbound on Fast Ethernet 0/1.

Step 3: Build an extended ACL to deny ICMP and Telnet

a. Select the Border1 router.

b. Enter configuration mode.

c. Create an access list numbered 100 which denies ICMP and Telnet, but permits all other IP traffic
between VLAN 10 and VLAN 20.

Note

Create the statement that denies ICMP before the statement that denies Telnet.

d. Apply the ACL inbound on both sub-interface Fast Ethernet 0/0.1 and Fast Ethernet 0/0.2.

Step 4: Verify ACL 100 and 110

a. Select PC0 and ping PC1.

b. Select PC0 and telnet to the Border1 router.

c. Select PC1 and ping PC0.

d. Select PC1 and telnet to the Border1 router.

e. Select PC1 and ping the Web Server by URL (www.cisco.com).

f. Navigate to www.cisco.com from both PC1 and PC0.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

g. Choose Check Results.

The pings should be unsuccessful, while browsing should be successful.

Reflection

a. Recently there was a Web Server installed on VLAN 10. Can the client on VLAN 20 browse to the server?

___________________________________________________________________________________

___________________________________________________________________________________

b. Can PC2 telnet to 172.16.3.1 and 172.16.1.1, why or why not?

___________________________________________________________________________________

___________________________________________________________________________________

c. If you wanted to block telnet and ICMP into the VLAN10 and VLAN20 networks from PC2 which interface
and direction would apply access-list 100?

____________________________________________________________________________________

____________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.1.2 Creating a Baseline

Objective

• Create a performance baseline


• Create a configuration baseline

Background / Preparation

As the network administrator for the XYZ Company, you have been tasked to create a baseline for the newly
installed network. Router 0 has just been installed and configured to support a new satellite office. Use ping
and trace route to create a baseline.

This lab does not require configuration, thus grading will not be conducted.

Required file: Creating a Baseline.pka

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 1: Create a Performance Baseline

a. Using the Baseline Chart or a scrap piece of paper identify the following information.

b. Select PC2 execute a ping and trace route to each of the devices in the chart below.

c. Document the results.

Note: To create a baseline using ping, you would ping 100 or 500 times and reference the average time
of the total number of pings.
Average Round Trip Time Path
PC2 to PC0
PC2 to PC1
PC2 to PC3
PC2 to PC4
PC2 to PC5
Baseline Chart

Step 2: Create a Configuration Baseline

a. Document the client configurations.

1. Client IP range

2. Subnet Mask

3. Default Gateway

b. Document the router configurations

1. Active interfaces and IP address

2. View and document the routing table

3. Save the startup configuration to the TFTP server.

Router# copy startup-config tftp

Address or name of remote host []? 10.10.40.250

Destination filename [Router-confg]? Router0_Config_Baseline

After creating a baseline network performance should be compared to the baseline every time a major change
has occurred. Periodically checking performance against the baseline will assist administrators in proactively
identifying potential problems.

Reflection

a. What is the purpose of network monitoring?

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

____________________________________________________________________________________

____________________________________________________________________________________

b. Name three groups of tools used to measure network monitoring?

____________________________________________________________________________________

____________________________________________________________________________________

c. What is SNMP used for on a network device?

____________________________________________________________________________________

____________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
Curriculum Name
Course Name: Chapter Name

9.2.1 Troubleshooting Host Connectivity on a Switch

Objective

• Troubleshoot and resolve host connectivity

Background / Preparation

A local warehouse has hired a new systems administrator to help maintain the existing network. While
troubleshooting normal user issues the new systems administrator moved the patch cables around on the switch
and now more users are have lost connectivity. You must troubleshoot the switch and fix any issues found.

Required File: Troubleshooting Host Connectivity on a Switch.pka

Note:
Ensure the network has fully converged before starting. All links will be green once converged.

Step 1: View current configuration and verify connectivity


a. Select PC1.
1. Ping the default gateway address.
2. Ping PC2.
3. View the IP configuration and note the network the PC is on and the MAC address.

b. Select PC3.
1. Ping the default gateway address.
2. Ping PC4.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
Curriculum Name
Course Name: Chapter Name

3. View the IP configuration and note the network the PC is on and the MAC address.

c. Select PC5.
1. Ping the default gateway address.
2. Ping PC6.
3. View the IP configuration and note the network the PC is on and the MAC address.

Step 2: View switch configurations and verify physical connectivity


a. Select Switch0.
1. View the switches running configuration and note the interface configurations.
2. Use show commands to help identify VLANs and port assignments.

After viewing the switch configuration and comparing it to the baseline that was on file, you have
determined that the switch configurations are correct.

b. Ensure all the PC links connect to the correct port.

Step 3: Verify connectivity


a. Select PC1.
1. Ping the default gateway address.
2. Ping PC2.

b. Select PC3.
1. Ping the default gateway address.
2. Ping PC4.

c. Select PC5.
1. Ping the default gateway address.
2. Ping PC6.

d. Choose Check Results.

Reflection

a. What command could be used to determine if a port was disabled due to port security?

______________________________________________________________________________________

_______________________________________________________________________________________

b. What are the pros and cons to using port security?

______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.2.2 Troubleshooting Inter-VLAN Routing Issues

Objective

• Troubleshoot and resolve issues related to Inter-VLAN routing

Background / Preparation

A small business has decided to implement VLANs and configure Inter-VLAN routing on the Core router to
improve performance. Since the VLANs have been implemented users have not been able to access network
resources. Troubleshoot the network and fix any configuration issues.

Document connectivity and configuration issues to assist in troubleshooting.

Required File: Troubleshooting Inter-VLAN Routing Issues.pka

Step 1: Verify status of connectivity and view current configuration


a. Select the PC 01A workstation.
1. Ping the default gateway address.
2. Ping the PC 02A workstation.
3. Ping the PC 01C workstation.
4. View the IP configuration and note which network the PC is on.

b. Select the PC 01C workstation.


1. Ping the default gateway address.
2. Ping the PC 01A workstation.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

3. Ping the PC 02B workstation.


4. View the IP configuration and note which network the PC is on.

c. Select the PC 02C workstation.


1. Ping the default gateway address.
2. Ping the PC 02B workstation
3. View the IP configuration and note which network the PC is on.

Step 2: Verify switch configurations


a. Select the 1st Floor switch.
1. View the running configuration.
2. Note the interfaces settings.
3. Make any changes to the switch configuration that may be necessary.

b. Select the 2nd Floor switch.


1. View the running configuration.
2. Note the interfaces settings.
3. Make any changes to the switch configuration that may be necessary.

c. Select the 3rd Floor switch.


1. View the running configuration.
2. Note the interfaces settings.
3. Make any changes to the switch configuration that may be necessary.

Step 3: View router configurations and make necessary configuration changes


a. Select the Core router.
b. View the routers running configuration.
c. Note the interfaces and IP addresses.
d. Make any changes to the routers configuration that may be necessary.

Step 4: Verify connectivity


a. Select the PC 01A workstation and ping PC 01C workstation.
b. Select the PC 01C workstation and ping PC 02B workstation.

Reflection

a. What prevented PC 01A from pinging the default gateway?

_______________________________________________________________________________________

_______________________________________________________________________________________

b. What command would you use to display the ports assigned to each VLAN?

_______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.2.3 Troubleshooting VTP Issues

Objective

• Identify VTP configuration issues


• Correct the VTP configuration errors
• Test connectivity

Background / Preparation

Users are currently complaining that there seems to be connectivity issues. The hosts are unable to ping
their default gateways or other host on the same VLAN. After examining the configuration baseline you have
determined the following information. Troubleshoot the connectivity issues and resolve the problem.

• VTP server - Switch 4

• VTP clients – Switch 1, Switch 2, Switch 3, and Switch 5

• VTP transparent - Switch 0

• Existing VLANs – VLAN 1, VLAN 10, and VLAN 20

Required file: Troubleshooting VTP Issues.pka

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 1: Identify and correct VTP settings

Initial troubleshooting indicates that VTP is configured correctly on Switch 4.

a. Use show commands to identify potential configuration issues on the remaining switches.

• show running-config

• show vtp status

• show vtp password

b. Make any required configuration changes.

c. Ensure all VLANs are added to the VTP server.

a. VLAN10 – Name vlan10

b. VLAN20 – Name vlan20

Step 3: Test the switch configurations

a. Ensure that all hosts can ping their default gateways.

b. Ensure that all hosts can ping the other host in its VLAN.

c. Ensure that all hosts can ping across VLANs.

Reflection

a. What would prevent VLAN updates on a VTP client in the same domain as the VTP server?

___________________________________________________________________________________

___________________________________________________________________________________

b. What would be the result if a new switch is added to the network and is configured as a VTP server
with a lower revision number than the current VTP server?

___________________________________________________________________________________

___________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.3.1 Troubleshooting RIP

Objective

• Troubleshoot and resolve configuration issues related to RIP

Background / Preparation

A small business has decided to implement RIP to help with network traffic. Since the implementation of RIP
users have been complaining that they have not been able to access other hosts on the network. You must
troubleshoot and fix the issues. The RIP version implemented is classless, supports discontiguous networks, and
VLSM.

Required File: Troubleshooting RIP.pka

Step 1: Verify connectivity and router configurations

a. Select each PC and determine the current status of connectivity.


b. Select Router1.
c. Enter debug ip rip
1. Switch to Simulation Mode and choose Auto / Capture Forward.
2. Select Router1 and view the debug messages for possible issues.
3. Enter undebug all.
d. Enter show ip protocols.
e. Enter show ip interface.
f. Enter show running-config.
g. Annotate the potential configuration issues.
h. Repeat steps c – g for Router0 and Router1.
i. Make any configuration changes necessary to restore communications between each host.

Step 2: Verify configurations and connectivity

a. Select each router and ensure the routing table is correct.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

b. Select the PC0 and ping the other two hosts.

c. Choose Check Results.

Reflection
a. What three commands used in the section would you use to display the version of rip being used?

_______________________________________________________________________________________

_______________________________________________________________________________________

b. Which version of RIP is classless and supports Variable Length Subnet Mask (VLSM)?

_______________________________________________________________________________________

_______________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.3.2 Troubleshooting Common EIGRP Issues

Objective

• Troubleshoot the routed network


• Identify and make any necessary configuration changes
• Verify connectivity

Background / Preparation

You have received several complaints from you customers the day after you performed a network migration.
Over the weekend the network was migrated from RIP to EIGRP. The Senior Network Engineer is counting
on you to resolve the issue. You were instructed to use EIGRP and an AS number of 10. Use the
troubleshooting techniques you have learned throughout the course to isolate and reconfigure any devices
necessary to re-establish network connectivity.

Required file: Troubleshooting Common EIGRP Issues.pka

Step 1: Isolate and correct any configuration errors

a. Isolate the problem with connectivity test.

1. Select PC0.

2. Ping and trace route to the other workstations.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

3. Select PC1.

4. Ping and trace route to the other workstations.

b. Select each router and gather information.

1. Enter show ip route

2. Enter show ip eigrp neighbors

3. Enter show running-config

c. Make the necessary configuration changes.

Step 2: Verify Configuration and Connectivity

a. Select each router and ensure all networks are in the routing tables are correct.

b. Verify that all routers have 3 EIGRP interfaces. Enter show ip eigrp interfaces.

c. Select PC1 and ping all the other hosts on the network.

d. Choose Check Results.

Reflection

a. How many EIGRP and connected routes exist on all the routers?

___________________________________________________________________________________

___________________________________________________________________________________

b. How many passive routes are known in the EIGRP topology?

___________________________________________________________________________________

___________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.4.1 Troubleshooting WAN Connectivity

Objective

• Troubleshoot issues related to WAN connectivity


• Identify and make any necessary configuration changes
• Verify connectivity

Background / Preparation

The XYZ Corporation has recently extended their WAN to a new office in Atlanta. The extension of the WAN
included the installation of router R1. The R1 router has two Point to Point serial connections to the R2 and
R3 routers and an Ethernet LAN segment. The installation team has been unsuccessful in establishing
connectivity. You have been called in to assist in troubleshooting. A meeting has provided the following
information.
• Encapsulation: PPP
• Serial interfaces: 30 bit subnet mask
• Clock rate: 64000
• Ethernet interface: 24 bit subnet mask
• Routing protocol: EIGRP and AS is 10
Required file: Troubleshooting WAN Connectivity.pka

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 1: Isolate and correct any configuration errors

a. Select workstations and perform connectivity tests.

b. Select each router and use show commands to identify potential configuration issues.

c. Make the necessary configuration changes.

Step 2: Verify Configuration and Connectivity

a. Select each router and ensure all networks are in the routing tables are correct.

b. Select PC1 and ping all the other hosts on the network.

c. Choose Check Results.

Reflection

a. What show commands can assist in troubling WAN connectivity?

___________________________________________________________________________________

___________________________________________________________________________________

b. What might an administrator implement to secure the negotiations of the PPP links?

___________________________________________________________________________________

___________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.4.2 Troubleshooting PPP Authentication Using CHAP

Objective

• Troubleshoot issues related to PPP authentication


• Identify and make any necessary configuration changes
• Verify connectivity

Background / Preparation

The XYZ Corporation has decided to secure their WAN links with CHAP authentication. Once again the
migration to the new configuration has not been successful. After successfully troubleshooting the WAN
connectivity during the installation of the R4 router, the company has asked for your assistance with the latest
issues. The following information has been provided.
• Authentication: CHAP
• Password: cisco123
• Encapsulation: PPP
• Clock rate: 64000
Required file: Troubleshooting PPP Authentication Using CHAP.pka

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 1: Isolate and correct any configuration errors

a. Select workstations and perform ping connectivity tests.

b. Select workstations and perform trace routes.

c. Select each router. Use show and debug commands to identify potential configuration issues.

d. Make the necessary configuration changes.

Note:

After the configuration errors have been corrected it may take a few minutes for EIGRP to converge.

Step 2: Verify Configuration and Connectivity

a. Select each router and ensure all networks are in the routing tables are correct.

b. Select PC1 and ping all the other hosts on the network.

c. Select PC3 and trace route to all other hosts on the network. Ensure the path is correct based on hop
count.

d. Choose Check Results.

Reflection

a. What show and debug commands can assist in troubling PPP authentication?

___________________________________________________________________________________

___________________________________________________________________________________

b. What is the difference between CHAP and PAP?

___________________________________________________________________________________

___________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.5.1 Troubleshooting ACLs Issues

Objective

• Verify and identify the ACL configuration issues


• Verify the ACLs are working properly

Background / Preparation
The security office wants to increase security to certain network resources via access-list. The network
administrator that configured the ACLs has asked you to verify the configuration. The following information has
been provided by the security office. Verify access list are working properly and make any changes necessary to
meet the security requirements.

• Restrict Telnet from the 192.168.4.0 network to all devices


• Restrict Telnet, WWW, DNS, and ICMP from the 192.168.1.0 network to all devices on the 192.168.2.0
network

Enable secret: class


VTY password: cisco123

Required file: Troubleshooting ACLs Issues.pka

Step 1: Verify Telnet restrictions

a. Verify Telnet is restricted for all hosts on the 192.168.4.0 network.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
Curriculum Name
Course Name: Chapter Name

b. Select the R0 router.

c. Examine the standard access-list.

d. Make the necessary changes to meet the security requirements.

Step 2: Verify Telnet, WWW, DNS, and ICMP restrictions

a. Verify Telnet, WWW, DNS, and ICMP is restricted for all hosts on the 192.168.1.0 network.

b. Select the R3 router.

c. Examine the standard access-list.

d. Make the necessary changes to meet the security requirements.

Step 3: Verify connectivity

a. Verify that PC0 and PC1 are unable to Telnet to R0, R1, R2, and R3.

b. Verify that PC3 is unable to ping the Web and DNS server.

c. Choose Check Results.

Reflection

a. What show commands can be used to view existing access-list (Identify two)?

____________________________________________________________________________________

____________________________________________________________________________________

b. Which OSI layers can be used by extended access-list to filter packets?

____________________________________________________________________________________

____________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

9.5.2 Troubleshooting the Placement of ACLs

Objective

• Verify the placement of existing ACLs


• Create and properly place new ACLs
• Verify the ACLs are working properly

Background / Preparation
The security office wants to secure access to a web server. The only network that should have access to the web
server is the 192.168.3.0 network. The night shift created a standard access list on the R3 router and applied it to
the Fast Ethernet 0/0 interface. Ever since the change, the workstations on the 192.168.1.0 network have not
been able to communication with the workstations on the both the 192.168.2.0 and 192.168.4.0 networks.

Required file: Troubleshooting the Placement of ACLs.pka

Step 1: Verify and resolve the placement of a standard ACL

a. Verify connectivity between PC3 and the other host.

b. Select the R3 router.

c. Examine the standard access-list.

d. Locate the interface and direction the access list is applied.

e. Place the ACL on an interface which meets the security requirement without changing the ACL.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise

Step 2: Create and properly place an extended ACL

After resolving the issue on the R3 router, you have been tasked to create an extended ACL on the R0 router that
accomplishes the same objective as the standard access list that was placed on the R3 router. You must prevent
all traffic from the 192.168.4.0 network from getting to the 192.168.2.0 network using and extended access list
numbered 100. All other traffic should be permitted.

a. Verify connectivity between PC0 and the other host.

b. Select the R0 router.

c. Create the necessary extended access list.

d. Apply the ACL to the most efficient interface in terms of reducing bandwidth on the serial links and
reducing the routing decisions.

Step 3: Verify connectivity

a. Verify connectivity between PC3 and the other host.

PC3 should be able to ping PC0 and PC2, but not the web server

b. Verify connectivity between PC0 and the other host

PC0 should be able to ping PC2 and PC3, but not the web server.

c. Choose Check Results.

Reflection

a. What would happen if the Standard ACL were placed on the Serial 0/0/0 interface in the inbound
direction?

____________________________________________________________________________________

____________________________________________________________________________________

b. What would happen if the Extended ACL were placed on the Fast Ethernet 0/0 interface in the
outbound direction?

____________________________________________________________________________________

____________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Introducing Routing and Switching in the Enterprise: Course Summary

10.0.1 Putting it All Together

Objectives
• Troubleshoot VLAN configuration
• Troubleshoot OSPF configuration
• Troubleshoot WAN interface configuration
• Troubleshoot access-list configuration

Background / Preparation
AnyCompany1 has been a victim of a hacking attack. This hackers intent was to disrupt communication versus
destroy data. The attack was focused the companies routers and switches. Identify the configuration changes that
the hacker made. Once identified resolve and test connectivity.

Step 1: Troubleshoot VLAN configurations


a. View the R2 sub-interface configurations
b. Identify the configured VLANs on each switch
c. Ensure that the H1, H2, and H3 workstations are on the correct VLANs
d. Make any necessary changes

Step 2: Troubleshoot OSPF configurations


a. View the OSPF configuration on the HQ and R2 routers.
b. Ensure that all the network and wildcard mask statements are correct.
c. Make any necessary changes.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
Curriculum Name
Course Name: Chapter Name

Step 3: Troubleshoot WAN interface configuration


a. View the HQ and ISP router configurations
b. Ensure that the serial interfaces are configured properly.
c. Make any necessary changes.

Step 4: Troubleshoot access-list configuration


a. View the R2 access list configuration.
b. Ensure the access list is proper built and applied to the interfaces correctly.
c. Make any necessary changes.

Step 5: Verify connectivity


a. Select each PC and ensure they can ping each other.
b. Select each PC and ensure they can ping the Web Server (172.16.0.250).
c. Choose Check Results.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2

S-ar putea să vă placă și