Skills Assessment Student Training (Answer Key)
|
|
|
- Samuel Whitehead
- 9 years ago
- Views:
Transcription
1 CCNA: Connecting Networks Skills Assessment Student Training (Answer Key) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Assessment Objectives Part 1: Initialize Devices (2 points, 5 minutes) Part 2: Configure Device Basic Settings (18 points, 20 minutes) Part 3: Configure PPP Connections (17 points, 20 minutes) Part 4: Configure NAT (14 points, 15 minutes) Part 5: Monitor the Network (16 points, 15 minutes) Part 6: Configure Frame Relay (17 points, 20 minutes) Part 7: Configure a GRE VPN Tunnel (16 points, 20 minutes) Scenario In this Skills Assessment (SA) you will create a small network. You must connect the network devices and configure those devices to support various WAN protocols. This will require that you reload the routers before starting your configuration of the next WAN protocol. The assessment has you save your basic device configurations to flash prior to implementing a WAN protocol to allow you to restore these basic configurations after each reload. The first WAN protocol you will configure is Point-to-Point Protocol (PPP) with CHAP authentication. You will also configure Network Address Translation (NAT), and network monitoring protocols during this phase of the assessment. After your instructor has signed off on this phase, you will reload the routers and configure Frame Relay. After the Frame Relay part is complete, and has been signed off by your instructor, you will reload the routers and configure a GRE VPN tunnel. Network configurations and connectivity will be verified throughout the assessment by using common CLI commands Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 55
2 CCNA: Connecting Networks Instructor Note: For the student version of this exam, the instructor should build the network and connect devices prior to the student starting the exam. This will save time and reduce wear on cables and equipment. The student will need to initialize and reload devices. Scoring is adjusted accordingly. Instructor Note: Sample scoring and estimated times for each exam part are provided. These can be adjusted by the instructor as necessary to suit the testing environment. Total points for the exam are 100 and total time is estimated at 115 minutes. The instructor may elect to deduct points if excessive time is taken for a part of the assessment. Instructor Note: For the initial SBA setup, the routers should have a startup-configuration saved with a hostname (Rtr). The router should also have a loopback address configured. These configurations will be used to verify that the student initialized the devices correctly in Part 1, Step 1. It is recommended that these configurations are saved to flash as SBA_Init and used to reset the device for the next student. Instructor Note: The routers used with this SA are Cisco 1941 Integrated Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). Other routers and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the SA. Refer to the Router Interface Summary Table at the end of the lab for the correct interface identifiers. Required Resources 3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable) 3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term. Console cable to configure the Cisco IOS devices via the console ports Ethernet and Serial cables as shown in the topology Instructor Note: Optionally, SNMP management software, such as PowerSNMP Free Manager, may be installed on PC-A. Refer to Lab Configuring SNMP) Part 1: Initialize Devices Total points: 2 Time: 5 minutes Step 1: Initialize and reload routers. Erase the startup configurations and reload the devices. Task IOS Command Points Erase the startup-config file on all routers. Reload all routers. R1# erase startup-config R1# reload (Verify by using show run command to see if loopback addresses are missing. Hostnames should be reset back to Router.) Note: Before proceeding, have your instructor verify device initializations. Instructor Sign-off Part 1: Points: of Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 55
3 CCNA: Connecting Networks Part 2: Configure Device Basic Settings Total points: 18 Time: 20 minutes Step 1: Configure PCs. Assign static IPv4 address information (IP address, subnet mask, default gateway) to the three PCs in the topology. Refer to the Topology diagram to obtain the IP address information. Configuration Item or Task Specification Points Configure static IPv4 address information on PC-A. Configure static IPv4 address information on PC-B. Configure static IPv4 address information on PC-C. IP Address: Subnet Mask: Default Gateway: IP Address: Subnet Mask: Default Gateway: IP Address: Subnet Mask: Default Gateway: Step 2: Configure R1. Configuration tasks for R1 include the following: Configuration Item or Task Specification Points Disable DNS lookup Router name R1 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords MOTD banner Unauthorized Access is Prohibited Configure G0/0 Set the description. Set the Layer 3 IPv4 address. Use the IP address information listed in the Topology. Activate the interface. Instructor Note: Ask the student to connect to R1, and then verify the proper configuration. (1 1/2 point) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 55
4 CCNA: Connecting Networks Configuration Item or Task Specification IOS Commands Disable DNS lookup Router name Encrypted privileged EXEC password Console access password Telnet access password Encrypt the plain text passwords MOTD banner Configure G0/0 no ip domain lookup R1 class cisco cisco service password-encryption banner Unauthorized Access is interface g0/0 description Connection to LAN ip address no R1# show run (Look for: no ip domain lookup) (Look for : R1> or R1# command prompt) R1> enable (Type in privileged exec password) R1# exit (Type in access password) R1# show run (Look under line VTY 0 4 for: password 7 094F471A1A0A) R1# show run (Look for: service passwordencryption) (Verify banner during above step) R1# show run interface g0/0 (Verify configuration.) R1# show ip interface brief (Verify that the interface is active.) Step 3: Configure R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 55
5 CCNA: Connecting Networks Configuration Item or Task Specification Points Disable DNS lookup Router name R2 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords MOTD banner Unauthorized Access is Prohibited Configure G0/0 Set the description. Set the Layer 3 IPv4 address. Use the IP address information listed in the Topology. Activate the interface. Instructor Note: Ask the student to connect to R2, and then verify the proper configuration. (1 1/2 point) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 55
6 CCNA: Connecting Networks Configuration Item or Task Specification IOS Commands Disable DNS lookup Router name Encrypted privileged EXEC password Console access password Telnet access password Encrypt the plain text passwords MOTD banner Configure G0/0 no ip domain lookup R2 class cisco cisco service password-encryption banner Unauthorized Access is interface g0/0 description Connection to LAN ip address no R2# show run (Look for: no ip domain lookup) (Look for : R2> or R2# command prompt) R2> enable (Type in privileged exec password) R2# exit (Type in access password) R2# show run (Look under line VTY 0 4 for: password 7 121A0C041104) R2# show run (Look for: service passwordencryption) (Verify banner during above step) R2# show run interface g0/0 (Verify configuration.) R2# show ip interface brief (Verify that the interface is active.) Step 4: Configure R3. Configuration tasks for R3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 55
7 CCNA: Connecting Networks Configuration Item or Task Specification Points Disable DNS lookup Router name R3 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords MOTD banner Unauthorized Access is Prohibited Configure G0/0 Set the description. Set the Layer 3 IPv4 address. Use the IP address information listed in the Topology. Activate the interface. Instructor Note: Ask the student to connect to R3, and then verify the proper configuration. (1 1/2 point) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 55
8 CCNA: Connecting Networks Configuration Item or Task Specification IOS Commands Disable DNS lookup Router name Encrypted privileged EXEC password Console access password Telnet access password Encrypt the plain text passwords MOTD banner Configure G0/0 no ip domain lookup R3 class cisco cisco service password-encryption banner Unauthorized Access is interface g0/0 description Connection to LAN ip address no R3# show run (Look for: no ip domain lookup) (Look for : R3> or R3# command prompt) R3> enable (Type in privileged exec password) R3# exit (Type in access password) R3# show run (Look under line VTY 0 4 for: password 7 121A0C041104) R3# show run (Look for: service passwordencryption) (Verify banner during above step) R3# show run interface g0/0 (Verify configuration.) R3# show ip interface brief (Verify that the interface is active.) Step 5: Save device configurations to Flash. Use the copy running-config BasicConfig command to save the running configuration to flash on each router. You will need this configuration file later in the assessment to restore the routers back to their basic configuration. Configuration Item or Task Specification Points Copy the running-config on R1 to flash. Name the file BasicConfig. Copy the running-config on R2 to flash. Name the file BasicConfig. Copy the running-config on R3 to flash. Name the file BasicConfig. R1# copy running-config BasicConfig R2# copy running-config BasicConfig R3# copy running-config BasicConfig Instructor Sign-off Part 2: Points: of 18 Part 3: Configure PPP Connections Ref lab: Configuring Basic PPP with Authentication 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 55
9 CCNA: Connecting Networks Total points: 17 Time: 20 minutes Figure 1: PPP Topology Use Figure 1 to obtain the IP information needed for this part of the student assessment. Step 1: Configure R1. Configuration tasks for R1 include the following: Task Specification Points Configure S0/0/0. Configure CHAP authentication on S0/0/0. Create a local database entry for CHAP authentication. Set a static default route out S0/0/0. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 1 at the top of Part 3 for IP address information. Set encapsulation to PPP. Set the clocking rate to Activate the interface. Username: R2 Password: cisco Instructor Note: Ask the student to connect to R1, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 55
10 CCNA: Connecting Networks Task Specification IOS Commands Configure S0/0/0. Configure CHAP authentication on S0/0/0. Create a local database entry to use for CHAP authentication. Set a static default route out S0/0/0. interface s0/0/0 description PPP connection to R2. ip address encapsulation ppp clock rate no Interface s0/0/0 ppp authentication chap username R2 password cisco ip route s0/0/0 R1# show run interface s0/0/0 (Verify configuration.) R1# show ip interface brief (Verify that the interface is active.) R1# show run interface s0/0/0 (Look for the configuration line: ppp authentication chap) R1# show run section user (Verify that configuration line: username R2 password D is listed.) R1# show ip route (Verify that the static route is in the routing table.) Step 2: Configure R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 55
11 CCNA: Connecting Networks Task Specification Points Configure S0/0/0. Configure CHAP authentication on S0/0/0. Create a local database entry for CHAP authentication. Configure S0/0/1. Set a static default route out S0/0/1. Set a static route for R1 LAN traffic out S0/0/0. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 1 at the top of Part 3 for IP address information. Set the encapsulation to PPP. Activate the interface. Username: R1 Password: cisco Set the description. Set the Layer 3 IPv4 address. Refer to Figure 1 at the top of Part 3 for IP address information. Set the encapsulation to PPP. Set the clocking rate to Activate the interface. (2 point) Instructor Note: Ask the student to connect to R2, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 55
12 CCNA: Connecting Networks Task Specification IOS Commands Configure S0/0/0. Configure CHAP authentication on S0/0/0. Create a local database entry to use for CHAP authentication. Configure S0/0/1. Set a static default route out S0/0/1. Set a static route for R1 LAN traffic out S0/0/0. interface s0/0/0 description PPP connection to R1. ip address encapsulation ppp no Interface s0/0/0 ppp authentication chap username R1 password cisco interface s0/0/1 description PPP connection to ISP ip address encapsulation ppp clock rate no ip route s0/0/1 ip route s0/0/0 R2# show run interface s0/0/0 (Verify configuration.) R2# show ip interface brief (Verify that the interface is active.) R2# show run interface s0/0/0 (Look for the configuration line: ppp authentication chap) R2# show run section user (Verify that configuration line: username R1 password D is listed.) R2# show run interface s0/0/1 (Verify configuration.) R1# show ip interface brief (Verify that the interface is active.) R1# show ip route (Verify that the static route is in the routing table.) R1# show ip route (Verify that the static route is in the routing table.) Step 3: Configure R3. Configuration tasks for R3 include the following: Task Specification Points Configure S0/0/1. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 1 at the top of Part 3 for IP address information. Set the encapsulation to PPP. Activate the interface. Instructor Note: Ask the student to connect to R3, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 55
13 CCNA: Connecting Networks Task Specification IOS Commands Configure S0/0/1. interface s0/0/1 description PPP connection to ISP ip address encapsulation ppp no R3# show run interface s0/0/1 (Verify configuration.) R3# show ip interface brief (Verify that the interface is active.) Step 4: Verify network connectivity. Verify connectivity using the ping command. From Command To Expected Results Points PC-A ping PC-B Ping should be successful. PC-C ping R3 G0/1 Ping should be successful. PC-C ping R2 S0/0/1 Ping should be successful. PC-A ping PC-C Ping should not be successful. PC-B ping PC-C Ping should not be successful. PC-C ping PC-B Ping should not be successful. Note: It may be necessary to disable the PC firewall for pings to be successful. Instructor Sign-off Part 3: Points: of 17 Part 4: Configure NAT Ref lab: Configuring Dynamic and Static NAT Total points: 14 Time: 15 minutes Step 1: Configure R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 55
14 CCNA: Connecting Networks Task Specification Points Assign a static NAT to map the inside local IP address for PC-B to a Inside Global address. Inside Global: Define an access control list to permit the R1 LAN for dynamic NAT. Access List: 1 Define the dynamic NAT pool for the R1 LAN. Define the NAT from the inside source to the outside pool. Make sure to allow multiple PCs access to this single Inside Global address. Pool: R1-LAN Inside Global: Inside source: Access list 1 Outside pool: R1-LAN Define an access control list to permit the R2 LAN for dynamic NAT. Access List: 2 Define the dynamic NAT pool for the R2 LAN. Define the NAT from the inside source to the outside pool. Make sure to allow multiple PCs access to this single Inside Global address. Assign the outside NAT interface. Assign the inside NAT interface for the R1 LAN. Assign the inside NAT interface for the R2 LAN. Pool: R2-LAN Inside Global: Inside source: Access list 2 Outside pool: R2-LAN 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 55
15 CCNA: Connecting Networks Task Specification IOS Commands Assign the static NAT address to map to the IP address for PC-B. Define an access control list to permit the R1 LAN for dynamic NAT. Define the dynamic NAT pool for the R1 LAN. Define the NAT from the inside source to the outside pool. Make sure to allow multiple PCs access to this single Inside Global address. Define an access control list to permit the R2 LAN for dynamic NAT. Define the dynamic NAT pool for the R2 LAN. Define the NAT from the inside source to the outside pool. Make sure to allow multiple PCs access to this single Inside Global address. Assign the outside NAT interface. Assign the inside NAT interface for the R1 LAN. Assign the inside NAT interface for the R2 LAN. ip nat inside source static access-list 1 permit ip nat pool R1-LAN netmask ip nat inside source list 1 pool R1-LAN overload access-list 2 permit ip nat pool R2-LAN netmask ip nat inside source list 2 pool R2-LAN overload interface s0/0/1 ip nat outside interface s0/0/0 ip nat inside interface g0/0 ip nat inside R2# show run include ip nat (Verify the command in the Specification box is listed.) R2# show access-lists (Verify the command in the Specification box is listed.) R2# show run include ip nat (Verify the command in the Specification box is listed.) R2# show run include ip nat (Verify the command in the Specification box is listed.) R2# show access-lists (Verify the command in the Specification box is listed.) R2# show run include ip nat (Verify the command in the Specification box is listed.) R2# show run include ip nat (Verify the command in the Specification box is listed.) R2# show run interface s0/0/1 (Verify the command in the Specification box is listed.) R2# show run interface s0/0/0 (Verify the command in the Specification box is listed.) R2# show run interface g0/0 (Verify the command in the Specification box is listed.) Step 2: Verify network connectivity. Verify connectivity using the ping command Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 55
16 CCNA: Connecting Networks From Command To Expected Results Points PC-A ping PC-C Ping should be successful. PC-C ping Inside Global address for PC-B ( ). Ping should be successful. Note: It may be necessary to disable the PC firewall for pings to be successful. Step 3: Verify NAT Configuration on R2. Enter the appropriate CLI command needed to display the following: Command Description Student Input (command) Points Display configured access lists. show access-lists Display the current active NAT translations. show ip nat translations Display detailed information about NAT including interface, access list, and pool assignments. Instructor Sign-off Part 4: Points: of 14 Part 5: Monitor the Network Ref lab: Configuring Syslog and NTP Ref lab: Configuring SNMP Ref lab: Collecting and Analyzing NetFlow Data Total points: 16 Time: 15 minutes Step 1: Configure NTP. Configuration tasks include the following: show ip nat statistics Task Specification Points Set the clock on R2 to a date and time specified for NTP testing. Date: August 25, 2013 Time: 9 am Configure R2 as the NTP Master. Stratum Number: 5 Configure R1 so that it uses R2 as its NTP Server Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 55
17 CCNA: Connecting Networks Task Specification IOS Commands Set the clock on R2 to a date and time unique for NTP testing. clock set 9:00:00 25 August 2013 Configure R2 as the NTP Master. ntp master 5 Configure R1 so that it uses R2 as its NTP Server. ntp server R2# show clock (Verify that the clock is set to the correct date and time.) R2# show ntp status (Verify that R2 is the master with a stratum setting of 5.) R1# show ntp associations (Verify that the reference clock has R2 s IP address.) Step 2: Configure Syslog messaging. Configuration tasks include the following: Task Specification Points Enable the timestamp service on R1 and R2 for system logging purposes. Include milliseconds in the timestamp. (1 points) Enable logging of messages on R1 and R2. Syslog server: (1 points) Change message trapping level on R1 and R2. Level: debugging (severity 7) (1 points) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 55
18 CCNA: Connecting Networks Task Specification IOS Commands Enable the timestamp service on R1 and R2 for system logging purposes. service timestamps log datetime msec Enable logging of messages on R1 and R2. logging host Change message trapping level on R1 and R2. logging trap debugging R1# show run include service (Verify the command in the Specification box is listed.) R2# show run include service (Verify the command in the Specification box is listed.) R1# show run include logging (Verify the command in the Specification box is listed.) R2# show run include logging (Verify the command in the Specification box is listed.) R1# show run include logging (Verify the command in the Specification box is listed.) R2# show run include logging (Verify the command in the Specification box is listed.) Step 3: Configure SNMP on R1. Configuration tasks include the following: Task Specification Points Create a standard access list to permit the SNMP management station (PC-A) to retrieve SNMP information from R1. Enable SNMP community access to the SNMP-ACCESS access list. Set the SNMP notification host. Enable all SNMP traps. Access List: SNMP-ACCESS Community: SA-LAB Access level: Read-only Host: Version: 2c Community: SA-LAB (1 points) (1 points) (1 points) (1 points) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 55
19 CCNA: Connecting Networks Task Specification IOS Commands Create a standard access list to permit PC-A to retrieve SNMP information from R1. Enable SNMP community access to the SNMP- ACCESS access list. Set the SNMP notification host. Enable all SNMP traps. ip access-list standard SNMP-ACCESS permit snmp-server community SA-LAB ro SNMP-ACCESS snmp-server host version 2c SA-LAB snmp-server enable traps R1# show run include snmp (Verify the command in the Specification box is listed. It should be the first line listed.) R1# show run include snmp (Verify the command in the Specification box is listed. It should be the first line listed.) R1# show snmp host (Look for: Notification host: udp-port: 162 type: trap user: SA-LAB security model: v2c.) R1# show run include snmp (There should be pages of traps listed.) Step 4: Collect NetFlow data on R2. Configuration tasks include the following: Task Specification Points Configure NetFlow data capture on both serial interfaces. Capture ingress and egress data packets. (1 points) Configure NetFlow data export. Destination: PC-B IP address UDP Port: 9996 (1 points) Configure the NetFlow export version. Version: 9 (1 points) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 55
20 CCNA: Connecting Networks Task Specification IOS Commands Configure NetFlow data capture on both serial interfaces. Capture ingress and egress data packets. interface s0/0/0 ip flow ingress ip flow egress interface s0/0/1 ip flow ingress ip flow egress Configure NetFlow data Export. ip flow-export destination Configure the NetFlow export version. ip flow-export version 9 R2# show ip flow interface (Verify that both serial interfaces have ip flow ingress and ip flow egress configured.) R2# show ip flow export (Verify that the destination points to (9996).) R2# show ip flow export (Verify that Version 9 flow records is listed.) Step 5: Verify monitoring configurations. Enter the appropriate CLI command needed to display the following: Command Description Student Input (command) Points Display the date and time. show clock Display the contents of logging buffers. show logging Display information about the SNMP communities. show snmp community Display the protocol using the highest volume of traffic. show ip cache flow Instructor Sign-off Part 5: Points: of 16 Part 6: Configure Frame Relay NOTE: DO NOT PROCEED WITH THE ASSESSMENT UNTIL YOUR INSTRUCTOR HAS SIGNED OFF ON THE PREVIOUS PARTS. Ref lab: Configuring Frame Relay and Subinterfaces Total points: 17 Time: 20 minutes 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 20 of 55
21 CCNA: Connecting Networks Figure 2: Frame Relay Topology Use Figure 2 to obtain the IP information needed for this part of the student assessment. Step 1: Reload routers and restore the BasicConfig to memory. a. Erase the startup configurations and reload the devices. b. For each router, issue the copy flash:basicconfig running-config command to reload the basic configuration that you saved at the end of Part 2. c. Issue the no command for the G0/0 interface on R1 and R3. Step 2: Configure R2 as a Frame Relay Switch. Copy and paste the following configuration lines into R2. This will configure R2 as a Frame Relay switch and allow you to complete Part 6. frame-relay switching int s0/0/0 encapsulation frame-relay frame-relay intf-type dce frame-relay route 123 interface s0/0/1 321 frame-relay lmi-type ansi no int s0/0/1 clock rate encapsulation frame-relay ietf frame-relay intf-type dce frame-relay route 321 interface s0/0/0 123 no Instructor Note: Students may need assistance with copying this configuration to R2. Step 3: Configure R1. Configure Frame Relay on S0/0/0 on R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 21 of 55
22 CCNA: Connecting Networks Configure S0/0/0. Disable Inverse ARP on S0/0/0. Task Specification Points Set the description. Set the Layer 3 IPv4 address. Refer to Figure 2 at the top of Part 6 for IP address information. Set encapsulation to frame-relay Set the clocking rate to Map the IP local address to the DLCI. Refer to Figure 2 for DLCI information. Map the remote IP address to the DLCI. Allow for multicast or broadcast traffic. Change the LMI type to the ANSI standard. Activate the interface. Create a default route to the IP address on the other side of the Frame Relay link. Refer to Figure 2 for IP address and DLCI information. Refer to Figure 2 for the IP address. Instructor Note: Ask the student to connect to R1, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 22 of 55
23 CCNA: Connecting Networks Task Specification IOS Commands Configure S0/0/0. Disable Inverse ARP on S0/0/0. interface s0/0/0 description Frame Relay connection to R3. ip address encapsulation frame-relay clock rate no no frame-relay inverse-arp Map the local IP address to the DLCI. frame-relay map ip Map the remote IP address to the DLCI. Allow for multicast or broadcast traffic. Change the LMI type to the ANSI standard. Activate the interface. frame-relay map ip broadcast frame-relay lmi-type ansi no Create a default route to the IP address on the other side of the Frame Relay link. ip route R1# show run interface s0/0/0 (Verify configuration.) R1# show ip interface brief (Verify that the interface is active.) R1# show run interface s0/0/0 (Verify the command in the Specification box is listed.) R1# show run interface s0/0/0 (Verify the command in the Specification box is listed.) R1# show run interface s0/0/0 (Verify the command in the Specification box is listed.) R1# show frame-relay lmi (Verify that the LMI TYPE = ANSI.) R1# show ip interface brief (Verify that the interface is not administratively.) R1# show ip route (Verify that a static default route to is listed in the routing table.) Step 4: Configure R3. Configure Frame Relay on a subinterface of S0/0/1 on R3. Configuration tasks for R3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 23 of 55
24 CCNA: Connecting Networks Configure S0/0/1. Create a point-to-point subinterface on S0/0/1. Set the Layer 3 IPv4 address on the subinterface. Task Specification Points Disable Inverse ARP on the subinterface. Configure Frame Relay Encapsulation. Set encapsulation to frame-relay (use the IETF standard). Activate the interface. Subinterface #: 321 Set the description. Refer to Figure 2 at the top of Part 6 for IP address information. Map the subinterface to the DLCI. Refer to Figure 2 for DLCI information. Create a default route to the IP address on the other side of the Frame Relay link. Refer to Figure 2 for IP address. Task Specification IOS Commands Configure S0/0/1. Create a point-to-point subinterface on S0/0/1 interface s0/0/1 encapsulation frame-relay ietf no interface s0/0/1.321 point-to-point description Frame Relay connection to R1 Set the Layer 3 IPv4 address on the subinterface. ip address Disable Inverse ARP on the subinterface. no frame-relay inverse-arp Map the subinterface to the DLCI. frame-relay interface-dlci 321 Create a default route to the IP address on the other side of the Frame Relay link. ip route R3# show run interface s0/0/1 (Verify configuration.) R3# show ip interface brief (Verify that the interface is active.) R3# show run interface s0/0/1.321 (Verify the commands in the Specification box are listed.) R3# show run interface s0/0/1.321 (Verify the command in the Specification box is listed.) R3# show run interface s0/0/1.321 (Verify the command in the Specification box is listed.) R3# show run interface s0/0/1.321 (Verify the command in the Specification box is listed.) R3# show ip route (Verify that a static default route to IP address is listed in the routing table.) Step 5: Verify network connectivity. Verify connectivity using the ping command Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 24 of 55
25 CCNA: Connecting Networks From Command To Expected Results Points PC-A ping Default gateway Ping should be successful. PC-C ping Default gateway Ping should be successful. PC-A ping Ping should be successful. PC-C ping Ping should be successful. PC-A ping PC-C Ping should be successful. Note: It may be necessary to disable the PC firewall for pings to be successful. Step 6: Verify Frame Relay configuration. Enter the appropriate CLI command needed to display the following: Command Description Student Input (command) Points Display Frame Relay LMI statistics. show frame-relay lmi Display the input and output packet count totals on a Frame Relay permanent virtual circuit (PVC). Display the Frame Relay maps between DLCIs and IP addresses. Instructor Sign-off Part 6: Points: of 17 Part 7: Configure a GRE VPN Tunnel Show frame-relay pvc show frame-relay map NOTE: DO NOT PROCEED WITH THE ASSESSMENT UNTIL YOUR INSTRUCTOR HAS SIGNED OFF ON THE PREVIOUS PART. Ref lab: Configuring a Point-to-Point GRE VPN Tunnel Total points: 16 Time: 20 minutes 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 25 of 55
26 CCNA: Connecting Networks Figure 3: GRE VPN Topology Use Figure 3 to obtain the IP information needed for this part of the student assessment. Step 1: Reload routers and restore the BasicConfig to memory. a. Erase the startup configurations and reload the devices. b. For each router, issue the copy flash:basicconfig running-config command to reload the basic configuration that you saved at the end of Part 2. c. Issue the no command for the G0/0 interface on R1 and R3. Step 2: Configure Serial Interfaces. a. Configuration tasks for R1 include the following: Task Specification Points Configure S0/0/0. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Set the encapsulation to HDLC. Set the clocking rate to Activate the interface. Instructor Note: Ask the student to connect to R1, and then verify the proper configuration. Task Specification IOS Commands Configure S0/0/0. interface s0/0/0 description HDLC connection to ISP ip address encapsulation hdlc clock rate no R1# show run interface s0/0/0 (Verify configuration.) R1# show ip interface brief (Verify that the interface is active.) b. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 26 of 55
27 CCNA: Connecting Networks Task Specification Points Configure S0/0/0. Configure S0/0/1. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Set the encapsulation to HDLC. Activate the interface. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Set the encapsulation to HDLC. Set the clocking rate to Activate the interface. Instructor Note: Ask the student to connect to R2, and then verify the proper configuration. Task Specification IOS Commands Configure S0/0/0. Configure S0/0/1. interface s0/0/0 description HDLC connection to R1 ip address encapsulation hdlc no interface s0/0/1 description HDLC connection to R3. ip address encapsulation hdlc clock rate no R2# show run interface s0/0/0 (Verify configuration.) R2# show ip interface brief (Verify that the interface is active.) R2# show run interface s0/0/1 (Verify configuration.) R1# show ip interface brief (Verify that the interface is active.) c. Configuration tasks for R3 include the following: Task Specification Points Configure S0/0/1. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Set the encapsulation to HDLC. Activate the interface. Instructor Note: Ask the student to connect to R3, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 27 of 55
28 CCNA: Connecting Networks Task Specification IOS Commands Configure S0/0/1. interface s0/0/1 description HDLC connection to ISP. ip address encapsulation hdlc no R3# show run interface s0/0/1 (Verify configuration.) R3# show ip interface brief (Verify that the interface is active.) Step 3: Configure the GRE VPN tunnel and EIGRP on R1. Configuration tasks for R1 include the following: Create a GRE tunnel interface. Use S0/0/0 as the tunnel source. Set the tunnel destination with the IP address of the R3 S0/0/1 interface. Create a default route out S0/0/0. Task Specification Points Interface: tunnel 0 Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Refer to Figure 3 for IP address information. Configure EIGRP on R1 Autonomous System (AS) number: 1 Advertise the LAN and Tunnel subnets in EIGRP. Set the LAN interface to passive. Refer to the GRE VPN topology. Instructor Note: Ask the student to connect to R1, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 28 of 55
29 CCNA: Connecting Networks Task Specification IOS Commands Create a GRE tunnel interface. Use S0/0/0 as the tunnel source. interface tunnel 0 description GRE VPN tunnel to R3 ip address tunnel source s0/0/0 R1# show run interface tunnel 0 (Verify configuration.) R1# show run interface tunnel 0 (Verify configuration.) Set the tunnel destination with the IP address of the R3 S0/0/1 interface. tunnel destination Create a default route out S0/0/0. Configure EIGRP on R1 router eigrp 1 Advertise the LAN and Tunnel subnets in EIGRP. Set the LAN interface to passive. ip route s0/0/0 network network passive-interface g0/0 R1# show run interface tunnel 0 (Verify configuration.) R1# show ip route (Verify that the static route is in the routing table.) R1# show run section eigrp (Verify the command in the Specification box is listed.) R1# show run section eigrp (Verify the commands in the Specification box are listed.) Step 4: Configure the GRE VPN tunnel and EIGRP on R3. Configuration tasks for R3 include the following: Create a GRE tunnel interface. Use S0/0/1 as the tunnel source. Set the tunnel destination with the IP address of the R1 S0/0/0 interface. Create a default route out S0/0/1. Task Specification Points Interface: tunnel 0 Set the description. Set the Layer 3 IPv4 address. Use the IP address information listed in Figure 3 at the top of Part 7. Refer to Figure 3 at the top of Part 7 for IP address information. Configure EIGRP on R3 Autonomous System (AS) number: 1 Advertise the LAN and Tunnel subnets in EIGRP. Set the LAN interface to passive. Refer to the GRE VPN topology. Instructor Note: Ask the student to connect to R3, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 29 of 55
30 CCNA: Connecting Networks Task Specification IOS Commands Create a GRE tunnel interface. Use S0/0/0 as the tunnel source interface tunnel 0 description GRE VPN tunnel to R1 ip address tunnel source s0/0/1 R3# show run interface tunnel 0 (Verify configuration.) R3# show run interface tunnel 0 (Verify configuration.) Set the tunnel destination with the IP address of the R3 S0/0/1 interface. tunnel destination Create a default route out S0/0/1. Configure EIGRP on R1 router eigrp 1 Advertise the LAN and Tunnel subnets in EIGRP. Set the LAN interface to passive. ip route s0/0/1 network network passive-interface g0/0 R3# show run interface tunnel 0 (Verify configuration.) R3# show ip route (Verify that the static route is in the routing table.) R3# show run section eigrp (Verify the commands in the Specification box are listed.) R3# show run section eigrp (Verify the commands in the Specification box are listed.) Step 5: Verify network connectivity. Verify connectivity using the following commands. From Command To Expected Results Points PC-A ping Default gateway Ping should be successful. PC-C ping Default gateway Ping should be successful. PC-A ping PC-C Ping should be successful. R1 traceroute R2 should show up in the traceroute. R1 traceroute R2 should be absent from traceroute. Note: It may be necessary to disable the PC firewall for pings to be successful. Step 6: Verify GRE VPN configuration. Enter the appropriate CLI command needed to display the following: Command Description Student Input (command) Points Display detail information about the GRE tunnel interface. show interfaces tunnel 0 Instructor Sign-off Part 7: Points: of Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 30 of 55
31 CCNA: Connecting Networks Part 8: Cleanup NOTE: DO NOT PROCEED WITH CLEANUP UNTIL YOUR INSTRUCTOR HAS GRADED YOUR SKILLS EXAM AND HAS INFORMED YOU THAT YOU MAY BEGIN CLEANUP. Before turning off power to the routers: Remove the NVRAM configuration files (if saved) from all devices. Remove the BasicConfig file from flash using the delete flash:basicconfig command. Disconnect and neatly put away all cables that were used in the Final. Router Interface Summary Table Router Interface Summary Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface # Fast Ethernet 0/0 (F0/0) 1900 Gigabit Ethernet 0/0 (G0/0) 2801 Fast Ethernet 0/0 (F0/0) 2811 Fast Ethernet 0/0 (F0/0) 2900 Gigabit Ethernet 0/0 (G0/0) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Fast Ethernet 0/1 (F0/1) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/1/0 (S0/1/0) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/1/1 (S0/1/1) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface. Device Configs Router R1 (After Part 2 - BasicConfig) R1#show run Building configuration... Current configuration : 1547 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 31 of 55
32 CCNA: Connecting Networks boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 no ip address clock rate interface Serial0/0/1 no ip address ip forward-protocol nd no ip http server no ip http secure-server control-plane banner motd ^C Unauthorized Access is Prohibited ^C 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 32 of 55
33 CCNA: Connecting Networks line con 0 password C2E login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password F0725 login transport input all scheduler allocate end Router R2 (After Part 2 - BasicConfig) R2#show run Building configuration... Current configuration : 1487 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R2 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 33 of 55
34 CCNA: Connecting Networks interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 no ip address interface Serial0/0/1 no ip address clock rate ip forward-protocol nd no ip http server no ip http secure-server control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password F0725 login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password 7 094F471A1A0A login transport input all 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 34 of 55
35 CCNA: Connecting Networks scheduler allocate end Router R3 (After Part 2 - BasicConfig) R3#show run Building configuration... Current configuration : 1522 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R3 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 35 of 55
36 CCNA: Connecting Networks interface Serial0/0/0 no ip address clock rate interface Serial0/0/1 no ip address ip forward-protocol nd no ip http server no ip http secure-server control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password login transport input all scheduler allocate end Router R1 (After Part 5) R1#show run Building configuration... Current configuration : 6286 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 36 of 55
37 CCNA: Connecting Networks hostname R1 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated username R2 password 7 110A D interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 description Connection to R2 ip address encapsulation ppp ppp authentication chap clock rate interface Serial0/0/1 no ip address ip forward-protocol nd no ip http server 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 37 of 55
38 CCNA: Connecting Networks no ip http secure-server ip route Serial0/0/0 ip access-list standard SNMP-ACCESS permit logging trap debugging logging host snmp-server community SA-LAB RO SNMP-ACCESS snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart snmp-server enable traps vrrp snmp-server enable traps transceiver all snmp-server enable traps ds1 snmp-server enable traps call-home message-send-fail server-fail snmp-server enable traps tty snmp-server enable traps eigrp snmp-server enable traps ospf state-change snmp-server enable traps ospf errors snmp-server enable traps ospf retransmit snmp-server enable traps ospf lsa snmp-server enable traps ospf cisco-specific state-change nssa-trans-change snmp-server enable traps ospf cisco-specific state-change shamlink interface snmp-server enable traps ospf cisco-specific state-change shamlink neighbor snmp-server enable traps ospf cisco-specific errors snmp-server enable traps ospf cisco-specific retransmit snmp-server enable traps ospf cisco-specific lsa snmp-server enable traps license snmp-server enable traps envmon snmp-server enable traps ethernet cfm cc mep-up mep-down cross-connect loop config snmp-server enable traps ethernet cfm crosscheck mep-missing mep-unknown service-up snmp-server enable traps flash insertion removal snmp-server enable traps auth-framework sec-violation snmp-server enable traps c3g snmp-server enable traps entity-sensor threshold snmp-server enable traps adslline snmp-server enable traps vdsl2line snmp-server enable traps icsudsu snmp-server enable traps isdn call-information snmp-server enable traps isdn layer2 snmp-server enable traps isdn chan-not-avail snmp-server enable traps isdn ietf snmp-server enable traps ds0-busyout snmp-server enable traps ds1-loopback snmp-server enable traps energywise snmp-server enable traps vstack snmp-server enable traps mac-notification 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 38 of 55
39 CCNA: Connecting Networks snmp-server enable traps bgp cbgp2 snmp-server enable traps isis snmp-server enable traps ospfv3 state-change snmp-server enable traps ospfv3 errors snmp-server enable traps aaa_server snmp-server enable traps atm subif snmp-server enable traps cef resource-failure peer-state-change peer-fib-statechange inconsistency snmp-server enable traps memory bufferpeak snmp-server enable traps cnpd snmp-server enable traps config-copy snmp-server enable traps config snmp-server enable traps config-ctid snmp-server enable traps entity snmp-server enable traps fru-ctrl snmp-server enable traps resource-policy snmp-server enable traps event-manager snmp-server enable traps frame-relay multilink bundle-mismatch snmp-server enable traps frame-relay snmp-server enable traps frame-relay subif snmp-server enable traps hsrp snmp-server enable traps ipmulticast snmp-server enable traps msdp snmp-server enable traps mvpn snmp-server enable traps nhrp nhs snmp-server enable traps nhrp nhc snmp-server enable traps nhrp nhp snmp-server enable traps nhrp quota-exceeded snmp-server enable traps pim neighbor-change rp-mapping-change invalid-pim-message snmp-server enable traps pppoe snmp-server enable traps cpu threshold snmp-server enable traps rsvp snmp-server enable traps syslog snmp-server enable traps l2tun session snmp-server enable traps l2tun pseudowire status snmp-server enable traps vtp snmp-server enable traps waas snmp-server enable traps ipsla snmp-server enable traps bfd snmp-server enable traps gdoi gm-start-registration snmp-server enable traps gdoi gm-registration-complete snmp-server enable traps gdoi gm-re-register snmp-server enable traps gdoi gm-rekey-rcvd snmp-server enable traps gdoi gm-rekey-fail snmp-server enable traps gdoi ks-rekey-pushed snmp-server enable traps gdoi gm-incomplete-cfg snmp-server enable traps gdoi ks-no-rsa-keys snmp-server enable traps gdoi ks-new-registration snmp-server enable traps gdoi ks-reg-complete 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 39 of 55
40 CCNA: Connecting Networks snmp-server enable traps firewall serverstatus snmp-server enable traps ike policy add snmp-server enable traps ike policy delete snmp-server enable traps ike tunnel start snmp-server enable traps ike tunnel stop snmp-server enable traps ipsec cryptomap add snmp-server enable traps ipsec cryptomap delete snmp-server enable traps ipsec cryptomap attach snmp-server enable traps ipsec cryptomap detach snmp-server enable traps ipsec tunnel start snmp-server enable traps ipsec tunnel stop snmp-server enable traps ipsec too-many-sas snmp-server enable traps ethernet cfm alarm snmp-server enable traps rf snmp-server enable traps vrfmib vrf-up vrf-down vnet-trunk-up vnet-trunk-down snmp-server host version 2c SA-LAB control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password C2E login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password F0725 login transport input all scheduler allocate ntp server end Router R2 (After Part 5) R2#show run Building configuration... Current configuration : 2488 bytes version Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 40 of 55
41 CCNA: Connecting Networks service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R2 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated username R1 password 7 104D000A0618 interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address ip nat inside ip virtual-reassembly in duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 description PPP connection to R1 ip address ip flow ingress ip flow egress ip nat inside ip virtual-reassembly in 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 41 of 55
42 CCNA: Connecting Networks encapsulation ppp ppp authentication chap interface Serial0/0/1 description PPP connection to ISP ip address ip flow ingress ip flow egress ip nat outside ip virtual-reassembly in encapsulation ppp clock rate ip forward-protocol nd no ip http server no ip http secure-server ip flow-export version 9 ip flow-export destination ip nat pool R1-LAN netmask ip nat pool R2-LAN netmask ip nat inside source list 1 pool R1-LAN overload ip nat inside source list 2 pool R2-LAN overload ip nat inside source static ip route Serial0/0/1 ip route Serial0/0/0 logging trap debugging logging host access-list 1 permit access-list 2 permit control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password F0725 login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 42 of 55
43 CCNA: Connecting Networks password 7 094F471A1A0A login transport input all scheduler allocate ntp master 5 end Router R3 (After Part 5) R3#show run Building configuration... Current configuration : 1595 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R3 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 43 of 55
44 CCNA: Connecting Networks duplex auto speed auto interface Serial0/0/0 no ip address clock rate interface Serial0/0/1 description PPP connection to ISP ip address encapsulation ppp ip forward-protocol nd no ip http server no ip http secure-server control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password login transport input all scheduler allocate end Router R1 (After Part 6) R1# show run Building configuration... Current configuration : 1875 bytes 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 44 of 55
45 CCNA: Connecting Networks version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R1 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 description Frame Relay connection to R3. ip address encapsulation frame-relay clock rate frame-relay map ip broadcast frame-relay map ip no frame-relay inverse-arp frame-relay lmi-type ansi interface Serial0/0/ Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 45 of 55
46 CCNA: Connecting Networks no ip address router eigrp 1 network network ip forward-protocol nd no ip http server no ip http secure-server ip route control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password C2E login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password F0725 login transport input all scheduler allocate end Router R2 (After Part 6) R2#show run Building configuration... Current configuration : 1726 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 46 of 55
47 CCNA: Connecting Networks hostname R2 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated frame-relay switching interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 no ip address encapsulation frame-relay frame-relay lmi-type ansi frame-relay intf-type dce frame-relay route 123 interface Serial0/0/1 321 interface Serial0/0/1 no ip address encapsulation frame-relay IETF clock rate frame-relay intf-type dce frame-relay route 321 interface Serial0/0/ Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 47 of 55
48 CCNA: Connecting Networks ip forward-protocol nd no ip http server no ip http secure-server control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password F0725 login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password 7 094F471A1A0A login transport input all scheduler allocate end Router R3 (After Part 6) R3#show run Building configuration... Current configuration : 1741 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R3 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 48 of 55
49 CCNA: Connecting Networks ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 no ip address clock rate interface Serial0/0/1 no ip address encapsulation frame-relay IETF interface Serial0/0/1.321 point-to-point description Frame Relay connection to R1 ip address frame-relay interface-dlci 321 ip forward-protocol nd no ip http server no ip http secure-server ip route control-plane banner motd ^C Unauthorized Access is Prohibited ^C 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 49 of 55
50 CCNA: Connecting Networks line con 0 password login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password login transport input all scheduler allocate end Router R1 (After Part 7) R1#show run Building configuration... Current configuration : 1787 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R1 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Tunnel Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 50 of 55
51 CCNA: Connecting Networks description GRE VPN tunnel to R3 ip address tunnel source Serial0/0/0 tunnel destination interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 description HDLC connection to ISP ip address clock rate interface Serial0/0/1 no ip address router eigrp 1 network network passive-interface GigabitEthernet0/0 ip forward-protocol nd no ip http server no ip http secure-server ip route Serial0/0/0 control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password C2E 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 51 of 55
52 CCNA: Connecting Networks login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password F0725 login transport input all scheduler allocate end Router R2 (After Part 7) R2#show run Building configuration... Current configuration : 1596 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R2 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Embedded-Service-Engine0/0 no ip address 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 52 of 55
53 CCNA: Connecting Networks interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 description HDLC connection to R1 ip address interface Serial0/0/1 description HDLC connection to R3 ip address clock rate ip forward-protocol nd no ip http server no ip http secure-server control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password F0725 login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password 7 094F471A1A0A login transport input all scheduler allocate Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 53 of 55
54 CCNA: Connecting Networks end Router R3 (After Part 7) R3#show run Building configuration... Current configuration : 1759 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R3 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Tunnel0 description GRE tunnel to R1 ip address tunnel source Serial0/0/1 tunnel destination interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 description Connection to the LAN ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 54 of 55
55 CCNA: Connecting Networks duplex auto speed auto interface Serial0/0/0 no ip address clock rate interface Serial0/0/1 description HDLC connection to ISP ip address router eigrp 1 network network passive-interface GigabitEthernet0/0 ip forward-protocol nd no ip http server no ip http secure-server ip route Serial0/0/1 control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password login transport input all scheduler allocate end 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 55 of 55
56 CCNA: Connecting Networks Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (2 points, 5 minutes) Part 2: Configure Device Basic Settings (18 points, 20 minutes) Part 3: Configure PPP Connections (17 points, 20 minutes) Part 4: Configure NAT (14 points, 15 minutes) Part 5: Monitor the Network (16 points, 15 minutes) Part 6: Configure Frame Relay (17 points, 20 minutes) Part 7: Configure a GRE VPN Tunnel (16 points, 20 minutes) Scenario In this Skills Assessment (SA) you will create a small network. You must connect the network devices and configure those devices to support various WAN protocols. This will require that you reload the routers before starting your configuration of the next WAN protocol. The assessment has you save your basic device configurations to flash prior to implementing a WAN protocol to allow you to restore these basic configurations after each reload. The first WAN protocol you will configure is Point-to-Point Protocol (PPP) with CHAP authentication. You will also configure Network Address Translation (NAT), and network monitoring protocols during this phase of the assessment. After your instructor has signed off on this phase, you will reload the routers and configure Frame Relay. After the Frame Relay part is complete, and has been signed off by your instructor, you will reload the routers and configure a GRE VPN tunnel. Network configurations and connectivity will be verified throughout the assessment by using common CLI commands Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 16
57 CCNA: Connecting Networks SA Exam Required Resources 3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable) 3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term. Console cable to configure the Cisco IOS devices via the console ports Ethernet and Serial cables as shown in the topology Part 1: Initialize Devices Total points: 2 Time: 5 minutes Step 1: Initialize and reload routers. Erase the startup configurations and reload the devices. Task IOS Command Points Erase the startup-config file on all routers. Reload all routers. Note: Before proceeding, have your instructor verify device initializations. Instructor Sign-off Part 1: Points: of 2 Part 2: Configure Device Basic Settings Total points: 18 Time: 20 minutes Step 1: Configure PCs. Assign static IPv4 address information (IP address, subnet mask, default gateway) to the three PCs in the topology. Refer to the Topology diagram to obtain the IP address information. Configuration Item or Task Specification Points Configure static IPv4 address information on PC-A. Configure static IPv4 address information on PC-B. Configure static IPv4 address information on PC-C. Step 2: Configure R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 16
58 CCNA: Connecting Networks SA Exam Configuration Item or Task Specification Points Disable DNS lookup Router name R1 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords MOTD banner Unauthorized Access is Prohibited Configure G0/0 Set the description. Set the Layer 3 IPv4 address. Use the IP address information listed in the Topology. Activate the interface. (1 1/2 point) Step 3: Configure R2. Configuration tasks for R2 include the following: Configuration Item or Task Specification Points Disable DNS lookup Router name R2 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords MOTD banner Unauthorized Access is Prohibited Configure G0/0 Step 4: Configure R3. Configuration tasks for R3 include the following: Set the description. Set the Layer 3 IPv4 address. Use the IP address information listed in the Topology. Activate the interface. (1 1/2 point) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 16
59 CCNA: Connecting Networks SA Exam Configuration Item or Task Specification Points Disable DNS lookup Router name R3 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords MOTD banner Unauthorized Access is Prohibited Configure G0/0 Set the description. Set the Layer 3 IPv4 address. Use the IP address information listed in the Topology. Activate the interface. (1 1/2 point) Step 5: Save device configurations to Flash. Use the copy running-config BasicConfig command to save the running configuration to flash on each router. You will need this configuration file later in the assessment to restore the routers back to their basic configuration. Configuration Item or Task Specification Points Copy the running-config on R1 to flash. Name the file BasicConfig. Copy the running-config on R2 to flash. Name the file BasicConfig. Copy the running-config on R3 to flash. Name the file BasicConfig. Instructor Sign-off Part 2: Points: of 18 Part 3: Configure PPP Connections Total points: 17 Time: 20 minutes 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 16
60 CCNA: Connecting Networks SA Exam Figure 1: PPP Topology Use Figure 1 to obtain the IP information needed for this part of the student assessment. Step 1: Configure R1. Configuration tasks for R1 include the following: Task Specification Points Configure S0/0/0. Configure CHAP authentication on S0/0/0. Create a local database entry for CHAP authentication. Set a static default route out S0/0/0. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 1 at the top of Part 3 for IP address information. Set encapsulation to PPP. Set the clocking rate to Activate the interface. Username: R2 Password: cisco Step 2: Configure R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 16
61 CCNA: Connecting Networks SA Exam Task Specification Points Configure S0/0/0. Configure CHAP authentication on S0/0/0. Create a local database entry for CHAP authentication. Configure S0/0/1. Set a static default route out S0/0/1. Set a static route for R1 LAN traffic out S0/0/0. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 1 at the top of Part 3 for IP address information. Set the encapsulation to PPP. Activate the interface. Username: R1 Password: cisco Set the description. Set the Layer 3 IPv4 address. Refer to Figure 1 at the top of Part 3 for IP address information. Set the encapsulation to PPP. Set the clocking rate to Activate the interface. (2 point) Step 3: Configure R3. Configuration tasks for R3 include the following: Task Specification Points Configure S0/0/1. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 1 at the top of Part 3 for IP address information. Set the encapsulation to PPP. Activate the interface. Step 4: Verify network connectivity. Verify connectivity using the ping command Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 16
62 CCNA: Connecting Networks SA Exam From Command To Expected Results Points PC-A ping PC-B Ping should be successful. PC-C ping R3 G0/1 Ping should be successful. PC-C ping R2 S0/0/1 Ping should be successful. PC-A ping PC-C Ping should not be successful. PC-B ping PC-C Ping should not be successful. PC-C ping PC-B Ping should not be successful. Note: It may be necessary to disable the PC firewall for pings to be successful. Instructor Sign-off Part 3: Points: of 17 Part 4: Configure NAT Total points: 14 Time: 15 minutes Step 1: Configure R2. Configuration tasks for R2 include the following: Task Specification Points Assign a static NAT to map the inside local IP address for PC-B to a Inside Global address. Inside Global: Define an access control list to permit the R1 LAN for dynamic NAT. Access List: 1 Define the dynamic NAT pool for the R1 LAN. Define the NAT from the inside source to the outside pool. Make sure to allow multiple PCs access to this single Inside Global address. Pool: R1-LAN Inside Global: Inside source: Access list 1 Outside pool: R1-LAN Define an access control list to permit the R2 LAN for dynamic NAT. Access List: 2 Define the dynamic NAT pool for the R2 LAN. Define the NAT from the inside source to the outside pool. Make sure to allow multiple PCs access to this single Inside Global address. Assign the outside NAT interface. Assign the inside NAT interface for the R1 LAN. Assign the inside NAT interface for the R2 LAN. Pool: R2-LAN Inside Global: Inside source: Access list 2 Outside pool: R2-LAN 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 16
63 CCNA: Connecting Networks SA Exam Step 2: Verify network connectivity. Verify connectivity using the ping command. From Command To Expected Results Points PC-A ping PC-C Ping should be successful. PC-C ping Inside Global address for Ping should be successful. PC-B ( ). Note: It may be necessary to disable the PC firewall for pings to be successful. Step 3: Verify NAT Configuration on R2. Enter the appropriate CLI command needed to display the following: Command Description Student Input (command) Points Display configured access lists. Display the current active NAT translations. Display detailed information about NAT including interface, access list, and pool assignments. Instructor Sign-off Part 4: Points: of 14 Part 5: Monitor the Network Total points: 16 Time: 15 minutes Step 1: Configure NTP. Configuration tasks include the following: Task Specification Points Set the clock on R2 to a date and time specified for NTP testing. Date: August 25, 2013 Time: 9 am Configure R2 as the NTP Master. Stratum Number: 5 Configure R1 so that it uses R2 as its NTP Server. Step 2: Configure Syslog messaging. Configuration tasks include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 16
64 CCNA: Connecting Networks SA Exam Task Specification Points Enable the timestamp service on R1 and R2 for system logging purposes. Include milliseconds in the timestamp. (1 points) Enable logging of messages on R1 and R2. Syslog server: (1 points) Change message trapping level on R1 and R2. Level: debugging (severity 7) (1 points) Step 3: Configure SNMP on R1. Configuration tasks include the following: Task Specification Points Create a standard access list to permit the SNMP management station (PC-A) to retrieve SNMP information from R1. Enable SNMP community access to the SNMP-ACCESS access list. Set the SNMP notification host. Enable all SNMP traps. Access List: SNMP-ACCESS Community: SA-LAB Access level: Read-only Host: Version: 2c Community: SA-LAB (1 points) (1 points) (1 points) (1 points) Step 4: Collect NetFlow data on R2. Configuration tasks include the following: Task Specification Points Configure NetFlow data capture on both serial interfaces. Capture ingress and egress data packets. (1 points) Configure NetFlow data export. Destination: PC-B IP address UDP Port: 9996 (1 points) Configure the NetFlow export version. Version: 9 (1 points) Step 5: Verify monitoring configurations. Enter the appropriate CLI command needed to display the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 16
65 CCNA: Connecting Networks SA Exam Command Description Student Input (command) Points Display the date and time. Display the contents of logging buffers. Display information about the SNMP communities. Display the protocol using the highest volume of traffic. Instructor Sign-off Part 5: Points: of 16 Part 6: Configure Frame Relay NOTE: DO NOT PROCEED WITH THE ASSESSMENT UNTIL YOUR INSTRUCTOR HAS SIGNED OFF ON THE PREVIOUS PARTS. Total points: 17 Time: 20 minutes Figure 2: Frame Relay Topology Use Figure 2 to obtain the IP information needed for this part of the student assessment. Step 1: Reload routers and restore the BasicConfig to memory. a. Erase the startup configurations and reload the devices. b. For each router, issue the copy flash:basicconfig running-config command to reload the basic configuration that you saved at the end of Part 2. c. Issue the no command for the G0/0 interface on R1 and R3. Step 2: Configure R2 as a Frame Relay Switch. Copy and paste the following configuration lines into R2. This will configure R2 as a Frame Relay switch and allow you to complete Part 6. frame-relay switching int s0/0/ Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 16
66 CCNA: Connecting Networks SA Exam encapsulation frame-relay frame-relay intf-type dce frame-relay route 123 interface s0/0/1 321 frame-relay lmi-type ansi no int s0/0/1 clock rate encapsulation frame-relay ietf frame-relay intf-type dce frame-relay route 321 interface s0/0/0 123 no Step 3: Configure R1. Configure Frame Relay on S0/0/0 on R1. Configuration tasks for R1 include the following: Configure S0/0/0. Disable Inverse ARP on S0/0/0. Task Specification Points Set the description. Set the Layer 3 IPv4 address. Refer to Figure 2 at the top of Part 6 for IP address information. Set encapsulation to frame-relay Set the clocking rate to Map the IP local address to the DLCI. Refer to Figure 2 for DLCI information. Map the remote IP address to the DLCI. Allow for multicast or broadcast traffic. Change the LMI type to the ANSI standard. Activate the interface. Create a default route to the IP address on the other side of the Frame Relay link. Refer to Figure 2 for IP address and DLCI information. Refer to Figure 2 for the IP address. Step 4: Configure R3. Configure Frame Relay on a subinterface of S0/0/1 on R3. Configuration tasks for R3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 16
67 CCNA: Connecting Networks SA Exam Configure S0/0/1. Create a point-to-point subinterface on S0/0/1. Set the Layer 3 IPv4 address on the subinterface. Task Specification Points Disable Inverse ARP on the subinterface. Configure Frame Relay Encapsulation. Set encapsulation to frame-relay (use the IETF standard). Activate the interface. Subinterface #: 321 Set the description. Refer to Figure 2 at the top of Part 6 for IP address information. Map the subinterface to the DLCI. Refer to Figure 2 for DLCI information. Create a default route to the IP address on the other side of the Frame Relay link. Refer to Figure 2 for IP address. Step 5: Verify network connectivity. Verify connectivity using the ping command. From Command To Expected Results Points PC-A ping Default gateway Ping should be successful. PC-C ping Default gateway Ping should be successful. PC-A ping Ping should be successful. PC-C ping Ping should be successful. PC-A ping PC-C Ping should be successful. Note: It may be necessary to disable the PC firewall for pings to be successful. Step 6: Verify Frame Relay configuration. Enter the appropriate CLI command needed to display the following: Command Description Student Input (command) Points Display Frame Relay LMI statistics. Display the input and output packet count totals on a Frame Relay permanent virtual circuit (PVC). Display the Frame Relay maps between DLCIs and IP addresses. Instructor Sign-off Part 6: Points: of Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 16
68 CCNA: Connecting Networks SA Exam Part 7: Configure a GRE VPN Tunnel NOTE: DO NOT PROCEED WITH THE ASSESSMENT UNTIL YOUR INSTRUCTOR HAS SIGNED OFF ON THE PREVIOUS PART. Total points: 16 Time: 20 minutes Figure 3: GRE VPN Topology Use Figure 3 to obtain the IP information needed for this part of the student assessment. Step 1: Reload routers and restore the BasicConfig to memory. a. Erase the startup configurations and reload the devices. b. For each router, issue the copy flash:basicconfig running-config command to reload the basic configuration that you saved at the end of Part 2. c. Issue the no command for the G0/0 interface on R1 and R3. Step 2: Configure Serial Interfaces. a. Configuration tasks for R1 include the following: Task Specification Points Configure S0/0/0. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Set the encapsulation to HDLC. Set the clocking rate to Activate the interface. b. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 16
69 CCNA: Connecting Networks SA Exam Task Specification Points Configure S0/0/0. Configure S0/0/1. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Set the encapsulation to HDLC. Activate the interface. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Set the encapsulation to HDLC. Set the clocking rate to Activate the interface. c. Configuration tasks for R3 include the following: Task Specification Points Configure S0/0/1. Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Set the encapsulation to HDLC. Activate the interface. Step 3: Configure the GRE VPN tunnel and EIGRP on R1. Configuration tasks for R1 include the following: Create a GRE tunnel interface. Use S0/0/0 as the tunnel source. Set the tunnel destination with the IP address of the R3 S0/0/1 interface. Create a default route out S0/0/0. Task Specification Points Interface: tunnel 0 Set the description. Set the Layer 3 IPv4 address. Refer to Figure 3 at the top of Part 7 for IP address information. Refer to Figure 3 for IP address information. Configure EIGRP on R1 Autonomous System (AS) number: 1 Advertise the LAN and Tunnel subnets in EIGRP. Set the LAN interface to passive. Refer to the GRE VPN topology Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 16
70 CCNA: Connecting Networks SA Exam Step 4: Configure the GRE VPN tunnel and EIGRP on R3. Configuration tasks for R3 include the following: Create a GRE tunnel interface. Use S0/0/1 as the tunnel source. Set the tunnel destination with the IP address of the R1 S0/0/0 interface. Create a default route out S0/0/1. Task Specification Points Interface: tunnel 0 Set the description. Set the Layer 3 IPv4 address. Use the IP address information listed in Figure 3 at the top of Part 7. Refer to Figure 3 at the top of Part 7 for IP address information. Configure EIGRP on R3 Autonomous System (AS) number: 1 Advertise the LAN and Tunnel subnets in EIGRP. Set the LAN interface to passive. Refer to the GRE VPN topology. Step 5: Verify network connectivity. Verify connectivity using the following commands. From Command To Expected Results Points PC-A ping Default gateway Ping should be successful. PC-C ping Default gateway Ping should be successful. PC-A ping PC-C Ping should be successful. R1 traceroute R2 should show up in the traceroute. R1 traceroute R2 should be absent from traceroute. Note: It may be necessary to disable the PC firewall for pings to be successful. Step 6: Verify GRE VPN configuration. Enter the appropriate CLI command needed to display the following: Command Description Student Input (command) Points Display detail information about the GRE tunnel interface. Instructor Sign-off Part 7: Points: of Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 16
71 CCNA: Connecting Networks SA Exam Part 8: Cleanup NOTE: DO NOT PROCEED WITH CLEANUP UNTIL YOUR INSTRUCTOR HAS GRADED YOUR SKILLS EXAM AND HAS INFORMED YOU THAT YOU MAY BEGIN CLEANUP. Before turning off power to the routers: Remove the NVRAM configuration files (if saved) from all devices. Remove the BasicConfig file from flash using the delete flash:basicconfig command. Router Interface Summary Table Router Interface Summary Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface # Fast Ethernet 0/0 (F0/0) 1900 Gigabit Ethernet 0/0 (G0/0) 2801 Fast Ethernet 0/0 (F0/0) 2811 Fast Ethernet 0/0 (F0/0) 2900 Gigabit Ethernet 0/0 (G0/0) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Fast Ethernet 0/1 (F0/1) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/1/0 (S0/1/0) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/1/1 (S0/1/1) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 16
72 Skills Assessment (OSPF) Student Training (Answer Key) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 46
73 Addressing Table Assessment Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/ N/A S0/0/ N/A Lo N/A Lo N/A Lo N/A R2 S0/0/ N/A S0/0/ N/A Lo N/A R3 G0/ N/A S0/0/ N/A Lo N/A Lo N/A Lo N/A S1 VLAN S2 VLAN S3 VLAN PC-A NIC PC-B NIC PC-C NIC Part 1: Initialize Devices (10 points, 5 minutes) Part 2: Configure Device Basic Settings (45 points, 30 minutes) Part 3: Configure LAN Redundancy and Link Aggregation (28 points, 25 minutes) Part 4: Configure OSPFv2 Dynamic Routing Protocol (51 points, 30 minutes) Part 5: Verify Network Connectivity and HSRP Configuration (10 points, 15 minutes) Part 6: Display IOS Image and License Information (6 points, 5 minutes) Scenario In this Skills Assessment (SA), you will create a small network. You must connect the network devices, and configure those devices to support IPv4 connectivity, LAN redundancy, and link aggregation. You will then configure OSPFv2 and HSRP on the network and verify connectivity. Finally, you will demonstrate your knowledge of IOS images and licensing Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 46
74 Instructor Note: For the student version of this exam, the instructor should build the network and connect devices prior to the student starting the exam. This will save time and reduce wear on cables and equipment. The student will need to initialize and reload devices. Scoring is adjusted accordingly. Instructor Note: Sample scoring and estimated times for each exam part are provided. These can be adjusted by the instructor as necessary to suit the testing environment. Total points for the exam are 150 and total time is estimated at 110 minutes. The instructor may elect to deduct points if excessive time is taken for a part of the assessment. Instructor Note: For the initial SBA setup, the routers should have a startup-configuration saved with a hostname (Rtr). The router should also have a loopback address configured. The switches should have a startup-configuration saved with a hostname (Sw) and have VLAN 99 created. These configurations will be used to verify that the student initialized the devices correctly in Part 1, Step 1. It is recommended that these configurations are saved to flash as SBA_Init and used to reset the device for the next student. Instructor Note: The routers used with this SA are Cisco 1941 Integrated Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the SA. Refer to the Router Interface Summary Table at the end of the SA for the correct interface identifiers. Required Resources 3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable) 3 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable) 3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term) Console cable to configure the Cisco IOS devices via the console ports Ethernet and Serial cables as shown in the topology Part 1: Initialize Devices Total points: 10 Time: 5 minutes Step 1: Initialize and reload the routers and switches. Erase the startup configurations and reload the devices. Before proceeding, have your instructor verify device initializations Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 46
75 Task IOS Command Points Erase the startup-config file on all routers. Reload all routers. Erase the startup-config file on all switches and remove the old VLAN database. Reload all switches. Verify VLAN database is absent from flash on all switches. R1# erase startup-config R1# reload (Hostnames should be reset back to Router.) S1# erase startup-config S1# del vlan.dat S1# reload (Hostnames should be reset back to Switch.) S1# show flash (Have student execute the CLI command on the switch.) Instructor Sign-off Part 1: Points: of 10 Part 2: Configure Device Basic Settings Total points: 45 Time: 30 minutes Step 1: Configure R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 46
76 Configuration Item or Task Specification Points Disable DNS lookup Router name R1 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface G0/1 Interface S0/0/0 Interface Loopback 1 (LAN) Interface Loopback 2 (LAN) Interface Loopback 3 (LAN) Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set a clocking rate of Activate Interface Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Instructor Note: Ask the student to connect to R1, and then verify the proper configuration. (1 points) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 46
77 Configuration Item or Task Specification IOS Commands Disable DNS lookup Router name Encrypted privileged EXEC password Console access password Telnet access password Encrypt the plain text passwords. MOTD banner Interface G0/1 Interface S0/0/0 Interface Loopback 1 Interface Loopback 2 Interface Loopback 3 no ip domain lookup hostname R1 enable secret class line con 0 password cisco login line vty 0 4 password cisco login service password-encryption banner Unauthorized Access is interface g0/1 description Connection to S1 ip address no interface s0/0/0 description Connection to R2 ip add clock rate no interface lo1 ip address interface lo2 ip address interface lo3 ip address R1# show run (Look for: no ip domain lookup) (Look for : R1> or R1# command prompt) R1> enable (Type in privileged exec password) R1# exit (Type in access password) R1# show run (Look under line VTY 0 4 for: password 7 121A0C041104) R1# show run (Look for: service passwordencryption) (Verify banner during above step) R1# show ip interface G0/1 (Look for IP address and correct subnet mask) R1# show interface S0/0/0 (Look for Description, Internet address, and verify that interface is not administratively down.) R1# show controllers S0/0/0 (Look for DCE V.35, clock rate ) R1# show ip interface lo1 (Look for IP address and correct subnet mask) R1# show ip interface lo2 (Look for IP address and correct subnet mask) R1# show ip interface lo3 (Look for IP address and correct subnet mask) Step 2: Configure R Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 46
78 Configuration tasks for R2 include the following: Configuration Item or Task Specification Points Disable DNS lookup Router name R2 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface S0/0/0 Interface S0/0/1 Interface Loopback 0 (Simulated Internet connection) Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set a clocking rate of Activate Interface Set the description. Set the Layer 3 IPv4 address to /29. Default route Configure a default route out Lo0. Instructor Note: Ask the student to connect to R2, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 46
79 Configuration Item or Task Specification IOS Commands Disable DNS lookup Router name Encrypted privileged EXEC password Console access password Telnet access password Encrypt the plain text passwords. MOTD banner Interface S0/0/0 Interface S0/0/1 Interface Loopback 0 (Simulated Internet connection) Default route no ip domain lookup hostname R2 enable secret class line con 0 password cisco login line vty 0 4 password cisco login service password-encryption banner Unauthorized Access is interface s0/0/0 description Connection to R1 ip add no interface s0/0/1 description Connection to R3 ip add clock rate no description Connection to Internet ip address ip route lo0 R2# show run (Look for: no ip domain lookup) (Look for : R2> or R2# command prompt) R2> enable (Type in privileged exec password) R2# exit (Type in access password) R2# show run (Look under line VTY 0 4 for: password 7 121A0C041104) R2# show run (Look for: service passwordencryption) (Verify banner during above step) R2# show interface S0/0/0 (Look for Description, Internet address, and verify that interface is not administratively down.) R2# show interface S0/0/1 (Look for Description, Internet address, and verify that interface is not administratively down.) R2# show controllers S0/0/1 (Look for DCE V.35, clock rate ) R2# show run interface lo0 (Verify description, IP address, and subnet mask) R2# show ip route (Look for: Gateway of last resort is to network S* /0 is directly connected, Loopback0) Step 3: Configure R3. Configuration tasks for R3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 46
80 Configuration Item or Task Specification Points Disable DNS lookup Router name R3 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface G0/1 Interface S0/0/1 Interface Loopback 4 (LAN) Interface Loopback 5 (LAN) Interface Loopback 6 (LAN) Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Instructor Note: Ask the student to connect to R3, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 46
81 Configuration Item or Task Specification IOS Commands Disable DNS lookup Router name Encrypted privileged EXEC password Console access password Telnet access password Encrypt the plain text passwords. MOTD banner Interface G0/1 Interface S0/0/1 Interface Loopback 4 Interface Loopback 5 Interface Loopback 6 no ip domain lookup hostname R3 enable secret class line con 0 password cisco login line vty 0 4 password cisco login service password-encryption banner Unauthorized Access is interface g0/1 description Connection to S3 ip address no interface s0/0/1 description Connection to R2 ip add no interface lo4 ip address interface lo5 ip address interface lo6 ip address R3# show run (Look for: no ip domain lookup) (Look for : R3> or R3# command prompt) R3> enable (Type in privileged exec password) R3# exit (Type in access password) R3# show run (Look under line VTY 0 4 for: password 7 121A0C041104) R3# show run (Look for: service passwordencryption) (Verify banner during above step) R3# show ip interface G0/1 (Look for IP address and correct subnet mask, and verify that interface is not administratively down.) R3# show interface S0/0/1 (Look for Description, Internet address, and verify that interface is not administratively down.) R3# show ip interface lo4 (Look for IP address and correct subnet mask) R3# show ip interface lo5 (Look for IP address and correct subnet mask) R3# show ip interface lo6 (Look for IP address and correct subnet mask) Step 4: Configure S1. Configuration tasks for S1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 46
82 Configuration Item or Task Specification Points Disable DNS lookup Switch name S1 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S2 and S3. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Instructor Note: Ask the student to connect to S1, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 46
83 Configuration Item or Task Specification IOS Commands Disable DNS lookup Switch name Encrypted privileged exec password Console access password Telnet access password Encrypt the plain text passwords. MOTD banner Assign an IPv4 address to the default SVI. Assign the defaultgateway. Force trunking on all interfaces connected to S2 and S3. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. no ip domain lookup hostname S1 enable secret class line con 0 password cisco login line vty 0 15 password cisco login service password-encryption banner Unauthorized Access is interface vlan 1 ip address no ip default-gateway interface range f0/1-4 switchport mode trunk switchport trunk native vlan 1 Note: VLAN 1 is the native VLAN by default, the previous command is not necessary. interface range f0/5-24, g0/1-2 switchport mode access Note: The switchport nonegotiate command may have also been issued, this is not incorrect but it is important that these ports have been changed to access ports. interface range f0/7-24, g0/1-2 S1# show run (Look for: no ip domain lookup) (Look for : S1> or S1# command prompt) S1> enable (Type in privileged exec password) S1# exit (Type in access password) S1# show run (Look under line VTY 0 15 for: password 7 121A0C041104) S1# show run (Look for: service passwordencryption) (Verify banner during above step) S1# show ip interface vlan1 (Look for IP address and correct subnet mask) S1# show run section default (Look for ip default-gateway ) S1# show interface trunk (Look to see if interfaces F0/1-4 are listed. If not listed check to see if interfaces are active.) S1# show run begin interface (Look to see if these ports have been set as access switch ports.) S1# show run begin interface (Verify that these ports are administratively.) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 46
84 Step 5: Configure S2. Configuration tasks for S2 include the following: Configuration Item or Task Specification Points Disable DNS lookup Switch name S2 Encrypted privileged exec password class Console access password cisco Telnet access password cisco Encrypt the clear text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S1 and S3. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Instructor Note: Ask the student to connect to S2, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 46
85 Configuration Item or Task Specification IOS Commands Disable DNS lookup Switch name Encrypted privileged EXEC password Console access password Telnet access password Encrypt the plain text passwords. MOTD banner Assign an IPv4 address to the default SVI. Assign the defaultgateway. Force trunking on all interfaces connected to S1 and S3. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. no ip domain lookup hostname S2 enable secret class line con 0 password cisco login line vty 0 15 password cisco login service password-encryption banner Unauthorized Access is interface vlan 1 ip address no ip default-gateway interface range f0/1-4 switchport mode trunk switchport trunk native vlan 1 Note: VLAN 1 is the native VLAN by default, the previous command is not necessary. interface range f0/5-24, g0/1-2 switchport mode access Note: The switchport nonegotiate command may have also been issued, this is not incorrect but it is important that these ports have been changed to access ports. interface range f0/5-17, f0/19-24, g0/1-2 S2# show run (Look for: no ip domain lookup) (Look for : S2> or S2# command prompt) S2> enable (Type in privileged exec password) S2# exit (Type in access password) S2# show run (Look under line VTY 0 15 for: password 7 121A0C041104) S2# show run (Look for: service passwordencryption) (Verify banner during above step) S2# show ip interface vlan1 (Look for IP address and correct subnet mask) S2# show run section default (Look for ip default-gateway ) S2# show interface trunk (Look to see if interfaces F0/1-4 are listed. If not listed check to see if interfaces are active.) S2# show run begin interface (Look to see if these ports have been set as access switch ports.) S2# show run begin interface (Verify that these ports are administratively.) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 46
86 Step 6: Configure S3 Configuration tasks for S3 include the following: Configuration Item or Task Specification Points Disable DNS lookup Switch name S3 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S1 and S2. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Instructor Note: Ask the student to connect to S3, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 46
87 Configuration Item or Task Specification IOS Commands Disable DNS lookup Switch name Encrypted privileged EXEC password Console access password Telnet access password Encrypt the plain text passwords. MOTD banner Assign an IPv4 address to the default SVI. Assign the defaultgateway. Force trunking on all interfaces connected to S1 and S2. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. no ip domain lookup hostname S3 enable secret class line con 0 password cisco login line vty 0 15 password cisco login service password-encryption banner Unauthorized Access is interface vlan 1 ip address no ip default-gateway interface range f0/1-4 switchport mode trunk switchport trunk native vlan 1 Note: VLAN 1 is the native VLAN by default, the previous command is not necessary. interface range f0/5-24, g0/1-2 switchport mode access Note: The switchport nonegotiate command may have also been issued, this is not incorrect but it is important that these ports have been changed to access ports. interface range f0/6-17, f0/19-24, g0/1-2 S3# show run (Look for: no ip domain lookup) (Look for : S3> or S3# command prompt) S3> enable (Type in privileged exec password) S3# exit (Type in access password) S3# show run (Look under line VTY 0 15 for: password 7 121A0C041104) S3# show run (Look for: service passwordencryption) (Verify banner during above step) S3# show ip interface vlan1 (Look for IP address and correct subnet mask) S3# show run section default (Look for ip default-gateway ) S3# show interface trunk (Look to see if interfaces f0/1-4 are listed. If not listed check to see if interfaces are active.) S3# show run begin interface (Look to see if these ports have been set as access switch ports.) S3# show run begin interface (Verify that these ports are administratively.) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 46
88 Step 7: Configure IPv4 addresses on PCs. Configuration Item or Task Specification Points Configure static IPv4 address information on PC-A Configure static IPv4 address information on PC-B Configure static IPv4 address information on PC-C Refer to Addressing Table for IPv4 address information. Refer to Addressing Table for IPv4 address information. Refer to Addressing Table for IPv4 address information. Configuration Item or Task Specification Command Configure static IPv4 address information on PC-A Configure static IPv4 address information on PC-B Configure static IPv4 address information on PC-C IPv4 address: Subnet mask: Default gateway: IPv4 address: Subnet mask: Default gateway: IPv4 address: Subnet mask: Default gateway: ipconfig ipconfig ipconfig Instructor Sign-off Part 2: Points: of 45 Part 3: Configure LAN Redundancy and Link Aggregation Ref lab: Lab Building a Switched Network with Redundant Links Ref lab: Lab Configuring Rapid PVST+, PortFast, and BPDU Guard Ref lab: Lab Configuring HSRP and GLBP Ref lab: Lab Configuring EtherChannel Total points: 28 Time: 25 minutes Step 1: Configure Spanning Tree on S1. Configuration tasks for S1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 46
89 Configuration Item or Task Specification Points Configure Rapid PVST+. Configure as primary root bridge for VLAN 1. Configure PortFast and BPDU Guard on the interface connected to PC-A. Configuration Item or Task Specification IOS Commands Configure Rapid PVST+. Configure as primary root bridge for VLAN 1. Configure PortFast and BPDU Guard on the interface connected to PC-A. spanning-tree mode rapid-pvst spanning-tree vlan 1 root primary interface f0/6 spanning-tree portfast spanning-tree bpduguard enable S1# show spanning-tree summary (Verify that the switch is in rapidpvst mode.) S1# show spanning-tree (Verify that the switch is the root bridge for VLAN 1.) S1# show run interface f0/6 (Verify that portfast and bpduguard have been enabled.) Step 2: Configure Spanning Tree on S2. Configuration tasks for S2 include the following: Configuration Item or Task Specification Points Configure Rapid PVST+. Configure PortFast and BPDU Guard on the interface connected to PC-B. Configuration Item or Task Specification IOS Commands Configure Rapid PVST+. Configure PortFast and BPDU Guard on the interface connected to PC-B spanning-tree mode rapid-pvst interface f0/18 spanning-tree portfast spanning-tree bpduguard enable S2# show spanning-tree summary (Verify that the switch is in rapidpvst mode.) S2# show run interface f0/18 (Verify that portfast and bpduguard have been enabled.) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 46
90 Step 3: Configure Spanning Tree on S3. Configuration tasks for S3 include the following: Configuration Item or Task Specification Points Configure Rapid PVST+. Configure as secondary root bridge for VLAN 1. Configure PortFast and BPDU Guard on the interface connected to PC-C. Configuration Item or Task Specification IOS Commands Configure Rapid PVST+ Configure as secondary root bridge for VLAN 1. Configure PortFast and BPDU Guard on the interface connected to PC-C spanning-tree mode rapid-pvst spanning-tree vlan 1 root secondary interface f0/18 spanning-tree portfast spanning-tree bpduguard enable S3# show spanning-tree summary (Verify that the switch is in rapidpvst mode.) S3# show run section spanning (Verify configuration line: spanning-tree vlan 1 priority ) S3# show run interface f0/18 (Verify that portfast and bpduguard have been enabled.) Step 4: Configure HSRP on R1. Configuration tasks for R1 include the following: Configuration Item or Task Specification Points Configure the HSRP virtual IP address on interface G0/1. Group: 1 Virtual IP address: Make this the primary HSRP router. Configure so this router becomes the primary HSRP router on a reboot Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 46
91 Configuration Item or Task Specification IOS Commands Configure the HSRP virtual IP address on interface G0/1. Make this the primary HSRP router. Configure so this router becomes the primary HSRP router on a reboot. interface g0/1 standby 1 ip standby 1 priority 150 standby 1 preempt R1# show standby (Verify that thel G0/1 interface has been configured with HSRP using Group 1, the interface Virtual IP has a address, and that interface is active.) R1# show standby (Verify that interface G0/1 has been configured with a HSRP priority greater than 100 and that the active router is local.) R1# show standby (Verify that interface G0/1 has Preemption enabled.) Step 5: Configure HSRP on R3. Configuration tasks for R3 include the following: Configuration Item or Task Specification Points Configure the HSRP virtual IP address on interface G0/1. Group: 1 Virtual IP address: Configuration Item or Task Specification IOS Commands Configure the HSRP virtual IP address on interface G0/1. interface g0/1 standby 1 ip R3# show standby (Verify that interface G0/1 has been configured with HSRP using Group 1, the interface Virtual IP address is , and that the interface is in a standby state.) Step 6: Configure an LACP EtherChannel between S1 and S3. Configuration tasks include the following: Configuration Item or Task Specification Points On S1, configure an LACP EtherChannel on interfaces connected to S3. On S3, configure an LACP EtherChannel on interfaces connected to S1. Use group 1 and enable LACP unconditionally. Use group 1 and enable LACP only if a LACP device is detected Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 20 of 46
92 Configuration Item or Task Specification IOS Commands On S1, configure an LACP EtherChannel on interfaces connected to S3. On S3, configure an LACP EtherChannel on interfaces connected to S1. interface range f0/3-4 channel-group 1 mode active interface range f0/3-4 channel-group 1 mode passive S1# show etherchannel summary (Verify that group 1 is connected to interfaces f0/3 and f0/4, and that the status is SU.) S3# show etherchannel summary (Verify that group 1 is connected to interfaces f0/3 and f0/4, and that the status is SU.) Instructor Sign-off Part 3: Points: of 28 Part 4: Configure OSPFv2 Dynamic Routing Protocol Ref lab: Lab - Configuring OSPFv2 on a Multiaccess Network Ref lab: Lab - Configuring OSPFv2 Advanced Features Ref lab: Lab - Configuring Multiarea OSPFv2 Total points: 51 Time: 30 minutes Step 1: Configure OSPFv2 on R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 21 of 46
93 Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Set all LAN interfaces as passive. Configure an inter-area summary route for the networks in area 1. Change the default cost reference bandwidth to support Gigabit interface calculations Use classless network addresses. Assign S0/0/0 and G0/1 interfaces to Area 0. Assign Loopback interfaces to Area 1. Set the bandwidth on S0/0/ Kb/s Adjust the metric cost of S0/0/0. Cost: 7500 Create an OSPF MD5 key on S0/0/0. Apply MD5 authentication to S0/0/0. Key: 1 Password: CISCO Instructor Note: Ask the student to connect to R1, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 22 of 46
94 Configuration Item or Task Specification IOS Commands OSPF Process ID router ospf 1 Router ID router-id Advertise directly connected networks. Set all LAN interfaces as passive. Configure an interarea summary route for the networks in area 1. network area 0 network area 0 network area 1 network area 1 network area 1 passive-interface g0/1 passive-interface lo1 passive-interface lo2 passive-interface lo3 area 1 range Change the default cost reference bandwidth to allow for Gigabit interfaces. auto-cost reference-bandwidth 1000 Set the bandwidth on S0/0/0. Adjust the metric cost of S0/0/0. Create an OSPF MD5 key on S0/0/0. Apply MD5 authentication to S0/0/0. interface s0/0/0 bandwidth 128 ip ospf cost 7500 ip ospf message-digest-key 1 md5 CISCO ip ospf authentication message-digest R1# show ip protocols (Look for: Routing Protocol is "ospf 1") (From output from previous command, look for: Router-ID: ) R1# show run section router ospf (Compare network commands to specifications.) Can also use show ip protocols command. R1# show ip protocols (Look at passive interface section at bottom of output. If not there, then either the network wasn t added or the passive interface command was not applied. Use the show run section router ospf command to verify.) R1# show ip route ospf (Look for the OSPF route: O /22 is a summary, 00:01:01, Null0) R1# show run section router (Look for: auto-cost reference-bandwidth 1000) R1# show interface s0/0/0 (Look for BW 128 Kbit/sec,) R1# show ip ospf interface brief (Look for: Se0/0/ / P2P 1/1) R1# show run interface s0/0/0 (Look for: ip ospf message-digest-key 1 md D2A36) R1# show run interface s0/0/0 (Look for: ip ospf authentication message-digest) Step 2: Configure OSPFv2 on R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 23 of 46
95 Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Propagate the default route to all other OSPF routers. Change the default cost reference bandwidth to allow for Gigabit interfaces Use classless network addresses. All connected networks should be assigned to Area 0 except the Lo0 network. Set the bandwidth on all serial interfaces. 128 Kb/s Adjust the metric cost of S0/0/0. Cost: 7500 Create an OSPF MD5 key on the serial interfaces. Apply MD5 authentication on the serial interfaces. Key: 1 Password: CISCO Instructor Note: Ask the student to connect to R2, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 24 of 46
96 Configuration Item or Task Specification IOS Commands OSPF Process ID router ospf 1 Router ID router-id R2# show ip protocols (Look for: Routing Protocol is "ospf 1") (From output from previous command, look for: Router-ID: ) Advertise directly connected networks. Propagate the default route to all other OSPF routers. network area 0 network area 0 default-information originate R2# show run section router ospf (Compare network commands to specifications.) Can also use show ip protocols command. R2# show run section router ospf (Look for the default-information originate command.) Change the default cost reference bandwidth to allow for Gigabit interfaces. auto-cost reference-bandwidth 1000 R2# show run section router (Look for: auto-cost reference-bandwidth 1000) Set the bandwidth on all serial interfaces. Adjust the metric cost of S0/0/0. Create an OSPF MD5 key on the serial interfaces. Apply MD5 authentication on the serial interfaces. interface s0/0/0 bandwidth 128 interface s0/0/1 bandwidth 128 interface s0/0/0 ip ospf cost 7500 interface s0/0/0 ip ospf message-digest-key 1 md5 CISCO interface s0/0/1 ip ospf message-digest-key 1 md5 CISCO interface s0/0/0 ip ospf authentication messagedigest interface s0/0/1 ip ospf authentication messagedigest R2# show interface s0/0/0 R2# show interface s0/0/1 (Look for BW 128 Kbit/sec,) R2# show ip ospf interface brief (Look for: Se0/0/ / P2P 1/1) R2# show run interface s0/0/0 R2# show run interface s0/0/1 (Look for: ip ospf message-digest-key 1 md D2A36) R2# show run interface s0/0/1 R2# show run interface s0/0/1 (Look for: ip ospf authentication messagedigest) Step 3: Configure OSPFv2 on R3. Configuration tasks for R3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 25 of 46
97 Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Set all LAN interfaces as passive. Configure an inter-area summary route for the networks in area 3. Change the default cost reference bandwidth to support Gigabit interface calculations Use classless network addresses Assign S0/0/1 and G0/1 interfaces to Area 0 Assign Loopback interfaces to Area 3 Set the serial interface bandwidth. 128 Kb/s Create an OSPF MD5 key on S0/0/1. Apply MD5 authentication to S0/0/1. Key: 1 Password: CISCO Instructor Note: Ask the student to connect to R3, and then verify the proper configuration Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 26 of 46
98 Configuration Item or Task Specification IOS Commands OSPF Process ID router ospf 1 Router ID router-id Advertise directly connected networks. Set all LAN (Loopback) interfaces as passive. Configure an interarea summary route for the networks in area 3. network area 0 network area 0 network area 3 network area 3 network area 3 passive-interface g0/1 passive-interface lo4 passive-interface lo5 passive-interface lo6 area 3 range Change the default cost reference bandwidth to allow for Gigabit interfaces. auto-cost reference-bandwidth 1000 Set the bandwidth on S0/0/1. Create an OSPF MD5 key on S0/0/1. Apply MD5 authentication to S0/0/1. interface s0/0/1 bandwidth 128 ip ospf message-digest-key 1 md5 CISCO ip ospf authentication message-digest R3# show ip protocols (Look for: Routing Protocol is "ospf 1") (From output from previous command, look for: Router-ID: ) R3# show run section router ospf (Compare network commands to specifications. Can also use show ip protocols command.) R3# show ip protocols (Look at passive interface section at bottom of output. If not there then either the network wasn t added or the passive interface command was not applied. Use the show run section router ospf command to verify.) R3# show ip route ospf (Look for the OSPF route: O /22 is a summary, 00:01:01, Null0) R3# show run section router (Look for: auto-cost reference-bandwidth 1000) R3# show interface s0/0/1 (Look for BW 128 Kbit/sec,) R3# show run interface s0/0/1 (Look for: ip ospf message-digest-key 1 md D2A36) R3# show run interface s0/0/0 (Look for: ip ospf authentication message-digest) Step 4: Verify network connectivity. Verify that OSPF is functioning as expected. Enter the appropriate CLI command to discover the following information: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 27 of 46
99 Question Response Points What command will display all connected OSPFv2 routers? show ip ospf neighbor What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface? What command displays the OSPF Process ID, Router ID, Address summarizations, Routing Networks, and Passive Interfaces configured on a router? show ip ospf interface brief show ip protocols What command displays only OSPF routes? show ip route ospf What command displays detailed information about the OSPF interfaces, including the authentication method? What command displays the OSPF section of the runningconfiguration? Instructor Sign-off Part 4: Points: of 51 show ip ospf interface show run section router ospf Part 5: Verify Network Connectivity and HSRP Configuration Total points: 10 Time: 15 minutes Use the listed command to verify that network is working as expected. Step 1: Verify end-to-end connectivity. Take corrective action if results are other than expected. From Command To Expected Results Points PC-A ping PC-C Ping should be successful. PC-B ping PC-A Ping should be successful. PC-B ping PC-C Ping should be successful. PC-B ping Default Gateway Ping should be successful. PC-B ping Ping should be successful. PC-B tracert Trace should route through R1. Note: It may be necessary to disable the PC firewall for pings to be successful. Step 2: Verify HSRP is working as expected. Issue the command on R1 G0/1, and then re-issue the following commands to verify that HSRP is working as expected: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 28 of 46
100 From Command To Expected Results Points PC-B ping Ping should not be successful. PC-B ping Default Gateway Ping should be successful. PC-B ping Ping should be successful. PC-B tracert Trace should route through R3. Note: Wait a few seconds before testing after shutting down the interface on R1. Instructor Sign-off Part 5: Points: of 10 Part 6: Display IOS Image and License Information Ref Video: Managing Cisco IOS Images Ref Video: Working with IOS 15 Image Licenses Total points: 6 Time: 5 minutes Enter the appropriate CLI command to discover the following information: Question Response Points What command displays the IOS image that is currently being used by the network device? What command displays the size of an IOS image loaded on a network device? What command displays a summary list of the Technology Package licenses on an ISR-G2 device that includes the current the state of each of those licenses? What command displays the amount of space available to install an additional IOS image to a network device? What command displays a list of all the licenses on an ISR-G2 device? What command would you use to accept the end user license agreement? Instructor Sign-off Part 6: Points: of 6 Part 7: Cleanup show version show flash show version show flash show license config t license accept end user agreement NOTE: DO NOT PROCEED WITH CLEANUP UNTIL YOUR INSTRUCTOR HAS GRADED YOUR SKILLS EXAM AND HAS INFORMED YOU THAT YOU MAY BEGIN CLEANUP. Before turning off power to the routers, remove the NVRAM configuration files (if saved) from all devices. Disconnect and neatly put away all cables that were used in the SA exam Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 29 of 46
101 Router Interface Summary Table Router Interface Summary Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface # Fast Ethernet 0/0 (F0/0) 1900 Gigabit Ethernet 0/0 (G0/0) 2801 Fast Ethernet 0/0 (F0/0) 2811 Fast Ethernet 0/0 (F0/0) 2900 Gigabit Ethernet 0/0 (G0/0) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Fast Ethernet 0/1 (F0/1) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/1/0 (S0/1/0) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/1/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface. Device Configs Router R1 (Final) R1# show run Building configuration... Current configuration : 2361 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R1 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 30 of 46
102 no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Loopback1 ip address interface Loopback2 ip address interface Loopback3 ip address interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 no ip address duplex auto speed auto interface GigabitEthernet0/1 description Connection to S1 ip address standby 1 ip standby 1 priority 150 standby 1 preempt duplex auto speed auto interface Serial0/0/0 description Connection to R2 bandwidth 128 ip address ip ospf authentication message-digest ip ospf message-digest-key 1 md D202A2638 ip ospf cost 7500 clock rate interface Serial0/0/1 no ip address router ospf 1 router-id auto-cost reference-bandwidth Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 31 of 46
103 area 1 range passive-interface GigabitEthernet0/1 passive-interface Loopback1 passive-interface Loopback2 passive-interface Loopback3 network area 0 network area 1 network area 1 network area 1 network area 0 ip forward-protocol nd no ip http server no ip http secure-server control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password 7 070C285F4D06 login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password B180F0B login transport input all scheduler allocate end Router R2 (Final) R2# show run Building configuration... Current configuration : 2056 bytes version 15.2 service timestamps debug datetime msec service timestamps log datetime msec 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 32 of 46
104 service password-encryption hostname R2 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Loopback0 description Conneciton to Internet ip address interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 no ip address duplex auto speed auto interface GigabitEthernet0/1 no ip address duplex auto speed auto interface Serial0/0/0 description Connection to R1 bandwidth 128 ip address ip ospf authentication message-digest ip ospf message-digest-key 1 md D ip ospf cost 7500 interface Serial0/0/1 description Connection to R Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 33 of 46
105 bandwidth 128 ip address ip ospf authentication message-digest ip ospf message-digest-key 1 md B382F2B clock rate router ospf 1 router-id auto-cost reference-bandwidth 1000 network area 0 network area 0 default-information originate ip forward-protocol nd no ip http server no ip http secure-server ip route Loopback0 control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password A login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password F login transport input all scheduler allocate end Router R3 (Final) R3# show run Building configuration... Current configuration : 2278 bytes 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 34 of 46
106 version 15.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname R3 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model memory-size iomem 15 ip cef no ip domain lookup no ipv6 cef multilink bundle-name authenticated interface Loopback4 ip address interface Loopback5 ip address interface Loopback6 ip address interface Embedded-Service-Engine0/0 no ip address interface GigabitEthernet0/0 no ip address duplex auto speed auto interface GigabitEthernet0/1 description Conneciton to S3 ip address standby 1 ip duplex auto speed auto 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 35 of 46
107 interface Serial0/0/0 no ip address clock rate interface Serial0/0/1 description Connection to R2 bandwidth 128 ip address ip ospf authentication message-digest ip ospf message-digest-key 1 md E router ospf 1 router-id auto-cost reference-bandwidth 1000 area 3 range passive-interface GigabitEthernet0/1 passive-interface Loopback4 passive-interface Loopback5 passive-interface Loopback6 network area 0 network area 3 network area 3 network area 3 network area 0 ip forward-protocol nd no ip http server no ip http secure-server control-plane banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password 7 121A0C login line aux 0 line 2 no activation-character no exec transport preferred none transport input all transport output pad telnet rlogin lapb-ta mop udptn v120 ssh stopbits 1 line vty 0 4 password C2E login 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 36 of 46
108 transport input all scheduler allocate end Switch S1 (Final) S1# show run Building configuration... Current configuration : 2599 bytes version 15.0 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname S1 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model system mtu routing 1500 no ip domain-lookup spanning-tree mode rapid-pvst spanning-tree extend system-id spanning-tree vlan 1 priority vlan internal allocation policy ascending interface Port-channel1 switchport mode trunk interface FastEthernet0/1 switchport mode trunk interface FastEthernet0/2 switchport mode trunk interface FastEthernet0/3 switchport mode trunk channel-group 1 mode active 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 37 of 46
109 interface FastEthernet0/4 switchport mode trunk channel-group 1 mode active interface FastEthernet0/5 switchport mode access interface FastEthernet0/6 switchport mode access spanning-tree portfast spanning-tree bpduguard enable interface FastEthernet0/7 switchport mode access interface FastEthernet0/8 switchport mode access interface FastEthernet0/9 switchport mode access interface FastEthernet0/10 switchport mode access interface FastEthernet0/11 switchport mode access interface FastEthernet0/12 switchport mode access interface FastEthernet0/13 switchport mode access interface FastEthernet0/14 switchport mode access interface FastEthernet0/15 switchport mode access interface FastEthernet0/ Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 38 of 46
110 switchport mode access interface FastEthernet0/17 switchport mode access interface FastEthernet0/18 switchport mode access interface FastEthernet0/19 switchport mode access interface FastEthernet0/20 switchport mode access interface FastEthernet0/21 switchport mode access interface FastEthernet0/22 switchport mode access interface FastEthernet0/23 switchport mode access interface FastEthernet0/24 switchport mode access interface GigabitEthernet0/1 switchport mode access interface GigabitEthernet0/2 switchport mode access interface Vlan1 ip address ip default-gateway ip http server ip http secure-server 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 39 of 46
111 banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password login line vty 0 4 password login line vty 5 15 password login end Switch S2 (Final) S2# show run Building configuration... Current configuration : 2464 bytes version 15.0 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname S2 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model system mtu routing 1500 no ip domain-lookup spanning-tree mode rapid-pvst spanning-tree extend system-id vlan internal allocation policy ascending interface FastEthernet0/1 switchport mode trunk interface FastEthernet0/2 switchport mode trunk 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 40 of 46
112 interface FastEthernet0/3 switchport mode trunk interface FastEthernet0/4 switchport mode trunk interface FastEthernet0/5 switchport mode access interface FastEthernet0/6 switchport mode access interface FastEthernet0/7 switchport mode access interface FastEthernet0/8 switchport mode access interface FastEthernet0/9 switchport mode access interface FastEthernet0/10 switchport mode access interface FastEthernet0/11 switchport mode access interface FastEthernet0/12 switchport mode access interface FastEthernet0/13 switchport mode access interface FastEthernet0/14 switchport mode access interface FastEthernet0/15 switchport mode access 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 41 of 46
113 interface FastEthernet0/16 switchport mode access interface FastEthernet0/17 switchport mode access interface FastEthernet0/18 switchport mode access spanning-tree portfast spanning-tree bpduguard enable interface FastEthernet0/19 switchport mode access interface FastEthernet0/20 switchport mode access interface FastEthernet0/21 switchport mode access interface FastEthernet0/22 switchport mode access interface FastEthernet0/23 switchport mode access interface FastEthernet0/24 switchport mode access interface GigabitEthernet0/1 switchport mode access interface GigabitEthernet0/2 switchport mode access interface Vlan1 ip address Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 42 of 46
114 ip default-gateway ip http server ip http secure-server banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password F login line vty 0 4 password F login line vty 5 15 password F login end Switch S3 (Final) S3# show run Building configuration... Current configuration : 2599 bytes version 15.0 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname S3 boot-start-marker boot-end-marker enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 no aaa new-model system mtu routing 1500 no ip domain-lookup spanning-tree mode rapid-pvst spanning-tree extend system-id spanning-tree vlan 1 priority vlan internal allocation policy ascending 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 43 of 46
115 interface Port-channel1 switchport mode trunk interface FastEthernet0/1 switchport mode trunk interface FastEthernet0/2 switchport mode trunk interface FastEthernet0/3 switchport mode trunk channel-group 1 mode passive interface FastEthernet0/4 switchport mode trunk channel-group 1 mode passive interface FastEthernet0/5 switchport mode access interface FastEthernet0/6 switchport mode access interface FastEthernet0/7 switchport mode access interface FastEthernet0/8 switchport mode access interface FastEthernet0/9 switchport mode access interface FastEthernet0/10 switchport mode access interface FastEthernet0/11 switchport mode access interface FastEthernet0/12 switchport mode access interface FastEthernet0/ Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 44 of 46
116 switchport mode access interface FastEthernet0/14 switchport mode access interface FastEthernet0/15 switchport mode access interface FastEthernet0/16 switchport mode access interface FastEthernet0/17 switchport mode access interface FastEthernet0/18 switchport mode access spanning-tree portfast spanning-tree bpduguard enable interface FastEthernet0/19 switchport mode access interface FastEthernet0/20 switchport mode access interface FastEthernet0/21 switchport mode access interface FastEthernet0/22 switchport mode access interface FastEthernet0/23 switchport mode access interface FastEthernet0/24 switchport mode access interface GigabitEthernet0/ Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 45 of 46
117 switchport mode access interface GigabitEthernet0/2 switchport mode access interface Vlan1 ip address ip default-gateway ip http server ip http secure-server banner motd ^C Unauthorized Access is Prohibited ^C line con 0 password login line vty 0 4 password login line vty 5 15 password login end 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 46 of 46
118 Skills Assessment (OSPF) Student Training Exam Topology 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 16
119 SA Exam Addressing Table Assessment Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/ N/A S0/0/ N/A Lo N/A Lo N/A Lo N/A R2 S0/0/ N/A S0/0/ N/A Lo N/A R3 G0/ N/A S0/0/ N/A Lo N/A Lo N/A Lo N/A S1 VLAN S2 VLAN S3 VLAN PC-A NIC PC-B NIC PC-C NIC Part 1: Initialize Devices (10 points, 5 minutes) Part 2: Configure Device Basic Settings (45 points, 30 minutes) Part 3: Configure LAN Redundancy and Link Aggregation (28 points, 25 minutes) Part 4: Configure OSPFv2 Dynamic Routing Protocol (51 points, 30 minutes) Part 5: Verify Network Connectivity and HSRP Configuration (10 points, 15 minutes) Part 6: Display IOS Image and License Information (6 points, 5 minutes) Scenario In this Skills Assessment (SA), you will create a small network. You must connect the network devices, and configure those devices to support IPv4 connectivity, LAN redundancy, and link aggregation. You will then configure OSPFv2 and HSRP on the network and verify connectivity. Finally, you will demonstrate your knowledge of IOS images and licensing Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 16
120 SA Exam Required Resources 3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable) 3 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable) 3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term) Console cable to configure the Cisco IOS devices via the console ports Ethernet and Serial cables as shown in the topology Part 1: Initialize Devices Total points: 10 Time: 5 minutes Step 1: Initialize and reload the routers and switches. Erase the startup configurations and reload the devices. Before proceeding, have your instructor verify device initializations. Task IOS Command Points Erase the startup-config file on all routers. Reload all routers. Erase the startup-config file on all switches and remove the old VLAN database. Reload all switches. Verify VLAN database is absent from flash on all switches. Instructor Sign-off Part 1: Points: of 10 Part 2: Configure Device Basic Settings Total points: 45 Time: 30 minutes Step 1: Configure R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 16
121 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Router name R1 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface G0/1 Interface S0/0/0 Interface Loopback 1 (LAN) Interface Loopback 2 (LAN) Interface Loopback 3 (LAN) Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set a clocking rate of Activate Interface Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. (1 points) Step 2: Configure R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 16
122 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Router name R2 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface S0/0/0 Interface S0/0/1 Interface Loopback 0 (Simulated Internet connection) Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set a clocking rate of Activate Interface Set the description. Set the Layer 3 IPv4 address to /29. Default route Configure a default route out Lo0. Step 3: Configure R3. Configuration tasks for R3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 16
123 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Router name R3 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface G0/1 Interface S0/0/1 Interface Loopback 4 (LAN) Interface Loopback 5 (LAN) Interface Loopback 6 (LAN) Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Step 4: Configure S1. Configuration tasks for S1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 16
124 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Switch name S1 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S2 and S3. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Step 5: Configure S2. Configuration tasks for S2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 16
125 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Switch name S2 Encrypted privileged exec password class Console access password cisco Telnet access password cisco Encrypt the clear text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S1 and S3. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Step 6: Configure S3 Configuration tasks for S3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 16
126 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Switch name S3 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S1 and S2. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Step 7: Configure IPv4 addresses on PCs. Configuration Item or Task Specification Points Configure static IPv4 address information on PC-A Configure static IPv4 address information on PC-B Configure static IPv4 address information on PC-C Refer to Addressing Table for IPv4 address information. Refer to Addressing Table for IPv4 address information. Refer to Addressing Table for IPv4 address information. Instructor Sign-off Part 2: Points: of 45 Part 3: Configure LAN Redundancy and Link Aggregation Total points: 28 Time: 25 minutes Step 1: Configure Spanning Tree on S1. Configuration tasks for S1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 16
127 SA Exam Configuration Item or Task Specification Points Configure Rapid PVST+. Configure as primary root bridge for VLAN 1. Configure PortFast and BPDU Guard on the interface connected to PC-A. Step 2: Configure Spanning Tree on S2. Configuration tasks for S2 include the following: Configuration Item or Task Specification Points Configure Rapid PVST+. Configure PortFast and BPDU Guard on the interface connected to PC-B. Step 3: Configure Spanning Tree on S3. Configuration tasks for S3 include the following: Configuration Item or Task Specification Points Configure Rapid PVST+. Configure as secondary root bridge for VLAN 1. Configure PortFast and BPDU Guard on the interface connected to PC-C. Step 4: Configure HSRP on R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 16
128 SA Exam Configuration Item or Task Specification Points Configure the HSRP virtual IP address on interface G0/1. Group: 1 Virtual IP address: Make this the primary HSRP router. Configure so this router becomes the primary HSRP router on a reboot. Step 5: Configure HSRP on R3. Configuration tasks for R3 include the following: Configuration Item or Task Specification Points Configure the HSRP virtual IP address on interface G0/1. Group: 1 Virtual IP address: Step 6: Configure an LACP EtherChannel between S1 and S3. Configuration tasks include the following: Configuration Item or Task Specification Points On S1, configure an LACP EtherChannel on interfaces connected to S3. On S3, configure an LACP EtherChannel on interfaces connected to S1. Use group 1 and enable LACP unconditionally. Use group 1 and enable LACP only if a LACP device is detected. Instructor Sign-off Part 3: Points: of 28 Part 4: Configure OSPFv2 Dynamic Routing Protocol Total points: 51 Time: 30 minutes Step 1: Configure OSPFv2 on R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 16
129 SA Exam Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Set all LAN interfaces as passive. Configure an inter-area summary route for the networks in area 1. Change the default cost reference bandwidth to support Gigabit interface calculations Use classless network addresses. Assign S0/0/0 and G0/1 interfaces to Area 0. Assign Loopback interfaces to Area 1. Set the bandwidth on S0/0/ Kb/s Adjust the metric cost of S0/0/0. Cost: 7500 Create an OSPF MD5 key on S0/0/0. Apply MD5 authentication to S0/0/0. Key: 1 Password: CISCO Step 2: Configure OSPFv2 on R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 16
130 SA Exam Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Propagate the default route to all other OSPF routers. Change the default cost reference bandwidth to allow for Gigabit interfaces Use classless network addresses. All connected networks should be assigned to Area 0 except the Lo0 network. Set the bandwidth on all serial interfaces. 128 Kb/s Adjust the metric cost of S0/0/0. Cost: 7500 Create an OSPF MD5 key on the serial interfaces. Apply MD5 authentication on the serial interfaces. Key: 1 Password: CISCO Step 3: Configure OSPFv2 on R3. Configuration tasks for R3 include the following: Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Set all LAN interfaces as passive. Configure an inter-area summary route for the networks in area 3. Change the default cost reference bandwidth to support Gigabit interface calculations Use classless network addresses Assign S0/0/1 and G0/1 interfaces to Area 0 Assign Loopback interfaces to Area 3 Set the serial interface bandwidth. 128 Kb/s Create an OSPF MD5 key on S0/0/1. Apply MD5 authentication to S0/0/1. Key: 1 Password: CISCO 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 16
131 SA Exam Step 4: Verify network connectivity. Verify that OSPF is functioning as expected. Enter the appropriate CLI command to discover the following information: Question Response Points What command will display all connected OSPFv2 routers? What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface? What command displays the OSPF Process ID, Router ID, Address summarizations, Routing Networks, and Passive Interfaces configured on a router? What command displays only OSPF routes? What command displays detailed information about the OSPF interfaces, including the authentication method? What command displays the OSPF section of the runningconfiguration? Instructor Sign-off Part 4: Points: of 51 Part 5: Verify Network Connectivity and HSRP Configuration Total points: 10 Time: 15 minutes Use the listed command to verify that network is working as expected. Step 1: Verify end-to-end connectivity. Take corrective action if results are other than expected. From Command To Expected Results Points PC-A ping PC-C Ping should be successful. PC-B ping PC-A Ping should be successful. PC-B ping PC-C Ping should be successful. PC-B ping Default Gateway Ping should be successful. PC-B ping Ping should be successful. PC-B tracert Trace should route through R1. Note: It may be necessary to disable the PC firewall for pings to be successful. Step 2: Verify HSRP is working as expected. Issue the command on R1 G0/1, and then re-issue the following commands to verify that HSRP is working as expected: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 16
132 SA Exam From Command To Expected Results Points PC-B ping Ping should not be successful. PC-B ping Default Gateway Ping should be successful. PC-B ping Ping should be successful. PC-B tracert Trace should route through R3. Note: Wait a few seconds before testing after shutting down the interface on R1. Instructor Sign-off Part 5: Points: of 10 Part 6: Display IOS Image and License Information Total points: 6 Time: 5 minutes Enter the appropriate CLI command to discover the following information: Question Response Points What command displays the IOS image that is currently being used by the network device? What command displays the size of an IOS image loaded on a network device? What command displays a summary list of the Technology Package licenses on an ISR-G2 device that includes the current the state of each of those licenses? What command displays the amount of space available to install an additional IOS image to a network device? What command displays a list of all the licenses on an ISR-G2 device? What command would you use to accept the end user license agreement? Instructor Sign-off Part 6: Points: of 6 Part 7: Cleanup NOTE: DO NOT PROCEED WITH CLEANUP UNTIL YOUR INSTRUCTOR HAS GRADED YOUR SKILLS EXAM AND HAS INFORMED YOU THAT YOU MAY BEGIN CLEANUP. Before turning off power to the routers, remove the NVRAM configuration files (if saved) from all devices. Disconnect and neatly put away all cables that were used in the SA exam Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 16
133 SA Exam Router Interface Summary Table Router Interface Summary Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface # Fast Ethernet 0/0 (F0/0) 1900 Gigabit Ethernet 0/0 (G0/0) 2801 Fast Ethernet 0/0 (F0/0) 2811 Fast Ethernet 0/0 (F0/0) 2900 Gigabit Ethernet 0/0 (G0/0) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Fast Ethernet 0/1 (F0/1) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/1/0 (S0/1/0) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/1/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 16
134 Student: Date: Skills Assessment (OSPF) Student Training Exam Score: (125) Topology 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 16
135 SA Exam Addressing Table Assessment Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/ N/A S0/0/ N/A Lo N/A Lo N/A Lo N/A R2 S0/0/ N/A S0/0/ N/A Lo N/A R3 G0/ N/A S0/0/ N/A Lo N/A Lo N/A Lo N/A S1 VLAN S2 VLAN S3 VLAN PC-A NIC PC-B NIC PC-C NIC Part 1: Initialize Devices (10 points, 5 minutes) Part 2: Configure Device Basic Settings (45 points, 30 minutes) Part 3: Configure LAN Redundancy and Link Aggregation (28 points, 25 minutes) Part 4: Configure OSPFv2 Dynamic Routing Protocol (60 points, 30 minutes) Part 5: Verify Network Connectivity and HSRP Configuration (10 points, 15 minutes) Part 6: Display IOS Image and License Information (6 points, 5 minutes) Scenario In this Skills Assessment (SA), you will create a small network. You must connect the network devices, and configure those devices to support IPv4 connectivity, LAN redundancy, and link aggregation. You will then configure OSPFv2 and HSRP on the network and verify connectivity. Finally, you will demonstrate your knowledge of IOS images and licensing Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 16
136 SA Exam Required Resources 3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable) 3 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable) 3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term) Console cable to configure the Cisco IOS devices via the console ports Ethernet and Serial cables as shown in the topology Part 1: Initialize Devices Total points: 10 Time: 5 minutes Step 1: Initialize and reload the routers and switches. Erase the startup configurations and reload the devices. Before proceeding, have your instructor verify device initializations. Task IOS Command Points Erase the startup-config file on all routers. Reload all routers. Erase the startup-config file on all switches and remove the old VLAN database. Reload all switches. Verify VLAN database is absent from flash on all switches. Instructor Sign-off Part 1: Points: of 10 Part 2: Configure Device Basic Settings Total points: 45 Time: 30 minutes Step 1: Configure R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 16
137 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Router name R1 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface G0/1 Interface S0/0/0 Interface Loopback 1 (LAN) Area 1 Interface Loopback 2 (LAN) Area 1 Interface Loopback 3 (LAN) Area 1 Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set a clocking rate of Activate Interface Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. (1 points) Step 2: Configure R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 16
138 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Router name R2 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface S0/0/0 Interface S0/0/1 Interface Loopback 0 (Simulated Internet connection) Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set a clocking rate of Activate Interface Set the description. Set the Layer 3 IPv4 address to /29. Default route Configure a default route out Lo0. Step 3: Configure R3. Configuration tasks for R3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 16
139 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Router name R3 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Interface G0/1 Interface S0/0/1 Interface Loopback 4 (LAN) Area 3 Interface Loopback 5 (LAN) Area 3 Interface Loopback 6 (LAN) Area 3 Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the description Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Activate Interface Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Set the Layer 3 IPv4 address. Refer to the Addressing Table for IPv4 address information. Step 4: Configure S1. Configuration tasks for S1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 16
140 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Switch name S1 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S2 and S3. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Step 5: Configure S2. Configuration tasks for S2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 16
141 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Switch name S2 Encrypted privileged exec password class Console access password cisco Telnet access password cisco Encrypt the clear text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S1 and S3. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Step 6: Configure S3 Configuration tasks for S3 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 16
142 SA Exam Configuration Item or Task Specification Points Disable DNS lookup Switch name S3 Encrypted privileged EXEC password class Console access password cisco Telnet access password cisco Encrypt the plain text passwords. MOTD banner Unauthorized Access is Prohibited Assign an IPv4 address to the default SVI. Refer to the Addressing Table for IPv4 address information. Assign the default-gateway. Refer to the Addressing Table. Force trunking on interfaces connected to S1 and S2. Disable the Dynamic Trunking Protocol (DTP) on all other ports. Shutdown all unused ports. Use VLAN 1 as the native VLAN. Make sure ports are configured as access ports. Step 7: Configure IPv4 addresses on PCs. Configuration Item or Task Specification Points Configure static IPv4 address information on PC-A Configure static IPv4 address information on PC-B Configure static IPv4 address information on PC-C Refer to Addressing Table for IPv4 address information. Refer to Addressing Table for IPv4 address information. Refer to Addressing Table for IPv4 address information. Instructor Sign-off Part 2: Points: of 45 Part 3: Configure LAN Redundancy and Link Aggregation Total points: 28 Time: 25 minutes Step 1: Configure Spanning Tree on S1. Configuration tasks for S1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 16
143 SA Exam Configuration Item or Task Specification Points Configure Rapid PVST+. Configure as primary root bridge for VLAN 1. Configure PortFast and BPDU Guard on the interface connected to PC-A. Step 2: Configure Spanning Tree on S2. Configuration tasks for S2 include the following: Configuration Item or Task Specification Points Configure Rapid PVST+. Configure PortFast and BPDU Guard on the interface connected to PC-B. Step 3: Configure Spanning Tree on S3. Configuration tasks for S3 include the following: Configuration Item or Task Specification Points Configure Rapid PVST+. Configure as secondary root bridge for VLAN 1. Configure PortFast and BPDU Guard on the interface connected to PC-C. Step 4: Configure HSRP on R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 16
144 SA Exam Configuration Item or Task Specification Points Configure the HSRP virtual IP address on interface G0/1. Group: 1 Virtual IP address: Make this the primary HSRP router. Configure so this router becomes the primary HSRP router on a reboot. Step 5: Configure HSRP on R3. Configuration tasks for R3 include the following: Configuration Item or Task Specification Points Configure the HSRP virtual IP address on interface G0/1. Group: 1 Virtual IP address: Step 6: Configure an LACP EtherChannel between S1 and S3. Configuration tasks include the following: Configuration Item or Task Specification Points On S1, configure an LACP EtherChannel on interfaces connected to S3. On S3, configure an LACP EtherChannel on interfaces connected to S1. Use group 1 and enable LACP unconditionally. Use group 1 and enable LACP only if a LACP device is detected. Instructor Sign-off Part 3: Points: of 28 Part 4: Configure OSPFv2 Dynamic Routing Protocol Total points: 51 Time: 30 minutes Step 1: Configure OSPFv2 on R1. Configuration tasks for R1 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 16
145 SA Exam Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Set all LAN interfaces as passive. Configure an inter-area summary route for the networks in area 1. Change the default cost reference bandwidth to support Gigabit interface calculations Use classless network addresses. Assign S0/0/0 and G0/1 interfaces to Area 0. Assign Loopback interfaces to Area 1. Set the bandwidth on S0/0/ Kb/s Adjust the metric cost of S0/0/0. Cost: 7500 Create an OSPF MD5 key on S0/0/0. Apply MD5 authentication to S0/0/0. Key: 1 Password: CISCO Step 2: Configure OSPFv2 on R2. Configuration tasks for R2 include the following: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 16
146 SA Exam Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Propagate the default route to all other OSPF routers. Change the default cost reference bandwidth to allow for Gigabit interfaces Use classless network addresses. All connected networks should be assigned to Area 0 except the Lo0 network. Set the bandwidth on all serial interfaces. 128 Kb/s Adjust the metric cost of S0/0/0. Cost: 7500 Create an OSPF MD5 key on the serial interfaces. Apply MD5 authentication on the serial interfaces. Key: 1 Password: CISCO Step 3: Configure OSPFv2 on R3. Configuration tasks for R3 include the following: Configuration Item or Task Specification Points OSPF Process ID 1 Router ID Advertise directly connected networks. Set all LAN interfaces as passive. Configure an inter-area summary route for the networks in area 3. Change the default cost reference bandwidth to support Gigabit interface calculations Use classless network addresses Assign S0/0/1 and G0/1 interfaces to Area 0 Assign Loopback interfaces to Area 3 Set the serial interface bandwidth. 128 Kb/s Create an OSPF MD5 key on S0/0/1. Apply MD5 authentication to S0/0/1. Key: 1 Password: CISCO 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 16
147 SA Exam Step 4: Verify network connectivity. Verify that OSPF is functioning as expected. Enter the appropriate CLI command to discover the following information: Question Response Points What command will display all connected OSPFv2 routers? What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface? What command displays the OSPF Process ID, Router ID, Address summarizations, Routing Networks, and Passive Interfaces configured on a router? What command displays only OSPF routes? What command displays detailed information about the OSPF interfaces, including the authentication method? What command displays the OSPF section of the runningconfiguration? Instructor Sign-off Part 4: Points: of 51 Part 5: Verify Network Connectivity and HSRP Configuration Total points: 10 Time: 15 minutes Use the listed command to verify that network is working as expected. Step 1: Verify end-to-end connectivity. Take corrective action if results are other than expected. From Command To Expected Results Points PC-A ping PC-C Ping should be successful. PC-B ping PC-A Ping should be successful. PC-B ping PC-C Ping should be successful. PC-B ping Default Gateway Ping should be successful. PC-B ping Ping should be successful. PC-B tracert Trace should route through R1. Note: It may be necessary to disable the PC firewall for pings to be successful. Step 2: Verify HSRP is working as expected. Issue the command on R1 G0/1, and then re-issue the following commands to verify that HSRP is working as expected: 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 16
148 SA Exam From Command To Expected Results Points PC-A ping PC-C Ping should not be successful. PC-B ping Default Gateway Ping should be successful. PC-B ping Ping should be successful. PC-B tracert Trace should route through R3. Note: Wait a few seconds before testing after shutting down the interface on R1. Instructor Sign-off Part 5: Points: of 10 Part 6: Display IOS Image and License Information Total points: 6 Time: 5 minutes Enter the appropriate CLI command to discover the following information: Question Response Points What command displays the IOS image that is currently being used by the network device? What command displays the size of an IOS image loaded on a network device? What command displays a summary list of the Technology Package licenses on an ISR-G2 device that includes the current the state of each of those licenses? What command displays the amount of space available to install an additional IOS image to a network device? What command displays a list of all the licenses on an ISR-G2 device? What command would you use to accept the end user license agreement? Instructor Sign-off Part 6: Points: of 6 Part 7: Cleanup NOTE: DO NOT PROCEED WITH CLEANUP UNTIL YOUR INSTRUCTOR HAS GRADED YOUR SKILLS EXAM AND HAS INFORMED YOU THAT YOU MAY BEGIN CLEANUP. Before turning off power to the routers, remove the NVRAM configuration files (if saved) from all devices. Disconnect and neatly put away all cables that were used in the SA exam Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 16
149 SA Exam Router Interface Summary Table Router Interface Summary Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface # Fast Ethernet 0/0 (F0/0) 1900 Gigabit Ethernet 0/0 (G0/0) 2801 Fast Ethernet 0/0 (F0/0) 2811 Fast Ethernet 0/0 (F0/0) 2900 Gigabit Ethernet 0/0 (G0/0) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Fast Ethernet 0/1 (F0/1) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/1/0 (S0/1/0) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/1/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 16
150 Skills Exam Notes Router 1 int G0/1 Commands for HSRP R1(config)# int G0/1 R1(config if)# standby 1 ip R1(config if)# standby 1 priority 150 R1(config if)# standby 1 prempt Router 3 int G0/1 Commands for HSRP R3(config)# int G0/1 R3(config if)# standby 1 ip
151 Student: Score: (175 points) Ping Results: (25 points of 175 points) CIS 196a Scaling Networks Skills Exam Check Points (2 points for each item) Router R1: (50 points) hostname R1 enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 interface Loopback1 ip address interface Loopback2 ip address interface Loopback3 ip address interface GigabitEthernet0/1 ip address standby 1 ip standby 1 priority 150 standby 1 preempt interface Serial0/0/0 ip address ip ospf authentication message-digest ip ospf message-digest-key 1 md D202A2638 router ospf 1 router-id area 1 range network area 0 network area 1 network area 1 network area 1 network area 0 end 1
152 Router 2: (40 points) hostname R2 enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 interface Loopback0 ip address interface Serial0/0/0 ip address ip ospf authentication message-digest ip ospf message-digest-key 1 md D ip ospf cost 7500 interface Serial0/0/1 ip address ip ospf authentication message-digest ip ospf message-digest-key 1 md B382F2B clock rate router ospf 1 router-id auto-cost reference-bandwidth 1000 network area 0 network area 0 default-information originate ip route Loopback0 end Router R3: (40 points) hostname R3 enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 interface Loopback4 ip address interface Loopback5 ip address interface Loopback6 ip address
153 interface GigabitEthernet0/1 ip address standby 1 ip interface Serial0/0/1 ip address ip ospf authentication message-digest ip ospf message-digest-key 1 md E router ospf 1 router-id auto-cost reference-bandwidth 1000 area 3 range network area 0 network area 3 network area 3 network area 3 network area 0 end Switch S1: (10 points) hostname S1 enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 interface Vlan1 ip address ip default-gateway Switch S3: (10 points) hostname S3 enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 interface Vlan1 ip address ip default-gateway
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Lab - Using IOS CLI with Switch MAC Address Tables
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12
Lab 5.3.9b Managing Router Configuration Files Using TFTP
Lab 5.3.9b Managing Router Configuration Files Using TFTP Device Host Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Download and install TFTP server software.
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
Objectives. Background. Required Resources. CCNA Security
Chapter 8 Lab B, Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A
Objectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Simple MPLS network topology for Dynamips/Olive
Simple MPLS network topology for Dynamips/Olive R1 version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R1 boot-start-marker
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 R1 Serial 0/0/0 (DCE) 172.17.0.1 255.255.0.0 FastEthernet 0/0 172.16.0.1 255.255.0.0
Brest. Backup : copy flash:ppe_brest1 running-config
Brest Backup : copy flash:ppe_brest1 running-config Cisco SF300-08 Mise en place des services : - Serveurs : 10.3.50.0/24 VLAN 2 (port 1) - DSI : 10.3.51.0/24 VLAN 3 (port 2) - Direction : 10.3.52.0/24
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI
Lab 5.3.5 Configuring Basic Router Settings with the Cisco IOS CLI Device Host Name Interface IP address Subnet mask R1 R1 Serial 0/0/0 (DCE) 172.17.0.1 255.255.0.0 FastEthernet 0/0 172.16.0.1 255.255.0.0
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Lab 3.1.2 Creating a Logical Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500 Objective Use Cisco Discovery Protocol (CDP) commands to get information about neighboring network devices. Background/Preparation CDP
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Lab 4.2.4 Advanced Telnet Operations
Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
Welcome to Todd Lammle s CCNA Bootcamp
Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot
ICND1-100-101 IOS CLI Study Guide (CCENT)
ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:
Lab 8.4.3a Managing Cisco IOS Images with TFTP
Lab 8.4.3a Managing Cisco IOS Images with TFTP Host Device Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Analyze the Cisco IOS image and router flash memory.
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
How To Set Up A Netvanta For A Pc Or Ipad (Netvanta) With A Network Card (Netvina) With An Ipa (Net Vanta) And A Ppl (Netvi) (Netva)
VPN WAN LAN PWR STAT TD RD TD RD TD RD VPN WAN LAN PWR STAT TD RD TD RD TD RD NetVanta 3200 NetVanta 3200 NetVanta Series (with T1/FT1 or T1/FT1 + DSX-1 Network Interface Module) Quick Configuration Guide
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Network Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Lab 6.1.3 Configure Local AAA on Cisco Router
Lab 6.1.3 Configure Local AAA on Cisco Router Objective Scenario Topology In this lab, the students will complete the following tasks: Securing and testing access to the privileged EXEC, VTY, and console
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
Applicazioni Telematiche
Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Cisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands
Lab 5.3.8 Configuring PAT with SDM and Static NAT using Cisco IOS Commands Device Host Name Interface IP Address Subnet Mask R1 CustomerRouter Serial 0/0/0 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet
Figure 1 - T1/E1 Internet Access
Page 1 of 17 TECH NOTE Configuring T1 and E1 Internet Access in AOS Overview This guide explains how to configure an Adtran Operating System (AOS) router for T1/E1 Internet access. You should use this
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
CS3695/M6-109 Lab 8-NPS02 VOIP Sniffing Ver. 8 Rev. 0
Background For this lab, we will be analyzing some Wireshark capture files that were captured using the ARP Poisoning technique on Cisco VIOP (Voice Over IP) phones As this lab took special equipment (i.e.
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Lab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 Customer Serial 0/0/1 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet 0/0 192.168.1.1
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4
APNIC Members Training Course Security workshop 2-4 July, 2008 Port Vila Vanuatu In conjunction with PACNOG 4 Router device security lab 1. APNIC s remote lab In these exercises you will be remotely accessing
Brocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips
Lab 1.2.3 Review of Basic Router Configuration with RIP Objective Cable and configure workstations and routers Setup IP addressing scheme using Class B networks Configure Routing Information Protocol (RIP)
LAB Configuring NAT. Objective. Background/Preparation
LAB Configuring NAT Objective Configure a router to use network address translation (NAT) to convert internal IP addresses, typically private addresses, into outside public addresses. Configure static
Lab 4.5.3 Diagramming Traffic Flows to and from Remote Sites
Lab 4.5.3 Diagramming Traffic Flows to and from Remote Sites Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2
Lab 2.3.2 Configuring OSPF with Loopback Addresses
Lab 2.3.2 Configuring OSPF with Loopback Addresses Objective Configure routers with a Class C IP addressing scheme. Observe the election process for designated routers (DR) and backup designated routers
Enabling Management Protocols: NTP, SNMP, and Syslog
SECTION 7 Enabling Management Protocols: NTP, SNMP, and Syslog In this Section This section describes how to enable basic management protocols on a Cisco AS5800 and Cisco AS5300 as part of a dial access
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 70031 Contents Introduction Prerequisites Requirements Components Used Conventions Related Products
Router Lab Reference Guide
Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and
Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access
Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2
Configuring a Router
CHAPTER 3 Configuring a Router This chapter provides information and commands concerning the following topics: Configuring a router, specifically: Names Passwords Interfaces MOTD banners IP host tables
Configuring the PIX Firewall with PDM
Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 113336 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
Lab: Basic Router Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Def. Gateway R1 Fa0/0 192.168.1.1 255.255.255.0 N/A S0/0/0 192.168.2.1 255.255.255.0 N/A R2 Fa0/0 192.168.3.1 255.255.255.0 N/A
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
ICND1 Lab Guide. 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by
ICND1 Lab Guide 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0 ii Interconnecting Cisco Networking Devices Part 1 100-101 Lab Guide LM20130929/BV2.01 iii 25 Century Blvd. Ste. 500
Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)
CNAP @ VCC 1 of 8 LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes) Objectives: Understand the function of a T1 Service Unit (TSU) in network telecommunications Connect routers
Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
Topic 7 DHCP and NAT. Networking BAsics.
Topic 7 DHCP and NAT Networking BAsics. 1 Dynamic Host Configuration Protocol (DHCP) IP address assignment Default Gateway assignment Network services discovery I just booted. What network is this? What
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Juniper Networks WX Series Large. Integration on Cisco
APPLICATION NOTE Juniper Networks WX Series Large Deployment with WCCP Off-Path Integration on Cisco Integrating Multiple Juniper Networks WX Series Application Acceleration Platforms into a Cisco Infrastructure
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Configuring Basic Settings
CHAPTER 9 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
Network Diagram Scalability Testbed and Configuration Files
APPENDIX A Network Diagram Scalability Testbed and Configuration Files This appendix contains configurations that were used during a V 3 PN performance and scalability evaluation based on the network illustrated
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Basic Router Configuration Using Cisco Configuration Professional
Basic Router Configuration Using Cisco Configuration Professional Document ID: 111999 Contents Introduction Prerequisites Components Used Install Cisco Configuration Professional Router Configuration to
NetVanta Series (with Octal T1/E1 Wide Module)
NET 1 LAN 1 NET 2 LAN 2 WIDE SLOT 1 ACTIVITY TEST NET 1 NET 1 LAN 1 LAN 2 WIDE SLOT 1 NET 2 ACTIVITY TEST LAN 1 NET 2 LAN 2 NET 1 WIDE SLOT 1 ACTIVITY TEST LAN 1 NET 2 LAN 2 WIDE SLOT 1 ACTIVITY TEST NetVanta
Cisco Configuration Professional Quick Start Guide
Cisco Configuration Professional Quick Start Guide April 29, 2011 This document explains how to start using Cisco Configuration Professional Express (Cisco CP Express) and Cisco Configuration Professional
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
NetVanta 3000 Series (with T1/FT1 or T1/FT1 with DSX-1 Network Interface Module)
VPN WAN LAN PWR STAT TD RD TD RD TD RD VPN WAN LAN PWR STAT TD RD TD RD TD RD NetVanta 3000 Series (with T1/FT1 or T1/FT1 with DSX-1 Network Interface Module) Quick Configuration Guide 61200862L1-42A November
Configuring Basic Settings
CHAPTER 10 This chapter describes how to configure basic settings on your ASA that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
Configuring Basic Settings
CHAPTER 12 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Case Study 1: Registering IP Phones with a remote Call
Case Study 1: Registering IP Phones with a remote Call Manager Objectives Place calls from IP Phones under R1 to IP Phones under R2 Place calls from any IP Phone (under R1 and under R2) to the regular
CCNA Security 1.1 Student Lab Manual
1.1 Student Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
TotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
Configuring the Switch with the CLI-Based Setup Program
APPENDIX D Configuring the Switch with the CLI-Based Setup Program This appendix provides a command-line interface (CLI)-based setup procedure for a standalone switch. For product overview information,
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and SDM
Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and SDM Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 Fa0/1 192.168.1.1 255.255.255.0
