Lab Workbook v.1.3 - 1. semestar Lab Workbook v.1.0 - 2.

semestar

 

Polaznik:___________________ Grupa:_____________________ Termin:____________________

  .

3 .Lab Workbook v.1. semestar .1.

  .

..........edunet.................................. 70  Activity 6.2: Establishing a Console Session with HyperTerminal ............................................................................................6........5................................ 98  Lab 9.........................................CCNA Exploration Network Fundamentals: Communicating over the Network Activity 2.0 Subneting .......................................3: Intermediary Device as an End Device ....................... 128  Lab 11.................6.................................4.................................................... 66  Lab 6.......................................................... 156  www..........5.............1: Address Resolution Protocol (ARP) ............................2: Examining ICMP Packets ...................3 IPv4 Address Subnetting Part 1 .......................8.........2: Cisco Switch MAC Table Examination .... 58  Activity: 6.....7..........2: Managing a Web Server ......... 78  Activity 6.....................0................................. 3  Lab 2............................................................................................................. 82  Activity 6.......2: Frame Examination .......................7.................................................................4 Home preparation: IPv4 Address Subnetting Part 2 ....................................................3: Application and Transport Layer Protocols Examination ...1: Media Connectors Lab Activity .....1: Topology Orientation and Building a Small Network .. 116  Lab 10...........8...8.....edunet......1: Basic Cisco Device Configuration .........5............................ 25  Lab 4...hr Page 2 of 165 ....4..2......... 104  Lab 9....2: Managing Device Configuration .5: IPv4 Address Subnetting Part 3 ........ 94  Lab 7. 6  Lab 3.....1: Examining a Device’s Gateway ................7.....hr Page 1 of 165 www...............5. 48  Lab 5........5: Using NeoTrace™ to View Internetworks ..........5: Using NeoTrace™ to View Internetworks Table od contensts: Activity 2........ 136  Lab 11.............6.5............7........................ 112  Lab 9....................................... 90  Lab 8... 121  Lab 10....2.....................1: Creating a Small Lab Topology .........

you will use the Windows embedded tracert utility and then the more enhanced NeoTrace program. To trace the route to a distant network. Tools such as these are usually embedded with the operating system of the end device. Describe the interconnected and global nature of the Internet with respect to data flow. Destination URL: __________________________________________ Destination IP Address: _____________________________________ Scenario Using an Internet connection. The first output line should show the Fully Qualified Domain Name (FQDN) followed by the IP address. How many hops between the source and destination? ________ Figure 1.hr Page 4 of 165 . The traceroute (or tracert) tool is often used for network troubleshooting.2. The displayed list can help identify data flow problems when trying to access a service such as a website.com Background Route tracing computer software is a utility that lists the networks data has to traverse from the user's originating end device to a distant destination network. Examine the output displayed. because this tool operates at the TCP/IP layers that only understand valid IP addresses. It can also be useful when performing tasks such as downloading data. for example. Without this name resolution. Therefore. This network tool is typically executed at the command line as: traceroute <destination network name or end device address> (Unix and similar systems) or tracert <destination network name or end device address> (MS Windows systems) and determines the route taken by packets across an IP network.edunet.2.com from a location in Bavaria. Activity 2. Use tracert and NeoTrace to trace a route from its PC to a distant server. This lab assumes the installation of NeoTrace. The number of routers is known as the number of "hops" the data traveled from source to destination. the IP address of the destination device has to be entered after the tracert command instead of the server name. The Lab Domain Name Service (DNS) server was able to resolve the name to an IP address.cisco. Step 1: Trace the route to a distant network. 1. it allows the user to identify the path taken to reach a particular destination on the network or across internetworks. and examine your output. such as tracert and NeoTrace.5: Using NeoTrace™ to View Internetworks Learning Objectives • • • Explain the use of route tracing programs.cisco. two trace routes between the same source and destination conducted some time apart may produce different results. and examine your output.cisco. First. The first output line shows the FQDN.5: Using NeoTrace™ to View Internetworks Task 1: Trace Route to Remote Server. 2. NeoTrace uses available online information to display graphically the route traced on a global map. Try the same trace route on a PC connected to the Internet. Each router represents a point where one network connects to another network and the packet was forwarded through. 3. Others such as NeoTrace™ are proprietary programs that provide extra information. At the command line prompt. Germany. By showing a list of routers traversed. If DNS is not available. the PC being used must have a working connection to the class/lab network. Number of hops to www. Then there are listings of all routers through which the tracert requests had to pass to get to the destination. type: tracert www. followed by the IP address. This activity should be preformed on a computer that has Internet access and access to a command line. you will use two routing tracing programs to examine the Internet pathway to destination networks. If there are multiple websites (mirrors) available for the same file of data. However.edunet.com: ___________ Step 2: Try another trace route on the same PC. the tracert would have failed. it should be noted that because of the "meshed" nature of the interconnected networks that make up the Internet and the Internet Protocol's ability to select different pathways over which to send packets. a DNS server was able to resolve the name to an IP address. www. one can trace each mirror to get a good idea of which mirror would be the fastest to use.hr Page 3 of 165 www.CCNA Exploration Network Fundamentals: Communicating over the Network Activity 2. tracert Command Figure 1 shows the successful result when running: tracert www.

2. Task 4: Challenge Consider and discuss possible network security issues that could arise from the use of programs like traceroute and NeoTrace. 2. Select each view in turn and note the differences and similarities. www. Alternatively. List View displays the list of routers similar to tracert. The type of media required depends on the type of device being connected. straight–through or patch—cables will be used to connect workstations and switches.com” in the Target field and click Go. Map View on the View menu displays the links and routers in their geographic location on a global map. Task 5: Clean Up Exit the NeoTrace program.CCNA Exploration Network Fundamentals: Communicating over the Network Activity 2. At the Physical layer (Layer 1) of the OSI model. 7. 4. Physically cable a peer-to-peer and switched network.hr Page 5 of 165 www.edunet. Try a number of different URLs and view the routes to those destinations. Consider what technical details are revealed and how perhaps this information could be misused. properly shut down the computer. Lab 2. For this reason. 6. Unless instructed otherwise by your instructor. Switched Network Learning Objectives Upon completion of this lab. See the Challenge section of Activity 1. you will be able to: • • • Correctly identify cables for use in the network. choose Options.2.hr Page 6 of 165 . 5.5(1). Launch the NeoTrace program. 1. Verify basic connectivity on each network. Background Many network problems can be fixed at the Physical layer of a network.edunet. you can click the Advanced button. which enables you to enter the precise latitude and longitude of your location. 3. Follow the instructions to select your country and location in your country. Click the Map tab and in the Home Location section click the Set Home Location button. it is important to have a clear understanding of which cables to use for your network connections.5: Using NeoTrace™ to View Internetworks Task 2: Trace Route using NeoTrace. On the View menu. From the View menu. end devices must be connected by media (cables). Enter “www. In the basic portion of this lab.cisco. Node View from the View menu displays the connections graphically with symbols.6.1: Topology Orientation and Building a Small Network Topology Diagram Peer to Peer Network Task 3: Reflection Review the purpose and usefulness of trace route programs. Relate the displays of the output of NeoTrace to the concept of interconnected networks and the global nature of the Internet.

6.CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. The cables used in this lab are crossover and straight-through. right-click My Network Places. The Network layer (Layer 3) requires a unique address (also know as a logical address or IP Addresses). Select the Internet Protocol (TCP/IP) item and then click the Properties button. 2. On your computer. connect two workstations together.6. Addressing for this lab will be applied to the workstations and will be used to enable communication between the devices.edunet.hr Page 7 of 165 www. Use a crossover cable to connect two workstations to each other through their NIC’s Ethernet port. you will need to identify the types of media you will be using. This is also an Ethernet cable. Step 1: Select a lab partner. two or more devices communicate through an address. click Start. Before the devices can be cabled. The Network Connections window should appear. with icons showing the different network connections. When you look at the plug you will notice that both ends of the cable are exactly the same in each pin position. Step 2: Obtain equipment and resources for the lab. Connect one end of the cable to the NIC port on PC1 and the other end of the cable to PC2. 1. Note: These steps must be completed on each workstation. Equipment needed: 2 workstations 2 straight through (patch) cables 1 crossover cable 1 switch (or hub) Task 2: Identify the Cables used in a Network. Step 2: Apply a Layer 3 address to the workstations. Scenario This lab starts with the simplest form of networking (peer-to-peer) and ends with the lab connecting through a switch. and then click Properties.hr Page 8 of 165 . The instructions are for Windows XP—steps may differ slightly if you are using a different operating system. Step 1: Connect two workstations. Use a straight-through cable to connect the router’s Ethernet port to a switch port or a workstation to a switch port. you will need to follow the step-by-step instructions below.1: Topology Orientation and Building a Small Network CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2.edunet. When you look at the plug you will notice that the orange and green wires are in opposite positions on each end of the cable. Task 3: Cable the Peer-to-peer Network. which allows the data to reach the appropriate destination device. 3.1: Topology Orientation and Building a Small Network In addition. Right-click the Local Area Connection and click Properties. Using the correct Ethernet cable. To complete this task. This is an Ethernet cable. Task 1: Create a Peer-to-Peer Network. Which cable did you use? _______________________________ www.

CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2.6.1: Topology Orientation and Building a Small Network 8.6. 1. 4.hr Page 10 of 165 .hr Page 9 of 165 www. enter this address manually. 2.1: Topology Orientation and Building a Small Network CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. If this address is not automatically entered. and then click Run.3 for PC2. www.168. The DOS command (cmd.1. On your computer.2 for PC1. Close the Local Area Connection Properties window. For the purposes of this lab. The subnet address should be 255. In the IP address box.edunet. On the General tab of the Internet Protocol (TCP/IP) Properties window. enter the IP address 192. select the Use the following IP address option. (Enter the IP address 192.exe) window will appear. Type cmd in the Open box and then click OK.0.255. basic network commands will be entered to allow you to test you computer connections. Click OK. Step 3: Verify connectivity. click Start. 5.1.255.edunet.) 6. Press the tab key and the Subnet mask is automatically entered. You can enter DOS commands using this window.168. 7.

168.edunet. 1. 3. Which cable did you use? ______________________________ Step 3: Verify connectivity. From the PC2 DOS command prompt. 2.2.1: Topology Orientation and Building a Small Network CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. www. type ping 192. connect one end of the cable to the NIC port on the workstation and the other end to a port on the switch.1. On your desktop.3. Verify network connectivity by using the ping command to reach the other workstations attached to the switch. From the PC1 DOS command prompt.) is reachable across an IP network. What is the output of the ping command? ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ Task 4: Connect Your Workstations to the Classroom Lab Switch.hr Page 12 of 165 What is the output of the ping command if you unplug the network cable and ping the other workstation? ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ .hr Page 11 of 165 www. What is the output of the ping command? ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ What is the output of the ping command if you ping an address that is not connected to this network? ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ Step 4: Share a document between PCs. Use the ping command to verify that PC1 can reach PC2 and PC2 can reach PC1. If the ping command displays an error message or doesn’t receive a reply from the other workstation. Note: A hand will be placed under the icon.1.1: Topology Orientation and Building a Small Network The ping command is a computer network tool used to test whether a host (workstation. server.edunet.6. Right-click the folder and click File sharing.6. Possible areas to troubleshoot include: • • Verifying the correct IP addresses on both workstations Ensuring that the correct type of cable is used between the workstations Step 1: Connect workstation to switch. create a new folder and name it test. router. type ping 192. etc.168. troubleshoot as necessary.CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. Step 2: Repeat this process for each workstation on your network. Using the correct cable.

Lab 2. Experiment with Wireshark features and options such as PDU capture and display filtering. For information and to download the program go to .CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. 4.edunet.6.hr Page 14 of 165 .Wireshark. Be able to perform basic PDU capture using Wireshark. the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications. used for network troubleshooting. The test folder should appear. Wireshark was known as Ethereal. It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses for data analysis and troubleshooting.org What could prevent the ping from being sent to the workstations when they are connected through the switch? ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ Scenario To capture PDUs the computer on which Wireshark is installed must have a working connection to the network and Wireshark must be running before any data can be captured. analysis. software and protocol development. you have access through all 7 layers of the OSI model. www. As data streams travel back and forth over the network. On the desktop. and education. double-click My Network Places and then Computers Near Me. You will be able to access this folder across the network.hr Page 13 of 165 www. 5. Double-click the workstation icon. Place a file in the folder. Once you are able to see it and work with the file. Before June 2006. Task 5: Reflection What could prevent a ping from being sent between the workstations when they are directly connected? ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ Background Wireshark is a software protocol analyzer. A packet sniffer (also known as a network analyzer or protocol analyzer) is computer software that can intercept and log data traffic passing over a data network. Wireshark is programmed to recognize the structure of different network protocols.2: Using Wireshark™ to View Protocol Data Units Learning Objectives • • • • Be able to explain the purpose of a protocol analyzer (Wireshark). Be able to perform basic PDU analysis on straightforward network data traffic. or "packet sniffer" application. This enables it to display the encapsulation and individual fields of a PDU and interpret their meaning.http://www.edunet.6.1: Topology Orientation and Building a Small Network 3.

Setting Wireshark to capture packets in promiscuous mode If this feature is NOT checked.hr Page 15 of 165 www.6. those that "pass by" the NIC but are not destined for the computer) are captured. only PDUs destined for this computer will be captured.2: Using Wireshark™ to View Protocol Data Units When Wireshark is launched.. Typically. Note: The capturing of these other PDUs depends on the intermediary device connecting the end device computers on this network. Among those available in Capture Options. routers) throughout these courses. it is necessary to ensure that Wireshark is set to monitor the correct interface. Although this is a useful feature.2: Using Wireshark™ to View Protocol Data Units CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. First. all PDUs destined for this computer AND all those detected by the computer NIC on the same network segment (i. As you use different intermediary devices (hubs.hr Page 16 of 165 . the screen below is displayed. switches. select the network adapter in use.6. There are also a number of other capture filtering and process settings available. Clicking on the Start button starts the data capture process and a message box displays the progress of this process. To start data capture it is first necessary to go to the Capture menu and select the Options choice.edunet.e. Setting Wireshark for network name resolution This option allows you to control whether or not Wireshark translates network addresses found in PDUs into names. If this feature is checked. From the Interface drop down list. www. Then other Options can be set. the name resolution process may add extra PDUs to your captured data perhaps distorting the analysis.edunet.CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. for a computer this will be the connected Ethernet Adapter. The Options dialog provides a range of settings and filters which determines which and how much data traffic is captured. you will experience the different Wireshark results. the two highlighted below are worth examination.

2: Using Wireshark™ to View Protocol Data Units CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2.hr Page 17 of 165 www. The Packet Details pane shows the current packet (selected in the "Packet List" pane) in a more detailed form. This main display window of Wireshark has three panes.6.Wireshark. The PDU (or Packet) Details Pane in the middle of the diagram displays the packet selected in the Packet List Pane in more detail. The PDU (or Packet) Bytes Pane at the bottom of the diagram displays the actual data (in hexadecimal form representing the actual binary) from the packet selected in the Packet List Pane.org was accessed. By clicking on packets in this pane. If you select a line in this pane. the types and number are indicated in the message box Packet Details Pane Packets Bytes Pane The PDU (or Packet) List Pane at the top of the diagram displays a summary of each packet captured. Each line in the Packet List corresponds to one PDU or packet of the captured data.edunet.2: Using Wireshark™ to View Protocol Data Units Packet List Pane As data PDUs are captured. the capture process is terminated and the main screen is displayed. which can be expanded and collapsed. you control what is displayed in the other two panes. this pane will not be examined in detail.hr Page 18 of 165 . The Packet Bytes pane shows the data of the current packet (selected in the "Packet List" pane) in what is known as "hexdump" style. more details will be displayed in the "Packet Details" and "Packet Bytes" panes.6.CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. The example above shows the PDUs captured when the ping utility was used and http://www. However. The protocols and fields of the packet are displayed using a tree. This pane shows the protocols and protocol fields of the selected packet. and highlights the field selected in the Packet Details Pane. www. Packet number 1 is selected in this pane. The examples above show the capture of a ping process and then accessing a web page. when a more in-depth analysis is required this displayed information is useful for examining the binary values and content of PDUs.edunet. In this lab. When the Stop button is clicked.

This file can then be opened in Wireshark for analysis some time in the future without the need to re-capture the same data traffic again. The Packet List pane on Wireshark should now look something like this: Click on each of the four "+" to expand the information.edunet.6. ping the Eagle Server at using the command ping 192. 9. The packet Detail Pane will now be similar to: Look at the packets listed above. 8.2: Using Wireshark™ to View Protocol Data Units The information captured for the data PDUs can be saved in a file. From the command line of the computer. ping the IP address of another network connected and powered on end device on in the lab topology. Step 1: After ensuring that the standard lab topology and configuration is correct. Locate the equivalent packets on the packet list on your computer. The information displayed when a capture file is opened is the same as the original capture. In this case. The Packet Detail pane will now display something similar to: Set the Capture Options as described above in the overview and start the capture process. 7. 12. 11.6.254.168. 14 and 15. If you performed Step 1A above match the messages displayed in the command line window when the ping was issued with the six packets captured by Wireshark.edunet. From the Wireshark Packet List answer the following: What protocol is used by ping? ______________________________ What is the full protocol name? ______________________________ What are the names of the two ping messages? ______________________________ _____________________________________________________________________ Are the listed source and destination IP addresses what you expected? Yes / No Clicking on Continue without Saving closes the file or exits Wireshark without saving the displayed captured data.CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. Why? ___________________________________ Task 1: Ping PDU Capture Step 3: Select (highlight) the first echo request packet on the list with the mouse. stop the packet capture. launch Wireshark on a computer in a lab pod.hr Page 20 of 165 .254. After receiving the successful replies to the ping in the command line window.2: Using Wireshark™ to View Protocol Data Units CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2.hr Page 19 of 165 www. www. we are interested in packet numbers 6. When closing a data capture screen or exiting Wireshark you are prompted to save the captured PDUs. Step 2: Examine the Packet List pane.

CCNA Exploration Network Fundamentals: Communicating over the Network

Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

CCNA Exploration Network Fundamentals: Communicating over the Network

Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

As you can see, the details for each section and protocol can be expanded further. Spend some time scrolling through this information. At this stage of the course, you may not fully understand the information displayed but make a note of the information you do recognize. Locate the two different types of 'Source" and "Destination". Why are there two types? __________________________________________________________________ What protocols are in the Ethernet frame? ____________________________________________________________ As you select a line in the Packets Detail pane all or part of the information in the Packet Bytes pane also becomes highlighted. For example, if the second line (+ Ethernet II) is highlighted in the Details pane the Bytes pane now highlights the corresponding values.

When successfully logged in enter get /pub/eagle_labs/eagle1/chapter1/gaim-1.5.0.exe and press the enter key <ENTER>. This will start downloading the file from the ftp server. The output will look similar to: C:\Documents and Settings\ccna1>ftp eagle-server.example.com Connected to eagle-server.example.com. 220 Welcome to the eagle-server FTP service. User (eagle-server.example.com:(none)): anonymous 331 Please specify the password. Password:<ENTER> 230 Login successful. ftp> get /pub/eagle_labs/eagle1/chapter1/gaim-1.5.0.exe 200 PORT command successful. Consider using PASV. 150 Opening BINARY mode data connection for pub/eagle_labs/eagle1/chapter1/gaim-1.5.0.exe (6967072 bytes). 226 File send OK. ftp: 6967072 bytes received in 0.59Seconds 11729.08Kbytes/sec. When the file download is complete enter quit ftp> quit 221 Goodbye. C:\Documents and Settings\ccna1> When the file has successfully downloaded, stop the PDU capture in Wireshark.

This shows the particular binary values that represent that information in the PDU. At this stage of the course, it is not necessary to understand this information in detail.

Step 4: Go to the File menu and select Close. Click on Continue without Saving when this message box appears. Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed. Locate and note those PDUs associated with the file download. These will be the PDUs from the Layer 4 protocol TCP and the Layer 7 protocol FTP. Identify the three groups of PDUs associated with the file transfer. If you performed the step above, match the packets with the messages and prompts in the FTP command line window. The first group is associated with the "connection" phase and logging into the server. List examples of messages exchanged in this phase.

Task 2: FTP PDU Capture
Step 1: Start packet capture. Assuming Wireshark is still running from the previous steps, start packet capture by clicking on the Start option on the Capture menu of Wireshark. At the command line on your computer running Wireshark, enter ftp 192.168.254.254 When the connection is established, enter anonymous as the user without a password. Userid: anonymous Password: <ENTER> You may alternatively use login with userid cisco and with password cisco.
www.edunet.hr Page 21 of 165

___________________________________________________________________ Locate and list examples of messages exchanged in the second phase that is the actual download request and the data transfer. __________________________________________________________________ ___________________________________________________________________ The third group of PDUs relate to logging out and "breaking the connection". List examples of messages exchanged during this process. __________________________________________________________________ ___________________________________________________________________
www.edunet.hr Page 22 of 165

CCNA Exploration Network Fundamentals: Communicating over the Network

Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

CCNA Exploration Network Fundamentals: Communicating over the Network

Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

Note the similarity between this message exchange and the FTP exchange. Locate recurring TCP exchanges throughout the FTP process. What feature of TCP does this indicate? ___________________________________________________________________ ___________________________________________________________________ Step 3: In the Packet List pane, highlight an HTTP packet that has the notation "(text/html)" in the Info column. In the Packet Detail pane click on the "+" next to "Line-based text data: html" When this information expands what is displayed? ___________________________________________________________________ Examine the highlighted portion of the Byte Panel. This shows the HTML data carried by the packet. When finished close the Wireshark file and continue without saving What are the protocols encapsulated in the frame? ___________________________________________________________________ Highlight the packets containing the user name and password. Examine the highlighted portion in the Packet Byte pane. What does this say about the security of this FTP login process? ___________________________________________________________________ Highlight a packet associated with the second phase. From any pane, locate the packet containing the file name. The filename is: ______________________________ Highlight a packet containing the actual file content - note the plain text visible in the Byte pane. Highlight and examine, in the Details and Byte panes, some packets exchanged in the third phase of the file download. What features distinguish the content of these packets? ___________________________________________________________________ When finished, close the Wireshark file and continue without saving

Step 3: Examine Packet Details. Select (highlight) a packet on the list associated with the first phase of the FTP process. View the packet details in the Details pane.

Task 4: Reflection
Consider the encapsulation information pertaining to captured network data Wireshark can provide. Relate this to the OSI and TCP/IP layer models. It is important that you can recognize and link both the protocols represented and the protocol layer and encapsulation types of the models with the information provided by Wireshark.

Task 5: Challenge
Discuss how you could use a protocol analyzer such as Wireshark to: (1) and (2) Identify data traffic on a network that is requested by users. Troubleshoot the failure of a webpage to download successfully to a browser on a computer.

_____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________

Task 3: HTTP PDU Capture
Step 1: Start packet capture. Assuming Wireshark is still running from the previous steps, start packet capture by clicking on the Start option on the Capture menu of Wireshark. Note: Capture Options do not have to be set if continuing from previous steps of this lab. Launch a web browser on the computer that is running Wireshark. Enter the URL of the Eagle Server of example.com or enter the IP address-192.168.254.254. When the webpage has fully downloaded, stop the Wireshark packet capture. Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed. Locate and identify the TCP and HTTP packets associated with the webpage download.

_____________________________________________________________________________ _____________________________________________________________________________

Task 6: Cleanup
Unless instructed otherwise by your instructor, exit Wireshark and properly shutdown the computer.

www.edunet.hr

Page 23 of 165

www.edunet.hr

Page 24 of 165

CCNA Exploration Network Fundamentals: Communicating over the Network

Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

Lab 3.4.2: Managing a Web Server
Topology Diagram

Learning Objectives
Upon completion of this lab, you will be able to: • • • Download, install, and verify a web server application Verify the default web server configuration file Capture and analyze HTTP traffic with Wireshark

Background
Web servers are an important part of the business plan for any organization with a presence on the Internet. Web browsers are used by consumers to access business web sites. However, web browsers are only half of the communication channel. The other half of the communication channel is web server support. Web server support is a valuable skill for network administrators. Based on a survey by Netcraft in January, 2007, the following table shows the top three web server applications by percent of use:

Web Server Apache Microsoft Sun Scenario

Percent of use 60 % 31 % 1.6 %

In this lab you will download, install, and configure the popular Apache web server. A web browser will be used to connect to the server, and Wireshark will be used to capture the communication. Analysis of the capture will help you understand how the HTTP protocol operates.

Task 1: Download, Install, and Verify the Apache Web Server.
The lab should be configured as shown in the Topology Diagram and logical address table. If it is not, ask the instructor for assistance before proceeding. ftp://eagle-server.example.com/pub/eagle_labs/eagle1/chapter3

Addressing Table Device R1-ISP R2-Central Eagle Server Interface IP Address S0/0/0 Fa0/0 S0/0/0 Fa0/0 N/A N/A 10.10.10.6 10.10.10.5 Subnet Mask Default Gateway 255.255.255.252N/A N/A N/A 192.168.254.253 N/A 172.16.255.254 172.16.255.254 172.16.255.254 255.255.255.25210.10.10.6

Step 1: Install the Apache web server on the pod host computer. 1. Open the folder where the software was saved, and double-click the Apache file to begin installation. Choose default values and consent to the licensing agreement. The next installation step requires customized configuration of the web server, shown in Figure 2.

192.168.254.253255.255.255.0 172.16.255.254 255.255.0.0 192.168.254.254255.255.255.0 172.31.24.254 255.255.255.0 172.16. Pod#.1 255.255.0.0 172.16. Pod#.2 255.255.0.0 172.16.254.1 255.255.0.0

hostPod#A N/A hostPod#B N/A S1-Central N/A

www.edunet.hr www.edunet.hr Page 25 of 165

Page 26 of 165

and connect to the URL of your computer. Click Next. 2. Type cmd. 3. Accept the recommended port and service status.2: Using Wireshark™ to View Protocol Data Units CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2.hr Page 28 of 165 . and then Install. 1. click Next.hr Page 27 of 165 www. Accept the default installation folder. A web page similar to Figure 4 will be displayed if the web server is working properly. Customized Configuration Screen Use the following values: Step 2: Verify the web server.edunet. Note: If a Windows Security Alert is displayed. www. close the screen. Accept the default typical installation. Choose Start > Run and open a command line window.6.CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. Information Network Domain Server Name Administrator’s E-mail Address Value example.edunet. When the installation has finished. the administrator’s e-mail number is ccna10@example. Use the netstat –a command to discover open and connected ports on your computer: C:\>netstat -a Active Connections Proto Local Address Foreign Address TCP GW-desktop-hom:http GW-desktop-hom:0 TCP GW-desktop-hom:epmap GW-desktop-hom:0 TCP GW-desktop-hom:microsoft-ds desktop-hom:0 LISTENING TCP GW-desktop-hom:3389 GW-desktop-hom:0 <output omitted> C:\> State LISTENING LISTENING GWLISTENING * For example. and click Next.com 2.2: Using Wireshark™ to View Protocol Data Units Figure 3. This will permit connections to the web server. Windows Security Alert Figure 2. should be visible on the lower right side of the screen. Open a web browser. 3. The Apache web server monitor icon close to the time. for users 1 through 22. verify that the web server is operating properly on the pod host computer.com IP address of computer ccna*@example. Using the command netstat –a. select unblock. What is the default installation folder? ______________________________________________________________________________ _____ 4. and then click OK. Host B.com The netstat command will display protocol statistics and connection information for this lab computer.6. See Figure 3. if the computer is on Pod 5.

choose notepad.0. and verify the following settings: IP Address 127.hr Page 30 of 165 .conf file. change the line to Listen 127.56. Change the file content to something similar to the following example: <html><body><h1>Welcome to the Pod1HostB Web Server!!!</h1> <center><bold> www. Although this page is sufficient for testing. Right-click the file. something more personal should be displayed.34. For servers without DNS names.html.2/htdocs" <IfModule dir_module> DirectoryIndex index. exempt from access by the web server.2\htdocs.0. The “#” character indicates a comment for system administrators.2: Using Wireshark™ to View Protocol Data Units Figure 4. 4.0. display index. C:\Program Files\Apache Software Foundation\Apache2.0 /8 network range.255.255. Meaning Listen on TCP port 80 for all incoming connections.com ServerName 172. From the pull-down list. Fill in the following table with the results: Figure 5.0 / 8 network address is reserved and is used for local IP addresses.0.conf file.hr Page 29 of 165 www. Web Server Default Page The 127. Apache Web Server Configuration File Step 2: Review the httpd.1 80. The same page should be displayed if the URL is changed to the IP address on the Ethernet interface or to any host IP address in the 127.edunet.0. 1.1.0. See Figure 5. This is the root directory for the web server. To accept connections from only this host. e-mail the web server at this e-mail address.254 127.255.78:80 Listen 80 ServerAdmin ccna2@example. If no page is requested from that directory.html should be present. Open the Apache web server configuration file.6. and choose Open With.0. A system administrator may find the need to verify or modify the default configuration file.0. The file index.0 / 8 network range. If there are problems.1 127.255 127. Scroll down the configuration file.0. Open folder C:\Program Files\Apache Software Foundation\Apache2.6.0.edunet. DirectoryIndex sets the file that Apache will serve if a directory is requested.2:80 DocumentRoot "C:/Program Files/Apache Software Foundation/Apache2. Step 3: Modify the web server default page.0. Step 1: Access the httpd.16.2\conf\httpd.0. use the IP address:port number. Test the web server on several different IP addresses from the 127. Figure 4 shows the default web page from file index.conf.html if it is present.255. Numerous configuration parameters allow the Apache web server to be fully customizable.CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2.0 Status Explanation Value #Listen 12.html </IfModule> Task 2: Verify the Default Web Server Configuration File.2: Using Wireshark™ to View Protocol Data Units CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2.

Instead. Depending on the organization.16 network. 404 Not Found Error Figure 7 contains a captured HTTP session. What are the contents? Task 3: Capture and Analyze HTTP Traffic with Wireshark. as shown in Figure 6.0. open URL http://127. Note that an error message is displayed in the web browser. Wireshark will not capture packets sent from or to the 127. 1.0.conf and change the Listen 80 line to Listen 8080. Finally.2: Using Wireshark™ to View Protocol Data Units CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2.1 error 404 and returned a file not found message to the web browser.html and observed the effect on the web browser output. Deliberately enter a web page that is not on the web server. but the server did not have the file. Open a web browser.6.0 network on a Windows computer.CCNA Exploration Network Fundamentals: Communicating over the Network Lab 2. The web server responded with an HTTP 1. File index.htm was requested from the web server. and set the capture interface to the interface bound to the 172. Figure 6. connect to either a student’s computer or Eagle Server and analyze the data exchange. 3. Start Wireshark. This lab demonstrated how to install and configure the Apache web server. To complete this task. test for proper operation. The interface will not display.com </body></html> Figure 7. and refresh the web browser. and move into the second (middle) Wireshark window. and identify several key configuration parameters.edunet.edunet.html are made and saved. Wireshark was used to capture an HTTP session of a file not found. ________________________________________________________________________ _____ 2. Verify with the netstat command that the new web server TCP port is 8080. Task 5: Reflection Web servers are an important component of e-commerce.0. Step 1: Analyze HTTP traffic. www. Highlight the capture line with the 404 error. As changes to index. Or. Expand the line-based text-data record.0. simply refresh the web browser to view the new content.6. Open a web browser and access URL http://127. Save the file. Wireshark Capture of HTTP Traffic 2. Why does index.2: Using Wireshark™ to View Protocol Data Units Operated by me! </center></bold> Contact web administrator: ccna2@example. the server sent a 404 error.1. The student modified the default web page index.0.hr Page 32 of 165 .html not have to be entered in the URL for the file contents to be displayed? ________________________________________________________________________ _____ Task 4: Challenge Modify the default web server configuration file httpd.1:8080. the network or web administrator has the responsibility of maintaining the corporate web server.hr Page 31 of 165 www. The new default page should be displayed.0. and connect to another computer with an active web server. The web browser simply displayed the server response “The page cannot be found”.

255. ICMPv6.16.255. use the /? options.10.0. UDP. the connection passes through a series of states.254 255.6 Interface IP Address S0/0/0 10. The following table is a summary of TCP states.16. Open a terminal window by clicking on Start | Run.255.16. as shown: C:\> netstat /? <ENTER> Use the output of the netstat /? command as reference to fill in the appropriate option that best matches the description: Option Description Display all connections and listening ports.254.255.0 255. TCPv6. This is a tricky problem.1: Observing TCP and UDP using Netstat Topology Diagram • • Explain common netstat command parameters and outputs.255.254 255.0 172. Task 1: Explain common netstat command parameters and outputs.254.0. or UDPv6.0 255. Display addresses and port numbers in numerical form.1 255.255.252 N/A When netstat statistics are displayed for TCP connections.253 255.edunet.0 N/A 192. If used with the –s option to display per-protocol statistics. Background netstat is an abbreviation for the network statistics utility.0. Passing optional parameters with the command will change output information.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4.5. and press OK.10. Redisplay statistics every five seconds.255.255. September.255. or UDPv6.253 N/A 172. compiled from RFC 793.254 172.10. Addressing Table Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 N/A Eagle Server hostPod#A hostPod#B S1-Central N/A N/A N/A N/A 172. Press CTRL+C to stop redisplaying statistics. Scenario In this lab the student will examine the netstat command on a pod host computer. IPv6. UDP.254 192.1: Observing TCP and UDP using Netstat Learning Objectives Lab 4.6 Subnet Mask Default Gateway 255. the TCP state is displayed.edunet.168.Pod#.168.255. Shows connections for the protocol specified by proto.16.10. During the life of a TCP connection.254 172.255.255.255. Page 33 of 165 www.10. Type cmd. netstat displays incoming and outgoing network connections (TCP and UDP). ICMP.254 172.16.5 N/A 255. Transmission Control Protocol.24. and adjust netstat output options to analyze and understand TCP/IP Transport Layer protocol status. proto may be any of: TCP.10.hr .5.168.31.255. available on both Windows and Unix / Linux computers.16.254. as reported by netstat: www.255. host computer routing table information. Use netstat to examine protocol information on a pod host computer. Redisplay all connections and listening ports every 30 seconds.0 10.Pod#.hr Page 34 of 165 .0.0 192.16.255. proto may be any of: IP.0 255.255.2 172.1 172. TCPv6. Display only open connections. TCP. and interface statistics. To display help information about the netstat command.254.255. 1981.252 10.

The –n option forces netstat to display output in raw format. Foreign Address 127.0. The four terminal windows that will be used for telnet connections to Eagle Server can be relatively small.1:1071 127.0. The venerable telnet command will be used to access Eagle Server network services. Connection Proto Local Address Foreign Address State IP addresses displayed by netstat fall into several categories: IP Address 127. several simultaneous connections will be made with Eagle Server. Write down three TCP and three UDP connections from the netstat –a output.0. How would you respond? C:\> netstat –n Active Connections Proto Local Address TCP 127. but is waiting for a termination request from the local user. The connection should transition quickly through this state.0. port 23 www. Several network services on Eagle Server will respond to a telnet connection.0. The local connection is waiting for a response after sending a connection request. above.120 seconds. The address of the remote device that has a connection with this computer. issue the command netstat –an: C:\> netstat –an <ENTER> Use the window vertical scroll bar to go back and forth between the outputs of the two commands. Refer to the following netstat output.1:1070 TCP 127.FTP server.domain name server.0.0 Remote Address Description This address refers to the local host. and data may be exchanged through the connection.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. Arrange the windows so that all are visible.0. and will normally last between 30 . note that in your table.1 0.5.0. Local address.hr Page 35 of 165 www.0.0.0. This is a normal condition. issue the command netstat –a: C:\> netstat –a <ENTER> A table will be displayed that lists protocol (TCP and UDP). approximately ½ screen width by ¼ screen height. In this task. port 53 FTP. The local connection is waiting a default period of time after sending a connection termination request before closing the connection. or this computer. port 25 TELNET. Compare outputs.SMTP mail server. The local connection is waiting for a confirming connection request acknowledgment. If there are fewer than three connections that translate. From the terminal window. The connection should transition quickly through this state.1:1070 State ESTABLISHED ESTABLISHED _______________________________________________________________________________ _______________________________________________________________________________ Step 2: Establish multiple concurrent TCP connections and record netstat output. Addresses and protocols that can be translated into names are displayed. Step 1: Use netstat to view existing connections. The connection is closed. We will use: • • • • DNS. and State information. The terminal windows that will be used to collect connection information should be ½ screen width by full screen height. noting how well-known port numbers are changed to names.edunet.Telnet server.1:1071 C:\> Task 2: Use netstat to Examine Protocol Information on a Pod Host Computer. Open an additional four terminal windows.edunet.hr Page 36 of 165 .5. A new network engineer suspects that his host computer has been compromised by an outside attack against ports 1070 and 1071. A global address.1: Observing TCP and UDP using Netstat CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. The connection is open. meaning “ANY”. and the corresponding translated port numbers from the netstat –an output.1: Observing TCP and UDP using Netstat State LISTEN ESTABLISHED TIME-WAIT CLOSE-WAIT SYN-SENT SYN_RECEIVED Connection Description The local connection is waiting for a connection request from any remote device. From the terminal window in Task 1. thus providing several protocols to examine with netstat. This is the normal state for the data transfer phase of the connection. port 21 SMTP.0. Foreign address. Multiple connections in SYN_RECEIVED state may indicate a TCP SYN attack.

254.168.254. and issue the netstat –an command.254.2: TCP/IP Transport Layer Protocols.254.168. host computer routing table information.168.254:53 192.5. The netstat utility displays incoming and outgoing network connections (TCP and UDP).168. Type quit <ENTER> to close the session. telnet on port 23.254. Task 4: Challenge.com 53 In the large terminal window. press the <CTRL> ] keys together. In the first telnet terminal window.168.168.5.example. telnet on port 21.hr Page 37 of 165 www. Close Established sessions abruptly (close the terminal window). connections should terminate from inactivity. www.254.168.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. The command for a telnet connection on port 21 is shown below: C:\> telnet eagle-server. a connection may close before all connections have been made.168.1:1688 192. Try to view connections in stages different from ESTABLISHED.edunet.1:1691 192.254:25 192. In the third terminal window. record established connections with Eagle Server. Proto TCP TCP TCP TCP Local Address 192. TCP and UDP Topology Diagram Task 3: Reflection.254:23 State ESTABLISHED ESTABLISHED ESTABLISHED ESTABLISHED Lab 4. In the fourth terminal window. telnet on port 25.1:1694 Foreign Address 192. Microsoft Telnet>. Eventually. telnet to Eagle Server on port 53.hr Page 38 of 165 .254.1:1693 192. and interface statistics.edunet.254:21 192. In the second terminal window. That will bring up the telnet prompt.254.1: Observing TCP and UDP using Netstat Why should telnet to UDP ports fail? _______________________________________________________________________________ _______________________________________________________________________________ To close a telnet connection. Output should look similar to the following. If typing is slow.

255.16. www.10.10. Start an FTP connection to Eagle Server. among others.0.255.2: TCP/IP Transport Layer Protocols.Pod#. it may be downloaded from URL ftp://eagleserver.168. Open a command line window by clicking on Start | Run. A command line window will start the FTP session. If Wireshark has not been loaded on the host pod computer.4. file wireshark-setup0.hr Page 39 of 165 www. 1980.254 172. Background The two protocols in the TCP/IP Transport Layer are the transmission control protocol (TCP). 1980.5.5.edunet.168.0 192.16.255.10.254. /pub/eagle_labs/eagle1/chapter4/s1-central.31.255. analyze TCP and UDP protocol header fields for file transfers between the host computer and Eagle Server. The ability to understand the parts of the TCP and UDP headers and operation are a critical skill for network engineers. For example. and user datagram protocol (UDP). Command line window.255. type cmd.255. TCP and UDP Addressing Table Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 N/A Eagle Server hostPod#A hostPod#B S1-Central N/A N/A N/A N/A 172.252 N/A Learning Objectives • • Identify TCP header fields and operation using a Wireshark FTP session capture. Change the FTP directory to /pub/eagle_labs/eagle1/chapter4/: ftp> cd /pub/eagle_labs/eagle1/chapter4/ Download the file s1-central: ftp> get s1-central When finished.16.Pod#. among others.16.254.Pod#. TCP and UDP CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4.16.255.255.255.16.253 N/A 172. type anonymous.168.254 255.hr Page 40 of 165 .com When prompted for a user id. then press OK. Windows computers use the FTP client.24.10. A window similar to Figure 1 should open. TCP is used to provide Transport Layer support for the HTTP and FTP protocols.10.0 255. to the host computer.255. Scenario Using Wireshark capture. defined in RFC 768. August.255.255.6 Subnet Mask Default Gateway Task 1: Identify TCP Header Fields and Operation using a Wireshark FTP Session Capture.1 172.255.0 255.6 Interface IP Address S0/0/0 10. Type the command: > ftp eagle-server.254 255.0.2: TCP/IP Transport Layer Protocols.254 172.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4.254 172. In this task. the session capture will be analyzed.0. to connect to the FTP server.0 172.254.example.0.253 255.255. Start a Wireshark capture on the interface that has IP address 172.exe. Figure 1. terminate the FTP sessions in each command line window with the FTP quit command: ftp> quit Close the command line window with the command exit: > exit Stop the Wireshark capture. Both protocols support upper-layer protocol communication.5 N/A 255.16.2 172.edunet.0 255.255. defined in RFC 761. TCP sessions are well controlled and managed by information exchanged in the TCP header fields. UDP provides Transport Layer support for domain name services (DNS) and trivial file transfer protocol (TFTP).252 10.10.0 10.com/pub/eagle_labs/eagle1/chapter4/.[1-2]. press <ENTER>. a FTP session will be made to Eagle Server. and the text configuration file for S1-central from Eagle Server will be downloaded. 255.0 N/A 192.1 255. Windows command line utilities ftp and tftp will be used to connect to Eagle Server and download files. Identify UDP header fields and operation using a Wireshark TFTP session capture.254. When prompted for a password. January.255. Step 1: Capture a FTP session.254 192.255. ftp.99.example. When finished.16.255.

The expanded TCP datagram should look similar to Figure 3. Code Bits have a special meaning in session management and in the treatment of segments. Options: The only option currently defined is the maximum TCP segment size (optional value).hr Page 42 of 165 . At the conclusion of the data transfer. File Transfer Protocol (FTP). An explanation of each field is provided to refresh the student’s memory: • • TCP Source port number belongs to the TCP session host that opened a connection.5. a new TCP session is started.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. such as telnet.when the sender needs to send urgent data to the receiver. Window size is the value of the sliding window . Destination IP Address. only set when a new TCP session is negotiated during the TCP threeway handshake). The top window contains summary information for each captured record. __________________________________________________________________________ __________________________________________________________________________ Figure 4. Before delving into TCP packet details. and manage window size. TCP is routinely used during a session to control datagram delivery. when the FTP session is finished TCP performs an orderly shutdown and termination. and move the mouse pointer to the middle window. Destination Port) uniquely identifies the session to both sender and receiver. the Transport Layer protocol TCP created a reliable session. Student capture should be similar to the capture shown in Figure 2. etc). an explanation of the summary information is needed. • SYN (Synchronize. TCP and UDP How is the first datagram in a TCP session identified? Step 2: Analyze the TCP fields. Finally. For each exchange of data between the FTP client and FTP server. Figure 2. HyperText Transfer Protocol (HTTP). a TCP datagram diagram. Highlight the first TCP datagram from the host computer. FTP capture. Destination port number is used to identify the upper layer protocol or application on the remote site. TCP packet fields. The values in the range 0–1023 represent the so called “well known ports” and are associated with popular services and applications (as described in RFC 1700. Switch to the Wireshark capture windows. In Wireshark. Refer to Figure 4. Wireshark capture of a TCP datagram. The quadruple field combination (Source IP Address. www.2: TCP/IP Transport Layer Protocols. When the FTP client is connected to the FTP server. request to close the TCP session). • • • • • • Figure 3. Acknowledgment number specifies the next octet expected by the receiver. Urgent pointer is only used with an URG (Urgent) flag .hr Page 41 of 165 www.edunet. TCP and UDP CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. The value is normally a random value above 1023. Sequence number specifies the number of the last octet in a segment. Source Port. detailed TCP information is available in the middle window.how many octets can be sent before waiting for an acknowledgement. verify datagram arrival.2: TCP/IP Transport Layer Protocols.edunet.5. Among interesting values are: • ACK (Acknowledgement of a segment receipt). the TCP session is closed. It may be necessary to adjust the middle window and expand the TCP record by clicking on the protocol expand box. • FIN (Finish.

TCP session management.hr Page 43 of 165 www. unaware and uncaring that TCP has control and management over the session. announcing the termination of the TCP session. In either case the attacker has won.16. to send a file. Also.___ Destination IP Address: _______________ Source port number: ______________ Destination port number: ______________ Sequence number: ______________ Acknowledgement number: ___________ Header length: ______________ Window size: _______________ From Eagle Server to pod host computer (only SYN and ACK bits are set to 1): Source IP Address: ________________ Destination IP Address: 172. At this time the FTP server TCP session sends a TCP datagram to the FTP client.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. get. such as when the connection is broken. When the FTP session has finished. In this sequence. This sequence is shown in Figure 6. or corrupt the operating system. TCP and UDP CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. networking service has been stopped on the receiver. Figure 5. Step 1: Capture a TFTP session. The default timeout value varies. the opening TCP session sends a TCP datagram with the SYN bit set and the receiver sends a related TCP datagram with the SYN ACK bits set.16. and visible in the Wireshark capture. an ACK datagram is sent to acknowledge the termination and the TCP session is closed. A final ACK bit is never sent to finish the TCP handshake. fill in information about the TCP header: From pod host computer to Eagle Server (only the SYN bit is set to 1): Source IP Address: 172. there are only two commands.edunet. Instead. the TCP session on the FTP client sends an acknowledgment to the TCP session on Eagle Server.5.16. Figure 6.2: TCP/IP Transport Layer Protocols. For example. This sequence is shown in Figure 5. TCP and UDP Using the Wireshark capture of the first TCP session start-up (SYN bit set to 1). www.2: TCP/IP Transport Layer Protocols. open a command line window. there is no authentication. receives a duplicate termination. When the originator of the TCP termination. the FTP client sends a command to “quit”.5. but is normally 5 minutes. the TCP sessions will wait a certain period of time until closing.___ Source port number: ______________ Destination port number: ______________ Sequence number: ______________ Acknowledgement number: ___________ Header length: ______________ Window size: _______________ From pod host computer to Eagle Server (only ACK bit is set to 1): Source IP Address: 172. and put. the receiving computer may exhaust resources and crash. then sends its own TCP session termination. The FTP server acknowledges the FTP termination with a Response :221 Goodbye. Without an orderly termination. The FTP client and server communicate between each other.hr Page 44 of 165 . When the FTP server sends a Response: 220 to the FTP client.edunet.___. Following the procedure in Task 1 above. This is one example of a denial-of-service (DoS) attack. A crash could involve a loss of networking services.___.___ Destination IP Address: _______________ Source port number: ______________ Destination port number: ______________ Sequence number: ______________ Acknowledgement number: ___________ Header length: ______________ Window size: _______________ Ignoring the TCP session started when a data transfer occurred. how many other TCP datagrams contained a SYN bit? __________________________________________________________________________ __________________________________________________________________________ Attackers take advantage of the three-way handshake by initiating a “half-open” connection. a new TCP connection is started in half-open fashion. The FTP client TCP session acknowledges receipt of the termination datagram.___. to retrieve a file. Orderly TCP session termination. The TFTP command has a different syntax than FTP. and is visible in the Wireshark capture. FTP server. Task 2: Identify UDP header fields and operation using a Wireshark TFTP session capture. With sufficient TCP sessions in the half-open state.

Transfers the file destination on the remote host to the file source on the local host. The expanded UDP datagram should look similar to Figure 8. It may be necessary to adjust the middle window and expand the UDP record by clicking on the protocol expand box. denoted by the preceding 0x code: Source IP Address: 172. host GET PUT source destination Figure 8. Student capture should be similar to the capture shown in Figure 7. TCP and UDP >tftp –help Transfers files to and from a remote computer running the TFTP service. Switch to the Wireshark capture windows. The command and syntax to perform this is shown below: >tftp eagle-server. Figure 9.2: TCP/IP Transport Layer Protocols. A TFTP transfer will be used to analyze Transport Layer UDP operation. then download the s1-central configuration file from Eagle Server with the Windows TFTP client. Header information is sparse. In Wireshark. The checksum value is a hexadecimal (base 16) value. Specifies where to transfer the file. In binary image mode the file is moved literally. Using the Wireshark capture of the first UDP datagram. Use this mode when transferring binary files. Summary capture of a UDP session. however.16.5. fill in information about the UDP header. Transfers the file source on the local host to the file destination on the remote host. The TFTP server has it’s own directory on Eagle Server.example. byte by byte. TCP and UDP CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. detailed UDP information is available in the middle window.hr Page 45 of 165 www.2: TCP/IP Transport Layer Protocols. UDP format. Wireshark capture of a UDP datagram. /tftpboot.edunet. There are similarities. TFTP syntax for a Windows TFTP client.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. and move the mouse pointer to the middle window. Each UDP datagram is identified by the UDP source port and UDP destination port. Table 1 contains Windows TFTP client syntax. www. Start a Wireshark capture. compared to the TCP datagram. Specifies the local or remote host. TFTP [-i] host [GET | PUT] source [destination] -i Specifies binary image transfer mode (also called octet). Table 1.hr Page 46 of 165 .edunet.5.___. Highlight the first UDP datagram from the host computer.com get s1-central Step 2: Analyze the UDP fields. which is different from the directory structure supported by the FTP server. Refer to Figure 9. a UDP datagram diagram. No authentication is supported. Specifies the file to transfer.___ Destination IP Address: _______________ Source port number: ______________ Destination port number: ______________ UDP message length: _____________ UDP checksum: _____________ How does UDP verify datagram integrity? __________________________________________________________________________ __________________________________________________________________________ Figure 7.

255. Lab 4. TCP manages communication much differently from UDP.255. but this source port is used for the remainder of the TFTP transfer.10. Both protocols.10.255.16.255. only the original source port used to begin the TFTP session is used to maintain the TFTP transfer.254.255. all data transferred is sent in clear text.0. Task 6: Challenge. Addressing Table Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 N/A Eagle Server hostPod#A hostPod#B S1-Central N/A N/A N/A N/A 172.0 255. Upper-layer TFTP data examination is a bit more complicated.255.16.168.255.0.24.0 255.1 172.Pod#.16.1 255.3: Application and Transport Layer Protocols Examination Topology Diagram Task 5: Reflection.255.0 172.255.255.254 172.255.edunet.168.0 10.6 Subnet Mask Default Gateway 255.0.255.254.16. or clear text file contents.253 N/A 172.10.253 255.252 10.255. and configuration file passwords.16.31.254.edunet.hr Page 47 of 165 www.0 192.10. however. transport data between clients and servers using Application Layer protocols and are appropriate for the upper-layer protocol each supports.16. Fill in information about the UDP header: Source IP Address: Destination IP Address: 172.254.5.0 N/A 192. Since there is no reliable connection.254 255.0. but the data field can be examined and configuration user id and password information extracted.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4.2: TCP/IP Transport Layer Protocols.2 172. UDP has less overhead and control.___ Source port number: ______________ Destination port number: ______________ UDP message length: _____________ UDP checksum: 0x _____________ Notice that the return UDP datagram has a different UDP source port.255. password.10. TCP and UDP Examine the first packet returned from Eagle Server. Analyzing the upper-layer FTP session will quickly identify the user id.hr Page 48 of 165 .0 255.168.254 255. passwords. and the upper-layer protocol must provide some type of acknowledgement control.255. Since neither FTP nor TFTP are secure protocols.16.252 N/A www.16.___.254 172.255.254 172. This lab provided students with the opportunity to analyze TCP and UDP protocol operations from captured FTP and TFTP sessions.255.254 192.10.5.5 N/A 255.Pod#. but reliability and guaranteed delivery requires additional control over the communication channel.255. This includes any user ids.6 Interface IP Address S0/0/0 10.

A web page similar to Figure 3 will be displayed. See Figure 2. This exercise will demonstrate that although clients may differ the underlying communication to the server remains the same. yet each client communicates exclusively with a session established between the client and server. Also examined are popular client requests and corresponding server responses. set the correct Capture Interface. The interface with the IP address of the pod host computer is the correct interface. Eagle-server has several network services preconfigured. Capture and analyze HTTP communication between the pod host computer and a web server. Step 1: Start Wireshark captures.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. such as TCP or UDP. Capture and analyze FTP communication between the pod host computer and an FTP server. HTTP and FTP. 1.5. Wireshark will display captures based on packet type. such as HTTP. Application layer protocols rely on lower level TCP/IP protocols. you will use client applications to connect to eagle-server network services. If it is not. Task 2: Capture and Analyze HTTP Communication Between the Pod Host Computer and a Web Server. Click the web browser Refresh button. and therefore different Transport protocols have been developed to meet these requirements. Open a second web browser. such as a web server and client. 1.com. www. Wireshark should begin to log data. Task 1: Configure the Pod Host Computer to Capture Application Layer Protocols. The lab should be configured as shown in the Topology Diagram and logical address table. you will be able to: • • • • Configure the host computer to capture Application layer protocols.hr Page 49 of 165 www. as well as the FTP command line client.example. You will monitor the communication with Wireshark and analyze the captured packets. relying on lower level protocols such as TCP to establish and manage the communication channel. Observe TCP establish and manage communication channels with HTTP and FTP connections Figure 2. 3. Application layer protocols define the communication between network services.html. A web browser such as Internet Explorer or Firefox will be used to connect to the eagle-server network service. and how Transport Layer protocols TCP and UDP manage the communication channel. ask the instructor for assistance before proceeding. Figure 3.3: Application and Transport Layer Protocols Examination CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4. Using a web browser such as Internet Explorer or Firefox. the interface is used as the default and does not need to be changed.hr Page 50 of 165 .example. HTTP version 1. This will display a different web page. Thereafter. Step 1: Start Wireshark and configure the Capture Interface. A user may open several client applications to the same server. Web Browser Connected to Web Server 2. different applications have different requirements for their data. There may be several servers on the same end device. However. and the server responds to the client. Do not close either browser until Wireshark capture is stopped. 3. Start a Wireshark capture. The web browser will also be used to examine the FTP protocol. HTTP is an Application layer protocol. There should be no change to the display in the web client.3: Application and Transport Layer Protocols Examination Learning Objectives Upon completion of this lab. This lab will examine two popular Application Layer protocols. Wireshark will be used in upcoming tasks. waiting to respond to client requests. and an FTP server and client. This part of the lab will demonstrate how sessions between multiple web clients and the web server are kept separate. Wireshark can be started by clicking the interface Start button. Do not close this web browser until instructed to do so. and connect to URL http://eagleserver.1 is defined in RFC 2616. Wireshark Interface Capture Screen Background The primary function of the Transport Layer is to keep track of multiple application conversations on the same host. connect to URL http://eagleserver. Clients initiate communication to the appropriate server.5.com/page2. For each network service there is a different server listening on a different port for client connections.edunet. Start Wireshark from Start > All Programs > Wireshark > Wireshark.edunet. dated 1999. Stop Wireshark for the moment. Step 2: Start the pod host web browser. Scenario In this lab. 2. When the opening screen appears.

CCNA Exploration Network Fundamentals: OSI Transport Layer

Lab 4.5.3: Application and Transport Layer Protocols Examination

CCNA Exploration Network Fundamentals: OSI Transport Layer

Lab 4.5.3: Application and Transport Layer Protocols Examination

Step 3: Stop Wireshark captures and analyze the captured data. 1. Stop Wireshark captures. 2. Close the web browsers. The resulting Wireshark data will be displayed. There were actually at least three HTTP sessions created in Step 2. The first HTTP session started with a connection to http://eagle-server.example.com. The second session occurred with a refresh action. The third session occurred when the second web browser accessed http://eagle-server.example.com/page2.html.

8. Expand the last protocol record, and any subfields. This is the actual information sent to the web server. Complete the following table using information from the protocol. Protocol Version Request Method * Request URI Language * Request URI is the path to the requested document. In the first browser, the path is the root directory of the web server. Although no page was requested, some web servers are configured to display a default file if one is available. The web server responds with the next HTTP packet. In Figure 4, this is on line 15. A response to the web browser is possible because the web server (1) understands the type of request and (2) has a file to return. Crackers sometimes send unknown or garbled requests to web servers in an attempt to stop the server or gain access to the server command line. Also, a request for an unknown web page will result in an error message. 9. Highlight the web server response, and then move into the second (middle) window. Open all collapsed sub-fields of HTTP. Notice the information returned from the server. In this reply, there are only a few lines of text (web server responses can contain thousands or millions of bytes). The web browser understands and correctly formats the data in the browser window. . 10. What is the web server response to the web client GET request?

Figure 4. Captured HTTP Session A sample captured HTTP session is shown in Figure 4. Before HTTP can begin, the TCP session must be created. This is seen in the first three session lines, numbers 10, 11, and 12. Use your capture or similar Wireshark output to answer the following questions: 3. Fill in the following table from the information presented in the HTTP session:

Web browser IP address Web server IP address Transport layer protocol (UDP/TCP) Web browser port number Web server port number

__________________________________________________________________________
11. What does this response mean?

__________________________________________________________________________
12. Scroll down the top window of Wireshark until the second HTTP session, refresh, is visible. A sample capture is shown in Figure 5.

4. Which computer initiated the HTTP session, and how?

__________________________________________________________________________ __________________________________________________________________________
5. Which computer initially signaled an end to the HTTP session, and how? Figure 5. Captured HTTP Session for Refresh The significance of the refresh action is in the server response, 304 Not Modified. With a single packet returned for both the initial GET request and refresh, the bandwidth used is minimal. However, for an initial response that contains millions of bytes, a single reply packet can save significant bandwidth. Because this web page was saved in the web client’s cache, the GET request contained the following additional instructions to the web server: If-modified-since: Fri, 26 Jan 2007 06:19:33 GMT\r\n If-None-Match: “98072-b8-82da8740”\r\n <- page tag number (ETAG)

___________________________________________________________________________ ___________________________________________________________________________
6. Highlight the first line of the HTTP protocol, a GET request from the web browser. In Figure 4 above, the GET request is on line 13. Move into the second (middle) Wireshark window to examine the layered protocols. If necessary, expand the fields. 7. Which protocol is carried (encapsulated) inside the TCP segment?

___________________________________________________________________________

www.edunet.hr

Page 51 of 165

www.edunet.hr

Page 52 of 165

CCNA Exploration Network Fundamentals: OSI Transport Layer

Lab 4.5.3: Application and Transport Layer Protocols Examination

CCNA Exploration Network Fundamentals: OSI Transport Layer

Lab 4.5.3: Application and Transport Layer Protocols Examination

13. What is the ETAG response from the web server?

2. The FTP client prompt is ftp>. This means that the FTP client is waiting for a command to send to the FTP server. To view a list of FTP client commands, type help <ENTER>: ftp> help Commands may be abbreviated. ! ? append ascii bell binary bye cd close delete debug dir disconnect get glob hash help lcd Commands are: prompt put pwd quit quote recv remotehelp rename rmdir send status trace type user verbose

__________________________________________________________________________

Task 3: Capture and Analyze FTP Communication Between the Pod Host Computer and a Web Server.
The Application layer protocol FTP has undergone significant revision since it first appeared in RFC 114, in 1971. FTP version 5.1 is defined in RFC 959, dated October, 1985. The familiar web browser can be used to communicate with more than just the HTTP server. In this task, the web browser and a command line FTP utility will be used to download data from an FTP server.

literal ls mdelete mdir mget mkdir mls mput open

Unfortunately, the large number of FTP client commands makes using the command line utility difficult for a novice. We will only use a few commands for Wireshark evaluation.

3. Type the command dir to display the current directory contents: ftp> dir 200 PORT command successful. Consider using PASV. 150 Here comes the directory listing. drwxr-xr-x 3 0 0 4096 Jan 12 04:32 pub Figure 6. Windows Command Line Screen In preparation for this task, open a command line on the host pod computer. This can be accomplished by clicking Start > Run, then typing CMD and clicking OK. A screen similar to Figure 6 will be displayed. Step 1: Start Wireshark captures. If necessary, refer to Task 1, Step 2, to open Wireshark. Step 2: Start the pod host command line FTP client. 1. Start a pod host computer FTP session with the FTP server, using the Windows FTP client utility. To authenticate, use userid anonymous. In response to the password prompt, press <ENTER>. >ftp eagle-server.example.com Connected to eagle-server.example.com. 220 Welcome to the eagle-server FTP service. User (eagle-server.example.com:(none)): anonymous 331 Please specify the password. Password: <ENTER> 230 Login successful. ftp> cd pub/eagle_labs/eagle1/chapter2 250 Directory successfully changed. ftp> dir 200 PORT command successful. Consider using PASV. 150 Here comes the directory listing. -rw-r--r-- 1 0 100 5853 Jan 12 04:26 ftptoeagle-server.pcap -rw-r--r-- 1 0 100 4493 Jan 12 04:27 http to eagle-server.pcap -rw-r--r-- 1 0 100 1486 Jan 12 04:27 ping to 192.168.254.254.pcap -rw-r--r-- 1 0 100 15163750 Jan 12 04:30 wireshark-setup-0.99.4.exe 226 Directory send OK. ftp: 333 bytes received in 0.04Seconds 8.12Kbytes/sec. ftp> get "ftptoeagle-server.pcap" 200 PORT command successful. Consider using PASV. 150 Opening BINARY mode data connection for ftptoeagle-server.pcap (5853 bytes). 226 File send OK. ftp: 5853 bytes received in 0.34Seconds 17.21Kbytes/sec. ftp> quit 221 Goodbye. 5. Close the command line window with the exit command. 6. Stop Wireshark captures, and save the captures as FTP_Command_Line_Client. The FTP client is at the root directory of the FTP server. This is not the real root directory of the server—only the highest point that user anonymous can access. User anonymous has been placed into a root jail, prohibiting access outside of the current directory. 4. Subdirectories can be traversed, however, and files transferred to the pod host computer. Move into directory pub/eagle_labs/eagle1/chapter2, download a file, and exit.

www.edunet.hr

Page 53 of 165

www.edunet.hr

Page 54 of 165

CCNA Exploration Network Fundamentals: OSI Transport Layer

Lab 4.5.3: Application and Transport Layer Protocols Examination

CCNA Exploration Network Fundamentals: OSI Transport Layer

Lab 4.5.3: Application and Transport Layer Protocols Examination

Step 3: Start the pod host web browser. 1. Start Wireshark captures again.

3. Move into the middle Wireshark window and expand the FTP protocol. FTP communicates using codes, similar to HTTP.

What is the FTP server response 220?

____________________________________________________________________________
When the FTP server issued a Response: 331 Please specify the password, what was the web browser reply?

____________________________________________________________________________
Which port number does the FTP client use to connect to the FTP server port 21?

____________________________________________________________________________
Figure 7. Web Browser Used as an FTP Client 2. Open a web browser as shown in Figure 7, and type in URL ftp://eagleserver.example.com. A browser window opens with the pub directory displayed. Also, the web browser logged into the FTP server as user Anonymous as shown on the bottom of the screen capture. 3. Using the browser, go down the directories until the URL path is pub/eaglelabs/eagle1/chapter2. Double-click the file ftptoeagle-server.pcap and save the file. 4. When finished, close the web browser. 5. Stop Wireshark captures, and save the captures as FTP_Web_Browser_Client. Step 4: Stop Wireshark captures and analyze the captured data. 1. If not already opened, open the Wireshark capture FTP_Web_Browser_Client. 2. On the top Wireshark window, select the FTP capture that is the first FTP protocol transmission, Response: 220. In Figure 8, this is line 23. 4. Open the Wireshark capture FTP_Web_Browser_Client, and observe the FTP communication. Although the clients are different, the commands are similar. Step 5: FTP active and passive transfer modes The implications between the two modes are very important from an information security perspective. The transfer mode sets how the data port is configured. In active transfer mode, a client initiates an FTP session with the server on well-known TCP port 21. For data transfer, the server initiates a connection from well-known TCP port 20 to a client’s high port, a port number above 1023. See Figure 9. When data is transferred or with simple directory listings, a new port is opened. This is called the transfer mode. The transfer mode can be either active or passive. In active mode, the server opens a TCP session to the FTP client and transfers data across that port. The FTP server source port number is 20, and the FTP client port number is some number above 1023. In passive mode, however, the client opens a new port to the server for data transfer. Both port numbers are above 1023. What is the FTP-DATA port number used by the FTP server?

____________________________________________________________________________

Figure 9. Unless the FTP client firewall is configured to permit connections from the outside, data transfer may fail. To establish connectivity for data transfer, the FTP client must permit either FTP-related connections (implying stateful packet filtering), or disable blocking. Figure 8. Wireshark Capture of an FTP Session with a Web Browser In passive transfer mode, a client initiates an FTP session with the server on well-known TCP port 21, the same connection used in the active transfer mode. For data transfer, however, there are two significant changes. First, the client initiates the data connection to the server. Second, high ports are used on both ends of the connection. See Figure 10.

www.edunet.hr

Page 55 of 165

www.edunet.hr

Page 56 of 165

10. While only HTTP and FTP were examined.254 172.16.255.31.16.255.255.254 172.255.253 N/A 172. FTP.0 255.1 172. HTTP uses a single protocol to communicate with the HTTP server.1: Examining a Device’s Gateway Topology Diagram Figure 10.0 www.255.16.10.254. Not all FTP client applications support changes to the transfer mode.Pod#.0 255.255.254.254 255.255.255. A client application may be either a web browser or command line utility.10.5. sending requests and processing replies. The FTP server listens on TCP port 21.252 N/A ____________________________________________________________________________ ____________________________________________________________________________ 192. Telnet and Gopher may also be supported on the browser. How is the Application layer protocol Telnet similar to HTTP and FTP? How is TELNET different? Addressing Table Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 N/A Eagle Server hostPod#A hostPod#B S1-Central N/A N/A N/A N/A 192.0.10.CCNA Exploration Network Fundamentals: OSI Transport Layer Lab 4.253 255. but each must send and receive messages that can be correctly interpreted.edunet.6 Subnet Mask Default Gateway 255.5 172.3: Application and Transport Layer Protocols Examination Lab 5.254 N/A 255.0.6 255.255.0 10.254. Unless the FTP server is configured to permit a connection to a random high port. however.0. User Anonymous normally has restricted access to the FTP server and cannot upload files.10. TCP manages the connection between client and server to ensure datagram delivery. This document is Cisco Public Information.10.hr Page 57 of 165 All contents are Copyright © 1992–2007 Cisco Systems.255. data transfer will fail.16.255.2 172.168. The browser acts as a client to the server.0 N/A 192.255.24.168. as the command line. use a web browser or command line Telnet client to connect to a Cisco device such as S1-Central or R2-Central.0 172.255.255.252 10. The FTP client must authenticate to the FTP server. Task 5: Challenge Enabling Wireshark capture.255. An HTTP session begins when a request is made to the HTTP server and ends when the response has been acknowledged by the HTTP client.255.Pod#. Inc.168.5. Depending on the transfer mode. even if the authentication is open to the world. however. Issue a GET request and observe the results.255.254 Interface IP Address S0/0/0 10.0 255. lasts until the client signals that it is leaving with the quit command.254 172.254. Page 58 of 165 . uses two protocols. An FTP session.16. Observe the Telnet protocol behavior.0. All rights reserved.16. Task 4: Reflection Both HTTP and FTP protocols rely on TCP to communicate. The server listens on port 80 for client connections. the server or client may initiate the data connection. The communication protocol is normally defined in an RFC.255.16.1 255. Multiple Application layer protocols can be accessed through a simple web browser.

.1. network configuration on a pod host computer will be verified.2 1 Default Gateway: 172. Gateway addresses are very important to users..0. Was the ping successful? __________ Figure 1. The network portion of the destination device is the same as the network portion of the host device.0. the gateway address is the address of the Ethernet device.. Figure 1 shows two devices on the same network communicating with the ping command. the netstat –r command is used to view the gateway addresses for this computer. 0. ____________________________________________________________________________ There are several Windows commands that will display a network gateway address.255. This entry is highlighted in green.. Any device that has the same network address—in this example.. The network portion of the IP address is used to identify when a packet must be sent to a gateway address.0.2 172. More specific networks are reached through other gateway addresses. what is the MAC address of the network device on IP address 172. is automatically assigned to the 127.0 0. Finally. Troubleshoot a hidden gateway address problem.0—is on the same LAN.0 and 0.254 as the default gateway.1..0.. For any non-local network.16...255.255..0. devices on different networks have different source and destination network numbers.0.16... you will be able to: • • • Understand and explain the purpose of a gateway address.2 20 172.2 172.254 ======================================================================= Persistent Routes: None C:\> Background An IP address is composed of a network portion and a host portion. One purpose of a router is to serve as an entry point for packets coming into the network and exit point for packets leaving the network. connectivity with Eagle Server will fail.255 172.0. Cisco estimates that 80 percent of network traffic will be destined to devices on other networks.hr Page 60 of 165 . What is the default gateway address? ____________________________________________________________________________ Step 2: Use the ping command to verify connectivity with IP address 127. Step 1: Open a terminal window on a pod host computer.CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6.. called the loopback interface.255.1? Learning Objectives Upon completion of this lab.0.1.0 172.255 255.0.255.0.edunet. www.0.16.1 127.0.0. A computer that communicates with another device must first know how to reach the device..255 255.0 172.0.255.16.16.0.255... This interface is used to identify the local host to local network services.hr Page 59 of 165 www.16. Task 1: Understand and Explain the Purpose of a Gateway Address.0. and only 20 percent of network traffic will go to local devices.0 is accessed through gateway 172.0.1 1 172.0 network. One popular command is netstat –r.0. However.0.255.2 255.16.0. Therefore.0.16. For devices on the same local area network (LAN). A local interface. if a gateway cannot be reached by the LAN devices. If the pod host computer gateway address is not configured properly. Using several common utilities.0. Understand how network information is configured on a Windows computer. The top highlight shows what gateway address is used to forward all network packets destined outside of the LAN... Refer to the gray highlighted entry..255.0.0 255. the IP address for this Ethernet interface. users will not be able to perform their job.255.0. Scenario Pod host computers must communicate with Eagle Server.0 Subneting CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6.1.16.16.0.1. but Eagle Server is located on a different network.1.0.2 1 127..0.16.1. C:\>netstat –r Route Table ======================================================================= Interface List 0x1 .255... Communication Between LAN Devices For local area network (LAN) traffic..1. 172..1 20 172.0 127.0.255 172. The ”quad-zero” Network Destination and Netmask values. This is called the 80/20 rule. this computer will use 172. the host portion of the IP address is used as the identifier.0.00 16 76 ac a7 6a Intel(R) 82562V 10/100 Network Connection ======================================================================= ======================================================================= Active Routes: Network Destination Netmask Gateway Interface Metric 0.255.1.254 172. The second yellow highlight displays the information in human-readable form.16.255.0.1.0 255. refer to any network not specifically known.16.255 127.0 Subneting Referring to Figure 1. In the following transcript.16. which is assigned to a network device that forwards packets between distant networks.16.1.16. MS TCP Loopback interface 0x20005 .1 127.2 172...2.2 20 255.16.0. A router is assigned the gateway address for all the devices on the LAN.edunet. any device on network 172.

0.1.168.255. Referring to Figure 2. Were responses successful? If not. All traffic destined to different networks must go through the network device that has the default gateway address.0. Network Interface with Static IP Address Step 1: Examine network properties settings.254.0. Click Start > Control Panel > Network Connections. Pod host computer #2. 2. what is the MAC address of the network device with IP address 192. scroll down the list of items in the pane. and click the Properties button. it is the door to other networks. Figure 3.0 is different from 192. In troubleshooting connectivity issues.hr Page 62 of 165 .0. what is the MAC address of the gateway device? 3. To access this window: 1.10. www. Because network 172.2. why? ____________________________________________________________________________ ____________________________________________________________________________ A default gateway address permits a network device to communicate with other devices on different networks. The computer composes the Layer 2 header with the destination MAC address of the router and places frames on the wire to the gateway device.254. IP address 172. In this case. On the General tab.254. communication between devices on different networks is different than on a LAN.255. and 127. select Internet Protocol (TCP/IP).0 Subneting CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6. a dynamic IP address may be configured. Figure 2. as shown in Figure 4. A window similar to the one in Figure 3 will be displayed.edunet. Right-click Local Area Connection.0.255. Network Interface with Dynamic IP Address However. 127. Communication Between Devices on Different Networks As shown in Figure 2. initiates a ping to IP address 192.168.CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6.edunet. the Network Properties settings window is not very useful for determining IP address information. Figure 4. One method that may be useful in determining the network interface IP properties is to examine the pod host computer’s Network Properties settings.254. In essence. and choose Properties. This gateway device. responds with its MAC address.1. the pod host computer requests the MAC address of the default gateway device.16.1.168.16. Many times connectivity issues are attributed to wrong network settings.hr Page 61 of 165 www.0.0 network. ____________________________________________________________________________ Referring to Figure 2.254? ____________________________________________________________________________ Task 2: Understand how Network Information is Configured on a Windows Computer. a router. several tools are available to quickly determine the network configuration for any Windows computer.0 Subneting Step 3: Use the ping command to ping different IP addresses on the 127.

10.hr Page 63 of 165 www.255.252 N/A N/A 192. fill in the following table with information from your pod host computer: Description IP Address Subnet Mask Default Gateway DNS Server Address hostPod#A hostPod#B S1-Central N/A N/A N/A N/A N/A 192.168.10.10.254.254 172.16. Refer to the network topology in Figure 5 and the logical IP address assignments in Table 1.255. use the command ipconfig /all.255.0.254 R2-Central Fa0/0 Domain name server IP address Eagle Server Step 2: Using the command ipconfig /all.255.255.0.168.10.1 172.0.0.0.16.255.CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6.0 172.1 255.254 255.16.255.255.Pod#.0 N/A 192.0 255.255.4 Subnet Mask Default Gateway 255.2 172.0 255.16. IP address for this pod host computer Subnet mask Default gateway address There are several options available with the ipconfig command.253 255.255.16.255. To show the most information about the network connections.0.255. a thorough understanding of the network can often assist in identifying the real problem.168.edunet.254 172.edunet.255.254.24.0 10.0 255.16.31.4 255.252 10. accessible with the command ipconfig /?.254.Pod#.16.254 255.254.hr Page 64 of 165 .10. Figure 5.10. www.254 172.255.255. Topology Diagram Device R1-ISP Interface IP Address S0/0/0 Fa0/0 S0/0/0 10.0 Subneting A more consistently reliable method for determining network settings on a Windows computer is to use the ipconfig command: Task 3: Troubleshoot a Hidden Gateway Address Problem.255.253 N/A 172.0 Subneting CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6.255.3 172.0 Table 1.255. Logical Address Assignments When troubleshooting network issues.

0 Subneting 1. All rights reserved. You have network address 172. Within the hour the gateway router is back on line. host-11B. 3. The technician verified the cables and network settings on both computers. does not respond to pings.example. 2.0 Subneting As the 3rd shift help desk Cisco engineer.16. and the pings fail. Using Windows command line utilities such as netstat –r and ipconfig /all will report gateway settings on host computers.com. 5. 4.2 from host-1A. Subnet/subnet mask 1. Fill out the following parameters: Class:____ Number of bits for host:________ Number of bits for subnets:______ ____________________________________________________________________________ Subnet mask:__________________________________ ____________________________________________________________________________ You instruct the help desk technician to tell the user to use the IP address for host-11B temporarily.edunet. complaining that computer host-11B.16. use the hostname of the destination pod computer for DNS to reply with the destination IP address. Observe the communication sequence between network devices. and normal network operation resumes. especially the gateway. Next. Inc. You need to create 5 subnets each accommodating al test 50 hosts. 172.11. you ask the technician to ping the IP address for host-11B. Nodding your head in understanding. Number of usable subnets:_______________________ Number of usable host in each subnet: _____________ Task 4: Reflection A gateway address is critical to network connectivity. and in some instances LAN devices require a default gateway to communicate with other devices on the LAN.254. www. and the user is able to establish connectivity with the computer.hr Page 65 of 165 All contents are Copyright © 1992–2007 Cisco Systems. Page 66 of 165 .16. at your disposal.0.0. who reports that R2-Central has been temporarily brought down for a hardware upgrade. First Host Last Host Broadcast Task 5: Challenge Use Wireshark to capture a ping between two pod host computers. capture a ping between network devices using only IP addresses.0. It may be necessary to restart the host computer to flush the DNS cache. First. 172. you ask the technician to ping the gateway IP address.254. The technician received a trouble ticket from a user on computer host-1A. . Then.CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6. This document is Cisco Public Information. The pings are successful. You check with the corporate network engineer.0. What is wrong? Activity: 6. but nothing unusual was found. you are asked for assistance from the help desk technician. The gateway address should not be needed.

2.0. 5.0. Subnet/subnet mask First Host Last Host Broadcast www. Fill out the following parameters: Class:____ Number of bits for host:________ Number of bits for subnets:______ Subnet mask:__________________________________ Number of usable subnets:_______________________ Number of usable host in each subnet: _____________ Subnet mask:__________________________________ Number of usable subnets:_______________________ Number of usable host in each subnet: _____________ Subnet/subnet mask 1. 4. at your disposal.0 Subneting 2. 2. 3.edunet.0.hr Page 67 of 165 www.0. 5.0.0 Subneting CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6. Fill out the following parameters: Class:____ Number of bits for host:________ Number of bits for subnets:______ 3. First Host Last Host Broadcast 1. You have network address 10.CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6. You have network address 192.edunet.0. 4. at your disposal.168. 3. You need to create 5 subnets each accommodating al least 10 hosts. You need to create 5 subnets each accommodating al least 100 hosts.50.hr Page 68 of 165 .

6 Interface S0/0/0 IP Address 10.254 172.255.16.254.0 172. 5.255.255.0 N/A 192.254.0 192. First Host Last Host Broadcast Addressing Table Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 N/A Eagle Server hostPod#A hostPod#B S1-Central N/A N/A N/A N/A 172.10.31.254 172.0 Subneting 4.168.hr . 3.255.0 255.255.255.254 172.255.255.0.16.10.0.edunet. Page 70 of 165 .255.255.253 N/A 172. Fill out the following parameters: Class:____ Number of bits for host:________ Number of bits for subnets:______ Lab 6.254.hr Page 69 of 165 www.10.168.255.10.255.255.edunet.255.6 Subnet Mask Default Gateway 255.252 10.255.253 255.0 255. 4.10.255.1 172.24.Pod#.254. You need to create 5 subnets each accommodating al least 500 hosts.0.2 172.16.10.168. 2.254 255. at your disposal.255.Pod#. You have network address 120.2: Examining ICMP Packets Topology Diagram Subnet mask:__________________________________ Number of usable subnets:_______________________ Number of usable host in each subnet: _____________ Subnet/subnet mask 1.0.0 255.0 10.0.254 255.252 N/A www.0.0.5 N/A 255.16.0.254 192.16.CCNA Exploration Network Fundamentals: OSI Network Layer Activity: 6.1 255.16.16.7.255.

The table in Figure 3 shows message codes for an ICMP Type 3 message. additional information about the problem is returned in the Code field. and a computed 16-bit Checksum. Wireshark captures will be made of ICMP packets between network devices. The ICMP message type describes the remaining ICMP fields. fill in the fields for the ICMP packet echo reply: Figure 2.2: Examining ICMP Packets Learning Objectives Upon completion of this lab. an 8-bit Code field. Using ICMP message capture shown in Figure 4. Also. For example. destination unreachable. ICMP Packet Echo Request Using the ICMP message capture shown in Figure 5. Values beginning with 0x are hexadecimal numbers: Figure 1. Code Value 0 1 2 3 4 5 6 7 8 9 10 11 12 Meaning Net Unreachable Host Unreachable Protocol Unreachable Port Unreachable Fragmentation Needed and Don't Fragment was Set Source Route Failed Destination Network Unknown Destination Host Unknown Source Host Isolated Communication with Destination Network is Administratively Prohibited Communication with Destination Host is Administratively Prohibited Destination Network Unreachable for Type of Service Destination Host Unreachable for Type of Service Figure 3. if the Type field is 3. ICMP packets serve many uses in today’s computer network. fill in the fields for the ICMP packet echo request.edunet.hr Page 71 of 165 www. ICMP Message Header Refer to Figure 1.2: Examining ICMP Packets CCNA Exploration Network Fundamentals: Addressing the Network . ICMP message types were later expanded in RFC 1700. the ping and tracert commands send ICMP messages to destinations. an informational message is returned to the source. When a router cannot deliver a packet to a destination network or host. destination unreachable. Background The Internet Control Message Protocol (ICMP) was first defined in RFC 792.7.CCNA Exploration Network Fundamentals: Addressing the Network . Each ICMP message starts with an 8-bit Type field. ICMP Message Types Codes provide additional information to the Type field. ICMP Type 3 Message Codes Scenario Using the Eagle 1 Lab. September.IPV4 Lab 6.IPV4 Lab 6. you will be able to: • • Understand the format of ICMP packets.7. ICMP Packet Echo Reply www. and destinations respond with ICMP messages.hr Page 72 of 165 . The table in Figure 2 shows ICMP message types from RFC 792: Value 0 3 4 5 8 11 12 13 14 15 16 Meaning Echo Reply Destination Unreachable Source Quench Redirect Echo Time Exceeded Parameter Problem Timestamp Timestamp Reply Information Request Information Reply Figure 4. from RFC 1700: Figure 5. the ICMP header fields common to all ICMP message types.edunet. 1981. Use Wireshark to capture and examine ICMP messages. ICMP operates at the TCP/IP Network layer and is used to exchange information between devices. Task 1: Understand the Format of ICMP Packets.

Four successful replies should be received from Eagle Server.168.IPV4 Lab 6.254: bytes=32 time<1ms TTL=63 Ping statistics for 192.hr Page 73 of 165 www.254. Wireshark Capture of ping Requests and Replies Step 1: Capture and evaluate ICMP echo messages to Eagle Server. There should be a total of four ICMP echo requests and matching echo replies. Record information from the first echo reply packet from Eagle Server: Field Type Code Checksum Identifier Sequence number Data Which fields. Record information from the first echo request packet to Eagle Server: Field Type Code Checksum Identifier Sequence number Data Value Are there 32 bytes of data? _____ 7. Which network device responds to the ICMP echo request? __________________________________ 5. Open a Windows terminal on the pod host computer.168.7.254.254. Expand the middle window in Wireshark. Stop Wireshark capture. Figure 8. Approximate round trip times in milli-seconds: Minimum = 0ms. The bottom window will also be needed to examine the Data field. Lost = 0 (0% loss).example.com Pinging eagle-server.edunet.example. ping Eagle Server. C:\> ping eagle-server. However.2: Examining ICMP Packets CCNA Exploration Network Fundamentals: Addressing the Network . Wireshark will be used to examine ICMP echo messages.168.168. start Wireshark capture. ICMP does provide minimal checks for a reply to match the request. When ready.254.254.254: bytes=32 time<1ms TTL=63 Reply from 192.edunet. Successful ping Replies from Eagle Server 3. Average = 0ms C:\> Figure 7.254. 2. similar to those shown in Figure 8. as shown in Figure 7.168. 6.2: Examining ICMP Packets At the TCP/IP Network layer.IPV4 Lab 6. if any.168.254: bytes=32 time<1ms TTL=63 Reply from 192. From the information provided in the ICMP messages above. 1. 4.CCNA Exploration Network Fundamentals: Addressing the Network .254: Packets: Sent = 4.7.hr Page 74 of 165 . and expand the Internet Control Message Protocol record until all fields are visible. communication between devices is not guaranteed. In this step.254] with 32 bytes of data: Reply from 192. Received = 4. changed from the echo request? ___________________________________________________________________________________ Value www.254: bytes=32 time<1ms TTL=63 Reply from 192. how does the sender know that the reply is to a specific echo? ___________________________________________________________________________________ ___________________________________________________________________________________ Task 2: Use Wireshark to Capture and Examine ICMP Messages. From the Windows terminal. Maximum = 0ms.com [192.

255. Approximate round trip times in milli-seconds: Minimum = 0ms.254. The results from the Wireshark capture will be evaluated—and may be surprising.hr Page 76 of 165 . Average = 0ms C:\> Figure 11.168.IPV4 Lab 6. Reply from 172.254. pings will be sent with a low TTL value. Lost = 0 (0% loss). Received = 4.253.255.253. Lost = 0 (0% loss). Fill in the following information from each new ping: Packet Request # 2 Reply # 2 Request # 3 Reply # 3 Request # 4 Reply # 4 Checksum Identifier Sequence number Which ICMP message type is used to return information to the sender? ___________________________________________________________________________________ What is the code associated with the message type? ___________________________________________________________________________________ Step 3: Capture and evaluate ICMP echo messages that exceed the TTL value.2: Examining ICMP Packets 8.16.168.254: TTL expired in transit.2: Examining ICMP Packets CCNA Exploration Network Fundamentals: Addressing the Network .16.1 Pinging 192.254 Pinging 192. In this step.253. pings will be sent to a fictitious network and host. simulating a destination that is unreachable.255. Received = 4.edunet. Reply from 172.16. Continue to evaluate the remaining echo requests and replies.168.253.168.16. Ping statistics for 192. Reply from 172.7.254: TTL expired in transit. What network device responds to pings that exceed the TTL value? ___________________________________________________________________________________ Figure 12. www.254: Destination host unreachable. In this step.16. Which ICMP message type is used to return information to the sender? ___________________________________________________________________________________ What is the code associated with the message type? ___________________________________________________________________________________ Which network device is responsible for decrementing the TTL value? ___________________________________________________________________________________ Figure 10. which shows ping replies when the TTL value has been exceeded.253.168. Reply from 172. Ping Eagle Server. Maximum = 0ms.edunet.255.16. Maximum = 0ms. Ping statistics for 192.254: Destination host unreachable. Try to ping IP address 192.255. Reply from 172. Average = 0ms C:\> Figure 9.254: TTL expired in transit. C:\> ping 192. Approximate round trip times in milli-seconds: Minimum = 0ms.254: Packets: Sent = 4.168.254.254: Destination host unreachable. Ping Results for an Exceeded TTL See Figure 11. there is an echo response. and set the TTL value to 1: C:\> ping -i 1 192.1.254. Instead of a request timeout.16.253.255. Wireshark Capture of TTL Value Exceeded Wireshark captures to a fictitious destination are shown in Figure 12.254 with 32 bytes of data: Reply from 172. Wireshark Capture from a Fictitious Destination Wireshark captures to a fictitious destination are shown in Figure 10.168.254 Why did the Checksum values change with each new request? ___________________________________________________________________________________ Step 2: Capture and evaluate ICMP echo messages to 192.1 with 32 bytes of data: Reply from 172.CCNA Exploration Network Fundamentals: Addressing the Network .255.16.254: Destination host unreachable. Expand the middle Wireshark window and the Internet Control Message Protocol record.7.255.168.1 C:\> ping 192. What network device responds to pings to a fictitious destination? ___________________________________________________________________________________ C:\> ping -i 1 192.hr Page 75 of 165 www. Reply from 172.168.254: TTL expired in transit.1: Packets: Sent = 4.168. Expand the middle Wireshark window and the Internet Control Message Protocol record.1.IPV4 Lab 6. Ping Results from a Fictitious Destination See Figure 9.

25. Background This activity is designed to teach how to compute network IP address information from a given IP address.114. a sender has no way to tell why a destination connection failed.7.0 (/16) IP Address Network Mask Step 2: Determine the network address.hr . 1. Task 4: Reflection The ICMP protocol is very useful when troubleshooting network connectivity issues. Without ICMP messages. Convert the host IP address and network mask to binary: 172 10101100 11111111 255 25 11001000 11111111 255 114 01110010 00000000 0 250 11111010 00000000 0 172.250 255.CCNA Exploration Network Fundamentals: Addressing the Network . you will be able to determine other information about the IP address such as: • • • • Network address Network broadcast address Total number of host bits Number of hosts Task 1: For a given IP address. This will demonstrate how the tracert command traces the network path to the destination.168.hr Page 77 of 165 www.251.3 IPv4 Address Subnetting Part 1 Learning Objectives Upon completion of this activity. different ICMP message type values were captured and evaluated. www.0.edunet. Determine Network Information. Draw a line under the mask.255. Scenario When given an IP address and network mask.2: Examining ICMP Packets Task 3: Challenge Use Wireshark to capture a tracert session to Eagle Server and then to 192. Given: Host IP Address Network Mask Find: Network Address Network Broadcast Address Total Number of Host Bits Number of Hosts Step 1: Translate Host IP address and network mask into binary notation.IPV4 Lab 6.7. Page 78 of 165 . Using the ping command. Activity 6.edunet. you will be able to determine network information for a given IP address and network mask. Examine the ICMP TTL exceeded message.254.

0 IP Address Subnet Mask Network Address Step 3: Determine the broadcast address for the network address The network mask separates the network portion of the address from the host portion.7.255. 4.edunet.edunet. broadcast address. By counting the number of host bits. The network address has all 0s in the host portion of the address and the broadcast address has all 1s in the host portion of the address.99. 172 10101100 11111111 10101100 172 25 11001000 11111111 11001000 25 114 01110010 00000000 00000000 0 250 11111010 00000000 00000000 0 Task 2: Challenge For all problems: Create a Subnetting Worksheet to show and record all work for each problem.250 255.CCNA Exploration Network Fundamentals: Addressing the Network .255.) Add this information to the table: Host IP Address Network Mask Network Address Network Broadcast Address Total Number of Host Bits Number of Hosts 172.IPv4 Activity 6. 0 AND anything results in a 0.25. which is 172.0.114.0.33 255.0. we can determine the total number of usable hosts for this network.7.255. network address.33 255. The result is the network address for this host IP address. Note: 1 AND 1 results in a 1.1.IPv4 Activity 6.30. 3.255.0.255.0.0 Network Add.0 Problem 3 Host IP Address Network Mask Network Address Network Broadcast Address Total Number of Host Bits Number of Hosts 192.168.17. Problem 1 Host IP Address Network Mask Network Address Network Broadcast Address Total Number of Host Bits Number of Hosts 172.3: IPv4 Address Subnetting Part 1 2.1.255.hr Page 80 of 165 .255.0 (/16) Problem 4 Host IP Address Network Mask Network Address Network Broadcast Address Total Number of Host Bits Number of Hosts 172. Express the result in dotted decimal notation. 172 10101100 11111111 10101100 172 25 11001000 11111111 11001000 25 0 00000000 00000000 11111111 255 0 00000000 00000000 11111111 255 Problem 2 Host IP Address Network Mask Network Address Network Broadcast Address Total Number of Host Bits Number of Hosts 172.536 – 2 = 65.3: IPv4 Address Subnetting Part 1 CCNA Exploration Network Fundamentals: Addressing the Network .30.hr Page 79 of 165 www.71 255.0 www.25. Mask Broadcast.10. Host bits: 16 Total number of hosts: 216 = 65. or the all 1s address.534 (addresses that cannot use the all 0s address.234 255. Perform a bit-wise AND operation on the IP address and the subnet mask.536 65.

219 255. Things to remember: • Subtract 2 for the usable number of hosts per subnet. 512 256 128 of bits borrowed: 9 8 7 512 256 128 Hosts or 6 5 4 64 32 16 Subnets Possible Subnet Mask Values Because subnet masks must be contiguous 1’s followed by contiguous 0’s.224 Borrowing Bits How many bits must be borrowed to create a certain number of subnets or a certain number of hosts per subnet? Using this chart.255. it is easy to determine the number of bits that must be borrowed.edunet.3.7. the converted dotted decimal notation can contain one of a certain number of values: Dec.3: IPv4 Address Subnetting Part 1 Problem 5 Host IP Address Network Mask Network Address Network Broadcast Address Total Number of Host Bits Number of Hosts 192.4 Home preparation: IPv4 Address Subnetting Part 2 Learning Objectives Upon completion of this activity.7.168.255.0 Activity 6. you will be able to determine subnet information for a given IP address and subnetwork mask. 210 1.255.hr Page 81 of 165 www.IPv4 Activity 6.CCNA Exploration Network Fundamentals: Addressing the Network . Background Problem 6 Host IP Address Network Mask Network Address Network Broadcast Address Total Number of Host Bits Number of Hosts 192.edunet. Page 82 of 165 . one for the subnet address and one for the broadcast address of the subnet.hr . and leave the room ready for the next class. 255 254 252 248 240 224 192 128 0 Binary 11111111 11111110 11111100 11111000 11110000 11100000 11000000 10000000 00000000 www.168.024 29 28 27 26 64 25 32 24 16 23 8 3 8 22 4 2 4 21 2 1 2 20 1 1 1 Task 3: Clean Up Remove anything that was brought into the lab.3.0.219 255.024 Number 10 1.

114.4: IPv4 Address Subnetting Part 2 4. 1. which in this case is 10 bits. Subnet Address for this IP Address 172.edunet.0.0 (/16) 255.IPv4 Activity 6.7. 2.255.255.25. the major network mask is 255. and the S. 1. This range contains the bits that are being incremented to create the host numbers or addresses.255. Given: Host IP Address Network Mask Subnet Mask Find: Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet 172.D.D. network mask. and the last bits at the end on the right.114.192 (/26) 3.hr Page 83 of 165 www.25.D. In our example. IP Address Subnet Mask Step 2: Determine the network (or subnet) where this host address belongs. Label the subnet counting range between the M. Draw a line under the mask. 172 10101100 11111111 255 25 11001000 11111111 255 114 01110010 11111111 255 250 11111010 11000000 192 1.D.25.CCNA Exploration Network Fundamentals: Addressing the Network . Express the result in dotted decimal notation. The result is the Number of Subnet Bits. you will be able to determine other information about the IP address such as: • • • • • • • The subnet address of this subnet The broadcast address of this subnet The range of host addresses for this subnet The maximum number of subnets for this subnet mask The number of hosts for each subnet The number of subnet bits The number of this subnet Step 3: Determine which bits in the address contain network information and which contain host information.250 255. Step 4: Determine the bit ranges for subnets and hosts. 3.0. Draw the Subnet Divide (S.hr Page 84 of 165 . This range contains the bits that are being incremented to create the subnet numbers or addresses.IPv4 Activity 6. Draw the Major Divide (M. Label the host counting range between the S.D. which can be determined by simply counting the number of bits between the M.0. and subnetwork mask.) as a wavy line where the 1s in the major network mask end (also the mask if there was no subnetting). 2. Note: 1 AND 1 results in a 1’ 0 AND anything results in a 0.255.7.4: IPv4 Address Subnetting Part 2 CCNA Exploration Network Fundamentals: Addressing the Network . www. 2. which is 172. Step 1: Translate host IP address and subnet mask into binary notation.114.edunet.) as a straight line where the 1s in the given subnet mask end. or the first 16 left-most bits.192 Add this information to the table: IP Address Subnet Mask Subnet Address 172 10101100 11111111 10101100 172 25 11001000 11111111 11001000 25 114 01110010 11111111 01110010 114 250 11111010 11000000 11000000 192 Task 1: For a Given IP Address and Subnet Mask. Perform a bit-wise AND operation on the IP Address and the Subnet Mask. The result is the Subnet Address of this Subnet.. and S.D.192 Scenario When given an IP address. The network information ends where the 1s in the mask end. Determine Subnet Information.D.

all 1s not used) 10 bits 210 = 1024 subnets Step 7: Determine the number usable hosts per subnet. where n is the number of bits in the subnet counting range. 26 – 2 = 64 – 2 = 62 hosts per subnet Number of Host Bits per Subnet Number of Usable Hosts per Subnet 6 bits 26 – 2 = 64 – 2 = 62 hosts per subnet www.edunet.D.255 16 bits or 216 or 65. which you make a 0.D.). which is the first part of the result for Range of Host Addresses for This Subnet. in the host portion (to the right of the S. 1.255.25.hr Page 85 of 165 www. all bits before the S. 6 bits) minus 2 (1 for the subnet address and 1 for the broadcast address of the subnet).IPv4 Activity 6.536 total hosts 65.).0 172.255. This is the result for Broadcast Address of This Subnet. make the host bits all 1s except for the rightmost bit (or least significant bit).D. 210 = 1024 Number of Subnet Bits Number of Subnets (all 0s used. 4.4: IPv4 Address Subnetting Part 2 Step 5: Determine the range of host addresses available on this subnet and the broadcast address on this subnet. This gives us the last host IP address on this subnet. Next. 3.7.25. 1.0 (/16) 172. Let’s add some of this information to our table: Host IP Address Major Network Mask Major (Base) Network Address Major Network Broadcast Address Total Number of Host Bits Number of Hosts Subnet Mask Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet 172.114. which you make a 1.25. make the host bits all 0s except for the right-most bit (or least significant bit).114.193.hr Page 86 of 165 .534 usable hosts 255. Use the formula 2n. The number of subnets is determined by how many bits are in the subnet counting range (in this example.192 (/26) Step 6: Determine the number of subnets.4: IPv4 Address Subnetting Part 2 CCNA Exploration Network Fundamentals: Addressing the Network .250 255.255. make the host bits all 1s. which in the example is 172.).255.).0.114.D.25. 2.25.255.edunet. which in the example is 172. which in the example is 172.IPv4 Activity 6. The number of hosts per subnet is determined by the number of host bits (in this example.CCNA Exploration Network Fundamentals: Addressing the Network . In the host portion (to the right of the S. which is the last part of the result for Range of Host Addresses for This Subnet.536 – 2 = 65. This gives us the first host IP address on this subnet.7.114. Copy down all of the network/subnet bits of the network address (that is.0. This gives us the broadcast IP address on this subnet. In the host portion (to the right of the S. 10 bits).25.254.

114.224 Problem 2 Host IP Address Subnet Mask Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet www. For all problems: Create a Subnetting Worksheet to show and record all work for each problem.99.IPv4 Activity 6.255.255.114.234 255.168.255.114.edunet.10.1.252 Page 88 of 165 .30.hr Page 87 of 165 www.CCNA Exploration Network Fundamentals: Addressing the Network .0 Problem 5 Host IP Address Subnet Mask Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet 192.255.4: IPv4 Address Subnetting Part 2 Step 8: Final Answers Host IP Address Subnet Mask Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet 172.255.4: IPv4 Address Subnetting Part 2 CCNA Exploration Network Fundamentals: Addressing the Network .25.255.IPv4 Activity 6.193 172.254 172.30.219 255.255.71 255.33 255.255 Problem 3 Host IP Address Subnet Mask Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet 192.255.114.25.25.192 (/26) 26 bits 210 = 1024 subnets 6 bits 26 – 2 = 64 – 2 = 62 hosts per subnet 172.250 255.edunet.0 Problem 4 Host IP Address Subnet Mask Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet 172.192 172.hr 172.255.17.1.255.7.3.25.192.192.255.114.33 255.0 Task 2: Challenge. Problem 1 Host IP Address Subnet Mask Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet 172.7.25.

255.0 class C network? A. 192.168.10.1. 192.7.29 D.255/18 B.168.252 Activity 6. 192.19/28? (Select two answer choices) A.edunet.FFFF. 192. F.CCNA Exploration Network Fundamentals: Addressing the Network . Which one of the following subnet masks should you use? A.15.15.2.hr .17 B.192 B. and you need ten subnets.hr Page 89 of 165 www.255.255.2 F.255. 192.248 E.255.168.14 C. FFFF. 6 networks and 30 hosts. 30 networks and 6 hosts.255.31.15.128.16 E.IPv4 Activity 6.255. D. and leave the room ready for the next class. B. 14 networks and 14 hosts.15. C.240 D.255. None of the above www.255.FFFF E.24.168.edunet. None of the above QUESTION NO: 3 Which of the following is an example of a valid unicast host IP address? A. You wish to have as many addresses available for hosts as possible.59/30 D.255.168.168. 255.7.15.168.5: IPv4 Address Subnetting Part 3 QUESTION NO: 1 Which two of the addresses below are available for host addresses on the subnet 192. QUESTION NO: 2 You have a Class C network. 172. 32 networks and 18 hosts.15. 192.255.219 255.168. None of the above Task 3: Clean Up Remove anything that was brought into the lab. 8 networks and 32 hosts. E.255. 224.255 C.5. 255.4: IPv4 Address Subnetting Part 2 Problem 6 Host IP Address Subnet Mask Number of Subnet Bits Number of Subnets Number of Host Bits per Subnet Number of Usable Hosts per Subnet Subnet Address for this IP Address IP Address of First Host on this Subnet IP Address of Last Host on this Subnet Broadcast Address for this Subnet 192.255.224 C.31 F.3. Page 90 of 165 . 255. All of the above QUESTION NO: 4 How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210. 255.

30 D.63.0/22? A.11.5: IPv4 Address Subnetting Part 3 QUESTION NO: 5 The Edunet network was assigned the Class C network 199.16. 172.255.19.) A.166.IPv4 Activity 6. 172. 217.192¸ www.0 C. There are 254 usable hosts per subnet.210.234. 201.224.CCNA Exploration Network Fundamentals: Addressing the Network .0. 64 QUESTION NO: 9 Your network uses the 172.IPv4 Activity 6.hr Page 92 of 165 .0. 201.255.68/28? A.0 from the ISP.5.252. 255. 83. how may hosts will they be able to support on each subnet? A. 14 B. If the administrator at Edunet were to subnet this class C network using the 255. There is one usable network.5.254.0. assuming that a /27 network mask was used for all of the networks? (Choose all that apply. 255.159 F.hr Page 91 of 165 www.178. None of the above Which of the following IP hosts would be valid for PC users.16. 201. 16. 172.100.128. E.12.16.63 B. 201.178.93 D. 15.118. 255.45.100. There are 256 usable hosts per subnet. There are 50 usable subnets.edunet.255.edunet.45. which of the IP addresses below can you assign to the hosts on this subnet? (Select all that apply) QUESTION NO: 6 What is the subnet for the host IP address 172. None of the above A.5.100. 10000000-10111111 D. 192. There are 24 usable hosts per subnet.63 B.100. 172.0 B.1 A. 00000111-10001111 B.255. 134.0 class B address. while accommodating the maximum number of subnets. 201.16.93 C.56 D. 87.5: IPv4 Address Subnetting Part 3 CCNA Exploration Network Fundamentals: Addressing the Network .7.5.18.16.12. 11100000-11101111 F. 201. 32 E. D.16. D. 92.16.5.0 D.7.178.107.178.0.166.100. 16 C. QUESTION NO: 10 Using a subnet mask of 255.0 mask.168. Which of the statements below are true of this network? (Select all valid answers) QUESTION NO: 12 QUESTION NO: 8 What is the IP address range for the first octet in a class B address.0 E.65 E.87 F.168. Which mask would you use? A.23.5.118. 217. 11000000-11011111 E.255.100. in binary form? A.32 C.121. B.37 E.0 F.131.18.0. F. 62 F. You need to support 459 hosts per subnet.5.224. You have a class B network with a 255.100.254. B.31 F.16.208.42. 134.224 subnet mask. There are 254 usable subnets.192 QUESTION NO: 11 QUESTION NO: 7 What is the subnet for the host IP address 201. C.168.255. 255.255.159 C. 201.116.255.56 E.255. 00000011-10011111 C.255. 192. C.64 D.0 B. 172.0.

115. B. a CAT 5 crossover cable must be used. Background Category (CAT 5) unshielded twisted-pair (UTP) cables are wired according to function. 225.240. 16 networks and 16 hosts D. www.224 E.255. Which of the following network masks should you use? A.225. such as routers and host computers.hr .224.0 D.77.255. you will be able to: • • • Test cables using a Network SC8106 LAN Cable Tester Become familiar with the most common functions of a cable tester. 225. 225.224.0 network was subnetted using a /28 subnet mask.255. a CAT 5 crossover cable is used again.IPv4 Activity 6. 255. 62 networks and 2 hosts E.edunet. This is also true of switches.CCNA Exploration Network Fundamentals: Addressing the Network . Test different cables for type and wiring problems. None of the above Network SC8106 LAN Cable Tester Learning Objectives Upon completion of this lab. How many usable subnets and host addresses per subnet were created as a result of this? A. When connecting one switch to another. When connected together.4. 16 networks and 14 hosts F.0 C. 255. 225. 255. which of the subnet masks below will allow for 100 subnets with 500 usable host addresses per subnet? A.7.hr Page 93 of 165 www.255.225.1: Media Connectors Lab Activity QUESTION NO: 14 You have a class C network. and you need to design it for 5 usable subnets with each subnet handling a minimum of 18 hosts each. however. 255. 6 networks with 30 hosts C.225.0. connect to switches with CAT 5 straight-through cables.225. 255.255. Page 94 of 165 .255. 2 networks with 62 hosts B. C.255. D.255.240 QUESTION NO: 15 The 213.0.224 Lab 8.254.255. 255.edunet.255. End devices.0 E.0.5: IPv4 Address Subnetting Part 3 QUESTION NO: 13 Given that you have a class B IP address network range.255.0.0 B.

It is now time to verify the cable type and learn about the common features of the cable tester. Then. The quality of cabling components used. you will use the cable tester to test for bad cables that cannot be determined with a visual inspection.edunet. Perform a Wire Map test on each of the cables provided. The following resources are required: • • Good CAT 5 straight-through and crossover wired cables of different colors. Task 1: Become Familiar with the Most Common Functions of a Cable Tester. respectively. For each cable. www.1: Media Connectors Lab Activity CCNA Exploration Network Fundamentals: OSI Physical Layer Lab 8. shown in Figure 3.hr Page 95 of 165 . starting with the greenwhite cable. TIA/EIA 568A straight-through cables can be identified by the color coding. Figure 1.4. Similar to Figure 2.4. as well as common features available with the tester.CCNA Exploration Network Fundamentals: OSI Physical Layer Lab 8. and whether the cable is straight-through or crossover. Finally you will build your own CAT 5 UTP cables. Step 1: Visually determine cable types. Place the near end of the cable into the RJ-45 jack labeled MAIN on the tester. www. you will use the cable tester to verify the cable type.hr Page 96 of 165 Figures 1 and 2 show the TIA/EIA 568B CAT 5 UTP wire positioning for a straight-through and crossover cable. TIA/EIA 568B CAT 5 UTP Straight Through 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 TIA/EIA 568B CAT 5 UTP Crossover 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Figure 3. and the bottom set of numbers refers to the near end. The top set of numbers displayed on the LCD screen refers to the rar end. Scenario First. Cable Coupler and Cable Identifier Use the following procedure to test each cable with the LAN cable coupler and cable identifier.1: Media Connectors Lab Activity Problems related to cables are one of the most common causes of network failure. When CAT 5 connectors are held together. cable type. 1 2 Cable Color Cable Type (straight-through or crossover) Cable Use (Circle correct device) Switch to: host / switch Switch to: host / switch TIA/EIA 568B is different from TIA/EIA 568A wiring. will be identical on both ends. The coupler and the cable identifier are accessories that come with the Network SC8106 LAN Cable Tester. and fill in the following table based on the results. write down the number and color. Basic cable tests can be very helpful in troubleshooting cabling problems with UTP. Perform a visual inspection of the cables and then fill out the chart below with the cable color. and quality of the connector terminations will be the main factors in determining how trouble-free the cabling will be. and use: Cable No. the routing and installation of the cable. wire color is a quick way to determine the cable type. Straight-through Wire Location Figure 2. Next. There should be two numbered cables available. the right wiring diagram. below. Insert the cable identifier into the other side of the cable. you will visually determine whether the CAT 5 cable type is crossover or straight-through.edunet. Crossover Wire Location The wiring of both the near and far end of the cable will be displayed. Category 5 straight-through and crossover wired cables with open wire connections in the middle or one or more conductors shorted at one end that are different colors and different lengths. Step 2: Verify cable wire map.

255.255.hr Page 97 of 165 www.255.16.6 Interface IP Address S0/0/0 10.31.168.254 255.255.5.254 172.254 192.255.edunet.255.1: Media Connectors Lab Activity Cable No.2 172.4. a straight-through and crossover cable.10.16.1 255. the cable length.0.5 N/A 255.255.254.16. and what the problem is.10. the tester screen test results.0 10. The tester LENGTH function displays the length of the cable. and complete the following table based on the results.0 255.255.255.168.Pod#.255.0. repeat the setup steps described in Step 2.255.254. Addressing Table Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 N/A Eagle Server hostPod#A hostPod#B S1-Central N/A N/A N/A N/A 172. if there is a problem.1 172. For each cable.254.255.254 172.2: Frame Examination Topology Diagram Note any problems encountered during this test: Step 4: Verify cable length.255.255.0.CCNA Exploration Network Fundamentals: OSI Physical Layer Lab 8.254 172.0.255.hr Page 98 of 165 .edunet. 1 2 Cable Color Cable Length Note any problems encountered during this test: Repeat these steps until you are comfortable with the use of the cable tester. Ask your instructor for details how to build cables.10.24.253 N/A 172.16. Perform a basic cable test on each of the cables.0 255.0 N/A 192.16.255. Cable No.168. Move the rotary switch selector on the tester to the LENGTH position.10.253 255. In the next task.252 10.255. If power was cycled.0 255.16.252 N/A www.Pod#.10. write down the number and color.254.6 Subnet Mask Default Gateway 255.10.0 172.0 192. Task 2 Optional: Build Different Cables for Type Build two cable types.254 255.255. unknown cables will be tested. 1 2 Cable Color Cable Type (straight-through or crossover) Lab 7.16.

For Ethernet II frames. Using this window. this field contains a hexadecimal value that is used to indicate the type of upper layer protocol in the data field.4. Background When upper layer protocols communicate with each other.edunet.org/forum/macid. such as TCP/IP. it is helpful to analyze frame header information.hr Page 99 of 165 www.com/pub/eagle_labs/eagle1/chapter7/. file wireshark-setup0. followed by a DNS query. The source address is always unicast. The Ethernet II frame header will be examined in this lab.A-F. Wireshark Capture of the ping Command In Figure 2. There are numerous upper layer protocols supported by Ethernet II. or 6 bytes. For example. then the Layer 2 frame encapsulation will be Ethernet II. the Panel List window shows a Wireshark capture of the ping command between a pod host computer and Eagle Server. 0-9. if the upper layer protocol is TCP/IP and the media access is Ethernet. The format for an Ethernet II frame is shown in Figure 1.2 Frame Examination Learning Objectives Upon completion of this lab. it can be downloaded from URL ftp://eagleserver.2 Frame Examination CCNA Exploration Network Fundamentals: Data Link Layer Lab 7.example. Use Wireshark to capture and analyze Ethernet II frames. When learning about Layer 2 concepts. you will be able to: • • Explain the header fields in an Ethernet II frame.htm for a list of vendor codes. If Wireshark has not been loaded on the host pod computer. The first six hex numbers indicate the manufacturer of the network interface card (NIC). ff:ff:ff:ff:ff:ff 00:16:76:ac:a7:6a Description This field contains synchronizing bits. Finally. In Figure 2.edunet. the following Ethernet II frame information can be obtained: Field Preamble Figure 1. ac:a7:6a.CCNA Exploration Network Fundamentals: Data Link Layer Lab 7. Each address is 48 bits long. Refer to http://www. The destination address may be a broadcast which contains all 1s or unicast. data flows down the OSI layers and is encapsulated into a Layer 2 frame. Scenario Wireshark will be used to capture and analyze Ethernet II frame header fields. expressed as 12 hexadecimal digits. Ethernet II Frame Format Destination Address Source Address Value Not shown in capture. Figure 2.5.exe. Two common frame Page 100 of 165 Task 1: Explain the Header Fields in an Ethernet II Frame. The session begins with the ARP protocol querying for the MAC address of the Gateway router. Ethernet II frames can support various upper layer protocols.hr . The Windows ping command will be used to generate network traffic for Wireshark to capture. A common format is 12:34:56:78:9A:BC. the Packet Details window shows Frame 1 detail information.5. The frame composition is dependent on the media access type. processed by the NIC hardware. Frame Type 0x0806 www.99. the ping command issues echo requests. Layer 2 addresses for the frame. The last six hex digits.neotechcc. are the serial number of the NIC.

Step 2: Start a ping to Eagle Server and capture the session. Description types are: Value 0x0800 0x0806 Figure 3.com www. Frame Check Sequence. type. Wireshark will be used to capture and analyze packets captured on the pod host computer.y interface IP address. answer the following questions about the destination and source MAC address: Destination Address: MAC address: ____________________ NIC manufacturer: ____________________ NIC serial number: ____________________ Source Address: MAC address: ____________________ NIC manufacturer: ____________________ NIC serial number: ____________________ From the information contained in the Packet List window for the second frame. and click OK.hr Page 101 of 165 www. It is verified by the receiver.2 Frame Examination Field Value Data ARP FCS Not shown in capture.1. This will begin the packet capture. C:\> ping eagle-server.example.254.hr Page 102 of 165 .CCNA Exploration Network Fundamentals: Data Link Layer Lab 7. Description IPv4 Protocol Address resolution protocol (ARP) Contains the encapsulated upper level protocol.2600] (C) Copyright 1985-2001 Microsoft Corp. and data field. used by the NIC to identify errors during transmission.example. Received = 4.168.168. The data field is between 46 – 1500 bytes.com Pinging eagle-server. Use the information to complete the following table: Field Preamble Destination Address Source Address Frame Type Data FCS Value What is the significance of all 1s in the destination address field? ______________________________________________________________________________ ______________________________________________________________________________ From the information contained in the Packet List window for the first frame. Step 1: Configure Wireshark for packet captures.254. Click Capture > Interfaces.5.com [192. The value is computed by the sending machine. Prepare Wireshark for captures. Ping to eagle-server. answer the following questions about the destination and source MAC address: Destination Address: MAC address: ____________________ NIC manufacturer: ____________________ NIC serial number: ____________________ Source Address: MAC address: ____________________ NIC manufacturer: ____________________ NIC serial number: ____________________ In the following task. Average = 0ms C:\> Figure 4.254: 192.168. type cmd. Lost = 0 (0% loss).254: 192.168. Task 2: Use Wireshark to Capture and Analyze Ethernet II Frames. Maximum = 0ms. Click Start > Run.edunet.254. Open a Windows terminal window.254: Packets: Sent = 4.16. Approximate round trip times in milli-seconds: Minimum = 0ms.168.254: bytes=32 bytes=32 bytes=32 bytes=32 time<1ms time<1ms time<1ms time<1ms TTL=62 TTL=62 TTL=62 TTL=62 Ping statistics for 192.example. Microsoft Windows XP [Version 5.254: 192.254] with 32 bytes of data: Reply Reply Reply Reply from from from from 192. encompassing frame addresses.2 Frame Examination CCNA Exploration Network Fundamentals: Data Link Layer Lab 7.254.edunet.x.5. and then click the start button that corresponds to the 172.254.254. Frame 3 Fields Figure 3 contains an exploded view of the Frame 3 Wireshark capture.168.

A preamble field contains seven bytes of alternating 0101 sequences.16.254 255.254.10.255. Ethernet II frame header information was examined.168.0 192. If the frame is a broadcast. What would you tell the student? What is the Ethernet II frame type value for an ARP Request? ____________________ What is the Ethernet II frame type value for an ARP Reply? ____________________ What is the Ethernet II frame type value for a DNS query? ____________________ What is the Ethernet II frame type value for a DNS query response? ____________________ Addressing Table What is the Ethernet II frame type value for an ICMP echo? ____________________ What is the Ethernet II frame type value for an ICMP echo reply? ____________________ Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 172.edunet.168. the value is 0x0800.255. as shown in Figure 4.255.5.edunet.0 N/A 192.254 172.16.hr Page 103 of 165 www.0.1 255.255.168.255.1: Address Resolution Protocol (ARP) Topology Diagram Use your Wireshark capture of the ping command to answer the following questions: Pod computer MAC address information: MAC address: ____________________ NIC manufacturer: ____________________ NIC serial number: ____________________ R2-Central MAC address information: MAC address: ____________________ NIC manufacturer: ____________________ NIC serial number: ____________________ A student from another school would like to know the MAC address for Eagle Server. a DNS request is made for the IP address of eagle-server. 01010110. stop Wireshark captures. Your capture should look similar to the one shown in Figure 2. A 4-byte frame type field contains a value that indicates the protocol in the data field. When the command has finished execution. the destination MAC address contains all 1s.com.0.254. Step 3: Analyze the Wireshark capture.253 255.255.5 N/A 255.0.253 N/A 172. such as FTP and HTTP.6 Interface IP Address S0/0/0 10.10.8.example.0 172.16.10.example.16.255. the ping command is executed. The data field is variable and contains the encapsulated upper layer protocol. Analyze the captured packets.31.Pod#.hr Page 104 of 165 .16. The first six hex digits contain the manufacturer of the NIC.com. and one byte that signals the beginning of the frame.255.10.255. Destination and source MAC addresses each contain 12 hex digits.1 172.255.CCNA Exploration Network Fundamentals: Data Link Layer Lab 7.252 10.0 255. and the last six hex digits contain the NIC serial number.6 Subnet Mask Default Gateway 255.Pod#.255.255.255. The Wireshark Packet List window should start with an ARP request and reply for the MAC address of the Gateway. Next. Finally. At the end of a frame. and verify that the Ethernet II frame type remains 0x0800. Lab 9.254.255.254 N/A Eagle Server hostPod#A hostPod#B S1-Central N/A N/A N/A N/A 192.2 Frame Examination Ping eagle-server.0 255.0 10. For IPv4.254.2 172. www.255.0 255.255. Task 4: Reflection In this lab. a 4-byte FCS value is used to verify that there were no errors during transmission.10.255.254 172.0.10.16.252 N/A Task 3: Challenge Use Wireshark to capture sessions from other TCP/IP protocols.254 255.255.24.254 172.16.

is a technique used by an attacker to inject the wrong MAC address association in a network. Wireshark will be used to capture and analyze ARP exchanges between network devices. the first applicable interface will be used. and click OK. -g Same as -a. an ARP request is broadcast on the LAN. ARP is a potential security risk. C:\> Figure 1. In Task 2. eth_addr Specifies a physical address. you will be able to: • • Use Windows arp command. -s Adds the host and associates the Internet address inet_addr with the Physical address eth_addr.CCNA Exploration Network Fundamentals: Data Link Layer Lab 7.. some Windows operating systems store ARP cache entries for 2 minutes.. or small area in RAM that holds ARP results. 3. If Wireshark has not been loaded on the host pod computer.99. This adds latency to the communication and could congest the LAN.5..5.16. entries for each ARP table are displayed. ARP spoofing. it can be downloaded from URL ftp://eagle-server.2 Frame Examination Learning Objectives Upon completion of this lab. Depending on the device.edunet. To dynamically discover the MAC address to the destination device. this specifies the Internet address of the interface whose address translation table should be modified. an authorized MAC address list may be configured Cisco devices to restrict network access to only approved devices. Without ARP. Also. Displays the arp table. use the Windows arp utility command to examine and change ARP cache entries. If more than one network interface uses ARP. Manually configuring static ARP associations is one way to prevent ARP spoofing. Background Address Resolution Protocol (ARP) is used by TCP/IP to map a Layer 3 IP address to a Layer 2 MAC address. Conversely. times differ. ARP must continually request address translations each time a frame is placed on the network.edunet. Scenario With a pod host computer. there is no efficient method to build the datagram Layer 2 destination address.hr Page 106 of 165 . www. If inet_addr is specified. An attacker forges the MAC address of a device.4. An ARP cache timer removes ARP entries that have not been used for a certain period of time.2 Frame Examination CCNA Exploration Network Fundamentals: Data Link Layer Lab 7. -N if_addr Displays the ARP entries for the network interface specified by if_addr. When a frame is placed on the network. 2. inet_addr Specifies an internet address. and frames are sent to the wrong destination. and examine the output. and the MAC address is recorded in ARP cache. inet_addr may be wildcarded with * to delete all hosts.. or ARP poisoning.212 00-aa-00-62-c6-09 . Open a Windows terminal by clicking Start > Run. With no options. If not present. If the entry is used again during that time. it must have a destination MAC address. The device that contains the destination IP address responds.55. For example. See Figure 1. -d Deletes the host specified by inet_addr. > arp -a . Use Wireshark to examine ARP exchanges. Answer the following questions about the arp command: What command would be used to display all entries in ARP cache? ________________________________________ What command would be used to delete all ARP cache entries (flush ARP cache)? ________________________________________ What command would be used to delete the ARP cache entry for 172. Step 1: Access the Windows terminal..example. unlimited hold times could cause errors with devices that leave the network or change the Layer 3 address. Finally.254? ________________________________________ Task 1: Use the Windows arp Command. ARP is a protocol that enables network devices to communicate with the TCP/IP protocol. the arp command will display useful help information. if_addr If present. The entry is permanent.exe. file wiresharksetup-0. the ARP timer for that entry is extended to 10 minutes.. Issue the arp command on the pod host computer.com/pub/eagle_labs/eagle1/chapter9/. A network engineer needs to be aware of ARP but may not interact with the protocol on a regular basis. Every device on the LAN keeps its own ARP cache. Example: > arp -s 157. The Physical address is given as 6 hexadecimal bytes separated by hyphens. ARP is an excellent example in performance tradeoff. arp Command Syntax 1. ARP -s inet_addr eth_addr [if_addr] ARP -d inet_addr [if_addr] ARP -a [inet_addr] [-N if_addr] -a Displays current ARP entries by interrogating the current protocol data.255. C:\> arp Displays and modifies the IP-to-Physical address translation tables used by address resolution protocol (ARP).85. With no cache.hr Page 105 of 165 www. Type cmd. Adds a static entry. the IP and Physical addresses for only the specified computer are displayed.

1.CCNA Exploration Network Fundamentals: Data Link Layer Lab 7.2 Frame Examination Step 2: Use the arp command to examine local ARP cache. Finally. Type dynamic 1. Manually Removing an ARP Cache Entry See Figure 5.hr Page 107 of 165 www.16.2 00-10-a4-7b-01-5f C:\> 3. Was the ARP cache entry cleared? __________ 4.5. Addresses can be deleted individually by specifying the IP address.16. 2. ARP associations are dynamically added to ARP cache. Do not send any traffic to the computer accessed previously.1.1. If not. What is the physical address of Eagle Server? ___________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Step 4: Manually adjust entries in the ARP cache.2 with 32 bytes of data: Reply from 172. the ARP cache should be empty.1. Received = 4.2 00-10-a4-7b-01-5f C:\> Figure 4. Examine ARP cache entry.1. or all entries can be deleted with the wildcard *. which will retain the cache entry for approximately 10 minutes.16. ________________________________________ What is the physical address of the destination pod host computer? ________________________________________. C:\> ping 172. C:\> arp -a No ARP Entries Found C:\> Figure 2.2: bytes=32 time<1ms TTL=128 Reply from 172. Figure 4 shows the new ARP cache entry. What is the physical address of the destination pod host computer? IP Address Physical Address How Discovered? 5. 2. Issue the ping command to another pod host computer.1. Write the command that will delete the entry for the pod host computer: ________________________________________ 5. Empty ARP Cache Without any network communication. Issue the command that displays ARP entries. eagle-server.1. Approximate round trip times in milli-seconds: Minimum = 0ms. delete the entry for the pod host computer. 4. Examine ARP cache entry. C:\> arp -a Interface: 172.1.1.2: bytes=32 time<1ms TTL=128 Ping statistics for 172. shown in Figure 3. ping Command to a Pod Host Computer 1.16.1. To delete entries in ARP cache.16.2 00-10-a4-7b-01-5f 172.2 Pinging 172. This is shown in Figure 2.0x60004 Internet Address Physical Address 172.16. R2-Central.1.2: Packets: Sent = 4. Issue the ping command to the Gateway. Lost = 0 (0% loss). 3. What are the results? ____________________________________________________________________________________ ____________________________________________________________________________________ Step 3: Use the ping command to dynamically add entries in the ARP cache.16.1. Next. ping the missing entry.2: bytes=32 time<1ms TTL=128 Reply from 172.2 Frame Examination CCNA Exploration Network Fundamentals: Data Link Layer Lab 7. which shows how to manually delete an ARP cache entry.hr Page 108 of 165 .1 --.com.16. and check ARP cache again. Verify that the ARP cache contains two entries: one for the Gateway and one to the destination pod host computer.16.0x60004 Internet Address Physical Address 172. C:\> arp –a Interface: 172.16.0x60004 Internet Address Physical Address 172. What is the physical address of the Gateway? ________________________________________ IP Address Physical Address How Discovered? Type dynamic dynamic Type dynamic Figure 5. verify your change.1.1 --. Display of ARP Cache How was the ARP entry added to the ARP cache? Hint: review the Type column. By accessing other devices. Issue the ping command to Eagle Server.example.edunet. On your computer. Record the two ARP cache entries: Device IP Address Physical Address How Discovered? www.1 --. The ping command can be used to test network connectivity. Average = 0ms C:\> Figure 3.255.254 C:\> arp -a Interface: 172. It may be easier to ping both devices more than once.16. Use the command ipconfig /all to verify the pod host computer’s Layer 2 and Layer 3 information. issue the command arp –d {inet-addr | *}. Maximum = 0ms.16.2: bytes=32 time<1ms TTL=128 Reply from 172. Wait between 2 and 3 minutes.16.16.5.254 00-0c-85-cf-66-40 C:\> C:\>arp -d 172.16.255.edunet. first verify that the two entries are present.

If the Ethernet II frame for an ARP request is a broadcast. Select the Interface that corresponds to the LAN. Using your Wireshark capture. Consider a secure environment where the Gateway controls access to a web server that contains Top Secret information.254. why does the Target MAC address contain all 0s? _________________________________________________________________ Why was there no ARP request for the ping to Eagle Server? ____________________________ _____________________________________________________________________________ _____________________________________________________________________________ www. which will require ARP to rediscover address maps.edunet. Wireshark capture will be stopped and the ARP communication evaluated. using the command ping –n 1 192. 1.5. 1. Wireshark Capture of ARP Communication 3. If not already completed. Issue the command on your pod host computer. Wireshark will be used to capture and examine an ARP exchange. Check the box to Update list of packets in real time. 2. Issue the command on your pod host computer. and one ping request will be sent to Eagle Server. Type cmd. You should see a Wireshark screen similar to the screen shown in Figure 6. The Packet Details Window shows ARP protocol contents. and examine the ARP cache with the command arp -a. ________________________________________ 9. Prepare Wireshark for captures. Do not close the Windows terminal—it will be used to view the ARP cache. Write the command that you used: ________________________________________ Step 3: Capture and evaluate ARP communication. Step 2: Prepare the pod host computer for ARP captures. Simulate removing all entries. and click OK. and fill in the following table: IP Address Physical Address Type Figure 6.hr Page 109 of 165 www. Afterward. Examine the ARP cache again. Step 1: Configure Wireshark for packet captures. 4. In this step. Click Capture > Options.edunet. Write the command that will add a static ARP entry for the Gateway to ARP cache: ________________________________________ 11. using the command ping –n 1 172. 1. 2.2 Frame Examination CCNA Exploration Network Fundamentals: Data Link Layer Lab 7. Send one ping request to the Gateway. 4.168. Send one ping request to Eagle Server. answer the following questions: What was the first ARP packet? ________________________________________ What was the second ARP packet? ________________________________________ Fill in the following table with information about the first ARP packet: Field Sender MAC address Sender IP address Target MAC address Target IP address Fill in the following table with information about the second ARP packet: Field Sender MAC address Sender IP address Target MAC address Target IP address Value Value For the next task. 3. Record the remaining ARP cache entry: Device IP Address Physical Address How Discovered? 7. This will begin the packet capture.hr Page 110 of 165 . All entries should be removed. Stop Wireshark and evaluate the communication. open a Windows terminal window by clicking Start > Run. 2.5. Task 2: Use Wireshark to Examine ARP Exchanges .254.254. one ping request will be sent to the Gateway. Write the command that will delete all entries in ARP cache: ________________________________________ 8. The Wireshark Packet list window displays the number of packets captured.255.CCNA Exploration Network Fundamentals: Data Link Layer Lab 7. Click Start.2 Frame Examination 6. What is one layer of security that can be applied to ARP cache entries that could aid in countering ARP spoofing? ________________________________________ 10.16. Flush the ARP cache.

If the entry was learned dynamically.0 255.16.10.255.254 192.2 Frame Examination How long should the Gateway mapping be stored in ARP cache on the pod host computer? Why? _____________________________________________________________________________ _____________________________________________________________________________ Lab 9. Using outside resources.16.hr Page 111 of 165 www. perform a search on ARP spoofing. If the entry was manually inserted in ARP cache.254 Page 112 of 165 N/A N/A N/A N/A .255.Pod#.10.Pod#.0 255.0.254 172.0 255.16.0.255.edunet. If a packet must move across networks. ARP cache stores ARP address mappings.16.0.24.255.10.254.0 255.252 10. the Layer 2 MAC address changes with each hop across a router.16.0 N/A 255.1 .255.2: Cisco Switch MAC Table Examination Topology Diagram Task 3: Reflection The ARP protocol maps Layer 3 IP addresses to Layer 2 MAC addresses.5.168.255.254 172. Using this technique.16.254 172.255.6 192.255. Discuss several techniques used to counter this type of attack.CCNA Exploration Network Fundamentals: Data Link Layer Lab 7. Task 4: Challenge Using outside resources. discuss the advantages of configuring wireless network access. Addressing Table Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 N/A Eagle Server hostPod#A hostPod#B S1-Central www. it will eventually be deleted from cache.1 172.255.255.255.10.168. Subnet Mask Default Gateway 255.255.255.hr Interface S0/0/0 IP Address 10.10.2 172. but the Layer 3 address never changes.6 255.255.5 172.254.8.255.253 N/A 172.254 172.31. MAC addresses that are permitted access to the wireless network are manually added to the wireless router. Discuss ways that attackers can circumvent this security.253 10.252 N/A 255.16. it is a static entry and will remain until the computer is turned off or the ARP cache is manually flushed.0 N/A 192.0 255.255.255.168.edunet.254.10.255. Most wireless routers support wireless network access.0.254.

******************************************************************* User Access Verification Username: ccna1 Password: cisco (*hidden*) S1-Central# Figure 1. Telnet is a network service that uses a client-server model.edunet. use userid ccna1. entries. network engineers can log into network devices from anywhere across a secure network. If the network is not secure. Issue the command show mac-address-table ? <ENTER>. the destination MAC address is checked against the table. Step 1: Access the Windows terminal. a modem configured on the AUX port enables telephone access.254. Task 2: Use the Cisco IOS show mac-address-table Command to Examine MAC Addresses and Port Associations. 1. Page 114 of 165 Step 2: Examine dynamic MAC address table entries. Using Telnet. When a switch receives a frame. the Cisco device can be configured for a Telnet session. otherwise it is denied. Telnet Client 2. Step 2: Use the Windows Telnet client to access S1-Central. ccna1 through ccna11. then the frame is routed out all ports except the port where it originated. Step 1: Examine the switch MAC address table. you will be able to: • • Use the Telnet protocol to log into a Cisco Switch. limited privileges have been configured for student use. Use show mac-address-table command to examine the mac addresses and association to ports. When the password prompt appears. Unless directed otherwise by your instructor. and the corresponding port is used to route the frame out of the switch. Open a Windows terminal by clicking Start > Run. 1.edunet. Use the Cisco IOS show mac-address-table command to examine MAC address and port associations. use the userid corresponding to your pod.2: Cisco Switch MAC Table Examination Learning Objectives Upon completion of this lab. S1-Central has been configured with 11 student accounts. For secure networks. telnet destination-ip-address: C:/> telnet 172. Using Windows hyperterm utility. Use the following table to fill in the command options: Option Description Scenario Use the Cisco IOS show mac-address-table command to examine the switch MAC address table and other address-related information. the student will connect to the switch via a Telnet session. . This command will display static (CPU) and dynamic. issue the Telnet command.8. and click OK.2: Cisco Switch MAC Table Examination CCNA Exploration Network Fundamentals: Ethernet Lab 9. Lab • • • Telnet to S1-Central. Enter the applicable user name. A console port can be used if the Cisco router or switch is within the same physical proximity of a computer. Authorized access only. similar to the one shown in Figure 1. Access to Cisco devices can be accomplished through several means. This will output all options for the command. or the frame is a broadcast. From the Windows terminal. Issue the command show mac-address-table. 2. Type cmd. type cisco <ENTER>. If a switch does not know which port to route the frame.CCNA Exploration Network Fundamentals: Ethernet Lab 9.16. for host computers on pod 1. The Cisco device must be configured for Telnet access. Log in with student account. To provide access to each student. the password is cisco.hr . or learned. network connectivity can be established through two means. Cisco IOS devices provide a default Telnet server. www.1 An access prompt will be displayed.8. Background Switches maintain a table of MAC addresses and associated switch port. The S1-Central# prompt should appear. Task 1: Use the Telnet Protocol to Log in to a Cisco Switch. Page 113 of 165 www. a serial connection can be established. 1. and operating systems such as Windows have built-in Telnet clients. In Eagle 1. For example. For devices physically distant from the network engineer. In this lab. ******************************************************************* This is Lab switch S1-Central.hr .

254.10.255.hr .254 255.10.255.16.Pod#. How many MAC addresses would be listed for switch port gi0/0? __________ Step 3: Examine MAC address table aging time.254 255.0. When a frame enters the switch. in seconds.5 N/A 255.254 172.10. the switch performs a lookup of the frame destination MAC address.0.254 172.0 192.255.edunet.254.255.6 Interface S0/0/0 IP Address 10.168.255.10.6 Subnet Mask Default Gateway 255.255. the frame is routed out the corresponding port. Without a MAC address table. that MAC address entries are stored.2 172.255.hr .0 N/A 192.254 172.255.3: Intermediary Device as an End Device Topology Diagram Suppose there was a hub with five active hosts connected to switch port gi0/0.1 255. List the MAC addresses and corresponding switch ports: MAC Address Switch Port Lab 9.168.255.253 255.255.255.16.24.255. This command will display the default time.16.255. This has the benefit of permitting access to remote devices for troubleshooting and monitoring purposes. What is the default aging time for VLAN 1? __________ Task 3: Challenge What would be the result if the MAC address table was flushed of dynamic entries? ___________________________________________________________________________________ ___________________________________________________________________________________ Task 4: Reflection Using the Telnet protocol. A switch contains a MAC address table that lists the MAC address connected to each switch port.0 N/A 172.0.2: Cisco Switch MAC Table Examination 2.8.16.255. the switch would have to flood the frame out each port.252 10.0.254 172.1 172. Page 116 of 165 . Page 115 of 165 www.255.252 N/A www.254.10.16. 2.edunet.168.16. Issue the command show mac-address-table aging-time. network engineers can access Cisco devices remotely across secure LANs.255.0 255. 1.31.16.254. If there is a match in the MAC address table.CCNA Exploration Network Fundamentals: Ethernet Lab 9.253 192.0 255. Addressing Table Device R1-ISP Fa0/0 S0/0/0 R2-Central Fa0/0 N/A Eagle Server N/A hostPod#A hostPod#B S1-Central N/A N/A N/A 172.Pod#.0 10.255.10.0 255.8.255.

3. The S1-Central prompt should be returned. Close the stream content window. Enter the appropriate user name and password. telnet destination-ip-address: C:/> telnet 172. use the userid corresponding to your pod. Examine the switch MAC address table with the command show mac-address-table. If the username and passwords are not visible.3: Intermediary Device as an End Device CCNA Exploration Network Fundamentals: Ethernet Lab 9. scroll down to the captured ICMP request. 2. A switch does not normally originate the frame to node devices. 1. Rather. Captured data will be transferred to Notepad for analysis. 1. www. S1-Central has been configured with 11 student accounts. Click Capture > Options. MAC Address Switch Port Background A switch is used to route frames between network devices. there should be numerous dynamic address table entries.16. From the Windows terminal. which was recorded earlier: C:>\ ping –n 1 ip-address 5. In addition to several static CPU entries. the password is cisco. 1. making analysis a bit tedious.edunet. Write down the IP address and port connection on S1-Central for the neighbor’s pod host computer: IP Address: ______________________________________ S1-Central port number: ___________ Task 1: Use Wireshark to Capture and Analyze Frames Originating From Network Nodes. a switch efficiently passes the frame from one device to another in the LAN. issue the Telnet command. On Wireshark menu. 4. Check the box to Update list of packets in real time. Highlight one of the Telnet session packets. Prepare Wireshark for captures. Step 2: Use the Windows Telnet client to access S1-Central. During this capture there will probably be more than 200 captures. Click Start. Page 117 of 165 What conclusion can be made about how a switch learns MAC addresses connected to switch interfaces? ____________________________________________________________________________ ____________________________________________________________________________ . 1. use the clear mac-address-table dynamic command. for host computers on pod 1. 4. Close Wireshark capture.8. The MAC address for this computer should be dynamically added in the S1-Central MAC address table. click Analyze | Follow TCP Stream. Select the Interface that corresponds to the LAN.hr . Step 2: Examine output of the show mac-address-table command. ccna1 through ccna11.1 2. In the top Wireshark Packet List pane. Examine the origination of frames in a small network. To provide access to each student. To clear dynamic MAC address table entries. The capture will be analyzed in the next task. Step 1: Examine a Telnet session to S1-Central. 1. Open a second terminal window. The critical Telnet conversation between the pod host computer and S1Central will be easy to filter.hr . 7. For example. 2. Ping your neighbor’s IP address. default display ASCII. cisco.254. There may be numerous packets that were captured. you will be able to: • • Use Wireshark to capture and analyze frames originating from network nodes. 6. A stream content window will open.edunet. Again list the dynamic MAC address entries: MAC Address Switch Port Scenario Wireshark will be used to capture and analyze Ethernet frames. Open Notepad. click View > Packet bytes. use userid ccna1. List the dynamic MAC address entries: Learning Objectives Upon completion of this lab. Task 2: Examine the Origination of Frames in a Small Network. Page 118 of 165 . 2. switch to HEX Dump. S1-Central#.8. If the bottom Wireshark Packet Byte window is not visible. This will begin the packet capture. Step 1: Configure Wireshark for packet captures. Step 3: Clear the MAC address table. Unless directed otherwise by your instructor. In this lab you will ping a neighbor’s pod host computer.3: Intermediary Device as an End Device 3. 2.CCNA Exploration Network Fundamentals: Ethernet Lab 9. Verify the username and password that you entered: Username: ___________________________ Password: __________ 3. www.

Task 4: Challenge Use Wireshark to capture and analyze a Telnet session between the pod host computer and the Cisco switch.dddd STATIC CPU 1 0010.0ccc. In Notepad. Does the switch port correspond to your neighbor’s pod host computer? __________ MAC Address Type Port Figure 1.RPC Mac Address Table ------------------------------------------Vlan Mac Address Type Ports ------------------------All 000f. select the corresponding Packet byte.8.edunet.76ac.a47b. Write down the MAC address and Port number for the second dynamic displayed in the output.a76a DYNAMIC Fa0/2 Total Mac Addresses for this criterion: 6 S1-Central# 4. Text should be similar to the following Paste action: {_lEPaNM.0ccc.3: Intermediary Device as an End Device Select the last Telnet data packet immediately after the ping reply.dddd STATIC CPU 1 0010.CCNA Exploration Network Fundamentals: Ethernet Lab 9. How secure is the Telnet protocol? What can be done to make communication with Cisco devices more secure? ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ________________________________________________________________________________ Why is your pod host computer mapping still in the MAC address table.a47b.cccc STATIC CPU All 0100.8. Right-click the Packet byte and click Copy > Text only. Next.6cc0 STATIC CPU All 0100.f79f. click Edit > Paste. Next.cccd STATIC CPU All 0100. a partial output of the Wireshark capture: Select the last Telnet data packet from S1-Central before the ping command. Page 119 of 165 www.015f DYNAMIC Fa0/1 Total Mac Addresses for this criterion: 5 S1-Central# 3.0ccc. select the corresponding Packet byte. Page 120 of 165 .f79f.hr .0ccc. click Edit > Paste.3: Intermediary Device as an End Device CCNA Exploration Network Fundamentals: Ethernet Lab 9.cccc STATIC CPU All 0100.VP Mac Address Table ------------------------------------------Vlan Mac Address Type Ports ------------------------All 000f.0cdd. despite having been cleared? _____________________________________________________________________ _____________________________________________________________________________ www. Use the Wireshark menu option Analyze > Follow TCP Stream to view the login user ID and password. Write down the MAC address and Port number displayed in the output. Wireshark Capture of Telnet See Figure 1.edunet. Right-click the Packet byte and click Copy > Text only.0cdd.cccd STATIC CPU All 0100. In Notepad.6cc0 STATIC CPU All 0100. Dynamic mappings should be similar to the following output: {_lEMaNL. Does the switch port correspond to your pod host computer? __________ MAC Address Type Port Task 3: Reflection The Wireshark capture of a Telnet session between a pod host computer and S1-Central was analyzed to show how a switch dynamically learns about nodes directly connected to it.hr .015f DYNAMIC Fa0/1 1 0016.

edunet. design an IP addressing scheme that satisfies the following requirements: Subnet SubnetA SubnetB SubnetC SubnetD Number of Hosts 2 maximum 6 maximum 47 maximum 125 maximum Host computers from each subnet will use the first available IP address in the address block. Configure the logical LAN topology. you will be able to: • • • • Design the logical network. Begin the logical network design by satisfying the requirement of SubnetD. Configure the physical lab topology. Given an IP address and mask of 172. Verify LAN connectivity. Step 1: Design SubnetD address block.CCNA Exploration Network Fundamentals: Ethernet Lab 9. not yet connected to the network.20. and pick the first address block that will support SubnetD. Refer to the subnet chart. Equipment and Hardware for Lab Gather the necessary equipment and cables.3: Intermediary Device as an End Device Scenario Lab 10. To configure the lab.1: Creating a Small Lab Topology Topology Diagram In this lab you will create a small network that requires connecting network devices and configuring host computers for basic network connectivity.edunet. and pick the next available address block that will support SubnetC. Page 122 of 165 . refer to the equipment and hardware listed in Table 1. Note: Appendix 1 contains a subnet chart for the last IP address octet.6. Task 1: Design the Logical Network. Learning Objectives Upon completion of this lab. Refer to the subnet chart. Page 121 of 165 www. SubnetC and SubnetD are anticipated subnets.0. Fill in the following table with IP address information for SubnetD: Network Address Mask First Host Address Last Host Address Broadcast Background Hardware Cisco Router Cisco Switch *Computer (host) Cat-5 or better straight-through UTP cables Qty 1 1 3 3 Description Part of CCNA Lab bundle Part of CCNA Lab bundle Lab computer Connects Router1 and computers Host1 and Host2 to Switch1 Connects computer Host1 to Router1 What is the bit mask? __________________________________________________ Step 2: Design SubnetC address block. SubnetA and SubnetB are subnets that are currently needed. the next largest IP address block. Satisfy the requirement of SubnetC. the next largest IP address block. which requires the largest block of IP addresses. Fill in the following table with IP address information for SubnetC: Network Address Mask First Host Address Last Host Address Broadcast Cat-5 crossover UTP cable 1 What is the bit mask? __________________________________________________ Step 3: Design SubnetB address block. Satisfy the requirement of SubnetB.hr .0 / 24 (address / mask). Refer to the subnet chart. Table 1. and pick the next available address block that will support SubnetB. www.hr .8. The 0th subnet will be used. Router interfaces will use the last available IP address in the address block.

Is the power applied to the connected device? Is the correct cable used? Is the correct cable good? What type of cable connects Router1 interface Fa0/0 to Host1? ________________________________ What type of cable connects Router1 interface Fa0/1 to Switch1? ______________________________ What type of cable connects Host2 to Switch1? _____________________________________________ What type of cable connects Host3 to Switch1? _____________________________________________ Is all equipment turned on? __________ Last Host Address Broadcast What is the bit mask? ________________________________________________________ Step 4: Design SubnetA address block.3: Intermediary Device as an End Device CCNA Exploration Network Fundamentals: Ethernet Lab 9. .edunet.hr IP Mask Gateway Address Step 2: Configure Host1 computer. and why? ____________ __________________________________________________________________________________ __________________________________________________________________________________ If not already enabled. Ensure that all switch connections show green.edunet. take a moment to verify the connections. From the IP address information recorded in Task 1. and then click the Properties button. What is the bit mask? ________________________________________________________ The host computer Gateway IP address is used to send IP packets to other networks. select Internet Protocol (TCP/IP). Figure 1. Attention to detail now will minimize the time required to troubleshoot network connectivity issues later. Host2. and pick the next available address block that will support SubnetA. What cable type is needed to connect Host1 to Router1. Step 1: Document logical network settings. Page 124 of 165 . Fill in the following table with IP address information for SubnetA: Network Address Mask First Host Address Task 3: Configure the Logical Topology.8. Page 123 of 165 www. Right-click the Local Area Connection device icon and choose Properties. and Router1 to Switch1. write down the IP address information for each computer: Host1 IP Address IP Mask Gateway Address Host2 IP Address IP Mask Gateway Address Host3 IP Address Task 2: Configure the Physical Lab Topology. Satisfy the requirement of SubnetA. www. Refer to the subnet chart.3: Intermediary Device as an End Device Fill in the following table with IP address information for SubnetB: Network Address Mask First Host Address Last Host Address Broadcast Step 2: Visually inspect network connections After cabling the network devices.hr . the Gateway address is the IP address assigned to the router interface for that subnet. Any switch connection that does not transition from amber to green should be investigated.CCNA Exploration Network Fundamentals: Ethernet Lab 9. turn power on to all devices. On Host1.8. click Start > Control Panel > Network Connections. Step 1: Physically connect devices. Therefore. On the General tab. Cabling the Network Cable the network devices as shown in Figure 1. and why? _____________________________ __________________________________________________________________________________ What cable type is needed to connect Host1.

above: IP address: Host1 IP address Subnet mask: Host1 subnet mask Default gateway: Gateway IP address When finished. Fa0/1 Host2 Host3 Host3 Gateway (Router1. Fa0/1) Router1. In addition to practicing IP subnetting. Task 4: Verify Network Connectivity. you configured host computers with network addresses and tested them for connectivity. connectivity will be broken between LANs. close the Internet Protocols (TCP/IP) Properties window by clicking OK. Page 125 of 165 www. This is a particularly important lab. Fa0/0 Host1 Host2 Gateway (Router1. Verify with your instructor that Router1 has been configured. Type cmd. Manually enter the following information. the computer may require a reboot for changes to be effective.3: Intermediary Device as an End Device CCNA Exploration Network Fundamentals: Ethernet Lab 9. how can a malfunctioning Gateway be detected? ___________________________________________________________________________________ ___________________________________________________________________________________ Task 5: Reflection Review any physical or logical configuration problems encountered during this lab. When troubleshooting connectivity issues. Fa0/1) Router1. Be sure that you have a thorough understanding of the procedures used to verify network connectivity.edunet. This will reinforce the skills you learned in this lab and make you a better network technician. Task 6: Challenge Ask your instructor or another student to introduce one or two problems in your network when you aren’t looking or are out of the lab room. Fa0/0) Router1. In the above scenario. Network connectivity can be verified with the Windows ping command. Repeat Step 2 for computers Host2 and Host3.hr . Open a windows terminal by clicking Start > Run. recorded in Step 1.8. Perform a good visual inspection. Fa0/0 Host1 IP Address Ping Results Note any break in connectivity. Switch1 should have a default configuration. using the IP address information for those computers. It is best to practice host computer configuration and verification several times. Page 126 of 165 . Problems can be either physical (wrong UTP cable) or logical (wrong IP address or gateway). Host1 IP Address and Gateway Settings Refer to Figure 2 for Host1 IP address and gateway settings.hr .edunet. Look for green link lights on Switch1. www. Step 3: Configure Host2 and Host3 computers.CCNA Exploration Network Fundamentals: Ethernet Lab 9. Take corrective action to establish connectivity if a test fails: From Host1 Host1 Host1 Host1 Host2 Host2 Host2 Host2 Host3 Host3 Figure 2. Otherwise. Close the Local Area Connection window. the topology diagram can be extremely helpful.3: Intermediary Device as an End Device Use the following table to methodically verify and record connectivity with each network device.8. Depending on the Windows operating system. and press Enter. To fix the problems: 1. Host3 Host3 To Gateway (Router1.

If the solution fixed the problem.8.hr .CCNA Exploration Network Fundamentals: Ethernet Lab 9. Instructions for TeraTerm Web use are contained in Appendix A.6.edunet. If the solution did not fix the problem. Write down your proposed solution(s): _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 4. Carefully remove cables and return them neatly to their storage. www.edunet.2: Establishing a Console Session with HyperTerminal Topology Diagram Task 7: Clean Up Unless directed otherwise by the instructor. Configure HyperTerminal to establish a console session with a Cisco IOS switch. Configure HyperTerminal to establish a console session with a Cisco IOS router. document the solution. Another popular serial communication utility is TeraTerm Web. Use the table provided in Task 3 to identify failed connectivity. Test your solution. you will be able to: • • • Connect a router and computer using a console cable. continue troubleshooting. Page 127 of 165 www. Background HyperTerminal is a simple Windows-based terminal emulation program for serial communication that can be used to connect to the console port on Cisco IOS devices. List the problems: _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 3. _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Lab 10.hr Page 128 of 165 . and leave the room ready for the next class.3: Intermediary Device as an End Device 2. Using HyperTerminal is the most basic way to access a router for checking or changing its configuration. and then turn off power to the host computers. Remove anything that was brought into the lab. Reconnect cables that were disconnected for this lab. Learning Objectives Upon completion of this lab. A serial interface on a computer is connected to the Cisco device via a rollover cable. restore host computer network connectivity.

enter a session name in the Name field. Step 2: Configure HyperTerminal. or a combination. Step 2: Power on devices. Connect the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port. Connect the console (rollover) cable to the console port on the router. start the HyperTerminal program by clicking Start > Programs > Accessories > Communications > HyperTerminal. Step 1: Start HyperTerminal application.6. At the Connection Description window. 1700.edunet.2 Establishing a Console Session with HyperTerminal Scenario Set up a network similar to the one in the Topology Diagram.CCNA Exploration Network Fundamentals: Planning and Cabling Networks Lab 10.2 Establishing a Console Session with HyperTerminal CCNA Exploration Network Fundamentals: Planning and Cabling Networks Lab 10. Task 2: Configure HyperTerminal to Establish a Console Session with a Cisco IOS Router. Figure 2.6. HyperTerminal COM1 Port Settings Refer to Figure 3. or leave the default. Select an appropriate icon. Possible routers include 800.hr Page 129 of 165 www. Enter the appropriate connection type. Step 1: Set up basic physical connection. Any router that meets the interface requirements may be used. Click OK. If not already powered on. The following resources will be required: • • • Computer with a serial interface and HyperTerminal loaded Cisco router Console (rollover) cable for connecting the workstation to the router Task 1: Connect a Router and Computer with a Console Cable. www. From the Windows taskbar. Figure 3. 1600. in the Connect using field. HyperTerminal Connection Type Refer to Figure 2. enable power to the computer and router. COM 1.edunet. Click OK. 2600 routers. 2500.hr Page 130 of 165 . Change port settings to the following values: Setting Bits per second Data bits Parity Stop bits Flow control Value 9600 8 None 1 None Figure 1. HyperTerminal Name Configuration Window Refer to Figure 1 for a description of the opening HyperTerminal configuration window.

For example. enable power to the computer and switch.6. Step 3: Close HyperTerminal. click Cancel. Task 3: Reflection This lab provided information for establishing a console connection to a Cisco IOS router and switch. close the HyperTerminal session. Remove the rollover cable. Refer to Figure 3. Click OK. Refer to Figure 4. Serial connections between Cisco IOS routers and switches are very similar. Change port settings to the following values: Setting Bits per second Data bits Parity Stop bits Flow control Click OK. Step 4: Configure HyperTerminal. At the Connection Description window. Click File > Open. This indicates that connection has been successfully completed. verify that the router has power. and be able to identify the different cable types. Click OK. enter a session name in the Name field. start the HyperTerminal program by clicking Start > Programs > Accessories > Communications > Hyper Terminal. close the HyperTerminal session. . Click File > Exit. Task 5: Clean Up Figure 4. Serial Connection Between a Host Computer and Cisco Switch Step 1: Set up basic physical connection. When finished.hr Page 131 of 165 www. Step 2: Power on devices.edunet. From the Windows taskbar.6. you will make a serial connection between the host computer and a Cisco IOS switch. Refer to Figure 2. If not already powered on. turn off power to the host computer and router. Reopen the HyperTerminal session as described in Task 2.2 Establishing a Console Session with HyperTerminal Click OK. There should be a response from the router. verify that the switch has power. exit TeraTerm. Step 5: Close HyperTerminal.edunet. press the Enter key. Step 2. Compare the differences. If there is still no connection. Enter the appropriate connection type. www.hr Page 132 of 165 Unless directed otherwise by the instructor.CCNA Exploration Network Fundamentals: Planning and Cabling Networks Lab 10. in the Connect using field. Step 4: Reconnect the HyperTerminal session. When the HyperTerminal session window comes up. Connect the console (rollover) cable to the console port on the router. Connect the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port. click No. When asked whether to save the session. If there is no connection. For example. This indicates that connection has been successfully completed. When the HyperTerminal session window comes up. Check the connection to the correct COM 1 port on the PC and the console port on the switch. click Yes. There should be a response from the switch. When asked whether to save the session. ask the instructor for assistance. Refer to Figure 1 of the opening HyperTerminal configuration window. troubleshoot as necessary. troubleshoot as necessary. When finished. Step 1. In this task. Enter a name for the session. Select an appropriate icon. when the Connection Description window opens (see Figure 1).2 Establishing a Console Session with HyperTerminal CCNA Exploration Network Fundamentals: Planning and Cabling Networks Lab 10. or leave the default. This time. Task 4: Challenge Draw the pin connections for the rollover cable and straight-through cable. Remove anything that was brought into the lab. Use the procedure described in Task 2. Select the saved session and then click Open. If there is no connection. When finished. Click File > Exit. COM 1. If there is still no connection. and leave the room ready for the next class. press the Enter key. Step 3: Start HyperTerminal application. Check the connection to the correct COM 1 port on the PC and the console port on the router. Use this technique to reconnect the HyperTerminal session to a Cisco device without reconfiguring a new session. Value 9600 8 None 1 None Task 3: Configure HyperTerminal to Establish a Console Session with a Cisco IOS Switch. to configure HyperTerminal. ask the instructor for assistance.

If there is still no connection. From the Windows taskbar. Figure 1. When asked whether to save the session. Scenario Cable a network similar to the Topology Diagram. Learning Objectives Upon completion of this lab. Refer to Figure 1. The connection has been successfully completed. verify that the router has power.2 Establishing a Console Session with HyperTerminal CCNA Exploration Network Fundamentals: Planning and Cabling Networks Lab 10.edunet. Select the appropriate serial COM port.hr www.2 Establishing a Console Session with HyperTerminal Appendix A Establishing a Console Session with TeraTerm Topology Diagram Task 1: Connect a Router and Computer with a Console Cable. Background TeraTerm Web is another simple Windows-based terminal emulation program for serial communication that can be used to connect to the console port on Cisco IOS devices. The following resources will be required: • • • Computer with a serial interface and TeraTerm Pro loaded Cisco router Console (rollover) cable for connecting the workstation to the router Page 133 of 165 www.6. Possible routers include 800. Step 3: Close TeraTerm Web. Ensure that power is turned off on the computer and Cisco router. ask the instructor for assistance. Enable power to the computer and router. or a combination. 1700. troubleshoot as necessary.edunet. start the TeraTerm Web program by opening the TeraTerm Web folder. press the Enter key. If there is no connection. ttermpro. For example.CCNA Exploration Network Fundamentals: Planning and Cabling Networks Lab 10. Any router that meets the interface requirements may be used. 1600. Configure TeraTerm to establish a console session with the router. TeraTerm Web Connection Configuration Window Click File > New Connection. Connect the other cable end to the PC with a DB-9 or DB-25 adapter to the COM 1 port. Check the connection to the COM 1 port on the PC and the console port on the router. Click OK.6.hr Page 134 of 165 . 2600 routers. Enter a name for the session. and starting the TeraTerm Web application. Step 1: Start TeraTerm Web application. There should be a response from the router. click Yes. 2500. When finished. Click File | Exit. Connect the console (rollover) cable to the console port on the router. Task 2: Configure TeraTerm Web to Establish a Console Session with the Router. you will be able to: • • Connect a router and computer using a console cable. close the TeraTerm Web session. Step 2: Power on devices. When the TeraTerm Web session window comes up. Step 1: Set up basic physical connection. Step 2: Configure TeraTerm Web.

click Cancel. access passwords. Connects computer host 1 to Router LAN interface Fa0/0 Connects computer hosts to Switch and switch to router Table 1. Common configuration tasks include setting the hostname.1: Basic Cisco Device Configuration Topology Diagram Task 3: Reflection This lab provided information for establishing a console connection to a Cisco router. In addition to assigning a Layer 3 IP address. Configure a Cisco switch. Learning Objectives Configure Cisco router global configuration settings.5. Cisco switches are accessed in the same way. and leave the room ready for the next class. and MOTD banner. Equipment and hardware required for this lab. Interface configuration is extremely important. Remove anything that was brought into the lab. Reopen the TeraTerm Web session as described in Task 2. turn off power to the host computer and router. Background Hardware Cisco Router Cisco Switch *Computer (host) Console (rollover) cable UTP Cat 5 crossover cable Straight Through Cable Qty 1 1 1 1 1 3 Description Part of CCNA Lab bundle.6.edunet. Configure Cisco router interfaces. and be able to identify the different cable types.hr Page 135 of 165 www. Click File > Open.edunet. Lab 11. To configure the lab.2 Establishing a Console Session with HyperTerminal Step 4: Reconnect the TeraTerm Web session. Compare the differences. Use this technique to reconnect the TeraTerm Web session to a Cisco device without reconfiguring a new session. Lab computer. when the New Description window opens (see Figure 1). Remove the rollover cable. Task 4: Challenge Draw the pin connections for the rollover cable and straight-through cable. make sure the equipment listed in Table 1 is available. Configure Cisco router password access. Save the router configuration file. Connects computer host 1 to Router console port. Page 136 of 165 . This time. Task 5: Clean Up Unless directed otherwise by the instructor. Step 1. Gather the necessary equipment and cables. Select the saved session and then click Open.CCNA Exploration Network Fundamentals: Planning and Cabling Networks Lab 10.hr . www. Part of CCNA Lab bundle. enter a description that describes the destination connection speeds troubleshooting time.

(Hint: fill in the subnet number.edunet. fill in the following information in the table below. Step 1: Physically connect devices. Ensure that power has been applied to the host computer.5.1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. then the host address. From the Widows taskbar. Configure HyperTerminal with the proper settings: Connection Description Name: Lab 11_2_11 Icon: Personal choice Connect to Before proceeding. Lab cabling.133. Configuration changes must be saved in NVRAM to be persistent across reboot. Given an IP address of 198.5. Address information will be easy to compute with the subnet number filled in first) Maximum number of usable subnets (including the 0th subnet): _______________ Number of usable hosts per subnet: ___________________ # 0 IP Address: Subnet First host address Subnet mask: Last host address Broadcast Figure 1. Refer to Figure 1. Cisco IOS switch configuration is similar to Cisco IOS router configuration. www. Connect the crossover cable between the host computer’s network interface card (NIC) and Router interface Fa0/0. Connect Using: COM1 (or appropriate COM port) COM1 Properties Bits per second: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow Control: None When the HyperTerminal session window comes up. switch and router. Step 2: Connect host computer to router through HyperTerminal.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. The instructor will assign subnetworks. Task 1: Configure Cisco Router Global Configuration Settings.hr Page 138 of 165 .0/24. press the Enter key until there is a response from the router. with 4 bits borrowed for subnets. Connect the other end of the cable to the host computer using a DB-9 or DB-25 adapter to the COM 1 port. Scenario In this lab students will configure common settings on a Cisco Router and Cisco Switch.1 Basic Cisco Device Configuration Configuration changes are effective immediately. start the HyperTerminal program by clicking on Start | Programs | Accessories | Communications | HyperTerminal.edunet. Connect the console or rollover cable to the console port on the router. verify your addresses with the instructor. Configuration changes may also be saved off-line in a text file for auditing or device replacement.219.hr Page 137 of 165 www. Connect a straight-through cable between the Router interface Fa0/1 and any of the switch’s interfaces (1-24).

penalties for unauthorized access.hr Page 139 of 165 www.1 Basic Cisco Device Configuration If the router terminal is in the configuration mode. For example. enter privileged exec mode: Router> enable Router# Verify a clean configuration file with the privileged exec command show running-config. The corporate security policy should provide policy on all banner messages. If a configuration file was previously saved. enter global configuration mode: Briefly hold down the keys <CTRL><SHIFT>6. To terminate the wait.5.255) % ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ From the privileged exec mode. ask the instructor to remove the configuration. www. your configuration may look slightly different. Since there is no domain server configured. and applicable local laws.domain server (255. there will be a delay while the request times out. simultaneously hold down the <CTRL><SHIFT>6 keys then release and press x: Router>enabel Translating "enabel". a friendly “Welcome” message may be interpreted by a court that an attacker has been granted permission to hack into the router.5. Appendix 1 shows a typical default router’s configuration.255.edunet. there should be no configured passwords or IP addresses. However. exit by typing NO. connection logging. Would you like to enter the initial configuration dialog? [yes/no]: no Examine the different configuration modes that can be entered with the command configure? Write down the list of configuration modes and description: ___________________________________________________________________________________ ___________________________________________________________________________________ Press RETURN to get started! Router> When in privileged exec command mode. If your router does not have a default configuration.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. any misspelled or unrecognized commands will attempt to be translated by the router as a domain name. banner content may have a significant legal impact on the organization. Depending on router’s model and IOS version. What two commands may be used to leave the privileged exec mode? ___________________ What shortcut command can be used to enter the privileged exec mode? _________________ Step 5: Configure the MOTD banner. In production networks. This can take between several seconds to several minutes.. release and press x Name lookup aborted Router> From the user exec mode. A banner should include information about authorization..edunet.255. Router# configuration terminal Router(config)# What three commands may be used to leave the global configuration mode and return to the privileged exec mode? ___________________________________________________________________________________ ___________________________________________________________________________________ What shortcut command can be used to enter the global configuration mode? ______________________ Set the device hostname to Router1: router(config)# hostname Router1 Router1(config)# How can the hostname be removed? ___________________________________________________________________________________ ___________________________________________________________________________________ Step 3: Configure global configuration hostname setting. it will have to be removed.hr Page 140 of 165 .1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.

since it controls access to the configuration mode.1 Basic Cisco Device Configuration Create a suitable MOTD banner. *** *** Unauthorized access is prohibited. In production environments. End with the character '%' ***You are connected to an ABC network device. Cisco IOS supports two commands that set access to the privileged exec mode. access on that virtual line is blocked. Use the terminating character on a blank line to end the MOTD entry: Router1(config)# banner motd % Enter TEXT message. numbers. One command.hr Page 142 of 165 . Exit configuration and return to the privileged exec mode. In early Cisco IOS versions. The privileged exec mode password is the most critical password. Access is granted to only current ABC company system administrators with prior written approval. In newer Cisco IOS versions. and the password.5.edunet. The virtual line password controls Telnet access to the router. only five virtual lines could be set.” Password security relies on the password algorithm. Examine the different banner modes that can be entered. and virtual lines.edunet. Set the privileged exec password to cisco. and will be prosecuted. unauthorized access will be prosecuted. www. enable password. aux. The MOTD banner is displayed on all connections before the login prompt. the number has been expanded. Write down the list of banner modes and description. Step 3: Configure the virtual line password. Step 1: Configure the privileged exec password. The console password controls console access to the router. and symbols. Set the virtual line access password to class.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Router1(config)# banner ? ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ What is the command to remove the console password? _____________________________ ___________________________________________________________________________________ Choose a terminating character that will not be used in the message text. we will use weak passwords. it is impossible to recover an enable secret based on the contents of a configuration file (other than by obvious dictionary attacks).__________________ Configure the MOTD banner.hr Page 141 of 165 www. ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ Task 2: Configure Cisco router password access. . Only system administrators of the ABC Company are authorized access. *** % Router1(config)# What is the global configuration command to remove the MOTD banner? ___________________________________________________________________________________ Router1(config)# line console 0 Router1(config-line)# password class Router1(config-line)# login Router1(config)# enable secret cisco Router1(config)# Step 2: Configure the console password.5.1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Access passwords are set for the privileged exec mode and user entry point such as console. Unless a telnet password is set. contains weak cryptography and should never be used if the enable secret command is available. strong passwords should be used at all times. and all connection information will be logged. Cisco says “As far as anyone at Cisco knows. *** *** All connections are continuously logged. In a lab environment. The enable secret command uses a very secure MD5 cryptographic hash algorithm. Set the console access password to class. Router1(config-line)# line vty 0 4 Router1(config-line)# password class Router1(config-line)# login There are three commands that Command may be used to exit the line configuration mode: Effect Return to the global configuration mode. A strong password consists of at least nine characters of upper and lower case letters. 0 through 4.

5. All cabled interfaces should contain documentation about the connection. Configure the host computer for LAN connectivity.602: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1.1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Use the ping command to verify network connectivity with the router. Right-click on the LAN icon. Write a short description for the connections on Router1: Fa0/1 -> ___________________________________________________________________________________ Apply the description on the router interface with the interface configuration command. and select Properties. changed state to up Task 3: Configure Cisco Router Interfaces. Write down your subnet number and mask: ________________________________________________ The first IP address will be used to configure the host computer LAN.1 Basic Cisco Device Configuration Issue the command exit. On newer Cisco IOS versions. Write a short description for the connections on Router1: Fa0/0 -> ___________________________________________________________________________________ Task 4: Save the Router Configuration File.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Figure 2 shows a network topology where a host computer is connected to Router1. Recall that the LAN configuration window is accessed through Start | Control Panel | Network Connections. What is the router prompt? What is the mode? Router1(config-line)# exit ___________________________________________________________________________________ ___________________________________________________________________________________ Issue the command end. and select Properties. Physical lab topology. changed state to up Step 3: Configure the host computer. Fill in the following fields: IP Address: The first host address __________________________ Subnet Mask: The subnet mask ____________________________ Default Gateway: Router’s IP Address _______________________ Click OK. Write down the first IP Address: ___________________________________________________________________________________ The last IP address will be used to configure the router fa0/0 interface. the maximum description is 240 characters. and NVRAM configuration storage as startup-configuration. If ping replies are not successful troubleshoot the connection: What Cisco IOS command can be used to verify the interface status? __________________________ What Windows command can be used to verify host computer configuration? _____________________ What is the correct LAN cable between host1 and Router1? _______________________________ Step 1: Configure the router fa0/0 interface. Figure 2. Open a terminal window. Step 2: Configure the router Fa0/1 interface. For configurations to survive rebooting or power restarts.edunet. Cisco IOS refers to RAM configuration storage as running-configuration. description: Router1(config)# interface fa0/0 Router1(config-if)# description Connection to Host1 with crossover cable Router1(config-if)# ip address address mask Router1(config-if)# no shutdown Router1(config-if)# end Router1# Look for the interface to become active: *Mar 24 19:58:59. and then Close. description: Router1(config)# interface fa0/1 Router1(config-if)# description Connection to switch with straight-through cable Router1(config-if)# ip address address mask Router1(config-if)# no shutdown Router1(config-if)# end Router1# Look for the interface to become active: *Mar 24 19:58:59. Write down the last IP Address: ___________________________________________________________________________________ Step 4: Verify network connectivity. and verify network settings with the ipconfig command.hr Page 143 of 165 www.602: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0. What is the router prompt? What is the mode? ___________________________________________________________________________________ ___________________________________________________________________________________ Apply the description on the router interface with the interface configuration command.hr Page 144 of 165 . the RAM configuration must be www. interface Fa0/0.edunet.5. Highlight the Internet Protocol field.

Only system administrators of the ABC company are authorized access. Display the next line. Use the terminating character on a blank line to end the MOTD entry. A line containing “ -. Set the console access password to class. review the similar step for configuring a router MOTD banner. This does not occur automatically. it is because there is no saved configuration. Display the contents of NVRAM. Configure global configuration hostname setting.edunet.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Save the RAM configuration to NVRAM: Router1# copy running-config startup-config Destination filename [startup-config]? <ENTER> Building configuration. your configuration may look slightly different. However. enter global configuration mode: Switch> en Switch# config t Switch(config)# Set the device hostname to Switch1. Switch1(config)# line console 0 Switch1(config-line)# password class Switch1(config-line)# login Step 2: Save RAM configuration to NVRAM. ask the instructor to remove the configuration. The MOTD banner is displayed on all connections before the login prompt.hr Page 145 of 165 www. Create a suitable MOTD banner. Router1#show running-config Use the output to answer the following questions: How large is the configuration file? ____________________ Switch(config)# hostname Switch1 Switch1(config)# Step 3: Configure the MOTD banner. there should be no configured passwords.1 Basic Cisco Device Configuration copied into non-volatile RAM (NVRAM). There are 16 virtual lines that can be configured on a Cisco IOS switch.5. NVRAM must be manually updated after any changes are made. Quit Quit Step 1: Connect the host to the switch. ____________________________ Review the contents of NVRAM. Set the privileged exec password to cisco. From the user exec mode. The benefit of learning IOS commands is that they are similar to many different devices and IOS versions. Switch1(config-line)# line vty 0 15 Switch1(config-line)# password class Switch1(config-line)# login Task 5: Configure a Cisco Switch. press Enter until the switch responds. For assistance.: Router1# show startup-config startup-config is not present Router1# Display the contents of RAM.“ indicates that there is additional information to display. For a configuration to be used the next time the router is powered on or reloaded. 0 through 15. Ensure power has been applied to the switch. Switch1(config)# enable secret cisco Switch1(config)# Step 5: Configure the console password. Step 6: Configure the virtual line password. Step 2.5. If the output of NVRAM is missing. Use the Cisco IOS show command to view RAM and NVRAM configurations. it must be manually saved in NVRAM. [OK] Router1# Write down one possible shortcut command that will copy the RAM configuration to NVRAM. Step 1: Compare router RAM and NVRAM configurations. cable to the console port on the switch. The configuration is displayed one screen at a time. The following list describes acceptable key responses: Key <SPACE> <RETURN> Q <CTRL> c Description Display the next page.hr Page 146 of 165 .. and all connection information will be logged.1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. or rollover. www. In Hyperterminal. Configure the MOTD banner..more -. Cisco IOS switch configuration is (thankfully) similar to configuring a Cisco IOS router. Appendix 2 shows a typical default switch configuration. unauthorized access will be prosecuted. Write down one possible shortcut command that will display the contents of NVRAM.edunet. Set the virtual line access password to class. Switch1(config)# banner motd % What is the enable secret password? ________________________ Does your MOTD banner contain the information you entered earlier? __________________________ Do your interface descriptions contain the information you entered earlier? ____________________ Write down one possible shortcut command that will display the contents of RAM. _________________ Step 4: Configure the privileged exec password. Depending on router model and IOS version. Move the console. and verify that the configuration is the same as the configuration in RAM. If your router does not have a default configuration.

and verify that the configuration is the same as the configuration in RAM. interface Fa0/1. description: Switch1(config)# interface fa0/1 Switch1(config-if)# description Connection to Router1 Switch1(config)# interface fa0/2 Switch1(config-if)# description Connection to host computer 2 Switch1(config)# interface fa0/3 Switch1(config-if)# description Connection to host computer 3 Switch1(config-if)# end Switch1# Figure 3. and interface Fa0/3 is connected to host computer 3. Task 6: Reflection The more you practice the commands.. It is perfectly acceptable to use notes at first to help configure a device. Router(config)# Specify a password to prevent unauthorized access to the console. Step 7: Save RAM configuration to NVRAM. Command configure terminal Example: Router> enable Router# configure terminal Router(config)# hostname name Example: Router(config)# hostname Router1 Router(config)# Specify the name for the router. Step 7: Configure the interface description.5. Specify an encrypted password to prevent enable secret password Example: unauthorized access to the privileged Router(config)# enable secret cisco exec mode.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. For a configuration to be used the next time the switch is powered on or reloaded. Switch1 interface Fa0/2 is connected to host computer 2.1 Basic Cisco Device Configuration Write a short description for the connections on Switch1: Router1 Interface Fa0/1 Fa0/2 Fa0/3 Description Apply the descriptions on the switch interface with the interface configuration command. password password login Example: www. [OK] Switch1# Review the contents of NVRAM. Save the RAM configuration to NVRAM: Switch1# copy run start Destination filename [startup-config]? <ENTER> Building configuration.hr Page 147 of 165 www.5. Network topology. The following table lists commands covered in this lab: Purpose Enter the global configuration mode. but a professional network engineer does not need a ‘cheat sheet’ to perform common configuration tasks. Figure 3 shows a network topology where Router1 is connected to Switch1. it must be manually saved in NVRAM.hr Page 148 of 165 .edunet.edunet.. the faster you will become in configuring a Cisco IOS router and switch.

One way to save the configuration file is to use HyperTerminal Transfer menu option Capture. Verify the configuration. and press the <SPACE> key until all of the configuration has been displayed. Remove any lines that are not configuration commands. To load the configuration file. Manually correct any lines that were scrambled or occupy the same line.5. very quickly.1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. The configuration will be loaded. The file can also be edited. Hyperterminal Capture menu. Router. Enter a path and file name. Open the text file and review the contents. This places the configuration in host computer memory. All communication between the host computer and router are saved to a file. Otherwise. and always handy.interface is OFF by default Switch. and saved. Stop the capture. to the router. right-click inside the Hyperterminal window and select Paste To Host. copied. The file can be edited. Task 7: Challenge It is often necessary. highlight the lines and select Notepad menu Edit | Copy. Watch closely for error messages. Issue the privileged exec command show running-config. such as the more prompt. Select menu option Transfer | Capture Text | Stop. Figure 2. Refer to Figure 2. Router vty lines: 0 4 Switch vty lines: 0 15 password password login Example: Router(config)# line vty 0 4 Router(config-line)# password class Router(config-line)# login Router(config-line)# Banner motd % Example: Router(config)# banner motd % Router(config)# Example: Router(config)# interface fa0/0 Router(config-if)# description description Router(config-if)# ip address address mask Router(config-if)# no shutdown Router(config-if)# copy running-config startup-config Example: Router# copy running-config startup-config Router# To start a capture. and save to NVRAM. After checking the configuration file. and select Start. enter the global configuration mode: Router> en Router# config t Router(config)# Using the mouse. it is ALWAYS best practice to begin with a clean RAM configuration. Configure an interface.5.edunet.edunet.hr Page 149 of 165 www. and pasted into a router: www. select Hyperterminal menu option Transfer | Capture Text.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.interface is ON by default Save the configuration to NVRAM.1 Basic Cisco Device Configuration Router(config)# line con 0 Router(config-line)# password class Router(config-line)# login Router(config)# Specify a password to prevent unauthorized telnet access. Configure the MOTD banner. each message must be investigated and corrected. to save the configuration file to an off-line text file.hr Page 150 of 165 . stale configuration commands may survive a paste action and have unintended consequences (also known as the Law of Unintended Consequences): Erase the NVRAM configuration file: Router1# erase start Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] <ENTER> [OK] Erase of nvram: complete Reload the router: Router1# reload Proceed with reload? [confirm] <ENTER> When the router reboots.

5.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Appendix 1. Delete any configuration files saved on the host computers. and leave the room ready for the next class.edunet.hr Page 152 of 165 . Remove anything that was brought into the lab.1 Basic Cisco Device Configuration Task 6: Cleanup Before turning off power to the router and switch.5. restore host computer network connectivity.default Cisco IOS router configuration Current configuration : 824 bytes ! version 12. then turn off power to the host computers.edunet. remove the NVRAM configuration file from each device with the privileged exec command erase startup-config.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Router ! boot-start-marker boot-end-marker ! no aaa new-model ip cef ! interface FastEthernet0/0 no ip address shutdown duplex auto speed auto ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface Serial0/1/0 no ip address shutdown no fair-queue ! interface Serial0/1/1 no ip address shutdown clock rate 2000000 ! interface Vlan1 no ip address ! ip http server no ip http secure-server ! control-plane ! line con 0 line aux 0 line vty 0 4 login ! scheduler allocate 20000 1000 end www.hr Page 151 of 165 www. Unless directed otherwise by the instructor.1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.

5.5.edunet.hr Page 154 of 165 .1 Basic Cisco Device Configuration Appendix 2.default Cisco IOS switch configuration Current configuration : 1519 bytes ! version 12.hr Page 153 of 165 www.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.edunet.1 Basic Cisco Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.1 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Switch ! ! ip subnet-zero ! ! spanning-tree mode pvst no spanning-tree optimize bpdu transmission spanning-tree extend system-id ! ! interface FastEthernet0/1 no ip address ! interface FastEthernet0/2 no ip address ! interface FastEthernet0/3 no ip address ! interface FastEthernet0/4 no ip address ! interface FastEthernet0/5 no ip address ! interface FastEthernet0/6 no ip address ! interface FastEthernet0/7 no ip address ! interface FastEthernet0/8 no ip address ! interface FastEthernet0/9 no ip address ! interface FastEthernet0/10 no ip address ! interface FastEthernet0/11 no ip address ! interface FastEthernet0/12 no ip address ! interface FastEthernet0/13 no ip address ! interface FastEthernet0/14 no ip address ! interface FastEthernet0/15 no ip address ! interface FastEthernet0/16 no ip address ! interface FastEthernet0/17 no ip address ! interface FastEthernet0/18 no ip address ! interface FastEthernet0/19 no ip address ! interface FastEthernet0/20 no ip address ! interface FastEthernet0/21 no ip address ! interface FastEthernet0/22 no ip address ! interface FastEthernet0/23 no ip address ! interface FastEthernet0/24 no ip address ! interface GigabitEthernet0/1 no ip address ! interface GigabitEthernet0/2 no ip address ! interface Vlan1 no ip address no ip route-cache shutdown ! ip http server ! ! line con 0 line vty 5 15 ! www.

To configure the lab. www.1 Basic Cisco Device Configuration end Lab 11. Connects host1 NIC to Router1 Fa0/1 Crossover cable 1 Table 1. Use TFTP to save and restore a Cisco IOS configuration.5. Gather the necessary equipment and cables.hr . Background Hardware Cisco Router Computer (host) Console (rollover) cable Qty 1 1 1 Description Part of CCNA Lab bundle.5.edunet. This lab requires the use of SolarWinds TFTP server software.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. The host computer will be used as a TFTP server.hr Page 155 of 165 www.2: Managing Device Configuration Topology Diagram Learning Objectives Configure network connectivity. Lab computer. make sure the equipment listed in Table 1 is available. Connects computer host 1 to Router console port.edunet. Page 156 of 165 . SolarWinds is a free TFTP application for Windows. Equipment and hardware required for this lab.

Sending 5. Refer to the Topology Diagram.5. then restore the configuration from a TFTP server.set the description set the Layer 3 address issue no shutdown NOTE **DO NOT SAVE THE CONFIGURATION IN NVRAM. www.250.250. Step 2: Logically connect devices. save the configuration to a TFTP server. press the Enter key until there is a response from the router. students will configure common settings on a Cisco Router.hr Page 158 of 165 .250.250. Scenario In this lab. and 6 bits used for subnets. Step 2: Start TFTP server. start the HyperTerminal program by clicking on Start | Programs | Accessories | Communications | Hyper Terminal. Figure 2 shows an active TFTP Server window. or rollover.edunet. Select Next. Configuration tasks for Router1 include the following: Task. Step 3: Configure the TFTP server. and Router1 should use the LAST valid host address: Verify connectivity between host1 and Router1: Router1# ping 10.249. Step 1: Physically connect devices.2 Managing Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.250. cable to the console port on the router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port.cisco Specify a console access password. Step 4: Configure Router1. Step 1: Install SolarWinds TFTP application. Double click on the SolarWinds TFTP application to begin installation. Figure 2. and accept default settings.250.class Specify a telnet access password. Configure Router1 interface Fa0/0. Using the IP address information from the scenario. When the HyperTerminal session window opens. Agree to the license agreement. Connect the console.0/24.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Given an IP address of 10.class Configure the MOTD banner. round-trip min/avg/max = 1/1/1 ms Router1# IP Address: 10.Router1 Specify an encrypted privileged exec password. click on Finish. Ensure power has been applied to both the host computer and router. Task 1: Configure Network Connectivity. Host1 should use the FIRST valid host address.249 Type escape sequence to abort. TFTP Server window. Use the LAST valid subnet.edunet.0 Subnet First host address Subnet mask: Last host address Broadcast Task 2: Use TFTP to Save and Restore a Cisco IOS Configuration. Step 3: Connect host computer to router through HyperTerminal. configure the host1 computer.250.hr Page 157 of 165 www. Start the TFTP server by selecting Start | Programs | SolarWinds Free Tools | TFTP Server.!!!! Success rate is 80 percent (4/5). timeout is 2 seconds: .refer to Appendix 1 for help with commands Specify Router name. From the Widows taskbar. After SolarWinds has finished installation. 100-byte ICMP Echos to 10.5.2 Managing Device Configuration Step 5: Verify connectivity. Configure Router1.250.

Verify the following settings: Setting TFTP Root Directory: Security Advanced Security Auto-Close Log Value TFTP-Root Transmit and Receive Files 10. 1081 bytes Verify the transferred file.5. Open Log file c:\Program Files\SolarWinds\Free Tools\TFTP-Server. select menu option File | configure.250.255.250 To 10. Use Microsoft Word or Wordpad to examine the contents of file c:\TFTP-Root\router1confg. select OK.250). Save Router1 configuration to TFTP server.250. Refer to Figure 3.edunet.255. Step 4.2 Managing Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.hr Page 160 of 165 .252 duplex auto speed auto ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface Serial0/1/0 no ip address shutdown no fair-queue ! interface Serial0/1/1 no ip address shutdown clock rate 2000000 www.008 secs (538 bytes/sec) Router1# ! version 12.250.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Contents should be similar to the following: 3/25/2007 12:29 :Receiving router1-confg from (10.edunet.hr Page 159 of 165 www.250) 3/25/2007 12:29 :Received router1-confg from (10.2 Managing Device Configuration Verify a successful upload transfer.250.250.250.250.250.250 Never Enable Log Requests to the Following File.249 Destination filename [router1-confg]? <ENTER> !! 1081 bytes copied in 2.5.250.txt. When finished. To configure TFTP server. begin a TFTP upload to the TFTP server: Router1#copy running-config tftp: Address or name of remote host []? 10. From HyperTerminal.250. Leave the default file. ! no aaa new-model ip cef ! interface FastEthernet0/0 description connection to host1 ip address 10. TFTP Server window.250.250.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Router1 ! boot-start-marker boot-end-marker ! enable secret 5 $1$D02B$AuX05n0HPT239yYRoQ0oE.250 255. Contents should be similar to the following configuration: Figure 3.

255.250. Router1 fa0/0 must be configured with an IP address.edunet.250. Verify that NVRAM is clear.250. timeout is 2 seconds: .250.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. and the interface enabled: Router> enable Router# conf t Enter configuration commands. Sending 5.hr Page 162 of 165 .095: %SYS-5-CONFIG_I: Configured from console by console *Mar 25 16:43:04. Router(config)# interface fa0/0 Router(config-if)# ip address 10.2 Managing Device Configuration ! ip http server no ip http secure-server ! control-plane ! banner motd *** ABC COMPANY NETWORK DEVICE **** *** Authorized access only ***** *** Logging is enabled **** ! line con 0 password class login line aux 0 line vty 0 4 password class login ! scheduler allocate 20000 1000 End Step 5: Restore Router1 configuration from TFTP server.249 Type escape sequence to abort. 100-byte ICMP Echos to 10.hr Page 161 of 165 www.5.2 Managing Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. End with CNTL/Z.edunet.250 255.!!!! Success rate is 80 percent(4/5).5. round-trip min/avg/max = 1/1/1ms Router# www.255.967: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0. then reboot Router1: Router1# show startup-config startup-config is not present Router1# reload Proceed with reload? [confirm] <ENTER> Connectivity must be established with the TFTP server.250.252 Router(config-if)# no shutdown Router(config-if)# exit *Mar 25 16:43:03. changed state to up Configure the hostname of the router to TEST Router(config-if)#exit Router(config)#hostname TEST Router(config-if)#end TEST# Verify connectivity with the ping command: Router# ping 10.249. one per line.250.

249 (via FastEthernet0/0): ! [OK . efficient way to save and load Cisco IOS configuration files.124-10b. Reload the router select no at the prompt that says “Configuration has been modified”. Unless directed otherwise by the instructor.2 Managing Device Configuration CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. export.bin Address or name of remote host []? 10.250. www. transfer and use.250. Delete any configuration files saved on the host computers. If you are unable to comply with U.250.edunet.249 Source filename []? router1-confg Destination filename [startup-config]? <ENTER> Accessing tftp://10.bin]? !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!! 22063220 bytes copied in 59.564 secs (370412 bytes/sec) Router1# Task 3: Reflection TFTP is a fast.S. Cisco 1841 (revision 6.hr Page 164 of 165 .. below: Router1# show version Cisco IOS Software.249/router1-confg.4(13r)T. A summary of U. Task 4: Challenge Similar to uploading a configuration file. By using this product you agree to comply with applicable laws and regulations. Loading router1-confg from 10. the IOS can also be stored off-line for future use. Remove anything that was brought into the lab. 1841 Software (C1841-ADVIPSERVICESK9-M). Use the privileged exec command erase startup-config.hr Page 163 of 165 www. restore host computer network connectivity. issue the Cisco IOS command show version.249 Destination filename [c1841-advipservicesk9-mz.edunet.124-10b. return this product immediately.com/wwl/export/crypto/tool/stqrg. export. remove the NVRAM configuration file if it was loaded. distributors and users are responsible for compliance with U.S. 191K bytes of NVRAM.250. Version 12. Remove SolarWinds TFTP server from the host computer. Delivery of Cisco cryptographic products does not imply third-party authority to import.249/router1-confg by console Router1# View the configuration in NVRAM to verify an accurate transfer. The configuration should be the same as what was configured in Task 1.com/techsupport Copyright (c) 1986-2007 by Cisco Systems. Processor board ID FHK110918KJ 2 Serial(sync/async) interfaces DRAM configuration is 64 bits wide with parity disabled. To discover the IOS filename. Task 5: Cleanup Before turning off power to the router. Open Add or Remove Applications.. The previous the configuration should be restored and the router’s hostname should now be Router1. then Remove. distribute or use encryption.cisco. Select SolarWinds.250. then turn off power to the host computers. Version 12.5. laws governing Cisco cryptographic products may be found at: http://www.375: %SYS-5-CONFIG_I: Configured from tftp://10. The filename is highlighted.250.0) with 174080K/22528K bytes of memory.250. Select Start | Control Panel. and leave the room ready for the next class. Step 4.S.1081 bytes] 1081 bytes copied in 9.com.250. Accept defaults.2 Managing Device Configuration Download Router1 configuration file from the TFTP server: Router# copy tftp startup-config Address or name of remote host []? 10. RELEASE SOFTWARE (fc1) Router1 uptime is 17 minutes System returned to ROM by reload at 16:47:54 UTC Sun Mar 25 2007 System image file is "flash:c1841-advipservicesk9-mz.4(10b). Importers.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11.250. Compiled Fri 19-Jan-07 15:15 by prod_rel_team ROM: System Bootstrap.cisco.124-10b.html If you require further assistance please contact us by sending email to export@cisco. exporters. 62720K bytes of ATA CompactFlash (Read/Write) Configuration register is 0x2102 Router1# The commands to upload the IOS are similar to uploading the configuration file: Router1# copy flash tftp Source filename []? c1841-advipservicesk9-mz. Inc. and local laws.5.364 secs (115 bytes/sec) Router1# *Mar 25 16:55:26.250. RELEASE SOFTWARE (fc3) Technical Support: http://www.bin" This product contains cryptographic features and is subject to United States and local country laws governing import. and local country laws.

hr Page 165 of 165 . Command configure terminal Example: Router> enable Router# configure terminal Router(config)# hostname name Example: Router(config)# hostname Router1 Router(config)# Specify the name for the router. Specify an encrypted password to prevent enable secret password Example: unauthorized access to the privileged Router(config)# enable secret cisco exec mode. Router(config)# Specify a password to prevent unauthorized access to the console. www.edunet. Router vty lines: 0 4 Switch vty lines: 0 15 Configure the MOTD banner.interface is ON by default Save the configuration to NVRAM.5.CCNA Exploration Network Fundamentals: Configuring and Testing Your Network Lab 11. Router. password password login Example: Router(config)# line con 0 Router(config-line)# password class Router(config-line)# login Router(config)# password password login Example: Router(config)# line vty 0 4 Router(config-line)# password class Router(config-line)# login Router(config-line)# Banner motd % Example: Router(config)# banner motd % Router(config)# Example: Router(config)# interface fa0/0 Router(config-if)# description description Router(config-if)# ip address address mask Router(config-if)# no shutdown Router(config-if)# copy running-config startup-config Example: Router# copy running-config startup-config Router# Specify a password to prevent unauthorized telnet access.interface is OFF by default Switch. Configure an interface.2 Managing Device Configuration Appendix 1 Purpose Enter the global configuration mode.

  .

Lab Workbook v. semestar .2.0 .1.

  .

.............................6............................................4..............................Table od contensts: Lab 1......................................... 95  Lab 9........5....................6......... 140  Lab 8................4...........................................6.............. 31  Lab 5................................. 63  Lab 7..........2: Show IP Route Challenge Lab.......................3: RIP Troubleshooting.............. 145  Lab 8............3: Troubleshooting Static Routes...... 153  Lab 8...........1: Basic RIP Configuration..............6..................................1: RIPv2 Basic Configuration Lab ............................................1: Investigating the Routing Table Lookup Process ........hr Page 1 of 161 www.................. 80  Lab 9..............hr Page 2 of 161 .....2: Challenge OSPF Configuration Lab ................................................ 158  www.....................................................3: OSPF Troubleshooting Lab .6................................................6.5................. 59  Lab 7.................................. 103  Lab 11...........................6...6....... 30  Lab 2....... 52  Lab 5...............4......2: Challenge RIP Configuration ...... 37  Lab 5...............................1: Cabling a Network and Basic Router Configuration ......................................................................................................3: EIGRP Troubleshooting Lab .................................................................................... 3  Lab 2..........................1: Basic EIGRP Configuration Lab ..............................................1: Basic OSPF Configuration Lab ..........................................................................edunet..1: Configuring Static Routes ............................................................edunet.....................................2: Challenge EIGRP Configuration Lab .................................6...................... 108  Lab 11..3: Configuring Dynamic Routing ...5.......................8.................. 130  Lab 11........... 75  Lab 9.......................................3: RIPv2 Troubleshooting Lab ...........8................

2. Use a straight-through Ethernet cable to connect the network interface card (NIC) of PC1 to the FastEthernet 0/2 Interface of the S1 switch. the serial cables in the real world are not connected back to back. Which of the devices in the Topology Diagram require an Ethernet cable between them? ____________________________________________________ Step 1: Connect the R1 Router to the S1 Switch.1.5.1 192. Task 2: Cable the Serial Link between the R1 and R2 Routers. check that you are using a straightthrough Ethernet cable and that the power is on for the S1 switch and PC1.255.255. you may substitute the shorter version. A simple way to identify the available interfaces on a router is by entering the show ip interface brief command. An administrator located in Sydney would have to connect to the router in New York through the WAN cloud in order to troubleshoot the New York router. But you can use any current router in your lab as long as it has the required interfaces as shown in the topology. Step 3: Connect PC2 to the R2 Router. ping and traceroute. Use a crossover Ethernet cable to connect the FastEthernet 0/0 interface of the R2 router to the NIC of PC2. Verify and test configurations using show commands. Cable the Ethernet links for a network that is similar to the one in the Topology Diagram.10 Subnet Mask 255.168.5.255. Install a terminal emulation program.255.255. Because there is no switch between PC2 and the R2 router. Reload a startup configuration file.255. The connection from one router serial interface to another router serial interface simulates the whole circuit cloud. Perform basic IOS command line interface operations.5. while another router might be in Sydney.168. What color is the link status light next to the FastEthernet 0/0 interface on R1? _______________ What color is the link status light next to the FastEthernet 0/1 interface on S1? _______________ Step 2: Connect PC1 to the S1 Switch.hr Page 3 of 161 www.168.3.168.1: Cabling a Network and Basic Router Configuration Lab 1.edunet.255. which is often a router.0 255.1 Use a straight-through Ethernet cable to connect the FastEthernet 0/0 interface of the R1 router to the FastEthernet 0/1 interface on the R1 switch. Unlike the cables in the academy lab setup.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. one router might be in New York. Australia.2. The skills presented in this lab are essential to completing the rest of the labs in this course. Scenario In this lab activity. In a real-world WAN connection.168. In the academy labs.1 192. This equipment is connected to the service provider through a data circuit-terminating equipment (DCE) device.255. you will be able to: • • • • • • • • Cable devices and establish console connections.0 Default Gateway N/A N/A N/A N/A 192.168.3. the customer premises equipment (CPE). www. devices that make up the WAN cloud are simulated by the connection between the back-to-back DTE-DCE cables. Perform basic router configuration. establishing a console connection. if your instructor determines that you are proficient in the essential skills reviewed in this lab.255.168. wait a few moments for the link between the two devices to become established.0 255. What color is the link status light next to the NIC interface on PC2? _______________ What color is the link status light next to the FastEthernet 0/0 interface on R2? _______________ R2 PC1 PC2 Learning Objectives Upon completion of this lab.edunet.3. and basic IOS command line interface operation and configuration commands.168. What color is the link status light next to the NIC interface on PC1? _______________ What color is the link status light next to the FastEthernet 0/2 interface on S1? _______________ If the link status lights are not green.1 192. You will also learn to save configuration files and capture your configurations to a text file.0 255. This device is used to convert the data from the DTE into a form acceptable to the WAN service provider.0 255. Erase and reload the routers. The output used in this lab is from Cisco 1841 routers.2: Basic Router Configuration.1 192. Lab 1. However.255. which is commonly a modem or channel service unit (CSU)/ data service unit (DSU).2 192. Create a startup configuration file.255.0 255.1. is the data terminal equipment (DTE).255.1. you will review previously learned skills including cabling devices. If the lights do not turn green after a few moments. In a real-world situation.hr Page 4 of 161 . Addressing Table Device R1 Interface Fa0/0 S0/0/0 Fa0/0 S0/0/0 N/A N/A IP Address 192.1: Cabling a Network and Basic Router Configuration Topology Diagram Task 1: Cable the Ethernet Links of the Network. a crossover cable is required for a direct link between the PC and the router.10 192.

press the Enter key. Router>enable Router# www. The DTE and DCE V. enter privileged EXEC mode on R1. Note that the connectors are tapered to help prevent improper connection. 1. turn the thumbscrews clockwise and secure the connectors. Step 2: Examine PC1 and locate a 9-pin male connector serial port.35 cables must be joined together. Next. At the end of this lab. Align the pins on the male cable with the sockets on the female cable and gently couple them. or other software specified by your instructor). orient the cable and router connecters so that the tapers match.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. When the prompt returns. 3 or 4 rounds. There should be a response from the router. 3. verify that the router has power. At this point the cable should be attached sufficiently to free both hands to advance each thumbscrew at the same rate until the cable is fully inserted. The V.edunet. the following three appendices are available for your reference concerning these two terminal emulation programs: • • • Appendix 1: Installing and Configuring Tera Term for use on Windows XP Appendix 2: Configuring Tera Term as the Default Telnet Client in Windows XP Appendix 3: Accessing and Configuring HyperTerminal Step 3: Reload the configuration. Step 3: Locate the console cable. It probably will not go in all the way because the threaded connectors need to be tightened in order for the cable to be inserted completely. as shown: Would Would Press Press you like to enter the initial configuration dialog? [yes/no]: no you like to terminate autoinstall? [yes]: Enter to accept default. and answer no if asked to save changes.5. The console port is a management port used to provide out-of-band access to a router. A rollover cable and an RJ-45 to DB-9 adapter are used to connect a PC to the console port. Before making the connection to one of the routers. Step 4: Establish a HyperTerminal Session to R2. To clear the configuration. issue the reload command.35 connector. issue the erase startup-config command.35 DCE connector is usually a female V. examine the connector on the router and the cable. Locate either a console cable with a built-in adapter or a console cable with a separate RJ-45 to DB-9 adapter attached to one end.1: Cabling a Network and Basic Router Configuration Step 1: Create a null serial cable to connect the R1 router to the R2 router.35 DCE cable and one V.1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. you can also use HyperTerminal. to get it started. 2. the WAN connection between routers uses one DCE cable and one DTE cable. Now turn the other thumbscrew clockwise. After the router finishes the boot process. If there is. Some console cables have an RJ-45 to DB-9 adapter built into one end. Step 1: Establish a HyperTerminal session to router R1. connect the DB-9 end of the console cable to the serial port of PC1. RETURN to get started! Step 1: Examine the router and locate the RJ-45 connector labeled Console. Holding one of the V. Tera Term. Check the connection to the serial port on the PC and the console port on the router. turn one of the thumb screws clockwise. However. Step 2: Connect the DCE end of the null serial cable to the Serial 0/0/0 interface of the R1 router. terminal emulation software is used to configure the router over the console connection. Now push the cable connector partially into the router connector.hr Page 5 of 161 . As you know from your previous studies.35 DTE cable to simulate the WAN connection. then the connection has been successfully completed. to start the screws. The labs will use one V. Once the terminal window is open. Task 5: Understand Command Line Basics. First. Confirm the objective when prompted.5. Configure the software parameters specific to your applications (see appendices for help). Review the information provided below before making these connections. The cables are also labeled as DCE or DTE on the router end of the cable. Task 4: Erase and Reload the Routers. Step 4: Connect the console cable to the router and PC. For example. Holding the connector in one hand. Router>enable Router# Step 2: Erase the configuration. an RJ-45 connector. If there is no connection. 3 or 4 rounds. Repeat Steps 1 through 3 to remove any startup configuration file that may be present. Open your terminal emulation software (HyperTerminal. While holding the cable in one hand and gently pushing the cable toward the router. which is part of the Windows operating system. When they are joined. The Cisco Networking Academy Program recommends using Tera Term. examine the pins and sockets as well as the threaded connectors. It is used to set up the initial configuration of a router and to monitor it. troubleshoot as necessary. Step 1: Using the HyperTerminal session established in Task 3. Step 2: Enter privileged EXEC mode. choose not to use the AutoInstall facility. It may—or may not—be labeled as COM1 or COM2. connect the console cable to the router console port. The result should look something like this: Router#erase startup-config Erasing the nvram filesystem will remove all files! Continue? [confirm] [OK] Erase of nvram: complete Router# Task 3: Establish a Console connection to the R1 Router. In the academy labs. Step 5: Test router connection.hr Page 6 of 161 www. and the DTE end of the null serial cable to the Serial 0/0/0 interface of the R2 router. Very little effort should be required to accomplish this.35 (34-pin) connector. The DCE-DTE connection between routers is referred to as a null serial cable. Note that there is only one proper way for the cables to fit together. Do not over-tighten these connectors. Confirm the objective when prompted. The DTE cable has a male V. Others do not.35 ends in each hand.edunet.

Step 4: Correct the previous command. Router>e % Ambiguous command: "e" Router> Enter en at the command prompt and observe the results. A question mark. Step 8: Exit privileged EXEC mode with the exit command. and the Enter key is pressed. ?. Enter only the character e at the command prompt and observe the results.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. If a command is entered incorrectly.1: Cabling a Network and Basic Router Configuration Step 3: Enter an incorrect command and observe the router response. The Router> prompt should be visible. Step 9: Press the Enter key to enter user EXEC mode. Router#comfigure terminal ^ % Invalid input detected at '^' marker. telnet traceroute undebug vlan write Open a telnet connection Trace route to destination Disable debugging functions (see also 'debug') Configure VLAN parameters Write running configuration to memory.edunet. Router(config)# View the rest of the command output by pressing the Spacebar.1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. Use the directional keys and the Backspace key to correct the command to configure terminal. The remainder of the output will appear where the --More-. The following output should be displayed: Router con0 is now available Step 5: Return to privileged EXEC mode with the exit command. network. If something needs to be deleted. When a --More-. can be entered at the prompt to display a list of available commands. Step 10: Type an abbreviated IOS command. If a command keyword is incorrectly typed. Router#exit End with CNTL/Z. Router#? Exec commands: <1-99> Session number to resume clear Reset functions clock Manage the system clock configure Enter configuration mode connect Open a terminal connection copy Copy from one file to another debug Debugging functions (see also 'undebug') delete Delete a file dir List files on a filesystem disable Turn off privileged commands disconnect Disconnect an existing network connection enable Turn on privileged commands erase Erase a filesystem exit Exit from the EXEC logout Exit from the EXEC no Disable debugging informations ping Send echo messages reload Halt and perform a cold restart resume Resume an active network connection setup Run the SETUP command facility show Show running system information --More-www. one per line. keyword. The ^ appears at or near the point in the command string where an incorrect command. press the Enter key. the user interface uses the caret symbol (^) to identify and isolate the error. Router#configure terminal Enter configuration commands.at the bottom of the command output. Press any other key to return to the prompt. as long as enough characters are typed for the IOS to recognize the unique command. To display only the next line. Use the Right Arrow and Left Arrow keys to move the cursor to the location where the mistake was made. Router>en Router# The abbreviated command en contains enough characters for the IOS to distinguish the enable command from the exit command. press the Spacebar to view the next available screen. use the Backspace key. Then make the correction.prompt appeared previously. Command line errors occur primarily from typing mistakes. or terminal Notice the --More-. Router# Step 7: View output. The --More-. Router(config)#exit %SYS-5-CONFIG_I: Configured from console by console Router# Step 6: Examine the commands that are available for privileged EXEC mode.5.prompt appears. and then press Enter.hr Page 7 of 161 Press RETURN to get started. IOS commands can be abbreviated. www.5. the Up Arrow key on the keyboard can be pressed to repeat the last command. or argument was entered.prompt indicates that there are multiple screens of output.hr Page 8 of 161 .edunet.

press the Tab key. Router#hostname R1 ^ % Invalid input detected at '^' marker.hr Page 9 of 161 www. Use cisco as the password. For example. followed by the Tab key completes a partial command name. Router#conf Router#configure This auto-complete feature can be used as long as enough characters are typed for the IOS to recognize the unique command. Step 2: Enter privileged EXEC mode.5. Router>enable Router# Step 3: Enter global configuration mode. R1(config)#enable secret class R1(config)# The enable secret command is used to provide an additional layer of security over the enable password command. R1(config)#no ip domain-lookup R1(config)# Why would you want to disable DNS lookup in a lab environment? ___________________________________________________________________________________ ___________________________________________________________________________________ End with CNTL/Z. Type the abbreviated command conf. Configure an EXEC mode password using the enable secret password command. the enable password is no longer necessary. End with the character '&'. Use class for the password. R1(config)#banner motd & Enter TEXT message. IOS commands can be removed from the configuration using the no form of the command. configuration changes cannot be made while in privileged EXEC mode. exit from line configuration mode.1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.edunet. ******************************** !!!AUTHORIZED ACCESS ONLY!!! ******************************** & R1(config)# Step 9: Configure the console password on the router. When you are finished. Router(config)# Step 4: Configure the router name as R1. such as conf. Step 1: Establish a HyperTerminal session to router R1. and observe the results. The enable secret command provides better security by storing the enable secret password using a non-reversible cryptographic function. When you are finished. The added layer of security encryption provides is useful in environments where the password crosses the network or is stored on a TFTP server. This functionality of the IOS is called auto-complete. R1(config)#line console 0 R1(config-line)#password cisco R1(config-line)#login R1(config-line)#exit R1(config)# Step 10: Configure the password for the virtual terminal lines. Step 12: Enter IOS commands in the correct mode. IOS commands must be entered in the correct mode. Task 6: Perform Basic Configuration of Router R1. exit from line configuration mode. Use cisco as the password. one per line. R1(config)#no enable password R1(config)# Step 8: Configure a message-of-the-day banner using the banner motd command. Enter the command hostname R1 at the prompt. the Step 7: Remove the enable password. Router#configure terminal Enter configuration commands. Router(config)#hostname R1 R1(config)# Step 5: Disable DNS lookup with the no ip domain-lookup command.1: Cabling a Network and Basic Router Configuration Step 11: Press the Tab key after an abbreviated command to use auto-complete. R1(config)#line vty 0 4 R1(config-line)#password cisco R1(config-line)#login R1(config-line)#exit R1(config)# www. Attempt to enter the command hostname R1 at the privileged EXEC prompt and observe the results.edunet.5.hr Page 10 of 161 . When both the enable password and enable secret passwords are configured. Typing an abbreviated command. Router# Step 6: Configure an EXEC mode password.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. Because the enable secret is configured.

R2(config-if)#end R2# Step 7: Save the R2 configuration...255.0 R2(config-if)#no shutdown %LINK-5-CHANGED: Interface FastEthernet0/0.168. Configure the host PC1 that is attached to R1 with an IP address of 192. one of the routers will need to provide the clocking for the circuit.168.5.2/24. changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0. repeat Steps 1 through 10 from Task 6.168.255.1 255. R2#copy running-config startup-config Building configuration.1/24. where the DCE end of the null modem cable has been connected. [OK] R1# Step 1: For R2. changed state to up R2(config-if)# Step 5: Use the description command to provide a description for this interface. one of the routers will need to act as the DCE on the connection.2 255. Step 1: Configure the host PC1.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.3.255.168. This function is achieved by applying the clock rate 64000 command on the serial 0/0/0 interface.2.2. www.255.1.168. R1(config-if)#end R1# Step 16: Save the R1 configuration. R1(config-if)#description Link to R2 R1(config-if)# Step 15: Use the end command to return to privileged EXEC mode. R1(config)#interface fastethernet 0/0 R1(config-if)#ip address 192.168. R1(config-if)#description Link to R1 R1(config-if)# Step 4: Configure the FastEthernet 0/0 interface with the IP address 192. changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0. R1#copy running-config startup-config Building configuration.1/24. changed state to up R2(config-if)# Step 3: Use the description command to provide a description for this interface. Set the clock rate to 64000..0 R1(config-if)#clock rate 64000 R1(config-if)#no shutdown R1(config-if)# Note: The interface will not be activated until the serial interface on R2 is configured and activated.10/24 and a default gateway of 192. Step 11: Configure the FastEthernet 0/0 interface with the IP address 192.1 255.hr Page 11 of 161 www.1. Step 14: Use the description command to provide a description for this interface. R2(config)#interface serial 0/0/0 R2(config-if)#ip address 192.0 R1(config-if)#no shutdown %LINK-5-CHANGED: Interface FastEthernet0/0. Save the R2 configuration using the copy running-config startup-config command.1: Cabling a Network and Basic Router Configuration Task 7: Perform Basic Configuration of Router R2.255.hr Page 12 of 161 .2.168.255. changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0. To provide this clocking signal in the lab. Save the R1 configuration using the copy running-config startup-config command.3. The purpose of the clock rate command is discussed further in Chapter 2.5.168.255.1.1. R2(config-if)#interface fastethernet 0/0 R2(config-if)#ip address 192.1 255.1.168.” R1(config-if)#interface serial 0/0/0 R1(config-if)#ip address 192. “Static Routes.2. changed state to up R1(config-if)# Step 12: Use the description command to provide a description for this interface.edunet.1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.. Note: Because the routers in the labs will not be connected to a live leased line.1/24. Step 2: Configure the Serial 0/0/0 interface with the IP address 192.168.edunet.255. [OK] R2# Task 8: Configure IP Addressing on the Host PCs.0 R2(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial0/0/0. This is normally provided to each of the routers by the service provider. R1(config-if)#description R2 LAN R1(config-if)# Step 6: Use the end command to return to privileged EXEC mode. R1(config-if)#description R1 LAN R1(config-if)# Step 13: Configure the Serial0/0/0 interface with the IP address 192.

R1#show startup-config Using 583 bytes ! version 12. Step 1: Examine the show running-config command. R1#show running-config ! version 12. There are many show commands that can be used to examine the operation of the router.255.0 clock rate 64000 ! interface Serial0/1 no ip address shutdown ! interface Vlan1 no ip address shutdown ! ip classless www.5.3.255. the command show ? provides a list of available show commands.1 255.168.hr Page 14 of 161 .edunet.edunet.168.168.3 ! hostname R1 ! ! enable secret 5 $1$AFDd$0HCi0iYHkEWR4cegQdTQu/ ! no ip domain-lookup ! interface FastEthernet0/0 description R1 LAN mac-address 0007.prompt appears.168.0 clock rate 64000 ! interface Serial0/1 no ip address shutdown ! interface Vlan1 no ip address shutdown ! ip classless www.255. Task 9: Examine Router show Commands.42dd. If the –-More-.1511 ip address 192. If the –-More-.0 duplex auto speed auto ! interface FastEthernet0/1 mac-address 0001.3 ! hostname R1 ! ! no ip domain-lookup ! interface FastEthernet0/0 description R1 LAN mac-address 0007. The list is considerably longer in privileged EXEC mode than it is in user EXEC mode.1511 ip address 192.255.1: Cabling a Network and Basic Router Configuration Step 2: Configure the host PC2.5. press the Spacebar to view the remainder of the command output.hr Page 13 of 161 ! ! ! ! line con 0 password cisco line vty 0 4 password cisco login ! end Step 2: Examine The show startup-config command.255.3. examine the output of the show startup-config command.a220 no ip address duplex auto speed auto shutdown ! interface Serial0/0 description Link to R2 ip address 192. From privileged EXEC mode on the R1 router.eca7.a220 no ip address duplex auto speed auto shutdown ! interface Serial0/0 description Link to R2 ip address 192.1.1.prompt appears.10/24 and a default gateway of 192.1. examine the output of the show running-config command. press the Spacebar to view the remainder of the command output.2.255. In both privileged EXEC and user EXEC modes.255. The show startup-config command displays the startup configuration file contained in NVRAM.42dd.1 255.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.0 duplex auto speed auto ! interface FastEthernet0/1 mac-address 0001.1 255.1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. Configure the host PC2 that is attached to R2 with an IP address of 192.2.168.168.eca7. From privileged EXEC mode on the R1 router.1 255.255. The show running-config command is used to display the contents of the currently running configuration file.

CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding

Lab 1.5.1: Cabling a Network and Basic Router Configuration

CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding

Lab 1.5.1: Cabling a Network and Basic Router Configuration

! ! ! ! line con 0 password cisco line vty 0 4 password cisco login ! end Step 3: Examine the show interfaces command. The show interfaces command displays statistics for all interfaces configured on the router. A specific interface can be added to the end of this command to display the statistics for only that interface. From privileged EXEC mode on the R1 router, examine the output of the show interfaces fastEthernet0/0 command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output. R1# show interfaces fastEthernet 0/0 FastEthernet0/0 is up, line protocol is up (connected) Hardware is Lance, address is 0007.eca7.1511 (bia 0002.1625.1bea) Description: R1 LAN Internet address is 192.168.1.1/24 MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, rely 255/255, load 1/255 Encapsulation ARPA, loopback not set ARP type: ARPA, ARP Timeout 04:00:00, Last input 00:00:08, output 00:00:05, output hang never Last clearing of "show interface" counters never Queueing strategy: fifo Output queue :0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 input packets with dribble condition detected 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out R1# Step 4: Examine the show version command. The show version command displays information about the currently loaded software version along with hardware and device information. From privileged EXEC mode on the R1 router, examine the output of the show version command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output. R1#show version Cisco IOS Software, 1841 Software (C1841-IPBASE-M), Version 12.3(14)T7, RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2006 by Cisco Systems, Inc. Compiled Mon 15-May-06 14:54 by pt_team
www.edunet.hr Page 15 of 161

ROM: System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1) System returned to ROM by power-on System image file is "flash:c1841-ipbase-mz.123-14.T7.bin" This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to export@cisco.com. Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory. Processor board ID FTX0947Z18E M860 processor: part number 0, mask 49 2 FastEthernet/IEEE 802.3 interface(s) 2 Low-speed serial(sync/async) network interface(s) 191K bytes of NVRAM. 31360K bytes of ATA CompactFlash (Read/Write) Configuration register is 0x2102 R1# Step 5: Examine the show ip interface brief command. The show ip interface brief command displays a summary of the usability status information for each interface. From privileged EXEC mode on the R1 router, examine the output of the show ip interface brief command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output. R1#show ip interface brief Interface IP-Address FastEthernet0/0 FastEthernet0/1 Serial0/0/0 Serial0/0/1 Vlan1 R1# 192.168.1.1 unassigned 192.168.2.1 unassigned unassigned OK? Method Status YES manual up Protocol up

YES manual administratively down down YES manual up up

YES manual administratively down down YES manual administratively down down

www.edunet.hr

Page 16 of 161

CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding

Lab 1.5.1: Cabling a Network and Basic Router Configuration

CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding

Lab 1.5.1: Cabling a Network and Basic Router Configuration

Task 10: Using ping.
The ping command is a useful tool for troubleshooting Layers 1 though 3 of the OSI model and diagnosing basic network connectivity. This operation can be performed at either the user or privileged EXEC modes. Using ping sends an Internet Control Message Protocol (ICMP) packet to the specified device and then waits for a reply. Pings can be sent from a router or a host PC. Step 1: Use the ping command to test connectivity between the R1 router and PC1. R1#ping 192.168.1.10 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.10, timeout is 2 seconds: .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 72/79/91 ms Each exclamation point (!) indicates a successful echo. Each period (.) on the display indicates that the application on the router timed out while it waited for a packet echo from a target. The first ping packet failed because the router did not have an ARP table entry for the destination address of the IP packet. Because there is no ARP table entry, the packet is dropped. The router then sends an ARP request, receives a response, and adds the MAC address to the ARP table. When the next ping packet arrives, it will be forwarded and be successful. Step 2: Repeat the ping from R1 to PC1. R1#ping 192.168.1.10 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.10, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 72/83/93 ms R1# All of the pings are successful this time because the router has an entry for the destination IP address in the ARP table. Step 3: Send an extended ping from R1 to PC1. To accomplish this, type ping at the privileged EXEC prompt and press Enter. Fill out the rest of the prompts as shown: R1#ping Protocol [ip]: Target IP address: 192.168.1.10 Repeat count [5]: 10 Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: Sweep range of sizes [n]: Type escape sequence to abort. Sending 10, 100-byte ICMP Echos to 192.168.1.10, timeout is 2 seconds: !!!!!!!!!! Success rate is 100 percent (10/10), round-trip min/avg/max = 53/77/94 ms R1#

Step 4: Send a ping from PC1 to R1. From Windows go to Start > Programs > Accessories > Command Prompt. In the Command Prompt window that opens, ping R1 by issuing the following command: C:\> ping 192.168.1.1 The ping should respond with successful results. Step 5: Send an extended ping from PC1 to R1. To accomplish this, enter the following command at the Windows command prompt: C:\>ping 192.168.1.1 –n 10 There should be 10 successful responses from the command.

Task 11: Using traceroute.
The traceroute command is an excellent utility for troubleshooting the path that a packet takes through an internetwork of routers. It can help to isolate problem links and routers along the way. The traceroute command uses ICMP packets and the error message generated by routers when the packet exceeds its Time-To-Live (TTL). This operation can be performed at either the user or privileged EXEC modes. The Windows version of this command is tracert. Step 1: Use the traceroute command at the R1 privileged EXEC prompt to discover the path that a packet will take from the R1 router to PC1. R1#traceroute 192.168.1.10 Type escape sequence to abort. Tracing the route to 192.168.1.10 1 R1# 192.168.1.10 103 msec 81 msec 70 msec

Step 2: Use the tracert command at the Windows command prompt to discover the path that a packet will take from the R1 router to PC1. C:\>tracert 192.168.1.1 Tracing route to 192.168.1.1 over a maximum of 30 hops: 1 71 ms 70 ms 73 ms 192.168.1.1

Trace complete. C:\>

Task 12: Create a start.txt File.
Router configurations can be captured to a text (.txt) file and saved for later use. The configuration can be copied back to the router so that the commands do not have to be entered one at a time.

www.edunet.hr

Page 17 of 161

www.edunet.hr

Page 18 of 161

CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding

Lab 1.5.1: Cabling a Network and Basic Router Configuration

CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding

Lab 1.5.1: Cabling a Network and Basic Router Configuration

Step 1: View the running configuration of the router using the show running-config command. R1#show running-config ! version 12.3 ! hostname R1 ! ! enable secret 5 $1$J.hq$Ds72Qz86tvpcuW2X3FqBS. ! no ip domain-lookup ! interface FastEthernet0/0 description R1 LAN mac-address 0007.eca7.1511 ip address 192.168.1.1 255.255.255.0 duplex auto speed auto ! interface FastEthernet0/1 mac-address 0001.42dd.a220 no ip address duplex auto speed auto shutdown ! interface Serial0/0 description Link to R2 ip address 192.168.2.1 255.255.255.0 clock rate 64000 ! interface Serial0/1 no ip address shutdown ! interface Vlan1 no ip address shutdown ! ip classless ! ! ! ! line con 0 password cisco line vty 0 4 password cisco login ! end R1#

Step 2: Copy the command output. Select the command output. From the HyperTerminal Edit menu, choose the copy command.

Step 3: Paste output in Notepad. Open Notepad. Notepad is typically found on the Start menu under Programs > Accessories. From the Notepad Edit menu, click Paste.

www.edunet.hr

Page 19 of 161

www.edunet.hr

Page 20 of 161

Task 14: Verify and Test the Configurations.1: Cabling a Network and Basic Router Configuration Step 4: Edit commands.txt. choose Paste to Host. Step 2: When the prompt returns. Save the running configuration to NVRAM using the copy running-config startup-config command. Step 6: Verify the running configuration. [OK] R1# End with CNTL/Z. Router(config)# Step 4: Copy the commands. After all of the pasted commands have been applied.1 255.1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.txt file that was created in Notepad.168. and then choose Edit > Copy. choose not to use the AutoInstall facility. Step 1: Verify that routing tables have the following routes using the show ip route command.2.5. Step 7: Save the running configuration.255.0 clock rate 64000 no shutdown ! ! ! ! line con 0 password cisco line vty 0 4 password cisco login ! end Step 5: Save the open file in Notepad to start. issue the reload command.. Some of these changes are: • • • • • Adding a no shutdown command to FastEthernet and serial interfaces that are being used.txt File onto the R1 Router. Replacing the encrypted text in the enable secret command with the appropriate password. These are the directly connected networks that were activated when you configured the interfaces on www.168. Step 1: Erase the current startup configuration of R1. as shown: Would Would Press Press you like to enter the initial configuration dialog? [yes/no]: no you like to terminate autoinstall? [yes]: Enter to accept default.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. After the router finishes the boot process.hr Page 21 of 161 www. you are interested in seeing that both R1 and R2 have two routes. For now.255. Confirm the objective when prompted.edunet. RETURN to get started! Step 3: Enter global configuration mode. R1#copy running-config startup-config Building configuration. Both routes are designated with a C. use the show running-config command to verify that the running configuration appears as expected. In the start.0 no shutdown duplex auto speed auto ! interface Serial0/0 description Link to R2 ip address 192. and answer no if asked to save changes. select all the lines.255.hr Page 22 of 161 . Step 5: From the HyperTerminal Edit menu.5. The result should look something like this: R1#erase startup-config Erasing the nvram filesystem will remove all files! Continue? [confirm] [OK] Erase of nvram: complete Router# Edit the text in the Notepad file as shown below: hostname R1 ! ! enable secret class ! no ip domain-lookup ! interface FastEthernet0/0 description R1 LAN ip address 192.1.. Router#configure terminal Enter configuration commands. Confirm the objective when prompted.255.1 255. Removing the mac-address command from the interfaces. Task 13: Load the start. Removing the ip classless command. Some commands will have to be edited or added before the startup script can be applied to a router. one per line.edunet. Removing unused interfaces. The show ip route command and output will be thoroughly explored in upcoming chapters.

N2 .IS-IS level-2 ia .2. Serial0/0/0 192. Another common problem is router interfaces that are not configured correctly or not activated. L2 . Check the PC configurations. E2 . B . is it possible to ping R1 using the command ping 192.mobile.OSPF NSSA external type 1.EIGRP.OSPF NSSA external type 2 E1 .candidate default. R . * .0/24 is directly connected.BGP D .OSPF external type 2 i . Step 4: Test connectivity between router R1 and R2.168.static.OSPF NSSA external type 2 E1 . Do they match the Topology Diagram? ____________ 3.3.168. B . FastEthernet0/0 192. troubleshoot the configurations to find the error using the following systematic process: 1. O .IS-IS summary. N2 .0/24 is directly connected. Step 3: Test connectivity.IS-IS inter area.168.2? ____________ -----------------------R2#show ip route Codes: C .168. P . troubleshoot the configurations to find the error using the following systematic process: 1.per-user static route o . then you should be able to successfully ping from R2 to R1 and from R2 to R3.0/24 is directly connected.2.168.periodic downloaded static route Gateway of last resort is not set C C 192.OSPF inter area N1 .connected. S . R1#show ip route Codes: C . Are the interfaces “up” and “up”? ____________ If your answer to all three steps is yes.1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. FastEthernet0/0 From the router R2. Check the router interfaces using the show ip interface brief command.EIGRP external.5.OSPF. U .per-user static route o . Are they physically connected to the correct router? (Connection could be through a switch or directly. U . P . * . is it possible to ping the default gateway? __________ From the host attached to R2. L1 . Are the routers physically connected? ____________ Are link lights blinking on all relevant ports? ____________ Step 2: Verify interface configurations. EX .1 unassigned unassigned OK? Method Status Protocol YES manual up up YES unset administratively down down YES manual up up YES unset administratively down down YES manual administratively down down 2. From the host attached to R1. M .0/24 is directly connected.connected. Your output should look similar to the following: R1#show ip interface Interface FastEthernet0/0 FastEthernet0/1 Serial0/0/0 Serial0/0/1 Vlan1 brief IP-Address 192. then you should be able to successfully ping the default gateway.1? ____________ If the answer is no for the questions above. Check the PCs. Test connectivity by pinging from each host to the default gateway that has been configured for that host.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. proceed to Step 2.hr brief IP-Address 192.BGP D . O . Use the show ip interface brief command to quickly verify the configuration of each router’s interfaces.168.2. Verify this again by using the show ip route command. EX .3. then both routes will be in the routing table.edunet.static. Are the interfaces up and up? ____________ If your answer to all three steps is yes.ODR. S .IS-IS. IA .168.168.2.IS-IS inter area. If you do not see two routes for each router as shown in the following output.RIP.hr Page 24 of 161 .168.1 unassigned 192. E2 .mobile.IS-IS.1.1 unassigned 192.IS-IS level-2 ia .RIP. Check the router configurations.IS-IS level-1. Check the router interfaces using the show ip interface brief command.IS-IS level-1. L1 .2 unassigned unassigned OK? Method Status Protocol YES manual up up YES unset administratively down down YES manual up up YES unset down down YES manual administratively down down Page 23 of 161 www. Do they match the Topology Diagram? ____________ Did you configure the clock rate command on the DCE side of the link? ____________ 3. From the router R1.OSPF inter area N1 .) ____________ Are link lights blinking on all relevant ports? ____________ 2.EIGRP external. su . -----------------------R2#show ip interface Interface FastEthernet0/0 FastEthernet0/1 Serial0/0/0 Serial0/0/1 Vlan1 www.OSPF.EIGRP.2.1. is it possible to ping R2 using the command ping 192.2.168. R .OSPF external type 2 i .candidate default.IS-IS summary.edunet. is it possible to ping the default gateway? __________ If the answer is no for any of the above questions. su .5.1: Cabling a Network and Basic Router Configuration each router.OSPF external type 1.OSPF external type 1.periodic downloaded static route Gateway of last resort is not set C C 192. L2 .OSPF NSSA external type 1. Check the cabling. M . Serial0/0/0 If both interfaces are up and up. IA .ODR.

1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1. L1 .connected.1.0/24 is directly connected. E2 . O .2.edunet. IA . FastEthernet0/0 With this route entered in the routing table.0 192.OSPF external type 1.OSPF inter area N1 .hr Page 26 of 161 .168. “Gather Information.5.0 [1/0] via 192.168. From the host PC1.0 is directly connected. is it possible to ping the host PC2? ________ This ping should be successful. EX . o .2.2.” PC2 will send a ping reply back to PC1.edunet.0 network in the routing table.connected. S C C R1# 192.OSPF NSSA external type 2 E1 .3. E . Serial0/0/1 192.1. L1 .IS-IS level-2.255.2.1. R . What is the next-hop address to which R2 would send a packet destined for the 192.static.0/24 is directly connected.ODR Gateway of last resort is not set On the R1 router.0 ________________ R2(config)# Step 5: View the routing table to verify the new static route entry. Step 1: To configure static routes with a next-hop specified.3.168.candidate default U .IS-IS.OSPF NSSA external type 1. subnet-mask—Subnet mask of the remote network to be added to the routing table. www. S . B . IA .2 192.BGP D .mobile.hr Page 25 of 161 www. M .168.5.IS-IS level-2.2. However. N2 .168. configure a static route to the 192.OSPF external type 2.0 255. R2#_________________________________ Codes: C .168. o . configure a static route to reach the 192.OSPF.168.2. Task 15: Configure a Static Route Using a Next-Hop Address. * .255.1.168.168.2.ODR Gateway of last resort is not set C C S R2# 192. N2 .0/24 is directly connected.OSPF. use the following syntax: Router(config)# ip route network-address subnet-mask ip-address • • • network-address:—Destination network address of the remote network to be added to the routing table. E2 .CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.1 Step 6: Use ping to check connectivity between the host PC1 and the host PC2. Notice that the route is coded with an S. L2 .per-user static route.0 255.3.IGRP. The pings will arrive at PC2 if you have configured and verified all devices through Task 6.static.RIP.1: Cabling a Network and Basic Router Configuration Step 4: On the R2 router. L2 .0/24 network? ____________ Although R1 will forward packets to destinations for which there is a route.2. The subnet mask can be modified to summarize a group of networks.BGP D . E . EX . * .IS-IS level-1.EGP i .2.255.168.3. ip-address—Commonly referred to as the next-hop router’s IP address.168.0/24 will be forwarded to the next-hop router at 192. What interface will R1 use to forward packets to the 192.OSPF external type 2. S .OSPF inter area N1 . Step 3: Use ping to check connectivity between the host PC3 and the host PC2.255. M .IGRP.OSPF external type 1. B . which means that the route is a static route. which means the route is a static route.per-user static route.0/24 network? R2(config)#ip route 192.EIGRP external.0/24 [1/0] via 192.168. I . O . I .3.168. R .IS-IS. From the host PC1.EIGRP. R1#_________________________________ Codes: C .EIGRP external.RIP.candidate default U . the ping reply will be discarded at R2 because the R2 does not have a return route to the 192.0 network using the Serial 0/0/1 interface of R2 as the next-hop address. FastEthernet0/0 192. Notice that the route is coded with an S.168.2 R1(config)# Step 2: View the routing table to verify the new static route entry.3.EGP i . Serial0/0/1 192.168. any packet that matches the first 24 left-most bits of 192.EIGRP.168.IS-IS level-1. is it possible to ping the host PC2? ________ These pings should fail.0 network.168.OSPF NSSA external type 1.168.OSPF NSSA external type 2 E1 . this does not mean that a packet will arrive safely at the final destination.mobile. R1(config)#ip route 192.

connected.static. N2 .IS-IS level-1. use the following syntax: Router(config)# ip route network-address subnet-mask exit-interface • • • network-address—Destination network address of the remote network to be added to the routing table.BGP D .EIGRP.RIP.0/24 is directly connected. O . Serial0/0/1 Step 1: On the R3 router.edunet.IS-IS level-2. R1(config)# ip route 192. Serial0/0/1 192. The subnet mask can be modified to summarize a group of networks.BGP D .OSPF external type 2.168.1: Cabling a Network and Basic Router Configuration Step 3: On the R2 router.RIP. O . B .255.OSPF inter area N1 . On the R3 router. S .IS-IS.OSPF external type 1.3.EIGRP. M .0 network using the Serial 0/0/0 interface of the R2 router as the exit interface.2.168.EIGRP external. R1#________________________________ Codes: C .per-user static route.IS-IS. R2#_________________________________ Codes: C . * . configure a static route.255. configure a static route to the 172.OSPF external type 2. EX .0 255. E .1: Cabling a Network and Basic Router Configuration CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.IS-IS level-2. configure a static route to the 172.EIGRP external. Serial0/0/0 192. L2 . R .candidate default U . L1 .168.168.1. FastEthernet0/0 192. EX .168.0 network using the Serial 0/0/0 interface of the R3 router as the exit interface. configure a static route.OSPF NSSA external type 1.ODR Gateway of last resort is not set 172. 3 subnets 192. exit-interface—Outgoing interface that would be used in forwarding packets to the destination network.EGP i . * . L2 .3.IGRP.per-user static route.edunet.0/24 is directly connected.3.EGP i . I .0 Serial0/0/0 R2(config)# Step 4: View the routing table to verify the new static route entry.OSPF NSSA external type 2 E1 . o . IA .OSPF NSSA external type 2 E1 .OSPF NSSA external type 1.255. To configure static routes with an exit interface specified.16.168.IGRP. Serial0/0/1 192.OSPF.0 255.ODR Gateway of last resort is not set C S C R2# Step 5: Use ping to check connectivity between the host PC2 and PC1.mobile.0 is directly connected. I .16. subnet-mask—Subnet mask of the remote network to be added to the routing table.OSPF external type 1.255.OSPF inter area N1 . M .mobile.hr Page 27 of 161 www.0/24 is directly connected.168.1. S .0 is directly connected. IA .hr Page 28 of 161 . Task 16: Configure a Static Route Using an Exit Interface.0 is directly connected. N2 .0/24 is subnetted. FastEthernet0/0 www. L1 .candidate default U . On the R2 router.1.5.3.static. B .5. R2(config)# ip route 192.IS-IS level-1.16.2.connected. o .0.3.OSPF. R . E . S C C R1# 192. E2 . E2 .168.0 Serial0/0/1 R1(config)# Step 2: View the routing table to verify the new static route entry.CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.

L1 .hr Page 30 of 161 .2.1.2. Configure routers: Enter the global configuration mode and configure the hostname as shown in the chart. * .hr Page 29 of 161 www. Step 3: Use ping to check connectivity between the host PC2 and PC1.0 is directly connected. we must explicitly configure R1 with a default route before it will send packets with unknown destinations to R2. Route>show ip route Using the command traceroute.2 to network 0. Troubleshooting: Using the command show ip route. R .CCNA Exploration Routing Protocols and Concepts: Introduction to Routing and Packet Forwarding Lab 1.0.IS-IS level-2. to test connection between routers.OSPF.16. refer to the Configuring router passwords lab.168.edunet.0. R1(config)#ip route 0.0 C C S* R1# 192.IS-IS.OSPF NSSA external type 1. If there are any difficulties. which is connected to R2. you configured the router for specific destination routes.2. and enable passwords. To configure a default static route.EIGRP external. Then configure the console.candidate default U . Do not configure a routing protocol.168.0 0.ODR Gateway of last resort is 192. But could you do this for every route on the Internet? No. Note that the R1 router now has a default route.2 R1(config)# Step 2: View the routing table to verify the new static route entry. R1#________________________________ Codes: C .0.0/0 [1/0] via 192. M . R1 should send the packet to R2.OSPF NSSA external type 2 E1 . Background/Preparation: Setup a network like on the diagram.8.0 { ip-address | interface } Step 1: Configure the R1 router with a default route. IA .0.0 is directly connected. view the IP routing table. is it possible to ping PC1? ________ This ping should be successful this time because the R1 router can return the packet using the default route. S . A router uses the default static route when there is not a better. Configure the R1 router with a default route using the Serial 0/0/0 interface of R1 as the next-hop interface.2 Objective: Configure static routes between routers to allow data transfer between routers without the use of dynamic routing protocols.0.connected.2.0 192.IS-IS level-1. FastEthernet0/0 0.mobile.per-user static route. EX .0.1: Configuring Static Routes Task 17: Configure a Default Static Route.168. Configure interfaces and IP host tables. virtual terminal.0 0. we could assume that R1 is a stub router. Serial0/0/0 172.0. more specific route to a destination. add a default static route.0. The router and you would be overwhelmed. and will send all unknown traffic out Serial 0/0/0.edunet.EGP i . refer to the Configuring Host Tables lab. If R1 has packets to route that do not belong to any of R1 directly connected networks.1: Cabling a Network and Basic Router Configuration Lab 2.168.BGP D .0. I . o . use the following syntax: Router(config)#ip route 0. E2 . From the host PC2. Otherwise.EIGRP. E . L2 .RIP. the gateway of last resort.0. However.OSPF inter area N1 .IGRP. B . Instead of filling the routing table of R1 with static routes.5. If there are any difficulties.0. In the previous steps. N2 . www. To minimize the size of the routing tables. O . This means that R2 is the default gateway for R1.0.OSPF external type 2. R1 discards packets with unknown destinations.static.OSPF external type 1.

129 172. You will need to troubleshoot each router to determine the configuration errors. Page 31 of 161 www.1.255.1.20. Step 2: Clear the configuration on each router.1.20.255.128 255.255.192 Default Gateway N/A N/A N/A N/A N/A N/A N/A 172.255.255.1.255.128 255.129 255.1.255. Answer no if asked to save changes.255. When you have corrected all of the configuration errors.255.255.20.38.255.0 0.1.0.65 Step 1: Load the following script onto the BRANCH router: hostname BRANCH ! ! no ip domain-lookup ! interface FastEthernet0/0 ip address 172.168.8.168. Addressing Table Device BRANCH Interface Fa0/0 S0/0/0 Fa0/0 HQ S0/0/0 S0/0/1 ISP PC1 PC2 Web Server FA0/0 S0/0/1 NIC NIC NIC IP Address 172. Clear the configuration on each of routers using the erase startup-config command and then reload the routers.128 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 172. Propose solutions to network errors.CCNA Exploration Routing Protocols and Concepts: Static Routing Lab 2. Lab 2.38.edunet.0 172.20.128 255.129 192.168.39.3: Troubleshooting Static Routes • Discover points where the network is not converged.255.20.253 172.edunet.255.255. Erase the startup configuration and reload a router to the default state. Gather information about errors in the network.255.255.8.1. These scripts contain errors that will prevent end-to-end communication across the network.129 ! ! ! ! line con 0 line vty 0 4 password cisco login ! end Learning Objectives Upon completion of this lab.hr www.3: Troubleshooting Static Routes Topology Diagram • • • • Scenario In this lab. Load the routers with supplied scripts.252 255.0. Task 2: Load Routers with the Supplied Scripts.0. Implement solutions to network errors.0. you will be able to: • • • Cable a network according to the Topology Diagram. Erase.255.168. and then use the appropriate commands to correct the configurations.255.0.255.20.254 192. and Reload the Routers. Task 1: Cable.20.255.129 172.hr Page 32 of 161 .255. you will begin by loading configuration scripts on each of the routers.129 172. all of the hosts on the network should be able to communicate with each other.1 255.39.39.20.168.255.0. Document the corrected network.135 192.0.1 172.65 192.128 255.255.0.20.128 255.135 172.255. Step 1: Cable a network that is similar to the one in the Topology Diagram.70 Subnet Mask 255.252 255.20.20.192 255.128 255.128 clock rate 64000 no shutdown ! ip route 0.2 192.

255.39.192 ! interface Serial0/0/1 ip address 192. ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ www.168.255.8.64 255.255.38.255.CCNA Exploration Routing Protocols and Concepts: Static Routing Lab 2.168.20.65 255.1.255.255.255. Use the space below to write a brief description of the errors that you found.255.254 ! ! ! ! line con 0 line vty 0 4 password cisco login ! end www.255.168.38.3: Troubleshooting Static Routes CCNA Exploration Routing Protocols and Concepts: Static Routing Lab 2.252 no shutdown ! ip route 192.128 no shutdown ! interface Serial0/0/1 ip address 192.253 ! ! ! ! line con 0 line vty 0 4 password cisco login ! end Step 3: Load the following script onto the ISP router: hostname ISP ! ! no ip domain-lookup ! interface FastEthernet0/0 ip address 192.255.255.168.20.0.255.edunet.129 255.8.252 no shutdown ! ip route 172.0 255.hr Page 33 of 161 Task 3: Troubleshooting Use this commands to find configuration errors in the scripts that were provided for this lab.3: Troubleshooting Static Routes Step 2: Load the following script onto the HQ router: hostname HQ ! ! no ip domain-lookup ! interface FastEthernet0/0 ip address 172.253 255.168.edunet.192 192.20. • • • • show running-config show ip route show ip interface brief show ip protocols Task 4: Reflection There were a number of configuration errors in the scripts that were provided for this lab.128 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 172.38.255.254 255.168.2 255.255.38.hr Page 34 of 161 .0 192.39.0.

4: Static Routes www.edunet.hr Page 35 of 161 www.hr Page 36 of 161 .8.edunet.CCNA Exploration Routing Protocols and Concepts: Static Routing Lab 2.

CCNA Exploration Routing Protocols and Concepts: RIP version 1

Lab 5.6.1: Basic RIP Configuration

Scenario A: Running RIPv1 on Classful Networks

Lab 5.6.1: Basic RIP Configuration
Topology Diagram

Topology Diagram

Addressing Table Learning Objectives
Upon completion of this lab, you will be able to: • • • • • • • • • • • • Cable a network according to the Topology Diagram. Erase the startup configuration and reload a router to the default state. Perform basic configuration tasks on a router. Configure and activate interfaces. Configure RIP routing on all routers. Verify RIP routing using show and debug commands. Reconfigure the network to make it contiguous. Observe automatic summarization at boundary router. Gather information about RIP processing using the debug ip rip command. Configure a static default route. Propagate default routes to RIP neighbors. Document the RIP configuration. R3 PC1 PC2 PC3 R2 R1 Device Interface Fa0/0 S0/0/0 Fa0/0 S0/0/0 S0/0/1 Fa0/0 S0/0/1 NIC NIC NIC IP Address 192.168.1.1 192.168.2.1 192.168.3.1 192.168.2.2 192.168.4.2 192.168.5.1 192.168.4.1 192.168.1.10 192.168.3.10 192.168.5.10 Subnet Mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 Default Gateway N/A N/A N/A N/A N/A N/A N/A 192.168.1.1 192.168.3.1 192.168.5.1

Scenarios
• • • Scenario A: Running RIPv1 on Classful Networks Scenario B: Running RIPv1 with Subnets and Between Classful Networks Scenario C: Running RIPv1 on a Stub Network.

Task 1: Prepare the Network.
Step 1: Cable a network that is similar to the one in the Topology Diagram. You can use any current router in your lab as long as it has the required interfaces shown in the topology. Note: If you use 1700, 2500, or 2600 routers, the router outputs and interface descriptions will appear different. Step 2: Clear any existing configurations on the routers.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 37 of 161

www.edunet.hr

Page 38 of 161

CCNA Exploration Routing Protocols and Concepts: RIP version 1

Lab 5.6.1: Basic RIP Configuration

CCNA Exploration Routing Protocols and Concepts: RIP version 1

Lab 5.6.1: Basic RIP Configuration

Task 2: Perform Basic Router Configurations.
Perform basic configuration of the R1, R2, and R3 routers according to the following guidelines: 1. Configure the router hostname. 2. Disable DNS lookup. 3. Configure an EXEC mode password. 4. Configure a message-of-the-day banner. 5. Configure a password for console connections. 6. Configure a password for VTY connections.

The network command: • • Enables RIP on all interfaces that belong to this network. These interfaces will now both send and receive RIP updates. Advertises this network in RIP routing updates sent to other routers every 30 seconds.

When you are finished with the RIP configuration, return to privileged EXEC mode and save the current configuration to NVRAM. R1(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R1#copy run start

Task 3: Configure and Activate Serial and Ethernet Addresses.
Step 1: Configure interfaces on R1, R2, and R3. Configure the interfaces on the R1, R2, and R3 routers with the IP addresses from the table under the Topology Diagram. Step 2: Verify IP addressing and interfaces. Use the show ip interface brief command to verify that the IP addressing is correct and that the interfaces are active. When you have finished, be sure to save the running configuration to the NVRAM of the router. Step 3: Configure Ethernet interfaces of PC1, PC2, and PC3. Configure the Ethernet interfaces of PC1, PC2, and PC3 with the IP addresses and default gateways from the table under the Topology Diagram. Step 4: Test the PC configuration by pinging the default gateway from the PC. When you are finished with the RIP configuration, return to privileged EXEC mode and save the current configuration to NVRAM. Step 4: Configure RIP on the R3 router using the router rip and network commands. R3(config)#router rip R3(config-router)#network 192.168.4.0 R3(config-router)#network 192.168.5.0 R3(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R3# copy run start When you are finished with the RIP configuration, return to privileged EXEC mode and save the current configuration to NVRAM. Step 3: Configure RIP on the R2 router using the router rip and network commands. R2(config)#router rip R2(config-router)#network 192.168.2.0 R2(config-router)#network 192.168.3.0 R2(config-router)#network 192.168.4.0 R2(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R2#copy run start

Task 4: Configure RIP.
Step 1: Enable dynamic routing. To enable a dynamic routing protocol, enter global configuration mode and use the router command. Enter router ? at the global configuration prompt to a see a list of available routing protocols on your router. To enable RIP, enter the command router rip in global configuration mode. R1(config)#router rip R1(config-router)#

Task 5: Verify RIP Routing.
Step 1: Use the show ip route command to verify that each router has all of the networks in the topology entered in the routing table. Routes learned through RIP are coded with an R in the routing table. If the tables are not converged as shown here, troubleshoot your configuration. Did you verify that the configured interfaces are active? Did you configure RIP correctly? Return to Task 3 and Task 4 to review the steps necessary to achieve convergence.

Step 2: Enter classful network addresses. Once you are in routing configuration mode, enter the classful network address for each directly connected network, using the network command. R1(config-router)#network 192.168.1.0 R1(config-router)#network 192.168.2.0 R1(config-router)#
www.edunet.hr Page 39 of 161

www.edunet.hr

Page 40 of 161

CCNA Exploration Routing Protocols and Concepts: RIP version 1

Lab 5.6.1: Basic RIP Configuration

CCNA Exploration Routing Protocols and Concepts: RIP version 1

Lab 5.6.1: Basic RIP Configuration

R1#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is not set C C R R R R1# 192.168.1.0/24 192.168.2.0/24 192.168.3.0/24 192.168.4.0/24 192.168.5.0/24 is directly is directly [120/1] via [120/1] via [120/2] via connected, FastEthernet0/0 connected, Serial0/0/0 192.168.2.2, 00:00:04, Serial0/0/0 192.168.2.2, 00:00:04, Serial0/0/0 192.168.2.2, 00:00:04, Serial0/0/0

R2#show ip route <Output omitted> R C C C R R2# 192.168.1.0/24 192.168.2.0/24 192.168.3.0/24 192.168.4.0/24 192.168.5.0/24 [120/1] via is directly is directly is directly [120/1] via 192.168.2.1, 00:00:22, Serial0/0/0 connected, Serial0/0/0 connected, FastEthernet0/0 connected, Serial0/0/1 192.168.4.1, 00:00:23, Serial0/0/1

R1#show ip protocols Routing Protocol is "rip" Sending updates every 30 seconds, next due in 16 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Redistributing: rip Default version control: send version 1, receive any version Interface Send Recv Triggered RIP Key-chain FastEthernet0/0 1 2 1 Serial0/0/0 1 2 1 Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 192.168.1.0 192.168.2.0 Passive Interface(s): Routing Information Sources: Gateway Distance Last Update 192.168.2.2 120 Distance: (default is 120) R1# R1 is indeed configured with RIP. R1 is sending and receiving RIP updates on FastEthernet0/0 and Serial0/0/0. R1 is advertising networks 192.168.1.0 and 192.168.2.0. R1 has one routing information source. R2 is sending R1 updates. Step 3: Use the debug ip rip command to view the RIP messages being sent and received. Rip updates are sent every 30 seconds so you may have to wait for debug information to be displayed. R1#debug ip rip R1#RIP: received v1 update from 192.168.2.2 on Serial0/0/0 192.168.3.0 in 1 hops 192.168.4.0 in 1 hops 192.168.5.0 in 2 hops RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (192.168.1.1) RIP: build update entries network 192.168.2.0 metric 1 network 192.168.3.0 metric 2 network 192.168.4.0 metric 2 network 192.168.5.0 metric 3 RIP: sending v1 update to 255.255.255.255 via Serial0/0/0 (192.168.2.1) RIP: build update entries network 192.168.1.0 metric 1 The debug output shows that R1 receives an update from R2. Notice how this update includes all the networks that R1 does not already have in its routing table. Because the FastEthernet0/0 interface belongs to the 192.168.1.0 network configured under RIP, R1 builds an update to send out that interface. The update includes all networks known to R1 except the network of the interface. Finally, R1 builds an update to send to R2. Because of split horizon, R1 only includes the 192.168.1.0 network in the update. Step 4: Discontinue the debug output with the undebug all command. R1#undebug all All possible debugging has been turned off

R3#show ip route <Output omitted> R R R C C R3# 192.168.1.0/24 192.168.2.0/24 192.168.3.0/24 192.168.4.0/24 192.168.5.0/24 [120/2] via [120/1] via [120/1] via is directly is directly 192.168.4.2, 00:00:18, Serial0/0/1 192.168.4.2, 00:00:18, Serial0/0/1 192.168.4.2, 00:00:18, Serial0/0/1 connected, Serial0/0/1 connected, FastEthernet0/0

Step 2: Use the show ip protocols command to view information about the routing processes. The show ip protocols command can be used to view information about the routing processes that are occurring on the router. This output can be used to verify most RIP parameters to confirm that: • • • • RIP routing is configured The correct interfaces send and receive RIP updates The router advertises the correct networks RIP neighbors are sending updates

www.edunet.hr

Page 41 of 161

www.edunet.hr

Page 42 of 161

R1(config)#no router rip Addressing Table Device R1 Interface Fa0/0 S0/0/0 Fa0/0 R2 S0/0/0 S0/0/1 R3 PC1 PC2 PC3 Fa0/0 S0/0/1 NIC NIC NIC IP Address 172.30.30.1 172.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. Routing updates can be modified and sent back to the router. changed state to down R1(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial0/0/0.1 172.5.0 255. changed state to up R1(config-if)# %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0. return to privileged EXEC mode and save the current configuration to NVRAM.255.30.255.1 R2(config)#no router rip R3(config)#no router rip Task 2: Configure RIP Step 1: Configure RIP routing on R1 as shown below.hr Page 43 of 161 .4. you may need to reset that interface by using the shutdown command. This process will force the IOS to starting using the new IP address. This statement includes both interfaces on different subnets of the 172. Step 3: Remove the RIP configurations from each router.255.1 192.255. it is more efficient to simply remove RIP and start over.0 Default Gateway N/A N/A N/A N/A N/A N/A N/A 172.255.30.30.1: Basic RIP Configuration Scenario B: Running RIPv1 with Subnets and Between Classful Networks Topology Diagram R1(config)#int s0/0/0 R1(config-if)#ip add 172.168.255.168.30.3.0 Notice that only a single network statement is needed for R1.255.0 255.10 192. advertising updates on a broadcast network is a security risk. Step 2: Configure R1 to stop sending updates out the FastEthernet0/0 interface.9 192.2 192.1 172.0 255.3.168. corrupting the router table with false metrics that misdirects traffic.255.255.255.1 192.255.0 255.10 Subnet Mask 255.edunet.6. This will remove all the RIP configuration commands including the network commands.4.0 R1(config-if)#shutdown %LINK-5-CHANGED: Interface Serial0/0/0. waiting for the LINK-5-CHANGED message.252 255.255.30. R1(config-router)#passive-interface fastethernet 0/0 R1(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R1#copy run start www.1.6.hr Page 44 of 161 Task 1: Make Changes between Scenario A and Scenario B Step 1: Change the IP addressing on the interfaces as shown in the Topology Diagram and the Addressing Table. verify that all necessary interfaces are active with the show ip interface brief command.252 255. changed state to up Step 2: Verify that routers are active. Sometimes when changing the IP address on a serial interface.255.255.0.255.255.0. Remove the RIP configurations from each router with the no router rip global configuration command.5.30. www.5. Sending updates out this interface wastes the bandwidth and processing resources of all devices on the LAN.255.255.255.2. In addition. When you are finished with the RIP configuration. After reconfiguring all the interfaces on all three routers.10 172.168.1 172. Although you can remove the old network commands with the no version of the command.0 255.2.10 172.1.0 255.30.255.1.0 255.30.0 major network.edunet.1: Basic RIP Configuration CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. and then using the no shutdown command. changed state to administratively down %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0.255.2. R1(config)#router rip R1(config-router)#network 172.3.168.1 255. The passive-interface fastethernet 0/0 command is used to disable sending RIPv1 updates out that interface. RIP updates can be intercepted with packet sniffing software.255.30.

6.168.168.4. FastEthernet0/0 172.168. 00:00:22.0.edunet.0/30 is subnetted.0.0 [120/1] via 172. next due in 20 seconds Invalid after 180 seconds.30.edunet.hr Page 45 of 161 www.0 is directly connected.0. 3 subnets 172.4.0/24 is directly connected.0 R2(config-router)#passive-interface fastethernet 0/0 R2(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R2#copy run start Again notice that only a single network statement is needed for the two subnets of 172.168.2. return to privileged EXEC mode and save the current configuration to NVRAM.1.hr Page 46 of 161 . For example.0 major network.168. R1#show ip protocols Routing Protocol is "rip" Sending updates every 30 seconds. of the 172. Classful routing protocols do not send the subnet mask with network in routing updates. The network for the WAN link between R2 and R3 is also configured.5.0 is directly connected.30. Notice in the output from this command that the FastEthernet0/0 interface is no longer listed under Interface but is now listed under a new section of the output: Passive Interface(s).165. Serial0/0/0 192.168.3.9.0/24 is subnetted. receive version 2 Interface Send Recv Triggered RIP Key-chain Serial0/1/0 2 2 Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 172.6.0.0 [120/1] via 172.168.229 120 00:00:15 Distance: (default is 120) Task 3: Verify RIP Routing Step 1: Use the show ip route command to verify that each router has all of the networks in the topology in the routing table. When you are finished with the RIP configuration.0 is directly connected.168.1.0/24 [120/1] via 192.4.0.0 Passive Interface(s): FastEthernet0/0 Routing Information Sources: Gateway Distance Last Update 209. 172.5.30.5. Serial0/0/0 172. 00:00:22.0 R3(config-router)#passive-interface fastethernet 0/0 R3(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R3#copy run start When you are finished with the RIP configuration. This statement includes both interfaces. Serial0/0/0 C C R R R R1# Note: RIPv1 is a classful routing protocol.4.30. Step 4: Configure RIP routing on R3 as shown below. 00:00:04.30.0 is sent by R2 to R1 without any subnet mask information.168. 1 subnets 192. Serial0/0/1 192.30.168.1: Basic RIP Configuration Step 3: Configure RIP routing on R2 as shown below.0/30 is subnetted.30. 00:00:22. R1#show ip route <Output omitted> 172.0 R2(config-router)#network 192. FastEthernet0/0 192.30.0/16 [120/1] via 192.3.2.2.0/24 is subnetted.0 R3(config-router)#network 192. www.0 209.0/24 [120/2] via 172.30.0.200.30.30. 00:00:19.10.30.30. 1 subnets 192.2.2. hold down 180.30.0 is directly connected. Serial0/0/0 192.2.168. first make sure that all necessary interfaces are active with show ip interface brief. Serial0/0/1 R C C C R R2# R3#show ip route <Output omitted> R C C 172.30. on different subnets.8 is directly connected. If one or more routing tables does not have a converged routing table.0.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5.30.30. Serial0/0/0 172.168.5.4.4. flushed after 240 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Redistributing: rip Default version control: send version 2. Serial0/0/1 192. Serial0/0/0 172. R3(config)#router rip R3(config-router)#network 192.200.1: Basic RIP Configuration CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. return to privileged EXEC mode and save the current configuration to NVRAM.165. Serial0/0/1 192.4.0. R2#show ip route <Output omitted> 172.168. 3 subnets 172. Then use show ip protocols to verify the RIP configuration.1. FastEthernet0/0 Step 2: Verify that all necessary interfaces are active.2.4.2.1. R2(config)#router rip R2(config-router)#network 172.0/24 [120/1] via 172.2. 00:00:22.30.4.8 is directly connected.

which consists of the R1 and R2 routers using the 172.2 on Serial0/0/0 172. R3.4.0 from the RIP configuration for R2. for Scenario C.1: Basic RIP Configuration CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. Remove network 192. then it should send the packet to the ISP.255.0/16 network—in via R2 (the gateway router) and out via R3 (the ISP).30. It makes more sense for R3 to have a static route configured for the 172. colleges with multiple campuses often run a dynamic routing protocol between campuses but use default routing to the ISP for access to the Internet.0.30. To keep our example simple.0 from the RIP configuration for R2.30. choosing to use dynamic routing only locally. For example.0 network every 30 seconds. Scenario C is a typical configuration for most companies connecting a stub network to a central headquarters router or an ISP. because R3 has no other way to get to 172.168. meaning that there is only one way in and one way out of the 172. subnetted with a /24 mask.000 summarized Internet routes to R2. Notice that RIP updates are not sent out of the fa0/0 interface because of the passive-interface fastethernet 0/0 command.1: Basic RIP Configuration Step 3: View the RIP messages being sent and received.0 network to R2.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5.3. They should send all traffic not destined for the 172. Step 1: Remove network 192. R1#undebug all All possible debugging has been turned off Background In this scenario we will modify Scenario B to only run RIP between R1 and R2. All R2 needs to know is that if a packet is not destined for a host on the 172. R2 would then forward the traffic to R3. This is the same for all other Company XYZ routers (only R1 in our case).30.hr Page 48 of 161 .168.6.2. How about traffic from Company XYZ toward the Internet? It makes no sense for R3 to send over 120.0 network. Company XYZ is a stub network.30.0/16 major network.168.0.0 network to R1.hr Page 47 of 161 www.0.edunet. To view the RIP messages being sent and received use the debug ip rip command.4.4. R2(config)#router rip R2(config-router)#no network 192.30.0.1) RIP: build update entries network 172.255 via Serial0/0/0 (172. R1#debug ip rip R1#RIP: sending v1 update to 255.0 except through R2.4.edunet.1. remote campuses may even use default routing to the main campus. a company runs a dynamic routing protocol (RIPv1 in our case) within the local network but finds it unnecessary to run a dynamic routing protocol between the company’s gateway router and the ISP.168.0.6. Let’s assume that R3 is the ISP for our Company XYZ.0. because no updates will be sent between R2 and R3 and we don’t want to advertise the 192.0/16 network pointing to R2.30. Task 1: Make Changes between Scenario B and Scenario C.0.255.30.2. we left the addressing intact from Scenario B. In some cases.30. Typically.30.30.0 metric 1 RIP: received v1 update from 172.0 www. It doesn’t make sense for R2 to send R3 RIP updates for the 172.0 in 1 hops Scenario C: Running RIPv1 on a Stub Network Topology Diagram Step 4: Discontinue the debug output with the undebug all command.

Serial0/0/0 Page 49 of 161 C C R Notice that RIP is not being used on R3.edunet.0/16 network. IA .0.2. N2 .3.2.30.IGRP.IS-IS level-1. E .0 172. 00:00:19. 00:00:05.30. S .168.252. R .candidate default. L1 .RIP.candidate default.2.0.RIP.168.30.IS-IS level-1. Step 1: Configure R2 to send default traffic to R3. 00:00:16.0.0. B .0 172.4. FastEthernet0/0 Task 4: Verify RIP Routing.2 on Serial0/0/0 0.OSPF. N2 .4. we need to configure a static route on R3 for the 172. U . The default-information originate command is used to configure R2 to include the default static route with its RIP updates.0. Serial0/0/0 is directly connected.255. Serial0/0/1 0.255. Step 3: Discontinue the debug output with the undebug all command. FastEthernet0/0 0.periodic downloaded static route Gateway of last resort is 0. R1#undebug all All possible debugging has been turned off Step 4: Use the show ip route command to view the routing table on R3. R1 will now send default traffic to the Gateway of last resort at 172.0/0 is directly connected.IS-IS inter area * .30. Sometimes this does not work with RIP. R2(config)# ip route 0.0.1. L2 .3.hr Page 50 of 161 .IGRP. Serial0/0/1 Task 2: Configure the Static Route on R3 for the 172. Serial0/0/0 172.periodic downloaded static route Gateway of last resort is 172.static. U .0 0. R1#show ip route Codes: C .30.3.IS-IS.1: Basic RIP Configuration Step 2: Completely remove RIP routing from R3.30. Serial0/0/0 Task 3: Configure a Default Static Route on R2.0.0/24 is directly connected.BGP D .0. O . R2#show ip route Codes: C . R3(config)#ip route 172.1.2.0.168.ODR P .0. M .IS-IS inter area * . This will send all 172.1.IS-IS level-2. Step 2: View the RIP updates that are sent and received on R1 with the debug ip rip command.0. EX . The only route that is not directly connected is the static route. Serial0/0/1 192.2. 1 subnets 192.6. IA .0.2. EX .30.BGP D .0 172.30. O . L2 .OSPF external type 1.2.0.EGP i .0. E . www. This command will cause the routers to immediately flush routes in the routing table and request updates from each other.0/0 [120/1] via 172. M .mobile.168. 3 subnets is directly connected.OSPF NSSA external type 1. try the command clear ip route * on both R1 and R2.0 metric 1 RIP: received v1 update from 172. Serial0/0/1 192.OSPF. save the configuration on R1 and R2 and then reload both routers.OSPF external type 2.0 172.ODR P .per-user static route. Step 1: Use the show ip route command to view the routing table on R2 and R1. L1 .0 is directly connected.0 255. S .0/24 172.0/16 is directly connected.mobile. E2 .0 serial 0/0/1 Step 2: Configure R2 to send default static route information to R1.2. First. o .0 [120/1] via 172.5.edunet.0. R2(config)#router rip R2(config-router)#default-information originate R2(config-router)# Note: Sometimes it is necessary to clear the RIP routing process before the default-information originate command will work.30. I . If the default route information is still not sent to R1.0.2 to network 0.4.0/24 is subnetted.IS-IS level-2.1.2.1) RIP: build update entries network 172. 1 subnets 192.connected.EIGRP external.30.30. E2 .EIGRP. R3#show ip route <Output omitted> S C C 172. ia . B .0.30. Because R3 and R2 are not exchanging RIP updates. which is the IP address of R2.4.static.30. Doing this will reset the hardware and both routers will restart the RIP routing process.0.EGP i .0.0 is subnetted.30.168.30.2. R3(config)#no router rip C S* 192.OSPF NSSA external type 2 E1 .255.30. Configure a default static route on R2 that will send all default traffic—packets with destination IP addresses that do not match a specific route in the routing table—to R3. The route is the “quad-zero” default route sent by R2.OSPF external type 1. Configure this command on R2 so that the default static route information is sent to R1.2.8 is directly connected.30.OSPF NSSA external type 2 E1 . ia .OSPF external type 2.0/16 traffic to R2.2.OSPF inter area N1 .0 serial0/0/1 Notice that R2 now has a static route tagged as a candidate default. 3 subnets 172.0.0 to network 0.0/30 is subnetted.0 is directly connected.30.EIGRP.0/30 is subnetted.0/16 network.1: Basic RIP Configuration CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5.EIGRP external.255 via Serial0/0/0 (172.0 in 1 hops 172.30.6.30.OSPF NSSA external type 1.0.30.per-user static route.OSPF inter area N1 .0.IS-IS.hr www. I . FastEthernet0/0 [120/1] via 172.0 in 1 hops Notice that R1 is receiving the default route from R2. R . Serial0/0/0 172.30.connected.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. R1#debug ip rip RIP protocol debugging is on R1#RIP: sending v1 update to 255. o . C R C R* Notice that R1 now has a RIP route tagged as a candidate default route.8 is directly connected.0.

1: Basic RIP Configuration Task 5: Document the Router Configurations On each router.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. reconnect the appropriate cabling and restore the TCP/IP settings. Page 52 of 161 . Addressing Table Device BRANCH Interface Fa0/0 S0/0/0 Fa0/0 HQ S0/0/0 S0/0/1 ISP PC1 PC2 PC3 Fa0/0 S0/0/1 NIC NIC NIC IP Address Subnet Mask Default Gateway N/A N/A N/A N/A N/A N/A N/A Learning Objectives Upon completion of this lab.2: Challenge RIP Configuration Topology Diagram Task 6: Clean Up Erase the configurations and reload the routers.edunet. capture the following command output to a text file and save for future reference: • • • • Running configuration Routing table Interface summarization Output from show ip protocols Lab 5. www.6. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet).6. Disconnect and store the cabling. Inc. Assign appropriate addresses to interfaces and document them in the Addressing Table. All rights reserved. you will be able to: • • Subnet an address space given requirements. This document is Cisco Public Information.hr Page 51 of 161 All contents are Copyright © 1992–2007 Cisco Systems.

200. www.224/27 network to the WAN interface of the ISP router. Step 1: Assign appropriate addresses to the device interfaces.0 network to the WAN link between the HQ and BRANCH routers. 3.hr Page 54 of 161 . Configure an EXEC mode password. or 2600 routers. Assign the first valid host address in the HQ LAN network to the LAN interface of the HQ router. The 192. Test and verify full connectivity. 4.0/24 network must be subnetted for use in the HQ LAN and the link between the HQ and BRANCH routers. Task 1: Subnet the Address Space.200.165. Configure a password for console connections.168.1. 6. The link between the ISP router and the HQ router will use the 209. Task 3: Prepare the Network. 4. 6. Assign the first valid host address in the 10. Scenario In this lab activity. 2. Disable DNS lookup.165. 7. Configure an EXEC timeout of 15 minutes. Step 1: Cable a network that is similar to the one in the Topology Diagram. 8. and ISP routers with the IP addresses from the Addressing Table provided under the Topology Diagram. HQ. Assign the first valid host address in the 209.2. Step 2: Document the addresses to be used in the table provided under the Topology Diagram. Assign the first valid host address in the 209. Assign the last valid host address in the HQ/BRANCH WAN link to the Serial 0/0/0 interface of the BRANCH router.224/27 network to the Serial 0/0/1 interface of the HQ router. 5. Task 4: Perform Basic Router Configurations. Assign the last valid host address in the HQ LAN network to PC 2.165.2. Step 2: Consider the following questions when creating your network design: How many subnets need to be created from the 192.128/27 network to PC3. Synchronize unsolicited messages and debug output with solicited output and prompts for the console and virtual terminal lines.202. Verify RIPv1 operation.1.10.2: Challenge RIP Configuration CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5.1. and ISP routers. 1.0/23 network to the LAN interface on the BRANCH router.128/27 network. Task 5: Configure and Activate Serial and Ethernet Addresses. Step 1: Configure the BRANCH. Configure a password for VTY connections. 2500.2.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. 2. Perform basic configuration in the BRANCH. 1.0/24 network? __________ What is the subnet mask for this network in dotted decimal format? ___________________________ What is the subnet mask for the network in slash format? __________ What are the network addresses of the subnets? Subnet 0: __________________________ Subnet 1: __________________________ Subnet 2: __________________________ How many usable host IP addresses are there per subnet? ___________ How many usable hosts IP addresses are available in the BRANCH LAN? ____________ Step 3: Assign subnetwork addresses to the Topology Diagram.165. Configure and propagate a static default route. Assign the first valid host address in the HQ/BRANCH WAN link to the Serial 0/0/0 interface of the HQ router.165. Note: If you use 1700. You can use any current router in your lab as long as it has the required interfaces shown in the topology.0 network to the LAN attached to the HQ router. 10.edunet. Step 1: Examine the network requirements.165. 9. Reflect upon and document the network implementation. Assign the last valid host address in the 209. 7.10.10.6. www.edunet. 3. Configure the router hostname. and ISP routers according to the following guidelines: 1. Assign the last valid host address in the 209. you will be given a network address that must be subnetted to complete the addressing of the network shown in the Topology Diagram. the router outputs and interface descriptions will appear different. Configure RIPv1 routing on all routers. HQ.128/27 network to the LAN interface on the ISP router. Configure a message-of-the-day banner. Assign subnet 1 in the 192.6.168. 8. Step 2: Clear any existing configurations on the routers.168. Erase the startup configuration and reload a router to the default state. Assign subnet 2 in the 192. 2. A combination of RIPv1 and static routing will be required so that hosts on networks that are not directly connected will be able to communicate with each other. Task 2: Determine Interface Addresses.202. The HQ LAN will require 50 host IP addresses.1.224/30 network.2: Challenge RIP Configuration • • • • • • • Cable a network according to the Topology Diagram.200. 5. Assign the last valid host address in the 10.hr Page 53 of 161 Configure the interfaces on the BRANCH. The addressing for the network has the following requirements: • • • • The ISP LAN will use the 209. The BRANCH LAN will use the 10.0/23 network to PC1. HQ.202.0/23 network.168.

You should not have connectivity between end devices yet. Refer to the basic troubleshooting techniques used in the Chapter 1 labs. PC2. What networks are currently present in the BRANCH routing table before RIP is configured? List the networks with slash notation. However. ____________________________________________________________________________ www.edunet.6.hr Page 55 of 161 What routes are present in the routing table of the BRANCH router? ____________________________________________________________________________ ____________________________________________________________________________ www.6. HQ LAN.2: Challenge RIP Configuration When you have finished. Task 7: Configure RIP Routing on the BRANCH Router. is it possible to ping PC3? __________ The answer to the above questions should be yes. Task 8: Configure RIP and Static Routing on the HQ Router Consider the type of static routing that is needed on HQ.2: Challenge RIP Configuration CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. check your physical connections and configurations. and PC3.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5.edunet. From PC2. What networks are present in the HQ routing table? List the networks with slash notation. Verify that BRANCH can ping across the WAN link to HQ and that HQ can ping across the WAN link it shares with ISP. and PC3 can ping their respective default gateways. What are the commands that will need to be configured on the ISP router to accomplish this? ISP(config)# ___________________________________________________________________ Task 10: Verify the Configurations Answer the following questions to verify that the network is operating as expected. and PC3 with the IP addresses from the Addressing Table provided under the Topology Diagram. Consider the networks that need to be included in the RIP updates that are sent out by the BRANCH router. Step 2: Verify Ethernet interface connectivity. be sure to save the running configuration to the NVRAM of the router. What command is needed to accomplish this? Use the appropriate exit interface on the HQ router in the command. Step 1: Verify BRANCH connectivity. ____________________________________________________________________________ What commands are required to enable RIPv1 and include the LAN network in the routing updates? ____________________________________________________________________________ ____________________________________________________________________________ Are there any router interfaces that do not need to have RIP updates sent out? ___________ What command is used to disable RIP updates on this interface? Task 6: Verify Connectivity to Next-Hop Device. If any of the above pings failed. PC2. is it possible to ping PC1? __________ From PC2. PC2. is it possible to ping PC3? __________ From PC1. and the link between the BRANCH and HQ routers. ____________________________________________________________________________ _____________________________________________________________________________ A static default route will need to be configured to send all packets with destination addresses that are not in the routing table to the ISP router. you can test connectivity between two routers and between an end device and its default gateway. Step 2: Configure the Ethernet interfaces of PC1.hr Page 56 of 161 . ____________________________________________________________________________ ____________________________________________________________________________ The HQ router needs to send the default route information to the BRANCH router in the RIP updates. What command is used to configure this? ____________________________________________________________________________ Task 9: Configure Static Routing on the ISP Router ____________________________________________________________________________ ____________________________________________________________________________ What commands are required to enable RIP version 1 and include these networks in the routing updates? ____________________________________________________________________________ ISP(config)#____________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ Are there any router interfaces that do not need to have RIP updates sent out? _____________ What command is used to disable RIP updates on this interface? ____________________________________________________________________________ Static routes will need to be configured on the ISP router for all traffic that is destined for the RFC 1918 addresses that are used on the BRANCH LAN. Verify that PC1. Configure the Ethernet interfaces of PC1.

reconnect the appropriate cabling and restore the TCP/IP settings.edunet. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet). are present in the RIP updates sent from the HQ router? ____________________________________________________________________________ ____________________________________________________________________________ What networks. including the metric. www.hr Page 57 of 161 www.2: Challenge RIP Configuration CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. are present in the RIP updates sent from the BRANCH router? ____________________________________________________________________________ ____________________________________________________________________________ On each router. capture the following command output to a text file and save for future reference: • • • Running configuration Routing table Interface summarization Task 13: Clean Up Erase the configurations and reload the routers. Disconnect and store the cabling.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5.2: Challenge RIP Configuration ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ Task 11: Reflection If static routing were used instead of RIP on the BRANCH router.6.hr Page 58 of 161 .6. how many individual static routes would be needed for hosts on the BRANCH LAN to communicate with all of the networks in the Topology Diagram? ______________ Task 12: Document the Router Configurations What is the gateway of last resort in the routing table of the BRANCH router? ____________________________________________________________________________ What routes are present in the routing table of the HQ router? ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ What networks are present in the routing table of the ISP router? ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ ____________________________________________________________________________ _____________________________________________________________________________ What networks. including the metric.edunet.

CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5. Answer no if asked to save changes. RIP updates must be disabled on the BRANCH and HQ LAN interfaces. Lab 5.255.0 255. These scripts contain errors that will prevent end-to-end communication across the network.1.0 255.0 255. RIPv1 routing is configured on the HQ router.hr Page 59 of 161 . Propose solutions to network errors.3: RIP Troubleshooting • • Discover where convergence is not complete.255.1.0 255.255.255.16.1.1. you will begin by loading configuration scripts on each of the routers. Erase. Step 2: Clear the configuration on each router. Task 2: Load Routers with the Supplied Scripts.2.255.1 Task 1: Cable.20.45.255. Cable a network that is similar to the one in the Topology Diagram.45.0 255.168.0 255.edunet.255. Static routes for all HQ and BRANCH networks are to be configured on the ISP router.16.16.255.0 Default Gateway N/A N/A N/A N/A N/A N/A N/A 192.168. Step 1: Cable a network.255. Clear the configuration on each of routers using the erase startup-config command and then reload the routers.255.1 10. Implement solutions to network errors.168.1 172.6.0 255.20.255. www.255. Analyze information to determine why convergence is not complete.255. Load the routers with supplied scripts.1 192. Erase the startup configuration and reload a router to the default state. Static default route is configured on the HQ router and shared with the BRANCH router via RIP updates. When you have corrected all of the configuration errors.1. This document is Cisco Public Information.255. Step 1: Load the following script onto the BRANCH router.45. you will be able to: • • • Cable a network according to the Topology Diagram.1.254 255.1.1.3: RIP Troubleshooting Topology Diagram • • • • Scenario In this lab.255. all of the hosts on the network should be able to communicate with each other. Document the corrected network.255.1 10.1. and Reload the Routers.45. Gather information about the non-converged portion of the network along with any other errors.0 255.255.254 10.6.254 172. The network should also have the following requirements met: • • • • • RIPv1 routing is configured on the BRANCH router.168.254 10. hostname BRANCH ! no ip domain-lookup ! interface FastEthernet0/0 ip address 192.1 255.2. The routes must be summarized wherever possible.255.255. Page 60 of 161 Learning Objectives Upon completion of this lab.255.1 10.0 clock rate 64000 no shutdown ! router rip All contents are Copyright © 1992–2007 Cisco Systems.1.1 172. All rights reserved.20.255.254 172.0 duplex auto speed auto ! interface Serial0/0/0 ip address 10. You will need to troubleshoot each router to determine the configuration errors and then use the appropriate commands to correct the configurations.255.255. Addressing Table Device BRANCH Interface Fa0/0 S0/0/0 Fa0/0 HQ S0/0/0 S0/0/1 ISP PC1 PC2 PC3 FA0/0 S0/0/1 NIC NIC NIC IP Address 192.254 Subnet Mask 255.0 255.1 172.45.20. Inc.2.255.45.

___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ All contents are Copyright © 1992–2007 Cisco Systems.255. hostname HQ ! no ip domain-lookup ! interface FastEthernet0/0 ip address 10.255.255.1 255. hostname ISP ! no ip domain-lookup ! interface FastEthernet0/0 ip address 172.255.CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5.0 255.0.255.16. Page 62 of 161 . All rights reserved. This document is Cisco Public Information. Inc.0 no shutdown ! interface Serial0/0/1 ip address 172.1.20.1 255.0.0. All rights reserved.1.1.255.255.0 network 172.255.6.0 no shutdown ! ip route 10.45.254.168.0 0.0 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 10. Use the space below to write a brief description of the errors that you found.45.6.255.254 255.255.1. Page 61 of 161 no shutdown ! interface Serial0/0/1 ip address 172.0 Serial0/0/1 ! line con 0 line vty 0 4 password cisco login ! end Step 3: Load the following script onto the ISP router.2. Inc.0.0 ! ip route 0.0.20.1 255.255.0 ! line con 0 line vty 0 4 password cisco login ! end Step 2: Load the following script onto the HQ router.0 255.1 255. • • • • show running-config show ip route show ip interface brief show ip protocols Task 4: Reflection There were a number of configuration errors in the scripts that were provided for this lab.3: RIP Troubleshooting CCNA Exploration Routing Protocols and Concepts: RIP version 1 Lab 5.0.0 clock rate 64000 no shutdown ! router rip passive-interface Serial0/0/0 network 10.0.0 duplex auto speed auto All contents are Copyright © 1992–2007 Cisco Systems.0.20. This document is Cisco Public Information.0 Serial0/0/1 ! line con 0 line vty 0 4 password cisco login ! end Task 3: Troubleshooting Use this commands to find configuration errors in the scripts that were provided for this lab.255.0.45.20.255.0.0 Serial0/0/1 ip route 192.3: RIP Troubleshooting passive-interface FastEthernet0/0 network 10.

255. Examine the automatic summarization of routes.100.0 duplex auto speed auto no shutdown ! interface FastEthernet0/1 ip address 172. ! hostname R1 ! ! ! interface FastEthernet0/0 ip address 172.10 10.1 172.2.0 255.10 172.255.0 255.0 Default Gateway N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 172.1 255.255.17 172.200. and Reload the Routers.edunet.165.255.0 255.255.30. you will be able to: • • • • • • • • • • Cable a network according to the Topology Diagram.1: RIPv2 Basic Configuration Lab Learning Objectives Lab 7.255. Disable automatic summarization.1 172. This can be an issue when the routing protocol used does not include enough information to distinguish the individual subnets.200.30. IP Address 172.240 255.0.10 Subnet Mask 255.200. 172.1 209.30.200. Page 64 of 161 www. Scenario The network shown in the Topology Diagram contains a discontiguous network. Step 2: Clear the configuration on each router.0.30.hr Page 63 of 161 .200. Document the RIPv2 configuration.255.255.233 172.30.255.200. All rights reserved.165.229 209.255.255.1: RIPv2 Basic Configuration Lab Topology Diagram Upon completion of this lab.255.2.30.1 Addressing Table Device Interface Fa0/0 R1 Fa0/1 S0/0/0 Fa0/0 R2 S0/0/0 S0/0/1 Fa0/0 S0/0/1 R3 Lo0 Lo1 Lo2 PC1 PC2 PC3 PC4 NIC NIC NIC NIC Task 1: Cable.165.200.255.230 10.255.33 172.30.240 255. Load provided scripts onto the routers.110. Examine the current status of the network.1 10.255. Step 1: Load the following script onto R1.228/30 and 209.30. This document is Cisco Public Information.30.1 255.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.252 255.255.30. in this case the two serial networks 209.255.30.255.255.1 209.255.10 172.1.255.0.165.0.5.232/30.1 172.0 255.0 subnets are physically and logically divided by at least one other classful or major network.5.255.0 255.252 255.2.234 172.0.1.100. Examine routing updates with debug ip rip.0.255.0.1. Configure RIPv2 on all routers.1. Verify network connectivity. This will allow VLSM subnet information to be propagated throughout the network.255.0.1 172.30.100.1 209.1.0 255.200. Clear the configuration on each of routers using the erase startup-config command and then reload the routers. Examine the routing tables.165.255.30. This network has been subnetted using VLSM. Inc.0 255.255. Cable a network that is similar to the one in the Topology Diagram.1.30.2. Step 1: Cable a network. RIPv2 is a classless routing protocol that can be used to provide subnet mask information in the routing updates.255. Task 2: Load Routers with the Supplied Scripts.0 duplex auto All contents are Copyright © 1992–2007 Cisco Systems.1.255.255. The 172.252 255.0 255. Answer no if asked to save changes.252 255.255.255.255.30. Erase.30.165.

how many ICMP messages are successful when pinging PC1? _______________________________________________________________________ Step 3: Load the following script onto R3.255.255.255. From the R2 router.229 Serial0/0/1 209.0 ! line con 0 line vty 0 4 login ! end Task 3: Examine the Current Status of the Network.165.0.200.255.233 255.165.30. This document is Cisco Public Information.200.1 FastEthernet0/1 unassigned Serial0/0/0 209.255.0 network 209.200.0 ! interface Loopback1 ip address 172.1: RIPv2 Basic Configuration Lab CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.165. From the R2 router.240 ! router rip passive-interface FastEthernet0/0 network 172.165.30.200.165.30.0 ! line con 0 line vty 0 4 login ! end Step 2: Load the following script onto R2.255.0.0 network 209.252 no shutdown ! interface Loopback0 ip address 172.240 ! interface Loopback2 ip address 172.100.229 255.255.252 no shutdown ! interface Serial0/0/1 ip address 209.165.0.255.234 255.255.1 255. Page 65 of 161 All contents are Copyright © 1992–2007 Cisco Systems.200.255.255.255.0 ! line con 0 line vty 0 4 login ! end hostname R3 ! ! ! interface FastEthernet0/0 ip address 172.1.165. how many ICMP messages are successful when pinging PC4? ______________________________________________________________________ All contents are Copyright © 1992–2007 Cisco Systems.233 Vlan1 unassigned OK? YES YES YES YES YES Method manual manual manual manual manual Status Protocol up up administratively down down up up up up administratively down down Step 2: Check the connectivity from R2 to the hosts on the R1 and R3 LANs.0 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 209.230 255.0.5.200. Step 1: Verify that both serial links are up.17 255.1.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.1: RIPv2 Basic Configuration Lab speed auto no shutdown ! interface Serial0/0/0 ip address 209.1 255. This document is Cisco Public Information.0.255.0 duplex auto speed auto no shutdown ! interface Serial0/0/1 ip address 209.255.200.0 network 209. hostname R2 ! ! ! interface FastEthernet0/0 ip address 10.30. Inc. All rights reserved.200.252 clock rate 64000 no shutdown ! router rip passive-interface FastEthernet0/0 passive-interface FastEthernet0/1 network 172.0.255.33 255.200.165.255. Inc.200.1 255. The two serial links can quickly be verified using the show ip interface brief command on R2.165. All rights reserved.200. R2#show ip interface brief Interface IP-Address FastEthernet0/0 10.252 clock rate 64000 no shutdown ! router rip passive-interface FastEthernet0/0 network 10.255.110.30.30. Page 66 of 161 .0.5.

no subnet mask information is sent in the update. Page 67 of 161 All contents are Copyright © 1992–2007 Cisco Systems. Page 68 of 161 .30.165.0.0. Serial0/0/0 209.228 is directly connected. Serial0/0/1 Step 7: Examine the RIPv1 packets that are being received by R2.165.200.1.0 metric 1 network 209.234.32/28.0.16/28 is directly connected.233.0.0.0 in 1 hops RIP: received v1 update from 209. Serial0/0/0 Step 6: Examine the routing table on the R3 router. is it possible to ping PC3? __________ What is the success rate? __________ From the PC1.30.0. Inc.200.255.233.30.0. Serial0/0/1 R C C C R 10.0.232 [120/1] via 209. Serial0/0/1 209.200.165. This document is Cisco Public Information.0. All rights reserved. R1#show ip route Output omitted All contents are Copyright © 1992–2007 Cisco Systems.0 subnets are physically and logically divided by at least one other classful or major network—in this case.165.0. R2 is receiving the route 172. the router alternates the routes that are used when forwarding packets that are destined for the 172.232 is directly connected.0/30 is subnetted.234 on Serial0/0/1 172. Because the route to 172. R3#show ip route Output omitted R C C C C R C 10.165.165. and 172.0/24 is subnetted.30.165.165. there are two entries for this network in the R2 routing table.255. packets destined for the R3 LANs will not be forwarded properly.0/16.0 metric 1 network 209.30. Serial0/0/0 209. R2#show ip route Output omitted 10. R3 only shows its own subnets for 172.5.0.228 is directly connected.0.228 [120/1] via 209.200. All rights reserved.229) RIP: build update entries network 10.0 is directly connected.200. From the PC1.30.0. Both the R1 and R3 are advertising routes to the 172.200.0—it does not show any of the subnets for this network that are used on the LANs attached to R1 and R3.30.0.30.0/16 is directly connected.0. is it possible to ping PC2? __________ What is the success rate? __________ From the PC1.100/24.0 subnets on R1.30.30. Both R1 and R3 will be summarizing 172.30.229.255.165.200.165. 00:00:15. Because these are equal cost metrics.0/16 network. The 172. 2 subnets 172. 00:00:19.255 via Serial0/0/0 (209.110.0.30.2.0.0. and because R1 does not have any specific routes for the 172.30.0/24 is directly connected.30.30.200. 2 subnets 209.165.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.200.30.1: RIPv2 Basic Configuration Lab Step 3: Check the connectivity between the PCs. R1 and R3 are not receiving any information about the 172.0.0/30 is subnetted. 2 subnets 209.0/16 network.0. 00:00:02. Loopback2 209.0.200.30. therefore.165. FastEthernet0/0 172.0.30.200.5.0 in 1 hops R2 is sending only the routes for the 10.255 via Serial0/0/1 (209.110/24. Use the debug ip rip command to display RIP routing updates. with 1 hop. Inc. FastEthernet0/0 172.200. Classful routing protocols like RIPv1 summarize networks at major network boundaries.0.30.100. Both R1 and R3 are configured with interfaces on a discontiguous network.30. Serial0/0/0 172.0 is directly connected. 2 subnets 209.200.232/30. 172.200.0/8 [120/1] via 209.200.200.200.230 on Serial0/0/0 172.0/24 is directly connected.228 metric 1 RIP: sending v1 update to 255.165.0. R2#debug ip rip RIP protocol debugging is on RIP: received v1 update from 209.200. 172.0.0 subnets on R3.30.233) RIP: build update entries network 10. Because the routing metric is the same for both entries. 00:00:24.232 is directly connected.0.165. 00:00:02. Loopback0 172.165.165.228/30 and 209. Serial0/0/0 [120/1] via 209.165. is it possible to ping PC3? __________ What is the success rate? __________ Step 4: View the routing table on R2.0.30.0.0. both routes are added to the R2 routing table. Serial0/0/1 172.0/16 is subnetted.30. The R2 routing table only shows the major classful network address of 172.200. is it possible to ping PC4? __________ What is the success rate? __________ From the PC4. FastEthernet0/0 172. R3 does not have any routes for the 172.30.0.165. RIP: sending v1 update to 255. from both R1 and R3.165.232 metric 1 C R C C Step 5: Examine the routing table on the R1 router.30. 2 masks 172.0/8 [120/1] via 209.30.200.32/28 is directly connected.1. 00:00:19. Because RIPv1 is a classful routing protocol.200.0/16 [120/1] via 209.229.0/30 is subnetted.0. 1 subnets 10.0. the two serial networks 209. FastEthernet0/1 209.200.200.0 is directly connected.0. is it possible to ping PC2? __________ What is the success rate? __________ From the PC4.255.16/28.200.0/24 subnets to 172.0 LAN and the two serial connections to R1 and R3.200.230.1: RIPv2 Basic Configuration Lab CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.165.30. Loopback1 172. 4 subnets.30.200.0 subnet routes. Serial0/0/1 209.200. This document is Cisco Public Information.165.165. 172.0/16 is variably subnetted.0 network: 172.165.

Loopback0 172.200.0/24 is directly connected.200.5.234. turn off the debugging.165.200.200.200.16/28 is directly connected. R2#show ip route Output omitted Task 4: Configure RIP Version 2. R3#show ip route Output omitted R C C C C R C 10.165.30.200.0 network. 00:00:09.229.0 209. show ip protocols.1.0.32/28 is directly connected. just like RIPv1. R2 still shows two equal cost paths to the 172.165.229 120 Distance: (default is 120) C R C C 10. Inc.0 and does not show any of the subnets for this network.0/8 [120/1] via 209.0/24 is subnetted.200.233. R2#undebug all Task 5: Examine the Automatic Summarization of Routes.0. The debug ip rip.30. This document is Cisco Public Information.100.30.0. next due in 7 seconds Invalid after 180 seconds.0/16 network in the routing table.0/24 is directly connected.232 is directly connected. R1# show ip protocols Routing Protocol is "rip" Sending updates every 30 seconds.1: RIPv2 Basic Configuration Lab When you are finished.0.30.30. 2 subnets 209.200. Loopback2 209.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.1.0.0/30 is subnetted. All rights reserved.200. The output of the show ip protocols command for R1 is shown below. hold down 180. The LANs connected to R1 and R3 are still composed of discontiguous networks.232 is directly connected. FastEthernet0/0 172. 00:00:08.232 [120/1] via 209. 2 subnets 209. Serial0/0/1 209.30. except that the subnet mask is included in the update.30. Page 70 of 161 . R1 still does not have any routes for the 172.0. However.165.110.0.229. Serial0/0/1 209. FastEthernet0/0 172. 1 subnets 10. Serial0/0/0 209.165.165.230. Serial0/0/1 172.0.30.0.0.0/30 is subnetted.165. 2 masks 172.200. R2(config)#router rip R2(config-router)#version 2 R1(config)#router rip R1(config-router)#version 2 R3(config)#router rip R3(config-router)#version 2 RIPv2 messages include the subnet mask in a field in the routing updates.200.200.0/16 [120/1] via 209.233. Page 69 of 161 All contents are Copyright © 1992–2007 Cisco Systems. flushed after 240 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Redistributing: rip Default version control: send version 2.0/30 is subnetted.200.0.165.30. Step 2: Verify that RIPv2 is running on the routers.200.0 is directly connected. This allows subnets and their masks to be included in the routing updates.228 [120/1] via 209. FastEthernet0/0 172. 00:00:09.0 subnets on R3. Serial0/0/1 All contents are Copyright © 1992–2007 Cisco Systems. 00:00:16.30. Serial0/0/0 [120/1] via 209.165. 2 subnets 172. and show run commands can all be used to confirm that RIPv2 is running.30. receive 2 Interface Send Recv Triggered RIP Key-chain FastEthernet0/0 2 2 FastEthernet0/1 2 2 Serial0/0/0 2 2 Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 172.200. FastEthernet0/1 209. R2 still shows only the major classful network address of 172.0/16 is variably subnetted.0 network.228 is directly connected.0.30.165.2.30. 2 subnets 209.0.200.200. 4 subnets. Loopback1 172. Serial0/0/0 172.5. 00:00:16. R3 still does not have any routes for the 172.0. All rights reserved.0. This document is Cisco Public Information. Step 1: Use the version 2 command to enable RIP version 2 on each of the routers.0 is directly connected.30.0 Passive Interface(s): FastEthernet0/0 FastEthernet0/1 Routing Information Sources: Gateway Distance Last Update 209.0.0 subnets on R1.165. Serial0/0/1 R1 still shows only its own subnets for the 172.165.1: RIPv2 Basic Configuration Lab CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7. R1#show ip route Output omitted R C C C R 10.200.0 is directly connected. Serial0/0/0 209.30.0. Inc.165.0/8 [120/1] via 209.165.165. by default RIPv2 summarizes networks at major network boundaries.30.228 is directly connected.200.0/16 is subnetted.165. 00:00:07. Serial0/0/0 R3 still only shows its own subnets for the 172.165.

1.30.30.165. 2 subnets 209.200. Serial0/0/0 209.200.0/24 [120/2] via 209.30. 00:00:21.0. 6 subnets.0/16 is variably subnetted.0. FastEthernet0/0 172. 2 subnets.165. 2 masks 172. 00:00:21. Serial0/0/0 209. Serial0/0/0 [120/1] via 209.234.165.165.200.0/24 [120/1] via 209. 00:00:21.233. Inc.200.200.232 is directly connected. 00:00:21. 7 subnets. FastEthernet0/1 172.30.0.100. 00:02:13.200.165. Serial0/0/1 172.30.30.30. 2 masks 10.0. Page 71 of 161 All contents are Copyright © 1992–2007 Cisco Systems.200.229. FastEthernet0/0 172.165.228 is directly connected. Serial0/0/1 172. R2(config)#router rip R2(config-router)#no auto-summary R1(config)#router rip R1(config-router)#no auto-summary R3(config)#router rip R3(config-router)#no auto-summary The show ip route and ping commands can be used to verify that automatic summarization is off.165. 00:00:08.200. The no auto-summary command is used to turn off automatic summarization in RIPv2.30.0 subnets—only the summarized route of 172.0/30 is subnetted. 00:00:08.30.30. 00:00:21. 00:00:21.200.234.0/30 is subnetted.0.0/8 is variably subnetted.165.100.230.165. Serial0/0/0 172. Serial0/0/0 10. Serial0/0/0 On R2.0/8 [120/1] via 209.0/24 is directly connected. Loopback2 209. 2 subnets 209. 00:00:08.165.1: RIPv2 Basic Configuration Lab Use the output of the debug ip rip command to answer the following questions: What entries are included in the RIP updates sent out from R3? ___________________________________ ______________________________ ______________________________ ______________________________ ______________________________ R R R R R C C 172.165.165.30.1.110.165. All rights reserved.165.0.0/24 is directly connected.200.232 is directly connected.200.230.0.1.165.228 is directly connected.2. Serial0/0/1 172. R R C C R R R R C R Task 6: Disable Automatic Summarization.165. Serial0/0/0 172.200.110.30. Serial0/0/1 172.30.30.16/28 is directly connected.0/16.165.0.200.30.165. Serial0/0/1 172. The LANs connected to R1 and R3 should now be included in all three routing tables. Serial0/0/1 209. 00:00:08.233.0 subnets on R3. Serial0/0/1 172.0.165. Serial0/0/1 10.2. Serial0/0/1 172.200. 2 masks 172.30.0/16 is variably subnetted.165.0/30 is subnetted. Loopback0 172.0 is directly connected.0.229. R2#show ip route Output omitted Use the output of the debug ip rip command to answer the following questions: What entries are included in the RIP updates sent out from R1? __________________________________ __________________________________ C R R 10.200. 00:00:08.200.32/28 [120/2] via 209. 2 subnets.165.5.0. Serial0/0/0 172.0.200.0/8 [120/1] via 209. Serial0/0/0 172.30.0.200.32/28 [120/1] via 209.0/24 [120/1] via 209. This document is Cisco Public Information.30.2.1.200. 6 subnets.229. Serial0/0/0 _____________________________________________ All contents are Copyright © 1992–2007 Cisco Systems.32/28 is directly connected. 2 subnets 209. Loopback1 172.200. FastEthernet0/0 172. Serial0/0/1 R R R R C C C C R C Task 7: Examine the Routing Tables.233.200.0/24 is directly connected.233. 2 masks 10.1: RIPv2 Basic Configuration Lab CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7. Page 72 of 161 .165.30.228 [120/1] via 209.0/24 [120/1] via 209.30.0/16 is variably subnetted.1.200.200.229.0/24 [120/2] via 209.200.230. 00:00:08. 3 masks 172. 00:00:08.200.30. R3#show ip route Output omitted 10.16/28 [120/2] via 209.229.0.0. Inc. 00:00:08.16/28 [120/1] via 209.200.200.165.165.0/16 [120/1] via 209. 00:00:08. The routers will no longer summarize routes at major network boundaries. Serial0/0/0 172.200.200.200.0/24 [120/1] via 209. 1 subnets 10.229.200.232 [120/1] via 209.234.0/24 is directly connected. All rights reserved.110.200.0/16 [120/1] via 209.0/16 [120/1] via 209.165.200.165. 00:02:28.0. Serial0/0/0 209.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.234.0/24 [120/2] via 209.30.234.233. 00:01:28.0/8 is variably subnetted. Serial0/0/1 209.100.200. 00:01:56. what routes are in the RIP updates that are received from R3? __________________________________ _____________________________________________ _____________________________________________ R3 is not sending any of the 172.0.0/24 [120/2] via 209.0.0. Serial0/0/1R2# R1#show ip route Output omitted 10.165.30.200.30.0/16 is subnetted. including the subnet mask. This document is Cisco Public Information.165. Disable auto summarization on all routers.229.30.165. 00:00:08.1.0.5. This is why R2 and R1 are not seeing the 172.

what routes are in the RIP updates that are received from R1? __________________________________ __________________________________ _____________________________________________ Are the subnet masks now included in the routing updates? __________ Task 10: Clean Up Erase the configurations and reload the routers. Disconnect and store the cabling. is it possible to ping PC2? __________ What is the success rate? __________ From PC4. is it possible to ping PC3? __________ What is the success rate? __________ Task 9: Documentation On each router. Task 8: Verify Network Connectivity. • • • • show running-config show ip route show ip interface brief show ip protocols If you need to review the procedures for capturing command output. is it possible to ping PC2? __________ What is the success rate? __________ From PC1. From PC1.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7. how many ICMP messages are successful when pinging PC4? ______________________________________________________ Step 2: Check the connectivity between the PCs. is it possible to ping PC3? __________ What is the success rate? __________ From PC1.5. is it possible to ping PC4? __________ What is the success rate? __________ From PC4.1: RIPv2 Basic Configuration Lab CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7. This document is Cisco Public Information.5. All rights reserved.1. Inc. Page 74 of 161 . how many ICMP messages are successful when pinging PC1? _____________________________________________________ From R2. reconnect the appropriate cabling and restore the TCP/IP settings. Page 73 of 161 All contents are Copyright © 1992–2007 Cisco Systems.txt) file and save for future reference. All rights reserved. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet). All contents are Copyright © 1992–2007 Cisco Systems. This document is Cisco Public Information.1: RIPv2 Basic Configuration Lab On R2.5. refer to Lab 1. From R2. Inc. capture the following command output to a text (. Step 1: Check connectivity between R2 router and PCs.

129 209. Cable a network that is similar to the one in the Topology Diagram.128 255.252 255.16. Erase.255.165.1 192. Task 2: Load Routers with the Supplied Scripts Step 1: Load the following script onto the BRANCH1 router: All contents are Copyright © 1992–2007 Cisco Systems.5.200.1. RIP updates must be disabled on the BRANCH1.168.1.128 255.255.4.255.255. • • IP Address 192.255.252 255.129 172.2.0 duplex auto speed auto no shutdown ! interface FastEthernet0/1 www.255.1 192.128 255.16.255.2.255.1 172.16.1 192. Scenario In this lab.255.200.255.128 Default Gateway N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 172.129 209.192 255.165.1.165. Propose solutions to network errors.10 192.1 172.10 172.255.225 209.254.16. you will be able to: • • • • • • • • Cable a network according to the Topology Diagram. and then use the appropriate commands to correct the configurations. This document is Cisco Public Information.255.3: RIPv2 Troubleshooting Lab Topology Diagram Upon completion of this lab. you will begin by loading configuration scripts on each of the routers.edunet.255.230 172.4.255. Document the corrected network.192 255. BRANCH2.200.1.255.255. Gather information about the non-converged portion of the network along with any other errors.16.0.168.255.168.16.1 172.1.0 255. RIPv2 routing is configured on the HQ router.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.255. Erase the startup configuration and reload a router to the default state.16.226 172. Implement solutions to network errors.3: RIPv2 Troubleshooting Lab Learning Objectives Lab 7.255.4. Clear the configuration on each of the routers using the erase startup-config command and then reload the routers. The network should also have the following requirements met:.0.129 hostname BRANCH1 ! ! ! interface FastEthernet0/0 ip address 172. Inc.0.255.16.176. Page 75 of 161 .1 255.0 255.255. all of the hosts on the network should be able to communicate with each other.128 255. These scripts contain errors that will prevent end-to-end communication across the network.hr Page 76 of 161 Addressing Table Device Interface Fa0/0 HQ Fa0/1 S0/0/0 S0/0/1 Fa0/0 BRANCH1 Fa0/1 S0/0/0 Fa0/0 BRANCH2 Fa0/1 S0/0/1 PC1 PC2 PC3 PC4 PC5 PC6 NIC NIC NIC NIC NIC NIC • Task 1: Cable. You will need to troubleshoot each router to determine the configuration errors.0 255.138 172. Step 2: Clear the configuration on each router.0.2.10 192.254.255. Load the routers with supplied scripts.200.255.16. When you have corrected all of the configuration errors.255. • RIPv2 routing is configured on the BRANCH1 router.255.229 172.168. and HQ LAN interfaces.1 209.255.255. All rights reserved.252 255.254.5. Answer no if asked to save changes.10 172.254.4.168.255.252 255.1 172. and Reload the Routers. Analyze information to determine why convergence is not complete.138 Subnet Mask 255. RIPv2 routing is configured on the BRANCH2 router.1.16.4.254.128 255.0 255.16.16. Step 1: Cable a network.255.165.168.4.

128 duplex auto speed auto no shutdown ! interface FastEthernet0/1 ip address 192.255.1.1.165.200.2.168.255.4.165.hr Page 78 of 161 .128 duplex auto speed auto no shutdown ! interface Serial0/0/1 ip address 209.200.4.255.16.0.255. hostname HQ ! ! ! interface FastEthernet0/0 ip address 192.hr Page 77 of 161 www.200.252 no shutdown ! router rip version 2 passive-interface FastEthernet0/0 passive-interface FastEthernet0/1 network 209.255.255.165.255.0 network 209.1 255.165.1.16.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.225 255.0 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 209.168.168. hostname BRANCH2 ! ! ! interface FastEthernet0/0 ip address 172.165.1 255.255.5.edunet.255.0 ! www.255.255.230 255.1 255.edunet.165.255.128 duplex auto speed auto no shutdown ! interface FastEthernet0/1 ip address 172.252 no shutdown ! router rip version 2 passive-interface FastEthernet0/0 passive-interface FastEthernet0/1 network 192.226 255.0 ! ip classless ! ! ! ! line con 0 line vty 0 4 login ! ! end ip classless ! ! ! line con 0 line vty 0 4 login ! ! end Step 3: Load the following script onto the HQ router.5.3: RIPv2 Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.254.200.129 255.3: RIPv2 Troubleshooting Lab ip address 172.229 255.16.0 ! ip classless ! ! ! line con 0 line vty 0 4 login ! ! end Step 2: Load the following script onto the BRANCH2 router.252 clock rate 64000 no shutdown ! router rip passive-interface FastEthernet0/0 passive-interface FastEthernet0/1 network 172.255.255.255.0 network 209.200.252 no shutdown ! interface Serial0/0/1 ip address 209.16.255.255.129 255.165.192 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 209.200.200.

1.0 N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 172.252 255. Page 80 of 161 .2.255. Use the space below to write a brief description of the errors that you found.1 192.CCNA Exploration Routing Protocols and Concepts: RIPv2 Lab 7.edunet. Inc.252 255.16.10.255.1.255.255.1 172.0 255.168.255.255.2 192.255.168.3: RIPv2 Troubleshooting Lab Task 3: Troubleshooting Use this commands to find configuration errors in the scripts that were provided for this lab.16.2.1.10 255.0 255.5 172.16.1 192.252 255.255.255.1.255.10 172.1.255.10.0 255.255.hr Page 79 of 161 All contents are Copyright © 1992–2007 Cisco Systems. All rights reserved.10.168. • • • • show running-config show ip route show ip interface brief show ip protocols Lab 9.10.16. This document is Cisco Public Information.3. ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ Fa0/0 ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ R2 R1 S0/0/0 S0/0/1 Fa0/0 S0/0/0 S0/0/1 Lo1 Fa0/0 R3 S0/0/0 S0/0/1 PC1 PC2 PC3 NIC NIC NIC 172.255.16.3.252 255.1 172.0 255.0 255.9 10.1 192.255.255.255.16.252 255.10 192.252 255.10 172.1 Addressing Table Device Interface IP Address Subnet Mask Default Gateway www.168.255.255.1.1 172.255.255.5.1 192.6 192.16.255.1.2.255.255.1.255.168.255.255.252 255.16.168.1: Basic EIGRP Configuration Lab Topology Diagram Task 4: Reflection There were a number of configuration errors in the scripts that were provided for this lab.168.6.

168. Use the router eigrp command in global configuration mode to enable EIGRP on the R1 router. Step 3: Configure the router to advertise the 192. Step 2: Clear any existing configurations on the routers.0 R1(config-router)# The router will begin to send EIGRP update messages out each interface belonging to the 172.edunet. configure the classful network 172. Task 2: Perform Basic Router Configurations. and R3 routers with the IP addresses from the table under the Topology Diagram. Enter a process ID of 1 for the autonomous-system parameter.0. where all traffic that is not destined for the local network will be sent. Perform basic configuration of the R1.4 0. 0.0.0. Learning Objectives Upon completion of this lab.0 to be included in the EIGRP updates that are sent out of R1. Propagate default route to EIGRP neighbors. be sure to save the running configuration to the NVRAM of the router. R1(config)#router eigrp 1 R1(config-router)# Step 2: Configure classful network 172.255.10. PC2. R1(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R1# Task 3: Configure and Activate Serial and Ethernet Addresses. Configure a message-of-the-day banner.hr Page 81 of 161 www. Step 1: Configure the interfaces on the R1. 5. Configure a static default route. Configure EIGRP routing on all routers. you will be able to: • • • • • • • • • • • Cable a network according to the Topology Diagram. 3. R2. R2. Note: Think of a wildcard mask as the inverse of a subnet mask.edunet.168.255. Perform basic configuration tasks on a router. Erase the startup configuration and reload a router to the default state. To calculate the inverse of the subnet mask. Configure the interfaces on the R1.255. Configure an EXEC mode password. This will allow VLSM subnet information to be propagated throughout the network. 0.255.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. Task 4: Configure EIGRP on the R1 Router. Step 3: Configure Ethernet interfaces of PC1. 4. www.168. Configure the Ethernet interfaces of PC1. Configure and activate interfaces.0.0. EIGRP updates will be sent out of the FastEthernet0/0 and Serial0/0/0 interfaces because they are both on subnets of the 172. The inverse of the subnet mask 255.4/30 network attached to the Serial0/0/1 interface.0 network. and R3 routers according to the following guidelines: 1.255 – 255.255: 255. Configure a password for VTY connections. Disable DNS lookup.16. Once you are in the Router EIGRP configuration sub-mode. You can use any current router in your lab as long as it has the required interfaces shown in the topology. and PC3 with the IP addresses and default gateways from the table under the Topology Diagram. Configure a password for console connections.0 classful network.1: Basic EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.0 network. and R3 routers. Verify EIGRP routing using show commands.hr Page 82 of 161 .0. EIGRP is a classless routing protocol that can be used to provide subnet mask information in the routing updates.10. A loopback address will be used on the R2 router to simulate a connection to an ISP. 3 Scenario In this lab activity.255.1: Basic EIGRP Configuration Lab Step 2: Verify IP addressing and interfaces. Use the wildcard-mask option with the network command to advertise only the subnet and not the entire 192. Task 1: Prepare the Network.0. you will learn how to configure the routing protocol EIGRP using the network shown in the Topology Diagram.16.0.255. PC2. return to privileged EXEC mode and save the current configuration to NVRAM. 6. R1(config-router)#network 172. Some segments of the network have been subnetted using VLSM. subtract the subnet mask from 255.0.10.0.6.255. Use the show ip interface brief command to verify that the IP addressing is correct and that the interfaces are active.16. Step 1: Enable EIGRP.6. Disable automatic summarization. Document the EIGRP configuration.16.252 ------------------0.252 is 0.16. and PC3. 2. Configure manual summarization.255. R2. Configure the router hostname.3. When you have finished. Step 1: Cable a network that is similar to the one in the Topology Diagram. Subtract the subnet mask Wildcard mask R1(config-router)# network 192.3 R1(config-router)# When you are finished with the EIGRP configuration for R1.

168. You should be able to see the IP address of each adjacent router and the interface that R1 uses to reach that EIGRP neighbor. DUAL sends a notification message to the console stating that a neighbor relationship with another EIGRP router has been established.10.16. such as protocol.8 0.5 (Serial0/0/0) is up: new adjacency R3(config-router)#network 192.10.1.0 R2(config-router)# %DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 172.0. Notice that the information that was configured in Task 5.3 R3(config-router)# %DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 192.10.3. Include the wildcard masks for the subnets attached to the Serial0/0/0 and Serial 0/0/1 interfaces. return to privileged EXEC mode.168. K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 1 Automatic network summarization is in effect Automatic address summarization: Maximum path: 4 Routing for Networks: 172.10.168.6.0. and networks.168.edunet.2 1 192. 1.0 classful network.16.1: Basic EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.6 R1# Ser0/0/0 Ser0/0/1 Hold Uptime (sec) 10 00:36:51 11 00:26:51 SRTT (ms) 40 40 RTO 500 500 Q Cnt 0 0 Seq Num 13 4 Step 2: View routing protocol information. Remember.16.10. Use a process ID of 1. The IP addresses of the adjacent neighbors are also shown. On the R1 router.168.10.0.0.16.10.3 R2(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R2# Step 4: Configure EIGRP on the R3 router using the router eigrp and network commands.hr Page 83 of 161 R3# Notice that when the networks for the serial links from R3 to R1 and R3 to R2 are added to the EIGRP configuration. 2.168. Step 1: Enable EIGRP routing on the R2 router using the router eigrp command.2 90 4811399 192. When you are finished. R1#show ip protocols Routing Protocol is "eigrp 1 " Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Default networks flagged in outgoing updates Default networks accepted from incoming updates EIGRP metric weight K1=1. Use a process ID of 1.0 192.0.0.168.1 (Serial0/0/0) is up: new adjacency Notice that DUAL sends a notification message to the console stating that a neighbor relationship with another EIGRP router has been established.0 R3(config-router)#network 192.168.3. R3(config)#router eigrp 1 R3(config-router)#network 192. K2=0. use the show ip eigrp neighbors command to view the neighbor table and verify that EIGRP has established an adjacency with the R2 and R3 routers.3. 3.16. use the show ip protocols command to view information about the routing protocol operation. On the R1 router.8 0.16. K4=0. 1. Step 1: View neighbors. What is the IP address of the EIGRP neighbor router? ________________________________________ What interface on the R2 router is the neighbor adjacent to? ________________________________________ Step 3: Configure the R2 router to advertise the 192. the process ID must be the same on all routers for EIGRP to establish neighbor adjacencies and share routing information. return to privileged EXEC mode.4 0.10.0. When you are finished.8/30 network attached to the Serial0/0/1 interface. is shown in the output. R1#show ip eigrp neighbors IP-EIGRP neighbors for process 1 H Address Interface 0 172. Use the wildcard-mask option with the network command to advertise only the subnet and not the entire 192.0 to include the network for the FastEthernet0/0 interface. R2(config-router)#network 172. Use the classful network address for the network attached to the FastEthernet0/0 interface. 4.3 R3(config-router)# %DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 192. process ID. K3=1. R2(config-router)#network 192.0. 2.10.6.168. R2(config)#router eigrp 1 R2(config-router)# Step 2: Use the classful address 172.10.edunet.hr Page 84 of 161 . www.9 (Serial0/0/1) is up: new adjacency R3(config-router)#end %SYS-5-CONFIG_I: Configured from console by console www.168.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.4/30 Routing Information Sources: Gateway Distance Last Update 172.168.6 90 5411677 Distance: internal 90 external 170 Notice that the output specifies the process ID used by EIGRP.1: Basic EIGRP Configuration Lab Task 5: Configure EIGRP on the R2 and R3 Routers.0. Task 6: Verify EIGRP Operation.

D C D C 172. 192. EX .1/30 MTU 1500 bytes.3.connected.1.168.9. Serial0/0/1 192.1. Because R3 is getting two equal cost routes for 172. 2 masks is a summary.16.168. ia . N2 . which is the routing algorithm used by EIGRP.16.16.0. S .10. Serial0/0/1 D C D Step 2: View the routing table on the R3 router. 3 subnets.hr Page 86 of 161 .10.0/16 is variably subnetted. FastEthernet0/0 [90/2172416] via 172. On most serial links. M .0/16 network and sending it as a single routing update.10. 4 subnets. loopback not set.OSPF inter area N1 .0/16 is a summary.OSPF NSSA external type 1.candidate default.0.16.0/24 is a summary.10.0/30 variably subnetted. The 172.edunet.8/30 [90/2681856] via 192. 01:15:35. keepalive set (10 sec) <output omitted> Step 2: Modify the bandwidth of the Serial interfaces. 01:06:07. Serial0/0/0 is directly connected.6.0.0.IS-IS inter area * .10.per-user static route.16.OSPF external type 2. R1 router: R1(config)#interface serial0/0/0 R1(config-if)#bandwidth 64 R2 router: R2(config)#interface serial0/0/0 R2(config-if)#bandwidth 64 R2(config)#interface serial0/0/1 R2(config-if)#bandwidth 1024 R3 router: R3(config)#interface serial0/0/1 R3(config-if)#bandwidth 1024 Note: The bandwidth command only modifies the bandwidth metric used by routing protocols.3.16. L2 .16. Serial0/0/1 [90/2681856] via 192.10. Step1: View the routing table on the R1 router.2. D C D C D D C D R1# Notice that the 172. L1 .168.0/24 Network is also variably subnetted and includes a Null0 route. delay. reliability.1.2. Serial0/0/0 192.10.16.16. the bandwidth will need to be changed so that the EIGRP metric can be calculated correctly. 01:16:20.168. load 1/255 Encapsulation HDLC. Because of automatic summarization.16.10.EIGRP external.0/24 172.0/16.3. 01:16:20.168.0/24 is a summary.0/24 is 192.periodic downloaded static route Gateway of last resort is not set 172.10.1: Basic EIGRP Configuration Lab Task7: Examine EIGRP Routes in the Routing Tables.2.8/30 variably subnetted.BGP D . Null0 192. Serial0/0/0 The 192.168. 01:06:07. www. the bandwidth metric will default to 1544 Kbits.168. Null0 172. Serial0/0/0 172.0. not the physical bandwidth of the link. Null0 is directly connected. and the link between R2 and R3 will be configured with a bandwidth of 1024 kbps. I .4/30 is directly connected.EGP i .2. 01:16:19. EIGRP routes are denoted in the routing table with a D.4/30 is directly connected. Notice the values that are shown for the bandwidth.168.168. U .IS-IS level-2.10. R1 and R2 are not propagating the individual subnets.OSPF.168. FastEthernet0/0 172. Serial0/0/0 192. O .0/16 from both R1 and R2. it is sent to the Null0 interface.0/24 is variably subnetted. 2 masks 192.0/30 is directly connected.168.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.10. and load.8/30 is directly connected.16. Null0 192.0.10.168.16. Also notice that EIGRP has automatically included a summary route to Null0 for the 172.10.10.0.ODR P . 01:06:07.0/24 [90/2172416] via 192.16.10. Serial0/0/1 192.0/24 is directly connected.0.0/24 [90/2172416] via 172.0.IS-IS.1: Basic EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. R1#show ip route Codes: C .10. 4 subnets.0/24 is variably subnetted. Serial0/0/1 Task 8: Configure EIGRP Metrics. If a packet destined for 172.6.edunet.16. BW 1544 Kbit. 01:06:07.0/16 is 172.0.0/24 is directly connected.168. 2 masks 192.5.16.168.6.168. R . Serial0/0/1 192. E . For this lab.0/16 172. 3 subnets. line protocol is up (connected) Hardware is HD64570 Internet address is 172. Serial0/0/1 R3#show ip route <output omitted> D C D C C R3# 172. IA . 172.6. 3 masks 172. B .0.0/16 does not match one of the level 2 child routes.0/16 [90/2172416] via 192. Step 1: View the EIGRP metric information.16.16.168. The routing table for R3 shows that both R1 and R2 are automatically summarizing the 172.4/30 192. R1#show interface serial0/0/0 Serial0/0/0 is up.1.6. Use the bandwidth command to modify the bandwidth of the Serial interfaces of each router. 01:06:18.0/16 parent network is variably subnetted with three child routes using either a /24 or /30 mask.10.EIGRP. Null0 is directly connected. 3 masks is a summary. rely 255/255.0/16 network.IGRP. Use the show ip interface command to view the EIGRP metric information for the Serial0/0/0 interface on the R1 router.0/16 route does not actually represent a path to reach the parent network. E2 .16. If this is not the actual bandwidth of the serial link.0/24 192.OSPF external type 1. 01:15:22. FastEthernet0/0 192.hr Page 85 of 161 www. 3 subnets.168.RIP.0.16. 01:15:22.mobile.16. Serial0/0/0 [90/2172416] via 192. DLY 20000 usec. both routes are included in the routing table. 01:16:19.168.3.16.0/24 172.static.168.3. which stands for DUAL (Diffusing Update Algorithm).168. the link between R1 and R2 will be configured with a bandwidth of 64 kbps.OSPF NSSA external type 2 E1 .IS-IS level-1. o .10.

2 masks D 192.168. 3 masks D 172.3. rely 255/255.16.10.4/30 [90/3523840] via 192. line protocol is up (connected) Hardware is HD64570 Internet address is 172.0/24 is variably subnetted.3. Null0 172.0/16 is a summary.1. A successor is the least-cost route to the destination network.168.1.168. load 1/255 Encapsulation HDLC.2.3. BW 1024 Kbit.168.168.edunet. keepalive set (10 sec) <output omitted> Step 2: Answer the following questions: What is the best path to PC1? ____________________________________________________________________________________ A successor is a neighboring router that is currently being used for packet forwarding.hr Page 87 of 161 www.0. Serial0/0/0 C 172.10.0/24 [90/40514560] via 172.168. keepalive set (10 sec) <output omitted> R2#show interface serial0/0/0 Serial0/0/0 is up.168. rely 255/255.1. FD is the metric listed in the routing table entry as the second number inside the brackets. 1 subnets 10.16.8/30 is directly connected.1.0/16 is variably subnetted.16. R2#show ip route <output omitted> 10.2/30 MTU 1500 bytes. Serial0/0/1 D 192. 00:42:20.1: Basic EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. line protocol is up (connected) Hardware is HD64570 Internet address is 172.2. Serial0/0/1 192.168. In order to be a feasible successor. BW 64 Kbit. A feasible successor is a neighbor who has a viable backup path to the same network as the successor. R1#show ip route <output omitted> Note: Use the interface configuration command no bandwidth to return the bandwidth to its default value. R2#show ip route <output omitted> www. 3 subnets.16.0/24 [90/2172416] via 192. What is the feasible distance to the network that PC1 is on? ________________________________________ Task 10: Determine if R1 is a Feasible Successor for the Route from R2 to the 192. Null0 D 172.1.0/16 is variably subnetted. Serial0/0/1 R1# D C D C D What is the reported distance to the 192.168.0 Network. Loopback1 172.16. loopback not set.0. Step 1: Examine the routing table on R1.16.10. Serial0/0/1 C 192.16.0.168.6.10. What is the IP address and name of the successor router in this route? ________________________________________ Feasible distance (FD) is the lowest calculated metric to reach that destination. loopback not set. 00:00:11.1: Basic EIGRP Configuration Lab Step 3: Verify the bandwidth modifications.16.1/30 MTU 1500 bytes.16.edunet.16.0/24 is variably subnetted.0.16.10. load 1/255 Encapsulation HDLC. BW 64 Kbit.0/24 is a summary.6.4/30 is directly connected.16. 00:00:11.16. 00:00:11. Serial0/0/0 D 192.0.1.6. 00:42:59.2. rely 255/255. The feasibility condition (FC) is met when a neighbor’s reported distance (RD) to a network is less than the local router’s feasible distance to the same destination network.10.0/16 is a summary.10.0/24 [90/3014400] via 192.10.3.168. line protocol is up (connected) Hardware is HD64570 Internet address is 192.168. Null0 D 192. load 1/255 Encapsulation HDLC.hr Page 88 of 161 .3.168.0. 3 masks 172.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. DLY 20000 usec. Use the show ip interface command to verify that the bandwidth value of each link has been changed.10.1. 00:42:20. Serial0/0/0 172.3.9/30 MTU 1500 bytes. Serial0/0/1 R2# C 172. Task 9: Examine Successors and Feasible Distances.0/30 is directly connected.168. 00:00:52.1. 00:00:52. Step 1: Examine the successors and feasible distances in the routing table on R2.10. R1 must satisfy the feasibility condition.0 is directly connected. 2 masks D 192.8/30 [90/3523840] via 192. The IP address of a successor is shown in a routing table entry right after the word “via”. 4 subnets. 4 subnets.0/24 is directly connected. keepalive set (10 sec) <output omitted> R3#show interface serial0/0/1 Serial0/0/1 is up.16.0/24 is directly connected. 00:42:26.0/24 is a summary. Serial0/0/0 192. loopback not set. Serial0/0/1 192.0 network? ________________________________________ Step 2: Examine the routing table on R2.10. DLY 20000 usec.168. Null0 C 192. 3 subnets. FastEthernet0/0 172.10.0/30 is subnetted. FastEthernet0/0 C 172. R1#show interface serial0/0/0 Serial0/0/0 is up.10.10.6.0/30 is directly connected.0/24 [90/40514560] via 172.168.1. 00:43:00.10. DLY 20000 usec.168.

0. 1 successors. R3#show ip route <output omitted> www. 4 subnets.168.Update.1 (41026560/2172416). Serial0/0/1 192.168.1. 3 masks 172.10 (3523840/2169856). r . This will cause packets that are destined for the 172.3. Serial0/0/0 P 192.0/24 is variably subnetted. Serial0/0/1 192.168.0 network? ________________________________________ Would R2 consider R1 to be a feasible successor to the 192.0. from 192.10.4/30. Serial0/0/0 192.3.168.0/24 State is Passive. Null0 P 192.0.168. FD is 3523840 via 192. Route is Internal Vector metric: Minimum bandwidth is 1024 Kbit Total delay is 20100 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1500 Hop count is 1 172.hr Page 89 of 161 www. 00:00:11.0.0/24. 1 successors. Step 1: View the EIGRP topology table.0.1: Basic EIGRP Configuration Lab C D D C C D D D C R2# 10. Use the show ip eigrp topology command to view the EIGRP topology table on R2. FastEthernet0/0 172.16. FD is 3011840 via Summary (3011840/0). 00:00:11.10.0/24 is directly connected.10.edunet.10.0 network.3.Query.1.1.0.10. U .16.Reply status P 172. 00:00:52.0/16 is a summary. FD is 3014400 via 192.Passive.1.16.10.16.0/30 is subnetted. FD is 40514560 via 172. 172.168. Serial0/0/0 P 192. 00:00:52.6. FD is 3011840 via Connected.10. Serial0/0/1 R2# Step 2: View detailed EIGRP topology information. Query origin flag is 1. R2#show ip eigrp topology IP-EIGRP Topology Table for AS 1 Codes: P . 3 subnets.16.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.3. 1 subnets 10.Active.0 if R1 became the successor? ________________________________________ Task 12: Disable EIGRP Automatic Summarization.168.16.168.16.hr Page 90 of 161 .0/30 is directly connected. 1 successors.168. Use the [network] parameter of the show ip eigrp topology command to view detailed EIGRP topology information for the 192.4/30 [90/3523840] via 192.Reply.1.168.10.0/24 is a summary.0/24 [90/40514560] via 172. Serial0/0/1 via 172.1.168. and 172.16.3.6. FD is 3014400 Routing Descriptor Blocks: 192.0/24.1 (40514560/28160).0/24.2.0/30.16.0/24.1 (Serial0/0/0).2.10. Serial0/0/0 P 192. Route is Internal Vector metric: Minimum bandwidth is 64 Kbit Total delay is 40100 microseconds Reliability is 255/255 Load is 1/255 Minimum MTU is 1500 Hop count is 2 R2# How many successors are there for this network? ________________________________________ What is the feasible distance to this network? ________________________________________ What is the IP address of the feasible successor? ________________________________________ What is the reported distance for 192.168. the routing table only has a summary route to the classful network address of 172. Send flag is 0x0 Composite metric is (41026560/2172416).1.10.8/30.1.0/16 is variably subnetted. FD is 28160 via Connected. Serial0/0/0 172.16.edunet. 1 Successor(s).0/16 through the R1 router. 2 masks 192. R .1.16. R2#show ip eigrp topology 192.16.1: Basic EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.0 from the feasible successor? ________________________________________ What would be the feasible distance to 192.10. 1 successors.1.3.1.168.0 is directly connected.3.10.2. Null0 192.0 IP-EIGRP (AS 1): Topology entry for 192.10.0.16.16.0/24. Null0 172.168.1. Serial0/0/1 What is the feasible distance to the 192. Send flag is 0x0 Composite metric is (3014400/28160). A .16.16. 00:00:11. 1 successors. FD is 28160 via Summary (28160/0). 1 successors.10 (Serial0/0/1).0 network? _______ Task 11: Examine the EIGRP Topology Table.1.0/24 network to be sent through the R1 router instead of being sent straight to the R2 router. Serial0/0/1 P 172. 1 successors.168.16.16.1. Instead. FD is 40512000 via Connected.0/24 [90/3014400] via 192. Null0 P 172.168.0/16.16.168.8/30 is directly connected.10.10.168.0/24.16.168.0/24 subnets.3.10.168. 1 successors. from 172.10 (3014400/28160). Notice that R3 is not receiving individual routes for the 172.2.1.168. Q . Loopback1 172. FastEthernet0/0 P 172. Step 1: Examine the routing table of the R3 router.

0/24 is variably subnetted.168.0/24 is variably subnetted.edunet.6.168.168.3.0/16. Serial0/0/0 192. FastEthernet0/0 192.1/24.Reply.0/24 is directly connected. and 172.10. Serial0/0/1 Task 13: Configure Manual Summarization. Serial0/0/0 P 192.168.2. U . 00:15:07. 2 masks 192.2. Serial0/0/1 192.1 255.168. Serial0/0/0 192.16. 3 masks [90/2172416] via 192.Reply status P 192.0 and 192. Null0 192.6.0/24 [90/2297856] via 192.16.hr Page 91 of 161 www.16.0 R3(config-router)#network 192.6.1: Basic EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.168.16. changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback1.168. Serial0/0/1 [90/41024000] via 192. View the routing table on the R1 router to verify that the new routes are being sent out in the EIGRP updates sent by R3. R1(config)#router eigrp 1 R1(config-router)#no auto-summary R2(config)#router eigrp 1 R2(config-router)#no auto-summary R3(config)#router eigrp 1 R3(config-router)#no auto-summary Step 4: View the routing table on R1 again.Query. Serial0/0/0 192. to the R3 router.2.10.168.0/24.168.168.0 R3(config-if)#interface loopback2 %LINK-5-CHANGED: Interface Loopback2.0/24.Active. Serial0/0/0 via 192.10.168. Serial0/0/0 192.2.5 (2172416/28160).16. 4 subnets. 00:15:07.168.168. 01:21:47. Serial0/0/0 192.168.16. FastEthernet0/0 192.168. R3#show ip route <output omitted> C D C D D D C D R1# 172.5.1: Basic EIGRP Configuration Lab D C D C C R3# 172. Null0 P 172.0.1. changed state to upR3(config-if)#ip address 192.10. R3(config)#interface loopback1 %LINK-5-CHANGED: Interface Loopback1.1 255.16.168.10.168. Notice that the reported distance from R2 is higher than the feasible distance from R1.1/24 and 192.6.168.9 (3014400/28160).16.6.3.168. A .0/24 172. 3 subnets.0.2. 00:02:39.0 R3(config-if)# Step 2: Add the 192.255. 00:01:07. Q .168.3.1.0/24 [90/2172416] via 192. Serial0/0/1 www. 01:21:54. 1 successors. Serial0/0/1 P 192. FD is 2169856 via Summary (2169856/0). 00:02:39.168.16.4/30 is directly connected.0/24 [90/2297856] via 192.10.10. Serial0/0/1 192. FD is 3011840 via Connected.4/30. 172.0 Step 3: Verify new routes.168. FD is 2169856 via Connected.0/16 is 172.10. 00:15:07.2.0/24.255.3.0/24 LAN. Serial0/0/1 172.0/30 is directly connected. FD is 2172416 via 192.1. R1#show ip route <output omitted> Step 3: Disable automatic summarization on all three routers with the no auto-summary command.0/16 network? ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ variably subnetted.10.9.hr Page 92 of 161 .10. R3#show ip eigrp topology IP-EIGRP Topology Table for AS 1 Codes: P . Notice that individual routes for the 172. FD is 28160 via Connected.0.8/30 is directly connected. 00:02:37. 3 masks 172.168. Serial0/0/1 [90/41024000] via 192.10.168.10.1. FastEthernet0/0 172.168.168. 1 successors.6.16. Serial0/0/1 Add two loopback addresses.168. Serial0/0/0 [90/3014400] via 192.8/30 [90/3523840] via 192. Serial0/0/1 192.0.9.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.1.10. 3 subnets.4/30 is directly connected. 3 subnets.168.3.0/24 is a summary.0/16 [90/2172416] via 192. r .168.10.255.10.0/24 [90/3526400] via 192.3.0/24 172.10.16.168.Update. Serial0/0/1 D D D C C C R3# 172.10.168. changed state to up R3(config-if)#ip address 192.Passive.10.168.3. Serial0/0/1 192. 00:02:37.1.4/30 is directly connected.3.1.edunet.16.8/30. 2 masks 192.10. R .2.168.0/24.10. R3(config)#router eigrp 1 R3(config-router)#network 192.0/24 is directly connected.5) the only successor for the route to the 172. 192. 00:00:57.10. 1 successors.0/16 is variably subnetted. 4 subnets.10.168.16.10. FastEthernet0/0 P 192.0/24 is directly connected.168.168. changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback2.168.0 networks to the EIGRP configuration on R3.0/24 subnets are now present and the summary Null route is no longer listed.168.1.6.10.168.168.255.2.10. 2 masks 192.8/30 is directly connected.5. 1 successors. Step 1: Add loopback addresses to R3 router.0.0/24 is variably subnetted.5. 1 successors. These virtual interfaces will be used to represent networks to be manually summarized along with the 192.16.0/30 Why is the R1 router (192.168.10.

3 masks 172.8/30 [90/3523840] via 192. • • • • show running-config show ip route show ip interface brief show ip protocols C D C D C D R1# Task 16: Clean Up Erase the configurations and reload the routers.168.16. Serial0/0/1 192. R2(config)#router eigrp 1 R2(config-router)#redistribute static R2(config-router)# Step 3: Verify the static default route.0/16 is variably subnetted.0/24 is variably subnetted.0.0. 00:02:14.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.6.168.1: Basic EIGRP Configuration Lab Step 4: Apply manual summarization to outbound interfaces.0. Serial0/0/1 C 172. Serial0/0/0 192.3.0/24 is directly connected.168. Use the redistribute static command to include the static route in the EIGRP updates that are sent from the R2 router.255. R3(config)#interface serial0/0/0 R3(config-if)#ip summary-address eigrp 1 192.0 loopback1 R2(config)# Step 2: Include the static route in EIGRP updates.252.0/24 [90/3526400] via 192. R2(config)#ip route 0.168. Serial0/0/1 192.1. View the routing table on the R1 router to verify that the static default route is being redistributed via EIGRP.0/24 networks can be summarized in the single network 192.2.1.10.0.168.0.0/0 [170/3651840] via 192. FastEthernet0/0 D 172. Use the ip summary-address eigrp as-number networkaddress subnet-mask command to configure manual summarization on each of the outbound interfaces connected to EIGRP neighbors.2.168.0.10.16.0/24 [90/3526400] via 192.8 [90/3523840] via 192. 192. 01:05:39.168. Step 1: Configure a static default route on the R2 router.168.6 to network 0. capture the following command output to a text (.0/22.0/16 is variably subnetted.6.168. Serial0/0/1 C D Task 15: Documentation On each router.6. Serial0/0/1 Gateway of last resort is 192.edunet.10. Task 14: Configure and Distribute a Static Default Route.10.168. Serial0/0/1 172.hr Page 94 of 161 . 00:15:07.10.168.hr Page 93 of 161 www.0.0/30 is directly connected.0/30 is directly connected.10.0.0.16.252. 2 subnets 192.168.168. and 192.0 255.6.2. Serial0/0/1 D 192. 3 subnets.0 192.255.0 R3(config-if)# Step 5: Verify the summary route.16.10.6. Use the loopback address that has been configured to simulate a link to an ISP as the exit interface. reconnect the appropriate cabling and restore the TCP/IP settings.16.6.0 0.10.10.0.10.0.0/22 [90/2172416] via 192.10.0/24.6. 2 masks 192. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet).0.168. The routes to the 192.168.4 is directly connected. R1#show ip route <output omitted> 172. 3 subnets. 4 subnets.0/24 is directly connected.168.txt) file and save for future reference.edunet. Serial0/0/0 D*EX 0.0/24.3.168.16.16.168. FastEthernet0/0 172.0.0 R3(config-if)#interface serial0/0/1 R3(config-if)#ip summary-address eigrp 1 192.1: Basic EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.10.0/22 [90/2172416] via 192.10.168. 00:15:07. 01:05:38.168.168.3.10.6.4/30 is directly connected.0/30 is subnetted.0 255. Serial0/0/1 172. View the routing table on the R1 router to verify that the summary route is being sent out in the EIGRP updates sent by R3. Serial0/0/1 192.6. 2 masks C 172.0.16. R1#show ip route <output omitted> www. 00:01:11. Disconnect and store the cabling.168.1. 01:06:01.0.

Verify EIGRP operation.6. Task 1: Subnet the Address Space.0/16 network? _______ How many total IP addresses are required from the 172. The Branch 2 LAN will require 100 addresses.224/30 network. Assign appropriate addresses to interfaces and document. you will be able to: • • • • • • • • • Create an efficient VLSM design given requirements. Reflect upon and document the network implementation. All rights reserved. The 192. Configure routers including EIGRP. This document is Cisco Public Information.16.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.0.165.16. A combination of EIGRP routing and static routing will be required so that hosts on networks that are not directly connected will be able to communicate with each other. Test and verify full connectivity.1. Configure and propagate a static default route.0/16 network? _______ What subnet mask will be used for the HQ LAN subnet? _______________________________________ What is the maximum number of host addresses that could be used on this subnet? _______ What subnet mask will be used for the BRANCH1 LAN subnet? ___________________________________ What is the maximum number of host addresses that could be used on this subnet? _______ What subnet mask will be used for the BRANCH2 LAN subnet? ___________________________________ What is the maximum number of host addresses that could be used on this subnet? _______ What subnet mask will be used for the links between the three routers? ___________________________ All contents are Copyright © 1992–2007 Cisco Systems.0. The loopback address representing the link between the HQ router and the ISP will use the 209. Inc. Step 1: Examine the network requirements.edunet.6.16.0/16 network must be subnetted to provide addresses for the three LANs.200.2: Challenge EIGRP Configuration Lab Topology Diagram Upon completion of this lab. Addressing Table Device Interface Fa0/0 HQ S0/0/0 S0/0/1 Lo1 Fa0/0 BRANCH1 S0/0/0 S0/0/1 Fa0/0 BRANCH2 S0/0/0 S0/0/1 PC1 PC2 PC3 NIC NIC NIC IP Address Subnet Mask Default Gateway N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A The addressing for the network has the following requirements: • The 172.0.hr Page 96 of 161 .168. Cable a network according to the Topology Diagram. The BRANCH1 LAN will require 200 addresses. you will be given a network address that must be subnetted using VLSM to complete the addressing of the network shown in the Topology Diagram. Erase the startup configuration and reload a router to the default state. • • • • • The HQ LAN will require 500 addresses. Scenario In this lab activity.2: Challenge EIGRP Configuration Lab Learning Objectives Lab 9.16/28 address space must be subnetted to obtain the addresses for the links between the three routers. Step 2: Consider the following questions when creating your network design: How many subnets need to be created from the 172. Page 95 of 161 www. EIGRP must be configured so that all IP traffic takes the shortest path to the destination address.

Assign the first valid IP address of the HQ to BRANCH2 link network to the Serial 0/0/1 interface of the HQ router. Step 2 Clear any existing configurations on the routers. Assign the last valid IP address of the HQ LAN network to PC2. Assign the last valid IP address of the BRANCH1 LAN network to PC1.edunet.1. Assign the first valid IP address of the HQ LAN network to the LAN interface of the HQ router.165. Configure a password for VTY connections. and PC3 can ping their respective default gateways.2: Challenge EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. 8.0/16 network to the BRANCH2 LAN subnet. Assign the first valid host address of the 209. Configure the interfaces on the HQ. What is the network address of this subnet? _________________________________ Step 2: Document the addresses to be used in the table provided under the Topology Diagram.0. 7.224/30 network to the Loopback interface on the HQ router.0.16.0/16 network to the HQ LAN subnet.16/28 network to the link between the HQ and BRANCH2 routers. Step 1: Verify connectivity of routers. What is the network address of this subnet? ________________________________________ 4. Step 2: Verify connectivity of PCs.6. Assign subnet 2 of the 172.1. 8. Configure a message-of-the-day banner. and ISP routers according to the following guidelines: 1. www. HQ. Step 2: Configure the Ethernet interfaces. Configure an EXEC mode password. 12. Synchronize unsolicited messages and debug output with solicited output and prompts for the console and virtual terminal lines. 3. What is the network address of this subnet? ________________________________________ 5. Task 2: Determine Interface Addresses. and BRANCH2 routers with the IP addresses from the table provided under the Topology Diagram. you can test connectivity between two routers and between an end device and its default gateway. Step 1: Assign appropriate addresses to the device interfaces. 10. 5.168. Assign subnet 0 of the 172. What is the network address of this subnet? ________________________________________ 6.1. Assign the last valid IP address of the BRANCH1 to BRANCH2 link network to the Serial0/0/0 interface of the BRANCH2 router. Assign subnet 0 of the 192. and BRANCH2 routers. Verify that PC1. Assign the last valid IP address of the HQ to BRANCH2 link network to the Serial0/0/1 interface of the Branch router. 7. Configure an EXEC timeout of 15 minutes. BRANCH1. Assign the first valid IP address of the BRANCH1 to BRANCH2 link network to the Serial 0/0/1 interface of the BRANCH1 router. However. Step 1 Cable a network that is similar to the one in the Topology Diagram. Task 6: Verify Connectivity to Next-Hop Device. 4.0. 5. What is the network address of this subnet? ________________________________________ 3. Configure a password for console connections. 3.168.16. Configure the Ethernet interfaces of PC1.16/28 network to the link between the BRANCH1 and BRANCH2 routers. be sure to save the running configuration to the NVRAM of the router.6. Perform basic configuration of the BRANCH1. Configure the router hostname.16. Assign subnet 2 of the 192.200. Disable DNS lookup. Task 4: Perform Basic Router Configurations. Assign the first valid IP address of the BRANCH2 LAN network to the LAN interface of the BRANCH2 router. 2. You can use any current router in your lab as long as it has the required interfaces shown in the topology. and PC3 with the IP addresses from the Addressing Table provided under the Topology Diagram. PC2. Task 3: Prepare the Network.0/16 network to the BRANCH1 LAN subnet. Step 1: Configure the interfaces on the HQ. BRANCH2. You should not have connectivity between end devices yet. Assign the first valid IP address of the BRANCH1 LAN network to the LAN interface of the BRANCH1 router. Verify that the HQ. Assign subnet 1 of the 192. 1. Assign the last valid IP address of the BRANCH2 LAN network to PC3. 2. PC2. 9. 11. 4. Assign the first valid IP address of the HQ to BRANCH1 link network to the Serial 0/0/0 interface of the HQ router. 6.edunet.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. and BRANCH2 routers can ping each of the neighboring routers across the WAN links. Assign subnet 1 of the 172.hr Page 98 of 161 . 13. 1.168. When you have finished.hr Page 97 of 161 www.2: Challenge EIGRP Configuration Lab What is the maximum number of host addresses that could be used on each of these subnets? _____ Step 3: Assign subnetwork addresses to the Topology Diagram. Task 5: Configure and Activate Serial and Ethernet Addresses. BRANCH1. 6.16/28 network to the link between the HQ and BRANCH1 routers. BRANCH1. What is the network address of this subnet? ________________________________________ 2. Assign the last valid IP address of the HQ to BRANCH1 link network to the Serial0/0/0 interface of the Branch router.

edunet. What command is used to configure this? ________________________________________ Task 9: Configure EIGRP Routing on the BRANCH2 Router. Consider the networks that need to be included in the EIGRP updates that are sent out by the BRANCH2 router. What directly connected networks are present in the BRANCH2 routing table? ________________________________________ ________________________________________ ________________________________________ Will these networks need to have the subnet mask information included in the network statements? __________ What commands are required to enable EGIRP and include the connected networks in the routing updates? ________________________________________ ________________________________________ ________________________________________ ________________________________________ What command is required to enable EGIRP to include the VLSM information instead of summarizing routes at the classful boundary? ________________________________________ Are there any router interfaces that do not need to have EIGRP updates sent out? __________ What command is used to disable EIGRP updates on these interfaces? ________________________________________ www. Consider the networks that need to be included in the EIGRP updates that are sent out by the BRANCH1 router.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. What directly connected networks are present in the BRANCH1 routing table? ________________________________________ ________________________________________ ________________________________________ Will these networks need to have the subnet mask information included in the network statements? __________ What commands are required to enable EGIRP and include the connected networks in the routing updates? ________________________________________ ________________________________________ ________________________________________ ________________________________________ What command is required to enable EGIRP to include the VLSM information instead of summarizing routes at the classful boundary? ________________________________________ Are there any router interfaces that do not need to have EIGRP updates sent out? __________ What command is used to disable EIGRP updates on these interfaces? ________________________________________ What commands are required to enable EGIRP and include the appropriate networks in the routing updates? ________________________________________ ________________________________________ ________________________________________ ________________________________________ What command is required to enable EGIRP to include the VLSM information instead of summarizing routes at the classful boundary? ________________________________________ Are there any router interfaces that do not need to have EIGRP updates sent out? __________ What command is used to disable EIGRP updates on this interface? ________________________________________ The HQ router needs to send the default route information to the BRANCH1 and BRANCH2 routers in the EIGRP updates.edunet.6. Consider the type of static routing that is needed on HQ.2: Challenge EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.2: Challenge EIGRP Configuration Lab Task 7: Configure EIGRP Routing on the BRANCH1 Router.hr Page 100 of 161 Task 8: Configure EIGRP and Static Routing on the HQ Router.6.hr Page 99 of 161 . What command is needed to accomplish this? ________________________________________ What directly connected networks are present in the HQ routing table? ________________________________________ ________________________________________ ________________________________________ ________________________________________ Will the networks of the HQ LAN and the links between the BRANCH1 and BRANCH2 routers need to have the subnet mask information included in the network statements? __________ www. A static default route will need to be configured to send all packets with destination addresses that are not in the routing table to the loopback address representing the link between the HQ router and the ISP.

16. www. Refer to your basic troubleshooting techniques used in the Chapter 1 labs.txt) file and save for future reference.hr Page 102 of 161 . On each router. check your physical connections and configurations.2: Challenge EIGRP Configuration Lab Task 10: Verify the Configurations. What EIGRP routes are present in the routing table of the BRANCH1 router? ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ What is the gateway of last resort in the routing table of the BRANCH1 router? ________________________________________ What EIGRP routes are present in the routing table of the HQ router? ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ What is the gateway of last resort in the routing table of the HQ router? ________________________________________ What EIGRP routes are present in the routing table of the BRANCH2 router? ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ What is the gateway of last resort in the routing table of the BRANCH2 router? ________________________________________ Task 11: Reflection Why is it necessary to use disable automatic summarization with this network design? ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ If the routes in the routing table are summarized at the classful network boundary 17. capture the following command output to a text (. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet). is it possible to ping the PC3? __________ The answer to the above questions should be yes.6. is it possible to ping PC2? __________ From PC1. the paths between the three routers will all have an equal cost and packets may not be sent using the route with the least hops.hr Page 101 of 161 www.2: Challenge EIGRP Configuration Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.edunet.0. reconnect the appropriate cabling and restore the TCP/IP settings. If any of the above pings failed.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. • • • Running configuration Routing table Interface summarization Task 13: Clean Up Erase the configurations and reload the routers. Disconnect and store the cabling.0. Answer the following questions to verify that the network is operating as expected: From PC1. Task 12: Document the Router Configurations.6.edunet.

you will begin by loading configuration scripts on each of the routers. The network should also have the following requirements met: • EIGRP routing is configured on the BRANCH1 router. Step 1: Load the following script onto the BRANCH1 router: hostname BRANCH1 ! ! no ip domain-lookup ! interface FastEthernet0/0 ip address 172.133 172. EIGRP routing is configured on the HQ router. These scripts contain errors that will prevent end-to-end communication across the network.130 209.138 209.1 172.202.255.255. Cable a network that is similar to the one in the Topology Diagram.255.192.252 255. Scenario In this lab.0 255.255. EIGRP updates must be disabled on the BRANCH1.255.192. Propose solutions to network errors.255.255.0 Step 2: Clear the configuration on each router. • • Fa0/0 HQ S0/0/0 S0/0/1 Fa0/0 BRANCH1 S0/0/0 S0/0/1 Fa0/0 BRANCH2 S0/0/0 S0/0/1 PC1 PC2 PC3 NIC NIC NIC Addressing Table Device Interface Task 1: Cable.129.252 255.255.134 172. all of the hosts on the network should be able to communicate with each other.129 209.1 172.255.202.18. • • IP Address 172. Step 1: Cable a network. Document the corrected network. All EIGRP routers must use a process ID of 1. Analyze information to determine why communication is not possible.0 255.255. Answer no if asked to save changes.255.14 172.18.1 209.18.255. Task 2: Load Routers with the Supplied Scripts.255. and HQ LAN interfaces. Load the routers with supplied scripts.18.edunet.6.18.128. Clear the configuration on each of the routers using the erase startup-config command and then reload the routers.1 255.100.1 209.165.3: EIGRP Troubleshooting Lab Topology Diagram Upon completion of this lab.100 172.18.202.255.0 255.1 Default Gateway N/A N/A N/A N/A N/A N/A N/A N/A N/A 255. Erase the startup configuration and reload a router to the default state.255.240 255.128. Implement solutions to network errors. you will be able to: • • • • • • • • • Cable a network according to the Topology Diagram.255. Erase.255.252 172.202.255.165.252 255.128.64.18.255.129.252 255.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. BRANCH2.252 255.6.255.165.18.edunet.165.hr Page 103 of 161 .137 172. EIGRP routing is configured on the BRANCH2 router.240 255.202. and Reload the Routers.255.18.240 duplex auto speed auto www.165.3: EIGRP Troubleshooting Lab Learning Objectives Lab 9.202.18.165.1 209.129. You will need to troubleshoot each router to determine the configuration errors.64.129. Discover where communication is not possible.hr Page 104 of 161 www. and then use the appropriate commands to correct the configurations.255. When you have corrected all of the configuration errors.255.255. Gather information about the misconfigured portion of the network along with any other errors.10 Subnet Mask 255.

0.202.165.hr Page 106 of 161 .18.136 0.128.130 255.6.192.137 255.255.252 clock rate 64000 no shutdown ! interface Serial0/0/1 ip address 209.3 no auto-summary ! ip classless ! ! ! ! line con 0 line vty 0 4 login ! ! end Step 2: Load the following script onto the BRANCH2 router: hostname BRANCH2 ! ! no ip domain-lookup ! interface FastEthernet0/0 ip address 172.0.255.128 0.129 255.255.255.255.edunet.138 255.0.202.252 no shutdown ! interface Serial0/0/1 ip address 209.255.132 0.255.132 0.6.165.7 no auto-summary ! ip classless ! ! ! ! line con 0 line vty 0 4 login ! ! End ! ! ! ! line con 0 line vty 0 4 login ! ! end Step 3: Load the following script onto the HQ router: hostname HQ ! ! no ip domain-lookup ! interface FastEthernet0/0 ip address 172.255.133 255.165.165.165.3: EIGRP Troubleshooting Lab ! interface Serial0/0/0 ip address 209.18.0.202.3 network 209.128.0.0.0.0.255.255.255.134 255.252 clock rate 64000 no shutdown ! router eigrp 1 passive-interface Serial0/0/0 network 172.165.18.202.0.3 network 209.3 network 172.202.202.165.1 255.255.0 0.0 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 209.18.1 255.252 no shutdown ! router eigrp 1 passive-interface FastEthernet0/0 network 172.165.255 network 209.64.0.3 ! ip classless www.0.129.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.136 0.18.202.0 0.64.252 no shutdown ! interface Serial0/0/1 ip address 209.edunet.255.165.202.202.255.202.0 network 209.0.0 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 209.hr Page 105 of 161 www.165.0.165.255.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.252 no shutdown ! router eigrp 2 passive-interface FastEthernet0/0 network 209.202.0.

backup designated router (BDR). • • • • show running-config show ip route show ip interface brief show ip protocols Learning Objectives Upon completion of this lab. The segments of the network have been subnetted using VLSM. you will be able to: • • • • • • • • • • • • • • Cable a network according to the Topology Diagram Erase the startup configuration and reload a router to the default state Perform basic configuration tasks on a router Configure and activate interfaces Configure OSPF routing on all routers Configure OSPF router IDs Verify OSPF routing using show commands Configure a static default route Propagate default route to OSPF neighbors Configure OSPF Hello and Dead Timers Configure OSPF on a Multiacess network Configure OSPF priority Understand the OSPF election process Document the OSPF configuration Task 4: Reflection There were a number of configuration errors in the scripts that were provided for this lab.6. You will also learn to use the OSPF election process to determine the designated router (DR). www.edunet. Use the space below to write a brief description of the errors that you found. and DRother states. you will learn to configure OSPF on a multi-access network.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.edunet.3: EIGRP Troubleshooting Lab Lab 11.hr Page 107 of 161 www.1: Basic OSPF Configuration Lab Task 3: Troubleshooting Use this commands to find configuration errors in the scripts that were provided for this lab. ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ Scenarios In this lab activity. In the second scenario. OSPF is a classless routing protocol that can be used to provide subnet mask information in the routing updates.hr Page 108 of 161 . This will allow VLSM subnet information to be propagated throughout the network. you will learn how to configure the routing protocol OSPF using the network shown in the Topology Diagram in Scenario A. In the first scenario. there are two separate scenarios.6.

R2.255.255. Use the show ip interface brief command to verify that the IP addressing is correct and that the interfaces are active. and R3 routers with the IP addresses from the table under the Topology Diagram. configure the LAN network 172.252 255.10.255.168.6.6.33 Step 2: Verify IP addressing and interfaces. 0 will be used for the OSPF area ID in all of the network statements in this topology. Task 4: Configure OSPF on the R1 Router Step 1: Use the router ospf command in global configuration mode to enable OSPF on the R1 router. You can use any current router in your lab as long as it has the required interfaces shown in the topology.255.6 192.16. Configure a password for console connections.5 10.10.1 192. Configure the interfaces on the R1.hr Page 109 of 161 www.252 255.168. and R3 routers according to the following guidelines: 1. The OSPF network command uses a combination of network-address and wildcard-mask similar to that which can be used by EIGRP. Unlike EIGRP. Perform basic configuration of the R1.10 172. www.10. Use an area ID of 0 for the OSPF area-id parameter.255. Once you are in the Router OSPF configuration sub-mode. R1(config-router)#network 172.255.0.33 192. Configure the router hostname. the wildcard mask in OSPF is required.255. and R3.0 255.10.10.255. PC2.1. R2.255.255.10.10. Note: If you use 1700.hr Page 110 of 161 .168.20 10. be sure to save the running configuration to the NVRAM of the router.240 255. or 2600 routers. When you have finished.255.1.248 N/A N/A N/A N/A N/A N/A N/A N/A N/A 172.35 Subnet Mask 255.255.edunet. Configure the Ethernet interfaces of PC1.10.255. 2500. Step 1: Configure interfaces on R1.10.edunet.2 192.255.16.17 10. R1(config)#router ospf 1 R1(config-router)# Step 2: Configure the network statement for the LAN network. Enter a process ID of 1 for the process-ID parameter.16.168.16/28 to be included in the OSPF updates that are sent out of R1.168. 3.0 255. Scenario A: Basic OSPF Configuration Topology Diagram Task 2: Perform Basic Router Configurations. 6.0.255. Step 1: Cable a network that is similar to the one in the Topology Diagram.252 255.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.1.1.255.1 172.240 255.16.15 area 0 R1(config-router)# Task 1: Prepare the Network. Configure a message-of-the-day banner.168. Configure a password for VTY connections. Addressing Table Default Gateway Device Interface Fa0/0 R1 S0/0/0 S0/0/1 Fa0/0 R2 S0/0/0 S0/0/1 Fa0/0 R3 S0/0/0 S0/0/1 PC1 PC2 PC3 NIC NIC NIC IP Address 172.255. and PC3.10.1.10. Disable DNS lookup.10.252 255.255.16 0.252 255.255.255. R2. PC2.255.252 255. 4.1.9 172. the router outputs and interface descriptions will appear different.1. Step 3: Configure Ethernet interfaces of PC1. 2.10 172.16.248 255. 5.16.1 192. Task 3: Configure and Activate Serial and Ethernet Addresses.16.255.3: EIGRP Troubleshooting Lab Step 2: Clear any existing configurations on the routers. Step 4: Test the PC configuration by pinging the default gateway from the PC.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.255. and PC3 with the IP addresses and default gateways from the table under the Topology Diagram.17 192. Configure an EXEC mode password.255.16.1.

Nbr 192.168.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.10. When you are finished. Nbr 192.1.0/30 network attached to the Serial0/0/0 interface.0.0/30 network attached to the Serial0/0/0 interface. Task 6: Configure OSPF Router IDs Task 5: Configure OSPF on the R2 and R3 Routers Step 1: Enable OSPF routing on the R2 router using the router ospf command. R1(config-router)# network 192. Nbr 192. www.10.10 Supports only single TOS(TOS0) routes Supports opaque LSA SPF schedule delay 5 secs. Loading Done R3(config-router)#network 192. Highest active IP address on any of the router’s physical interfaces.0 0. the router sends a notification message to the console stating that a neighbor relationship with another OSPF router has been established. the router ID for each router is determined by the highest IP address of any active interface.0 0. R1(config-router)# network 192. 3.5 on Serial0/0/0 from EXCHANGE to FULL.168. Exchange Done Notice that when the network for the serial link from R1 to R2 is added to the OSPF configuration.0.0 0.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.168. R1(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R1# R3(config)#router ospf 1 R3(config-router)#network 172.0. Configure the router to advertise the three directly connected networks. What is the router ID for R1? ____________________ What is the router ID for R2? ____________________ What is the router ID for R3? ____________________ The router ID can also be seen in the output of the show ip protocols.3 area 0 R2(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R2# Step 5: Configure OSPF on the R3 router using the router ospf and network commands. R2(config)#router ospf 1 R2(config-router)# Step 2: Configure the router to advertise the LAN network 10. Highest IP address of any of the router’s loopback addresses.6.10.168.7 area 0 R3(config-router)#network 192.0.0.0.10.3: EIGRP Troubleshooting Lab Step 3: Configure the router to advertise the 192.8 0. the router sends a notification message to the console stating that a neighbor relationship with another OSPF router has been established.168.0.8 0.10.4 0.hr Page 112 of 161 .0.0. Use a process ID of 1.10. Step 4: Configure the router to advertise the 192.10.0.8/30 network attached to the Serial0/0/1 interface. Since no router IDs or loopback interfaces have been configured on the three routers.16. Use a process ID of 1.0. R2(config-router)#network 10.3 area 0 R1(config-router)# Step 5: When you are finished with the OSPF configuration for R1.168. R2(config-router)#network 192.168.0.0/24 in the OSPF updates. return to privileged EXEC mode.10. 1 normal 0 stub 0 nssa Maximum path: 4 <output omitted> R3#show ip ospf Routing Process "ospf 1" with ID 192.3 area 0 R2(config-router)# 00:07:27: %OSPF-5-ADJCHG: Process 1.10.0.32 0.168.255 area 0 R2(config-router)# Step 3: Configure the router to advertise the 192. R2(config-router)#network 192.10.168.10.10.168.168. Step 1: Examine the current router IDs in the topology.10.3 area 0 R3(config-router)# 00:17:46: %OSPF-5-ADJCHG: Process 1.5 on Serial0/0/0 from LOADING to FULL. return to privileged EXEC mode.10.168. A router ID is an IP address.hr Page 111 of 161 The OSPF router ID is used to uniquely identify the router in the OSPF routing domain.0.10 Number of areas in this router is 1.10. show ip ospf.edunet.10.168.0. and show ip ospf interfaces commands.4 0.10.6. When you are finished.edunet. return to privileged EXEC mode. 2. IP address configured with the OSPF router-id command. Exchange Done R3(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R3# Notice that when the networks for the serial links from R3 to R1 and R3 to R2 are added to the OSPF configuration.168.3 area 0 R3(config-router)# 00:18:01: %OSPF-5-ADJCHG: Process 1.4/30 network attached to the Serial0/0/1 interface. Cisco routers derive the Router ID in one of three ways and with the following precedence: 1.0. Hold time between two SPFs 10 secs <output omitted> www. R3#show ip protocols Routing Protocol is "ospf 1" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Router ID 192.168.10.10.9 on Serial0/0/1 from EXCHANGE to FULL.3 area 0 R1(config-router)# Step 4: Configure the router to advertise the 192.

.3.1.2 255. Restarting the OSPF process forces the router to use the IP address configured on the Loopback 0 interface as the Router ID.3. R1(config-router)#end R1# clear ip ospf process Reset ALL OSPF processes? [no]:yes R1# R2#show ip ospf neighbor Task 7: Verify OSPF Operation Neighbor ID 10.255 R2(config)#interface loopback 0 R2(config-if)#ip address 10.33 No backup designated router on this network Timer intervals configured. what is the router ID for R1? ____________________ When the router is reloaded.2.1 255.10. R1#(config-router)#end R1# clear ip ospf process Reset ALL OSPF processes? [no]:yes R1# Step 6: Use the show ip ospf neighbor command on router R2 to verify that the router ID of R1 has been changed.4.hr Page 113 of 161 www.3.1.10.168.3.10. Router ID 192. To manually restart the OSPF process.10. R1(config)#router ospf 1 R1(config-router)#router-id 10.edunet. Make sure that the current configuration is saved to NRAM.1.1.1.10. R1#show ip ospf neighbor Neighbor ID 10. the new router-ID is used at the next reload or at a manual OSPF process restart.edunet.168.168. use the clear ip ospf process command.16. maximum is 0 msec Neighbor Count is 0. line protocol is up Internet address is 172.168. Note: Some IOS versions do not support the router-id command. R2#show ip ospf neighbor Neighbor ID 10.3: EIGRP Troubleshooting Lab R3#show ip ospf interface FastEthernet0/0 is up. Adjacent neighbor count is 0 Suppress hello for 0 neighbor(s) <output omitted> R3# Step 2: Use loopback addresses to change the router IDs of the routers in the topology. When a new Router ID is configured.3 255.1 Interface Serial0/0/1 Serial0/0/0 Step 1: On the R1 router. Dead 40.1 Pri 0 0 State FULL/ FULL/ Dead Time 00:00:36 00:00:37 Address 192. Priority 1 Designated Router (ID) 192.4. If this command is not available.2 10.3. Wait 40.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. Interface address 172.2.3 10.6.10.2.168.6 192.3. Retransmit 5 Hello due in 00:00:00 Index 1/1. Hello 10. State DR.2.10 192. Cost: 1 Transmit Delay is 1 sec. flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1. continue to Task 7.10.10.1.4 Reload or use “clear ip ospf process” command.1.168.6. for this to take effect If this command is used on an OSPF router process which is already active (has neighbors).168.hr Page 114 of 161 .5 Interface Serial0/0/1 Serial0/0/0 Step 5: Use the router-id command to change the router ID on the R1 router.255.3.4.4 Pri 0 0 State FULL/ FULL/ Dead Time 00:00:36 00:00:37 Address 192.10. Network Type BROADCAST.255 Step 3: Reload the routers to force the new Router IDs to be used. and then use the reload command to restart each of the routers.3 10.255.4. and the interface that R1 uses to reach that OSPF neighbor.10.2 Interface Serial0/0/1 Serial0/0/0 Neighbor ID 10. R1(config)#interface loopback 0 R1(config-if)#ip address 10. Use the show ip ospf neighbor command to view the information about the OSPF neighbor routers R2 and R3. R3#show ip ospf neighbor www.10.16.168. Area 0 Process ID 1.1 Interface Serial0/0/1 Serial0/0/0 - Step 7: Remove the configured router ID with the no form of the router-id command.9 192.1.4.255.4 Reload or use “clear ip ospf process” command.3 10.4. what is the router ID for R3? ____________________ Step 4: Use the show ip ospf neighbors command to verify that the router IDs have changed. for this to take effect Step 8: Restart the OSPF process using the clear ip ospf process command.255.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.255.10. what is the router ID for R2? ____________________ When the router is reloaded. R1(config)#router ospf 1 R1(config-router)#router-id 10. it will not be used until the OSPF process is restarted.2 Pri 0 0 State FULL/ FULL/ Dead Time 00:00:30 00:00:33 Address 192.255.3.168.2.1 Pri 0 0 State FULL/ FULL/ - Dead Time 00:00:34 00:00:38 Address 192.10 192.255 R3(config)#interface loopback 0 R3(config-if)#ip address 10.168. maximum is 1 Last flood scan time is 0 msec.33/29. You should be able to see the neighbor ID and IP address of each adjacent router.2. When the router is reloaded.

R .EIGRP external.0.static.4 is directly connected. 00:16:56.3 0 FULL/R1# O Dead Time 00:00:32 00:00:32 Address 192.4 is directly connected.0/24 [110/65] via 192.0. the bandwidth metric will default to 1544 Kbits. keepalive set (10 sec) Last input never. Serial0/0/1 192.1/32 is directly connected.1.ODR P . M .8 [110/128] via 192.0/24 network.10. BW 1544 Kbit. process ID. 00:01:12.2.3.10.0.hr . EX .6. S .16 0. 00:16:56.2.1/30 MTU 1500 bytes.10. Serial0/0/1 192. 2 masks 10.168. such as protocol.16.0. R1#show ip protocols Routing Protocol is "ospf 1" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Router ID 10. loopback not set. 2 masks 10. the process ID must be the same on all routers for OSPF to establish neighbor adjacencies and share routing information. 00:17:06.3.2 110 00:11:43 10.168. L2 .0 is directly connected. 2 subnets.10.168. 2 subnets.16. Serial0/0/1 [110/128] via 192. Loopback0 10.0 is directly connected.168.1 Number of areas in this router is 1. and networks.168.RIP.OSPF NSSA external type 1.0. 2 subnets. IA .2.0/8 is variably subnetted.0/8 is variably subnetted. Notice that the information that was configured in the previous Tasks. 1 normal 0 stub 0 nssa Maximum path: 4 Routing for Networks: 172.168.IGRP.168.168.16.3.OSPF inter area N1 .10.16.0/16 is variably subnetted.168. FastEthernet0/0 172.168.2. Serial0/0/0 192. the bandwidth will need to be changed so that the OSPF cost can be calculated correctly.OSPF external type 1.0/30 is subnetted.16.0.6.168. I .OSPF NSSA external type 2 E1 .168.10.168.connected. 2 masks 172.2. Serial0/0/0 172.2. 2 subnets.BGP D .2. E .1.10.10. o . 2 masks 172.0.10.16.10.IS-IS level-2.168.10.10. Task 9: Configure OSPF Cost Step 1: Use the show ip route command on the R1 router to view the OSPF cost to reach the 10.per-user static route.3.10. rely 255/255. N2 .0. DLY 20000 usec. If this is not the actual bandwidth of the serial link. 64 kbps.mobile.10. Notice that unlike RIPv2 and EIGRP. R1#show ip route <output omitted> 10.periodic downloaded static route Gateway of last resort is not set 10.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. is shown in the output.6. FastEthernet0/0 Page 115 of 161 C O C www.6. load 1/255 Encapsulation HDLC. output never. ia .1. O . Serial0/0/0 Step 2: On the R1 router. line protocol is up (connected) Hardware is HD64570 Internet address is 192.edunet.EIGRP.10.edunet.EGP i . Serial0/0/1 [110/128] via 192. Remember.IS-IS level-1.IS-IS inter area * .168. 00:01:12. R1#show interfaces serial0/0/0 Serial0/0/0 is up.1.0/16 is variably subnetted. L1 .0.10.168.0/24 [110/65] via 192.10.1. R1 router: R1(config)#interface serial0/0/0 www. Serial0/0/0 C O C O C C O R1# Step 2: Use the show interfaces serial0/0/0 command on the R1 router to view the bandwidth of the Serial 0/0/0 interface. 3 subnets 192.2 0 FULL/10. R1#show ip route Codes: C . The IP addresses of the adjacent neighbors are also shown. neighbor ID.1/32 is directly connected. 00:01:02. B . Serial0/0/1 192.1.32/29 [110/65] via 192.168.10. Serial0/0/1 192.0.1.168.1. U .10.2.OSPF external type 2.3 110 00:11:43 Distance: (default is 110) R1# Notice that the output specifies the process ID used by OSPF.candidate default.1.hr Page 116 of 161 Task8: Examine OSPF Routes in the Routing Tables View the routing table on the R1 router.0 0. E2 . Serial0/0/0 172. Total output drops: 0 <output omitted> On most serial links. use the show ip protocols command to view information about the routing protocol operation.10.6 Interface Serial0/0/0 Serial0/0/1 C C O R1# 172.16/28 is directly connected.3 area 0 192. Step 3: Use the bandwidth command to change the bandwidth of the serial interfaces of the R1 and R2 routers to the actual bandwidth.3: EIGRP Troubleshooting Lab R1#show ip ospf neighbor Neighbor ID Pri State 10. Serial0/0/0 192.10.8 [110/128] via 192.168. output hang never Last clearing of "show interface" counters never Input queue: 0/75/0 (size/max/drops).10.0.168.6. 3 subnets 192.32/29 [110/65] via 192. 00:01:02.10.16/28 is directly connected.168.6.2 192. Loopback0 10.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.15 area 0 192.10.1.OSPF.1.4 0.10.3 area 0 Routing Information Sources: Gateway Distance Last Update 10.0.16.IS-IS.0/30 is subnetted.10. 00:17:06. OSPF does not automatically summarize at major network boundaries.10. OSPF routes are denoted in the routing table with an “O”.

255. Network Type POINT-TO-POINT.168. Timer intervals configured. Area 0 Process ID 1.168. Wait 40.hr Page 117 of 161 www. the result of the calculation: 108/64.252 Step 2: Configure a static default route on the R1 router.10. Network Type POINT-TO-POINT. Hello 10.000 bps. Router ID 10.3. changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback1. R1(config)#router ospf 1 R1(config-router)#default-information originate R1(config-router)# www.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. Router ID 10.255.1/30.edunet. line protocol is up Internet address is 192.0 loopback1 R1(config)# Step 3: Use the default-information originate command to include the static route in the OSPF updates that are sent from the R1 router.3. line protocol is up Internet address is 192.1.168.10.30. Dead 40. Area 0 Process ID 1.6. Retransmit 5 Hello due in 00:00:05 Index 2/2. Cost: 1562 Transmit Delay is 1 sec. Use the ip ospf cost command to change the bandwidth of the serial interfaces of the R3 router to 1562.5/30.1.3.2. Retransmit 5 Hello due in 00:00:06 Index 2/2.0. line protocol is up Internet address is 192. Use the loopback address that ha been configured to simulate a link to an ISP as the exit interface.3.2 Suppress hello for 0 neighbor(s) Serial0/0/1 is up.1.1. State POINT-TO-POINT. R1#show ip ospf interface <output omitted> Serial0/0/0 is up. State POINT-TO-POINT.10.0. line protocol is up Internet address is 192. Cost: 1562 Transmit Delay is 1 sec. Cost: 1562 Transmit Delay is 1 sec. R1(config)#interface loopback1 %LINK-5-CHANGED: Interface Loopback1. Router ID 10. maximum is 0 msec Neighbor Count is 1 . State POINT-TO-POINT. maximum is 1 Last flood scan time is 0 msec. Network Type POINT-TO-POINT. <output omitted> Task 10: Redistribute an OSPF Default Route Step 1: Configure a loopback address on the R1 router to simulate a link to an ISP. R3#show ip ospf interface <output omitted> Serial0/0/1 is up. Network Type POINT-TO-POINT. changed state to up R1(config-if)#ip address 172.2. Area 0 Process ID 1. <output omitted> Step 5: Use the ip ospf cost command to configure the OSPF cost on the R3 router.10/30.0. Timer intervals configured. Cost: 1562 Transmit Delay is 1 sec. Adjacent neighbor count is 1 Adjacent with neighbor 10.168.3.0. R3(config)#interface serial0/0/0 R3(config-if)#ip ospf cost 1562 R3(config-if)#interface serial0/0/1 R3(config-if)#ip ospf cost 1562 Step 6: Use the show ip ospf interface command on the R3 router to verify that the cost of the link the cost of each of the Serial links is now 1562. State POINT-TO-POINT. Wait 40.10.2. maximum is 0 msec Neighbor Count is 1 .hr Page 118 of 161 . maximum is 1 Last flood scan time is 0 msec.2 Suppress hello for 0 neighbor(s) Serial0/0/0 is up. Adjacent neighbor count is 1 Adjacent with neighbor 10. Hello 10.edunet. The cost of each of the Serial links is now 1562.6/30.6.1. flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1.1. Area 0 Process ID 1.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.0 0. flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1. Router ID 10.3: EIGRP Troubleshooting Lab R1(config-if)#bandwidth 64 R1(config-if)#interface serial0/0/1 R1(config-if)#bandwidth 64 R2 router: R2(config)#interface serial0/0/0 R2(config-if)#bandwidth 64 R2(config)#interface serial0/0/1 R2(config-if)#bandwidth 64 Step 4: Use the show ip ospf interface command on the R1 router to verify the cost of the serial links. R1(config)#ip route 0. An alternative method to using the bandwidth command is to use the ip ospf cost command.2.1. which allows you to directly configure the cost.1 255. Dead 40.3.

168.16/28 [110/1563] via 192.168.168.1.0. 00:25:56.0.2/32 is directly connected.168. 2 masks O 172.0. 00:01:01.2. Loopback1 Step 3: Use the show ip ospf neighbor command on R1 to view the Dead Time counter.8 [110/67097] via 192.10.3 0 FULL/- Dead Time 00:00:34 00:00:34 Address 192.10.0/24 is directly connected.168. 2 subnets. 3 subnets C 192.168.2.8 is directly connected.32/29 [110/65635] via 192.2.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.0/8 is variably subnetted.168.10.168.1.10.0 10.10.10.168. R2#show ip route <output omitted> Gateway of last resort is 192.168.2.0. Serial0/0/0 192.168.0. Please ensure reference bandwidth is consistent across all routers.32/29 [110/1563] via 192. 3 subnets 192. Please ensure reference bandwidth is consistent across all routers. R1#show ip route <output omitted> Gateway of last resort is 0. 2 subnets.0 is directly connected.1 on Serial0/0/0 from EXCHANGE to FULL.168. Loopback1 192.1. Hello 5. R1(config)#interface serial0/0/0 R1(config-if)#ip ospf hello-interval 5 R1(config-if)#ip ospf dead-interval 20 R1(config-if)# 01:09:04: %OSPF-5-ADJCHG: Process 1. Please ensure reference bandwidth is consistent across all routers.1/32 is directly connected. Router ID 10.16. Increase the reference bandwidth to 10000 to simulate 10GigE speeds.0/24 [110/65635] via 192.0/8 is variably subnetted.10.2.1.0.0.0/30 is subnetted.1. Serial0/0/1 192.0.0.1. Neighbor Down: Dead timer expired 01:09:04: %OSPF-5-ADJCHG: Process 1. R3(config-router)#auto-cost reference-bandwidth 10000 % OSPF: Reference bandwidth is changed.hr Page 120 of 161 Task 11: Configure Additional OSPF Features Step 1: Use the auto-cost reference-bandwidth command to adjust the reference bandwidth value.3. 2 masks 10. Serial0/0/0 C 192.10. Step 2: Examine the routing table on the R1 router to verify the change in the OSPF cost metric.168. Nbr 10.0. Nbr 10.2 0 FULL/10. R2#show ip ospf interface serial0/0/0 Serial0/0/0 is up.10. Serial0/0/0 O 172. Serial0/0/0 0. R1 and R2 loose adjacency because the Dead Timer and Hello Timers must be configured identically on each side of the serial link between R1 and R2. Dead 20.168. Step 5: Use the show ip ospf interface serial0/0/0 command to verify that the Hello Timer and Dead Timer intervals have been modified.2.0/0 [110/1] via 192. Nbr 10.6 Interface Serial0/0/0 Serial0/0/1 Step 4: Configure the OSPF Hello and Dead intervals. 2 masks 172.10. Loopback0 10.3.0/16 is variably subnetted. Network Type POINT-TO-POINT. 00:00:51.16/28 is directly connected. Timer intervals configured.168. Area 0 Process ID 1. 2 subnets.10.2/30. FastEthernet0/0 172. Cost: 1562 Transmit Delay is 1 sec. line protocol is up Internet address is 192.1 to network 0.4 [110/3124] via 192. Serial0/0/1 192.0/30 is subnetted. Serial0/0/1 O*E2 0.1.168. Retransmit 5 Hello due in 00:00:00 www.168.4 is directly connected. R2(config-router)#auto-cost reference-bandwidth 10000 % OSPF: Reference bandwidth is changed.2 on Serial0/0/0 from FULL to Down: Interface down or detached After 20 seconds the Dead Timer on R1 expires. 00:29:28.2 on Serial0/0/0 from FULL to DOWN.10. Configure this command on all routers in the OSPF routing domain.0 10. Notice that the values are much larger cost values for OSPF routes.168. 00:01:01.0 to network 0.10. Serial0/0/1 [110/3124] via 192.2.0.hr .0. Wait 20.2.0 is directly connected.16. R1#show ip ospf neighbor Neighbor ID Pri State 10. R1(config-router)#auto-cost reference-bandwidth 10000 % OSPF: Reference bandwidth is changed.1.16.10. Serial0/0/0 R2# C C C C C O S* R1# 172. Use these commands to change the hello interval to 5 seconds and the dead interval to 20 seconds on the Serial 0/0/0 interface of the R1 router. Modify the Dead Timer and Hello Timer intervals on the Serial 0/0/0 interface in the R2 router to match the intervals configured on the Serial 0/0/0 interface of the R1 router.0.10.168.edunet.16.10.2.10.16.0. The OSPF Hello and Dead intervals can be modified manually using the ip ospf hello-interval and ip ospf dead-interval interface commands.1.10. Serial0/0/1 Page 119 of 161 C O C O www.2.6. The Dead Time counter is counting down from the default interval of 40 seconds. 2 masks 10.0.10.edunet.10. Exchange Done Notice that the IOS displays a message when adjacency has been established with a state of Full.3: EIGRP Troubleshooting Lab Step 4: View the routing table on the R2 router to verify that the static default route is being redistributed via OSPF.168. 00:01:11. State POINT-TO-POINT.10.30.30.1.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.6.0/0 is directly connected.10.0. 2 subnets. R2(config)#interface serial0/0/0 R2(config-if)#ip ospf hello-interval 5 R2(config-if)#ip ospf dead-interval 20 R2(config-if)# 01:12:10: %OSPF-5-ADJCHG: Process 1.0 is directly connected.0.0/30 is subnetted. Serial0/0/0 O 192. 00:29:28.1.2 192.2.10.10.6. Loopback0 10.2.2.1. Serial0/0/0 172. 00:25:56. 1 subnets 172.0/16 is variably subnetted. Step 5: Modify the Dead Timer and Hello Timer intervals.10. FastEthernet0/0 172.10.16.

168.2 0 FULL/10. Adjacent neighbor count is 1 Adjacent with neighbor 10. 2500.31. Notice that the Dead Time for Serial 0/0/0 is now much lower since it is counting down from 20 seconds instead of the default 40 seconds. Disconnect and store the cabling.10. Each router will be configured with an IP address on the Fast Ethernet interface and a loopback address for the router ID. flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1.3 192. maximum is 1 Last flood scan time is 0 msec. reconnect the appropriate cabling and restore the TCP/IP settings.255 255.3: EIGRP Troubleshooting Lab Index 3/3.1.255.11 192.168.255.1. You can use any current router in your lab as long as it has the required interfaces shown in the topology.edunet.255.255.255.168. On each router.1 192.255.255 255. capture the following command output to a text file and save for future reference: • • • • Running configuration Routing table Interface summarization Output from show ip protocols Default Gateway Device R1 Interface Fa0/0 Loopback1 Fa0/0 Loopback1 Fa0/0 Loopback1 IP Address 192.2 192.255 N/A N/A N/A N/A N/A N/A R2 Task 11: Clean Up.3. Step 1: Cable a network that is similar to the one in the Topology Diagram.255.3 0 FULL/R1# Scenario B: Configure OSPF on a Multiaccess Network Topology Diagram Dead Time 00:00:19 00:00:34 Address 192.2.0 255.168.168.1. Step 2: Clear any existing configurations on the routers.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet).hr Page 121 of 161 www. www.1 Suppress hello for 0 neighbor(s) R2# Step 6: Use the show ip ospf neighbor command on R1 to verify that the neighbor adjacency with R2 has been restored.6 Interface Serial0/0/0 Serial0/0/1 Task 12: Document the Router Configurations.1.2 192. In this topology we have three routers sharing a common Ethernet multiaccess network.0/24.hr Page 122 of 161 .168. or 2600 routers.168. maximum is 0 msec Neighbor Count is 1 .255. 192.0 255.31.0 255.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.255.255.31.6.168. R3 Task 1: Prepare the Network.168.1. Note: If you use 1700. Erase the configurations and reload the routers.edunet.255.6. Serial 0/0/1 is still operating with default timers.255. the router outputs and interface descriptions will appear different.22 192.2.1.3. R1#show ip ospf neighbor Neighbor ID Pri State 10.10.33 Subnet Mask 255.

Enter a process ID of 1 for the process-ID parameter. 5.3 No backup designated router on this network Timer intervals configured.168. This can happen as the routers are powered-on or when the OSPF network command for that interface is configured. Configure a password for VTY connections Transmit Delay is 1 sec. Network Type BROADCAST. Use an area ID of 0 for the OSPF area-id parameter in the network statement. R2.168. Retransmit 5 Hello due in 00:00:07 Index 1/1. It may take up to 40 seconds for the R3 router to send a hello packet.31. When you have finished.168.0/24 network. maximum is 0 msec Neighbor Count is 1. Configure the OSPF process on the router with the highest router ID first to ensure that this router becomes the DR.3/24. and R3 routers according to the following guidelines: 1. R2.168.1. Dead 40. flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1. Interface address 192. it will not become the DR or BDR even if it has a higher OSPF interface priority or router ID than the current DR or BDR.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.31.168.1. Perform basic configuration of the R1.2/24. Use the show ip interface brief command to verify that the IP addressing is correct.31.hr Page 123 of 161 www. Dead 40. Configure the router to advertise the 192.22.0 0.6. Router ID 192. Configure a password for console connections.168. Configure the OSPF process on the router with the second highest router ID next to ensure that this router becomes the BDR.31. R2(config)#router ospf 1 R2(config-router)#network 192. 3. maximum is 1 Last flood scan time is 0 msec. Wait 40.168. If a new router enters the network after the DR and BDR have already been elected.2 Timer intervals configured. Nbr 192. Adjacent neighbor count is 1 Adjacent with neighbor 192. be sure to save the running configuration to the NVRAM of the router. R3#show ip ospf interface FastEthernet0/0 is up. line protocol is up Internet address is 192.1. Area 0 Process ID 1. Configure an EXEC mode password.168.168.255 area 0 R2(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R2# 00:08:51: %OSPF-5-ADJCHG: Process 1. Disable DNS lookup. and R3.0 0. Configure the router hostname.0.1. the neighbor relationship is formed.1. Interface address 192.168. Priority 1 Designated Router (ID) 192. R2. R2#show ip ospf interface FastEthernet0/0 is up. Step 2: Use the show ip ospf interface command to verify that the OSPF has been configured correctly and that R2 is the BDR.0/24 network. 2. R3(config)#router ospf 1 R3(config-router)#network 192.168. Wait 40.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. Retransmit 5 Hello due in 00:00:03 Index 1/1. Area 0 Process ID 1. be sure to save the running configuration to the NVRAM of the router.168. Cost: 1 Transmit Delay is 1 sec.1.0.3: EIGRP Troubleshooting Lab Task 2: Perform Basic Router Configurations. Adjacent neighbor count is 0 Suppress hello for 0 neighbor(s) R3# Task 5: Configure OSPF on the BDR Router Task 3: Configure and Activate Ethernet and Loopback Addresses Step 1: Configure interfaces on R1.1. line protocol is up Internet address is 192. When you have finished. Cost: 1 www. State DR.1. flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1.hr Page 124 of 161 .31.22. Router ID 192.255 area 0 R3(config-router)#end R3# Step 2: Use the show ip ospf interface command to verify that the OSPF has been configured correctly and that R3 is the DR.1. maximum is 1 Last flood scan time is 0 msec. Interface address 192. 4. Hello 10.31. Loading Done Notice that an adjacency is formed with the R3 router. State BDR.168.3 Backup Designated Router (ID) 192.33.33.3 (Designated Router) Suppress hello for 0 neighbor(s) R2# Task 4: Configure OSPF on the DR Router The DR and BDR election process takes place as soon as the first router has its interface enabled on the multiaccess network.0. When this packet is received. Step 1: Use the router ospf command in global configuration mode to enable OSPF on the R3 router. Use the show ip interface brief command to verify that the IP addressing is correct and that the interfaces are active.33. Network Type BROADCAST. Use an area ID of 0 for the OSPF area-id parameter in the network statement. and R3 routers with the IP addresses from the table under the Topology Diagram.33 on FastEthernet0/0 from LOADING to FULL. Configure the Ethernet and Loopback interfaces on the R1.168. Priority 1 Designated Router (ID) 192.168.1. 6.168. maximum is 0 msec Neighbor Count is 0. Hello 10. Configure the router to advertise the 192.6.edunet. Enter a process ID of 1 for the process-ID parameter. Step 2: Verify IP addressing and interfaces. Step 1: Use the router ospf command in global configuration mode to enable OSPF on the R2 router.0. Configure a message-of-the-day banner.edunet.

31. Exchange Done Notice that an adjacency is formed with the R2 and R3 routers.255 area 0 R1(config-router)#end %SYS-5-CONFIG_I: Configured from console by console R1# 00:16:08: %OSPF-5-ADJCHG: Process 1.31.1.3 Backup Designated Router (ID) 192. Step 1: Use the router ospf command in global configuration mode to enable OSPF on the R1 router.33 1 FULL/DR FastEthernet0/0 Step 3: Use the show ip ospf neighbors command in global configuration mode to view information about the other routers in the OSPF area. Wait 40. Priority 1 Designated Router (ID) 192.22 (Backup Designated Router) Suppress hello for 0 neighbor(s) R1# Task 7: Use the OSPF Priority to Determine the DR and BDR Step 1: Use the ip ospf priority interface command to change the OSPF priority of the R1 router to 255. This is the highest possible priority. R3(config)#interface fastEthernet0/0 R3(config-if)#ip ospf priority 100 R3(config-if)#end Step 3: Use the ip ospf priority interface command to change the OSPF priority of the R2 router to 0.3 Interface Task 6: Configure OSPF on the DRother Router Configure the OSPF process on the router with the lowest router ID last.22 on FastEthernet0/0 from LOADING to FULL. R1(config)#interface fastEthernet0/0 R1(config-if)#ip ospf priority 255 R1(config-if)#end Step 2: Use the ip ospf priority interface command to change the OSPF priority of the R3 router to 100.168. Loading Done 00:16:12: %OSPF-5-ADJCHG: Process 1.168. R1: R1(config)#interface fastethernet0/0 R1(config-if)#shutdown %LINK-5-CHANGED: Interface FastEthernet0/0.168.168.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.33 on FastEthernet0/0 from EXCHANGE to FULL.1.168. Cost: 1 Transmit Delay is 1 sec.1. Hello 10. Adjacent neighbor count is 2 Adjacent with neighbor 192. changed state to administratively down %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0. Retransmit 5 Hello due in 00:00:00 Index 1/1.0/24 network.168.2 192. Interface address 192.168. Step 2: Use the show ip ospf interface command to verify that the OSPF has been configured correctly and that R1 is a DRother.33. Interface address 192. Shut down the FastEthernet0/0 interface on each of the three routers. Notice that R3 is the DR and R2 is the BDR.1.3 Interface Dead Time 00:00:35 00:00:30 Address 192. Nbr 192. changed state to down 02:17:22: %OSPF-5-ADJCHG: Process 1.31.31. maximum is 1 Last flood scan time is 0 msec.168.1/24. line protocol is up Internet address is 192.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.31. Configure the router to advertise the 192.31.22 on FastEthernet0/0 from FULL to Down: Interface down or detached 02:17:22: %OSPF-5-ADJCHG: Process 1.33 (Designated Router) Adjacent with neighbor 192.168. Notice that R3 is the DR.1. Nbr 192.hr Page 125 of 161 www. flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1.168.6.edunet.168. R1(config)#router ospf 1 R1(config-router)#network 192.168. Router ID 192.31.11.168.6.33 on FastEthernet0/0 from FULL to Down: Interface down or detached R2: www.31. maximum is 0 msec Neighbor Count is 2. This router will be designated as DRother instead of DR or BDR.31.3: EIGRP Troubleshooting Lab Step 3: Use the show ip ospf neighbors command in global configuration mode to view information about the other routers in the OSPF area. R1#show ip ospf neighbor Neighbor ID Pri State 192. It may take up to 40 seconds for both the R2 and R3 routers to each send a hello packet. The FastEthernet0/0 interfaces of each of the routers can be shut down and re-enabled to force an OSPF election. Dead 40.22. R2(config)#interface fastEthernet0/0 R2(config-if)#ip ospf priority 0 R2(config-if)#end Step 4: Shut down and re-enable the FastEthernet0/0 interfaces to force an OSPF election. R2#show ip ospf neighbor Neighbor ID Pri State 192.0.22 1 FULL/BDR FastEthernet0/0 192.33 1 FULL/DR FastEthernet0/0 Dead Time 00:00:33 Address 192. State DROTHER. Notice that as the interfaces are shut down the OSPF adjacencies are lost. A priority of 0 causes the router to be ineligible to participate in an OSPF election and become a DR or BDR.168.168.2 Timer intervals configured.0.1. Nbr 192.edunet.168.168.168. Nbr 192.hr Page 126 of 161 .0 0.31. Network Type BROADCAST. R1#show ip ospf interface FastEthernet0/0 is up.31.168.1.31. Use an area ID of 0 for the OSPF area-id parameter in the network statement. Enter a process ID of 1 for the process-ID parameter.1. Area 0 Process ID 1.168.

11 on FastEthernet0/0 from LOADING to FULL.33.168. Priority 100 Designated Router (ID) 192.31. Router ID 192. changed state to down 02:17:06: %OSPF-5-ADJCHG: Process 1.168.31. Cost: 1 Transmit Delay is 1 sec. changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0.22 on FastEthernet0/0 from FULL to Down: Interface down or detached 02:17:22: %OSPF-5-ADJCHG: Process 1. changed state to up R3(config-if)#end %SYS-5-CONFIG_I: Configured from console by console 02:37:32: %OSPF-5-ADJCHG: Process 1. It may take up to 40 seconds for both the R1 and R2 routers to each send a hello packet. Notice that even though the R2 router has a higher router ID than R1. Nbr 192.1.3/24. 192. Exchange Done Step 9: Use the show ip ospf interface command on the R3 router to verify that R3 has become the BDR.11 on FastEthernet0/0 from FULL to Down: Interface down or detached R3: R3(config)#interface fastethernet0/0 R3(config-if)#shutdown %LINK-5-CHANGED: Interface FastEthernet0/0. Nbr 192. Nbr 192.168.168.hr Page 128 of 161 .168. the R2 router has been set to a state of DRother because the OSPF priority has been set to 0.168.168. Exchange Done Step 7: Use the show ip ospf neighbor command on the R1 router to view the OSPF neighbor information for that router.31. changed state to administratively down %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0. Notice that an adjacency is formed with the R2 router.3: EIGRP Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9.31. Nbr 192.168. Area 0 Process ID 1.31.22 on FastEthernet0/0 from EXCHANGE to FULL.31. Loading Done 02:37:36: %OSPF-5-ADJCHG: Process 1.31. R1(config-if)#no shutdown %LINK-5-CHANGED: Interface FastEthernet0/0.edunet. State BDR. R3(config-if)#no shutdown %LINK-5-CHANGED: Interface FastEthernet0/0.168. R3#show ip ospf interface FastEthernet0/0 is up.6. line protocol is up Internet address is 192. changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0.168. R2(config-if)#no shut R2(config-if)#end %SYS-5-CONFIG_I: Configured from console by console R2# Step 6: Re-enable the FastEthernet0/0 interface on the R1 router.1 <output omitted> R1#show ip ospf neighbor Neighbor ID Pri State www.11 on FastEthernet0/0 from FULL to Down: Interface down or detached Step 5: Re-enable the FastEthernet0/0 interface on the R2 router. Interface address 192.33 on FastEthernet0/0 from FULL to Down: Interface down or detached 02:17:06: %OSPF-5-ADJCHG: Process 1.3: EIGRP Troubleshooting Lab R2(config)#interface fastethernet0/0 R2(config-if)#shutdown %LINK-5-CHANGED: Interface FastEthernet0/0. Nbr 192.22 FastEthernet0/0 R1# 0 FULL/DROTHER 00:00:33 192. Nbr 192. Network Type BROADCAST. Nbr 192.11.31.1.1. changed state to down 02:17:22: %OSPF-5-ADJCHG: Process 1.6.hr Dead Time Address Interface Page 127 of 161 www.CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. changed state to administratively down %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0.168.edunet.2 Step 8: Re-enable the FastEthernet0/0 interface on the R3 router.168.31.22 on FastEthernet0/0 from EXCHANGE to FULL.31.168. changed state to up R1(config-if)#end %SYS-5-CONFIG_I: Configured from console by console R1# 02:31:43: %OSPF-5-ADJCHG: Process 1. It may take up to 40 seconds for the R2 router to send a hello packet. Notice that an adjacency is formed with the R1 and R2 routers.

CCNA Exploration Routing Protocols and Concepts: EIGRP Lab 9. Inc. This document is Cisco Public Information. All rights reserved.6. Addressing Table Device Interface Fa0/0 HQ S0/0/0 S0/0/1 Lo1 Fa0/0 Branch1 S0/0/0 S0/0/1 Fa0/0 Branch2 S0/0/0 S0/0/1 PC1 PC2 PC3 NIC NIC NIC 10.edunet.Page 130 of 161 .10. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet).hr Page 129 of 161 All contents are Copyright © 1992–2007 Cisco Systems. Disconnect and store the cabling. reconnect the appropriate cabling and restore the TCP/IP settings.3: EIGRP Troubleshooting Lab Task 8: Document the Router Configurations. capture the following command output to a text file and save for future reference: • • • • Running configuration Routing table Interface summarization Output from show ip protocols Lab 11. Erase the configurations and reload the routers.2: Challenge OSPF Configuration Lab Topology Diagram Task 9: Clean Up.255.6. On each router.255.1 255.252 IP Address Subnet Mask Default Gateway N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A www.10.

What is the network address of this subnet? ______________________ 4.2: Challenge OSPF Configuration Lab CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. o The HQ LAN will require 8000 addresses o The Branch1 LAN will require 4000 addresses o The Branch 2 LAN will require 2000 addresses o The links between the routers will require two addresses for each link The loopback address representing the link between the HQ router and the ISP will use the 10. Task 2: Determine Interface Addresses. Assign subnet 3 of the 172.20.20. The addressing for the Network has the following requirements.0. What is the network address of this subnet? ______________________ 3. Assign the last valid IP address of the HQ LAN network to PC2.20. • The 172.16. Assign appropriate addresses to the device interfaces.0/16 network to the HQ LAN subnet.0. 4. Assign subnet 1 of the 172.10. Page 132 of 161 .edunet. you will be able to: • • • • • • • • • Create an efficient VLSM design given requirements Assign appropriate addresses to interfaces and document Cable a network according to the Topology Diagram Erase the startup configuration and reload a router to the default state Configure routers including OSPF Configure and propagate a static default route Verify OSPF operation Test and verify full connectivity Reflect upon and document the network implementation What subnet mask will be used for the Branch2 LAN subnet? _____________________ What is the maximum number of host addresses that could be used on this subnet? __________ What subnet mask will be used for the links between the three routers? ____________________ What is the maximum number of host addresses that could be used on each of these subnets? ________ Step 3: Assign subnetwork addresses to the Topology Diagram.20.0/16 network to the Branch1 LAN subnet.6.20.0/16 network must be subnetted to provide addresses for the LANs and serial links.10. Assign the first valid IP address of the HQ LAN network to the LAN interface of the HQ router.10. 1. Assign the last valid IP address of the Branch1 LAN network to PC1. What is the network address of this subnet? ___________________________ 5. 5.0/16 network? ____________ What subnet mask will be used for the HQ LAN subnet? ________________________ What is the maximum number of host addresses that could be used on this subnet? __________ What subnet mask will be used for the Branch1 LAN subnet? ___________________ What is the maximum number of host addresses that could be used on this subnet? __________ www.0/30 network to the Loopback 1 interface on the HQ router.20.0.edunet. Page 131 of 161 www.hr .CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. Assign subnet 0 of the 172.0.6.0. How many subnets need to be created from the 172.0/16 network to the Branch2 LAN subnet.20.20. Task 1: Subnet the Address Space.10.0. you will be given a network address that must be subnetted using VLSM to complete the addressing of the network shown in the Topology Diagram.0/16 network to the link between the HQ and Branch1 routers. What is the network address of this subnet? _________________ 2.0/16 network to the link between the HQ and Branch2 routers.2: Challenge OSPF Configuration Lab Learning Objectives Upon completion of this lab. OSPF area ID of 0 and process ID of 1 will be used in all OSPF configurations. Assign the last valid IP address of the Branch2 LAN network to PC3. Step 1: Examine the network requirements.0/16 network to the link between the Branch1 and Branch2 routers.hr . 7. 6.0/16 network? ________ How many total IP addresses are required from the 172. Assign the first valid host address in the 10. Assign subnet 2 of the 172.0. What is the network address of this subnet? ___________________________ 6. What is the network address of this subnet? ____________________ Scenario In this lab activity. Assign subnet 5 of the 172. • Step 2: Consider the following questions when creating your network design. 3. 2. 1. Assign the first valid IP address of the Branch2 LAN network to the LAN interface of the Branch2 router. A combination OSPF routing and static routing will be required so that hosts on networks that are not directly connected will be able to communicate with each other. Assign subnet 4 of the 172.0.0. Assign the first valid IP address of the Branch1 LAN network to the LAN interface of the Branch1 router.0/30 network.

Page 134 of 161 .edunet. Task 5: Configure and Activate Serial and Ethernet Addresses. PC2.6. 10. Step 1: Configure the interfaces on the HQ. be sure to save the running configuration to the NVRAM of the router. 11. Step 3: Configure the correct bandwidth for the serial interfaces on the Branch 1 router. and PC3 with the IP addresses from the table provided under the Topology Diagram. 5. 12. You can use any current router in your lab as long as it has the required interfaces as shown in the topology. Branch1. Assign the first valid IP address of the HQ to Branch2 link network to the Serial 0/0/1 interface of the HQ router. Page 133 of 161 www. Synchronize unsolicited messages and debug output with solicited output and prompts for the console and virtual terminal lines. Configure a password for console connections. Assign the last valid IP address of the HQ to Branch1 link network to the Serial0/0/0 interface of the Branch router.hr . 3. Configure an EXEC timeout of 15 minutes. Perform basic configuration of the BRANCH.edunet. HQ. 8. Configure a message-of-the-day banner.6. _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ www. and Branch2 routers with the IP addresses from the table provided under the Topology Diagram. What commands are required to accomplish this? _____________________________________________________________________________ Task 4: Perform Basic Router Configurations. Assign the last valid IP address of the HQ to Branch2 link network to the Serial0/0/1 interface of the Branch2 router. Step 2: Configure the Ethernet interfaces of PC1. 4. Configure the router hostname. 6. 7. Assign the first valid IP address of the Branch1 to Branch2 link network to the Serial 0/0/1 interface of the Branch1 router. When you have finished. Step 2: Clear any existing configurations on the routers. 9. Assign the first valid IP address of the HQ to Branch1 link network to the Serial 0/0/0 interface of the HQ router. _____________________________________________________________________________ _____________________________________________________________________________ Step 4: Configure the correct bandwidth for the serial interfaces on the Branch 2 router. 13. and ISP routers according to the following guidelines: 1.2: Challenge OSPF Configuration Lab CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. What commands are required to accomplish this? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Task 3: Prepare the Network. Assign the last valid IP address of the Branch1 to Branch2 link network to the Serial0/0/0 interface of the Branch2 router. Configure an EXEC mode password.hr .2: Challenge OSPF Configuration Lab 8.CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. Configure a password for VTY connections. Step 1: Cable a network that is similar to the one in the Topology Diagram. Disable DNS lookup. Document the addresses to be used in the table provided under the Topology Diagram. 2.

Step 1: Consider the type of static routing that is needed on HQ.6.6. You should NOT have connectivity between end devices yet. Page 136 of 161 . What directly connected networks are present in the HQ routing table? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Task 7: Configure OSPF Routing on the Branch1 Router.2: Challenge OSPF Configuration Lab Step 5: Configure the correct bandwidth for the serial interfaces on the HQ router. What commands are required to accomplish this? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Are there any router interfaces that do not need to have OSPF updates sent out? ____________ What command is used to disable OSPF updates on these interfaces? _____________________________________________________________________________ Task 8: Configure OSPF and Static Routing on the HQ Router.edunet. and PC3 can ping their respective default gateway. What command is needed to accomplish this? _____________________________________________________________________________ Task 6: Verify Connectivity to Next Hop Device. you can test connectivity between two routers and between and end device and its default gateway. However.hr . Step 1: Verify that the HQ. Page 135 of 161 www. Step 2: Verify that PC1.hr .2: Challenge OSPF Configuration Lab CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. What directly connected networks are present in the Branch1 routing table? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ What commands are required to enable OSPF and include the connected networks in the routing updates? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Will the networks of the HQ LAN and the links between the Branch 1 and Branch2 routers need to have the subnet mask information included in the network statements? __________ What commands are required to enable OSPF and include the appropriate networks in the routing updates? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Are there any router interfaces that do not need to have OSPF updates sent out? ____________ What command is used to disable OSPF updates on these interfaces? _____________________________________________________________________________ _____________________________________________________________________________ www.CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. and Branch2 routers can ping each of the neighboring routers across the WAN links. Branch1. PC2.edunet. Step 1: Consider the networks that need to be included in the OSPF updates that are sent out by the Branch1 router. A static default route will need to be configured to send all packets with destination addresses that are not in the routing table to the loopback address representing the link between the HQ router and the ISP.

6. _____________________________________________________________________________ _____________________________________________________________________________ What is the gateway of last resort in the routing table of the Branch2 router? _____________________________________________________________________________ www. If any of the above pings failed.edunet.6.edunet.CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. is it possible to ping PC2? ____________ From PC1. Step 1: Consider the networks that need to be included in the OSPF updates that are sent out by the Branch2 router. Page 138 of 161 . From PC1. What command is used to configure this? _____________________________________________________________________________ What OSPF routes are present in the routing table of the Branch1 router? _____________________________________________________________________________ _____________________________________________________________________________ Task 9: Configure OSPF Routing on the Branch2 Router. is it possible to ping the PC3? ___________ The answer to the above questions should be ‘yes’.2: Challenge OSPF Configuration Lab The HQ router needs to send the default route information to the Branch1 and Branch2 routers in the OSPF updates.hr . Page 137 of 161 www.hr .2: Challenge OSPF Configuration Lab CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. check your physical connections and configurations. What directly connected networks are present in the Branch2 routing table? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ What is the gateway of last resort in the routing table of the Branch1 router? _____________________________________________________________________________ What OSPF routes are present in the routing table of the HQ router? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ What is the gateway of last resort in the routing table of the HQ router? _____________________________________________________________________________ What commands are required to enable OSPF and include the connected networks in the routing updates? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Are there any router interfaces that do not need to have OSPF updates sent out? ____________ What command is used to disable OSPF updates on these interfaces? _____________________________________________________________________________ What OSPF routes are present in the routing table of the Branch2 router? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Task 10: Verify the Configurations Answer the following questions to verify that the network is operating as expected. Refer to your basic troubleshooting techniques used in the [Chapter 1] labs.

1 10.252.255.10.255.10.1 172.10.254.Page 140 of 161 .txt) file and save for future reference.0 255.252.254 Subnet Mask 255.254 10.254 10.0.3: OSPF Troubleshooting Lab Topology Diagram Is this the least number of hops that can be used to reach PC3? ____________ If the answer is no.4.edunet.255. www. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet). Disconnect and store the cabling.10.1 172.16. use the tracert command to examine the route that is used between PC1 and PC3.255.0 Default Gateway N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A 10.255.16.6.7.6.2: Challenge OSPF Configuration Lab Task 11: Reflection On PC1.252 255.10.7.0.252 255.1 10.255. What are the hops in the route to PC3? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Lab 11.1 172.16.255.255.hr .252 255.7.165.254.10 172.255.254.5.129 10.0 255.1 172.4.6.16. why is a path with more than the minimum amount of hops used? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Device Interface Fa0/0 HQ S0/0/0 S0/0/1 Lo1 Fa0/0 Branch1 S0/0/0 S0/0/1 Fa0/0 Branch2 S0/0/0 S0/0/1 PC1 PC2 PC3 NIC NIC NIC IP Address 10.10.10.255.255.255.255.7.5.7.252 255.6 10.255.16. All rights reserved.252 255.255.CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. capture the following command output to a text (.0 255.255.3.254. reconnect the appropriate cabling and restore the TCP/IP settings. Page 139 of 161 All contents are Copyright © 1992–2007 Cisco Systems.255.16. This document is Cisco Public Information.5 209.255.2 172.255.1 Task 13: Clean Up Erase the configurations and reload the routers. • • • • show running-config show ip route show ip interface brief show ip protocols If you need to review the procedures for capturing command output.1 Addressing Table Task 12: Documentation On each router.252 255.6.7.9 10. Inc.10.0 255.10.252 255.0 255.7. refer to Lab 1.202.255.

254.252 no shutdown ! interface Serial0/0/1 ip address 172.6.0 0.254.edunet. Step 1: Cable a network.16.255.9 255.7.0 0. OSPF routing is configured on the Branch2 router. hostname Branch2 ! ! ! interface FastEthernet0/0 ip address 10. Gather information about the misconfigured portion of the network along with any other errors.0.hr Page 142 of 161 Task 1: Cable. These scripts contain errors that will prevent end-to-end communication across the network. all of the hosts on the network should be able to communicate with each other. The HQ router must redistribute the default route to the Loopback interface in the routing updates.10 255. When you have corrected all of the configuration errors.3: OSPF Troubleshooting Lab Learning Objectives Upon completion of this lab. and then use the appropriate commands to correct the configurations.CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11.255.252 ! router ospf 1 log-adjacency-changes passive-interface Serial0/0/1 network 172.10.0.16.10.1.255 area 0 www. Document the corrected network. you will be able to: • • • • • • • • • Cable a network according to the Topology Diagram. OSPF updates must be disabled on the LAN and Loopback interfaces.0 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 172. you will begin by loading configuration scripts on each of the routers.255. You will need to troubleshoot each router to determine the configuration errors.255.0.10. Analyze information to determine why communication is not possible. The network should also have the following requirements met: • • • • • • • OSPF routing is configured on the Branch1 router.255.255.0. OSPF routing is configured on the HQ router. Clear the configuration on each of the routers using the erase startup-config command and then reload the routers.4 0.7. and Reload the Routers.0 duplex auto speed auto no shutdown ! interface Serial0/0/0 ip address 172.3: OSPF Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11.255.7.7.252 clock rate 64000 no shutdown ! interface Serial0/0/1 ip address 172.3 area 0 network 172.4.3.6.16.0 0.0.16.16.255.0.10.255.7.1 255.6.hr Page 141 of 161 .0.3 area 0 network 172. Cable a network that is similar to the one in the Topology Diagram.7.4. All OSPF routers must use a process ID of 1. ! interface FastEthernet0/0 ip address 10. Erase. All OSPF routers must be in area 0.6 255. Step 2: Clear the configuration on each router.2 255.252 no shutdown ! router ospf 2 passive-interface FastEthernet0/0 network 10. Load the routers with supplied scripts.0.0.16.3 area 0 network 10.255.3 area 0 ! ip classless ! line con 0 line vty 0 4 login ! ! end Step 2: Load the following script onto the Branch2 router.8 0. Propose solutions to network errors.7.6.edunet.8 0.16.1 255. Discover where communication is not possible.7. Task 2: Load Routers with the Supplied Scripts Step 1: Load the following script onto the Branch1 router: hostname Branch1 ! ! no ip domain-lookup www.255 area 0 network 172.0. Implement solutions to network errors.16. Erase the startup configuration and reload a router to the default state. Scenario In this lab. Answer no if asked to save changes.

255.16.0.16.0 duplex auto speed auto no shutdown ! ! interface Serial0/0/0 ip address 172.16.0 0.0.7.10.129 255.3: OSPF Troubleshooting Lab CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11.0 loopback1 ! line con 0 line vty 0 4 login ! ! end Task 4: Reflection There were a number of configuration errors in the scripts that were provided for this lab.10.1 255. ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ ___________________________________________________________________________________ www.6.0.0.7.0.252 clock rate 64000 no shutdown ! interface Loopback1 ip address 209.edunet.252.7.edunet.202.252 ! router ospf 1 log-adjacency-changes passive-interface FastEthernet0/0 passive-interface Loopback1 network 172.0 0.hr Page 144 of 161 .0.7.16. Use the space below to write a brief description of the errors that you found.255 area 0 ! ip classless ip route 0.255.CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11. • • • • show running-config show ip route show ip interface brief show ip protocols Step 3: Load the following script onto the HQ router.4 0.0.255.0.3 area 0 network 10.255.255.0.6.10.3: OSPF Troubleshooting Lab ! ip classless ! line con 0 line vty 0 4 login ! ! end Task 3: Troubleshooting Use this commands to find configuration errors in the scripts that were provided for this lab.3 area 0 network 172.7.252 no shutdown ! interface Serial0/0/1 ip address 172.1 255. hostname HQ ! ! no ip domain-lookup ! interface FastEthernet0/0 ip address 10.5 255.0 0.165.255.255.0.hr Page 143 of 161 www.

192/29 [120/2] via 10.16.16.periodic downloaded static route Gateway of last resort is not set 10.2: Show IP Route Challenge Lab Addressing Table Device Interface IP Address Subnet Mask In this lab activity.10.10. E2 .OSPF.192/26 [120/1] via 10.10.0/27 is directly connected.1.4.0/25 is directly connected.2: Show IP Route Challenge Lab Scenario Lab 8.16.0. 5 masks 172.OSPF NSSA external type 1.RIP.4.6. B – BGP D .10. N2 . 4 subnets 10.candidate default.16. R1#show ip route R1 Codes: C . Serial0/0/1 172. Inc. Serial0/0/1 192. Cable a network according to the Topology Diagram.6. Serial0/0/0 10.EIGRP external. S .OSPF external type 1. R . 00:00:09.10.2.128/26 [120/1] via 10. When complete.10. 00:00:09.IS-IS level-1. All rights reserved. Serial0/0/1 172. EX .IGRP.10. 00:00:09.1.10. O . ia .0 [120/1] via 10.CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8.16.128/25 [120/2] via 10.10. L2 .6. M .10.10.168. 00:00:09.12 [120/1] via 10. you will determine the topology of a network using the outputs from the show ip route command. IA .10. This document is Cisco Public Information. 00:00:09.0/30 is subnetted. L1 .16. 00:00:09.64/27 [120/1] via 10.10. Serial0/0/0 10.IS-IS level-2.6.hr Page 146 of 161 . FastEthernet0/0 172. you will be able to: • • • • • Determine network topology based on the outputs from the show ip route command. Serial0/0/0 172. U . Perform basic configuration tasks on a router. 10 subnets.connected. The DTE and DCE assignment is at your discretion.IS-IS.4.0/26 [120/2] via 10.10.10. You must draw a topology diagram and determine the interface addressing on each router.10.EIGRP. Step 1: Examine the output from the R1 router.10.Page 145 of 161 www.0.16.10.1.10. Serial0/0/0 172.0/16 is variably subnetted.10.1.16.10.10.0.10.2.3.edunet.per-user static route.0.10. FastEthernet0/1 172.10.16.static.3. 00:00:09.4 is directly connected. Serial0/0/1 172.32/28 [120/2] via 10.OSPF inter area N1 . Loopback0 R2 R3 R C C R C R R R R C R R R R C S* R4 R5 Learning Objectives Upon completion of this lab. Then you must build and configure the network based on the outputs.6.0/24 is directly connected.10.10. 00:00:09.16.OSPF NSSA external type 2 E1 .0.10.10.16.10. Serial0/0/0 172.0/0 is directly connected. All contents are Copyright © 1992–2007 Cisco Systems.0/27 [120/1] via 10. Serial0/0/1 10.IS-IS inter area * . I .mobile. Determine level 1 and level 2 routes. 00:00:09.OSPF external type 2. E – EGP i .4.8 is directly connected.10. 00:00:09. Serial0/0/1 172. Serial0/0/0 172. the outputs from your network must match those given below. o – ODR P . Task 1: Examine the router outputs.3. Determine router interface addressing based on outputs. Loopback0 0.10.10.

2: Show IP Route Challenge Lab Step 2: Examine the output from the R2 router. Serial0/0/0 172.9.10. 00:00:04.OSPF external type 1. Serial0/0/0 0.5. O . 4 subnets 10. o – ODR P .2. Serial0/0/0 0. 00:00:17.2.10.10. R3#show ip route Codes: C .2.OSPF NSSA external type 2 E1 .per-user static route.10.0/27 [120/3] via 10.10. FastEthernet0/1 172. Serial0/0/0 172.0.1. 4 subnets 10.2. 00:00:04.128/25 [120/1] via 10.2.2.IS-IS.0/24 [120/2] via 10.IGRP.10. Serial0/0/0 10.IS-IS level-2.5.2.10.1.10.10.0 Step 3: Examine the output from the R3 router.32/28 [120/1] via 10.2.10.0.OSPF.10.10. Serial0/0/0 172.mobile. Serial0/0/0 C C R R R R C R R R C R R R R R* C R R R R R R C R R R C R R R R* 10.192/26 [120/2] via 10.2. FastEthernet0/0 172.10.10. Serial0/0/0 172. Serial0/0/0 172.OSPF NSSA external type 2 E1 . 00:00:04.2.10.0.0/30 is subnetted.16.0. IA . 00:00:14.RIP.16. Serial0/0/0 192.10.10. B – BGP D .4 [120/1] via 10.10.10.3.10.8 [120/2] via 10.10.192/29 [120/1] via 10. 00:00:14.10.4. E – EGP i .0 is directly connected.5.connected.8 is directly connected.10. Serial0/0/1 172.192/26 [120/1] via 10.0.IS-IS inter area * .9. L1 .OSPF external type 1. N2 . 00:00:04. 00:00:14.10.10. U .10. 5 masks 172.OSPF inter area N1 . I .candidate default.10.static. 00:00:04.10.16. 5 masks 172.9.10. I .4.16.192/29 [120/3] via 10.0.10. 00:00:03.10.OSPF. O . FastEthernet0/1 172.192/26 is directly connected. Serial0/0/1 172. R .5.edunet.1.IS-IS. 00:00:14.2: Show IP Route Challenge Lab CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8. M . 00:00:04. R4#show ip route Codes: C .64/27 is directly connected. 00:00:14.edunet.16.0/16 is variably subnetted. 00:00:04.10.0/26 [120/3] via 10.10.16. E2 .0/30 is subnetted.IS-IS level-1.2.9.16. O .3.0.per-user static route.2.2. E2 .10.0/25 [120/2] via 10.0.10.RIP.10.IS-IS inter area * .10. 00:00:04.10.0/24 [120/1] via 10. 00:00:04. 4 subnets 10. o – ODR P . FastEthernet0/1 172.10.OSPF inter area N1 .2.10.1. ia .4 is directly connected.14. Serial0/0/0 172.0 10. 00:00:04. Serial0/0/1 172. L2 . 00:00:04.1.10.10. L2 . Serial0/0/0 172.10.0/27 is directly connected. 10 subnets.12 [120/3] via 10.connected.0. Serial0/0/0 10.3. 00:00:04. Serial0/0/0 192.10. 00:00:04.0. Serial0/0/0 172.OSPF NSSA external type 1.0.16.10.EIGRP. R . Serial0/0/0 10.16. 00:00:14.4.10. Serial0/0/0 Step 4: Examine the output from the R4 router. Serial0/0/1 10.16.10.candidate default.32/28 [120/4] via 10.0/27 [120/1] via 10. 00:00:04.16. E – EGP i . E – EGP i .10.5.3. I .10. 00:00:04.0/30 is subnetted.9.periodic downloaded static route Gateway of last resort is 10. Serial0/0/1 192.10.OSPF NSSA external type 2 E1 .10.10.0 is directly connected. 10 subnets.10.128/26 [120/1] via 10.IS-IS level-2.10. Serial0/0/0 10.0.0/0 [120/1] via 10. B – BGP D . 00:00:14.10.0/16 is variably subnetted.10.10. 5 masks 172.3. EX .10.10.4.2.10.128/26 is directly connected. S . FastEthernet0/0 172.periodic downloaded static route Gateway of last resort is 10.2 to network 0.5.0.4. 00:00:14. N2 . 00:00:04.10.10.0 [120/2] via 10.168. Serial0/0/0 172.168.connected.1.10.2.9.128/25 [120/4] via 10. M .16. Serial0/0/0 172. E2 . Serial0/0/0 10.16.5.64/27 [120/2] via 10.static.10.10.10.192/29 is directly connected. S .10.16.0/27 [120/1] via 10. U .10.16. 00:00:04.16.10.16.IS-IS. Serial0/0/0 10.CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8. 00:00:04.2.16.10. 10 subnets.hr Page 147 of 161 www.10.0.10.RIP.1. 00:00:03.16.IGRP.3. EX .10. L1 .128/25 [120/3] via 10.10.0/27 [120/2] via 10. M .10.static.candidate default.5.0. Serial0/0/0 172.OSPF.10.16.0.2.IS-IS level-1.4 [120/1] via 10. B – BGP D . Serial0/0/0 172.4.hr Page 148 of 161 .16. Serial0/0/0 172.9.1.OSPF external type 1.mobile.10.0/0 [120/1] via 10.10.IS-IS level-1.9.4.168.1.16.1. 00:00:04.periodic downloaded static route Gateway of last resort is 10. Serial0/0/0 www.0/25 [120/1] via 10.2. Serial0/0/0 172. R . Serial0/0/0 172.10.3. Serial0/0/0 172. Serial0/0/1 172.OSPF external type 2.10. FastEthernet0/0 172.1.10. 00:00:04. Serial0/0/0 172.0/27 [120/2] via 10.4.8 [120/1] via 10. N2 .10. Serial0/0/0 0.10.10.14.16. Serial0/0/0 10. IA .3.0/26 [120/1] via 10.10.12 [120/2] via 10.10.0/26 is directly connected.0/25 [120/1] via 10.16. Serial0/0/0 10.64/27 [120/3] via 10. 00:00:04.16. 00:00:14.16.OSPF inter area N1 .16.0 R R C C R R R R C R R R C R R R* 10. ia .1.10.32/28 [120/3] via 10.10. Serial0/0/0 172.0/16 is variably subnetted.IS-IS level-2.OSPF NSSA external type 1.16. R2#show ip route Codes: C .5. 00:00:17.16. 00:00:04.10.16. IA .12 is directly connected.5. Serial0/0/0 172.0.EIGRP external.10.9.10.10.EIGRP external.9.0.10.0/0 [120/2] via 10.16.IS-IS inter area * .10.0/24 [120/1] via 10.10.10.EIGRP external.10. Serial0/0/0 172. o – ODR P .per-user static route.OSPF external type 2.10.128/26 [120/2] via 10. U .16. EX . 00:00:14.0.9 to network 0.IGRP.0.10.0.10.1.OSPF NSSA external type 1. S .mobile.EIGRP.10. ia . L1 .EIGRP.10.OSPF external type 2.5 to network 0. 00:00:04. L2 .10.16.1.3.10.

E – EGP i .13. 00:00:21.0/30 is subnetted.10.16. S .0.16.hr Page 150 of 161 .16. R R R C R C R R R R R R R C R R* www.periodic downloaded static route Gateway of last resort is 10. Serial0/0/0 172.10. Serial0/0/0 172.16.OSPF inter area N1 . 00:00:21.static.2: Show IP Route Challenge Lab Step 5: Examine the output from the R5 router.16.13.0 10.RIP.10.13.13.10.10.192/29 [120/4] via 10.16. O . I . Serial0/0/0 10.10.10.10.16. N2 .13.10.OSPF NSSA external type 2 E1 .10.per-user static route.10.13.OSPF.10. IA . Serial0/0/0 172.1.10.1.10. Serial0/0/0 0. Serial0/0/0 Task 2: Create a diagram of the network based on the router outputs.64/27 [120/1] via 10. 00:00:21. R5#show ip route Codes: C .0.10.10.128/25 is directly connected.0. 00:00:21.0/24 [120/2] via 10. FastEthernet0/1 172.13.13.4 [120/2] via 10. Serial0/0/0 10.13 to network 0.10.13.4.0.16.192/26 [120/3] via 10.2.0/0 [120/2] via 10.connected.0/27 [120/2] via 10.IGRP.3.OSPF NSSA external type 1. o – ODR P .10. ia .0. 4 subnets 10. 00:00:21.IS-IS level-1.10.10. Serial0/0/0 172.edunet.8 [120/1] via 10.0/26 [120/4] via 10. U . Serial0/0/0 172.0/25 [120/2] via 10.13.10. 00:00:21. L1 . L2 .10.mobile.10. E2 .128/26 [120/3] via 10. M .10.13.4.13.OSPF external type 2.4.IS-IS.10. 5 masks 172. R .4.10.edunet.EIGRP. 00:00:21.32/28 is directly connected.2.10.16. Serial0/0/0 172. Serial0/0/0 172.EIGRP external. B – BGP D .candidate default.IS-IS level-2. 00:00:21. Step 1: Draw a diagram of the network based on your interpretation of the router outputs in the space provided below.0.10.0 [120/3] via 10. Serial0/0/0 172. 10 subnets.10.3.1.13.0/27 [120/1] via 10.1.168.10. 00:00:21.CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8.0. 00:00:21. EX .IS-IS inter area * .10.2: Show IP Route Challenge Lab CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8.12 is directly connected.16.3. Serial0/0/0 172. FastEthernet0/0 192.10. 00:00:21.10. Serial0/0/0 10.10. 00:00:21.10. 00:00:21.0/16 is variably subnetted.10.16.OSPF external type 1.hr Page 149 of 161 www.

How many total networks/subnets did R2 learn from its neighbors? __________ Where would R2 send packets to networks not currently in its routing table? Why? ______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Which networks are directly connect to R3? _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Step 4: Examine the R4 routing table.10. How many routers must a packet pass through to get from R5 to network 172.2. What does the statement “ R* 0.2: Show IP Route Challenge Lab CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8. Step 3: Configure the appropriate routing protocol for each router and advertise all directly connected networks.10.0/0 [120/2] via 10.hr Page 151 of 161 www. Which network is the furthest distance from R4 and how many hops away is it? _____________________________________________________________ How many usable host addresses are on the network furthest from R4? __________ Step 5: Examine the R5 routing table. Which Level 2 routes did R3 learn about from its neighbors? _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Task 4: Identify Routing Processes. 1841 or 2811 routers can be used.0.2: Show IP Route Challenge Lab Step 2: Document the interface addresses in the Addressing Table. 00:00:04.13? _____________________________________________________________ www.edunet. Step 4: Verify that configurations match the router outputs from Task 1.10.0.0/26? __________ Why is the “Gateway of last resort” for R5 listed as 10.4.16.10.CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8. Step 1: Examine the R1 routing table.4. ______________________________________________________________________________________ Step 3: Examine the R3 routing table.2.edunet.hr Page 152 of 161 . Step 1: Build the topology diagram in Packet Tracer. Serial0/0/0” at the end of the R2 routing table represent? Task 3: Build and Configure the Diagram using Packet Tracer. Step 2: Configure the interfaces with the appropriate IP address and subnet mask. What are the IP addresses of the directly connected neighbors of the R1 router? _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Which routes did R1 learn from the directly connected neighbors? _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ Step 2: Examine the R2 routing table.

R3(config)#ip route 172.255.255.255.0 255. Configure RIP version 1 routing on each of the routers.255. Configure a password for console connections.0.255.255. 4. 3.0 255.16. All rights reserved.255.16. Configure a message-of-the-day banner.0 N/A N/A N/A N/A N/A N/A N/A 172.16.2 172.1.10 Subnet Mask 255. or 2600 routers. Configure an EXEC mode password.1 192. be sure to save the running configuration to the NVRAM of the router.1. R2.16.1 172. Configure the interfaces on the R1. This document is Cisco Public Information. Disable DNS lookup.2 192.16. R2.CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8. 6. PC2. Inc.10 172. and PC3.3.255.255.168.168.16.3.0 255.255. 2. All contents are Copyright © 1992–2007 Cisco Systems.2.1. Default Gateway Device R1 Interface Fa0/0 S0/0/0 Fa0/0 R2 S0/0/0 S0/0/1 R3 PC1 PC2 PC3 Fa0/0 S0/0/1 NIC NIC NIC IP Address 172.16. Step 3: Configure Ethernet interfaces of PC1.0 255.16. R2. 5.1 172.1 172.4.16.255.2.255. and R3. Task 2: Perform Basic Router Configurations. Configure the Ethernet interfaces of PC1.255. Task 3: Configure and Activate Serial and Ethernet Addresses.4. PC2.4.0 255. Step 1: Configure interfaces on R1. Step 2: Verify IP addressing and interfaces.4.255. and PC3 with the IP addresses and default gateways from the table under the Topology Diagram.1.16. Configure a password for VTY connections.16. Step 2: Clear any existing configurations on the routers.3.0/16 on R3. and R3 routers with the IP addresses from the table under the Topology Diagram. the router outputs and interface descriptions will appear different. Perform basic configuration of the R1.0.16.0 255.0 Serial0/0/1 Step 4: Test the PC configuration by pinging the default gateway from the PC.255.0 255.1: Investigating the Routing Table Lookup Process Classful and Classless Routing Behavior Topology Diagram Step 1: Cable a network that is similar to the one in the Topology Diagram.4. Include network statements for each of the directly connected networks. and R3 routers according to the following guidelines: 1.0 255.255.0 255.255. 2500.edunet.1 Step 1: Configure a static route to 172.1 172. Note: If you use 1700.1.16.1: Investigating the Routing Table Lookup Proccess Task 1: Prepare the Network.Page 153 of 161 www.255.255. When you have finished.0 255.1 172.hr Page 154 of 161 .0.1 172. Use the show ip interface brief command to verify that the IP addressing is correct and that the interfaces are active. Lab 8. Configure the router hostname.. You can use any current router in your lab as long as it has the required interfaces shown in the topology. Task 4: Configure RIP.255.10 172.255.

0/16? ________ Since the no ip classless command has been used to configure the R2 router to use classful routing behavior.16.10 Type escape sequence to abort. Serial0/0/1 R R C C C R2# Step 3: Ping from R2 to PC3 and observe the results.0 is directly connected.168.0/24 is directly connected. it will not be used.1.edunet.16. FastEthernet0/0 192.0/16 parent network? ____________________________________________________ R2(config)#ip route 0. 100-byte ICMP Echos to 172.16.10. 00:00:00.1. R2#ping 172.4. the child routes are checked. Step 3: Add a static default route to R3 on the R2 router.16. 00:00:13. Notice that the routing table is the still the same even though the router configuration has been changed to use classless routing behavior. Serial0/0/1 [120/1] via 172.16.2.0.16.0 0.1.0.16. and the packet will be dropped.0. Serial0/0/0 Step 2: Examine the routing table on the R2 router. 4 subnets [120/1] via 192. Sending 5.0.3.hr Page 155 of 161 www.2.16..hr Page 156 of 161 .1: Investigating the Routing Table Lookup Proccess CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8.0 Serial0/0/1 R2(config)#router rip R2(config-router)#default-information originate ____________________________________________________ ____________________________________________________ How many bits in the destination address must match in order for a packet to be forwarded using one of the child routes? ________ Does the destination address of the ping packets match any of the child routes of 172. Task 6: Enable Classful Routing Behavior on the Routers Step 1: Use the no ip classless command to configure the route lookup process to use classful route lookups.0/24 is subnetted.1.edunet.2.1. What are the child routes of the 172.0.4.16.2.0. Include the default-information originate command in the configuration so that the default static route is included in the RIP updates.0.0.0.4. 00:00:13. R2#show ip route <output omitted> Gateway of last resort is not set 172.CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8.0 172.1. R1 R1(config)#ip classless R2 R2(config)#ip classless R3 R3(config)#ip classless Step 2: Examine the routing table on R2.168.0 The ping is unsuccessful because the router is using classful routing behavior. The route lookup process on the R2 router searches the routing table and finds that the first 16 bits of the destination address are a match with the parent route 172...1.16. Serial0/0/0 172. Serial0/0/1 172.16. 00:00:00.0.1: Investigating the Routing Table Lookup Proccess Step 2: Configure RIP on R2.16.0.16. Serial0/0/0 172.0 172. 4 subnets 172.2. timeout is 2 seconds: .2.16.16.0 is directly connected.4.. Success rate is 0 percent (0/5 ) R R C www.0 [120/1] via 192. once a level 1 match is found the router will not search beyond the child routes for a lesser match.0 [120/1] via 172. R2#show ip route <output omitted> Gateway of last resort is not set 172. Serial0/0/0 is directly connected.16.168. Even though there is a default static route configured.0 is subnetted. Since the destination address matches the parent route.16.0.0/16. R1 R1(config)#no ip classless R2 R2(config)#no ip classless R3 R3(config)#no ip classless Task 7: Enable Classless Routing Behavior on the Routers Step 1: Use the ip classless command to reenable classless routing. R2(config)#router rip R2(config-router)network 172.0/24 172.

Task 2: Perform Basic Router Configurations. 2.1. the router outputs and interface descriptions will appear different. FastEthernet0/0 192. Since classless routing behavior is configured.16.hr Page 157 of 161 All contents are Copyright © 1992–2007 Cisco Systems. S* 0.0. 2 masks 172.0.16. which means that no bits need to match. In this case.0/16 but there is not a match with any of the child routes of this parent route.0/24 subnet route and the 172.1. 4.0/16 is directly connected.16. You can use any current router in your lab as long as it has the required interfaces shown in the topology.4.4.0. 3.4.16.0.168.0/16 classful network route are level 2 child routes of the 172. R3#show ip route <output omitted> Gateway of last resort is not set 172.0/0 is directly connected.0. Serial0/0/1 Since there is a default route configured on the R2 router. The destination address of the packet is a match with the level 1 parent route 172.0. Note: If you use 1700. round-trip min/avg/max = 28/28/28 ms The ping is successful this time because the router is using classless routing behavior.0.0. Step 1: Cable a network that is similar to the one in the Topology Diagram. both the 172. Perform basic configuration of the routers according to the following guidelines: 1.3.0 is directly connected. R3 uses the 172. or 2600 routers.0/24 is directly connected. Serial0/0/1 Lab 8. Configure the router hostname.16. Inc.CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8. 2500. Step 2: Clear any existing configurations on the routers.0/24 is directly connected.3: Configuring Dynamic Routing Step 3: Repeat the ping from R2 to PC3 and observe results.16. but the route is still a match.16. Sending 5.0/16 child route and forwards the return traffic out Serial 0/0/1 back to R2. In classless routing behavior. Serial0/0/1 172.16.10 Type escape sequence to abort. Disable DNS lookup.10. if no other route matches. the default route will always match.1: Investigating the Routing Table Lookup Proccess C C R2# 172.4.4.0/16 parent route. This document is Cisco Public Information. All rights reserved.16. Configure a message-of-the-day banner. S C C R3# Notice that in the routing table for R3.4. this route is used to forward the packets to PC3. Step 4: Examine the routing table on R3 to determine how the traffic generated by the ping command is returned to R2. The mask of a default route is /0.0/16 is variably subnetted.16.16. Configure an EXEC mode password. www. timeout is 2 seconds: !!!!! Success rate is 100 percent. 100-byte ICMP Echos to 172. the router will now continue to search the routing table for a route where there may be fewer bits that match. FastEthernet0/0 192.Page 158 of 161 . Serial0/0/1 Task 1: Prepare the Network.0/24 is directly connected. R2#ping 172.edunet.168. 2 subnets.

Step 4: View the routing table on the router and observe the changes that occurred when the Serial0/0/0 interface was disabled.CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8. R(config-if)#no shutdown Task 6: Determine Level 1 and Level 2 Routes Step 1: Examine the routing table. R# show ip route Step 5: Enable the Serial0/0/0 interface and observe the debug output. Step 2: Use the debug ip routing command to observe changes in the routing table as they occur on the router. ________________________________________________________________ ________________________________________________________________ Step 2: Verify IP addressing and interfaces. Configure EIGRP routing on each of the routers. Configure a password for console connections. Configure a password for VTY connections.3: Configuring Dynamic Routing CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8. Task 5: Observe Routes Being Deleted and Added to the Routing Table. Step 1: Configure interfaces on routers Configure the interfaces on the routers with the IP addresses from the Topology Diagram. When you have finished.4. R1#show ip route <Output ommited> Gateway of last resort is not set www.edunet. Include network statements for each of the directly connected networks. Step 4: Test the PC configuration by pinging the default gateway from the PC. ________________________________________________________________ Step 3: Configure Ethernet interfaces of hosts. What networks are shown in the routing table? Task 3: Configure and Activate Serial and Ethernet Addresses.hr Page 160 of 161 .3: Configuring Dynamic Routing 5.edunet. R#debug ip routing IP routing debugging is on Step 3: Shut down the Serial0/0/0 interface and observe the debug output. Configure the Ethernet interfaces of hosts with the IP addresses and default gateways from the Topology Diagram.hr Page 159 of 161 www. be sure to save the running configuration to the NVRAM of the router. Use the show ip interface brief command to verify that the IP addressing is correct and that the interfaces are active. Step 1: View the routing table on the router. 6. R(config-if)#shutdown ________________________________________________________________ ________________________________________________________________ Task 4: Configure EIGRP.4.

edunet.4.hr Page 161 of 161 .CCNA Exploration Routing Protocols and Concepts: The Routing Table: A Closer Look Lab 8.3: Configuring Dynamic Routing Which of these routes are level 1 routes? ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ ________________________________________________________________ Why are these routes level 1 routes? _____________________________________________________________________________ _____________________________________________________________________________ Are any of the level 1 routes ultimate routes? _________________________________________________________________ ________________________________________________________________ ________________________________________________________________ Why is this route an ultimate route? _____________________________________________________________________________ _____________________________________________________________________________ Are any of the level 1 routes parent routes? ________________________________________________________________ ________________________________________________________________ Why is this route a level 1 parent route? _____________________________________________________________________________ _____________________________________________________________________________ Which of the routes are level 2 routes? ____________________________________________________ ____________________________________________________ ____________________________________________________ ____________________________________________________ Why are these routes level 2 routes? _____________________________________________________________________________ _____________________________________________________________________________ www.

Sign up to vote on this title
UsefulNot useful