Professional Documents
Culture Documents
8.2.1.4 Packet Tracer - Designing and Implementing A VLSM Addressing Scheme - ILM PDF
8.2.1.4 Packet Tracer - Designing and Implementing A VLSM Addressing Scheme - ILM PDF
Topology
You will receive one of three possible topologies.
Addressing Table
Objectives
Part 1: Examine the Network Requirements
Part 2: Design the VLSM Addressing Scheme
Part 3: Assign IP Addresses to Devices and Verify Connectivity
Background
In this activity, you are given a /24 network address to use to design a VLSM addressing scheme. Based on a
set of requirements, you will assign subnets and addressing, configure devices and verify connectivity.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9
Packet Tracer - Designing and Implementing a VLSM Addressi ng Scheme
Subnet Table
Note: The correct answers for this table are variable depending on the scenario received. Refer to the
Instructor Notes at the end of these instructions for further information. The format here follows what the
student used in Designing and Implementing a VLSM Addressing Scheme .
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 9
Packet Tracer - Designing and Implementing a VLSM Addressi ng Scheme
Number of
Subnet Hosts Network First Usable Broadcast
Description Needed Address/CIDR Host Address Address
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 9
Packet Tracer - Designing and Implementing a VLSM Addressi ng Scheme
Part 1 Total 5
Part 2: Design the VLSM Addressing Scheme
Part 2 Total 65
Packet Tracer Score 30
ID:[[indexAdds]][[indexNames]][[indexTopos]]
Instructor Notes:
The following addressing tables represent the three possible addressing scenarios the student may get. Note that
the Device column is independent of the addressing scheme. For example, a student could receive the device
names from Scenario 1 and the addressing scheme from Scenario 3. In addition, the three possible topologies
are also independent of the device names and the addressing scheme (click reset in the activity to see the
different topologies). Therefore, this activity uses three independent variables with three possible values each for
a total of 27 possible combinations (3 device names x 3 addressing schemes x 3 topologies = 27 isomorphs).
Subnet Table
Number of
Subnet Network First Usable Last Usable Broadcast
Hosts
Description Address/CIDR Host Address Host Address Address
Needed
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 9
Packet Tracer - Designing and Implementing a VLSM Addressi ng Scheme
Building 1
en
conf t
int g0/0
ip add 10.11.48.97 255.255.255.240
no shut
int g0/1
ip add 10.11.48.65 255.255.255.224
no shut
ASW3
en
conf t
int vlan 1
ip add 10.11.48.114 255.255.255.248
no shut
ip def 10.11.48.113
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 9
Packet Tracer - Designing and Implementing a VLSM Addressi ng Scheme
Subnet Table
Number of
Subnet Network First Usable Last Usable Broadcast
Hosts
Description Address/CIDR Host Address Host Address Address
Needed
Branch 1
en
conf t
int g0/0
ip add 172.31.103.1 255.255.255.224
no shut
int g0/1
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 9
Packet Tracer - Designing and Implementing a VLSM Addressi ng Scheme
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 9
Packet Tracer - Designing and Implementing a VLSM Addressi ng Scheme
Subnet Table
Number of
Subnet Network First Usable Last Usable Broadcast
Hosts
Description Address/CIDR Host Address Host Address Address
Needed
Remote-Site1
en
conf t
int g0/0
ip add 192.168.72.129 255.255.255.240
no shut
int g0/1
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 9
Packet Tracer - Designing and Implementing a VLSM Addressi ng Scheme
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 9