Professional Documents
Culture Documents
CONTENTS (Access your Weekly eJournal Packet Tracer Files from Canvas) ***Update contents pages
1-7 will be as
8-14 will be assesse
***When your Teacher has 'edit access' to your eJournal they will confirm by adding their name here:
date contents pages as you develop your SKILLs & KNOWLEDGE
g their name here:
if your teacher does not fill this cell above - Please let them knwo to do so!
EEDC00 RMIT Classification: Trusted#_x000D_
UNIVERSAL CO
Prompt & Full Command Syntax
Router>enable
Router#configure terminal
Router(config)#hostname xxx
xxx(config)#enable password cisco
xxx(config)#enable secret class
xxx(config)#banner motd %xxxx%
xxx(config)#no ip domain-lookup
xxx(config)#line vty 0 15
xxx(config-line)#password class
xxx(config-line)#login
xxx(config-line)#line con 0
xxx(config-line)#password class
xxx(config-line)#login
xxx(config-line)#logging synch
xxx(config-line)#exec-timeout 0
xxx(config)#service password-encryption
xxx#?
xxx(config)#do copy run start
UNIVERSAL CONFIGURATION
Description/ purpose
uters/Switches
ng of the line
he line
rd
ne word
character
ne character
ngle character
output the running config beginning from interfaces details = | character = pipe (above the enter/return key
output the running config for interface(s) section ONLY
sh run | inc int?? offer what?
Router2#sh run | ?
begin Begins unfiltered output of the show command with the first line that contains the regular expression.
exclude Displays output lines that do not contain the regular expression.
EEDC00 RMIT Classification: Trusted#_x000D_
See preconfigured Paste Box below to copy and paste into your device
en
config t
ho xxx
ena password cisco
ena secret class
banner motd %xxx%
no ip domain-lookup User-friendly - stop device translating input errors (shwo)
line vty 0 15
password class
login
line con 0
password class
login
logging synch User friendly - stops console messages over-writing your CL
exec-timeout 0 User friendly - stops device logging out - save having to pas
service password-encryption
?
do copy run start
** Copy and Paste the above Script into the router ** for each time you start a new LAB!!
Review Configuration of interfaces NOTE, YOU ARE GRADED FROM THIS LAB ONWARDS
Download:
Description/ purpose
FIRST Paste Universal configuration in R1&2 (edit host names!)
ON R1 :Enter global configuration mode
Enter Fast Ethernet configuration mode /select fa0/0
Enter the IP address and subnet mask of the interface.
Enter the interface description – “links to ? “
Activate the interface
ON R2
Enter Serial configuration mode
Enter the IP address and subnet mask of the interface.
Enter the interface description
Activate the interface
no shutdown 1 1 FALSE
en
conf t
int f0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
en
conf t
EEDC00 RMIT Classification: Trusted#_x000D_
int s0/0/0
ip address 10.10.10.1 255.255.255.252
no shutdown
REMOVE default settings
1 1 FALSE
hint use cmd from A44 above
Images are shortened for easy of fitting.
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 0
hint #dir f_____ - try it on the device to see the output Ethan for next ans below:
FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
Ensure you fill in blank lines below: this page constitutes spot check 2
Ensure you fill in blank lines below: Note this section continues on from Spot Check 2
The prefix S indicates a ___________ route *** Replace ? with your answer
1 1 FALSE
1 1 FALSE
1 1 FALSE
Total on this sheet= 22 out of 22
EEDC00 RMIT Classification: Trusted#_x000D_
Configure Router – R1 with a way to advertise it's directly connected networks 192.168.1.0/16 & 10.10.10.0 to R2
Description/ purpose
Remove static route on R1 ( use ‘no’ form )
Identify the networks to advertise ( display routing table)
Call out the Dynamic routing protocol RIP
Use RIP version 2
Advertise all directly connected networks (C’s)
“ “
Disable auto summarization
Backup configuration to NVRAM
Configure R2 to advertise its directly connected ntwks 172.16.0.0/16 & 10.10.10.0 using RIPv2:
Remove static route on R1 ( use ‘no’ form )
Identify the networks to advertise (display routing table)
Call out the Dynamic routing protocol RIP
Use RIP version 2
Advertise all directly connected networks (C’s)
EEDC00 RMIT Classification: Trusted#_x000D_
“ “
Disable auto summarization
Display routing table
Backup configuration to NVRAM
tise it's directly connected networks 192.168.1.0/16 & 10.10.10.0 to R2 using RIPv2:
This columns are filled / adjusted by you teacher - pl
Fill in each cmommand below in this Paste Box Attempted Correct TRY AGAIN
no ip route 192.168.1.0 255.255.0.0 FastEthernet0/1 1 1 FALSE
show route 1 1 FALSE
router rip 1 1 FALSE
version 2 1 1 FALSE
network 192.168.2.0 1 1 FALSE
1 1 FALSE
no auto-summry 1 1 FALSE
write 1 1 FALSE
1 1 FALSE
no auto-summary 1 1 FALSE
show ip route 1 1 FALSE
write 1 1 :-)
1 1 FALSE
The prefix R in the table indicates a _____? route (fill blank _ _ _) 1 1 FALSE
The interface used to exit R2 to reach R1’s LAN is: ________? se0/0/1 1 1 FALSE
Write the extension of the sh ip route cmd to just display RIP routes - fill for ? below
sh ip route rip? 1 1 FALSE
Online Class Lab 2a - Please see Canvas for PKT and continue to fill in your eJournal
Multilayer Switch Topology:
IP Addr 172.16.100.10/24
Completing this Activity verifies your Knowledge and Skills in the following areas
EEDC00 RMIT Classification: Trusted#_x000D_
- CLI modes and navigation at different levels on a Multilayer Switch & Layer 2 Switch
- Configure MLS with basic setup
- Address devices with an IPv4 scheme
- configuring intervlan routing on a MLS
- Interpreting Switch verification outputs & tables
Complete the following tasks by filling in the required command syntax for each one:
(Refer to Week 2 Lab slides to guide you on your configurations.)
1. Paste you modified Universal Configuration into each of your Switches – according hostnames in the Logical topology
2. Configure Hosts A & B with IP addresses as shown in topology.
3. Configure SVI’s as shown in VLAN/SVI table above.
4. Configure all VLANs (1. 100 & 200) on all Switches as shown in VLAN/SVI table above.
5. Configure trunks on all Switches
6. Enable IP routing & Ripv2?
MLS - Lyr3 3560 Step 3 Configure SVI’s on MLS as shown in VLAN/SVI info table above
**Paste the universal config into each switch - modify hostnames as per Logical Topology above
Description/ purpose
Enter Int vlan configuration mode /select for vlan1
Enter the IP addr and subnet mask of the interface.
Enter the interface description – “SVI for __ ? VLAN
Activate the SVI - note, state of interface is down!!
Display screen capture of the interface info section from show run output on MLS
REMOVE ALL PORTS except fa0/24 FROM vlan 1 - (this is a BEST Practice for Security purposes!!) - show CLI
command to move all Fast Ethernet Ports to VLAN 23 - use the RANGE command to select Fa01 thourgh to 23
Verify connectivity
Display successful end to end conectiviy from Host 1 to Host 2
EEDC00 RMIT Classification: Trusted#_x000D_
Note - pings between Sw1 & 2 Layer 2 switch are not successfully - what task is required to achieve connectivity?
EEDC00 RMIT Classification: Trusted#_x000D_
ur eJournal
IP Addr 172.16.200.20/24
EEDC00 RMIT Classification: Trusted#_x000D_
RESULT
Attempted Correct TRY AGAIN Comment
1 1 FALSE
Fill in each command below in these Paste BOXes
int vlan 1 1 1 FALSE
ip add 172.16.1.1 255.255.255.0 1 1 FALSE
description SVI for Management 1 1 FALSE
no shutdown 1 1 FALSE
Paste Box
EEDC00 RMIT Classification: Trusted#_x000D_
sh running-config 1 1 FALSE
Paste Box
vlan 100 1 1 FALSE
name FINANCE 1 1 FALSE
vlan 200 1 1 FALSE
name ENGINEERING 1 1 FALSE
vlan 1 1 1 FALSE
name MANAGEMENT 1 1 FALSE
1
1 FALSE
int range f0/1-f0/23
no switchport 1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
sh vl br
ip route 1 1 FALSE
Paste Box
int range g0/1-g0/2 1 1 FALSE
switchport trunk encapsulation dot1q 1 1 FALSE
switchport mode trunk 1 1 FALSE
int f0/1 1 1 FALSE
switchport mode trunk 1 1 FALSE
int g0/1 1 1 FALSE
switchport mode trunk 1 1 FALSE
int f0/1 1 1 FALSE
switchport mode trunk 1 1 FALSE
int g0/2 1 1 FALSE
switchport mode trunk 1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
Description/ purpose
Assign hostname as used in Topology above
assign enable secret = cisco
Select all possible telnet lines
use password = cisco
ensure password is used at login
EEDC00 RMIT Classification: Trusted#_x000D_
Description/ purpose
Select correct int (fa0/0 or g0/0/0 –depends on router in rack
ip add 10.10.10.1 255.255.255.252
no shutdown
d. On MLS set Fa0/24 as a routed port and address to match link with Router0
Display evidence below of successfully connectivity between host 1 & lo1 below
EEDC00 RMIT Classification: Trusted#_x000D_
Fill in each command below in this Paste BOX Attempted Correct TRY AGAIN
hostname DLS1 1 TRUE
enable secret cisco 1 TRUE
line vty 0 4 1 TRUE
password cisco 1 TRUE
login 1 TRUE
EEDC00 RMIT Classification: Trusted#_x000D_
Paste Box
int g0/0/0 1 1 FALSE
ip add 10.10.10.1 255.255.255.252 1 1 FALSE
no shutdown 1 1 FALSE
Paste Box
int loopback 1 1 1 FALSE
ip add 1.1.1.1 255.255.255.0 1 1 FALSE
Paste Box
interface FastEthernet0/24 1 1 FALSE
switchport access vlan 1 1 1 FALSE
1 1 FALSE
1 1 FALSE
Paste Box
router rip 1 TRUE
version 2 1 TRUE
no auto-summary 1 TRUE
network 10.10.10.0 1 TRUE
write memory 1 TRUE
1 1
FALSE
Comment
EEDC00 RMIT Classification: Trusted#_x000D_
EEDC00 RMIT Classification: Trusted#_x000D_
t of 147
EEDC00 RMIT Classification: Trusted#_x000D_
Name Switch S2
Address management int VLAN 1
address 192.168.1.2 mask /24
Activate interface
Name Switch S3
Address management int VLAN 1
address 192.168.1.3 mask /24
Activate interface
Starting with Sw1 - use show spanning-tree cmd to establish the Root Bridge) Paste output of command below:
EEDC00 RMIT Classification: Trusted#_x000D_
Change the Priority on one of the other switches to make it the new ROOT Bridge.
Set the value to the lowest value to make S2 the Root Bridge.
When you enable root guard on a per-port basis, it is automatically applied to all of the active VLANs to which that port belongs.
When you disable root guard, it is disabled for the specified port and the port automatically goes into the listening state.
When a switch that has ports with root guard enabled detects a new root, the ports goes into
root-inconsistent state. Then, when the switch no longer detects a new root, its ports automatically go
into the listening state. Ports that are available and used for hosts can be disconnected (unplugged) and a rogue switch
can plugged and take over the role of Root Bridge and cause many issues to the switch topology so
those ports need to be protected. You must enable root guard on all ports where the root bridge should not appear.
1. Verify port settings for ports fa0/3 to fa0/5 via show run – paste below:
Test Root guard protection by plugging a switch with a lower priority into a protected port.
Verify and display the portfast settings for S2 host port: paste output of your show command below
EEDC00 RMIT Classification: Trusted#_x000D_
Paste box
Attempted Correct TRY AGAIN
hostname S1 1 TRUE
EEDC00 RMIT Classification: Trusted#_x000D_
hostname S2 1 TRUE
int vlan 1 1 TRUE
ip
noadd 192.168.1.2 255.255.255.0
shutdown 1 TRUE
1 TRUE
hostname S3 1 TRUE
int vlan 1 1 TRUE
ip
noadd 192.168.1.3 255.255.255.0
shutdown 1 TRUE
1 TRUE
Paste Box
line vty 0 4 1 TRUE
password cisco 1 TRUE
exit 1 TRUE
enable password cisco 1 TRUE
1 TRUE
EEDC00 RMIT Classification: Trusted#_x000D_
1 TRUE
1 TRUE
EEDC00 RMIT Classification: Trusted#_x000D_
EEDC00 RMIT Classification: Trusted#_x000D_
TRUE
1
Paste Box
1 TRUE
1 TRUE
1 TRUE
1 TRUE
EEDC00 RMIT Classification: Trusted#_x000D_
rogue switch
t appear.
1 TRUE
1 TRUE
1 TRUE
EEDC00 RMIT Classification: Trusted#_x000D_
1 TRUE
1 TRUE
1 TRUE
1 TRUE
Comment
EEDC00 RMIT Classification: Trusted#_x000D_
EEDC00 RMIT Classification: Trusted#_x000D_
out of 31
EEDC00 RMIT Classification: Trusted#_x000D_
EEDC00 RMIT Classification: Trusted#_x000D_
The process used to bundle ports together in an ethernet switch to achieve higher bandwidth is known as EtherChannel or link aggregation.
EtherChannel is a port link aggregation technology or port-channel architecture used primarily on Cisco switches.
As you can see from the figure above, etherchannel/ Link Aggregation combines the switch ports and functions it like a one link.
We need to be able to configure both types of protocols
PAgP – Cisco flavor
LACP (Link Agg Protocol – open std 802.3AD)
PAgP and LACP do not interoperate with each other. Ports configured to use PAgP cannot form EtherChannels with ports configured to use
Ports configured to use LACP cannot form EtherChannels with ports configured to use PagP
On S1's connected interfaces create a channel group - set to PagP desirable mode PASTE BOX
interface range f0/1-f0/2
channel -group 1 mode desirable
Note the mode used implies which form etherchannel is being used – this example shows the mode desirable –
indicates Cisco’s PAGP is in being used for the channel group – channel group 1
We have one of 2 options to use at the other end of the Etherchannel on Switch S2:
Fill in both options below - Modes?
select S2 interfaces ( using range cmd) int range f0/1-f0/2
set to d____________ desirable channel-group 1 mode desirable
or
select S2 interfaces ( using range cmd) int range f0/1-f0/2
EEDC00 RMIT Classification: Trusted#_x000D_
Note the mode used implies which form is being used – this example shows the mode active –
and that indicates Link Aggregation Protocol is in being used for the channel group – channel group 1
We have one of 2 options to use at the other end of the Link Aggregation Protocol on Switch S2:
(LACP):
e a one link.
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
set dn1 dn 1
number = 1001 number 1001
select ephone 1 ephone 1
set button 1:1 button 1:1
set dn2 dn 2
number = 1002 number 1002
select ephone 2 ephone 2
set button 1:2 button 1:2
set dn1 dn 1
number = 1001 number 1001
(select ephone 1 - set button to 1:1)
set dn2 dn 2
number = 1002 number 1002
(select ephone 2 - set button to 1:2)
session target ip =address on R1's int fa0/1 session target ipv4 192.168.10.1
destination-pattern use first 2 digits for remote phones destination-pattern ^1[0-9]$
Total on this sheet= 40
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 :-)
1 1 :-)
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 TRUE
1 TRUE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
out of 40
out 232
EEDC00 RMIT Classification: Trusted#_x000D_
#access-list {100-199} permit/deny {tcp/udp} source IP/network Wild-card Mask destination IP/network Wild-card eq {application
Configure an Extended Numbered IPV4 ACL to Block GATEWAY router from a TFTP service to PC B on VLAN20 – Us
Part 2b) Configure an Extended Numbered IPV4 ACL 199 to Block access from PC A on Vlan 10 for Telnet GATEWAY rou
Note – this is not for blocking on vty lines via standard method
Fill blank
fill in the number assigned for this Extended IPv4 ACL 199
Q.1 What is the ACL trying to do Permit or Deny deny
Q.2 Which protocol type is involved TCP or UDP TCP
Q.3 What is the source IP who is sending traffic 192.168.10.1
Q.4 What is the Wild card Mask for this VLAN 0.0.0.0
Q.5 What is the destination IP who is sending traffic 192.168.10.1
Q.6 What is the Wild card Mask for this VLAN 0.0.0.0
Q.7 What is the Application port number for Telnet 23
EEDC00 RMIT Classification: Trusted#_x000D_
PASTE BOX
Q 10 How would you assigned th ACL 199 to that interface access-group 199 in fa0/1
Q11. how would you assign this ACL to VTY lines? line vty 0 15
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 :-)
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
4 5 6 7
0.0.0.0 192.168.20.2 0.0.0.0 69 Correct
ST 192.168.1.1 or HOST 192.168.20.20
92.168.1.0 0.0.0.255 192.168.20.20 0.0.0.255 eq 69
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 :-)
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
FALSE
1 1
Step 1: Configure an ACL that will block HTTP and HTTPS access.
R1(config)#_______________________
EEDC00 RMIT Classification: Trusted#_x000D_
Apply the ACL on the interface closest the source of the traffic to be blocked.
R1(config)___________________________
R1(config-if)# _____________________________
int s0/0/0 ipv6 traffic-filter BLOCK_HTTP out
In this case, ICMP traffic can come from any source. To ensure that ICMP traffic is blocked
regardless of its source or changes that occur to the network topology, apply the ACL closest to the des
closest to the destination(Server3).
R3(config-if)# ____________________
R3(config-if)# ____________________
int s0/0/1 ipv6 traffic-filter BLOCK_ICMP int
Step 3: Verify that the proper access list functions.
Open the web browser of PC1 to http:// 2001:DB8:1:30::30 or https://2001:DB8:1:30::30. The website sh
EEDC00 RMIT Classification: Trusted#_x000D_
//week 8
IPv6IP tunnel
IPv6IP PKT – all IPv4 addressing, partial IPv6 addressing, RIPv2 & RIPng is preconfigured
An IPv6 address is manually configured on a tunnel interface, and manually configured IPv4 addresses
On Router R1
Paste Box
interface ________
tunnel source __________ use the label of serial interface on R1
tunnel destination _______ ipv4 address of the other end of tunnel at S0/0/0
ipv6 address __________ IPv6 address at R1’s end2009::?/64
tunnel mode _________ ipv6ip
below command is done in the tunnel
ipv6 rip_____? enable ( enable RIPng Process called tunnelv6
On Router R3
interface tunnel 0 Paste Box
tunnel source __________ use the label of serial interface on R3
tunnel destination _______ ipv4 address of the other end of tunnel at S0/0/1
ipv6 address __________ IPv6 address at R1’s end2009::?/64
tunnel mode _________ ipv6ip
llowing statements.
Paste Box
ipv6 access-list BLOCK_HTTP 1
1
deny tcp any host 2001:DB8:1:30::30 eq 443 1
1
EEDC00 RMIT Classification: Trusted#_x000D_
cked.
int g0/? 1
ipv6 traffic-filter BLOCK_HTTP ___? 1
s:
001:DB8:1:30::30. The website should appear.
001:DB8:1:30::30. The website should be blocked
ACL
Pv6
MP ping requests to your server.
ments:
permit 1
MP traffic is blocked
pply the ACL closest to the destination(Server3).
int 1
ipv6 traffic-filter BLOCK_ICMP ? 1
ng is preconfigured
ally configured IPv4 addresses are assigned to the tunnel source and the tunnel destination. The host or device a
HINTS
1
serial interface on R1 1
the other end of tunnel at S0/0/0 1
R1’s end2009::?/64 1
1
HINTS
serial interface on R3 1
the other end of tunnel at S0/0/1 1
R1’s end2009::?/64 1
1
Running Total
###
EEDC00 RMIT Classification: Trusted#_x000D_
TRUE
1 FALSE
1 FALSE
1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
. The host or device at each end of a configured tunnel must support both the IPv4 and IPv6 protocol stacks. We c
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
1 FALSE
22 /22
EEDC00 RMIT Classification: Trusted#_x000D_
EEDC00 RMIT Classification: Trusted#_x000D_
Step 2 Assign a router ID to each router & Enable EIGRP for IPv6 routing on each router
To begin the EIGRP for IPv6 routing configuration process, issue the ipv6 router eigrp 1 command, where 1 is the AS number.
EIGRP for IPv6 requires a 32-bit address for the router ID. Use the eigrp router-id cmd followed by the router ID in the router configuration m
R1
R2
R3
Step 3 Configure EIGRP for IPv6 using AS 1 on the Serial and Gigabit Ethernet interfaces on the routers.
Issue the ipv6 eigrp 1 command on the interfaces that participate in the EIGRP routing process. The AS number is 1 as assigned in Step 2. T
R1(config-if)#
*Apr 12 00:25:49.183: %DUAL-5-NBRCHANGE: EIGRP-IPv6 1: Neighbor FE80::2 (Serial0/0/0) is up: new adjacency
*Apr 12 00:26:15.583: %DUAL-5-NBRCHANGE: EIGRP-IPv6 1: Neighbor FE80::3 (Serial0/0/1) is up: new adjacency
Fill in below
What address is used to indicate the neighbor in the adjacency messages?
%DUAL-5-NBRCHANGE: IPv6-EIGRP 1: Neighbor FE80::290:21FF:FEE7:256D (Serial0/0/1) is up: new
Verify end-to-end connectivity. ping all locations – Troubleshoot if unsuccessful!!!pings do work
On R1, issue the show ipv6 eigrp neighbors command to verify that the adjacency has been established with its neighboring routers. The link-local addresses of the nei
Display ipv6 eigrp neighbors below: show ipv6 eigrp neighbors sh ipv6 eigrp neighbors
FE80::2
Step 2 Examine the IPv6 EIGRP routing table.
Use the show ipv6 route eigrp command to display IPv6 specific EIGRP routes on all the route
Step 4 Verify the parameters and current state of the active IPv6 routing protocol processes.
Issue the show ipv6 protocols command to verify the configured parameter. From the output, EIGRP is the configured IPv6 routing protocol with 1.1.1.1 as the router ID
do sh ipv6 protocols
EEDC00 RMIT Classification: Trusted#_x000D_
A passive interface does not allow outgoing and incoming routing updates over the configured interface. The passive-interface interface command causes the router to
Verify the passive interface configuration. Issue the show ipv6 protocols command on R1 and verify G0/0 status
Display passive interface setting below:
If a few interfaces are configured as passive, use the passive-interface default command to configure all the interfaces on the router as passive. Use the
A. Configure all interfaces as passive on R3.
for R3 under EIGRP IPv6
use passive interface on LAN port ipv6 router eigrp 1
passive-? g0/?
B. After you have issued the passive-interface default command, R3 no longer participates in the routing process. What command can you use to verify it?
D. The neighbor relationships have been established again with R1 and R2. Verify that only G0/0 has been configured as passive.
Running Total
EEDC00 RMIT Classification: Trusted#_x000D_
Topology
or IPv6 Routing
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
0 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
(Serial0/0/1) is up: new adjacency
-local addresses of the neighboring routers R2 is FE80::2 and R3 is FE80::3 are displayed in the adjacency table.
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
or each route?
1 1 FALSE
1 1 FALSE
ith 1.1.1.1 as the router ID for R1. This routing protocol is associated with autonomous system 1 with three active interfaces: G0/0, S0/0/0, and S0/0/1.
1 TRUE
EEDC00 RMIT Classification: Trusted#_x000D_
mand causes the router to stop sending and receiving Hello packets over an interface.
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
uter as passive. Use the no passive-interface interface command to allow EIGRP Hello messages in and out of the router interface.
1 1 FALSE
1 1 FALSE
se to verify it?
1 1 FALSE
1 1 FALSE
1 1 :-)
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
34 34
Configure Eigrp v2 using Autonomous System number 1 so all networks are reachable across the network.
EEDC00 RMIT Classification: Trusted#_x000D_
Router1
router eigrp 1
network 10.10.1?.? 0.0.0.? (wildcard mask)
network 1.1.?.? 0.0.0.? (wildcard mask)
on S0/0/0
set Bandwidth to required setting
on S0/0/1
set Bandwidth to required setting
6. Display the routing table on Router 1 for eigrp routes specifically – Router1#sh ip r_____ e____
Paste the output below (without legend):
EEDC00 RMIT Classification: Trusted#_x000D_
7. Now how many destinations are being used for the network?
7a. Display the Topology Table – command equals sh ip eigrp topology and display output below:
EEDC00 RMIT Classification: Trusted#_x000D_
Which command display the variance value currently used by Router1 for eigrp? answer: sh ip p________?
Variance is currently set to?
ance
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
??
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
Fill below!
1 1 FALSE
s0/0/? and s0/0/? 1 1 FALSE
Total Distance ? 1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
Fill Below
1 1 FALSE
sh ip eigrp ? 1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
Use the following requirements to configure OSPF routing on all three routers:
- Enable IPv6 routing ipv6 unicast-routing
- Process ID 10
- Router ID for each router: R1 = 1.1.1.1; R2 = 2.2.2.2; R3 = 3.3.3.3
- Enable OSPFv3 on each router interface
activate ospf
select s0/?/?
activate ospf
select s0/?/?
activate ospf
R2
enable IPv6 routing Ipv6 unicast-routing
create proces number 10
Router ID = 1.1.1.1
select int g0??
activate ospf
select s0/?/?
activate ospf
select s0/?/?
ipv6 ospf 10 area ?
R3
ipv6 unicast-routing
Step 2: Verify OSPF routing is operational with the other two routers. Verify the routing table has a route to every network in the topology.
Each PC should be able to ping the other two PCs. Paste ipv6 routing table for each router below:
R1 R2
EEDC00 RMIT Classification: Trusted#_x000D_
C 2001:DB8:CAFE:1::/64 [0/0]
R3
EEDC00 RMIT Classification: Trusted#_x000D_
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 TRUE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 TRUE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
R2
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
Setup ospf as per areas shown on the topology and setup the routers with the router id shown on the topology.
OSPF set up on Router - Tom Paste Box
state the OSPF process id = ? router ospf ?
State ROUTER ID = 10.10.?.? router-id 10.10.?.?
Complete network statements to advertise:
netwk 192.168.1.0 0.0.0.255 area ? network 192.168.1.0 0.0.0.255 area ?
EEDC00 RMIT Classification: Trusted#_x000D_
Note, Routing Table will not show remote networks until a OSPF virtual link is configured
from ABR – Area Border Router Tom in area ? which router (id) connects to area 2 = Amanda’s router id 30.30.30.?
Therefore to configure Tom with other end of the virtual link
area ? virtual-link 30.30.30.?
up OSPF for IPv4 - Fill in blanks and cmd syntax and paste into PKT on each router
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
0.10.1
EEDC00 RMIT Classification: Trusted#_x000D_
oot
1 1 FALSE
WEEK 13 HSRP
2. Configure router R2 G0/0 interface with the following hot standby attributes:
Paste Box
a. Create HSRP using the same group number & VIP = ________
b. leave HSRP priority = ______ (this is the defailt value)
3.a Verify HSRP status on R1 & R2 – using show standby brief - Paste output below.
note
R1 R2
4. Disable either of the Ethernet link to R1 and test to see if you can still ping the ISP. 1. xxx# config t
select int int g0/?
turn it off sh______?
R1
5b. While R1 int g0/0 is shutdown why is the Standby unknown? They are not communicating via switches
as follows: C:\> ping -t 192.168.2.2 keep window open and in view - now re-activate R1’s int g0/0 (no shut).
Display evidence below:
Notice that a short delay as R1 retakes the role as Active due to the use of PREEMPT
EEDC00 RMIT Classification: Trusted#_x000D_
Paste Box
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 TRUE
1 TRUE
0 (no shut).
1 TRUE
1. Configure the network with EIGRP AS 20 and OSPF 20 Area 0 and setup 2 way route redistribution between the Autonom
Show the command sequence to complete each task in PASTE box below:
Begin by setting up OSPF
ON Rtr LONDON PASTE Box
router ospf ??
router-id = 4.4.4.4
EEDC00 RMIT Classification: Trusted#_x000D_
italy#sh ip route e
36.0.0.0/8 is variably subnetted, 4 subnets, 2 masks
D 196.10.20.0/24 [90/2172416] via 36.0.0.6, 00:01:57, Serial0/1/0
Set up Germany to be able redistribute the OSPF route into the EIGRP autonomous system
router eigrp ?? router eigrp 2?
redistribute ospf ?? metric _____ __ ___ _ ___ Use Default? redistribute ospf ? metric ? ? ? ? ?
Set up Germany to be able redistribute the EIGRP routes into the OSPF autonomous system
router ospf ??
redistribute eigrp ? s____________
GERMANY:
Set username as your name & password as your class name XXXX. username London password xxxx
LONDON:
username Germany password ethan username Germany password xxxx
3. Test that PC0 and PC1 can get to the web server
by using the URL address. if not then troubleshoot
This sheet total of
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
1 TRUE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
1 1 FALSE
EEDC00 RMIT Classification: Trusted#_x000D_
1 1 FALSE
in Part 2
EEDC00 RMIT Classification: Trusted#_x000D_
**** The following tabs are linked to the rest of your eJournal - please add notes to aid your in
INDEX TOPIC
A B C D E F G H I J K L MN O P Q R S T U V W
A
Address (valid/usable)
Addressing Ethernet Interface
Addressing Serial Interface
Administrative Distance
Autonomous System
Autonomous System Number
B
Banner [MOTD]
Binary Number Syst
BPDU
Broadcasts
C
CIDR/
Cables
CLI
Clock
Clock rate
Configure Terminal
configure-register
Console
D
Debug
DHCP
Do
E
enable
erase STARTUP-CONFIG
exit
F
FLASH
H
hostname
EEDC00 RMIT Classification: Trusted#_x000D_
I
Interface
InterVLAN Routing
IPv4
IPv6
J
K
L
LAN
line console 0
line vty 0 - ?
Loopback
M Modes
O
OSI ( Open System Interconnect Model)
P
PING (ICMP)
PDU (Protocol data unit)
Privilege (mode)
Protocols
ROUTERS
Routes/Routing TABLE
S RIP Routing
Serial
SHOW
Subnetwork
EEDC00 RMIT Classification: Trusted#_x000D_
Star topology
STP - Spanning-Tree Protocol
Straight thru cable
T
SWITCHES
Switch installation
TCP model
TCP protocol
Telnet
Topologies
Tracert (Traceroute)
Trunks
UDP
Unicast Address
User (mode)
V
VOIP phone
W
WAN
Wirelesss
Wireless Router
EEDC00 RMIT Classification: Trusted#_x000D_
0 0 0
0 0 1
0 1 0
1
1 0 0 0 0 0 0 0
1 1 1 1 1 1 1 1
d thus is Based 2 state system
ue of standard 8 bit pattern
t bit 1 (2^0)
ecimal numbers - ideal for IP addressing
DecimaM (mim's) 10^3 10^2 10^1 10^0
Combo 1000 100 10 1 Combinations
= 0 0 No. of Bits How many rows!
= 1 2 1 1 2
= 2 2 2 4
= 3 4 3 3 8
= 4 4 4 16
= 5 5 5 32
= 6 6 6 64
= 7 8 7 7 128
= 8 8 8 256
= 9 9 9 512
= 10 1 0 10 1024
= 11 1 1 11 2048
= 12 How to convert from Binary to Decimal
= 13 13 = 1 lot of 8 + 1 lot of 4 + 0 lots of 2 1 lot of 1
= 14
= 15 16
= 16
= 17
= 18
= 19
= 20
= 21
= 22
= 23
= 24
= 25
= 26
= 27
= 28
= 29
= 30
= 31 32
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
255
CABLING & HARDWARE
CABLING /Media
Wireless Cableless
CONSOLE
Light blue cable is called a console cable Used to initally configure a network device ( Rtr & sw)
Console cable (light blue) Connect to a Console Port on Routers and Switches - from a USB(ada
Switch installation
Cabling is far enough from sources of electrical noise
Air flow
Control Temp
Moisture
HWIC-2T image:
Serial interface Slot
HWIC-2T image:
Routers
NVRAM
WIRELESS Router Operate at Layer 1 to 3 - because it is a 3 in 1 =
ICON
Yellow ports 4 Switch ports for hard wired connections (non-wireless links)
d with a ______________________?
a _______________________
s electromagnetic waves)
B
Broadcast Hosts and Switches create Broadcast Traffic ( Routers will not!)
An ARPa (Address
When Resolution
Switch MAC addressProtocol)
table doesis initated
not holdby Hostsfor
lookup to aHosts
host to discover the
destination MACUNKNOWN MAC (physical) Address
that Switch
will Broadcast traffic out all ports to seek the unknown destination
CLI Abrev' Command Line Interface - Text driven environment found on Routers & Switches
C
Command
Command Prompt
D
E
I
IP
ISP Internet Service Provider ( Telstra - Optus etc
J
K
L
LAN Local Area Network Image
SMALL scale network = LAN
commonly connected via a Switch
or Wireless Router (ISR)
M
Media ( See Cabling)
OSI ( Open System Interconnect Model) = 7 layer model that describe each level of network activities as per traffic sent and rece
O Layer
7A=
6P
5S
4T
3N
2D
1P
P Protocol Rule for Behaviors
Router
Router on a Stick
Using a physical interface to spilit it into sub-interfaces which act a gateway (default-gateway) for
for each vlan - 4 vlnas = 4 subinterfaces
Also see vlan -
int fa0/0 - no shut - int fa0/0.1 , int fa0/0.10 etc - need dot1q encapsulation to tag vlan
S
TCP Protocol TCP operates at the Transport layer of the OSI /TCPmodel.
Used commonly by traffic crossing the internet - Reliable and
T Topology/Topologies 2 types -
1. Physical topology image
TCP Model Def: 4 Layer NETWORK Model - like OSI - describes Protocols and behaviours at each level as traffic flow to and from a sender to
Layr 4:Application -3: Transport -2: Internetwork - 1: Network Access
Should show:
Device names
PORTS used
IP Network Addresses
Tracert
UNICAST Address
VLAN Def: Created on Switches to form separation of LANs viitrually - needs a router/route processer (MLS)
to allow one VLAN to communicate with another vlan
V
W
WAN Wide Area Network spans cities - states - countr
D
Debug ip packets Router
Debug ip rip Router
DNS Router Domanin Name Service - to lookup and translate URL - e.g Google.com to a IP ad
E
enable Rtr & Sw Command typed at the user mode to move into PRIVILEGE mode
J
K
L Line console 0 is used for the direct access
Line console 0 lin con 0 Routers & Switches to a device via a console cable connection
password cisco pas cisco It should be password protected!
login login
M
R
router rip router RIP uses Hopcount to decide which path to take to a destination
AD = 120
S
Show sh Routers & Switches Use by default at the Privilege mode
T
Telnet
Recognising IPv4 CLASSES A if the first eight bits(byte/octet) describes a number between 1 and 127 it is deemed class A
and it has a Network / Host structure N.H.H.H
B if the first byte describes a number between 128 and 191 it is deemed class B and it has a Network / Host structur
C if the first byte describes a number between 192 and 223 it is deemed class C and it has a Network / Host structur
This structure relates to the Network Mask written as 255 for every Network portion
Class A N.H.H.H is 255.0.0.0 * note by default CLASS A has only one portion set for Network - thus on on lot of 255' is se
Default Gateway The def-gateway is found on Routers - in particular, it relates to LAN ( Local Area Networks)
Public IP number
Private IP Starts 10 .x.x.x All private addresses can not carry in internet - they BANNED - not allowed ISPs
Starts 172 16-31.x.x
Starts 192.168.x.x Inputs OUTPUT
A B
Network Mask the Network Mask is indicated by placing 1's in the Network(portion) - 8bits
Subnet Mask N.H.H.H255.0.0.0
N.N.H.H255.255.0.0
N.N.N.H255.255.255.0
N
CIDR / /8 - 8 NETWORK bit nnnnnnnn[Default Class A]
/16 - 16 NETWORK bit nnnnnnnnnnnnnnnn Class B
/24 - 2?
a Network / Host structure N.N.H.H
a Network / Host structure N.N.N.H