Learning by Doing: CISCO Certified Network Administrator (CCNA) Lab Manual version Matthew J. Basham [email protected] Business. Warning and Disclaimer This manual is designed to provide information about CCNA (). Every effort Has been made to make this manual as complete. The ultimate CCNA Training resource on the web with hundreds CCNA labs, what book(s) should candidates use when learning and preparing for exams.
|Language:||English, Spanish, Indonesian|
|ePub File Size:||20.65 MB|
|PDF File Size:||14.81 MB|
|Distribution:||Free* [*Sign up for free]|
CCNA v3 Lab Guide: Routing and Switching Labs Paperback – February 27, CCNA Lab Guide is a workbook designed to provide lab skills necessary for passing the new CCNA exam. Learn how to configure, verify and troubleshoot all required labs for ICND1 exam, ICND2 exam and CCNA. One of the best books I have ever use. This book bring and summarized the CCNA test in labs and examples that you will never forget. My recommendation for. Hello Community Im looking for a good LAB manual to assist my studies, Anyone able to provide the Cisco network academy lab guide or.
S Karachi Pakistan. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording and information storage or retrieval system without written permission from the publisher, except for the inclusion of quotation in a review. Every effort Has been made to make this manual as complete and accurate as possible, but no warranty of fitness is implied. The information is provided on as basis and CTTC shall have neither liability nor responsibility to any person or entity with respect to any loss or damage Arising from the information contained in this manual. Authors Mr.
Verify Root Bridge on Switch Switch-1 config spanning-tree mode rapid-pvst Note: The above command will be issued on all the switches of the network. Verify RSTP: Switch-2 config spanning-tree vlan 1 priority Note: Switch-2 config spanning-tree vlan 1 root primary Verify Switch-2 as Root Bridge: Switch-1 config spanning-tree portfast default Note: Above command will be issued to all the switches in the network.
By enabling portfast feature on all the switches, will disable the STP process on all non-trunk ports. It will cause to take less time to change the state to up on all non-trunking ports. To verify this feature, connect a PC to the switch and the port will be up within 5 seconds. Configuring Switch Static Routing: Configuring R2: R1 config ip route R2 config ip route When configuring the static route on router R1 we used the local interface of the router R1 i.
Verify the routes on Router R1: R1 show ip route Gateway of last resort is not set R2 show ip route Gateway of last resort is not set R1 config router eigrp R1 config-router network All directly connected networks will be issued in the router eigrp mode.
Autonomous System number must be same on all the routers in the network. R2 sh ip route Gateway of last resort is not set To verify the currently enabled routing protocols, use the following command: R1 config router ospf 10 R1 config-router network R2 config router ospf 20 R2 config-router network R2 show ip route: Gateway of last resort is not set ABR show ip route: More commands to verify OSPF: Master-RT show standby Note: Gateway Load Balancing Protocol Objective: Configuring IPv6 Auto configures Objective: Configure RIPng on Router: In this configuration example, routers R1 and R2 are connected via Serial interface and Loopback addresses are configured to generate networks.
All the interfaces are configured with the IPv6 addresses. Configure on R1: Loopback interfaces have their own OSPF network type in which case OSPF advertises a host route to the loopback interface and not the configure subnet mask. For R1: R1 show ipv6 route eigrp: Passwords on both the routers must be same.
R1 ping Click on WAN cloud then click on Config tab. You will see all the interfaces on the left hand side. Now repeat the same procedure for Serial1 and Serial2. You can now verify the connectivity by sending ping packets as follows.
If you want to remove a host entry, just type NO before the command. Rl config no ip host KHI. Flags Age A. The a means.. When you supply an anonymous command to a Cisco device, it does The device tries to resolve that command using DNS Server. Rl pakistan Translating "pakistan" Because the device doesn't know my names Because we need to spend time and wait for the name lookup to time' out.
You can avoid this and save a time-consuming DNS lookup with the help of following command: R1 config no ip domain-lookup. Success rate is percent R3 ping isb "isb" In dynamic routing, a protocol on one router communicates with the same protocol running on neighbor routers.
The routers then update each other about all the networks they know about and place this information into the routing table. If a change occurs in the network, the dynamic routing protocols automatically inform all routers about the event.
If static routing is used, the administrator is responsible for updating all changes manually into all routers. Typically, in a large network, a combination of both dynamic and static routing is used. RIP sends the complete routing table out to all active interfaces every 30 seconds. RIP only uses hop count to determine the best way to a remote network, but it has a maximum allowable hop count of 15 by default, meaning that 16 is deemed unreachable.
RIP works well in small networks, but it's inefficient on large networks with slow WAN links or on networks with a large number of routers installed. RIP version 1 uses only classful routing, which means that all devices in the network must use the same subnet mask. This is because RIP version 1 doesn't send updates with subnet mask information in tow. RIP version 2 provides something called prefix routing and does send subnet mask information with the route updates.
This is called classless routing. R3 config-if It clock rate R3 config interface Loopbaok O R3 config-if ' exit Therefore, one cannot communicate with a remote device, e.
Rl NOTE: Remember that, when configuring the network and RIPv2 uses classless addresses. All IP addresses have a network and host portion. In c1assful addressing, the network portion ends on one of the separating dots in the address on an octet boundary. There were three address classes to choose from: Classless addre'ssi. J1g'" treats the IP address as a 32 bit stream of ones and zeroes, where the boundary. The administrative distance AD is used to rate the trustworthiness of routing information received on a router from a neighbor router.
An administrative distance is an integer from 0 to , where 0 is the most trusted and means no traffic will be passed via this route.
If a router receives two updates listing the same remote network, the first thing the router checks is the AD. If one of the advertised routes has a lower AD than the other, then the route with the lowest AD will be placed in the routing table. The advertised route with the lowest metric will be placed in the routing table. But if both advertised routes have the same AD as well as the same metrics, then the routing protocol will load-balance to the remote network which means that it sends packets over each link.
Network 3. Both RIPv1 and RIPv2 are distance-vector protocols, which means that each router running RIP sends its complete routing tables out all active interfaces at periodic time intervals.
Also, the timers and loop-avoidance schemes are the same in both RIP versions i. Both RIPv1 and RIPv2 are configured as classful addressing but RIPv2 is considered classless because subnet information is sent with each route update , and both have the same administrative distance RIP requires too much bandwidth, making it pretty intensive to use in your network. No authentication g.
No support for discontiguous.
R4 config IIinterface loopback o! R4 config-if 1I ip address 4. R4 config interface loopback 2'1 R4 config-if IIip address 4. R4 config-if exit NOTE:. Auto-summary command. R2 configure terminal R2 config 'router rip R2 config-router version R2 config-router network R2 config-router network R2 config-router network R2 config-router end R2.
R3 configure terminal R3 config router rip R3 config-router version R3 config-router network R3 config-router network R3 config-router network R3 config-router end R3. R4 configure terminal R4 config router rip R4 config-router version R4 config-router network R4 config-router network R4 config-router end R4.
Routing Protocol is "rip" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Sending updates every 30 seconds, next due in 24 seconds Invalid after seconds, hold down , flushed after Redistributing: Routing Information Sources: Gateway Distance Routing for Networks: Cisco created this routing protocol to overcome the problems associated with RIP.
This is helpful in larger networks and solves the problem of 15 hops being the maximum possible in a RIP network. IGRP uses bandwidth and delay of the line by default as a metric for determining the best route to an internetwork. This is called a composite metric.
Reliability, load, and maximum transmission unit MTU can also be used, although they are not used by default.
The main difference between RIP and supply the autonomous system number. Can be used in large internetworks b. Uses an autonomous system number for activation c. Gives a full route table update every 90 seconds d. Has an administrative distance of e. Uses bandwidth and delay of the line as metric lowest composite metric , with a maximum hop count of Gives a full route table update every 30 seconds Has an administrative distance of 12'0 Uses only hop count to determine the best path to a remote network, with 15 hops being the maximum.
It can be in the range from 0 to and should be same on the routers running IGRP. Rl configure terminal Rl config router igrp 5 Rl config-router network R2 configure terminal R2 config router igrp 5 R2 config-router network Last Update Gateway Distance And as you now know, the advertisement of subnet information allows us to use variable Length Subnet Masks VLSMs and summarization when designing our networks!
EIGRP is sometimes referred to as a hybrid routing protocol because it has characteristics of both distance-vector and link-state protocols. For example, EIGRP doesn't send link-state packets as OSPF does; instead, it sends traditional distance-vector updates containing information about networks plus the cost of reaching them from the perspective of the advertising router.
And EIGRP has link-state characteristics as well it synchronizes routing tables between neighbors at startup and then sends specific updates only when topology changes occur.
EIGRP has a maximum hop count of the default is set to There are protocols. R3 config-if exit The value can be R3 configure terminal R3 config router eigrp 2 R3 config-router network Incoming update filter list for all interfaces is not set.
If you have multiple routers and not all of them are Cisco what! If it's a large network, then, really, your only options are OSPF and something called route redistribution-a translation service between routing protocols that we discussed earlier in this chapter. OSPF works by using the Dijkstra algorithm. First, a shortest path tree is constructed, and then the routing table is populated with the resulting best paths.
OSPF provides the following features:. OSPF is the first link-state routing protocol that most people are introduced to, so it's useful to see how it compares to more traditional distance-vector protocols such as RIPv2 and RIPvl.
It's a unique number on this router th. It's purely a local value that essentially has little meaning, but'--it cannot start at 0; it has to start at a minimum of 1.
The second process will maintain an entirely separate copy of its topology table and manage its communications independently of the first process.
After identifying the OSPF process, you need to identify the interfaces that you want to activate OSPF communications on as well as the area in which each resides.
This will also configure the networks you're going to advertise to others. OSPF uses wildcards in the configuration-which are also used in access-list configurations. It is strongly recommended that before working with OSPF, you should have sound knowledge of wild cards and subnetting. R1 config-router NO: An OSPF area is a grouping of contiguous networks and routers. All routers in the same area share a common Area ID. Because a router can be a member of more than one area at a time, the Area ID is associated with specific interfaces on the router.
When configuring OSPF, you've got to remember that there must be an area 0 and that this is typically cDnfigured on the routers that connect to the backbone of the network.
Area can be a number from 0 - R3 configure terminal R3 config router ospf 1 R3 config-router network A cost is a. The CDSt of the entire path is the sum of the cos. Using The th: Similarly, metric value of network Dead Time R2 configure terminal R2 config router ospf 10 R3 configure terminal R3 config router ospf 10 R3 config-router network ROIAH indicates inter-area route.
R2 show ip protocol Routing Protocol is "ospf 10" Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Router ID Using a routing protocol to advertise routes that are learned by some other means, such as by another routing protocol, static routes, or directly connected routes, is called redistribution.
While running a single routing protocol throughout your entire IP internetwork is desirable, multi-protocol routing is common for a number of reasons, such as company mergers, multiple departments managed by multiple network administrators, and multi-vendor environments. Running different routing protocols is often part of a network design. In any case, having a multiple protocol environment makes redistribution a necessity.
Differences in routing protocol characteristics, such as metrics, administrative distance, classful and classless capabilities can effect redistribution.
Consideration must be given to these differences for redistribution to succeed. Remeffib,er hat there are following seven t topology: R3 configure terminal R3 config router ospf 5 R3 config-router network R4 configure terminal R4 config router eigrp R4 config-router network R4 config-router network R4 config-router end. Remember that, although routing protocols are running, but they are different communicate with each other until we apply redistribution technique.
Hop Count. Default-metric command represents hop count. The va. Suggested value is O. All the networks table. Following values. Routing routing table of router R4 has been completed. All table. E2 All the networks are listed in the routing table. They can be really helpful when you need to exercise control over network traffic. An access list would be your tool of choice for decision making in these situations. One of the most common and easiest to understand uses of access lists is filtering unwanted packets when implementing security policies.
For example, you can set them up to make very specific decisions about regulating traffic patterns so that they'll allow only certain hosts to access web resources on the Internet while restricting others.
With the right combination of access lists, network managers arm themselves with the power to enforce nearly any security policy they can invent.
There list: It's always compared with each line of the access list in sequential order-that is, it'll always start with the first line of the access list, then go to line 2, then line 3, and so on. It's compared with lines of the access list only until a match is made. Once the packet matches the condition on a line of the access list, the packet is acted upon and no further comparisons take place.
There is an implicit "deny" at the end of each access list-this means that if a packet doesn't match the condition on any of the lines in the access list, the packet will be discarded. All decisions are made based on the source IP address. This means that standard access lists basically permit or deny an entire suite of protocols. Target IF address: Datagram size : Rl ping. Datagram size [ Timeout in seconds [2: Extended commands.. Type escape "sequence.
Specify packets to reject Specify packets to forward Acces: Irnnenij Using the access-list number access list number 5.
Loose, Strict, Record, Timestamp, Verbose [none]: Sweep range of sizes [nl: RI ping Protocol [ip]: Timeout in seconds ; Extended commands [n]: Target address They can evaluate source and destination IP addresses, the protocol field in the Network layer header, and the port number at the Transport layer header. This gives extended access lists the ability to make much more granular decisions when controlling traffic. R2 configure terminal R2 config line vty 0 4 R2 config-line password R2 config-line login R2 config-line end R2.
Trying Open User Access Verification Password: D access-list deny tcp Rl ping Protocol [ip]: Datagram size [J: Timeout in seconds [2J; Extended commands [n]: Sending 5, byte rCMP Echos to Rl ping Protocol [ip: Timeout in seconds [2J: Since named access or extended and not actually a new type. They're functionally the same.
In the lower line, we are telling the other source address for any destination R2 config-ext-nacl end. Extended IP access list corvit deny icmp host 1. Datagram size Extended commands [nJ: Sweep range of sizes nJ: Sending 5, byte rCMP Echos to 2. Packet sent with a source address of Static NAT is a simple one-to-one mapping of private and public addresses. This support inbound connections from your public network into your private network. Stateful NAT configuration commands Create flow entries.
D interface Rl config R1 config ip nat inside source static Protocol [ip: Timeout in seconds 2: Extended commands [n: Set OF bit in IP header? Loose, Strict, Record, Timestamp, Verbose [none: Sweep range of sizes [n: Total active translations: FastEthernet9JO" -,? F Punted' packets: Queued Packets: A pool of network addresses is maintained and used when an outbound connection is made.
Each connection is assigned a unique public address. The maximum number of simultaneous connections is equal to the number of public addresses in the pool.
This is similar to a one-toone correspondence between addresses. The figure below illustrates Dynamic NAT. Loose, Strict, Record, Timestamp, verbose [none]: Rl ping Protocol [ipJ: Sweep range of sizes [nJ: Data pattern [oxABCD: Flag for inappropriate content. Related titles. Learning by Doing: Jump to Page. Search inside document.
Find the COM port ;e. Plug the other end of console port of router. This image is captured on Microsoft Windows Professional. In "Connection button. In the button. Specials for info C platform with Kbytes of main memory program load complete, entry point: The command prompt "I ' This is" the default mode of a router and is called user exec mode.
The next prompt looks like this: The prompt for this cdmmand looks like this: Configured from console by console Exercise NO. It is used before starting and ending of a message. NVRAM config last updated! LOGIN command end is used for checking enable password. I lOS of the device does not allow you to enter into Exercise No.
I Exercise No. An enable password is defined as follows: I o o o o D Haw the rauter boats into. Optians while baoting ignare canfiguration, disable baot messages Cans ale speed baud rate far a terminal emulatian session How to deal with the NVRAM canfiguratian Enabling ar disabling break functian The factory-default setting for the configuratian register is Ox21' I I This router has four serial interfaces interfaces of a router are in shutdown interface.
Building configuration DIJDd with l. TF1P Server 1. TCP fOf. PiNSe- refer to doa: JI Cancel want to sl!! Select the values as shown below window and press OK button.
I' Corvit Systems. WinAee'lls is already loaded in router's flash memory. III' Name.. Size r. Continued Exercise No.
These tools typically support options like o o o o How How How The many times to send requests? R1 Serial Version Open Now you can completely NOTE: R3 te1net Trying After successful router R3. Let's tel net from router see what happens?