Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Scaling Networks
EIGRP Practice Skills Assessment - Packet Tracer
A few things to keep in mind while completing this activity:
1. Do not use the browser Back button or close or reload any exam
windows during the exam.
2. Do not close Packet Tracer when you are done. It will close automatically.
3. Click the Submit Assessment button in the browser window to submit
your work.
Introduction
In Part I of this practice skills assessment, you will configure routing and ACLs.
You will configure dynamic routing with EIGRP for IPv4 and static and default
routes. In addition, you will configure two access control lists.
In Part II of this practice skills assessment, you will configure the Medical
Company network with RPVST+, port security, EtherChannel, DHCP, VLANs and
trunking, and routing between VLANs. In addition you will perform an initial
configuration on a switch, secure unused switch ports and secure SVIs. You will
also control access to the switch management network with an access control
list.
All IOS device configurations should be completed from a direct
terminal connection to the device console from an available host.
Some values that are required to complete the configurations have
not been given to you. In those cases, create the values that you need
to complete the requirements. These values may include certain IP
addresses, passwords, interface descriptions, banner text, and other
values.
When you have been given a text value, such as a password, user
name, DHCP pool name, ACL name, VLAN name, etc, you must enter
these values exactly as they are given in these instructions. If the
values do not match exactly, you may not receive credit for your
configuration.
For the sake of time, many repetitive but important configuration tasks have
been omitted from this activity. Many of these tasks, especially those related to
device security, are essential elements of a network configuration. The intent
of this activity is not to diminish the importance of full device configurations.
Configuration of RPVST+
Configuration of EtherChannel
Central:
West:
Bldg1:
Configure EtherChannel.
Configure trunking.
Bldg2:
Configure EtherChannel.
Configure trunking.
Activate RPVST+.
Bldg3:
Configure EtherChannel.
Configure trunking.
Internal PC hosts:
Tables
Note: You are provided with the networks that interfaces should be configured
on. Unless you are told to do differently in the detailed instructions below, you
are free to choose the host addresses to assign.
Addressing Table:
Device
East
Central
West
Bldg1
Interface Network
Configuration Details
S0/0/0
192.168.100.20/
192.168.100.21 255.255.255.252
30
S0/0/1
192.168.100.28/
192.168.100.29 255.255.255.252
30
G0/0
G0/1
S0/0/0
192.168.100.20/
192.168.100.22 255.255.255.252
30
S0/0/1
192.168.100.36/
192.168.100.37 255.255.255.252
30
S0/1/0
S0/0/0
192.168.100.28/
192.168.100.30 255.255.255.252
30
S0/0/1
192.168.100.36/
192.168.100.38 255.255.255.252
30
G0/1.2
10.10.2.0/24
10.10.2.1 255.255.255.0
G0/1.4
10.10.4.0/24
10.10.4.1 255.255.255.0
G0/1.8
10.10.8.0/24
10.10.8.1 255.255.255.0
G0/1.15
10.10.15.0/24
10.10.15.1 255.255.255.0
G0/1.25
10.10.25.0/24
10.10.25.1 255.255.255.0
SVI
10.10.25.0/24
10.10.25.254 255.255.255.0
Bldg2
SVI
10.10.25.0/24
10.10.25.253 255.255.255.0
Bldg3
SVI
10.10.25.0/24
10.10.25.252 255.255.255.0
Host 1
NIC
Host 2
NIC
NetAdmin 1
NIC
10.10.15.0/24
10.10.15.10 255.255.255.0
NetAdmin 2
NIC
10.10.15.0/24
10.10.15.20 255.255.255.0
15
25
LAB-A
LAB-B
LAB-C
Network
10.10.2.0/
24
10.10.4.0/
24
10.10.8.0/
24
NetAdm 10.10.15.0
in
/24
SWAdmin
Switc
Devi
h
ce
Ports
Bldg
Fa0/5
1
Bldg
Fa0/7
3
Bldg
Fa0/10
1
Bldg
Fa0/10
3
Bldg
Fa0/15
1
Bldg
Fa0/15
3
Bldg
Fa0/24
1
Bldg
Fa0/24
3
Bldg
SVI
2
Bldg
SVI
3
99
spare
N/A
all
Bldg
unuse
1
d ports
Fa0/1, Fa0/2
Bldg3
Fa0/1, Fa0/2
Bldg1
Fa0/3, Fa0/4
Bldg2
Fa0/3, Fa0/4
Bldg2
Fa0/5, Fa0/6
Bldg3
Fa0/5, Fa0/6
Instructions
All configurations must be performed through a direct terminal
connection to the device console lines from an available host.
Part I: EIGRP Router Configuration
Step 1: Plan the Addressing.
Determine the IP addresses that you will use for the required interfaces on the
devices and LAN hosts. Follow the configuration details provided in the
Addressing Table.
Step 2: Configure East.
Configure East with initial settings:
Configure the router host name: East. This value must be entered
exactly as it appears here.
Configure IP addressing.
Router East:
Interface serial 0/0/0
Ip address 192.168.100.21 255.255.255.252
Clock rate 128000
No shutdown
Exit
Interface serial 0/0/1
Ip address 192.168.100.29 255.255.255.252
No shutdown
Exit
Interface gi 0/0
Ip address 192.168.8.1 255.255.255.0
No shutdown
Exit
Interface gi 0/1
Ip address 192.168.9.1 255.255.255.0
No shutdown
Exit
Do write
Router Central:
Interface serial 0/0/0
Ip add 192.168.100.22 255.255.255.252
Description Central_To_East
No shutdown
Exit
Interface serial 0/0/1
Ip add 192.168.100.37 255.255.255.252
Clock rate 128000
Description Central_To_West
No shutdown
Exit
Interface serial 0/1/0
Ip add 203.0.113.18 255.255.255.248
Description Central_To_Internet
No shutdown
Exit
Do write
Router West:
Interface serial 0/0/0
Ip add 192.168.100.30 255.255.255.252
Clock rate 128000
No shutdown
Exit
Interface serial 0/0/1
Router West:
Interface gi 0/1.2
Encapsulation dot1q 2
Ip add 10.10.2.1 255.255.255.0
No shutdown
Exit
Interface gi 0/1.4
Encapsulation dot1q 4
Ip add 10.10.4.1 255.255.255.0
No shutdown
Exit
Interface gi 0/1.8
Encapsulation dot1q 8
Ip add 10.10.8.1 255.255.255.0
No shutdown
Exit
Interface gi 0/1.15
Encapsulation dot1q 15
Ip add 10.10.15.1 255.255.255.0
No shutdown
Exit
Interface gi 0/1.25
Encapsulation dot1q 25
Ip add 10.10.25 .1 255.255.255.0
No shutdown
Exit
Interface gi 0/1
No shutdown
Exit
Do write
Step 5: Configure EIGRP Routing and a default route.
a. On all routers:
Configure EIGRP for IPv4 to route between the internal networks. Use
ASN 100.
Use the precise wild card masks for all network statements.
You are not required to route the SW-Admin VLAN network over EIGRP.
Prevent routing updates from being sent on the LAN networks. Do not
use the default keyword version of the command to do so.
Router East:
Router eigrp 100
No auto-summary
Network 192.168.100.20 0.0.0.3
Network 192.168.100.28 0.0.0.3
Network 192.168.8.0 0.0.0.255
Network 192.168.9.0 0.0.0.255
Passive-interface gi 0/0
Passive-interface gi 0/1
Exit
Do write
Router Central:
Router eigrp 100
No auto-summary
Network 192.168.100.20 0.0.0.3
Network 192.168.100.36 0.0.0.3
Exit
Do write
Router West:
Router eigrp 100
No auto-summary
Network 192.168.100.28 0.0.0.3
Network 192.168.100.36 0.0.0.3
Network 10.10.2.0 0.0.0.255
Network 10.10.4.0 0.0.0.255
Network 10.10.8.0 0.0.0.255
Network 10.10.15.0 0.0.0.255
Passive-interface gi0/1.2
Passive-interface gi0/1.4
Passive-interface gi0/1.8
Passive-interface gi0/1.15
Passive-interface gi0/1.25
Exit
Do write
Configure EIGRP for IPv4 to distribute the default route to the other
routers.
Router Central:
ip route 0.0.0.0 0.0.0.0 serial 0/1/0
router eigrp 100
resdistribute static
exit
do write
Set the bandwidth of the link between East and Central to 128 kb/s.
Configure EIGRP for IPv4 with the route summary so that it will be sent to
the other routers. Be sure to configure the summary on all of the
appropriate interfaces.
Router East:
Interface serial 0/0/0
Bandwidth 128
Exit
Do write
Router Central:
Interface serial 0/0/0
Bandwidth 128
Exit
Do write
Router west:
Interface serial 0/0/0
Ip summary-address eigrp 100 10.10.0.0 255.255.240.0
Exit
Interface serial 0/0/1
Ip summary-address eigrp 100 10.10.0.0. 255.255.240.0
Exit
Do write
Step 7: Configure Access Control Lists.
You will configure two access control lists in this step. You should use
the any and host keywords in the ACL statements where appropriate. The ACL
specifications are as follows:
a. Restrict access to the vty lines on Central with an ACL:
Create a named standard ACL using the name telnetBlock. Be sure that
you enter this name exactly as it appears in this instruction or you will
not receive credit for your configuration.
Router Central:
Ip access-list standard telnetBlock
Permit host 198.51.100.5
Exit
Line vty 0 15
Ip access-class telnetBlock in
Exit
Do write
b. Block ping requests from the Internet with an ACL:
Prevent all other Internet hosts (not only the Internet hosts visible in the
topology) from pinging addresses inside the Medical Company network.
Block echo messages only.
Router Central:
Access-list 101 permit icmp host 198.51.100.5 any echo
Access-list 101 deny icmp any any echo
Access-list 101 permit ip any any
Hosts on the NetAdmin VLAN network should be able to reach all other
destinations.
Router West:
Access-list 1 permit 10.10.15.0 0.0.0.255
Interface gi 0/1.25
Ip access-group 1 out
Exit
Do write
Part II: Switching and DHCP Configuration
Step 1: Create and name VLANs.
On all three switches that are attached to West, create and name the VLANs
shown in the VLAN Table.
The VLAN names that you configure must match the values in the table
exactly.
Each switch should be configured with all of the VLANs shown in the
table.
Name LAB-C
Exit
Vlan 15
Name NetAdmin
Exit
Vlan 25
Name SW-Admin
Exit
Vlan 99
Name spare
Exit
Do write
Step 2: Assign switch ports to VLANs.
Using the VLAN table, assign the switch ports to the VLANs you created in Step
1, as follows:
All switch ports that you assign to VLANs should be configured to static
access mode.
Switch Bldg1:
Interface fa 0/5
Switchport mode access
Switchpor access vlan 2
No shutdown
Exit
Interface fa 0/10
Switchport mode access
Switchport access vlan 4
No shutdown
Exit
Interface fa 0/15
Switchport mode access
Switchport access vlan 8
No shutdown
Exit
Interface fa 0/24
Switchport mode access
Switchport access vlan 15
No shutdown
Exit
Do write
Switch Bldg3:
Interface fa 0/7
Switchport mode access
Switchport access vlan 2
No shutdown
Exit
Interface fa 0/10
Switchport mode access
Switchport access vlan 4
No shutdown
Exit
Interface fa 0/15
Switchport mode access
Switchport access vlan 8
No shutdown
Exit
Interface fa 0/24
Switchport mode access
Switchport access vlan 15
No shutdown
Exit
Do write
Step 3: Configure the SVIs.
Refer to the Addressing Table. Create and address the SVIs on all three of the
switches that are attached to West. Configure the switches so that they can
communicate with hosts on other networks. Full connectivity will be established
after routing between VLANs has been configured later in this assessment.
switch Bldg1:
Interface vlan 25
Ip address 10.10.25.254 255.255.255.0
No shutdown
Exit
Ip default-gateway 10.10.25.1
Do write
Swtich Bldg2:
Interface vlan 25
Ip address 10.10.25.253 255.255.25.0
No shutdown
Exit
Ip default-gateway 10.10.25.1
Do write
Switch Bldg3:
Interface vlan 25
Ip address 10.10.25.252 255.255.255.0
No shutdown
Exit
Ip default-gateway 10.10.25.1
Do write
Step 4: Configure Trunking and EtherChannel.
a. Use the information in the Port-Channel Groups table to configure
EtherChannel as follows:
Use LACP.
The switch ports on the Bldg2 side of the Channel 3 should initiate
negotiations with the switch ports on Bldg3.
The switch ports on the Bldg3 side of Channel 3 should not initiate
negotiations with the switch ports on the other side of the channel.
All channels should be ready to forward data after they have been
configured.
Switch Bldg1:
Interface range fa 0/1-2
Channel-group 1 mode active
Exit
Interface range fa 0/3-4
Channel-group 2 mode active
Exit
Do write
Switch Bldg2:
Interface range fa 0/3-4
Channel group 2 mode active
Exit
Interface range fa 0/5-6
Channel-group 3 mode active
Exit
Do write
Switch Bldg3:
Interface range fa 0/1-2
Channel-group 1 mode active
Exit
Interface range fa 0/5-6
Channel group 3 mode passive
No shutdown
Exit
Do write
b. Configure all port-channel interfaces as trunks.
Switch Bldg1:
Interface range fa 0/1-4
Switchport mode trunk
Exit
Interface port-channel 1
Switchport mode trunk
No shutdown
Exit
Interface port-channel 2
Switchport mode trunk
exit
Do write
Switch Bldg2:
Interface range fa 0/3-6
Switchport mode trunk
Exit
Interface port-channel 2
Switchport mode trunk
Exit
Interface port-channel 3
Switchport mode trunk
Exit
Do write
Switch Bldg 3:
Interface range fa 0/1-2, fa 0/5-6
Switchport mode trunk
Exit
Interface port-channel 1
Switchport mode trunk
Exit
Interface port-channel 3
Switchport mode trunk
exit
Do write
c. Configure static trunking on the switch port on Bldg2 that is connected
to West.
Switch Bldg2:
Interface gi 0/1
Switchport mode trunk
Exit
Do write
Step 5: Configure Rapid PVST+.
Configure Rapid PVST+ settings as follows:
a. Activate Rapid PVST+ and set root priorities.
All three switches should be configured to run Rapid PVST+.
Switch Bldg1:
Spanning-tree mode rapid-pvst
Spanning-tree vlan 2,4 root primary
Spanning-tree vlan 8,15 root secondary
Do write
Switch Bldg2:
Spanning-tree mode rapid-pvst
Switch Bldg3:
Spanning-tree mode rapid-pvst
Spanning-tree vlan 8,15 root primary
Spanning-tree vlan 2,4 root secondary
Do write
b. Activate PortFast and BPDU Guard on the active Bldg3 switch access ports.
Activate BPDU Guard on all access ports that are connected to hosts.
Switch Bldg 3:
interface range fa 0/7, fa 0/10, fa 0/15, fa 0/24
spanning-tree portfast
spanning-tree bpduguard enable
exit
do write
Ensure that all unused switch ports have been assigned to VLAN 99.
Each switch port should accept only two MAC addresses before a
security action occurs.
Switch Bldg1:
Interface range fa 0/6-9, fa 0/11-14, fa 0/16-23, gi 0/1-2
shutdown
Switchport mode access
Switchport access vlan 99
Exit
Interface range fa0/5, fa0/10, fa0/15, fa0/24
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
exit
do write
c. On Bldg2, configure the virtual terminal lines to accept only SSH
connections.
Switch Bldg2:
Ip domain-name ccnaPTSA.com
Crypto key generate rsa
1024
Ip ssh version 2
Line vty 0 15
Login local
Transport input ssh
Exit
Username netadmin secret SSHsecret9
Do write
Step 7: Configure West as a DHCP server for the hosts attached to the
Bldg1 and Bldg2 switches.
Configure three DHCP pools as follows:
Create a DHCP pool for hosts on VLAN 2 using the pool name vlan2pool.
Create a DHCP pool for hosts on VLAN 4 using the pool name vlan4pool.
Create a DHCP pool for hosts on VLAN 8 using the pool name vlan8pool.
All VLAN pool names must match the provided values above exactly.
Router West:
Ip dhcp excluded-address 10.10.2.1 10.10.2.5
Ip dhcp excluded-address 10.10.4.1 10.10.4.5
Ip dhcp excluded-address 10.10.8.1 10.10.8.5
Ip dhcp pool vlan2pool
Network 10.10.2.0 255.255.255.0
Dns-server 192.168.200.225
Default-router 10.10.2.1
Exit
Ip dhcp pool vlan4pool