Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
CCNA 3 Routing and Switching Scaling Networks EIGRP Practice Skills Assessment
Packet Tracer
http://www.ccna5.net/ccna-3-routing-and-switching-scaling-networks-eigrp-practice-
skills-assessment-packet-tracer/1666
Do not use the browser Back button or close or reload any exam windows during the
exam.
Do not close Packet Tracer when you are done. It will close automatically.
Click the Submit Assessment button in the browser window to submit your work.
Introduction
In Part I of this practice skills assessment, you will configure routing and ACLs.
You will configure dynamic routing with EIGRP for IPv4 and static and default
routes. In addition, you will configure two access control lists.
In Part II of this practice skills assessment, you will configure the Medical
Company network with RPVST+, port security, EtherChannel, DHCP, VLANs and trunking,
and routing between VLANs. In addition you will perform an initial configuration on
a switch, secure unused switch ports and secure SVIs. You will also control access
to the switch management network with an access control list.
All IOS device configurations should be completed from a direct terminal connection
to the device console from an available host.
Some values that are required to complete the configurations have not been given to
you. In those cases, create the values that you need to complete the requirements.
These values may include certain IP addresses, passwords, interface descriptions,
banner text, and other values.
For the sake of time, many repetitive but important configuration tasks have been
omitted from this activity. Many of these tasks, especially those related to device
security, are essential elements of a network configuration. The intent of this
activity is not to diminish the importance of full device configurations.
East:
Tables
Note: You are provided with the networks that interfaces should be configured on.
Unless you are told to do differently in the detailed instructions below, you are
free to choose the host addresses to assign.
Addressing Table:
Device
Interface
Network
Configuration Details
East
S0/0/0
192.168.100.20/30
any address in the network
S0/0/1
192.168.100.28/30
any address in the network
G0/0
192.168.8.0/24
first host address
G0/1
192.168.9.0/24
first host address
Central
S0/0/0
192.168.100.20/30
any address in the network
S0/0/1
192.168.100.36/30
any address in the network
S0/1/0
203.0.113.16/29
(The first address in this network is already in use on the ISP router. Any other
address in the network can be assigned to this interface.)
West
S0/0/0
192.168.100.28/30
any address in the network
S0/0/1
192.168.100.36/30
any address in the network
G0/1.2
10.10.2.0/24
first address in the network
G0/1.4
10.10.4.0/24
first address in the network
G0/1.8
10.10.8.0/24
first address in the network
G0/1.15
10.10.15.0/24
first address in the network
G0/1.25
10.10.25.0/24
first address in the network
Bldg1
SVI
10.10.25.0/24
the highest address in the network
Bldg2
SVI
10.10.25.0/24
the second to the highest address in the network
Bldg3
SVI
10.10.25.0/24
the third to the highest address in the network
Host 1
NIC
192.168.8.0/24
any available address in the network
Host 2
NIC
192.168.9.0/24
any available address in the network
NetAdmin 1
NIC
10.10.15.0/24
any available address in the network
NetAdmin 2
NIC
10.10.15.0/24
any available address in the network
VLAN Switch Port Assignment Table:
VLAN
Name
Network
Device
Switch Ports
2
LAB-A
10.10.2.0/24
Bldg1
Fa0/5
Bldg3
Fa0/7
4
LAB-B
10.10.4.0/24
Bldg1
Fa0/10
Bldg3
Fa0/10
8
LAB-C
10.10.8.0/24
Bldg1
Fa0/15
Bldg3
Fa0/15
15
NetAdmin
10.10.15.0/24
Bldg1
Fa0/24
Bldg3
Fa0/24
25
SW-Admin
10.10.25.0/24
Bldg1
SVI
Bldg2
SVI
Bldg3
SVI
99
spare
N/A
Bldg1
all unused ports
Port-Channel Group Interfaces:
Channel
Device
Interfaces
1
Bldg1
Fa0/1, Fa0/2
Bldg3
Fa0/1, Fa0/2
2
Bldg1
Fa0/3, Fa0/4
Bldg2
Fa0/3, Fa0/4
3
Bldg2
Fa0/5, Fa0/6
Bldg3
Fa0/5, Fa0/6
Instructions
Determine the IP addresses that you will use for the required interfaces on the
devices and LAN hosts. Follow the configuration details provided in the Addressing
Table.
Configure the router host name: East. This value must be entered exactly as it
appears here.
Prevent the router from attempting to resolve command line entries to IP addresses.
Protect device configurations from unauthorized access with an encrypted secret
password.
Secure the router console and remote access lines.
Prevent system status messages from interrupting console output.
Configure a message-of-the-day banner.
Encrypt all clear text passwords.
Hostname East
No ip domain look up
Line console 0
Password cisco
Logging sinchronus
Login
Line vty 0 4
Password cisco
login
Service password-encryption
Use the information in the addressing table to configure the interfaces of all
routers for full connectivity with the following:
Configure IP addressing.
Descriptions for all physical interfaces.
Configure DCE settings where required. Use a rate of 128000.
The Ethernet subinterfaces on West will be configured later in this assessment.
Step 4: Configure inter-VLAN routing on West.
Configure router West to route between VLANs using information in the Addressing
Table and VLAN Switch Port Assignment Table. The VLANs will be configured on the
switches later in this assessment.
a. On all routers:
Configure EIGRP for IPv4 to route between the internal networks. Use ASN 100.
Use the precise wild card masks for all network statements.
You are not required to route the SW-Admin VLAN network over EIGRP.
Prevent routing updates from being sent on the LAN networks. Do not use the
default keyword version of the command to do so.
Prevent EIGRP for IPv4 from performing automatic route summarization on all
routers.
b. On the Central router:
Configure a default route to the Internet. Use the exit interface argument.
Configure EIGRP for IPv4 to distribute the default route to the other routers.
Step 6: Customize EIGRP for IPv4.
You will configure two access control lists in this step. You should use the any
and host keywords in the ACL statements where appropriate. The ACL specifications
are as follows:
Create a named standard ACL using the name TELNET-BLOCK. Be sure that you enter
this name exactly as it appears in this instruction.
Allow only Test PC to access the vty lines of Central.
No other Internet hosts (including hosts not visible in the topology) should be
able to access the vty lines of Central.
Your solution should consist of one ACL statement.
b. Block ping requests from the Internet with an ACL:
On all three switches that are attached to West, create and name the VLANs shown in
the VLAN Table.
The VLAN names that you configure must match the values in the table exactly.
Each switch should be configured with all of the VLANs shown in the table.
Step 2: Assign switch ports to VLANs.
Using the VLAN table, assign the switch ports to the VLANs you created in Step 1,
as follows:
All switch ports that you assign to VLANs should be configured to static access
mode.
All switch ports that you assign to VLANs should be activated.
Step 3: Configure the SVIs.
Refer to the Addressing Table. Create and address the SVIs on all three of the
switches that are attached to West. Configure the switches so that they can
communicate with hosts on other networks. Full connectivity will be established
after routing between VLANs has been configured later in this assessment.
Use LACP.
The switch ports on both sides of Channels 1 and 2 should initiate negotiations for
channel establishment.
The switch ports on the Bldg2 side of the Channel 3 should initiate negotiations
with the switch ports on Bldg3.
The switch ports on the Bldg3 side of Channel 3 should not initiate negotiations
with the switch ports on the other side of the channel.
All channels should be ready to forward data after they have been configured.
b. Configure all port-channel interfaces as trunks.
c. Configure static trunking on the switch port on Bldg2 that is connected to West.
You are required to complete the following only on some of the devices in the
network for this assessment. In reality, security should be configured on all
devices in the network.
a. Secure unused switch ports. Following security best practices, do the following
on Bldg1 only:
Create a DHCP pool for hosts on VLAN 2 using the pool name vlan2pool.
Create a DHCP pool for hosts on VLAN 4 using the pool name vlan4pool.
Create a DHCP pool for hosts on VLAN 8 using the pool name vlan8pool.
All VLAN pool names must match the provided values exactly.
Exclude the first five addresses from each pool.
Configure a DNS server address of 192.168.200.225.
All hosts should be able to communication with hosts on other networks.
Step 8: Configure host addressing.
All hosts should be able to ping each other and the two external servers after they
have been addressed.
Configuration
***BLDG1*** or ***SW-A***
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
no shutdown
interface fa0/5
interface fa0/10
interface fa0/15
interface fa0/24
shutdown
ETHERCHANNEL
interface port-channel 1
interface port-channel 2
PVST+
SECURITY
interface fa0/5
switchport port-security
interface fa0/10
switchport port-security
interface fa0/15
switchport port-security
interface fa0/24
switchport port-security
***BLDG2*** or ***SW-B***
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
no shutdown
interface gi 1/1
ETHERCHANNEL
interface port-channel 2
interface port-channel 3
PVST+
SSH
hostname SW-B
ip ssh version 2
ip domain-name ccnaPTSA.com
line vty 0 4
login local
line vty 5 15
login local
***BLDG3*** or ***SW-C***
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
no shutdown
interface fa0/7
interface fa0/10
interface fa0/15
interface fa0/24
ETHERCHANNEL
no shutdown
interface port-channel 1
no shutdown
interface port-channel 3
PVST+
spanning-tree portfast
no shutdown
***Central*** or ***HQ***
bandwidth 128
description SITE
no shutdown
bandwidth 128
no shutdown
bandwidth 128
description INTERNET
no shutdown
EIGRP
redistribute static
no auto-summary
ACCESS LIST
line vty 0 4
access-class TELNET-BLOCK in
ip access-group 101 in
***East*** or ***Site1***
hostname Site-1
no ip domain-lookup
line console 0
logging synchronous
password cisco
login
line vty 0 4
password cisco
login
service password-encryption
bandwidth 128
description HQ
no shutdown
bandwidth 128
description HQ
no shutdown
interface gi 0/0
description SITE
no shutdown
interface gi 0/1
no shutdown
EIGRP
passive-interface GigabitEthernet0/0
passive-interface GigabitEthernet0/1
no auto-summary
***West*** or ***Site2***
bandwidth 128
description SITE
no shutdown
bandwidth 128
description SITE
no shutdown
description SITE
no shutdown
interface gi 0/1.2
encapsulation dot1q 2
interface gi 0/1.4
encapsulation dot1q 4
interface gi 0/1.8
encapsulation dot1q 8
encapsulation dot1q 15
interface gi 0/1.25
encapsulation dot1q 25
EIGRP
passive-interface GigabitEthernet0/1
no auto-summary
passive-interface g0/1.2
passive-interface g0/1.4
passive-interface g0/1.8
passive-interface g0/1.15
ROUTE SUMMARIZATION
DHCP
default-router 10.10.2.1
dns-server 192.168.200.225
default-router 10.10.4.1
dns-server 192.168.200.225
default-router 10.10.8.1
dns-server 192.168.200.225
ACCESS LIST
interface gi0/1.25
ip access-group 1 out
***HOSTS***
11March 4, 2014 by CCNA5.NET in CCNA 3 v5.0 Routing and Switching, CCNA v5.0 Final
Exams Packet Tracerccnaccna 3 final examccna skill assessmentccna3 skill eigrp
Comments
SITE 1
hostname Site-1
no ip domain-lookup
enable secret class
line console 0
logging synchronous
password cisco
login
line vty 0 4
password cisco
login
service password-encryption
banner motd Authorized acces only
interface serial 0/0/0
bandwidth 128
ip address 192.168.100.21 255.255.255.252
description HQ
clock rate 128000
no shutdown
interface serial 0/0/1
bandwidth 128
ip address 192.168.100.29 255.255.255.252
description HQ
no shutdown
interface gi 0/0
ip address 192.168.8.1 255.255.255.0
description SITE
no shutdown
interface gi 0/1
ip address 192.168.9.1 255.255.255.0
no shutdown
EIGRP
router eigrp 100
passive-interface GigabitEthernet0/0
passive-interface GigabitEthernet0/1
network 192.168.100.20 0.0.0.3
network 192.168.100.28 0.0.0.3
network 192.168.8.0 0.0.0.255
network 192.168.9.0 0.0.0.255
no auto-summary
HQ
ip route 0.0.0.0 0.0.0.0 s0/1/0
interface serial 0/0/0
bandwidth 128
ip address 192.168.100.22 255.255.255.252
description SITE
no shutdown
interface serial 0/0/1
bandwidth 128
ip address 192.168.100.37 255.255.255.252
description SITE
clock rate 128000
no shutdown
interface serial 0/1/0
bandwidth 128
ip address 203.0.113.18 255.255.255.248
description INTERNET
no shutdown
EIGRP
router eigrp 100
redistribute static
network 192.168.100.20 0.0.0.3
network 192.168.100.36 0.0.0.3
no auto-summary
ACCESS LIST
ip access-list standard TELNET-BLOCK
permit host 198.51.100.5
line vty 0 4
access-class TELNET-BLOCK in
SITE 2
interface serial 0/0/0
bandwidth 128
ip address 192.168.100.30 255.255.255.252
description SITE
no shutdown
interface serial 0/0/1
bandwidth 128
ip address 192.168.100.38 255.255.255.252
description SITE
no shutdown
interface gi 0/1
no shutdown
interface gi 0/1.2
encapsulation dot1q 2
ip address 10.10.2.1 255.255.255.0
interface gi 0/1.4
encapsulation dot1q 4
ip address 10.10.4.1 255.255.255.0
interface gi 0/1.8
encapsulation dot1q 8
ip address 10.10.8.1 255.255.255.0
interface gi 0/1.15
encapsulation dot1q 15
ip address 10.10.15.1 255.255.255.0
interface gi 0/1.25
encapsulation dot1q 25
ip address 10.10.25.1 255.255.255.0
EIGRP
router eigrp 100
passive-interface GigabitEthernet0/1
network 192.168.100.28 0.0.0.3
network 192.168.100.36 0.0.0.3
network 10.10.2.0 0.0.0.255
network 10.10.4.0 0.0.0.255
network 10.10.8.0 0.0.0.255
network 10.10.15.0 0.0.0.255
no auto-summary
passive-interface g0/1.2
passive-interface g0/1.4
passive-interface g0/1.8
passive-interface g0/1.15
ROUTE SUMMARIZATION
interface serial 0/0/0
ip summary-address eigrp 100 10.10.0.0 255.255.240.0
interface serial 0/0/1
ip summary-address eigrp 100 10.10.0.0 255.255.240.0
DHCP
ip dhcp excluded-address 10.10.2.1 10.10.2.5
ip dhcp excluded-address 10.10.4.1 10.10.4.5
ip dhcp excluded-address 10.10.8.1 10.10.8.5
ip dhcp pool vlan2pool
network 10.10.2.0 255.255.255.0
default-router 10.10.2.1
dns-server 192.168.200.225
ip dhcp pool vlan4pool
network 10.10.4.0 255.255.255.0
default-router 10.10.4.1
dns-server 192.168.200.225
ip dhcp pool vlan8pool
network 10.10.8.0 255.255.255.0
default-router 10.10.8.1
dns-server 192.168.200.225
ACCESS LIST
access-list 1 permit 10.10.15.0 0.0.0.255
interface gi0/1.25
ip access-group 1 out
SW-A
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
ip address 10.10.25.254 255.255.255.0
no shutdown
interface fa0/5
switchport mode acces
switchport acces vlan 2
interface fa0/10
switchport mode acces
switchport acces vlan 4
interface fa0/15
switchport mode acces
switchport acces vlan 8
interface fa0/24
switchport mode acces
switchport acces vlan 15
ETHERCHANNEL
interface range fa0/1-2
channel-group 1 mode active
interface port-channel 1
switchport mode trunk
interface range fa0/3-4
channel-group 2 mode active
interface port-channel 2
switchport mode trunk
PVST+
spanning-tree mode rapid-pvst
spanning-tree vlan 2 root primary
spanning-tree vlan 4 root primary
spanning-tree vlan 8 root secondary
spanning-tree vlan 15 root secondary
SECURITY
interface fa0/5
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/10
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/15
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/24
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
SW-B
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
ip address 10.10.25.253 255.255.255.0
no shutdown
interface gi 1/1
switchport mode trunk
ETHERCHANNEL
interface range fa0/3-4
channel-group 2 mode active
interface port-channel 2
switchport mode trunk
interface range fa0/5-6
channel-group 3 mode active
interface port-channel 3
switchport mode trunk
PVST+
spanning-tree mode rapid-pvst
SSH
hostname SW-B
ip ssh version 2
ip domain-name ccnaPTSA.com
crypto key generate rsa
username netadmin password SSH_secret9
line vty 0 4
login local
transport input ssh
line vty 5 15
login local
transport input ssh
SW-C
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
ip address 10.10.25.252 255.255.255.0
no shutdown
interface fa0/7
switchport mode acces
switchport acces vlan 2
interface fa0/10
switchport mode acces
switchport acces vlan 4
interface fa0/15
switchport mode acces
switchport acces vlan 8
interface fa0/24
switchport mode acces
switchport acces vlan 15
ETHERCHANNEL
interface range fa0/1-2
channel-group 1 mode active
no shutdown
interface port-channel 1
switchport mode trunk
PVST+
spanning-tree mode rapid-pvst
spanning-tree vlan 2 root secondary
spanning-tree vlan 4 root secondary
spanning-tree vlan 8 root primary
spanning-tree vlan 15 root primary
meApril 1, 2014Reply
i think this is the acc list
Router Main :
Router Bldg-2 :
SITE 1
hostname Site-1
no ip domain-lookup
line console 0
logging synchronous
password cisco
login
line vty 0 4
password cisco
login
service password-encryption
bandwidth 128
description HQ
no shutdown
bandwidth 128
description HQ
no shutdown
interface gi 0/0
description SITE
no shutdown
interface gi 0/1
no shutdown
EIGRP
passive-interface GigabitEthernet0/0
passive-interface GigabitEthernet0/1
no auto-summary
HQ
bandwidth 128
description SITE
no shutdown
bandwidth 128
description SITE
no shutdown
bandwidth 128
no shutdown
EIGRP
redistribute static
no auto-summary
ACCESS LIST
line vty 0 4
access-class TELNET-BLOCK in
ip access-group 101 in
SITE 2
bandwidth 128
description SITE
no shutdown
bandwidth 128
description SITE
no shutdown
interface gi 0/1
no shutdown
interface gi 0/1.2
encapsulation dot1q 2
ip address 10.10.2.1 255.255.255.0
interface gi 0/1.4
encapsulation dot1q 4
interface gi 0/1.8
encapsulation dot1q 8
interface gi 0/1.15
encapsulation dot1q 15
interface gi 0/1.25
encapsulation dot1q 25
EIGRP
passive-interface GigabitEthernet0/1
no auto-summary
passive-interface g0/1.2
passive-interface g0/1.4
passive-interface g0/1.8
passive-interface g0/1.15
ROUTE SUMMARIZATION
DHCP
default-router 10.10.2.1
dns-server 192.168.200.225
default-router 10.10.4.1
dns-server 192.168.200.225
default-router 10.10.8.1
dns-server 192.168.200.225
ACCESS LIST
interface gi0/1.25
ip access-group 1 out
SW-A
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
no shutdown
interface fa0/5
interface fa0/10
interface fa0/15
interface fa0/24
shutdown
ETHERCHANNEL
interface port-channel 1
interface port-channel 2
PVST+
SECURITY
interface fa0/5
switchport port-security
interface fa0/10
switchport port-security
interface fa0/15
switchport port-security
interface fa0/24
switchport port-security
SW-B
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
no shutdown
interface gi 1/1
ETHERCHANNEL
interface port-channel 3
PVST+
SSH
hostname SW-B
ip ssh version 2
ip domain-name ccnaPTSA.com
line vty 0 4
login local
line vty 5 15
login local
SW-C
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
no shutdown
interface fa0/7
interface fa0/10
interface fa0/15
interface fa0/24
ETHERCHANNEL
no shutdown
interface port-channel 1
no shutdown
interface port-channel 3
switchport mode trunk
PVST+
spanning-tree portfast
no shutdown
moonJune 7, 2014
THanks man, i got 97% from that. For some reason, i cannot get 100%, the line
fa0/24 on both switches network could not request DHCP DHCP requesting failed
bulyMay 6, 2015Reply
NEW 2015-05
ScaN Skills Assessment EIGRP Student Training Exam
R1,R2,R3
ena
erase startup-config
reload
###############################################
S1,S2,S3
ena
erase startup-config
delete vlan.dat
reload
ena
show flash (4414921)
##############################################
R1
ena
conf t
no ip domain-lookup
hostname R1
enable secret class
line console 0
password cisco
login
line vty 0 4
password cisco
login
exit
service password-encryption
banner motd #Unauthorized Access is Prohibited!#
!
int g0/1
description Connection to S1
ip add 172.27.0.1 255.255.255.0
no sh
!
int s0/0/0
description Connection to R2
ip add 172.27.123.1 255.255.255.252
clock rate 128000
no sh
!
int lo 1
ip add 172.27.1.1 255.255.255.0
!
int lo 2
ip add 172.27.2.1 255.255.255.0
!
int lo 3
ip add 172.27.3.2 255.255.255.0
!
end
copy running-config startup-config
#################################################
R2
ena
conf t
no ip domain-lookup
hostname R2
enable secret class
line console 0
password cisco
login
line vty 0 4
password cisco
login
exit
service password-encryption
banner motd #Unauthorized Access is Prohibited!#
!
int s0/0/0
description Connection to R1
ip add 172.27.123.2 255.255.255.252
no sh
!
int s0/0/1
description Connection to R3
ip add 172.27.123.5 255.255.255.252
clock rate 128000
no sh
!
int lo 0
description Connection to Internet
ip add 209.165.200.225 255.255.255.248
exit
!
ip route 0.0.0.0 0.0.0.0 lo0
!
end
copy running-config startup-config
####################################################
R3
ena
conf t
no ip domain-lookup
hostname R3
enable secret class
line console 0
password cisco
login
line vty 0 4
password cisco
login
exit
service password-encryption
banner motd #Unauthorized Access is Prohibited!#
!
int g0/1
description Connection to S3
ip add 172.27.0.3 255.255.255.0
no sh
!
int s0/0/1
description Connection to R2
ip add 172.27.123.6 255.255.255.252
no sh
exit
!
int lo 4
ip add 172.27.4.1 255.255.255.0
!
int lo 5
ip add 172.27.5.1 255.255.255.0
!
int lo 6
ip add 172.27.6.1 255.255.255.0
!
end
copy running-config startup-config
#################################################
S1
ena
conf t
no ip domain-lookup
hostname S1
enable secret class
line console 0
password cisco
login
line vty 0 4
password cisco
login
exit
service password-encryption
banner motd #Unauthorized Access is Prohibited!#
!
int vlan 1
ip add 172.27.0.11 255.255.255.0
no sh
exit
ip default-gateway 172.27.0.2
int range fa0/1-4
switchport mode trunk
switchport trunk native vlan 1
exit
!
int range fa0/5-24, g0/1-2
switchport mode access
switchport nonegotiate
!
int range fa0/7-24, g0/1-2
sh
!
end
copy running-config startup-config
####################################################
S2
ena
conf t
no ip domain-lookup
hostname S2
enable secret class
line console 0
password cisco
login
line vty 0 4
password cisco
login
exit
service password-encryption
banner motd #Unauthorized Access is Prohibited!#
!
int vlan 1
ip add 172.27.0.12 255.255.255.0
no sh
exit
ip default-gateway 172.27.0.2
!
int range fa0/1-4
switchport mode trunk
switchport trunk native vlan 1
exit
!
int range fa0/5-24, g0/1-2
switchport mode access
switchport nonegotiate
!
int range fa0/5-17, fa0/19-24, g0/1-2
sh
!
end
copy running-config startup-config
##################################################
S3
ena
conf t
no ip domain-lookup
hostname S3
enable secret class
line console 0
password cisco
login
line vty 0 4
password cisco
login
exit
service password-encryption
banner motd #Unauthorized Access is Prohibited!#
!
int vlan 1
ip add 172.27.0.13 255.255.255.0
no sh
exit
ip default-gateway 172.27.0.2
!
int range fa0/5-24, g0/1-2
switchport mode access
switchport nonegotiate
!
int range fa0/6-17, fa0/19-24, g0/1-2
sh
!
end
copy running-config startup-config
###########################################
nustatome pc ip
PC-A
IP
172.27.0.21
MASK
255.255.255.0
DEFAULT GATEWAY
172.27.0.2
PC-B
IP
172.27.0.22
MASK
255.255.255.0
DEFAULT GATEWAY
172.27.0.2
PC-C
IP
172.27.0.23
MASK
255.255.255.0
DEFAULT GATEWAY
172.27.0.2
##############################################
S1
ena
conf t
!
spanning-tree mode rapid-pvst
spanning-tree vlan 1 root primary
int fa0/6
spanning-tree portfast
!
spanning-tree bpduguard enable
########
S2
ena
conf t
!
spanning-tree mode rapid-pvst
int fa0/18
spanning-tree portfast
!
spanning-tree bpduguard enable
!
end
copy running-config startup-config
##########
S3
ena
conf t
!
spanning-tree mode rapid-pvst
spanning-tree vlan 1 root secondary
int fa0/18
spanning-tree portfast
!
spanning-tree bpduguard enable
exit
###########
R1
conf t
int g0/1
standby 1 ip 172.27.0.2
!
standby 1 priority 150
standby preempt
exit
!
############
R3
int g0/1
standby 1 ip 172.27.0.2
exit
!
############
S1
############
S3
conf t
int range fa0/3-4
channel-group 1 mode passive
exit
###########
R1
conf t
router eigrp 1
eigrp router-id 1.1.1.1
do show ip route connected
ip hold-time eigrp 1 90
############
R2
conf t
router eigrp 1
eigrp router-id 2.2.2.2
do show ip route connected
redistribute static
int s0/0/0
bandwidth 128
int s0/0/1
bandwidth 128
?
ip hello-interval eigrp 1 30
ip hold-time eigrp 1 90
ip bandwidth-percent eigrp 1 70
?
exit
key chain EIGRP-KEY
key 1
key-string cisco
exit
exit
int s0/0/0
ip authentication key-chain eigrp 1 EIGRP-KEY
ip authentication mode eigrp 1 md5
no ip hello-interval eigrp 1
int s0/0/1
no ip hello-interval eigrp 1
#######################
R3
conf t
router eigrp 1
eigrp router-id 3.3.3.3
do show ip route connected
##########
R2
int s0/0/1
no ip hello-interval eigrp 1
##########
R3
no auto-summary
int s0/0/1
bandwidth 128
ip hello-interval eigrp 1 30
no ip hello-interval eigrp 1
ip hold-time eigrp 1 90
ip bandwidth-percent eigrp 1 70
exit
key 1
key-string cisco
exit
exit
int s0/0/1
ip authentication key-chain eigrp 1 EIGRP-KEY
ip authentication mode eigrp 1 md5
###########
R2 show run
conf t
int s0/0/1
ip authentication key-chain eigrp 1 EIGRP-KEY
ip authentication mode eigrp 1 md5
end
show ip protocols
#######
##############
R1
int g0/1
sh
##########
##########
R2
show version
show flash
show version
show flash
conf t
license accept end user agreement