Sei sulla pagina 1di 1

First of all, when you arrive in the exam room, write on a Draft all

the possibilities (R1 NAT ACL/ R1 IN ACL/R1 OSPF Authentication…) and delete them
each time you solve the problem on a ticket (it helps to search the problem)

IPV4 Most IMPORTANT: IPV6


READ THE SCENARIO
/INSTRUCTION
Client 1 (10.2.1.3) is unable to connect R1 ipv6 loopback is unable to ping
to Webserver (209.65.200.241) DSW1 ipv6 loopback

R2
IPV6 OSPF Statement
DSW1 R1
NO On R2, IPv6 OSPF Routing,
NO Traceroute YES Ping ipv6 R3
Under the interface Serial
209.65.200.241 (s0/0/0.23 ipv6
0/0/0.23 configuration
Source 10.1.4.6 addr)
enter the ipv6 ospf 6 area
0 command
YES
DSW1
NO Traceroute YES
DSW1
209.65.200.241
Result of
Source 10.2.1.1 R3
traceroute
R1 Tunnel mode
NO On R3, IPv4 and IPv6
Ping ipv6 R4
YES It was probably an IPV6 Interoperability, remove
Stop at * * * * Stop at 10.1.1.1 DSW1 DSW1 Question so (tunnel ipv6 addr) the command tunnel
Result of Ping 10.2.1.3
traceroute
Read the scenario mode ipv6
Stop at 10.1.1.9

NO ASW1 YES
R4 Port Security
No Neighbor On ASW1, Port Security, In
Verify EIGRP
Neighbor/ Configuration mode, using
ASW1 DOWN the interface range Fa 1/0/
Route Verify
1 – 2, then no switchport R4
Interface
port-security, RIPng to OSPFv3 Redistribution
Stop at * * * * Stop at 10.1.1.1
Neighbor OK followed by shutdown, no On R4, IPv6 Route Redistribution, Under
But no D EX 0.0.0.0 route R1 UP shutdown interface the ipv6 OSPF 6 process, add the
Verify OSPF configuration commands command redistribute RIP RIP_ZONE
Authentication
include-connected
R4 NOK
OSPF to EIGRP redistribution ASW1
On R4, IPv4 Route Redistribution, Verify Vlan
DSW1 R1
Under the EIGRP process, delete Verify Verify NAT ACL
the redistribute ospf 1 route- VLAN Filter
R1
map OSPF_ to_ EIGRP
command and enter the
OSPF Authentication VLAN OK
On R1, IPV4 OSPF Routing, Enable
redistribute ospf 1 route-map
OSPF authentication on the s0/0/0
OSPF - > EIGRP command
interface using the ip ospf DSW1 R1 ASW1
authentication messagedigest VLAN ACL ASW1
NAT ACL Vlan Access
command On DSW1, VLAN Switch-to-Switch Connectivity
On R1, IP NAT, On ASW1, Access Vlans, In
ACL / Port ACL, On ASW1, Switch to Switch
Under the ip access- Configuration mode, using
R4 Under the global connectivity, In Configuration
NO list standard the interface range
EIGRP (passive interface) R1 configuration mode mode, using the interface port-
nat_trafic Fastethernet 1/0/1 – 2,
On R4, IPv4 EIGRP Routing, Ping ISP Router enter no vlan filter channel 13, port-channel 23,
configuration enter then switchport access
Enable EIGRP on the test1 vlan-list 10 then configure
the permit 10.2.0.0 vlan 10 command
FastEthernet0/0 and command switchport trunk none allowed
0.0.255.255
FastEthernet0/1 interface vlan none followed by
command
using the no YES switchport trunk allowed vlan
passiveinterface R1 10,200
command BGP Neighbor statement error commands
On R1, BGP, Under the BGP
process, delete the neighbor
R1
209.56.200.226 remote-as 65002
Verify INBOUND ACL on int s0/0/01
command and
On R1, IPv4 layer 3 Security, Under
enter the neighbor
the ip access-list extended
209.65.200.226 remote-as 65002
edge_security configuration add
command
the permit ip 209.65.200.224
0.0.0.3 any command

Potrebbero piacerti anche