Ccna Virtual Lab
Ccna Virtual Lab
Ccna Virtual Lab
Virtual Lab
T I TAN I U M E D I T I O N 3 . 0
Work with Practice Scenarios Based on
CCNA Exam Objectives
Set Up Custom Network Congurations
Easily with Drag-and-Drop Functionality
Hone Your Skills for the Exams with over
150 Hands-On Labs
Use an Unlimited Number of Switches,
Routers, and Hosts in Your Virtual Network
Get Useful Feedback with the Valuable
Net Assessment Tool
SERIOUS SKILLS.
William Tedder
BESTSELLING LAB SIMULATION SOFTWARE
C
O
P
Y
R
I
G
H
T
E
D
M
A
T
E
R
I
A
L
Senior Acquisitions Editor: Jeff Kellum
Development Editor: Tom Cirtin
Technical Editor: Troy McMillan
Production Editor: Christine OConnor
Editorial Manager: Pete Gaughan
Production Manager: Tim Tate
Vice President and Executive Group Publisher: Richard Swadley
Vice President and Publisher: Neil Edde
Supervising Producer, Vertical Websites: Richard Graves
Book Designers: Judy Fung and Bill Gibson
Compositor: Craig Woods, Happenstance Type-O-Rama
Proofreader: Josh Chase, Word One New York
Project Coordinator, Cover: Katherine Crocker
Cover Designer: Ryan Sneed
Copyright 2012 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-118-43199-3
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as
permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior
written permission of the Publisher, or authorization through payment of the appropriate per-copy
fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400,
fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions
Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax
(201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or war-
ranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim
all warranties, including without limitation warranties of fitness for a particular purpose. No warranty
may be created or extended by sales or promotional materials. The advice and strategies contained herein
may not be suitable for every situation. This work is sold with the understanding that the publisher is not
engaged in rendering legal, accounting, or other professional services. If professional assistance is required,
the services of a competent professional person should be sought. Neither the publisher nor the author
shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this
work as a citation and/or a potential source of further information does not mean that the author or the
publisher endorses the information the organization or Web site may provide or recommendations it may
make. Further, readers should be aware that Internet Web sites listed in this work may have changed or
disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact
our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or
fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material
included with standard print versions of this book may not be included in e-books or in print-on-demand.
If this book refers to media such as a CD or DVD that is not included in the version you purchased, you
may download this material at http://booksupport.wiley.com. For more information about Wiley
products, visit www.wiley.com.
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of
John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used
without written permission. [Insert any third-party trademark language.] All other trademarks are the
property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor
mentioned in this book.
10 9 8 7 6 5 4 3 2 1
Contents
Introduction to CCNA Virtual Lab, Titanium Edition 3.0 Labs v
Network Environment 1
Lab 1.1: Loading a Network Layout 2
Lab 1.2: Adding a Device to the Network Visualizer Screen 4
Host 4
Lab 1.3: Connecting Devices 7
Lab Steps 7
Lab 1.4: Network Cables 9
Cable Thickness 12
Lab 1.5: Disconnecting Devices 13
Lab Steps 13
Lab 1.6: Entering Configurations and Changing
Console Screens 15
Changing Console Screens 16
Lab 1.7: Clearing A Network Visualizer Screen 17
Lab 1.8: Network Configurations Window 18
Password Lookups 21
Lab 1.9: Preferences 21
Background Color 22
Other colors 23
ICND1: Cisco IOS 25
Lab 1.1 RouterSim and Cisco Devices 26
Lab Steps 26
Lab 1.2: Logging In and Out of a Cisco Router 29
Lab Steps 30
Lab 1.3: Overview of Router Modes 32
Router Modes 33
Lab Steps 34
Lab 1.4: Editing and Help Features 37
Lab Steps 38
Lab 1.5: Using Shortcut Commands and Tab Completion
in Gathering Basic Router Information 43
Lab Steps 44
Lab 1.6: Setting Passwords 48
Lab Steps 49
Lab 1.7: Encrypting Your Passwords 52
Lab Steps 53
Lab 1.8: Saving Your Configurations 56
vi Contents
Lab 1.9: Setting Router Banners 57
Lab 1.10: Configuring Interfaces for the 2621 Router 59
Lab Steps 60
Lab 1.11: Configuring Interfaces for the 2811 Router 62
Lab Steps 64
Lab 1.12: Configuring Interfaces for the 3560 Switch 66
Lab Steps 68
Lab 1.13: Bringing Up an Interface 69
Lab Steps 70
Lab 1.14: Configuring an IP Address on an Interface 73
Lab Steps 73
Lab 1.15: Serial Interface Commands 75
Lab Steps 77
Lab 1.16: Setting the Router Hostnames 78
Lab Steps 78
Lab 1.17: Setting Interface Descriptions 79
Lab Steps 80
Lab 1.18: Verifying Your Configuration 81
Lab Steps 82
Lab 1.19: do Command 86
Lab Steps 87
IP Routing 91
Lab 2: Introduction to IP Routing 92
Lab 2.1: Configuring the SDM for the 2811 Router 94
Lab Steps 95
Lab 2.2: Connecting to the SDM using the 2811 Router 98
Lab Steps 99
Lab 2.3: Configuring an Interface with SDM 104
Lab Steps 106
Lab 2.4: Configuring a DHCP Pool with SDM 109
Lab Steps 111
Lab 2.5: Configuring Other Items with SDM 114
Lab Steps 116
Lab 2.6: Verifying Your Configurations with SDM 119
Lab Steps 120
Lab 2.7: Configuring the Routers 121
Lab Steps 122
Lab 2.9: Configuring Static Routing 127
Lab Steps 129
Lab 2.10: Verifying Static Routing 130
Lab Steps 131
Practice Scenario: Basic Cisco Router Operations 134
Lab 2.11: Configuring and Verifying the Hosts 137
Lab Steps 137
Contents vii
Lab 2.12: Configuring Default Routing 142
Lab Steps 143
Lab 2.13: Verifying Default Routing 145
Practice Scenario: Basic Cisco Router Operations 147
Lab 2.14: Configuring RIPv2 149
Lab Steps 151
Lab 2.16: Using Traceroute 151
Lab Steps 152
Lab 2.17: Using Debug with a RIPv2 Network 156
Lab Steps 157
Lab 2.18: Configuring and Verifying a Loopback Interface 157
Lab Steps 158
Lab 2.19: Using ARP (Address Resolution Protocol) 161
Lab Steps 162
Managing a Cisco Internetwork 165
Lab 3: Introduction to Managing a Cisco Internetwork 166
Lab 3.1: Password Recovery Techniques 168
Lab Steps 169
Lab 3.11: Configuring IGRP Routing 172
Lab Steps 174
Lab 3.12: Verifying IGRP Routing 177
Lab Steps 178
Lab 3.2: Backing Up the Cisco IOS 179
Lab Steps 180
Lab 3.3: Restoring or Upgrading the Cisco Router IOS 181
Lab Steps 182
Lab 3.4: Backing Up the Cisco Configuration 182
Lab Steps 183
Lab 3.5: Restoring the Cisco Router Configuration from
a TFTP Server 185
Lab Steps 185
Lab 3.6: Using the Cisco Discovery Protocol to Gather
Information about Neighbor Devices 186
Lab Steps 187
Lab 3.7: Using Telnet 191
Lab Steps 192
Lab 3.8: Using Secure Shell in Place of Telnet 197
Lab Steps 198
Lab 3.9: Verifying Secure Shell in Place of Telnet 200
Lab Steps 201
Lab 3.10: Creating a Hosts Table on a Router and Resolve Host
Names to IP Addresses 202
Lab Steps 202
viii Contents
Configuring the Catalyst Switch 205
Lab 4: Introduction to Configuring the Catalyst Switch 206
Lab 4.1: Connecting to the 1900 Switch and Setting Passwords 207
Lab Steps 207
Lab 4.2: Configuring the 1900 Switch 212
Set the Hostname 212
Lab Step 213
Configure the IP Address 213
Configure Interfaces 214
Configure Interface Descriptions 216
View Interface Descriptions 217
Lab 4.3: Configuring the 1900 Switch Port Duplex 218
Lab Steps 219
Lab 4.4: Verifying 1900 Switch IP Connectivity 220
Lab Steps 221
Lab 4.5: Erasing the 1900 Switch Configuration 222
Lab Steps 223
Lab 4.6: Utilizing the 2950 and 2960 Switch 224
Lab 4.7: Setting Passwords on the 2950/2960 Switch 225
Lab Steps 227
Lab 4.8: Configuring the 2950/2960 Switch 229
Set the Hostname 230
Lab Steps 231
Configure the IP Address 231
Configure Interfaces 232
Lab 4.9: Verifying 2950/2960 Switch IP Connectivity 237
Lab 4.10: Saving and Erasing 2950/2960 Switch Configuration 239
Lab Steps 240
Lab 4.11: Utilizing the 3550 and 3560 Switch 241
Lab 4.12: Setting Passwords on the 3550/3560 Switch 241
Lab Steps 242
Lab 4.13: Configuring the 3550/3560 Switch 244
Set the Hostname 245
Lab Steps 246
Configure the IP Address 246
Configure Interfaces 247
Lab 4.14: Verifying 3550/3660 Switch IP Connectivity 253
Lab 4.15: Saving and Erasing the 3550/3560 Switch
Configuration 255
NAT 257
Lab 5: Introduction to Network Address Translation (NAT) 258
Lab 5.1: Configuring Your Routers 259
Setting up the NAT Lab creates an address pool 260
Lab Steps 261
Contents ix
Switch Security 267
Lab 6.1: Configuring Switch Security 268
Lab 6.2: Verifying Switch Security 271
Lab Steps 272
Individual Labs (Comprehensive) 275
Lab Steps 278
Launching SDM Via Host A 280
Configure IP Address Using SDM 284
Configure DHCP Pool with the SDM 288
Using the SDM to Configure Other Items 292
Verify Router Configurations 295
Individual Lab: Configuring Routers 297
Lab Steps 299
Individual Lab: Configuring the 1900 Switch 303
Lab Steps 304
Setting the Hostname 308
Configuring an IP Address 308
Configuring Interfaces 309
Configuring Interface Descriptions 311
Configuring Port Duplex 312
Grade Me 313
Erasing the Configuration 313
Individual Lab: Configuring 2950 Switch 314
Lab Steps 316
Setting the Hostname 318
Configuring IP Address Information 319
Configuring Interfaces 321
Verifying the IP Connectivity 326
Grade Me 327
Saving and Erasing Your Configurations 327
Individual Lab: Configuring the 2960 Switch 328
Lab Steps 328
Setting the Hostname 331
Configuring IP Address Information 331
Configuring Interfaces 332
Verifying the IP Connectivity 336
Grade Me 337
Saving and Erasing Your Configuration 337
Individual Lab: Static Routing 338
Lab Steps 340
Individual Lab: Telnet 346
Lab Steps 348
Individual Lab: Using the Cisco Discovery Protocol
to Gather Information about Neighbor Devices 356
Lab Steps 358
x Contents
Individual Lab: Working with a Router Interface 363
Lab Steps 364
Configuring an IP Address on an Interface 366
Serial Interface 367
Setting An Interface Description 370
Individual Lab: Configuring Hosts 371
Lab Steps 372
ICND2 383
RIP - IPv6 384
Lab 1.1: Configuring RIP Routing 384
Lab Steps 385
Lab 1.2: Verifying RIP Routing 388
Lab Steps 389
Lab 1.3: Configuring IPv6 Static Routing 392
Address Types 392
Unicast Types 393
IPv6 Bits 393
Lab Steps 394
Lab 1.4: Verifying IPv6 Static Routing 397
Lab Steps 398
Practice Scenario: Basic Cisco Router Operations 401
Troubleshooting IPv6 Static Routing 401
(use Practice Scenario: 401
Troubleshooting Ipv6 ) 401
Turn On Hostnames 402
Scenario 403
Task 403
Lab 1.5: Configuring RIP IPv6 Routing (RIPng) 404
Lab Steps 404
Lab 1.6: Verifying RIP IPv6 Routing (RIPng) 406
Lab Steps 406
Cisco Wide Area Networks (WAN) 411
Lab 2: Introduction to Cisco Wide Area Network Support 412
Lab 2.1: Configuring PPP Encapsulation 413
Lab Steps 414
Lab 2.2: Verifying PPP Encapsulation 415
Lab Steps 416
Lab 2.3: Configuring PPP Authentication with CHAP 417
Lab Steps 419
Lab 2.4: Verifying PPP with Authentication 419
Lab Steps 420
Contents xi
Lab 2.5: Understanding Frame Relay Configuration 423
Frame Relay Uses Virtual Circuits 423
Configuring Frame Relay Encapsulation 423
Frame Relay DLCI 423
Frame Relay LMI 424
Subinterfaces with Frame Relay 424
Lab 2.6: Configuring Frame Relay Switching 425
Lab Steps 426
Lab 2.7: Configuring Frame Relay with Subinterfaces 429
Lab Steps 430
Lab 2.8: Verifying Frame Relay 431
Lab Steps 431
EIGRP 435
Lab 3: Introduction to EIGRP 436
Lab 3.1: Configuring EIGRP Routing 436
Lab Steps 437
Lab 3.2: Verifying EIGRP Routing 440
Lab 3.3: Configuring EIGRP Wild Card Masks 445
Lab Steps 445
Lab 3.4: Verifying EIGRP Wild Card Mask Configurations 446
Lab Steps 447
Lab 3.5: Configuring EIGRP Authentication 449
Lab Steps 450
Lab 3.6: Verifying EIGRP Authentication 452
Lab Steps 452
Lab 3.7: Configuring Advanced Commands with EIGRP 456
OSPF 459
Lab 4: Introduction to OSPF 460
Lab 4.1: Configuring Single Area OSPF 460
Lab Steps 462
Lab 4.2: Verifying Single Area OSPF 465
Lab 4.3: OSPF Authentication 468
Lab Steps 469
Lab 4.4: Stub Area Configuration 473
Lab Steps 474
Lab 4.5: Totally Stub 476
Lab Steps 476
Lab 4.6: OSPF DR and BDR Elections 478
Lab Steps 479
xii Contents
Virtual LANs (VLANs) 483
Lab 5: Introduction to Virtual LANs 484
Lab 5.1: Configuring VLANs on a 1900 Switch 485
Lab Steps 486
Lab 5.3: Configuring VLANs on a 3550 Switch 489
Lab Steps 490
Lab 5.4: Configuring Trunk Ports and VTP Domain on
a 3550 Switch 493
Lab Steps 493
Configure VTP Domain 494
Lab 5.5: Configuring VLANs on a 3560 Switch 495
Lab Steps 496
Lab 5.6: Configuring Trunk Ports and VTP Domain on
a 3550 Switch 498
Configure Trunk Ports 498
Lab Steps 498
Configure VTP Domain 499
Lab 5.7: IntraVLAN and InterVLAN Routing 500
Lab Steps 501
Access Lists 505
Lab 6: Introduction to Managing Traffic with Access Lists 506
Lab 6.1: Standard IP Access-Lists 507
Lab 6.2: Verifying Standard
IP Access-Lists 512
Lab Steps 513
Lab 6.3: Applying an Access-List to a VTY Line 514
Lab Steps 515
Lab 6.4: Extended IP Access-Lists 516
Lab Steps 517
Lab 6.5: Verifying Extended
IP Access-lists 519
Lab Steps 520
Lab 6.6: Removing Extended
IP Access-lists 521
Lab Steps 521
Practice Scenario: NAT and ACLs 522
Configuring ACLs for Telnet and SSH 522
Turn On Hostnames 524
Scenario 524
Task 524
Contents xiii
NAT/PAT 525
Lab 7.1: Configuring Dynamic NAT 526
Lab Steps 527
Lab 7.2: Configuring PAT 529
Lab Steps 530
Lab 7.3: NAT/PAT Final Configuration Exercise 531
Lab Steps 532
VLSM with Summarization 537
Lab 8.1: VLSM with Summarization LabConfiguring
Routers 538
Lab Steps 540
Lab 8.2: VLSM with Summarization
LabConfiguring Hosts 545
Lab Steps 546
Lab 8.4: VLSM with Summarization
LabConfiguring EIGRP with Discontiguous Networking 547
Lab Steps 549
Lab 8.5: VLSM with Summarization
LabConfiguring Summarization 552
Lab Steps 553
Individual Labs (Comprehensive) 555
Introduction to Individual Labs 556
Grading 556
Individual Lab: RIP Routing 557
Lab Steps 559
Verify Configurations 563
RIPv2 566
Verify Configurations 567
Individual Lab: IPv6 Static Routing 568
Lab Steps 571
Verifying IPv6 Static Routing 572
Individual Lab: RIP IPv6 Routing (RIPng) 576
Lab Steps 578
Verifying RIP IPv6 Routing (RIPng) 580
Individual Lab: PPP Encapsulation 582
Lab Steps 585
Verifying PPP Encapsulation 588
Configuring PPP Authentication with CHAP 590
Verifying PPP with Authentication 591
Individual Lab: Frame Relay Switching 594
Understand Frame Relay 596
xiv Contents
Configuring Frame-Relay 598
Lab Steps 598
Configuring Frame Relay with Subinterfaces 599
Verifying Frame Relay 600
Individual Lab: EIGRP Routing 602
Lab Steps 605
Verifying EIGRP 610
Individual Lab: Single Area OSPF 612
Lab Steps 614
Verify OSPF 619
Individual Lab: OSPF DR and BDR Elections 622
Lab Steps 625
Individual Lab: Configuring VLANs 628
Lab Steps 631
Setting Up VLANS 631
Setting Up Trunk Ports 635
Configuring VTP Domain 637
IntraVLAN and InterVLAN Routing 640
Individual Lab: Configuring VLANs on a 1900 Switch 645
Lab Steps 647
Configuring Trunk Ports 650
Configuring Inter-Switch Link (ISL) Routing 651
Grade Me 652
Individual Lab: Standard IP Access-Lists 653
Lab Steps 654
Configuring Hosts E and F 658
Configuring Switches 659
Verifying Standard IP Access-Lists 665
Applying an Access-List to a VTY Line 666
Individual Lab: Extended IP Access-Lists 668
Lab Steps 670
Configuring Hosts E and F 674
Configuring Switches 675
Verifying Extended IP Access-lists 678
Removing Extended IP Access-lists 679
Individual Lab: Network Address Translation (NAT) and
Port Address Translation 680
Setting up the NAT Lab 683
Lab Steps 684
Dynamic NAT 687
Configuring PAT 689
Individual Lab: VLSM with Summarization 691
Lab Steps 694
Configuring Hosts 700
Contents xv
Verify Configurations 701
Configuring EIGRP with Discontiguous Networking 703
Configuring Summarization 706
Verifying Summarization 707
Net Assessment 709
Lab 1.1: Introduction to Net Assessment 710
For Instructors 710
For Individuals 712
Lab 1.2: Making Changes and Inserting Instructions 712
Lab Steps 713
Lab 1.3: Loading Net Assessment 715
Lab 1.4: Creating a Net Assessment Template 717
Lab Steps 717
Lab 1.5: Net AssessmentEditing Values 722
Lab Steps 722
Lab 1.6: Net AssessmentCreating A Test Network 725
Lab Steps 725
Lab 1.7: Net AssessmentAssessing
A Test Network 726
Lab Steps 726
Lab 1.8: Advanced Values Editing 729
Lab 1.9: Edit ValuesChanging A Selected Value 730
Lab 1.10: Edit ValuesRandomizing
A Selected Value 732
Lab 1.11: Edit ValuesRemoving A Selected Value 733
Lab 1.12: Edit ValuesAuto-Selecting and Randomizing
Any Value 734
Exceeding the Number of Configurations 735
Lab 1.13: Edit ValuesAuto-Selecting and Removing
Any Value 735
Create Your Own Custom Labs 737
Lab 1.1: Creating a Custom Lab 738
Lab Steps 738
Introduction to CCNA Virtual Lab,
Titanium Edition 3.0 Labs
This program contains all the labs available for CCNA Virtual Lab, Titanium Edition 3.0.
Navigation
When you load the online documentation, a tree list on the left side of the screen allows you
to quickly navigate from one section and lab topic to another. Click on a book to expand the
list of labs for that section. You will then see a ? icon to the left of each topic. Click a topic
title to display lab content on the right side of the screen.
xviii Introduction
Types of Labs
CCNA Labs and Supporting Material
ICND1 and ICND2 Labs The presentation of CCNA labs has been reorganized into two
different areas. Individuals preparing for the Cisco
ICND 2 (640-816) exam can now nd these 78 labs and networks organized in
the same section.
Practice Scenarios Studying for the Cisco
CCNA exam. After you go through accumulative and/or Individual labs you can
test your problem-solving and troubleshooting skills. In the lab documentation we present
Practice Scenarios which are interspersed in the lab documentation. With these scenarios you
are presented with partially or incorrectly congured networks and your task is to read the
instructions and correct the situation. These are gradable labs.
They can be found in two places on our menu tree. They are interspersed among the accu-
mulative labs. After you read about a concept and go through hands-on lab(s), you are then
presented with a practice scenario that tests your problem-solving and troubleshooting skills.
They can also be found in their own section so that you can quickly choose any of the labs,
instead of hunting for them in the accumulative labs.
Individual Labs We also offer CCNA labs that stand on their own, are comprehensive
and self-contained, and do not require congurations from prior labs. These labs are typically
longer than the accumulative labs because you are starting with a non-congured network
each time you bring up an Individual lab. You are totally conguring the network for each
lab, from beginning to nish. We provide step-by-step instructions for these labs. These are
gradable labs.
Net Assessment This feature allows you to test and evaluate your CCNA problem-solving
and trouble shooting network skills. This is a powerful and exible tool for all to use, includ-
ing teachers, students, individuals, etc. You can grade yourself or if you are an instructor, you
can grade your students. There are eight labs that walk you through an example in utilizing
Net Assessment. Net Assessment also provides you with more sophisticated and powerful
methods in altering values. That is covered in seven additional labs.
Accumulative Labs We provide step-by-step labs that, for the most part, build on each
other. Fourteen different network layouts are presented within these labs. When you start
working with a new section and encounter a new network layout, you are asked to save
your work. It is suggested that you save your network layout with another name so that
you always have a non-congured network to fall back on. An example would be saving
the original network layout, Standard Layout, as My Standard Layout.
Introduction xix
Network Layouts
Loading a Network Layout
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Find and click on the file name and then click OK.
Custom Labs
With CCNA Virtual Lab, Titanium Edition 3.0, you can create your own labs. You can
then make your labs available for others to use. They will appear off the main menu of
the Network Visualizer screen. You can also imbed instructions into your labs/network.
Use a third-party program to create instructions. This can be a text editor, word proces-
sor, HTML editor, spreadsheet program, etc.
Network Environment
Lab 1.1: Loading a Network
Layout
There are three types of network layouts that you can load with this program.
Accumulative Labs In our lab documentation we provide step-by-step labs that, for the
most part, build on each other. Within the accumulative labs there are a handful of different
network layouts that you will load. The network layouts are specic to the tasks you will
encounter in the labs.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Find and click on the file name and then click Open.
Individual Labs We also offer labs that stand on their own, are self-contained, and do not
require congurations from prior labs. These labs are typically larger than the accumula-
tive labs because you are starting with a non-congured network each time you bring up
an Individual lab. You are totally conguring the network for each lab, from beginning
to nish. We provide step-by-step instructions for these labs. Some labs require extensive
congurations, Instead of manually entering the congurations, you have the ability to copy
Lab 1.1: Loading a Network Layout 3
and paste script into the console. This saves you time so that you do not have to manually
type in each command if you do not care to do so.
Practice Scenarios Studying for the Cisco
CCNA
exam. After you go through accumulative and/or Individual labs you can test your problem-
solving and troubleshooting skills. In the lab documentation we present Practice Scenarios
which are interspersed in the lab documentation. With these scenarios you are presented with
partially or incorrectly congured networks and your task is to read the instructions and cor-
rect the situation.
They can be found in two places on our menu tree. They are interspersed among the accu-
mulative labs. After you read about a concept and go through hands-on lab(s), you are then
presented with a practice scenario that tests your problem-solving and troubleshooting skills.
They can also be found in their own section so that you can quickly choose any of the labs,
instead of hunting for them in the accumulative labs.
4 Network Environment
Custom Networks With this program, you can create your own labs. You can then make
your labs available for others to use. You can distribute your custom labs to others so that
they show up on their menus. They can be loaded from the Network Visualizer menu.
Lab 1.2: Adding a Device to the Network
Visualizer Screen
This program offers several devices that you can interact with in our network layouts or
networks that you want to create. The following is a list of these devices and their features.
Host
1900 Switch It has 12 10BaseT switched ports and two FastEthernet switched ports.
2621 Router It has Enterprise edition 12.x software. The 2621 has two FastEthernet
interfaces and two serial interfaces.
2811 Router It has Enterprise edition 12.4 software, four serial ports and two FastEthernet
ports.
2950 Switch It has 12 FastEthernet, 10/100 ports to help you build your LANs and VLANs.
2960 Switch It has eight FastEthernet ports and one GigabitEthernet port.
3550 Switch It has 10 FastEthernet, 10/100 ports.
3560 Switch It has eight FastEthernet ports and one GigabitEthernet port.
Lab 1.2: Adding a Device to the Network Visualizer Screen 5
These devices are represented by device buttons at the top of the Network Visualizer screen.
Description of Toolbar Buttons
New Network Visualizer screen
Load a network
Save a network
Print network layout
Clear all devices off the Network Visualizer screen
Insert a file into the network. For example, this could be a text file,
Microsoft Word file, PDF file, graphic file, etc.
Insert a host onto the Network Visualizer screen
Insert a new 2621 router onto the Network Visualizer screen
Insert a new 2811 router onto the Network Visualizer screen
Insert a new 1900 switch onto the Network Visualizer screen
Insert a new 2950 switch onto the Network Visualizer screen
Insert a new 2960 switch onto the Network Visualizer screen
Insert a new 3550 switch onto the Network Visualizer screen
Insert a new 3560 switch onto the Network Visualizer screen
6 Network Environment
Description of Toolbar Buttons
Display the Net Assessment window
Display the Net Configs window
Display the Net Packet Monitor window
To add one or more of any device, click the device button that corresponds to the host,
router, or switch. A new object will appear in the left corner of the Network Visualizer screen.
Drag and drop it wherever you want. Devices are labeled sequentially. For example, if you
click on the 2811 device button, 2811 Router A will appear on the screen. If you click the
device button again, 2811 Router B will appear on the screen. The next one would be 2811
Router C, and so on.
There is an unlimited amount of devices that can be added to a Network
Visualizer screen. You are only limited by your computer resources.
(continued)
Lab 1.3: Connecting Devices 7
Lab 1.3: Connecting Devices
Once you have placed devices onto the Network Visualizer screen, only a couple steps
are required to connect them. They need to be connected so that the program knows
they are in the same network. All devices must be connected into the same network for
you to both congure and test for connectivity.
In the following example, we will connect serial interface 0/0/0 of the 2811 Router A to
serial interface 0/0/1 of 2811 Router B.
Lab Steps
1. Right-mouse click 2811 Router A. A graphical representation of its ports will appear. It
will appear on top of 2811 Router A.
8 Network Environment
2. Place your mouse over interface serial 0/0/0 and click your left mouse key.
3. As soon as you click a port, the large graphic disappears and you will see a line
attached to the cursor. Move the cursor over to 2811 Router B and click the right
mouse button.
4. When the graphical representation of the ports for 2811 Router B appears, click on
interface serial 0/0/1.
Lab 1.4: Network Cables 9
The large graphic will disappear and you should see 2811 Router A and 2811 Router B
connected with a serial cable. You have the option of viewing interface labels. On the
Network Visualizer screen click View and Hostnames.
Lab 1.4: Network Cables
This program provides three different types of cables that can be used when creating
networks.
10 Network Environment
Straight-Through is GREEN in color in our program and provides connectivity from
hosts to switches and from routers to switches. This is a twisted-pair cable that uses RJ-45
connectors.
Cross-Over is WHITE in color in our program and is used to connect switch to switch
and router to router on an Ethernet port. This cannot be used to connect hosts to switches
or switches to routers.
Lab 1.4: Network Cables 11
Serial WAN is RED in color in our program and is represented by a lightning bolt. This is
used to simulate a serial WAN connection and can only be connected to serial interfaces on
a router. These are point-to-point only and can connect from router to router only via their
serial ports. They cannot be used to connect to switches or hosts.
WAN connection
A network connection through routers which connects two geographically distanced
networks together. It typically connects several local area networks (LANs), usually
through the Internet.
12 Network Environment
Cable Thickness
You can change the thickness of cables used in your network. On the Network Visualizer
menu, click the View menu, put your mouse over the menu item Line Thickness, and then
select one of the three levels of line thickness.
Here is a network that is displays the smallest thickness of cables.
Lab 1.5: Disconnecting Devices 13
Here is a network that displays the largest thickness of cables.
Lab 1.5: Disconnecting Devices
Any network cable can be disconnected. If you want to remove several cables from a device,
you will need to do so, one by one. In the following example, we will disconnect the serial
cable between 2811 Router A and 2811 Router B.
Lab Steps
1. Place your cursor over 2811 Router A and click your right mouse button.
14 Network Environment
2. Place your cursor above the cable connector for interface serial 0/0/0 and click your left
mouse button.
3. You will be asked to confirm you removing the cable from the port. Click the Yes button.
4. The cable will now be removed and you will have two disconnected routers.
Lab 1.6: Entering Configurations and Changing Console Screens 15
Lab 1.6: Entering Configurations and
Changing Console Screens
Congurations are entered through a console screen. Only one console screen displays at
a time, however, you can display a separate console screen for any router or switch in your
network.
1. Place a couple 2811 routers onto a Network Visualizer screen.
2. Place your cursor over 2811 Router A and double-click you left mouse button. A con-
sole screen will appear.
16 Network Environment
3. When you first start out with a network you will need to press Enter to display the
User mode. From there you can change modes and enter configurations, ping, telnet,
and perform show commands.
4. Type enable and press Enter to go to the Privileged mode.
5. Type config t and press Enter so that you can enter Global Configuration mode. You
will enter your configurations in this mode and in other modes such as Interface mode.
Changing Console Screens
You can use the menu system on the console screen to view the consoles for any device on
the Network Visualizer screen. In the following example we have a 3550 and 3560 switch
on the Network Visualizer screen.
Lab 1.7: Clearing A Network Visualizer Screen 17
In this example you want to go from the console of the 3550 Switch A, to the console of
the 3560 Switch A. Click View on the menu, put your mouse over Console, go down and nd
the desired type of device (in this case it is Switch 3560), and then choose 3560 Switch A.
Lab 1.7: Clearing A Network
Visualizer Screen
There are two ways to clear a Network Visualizer screen.
N
Click the Edit menu and then select Clear.
18 Network Environment
N
You can also click the trash can icon on the tool bar.
You will be asked to conrm that you want to clear the current network layout.
Lab 1.8: Network Configurations Window
You can view the congurations for all devices on your Network Visualizer screen. To
view the Network Congs screen, click the Tools menu, and then Net Congs.
Lab 1.8: Network Configurations Window 19
Or click the Net Congs button on the button bar.
20 Network Environment
And the Net Congs screen will appear ...
Lab 1.9: Preferences 21
Password Lookups
You may forget passwords that you enter while conguring devices. You can look them up
by clicking the Net Congs button.
You can display the console screen for any device listed in the Net Configs
window. Double-click on the name of any device.
Lab 1.9: Preferences
There are two preferences that you can set for the look and feel of this program.
N
Background color of the Network Visualizer screen
N
Autosize the Network Visualizer screen when you load a network
22 Network Environment
The Preferences window can be displayed by clicking Tools on the Network Visualizer
screen, then Preferences.
Background Color
You can easily change the background of your Network Visualizer screen. Eighteen basic
colors are available in choosing the background color. If you click the Default button, your
screen will display a dark Navy blue.
Lab 1.9: Preferences 23
Other colors
If you want to choose another color, click on the Other button.
ICND1: Cisco IOS
Lab 1.1 RouterSim and
Cisco Devices
In this program you now have the option of also using traditional Cisco
graphical devices.
You can create networks from scratch using several types of devices, however, you cannot
mix them. The program will display all RouterSim devices or all Cisco
graphical devices.
You can load existing network layouts and easily change their appearance.
Lab Steps
1. On the Network Visualizer menu click View and then select Cisco Devices from the
drop down menu.
Lab 1.1 RouterSim and Cisco Devices 27
Network Layout
Load CiscoIOS Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le CiscoIOS Layout.rsm and click Open. You should see the following
non-congured network:
By default you will see Routersim devices on any network layout that comes with this
program.
28 ICND1: Cisco IOS
The network shown at the top of lab quickly changes and Cisco
devices.
2. You can change back and display RouterSim devices. On the Network Visualizer menu
click View and then select RouterSim Devices from the drop down menu.
Lab 1.2: Logging In and Out of a Cisco Router 29
Lab 1.2: Logging In and Out of a
Cisco Router
In this lab you bring up a router console and learn how to log in using the enable and
disable commands.
30 ICND1: Cisco IOS
Lab Steps
1. On the Network Visualizer screen, double-click on 2811 Router A. This will bring up
a console screen. You interact with each device through the console screen. You will
enter all your CLI commands such as configuring a device, testing connectivity, and
displaying output.
Network Layout
Load the network layout you have been working with for labs in section 1.
Connectivity
When testing for connectivity in a network, it refers to the ability of a source device
such as a router to connect to a remote device, or another router. If you ping a remote
router and it is unsuccessful, you have no connectivity. If your ping is successful, you
have connectivity.
Lab 1.2: Logging In and Out of a Cisco Router 31
Output
Information that is displayed on the console screen after you enter a show command.
For example, if you enter the command show run, you get the following output:
Building configuration...
Current configuration : 874 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
[output cut]
32 ICND1: Cisco IOS
2. Press Enter and the Router> prompt will appear. You are now in the User mode.
This mode is mostly used to view statistics, though it is also a stepping-stone to
logging into Privileged mode. You can only view and change the configuration of a
Cisco router in Privileged mode, which you enter with the enable command.
Router>
Router>enable
Router#
3. You now end up with a Router# prompt, which indicates you are in Privileged mode.
You can both view and change the configuration in Privileged mode. You can go back
from Privileged mode to user mode by using the disable command.
Router#disable
Router>
4. At this point you can type logout to exit the console.
Router>logout
Router con0 is now available
Press Return to get started.
5. Or you could just type logout or exit from the Privileged mode prompt to log out.
Router>enable
Router#logout
Router con0 is now available
Press RETURN to get started.
Lab 1.3: Overview of Router Modes
It is important to understand the different prompts you can nd when conguring a router so
you can know where you are at any time within Conguration mode. In this lab, the prompts
that are used on a Cisco router will be demonstrated. Always check your prompts before
making any changes to a routers conguration.
Lab 1.3: Overview of Router Modes 33
Router Modes
Depending on what you want to do, you can go to different mode levels interacting with
interfaces and devices. Most commands are mode specic. That means that many com-
mands work in one mode but not another. That is why you have to change modes, depend-
ing on what command you want to enter. However, with the do command you can now
enter privileged mode commands in Global Conguration mode. This works on the 2811
router (IOS version 12.4) and the 2960 and 3560 switch (IOS version 12.2 SE). The follow-
ing chart displays the different modes you will encounter.
Network Layout
Load the network layout you have been working with for labs in section 1.
34 ICND1: Cisco IOS
Mode Prompt Typical Use
User Router> Usually the first login prompt when logged
in to a Cisco router.
Minimal, fundamental set of non configu-
ration commands in this mode.
Only basic router information is given in
this mode. Show commands can be given
which will result in output displayed in the
console screen. Only information about the
device is given.
Privileged Router# This mode is accessed by using the enable
command from user mode.
You can quit privilege mode by using the
disable command.
Can be and should be protected by an
enable or enable secret password.
All router functionality can be accessed
from this level.
Ping interfaces.
Telnet to devices.
Show commands that display routing
information, interface protocols, and the
systems entire running configuration.
Global Configuration Router(config#) Configure or make changes that affect the
entire router.
Change your device host name.
Change passwords.
Set up access lists.
Interface Router(config-if#) Allows you to configure specific interfaces.
Routing-Configuration Router(config-router) Allows you to configure the routing
protocol.
Lab Steps
1. On the Network Visualizer screen, double-click on 2811 Router A. This will bring up a
console screen.
2. Press Enter and the Router> prompt will appear. You are now in the User mode.
Lab 1.3: Overview of Router Modes 35
3. Change to the Privileged mode.
Router>
Router>enable
4. To configure a device from the CLI, you can make global changes to the router by typ-
ing configure terminal (config t for short), which puts you in Global Configuration
mode and changes what is known as the running-config. You can type config from
the Privileged mode prompt and then just press Enter to take the default of terminal.
Router#config
Configuring from terminal, memory, or network [terminal]?enter
Enter configuration commands, one per line. End with CTRL/Z.
Router(config)#
At this point you make changes that affect the router as a whole, hence the term
Global Conguration mode. Notice the prompt is now Router(cong)#.
5. To make changes to an interface, you use the interface command from Global Con-
figuration mode.
Router(config)#interface ?
Async Async interface
BRI ISDN Basic Rate Interface
BVI Bridge-Group Virtual Interface
CTunnel CTunnel interface
Dialer Dialer interface
FastEthernet FastEthernet IEEE 802.3
Group-Async Async Group interface
Lex Lex interface
Loopback Loopback interface
MFR Multilink Frame Relay bundle interface
Multilink Multilink-group interface
Null Null interface
Tunnel Tunnel interface
Vif PGM Multicast Host interface
Virtual-Template Virtual Template interface
Virtual-TokenRing Virtual TokenRing
range interface range command
Router(config)#interface fastethernet 0/0
Router(config-if)#
Notice the prompt changed to Router(cong-if)# to tell you that you are in interface
conguration.
36 ICND1: Cisco IOS
6. Sub interfaces allow you to create virtual interfaces within the router. The prompt then
changes to Router(config-subif)#.
Router(config)#int f0/0.?
<0-4294967295> FastEthernet interface number
Router(config)#int f0/0.1
Router(config-subif)#
Type exit to go back to Global Conguration mode.
Router(config-subif)#exit
Router(config)#
7. To configure User mode passwords, use the line command. The prompt then becomes
Router(config-line)#.
Enter conguration commands, one per line. End with CTRL/Z.
Router(config)#line ?
<0-70> First Line number
aux Auxiliary line
console Primary terminal line
tty Terminal controller
vty Virtual terminal
Router(config)#line console 0
Router(config-line)#
The line console 0 command is known as a major, or global, command, and any
command typed from the (cong-line) prompt is known as a subcommand.
8. Type exit to go back to Global Configuration mode.
Router(config-line)#exit
Router(config)#
9. The line vty 0 1180 command is used to control inbound telnet connections. This is
part of a series of commands that you use to set passwords for interfaces so that you
can set up interface security and telnet from one device to another.
Router(config)#line vty 0 1180
Router(config-line)#
10. Type exit to go back to Global Configuration mode.
Router(config-line)#exit
Router(config)#
11. To configure routing protocols like RIP, use the prompt (config-router)#.
Router(config)#router rip
Router(config-router)#
Lab 1.4: Editing and Help Features 37
It is not important that you understand what each of these commands do
at this time. These will all be explained later in greater detail. What you
need to understand is the different prompts available. This program sup-
ports the line console and line vty commands.
12. Type control+z to go back to Global Configuration mode. Control+z is noted as ctrl+z.
Router(config-router)#ctrl+z
Router#
Lab 1.4: Editing and Help Features
You can use the Cisco
routers have a 16-bit software register, which is written into NVRAM. By default,
the conguration register is set to load the Cisco IOS from ash memory and to look for and
load the startup-config le from NVRAM.
By changing the conguration register, you can perform password recovery on a
Cisco router.
If you are locked out of a router because you forgot the password, you can change the
conguration register to help you recover. Bit 6 in the conguration register is used to tell
the router whether or not to use the contents of NVRAM to load a router conguration.
The default conguration register value for bit 6 is 0x2102 (the 0 is bit 6), which means
that bit 6 is off. With the default setting, the router will look for and load a router congu-
ration stored in NVRAM (startup-config). To recover a password, you need to turn on
bit 6, which will tell the router to ignore the NVRAM contents. The conguration register
value to turn on bit 6 is 0x2142.
(continued)
Lab 3.1: Password Recovery Techniques 169
Lab Steps
1. You can see the current value of the configuration register by using the show version
command (sh version or show ver for short), as in the following example on 2621
Router A:
2621A#show version
Cisco Internetwork Operating System Software
IOS (tm) C2621 Software (C2621-BIN-M), Version 12.2(13)T1, RELEASE
SOFTWARE (fc1)
[output cut]
Configuration register is 0x2102
The last information given from this command is the value of the conguration register.
In this example, the value is 0x2102, which is the default setting.
2. You can change the configuration register by using the config-register command.
For example, the following commands tell the router to boot from ROM monitor mode
and then to verify the current configuration register value:
2621A(config)#config-register 0x0101
2621A(config)#ctrl+z
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
while working in section 2.
170 Managing a Cisco Internetwork
2621A#sh ver
[output cut]
Configuration register is 0x2102 (will be 0x0101 at next reload)
Notice that the show version command shows the current conguration register value,
as well as what it will be when the router reboots. Any change to the conguration reg-
ister will not take effect until the router is reloaded.
3. From 2621 Router A, type reload at the privileged mode prompt.
2621A#copy run start
2621A#reload
4. You will then see this output on your screen: System configuration has been modified.
Save? [yes/no]: . Press Y.
5. You will then be asked to confirm the reload. Press Enter.
6. When the router is rebooting, press and hold ctrl+break on the keyboard, until it takes
you into rom monitor mode.
System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
Copyright (c) 1999 by Cisco Systems, Inc.
TAC:Home:SW:IOS:Specials for info
PC = 0xfff0a530, Vector = 0x500, SP = 0x680127b0
C2621 platform with 32768 Kbytes of main memory
PC = 0xfff0a530, Vector = 0x500, SP = 0x80004374
monitor: command "boot" aborted due to user interrupt rommon 1 >
7. To change the bit value on a Cisco 2621 series router, simply enter the confreg (mean-
ing config register) command at the <rommon 1> prompt:
rommon 1 >confreg 0x2142
You must reset or power cycle for new cong to take effect.
8. At this point, reset the router.
rommon 1 >reset
9. When the router reloads, say no to entering setup mode.
10. Enter privileged mode and then type copy startup-config running-config.
11. Change your passwords and then save your configuration with the copy run start
command.
12. Change your configuration register back to 0x2102.
rommon 1 > confreg 0x2102
Lab 3.1: Password Recovery Techniques 171
Viewing Passwords on Net Configs screen
If you want to take a peek at all the passwords set for the currently loaded network, you
can view these on the Net Congs screen.
1. Click Tools on the main menu of the Network Visualizer screen. Then click the Net
Configs sub-menu selection. Or, right mouse click on the Network Visualizer screen
and choose Net Configs from the pop-up menu.
FROM THE MAIN MENU
FROM THE POP-UP WINDOW
172 Managing a Cisco Internetwork
The following information will appear on the Net Congs screen, displaying passwords
for every network device.
Lab 3.11: Configuring IGRP Routing
Interior Gateway Routing Protocol (IGRP) is a Cisco proprietary distance vector rout-
ing protocol. It is an updated RIP routing protocol that uses an administrative distance of
100, so it will automatically overwrite RIP found routes in the routing table. Also, it uses
Autonomous Systems (AS) to create groups of routers that share routing information.
To congure IGRP, it is basically the same as RIP except you choose your AS number.
All routers must use the same number as you want them to share information.
Lab 3.11: Configuring IGRP Routing 173
Network Layout
Load IGRP Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le IGRP Layout.rsm and click Open. You should see the following
non-congured network:
174 Managing a Cisco Internetwork
Lab Steps
1. Double-click 2621 Router A. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2621A
2621A(config-if)#interface serial 0/1
2621A(config-if)#ip address 172.16.10.2 255.255.255.0
2621A(config-if)#no shutdown
2621A(config-if)#exit
2621A(config)#exit
2621A#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621A#
2. Change the console screen so that you can enter configurations for 2621 Router B. Use the
console menu to achieve this. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2621B
2621Bconfig-if)#interface serial 0/0
2621Bconfig-if)#clock rate 64000
2621B(config-if)#ip address 172.16.10.1 255.255.255.0
2621B(config-if)#no shutdown
2621Bconfig-if)#interface serial 0/1
2621Bconfig-if)#clock rate 64000
2621B(config-if)#ip address 172.16.20.1 255.255.255.0
2621B(config-if)#no shutdown
2621B(config-if)#exit
2621B(config)#exit
2621B#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621B#
Lab 3.11: Configuring IGRP Routing 175
3. Change the console screen so that you can enter configurations for 2621 Router C.
Use the console menu to achieve this. After the console screen comes up, perform the
following commands.
Router>enable
Router#config t
Router(config)#hostname 2621C
2621Cconfig-if)#interface serial 0/0
2621C(config-if)#ip address 172.16.20.2 255.255.255.0
2621C(config-if)#no shutdown
2621C(config-if)#exit
2621C(config)#exit
2621C#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621C#
4. Configure 2621 Router A to use IGRP with an AS of 10.
2621A#config t
2621A(config)#router igrp 10
2621A(config-router)#network 172.16.0.0
2621A(config-router)#ctrl+z
2621A#
5. Configure 2621 Router B to use IGRP with an AS of 10.
2621B#config t
2621B(config)#router igrp 10
2621B(config-router)#network 172.16.0.0
2621B(config-router)#ctrl+z
2621B#
6. Configure 2621 Router C to use IGRP with an AS of 10.
2621C#config t
2621C(config)#router igrp 10
2621C(config-router)#network 172.16.0.0
2621C(config-router)#ctrl+z
2621C#
176 Managing a Cisco Internetwork
Rename and Save Your File: Make sure you save the actual network layout le that
you have been working with. You might want to save it to another le name than IGRP
Layout.rsm. This allows you to start over with a non-congured network if you wish.
1. There are two ways you can save a network layout. The first way is by clicking on the
Diskette button on the button bar, at the top of the Network Visualizer screen. You
can also click File on the menu and choose Save from the drop down menu.
Lab 3.12: Verifying IGRP Routing 177
2. A dialog box will appear. At the bottom you will see the file name IGRP Layout.rsm.
Rename the file. For example, you could name it My IGRP Layout.rsm.
3. Click the Save button. At this point your network layout has been saved to a new name.
You then have the option of reloading IGRP Layout.rsm which is non-configured.
Lab 3.12: Verifying IGRP Routing
Since IGRP has a better administrative distance then RIP, all the routing tables should
have IGRP found routes. Use the show ip route command and then the debugging tools
to verifying IGRP.
Network Layout
Load IGRP Layout.rsm or whatever you named the le when you saved your work in
Lab 3.11.
178 Managing a Cisco Internetwork
Lab Steps
1. From 2621 Router A, use the show ip route command to verify the routing table.
2621A#show ip route
[output cut]
172.16.0.0/24 is subnetted, 2 subnets
I 172.16.20.0 [100/160250] via 172.16.10.1, 00:00:14, Serial0/1
C 172.16.10.0 is directly connected, Serial0/1
2621A
Notice the I found routes. This is IGRP.
2. Use the show ip protocol command from 2621 Router A.
2621A#show ip protocol
Routing Protocol is "igrp 10"
Sending updates every 90 seconds, next due in 25 seconds
Invalid after 270 seconds, hold down 270, flushed after 630
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Default networks flagged in outgoing updates
Default networks accepted from incoming updates
IGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0
IGRP maximum hop count 100
IGRP maximum metric variance 1
Redistributing: igrp 10
Routing for networks:
172.16.0.0
Routing information sources:
Gateway Distance Last Update
172.16.10.1 100 00:01:05
Distance: <default is 100>
2621A#
Notice that the timer for IGRP to send out updates is every 90 seconds.
3. From 2621 Router B, use the show ip route command to verify the routing table.
2621B#show ip route
[output cut]
172.16.0.0/24 is subnetted, 2 subnets
C 172.16.20.0 is directly connected, Serial0/1
C 172.16.10.0 is directly connected, Serial
2621B#
Lab 3.2: Backing Up the Cisco IOS 179
Routing tables take a small amount of time to update.
4. From 2621 Router C, use the show ip route command to verify the routing table.
2621C#show ip route
172.16.0.0/24 is subnetted, 2 subnets
C 172.16.20.0 is directly connected, Serial0/0
I 172.16.10.0 [100/160250] via 172.16.20.1, 00:00:48, Serial0/0
2621C#
5. Use the debug ip igrp events command to see IGRP updates being sent and received
on the router. See above.
2621A#debug ip igrp events
IGRP protocol debugging is on
ld23h: IGRP: sending update to 255.255.255.255 via Serial0/1 <172.16.10.2>
ld23h: IGRP: Update contains 1 interior, 0 system, and 0 exterior routes.
ld23h: IGRP: Total routes in update: 1
2621A#
6. Turn off debugging with the no debug ip igrp events command, or the undebug all
command.
2621A#undebug all
7. Use the debug ip igrp transactions command to see a summary of the IGRP events
being processed on the router.
2621A#debug ip igrp transactions
IGRP protocol debugging is on
2621A#
ld23h: IGRP: sending update to 255.255.255.255 via Serial0/1 <172.16.10.2>
ld23h: subnet 172.16.10.0, metric=189250
2621A#
8. You can turn off the debug ip igrp transactions command.
2621A#no debug ip igrp transactions
Lab 3.2: Backing Up the Cisco IOS
Before you upgrade or restore a Cisco
IOS. The
180 Managing a Cisco Internetwork
following sections describe how to check the amount of ash memory, copy the Cisco
IOS
from ash memory to a tftp host, and then copy the IOS from a tftp host to ash memory.
Lab Steps
1. Before you attempt to upgrade the Cisco
command, config mem, to restore a conguration. Of course, this will work only if
you rst copied running-config into NVRAM before making any changes.
Lab Steps
1. If you copied the routers configuration to a tftp host as a second backup, you can
restore the configuration using the copy tftp running-config command (copy tftp
run for short) or the copy tftp startup-config command (copy tftp start for
short), as shown below.
2621A#copy tftp run
Address or name of remote host []? 172.16.40.3
Source filename []? 2621A-confg
Destination filename [running-config]?(press enter)
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
while working in section 2.
186 Managing a Cisco Internetwork
Accessing tftp://172.16.40.3/2621A-confg...
Loading 2621A-confg from 172.16.40.3 (via Fastethernet 0/0):
!!
[OK - 487/4096 bytes]
487 bytes copied in 5.400 secs (97 bytes/sec)
2621A#
00:38:31: %SYS-5-CONFIG: Configured from tftp://172.16.40.3/2621A-confg
2621A#
2. After you copy your configuration from a tftp host to your router, you must then
enable your interfaces as they are automatically shut down.
Lab 3.6: Using the Cisco Discovery
Protocol to Gather Information about
Neighbor Devices
Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help admin-
istrators collect information about both locally attached and remote devices. You can
gather hardware information, as well as protocol information about neighbor devices. This
information is useful for troubleshooting and documenting the network.
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
while working in section 2.
Lab 3.6: Using the Cisco Discovery Protocol to Gather Information about Neighbor Devices 187
Lab Steps
2621 Router A and 2621 Router B need to be configured in order for output
to appear when you go through this lab.
1. First gather CDP information on your router by getting CDP Timers and Holdtime
Information. Use the show cdp command (sh cdp for short) which shows information
about two CDP global parameters that can be configured on Cisco devices. The output
on a router looks like this:
2811A#show cdp
Global CDP information:
Sending CDP packets every 60 seconds
Sending a holdtime value of 180 seconds
Sending CDPv2 advertisements is enabled
2811A#
N
CDP timer is how often CDP packets are transmitted to all active interfaces.
N
CDP holdtime is the amount of time that the device will hold packets received
from neighbor devices.
Both the Cisco routers and the Cisco switches use the same parameters.
2. Use the global commands cdp holdtime and cdp timer to configure the CDP holdtime
and timer on a router.
2811A#config t
Enter configuration commands, one per line. End with CTRL/Z.
2811A(config)#cdp ?
advertise-v2 CDP sends version-2 advertisements
holdtime Specify the holdtime (in sec) to be sent in packets
log Log messages generated by CDP
run Enable CDP
source-interface Insert the interface's IP in all CDP packets
timer Specify rate (in sec) at which CDP packets are sent>
2811A(config)#cdp timer 90
2811A(config)#cdp holdtime 240
2811A(config)#ctrl+z
3. You can turn off CDP completely on the router with the no cdp run command from
global configuration mode of a router. Enable CDP with the cdp run command.
2811A(config)#no cdp run
2811 (config)#cdp run
2811A(config)#ctrl+z
188 Managing a Cisco Internetwork
4. To turn off or on CDP on a router interface, use the no cdp enable and cdp enable
commands. Enable CDP on the interface with the cdp enable command.
2811A(config)#interface fastethernet 0/0
2811A(config-if)#no cdp enable
2811A(config-if)#cdp enable
2811A(config)#ctrl+z
5. The show cdp neighbor command (show cdp nei for short) shows information about
directly connected devices. It is important to remember that CDP packets are not
passed through a Cisco switch, and you only see what is directly attached. On a router
connected to a switch, you will not see the other devices connected to the switch. The
following output shows the show cdp neighbor command used on the 2811 A router.
2811A#show cdp nei
Device ID Local Intrfce Holdtme Capability Platform Port ID
2621B Ser 0/0 170 R 2621
Ser 0/0/1
2621A Ser 0/0 170 R 2621
Ser 0/1/1
2811A#
The following table summarizes the information displayed by the show cdp neighbor
command for each device.
Field Description
Device ID The hostname of the device directly connected.
Local Interface The port or interface on which you are receiving the CDP packet.
Holdtime The amount of time the router will hold the information before
discarding it if no more CDP packets are received.
Capability The neighbors capability, such as router, switch, or repeater. The
capability codes are listed at the top of the command output.
Platform The type of Cisco device. In the above output, a 2811 router, two
2621 routers, a 3550 switch, and a 3560 switch are attached.
Port ID The neighbor devices port or interface on which the CDP packets
are broadcasted out.
Lab 3.6: Using the Cisco Discovery Protocol to Gather Information about Neighbor Devices 189
6. Another command that provides neighbor information is the show cdp neighbor
detail command (show cdp nei de for short), which also can be run on the router
or switch. This command shows detailed information about each device connected
to the device, as in the router output below.
2811A#show cdp neighbor detail
-------------------------
Device ID: 2621B
Entry address(es):
IP Address: 172.16.30.2
Platform: cisco 2621, Capabilities: Router
Interface: Serial0/0, Port ID (outgoing port): Serial0/0/1
Holdtime : 146 sec
Version :
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-BIN-M), Version 12.2(13)T1, RELEASE SOFTWARE
(fc1)
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2003 by Cisco Systems, Inc.
Compiled Sat 04-Jan-03 05:58 by ccai
advertisement version: 2
-------------------------
Device ID: 2621A
Entry address(es):
IP Address: 172.16.20.2
Platform: cisco 2621, Capabilities: Router
Interface: Serial0/0, Port ID (outgoing port): Serial0/1/1
Holdtime : 146 sec
Version :
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-BIN-M), Version 12.2(13)T1, RELEASE SOFTWARE
(fc1)
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2003 by Cisco Systems, Inc.
Compiled Sat 04-Jan-03 05:58 by ccai
advertisement version: 2
-------------------------
2811A#
The output above shows the hostname and IP address of the directly connected devices.
In addition to the same information displayed by the show cdp neighbor command, the
show cdp neighbor detail command also shows the IOS version of the neighbor device.
190 Managing a Cisco Internetwork
7. The show cdp entry * command displays the same information as the show cdp
neighbor details command. The following is an example of the router output of
the show cdp entry * command.
2811A#show cdp entry *
-------------------------
Device ID: 2621B
Entry address(es):
IP Address: 172.16.30.2
Platform: cisco 2621, Capabilities: Router
Interface: Serial0/0, Port ID (outgoing port): Serial0/0/1
Holdtime : 146 sec
Version :
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-BIN-M), Version 12.2(13)T1, RELEASE SOFTWARE
(fc1)
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2003 by Cisco Systems, Inc.
Compiled Sat 04-Jan-03 05:58 by ccai
advertisement version: 2
-------------------------
Device ID: 2621A
Entry address(es):
IP Address: 172.16.20.2
Platform: cisco 2621, Capabilities: Router
Interface: Serial0/0, Port ID (outgoing port): Serial0/1/1
Holdtime : 146 sec
Version :
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-BIN-M), Version 12.2(13)T1, RELEASE SOFTWARE
(fc1)
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2003 by Cisco Systems, Inc.
Compiled Sat 04-Jan-03 05:58 by ccai
advertisement version: 2
-------------------------
2811A#
Lab 3.7: Using Telnet 191
8. The show cdp traffic command displays information about interface traffic, including
the number of CDP packets sent and received and the errors with CDP. The following
output shows the show cdp traffic command used on a router.
2811A#show cdp traffic
CDP counters :
Total packets output: 14556, Input: 7366
Hdr syntax: 0, Chksum error: 0, Encaps failed: 0
No memory: 0, Invalid packet: 0, Fragmented: 0
CDP version 1 advertisements output: 0, Input: 0
CDP version 2 advertisements output: 14556, Input: 7366
2811A#
Lab 3.7: Using Telnet
Telnet is a virtual terminal protocol that is part of the TCP/IP protocol suite. Telnet allows
you to make connections to remote devices and gather information and run programs. To
start a Telnet session, logging into a another device requires a valid username and password
on the destination hardware.
After your routers and switches are congured, you can use the Telnet program to
congure and check your routers and switches instead of needing to use a console cable.
You use the Telnet program by typing telnet from any command prompt (DOS or Cisco).
VTY passwords must be set on the routers for this to work.
You cannot use CDP to gather information about routers and switches that are not directly
connected to your device. However, you can use the Telnet application to connect to your
neighbor devices and then run CDP on those remote devices to gather CDP information about
remote devices.
In this lab we will telnet from 2621 Router B into 2621 Router A and 3550 Switch A. In
a prior lab we have congured 2621 Router A but now we need to congure 3550 Switch
A at the start of this lab.
192 Managing a Cisco Internetwork
Lab Steps
1. Double-click 3550 Switch A in order to bring up the console screen.
2. Perform the following commands:
Switch>en
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z
Switch(config)#
3. To set the IP configuration on a 3550 switch, use the ip address command. However,
this is set under the VLAN1 interface, not at global configuration mode like on a 1900
switch. Remember that by default all interfaces are members of VLAN1, which is why
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
while working in section 2. You need a congured network in order to complete this lab.
Lab 3.7: Using Telnet 193
the VLAN1 interface is configured by default. Lets also set the hostname so that we
can more clearly identify this device when we telnet into it in subsequent steps.
Switch(config)#hostname 3550A
3550A(config)#interface vlan 1
3550A(config-if)#ip address 172.16.10.17 255.255.255.0
4. The default gateway should also be set using the ip default-gateway command.
However, unlike the IP address, this is completed at global configuration mode.
3550A(config-if)#exit
3550A(config)#ip default-gateway 172.16.10.1
5. We need to set up a VTY password for the 3550 Switch A.
3550A(config)#line vty 0 15
3550A(config-line)#password todd
3550A(config-line)#ctrl+z
6. Switch to 2621 Router A via the console menu.
7. For this lab, remove the telnet and enable passwords from the 2621 Router A.
2621A>enable
2621A#config t
Enter configuration commands, one per line. End with CTRL/Z.
2621A(config)#no enable secret
2621A(config)#no enable password
2621A(config)#line vty 0 4
2621A(config-line)#no password
2621A(config-line)#ctrl+z
2621A#
194 Managing a Cisco Internetwork
8. You can issue the telnet command from any router prompt, as in the following example
from 2621 Router B to 2621 Router A:
2621B#telnet 172.16.20.2
Trying 172.16.10.2 ... Open
Password required, but none set
[Connection to 172.16.20.2 closed by foreign host]
2621B#
Remember that the VTY ports on a router are congured as login, which means that
you must either set the VTY passwords or use the no login command.
9. On a Cisco router, you do not need to use the telnet command. If you just type in an
IP address from a command prompt, the router will assume you want to telnet to the
device, as shown below:
2621B#172.16.20.2
Trying 172.16.10.2 ... Open
Password required, but none set
[Connection to 172.16.20.2 closed by foreign host]
2621B#
10. Its time to set VTY passwords on the router I want to telnet into. Here is an example
of what I did:
2621A#config t
Enter configuration commands, one per line. End with CTRL/Z.
2621A(config)#line vty 0 4
2621A(config-line)#password todd
2621A(config-line)#ctrl+z
2621A#
11. Now, lets try connecting to the router again (from the 2621 Router B console).
2621B#172.16.20.2
Trying 172.16.20.2 ... Open
User Access Verification
Password:
2621A>
12. Remember that the VTY password is the user mode password, not the enable pass-
word. Watch what happens when I try to go into privileged mode after telneting into
2621 Router A:
2621A>en
% No password set
2621A>
Lab 3.7: Using Telnet 195
This is a good security feature. You dont want anyone just telneting onto your device and
then being able to just type the enable command to get into privileged mode. You must set
your enable password or enable secret password to use telnet to congure remote devices.
13. Now, exit out of 2621 Router A.
2621A>exit
[Connection to 172.16.20.2 closed by foreign host]
2621B#
14. If you telnet to a router or switch, you can end the connection by typing exit at any
time. However, what if you want to keep your connection to a remote device but still
come back to your original router console? To keep the connection, you can press the
Ctrl+Shift+6 key combination, release it, and then press X.
Heres an example of connecting to multiple devices from 2621 Router B router console:
2621B#telnet 172.16.20.2
Trying 172.16.20.2 ... Open
User Access Verification
Password:
2621A> [press ctrl+shift+6 then x]
2621B#
In the example above, I telneted to the 2621 Router A, then typed the password to
enter user mode. I then pressed Ctrl+Shift+6, then x (this doesntt show on the screen
output). Notice the command prompt is now back at the 2621 Router B.
15. You can also telnet into a switch. In the following example, we telnet to switch 3550 A.
2621B#telnet 172.16.10.17
Trying 172.16.10.17 ... Open
User Access Verification
Password:
3550A>
16. At this point, press Ctrl+Shift+6, then X, which will take you back to 2621 Router B
console.
2621B#
17. To see the connections made from your router to a remote device, use the show sessions
command, as shown below.
2621B#show sessions
Conn Host Address Byte Idle Conn Name
1 172.16.20.2 172.16.20.2 0 0 172.16.20.2
* 2 172.16.10.17 172.16.10.17 0 0 172.16.10.17
2621B#
196 Managing a Cisco Internetwork
18. Notice the asterisk (*) next to connection 2. This means that session 2 was the last
session. You can return to your last session by pressing enter twice. You can also
return to any session by typing the number of the connection and pressing enter twice.
Here is an example:
2621B#1
[Resuming connection 1 to 172.16.20.2 ... ] [press enter]
2621A>
When changing windows from Router to Router do not close the window
with the x or the Telnet information will be lost.
19. You can list all active consoles and VTY ports in use on your router with the show
users command. Type show users from the 2621 Router A, which the 2621 Router B
had telneted into.
2621A>show users
Line User Host(s) Idle Location
0 con 0 idle 00:00:00
* 2 vty 0 idle 00:25:12 172.16.30.2
Interface User Mode Idle Peer Address
2621A>
In the output, the con represents the local console. In this example, the console is con-
nected to two remote IP addresses, or devices. This output shows that the console is
active and that VTY port 0 is being used. The asterisk represents the current terminal
session user.
20. You can end Telnet sessions a few different ways. Typing exit or disconnect is probably
the easiest and quickest. To end a session from a remote device, use the exit command,
as shown below.
2621A#exit
[Connection to 172.16.20.2 closed by foreign host]
2621B#
21. To end a session from a local device, use the disconnect command, as shown below.
2621B#show sessions
Conn Host Address Byte Idle Conn Name
* 2 172.16.10.17 172.16.10.17 0 0 172.16.10.17
2621B#disconnect 2
Lab 3.8: Using Secure Shell in Place of Telnet 197
Closing connection to 172.16.10.17 [confirm] [enter]
2621B#
In this example, we used the session number 2 because that was the connection to 3550
Switch A that we wanted to end. As explained earlier, you can use the show sessions com-
mand to see the connection number.
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 3.8: Using Secure Shell
in Place of Telnet
The last lab had you set your ve basic passwords that can be used on a router. In order to
gain access to the console (user mode) through the network (called in-band), you set a pass-
word on your VTY lines. This allowed Telnet access. However, Telnet is insecure because
everything including passwords are sent in the clear. However, we can x that by using
Secure Shell (SSH). This is basically the same as using Telnet, but is a secure connection.
We will congure our routers to use SSH on the VTY lines.
Network Layout
Load Secure Shell Layout.rsm or whatever you previously named it, before going
through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le Secure Shell Layout.rsm and click Open.
198 Managing a Cisco Internetwork
Lab Steps
1. On the Network Visualizer screen, double-click on 2811 Router A. This will bring up a
console screen.
2. Press Enter and the Router> prompt will appear. You are now in the user mode.
3. Change to the privileged mode.
Router>
Router>enable
4. We need to set a hostname on 2811 Router A.
Router#config t
Router(config)#hostname2811A
2811A(config)#
5. The next thing we need to do is set a username and password to use for login when
using SSH.
2811A(config)#username todd password lammle
6. In addition, a domain name must be set. This is a required step when using SSH.
However, it is not important what you set it to unless you are using a DNS server for
domain lookups on the router.
2811A(config)#ip domain-name lammle.com
7. Now a key needs to be generated on the router. This will be used to encrypt the pass-
word when connecting with SSH to the router.
2811A(config)#crypto key generate rsa
The name for the keys will be: 2811A.lammle.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: [press enter]
% Generating 512 bit RSA keys, keys will be non-exportable...[OK]
2811A(config)#
Now, we need to set our VTY line commands. The vty lines are used to set a Telnet
password on the router. If the password is not set, then telnet cannot be used by
default. However, we dont have to use Telnet, we can use SSH instead, or with Telnet.
We no longer use the login command by itself. We need to use the login local to have
the vty lines look for the username and password congured locally on the router. Lets
take a look.
Lab 3.8: Using Secure Shell in Place of Telnet 199
8. Use the line vty command to enter into line mode.
2811A(config)#line vty 0 ?
<1-1180> Last Line number
<cr>
2811A(config)#line vty 0 1180
2811A(config-line)#login local
9. After settting the lines to use the username and password configured on the local
router, we need to tell the vty lines to use SSH.
2811A(config-line)#transport input ssh
10. The above command allows only SSH session on the vty lines. You can use the follow-
ing command to allow both SSH and Telnet into your router (although, if you can use
SSH, Telnet is not recommended).
2811A(config-line)#transport input ssh telnet
Rename and Save Your File: Make sure you save the actual network layout le that you
have been working with. You might want to save it to another le name than Secure Shell
Layout.rsm. This allows you to start over with a non-congured network if you wish.
1. There are two ways you can save a network layout. The first way is by clicking on the
Diskette button on the button bar, at the top of the Network Visualizer screen. You
can also click File on the menu and choose Save from the drop down menu.
200 Managing a Cisco Internetwork
2. A dialog box will appear. At the bottom you will see the file name Secure Shell
Layout.rsm. Rename the file. In the following example it is renamed My Secure
Shell Layout.rsm.
3. Click the Save button. At this point your network layout has been saved to a new
name. You then have the option of reloading Secure Shell Layout.rsm which is non-
configured.
Lab 3.9: Verifying Secure Shell
in Place of Telnet
In Lab 3.8 we had congured 2811 Router A to be an SSH server. In this lab, we will use
2811 Router B to connect to 2811 Router A and verify that SSH is working. As we discussed
in Lab 3.8, the reason we want to use SSH is because Telnet is insecure. However, we can x
that by using Secure Shell (SSH). This is basically the same as using Telnet, but is a secure
connection. Lets congure verify our SSH server on 2811 Router A.
Lab 3.9: Verifying Secure Shell in Place of Telnet 201
Lab Steps
1. On the Network Visualizer screen, double-click 2811 Router B. This will bring up a
console screen.
2. The first thing we need to do is ping 2811 Router A from 2811 Router B to verify
network connectivity.
2811B(config)#exit
2811B#ping 172.16.20.1
3. Now, lets SSH into 2811 Router A and verify our connection. We need to use the
username configured on the 2811 Router A (from Lab 6.8) as our login. We do this
with the -l option. The name used in the ssh command is case sensitive.
2811B#ssh -l todd 172.16.20.1
Password: [lammle is the password, does not appear when you type]
2811A>
Network Layout
Work with the saved network that you used to congure devices in Lab 3.8.
202 Managing a Cisco Internetwork
4. You can verify your connection on 2811 Router A with the show users command:
2811A>show users
Line User Host(s) Idle Location
* 66 vty 0 Vail idle 00:00:00 192.0.2.157
Interface User Mode Idle Peer Address
2811A>
Lab 3.10: Creating a Hosts Table on
a Router and Resolve Host Names to
IP Addresses
You can use a hostname to connect to a remote device rather than use an IP address. The
device that you are using to make the connection from must be able to translate the hostname
to an IP address. This lab will show you how to create a hosts table on your router to resolve
host names to IP addresses.
Lab Steps
1. A host table provides name resolution only on the router on which it was built. The
command to build a host table on a router is:
ip host name ip_address
2. Here is an example of configuring a host table on the 2621 Router B with two entries
to resolve the names for the 2621 Router A and the 3550 Switch A:
2621B#config t
Enter conguration commands, one per line. End with CTRL/Z.
2621B(config)#ip host ?
WORD Name of host
2621B(config)#ip host 2621A ?
<0-65535> Default telnet port number
A.B.C.D Host IP address
additional Append addresses
2621B(config)#ip host 2621A 172.16.20.2 ?
A.B.C.D Host IP address (maximum of 8)
<cr>
Lab 3.10: Creating a Hosts Table on a Router and Resolve Host Names to IP Addresses 203
2621B(config)#ip host 2621A 172.16.20.2
2621B(config)#ip host 3550A 172.16.10.17
2621B(config)#ctrl+z
3. To see the host table, use the show hosts command, as shown below.
2621B#sh hosts
Default domain is not set
Name/address lookup uses domain service
Network Layout
Work with the saved network that you used to congure devices in Lab 3.9. You need a
congured network in order to complete this lab.
204 Managing a Cisco Internetwork
Name servers are 255.255.255.255
Host Flags Age Type Address(es)
2621A (perm, OK) 0 IP 172.16.20.2
3550A (perm, OK) 0 IP 172.16.10.17
2621B#
In the router output above, you can see the two hostnames and their associated IP
addresses. The perm in the Flags column means the entry is manually congured. If it
said temp, it would be an entry resolved by DNS.
4. To verify that the host table resolves names, try typing the hostnames at a router
prompt. Remember that if you dont specify the command, the router assumes you
want to telnet. Use the hostnames we just created to telnet into the remote devices and
then press Ctrl+Shift+6, then X to return to the main console of the 2621B router.
2621B#2621A
Trying 2621A (172.16.20.2)... Open
User Access Verification
Password:
2621A>(control+shift+6,then x)
2621B#
2621B#3550A
Trying 3550A (172.16.40.2)... Open
User Access Verification
Password:
3550A#
5. Notice in the entries in the show session output below that the hostname now shows up
instead of the IP address because the IP addresses has been resolved.
3550A#sh sess
Conn Host Address Byte Idle Conn Name
1 2621A 172.16.20.2 0 0 2621A
* 2 3550A 172.16.10.17 0 0 3550A
6. You can remove a hostname from the table by using the no ip host command, as in
the following example:
3550A>(control+shift+6,then x)
2621B#
2621B#config t
Enter configuration commands, one per line. End with CTRL/Z.
2621B(config)#no ip host 2621A
7. Now remove the other hostname from the table by using the no ip host command.
2621B(config)#no ip host 3550A
Configuring the
Catalyst Switch
Lab 4: Introduction to
Configuring the Catalyst
Switch
The CCNA exam covers specic switch commands for the 2950/2960 and 3550/3560
switches. The following labs will teach you how to connect to the 1900 switch and
Catalyst 2950/2960 and 3550/3560 switches and congure LAN switching.
The labs covered in this section include:
N
4.1: Connecting to the 1900 Switch and setting the passwords
N
4.2: Configuring the 1900 Switch
N
4.3: Configuring the 1900 Switch Port Duplex
N
4.4: Verifying the 1900 Switch IP Connectivity
N
4.5: Erasing the 1900 Switch Configuration
Labs 4.1 - 4.5 are for the 1900 switch, which is not used in our standard
network layouts, but is included for your educational purpose. The 1900
switch is an older switch and is end-of-life from Cisco.
N
4.6: Utilizing the 2950/2960 Switch
N
4.7: Setting Passwords on the 2950/2960 Switch
N
4.8: Configuring the 2950/2960 Switch
N
4.9: Verifying the 2950/ 2960 Switch IP Connectivity
N
4.10: Saving and Erasing the 2950/2960 Switch Configuration
N
4.11: Utilizing the 3550/3560 Switch
N
4.12: Setting Passwords on the 3550/3560 Switch
N
4.13: Configuring the 3550/3560 Switch
N
4.14: Verifying the 3550 /3560 Switch IP Connectivity
N
4.15: Saving and Erasing the 3550/3560 Switch Configuration
Lab 4.1: Connecting to the 1900 Switch and Setting Passwords 207
Lab 4.1: Connecting to the 1900 Switch
and Setting Passwords
This lab will have you work with a switch and router, enter an IP address on a router, enter
global conguration mode and then set the passwords.
Lab Steps
1. Double click the 1900 switch to view the the 1900 switch console.
OR
Network Layout
Load 1900 Switch Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le 1900 Switch Layout.rsm and click Open.
208 Configuring the Catalyst Switch
Go to the 1900 switch via the console menu.
2. You will then see the following output. Press K to enter the CLI.
1 user(s) now active on Management Console.
User Interface Menu
[M] Menus
[K] Command Line
[I] IP Configuration
Enter Selection: K
CLI session with the switch is open.
To end the CLI session, enter [Exit].
>
3. The first thing that you should configure on a switch is the passwords. You dont
want unauthorized users connecting to the switch. You can set both the user mode
and privileged mode passwords, just like a router. Enter privileged mode by using the
enable command and then enter global configuration mode by using the config t
command. The switch following output shows an example of how to get into enable
mode, and then into global configuration mode.
>enable
#config t
Enter configuration commands, one per line. End with CTRL/Z
(config)#
Lab 4.1: Connecting to the 1900 Switch and Setting Passwords 209
4. Once you are in global configuration mode, you can set the user mode and enable
mode passwords by using the enable password command. The switches output below
shows the configuration of both the user mode and enable mode passwords.
(config)#enable password ?
level Set exec level password
(config)#enable password level ?
<1-15> Level number
5. To enter the user mode password, use level number 1. To enter the enable mode pass-
word, use level mode 15. Remember the password must be at least four characters,
but not longer then eight characters. The switch output below shows the user mode
password being set and denied because it is more than eight characters.
(config)#enable password level 1 toddlammle
Error: Invalid password length.
Password must be between four and eight characters.
6. The following output is an example of how to set both the user mode and enable mode
passwords on the 1900 switch.
(config)#enable password level 1 todd
(config)#enable password level 15 todd1
(config)#exit
#exit
7. At this point, you can press enter and test your passwords. You will be prompted for
a user mode password after you press K and then an enable mode password after you
type enable.
Catalyst 1900 Management Console
Copyright (c) Cisco Systems, Inc. 1993-1998
All rights reserved.
Enterprise
Edition Software
Ethernet Address: 00-30-80-CC-7D-00
PCA Number: 73-3122-04
PCA Serial Number: FAB033725XG
Model Number: WS-C1912-A
System Serial Number: FAB0339T01M
Power Supply S/N: PHI031801CF
210 Configuring the Catalyst Switch
PCB Serial Number: FAB033725XG,73-3122-04
-------------------------------------------------
1 user(s) now active on Management Console.
User Interface Menu
[M] Menus
[K] Command Line
Enter Selection: K
Enter password: ****
CLI session with the switch is open.
To end the CLI session, enter [Exit].
>en
Enter password: ****
#
8. The enable secret password is a more secure password and supersedes the enable pass-
word if set. You set this password the same way you set the enable secret password
on a router. If you have an enable secret set, you dont even need to bother setting the
enable mode password.
#config t
Enter configuration commands, one per line. End with CTRL/Z
(config)#enable secret todd2
9. You can use show running-config (show run for short) to see the current configuration
on the switch.
(config)#exit
#sh run
Building configuration...
Current configuration:
enable secret 5 $1$FMFQ$wFVYVLYn2aXscfB3J95.w.
enable password level 1 "TODD"
enable password level 15 "TODD1"
[output cut]
Notice the enable mode passwords are not encrypted by default, but the enable secret is.
This is the same password conguration technique that you will nd on a router. One more
thing to notice is that even though I typed the password as lowercase, the running-config
shows the passwords as uppercase. It doesnt matter how you type it in or how it shows in
the conguration because the passwords are not case sensitive on the switch.
Lab 4.1: Connecting to the 1900 Switch and Setting Passwords 211
Rename and Save Your File: Make sure you save the actual network layout le that you
have been working with. You might want to save it to another le name than 1900 Switch
Layout.rsm. This allows you to start over with a non-congured network if you wish.
1. There are two ways you can save a network layout. The first way is by clicking on the
Diskette button on the button bar, at the top of the Network Visualizer screen. You
can also click File on the menu and choose Save from the drop down menu.
212 Configuring the Catalyst Switch
2. A dialog box will appear. At the bottom you will see the file name 1900 Switch
Layout.rsm. Rename the file. In the following example it is renamed to My 1900
Switch Layout.rsm.
3. Click the Save button. At this point your network layout has been saved to a new name.
You then have the option of reloading 1900 Switch Layout.rsm which is non-configured.
Lab 4.2: Configuring the 1900 Switch
Use the saved network layout le from Lab 4.1. The le name is 1900 Switch Layout.rsm
or whatever you named it when you saved it in Lab 4.1.
Set the Hostname
The hostname on a switch, as well as on a router, is only locally signicant. This means
that it does not have any function on the network or name resolution whatsoever. However,
it is helpful to set a hostname on a switch so that you can identify the switch when connect-
ing to it. A good rule of thumb is to name the switch after the location it is serving.
Lab 4.2: Configuring the 1900 Switch 213
Lab Step
1. The 1900 switch command to set the hostname is exactly like any router: you use the
hostname command. Remember, it is one word. The switch output below shows the con-
sole screen. Press K to go into user mode, enter the password, use the enable command
and enter the enable secret password. From global configuration mode, type the command
hostname hostname.
1 user(s) now active on Management Console.
User Interface Menu
[M] Menus
[K] Command Line
[I] IP Configuration
Enter Selection: K
Enter password: ****
CLI session with the switch is open.
To end the CLI session, enter [Exit].
>en
Enter password: ****
#config t
Enter configuration commands, one per line. End with CTRL/Z
(config)#hostname 1900A
1900A(config)#exit
Notice that as soon as I pressed enter, the hostname of the switch appeared. Remember
that from global conguration mode, which you enter by using the config t command, it
changes the running-config. Any changes you make in this mode take effect immediately.
Configure the IP Address
You do not have to set any IP conguration on the switch to make it work. You can just
plug in devices and they should start working, just like they would on a hub. The reason
you would set the IP address information on the switch is so you can either manage the
switch via Telnet or other management software, or you wanted to congure the switch
with different VLANs and other network functions. VLANs are discussed in later labs.
2. By default, no IP address or default-gateway information is set. You would set both the
IP address and the default-gateway on a layer-two switch, just like any host. By typing
the command show ip (or sh ip), you can see the default IP configuration of the switch.
1900A#show ip
IP Address: 0.0.0.0
Subnet Mask: 0.0.0.0
Default Gateway: 0.0.0.0
Management VLAN: 1
214 Configuring the Catalyst Switch
Domain name:
Name server 1: 0.0.0.0
Name server 2: 0.0.0.0
HTTP server : Enabled
HTTP port : 80
RIP : Enabled
Notice in the above switch output that no IP address, default-gateway, or other IP
parameters are congured.
3. To set the IP configuration on a 1900 switch, use the ip address command. The
default gateway should also be set using the ip default-gateway command.
The switch output below shows an example of how to set the IP address and default-
gateway on a 1900 switch.
1900A#config t
Enter configuration commands, one per line. End with CTRL/Z
1900A(config)#ip address 172.16.10.16 255.255.255.0
1900A(config)#ip default-gateway 172.16.10.1
1900A(config)#exit
4. Once you have your IP information set, use the show ip command to verify your changes.
You can view this information with the show running-config command as well.
1900A#show ip
IP Address: 172.16.10.16
Subnet Mask: 255.255.255.0
Default Gateway: 172.16.10.1
Management VLAN: 1
Domain name:
Name server 1: 0.0.0.0
Name server 2: 0.0.0.0
HTTP server : Enabled
HTTP port : 80
RIP : Enabled
1900A#
To change the IP address and default-gateway on the switch, you can either type in new
addresses or remove the IP information with the no ip address and no ip default-gateway
commands, at the global conguration prompt.
Configure Interfaces
It is important to understand how to access switch ports. The 1900 switch uses the type
slot/port command. For example, FastEthernet 0/3 is 10BaseT port 3. Another example
Lab 4.2: Configuring the 1900 Switch 215
would be FastEthernet 0/26 which is the rst of the two FastEthernet ports available on
the 1900 switch.
The 1900 switch type slot/port command can be used with either the interface com-
mand or the show command. The interface command allows you to set interface specic
congurations. The 1900 switch has only one slot: zero (0).
5. To configure an interface on a 1900 switch, go to global configuration mode and use
the interface command. From global configuration, use the interface command
and the type, either Ethernet or FastEthernet interface. I am going to demonstrate
the Ethernet interface configuration first.
1900A#config t
Enter configuration commands, one per line. End with CTRL/Z
1900A(config)#int ethernet ?
<0-0> IEEE 802.3
6. The previous output asks for the slot. Since the 1900 switch is not modular, there is only
one slot. The next output gives us a slash (/) to separate the slot/port configuration.
1900A(config)#int ethernet 0?
/
1900A(config)#int ethernet 0/?
<1-25> IEEE 802.3
7. After the 0/configuration command, the above output shows the amount of ports you
can configure. The output below shows the completed command.
1900A(config)#int ethernet 0/1
8. Once you are in interface configuration, the prompt changes to (config-if). After
you are at the interface prompt, you can use the help commands to see the available
commands.
1900A(config-if)#?
Interface configuration commands:
cdp Cdp interface subcommands
description Interface specific description
duplex Configure duplex operation
exit Exit from interface configuration mode
help Description of the interactive help system
no Negate a command or set its defaults
port Perform switch port configuration
shutdown Shutdown the selected interface
spantree Spanning tree subsystem
vlan-membership VLAN membership configuration
1900A(config-if)#?exit
216 Configuring the Catalyst Switch
You can switch between interface conguration by using the int e 0/# command at
any time from global conguration mode.
9. The switch output below shows the configuration of a FastEthernet port on the 1900
switch. Notice that the command is interface fastethernet, but the slot is still 0.
The only ports available are 26 and 27.
1900A(config)#int fastethernet ?
<0-0> FastEthernet IEEE 802.3
1900A(config)#int fastethernet 0/?
<26-27> FastEthernet IEEE 802.3
1900A(config)#int fastethernet 0/26
1900A(config-if)#int fast 0/27
1900A(config-if)#ctl+z
10. After you make any changes you want to the interfaces, you can view the different inter-
faces with the show interface command. The switch output below shows the command
used to view a 10BaseT interface and the command to view a fastethernet interface.
1900A#show int e0/1
ethernet 0/1 is Suspended-no-linkbeat
Hardware is Built-in 10Base-T
Address is 0030.80CC.7D01
MTU 1500 bytes, BW 10000 Kbits
802.1d STP State: Forwarding Forward Transitions: 1
[output cut]
1900A#show int f0/26
Fastethernet 0/26 is Suspended-no-linkbeat
Hardware is Built-in 100Base-TX
Address is 0030.80CC.7D1A
MTU 1500 bytes, BW 100000 Kbits
802.1d STP State: Blocking Forward Transitions: 0
[output cut]
Configure Interface Descriptions
You can administratively set a name for each interface on the 1900 switch. Like the
hostname, the descriptions are only locally signicant. For the 1900 series switch, use
the description command. You cannot use spaces with the description command, but
you can use underlines if you need to.
11. To set the descriptions, you need to be in interface configuration mode. From interface
configuration mode, use the description command to describe each interface. You can
Lab 4.2: Configuring the 1900 Switch 217
make the descriptions more then one word, but you cant use spaces. You will have to
use the underline as shown below:
1900A#config t
Enter configuration commands, one per line. End with CTRL/Z
1900A(config)#int e0/1
1900A(config-if)#description Finance_VLAN
1900A(config-if)#int f0/26
1900A(config-if)#description trunk_to_Building_4
1900A(config-if)#ctl+z
In the conguration example above, we set the description on both a 10Mbps port and
a 100Mbps port.
View Interface Descriptions
Once you have congured the descriptions you want on each interface, you can then view the
descriptions with either the show interface command, or show running-config command.
12. View the configuration of the Ethernet interface 0/1 by using the show interface
ethernet 0/1 command.
1900A#show int e0/1
Ethernet 0/1 is Enabled
Hardware is Built-in 10Base-T
Address is 0030.80CC.7D01
MTU 1500 bytes, BW 10000 Kbits
802.1d STP State: Forwarding Forward Transitions: 1
Port monitoring: Disabled
Unknown unicast flooding: Enabled
Unregistered multicast flooding: Enabled
Description: Finance_VLAN
Duplex setting: Half duplex
Back pressure: Disabled
13. Use the show running-config command to view the interface configurations as well.
1900A#show run
Building configuration...
Current configuration:
!
hostname "1900A"
!
ip address 172.16.10.16 255.255.255.0
218 Configuring the Catalyst Switch
ip default-gateway 172.16.10.1
!
enable secret 5 $1$u76B$IOFVJ7VxfVXYVpGDrFTcI0
enable password level 1 "TODD"
enable password level 15 "TODD1"
!
interface Ethernet 0/1
description "Finance_VLAN"
[output cut]
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 4.3: Configuring the 1900 Switch
Port Duplex
The 1900 switch has only 12 or 24 10BaseT ports and comes with one or two FastEthernet
ports. You can only set the duplex on the 1900 switch, as the ports are all xed speeds.
Network Layout
Use the saved network that you have been working with.
Lab 4.3: Configuring the 1900 Switch Port Duplex 219
Lab Steps
1. Use the duplex command in interface configuration.
In the switch output below, notice the options available on the FastEthernet ports.
1900A(config)#int f0/26
1900A(config-if)#duplex ?
auto Enable auto duplex configuration
full Force full duplex operation
full-flow-control Force full duplex with flow control
half Force half duplex operation
1900A(config-if)#duplex full
1900A(config-if)#ctrl+z
The following Table shows the different duplex options available on the 1900 switches.
The 1900 FastEthernet ports default to auto duplex, which means they will try and auto
detect the duplex the other end is running.
TABLE : Duplex Options
Parameter Definition
Auto Set the port into auto-negotiation mode. Default for all
100BaseTX ports.
Full Forces the 10 or 100Mbps ports into full duplex mode.
Full-flow-control Works only with 100BaseTX ports, uses flow control so buffers
wont overflow.
Half Default for 10BaseT ports, forces the ports to work only in half
duplex mode.
2. Once you have the duplex set, you can use the show interface command to view the
duplex configuration.
1900A#show int f0/26
Fastethernet 0/26 is enabled
Hardware is Built-in 100Base-TX
Address is 0030.80CC.7D1A
MTU 1500 bytes, BW 100000 Kbits
802.1d STP State: Blocking Forward Transitions: 0
Port monitoring: Disabled
Unknown unicast flooding: Enabled
Unregistered multicast flooding: Enabled
220 Configuring the Catalyst Switch
Description: trunk to Building 4
Duplex setting: Full duplex
Back pressure: Disabled
3. In the output above, the duplex setting shows full duplex.
Lab 4.4: Verifying 1900 Switch
IP Connectivity
It is important to test the switch IP conguration. You can use the ping program, and you
can telnet into the 1900 switch. However, you cannot telnet from the 1900 switch or use
traceroute.
Network Layout
Use the saved network that you are using while working with the 1900 switch.
Lab 4.4: Verifying 1900 Switch IP Connectivity 221
Lab Steps
1. Right-click on Host A.
2. Click on the Configs button.
3. On Host A configure:
N
IP Address
N
Subnet Mask
N
Default Gateway
IP Address: 172.16.10.9
Subnet Mask: 255.255.255.0
Default Gateway: 172.16.10.1
4. Click the OK button and then the Close button.
222 Configuring the Catalyst Switch
5. Ping the host from the switch 1900 A.
1900A#ping 172.16.10.9
Sending 5, 100-byte ICMP Echos to 172.16.10.9, time out is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max 0/2/10/ ms
The output on a successful ping: exclamation point (!). If you receive
periods (.) instead of exclamation points, that signifies a timeout.
6. Telnet to the host.
1900A#telnet 172.16.10.9
^
% Invalid input detected at '^' marker.
In the Telnet example above, notice the error when you try to telnet from the 1900
switch. The command is not available on the 1900 switch. However, you can telnet into a
switch at any time, as long as the switch is congured correctly.
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 4.5: Erasing the 1900 Switch
Configuration
The switch conguration is stored in NVRAM, just as any router. You cannot view the
startup-config, or contents of NVRAM. You can only view the running-config. When
you make a change to the switches running-config, the switches automatically copy the
conguration on the switch to NVRAM.
You can delete the conguration in NVRAM on the 1900 switch if you want to start
over on the switches conguration. To delete the contents of NVRAM on a 1900 switch,
use the delete nvram command.
Lab 4.5: Erasing the 1900 Switch Configuration 223
Lab Steps
1. Type delete ? from a 1900 Switch A, privileged mode prompt. Notice in the switch out-
put below that there are two options: nvram and vtp. We want to delete the contents of
NVRAM to the factory default settings.
1900A#delete ?
nvram NVRAM configuration
vtp Reset VTP configuration to defaults
1900A#delete nvram
This command resets the switch with factory defaults. All system parameters will revert
to their default factory settings. All static and dynamic addresses will be removed.
2. Reset system with factory defaults, [Y]es or [N]o? Yes
Notice the message received from the switch when the delete nvram command is used.
Once you say yes, the conguration is gone.
Network Layout
Use the saved network that you are using while working with the 1900 switch.
224 Configuring the Catalyst Switch
3. To confirm the configuration is gone, use the show run command.
#show run
Building configuration...
Current configuration:
!
interface Ethernet 0/1
!
interface Ethernet 0/2
!
interface Ethernet 0/3
!
interface Ethernet 0/4
[output cut]
Lab 4.6: Utilizing the 2950 and
2960 Switch
The 2950 and 2960 switches are very similar and basically support the same commands. The
conguration commands between the two switches differ because:
N
The Catalyst 2950 switch runs Cisco IOS 12.1EA software, and the Catalyst 2960
switch runs Cisco IOS 12.2SE software.
N
The hardware is different. In this program the 2950 switch has 12 FastEthnet ports ...
Lab 4.7: Setting Passwords on the 2950/2960 Switch 225
N
and the 2960 switch has eight FastEthernet ports and one GigabitEthernet port ...
If you use a 2950 switch command, it might not be supported on the 2960 switch.
The 2960 switch software handles the incompatible commands by either:
N
accepting it and translating them
N
rejecting the command
In this program the supported commands for these two switches are
identical.
Lab 4.7: Setting Passwords on
the 2950/2960 Switch
This lab will have you work with a 2950/2960 switch. The commands used in conguring
the 2950 or 2960 switches are identical in this program. You can choose which device you
would like to work with in setting passwords. In this lab, enter the global conguration
mode and then set the passwords.
226 Configuring the Catalyst Switch
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
in earlier labs.
Lab 4.7: Setting Passwords on the 2950/2960 Switch 227
Lab Steps
1. Double-click 2950 Switch A or 2960 Switch A to open the console screen.
2. Press Enter to connect to the console.
Switch>
3. For the user mode of the switch, you can use the help screen just like a router.
Switch>?
Exec commands:
<1-99> Session number to resume
access-enable Create a temporary Access-List entry
clear Reset functions
connect Open a terminal connection
disable Turn off privileged commands
disconnect Disconnect an existing network connection
enable Turn on privileged commands
exit Exit from the EXEC
help Description of the interactive help system
lock Lock the terminal
login Log in as a particular user
logout Exit from the EXEC
name-connection Name an existing network connection
ping Send echo messages
rcommand Run command on remote switch
resume Resume an active network connection
show Show running system information
systat Display information about terminal lines
telnet Open a telnet connection
terminal Set terminal line parameters
traceroute Trace route to destination
tunnel Open a tunnel connection
--More--
[output cut]
4. The first thing that you should configure on a switch are the passwords. You dont
want unauthorized users connecting to the switch. You can set both the user mode
and privileged mode passwords, just like a router. Enter the enable mode by using the
enable command and then enter global configuration mode by using the config t
command. The switch following output shows an example of how to get into enable
mode, and then into global configuration mode.
Switch>enable
Switch#config t
228 Configuring the Catalyst Switch
Enter configuration commands, one per line. End with CTRL/Z
Switch(config)#
5. Once you are in global configuration mode, you can set the user mode and enable
mode passwords by using the enable password and enable secret command. The
switches output below shows the configuration of both the user mode and enable
mode passwords.
Switch(config)#enable password ?
0 Specifies an UNENCRYPTED password will follow
7 Specifies a HIDDEN password will follow
LINE The UNENCRYPTED (cleartext) 'enable' password
level Set exec level password
Switch(config)#enable password todd
Switch(config)#enable secret cisco
Switch(config)
If you set your enable secret, the enable password is superseded and not
used, just like in a router.
6. In addition to the enable password and enable secret, the 2950/2960 switch allows you to
set a console and Telnet password as well using the line commands, just like in a router.
Switch(config)line ?
<0-16> First Line number
console Primary terminal line
vty Virtual terminal
Switch(config)#line console 0
Switch(config-line)#password console
Switch(config-line)#login
Switch(config-line)#line vty ?
% Unrecognized command
7. Remember that just like in a router, you cannot get help for a line command from
within line configuration mode. Type Exit to go back one step.
Switch(config-line)#exit
Switch(config)#line vty ?
<0-15> First Line number
Switch(config)#line vty 0 15
Switch(config-line)#password telnet
Switch(config-line)#login
Switch(config-line)#ctrl+z
Switch#
Lab 4.8: Configuring the 2950/2960 Switch 229
8. You can use show running-config (show run for short) to see the current configuration
on the switch.
Current configuration : 997 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch
!
enable secret 5 $1$yNgO$9uU0Z6NG1ib4vlt05bmMW1
enable password todd
!
ip subnet-zero
!
spanning-tree extend system-id
!
!
interface FastEthernet0/1
no ip address
!
interface FastEthernet0/2
no ip address
--More--
Notice the enable mode password is not encrypted by default, but the enable secret is.
This is the same password conguration technique that you will nd on a router.
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 4.8: Configuring the
2950/2960 Switch
This lab will have you work with a 2950/2960 switch. The commands used in conguring
the 2950 or 2960 switches are identical in this program. Even though the step-by-steps refer
to the 2950 switch, you can also congure the 2960 with the same steps.
230 Configuring the Catalyst Switch
Set the Hostname
The hostname on a switch, as well as on a router, is only locally signicant. This means that
it does not have any function on the network and is not used for name resolution whatsoever.
However, it is helpful to set a hostname on a switch so that you can identify the switch when
connecting to it. A good rule of thumb is to name the switch after the location it is serving.
Network Layout
Work with the saved network that you used to congure devices in Lab 4.7.
Lab 4.8: Configuring the 2950/2960 Switch 231
The 2950/2960 switch command to set the hostname is exactly like any router: you use
the hostname command. Remember, it is one word. From global conguration mode, type the
command hostname hostname.
Lab Steps
1. Double-click 2950 Switch A or 2960 Switch A to open the console screen.
Switch>enable
Enter password: ****
Switch#config t
Enter configuration commands, one per line. End with CTRL/Z
Switch(config)#hostname 2950A
2950A(config)#exit
2950A#
Notice that as soon as you press enter, the hostname of the switch appears. Remember
that from global conguration mode, which you enter by using the config t command, it
changes the running-config. Any changes you make in this mode take effect immediately.
Configure the IP Address
2. By default, no IP address or default-gateway information is set. You would set both
the IP address and the default-gateway on a layer-two switch, just like any host. By
typing the command show running-config you can see the default IP configuration of
the switch. Notice in your switch output that no IP address, default-gateway, or other
IP parameters are configured.
3. To set the IP configuration on a 2950 switch, use the ip address command. However,
this is set under the VLAN1 interface, not at global configuration mode like on a 1900
switch. Remember that by default all interfaces are members of VLAN1, which is why
the VLAN1 interface is configured by default.
2950A#config t
Enter configuration commands, one per line. End with CTRL/Z
2950A(config)#interface vlan 1
2950A(config-if)#ip address 172.16.40.2 255.255.255.0
2950A(config-if)#exit
2950A(config)#
4. The default gateway should also be set using the ip default-gateway command. How-
ever, unlike the IP address, this is completed at global configuration mode.
2950A(config)#ip default-gateway 172.16.40.1
2950A(config)#exit
2950A#
232 Configuring the Catalyst Switch
To change the IP address and default-gateway on the switch, you can either type in new
addresses or remove the IP information with the no ip address and no ip default-gateway
commands, at the appropriate conguration prompt.
Configure Interfaces
It is important to understand how to access switch ports. The 2950/2960 switch uses
the type slot/port command, just like a 2621 router. For example, Fastethernet 0/3 is
10/100BaseT port 3.
The 2950/2960 switch type slot/port command can be used with either the interface
command or the show command. The interface command allows you to set interface specic
congurations. The 2950/2960 switch has only one slot: zero (0), just like the 1900.
5. To configure an interface on a 2950/2960 switch, go to global configuration mode and
use the interface command as shown. Since the 2950/2960 switch is not modular, there
is only one slot, which is 0, although it lists 0-2 for some odd reason. However, you can
IP Default-Gateway
This is used on devices where no routing information is provided by the router that
tells you how to get to the next, directly connected device. It tells us what pathway to
use to send packets to the next, directly connected device. In the previous set of com-
mands the ip default-gateway is 172.16.40.1 because that is the IP address of interface
f0/0 on Router 2621 A.
Lab 4.8: Configuring the 2950/2960 Switch 233
only type in 0 as the slot in this program. Any other slot number will give you an
error. The next output gives us a slash (/) to separate the slot/port configuration.
2950A#config t
2950A(config)#interface fastethernet ?
<0-2> FastEthernet interface number
2950A(config)#interface fastethernet 0?
/
2950A(config)#interface fastethernet 0/?
<0-12> FastEthernet interface number
6. After the 0/configuration command, the above output shows the amount of ports you
can configure. The output below shows the completed command.
2950A(config)#interface fastethernet 0/1
2950A(config-if)#
7. Once you are in interface configuration, the prompt changes to (config-if). You can
switch between interface configurations by using the int fa 0/# command at any time
from global configuration mode. Now, lets look at the duplex and speed configura-
tions for a switch port.
2950A(config)#int fa0/1
2950A(config-if)#duplex ?
auto Enable AUTO duplex configuration
full Force full duplex operation
half Force half-duplex operation
2950A(config-if)#
2950A(config-if)#speed ?
10 Force 10 Mbps operation
100 Force 100 Mbps operation
auto Enable AUTO speed configuration
2950A(config-if)#
8. Since the switch ports duplex and speed settings are already set to auto by default, you
do not need to change the switch port settings. It is recommended that you allow the
switch port to auto negotiate speed and duplex settings in most situations. In a rare
situation, when it is required to manually set the speed and duplex of a switch port,
you can use the following configuration.
2950A(config-if)#duplex full
Duplex will not be set until speed is set to non-auto value
2950A(config-if)#speed 100
9. Notice in the above command that to run full duplex, you must set the speed to
non-auto value.
234 Configuring the Catalyst Switch
10. In addition to the duplex and speed commands that can be configured on the switch
port, you also can turn on what is called portfast. The portfast command allows
a switch port to come up quickly. Typically a switch port waits 50 seconds for the
spanning-tree to go through its gotta make sure there are no loops! cycle. However,
if you turn portfast on, then you better be sure you do not create a physical loop on the
switch network. A spanning-tree loop can severely hurt or bring your network down.
Here is how you would enable portfast on a switch port.
2950A(config-if)#spanning-tree ?
bpdufilter Dont send or receive BPDUs on this interface
bpduguard Don't accept BPDUs on this interface
cost Change an interface's spanning tree port path cost
guard Change an interface's spanning tree guard mode
link-type Specify a link type for spanning tree protocol use
port-priority Change an interface's spanning tree port priority
portfast Enable an interface to move directly to forwarding on link
up
stack-port Enable stack port
vlan VLAN Switch Spanning Tree
11. The command above shows the available options for the spanning-tree command.
We want to use the portfast command.
2950A(config-if)#spanning-tree portfast
%Warning: portfast should only be enabled on ports connected to a single
host. Connecting hubs, concentrators, switches, bridges, etc... to this
interface when portfast is enabled, can cause temporary bridging loops.
Use with CAUTION
%Portfast has been configured on FastEthernet0/1 but will only
have effect when the interface is in a non-trunking mode.
2950A(config-if)#
12. Notice the message the switch provides when enabling portfast. Although it seems like
the command did not take effect, as long as the port is in access mode (discussed in a
minute), the port will now be in portfast mode.
13. After you make any changes you want to the interfaces, you can view the different
interfaces with the show interface command. The switch output below shows the
command used to view a 10/100BaseT interface on the 2950/2960 switch.
2950A(config-if)#ctrl+z
2950A#show int f0/1
FastEthernet0/1 is down line protocol is down (notconnect)
Hardware is FastEthernet, address is 00b0.9eb1.bcd0 (bia 00b0.9eb1.bcd0)
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Lab 4.8: Configuring the 2950/2960 Switch 235
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Half-duplex, 100Mb/s, media type is 10/100BaseTX
input flow-control is off, output flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:02, output 00:00:01, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 1000 bits/sec, 1 packets/sec
1097702 packets input, 71821315 bytes, 0 no buffer
Received 488076 broadcasts, 0 runts, 0 giants, 0 throttles
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 3752639 multicast, 0 pause input
0 input packets with dribble condition detected
1590235 packets output, 290473092 bytes, 0 underruns
0 output errors, 0 collisions, 2 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
14. In addition to the show interface command, you can use the show running-config
command to see the interface configuration as well.
[output cut]
!
interface FastEthernet0/1
duplex full
speed 100
spanning-tree portfast
!
interface FastEthernet0/2
[output cut]
15. You can administratively set a name for each interface on the 2950/2960 switch. Like the
hostname, the descriptions are only locally significant. For the 2950/2960 series switch,
use the description command. You can use spaces with the description command, but
you can use underlines if you need to.
236 Configuring the Catalyst Switch
To set the descriptions, you need to be in interface conguration mode. From interface
conguration mode, use the description command to describe each interface.
2950A#config t
Enter configuration commands, one per line. End with CTRL/Z
2950A(config)#int fa 0/1
2950A(config-if)#description Sales VLAN
2950A(config-if)#int fa 0/8
2950A(config-if)#description trunk to Building 8
2950A(config-if)#
In the conguration example above, we set the description on both port 1 and 12.
16. Once you have configured the descriptions you want on each interface, you can then
view the descriptions with either the show interface command, or show running-
config command. View the configuration of the Ethernet interface 0/1 by using the
show interface ethernet 0/1 command.
2950A#show int fa 0/1
FastEthernet0/1 is down line protocol is down (notconnect)
Hardware is FastEthernet, address is 00b0.9eb1.bcd0 (bia 00b0.9eb1.bcd0)
Description: Sales VLAN
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Half-duplex, 100Mb/s, media type is 10/100BaseTX
(output cut)
17. Use the show running-config command to view the interface configurations as well.
2950A#show run
[output cut]
!
interface FastEthernet0/1
description "Sales VLAN"
spanning-tree portfast
!
[output cut]
Notice in the above switch output that the show int fa0/1 command and the show run
command both show the description command set on an interface.
Save the network that you have been working on.
Lab 4.9: Verifying 2950/2960 Switch IP Connectivity 237
Lab 4.9: Verifying 2950/2960 Switch
IP Connectivity
This lab will have you work with a 2950/2960 switch. The commands used in conguring
the 2950 or 2960 switches are identical in this program. Even though the step-by-steps refer
to the 2950 switch, you can also congure the 2960 with the same steps. It is important to
test the switch IP conguration. You can use the ping program, and you can telnet into the
2950/2960 switch. However, you cannot telnet from the 2950/2960 switch or use traceroute.
1. In the following example, ping Host E on the network from 2950 Switch A. Notice the
output on a successful ping: exclamation point (!). If you receive periods (.) instead of
exclamation points, that signifies a timeout.
Network Layout
Work with the saved network that you used to congure devices in Lab 4.8.
238 Configuring the Catalyst Switch
2950A#ping 172.16.40.3
Sending 5, 100-byte ICMP Echos to 172.16.40.3, time out is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max 0/2/10/ ms
2. In the following example, ping Host F on the network from the 2960 A switch.
2960A#ping 172.16.50.3
Sending 5, 100-byte ICMP Echos to 172.16.50.3, time out is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max 0/2/10/ ms
Lab 4.10: Saving and Erasing 2950/2960 Switch Configuration 239
Lab 4.10: Saving and Erasing 2950/2960
Switch Configuration
This lab will have you work with a 2950/2960 switch. The commands used in conguring
the 2950 or 2960 switches are identical in this program. Even though the step-by-steps refer
to the 2950 switch, you can also congure the 2960 with the same steps.
The switch conguration is stored in NVRAM, just as any router, and placed in RAM
when the switch boots. The le in RAM is called the running-config and the le in NVRAM
is called the startup-config. You can view the startup-config, also called the backup con-
guration, with the show startup-config command.
Network Layout
Work with the saved network that you used to congure devices in Lab 4.9.
240 Configuring the Catalyst Switch
Lab Steps
1. To save the switch configuration, you type copy running-config startup-config, or
copy run start, just like on a router.
2950A#copy run start
Destination filename [startup-config]?press Enter
Building configuration...
[OK]
2950A#
2. You can delete the configuration in NVRAM on the 2950 switch if you want to start
over on the switches configuration. To delete the contents of NVRAM on a 2950
switch, use the erase startup-config command as shown. However, you still need
to reload the switch to erase the running-config.
2950A#erase startup-config
Erasing the nvram file system will remove all files! Continue? [confirm]
press Enter
[OK]
Erase of nvram: complete
2950A#sh start
%% Non-volatile configuration memory is not present
2950A#
3. Again, just because you have erased the contents of NVRAM with the erase
startup-config command, you need to remember that the running-config is
still in RAM. To erase the running-config you have to reload the switch.
4. Change to the console screen for 2960 Switch A. Save your configuration.
2960A#copy run start
Destination filename [startup-config]?press Enter
Building configuration...
[OK]
2960A#
5. To delete the contents of NVRAM on a 2960 switch, use the erase startup-config
command as shown. However, you still need to reload the switch to erase the
running-config.
2960A#erase startup-config
Erasing the nvram file system will remove all files! Continue? [confirm]
press Enter
[OK]
Lab 4.12: Setting Passwords on the 3550/3560 Switch 241
Erase of nvram: complete
2960A#sh start
%% Non-volatile configuration memory is not present
2960A#
Lab 4.11: Utilizing the 3550
and 3560 Switch
The 3550 and 3560 switches are very similar and basically support the same commands. The
conguration commands between the two switches differ because:
N
The Catalyst 3550 switch runs Cisco IOS 12.1EA software, and the Catalyst 3560
switch runs Cisco IOS 12.2SE software.
N
The hardware is different. In this program, the 3550 switch has 10 FastEthnet ports ...
N
and the 3560 switch has eight FastEthernet ports and one GigabitEthernet port ...
In this program, the supported commands for these two switches are
identical.
Lab 4.12: Setting Passwords
on the 3550/3560 Switch
This lab will have you work with a 3550/3560 switch. The commands used in conguring
the 3550 or 3560 switches are identical in this program. Even though the step-by-steps refer
to the 3550 switch, you can also congure the 3560 with the same steps.
Enter global conguration mode and then set the passwords.
242 Configuring the Catalyst Switch
Lab Steps
1. Double-click 3550 Switch A to open the console screen.
2. Press Enter to connect to the console.
3550A>
3. The first thing that you should configure on a switch is the passwords. You dont want
unauthorized users connecting to the switch. You can set both the user mode and
privileged mode passwords, just like a router. Enter enable mode by using the enable
command and then enter global configuration mode by using the config t command.
The following output shows an example of how to get into enable mode, and then into
global configuration mode.
3550A>enable
3550A#config t
Enter configuration commands, one per line. End with CTRL/Z
Switch(config)#
4. Once you are in global configuration mode, you can set the user mode and enable
mode passwords by using the enable password and enable secret command. The
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
in earlier labs.
Lab 4.12: Setting Passwords on the 3550/3560 Switch 243
switches output below shows the configuration of both the user mode and enable
mode passwords.
3550A(config)#enable password ?
0 Specifies an UNENCRYPTED password will follow
7 Specifies a HIDDEN password will follow
LINE The UNENCRYPTED (cleartext) 'enable' password
level Set exec level password
3550A(config)#enable password todd
3550A(config)#enable secret cisco
3550A(config)
If you set your enable secret, the enable password is superseded and not
used, just like in a router.
6. In addition to the enable password and enable secret, the 3550/3560 switch allows you to
set a console and Telnet password as well using the line commands, just like in a router.
3550A(config)line ?
<0-16> First Line number
console Primary terminal line
vty Virtual terminal
3550A(config)#line console 0
3550A(config-line)#password console
3550A(config-line)#login
3550A(config-line)#exit
3550A(config)#line vty 0 15
3550A(config-line)#password telnet
3550A(config-line)#login
3550A(config-line)#ctrl+z
The telnet password was already set for 3550 Switch A in an earlier lab.
7. You can use show running-config (show run for short) to see the current configuration
on the switch.
3550A(config-line)#ctrl+z
3550A#show run
Building configuration...
Current configuration : 866 bytes
!
version 12.1
no service single-slot-reload-enable
244 Configuring the Catalyst Switch
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname 3550A
!
enable secret 5 $1$u76B$IOFVJ7VxfVXYVpGDrFTcI0
enable password todd
!
ip subnet-zero
!
!
spanning-tree extend system-id
!
!
interface FastEthernet0/1
switchport mode dynamic desirable
!
interface FastEthernet0/2
switchport mode dynamic desirable
[output cut]
The enable mode password is not encrypted by default, but the enable
secret is. This is the same password configuration technique that you will
find on a router.
Lab 4.13: Configuring the
3550/3560 Switch
This lab will have you work with a 3550 switch. The commands used in conguring the
3550 or 3560 switches are identical in this program. Even though the step-by-steps refer to
the 3550 switch, you can also congure the 3560 with the same steps.
The hostnames on a switch, as well as on a router, is only locally signicant. This means
that it does not have any function on the network and is not used for name resolution what-
soever. However, it is helpful to set a hostname on a switch so that you can identify the
switch when connecting to it. A good rule of thumb is to name the switch after the location
it is serving.
Lab 4.13: Configuring the 3550/3560 Switch 245
Set the Hostname
The hostnames on a switch, as well as on a router, is only locally signicant. This means that
it does not have any function on the network and is not used for name resolution whatsoever.
However, it is helpful to set a hostname on a switch so that you can identify the switch when
connecting to it. A good rule of thumb is to name the switch after the location it is serving.
Network Layout
Work with the saved network that you used to congure devices in Lab 4.12.
246 Configuring the Catalyst Switch
Lab Steps
1. The 3550/3560 switch command to set the hostname is exactly like any router: you use
the hostname command. Remember, it is one word. From global configuration mode,
type the command hostname hostname.
Switch>enable
Enter password: ****
Switch#config t
Enter configuration commands, one per line. End with CTRL/Z
Switch(config)#hostname 3550A
3550A(config)#exit
3550A#
Notice that as soon as you press Enter, the hostname of the switch appears. Remember
that from global conguration mode, which you enter by using the config t command, it
changes the running-config.
Any changes you make in this mode take effect immediately.
Configure the IP Address
2. By default, no IP address or default-gateway information is set. You would set both the
IP address and the default-gateway on a layer-two switch, just like any host. By typing
the command show running-config you can see the default IP configuration of the
switch. Notice in your switch output that no IP address, default-gateway, or other
IP parameters are configured.
3. To set the IP configuration on a 3550/3560 switch, use the ip address command.
However, this is set under the VLAN1 interface, not at global configuration mode like
on a 1900 switch. Remember that by default all interfaces are members of VLAN1,
which is why the VLAN1 interface is configured by default.
3550A#config t
Enter configuration commands, one per line. End with CTRL/Z
3550A(config)#interface vlan 1
3550A(config-if)#ip address 172.16.10.4 255.255.255.0
3550A(config-if)#exit
3550A(config)#
4. The default gateway should also be set using the ip default-gateway command.
However, unlike the IP address, this is completed at global configuration mode.
3550A(config)#ip default-gateway 172.16.10.1
3550A(config)#exit
3550A#
Lab 4.13: Configuring the 3550/3560 Switch 247
To change the IP address and default-gateway on the switch, you can either type in new
addresses or remove the IP information with the no ip address and no ip default-gateway
commands, at the appropriate conguration prompt.
Configure Interfaces
It is important to understand how to access switch ports. The 3550/3560 uses the type
slot/port command, just like a 2621 router and just like the 3550/3560. For example,
Fastethernet 0/3 is 10/100BaseT port 3.
The 3550/3560 type slot/port command can be used with either the interface com-
mand or the show command. The interface command allows you to set interface specic
congurations. The 3550/3560 has only one slot: zero (0), just like the 1900.
5. To configure an interface on a 3550/3560, go to global configuration mode and use the
interface command as shown.
3550A#config t
Enter configuration commands, one per line. End with CTRL/Z
3550A(config)#interface ?
Async Async interface
BVI Bridge-Group Virtual Interface
Dialer Dialer interface
FastEthernet FastEthernet IEEE 802.3
Group-Async Async Group interface
Lex Lex interface
Loopback Loopback interface
Multilink Multilink-group interface
Null Null interface
Port-channel Ethernet Channel of interfaces
Transparent Transparent interface
Tunnel Tunnel interface
Virtual-Template Virtual Template interface
Virtual-TokenRing Virtual TokenRing
Vlan Catalyst Vlans
fcpa Fiber Channel
range interface range command
3550A(config)#interface
6. The next output asks for the slot. Since the 3550/3560 is not modular, there is only one
slot, which is 0, although it lists 0-2 for some odd reason. However, you can only type
in 0 as the slot in this program. Any other slot number will give you an error. The
next output gives us a slash (/) to separate the slot/port configuration.
3550A(config)#interface fastethernet ?
<0-2> FastEthernet interface number
248 Configuring the Catalyst Switch
3550A(config)#interface fastethernet 0?
/
3550A(config)#interface fastethernet 0/?
<0-10> FastEthernet interface number
7. After the 0/configuration command, the above output shows the amount of ports you
can configure. The output below shows the completed command.
3550A(config)#interface fastethernet 0/4
3550A(config-if)#
8. Once you are in interface configuration mode, the prompt changes to (config-if).
After you are at the interface prompt, you can use the help commands to see the
available commands.
3550A(config-if)#?
Interface configuration commands:
arp Set arp type (arpa, probe, snap) or timeout
bandwidth Set bandwidth informational parameter
carrier-delay Specify delay for interface transitions
cdp CDP interface subcommands
channel-group Etherchannel/port bundling configuration
default Set a command to its defaults
delay Specify interface throughput delay
description Interface specific description
dot1x IEEE 802.1X subsystem
duplex Configure duplex operation
exit Exit from interface configuration mode
help Description of the interactive help system
hold-queue Set hold queue depth
ip Interface Internet Protocol config commands
keepalive Enable keepalive
load-interval Specify interval for load calculation for an
interface
logging Configure logging for interface
mac-address Manually set interface MAC address
mls mls interface commands
mvr MVR per port configuration
no Negate a command or set its defaults
ntp Configure NTP
--More--
Lab 4.13: Configuring the 3550/3560 Switch 249
You can switch between interface congurations by using the int fa 0/# command at
any time from global conguration mode.
9. Lets look at the duplex and speed configurations for a switch port.
3550A(config-if)#exit
3550A(config)#int fa0/4
3550A(config-if)#duplex ?
auto Enable AUTO duplex configuration
full Force full duplex operation
half Force half-duplex operation
3550A(config-if)#
3550A(config-if)#speed?
10 Force 10 Mbps operation
100 Force 100 Mbps operation
auto Enable AUTO speed configuration
3550A(config-if)#
10. Since the switch ports duplex and speed settings are already set to auto by default, you
do not need to change the switch port settings. It is recommended that you allow the
switch port to auto negotiate speed and duplex settings in most situations. In a rare
situation, when it is required to manually set the speed and duplex of a switch port,
you can use the following configuration.
3550A(config-if)#speed 100
Duplex will not be set until speed is set to non-auto value
3550A(config-if)#duplex full
11. Notice in the above command that to run full duplex, you must set the speed to non-
auto value.
Full Duplex
Transmission of data in two directions simultaneously. It has a higher throughput than
half duplex.
N
There are no collision domains with this setting
N
Both sides must have the capability of being set to full duplex
N
Both sides of the connection must be congured with full duplex
N
Each side transmits and receives at full bandwidth in both directions
250 Configuring the Catalyst Switch
12. In addition to the duplex and speed commands that can be configured on the switch
port, you also can turn on what is called portfast. The portfast command allows a
switch port to come up quickly. Typically a switch port waits 50 seconds for spanning-
tree to go through its gotta make sure there are no loops! cycle. However, if you turn
portfast on, then you better be sure you do not create a physical loop on the switch
network. A spanning-tree loop can severely hurt or bring your network down. Here is
how you would enable portfast on a switch port.
3550A(config-if)#spanning-tree ?
bpdufilter Don't send or receive BPDUs on this interface
bpduguard Don't accept BPDUs on this interface
cost Change an interface's spanning tree port path cost
guard Change an interface's spanning tree guard mode
link-type Specify a link type for spanning tree protocol use
port-priority Change an interface's spanning tree port priority
portfast Enable an interface to move directly to forwarding on link up
stack-port Enable stack port
vlan VLAN Switch Spanning Tree
13. The command above shows the available options for the spanning-tree command.
We want to use the portfast command.
3550A(config-if)#spanning-tree portfast
%Warning: portfast should only be enabled on ports connected to a single
host. Connecting hubs, concentrators, switches, bridges, etc... to this
interface when portfast is enabled, can cause temporary bridging loops.
Use with CAUTION
%Portfast has been configured on FastEthernet0/4 but will only
have effect when the interface is in a non-trunking mode.
3550A(config-if)#
14. Notice the message the switch provides when enabling portfast. Although it seems like
the command did not take effect, as long as the port is in access mode (discussed in a
minute), the port will now be in portfast mode.
15. After you make any changes you want to the interfaces, you can view the different
interfaces with the show interface command. The switch output below shows the
command used to view a 10/100BaseT interface on the 3550/3560.
3550A(config-if)#ctrl+z
3550A#show int f0/4
FastEthernet0/4 is up, line protocol is up
Hardware is Fast Ethernet, address is 00b0.c5e4.e2cf (bia 00b0.c5e4.e2cf)
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec,
Lab 4.13: Configuring the 3550/3560 Switch 251
Encapsulation ARPA, loopback not set
reliability 255/255, txload 1/255, rxload 1/255
Keepalive set (10 sec)
Full duplex, 100Mb/s
input flow-control is off, output flow-control is off
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output 1w6d, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue :0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1 packets input, 64 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
0 input packets with dribble condition detected
1 packets output, 64 bytes, 0 underruns
0 output errors, 0 collisions, 3 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 PAUSE output
0 output buffer failures, 0 output buffers swapped out
3550A#
16. In addition to the show interface command, you can use the show running-config
command to see the interface configuration as well.
3550A#show run
[output cut]
interface FastEthernet0/3
switchport mode dynamic desirable
!
interface FastEthernet0/4
switchport mode dynamic desirable
spanning-tree portfast
!
interface FastEthernet0/5
[output cut]
252 Configuring the Catalyst Switch
17. You can administratively set a name for each interface on the 3550/3560. Like the
hostname, the descriptions are only locally significant. For the 3550 series switch, use
the description command. You can use spaces with the description command, but
you can use underlines if you need to.
To set the descriptions, you need to be in interface conguration mode. From interface
conguration mode, use the description command to describe each interface.
3550A#config t
Enter configuration commands, one per line. End with CTRL/Z
3550A(config)#int fa 0/4
3550A(config-if)#description Marketing VLAN
3550A(config-if)#int fa 0/10
3550A(config-if)#description trunk to Building 3
3550A(config-if)#
In the conguration example above, we set the description on both port 4 and 10.
18. Once you have configured the descriptions you want on each interface, you can then
view the descriptions with either the show interface command, or show running-
config command. View the configuration of the Ethernet interface 0/4 by using the
show interface ethernet 0/4 command.
3550A(config-if)#ctrl+z
3550A#show int fa 0/4
FastEthernet0/4 is up, line protocol is up
Hardware is Fast Ethernet, address is 00b0.1a09.2097 (bia 00b0.1a09.2097)
Description: Marketing VLAN
(output cut)
19. Use the show running-config command to view the interface configurations as well.
3550A#show run
[output cut]
!
interface FastEthernet0/4
description "Marketing VLAN"
duplex full
speed 100
spanning-tree portfast
!
[output cut]
Lab 4.14: Verifying 3550/3660 Switch IP Connectivity 253
Notice in the above switch output that the show int fa0/4 command and the show run
command both show the description command set on an interface.
Save the network that you have been working on.
Lab 4.14: Verifying 3550/3660 Switch
IP Connectivity
This lab will have you work with a 3550/3560 switch. The commands used in conguring
the 3550 or 3560 switches are identical in this program. Even though the step-by-steps refer
to the 3550 switch, you can also congure the 3560 with the same steps.
It is important to test the switch IP conguration. You can use the ping program, and
you can telnet into the 3550/3560 switch. However, you cannot telnet from the 3550/3560
switch or use traceroute.
1. In the following example, ping Host B on the network from the 3550 Switch A . Notice
the output on a successful ping: exclamation point (!). If you receive periods (.) instead
of exclamation points, that signifies a timeout.
Network Layout
Work with the saved network that you used to congure devices in Lab 4.13.
254 Configuring the Catalyst Switch
3550A#ping 172.16.10.6
Sending 5, 100-byte ICMP Echos to 172.16.10.6, time out is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max 0/2/10/ ms
2. In the following example, ping Host C on the network from the 3560 A switch.
3560A#ping 172.16.10.7
Sending 5, 100-byte ICMP Echos to 172.16.10.7, time out is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max 0/2/10/ ms
Lab 4.15: Saving and Erasing the 3550/3560 Switch Configuration 255
Lab 4.15: Saving and Erasing the
3550/3560 Switch Configuration
This lab will have you work with a 3550/3560 switch. The commands used in conguring
the 3550 or 3560 switches are identical in this program. Even though the step-by-steps refer
to the 3550 switch, you can also congure the 3560 with the same steps.
The switch conguration is stored in NVRAM, just as any router and placed in RAM
when the switch boots. The le in RAM is called the running-config and the le in
NVRAM is called the startup-config. You can view the startup-config, also called
the backup conguration, with the show startup-config command.
Network Layout
Work with the saved network that you used to congure devices in Lab 4.14.
256 Configuring the Catalyst Switch
1. To save the switch configuration, you type copy running-config startup-config, or
copy run start, just like on a router.
3550A#copy run start
Destination filename [startup-config]?press Enter
Building configuration...
[OK]
3550A#
2. You can delete the configuration in NVRAM on the 3550 switch if you want to start
over on the switches configuration. To delete the contents of NVRAM on a 3550
switch, use the erase startup-config command as shown. However, you still need
to reload the switch to erase the running-config.
3550A#erase startup-config
Erasing the nvram filesystem will remove all files! Continue? [confirm]
press Enter
[OK]
Erase of nvram: complete
3550A#sh start
%% Non-volatile configuration memory is not present
3550A#
3. Again, just because you have erased the contents of NVRAM with the erase startup-
config command, you need to remember that the running-config is still in RAM. To
erase the running-config you have to reload the switch.
4. Change to the console screen for 3560 Switch A. Save your configuration.
3560A#copy run start
Destination filename [startup-config]?press Enter
Building configuration...
[OK]
3560A#
5. To delete the contents of NVRAM on a 3560 switch, use the erase startup-config
command as shown. However, you still need to reload the switch to erase the running-
config.
3560A#erase startup-config
Erasing the nvram filesystem will remove all files! Continue? [confirm]
press Enter
[OK]
Erase of nvram: complete
3560A#sh start
%% Non-volatile configuration memory is not present
3560A#
NAT
Lab 5: Introduction
to Network Address
Translation (NAT)
What Does NAT Do? NAT splits networks into two distinct sections, outside and inside.
Inside addresses are usually assigned PRIVATE IP addresses and the outside addresses are
assigned PUBLIC IP addresses on the Internet.
When Do You Use NAT? NAT, at times, decreases the overwhelming amount of Public
IP addresses required in your networking environment. And NAT comes in really handy
when two companies that have duplicate internal addressing schemes merge. NAT is also
great to have around when an organization changes its Internet Service Provider (ISP) and
the networking manager doesnt want to hassle with changing the internal address scheme.
Heres a list of situations when its best to have NAT on your side:
N
You need to connect to the Internet and your hosts do not have globally unique
IP addresses.
N
You change to a new ISP that requires you to renumber your network.
N
You require two Intranets with duplicate addresses to merge.
Advantages and Disadvantages of Implementing NAT
Advantages Disadvantages
Conserves legally registered addresses Translation introduces switching path delays
Reduces address overlap occurrence Loss of end-to-end IP traceability
Increases flexibility when connecting to
Internet
Certain applications will not function with NAT
enabled
Eliminates address renumbering as
network changes
Lab 5.1: Configuring Your Routers 259
Lab 5.1: Configuring Your Routers
In this lab, you will congure NAT on 2811 Router A to translate the private IP address of
192.168.10.0 to a public address of 171.16.10.0.
Network Layout
Load Nat-Pat Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le Nat-Pat Layout.rsm and click Open.
260 NAT
Command Summary for NAT/PAT Lab
Command Purpose
IP nat inside source list acl pool name Translates IPs that match the ACL from
the pool
IP nat inside source static inside_addr
outside_addr
Statically maps an inside address to an
outside address
IP nat pool name Creates an address pool
IP nat inside Sets an interface to be an inside interface
IP nat outside Sets an interface to be an outside interface
Show ip nat translations Shows current NAT translations
Setting up the NAT Lab creates an address pool
You will set up IP addresses on the router interfaces, plus, turn on EIGRP on every router.
Congure the routers with the IP addresses listed below:
Router IP Address Scheme
Router Interface IP Address
2811 A S0/0/0 171.16.10.1/24
2811 B F0/0 192.168.10.1/24
2811 B S0/0/0 171.16.10.2/24
2811 C F0/0 192.168.10.2/24
2811 C F0/1 192.168.20.1/24
2811 D F0/1 192.168.20.2/24
Lab 5.1: Configuring Your Routers 261
Lab Steps
1. Double-click 2811 Router A in order to bring up the console screen. Configure the router.
Router>enable
Router#config t
Router(config)#hostname 2811A
2811A(config-if)#interface serial 0/0/0
2811A(config-if)#ip address 171.16.10.1 255.255.255.0
2811A(config-if)#no shutdown
2811A(config-if)#exit
2811A(config)#router eigrp 15
2811A(config-router)#network 171.16.0.0
2811A(config-router)#ctrl+z
2811A#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811A#
2. Use the console menu to bring up the console screen for 2811 Router B.
3. Configure 2811 Router B.
Router>enable
Router#config t
Router(config)#hostname 2811B
2811B(config-if)#interface serial 0/0/0
2811B(config-if)#ip address 171.16.10.2 255.255.255.0
2811B(config-if)#no shutdown
2811B(config-if)#interface f0/0
2811B(config-if)#ip address 192.168.10.1 255.255.255.0
2811B(config-if)#no shutdown
2811B(config-if)#exit
2811B(config)#router eigrp 15
2811B(config-router)#network 171.16.0.0
2811B(config-router)#network 192.168.10.0
2811B(config-router)#no auto-summary
2811B(config-router)#ctrl+z
262 NAT
2811B#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811B#
4. Use the console menu to bring up the console screen for 2811 Router C.
5. Configure 2811 Router C.
Router>enable
Router#config t
Router(config)#hostname 2811C
2811C(config-if)#interface f0/0
2811C(config-if)#ip address 192.168.10.2 255.255.255.0
2811C(config-if)#no shutdown
2811C(config-if)#interface f0/1
2811C(config-if)#ip address 192.168.20.1 255.255.255.0
2811C(config-if)#no shutdown
Auto-Summary
The process of taking subnets like 192.168.10.4/30 or 192.168.10.56/29 and sum-
marizing them down to their base network class. In the case of 192.168.10.4/30 or
192.168.10.56/29 the networks are summarized to their Class C base network address
of 192.168.10.0/24.
Summarization occurs at classful network boundaries. Classful network boundaries
occur when one class of networks meet a different class of networks, thus a network
boundary. If subnet 192.168.10.4/30 or 192.168.10.56/29 were crossing over to another
router connected by the 10.1.1.0/24 network, the classful network boundary is between
the 10.0.0.0/8 and 192.168.10.0/24 networks.
No Auto-Summary
The process of taking the subnets like 192.168.10.4/30 or 192.168.10.56/29 and not
summarizing them down to their base network class. In the case of 192.168.10.4/30 or
192.168.10.56/29, the networks are never summarized to their Class C base network
address of 192.168.10. /24 when classful network boundaries are encountered.
Lab 5.1: Configuring Your Routers 263
2811C(config-if)#exit
2811C(config)#router eigrp 15
2811C(config-router)#network 192.168.10.0
2811C(config-router)#network 192.168.20.0
2811C(config-router)#ctrl+z
2811C#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811C#
6. Use the console menu to bring up the console screen for 2811 Router D.
7. Configure 2811 Router D.
Router>enable
Router#config t
Router(config)#hostname 2811D
2811D(config-if)#interface f0/1
2811D(config-if)#ip address 192.168.20.2 255.255.255.0
2811D(config-if)#no shutdown
2811D(config-if)#exit
2811D(config)#router eigrp 15
2811D(config-router)#network 192.168.20.0
2811D(config-router)#ctrl+z
2811D#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811D#
8. After you configure the routers, you should be able to ping from router to router. Verify
that you can ping from 2811 Router A to 2811 Router D and from 2811 Router D to 2811
Router A. If you cannot, STOP!, troubleshoot your network.
2811A#ping 192.168.20.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.20.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms
2811A#
2811D#ping 171.16.10.1
264 NAT
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 171.16.10.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms
2811D#
9. You can also verify your EIGRP routes with the show ip route command.
2811A#show ip route
[output cut]
171.16.0.0/24 is subnetted, 1 subnets
C 171.16.10.0 is directly connected, Serial0/0/0
D 192.168.20.0 [90/2172416] via 171.16.10.2, 00:06:07, Serial0/0/0
D 192.168.10.0 [90/2172416] via 171.16.10.2, 00:06:07, Serial0/0/0
2811A#
2811B#show ip route
[output cut]
171.16.0.0/24 is subnetted, 1 subnets
C 171.16.10.0 is directly connected, Serial0/0/0
D 192.168.20.0 [90/2172416] via 192.168.10.2, 00:08:08, FastEthernet0/0
C 192.168.10.0/24 is directly connected, FastEthernet0/0
2811B#
2811C#show ip route
[output cut]
171.16.0.0/24 is subnetted, 1 subnets
D 171.16.10.0 [90/2172416] via 192.168.10.1, 00:09:08, FastEthernet0/0
C 192.168.20.0/24 is directly connected, FastEthernet0/1
C 192.168.10.0/24 is directly connected, FastEthernet0/0
2811C#
2811D#show ip route
[output cut]
171.16.0.0/24 is subnetted, 1 subnets
D 171.16.10.0 [90/2172416] via 192.168.20.1, 00:10:25, FastEthernet0/1
C 192.168.20.0/24 is directly connected, FastEthernet0/1
D 192.168.10.0 [90/2172416] via 192.168.20.1, 00:10:25, FastEthernet0/1
2811D#
Lab 5.1: Configuring Your Routers 265
Rename and Save Your File: Make sure you save the actual network layout le that
you have been working with. You might want to save it to another le name than Nat-Pat
Layout.rsm. This allows you to start over with a non-congured network if you wish.
1. There are two ways you can save a network layout. The first way is by clicking on the
Diskette button on the button bar, at the top of the Network Visualizer screen. You
can also click File on the menu and choose Save from the drop down menu.
266 NAT
2. A dialog box will appear. At the bottom you will see the file name Nat-Pat Layout.rsm.
Rename the file. In the following example it is renamed to My Nat-Pat Layout.rsm.
3. Click the Save button. At this point your network layout has been saved to a new name.
You then have the option of reloading Nat-Pat Layout.rsm which is non-configured.
Switch Security
Lab 6.1: Configuring
Switch Security
In this lab you will congure a switch to mitigate security attacks.
In some networks it may be desirable to implement security on switchports in order to
restrict which computers can access the network. This is accomplished through switchport
security commands. Through such commands an administrator can control how many
computers can be connected to a given port as well as specify, based on MAC addresses,
which computers are allowed to connect to the port.
The lab topology consists of 2960 Switch A with a connection to Hosts A and B.
Host MAC Address
Host A 8e36.6b21.6e25
Host B 1175.3e8b.d4f0
Lab Steps
1. First you will enable switchport security on interface FastEthernetst 0/1 on 2960
Switch A. This and the subsequent security commands are entered in the interface
configuration mode.
Switch>enable
Switch#config t
Switch#hostname 2960A
2960A(config)#int fa0/1
2960A(config-if)#switchport mode access
2960A(config-if)#switchport port-security
2. Configure 2960 Switch A to limit the devices that can connect through interface
FastEthernet 0/1. You will set the maximum number of devices to 1.
2960A(config-if)#switchport port-security maximum 1
3. Set the MAC address that can be learned through the interface.
2960A(config-if)#switchport port-security mac-address b21f.135f.d81e
Lab 6.1: Configuring Switch Security 269
4. The switch response when port security is violated depends on which response state
has been configured. These states are as follows:
Protect Once the maximum number of secure MAC addresses is reached on a port
additional addresses will not be learned and packets from unknown addresses are
dropped. No notication is sent.
Restrict Once the maximum number of secure MAC addresses is reached on a port
additional addresses will not be learned and packets from unknown addresses are
dropped. An SNMP trap is sent, a syslog message is logged and the violation counter
increases.
Shutdown Once the maximum number of secure MAC addresses is reached on a port
the receipt of a packet from an unknown address causes the port to be error disabled
and the port LED turns off. An SNMP trap is sent, a syslog message is logged and the
violation counter increases.
Network Layout
Load Switchport Security Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le Switchport Security Layout.rsm and click Open. You should see
the following non-congured network:
270 Switch Security
Shutdown VLAN This mode is implemented on a per VLAN basis. Once the maxi-
mum number of secure MAC addresses is reached on a port for a designated VLAN,
the receipt of a packet from an unknown address causes the port to be error disabled
for that VLAN.
5. Configure FastEthernet 0/1 to be shut down upon a violation.
2960A(config-if)#switchport port-security violation shutdown
6. Configure interface FastEthernet 0/2 to only allow one MAC address to be learned
through the interface but will use the sticky method for that MAC address to be
learned and placed in the configuration.
2960A(config-if)#int fa0/2
2960A(config-if)#switchport mode access
2960A(config-if)#switchport port-security
2960A(config-if)#switchport port-security maximum 1
2960A(config-if)#switchport port-security mac-address sticky
7. Go back to the enable mode.
2960A(config-if)#ctrl+z
2960A#
Rename and Save Your File: Make sure you save the actual network layout le that you
have been working with. You might want to save it to another le name than Switchport
Security Layout.rsm. This allows you to start over with your initial, non-congured net-
work if you wish.
There are two ways you can save a network layout. The rst way is by clicking on the
Diskette button on the button bar, at the top of the Network Visualizer screen. You can
also click File on the menu and choose Save from the drop down menu.
Lab 6.2: Verifying Switch Security 271
Lab 6.2: Verifying Switch Security
Now that the switch conguration is complete, you will verify that the switch security con-
guration effectively prevents the attachment of an unauthorized host machine.
272 Switch Security
Lab Steps
1. Issue the show mac-address-table command from 2960 Switch A. This should con-
firm that MAC addresses of host A and host B are in the MAC address table.
The addresses are listed below.
Network Layout
Load Switchport Security Layout.rsm or whatever you named the le when you saved
your work. You need a congured network in order to complete this lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le Switchport Security Layout.rsm and click Open.
Lab 6.2: Verifying Switch Security 273
Host MAC Address IP Address
Host A 8e36.6b21.6e25 10.1.1.1
Host B 1175.3e8b.d4f0 10.1.1.2
Host C 2c9b.00e9.9c64 10.1.1.3
If the addresses are not in the table, issue a ping from host A to host B (ping 10.1.1.2
from host A).
2960A#show mac-address-table
Mac Address Table
-------------------------------------------
Vlan Mac Address Type Ports
---- ----------- -------- -----
1 8e36.6b21.6e25 STATIC Fa0/1
1 1175.3e8b.d4f0 STATIC Fa0/2
2. Next issue the show run command. You should see the following output.
2960A#show run
interface FastEthernet0/1
switchport mode access
switchport port-security
switchport port-security maximum 1
switchport port-security mac-address b21f.135f.d81e
interface FastEthernet0/2
switchport mode access
switchport port-security
switchport port-security maximum 1
switchport port-security mac-address sticky
switchport port-security mac-address sticky 1175.3e8b.d4f0
3. Next you will confirm the effectiveness of these commands by disconnecting host B
from FastEthernet port 0/2 on 2960 Switch A and connecting host C to FastEthernet
port 0/2.
a. Right-click on host B and click on the Ethernet 0/0 interface.
b. When asked if you want to remove this connection, click Yes.
c. Right-mouse click host C, click Ethernet port 0/0, then move the mouse pointer
over to 2960 Switch A.
274 Switch Security
d. Right-mouse click 2960 Switch A and then click FastEthernet 0/2 to complete the
connection.
Once you have done so return to the switch command prompt. You should see the
following messages displayed:
2960A#
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/2, changed
state to down
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/2, changed
state to up
Press the Enter key if necessary.
4. Bring up the DOS screen for host A. Ping from host A to host C (ping 10.1.1.3). Once
you have done so return to the switch command prompt. You should see the following
messages displayed:
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to administratively
down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/2, changed
state to down
Lab 6.2: Verifying Switch Security 275
This conrms that the interface was disabled when it saw a new MAC address con-
nected to the port.
Individual Labs (Comprehensive)
Please Note: Enter all commands in lower case. The programs grading feature expects
lower case and may count an answer wrong if it is in upper case.
Introduction to Individual Labs
We offer CCNA labs that are comprehensive and self-contained. They stand on their own,
and do not require congurations from prior labs. These labs are typically longer than
the accumulative labs because you are starting with a non-congured network each time
you bring up an Individual lab. You are totally conguring the network for each lab, from
beginning to nish. We provide step-by-step instructions for these labs.
Grading
When you have nished with each Individual lab ...
You can check your work by clicking the Grade Me button in the upper right hand cor-
ner of the Network Visualizer screen.
You will see a report that will display:
N
The name of the command entered for this lab.
N
The expected configuration.
N
Your configuration.
N
The result for each command. You will see a green checkmark (meaning that you got it
correct) or a red X.
N
A score of the number of correct answers out of the total possible.
276 Switch Security
Individual Lab: Cisco 2811 Router and Security
Device Manager (SDM)
Cisco
routers. This lab will provide you with the commands to verify RIP.
Network Layout
Load the network layout you have been working with in Lab 1.1.
Lab 1.2: Verifying RIP Routing 389
Lab Steps
1. From 2621 Router A, use the show ip route command to verify the routing table.
2621A#show ip route
172.16.0.0/24 is subnetted, 5 subnets
R 172.16.30.0 [120/1] via 172.16.20.1, 00:00:13, Serial0/0
C 172.16.40.0 is directly connected, FastEthernet0/0
C 172.16.20.0 is directly connected, Serial0/0
R 172.16.10.0 [120/1] via 172.16.20.1, 00:00:13, Serial0/0
R 172.16.50.0 [120/1] via 172.16.20.1, 00:00:13, Serial0/0
Notice the R, which means it is a RIP found route. The C is a directly connected network.
You should see two directly connected routes and three RIP routes.
2. From 2621 Router B, use the show ip route command to verify the routing table.
2621B#show ip route
172.16.0.0/24 is subnetted, 5 subnets
C 172.16.30.0 is directly connected, Serial0/0
R 172.16.40.0 [120/2] via 172.16.30.1, 00:00:21, Serial0/0
C 172.16.50.0 is directly connected, FastEthernet0/0
R 172.16.20.0 [120/1] via 172.16.30.1, 00:00:21, Serial0/0
R 172.16.10.0 [120/1] via 172.16.30.1, 00:00:21, Serial0/0
3. From the 2811 Router A, use the show ip route command to verify the routing table.
2811A#show ip route
172.16.0.0/24 is subnetted, 5 subnets
C 172.16.30.0 is directly connected, Serial0/0/1
R 172.16.40.0 [120/1] via 172.16.20.2, 00:00:27, Serial0/1/1
R 172.16.50.0 [120/1] via 172.16.30.2, 00:00:27, Serial0/0/1
C 172.16.20.0 is directly connected, Serial0/1/1
C 172.16.10.0 is directly connected, FastEthernet0/0
4. From 2621 Router B, use the debug ip rip command to see RIP updates being sent
and received on the router.
2621B#debug ip rip
RIP protocol debugging is on
2621B#
then after a few seconds ....
*Oct 13 17:19:25.906: RIP: received v1 update from 172.16.30.1 on Serial0/0
*Oct 13 17:19:25.906: 172.16.40.0 in 2 hops
*Oct 13 17:19:25.906: 172.16.20.0 in 2 hops
*Oct 13 17:19:25.906: RIP: received v1 update from 172.16.30.1 on Serial0/0
390 ICND2
*Oct 13 17:19:25.906: 172.16.40.0 in 3 hops
*Oct 13 17:19:25.906: 172.16.20.0 in 3 hops
*Oct 13 17:19:25.906: RIP: received v1 update from 172.16.30.1 on Serial0/0
*Oct 13 17:19:25.906: 172.16.40.0 in 4 hops
*Oct 13 17:19:25.906: 172.16.20.0 in 4 hops
*Oct 13 17:19:25.906: RIP: received v1 update from 172.16.30.1 on Serial0/0
*Oct 13 17:19:25.906: 172.16.40.0 in 5 hops
[output cut]
5. To turn off debugging, use the no debug ip rip command, or the undebug all
command.
2621B#undebug all
6. To see detailed information about currently configured protocols on a router, use the
show ip protocols command.
2621B#show ip protocols
Routing Protocol is "rip"
Sending updates every 30 seconds, next due in 27 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Redistributing: rip
Default version control: send version 1, receive any version
Interface Send Recv Triggered RIP Key-chain
Serial0/0 1 1 2
FastEthernet0/0 1 1 2
Automatic network summarization is in effect
Maximum path: 4
Routing for networks:
172.16.0.0
Routing information sources:
Gateway Distance Last Update
172.16.30.1 120 00:00:03
Distance: <default is 120>
2621B#
Notice the timers. RIP is sent out every 30 seconds by default. The administrative
distance for RIP is 120 by default.
7. Another really good command is the show protocols command, which shows you the
routed protocol configuration of each interface.
2621B#show protocols
Global values:
Internet protocol routing is enabled
Lab 1.2: Verifying RIP Routing 391
Serial0/1 is administratively down, line protocol is down
Serial0/0 is up, line protocol is up
Internet address is 172.16.30.2/24
FastEthernet0/1 is administratively down, line protocol is down
FastEthernet0/0 is up, line protocol is up
Internet address is 172.16.50.1/24
Administrative Distance
Is a measure of the trustworthiness of the source of the routing information. It is reported
as a number between 0 and 255. The smaller the number, the more reliable the protocol.
If you have, for example, two protocols IGRP and RIP congured on a router, the IGRP
routes will be preferred over the RIP routes. This is because you have an administrative
distance of 120 for RIP and 100 for IGRP.
Source Default Distance Value
Connected interface 0
Static route 1
Enhanced Interior Gateway Routing Protocol (EIGRP)
summary route
5
External Border Gateway Protocol (BGP) 20
Internal EIGRP 90
IGRP 100
OSPF 110
Intermediate System-to-Intermediate System (IS-IS) 115
Routing Information Protocol (RIP) 120
Exterior Gateway Protocol (EGP) 140
On Demand Routing (ODR) 160
External EIGRP 170
Internal BGP 200
Unknown 255
392 ICND2
8. From 2811 Router A, use the show protocols command.
2811A#show protocols
Global values:
Internet protocol routing is enabled
Serial0/0/0 is administratively down, line protocol is down
Serial0/0/1 is up, line protocol is up
Internet address is 172.16.30.1/24
Serial0/1/0 is administratively down, line protocol is down
Serial0/1/1 is up, line protocol is up
Internet address is 172.16.20.1/24
FastEthernet0/0 is up, line protocol is up
Internet address is 172.16.10.1/24
Lab 1.3: Configuring IPv6 Static Routing
Internet Protocol Version 6 (IPv6) is the new addressing scheme that will eventually replace
all IPv4 addresses. The IPv4 address scheme is no longer adequate to meet the needs of the
growing Internet, and growing Intranets. IPv6 was also designed to increase routing perfor-
mance and network scalability issues. IPv6 addresses are 128 bits in length.
Hexadecimal Groups
IPv6 addresses are divided into eight, 16 bit hexadecimal groups. For example,
2001:0000:0000:0008:0000:0000:0000:0012 can be divided into ...
2001: 0000: 0000: 0008: 0000: 0000: 0000: 0012
1 2 3 4 5 6 7 8
The IPV6 address above can also be shortened to 2001:0:0:8:0:0:0:12 or
2001::8:0:0:0:12
Address Types
There are three IPv6 address types:
N
Unicast
N
Anycast
N
Multicast
Lab 1.3: Configuring IPv6 Static Routing 393
Unicast Types
There are four unicast address types:
N
Link local
N
Unique local
N
Global
N
Special
IPv6 Bits
IPv6 bit address can be divided into ...
48 bits 16 bits 64 bits
2001:0000:0000: 0008: 0000:0000:0000:0012
Global Prefix Subnet Interface ID
This lab will have you create an IPv6 network. In this network you will use IPv6 to
create both default and static routing. The network used in this lab has IPv4 addresses
already congured on each router interface. Having both IPv4 and IPv6 addresses on an
interface is called DUAL stacking.
Network Layout
Load IPv6 Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
394 ICND2
Lab Steps
1. Enable IPv6 routing and Cisco Express Forwarding (CEF) on each router.
2811A#config t
2811A(config)#ipv6 unicast-routing
2811A(config)#ipv6 cef
2811B#config t
2811B(config)#ipv6 unicast-routing
2811B(config)#ipv6 cef
2811C#config t
2811C(config)#ipv6 unicast-routing
2811C(config)#ipv6 cef
2. Configure IPv6 addresses on 2811 Router A.
2811A(config)#int fa0/0
2811A(config-if)#ipv6 address 2001::10:1/112
3. Click on the le IPv6 Layout.rsm and click Open. You should see the following non-
congured network:
Lab 1.3: Configuring IPv6 Static Routing 395
2811A(config-if)#int s0/0/0
2811A(config-if )ipv6 address 2001::20:1/112
2811A(config-if)#int s0/1/0
2811A(config-if)#ipv6 address 2001::30:1/112
2811A(config-if)#exit
3. Configure IPv6 addresses on 2811 Router B.
2811B(config)#interface fastethernet 0/0
2811B(config-if)# ipv6 address 2001::40:1/112
2811B(config-if)#int s0/1/0
2811B(config-if)#ipv6 address 2001::30:2/112
2811B(config-if)#exit
4. Configure IPv6 addresses on 2811 Router C.
2811C(config)#int fa0/0
2811C(config-if)# ipv6 address 2001::50:1/112
2811C(config-if)#int s0/0/0
2811C(config-if)#ipv6 address 2001::20:2/112
2811C(config-if)#exit
5. Configure two IPv6 static routes on 2811 Router A.
2811A(config)#ipv6 route 2001::40:0/112 2001::30:2
2811A(config)#ipv6 route 2001::50:0/112 2001::20:2
2811A(config)#exit
2811A#copy run start
The static routes will allow 2811 Router A to communicate with the rest of the network.
6. Configure a IPv6 default route on 2811 Router B.
2811B(config)#ipv6 route ::/0 2001::30:1
2811B(config)#exit
2811B#copy run start
This default route will allow 2811 Router B to communicate with the rest of the net-
work. 2811 Router B will use 2811 Router A as a gateway of last resort.
7. Configure a IPv6 default route on 2811 Router C.
2811C(config)#ipv6 route ::/0 2001::20:1
2811C(config)#exit
2811C#copy run start
This default route will allow 2811 Router C to communicate with the rest of the net-
work. 2811 Router C will use 2811 Router A as a gateway of last resort.
396 ICND2
Rename and Save Your File: Make sure you save the actual network layout le that you
have been working with. You might want to save it to another le name than IPv6 Layout.
rsm. This allows you to start over with a non-congured network if you wish.
1. There are two ways you can save a network layout. The first way is by clicking on the
Diskette button on the button bar, at the top of the Network Visualizer screen. You
can also click File on the menu and choose Save from the drop down menu.
Lab 1.4: Verifying IPv6 Static Routing 397
2. A dialog box will appear. At the bottom you will see the file name IPv6 Layout.rsm.
Rename the file. For example, you could name it My IPv6 Layout.rsm.
3. Click the Save button. At this point your network layout has been saved to a new name.
You then have the option of reloading IPv6 Layout.rsm which is non-configured.
Lab 1.4: Verifying IPv6 Static Routing
Understanding how to congure routers is very important. But just as important as the
understanding of conguring routers is the process of verifying your congurations. This
lab will provide you with the commands to verify your IPv6 Static Routing congurations.
Network Layout
Load IPv6 Layout.rsm or whatever you named the le when you saved your work. You
need a congured network in order to complete this lab.
398 ICND2
Lab Steps
1. On 2811 Router A, issue the show running-configuration command to verify the IPv6
configurations.
2811A#show run
[output cut]
!
interface FastEthernet0/0
ip address 172.16.10.1 255.255.255.0
no ip directed-broadcast
ipv6 address 2001::10:1/112
!
[output cut]
!
interface Serial0/0/0
ip address 172.16.20.1 255.255.255.0
no ip directed-broadcast
clockrate 2000000
ipv6 address 2001::20:1/112
!
[output cut]
!
interface Serial0/1/0
ip address 172.16.30.1 255.255.255.0
no ip directed-broadcast
clockrate 2000000
ipv6 address 2001::30:1/112
!
[output cut]
!
ipv6 route 2001::40:0/112 2001::30:2
ipv6 route 2001::50:0/112 2001::20:2
!
[output cut]
2811A#
As you can see, each interface has an IPv6 address. You can also see the IPv6 static
routes that are congured.
2. On 2811 Router A, issue the show ipv6 interface command to see which router
interfaces are configured for IPv6.
2811A#show ipv6 interface
FastEthernet0/0 is up, line protocol is up
Lab 1.4: Verifying IPv6 Static Routing 399
IPv6 is enabled, link-local address is FE80::21A:2FFF:FE55:D408
Global unicast address(es):
2001::10:1, subnet is 2001::10:0/112
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF10:1
FF02::1:FF55:D408
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
[output cut]
Serial0/0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::21A:2FFF:FE55:D408
Description: conn-to-2811A
Global unicast address(es):
2001::20:1, subnet is 2001::30:0/112
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF20:1
FF02::1:FF55:D408
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
[output cut]
Serial0/1/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::21A:2FFF:FE55:D408
Description: conn-to-2811C
Global unicast address(es):
2001::30:1, subnet is 2001::20:0/112
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF30:1
FF02::1:FF55:D408
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
[output cut]
2811A#
400 ICND2
3. On 2811 Router A, issue the show ipv6 interface brief command to see a summary
of the router interfaces configured for IPv6.
2811A#show ipv6 interface brief
FastEthernet0/0 [up/up]
FE80::21A:2FFF:FE55:D408
2001::10:1
FastEthernet0/1 [administratively down/down]
Serial0/0/0 [up/up]
FE80::21A:2FFF:FE55:D408
2001::20:1
Serial0/0/1 [administratively down/down]
Serial0/1/0 [up/up]
FE80::21A:2FFF:FE55:D408
2001::30:1
Serial0/1/1 [administratively down/down]
2811A#
4. On 2811 Router A, issue the show ipv6 route command to see the IPv6 routing table.
2811A#show ipv6 route
IPv6 Routing Table - 10 entries
Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP
U - Per-user Static route
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary
O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
C 2001::10:0/112 [0/0]
via ::, FastEthernet0/0
L 2001::10:1/128 [0/0]
via ::, FastEthernet0/0
C 2001::20:0/112 [0/0]
via ::, Serial0/0/0
L 2001::20:1/128 [0/0]
via ::, Serial0/0/0
C 2001::30:0/112 [0/0]
via ::, Serial0/1/0
L 2001::30:1/128 [0/0]
via ::, Serial0/1/0
S 2001::40:0/112 [1/0]
via 2001::30:2
S 2001::50:0/112 [1/0]
Lab 1.4: Verifying IPv6 Static Routing 401
via 2001::20:2
L FE80::/10 [0/0]
via ::, Null0
L FF00::/8 [0/0]
via ::, Null0
2811A#
5. From 2811 Router A, ping the IPv6 Fast Ethernet addresses of routers 2811 B and
2811 C. Pinging will verify that your default and static routing configurations are
correct.
2811A#ping ipv6 2001::40:1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001::40:1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
2811A#
2811A#ping ipv6 2001::50:1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001::50:1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/4 ms
2811A#
Practice Scenario: Basic Cisco Router Operations
Troubleshooting IPv6 Static Routing
You have been asked to resolve the issue. This is stated below.
(use Practice Scenario:
Troubleshooting Ipv6 )
Now that you have learned about some concepts and completed some hands-on work, try your
problem-solving and troubleshooting skills with the following task. To complete your task you
will load a specic network layout which you will use in working through the scenario.
When you have nished with this lab ...
402 ICND2
You can check your work by clicking the Grade Me button in the upper right hand cor-
ner of the Network Visualizer screen.
You will see a report that will display:
N
The name of the command entered for this lab.
N
The expected configuration.
N
Your configuration.
N
The result for each command. You will see a green check mark (meaning that you
got it correct) or a red X.
N
A score of the number of correct answers out of the total possible.
Turn On Hostnames
In some of the practice labs we refer to the hostname of a device. Therefore, we need to
make sure that Hostnames is turned on for this lab. On the Network Visualizer screen
click View and then click Hostnames so that it has a checkmark next to it.
Lab 1.4: Verifying IPv6 Static Routing 403
Scenario
Your IPv6 network has been working ne up until today.
Task
You have been asked to resolve the issue.
Network Layout
On the Network Visualizer screen, click on the Labs menu then choose Practice Sce-
narios, Basic Cisco Router Operations, and Troubleshooting IPv6 Static Routing.
404 ICND2
Lab 1.5: Configuring RIP IPv6
Routing (RIPng)
In this lab you will create an IPv6 RIPng network. The network used in this lab has IPv4
addresses already congured on each router interface. This will demonstrate DUAL stacking.
You will also be given the commands to verify your RIPng routing congurations.
Lab Steps
1. You need to remove the IPv6 routing configured in the previous lab. Perform this for
each of the three routers.
2811A#config t
2811A(config)#no ipv6 route 2001::40:0/112 2001::30:2
2811A(config)#no ipv6 route 2001::50:0/112 2001::20:2
Network Layout
Load IPv6 Layout.rsm or whatever you named the le when you saved your work in
Lab 1.3.
Lab 1.5: Configuring RIP IPv6 Routing (RIPng) 405
2811B#config t
2811B(config)#no ipv6 route ::/0 2001::30:1
2811C#config t
2811C(config)#no ipv6 route ::/0 2001::20:1
2. On the 2811 Router A, enable the IPv6 RIPng routing process from global and interface
configuration mode.
2811A(config)#ipv6 router rip myripngprocess
2811A(config-rtr)#exit
2811A(config)#int fa0/0
2811A(config-if)#ipv6 rip myripngprocess enable
2811A(config-if)#int s0/0/0
2811A(config-if )ipv6 rip myripngprocess enable
2811A(config-if)#int s0/1/0
2811A(config-if)#ipv6 rip myripngprocess enable
2811A(config-if)#ctrl+z
2811A#copy run start
Remember that the ipv6 unicast-routing command must be congured on the router
before the RIPng routing process can be enabled. The previous labs had you congure
the command on all routers so we will not do it here.
3. On the 2811 Router B, enable the IPv6 RIPng routing process from global configura-
tion mode.
2811B(config)#ipv6 router rip myripngprocess
2811A(config-rtr)#exit
2811B(config)#int fa0/0
2811B(config-if)#ipv6 rip myripngprocess enable
2811B(config-if)#int s0/1/0
2811B(config-if)#ipv6 rip myripngprocess enable
2811B(config-if)#ctrl+z
2811B#copy run start
4. On the 2811 Router C, enable the IPv6 RIPng routing process from global configura-
tion mode.
2811C(config)#ipv6 router rip myripngprocess
2811C(config-rtr)#exit
2811C(config)#int fa0/0
2811C(config-if)#ipv6 rip myripngprocess enable
2811C(config-if)#int s0/0/0
2811C(config-if)#ipv6 rip myripngprocess enable
2811C(config-if)#ctrl+z
2811C#copy run start
406 ICND2
Lab 1.6: Verifying RIP IPv6
Routing (RIPng)
Understanding how to congure routers is very important. But just as important as the
understanding of conguring routers is the process of verifying your congurations. This
lab will provide you with the commands to verify your RIPng routing congurations.
Lab Steps
1. On the 2811 Router A, issue the show running-configuration command to verify the
IPv6 configurations.
2811A# show run
[output cut]
Network Layout
Load IPv6 Layout.rsm or whatever you named the le when you saved your work in
Lab 1.5.
Lab 1.6: Verifying RIP IPv6 Routing (RIPng) 407
!
ipv6 unicast-routing
ipv6 cef
!
[output cut]
!
interface FastEthernet0/0
ip address 172.16.10.1 255.255.255.0
no ip directed broadcast
ipv6 address 2001::10:1/112
ipv6 rip myripngprocess enable
!
[output cut]
!
interface Serial0/0/0
ip address 172.16.20.1 255.255.255.0
no ip directed broadcast
ipv6 address 2001::20:1/112
clock rate 8000000
ipv6 rip myripngprocess enable
!
interface Serial0/1/0
ip address 172.16.30.1 255.255.255.0
no ip directed broadcast
ipv6 address 2001::30:1/112
ipv6 rip myripngprocess enable
clock rate 8000000
no cdp enable
!
[output cut]
!
ipv6 router rip myripngprocess
[output cut]
2811A#
As you can see, RIPng is congured on each interface. You can also see the IPv6 RIP
(RIPng) routing process.
2. On 2811 Router A, issue the show ipv6 route command to see the IPv6 routing table.
2811A#show ipv6 route
IPv6 Routing Table - 10 entries
Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP
408 ICND2
U - Per-user Static route
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary
O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
C 2001::10:0/112 [0/0]
via ::, FastEthernet0/0
L 2001::10:1/128 [0/0]
via ::, FastEthernet0/0
C 2001::20:0/112 [0/0]
via ::, Serial0/0/0
L 2001::20:1/128 [0/0]
via ::, Serial0/0/0
C 2001::30:0/112 [0/0]
via ::, Serial0/1/0
L 2001::30:1/128 [0/0]
via ::, Serial0/1/0
R 2001::40:0/112 [120/2]
via FE80::215:FAFF:FED7:EDA0, Serial0/1/0
R 2001::50:0/112 [120/2]
via FE80::21A:2FFF:FE52:4808, Serial0/0/0
L FE80::/10 [0/0]
via ::, Null0
L FF00::/8 [0/0]
via ::, Null0
2811A#
3. On 2811 Router A, issue the show ipv6 protocols command to see the IPv6 protocols
that are running on the router.
2811A#show ipv6 protocols
IPv6 Routing Protocol is "connected"
IPv6 Routing Protocol is "static"
IPv6 Routing Protocol is "rip myripngprocess"
Interfaces:
Serial0/0/1
Serial0/0/0
FastEthernet0/0
Redistribution:
None
2811A_aka_2811B#
Lab 1.6: Verifying RIP IPv6 Routing (RIPng) 409
4. From 2811 Router A, ping the IPv6 Fast Ethernet addresses of Routers 2811 B and
2811 C. Pinging will verify that your RIPng configurations are correct.
2811A#ping ipv6 2001::40:1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001::40:1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
2811A#ping ipv6 2001::50:1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001::5 0:1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
2621B_aka_2811A#
Cisco Wide Area
Networks (WAN)
Lab 2: Introduction to
Cisco Wide Area Network
Support
The Cisco IOS WAN can support many different WAN protocols that can help you extend
your LANs to other LANs at remote sites. Connecting company sites together so informa-
tion can be exchanged is imperative in this economy. However, it would take a truckload of
money to put in your own cable or dedicated connections to network all of your companys
remote locations. Service providers allow you to lease or share connections that the service
provider already has installed, which can save money and time.
Although this section does not cover every type of Cisco WAN support, it does cover the
HDLC, PPP, and Frame Relay.
The labs covered in this section are as follows:
N
2.1: Configuring PPP Encapsulation
N
2.2: Verifying PPP Encapsulation
N
2.3: Configuring PPP Authentication with CHAP
N
2.4: Verifying PPP with Authentication
N
2.5: Understanding Frame Relay Configuration
N
2.6: Configuring Frame Relay Switching
N
2.7: Configuring Frame Relay with Subinterfaces
N
2.8: Verifying Frame Relay
The commands covered in this section are as follows:
Command Meaning
encapsulation frame-relay Changes the encapsulation to frame-relay on a
serial link.
encapsulation frame-relay ietf Sets the encapsulation type to the Internet Engi-
neering Task Force (IETF). Used to connect Cisco
routers to off-brand routers.
encapsulation hdlc Restores the default encapsulation of HDLC on a
serial link.
Lab 2.1: Configuring PPP Encapsulation 413
Command Meaning
encapsulation ppp Changes the encapsulation on a serial link to PPP.
frame-relay interface-dlci Configures the PVC address on a serial interface or
subinterface.
frame-relay lmi-type Configures the LMI type on a serial link.
interface s0.16 point-to-point Creates a point-to-point subinterface on a serial
link that can be used with frame-relay.
ppp authentication chap Tells PPP to use CHAP authentication.
show frame-relay lmi Sets the LMI type on a serial interface.
show frame-relay map Shows the static and dynamic Network layer to
PVC mappings.
show frame-relay pvc Shows the configured PVCs and DLCI numbers
configured on a router.
username name password password Creates usernames and passwords used for
authentication on a Cisco router.
Lab 2.1: Configuring PPP Encapsulation
The High-Level Data-Link Control protocol (HDLC) is a point-to-point protocol used on
leased lines. No authentication can be used with HDLC and is the default encapsulation
used by Cisco routers over synchronous serial links. Ciscos HDLC is proprietaryit wont
communicate with any other vendors HDLC implementation. If you wanted to either offer
authentication on a serial link or to connect from a Cisco router to another vendor router,
then we need to congure PPP on the serial interfaces.
PPP (Point-to-Point Protocol) is a data-link protocol that can be used over asynchronous
serial (dial-up) media and uses the LCP (Link Control Protocol) to build and maintain data-
link connections. The basic purpose of PPP is to transport layer-3 packets across a data link
layer point-to-point link.
This lab will have you congure PPP on all four serial networks, and replace HDLC as
the encapsulation method on our serial links.
414 Cisco Wide Area Networks (WAN)
Lab Steps
1. Connect to 2811 Router B and change the encapsulation on the serial links from
HDLC to PPP.
2811A>enable
2811A#config t
2811A(config)#interface serial 0/0/1
2811A(config-if)#encapsulation ppp
2811A(config-if)#interface serial 0/1/1
2811A(config-if)#encapsulation ppp
2811A(config-if)#ctrl+z
2811A#
2. Connect to 2621 Router B and change the encapsulation on the serial links from
HDLC to PPP.
2621B>enable
2621B#config t
2621B(config)#interface serial 0/0
2621B(config-if)#encapsulation ppp
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
in earlier labs.
Lab 2.2: Verifying PPP Encapsulation 415
2621B(config-if)#ctrl+z
2621B#
3. Connect to 2621 Router A and change the encapsulation on the serial link from HDLC
to PPP.
2621A>enable
2621A#config t
2621A(config)#interface serial 0/0
2621A(config-if)#encapsulation ppp
2621A(config-if)#ctrl+z
2621A#
That is all there is to it. This part is easy.
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 2.2: Verifying PPP Encapsulation
Once you have replaced HDLC as the serial encapsulation method, then you need to verify
your network is still working properly.
The rst command to use is the show ip route command to make sure all your IP
routes are still present.
Network Layout
Work with the saved network that you used to congure devices in Lab 2.1.
416 Cisco Wide Area Networks (WAN)
Lab Steps
1. From 2621 Router A, use the show ip route command to verify the network is still
running.
2621A#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 6 subnets, 2 masks
O 172.16.30.0/24 [110/74] via 172.16.20.1, 22:22:18, Serial0/0
C 172.16.20.1/32 is directly connected, Serial0/0
C 172.16.40.0/24 is directly connected, FastEthernet0/0
O 172.16.50.0/24 [110/74] via 172.16.20.1, 22:22:18, Serial0/0
C 172.16.20.0/24 is directly connected, Serial0/0
O 172.16.10.0/24 [110/74] via 172.16.20.1, 22:22:18, Serial0/0
2621A#
2. From 2621 Router B, use the show ip route command to verify the network is still
running.
2621B#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 6 subnets, 2 masks
C 172.16.30.1/32 is directly connected, Serial0/0
C 172.16.30.0/24 is directly connected, Serial0/0
O 172.16.40.0/24 [110/74] via 172.16.30.1, 22:22:18, Serial0/0
C 172.16.50.0/24 is directly connected, FastEthernet0/0
O 172.16.20.0/24 [110/74] via 172.16.30.1, 22:22:18, Serial0/0
O 172.16.10.0/24 [110/74] via 172.16.30.1, 22:22:18, Serial0/0
2621B#
3. From 2811 Router A, use the show ip route command to verify the network is still
running.
2811A#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 7 subnets, 2 masks
C 172.16.30.2/32 is directly connected, Serial0/0/1
C 172.16.30.0/24 is directly connected, Serial0/0/1
O 172.16.40.0/24 [110/74] via 172.16.20.2, 22:22:18, Serial0/1/1
C 172.16.20.2/32 is directly connected, Serial0/1/1
O 172.16.50.0/24 [110/74] via 172.16.30.2, 22:22:18, Serial0/0/1
C 172.16.20.0/24 is directly connected, Serial0/1/1
C 172.16.10.0/24 is directly connected, FastEthernet0/0
2811A#
Lab 2.3: Configuring PPP Authentication with CHAP 417
4. From 2811 Router A, use the show interface command to see the serial link encap-
sulation.
2811A#show interface s0/0/1
Serial0/0/1 is up, line protocol is up
Hardware is GT96K Serial
Description: connection to 2621B
Internet address is 172.16.30.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
[output cut]
2811A#show interface s0/1/1
Serial0/1/1 is up, line protocol is up
Hardware is GT96K Serial
Description: connection to 2621A
Internet address is 172.16.20.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
Lab 2.3: Configuring PPP Authentication
with CHAP
Now that the network should be up and working with PPP, you can use PPP authentication
to stop unwanted users from connected to your network. Although, this is typically used
with dial-up, it still can be used with serial interfaces.
This lab will have you congure PPP authentication on all routers serial interfaces using
the CHAP protocol.
Challenge Authentication Protocol (CHAP) is used at the initial startup of a link and at
periodic checkups on the link to make sure the router is still communicating with the same
host. After PPP nishes its initial phase, the local router sends a challenge request to the
remote device. The remote device sends a value calculated using a one-way hash function
called MD5. The local router checks this hash value to make sure it matches. If the values
dont match, the link is immediately terminated.
To congure PPP authentication, rst set the hostname of the router if it is not already
set (this is not an option!). Then set the username and password for the remote router con-
necting to your router. For example, if you are connected to 2621 Router A and want to
congure authentication, you would set the hostname and then create a username that con-
sists of the router you are going to connect to, in this example, 2811 Router A.
418 Cisco Wide Area Networks (WAN)
This is shown below:
Router#config t
Enter configuration commands, one per line. End with CTRL/Z.
Router(config)#hostname 2621A
2621A(config)#username 2811A password cisco
When using the hostname command, remember that the username is the hostname of
the remote router connecting to your router. It is case-sensitive. Also, the password on
both routers must be the same. It is a plain-text password and can be seen with a show run
command.
You must have a username and password congured for each remote system you are
going to connect to. The remote routers must also be congured with usernames and
passwords.
After you set the hostname, usernames, and passwords, choose the authentication as
shown in the following example:
2621A#config t
Enter configuration commands, one per line. End with CTRL/Z.
2621A(config)#int s0/0
2621A(config-if)#ppp authentication chap
2621A(config-if)#ctrl+z
2621A#
Network Layout
Work with the saved network that you used to congure devices in Lab 2.2.
Lab 2.4: Verifying PPP with Authentication 419
Lab Steps
1. Open a console to 2621 Router A and create a username of 2811A and with a pass-
word of cisco. Then configure the serial interface 0/0 to use ppp authentication of chap.
2621A#config t
2621A(config)#username 2811A password cisco
2621A(config)#int s0/0
2621A(config-if)#ppp authentication chap
2621A(config-if)#ctrl+z
2621A#
2. Open a console to 2621 Router B and create a username of 2811A and with a password
of cisco. Then configure the serial interface 0/0 to use ppp authentication of chap.
2621B#config t
2621B(config)#username 2811A password cisco
2621B(config)#int s0/0
2621B(config-if)#ppp authentication chap
2621B(config-if)#ctrl+z
2621B#
3. Open a console to 2811 Router A and create a username of router 2621A and 2621B
and with a password of cisco. Then configure the serial interfaces 0/0/1 and 0/1/1 to
use ppp authentication of chap.
2811A#config t
2811A(config)#username 2621A password cisco
2811A(config)#username 2621B password cisco
2811A(config)#int s0/0/1
2811A(config-if)#ppp authentication chap
2811A(config)#int s0/1/1
2811A(config-if)#ppp authentication chap
2811A(config-if)#ctrl+z
Save Your File: Make sure you save the network layout le that you have been work-
ing on.
Lab 2.4: Verifying PPP with
Authentication
Once you have congured PPP with authentication as the serial encapsulation method, then
you need to verify your network is still working properly.
420 Cisco Wide Area Networks (WAN)
The rst command to use is the show ip route command to make sure all your IP routes
are still present. The next command to use is the show interface command.
Lab Steps
1. From 2621 Router A, use the show ip route command to verify the network is still
running.
2621A#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 6 subnets, 2 masks
O 172.16.30.0/24 [110/74] via 172.16.20.1, 22:22:18, Serial0/0
C 172.16.20.1/32 is directly connected, Serial0/0
C 172.16.40.0/24 is directly connected, FastEthernet0/0
O 172.16.50.0/24 [110/74] via 172.16.20.1, 22:22:18, Serial0/0
C 172.16.20.0/24 is directly connected, Serial0/0
O 172.16.10.0/24 [110/74] via 172.16.20.1, 22:22:18, Serial0/0
2621A#
Network Layout
Work with the saved network that you used to congure devices in Lab 2.3.
Lab 2.4: Verifying PPP with Authentication 421
2. From 2621 Router B, use the show ip route command to verify the network is still
running.
2621B#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 6 subnets, 2 masks
C 172.16.30.1/32 is directly connected, Serial0/0
C 172.16.30.0/24 is directly connected, Serial0/0
O 172.16.40.0/24 [110/74] via 172.16.30.1, 22:22:18, Serial0/0
C 172.16.50.0/24 is directly connected, FastEthernet0/0
O 172.16.20.0/24 [110/74] via 172.16.30.1, 22:22:18, Serial0/0
O 172.16.10.0/24 [110/74] via 172.16.30.1, 22:22:18, Serial0/0
2621B#
3. From 2811 Router A, use the show ip route command to verify the network is still
running.
2811A#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 7 subnets, 2 masks
C 172.16.30.2/32 is directly connected, Serial0/0/1
C 172.16.30.0/24 is directly connected, Serial0/0/1
O 172.16.40.0/24 [110/74] via 172.16.20.2, 22:22:18, Serial0/1/1
C 172.16.20.2/32 is directly connected, Serial0/1/1
O 172.16.50.0/24 [110/74] via 172.16.30.2, 22:22:18, Serial0/0/1
C 172.16.20.0/24 is directly connected, Serial0/1/1
C 172.16.10.0/24 is directly connected, FastEthernet0/0
2811A#
4. From 2811 Router A use the show interface command to see the serial link encapsu-
lation.
2811A#show int s0/0/1
Serial0/0/1 is up, line protocol is up
Hardware is GT96K Serial
Description: connection to 2621B
Internet address is 172.16.30.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
Keepalive set (10)
Last input 00:00:02, output 00:00:06, output hang never
Last clearing of "show interface" counters 02:41:59
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
422 Cisco Wide Area Networks (WAN)
Queueing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/1/256 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
Available Bandwidth 1158 kilobits/sec
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1645 packets input, 100265 bytes, 0 no buffer
Received 1139 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
1662 packets output, 105842 bytes, 0 underruns
0 output errors, 0 collisions, 3 interface resets
0 output buffer failures, 0 output buffers swapped out
2 carrier transitions
DCD=up DSR=up DTR=up RTS=up CTS=up
2811A#
2811A#show int s0/1/1
Serial0/1/1 is up, line protocol is up
Hardware is GT96K Serial
Description: connection to 2621A
Internet address is 172.16.20.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
Keepalive set (10)
Last input 00:00:02, output 00:00:06, output hang never
Last clearing of "show interface" counters 02:41:59
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/1/256 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
Available Bandwidth 1158 kilobits/sec
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1645 packets input, 100265 bytes, 0 no buffer
Received 1139 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
1662 packets output, 105842 bytes, 0 underruns
0 output errors, 0 collisions, 3 interface resets
0 output buffer failures, 0 output buffers swapped out
2 carrier transitions
DCD=up DSR=up DTR=up RTS=up CTS=up
Lab 2.5: Understanding Frame Relay Configuration 423
Lab 2.5: Understanding Frame Relay
Configuration
Frame Relay provides a communications interface between DTE (data terminal equipment)
and DCE (data circuit-terminating equipment, such as packet switches) devices. DTE con-
sists of terminals, PCs, routers, and bridgescustomer-owned end-node and internetwork-
ing devices. DCE consists of carrier-owned internetworking devices.
Frame Relay sends packets at the data link layer (layer 2) of the OSI model rather than at
the network layer (layer 3). A frame can incorporate packets from different protocols.
Frame Relay Uses Virtual Circuits
Frame Relay provides connection-oriented, Data Link layer communication via virtual
circuits. These virtual circuits are logical connections created between two DTEs across a
packet-switched network, which is identied by a DLCI, or Data Link Connection Identier.
Also, Frame Relay uses both PVCs (Permanent Virtual Circuits) and SVCs (Switched
Virtual Circuits which is a form of dialup), although most Frame Relay networks use only
PVCs. This virtual circuit provides the complete path to the destination network prior to
the sending of the rst frame.
Configuring Frame Relay Encapsulation
When conguring Frame Relay on Cisco routers, you need to specify it as an encapsula-
tion on serial interfaces. There are only two encapsulation types: Cisco and IETF (Internet
Engineering Task Force). The following router output shows the two different encapsulation
methods when choosing Frame Relay on your Cisco router:
2621A#config t
2621A(config)#interface s0/0
2621A(config-if)#encapsulation frame-relay ?
ietf Use RFC1490 encapsulation
<cr>
The default encapsulation is Cisco unless you manually type in IETF, and Cisco is the
type used when connecting two Cisco devices. Youd opt for the IETF-type encapsulation
if you needed to connect a Cisco device to a non-Cisco device with Frame Relay.
Frame Relay DLCI
Frame Relay virtual circuits (PVCs) are identied by Data Link Connection Identiers
(DLCIs). A Frame Relay service provider, such as the telephone company, typically assigns
DLCI values, which are used by Frame Relay to distinguish between different virtual circuits
on the network. Because many virtual circuits can be terminated on one multipoint Frame
Relay interface, many DLCIs are often afliated with it.
424 Cisco Wide Area Networks (WAN)
For the IP devices at each end of a virtual circuit to communicate, their IP addresses
need to be mapped to DLCIs. This mapping can function as a multipoint deviceone that
can identify to the Frame Relay network the appropriate destination virtual circuit for each
packet that is sent over the single physical interface. The mappings can be done dynamically
through IARP (Inverse ARP) or manually through the frame relay map command.
DLCI numbers, used to identify a PVC, are typically assigned by the provider and start
at 16. Conguring a DLCI number to be applied to an interface is shown below:
2621A(config-if)#frame-relay interface-dlci ?
<16-1007> Define a DLCI as part of the current subinterface
2621A(config-if)#frame-relay interface-dlci 16
Frame Relay LMI
The Local Management Interface (LMI) was developed in 1990 by Cisco Systems,
StrataCom, Northern Telecom, and Digital Equipment Corporation and became known
as the Gang-of-Four LMI or Cisco LMI. This gang took the basic Frame Relay protocol
from the CCIT and added extensions onto the protocol features that allow internetwork-
ing devices to communicate easily with a Frame Relay network.
The LMI is a signaling standard between a CPE device (router) and a frame switch. The
LMI is responsible for managing and maintaining status between these devices.
If youre not going to use the auto-sense feature of LMI, youll need to check with your
Frame Relay provider to nd out which type to use instead. The default type is Cisco, but
you may need to change to ANSI or Q.933A. The three different LMI types are depicted in
the router output below.
2621A(config-if)#frame-relay lmi-type ?
cisco
ansi
q933a
2621A(config-if)#frame-relay lmi-type ansi
You can have multiple virtual circuits on a single serial interface and yet treat each as a
separate interface. These are known as subinterfaces. Think of a subinterface as a hardware
interface dened by the IOS software. An advantage gained through using subinterfaces is
the ability to assign different Network layer characteristics to each subinterface and virtual
circuit, such as IP routing on one virtual circuit and IPX on another.
Subinterfaces with Frame Relay
You dene subinterfaces with the int s0.subinterface number command as shown
below. You rst set the encapsulation on the serial interface, and then you can dene the
subinterfaces.
2621A(config-int)#encapsulation frame-relay
2621A(config-int)#exit
Lab 2.6: Configuring Frame Relay Switching 425
2621A(config)#int s0/0.?
<0-4294967295> Serial interface number
2621A(config)#int s0/0.16 ?
multipoint Treat as a multipoint link
point-to-point Treat as a point-to-point link
2621A(config)#int s0/0.16 point-to-point
2621A(config-subif)#
You can dene an almost limitless number of subinterfaces on a given physical interface
(keeping router memory in mind). In the above example, we chose to use subinterface 16
because that represents the DLCI number assigned to that interface. However, you can
choose any number between 0 and 4,292,967,295.
Lab 2.6: Configuring Frame Relay
Switching
Now that you should have a background on how to congure basic Frame Relay on a Cisco
router, this lab will have you congure 2811 Router A as a Frame relay switch. Then you
will congure routers 2811 B and 2811 C as remote Frame Relay connections.
To perform this lab, you need to delete the congurations on 2811 Router A rst since
the Frame Relay switching conguration is completely different then what we have now.
Network Layout
Work with the saved network that you used to congure devices in Lab 2.4.
426 Cisco Wide Area Networks (WAN)
Lab Steps
1. From 2811 Router A, type erase start then reload.
2811A#erase start
Erasing the nvram filesystem will remove all configuration files!
Continue? [confirm] [press Enter]
[OK]
Erase of nvram: complete
*Oct 27 19:30:52.640: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of
nvram
2811A#
2811A#reload
System configuration has been modified. Save? [yes/no]: n
Proceed with reload? [confirm] (press enter)
*Nov 15 16:11:07.406: %SYS-5-RELOAD: Reload requested by console. Reload
Reason:
Reload Command.
System Bootstrap, Version 12.4(1r) [hqluong 1r], RELEASE SOFTWARE (fc1)
Copyright (c) 2005 by cisco Systems, Inc.
Initializing memory for ECC
c2811 processor with 262144 Kbytes of main memory
Main memory is configured to 64 bit mode with ECC enabled
Readonly ROMMON initialized
program load complete, entry point: 0x8000f000, size: 0xc940
program load complete, entry point: 0x8000f000, size: 0xc940
program load complete, entry point: 0x8000f000, size: 0x228d9f8
Self decompressing the image : #############################################
####
#########################################################################
[OK]
Smart Init is enabled
smart init is sizing iomem
ID MEMORY_REQ TYPE
0003E7 0X003DA000 C2811 Mainboard
0X00263F50 Onboard VPN
0X000021B8 Onboard USB
0X002C29F0 public buffer pools
0X00211000 public particle pools
TOTAL: 0X00B13AF8
If any of the above Memory Requirements are
Lab 2.6: Configuring Frame Relay Switching 427
"UNKNOWN", you may be using an unsupported
configuration or there is a software problem and
system operation may be compromised.
Rounded IOMEM up to: 12Mb.
Using 4 percent iomem. [12Mb/256Mb]
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version
12.4(12),
RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2006 by Cisco Systems, Inc.
Compiled Fri 17-Nov-06 12:02 by prod_rel_team
Image text-base: 0x40093160, data-base: 0x42B00000
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found
at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
[email protected].
Cisco 2811 (revision 49.46) with 249856K/12288K bytes of memory.
Processor board ID FTX0952C3EG
2 FastEthernet interfaces
4 Serial(sync/async) interfaces
1 Virtual Private Network (VPN) Module
DRAM configuration is 64 bits wide with parity enabled.
428 Cisco Wide Area Networks (WAN)
239K bytes of non-volatile configuration memory.
125440K bytes of ATA CompactFlash (Read/Write)
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]: (press n)
2. Open a console for 2811 Router A and configure the hostname.
Router>enable
Router#config t
Router(config)#hostname 2811A
2811A(config-line)#exit
2811A(config)#
Once your router is clear, you can now make them a frame relay switch with the
frame-relay switching command. However, that is the easy part. You need to map
every DLCI on the switch. Of course the router only has two connections, so it is not
too time consuming, but if you had dozens of PVCs, this could take a while.
3. On the frame relay switch, use the frame relay route command to map each and
every DLCI. Here is an example:
2811A(config)#int s0/0/1
2811A(config-if)#frame-relay route 17 int serial 0/1/1 16
2811A(config-if)#exit
2811A(config)#
This command tells the switch that if it receives a frame on serial 0/0/1 with a PVC of 17,
then send it out serial 0/1/1 using a PVC of 16. Again, in our network, this conguration
will only be two routes so its not a big deal.
4. On 2811 Router A configure the Frame Switching. No IP addresses are assigned to the
routes interfaces. Remember, this is a Data Link layer function only, so IP is irrelevant
to this configuration.
2811A(config)#frame-relay switching
2811A(config)#int s0/0/1
2811A(config)#encapsulation frame-relay
2811A(config-if)#no shut
2811A(config-if)#frame intf-type dce
2811A(config-if)#frame-relay route 17 int serial 0/1/1 16
2811A(config-if)#int s0/1/1
2811A(config)#encapsulation frame-relay
2811A(config-if)#no shut
2811A(config-if)#frame intf-type dce
Lab 2.7: Configuring Frame Relay with Subinterfaces 429
2811A(config-if)#frame-relay route 16 int serial 0/0/1 17
2811A(config-if)#ctrl+z
2811A#
5. Save you configurations.
2811A#copy run start
6. Now that the frame-relay switching router is configured, you need to configure the
remote routers.
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 2.7: Configuring Frame Relay
with Subinterfaces
This lab will have you bring up the console for Routers 2811 B and 2811 C and congure
them for frame relay conguration using subinterfaces.
Since the Frame-Relay switches are not using IP addressing, connecting from Routers
2811 B to 2811 C, for example, will use one subnet and appear like a direct connection.
Use subnet 172.16.100.0.
Network Layout
Work with the saved network that you used to congure devices in Lab 2.6.
430 Cisco Wide Area Networks (WAN)
Lab Steps
1. Open the console for 2811 Router B and configure the serial 0/0 interface with a Frame
Relay subinterface. To perform this, you must remove the IP address from the serial
interface.
2811B#config t
2811B(config)#int serial 0/0
2811B(config-if)#no ip address
2811B(config-if)#no shut
2811B(config-if)#encapsulation frame-relay
2811B(config-if)#int serial 0/0.16 point-to-point
2811B(config-subif)#ip address 172.16.100.1 255.255.255.0
2811B(config-subif)#frame-relay interface-dlci 16
2811B(config-subif)#ctrl+z
2811B#
2. Open the console for 2811 Router C and configure the serial 0/0 interface with a
Frame Relay subinterface.
2811C#config t
2811C(config)#int serial 0/0
2811C(config-if)#no ip address
2811C(config-if)#no shut
2811C(config-if)#encapsulation frame-relay
2811C(config-if)#int serial 0/0.17 point-to-point
2811C(config-subif)#ip address 172.16.100.2 255.255.255.0
2811C(config-subif)#frame-relay interface-dlci 17
2811C(config-subif)#ctrl+z
2811C#
3. Verify the Frame Relay connection is up and running. Ping from 2811 Router B to the
2811 Router C.
2811B#ping 172.16.100.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.100.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms
2811B#
Lab 2.8: Verifying Frame Relay 431
Lab 2.8: Verifying Frame Relay
There are several ways to check the status of your interfaces and PVCs once you have
Frame Relay encapsulation set up and running.
Lab Steps
1. Open the console screen for 2621 Router A. I have this in the online docs.
2. You can use the show frame-relay command with a question mark (?) to get the
command options: The show frame-relay lmi command will give you the LMI
traffic statistics exchanged between the local router and the Frame Relay switch.
2621A#show frame ?
ip show frame relay IP statistics
lapf show frame relay lapf status/statistics
lmi show frame relay lmi statistics
map Frame-Relay map table
pvc show frame relay pvc statistics
qos-autosense show frame relay qos-autosense information
route show frame relay route
rtp show frame relay RTP statistics
Network Layout
Work with the saved network that you used to congure devices in Lab 2.7.
432 Cisco Wide Area Networks (WAN)
svc show frame relay SVC stuff
traffic Frame-Relay protocol statistics
vofr show frame relay VoFR statistics
261A#show frame lmi
LMI Statistics for interface Serial0/0 (Frame Relay DTE) LMI TYPE = ANSI
Invalid Unnumbered info 0 Invalid Prot Disc 0
Invalid dummy Call Ref 0 Invalid Msg Type 0
Invalid Status Message 0 Invalid Lock Shift 0
Invalid Information ID 0 Invalid Report IE Len 0
Invalid Report Request 0 Invalid Keep IE Len 0
Num Status Enq. Rcvd 1748 Num Status msgs Sent 1748
Num Update Status Sent 0 Num St Enq. Timeouts 0
2811B#
The router output from the show frame-relay lmi command shows you LMI errors as
well as the LMI type.
3. The show frame pvc command will list all configured PVCs and DLCI numbers. It
provides the status of each PVC connection and traffic statistics. It will also give you
the number of BECN and FECN packets received on the router.
2621A#show frame pvc
PVC Statistics for interface Serial0/0 (Frame Relay DTE)
DLCI = 16 , DLCI USAGE = LOCAL , PVC STATUS = ACTIVE , INTERFACE =
Serial0/0.16
input pkts 11290 output pkts 11277 in bytes 898590
out bytes 899156 dropped pkts 2 in FECN pkts 0
in BECN pkts 0 out FECN pkts 0 out BECN pkts 0
in DE pkts 0 out DE pkts 0
out bcast pkts 11264 out bcast bytes 898468
pvc create time 13:25:57, last time pvc status changed 13:25:39
2811B#
4. You can also use the show interface command to check for LMI traffic. The show
interface command displays information about the encapsulation as well as layer-2
and layer-3 information.
The LMI DLCI is used to dene the type of LMI being used. If it is 1023, it is the
default LMI type of Cisco. If the LMI DLCI is zero, then it is the ANSI LMI type.
2621A#show int s0/0
Serial0/0 is up, line protocol is up
Hardware is PowerQUICC Serial
Description: connection to 2811A
Lab 2.8: Verifying Frame Relay 433
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 0.
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation FRAME-RELAY, loopback not set
Keepalive set (10)
FR SVC disabled, LAPF state down
LMI enq sent 41, LMI stat recvd 22, LMI upd recvd 0, DTE LMI down
LMI enq recvd 4, LMI stat sent 0, LMI upd sent 0
LMI DLCI 0 LMI type is ANSI frame relay DTE
Broadcast queue 0/64, broadcasts sent/dropped 0/0, interface broadcasts 0
[output cut]
2811B#
The show interface command displays line, protocol, DLCI and LMI information.
5. The show frame map command will show you the Network layer-to-DLCI mappings.
2621A#show frame map
Serial0/0 (up):ip dlci 16(0x66,0x1860), broadcast
status defined, active
Serial0/0.16 (up): point-to-point dlci, dlci 16(0x66,0x1860), broadcast
status defined, active
2621A#
EIGRP
Lab 3: Introduction to EIGRP
In this section you will learn about EIGRP which is a proprietary Cisco protocol that only
runs on Cisco routers. You will learn how to manage Cisco routers in an internetwork. EIGRP
uses the properties of both distance vector and link state and uses autonomous systems (AS) to
create groups of routers that share routing information.
The following labs are covered:
N
3.1: Configuring EIGRP Routing
N
3.2: Verifying EIGRP Routing
N
3.3: Configuring EIGRP Wild Card Masks
N
3.4: Verifying EIGRP Wild Card Masks Configurations
N
3.5: Configuring EIGRP Authentication
N
3.6: Verifying EIGRP Authentication
N
3.7: Configuring Advanced Commands with EIGRP
Lab 3.1: Configuring EIGRP Routing
EIGRP is a Cisco proprietary hybrid routing protocol. If you want your routers to share
information they must all:
N
have EIGRP running
N
use the same AS number
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
in earlier labs. You need a congured network in order to complete this lab.
Lab 3.1: Configuring EIGRP Routing 437
Lab Steps
1. First go to 2621 Router A and ping interface f 0/0 on 2621 Router B. The packet will
travel through 2811 Router A on its way to 2621 Router B.
2621A#ping 172.16.30.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.30.2, timeout is 2 seconds:
!!!!!
2. We have not done anything yet with EIGRP but we can ping a distant router. If you look
back at Lab 5.16 (if you have been sequentially going through the labs), we configured
every router with RIP version 2. We need to remove RIP from every router so that we can
test the effects of the EIGRP commands.
2621A#config t
2621A(config)#no router rip
2621B#config t
2621B(config)#no router rip
2811A#config t
2811A(config)#no router rip
EIGRP
N
Stands for Enhanced Interior Routing Protocol
N
Uses properties of both distance vector and link state
N
Has an administrative distance of 90
N
Has a maximum hop count of 255
N
Will automatically overwrite RIP (which has a default administrative distance of 120)
routes in the routing table
N
Uses autonomous systems (AS) to create groups of routers that share routing
information
N
Classless routing protocol but congured in a classful manner
N
Uses RTP Reliable Transport Protocol
N
Uses DUAL Diffusing Update Algorithm
N
Supports VLSM, summarization, and discontiguous networking
N
Supports IP V4 and V6, IPX, AppleTalk
438 EIGRP
3. Now try pinging 172.16.30.2.
2621A#ping 172.16.30.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.30.2, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5), round-trip min/avg/max = 0/0/0 ms
2621A#
Good! We have removed RIP and now no connectivity. We can now proceed with
EIGRP.
4. Configure 2621 Router A to use EIGRP with an AS of 10.
2621A#config t
2621A(config)#router eigrp 10
2621A(config-router)#network 172.16.0.0
2621A(config-router)#ctrl+z
2621A#
5. Configure 2621 Router B to use EIGRP with an AS of 10.
2621B#config t
2621B(config)#router eigrp 10
2621B(config-router)#network 172.16.0.0
2621B(config-router)
6. Configure 2811 Router A to use EIGRP with an AS of 15.
2811A#config t
2811A(config)#router eigrp 15
2811A(config-router)#network 172.16.0.0
2811A(config-router)#exit
7. Now that we have EIGRP on every router, go to 2621 Router A and ping 172.16.30.2
on 2621 Router B.
2621A#ping 172.16.30.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.30.2, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5), round-trip min/avg/max = 0/0/0 ms
2621A#
Lab 3.1: Configuring EIGRP Routing 439
It did not work. Click on the Net Detective icon to see if we can nd out why the ping
was not successful.
You will see the following information:
1. Network 172.16.0.0 was not found in the routing tables for 2621 Router A.
2. The desired address falls outside of the protocol networks set up for one or more
of the devices.
3. The desired IP address of 172.16.30.2 was not found. None of the interfaces in the
current network have been configured with this IP address.
Net Detective
Unless you are an expert in using routers and switches, you might enter a command,
have it not work, and not immediately know what you did wrong. We have tried to
bridge that gap with Net Detective
.
N
5.3: Configuring VLANs on a 3550 Switch
N
5.4: Configuring Trunk Ports/VTP Domain a 3550 Switch
N
5.5: Configuring VLANs on a 3560 Switch
N
5.6: Configuring Trunk Ports/VTP Domain on a 3560 Switch
N
5.7: Intra and InterVLAN Routing
The commands used in this section are described below:
Command Description
delete vtp Deletes VTP configurations from a switch
encapsulation isl 2 Sets ISL routing for VLAN 2
Lab 5.1: Configuring VLANs on a 1900 Switch 485
Command Description
int f0/0.1 Creates a subinterface
interface e0/5 Configures Ethernet interface 5
interface f0/26 Configures FastEthernet 26
show trunk A Shows the trunking status of port 26
show trunk B Shows the trunking status of port 27
show vlan Shows all configured VLANs
show vlan-membership Shows all port VLAN assignments
show vtp Shows the VTP configuration of a switch
trunk auto Sets the port to auto trunking mode
trunk on Sets a port to permanent trunking mode
vlan 2 name Sales Creates a VLAN 2 named Sales
vlan-membership static 2 Assigns a static VLAN to a port
vtp client Sets the switch to be a VTP client
vtp domain Sets the domain name for the VTP configuration
vtp server Sets the switch to be a VTP server
Lab 5.1: Configuring VLANs
on a 1900 Switch
Conguring VLANs is the easy part of the job. It is trying to understand which users you
want in each VLAN that is time consuming. Once you have decided the number of VLANs
you want to create and the users that will be members of each VLAN, you can create your
VLAN. You can create up to 64 VLANs on a 1900 switch.
486 Virtual LANs (VLANs)
Lab Steps
1. Double-click 1900 Switch A in order to bring up the console screen.
2. To configure VLANs on the 1900 series switch, choose k from the initial user inter-
face menu to get into IOS configuration. The following switch output is the console
display when connecting to a 1900 switch. Press k to enter the CLI mode, and enter
global configuration mode using the enable command and then config t.
1 user(s) now active on Management Console.
User Interface Menu
[M] Menus
[K] Command Line
Enter Selection: k
Network Layout
Load 1900 Switch Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le 1900 Switch Layout.rsm and click Open.
Lab 5.1: Configuring VLANs on a 1900 Switch 487
CLI session with the switch is open.
To end the CLI session, enter [Exit].
3. To configure VLANs on an IOS-based switch, use the vlan [vlan#] name [vlan
name] command. The following will demonstrate how to configure VLANs on the
switch by creating three VLANs for three different departments.
>en
#config t
Enter configuration commands, one per line. End with CNTL/Z
(config)#hostname1900A
1900A(config)#vlan 2 name sales
1900A(config)#vlan 3 name marketing
1900A(config)#vlan 4 name mis
1900A(config)#exit
4. After you create the VLANs that you want, you can use the show vlan command to see
the configured VLANs. However, notice that by default all ports on the switch are in
VLAN 1. To change the VLAN associated with a port you need to go to each interface
and tell it what VLAN to be a member of.
Once the VLANs are created, verify your conguration with the show vlan command
(sh vlan for short).
1900A#sh vlan
VLAN Name Status Ports
--------------------------------------
1 default Enabled 1-12,A,B,AUI
2 sales Enabled
3 marketing Enabled
4 mis Enabled
1002 fddi-default Suspended
1003 token-ring-defau Suspended
1004 fddinet-default Suspended
1005 trnet-default Suspended
--------------------------------------
[output cut]
5. You can configure each port to be in a VLAN by using the vlan-membership command.
You can only configure VLANs one port at a time. There is no command to assign more
than one port to a VLAN at a time with the 1900 switch. In the following example, we
configure interface 2 to VLAN 2, interface 4 to VLAN 3, and interface 5 to VLAN 4.
1900A#config t
Enter configuration commands, one per line. End with CNTL/Z
488 Virtual LANs (VLANs)
1900A(config)#int e0/2
1900A(config-if)#vlan-membership ?
dynamic Set VLAN membership type as dynamic
static Set VLAN membership type as static
1900A(config-if)#vlan-membership static ?
<1-1005> ISL VLAN index
1900A(config-if)#vlan-membership static 2
1900A(config-if)#int e0/4
1900A(config-if)#vlan-membership static 3
1900A(config-if)#int e0/5
1900A(config-if)#vlan-membership static 4
1900A(config-if)#exit
1900A(config)#exit
6. Now, type show vlan again to see the ports assigned to each VLAN.
1900A#sh vlan
VLAN Name Status Ports
--------------------------------------
1 default Enabled 1,3,6-12,A,B,AUI
2 sales Enabled 2
3 marketing Enabled 4
4 mis Enabled 5
1002 fddi-default Suspended
1003 token-ring-defau Suspended
1004 fddinet-default Suspended
1005 trnet-default Suspended
--------------------------------------
[output cut]
7. Another command you can use to see the ports assigned to a VLAN is show
vlan-membership. Notice that this command shows each port on the switch, which
VLAN the port is a member of, and the membership type (static or dynamic).
1900A#sh vlan-membership
Port VLAN Membership Type Port VLAN Membership Type
----------------------------- -----------------------------
1 1 Static
2 2 Static
3 1 Static
4 3 Static
5 4 Static
Lab 5.3: Configuring VLANs on a 3550 Switch 489
6 1 Static
7 1 Static
8 1 Static
9 1 Static
10 1 Static
11 1 Static
12 1 Static
AUI 1 Static
A 1 Static
B 1 Static
1900A#
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 5.3: Configuring VLANs
on a 3550 Switch
Conguring VLANs is the easy part of the job. It is trying to understand which users you want
in each VLAN that is time consuming. Once you have decided the number of VLANs you
want to create and the users that will be members of each VLAN, you can create your VLAN.
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
in earlier labs.
490 Virtual LANs (VLANs)
Lab Steps
1. To configure VLANs on the 3550 series switch, you can configure the VLANs from
the VLAN database. You do this from privileged mode, not configuration mode. Type
vlan database:
3550A#vlan database
2. To configure VLANs on the 3550 switch, use the vlan # name name command. The
following shows an example of creating three VLANs.
3550A(vlan)#vlan 2 name Sales
VLAN 2 added:
Name: Sales
3550A(vlan)#vlan 4 name Marketing
VLAN 4 added:
Name: Marketing
3550A(vlan)#vlan 7 name Research
VLAN 7 added:
Name: Research
3550A(vlan)#exit
APPLY completed.
Exiting....
3550A#
3. You must apply your changes to the switch. You can either use the apply command or
use the exit command which will then apply the changes.
4. After you create the VLANs that you want, you can use the show vlan command to
see the configured VLANs. However, notice that by default all ports on the switch are
in VLAN 1. To change the VLAN associated with a port you need to go to each inter-
face and tell it what VLAN to be a member of.
Once the VLANs are created, verify your conguration with the show vlan command
(show vlan for short).
3550A#show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/2, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10
Lab 5.3: Configuring VLANs on a 3550 Switch 491
2 Sales active
4 Marketing active
7 Research active
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
[output cut]
5. You can configure each port to be in a VLAN by using the switchport access vlan #
command. You can only configure VLANs one port at a time. In the following example,
we configure interface 1 to VLAN 2, interface 5 to VLAN 7, and interface 10 to VLAN 4.
3550A#config t
Enter configuration commands, one per line. End with CNTL/Z
3550A(config)#int fa0/1
3550A(config-if)#switchport access vlan 2
3550A(config)#int fa0/5
3550A(config-if)#switchport access vlan 7
3550A(config-if)#int fa0/10
3550A(config-if)#switchport access vlan 4
3550A(config-if)#exit
6. You must also set the port to be in access mode, which means that the interface will
only be a member of one VLAN.
3550A(config)#int fa0/1
3550A(config-if)#switchport mode access
3550A(config)#int fa0/5
3550A(config-if)#switchport mode access
3550A(config-if)#int fa0/10
3550A(config-if)#switchport mode access
3550A(config-if)#exit
3550A(config)#exit
3550A#copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
3550A#
492 Virtual LANs (VLANs)
7. Now, type show vlan again to see the ports assigned to each VLAN.
3550A#sh vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/2, Fa0/4, Fa0/6, Fa0/7
Fa0/8, Fa0/9
2 Sales active Fa0/1
4 Marketing active Fa0/10
7 Research active Fa0/5
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
[output cut]
Interface Fa0/1 is a member of VLAN 2, interface Fa0/05 a member of VLAN 5, and
interface Fa0/10 is a member of VLAN 4.
8. Another command you can use to see the ports assigned to a VLAN is show
running-config.
3550A#show run
[output cut]
!
interface FastEthernet0/1
switchport access vlan 2
switchport mode access
!
interface FastEthernet0/5
switchport access vlan 7
switchport mode access
!
interface FastEthernet0/10
switchport access vlan 4
switchport mode access
!
[output cut]
3550A#
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 5.4: Configuring Trunk Ports and VTP Domain on a 3550 Switch 493
Lab 5.4: Configuring Trunk Ports and
VTP Domain on a 3550 Switch
Configure Trunk Ports
Trunk links are 100 or 1000 Mbps point-to-point links between two switches, between
a switch and router, or between a switch and server. Trunked links carry the trafc of
multiple VLANs, from 1 to 1005 at a time. You cannot run trunked links on 10Mbps
links, nor would you want to. Remember that an access link is a port on a switch that is
a member of only one VLAN.
In this network 3560 Switch A is connected to 3550 Switch A via interface Fa0/3 on each
device. That is what we are going to use to set our trunk port between the two switches.
Lab Steps
1. To configure trunking on a 3550 port, use the interface command switchport mode
command. In this lab we will set it up for fa0/3.
3550A>en
3550A#config t
Network Layout
Work with the saved network that you used to congure devices in Lab 5.3.
494 Virtual LANs (VLANs)
3550A(config)#int fa0/3
3550A(config-if)#switchport trunk encapsulation ?
dot1q Interface uses only 802.1q trunking encapsulation when
trunking
isl Interface uses only ISL trunking encapsulation when
trunking
negotiate Device will negotiate trunking encapsulation with peer on
interface
3550A(config-if)#switchport trunk encapsulation dot1q
3550A(config-if)#switchport mode trunk
2. By default, traffic from all VLANs are sent over a trunk link. To change the VLANs
permitted to send traffic on a trunk link, use the switchport trunk allowed vlan
except # command. The command allows traffic from all VLANs except the VLANs
listed. In lab 9.5 we set up VLAN 7, for now we do not want to allow VLAN 7 to send
traffic across the trunk link.
3550A(config-if)#switchport trunk allowed vlan except 7
3. The above command sets the trunking interface to allow traffic from all VLANs except
for VLAN 7.
4. To verify your trunk ports, use the show running-config command.
3550A(config-if)#exit
3550A(config)#exit
3550A#show run
[output cut]
!
interface FastEthernet0/3
switchport trunk allowed vlan 1-6,8-1005
switchport mode trunk
switchport trunk encapsulation dot1q
!
[output cut]
5. Notice in the above output that all VLANs are allowed except for VLAN 7.
Configure VTP Domain
Every Catalyst switch is congured by default to be a VTP server. To congure VTP, rst
congure the domain name you want to use, as discussed in the next section. Once you con-
gure the VTP information on a switch, you need to verify the conguration.
Lab 5.5: Configuring VLANs on a 3560 Switch 495
6. Use the vtp global configuration mode command to set this information. In the following
example, we explicitly set switch 3550 A to be a VTP server, which it already is, and then
set the VTP domain to routersim.
3550A(config)#vtp mode server
Device mode already VTP SERVER.
3550A(config)#vtp domain routersim
Changing VTP domain name from NULL to routersim
3550A(config)#
7. After you configure the VTP information, you can verify it with the show vtp status
command.
3550A#show vtp status
VTP Version : 2
Configuration Revision : 4
Maximum VLANs supported locally : 64
Number of existing VLANs : 8
VTP Operating Mode : Server
VTP Domain Name : routersim
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x70 0x01 0xF2 0x72 0x97 0xA1 0x35 0xEB
Configuration last modified by: 172.16.10.17 at 11-29-93 20:39:24
Local updater ID is 172.16.10.17 on interface Vl1 (lowest numbered VLAN
interface found)
3550A#
The preceding switch output shows the VTP domain and the switchs mode.
Lab 5.5: Configuring VLANs
on a 3560 Switch
In this lab we want to eventually associate ports 2 and 8 with VLANs 2 and 4, that were
set up for 3550 Switch A in lab 5.3. However, we do not have to manually set up VLANs 2
and 4 again for 3560 Switch A. That can be broadcast from 3550 Switch A (from work you
did in lab 5.2), however, we must do a couple things in order to facilitate that.
496 Virtual LANs (VLANs)
Lab Steps
1. Initially, lets issue the show vlan command to verify that there are no VLANs associated
with 3560 Switch A.
3560A#sh vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/2, Fa0/4, Fa0/5
Fa0/6, Fa0/7, Fa0/8, Gi0/1
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
[output cut]
No VLANs!
Network Layout
Work with the saved network that you used to congure devices in Lab 5.4.
Lab 5.5: Configuring VLANs on a 3560 Switch 497
2. We now need to configure two ports, one for each VLAN by using the switchport
access vlan # command. You can only configure VLANs one port at a time. In the
following example, we configure interface 2 to VLAN 2 and interface 8 to VLAN 4.
3560A(config)#config t
Enter configuration commands, one per line. End with CNTL/Z
3560A(config)#int fa0/2
3560A(config-if)#switchport access vlan 2
3560A(config-if)#int f0/8
3560A(config-if)#switchport access vlan 4
3. You must also set the port to be in access mode, which means that the interface will
only be a member of one VLAN.
3560A(config)#int fa0/2
3560A(config-if)#switchport mode access
3560A(config-if)#int fa0/8
3560A(config-if)#switchport mode access
3560A(config-if)#exit
3560A(config)#exit
3560A#copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
3560A#
4. We can verify what we did with the two ports with the show run command.
3560A#show run
[output cut]
!
interface FastEthernet0/2
switchport access vlan 2
switchport mode access
!
interface FastEthernet0/8
switchport access vlan 4
switchport mode access
!
[output cut]
3560A#
Save Your File: Make sure you save the network layout le that you have been working on.
498 Virtual LANs (VLANs)
Lab 5.6: Configuring Trunk Ports and
VTP Domain on a 3550 Switch
Configure Trunk Ports
Trunk links are 100 or 1000 Mbps point-to-point links between two switches, between
a switch and router, or between a switch and server. Trunked links carry the trafc of
multiple VLANs, from 1 to 1005 at a time. You cannot run trunked links on 10Mbps
links, nor would you want to. Remember that an access link is a port on a switch that is
a member of only one VLAN.
Lab Steps
1. To configure trunking on a 3560 port, use the interface command switchport mode
trunk command. In this lab we will configure interface fa0/3.
3560A>en
3560A#config t
Network Layout
Work with the saved network that you used to congure devices in Lab 5.5.
Lab 5.6: Configuring Trunk Ports and VTP Domain on a 3550 Switch 499
3560A(config)#int fa0/3
3560A(config-if)#switchport mode trunk
3560A(config-if)#switchport trunk encapsulation dot1q
2. To verify your trunk port, use the show running-config command.
3560A(config-if)#exit
3560A(config)#exit
3560A#show run
[output cut]
!
interface FastEthernet0/3
switchport mode trunk
switchport trunk encapsulation dot1q
!
[output cut]
Configure VTP Domain
Every Catalyst switch is congured by default to be a VTP server. To congure VTP, rst con-
gure the domain name you want to use, as discussed in the next section. Once you congure
the VTP information on a switch, you need to verify the conguration.
3. Use the vtp global configuration mode command to set this information. In the fol-
lowing example, we set the switch to a VTP client and then set the VTP domain to
routersim.
3560A(config)#config t
3560A(config)#vtp mode client
Setting device to VTP CLIENT mode.
3560A(config)#vtp domain routersim
Changing VTP domain name from NULL to routersim
3560A(config)#ctrl+z
4. After you configure the VTP information, you can verify it with the show vtp command.
3560A#sh vtp status
VTP Version : 2
Configuration Revision : 3
Maximum VLANs supported locally : 64
Number of existing VLANs : 7
VTP Operating Mode : Client
VTP Domain Name : routersim
VTP Pruning Mode : Disabled
500 Virtual LANs (VLANs)
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x70 0x01 0xF2 0x72 0x97 0xA1 0x35 0xEB
Configuration last modified by: 172.16.10.3 at 11-29-93 20:39:24
Local updater ID is 172.16.10.3 on interface Vl1 (lowest numbered VLAN
interface
found)
3560A#
The preceding switch output shows the VTP domain and the switchs mode.
5. VLAN information should now be propagated from 3550 Switch A to 3560 Switch A.
Confirm this with the show vlan command.
3560A#show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/4, Fa0/5, Fa0/6,
Fa0/7
Gi0/1
2 Sales active Fa0/2
4 Marketing active Fa0/8
7 Research active
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
VLAN 7 will not be allowed to pass any traffic on the trunk link because we
issued the command switchport trunk allowed vlan except 7 in lab
5.4, step 2.
Lab 5.7: IntraVLAN and
InterVLAN Routing
In previous labs we have set up VLANs 2 and 4 for the 3550 and 3560 switches. We will
rst set up the proper subnetting so that we can place Hosts A and C in VLANs 2 and
Hosts B and D in VLANs 4. We will then have you test this by communicating with the
Lab 5.7: IntraVLAN and InterVLAN Routing 501
VLANS. Then we will set up interVLAN routing so that Hosts from VLANs 2 and 4 can
communicate with each other. Network devices in different VLANs cannot communicate
with each other without sending trafc through a router. In this lab we will use 2811
Router A to perform the 802.1q routing so that we can route trafc between the two
VLANs.
Two new subnets will be needed. We will us subnets 172.16.2.0/24 and 172.16.3.0/24.
2811 Router A FastEthernet 0/0 interface will stay at 172.16.10.1/24, however, the IP address
needs to be moved to a subinterface, which well do in a minute.
Lab Steps
1. We configured all hosts in this network in ICND1 lab 2.11. If you have not configured
the hosts in this lab, you should go through ICND1 lab 2.11.
Lets start from that point. VLAN 2 will have a subnet of 172.16.2.0/24 and
VLAN 4 will have a subnet of 172.16.3.0/24. Change the current IP addresses of
the hosts so they are in their proper VLAN. Change the IP addresses and default-
gateways of the four hosts.
Network Layout
Work with the saved network that you used to congure devices in Lab 5.6.
502 Virtual LANs (VLANs)
Host Current IP Address New IP Address New Default Gateway
A 172.16.10.5 172.16.2.2 172.16.2.1
B 172.16.10.6 172.16.3.3 172.16.3.1
C 172.16.10.7 172.16.2.3 172.16.2.1
D 172.16.10.8 172.16.3.2 172.16.3.1
2. Verify you have set up the VLANs correctly by pinging from Host A to Host C.
C:\>ping 172.16.2.3
Pinging 172.16.2.3 with 32 bytes of data:
Reply from 172.16.2.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.2.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.2.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.2.3 ;bytes=32 time=22ms TTL=254
Ping Statistics for 172.16.2.3:
Packets Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 22ms, Maximum = 23ms, Average = 22ms
C:\>
Once you can ping, you know you have congured at least one VLAN correctly. At this
time, Host A and Host C cannot ping anything else in the network except each other.
3. At this point you should not be able to ping Host B even though it is connected to the
same switch.
C:\>ping 172.16.3.3
Pinging 172.16.3.3 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping Statistics for 172.16.3.3:
Packets Sent = 4, Received = 0, Lost = 4 (100% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
C:\>
Lab 5.7: IntraVLAN and InterVLAN Routing 503
4. Verify you have set up the VLANs correctly by pinging from Host B to Host D.
C:\>ping 172.16.3.2
Pinging 172.16.3.2 with 32 bytes of data:
Reply from 172.16.3.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.3.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.3.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.3.2 ;bytes=32 time=22ms TTL=254
Ping Statistics for 172.16.3.2:
Packets Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 22ms, Maximum = 23ms, Average = 22ms
C:\>
Once you can ping, you know you have congured both VLANs correctly. At this
time, Host B and Host D cannot ping anything else in the network except each other.
5. To have the hosts ping outside their own VLAN, you must setup some type of rout-
ing You also need to setup a trunk link between the switch and the router. Use 2811
Router A FastEthernet 0/0 interface and create 802.1q routing. Create three subinter-
faces, one for each VLAN. To establish a trunk link between 3550 Switch A and the
2811 Router A, configure FastEthernet 0/4, on the 3550 Switch A as a trunk port with
802.1q encapsulation.
2811A>enable
2811A#config t
2811A(config)#int fa0/0
2811A(config-if)#no ip address
2811A(config-if)#int fa0/0.1
2811A(config-subif)#encapsulation dot1q 1
2811A(config-subif)#ip address 172.16.10.1 255.255.255.0
2811A(config-subif)# int fa0/0.2
2811A(config-subif)#encapsulation dot1q 2
2811A(config-subif)#ip address 172.16.2.1 255.255.255.0
2811A(config-subif)# int fa0/0.3
2811A(config-subif)#encapsulation dot1q 4
2811A(config-subif)#ip address 172.16.3.1 255.255.255.0
2811A(config-subif)#router ospf 102
2811A(config-router)#network 172.16.2.0 0.0.0.255 a 0
2811A(config-router)#network 172.16.3.0 0.0.0.255 a 0
2811A(config-subif)#exit
2811A(config)#exit
2811A#copy run start
504 Virtual LANs (VLANs)
Destination filename [startup-config]?
Building configuration...
[OK]
2811A#
3550A>en
3550A#config t
3550A(config)#int f0/4
3550A(config-if)#switchport mode trunk
3550A(config-if)#switchport trunk encapsulation dot1q
6. Verify your sub-interface configurations with the show run command.
2811A(config)#show run
[output cut]
!
interface FastEthernet0/0
description connection to LAN 10
no ip address
no ip directed-broadcast
!
interface FastEthernet0/0.1
encapsulation dot1Q 1
ip address 172.16.10.1 255.255.255.0
!
interface FastEthernet0/0.2
encapsulation dot1Q 2
ip address 172.16.2.1 255.255.255.0
!
interface FastEthernet0/0.4
encapsulation dot1Q 4
ip address 172.16.3.1 255.255.255.0
!
[output cut]
7. At this point, the hosts should be able to ping all hosts and 2811 Router A.
Access Lists
Lab 6: Introduction to
Managing Traffic with
Access Lists
This set of labs will have you congure IP ltering on the internetwork. The proper use and
conguration of access lists is a vital part of router conguration. Contributing mightily to
the efciency and optimization of your network, access lists give network managers a huge
amount of control over trafc ow throughout the internetwork.
With access lists, managers can gather basic statistics on packet ow and security policies
can be implemented. Sensitive devices can also be protected from unauthorized access. We
will discuss access lists for TCP/IP, and we will cover some of the tools available to test and
monitor the functionality of applied access lists.
The following labs are presented in this section:
N
6.1: Standard IP Access-Lists Lab
N
6.2: Verifying Standard IP Access-lists Lab
N
6.3: Applying an Access-List to a VTY Line Lab
N
6.4: Extended IP Access-Lists Lab
N
6.5: Verifying Extended IP Access-lists
N
6.6: Removing Extended IP Access-lists
The commands covered in this chapter are as follows:
Command Meaning
access-list Creates a list of tests to filter the networks.
host Specifies a single host address.
Access List
A set of permissions that have been established at an interface level that are used
to permit or deny packets moving through a router, and permit or deny Telnet (VTY)
access to or from a router. It essentially acts as a packet ltering rewall.
Lab 6.1: Standard IP Access-Lists 507
Command Meaning
any Wildcard command. Specifies any host or any network;
same as the 0.0.0.0 255.255.255.255 command.
0.0.0.0 255.255.255.255 Wildcard command; same as the any command.
ip access-group Applies an IP access-list to an interface.
access-class Applies a standard IP access list to a VTY line.
show access-list Shows all the access lists configured on the router.
show access-list 110 Shows only access-list 110.
show ip access-list Shows only the IP access lists.
show ip interface Shows which interfaces have IP access lists applied.
There are two types of access lists used with IP.
Standard access lists use only the source IP address in an IP packet to lter the network.
This basically permits or denies an entire suite of protocols. IPX standards can lter on
both source and destination IPX address.
Extended access lists these check for both source and destination IP address, protocol
eld in the Network layer header, and port number at the Transport layer header.
Once you create an access list, you apply it to an interface with either an inbound or
outbound list:
Inbound access lists packets are processes through the access list before being routed to
the outbound interface.
Outbound access lists packets are routed to the outbound interface and then processed
through the access list.
Lab 6.1: Standard IP Access-Lists
This lab will have you block access to network 172.16.40.0 from Host F. Access-lists can
be tricky because if you do not create your lists correctly, you can bring the network down.
There are two steps with access-lists:
N
Create an access-list
N
Apply an access-list
standard IP access-lists use source addresses for ltering packets. A collection of permit
and deny conditions is applied to IP addresses.
508 Access Lists
1. Double-click Host F.
Network Layout
Load Standard Layout.rsm or whatever you named the le when you saved your work
in earlier labs.
Lab 6.1: Standard IP Access-Lists 509
2. Verify that you can ping to the 2950 Switch A and that you can ping Host E from Host F.
C:\ping 172.16.40.2
Pinging 172.16.40.2 with 32 bytes of data:
Reply from 172.16.40.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.2 ;bytes=32 time=22ms TTL=254
Ping Statistics for 172.16.40.2:
Packets Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 22ms, Maximum = 23ms, Average = 22ms
C:\>ping 172.16.40.3
Pinging 172.16.40.3 with 32 bytes of data:
Reply from 172.16.40.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.3 ;bytes=32 time=22ms TTL=254
Ping Statistics for 172.16.40.3:
Packets Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 22ms, Maximum = 23ms, Average = 22ms
C:\>
510 Access Lists
3. From the Host F menu, bring up the console for the 2621 Router A.
4. Create an access-list that blocks access from host F trying to get to network 172.16.40.0.
2621A>enable
2621A#config t
2621A(config)#access-list 10 deny host 172.16.50.3
2621A(config)#access-list 10 permit any
That is all were going to do for the list. Remember that IP standard access-lists should
be created closest to the destination network, which is why we built that access-list on
2621 Router A. It is directly connected to network 172.16.40.0.
Lab 6.1: Standard IP Access-Lists 511
5. After creating an access-list for 2621 Router A, we now need to add the access-list to
the serial 0/0 interface of 2621 Router A.
2621A(config)#interface serial 0/0
2621A(config-if)#ip access-group 10 in
This applied the access-list 10 to the serial 0/0 interface of 2621 Router A and ltered
any incoming packets.
6. Check to see that Host F can no longer ping to 172.16.40.2 and 172.16.40.3.
C:\>ping 172.16.40.2
Pinging 172.16.40.2 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
C:\>
C:\>ping 172.16.40.3
Pinging 172.16.40.3 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
C:\>
512 Access Lists
7. If the access-list is correct, all other devices should still be able to reach network
172.16.40.0. Ping from 2621 Router B and verify that you can reach 172.16.40.2
and 172.16.40.3.
2621B#ping 172.16.40.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.40.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms
2621B#
2621B#ping 172.16.40.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.40.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms
2621B#
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 6.2: Verifying Standard
IP Access-Lists
Pinging and telnetting through the internetwork is a really good way to verify the network and
access-lists. However, using the Cisco IOS commands is also a good way to verify the lists.
Network Layout
Work with the saved network that you used to congure devices in lab 6.1.
Lab 6.2: Verifying Standard IP Access-Lists 513
Lab Steps
1. Bring up the console for 2621 Router A and type show access-list to see the list config-
ured on the router.
2621A(config-if)#ctrl+z
2621A#show access-list
Standard IP access list 10
deny 172.16.50.3
permit any
2621A#
2. You can also type either show ip access-list or show access-list 10 to gather specific list
configurations.
2621A#show access-list 10
Standard IP access list 10
deny 172.16.50.3
permit any
2621A#
3. To see which interface has access-lists applied, use the show ip interface command.
2621A#show ip interface
Serial0/0 is up, line protocol is up
Internet address is 172.16.20.2/24
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1514 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is 10
[output cut]
4. The show running-config is useful to see both the access-list and to verify the inter-
face where the access-list is applied.
2621Ashow run
[output cut]
!
interface Serial0/0
description connection to 2811A
514 Access Lists
ip address 172.16.20.2 255.255.255.0
no ip directed-broadcast
ip access-group 10 in
!
[output cut]
Lab 6.3: Applying an Access-List
to a VTY Line
You will have a difcult time trying to stop users from telneting into a router because any
active port on a router is fair game for VTY access. However, you can use a standard IP
access-list to control access by placing the access-list on the VTY lines themselves.
To perform this function:
1. Create a standard IP access-list that permits only the host or hosts you want to be able
to telnet into the routers.
2. Apply the access list to the VTY line with the access-class command.
This lab will have you stop Host F from telneting into 2621 Router A.
Network Layout
Work with the saved network that you used to congure devices in lab 6.2.
Lab 6.3: Applying an Access-List to a VTY Line 515
Lab Steps
1. Remove the access-list on 2621 Router A.
2621A#config t
2621A(config)#no access-list 10
2. Remove the access-list on the serial 0/0 interface of 2621 Router A.
2621A(config)#int s0/0
2621A(config-if)#no ip access-group 10 in
You can just type no access-list 10 on to remove the access-list, but you
must type the whole command from the interface to remove the list from
the interface on the router.
3. Verify that Host F can telnet into 2621 Router A.
C:\>telnet 172.16.20.2
Connecting To 172.16.20.2 ...
This is 2621 Router A
User Access Verification
Password:
2621A>
4. Exit from your telnet session.
2621A>exit
Connection to host lost.
C:\>
5. Connect to 2621 Router A and block telnet access for Host F, but allow all other
devices to telnet to the 2621 A router.
2621A#config t
2621A(config)#access-list 20 deny host 172.16.50.3
2621A(config)#access-list 20 permit any
6. Apply the access-list directly to the VTY lines and not to an interface.
2621A(config)#line vty 0 4
2621A(config-line)#access-class 20 in
2621A(config-line)#ctrl+z
2621A#
516 Access Lists
7. Verify that Host F can no longer telnet into 2621 Router A.
C:\>telnet 172.16.20.2
Connecting To 172.16.20.2 ...Could not open a connection to host: Connect
failed
C:\>
8. Use the Host F menu to go to the 2621 Router A console.
9. Verify that 2621 Router B can still telnet into 2621 Router A.
2621B#telnet 172.16.20.2
Trying 172.16.20.2 ... Open
This is 2621 Router A
User Access Verification
Password:
2621A>
Save Your File: Make sure you save the network layout le that you have been work-
ing on.
Lab 6.4: Extended IP Access-Lists
In this lab we will remove the standard IP access-list on 2621 Router A and create a new
access-list that is more succinct on 2621 Router A. We want Host F to use the services on
the 172.16.40.0 network, but we dont want them to telnet into 2950 Switch A.
Lab 6.4: Extended IP Access-Lists 517
Lab Steps
1. Remove the access-list on 2621 Router A.
2621A#config t
2621A(config)#no access-list 20
2. Bring up the Host F console by using 2621 Router As menu.
Network Layout
Work with the saved network that you used to congure devices in lab 6.3.
518 Access Lists
3. Verify that Host F can now ping 172.16.40.2 and 172.16.40.3.
C:\ping 172.16.40.2
Pinging 172.16.40.2 with 32 bytes of data:
Reply from 172.16.40.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.2 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.2 ;bytes=32 time=22ms TTL=254
Ping Statistics for 172.16.40.2:
Packets Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 22ms, Maximum = 23ms, Average = 22ms
C:\>ping 172.16.40.3
Pinging 172.16.40.3 with 32 bytes of data:
Reply from 172.16.40.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.3 ;bytes=32 time=22ms TTL=254
Reply from 172.16.40.3 ;bytes=32 time=22ms TTL=254
Ping Statistics for 172.16.40.3:
Packets Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 22ms, Maximum = 23ms, Average = 22ms
C:\>
4. Create an access-list on 2621 Router A to block telnet access into the 172.16.40.0 net-
work, but still allow Host F to ping Host E.
2621A#config t
2621A(config)#access-list 110 deny tcp host 172.16.50.3 172.16.40.0 0.0.0.255
eq telnet
2621A(config)#access-list 110 permit ip any any
This access-list blocked source address 172.16.50.3 from telneting into
172.16.40.0.
5. Apply this access-list to the serial interface 0/0 of 2621 Router A to filter the packets
coming into the router.
2621A(config)#int s0/0
2621A(config-if)#ip access-group 110 in
2621A(config-if)#ctrl+z
2621A#
Lab 6.5: Verifying Extended IP Access-lists 519
6. Test the access-list by trying to telnet 172.16.40.2 From Host F, (remember, you cannot
telnet to a host). All other devices should be able to telnet to 172.16.40.2.
C:\>telnet 172.16.40.2
Connecting To 172.16.40.2 ...Could not open a connection to host: Connect
failed
C:\
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 6.5: Verifying Extended
IP Access-lists
We will use the same command as we did to verify the IP Standard Access-Lists. Go
to 2621 Router A (if you created the list on 2621 Router A) and verify your access-list.
Remember that ping and telnet are really good tools to verify your network as well.
Network Layout
Work with the saved network that you used to congure devices in lab 6.4.
520 Access Lists
Lab Steps
1. From 2621 Router A, type the show access-list command to see the configured list.
2621A#show access-list
Extended IP access list 110
deny tcp host 172.16.50.3 172.16.40.0 0.0.0.255 eq telnet
permit ip any any
2621A#
2. Use the show access-list 110 command to see only list 110.
2621A#show access-list 110
Extended IP access list 110
deny tcp host 172.16.50.3 172.16.40.0 0.0.0.255 eq telnet
permit ip any any
2621A#
3. You can also use show ip access-list to see only the IP access-list configured on
your router.
2621A#show ip access-list
Extended IP access list 110
deny tcp host 172.16.50.3 172.16.40.0 0.0.0.255 eq telnet
permit ip any any
2621A#
4. Verify which interface has an access-list set by using the show ip interface command
on 2621 Router A.
2621A#show ip interface
Serial0/0 is up, line protocol is up
Internet address is 172.16.20.2/24
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1514 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is 110
[output cut]
2621A#
Lab 6.6: Removing Extended IP Access-lists 521
Lab 6.6: Removing Extended
IP Access-lists
To remove the extended IP access-list, perform the following steps.
Lab Steps
1. Remove the access-list on 2621 Router A.
2621A#config t
2621A(config)#no access-list 110
2. Remove the access-list on the serial 0/0 interface of 2621 Router A.
2621A(config)#interface serial 0/0
2621A(config-if)#no ip access-group 110 in
You can just type no access-list 110 on to remove the access-list, but you
must type the whole command from the interface to remove the list from
the interface on the router.
Network Layout
Work with the saved network that you used to congure devices in lab 6.4.
522 Access Lists
3. Verify that you have removed the extended IP access-list.
2621A(config)#show run
[output cut]
!
interface Serial0/0
description connection to 2811A
ip address 172.16.20.2 255.255.255.0
no ip directed-broadcast
!
[output cut]
Practice Scenario: NAT and ACLs
Configuring ACLs for Telnet and SSH
Now that you have learned about some concepts and completed some hands-on work, try
your problem-solving and troubleshooting skills with the following task. To complete your
task you will need a network to interact with a scenario and the task(s) at hand.
When you have nished with this scenario ...
You can check your work by clicking the Grade Me button in the upper right hand corner
of the Network Visualizer screen.
You will see a report that will display:
N
The name of the command entered for this scenario
N
The expected configuration
N
Your configuration
Lab 6.6: Removing Extended IP Access-lists 523
N
The result for each command. You will see a green check mark (meaning that you got
it correct) or a red X
N
A score of the number of correct answers out of the total possible
Network Layout
On the Network Visualizer screen, click on the Labs menu then choose Practice Sce-
narios, NAT and ACLs, and Conguring ACLs for Telnet and SSH.
524 Access Lists
Turn On Hostnames
In some of the practice labs we refer to the hostname of a device. Therefore, we need to
make sure that Hostnames is turned on for this lab. On the Network Visualizer screen click
View and then click Hostnames so that it has a checkmark next to it.
Scenario
Colorado Company RouterSim is planning and designing their new corporate Internetwork.
You are the network administrator for the Denver network. Develop an extended access list
that will block the California network from telneting into the DNVR_RTR router.
Task
Congure access-list 150 on the DNVR_RTR router as close as possible to the source
network. Set it up so that any router or switch in the 172.16.40 network is blocked.
NAT/PAT
Lab 7.1: Configuring
Dynamic NAT
This section will show you how to congure NAT to translate from real ISP assigned
addresses to private addresses so that the inside network can communicate to the Internet.
Network Layout
Use the network the you worked with in ICND1 lab 5.1. The network is Nat-Pat Layout.rsm
or whatever you renamed it in the earlier lab. If you have not completed that lab, please
go back and go through it.
Lab 7.1: Configuring Dynamic NAT 527
Lab Steps
1. In this step, youll configure a dynamic NAT pool on 2811 Router B. Create a pool
of addresses called RouterSim on 2811 Router B. The pool should contain a range of
addresses of 171.16.10.50 through 171.16.10.55.
2811B(config)#ip nat pool RouterSim 171.16.10.50 171.16.10.55 net
255.255.255.0
2. Create access-list 1. This list permits traffic from the 192.168.20.0 and 192.168.10.0
network to be translated.
2811B(config)#access-list 1 permit 192.168.20.0 0.0.0.255
2811B(config)#access-list 1 permit 192.168.10.0 0.0.0.255
3. Map the access list to the pool that was created.
2811B(config)#ip nat inside source list 1 pool RouterSim
4. Configure fa0/0 as an inside NAT interface.
2811B(config)#int fa0/0
2811B(config-if)#ip nat inside
5. Configure serial 0/0/0 as an outside NAT interface.
2811B(config-if)#int s0/0/0
2811B(config-if)#ip nat outside
6. Bring up the console for 2811 Router D. Telnet from 2811 Router D to 2811
Router Ado not disconnect.
2811D#telnet 171.16.10.1
Trying 171.16.10.1 ... Open
Password required, but none set
[Connection to 171.16.10.1 closed by foreign host]
2811D#
We received this message because we did not set up a telnet password on 2811 Router A.
7. Go to the 2811 A router and set up a telnet password.
2811A#config t
2811ARouter(config)#line vty 0 1180
2811ARouter(config-line)#password todd2
8. Try step 6 again and if you are successful, move on to step 9.
528 NAT/PAT
9. Bring up the console for 2811 Router C. Telnet from the 2811 Router C to 2811
Router Ado not disconnect.
2811C#telnet 171.16.10.1
10. Go back to 2811 Router A and execute the command show users. (This shows who is
accessing the VTY lines).
2811A#show users
Line User Host(s) Idle Location
0 con 0 idle 00:00:00
2 vty 0 idle 00:00:40 171.16.10.50
* 3 vty 1 idle 00:00:17 171.16.10.51
Interface User Mode Idle Peer Address
2811A#
Notice that there is a one-to-one translation. Which means you must have a real IP
address for every host that wants to get to the Internet, which is not always possible.
11. Leave the session open on 2811 Router A and connect back to 2811 Router B.
12. Bring up the console for 2811 Router B and view your current translations by entering
the show ip nat translation command. You should see something like this:
2811B#sh ip nat translations
Pro Inside global Inside local Outside local Outside global
--- 171.16.10.50 192.168.20.2 --- ---
--- 171.16.10.51 192.168.10.2 --- ---
2811B#
Remember that the inside local is before translation and the inside global is after
translation, and how you are known on the Internet.
Exit out of the telnet session from 2811 Router D.
13. If you turn on debug ip nat on 2811 Router B and then ping through the router from
2811 Router D, you will see the actual NAT process take place, which will look some-
thing like this:
2811B#debug ip nat
2811D#ping 171.16.10.1
2811B#
Feb 27 17:16:18.256: NAT*: s=192.168.20.2->171.16.10.52, d=171.16.10.1 [1]
Feb 27 17:16:18.260: NAT*: s=171.16.10.1->171.16.10.52, d=192.168.20.2 [1]
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 7.2: Configuring PAT 529
Lab 7.2: Configuring PAT
Port Address Translation (PAT), also called NAT Overload, uses TCP and UDP port
numbers to uniquely identify hosts on the inside network so that everyone on the inside
network can use only one real IP address to send packets to the Internet. Static NAT is a
one-for-one translation, which means that each host uses a unique real IP address to send
packets to the Internet. By using PAT, we save address space by using only one real IP
address for all hosts.
In this lab, youll congure Port Address Translation (PAT) on 2811 Router B. We will
use PAT because we dont want a one-to-one translation, but instead we want to just use
one IP address for every user on the network.
Network Layout
Use the network you worked with in lab 7.1.
530 NAT/PAT
Lab Steps
1. Terminate the telnet sessions on 2811 Router C by using the exit command.
2. On the 2811 Router B, delete the translation table and remove the dynamic NAT pool.
2811B#clear ip nat translation *
2811B#config t
2811B(config)#no ip nat pool RouterSim 171.16.10.50 171.16.10.55 netmask
255.255.255.0
2811B(config)#no ip nat inside source list 1 pool RouterSim
3. On 2811 Router B, create a NAT pool with one address called Lammle. The pool
should contain a single address 171.16.10.100. Enter the command below:
2811B(config)#ip nat pool Lammle 171.16.10.100 171.16.10.100 netmask
255.255.255.0
4. Create access-list 2. It should permit networks 192.168.20.0 and 192.168.10.0 to be
translated.
2811B(config)#access-list 2 permit 192.168.20.0 0.0.0.255
2811B(config)#access-list 2 permit 192.168.10.0 0.0.0.255
5. Map the access-list 2 to the new pool, allowing PAT to occur by using the overload
command.
2811B(config)#ip nat inside source list 2 pool Lammle overload
6. Bring up the console for 2811 Router D and telnet to 2811 Router A. Then bring up the
2811 Router C and telnet to 2811 Router A.
7. From the ISP router use the show users command. The output should look something
like this:
2811A>sh users
Line User Host(s) Idle Location
0 con 0 idle 00:00:00
2 vty 0 idle 00:00:29 171.16.10.100
* 3 vty 1 idle 00:00:21 171.16.10.100
Interface User Mode Idle Peer Address
2811A>
Lab 7.3: NAT/PAT Final Configuration Exercise 531
8. From 2811 Router B use the show ip nat translations command.
2811B#sh ip nat translations
Pro Inside global Inside local Outside local Outside global
tcp 171.16.10.100:1723 192.168.10.2:1723 171.16.10.1:23 171.16.10.1:23
tcp 171.16.10.100:1723 192.168.20.2:1723 171.16.10.1:23 171.16.10.1:23
2811B#
9. Exit the telnet session from 2811 Router D.
10. Also make sure that the debug ip nat command is on 2811 Router B. If you ping from
2811 Router C to 2811 Router A, the output will look like this:
01:12:36: NAT: s=192.168.10.2->171.16.10.100, d=171.16.10.1 [35]
01:12:36: NAT*:s=171.16.10.1, d=171.16.10.100->192.168.10.2 [35]
01:12:36: NAT*:s=192.168.10.2->171.16.10.100, d=171.16.10.1 [36]
01:12:36: NAT*:s=171.16.10.1, d=171.16.10.100->192.168.10.2 [36]
01:12:36: NAT*:s=192.168.10.2->171.16.10.100, d=171.16.10.1 [37]
01:12:36: NAT*:s=171.16.10.1, d=171.16.10.100->192.168.10.2 [37]
01:12:36: NAT*:s=192.168.10.2->171.16.10.100, d=171.16.10.1 [38]
01:12:36: NAT*:s=171.16.10.1, d=171.16.10.100->192.168.10.2 [38]
01:12:37: NAT*:s=192.168.10.2->171.16.10.100, d=171.16.10.1 [39]
01:12:37: NAT*:s=171.16.10.1, d=171.16.10.100->192.168.10.2
Lab 7.3: NAT/PAT Final Configuration
Exercise
In this lab, you will congure two routers and a host so that the inside network can com-
municate with the outside network using Port Address Translation. You will not use the
network layout used previously. You have six public IP address assigned to your company:
198.18.194.73 -78. There are 30 hosts that need to access the Internet simultaneously.
N
Hosts range on the inside network is 192.168.35.65- 94
N
Inside global addresses are 198.18.194.73-78/29
N
Inside local addresses are 192.168.35.65-94/27
532 NAT/PAT
Lab Steps
1. Double-click 2811 Router B to open the console screen.
Network Layout
Load Nat-Pat Final Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le Nat-Pat Final Layout and click Open.
Lab 7.3: NAT/PAT Final Configuration Exercise 533
2. Configure 2811 Router B.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname 2811B
2811B(config)#int fa0/0
2811B(config-if)#ip address 192.168.35.94 255.255.255.224
2811B(config-if)#no shut
2811B(config-if)#int s0/0/0
2811B(config-if)#ip address 192.0.2.157 255.255.255.252
2811B(config-if)#clock rate 1000000
2811B(config-if)#no shut
2811B(config-if)#ctrl+z
2811B#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811B#
3. Configure 2811 Router A with IP addresses and default routing.
Router>en
Router#config t
Router(config)#hostname 2811A
2811A(config)#int s0/0/1
2811A(config-if)#ip address 192.0.2.158 255.255.255.252
2811A(config-if)#no shut
2811A(config-if)#exit
2811A(config)#ip route 0.0.0.0 0.0.0.0 192.0.2.157
4. Configure your host with the IP address 192.168.35.65/27. Dont forget to set your
default-gateway.
5. Create an inside source list that will allow the inside hosts to access the NAT pool and
allow the use of PAT.
2811B#config t
2811B(config)#ip nat inside source list 10 pool 2811B overload
6. Next, create an access-list for IP range 192.168.35.65-94/27.
2811B(config)#access-list 10 permit 192.168.35.64 0.0.0.31
534 NAT/PAT
7. Verify your access-list.
2811B(config)#do show run
Building configuration...
!
Current configuration : 960 bytes
!
access-list 10 permit 192.168.35.64 0.0.0.31
[output cut]
2811B(config)#do show access-lists
Standard IP access list 10
10 permit 192.168.35.64, wildcard bits 0.0.0.31
2811B(config)#
8. Create the pool with the six available global hosts IP addresses.
2811B(config)#ip nat pool 2811B 198.18.194.73 198.18.194.78 netmask
255.255.255.248
9. Configure the interfaces for use with NAT.
2811B(config)#int fa0/0
2811B(config-if)#ip nat inside
2811B(config-if)#int s0/0/0
2811B(config-if)#ip nat outside
2811B(config-if)#exit
2811B(config)#exit
2811B#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811B#
10. Change the console screen to Host A and then ping 2811 Router A.
C:\ping 192.0.2.158
11. Change to the console screen for 2811 Router B and verify your NAT/PAT configura-
tion by enabling debug ip nat.
2811B#debug ip nat
IP NAT debugging is on
Lab 7.3: NAT/PAT Final Configuration Exercise 535
Dec 3 16:48:09.484: NAT*: s=192.168.35.65->198.18.194.73, d=192.0.2.158 [1]
Dec 3 16:48:09.500: NAT*: s=192.0.2.158->198.18.194.73, d=192.168.35.65 [1]
2811B#
12. Verify your NAT table with the following command:
2811B#sh ip nat translations
Pro Inside global Inside local Outside local Outside global
icmp 198.18.194.74:1 192.168.35.65:1 192.0.2.158:1 192.0.2.158:1
2811B#
13. Delete the NAT/PAT configuration on your routers.
14. Reconfigure the router with the following IP addresses on 2811 Router B (try to
configure this without looking at the answers for the NAT/PAT configuration we
just finished):
Interface f0/0: 192.168.76.94/27
Interface s0/0/0: 192.0.2.165/30
Inside global: 198.18.149.113-118/29
Inside local: 192.168.76.65-94/27
15. Verify your NAT configuration.
VLSM with
Summarization
Lab 8.1: VLSM with
Summarization Lab
Configuring Routers
The following lab will have you congure a medium size network into block sizes of 32 (/27)
using the EIGRP routing protocol and summarizing the classless boundaries. The switches
will not be congured in this lab and they will behave just like hubs. You will congure each
router in the lab with the appropriate IP addressing and verify the conguration in lab 8.2.
Network Layout
Load VLSM Layout.rsm before going through the following lab.
1. On the Network Visualizer screen, click on the File menu and then click Open.
2. When the dialog box appears, make sure you are in the Networks folder.
3. Click on the le VLSM Layout.rsm and click Open.
Lab 8.1: VLSM with Summarization LabConfiguring Routers 539
Routers 2811 A through 2811 E will be congured in the 192.168.10.32/27 network and
routers 2811 F through 2811 J will be congured in the 192.168.10.64/27 network. In each
network there are four block sizes of four (the WAN links) and two block sizes of eight
(the LANs).
To connect routers 2811 A and 2811 F across the backbone, we will use the 10.1.1.0/24
network. This is called discontiguous networking because we have one class of network
(192.168.10.0) connecting across to the same network address through the 10.0.0.0 network
and this will not work by default. RIPv1 and IGRP can never work in this type of network. In
order to use VLSM with discontiguous networking in your network, you must use one the fol-
lowing routing protocols: RIPv2, EIGRP, OSPF or ISIS (these are considered classless routing
protocols). This lab will have you use EIGRP as the classless routing protocol.
Here is the IP addressing scheme used in this lab for routers 2811 A through 2811 E:
(notice how the four block sizes of four, and two block sizes of eight t in one block size of
32VLSM network addressing).
Router Block Sizes
2811 Router A S0/0/0: 192.168.10.37/30 (subnet 36, block size of 4)
S0/0/1: 192.168.10.33/30 (subnet 32, block size of 4)
F0/0: 10.1.1.1/24
2811 Router B S0/0/0: 192.168.10.41/30 (subnet 40, block size of 4)
S0/0/1: 192.168.10.34/30 (subnet 32, connected to s0/0/1 of 2811
Router A)
2811 Router C S0/0/0: 192.168.10.45/30 (subnet 44, block size of 4)
S0/0/1: 192.168.10.38/30 (subnet 36, connected to s0/0/0 of 2811
Router A)
2811 Router D S0/0/0: 192.168.10.42/30 (connected to s0/0/0 of router 2811 B)
F0/0: 192.168.10.49/29 (subnet 48, block size of 8)
Discontiguous Networking
When a major network like 192.168.10.0 is separated by a different major network like
10.0.0.0. Example: The 192.168.10.0/24 network can be subnetted into two or more net-
works. The networks 192.168.10.36/30 and 192.168.10.80/29 are congured on different
routers. The routers are using the 10.0.0.0 network to connect to each other, thus one
major network being separated by another major network.
540 VLSM with Summarization
Router Block Sizes
2811 Router E S0/0/0: 192.168.10.46/30 (connected to s0/0/0 of router 2811 C)
F0/0: 192.168.10.57/29 (subnet 56, block size of 8)
2811 Router F S0/0/0: 192.168.10.69/30 (subnet 64, block size of 4)
S0/0/1: 192.168.10.65/30 (subnet 68, block size of 4)
F0/0: 10.1.1.2/24
2811 Router G S0/0/0: 192.168.10.73/30 (subnet 72, block size of 4)
S0/0/1: 192.168.10.66/30 (subnet 64, connected to s0/0/1 of 2811
Router F)
2811 Router H S0/0/0: 192.168.10.77/30 (subnet 76, block size of 4)
S0/0/1: 192.168.10.70/30 (subnet 68, connected to s0/0/0 of 2811
Router F)
2811 Router I S0/0/0: 192.168.10.74/30 (connected to s0/0/0 of router 2811 G)
F0/0: 192.168.10.81/29 (subnet 80, block size of 8)
2811 Router J S0/0/0: 192.168.10.78/30 (connected to s0/0/0 of router 2811 H)
F0/0: 192.168.10.89 (subnet 88, block size of 8)
Lab Steps
1. Double-click on 2811 Router A to bring up the console screen.
2. Configure 2811 Router A.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811A
2811A(config)#int s0/0/0
2811A(config-if)#ip address 192.168.10.37 255.255.255.252
2811A(config-if)#no shut
2811A(config-if)#int s0/0/1
2811A(config-if)#ip address 192.168.10.33 255.255.255.252
2811A(config-if)#no shut
2811A(config-if)#int f0/0
(continued)
Lab 8.1: VLSM with Summarization LabConfiguring Routers 541
2811A(config-if)#ip address 10.1.1.1 255.255.255.0
2811A(config-if)#no shut
2811A(config-if)#ctrl+z
2811A#copy run start
3. Change to the console for 2811 Router B.
4. Configure 2811 Router B.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811B
2811B(config)#int s0/0/0
2811B(config-if)#ip address 192.168.10.41 255.255.255.252
2811B(config-if)#no shut
2811B(config-if)#int s0/0/1
2811B(config-if)#ip address 192.168.10.34 255.255.255.252
2811B(config-if)#no shut
2811B(config-if)#ctrl+z
2811B#copy run start
5. Change to the console for 2811 Router C.
6. Configure 2811 Router C.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811C
2811C(config)#int s0/0/0
2811C(config-if)#ip address 192.168.10.45 255.255.255.252
2811C(config-if)#no shut
2811C(config-if)#int s0/0/1
2811C(config-if)#ip address 192.168.10.38 255.255.255.252
2811C(config-if)#no shut
2811C(config-if)#ctrl+z
2811C#copy run start
7. Change to the console for 2811 Router D.
8. Configure 2811 Router D.
Router>en
Router#config t
542 VLSM with Summarization
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811D
2811D(config)#int s0/0/0
2811D(config-if)#ip address 192.168.10.42 255.255.255.252
2811D(config-if)#no shut
2811D(config-if)#int f0/0
2811D(config-if)#ip address 192.168.10.49 255.255.255.248
2811D(config-if)#no shut
2811D(config-if)#exit
2811D(config-if)#ctrl+z
2811D#copy run start
9. Change to the console for 2811 Router E.
10. Configure 2811 Router E.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811E
2811E(config)#int s0/0/0
2811E(config-if)#ip address 192.168.10.46 255.255.255.252
2811E(config-if)#no shut
2811E(config-if)#int f0/0
2811E(config-if)#ip address 192.168.10.57 255.255.255.248
2811E(config-if)#no shut
2811E(config-if)#ctrl+z
2811E#copy run start
11. Change to the console for 2811 Router F.
12. Configure 2811 Router F.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811F
2811F(config)#int s0/0/0
2811F(config-if)#ip address 192.168.10.69 255.255.255.252
2811F(config-if)#no shut
2811F(config-if)#int s0/0/1
2811F(config-if)#ip address 192.168.10.65 255.255.255.252
2811F(config-if)#no shut
2811F(config-if)#int f0/0
Lab 8.1: VLSM with Summarization LabConfiguring Routers 543
2811F(config-if)#ip address 10.1.1.2 255.255.255.0
2811F(config-if)#no shut
2811F(config-if)#ctrl+z
2811F#copy run start
13. Change to the console for 2811 Router G.
14. Configure 2811 Router G.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811G
2811G(config)#int s0/0/0
2811G(config-if)#ip address 192.168.10.73 255.255.255.252
2811G(config-if)#no shut
2811G(config-if)#int s0/0/1
2811G(config-if)#ip address 192.168.10.66 255.255.255.252
2811G(config-if)#no shut
2811G(config-if)#ctrl+z
2811G#copy run start
15. Change to the console for 2811 Router H.
16. Configure 2811 Router H.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811H
2811H(config)#int s0/0/0
2811H(config-if)#ip address 192.168.10.77 255.255.255.252
2811H(config-if)#no shut
2811H(config-if)#int s0/0/1
2811H(config-if)#ip address 192.168.10.70 255.255.255.252
2811H(config-if)#no shut
2811H(config-if)#ctrl+z
2811H#copy run start
17. Change to the console for 2811 Router I.
18. Configure 2811 Router I.
Router>en
Router#config t
544 VLSM with Summarization
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811I
2811I(config)#int s0/0/0
2811I(config-if)#ip address 192.168.10.74 255.255.255.252
2811I(config-if)#no shut
2811I(config-if)#int f0/0
2811I(config-if)#ip address 192.168.10.81 255.255.255.248
2811I(config-if)#no shut
2811I(config-if)#ctrl+z
2811I#copy run start
19. Change to the console for 2811 Router J.
20. Configure 2811 Router J.
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname 2811J
2811J(config)#int s0/0/0
2811J(config-if)#ip address 192.168.10.78 255.255.255.252
2811J(config-if)#no shut
2811J(config-if)#int f0/0
2811J(config-if)#ip address 192.168.10.89 255.255.255.248
2811J(config-if)#no shut
2811J(config-if)#ctrl+z
2811J#copy run start
Rename and Save Your File: Make sure you save the actual network layout le that
you have been working with. You might want to save it to another le name than VLSM
Layout.rsm. This allows you to start over with a non-congured network if you wish.
1. There are two ways you can save a network layout. The first way is by clicking on the
Diskette button on the button bar, at the top of the Network Visualizer screen. You
can also click File on the menu and choose Save from the drop down menu.
Lab 8.2: VLSM with Summarization LabConfiguring Hosts 545
2. A dialog box will appear. At the bottom you will see the file name VLSM Layout.rsm.
Rename the file. In the following example it is renamed to My VLSM Layout.rsm.
3. Click the Save button. At this point your network layout has been saved to a new name.
You then have the option of reloading VLSM Layout.rsm which is not configured.
Lab 8.2: VLSM with Summarization
LabConfiguring Hosts
We will now congure all the hosts in the network.
Network Layout
Use the saved network you were working with in Lab 8.1.
546 VLSM with Summarization
Lab Steps
1. Right-click on Host A.
2. Click on the Configs button.
3. On Host A configure:
N
IP Address
N
Subnet Mask
N
Default Gateway
IP Address:192.168.10.50
Subnet Mask: 255.255.255.248
Default Gateway:192.168.10.49
4. Click the OK button and then the Close button.
5. On Host B configure:
N
IP Address
N
Subnet Mask
N
Default Gateway
Lab 8.4: VLSM with Summarization LabConfiguring EIGRP 547
IP Address:192.168.10.58
Subnet Mask: 255.255.255.248
Default Gateway:192.168.10.57
6. Click the OK button and then the Close button.
7. On Host C configure:
N
IP Address
N
Subnet Mask
N
Default Gateway
IP Address:192.168.10.82
Subnet Mask: 255.255.255.248
Default Gateway:192.168.10.81
8. Click the OK button and then the Close button.
9. On Host D configure:
N
IP Address
N
Subnet Mask
N
Default Gateway
IP Address:192.168.10.90
Subnet Mask: 255.255.255.248
Default Gateway:192.168.10.89
10. Click the OK button and then the Close button.
Save Your File: Make sure you save the network layout le that you have been working on.
Lab 8.4: VLSM with Summarization
LabConfiguring EIGRP with
Discontiguous Networking
In this lab you will congure the classless routing protocol EIGRP on each router. EIGRP is an
advanced Distance Vector routing protocol that supports VLSM and discontiguous networks.
In addition, it can be used to manually summarize contiguous network boundaries, which is
what we have.
Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco proprietary hybrid
routing protocol. It uses the properties of both distance vector and link state and uses
an administrative distance of 90, so it will automatically overwrite RIP (which has a
548 VLSM with Summarization
default administrative distance of 120) routes in the routing table. Also, it uses autono-
mous systems (AS) to create groups of routers that share routing information. The major
difference between IGRP and EIGRP is that EIGRP uses three different tables to create
a stable routing environment and additionally EIGRP only sends updates when needed
whereas IGRP broadcasts routing table entries every 90 seconds.
Remember that although EIGRP is considered a classless routing protocol (which
means it sends subnet mask information with each route update), it is congured in a
classful manner. What this means is that you turn off all subnet bits and host bits to
add each network statementwhich is why the network statement is 192.168.10.0, not
192.168.10.32, 192.168.10.36, etc. for each subnet. EIGRP will nd the subnets; you
dont type subnets in with the network statement.
Router A is directly connected to the 192.168.10.0 network, but also the 10.1.1.0/24
network is directly connected off of F0/0. What is the network statement we will use?
Remember, ALL subnet bits and host bits are off!
Add EIGRP with AS 10 to each router, using the correct network statement. Also, add
the network statement of network 192.168.10.0 under EIGRP 10 for each router, except
for routers A and F, which will need the network 10.0.0.0 statement as well.
Network Layout
Use the network you were working with in Lab 8.2.
Lab 8.4: VLSM with Summarization LabConfiguring EIGRP 549
Lab Steps
1. From each router global configuration prompt, add the routing protocol EIGRP with
an AS number of 10:
2811A>en
2811A#config t
2811A(config)#router eigrp 10
2811A(config-router)#network 192.168.10.0
2811A(config-router)#network 10.0.0.0
2811A(config)#auto-summary
2811A(config-router)#
2811B>en
2811B#config t
2811B(config)#router eigrp 10
2811B(config-router)#network 192.168.10.0
2811B(config)#auto-summary
2811B(config-router)#
2811C>en
2811C#config t
2811C(config)#router eigrp 10
2811C(config-router)#network 192.168.10.0
2811C(config)#auto-summary
2811C(config-router)#
2811D>en
2811D#config t
2811D(config)#router eigrp 10
2811D(config-router)#network 192.168.10.0
2811D(config)#auto-summary
2811D(config-router)#
2811E>en
2811E#config t
2811E(config)#router eigrp 10
2811E(config-router)#network 192.168.10.0
2811E(config)#auto-summary
2811E(config-router)#
2811F>en
2811F#config t
2811F(config)#router eigrp 10
2811F(config-router)#network 192.168.10.0
2811F(config-router)#network 10.0.0.0
550 VLSM with Summarization
2811F(config)#auto-summary
2811F(config-router)#
2811G>en
2811G#config t
2811G(config)#router eigrp 10
2811G(config-router)#network 192.168.10.0
2811G(config)#auto-summary
2811G(config-router)#
2811H>en
2811H#config t
2811H(config)#router eigrp 10
2811H(config-router)#network 192.168.10.0
2811H(config)#auto-summary
2811H(config-router)#
2811I>en
2811I#config t
2811I(config)#router eigrp 10
2811I(config-router)#network 192.168.10.0
2811I(config)#auto-summary
2811I(config-router)#
2811J>en
2811J#config t
2811J(config)#router eigrp 10
2811J(config-router)#network 192.168.10.0
2811J(config)#auto-summary
2811J(config-router)#
2. Now that we have added our directly connected networks under EIGRP (remember,
add networks, not subnets!), we need to configure 2811 Router A and 2811 Router F to
work using discontiguous networking. Take a look at the routing table of each router
and notice that you can see the subnets in the routing table from each contiguous net-
work only (2811 Router A through 2811 Router E and 2811 Router F through 2811
Router J). This is because discontiguous networking does not work by default.
2811A(config-router)#ctrl+z
2811A#sh ip route
2811F(config-router)#ctrl+z
2811F#sh ip route
Lab 8.4: VLSM with Summarization LabConfiguring EIGRP 551
3. We need to add the no auto-summary command to 2811 Router A and 2811 Router F
to have this work.
2811A#config t
2811A(config)#router eigrp 10
2811A(config-router)#no auto-summary
2811F#config t
2811F(config)#router eigrp 10
2811F(config-router)#no auto-summary
4. Now, lets take a look at the routing tables of each router and notice that ALL subnets
are now listed in each routers routing table.
2811J#show ip route
[output cut]
10.0.0.0/24 is subnetted, 1 subnets
D 10.1.1.0 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
192.168.10.0/24 is variably subnetted, 12 subnets, 2 masks
D 192.168.10.44/30 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
D 192.168.10.68/30 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
D 192.168.10.32/30 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
Auto-summary
The process of taking subnets like 192.168.10.4/30 or 192.168.10.56/29 and sum-
marizing them down to their base network class. In the case of 192.168.10.4/30 or
192.168.10.56/29 the networks are summarized to their Class C base network address
of 192.168.10.0/24.
No auto-summary
The process of taking the subnets like 192.168.10.4/30 or 192.168.10.56/29 and not
summarizing them down to their base network class. In the case of 192.168.10.4/30 or
192.168.10.56/29, the networks are never summarized to their Class C base network
address of 192.168.10. /24 when classful network boundaries are encountered.
552 VLSM with Summarization
C 192.168.10.76/30 is directly connected, Serial0/0/0
C 192.168.10.88/29 is directly connected, FastEthernet0/0
D 192.168.10.36/30 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
D 192.168.10.40/30 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
D 192.168.10.64/30 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
D 192.168.10.48/29 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
D 192.168.10.80/29 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
D 192.168.10.72/30 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
D 192.168.10.56/29 [90/2172416] via 192.168.10.77, 00:12:01, Serial0/0/0
5. This is a small network and the routing tables are manageable.. However, if we had
more routers, our routing tables would be rather large, which takes up memory and
router processing parsing the routing table. What can we do to make our routing table
smaller, more efficient, yet still keep all our connectivity from end to end? You guessed
it! Summarization baby!
Lab 8.5: VLSM with Summarization
LabConfiguring Summarization
Now that we have congured the internetwork from end to end using VLSM and discontiguous
networking, and EIGRP with the no auto-summary command to support the discontiguous net-
work, it is time to congure summarization.
Summarization would be done on the boundaries of each contiguous congured net-
work (routers 2811 A and 2811 F). Summarization is used by EIGRP under the interface
conguration using the ip summary-address eigrp 10 network mask command.
Before we add the summary commands to routers 2811 A and 2811 F, we need to know
what network and mask to add to the summary command. Remember, summary addresses
are congured in block sizes, just like subnets. The summary address for the 2811 Router A
would be 192.168.10.32, since we are starting at subnet 32; however, what is our summary
mask? Well, what is the block size of our contiguous networks? Thirty-two (32). What mask
provides a block size of 32? A /27, which is 255.255.255.224; this is our summary mask.
For the 2811 F conguration, we would start at subnet 192.168.10.64, which is also a
summary mask of /27, since the contiguous networks t in a block size of 32.
Lab 8.5: VLSM with Summarization LabConfiguring Summarization 553
Lab Steps
1. Here is our configuration on both routers:
2811A#config t
2811A(config)#interface fa0/0
2811A(config-if)#ip summary-address eigrp 10 192.168.10.32 255.255.255.224
2811F#config t
2811F(config)#interface fa0/0
2811F(config-if)#ip summary-address eigrp 10 192.168.10.64 255.255.255.224
At this point, we have disabled automatic summarization under EIGRP since we need
to support discontiguous networking. We then congured manual summarization at
contiguous classful boundaries.
2. If we take a look at the routing tables now, we can see that 2811 Router A is summa-
rizing the contiguous network with a 192.168.10.32/27 route into the 2811 Router F
routing tables, which is then sent to the other routers connected to 2811 Router F.
2811F>en
2811F#show ip route
Network Layout
Use the network you were working with in Lab 8.4.
554 VLSM with Summarization
[output cut]
192.168.10.0/24 is variably subnetted, 7 subnets, 3 masks
C 192.168.10.64/30 is directly connected, Serial0/0/1
D 192.168.10.80/29 [90/2172416] via 192.168.10.66, 00:05:49, Serial0/0/1
C 192.168.10.68/30 is directly connected, Serial0/0/0
D 192.168.10.72/30 [90/2172416] via 192.168.10.66, 00:05:49, Serial0/0/1
D 192.168.10.76/30 [90/2172416] via 192.168.10.70, 00:05:49, Serial0/0/0
D 192.168.10.32/27 [90/2172416] via 10.1.1.1, 00:05:49, FastEthernet0/0
D 192.168.10.88/29 [90/2172416] via 192.168.10.70, 00:05:49, Serial0/0/0
10.0.0.0/24 is subnetted, 1 subnets
C 10.1.1.0 is directly connected, FastEthernet0/0
3. For 2811 Router A, the routing table now looks like this, which is sent to all routers
connected to 2811 Router A.
2811A#show ip route
[output cut]
10.0.0.0/24 is subnetted, 1 subnets
C 10.1.1.0 is directly connected, FastEthernet0/0
192.168.10.0/24 is variably subnetted, 7 subnets, 3 masks
C 192.168.10.36/30 is directly connected, Serial0/0/0
D 192.168.10.64/27 [90/2172416] via 10.1.1.2, 00:02:53, FastEthernet0/0
D 192.168.10.44/30 [90/2172416] via 192.168.10.38, 00:02:53, Serial0/0/0
D 192.168.10.40/30 [90/2172416] via 192.168.10.34, 00:02:53, Serial0/0/1
D 192.168.10.48/29 [90/2172416] via 192.168.10.34, 00:02:53, Serial0/0/1
C 192.168.10.32/30 is directly connected, Serial0/0/1
D 192.168.10.56/29 [90/2172416] via 192.168.10.38, 00:02:53, Serial0/0/0
Our routing tables are smaller, more efcient, and easier for IP to parse.
Individual Labs
(Comprehensive)
Introduction to
Individual Labs
We offer CCNA labs that are comprehensive and self-contained. They stand on their own, and
do not require congurations from prior labs. These labs are typically longer than the accumu-
lative labs because you are starting with a non-congured network each time you bring up an
Individual lab. You are totally conguring the network for each lab, from beginning to nish.
We provide step-by-step instructions for these labs.
Grading
When you have nished with each Individual lab ...
You can check your work by clicking the Grade Me button in the upper right hand
corner of the Network Visualizer screen.
You will see a report that will display:
N
The name of the command entered for this lab
N
The expected configuration
N
Your configuration
N
The result for each command. You will see a green checkmark (meaning that you
got it correct) or a red X
N
A score of the number of correct answers out of the total possible
Individual Lab: RIP Routing 557
Individual Lab: RIP Routing
Conguring the routers with static and default routing is interesting to say the least. However,
it is not very often that you would use just static and default routing in a network these days.
This lab will have you congure Routing Information Protocol (RIP), one of the rst dynamic
routing protocols created. It is easy and works pretty well in small to medium size networks.
Enter all commands in lower case. The programs grading feature expects
lower case and may count an answer wrong if it is in upper case.
When you have nished with this lab ...
You can check your work by clicking the Grade Me button in the upper right hand
corner of the Network Visualizer screen.
RIP
N
Stands for routing information protocol.
N
Sends routing-update messages at regular intervals (usually every 30 seconds)
and when the network topology changes.
N
Uses a single metric called a hop, which measures the distance between the
source and destination.
N
Is limited to a hop count of 15. It has a maximum hop count. This means a network
cannot be more than 15 hops from the source to the destination. Otherwise the
destination is deemed as unreachable.
N
Has a timeout timer that is used on a period basis (usually every 30 seconds) for
each known route. If the timer times out this usually means that path is no longer
available. Therefore that route is removed from routing tables.
N
Does not support VLSM.
558 Individual Labs (Comprehensive)
You will see a report that will display:
N
The name of the command entered for this lab
N
The expected configuration
N
Your configuration
N
The result for each command. You will see a green checkmark (meaning that you
got it correct) or a red X
N
A score of the number of correct answers out of the total possible
Network Layout
On the Network Visualizer screen, click on the Labs menu then choose Individual,
Routing Protocols, and RIP.
Individual Lab: RIP Routing 559
Lab Steps
Copy and Paste Script
Steps 1-3 are necessary in order to perform this lab. If you do not want to manually complete
these steps and want to accelerate steps 1 - 3, you can copy and paste the following script into
the console for each router. After you get into user mode, copy and paste the script into the
console. Click on the console and click your right mouse button. A pop-up menu will appear.
Click Paste.
After pasting the script into the console, you will see the prompt Destination filename
[startup-config]?. At this point, press Enter.
2621 Router A 2811 Router A 2621 Router B
enable
config t
hostname 2621A
line vty 0 4
password todd
login
interface serial 0/0
IP address 172.16.20.2
255.255.255.0
description connection to
2811A
no shutdown
exit
exit
copy run start
enable
config t
hostname 2811A
line vty 0 1180
password todd
login
interface serial 0/1/1
IP address 172.16.20.1
255.255.255.0
description connection to
2621A
no shutdown
interface serial 0/0/1
IP address 172.16.30.1
255.255.255.0
description connection to
2621B
no shutdown
exit
exit
copy run start
enable
config t
hostname 2621B
line vty 0 4
password todd
login
interface serial 0/0
IP address 172.16.30.2
255.255.255.0
description connection to
2811A
no shutdown
exit
exit
copy run start
560 Individual Labs (Comprehensive)
1. Double-click 2621 Router A. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2621A
2621A(config-line)#line vty 0 4
2621A(config-line)#password todd
2621A(config-line)#login
2621A(config-if)#int s0/0
2621A(config-if)#ip address 172.16.20.2 255.255.255.0
2621A(config-if)#description connection to 2811A
2621A(config-if)#no shutdown
2621A(config-if)#ctrl+z
2621A#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621A#
2. Double-click 2811 Router A. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2811A
2811A(config-line)#line vty 0 1180
2811A(config-line)#password todd
2811A(config-line)#login
2811A(config-if)#int s0/1/1
2811A(config-if)#ip address 172.16.20.1 255.255.255.0
2811A(config-if)#description connection to 2621A
2811A(config-if)#no shutdown
2811A(config-if)#int s0/0/1
2811A(config-if)#ip address 172.16.30.1 255.255.255.0
2811A(config-if)#description connection to 2621B
2811A(config-if)#no shutdown
2811A(config-if)#ctrl+z
2811A#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811A#
Individual Lab: RIP Routing 561
3. Double-click 2621 Router B. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2621B
2621B(config-line)#line vty 0 4
2621B(config-line)#password todd
2621B(config-line)#login
2621Bconfig-if)#int s0/0
2621B(config-if)#ip address 172.16.30.2 255.255.255.0
2621B(config-if)#description connection to 2811A
2621B(config-if)#no shutdown
2621B(config-if)#ctrl+z
2621B#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621B#
4. From 2621 Router A, configure RIP routing and tell RIP the network you want to
advertise.
Clock Rate
You do not have to set a clock rate if the DCE side of your connection is a 2811 router.
The clock rate for the serial interface is set by default to 2000000. However, on the
2621 router you still need to explicitly set the clock rate. In our lab the DCE side of the
connection is interface serial 0/1/1 and serial 0/0/1.
Dynamic Routing
The process of routers in an Intranet or internet advertising route information automat-
ically between each other. There is typically a common dynamic routing protocol con-
gured on each router. RIP Version 1 and 2, OSPF, EIGRP, and BGP are some examples
of dynamic routing protocols. When all routers have received routing updates and have
updated routing tables, the network is said to have converged. Convergence means
that all routers in the internetwork have the same routing information. At this point, a
routed protocol, IP for example, can send user data throughout the internetwork.
562 Individual Labs (Comprehensive)
2621A#config t
2621A(config)#router rip
2621A(config-router)#network 172.16.0.0
2621A(config-router)#ctrl+z
Thats all there is to it! Dynamic routing is easy on small networks. The important thing
to notice here is that the network address is a classful address, which means you use the
classful boundary.
5. From 2621 Router B, configure RIP routing and tell RIP the network you want to
advertise.
2621B#config t
2621B(config)#router rip
2621B(config-router)#network 172.16.0.0
2621B(config-router)#ctrl+z
Router RIP Command
Turns on RIP routing.
Network Command
Should be entered for each of the networks that the router is connected to and is a part
of the RIP network. In our network we have only one network, network 172.16.0.0.
Classful Routing
Routing protocols (i.e., RIPv1 and IGRP) where subnet masks (routing masks) are not
sent in the periodic routing updates. For example, we use a 172.16.0.0 class B network
address and subnet that network with 24 bits of subnetting. This means the third
octet is used for subnets and the fourth octet are the host addresses for each subnet.
RIP is a classful routing protocol, which means that you do not type in any subnet
addresses, only the class B address. When using a classful network protocol like RIP,
make sure that all networked devices have the same subnet mask.
Individual Lab: RIP Routing 563
6. From 2811 Router A, configure RIP routing and tell RIP the network you want to
advertise.
2811A#config t
2811A(config)#router rip
2811A(config-router)#network 172.16.0.0
2811A(config-router)#ctrl+z
Verify Configurations
7. From 2621 Router A, use the show ip route command to verify the routing table.
2621A#show ip route
172.16.0.0/24 is subnetted, 2 subnets
R 172.16.30.0 [120/1] via 172.16.20.1, 00:00:21, Serial0/0
C 172.16.20.0 is directly connected, Serial0/0
2621A#
Notice the R, which means it is a RIP found route. The C is a directly connected
network. You should see two directly connected routes and three RIP routes.
8. From 2621 Router B, use the show ip route command to verify the routing table.
2621B#show ip route
172.16.0.0/24 is subnetted, 2 subnets
C 172.16.30.0 is directly connected, Serial0/0
R 172.16.20.0 [120/1] via 172.16.30.1, 00:00:13, Serial0/0
2621B#
9. From 2811 Router A, use the show ip route command to verify the routing table.
2811A#show ip route
172.16.0.0/24 is subnetted, 2 subnets
C 172.16.30.0 is directly connected, Serial0/0/1
C 172.16.20.0 is directly connected, Serial0/1/1
10. From 2621 Router B, use the debug ip rip command to see RIP updates being sent
and received on the router.
2621B#debug ip rip
RIP protocol debugging is on
2621B#
then after a few seconds ....
*Oct 13 17:19:25.906: RIP: received v1 update from 172.16.30.1 on Serial0/0
564 Individual Labs (Comprehensive)
*Oct 13 17:19:25.906: 172.16.20.0 in 2 hops
*Oct 13 17:19:25.906: RIP: received v1 update from 172.16.30.1 on Serial0/0
*Oct 13 17:19:25.906: 172.16.20.0 in 3 hops
*Oct 13 17:19:25.906: RIP: received v1 update from 172.16.30.1 on Serial0/0
*Oct 13 17:19:25.906: 172.16.20.0 in 4 hops
*Oct 13 17:19:25.906: RIP: received v1 update from 172.16.30.1 on Serial0/0
[output cut]
11. To turn off debugging, use the no debug ip rip command, or the undebug all
command.
2621B#undebug all
12. To see detailed information about currently configured protocols on a router, use the
show ip protocols command.
2621B#show ip protocols
Routing Protocol is "rip"
Sending updates every 30 seconds, next due in 19 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Redistributing: rip
Default version control: send version 1, receive any version
Interface Send Recv Triggered RIP Key-chain
Serial0/0 1 1 2
Automatic network summarization is in effect
Maximum path: 4
Routing for networks:
172.16.0.0
Routing information sources:
Gateway Distance Last Update
172.16.30.1 120 00:00:11
Distance: <default is 120>
2621B#
Notice the timers. RIP is sent out every 30 seconds by default. The administrative dis-
tance for RIP is 120 by default.
Administrative distance is a measure of the trustworthiness of the source of the routing
information. It is reported as a number between 0 and 255. The smaller the number, the
more reliable the protocol. If you have, for example, two protocols IGRP and RIP cong-
ured on a router, the IGRP routes will be preferred over the RIP routes. This is because you
have an administrative distance of 120 for RIP and 100 for IGRP.
Individual Lab: RIP Routing 565
Source Default Distance Value
Connected interface 0
Static route 1
Enhanced Interior Gateway Routing Protocol (EIGRP) summary
route
5
External Border Gateway Protocol (BGP) 20
Internal EIGRP 90
IGRP 100
OSPF 110
Intermediate System-to-Intermediate System (IS-IS) 115
Routing Information Protocol (RIP) 120
Exterior Gateway Protocol (EGP) 140
On Demand Routing (ODR) 160
External EIGRP 170
Internal BGP 200
Unknown 255
13. Another really good command is the show protocols command, which shows you the
routed protocol configuration of each interface.
2621B#show protocols
Global values:
Internet protocol routing is enabled
Serial0/1 is administratively down, line protocol is down
Serial0/0 is up, line protocol is up
Internet address is 172.16.30.2/24
FastEthernet0/1 is administratively down, line protocol is down
FastEthernet0/0 is administratively down, line protocol is down
2621B#
566 Individual Labs (Comprehensive)
14. From 2811 Router A, use the show protocols command.
2811A#show protocols
Global values:
Internet protocol routing is enabled
Serial0/0/0 is administratively down, line protocol is down
Serial0/0/1 is up, line protocol is up
Internet address is 172.16.30.1/24
Serial0/1/0 is administratively down, line protocol is down
Serial0/1/1 is up, line protocol is up
Internet address is 172.16.20.1/24
FastEthernet0/0 is administratively down, line protocol is down
FastEthernet0/1 is administratively down, line protocol is down
2811A#
RIPv2
You will now congure RIPv2.
RIPv2 RIP does not carry subnet information. To overcome this, RIPv2 was created in
1994 to address some deciencies in RIP. RIPv2 can carry subnet information. RIPv2 sends
routing updates via multicast address 224.0.0.9. It also provides support for variable length
subnet masks (VLSM) and discontiguous networking. RIPv2 is not automatically turned on
with the router rip command. You must also specify it and use the version 2 command.
15. From 2621 Router A, configure RIP routing to use version 2.
2621A#config t
2621A(config)#router rip
2621A(config-router)#version 2
2621A(config-router)#ctrl+z
Thats all there is to it! Since we have already added our directly connected networks
under router rip in our last lab, we now just have to tell it to run version 2.
16. From 2621 Router B, configure RIP routing to use version 2.
2621B#config t
2621B(config)#router rip
2621B(config-router)#version 2
2621B(config-router)#ctrl+z
Individual Lab: RIP Routing 567
17. From 2811 Router A, configure RIP routing to use version 2.
2811A#config t
2811Aconfig)#router rip
2811A(config-router)#version 2
2811A(config-router)#ctrl+z
Verify Configurations
18. From 2621 Router A, use the show ip route command to verify the routing table.
2621A#show ip route
172.16.0.0/24 is subnetted, 2 subnets
R 172.16.30.0 [120/1] via 172.16.20.1, 00:00:13, Serial0/0
C 172.16.20.0 is directly connected, Serial0/0
Notice the R, which means it is a RIP found route. The C is a directly connected
network. The routing tables will look the same as version 1 unless you have VLSM net-
works congured.
19. From the 2621 Router B, use the show ip route command to verify the routing table.
2621B#show ip route
172.16.0.0/24 is subnetted, 2 subnets
C 172.16.30.0 is directly connected, Serial0/0
R 172.16.20.0 [120/1] via 172.16.30.1, 00:00:09, Serial0/0
20. From 2811 Router A, use the show ip route command to verify the routing table.
2811A#show ip route
172.16.0.0/24 is subnetted, 2 subnets
C 172.16.30.0 is directly connected, Serial0/0/1
C 172.16.20.0 is directly connected, Serial0/1/1
21. From 2621 Router A, use the debug ip rip command to see RIP updates being sent
and received on the router.
2621A#debug ip rip
22. To turn off debugging, use the no debug ip rip command, or the undebug all
command.
2621A#undebug all
568 Individual Labs (Comprehensive)
23. To see the routing protocol timers, use the show ip protocols command.
2621A#show ip protocols
Routing Protocol is "rip"
Sending updates every 30 seconds, next due in 23 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Redistributing: rip
Default version control: send version 2, receive version 2
Interface Send Recv Triggered RIP Key-chain
Serial0/0 1 1 2
Automatic network summarization is in effect
Maximum path: 4
Routing for networks:
172.16.0.0
Routing information sources:
Gateway Distance Last Update
172.16.20.1 120 00:00:07
Distance: <default is 120>
2621A#
Notice the timers. RIP is sent out every 30 seconds by default. The administrative dis-
tance is 120 by default. Both RIPv1 and RIPv2 use the same timers.
Individual Lab: IPv6 Static Routing
Enter all commands in lower case. The programs grading feature expects
lower case and may count an answer wrong if it is in upper case.
Internet Protocol Version 6 (IPv6) is the new addressing scheme that will eventually
replace all IPv4 addresses. The IPv4 address scheme is no longer adequate to meet the
needs of the growing Internet, and growing Intranets. IPv6 was also designed to increase
routing performance and network scalability issues. IPv6 addresses are 128 bits in length.
Hexadecimal Groups IPv6 addresses are divided into eight, 16 bit hexadecimal groups.
For example, 2001:0000:0000:0008:0000:0000:0000:0012 can be divided into ...
2001: 0000: 0000: 0008: 0000: 0000: 0000: 0012
1 2 3 4 5 6 7 8
Individual Lab: IPv6 Static Routing 569
The IPV6 address above can also be shortened to 2001:0:0:8:0:0:0:12 or 2001::8:0:0:0:12
Address Types There are three IPv6 address types:
N
Unicast
N
Anycast
N
Multicast
Unicast Types There are four unicast address types:
N
Link local
N
Unique local
N
Global
N
Special
IPv6 Bits IPv6 bit address can be divided into ...
48 bits 16 bits 64 bits
2001:0000:0000: 0008: 0000:0000:0000:0012
Global Prefix Subnet Interface ID
This lab will have you create an IPv6 network. In this network you will use IPv6 to create
both default and static routing. The network used in this lab has IPv4 addresses already con-
gured on each router interface. Having both IPv4 and IPv6 addresses on an interface is called
DUAL stacking. You will also verify your IPv6 Static Routing congurations.
When you have nished with this lab ...
You can check your work by clicking the Grade Me button in the upper right hand
corner of the Network Visualizer screen.
570 Individual Labs (Comprehensive)
You will see a report that will display:
N
The name of the command entered for this lab
N
The expected configuration
N
Your configuration
N
The result for each command. You will see a green checkmark (meaning that you got it
correct) or a red X.
N
A score of the number of correct answers out of the total possible
Network Layout
On the Network Visualizer screen, click on the Labs menu then choose Individual,
Routing Protocols, and Static IPv6.rsm.
Individual Lab: IPv6 Static Routing 571
Lab Steps
1. Enable IPv6 routing and Cisco Express Forwarding (CEF) on each router.
2811A#en
2811A#config t
2811A(config)#ipv6 unicast-routing
2811A(config)#ipv6 cef
2811B#en
2811B#config t
2811B(config)#ipv6 unicast-routing
2811B(config)#ipv6 cef
2811C#en
2811C#config t
2811C(config)#ipv6 unicast-routing
2811C(config)#ipv6 cef
2. Configure IPv6 addresses on 2811 Router A.
2811A(config)#int fa0/0
2811A(config-if)#ipv6 address 2001::10:1/112
2811A(config-if)#int s0/0/0
2811A(config-if )ipv6 address 2001::20:1/112
2811A(config-if)#int s0/1/0
2811A(config-if)#ipv6 address 2001::30:1/112
2811A(config-if)#exit
3. Configure IPv6 addresses on 2811 Router B.
2811B(config)#int fa0/0
2811B(config-if)#ipv6 address 2001::40:1/112
2811B(config-if)#interface serial 0/1/0
2811B(config-if)#ipv6 address 2001::30:2/112
2811B(config-if)#exit
4. Configure IPv6 addresses on 2811 Router C.
2811C(config)#int fa0/0
2811C(config-if)#ipv6 address 2001::50:1/112
2811C(config-if)#int s0/0/0
2811C(config-if)#ipv6 address 2001::20:2/112
2811C(config-if)#exit
572 Individual Labs (Comprehensive)
5. Configure two IPv6 static routes on 2811 Router A.
2811A(config)#ipv6 route 2001::40:0/112 2001::30:2
2811A(config)#ipv6 route 2001::50:0/112 2001::20:2
2811A(config)#exit
2811A#copy run start
The static routes will allow 2811 Router A to communicate with the rest of the
network.
6. Configure a IPv6 default route on 2811 Router B.
2811B(config)#ipv6 route ::/0 2001::30:1
2811B(config)#exit
2811B#copy run start
This default route will allow 2811 Router B to communicate with the rest of the network.
2811 Router B will use router 2811 A as a gateway of last resort.
7. Configure a IPv6 default route on 2811 Router C.
2811C(config)#ipv6 route ::/0 2001::20:1
2811C(config)#exit
2811C#copy run start
This default route will allow 2811 Router C to communicate with the rest of the network.
2811 Router C will use router Router A as a gateway of last resort.
Verifying IPv6 Static Routing
8. On 2811 Router A, issue the show running-configuration command to verify the
IPv6 configurations.
2811A#show run
[output cut]
!
interface FastEthernet0/0
ip address 172.16.10.1 255.255.255.0
no ip directed-broadcast
ipv6 address 2001::10:1/112
!
[output cut]
!
interface Serial0/0/0
Individual Lab: IPv6 Static Routing 573
ip address 172.16.20.1 255.255.255.0
no ip directed-broadcast
clockrate 2000000
ipv6 address 2001::20:1/112
!
[output cut]
!
interface Serial0/1/0
ip address 172.16.30.1 255.255.255.0
no ip directed-broadcast
clockrate 2000000
ipv6 address 2001::30:1/112
!
[output cut]
!
ipv6 route 2001::40:0/112 2001::30:2
ipv6 route 2001::50:0/112 2001::20:2
!
[output cut]
2811A#
As you can see, each interface has an IPv6 address. You can also see the IPv6 static
routes that are congured.
9. On 2811 Router A, issue the show ipv6 interface command to see which router
interfaces are configured for IPv6.
2811A#show ipv6 interface
FastEthernet0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::21A:2FFF:FE55:D408
Global unicast address(es):
2001::10:1, subnet is 2001::10:0/112
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF10:1
FF02::1:FF55:D408
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
[output cut]
Serial0/0/0 is up, line protocol is up
574 Individual Labs (Comprehensive)
IPv6 is enabled, link-local address is FE80::21A:2FFF:FE55:D408
Description: conn-to-2811A
Global unicast address(es):
2001::20:1, subnet is 2001::30:0/112
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF20:1
FF02::1:FF55:D408
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
[output cut]
Serial0/1/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::21A:2FFF:FE55:D408
Description: conn-to-2811C
Global unicast address(es):
2001::30:1, subnet is 2001::20:0/112
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF30:1
FF02::1:FF55:D408
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
[output cut]
2811A#
10. On 2811 Router A, issue the show ipv6 interface brief command to see a summary
of the router interfaces configured for IPv6.
2811A#show ipv6 interface brief
FastEthernet0/0 [up/up]
FE80::21A:2FFF:FE55:D408
2001::10:1
FastEthernet0/1 [administratively down/down]
Serial0/0/0 [up/up]
FE80::21A:2FFF:FE55:D408
2001::20:1
Serial0/0/1 [administratively down/down]
Individual Lab: IPv6 Static Routing 575
Serial0/1/0 [up/up]
FE80::21A:2FFF:FE55:D408
2001::30:1
Serial0/1/1 [administratively down/down]
2811A#
11. On 2811 Router A, issue the show ipv6 route command to see the IPv6 routing table.
2811A#show ipv6 route
IPv6 Routing Table - 10 entries
Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP
U - Per-user Static route
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary
O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
C 2001::10:0/112 [0/0]
via ::, FastEthernet0/0
L 2001::10:1/128 [0/0]
via ::, FastEthernet0/0
C 2001::20:0/112 [0/0]
via ::, Serial0/0/0
L 2001::20:1/128 [0/0]
via ::, Serial0/0/0
C 2001::30:0/112 [0/0]
via ::, Serial0/1/0
L 2001::30:1/128 [0/0]
via ::, Serial0/1/0
S 2001::40:0/112 [1/0]
via 2001::30:2
S 2001::50:0/112 [1/0]
via 2001::20:2
L FE80::/10 [0/0]
via ::, Null0
L FF00::/8 [0/0]
via ::, Null0
2811A#
12. From 2811 Router A, ping the IPv6 Fast Ethernet addresses of routers 2811 B and 2811 C.
Pinging will verify that your default and static routing configurations are correct.
2811A#ping ipv6 2001::40:1
Type escape sequence to abort.
576 Individual Labs (Comprehensive)
Sending 5, 100-byte ICMP Echos to 2001::40:1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
2811A#
2811A#ping ipv6 2001::50:1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001::50:1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/4 ms
2811A#
Individual Lab: RIP IPv6 Routing (RIPng)
Enter all commands in lower case. The programs grading feature expects
lower case and may count an answer wrong if it is in upper case.
In this lab you will create an IPv6 RIPng network. The network used in this lab has IPv4
addresses already congured on each router interface. This will demonstrate DUAL stacking.
You will also be given the commands to verify your RIPng routing congurations.
When you have nished with this lab ...
You can check your work by clicking the Grade Me button in the upper right hand corner
of the Network Visualizer screen.
You will see a report that will display:
N
The name of the command entered for this lab
N
The expected configuration
N
Your configuration
Individual Lab: RIP IPv6 Routing (RIPng) 577
N
The result for each command. You will see a green checkmark (meaning that you got it
correct) or a red X
N
A score of the number of correct answers out of the total possible
Network Layout
On the Network Visualizer screen, click on the Labs menu then choose Individual,
Routing Protocols, and RIP IPv6.rsm.
578 Individual Labs (Comprehensive)
Lab Steps
1. Enable IPv6 routing and Cisco Express Forwarding (CEF) on each router.
2811A#en
2811A#config t
2811A(config)#ipv6 unicast-routing
2811A(config)#ipv6 cef
2811B#en
2811B#config t
2811B(config)#ipv6 unicast-routing
2811B(config)#ipv6 cef
2811C#en
2811C#config t
2811C(config)#ipv6 unicast-routing
2811C(config)#ipv6 cef
2. Configure IPv6 addresses on 2811 Router A.
2811A(config)#int fa0/0
2811A(config-if)#ipv6 address 2001::10:1/112
2811A(config-if)#int s0/0/0
2811A(config-if )ipv6 address 2001::20:1/112
2811A(config-if)#int s0/1/0
2811A(config-if)#ipv6 address 2001::30:1/112
2811A(config-if)#exit
3. Configure IPv6 addresses on 2811 Router B.
2811B(config)#interface fastthernet 0/0
2811B(config-if)#ipv6 address 2001::40:1/112
2811B(config-if)#interface serial 0/1/0
2811B(config-if)#ipv6 address 2001::30:2/112
2811B(config-if)#exit
4. Configure IPv6 addresses on 2811 Router C.
2811C(config)#int fa0/0
2811C(config-if)#ipv6 address 2001::50:1/112
2811C(config-if)#int s0/0/0
2811C(config-if)#ipv6 address 2001::20:2/112
2811C(config-if)#exit
Individual Lab: RIP IPv6 Routing (RIPng) 579
5. On 2811 Router A, enable the IPv6 RIPng routing process from global and interface
configuration mode.
2811A(config)#ipv6 router rip myripngprocess
2811A(config-rtr)#exit
2811A(config)#int fa0/0
2811A(config-if)#ipv6 rip myripngprocess enable
2811A(config-if)#int s0/0/0
2811A(config-if )ipv6 rip myripngprocess enable
2811A(config-if)#int s0/1/0
2811A(config-if)#ipv6 rip myripngprocess enable
2811A(config-if)#ctrl+z
2811A#copy run start
Remember that the ipv6 unicast-routing command must be congured on the router
before the RIPng routing process can be enabled. The previous labs had you congure
the command on all routers so we will not do it here.
6. On 2811 Router B, enable the IPv6 RIPng routing process from global
configuration mode.
2811B(config)#ipv6 router rip myripngprocess
2811B(config-rtr)#exit
2811B(config)#int fa0/0
2811B(config-if)#ipv6 rip myripngprocess enable
2811B(config-if)#interface serial 0/1/0
2811B(config-if)#ipv6 rip myripngprocess enable
2811B(config-if)#ctrl+z
2811B#copy run start
7. On 2811 Router C, enable the IPv6 RIPng routing process from global
configuration mode.
2811C(config)#ipv6 router rip myripngprocess
2811C(config-rtr)#exit
2811C(config)#int fa0/0
2811C(config-if)#ipv6 rip myripngprocess enable
2811C(config-if)#int s0/0/0
2811C(config-if)#ipv6 rip myripngprocess enable
2811C(config-if)#ctrl+z
2811C#copy run start
580 Individual Labs (Comprehensive)
Verifying RIP IPv6 Routing (RIPng)
8. On 2811 Router A, issue the show running-configuration command to verify the
IPv6 configurations.
2811A#show run
[output cut]
!
ipv6 unicast-routing
ipv6 cef
!
[output cut]
!
interface FastEthernet0/0
ip address 172.16.10.1 255.255.255.0
no ip directed broadcast
ipv6 address 2001::10:1/112
ipv6 rip myripngprocess enable
!
[output cut]
!
interface Serial0/0/0
ip address 172.16.20.1 255.255.255.0
no ip directed broadcast
ipv6 address 2001::20:1/112
clock rate 8000000
ipv6 rip myripngprocess enable
!
interface Serial0/1/0
ip address 172.16.30.1 255.255.255.0
no ip directed broadcast
ipv6 address 2001::30:1/112
ipv6 rip myripngprocess enable
clock rate 8000000
no cdp enable
!
[output cut]
!
ipv6 router rip myripngprocess
[output cut]
2811A#
Individual Lab: RIP IPv6 Routing (RIPng) 581
As you can see, RIPng is congured on each interface. You can also see the ipv6 RIP
(RIPng) routing process.
9. On 2811 Router A, issue the show ipv6 route command to see the IPv6 routing table.
2811A#show ipv6 route
IPv6 Routing Table - 10 entries
Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP
U - Per-user Static route
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary
O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
C 2001::10:0/112 [0/0]
via ::, FastEthernet0/0
L 2001::10:1/128 [0/0]
via ::, FastEthernet0/0
C 2001::20:0/112 [0/0]
via ::, Serial0/0/0
L 2001::20:1/128 [0/0]
via ::, Serial0/0/0
C 2001::30:0/112 [0/0]
via ::, Serial0/1/0
L 2001::30:1/128 [0/0]
via ::, Serial0/1/0
R 2001::40:0/112 [120/2]
via FE80::215:FAFF:FED7:EDA0, Serial0/1/0
R 2001::50:0/112 [120/2]
via FE80::21A:2FFF:FE52:4808, Serial0/0/0
L FE80::/10 [0/0]
via ::, Null0
L FF00::/8 [0/0]
via ::, Null0
2811A#
10. On 2811 Router A, issue the show ipv6 protocols command to see the IPv6 protocols
that are running on the router.
2811A#show ipv6 protocols
IPv6 Routing Protocol is "connected"
IPv6 Routing Protocol is "static"
IPv6 Routing Protocol is "rip myripngprocess"
Interfaces:
582 Individual Labs (Comprehensive)
Serial0/0/1
Serial0/0/0
FastEthernet0/0
Redistribution:
None
2811A_aka_2811B#
11. From 2811 Router A, ping the IPv6 Fast Ethernet addresses of routers 2811 B and
2811 C. Pinging will verify that your RIPng configurations are correct.
2811A#ping ipv6 2001::40:1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001::40:1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
2621B_aka_2811A#
2811A#ping ipv6 2001::50:1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 2001::5 0:1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/0 ms
2621B_aka_2811A#
Individual Lab: PPP Encapsulation
Enter all commands in lower case. The programs grading feature expects
lower case and may count an answer wrong if it is in upper case.
The High-Level Data-Link Control protocol (HDLC) is a point-to-point protocol used on
leased lines. No authentication can be used with HDLC and it is the default encapsulation
used by Cisco routers over synchronous serial links. Ciscos HDLC is proprietaryit wont
communicate with any other vendors HDLC implementation. If you wanted to either offer
authentication on a serial link or to connect from a Cisco router to another vendor router,
then we need to congure PPP on the serial interfaces.
Individual Lab: PPP Encapsulation 583
PPP (Point-to-Point Protocol) is a data-link protocol that can be used over asynchronous
serial (dial-up) media and uses the LCP (Link Control Protocol) to build and maintain data-
link connections. The basic purpose of PPP is to transport layer-3 packets across a Data
Link layer point-to-point link.
This lab will have you congure PPP on all four serial networks, and replace HDLC as
the encapsulation method on our serial links.
When you have nished with this lab ...
You can check your work by clicking the Grade Me button in the upper right hand corner
of the Network Visualizer screen.
You will see a report that will display:
N
The name of the command entered for this lab
N
The expected configuration
N
Your configuration
N
The result for each command. You will see a green checkmark (meaning that you got it
correct) or a red X
N
A score of the number of correct answers out of the total possible
584 Individual Labs (Comprehensive)
Network Layout
On the Network Visualizer screen, click on the Labs menu then choose Individual,
WAN, and PPP.
Individual Lab: PPP Encapsulation 585
Lab Steps
Copy and Paste Script
Steps 1-3 are necessary in order to perform this lab. If you do not want to manually com-
plete these steps and want to accelerate steps 1 - 3, you can copy and paste the following
script into the console for each router. After you get into user mode, copy and paste the
script into the console. Click on the console and click your right mouse button. A pop-up
menu will appear. Click Paste.
After pasting the script into the console, you will see the prompt Destination filename
[startup-config]?. At this point, press Enter.
2621 Router A 2811 Router A 2621 Router B
enable
config t
hostname 2621A
line vty 0 4
password todd
login
interface serial 0/0
ip address 172.16.20.2
255.255.255.0
description connection to
2811A
no shutdown
exit
exit
copy run start
enable
config t
hostname 2811A
line vty 0 1180
password todd
login
interface serial 0/1/1
ip address 172.16.20.1
255.255.255.0
description connection to
2621A
no shutdown
interface serial 0/0/1
ip address 172.16.30.1
255.255.255.0
description connection to
2621B
no shutdown
exit
exit
copy run start
enable
config t
hostname 2621B
line vty 0 4
password todd
login
interface serial 0/0
ip address 172.16.30.2
255.255.255.0
description connection to
2811A
no shutdown
exit
exit
copy run start
586 Individual Labs (Comprehensive)
1. Double-click 2621 Router A. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2621A
2621A(config-line)#line vty 0 4
2621A(config-line)#password todd
2621A(config-line)#login
2621A(config-if)#int s0/0
2621A(config-if)#ip address 172.16.20.2 255.255.255.0
2621A(config-if)#description connection to 2811A
2621A(config-if)#no shutdown
2621A(config-if)#exit
2621A(config)#exit
2621A#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621A#
2. Double-click 2811 Router A. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2811A
2811A(config-line)#line vty 0 1180
2811A(config-line)#password todd
2811A(config-line)#login
2811A(config-if)#int s0/1/1
2811A(config-if)#ip address 172.16.20.1 255.255.255.0
2811A(config-if)#description connection to 2621A
2811A(config-if)#no shutdown
2811A(config-if)#int s0/0/1
2811A(config-if)#ip address 172.16.30.1 255.255.255.0
2811A(config-if)#description connection to 2621B
2811A(config-if)#no shutdown
2811A(config-if)#ctrl+z
2811A#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811A#
Individual Lab: PPP Encapsulation 587
3. Double-click 2621 Router B. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2621B
2621B(config-line)#line vty 0 4
2621B(config-line)#password todd
2621B(config-line)#login
2621Bconfig-if)#int s0/0
2621B(config-if)#ip address 172.16.30.2 255.255.255.0
2621B(config-if)#description connection to 2811A
2621B(config-if)#no shutdown
2621B(config-if)#ctrl+z
2621B#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621B#
4. Now, configure each router with OSPF.
2621A(config)#router ospf 100
2621A(config-router)#network 172.16.20.2 0.0.0.0 area 0
2621A(config-router)#network 172.16.40.0 0.0.0.255 area 0
2621A(config-router)#exit
2621B(config)#router ospf 101
2621B(config-router)#network 172.16.30.2 0.0.0.0 area 0
2621B(config-router)#network 172.0.0.0 0.255.255.255 area 0
2621B(config-router)#exit
2811A(config)#router ospf 102
Clock Rate
You do not have to set a clock rate if the DCE side of your connection is a 2811 router.
The clock rate for the serial interface is set by default to 2000000. However, on the
2621 router you still need to explicitly set the clock rate. In our lab the DCE side of the
connection is interface serial 0/1/1 and serial 0/0/1.
588 Individual Labs (Comprehensive)
2811A(config-router)#network 172.16.10.1 0.0.0.0 area 0
2811A(config-router)#network 172.16.20.1 0.0.0.0 area 0
2811A(config-router)#network 172.16.30.1 0.0.0.0 area 0
2811A(config-router)#exit
5. Bring up the console for 2811 Router A and change the encapsulation on the serial
links from HDLC to PPP.
2811A(config)#int s0/0/1
2811A(config-if)#encapsulation ppp
2811A(config-if)#int s0/1/1
2811A(config-if)#encapsulation ppp
2811A(config-if)#ctrl+z
2811A#
6. Connect to 2621 Router B and change the encapsulation on the serial links from
HDLC to PPP.
2621B(config)#int s0/0
2621B(config-if)#encapsulation ppp
2621B(config-if)#ctrl+z
2621B#
7. Connect to 2621 Router A and change the encapsulation on the serial link from
HDLC to PPP.
2621A(config)#int s0/0
2621A(config-if)#encapsulation ppp
2621A(config-if)#ctrl+z
2621A#
Thats all there is to it. This part is easy.
Verifying PPP Encapsulation
Once you have replaced HDLC as the serial encapsulation method, then you need to verify
your network is still working properly.
The rst command to use is the show ip route command to make sure all your IP
routes are still present.
8. From 2621 Router A, use the show ip route command to verify the network is still
running.
2621A#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks
Individual Lab: PPP Encapsulation 589
O 172.16.30.0/24 [110/74] via 172.16.20.1, 07:50:33, Serial0/0
C 172.16.20.1/32 is directly connected, Serial0/0
C 172.16.20.0/24 is directly connected, Serial0/0
2621A#
9. From 2621 Router B, use the show ip route command to verify the network is still
running.
2621B#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks
C 172.16.30.1/32 is directly connected, Serial0/0
C 172.16.30.0/24 is directly connected, Serial0/0
O 172.16.20.0/24 [110/74] via 172.16.30.1, 07:50:33, Serial0/0
2621B#
10. From 2811 Router A, use the show ip route command to verify the network is still
running.
2811A#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 4 subnets, 2 masks
C 172.16.30.2/32 is directly connected, Serial0/0/1
C 172.16.30.0/24 is directly connected, Serial0/0/1
C 172.16.20.2/32 is directly connected, Serial0/1/1
C 172.16.20.0/24 is directly connected, Serial0/1/1
2811A#
11. From 2811 Router A, use the show interface command to see the serial link
encapsulation.
2811A#show int s0/0/1
Serial0/0/1 is up, line protocol is up
Hardware is GT96K Serial
Description: connection to 2621B
Internet address is 172.16.30.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
[output cut]
2811A#show int s0/1/1
Serial0/1/1 is up, line protocol is up
Hardware is GT96K Serial
Description: connection to 2621A
590 Individual Labs (Comprehensive)
Internet address is 172.16.20.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
Configuring PPP Authentication with CHAP
Now that the network should be up and working with PPP, you can use PPP authentication
to stop unwanted users from connecting to your network. Although, this is typically used
with dial-up, it still can be used with serial interfaces.
This lab will have you congure PPP authentication on all routers serial interfaces using
the CHAP protocol.
Challenge Authentication Protocol (CHAP) is used at the initial startup of a link and at
period checkups on the link to make sure the router is still communicating with the same
host. After PPP nishes its initial phase, the local router sends a challenge request to the
remote device. The remote device sends a value calculated using a one-way hash function
called MD5. The local router checks this hash value to make sure it matches. If the values
dont match, the link is immediately terminated.
12. To configure PPP authentication, first set the hostname of the router if it is not already
set (this is not an option!). Then set the username and password for the remote router
connecting to your router. For example, if you are connected to 2621 Router A and want
to configure authentication, you would set the hostname and then create a username that
consists of the router you are going to connect to, in this example, 2811 Router A.
This is shown below:
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname 2621A
2621A(config)#username 2811A password cisco
When using the hostname command, remember that the username is the hostname of
the remote router connecting to your router. It is case-sensitive. Also, the password on
both routers must be the same. It is a plain-text password and can be seen with a show
run command.
You must have a username and password congured for each remote system you are
going to connect to. The remote routers must also be congured with usernames and
passwords.
13. After you set the hostname, usernames, and passwords, choose the authentication as
shown in the following example:
2621A#config t
Enter configuration commands, one per line. End with CNTL/Z.
2621A(config)#int s0/0
Individual Lab: PPP Encapsulation 591
2621A(config-if)#ppp authentication chap
2621A(config-if)#exit
2621A(config)#
14. Open a console to 2621 Router A and create a username of 2811 Router A and with
a password of cisco. Then configure the serial interface 0/0 to use ppp authentication
of chap.
2621A(config)#username 2811A password cisco
2621A(config)#int s0/0
2621A(config-if)#ppp authentication chap
2621A(config-if)#ctrl+z
2621A#
15. Open a console to 2621 Router B and create a username of 2811 Router A and with
a password of cisco. Then configure the serial interface 0/0 to use ppp authentication
of chap.
2621B#config t
2621B(config)#username 2811A password cisco
2621B(config)#int s0/0
2621B(config-if)#ppp authentication chap
2621B(config-if)#ctrl+z
2621B#
16. Open a console to 2811 Router A and create a username of 2621 Router A and 2621
Router B and with a password of cisco. Then configure the serial interfaces 0/0/1 and
0/1/1 to use ppp authentication of chap.
2811A(config)#username 2621A password cisco
2811A(config)#username 2621B password cisco
2811A(config)#int s0/0/1
2811A(config-if)#ppp authentication chap
2811A(config)#int s0/1/1
2811A(config-if)#ppp authentication chap
2811A(config-if)#ctrl+z
2811A#
Verifying PPP with Authentication
Once you have congured PPP with authentication as the serial encapsulation method, then
you need to verify your network is still working properly.
The rst command to use is the show ip route command to make sure all your IP routes
are still present. The next command to use is the show interface command.
592 Individual Labs (Comprehensive)
17. From 2621 Router A, use the show ip route command to verify the network is still
running.
2621A#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks
O 172.16.30.0/24 [110/74] via 172.16.20.1, 08:08:48, Serial0/0
C 172.16.20.1/32 is directly connected, Serial0/0
C 172.16.20.0/24 is directly connected, Serial0/0
2621A#
18. From 2621 Router B, use the show ip route command to verify the network is still
running.
2621B#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks
C 172.16.30.1/32 is directly connected, Serial0/0
C 172.16.30.0/24 is directly connected, Serial0/0
O 172.16.20.0/24 [110/74] via 172.16.30.1, 08:08:48, Serial0/0
2621B#
19. From 2811 Router A, use the show ip route command to verify the network is still
running.
2811A#show ip route
[output cut]
172.16.0.0/16 is variably subnetted, 4 subnets, 2 masks
C 172.16.30.2/32 is directly connected, Serial0/0/1
C 172.16.30.0/24 is directly connected, Serial0/0/1
C 172.16.20.2/32 is directly connected, Serial0/1/1
C 172.16.20.0/24 is directly connected, Serial0/1/1
2811A#
20. From 2811 Router A, use the show interface command to see the serial link
encapsulation.
2811A#show int s0/0/1
Serial0/0/1 is up, line protocol is up
Hardware is GT96K Serial
Description: connection to 2621B
Internet address is 172.16.30.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
Keepalive set (10)
Individual Lab: PPP Encapsulation 593
Last input 00:00:02, output 00:00:06, output hang never
Last clearing of "show interface" counters 02:41:59
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/1/256 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
Available Bandwidth 1158 kilobits/sec
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1645 packets input, 100265 bytes, 0 no buffer
Received 1139 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
1662 packets output, 105842 bytes, 0 underruns
0 output errors, 0 collisions, 3 interface resets
0 output buffer failures, 0 output buffers swapped out
2 carrier transitions
DCD=up DSR=up DTR=up RTS=up CTS=up
2811A#
2811A#show int s0/1/1
Serial0/1/1 is up, line protocol is up
Hardware is GT96K Serial
Description: connection to 2621A
Internet address is 172.16.20.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
Keepalive set (10)
Last input 00:00:02, output 00:00:06, output hang never
Last clearing of "show interface" counters 02:41:59
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/1/256 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
Available Bandwidth 1158 kilobits/sec
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1645 packets input, 100265 bytes, 0 no buffer
Received 1139 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
1662 packets output, 105842 bytes, 0 underruns
0 output errors, 0 collisions, 3 interface resets
594 Individual Labs (Comprehensive)
0 output buffer failures, 0 output buffers swapped out
2 carrier transitions
DCD=up DSR=up DTR=up RTS=up CTS=up
Individual Lab: Frame Relay Switching
Enter all commands in lower case. The programs grading feature expects
lower case and may count an answer wrong if it is in upper case.
Frame Relay provides connection-oriented, Data Link layer communication via virtual
circuits. These virtual circuits are logical connections created between two DTEs across a
packet-switched network, which is identied by a DLCI, or Data Link Connection Identier.
Also, Frame Relay uses both PVCs (Permanent Virtual Circuits) and SVCs (Switched
Virtual Circuits, which is a form of dialup), although most Frame Relay networks use only
PVCs. This virtual circuit provides the complete path to the destination network prior to
the sending of the rst frame.
Frame Relay provides a communications interface between DTE (data terminal equip-
ment) and DCE (data circuit-terminating equipment, such as packet switches) devices.
DTE consists of terminals, PCs, routers, and bridgescustomer-owned end-node and
Internetworking devices. DCE consists of carrier-owned internetworking devices.
Frame Relay sends packets at the Data Link Layer (layer 2) of the OSI model rather than
at the network layer (layer 3). A frame can incorporate packets from different protocols.
When you have nished with this lab ...
You can check your work by clicking the Grade Me button in the upper right hand corner
of the Network Visualizer screen.
Individual Lab: Frame Relay Switching 595
Network Layout
On the Network Visualizer screen, click on the Labs menu then choose Individual,
WAN, and Frame Relay.
596 Individual Labs (Comprehensive)
You will see a report that will display:
N
The name of the command entered for this lab
N
The expected configuration
N
Your configuration
N
The result for each command. You will see a green checkmark (meaning that you got it
correct) or a red X
N
A score of the number of correct answers out of the total possible
Understand Frame Relay
Frame Relay Uses Virtual Circuits`
Frame Relay provides connection-oriented, Data Link layer communication via virtual
circuits. These virtual circuits are logical connections created between two DTEs across a
packet-switched network, which is identied by a DLCI, or Data Link Connection Identier.
Also, Frame Relay uses both PVCs (Permanent Virtual Circuits) and SVCs (Switched
Virtual Circuits, which is a form of dialup), although most Frame Relay networks use only
PVCs. This virtual circuit provides the complete path to the destination network prior to
the sending of the rst frame.
Configuring Frame Relay Encapsulation
When conguring Frame Relay on Cisco routers, you need to specify it as an encapsula-
tion on serial interfaces. There are only two encapsulation types: Cisco and IETF (Internet
Engineering Task Force). The following router output shows the two different encapsula-
tion methods when choosing Frame Relay on your Cisco router:
2621A#config t
2621A(config)#int s0/0
2621A(config-if)#encapsulation frame-relay ?
ietf Use RFC1490 encapsulation
<cr>
The default encapsulation is Cisco unless you manually type in IETF, and Cisco is the
type used when connecting two Cisco devices. Youd opt for the IETF-type encapsulation if
you needed to connect a Cisco device to a non-Cisco device with Frame Relay.
Frame Relay DLCI
Frame Relay virtual circuits (PVCs) are identied by Data Link Connection Identiers
(DLCIs). A Frame Relay service provider, such as the telephone company, typically assigns
DLCI values, which are used by Frame Relay to distinguish between different virtual cir-
cuits on the network. Because many virtual circuits can be terminated on one multipoint
Frame Relay interface, many DLCIs are often afliated with it.
Individual Lab: Frame Relay Switching 597
For the IP devices at each end of a virtual circuit to communicate, their IP addresses
need to be mapped to DLCIs. This mapping can function as a multipoint deviceone that
can identify to the Frame Relay network the appropriate destination virtual circuit for each
packet that is sent over the single physical interface. The mappings can be done dynami-
cally through IARP (Inverse ARP) or manually through the frame relay map command.
DLCI numbers, used to identify a PVC, are typically assigned by the provider and start
at 16. Conguring a DLCI number to be applied to an interface is shown below:
2621A(config-if)#frame-relay interface-dlci ?
<16-1007> Define a DLCI as part of the current subinterface
2621A(config-if)#frame-relay interface-dlci 16
Frame Relay LMI
The Local Management Interface (LMI) was developed in 1990 by Cisco Systems,
StrataCom, Northern Telecom, and Digital Equipment Corporation and became known
as the Gang-of-Four LMI or Cisco LMI. This gang took the basic Frame Relay protocol
from the CCIT and added extensions onto the protocol features that allow internetworking
devices to communicate easily with a Frame Relay network.
The LMI is a signaling standard between a CPE device (router) and a frame switch. The
LMI is responsible for managing and maintaining status between these devices.
If youre not going to use the auto-sense feature of LMI, youll need to check with your
Frame Relay provider to nd out which type to use instead. The default type is Cisco, but
you may need to change to ANSI or Q.933A. The three different LMI types are depicted in
the router output below.
2621A(config-if)#frame-relay lmi-type ?
cisco
ansi
q933a
2621A(config-if)#frame-relay lmi-type ansi
You can have multiple virtual circuits on a single serial interface and yet treat each as a
separate interface. These are known as subinterfaces. Think of a subinterface as a hardware
interface dened by the IOS software. An advantage gained through using subinterfaces is
the ability to assign different Network layer characteristics to each subinterface and virtual
circuit, such as IP routing on one virtual circuit and IPX on another.
Subinterfaces with Frame Relay
You dene subinterfaces with the int s0.subinterface number command as shown
below. You rst set the encapsulation on the serial interface, and then you can dene the
subinterfaces.
2621A(config-int)#encapsulation frame-relay
2621A(config-int)#exit
598 Individual Labs (Comprehensive)
2621A(config)#int s0/0.?
<0-4294967295> Serial interface number
2621A(config)#int s0/0.16 ?
multipoint Treat as a multipoint link
point-to-point Treat as a point-to-point link
2621A(config)#int s0/0.16 point-to-point
2621A(config-subif)#
You can dene an almost limitless number of subinterfaces on a given physical interface
(keeping router memory in mind). In the above example, we chose to use subinterface 16
because that represents the DLCI number assigned to that interface. However, you can
choose any number between 0 and 4,292,967,295.
Configuring Frame-Relay
Lab Steps
Now that you should have a background on how to congure basic Frame Relay on a Cisco
router, this lab will have you congure 2811 Router A as a Frame Relay switch. Then youll
congure routers 2621 A and 2621 B as remote Frame Relay connections.
1. Open a console for 2811 A and configure the hostname.
Router>enable
Router#config t
Router(config)#hostname 2811A
2811A(config)#
Once your router is clear, you can now make them a Frame Relay switch with the
frame-relay switching command. However, that is the easy part. You need to map
every DLCI on the switch. Of course the router only has two connections, so it is not
too time consuming, but if you had dozens of PVCs, this could take a while.
2811 A
serial 0/0/1 DLCI 16
serial 0/1/1 DLCI 17
On the frame relay switch, use the frame relay route command to map each and
every DLCI. Here is an example:
2811A(config)#int s0/0/1
2811A(config-if)#frame-relay route 17 interface serial 0/1/1 16
2811A(config-if)#exit
2811A(config)#
Configuring Frame-Relay 599
This command tells the switch that if it receives a frame on serial 0/0/1 with a PVC of
16, then send it out serial 0/1/1 using a PVC of 17. Again, in our network, this congura-
tion will only be two routes so its not a big deal.
2. On 2811 Router A configure the Frame Switching. No IP addresses are assigned to the
routes interfaces. Remember, this is a Data Link layer function only, so IP is irrelevant
to this configuration.
2811A(config)#frame-relay switching
2811A(config)#int s0/0/1
2811A(config)#encapsulation frame-relay
2811A(config-if)#no shut
2811A(config-if)#frame intf-type dce
2811A(config-if)#frame-relay route 17 interface serial 0/1/1 16
2811A(config-if)#int s0/1/1
2811A(config)#encapsulation frame-relay
2811A(config-if)#no shut
2811A(config-if)#frame intf-type dce
2811A(config-if)#frame-relay route 16 interface serial 0/0/1 17
2811A(config-if)#ctrl+z
2811A#
Configuring Frame Relay with Subinterfaces
Now that the Frame-Relay switching router is congured, you need to congure the remote
routers. You will bring up the console for routers 2621 A and 2621 B and congure them
for Frame Relay conguration using subinterfaces.
Since the Frame-Relay switches are not using IP addressing, connecting from routers
2621 A to 2621 B, for example, will use one subnet and appear like a direct connection.
Use subnet 172.16.100.0.
3. Open a console on 2621 Router A and configure the serial 0/0 interface with a Frame
Relay subinterface. To perform this, you must remove the IP address and IPX network
number from the serial interface. In this lab we do not have an existing IP address but
we wanted to include the configuration to remove it. You may be constructing your
own network and already have an IP address for s0/0 and you will need to remember
to remove it.
Router>enable
Router#config t
Router(config)#hostname 2621A
2621A(config)#int s0/0
2621A(config-if)#no ip address
2621A(config-if)#no shut
2621A(config-if)#encapsulation frame-relay
2621A(config-if)#int s0/0.16 point-to-point
600 Individual Labs (Comprehensive)
2621A(config-subif)#ip address 172.16.100.1 255.255.255.0
2621A(config-subif)#frame-relay interface-dlci 16
2621A(config-subif)#ctrl+z
2621A#
4. Open a console on 2621 Router B and configure the serial 0/0 interface with a Frame
Relay subinterface.
Router>enable
Router#config t
Router(config)#hostname 2621B
2621B(config)#int s0/0
2621B(config-if)#no ip address
2621B(config-if)#no shut
2621B(config-if)#encapsulation frame-relay
2621B(config-if)#int s0/0.17 point-to-point
2621B(config-subif)#ip address 172.16.100.2 255.255.255.0
2621B(config-subif)#frame-relay interface-dlci 17
2621B(config-subif)#ctrl+z
2621B#
5. Verify the Frame-Relay connection is up and running. Ping from 2621 Router A to
2621 Router B.
2621A#ping 172.16.100.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.100.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms
2621A#
Verifying Frame Relay
There are several ways to check the status of your interfaces and PVCs once you have Frame
Relay encapsulation set up and running. You can use the show frame-relay command with
a question mark (?) to get the command options:
2621A#show frame ?
ip show frame relay IP statistics
lapf show frame relay lapf status/statistics
lmi show frame relay lmi statistics
map Frame-Relay map table
Configuring Frame-Relay 601
pvc show frame relay pvc statistics
qos-autosense show frame relay qos-autosense information
route show frame relay route
rtp show frame relay RTP statistics
svc show frame relay SVC stuff
traffic Frame-Relay protocol statistics
6. Change to the console for 2621 Router A.
7. The show frame-relay lmi command will give you the LMI traffic statistics
exchanged between the local router and the Frame Relay switch.
2621A#show frame lmi
LMI Statistics for interface Serial0/0 (Frame Relay DTE) LMI TYPE = CISCO
Invalid Unnumbered info 0 Invalid Prot Disc 0
Invalid dummy Call Ref 0 Invalid Msg Type 0
Invalid Status Message 0 Invalid Lock Shift 0
Invalid Information ID 0 Invalid Report IE Len 0
Invalid Report Request 0 Invalid Keep IE Len 0
Num Status Enq. Rcvd 1748 Num Status msgs Sent 1748
Num Update Status Sent 0 Num St Enq. Timeouts 0
2621A#
The router output from the show frame-relay lmi command shows you LMI errors as
well as the LMI type.
8. The show frame pvc command will list all configured PVCs and DLCI numbers. It pro-
vides the status of each PVC connection and traffic statistics. It will also give you the
number of BECN and FECN packets received on the router.
2621A#show frame pvc
PVC Statistics for interface Serial0/0 (Frame Relay DTE)
DLCI = 16 , DLCI USAGE = LOCAL , PVC STATUS = ACTIVE , INTERFACE =
Serial0/0.16
input pkts 11290 output pkts 11277 in bytes 898590
out bytes 899156 dropped pkts 2 in FECN pkts 0
in BECN pkts 0 out FECN pkts 0 out BECN pkts 0
in DE pkts 0 out DE pkts 0
out bcast pkts 11264 out bcast bytes 898468
pvc create time 13:25:57, last time pvc status changed 13:25:39
2621A#
9. You can also use the show interface command to check for LMI traffic. The show
interface command displays information about the encapsulation as well as layer-2
and layer-3 information.
The LMI DLCI is used to dene the type of LMI being used. If it is 1023, it is the
default LMI type of Cisco. If the LMI DLCI is zero, then it is the ANSI LMI type.
602 Individual Labs (Comprehensive)
2621A#show int s0/0
Serial0/0 is up, line protocol is up
Hardware is PowerQUICC Serial
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 0.
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation FRAME-RELAY, loopback not set
Keepalive set (10)
FR SVC disabled, LAPF state down
LMI enq sent 41, LMI stat recvd 22, LMI upd recvd 0, DTE LMI down
LMI enq recvd 4, LMI stat sent 0, LMI upd sent 0
LMI DLCI 1023 LMI type is CISCO frame relay DTE
Broadcast queue 0/64, broadcasts sent/dropped 0/0, interface broadcasts 0
[output cut]
2621A#
The show interface command displays line, protocol, DLCI and LMI information.
10. The show frame map command will show you the Network layer-to-DLCI mappings.
2621A#show frame map
Serial0/0.16 (up): point-to-point dlci, dlci 16(0x66,0x1860), broadcast
status defined, active
2621A#
Individual Lab: EIGRP Routing
Enter all commands in lower case. The programs grading feature expects
lower case and may count an answer wrong if it is in upper case.
Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco proprietary hybrid routing
protocol. If you want your routers to share information they must all:
N
have EIGRP running
N
use the same AS number
When you have nished with this lab ...
Individual Lab: EIGRP Routing 603
You can check your work by clicking the Grade Me button in the upper right hand corner
of the Network Visualizer screen.
You will see a report that will display:
N
The name of the command entered for this lab
N
The expected configuration
N
Your configuration
N
The result for each command. You will see a green checkmark (meaning that you got it
correct) or a red X
N
A score of the number of correct answers out of the total possible
EIGRP
N
Stands for Enhanced Interior Gateway Routing Protocol
N
Uses properties of both distance vector and link state
N
Has an administrative distance of 90
N
Has a maximum hop count of 255
N
Will automatically overwrite RIP (which has a default administrative distance of 120)
routes in the routing table
N
Uses autonomous systems (AS) to create groups of routers that share routing
information
N
Classless routing protocol but congured in a classful manner
N
Uses RTP Reliable Transport Protocol
N
Uses DUAL Reliable Transport Protocol
N
Supports VLSM, summarization, and discontiguous networking
N
Supports IP v4 and v6, IPX, AppleTalk
604 Individual Labs (Comprehensive)
Network Layout
On the Network Visualizer screen, click on the Labs menu then choose Individual,
Routing Protocols, and EIGRP.
Individual Lab: EIGRP Routing 605
Lab Steps
Copy and Paste Script
Steps 1-3 are necessary in order to perform this lab. If you do not want to manually complete
these steps and want to accelerate steps 1 - 3, you can copy and paste the following script into
the console for each router. After you get into User mode, copy and paste the script into the
console. Click on the console and click your right mouse button. A pop-up menu will appear.
Click Paste.
After pasting the script into the console, you will see the prompt Destination filename
[startup-config]?. At this point, press Enter.
2621 Router A 2811 Router A 2621 Router B
enable
config t
hostname 2621A
line vty 0 4
password todd
login
interface serial 0/0
ip address 172.16.20.2
255.255.255.0
description connection to
2811A
no shutdown
exit
exit
copy run start
enable
config t
hostname 2811A
line vty 0 1180
password todd
login
interface serial 0/1/1
ip address 172.16.20.1
255.255.255.0
description connection to
2621A
no shutdown
interface serial 0/0/1
ip address 172.16.30.1
255.255.255.0
description connection to
2621B
no shutdown
exit
exit
copy run start
enable
config t
hostname 2621B
line vty 0 4
password todd
login
interface serial 0/0
ip address 172.16.30.2
255.255.255.0
description connection to
2811A
no shutdown
exit
exit
copy run start
606 Individual Labs (Comprehensive)
1. Double-click 2621 Router A. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2621A
2621A(config-line)#line vty 0 4
2621A(config-line)#password todd
2621A(config-line)#login
2621A(config-if)#int s0/0
2621A(config-if)#ip address 172.16.20.2 255.255.255.0
2621A(config-if)#description connection to 2811A
2621A(config-if)#no shutdown
2621A(config-if)#ctrl+z
2621A#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621A#
2. Double-click 2811 Router A. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2811A
2811A(config-line)#line vty 0 1180
2811A(config-line)#password todd
2811A(config-line)#login
2811A(config-if)#int s0/1/1
2811A(config-if)#ip address 172.16.20.1 255.255.255.0
2811A(config-if)#description connection to 2621A
2811A(config-if)#no shutdown
2811A(config-if)#int s0/0/1
2811A(config-if)#ip address 172.16.30.1 255.255.255.0
2811A(config-if)#description connection to 2621B
2811A(config-if)#no shutdown
2811A(config-if)#ctrl+z
2811A#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2811A#
Individual Lab: EIGRP Routing 607
3. Double-click 2621 Router B. After the console screen comes up, perform the following
commands.
Router>enable
Router#config t
Router(config)#hostname 2621B
2621B(config-line)#line vty 0 4
2621B(config-line)#password todd
2621B(config-line)#login
2621Bconfig-if)#int s0/0
2621B(config-if)#ip address 172.16.30.2 255.255.255.0
2621B(config-if)#description connection to 2811A
2621B(config-if)#no shutdown
2621B(config-if)#ctrl+z
2621B#copy run start
Destination filename [startup-config]? [enter]
Building configuration...
[OK]
2621B#
4. Go to the console screen for 2621 Router A and ping interface s 0/0 on 2621 Router B.
The packet will travel through 2811 Router A on its way to router 2621 B.
2621A#ping 172.16.30.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.30.2, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5), round-trip min/avg/max = 0/0/0 ms
2621A#
No routing protocol is set up. The routing table for router 2621 A does not
know how to get to the destination address.
5. Configure 2621 Router A to use EIGRP with an AS of 10.
2621A#config t
2621A(config)#router eigrp 10
Clock Rate
You do not have to set a clock rate if the DCE side of your connection is a 2811 router. The
clock rate for the serial interface is set by default to 2000000. However, on the 2621 router
you still need to explicitly set the clock rate. In our lab the DCE side of the connection is
interface serial 0/1/1 and serial 0/0/1.
608 Individual Labs (Comprehensive)
2621A(config-router)#network 172.16.0.0
2621A(config-router)#ctrl+z
2621A#
6. Configure 2621 Router B to use EIGRP with an AS of 10.
2621B#config t
2621B(config)#router eigrp 10
2621B(config-router)#network 172.16.0.0
2621B(config-router)
7. Configure 2811 Router A to use EIGRP with an AS of 15.
2811A#config t
2811A(config)#router eigrp 15
2811A(config-router)#network 172.16.0.0
2811A(config-router)#exit
2811A(config)#
8. Now that we have EIGRP on every router, go to router 2621 A and ping 172.16.30.2
on router 2621 B.
2621A#ping 172.16.30.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.30.2, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5), round-trip min/avg/max = 0/0/0 ms
2621A#
It did not work. Click on the Net Detective icon to see if we can nd out why the ping
was not successful.
Individual Lab: EIGRP Routing 609
You will see the following information:
1. Network 172.16.0.0 was not found in the routing tables for 2621 Router A.
2. The desired address falls outside of the protocol networks set up for one or more of
the devices.
3. The desired IP address of 172.16.30.2 was not found. None of the interfaces in the
current network have been configured with this IP address.
We know that Network 172.16.0.0 is in the routing table. Maybe #2 is true. Ok, I found
it. The AS number for 2811 Router A is wrong. Change it from 15 to 10.
9. First, remove router eigrp 15 and put the correct command in.
2811A(config)#no router eigrp
% Incomplete command.
(We forgot to put 15 in the command. Try again)
2811A(config)#no router eigrp 15
2811A(config)#router eigrp 10
2811A(config-router)#network 172.16.0.0
2811A(config-router)#ctrl+z
2811A#
10. Now the ping should work. Go to 2621 Router A and ping interface f 0/0 on 2621 B.
2621A#ping 172.16.30.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.30.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms
2621A#
Net Detective
Unless you are an expert in using routers and switches, you might enter a command,
have it not work, and not immediately know what you did wrong. We have tried to
bridge that gap with Net Detective