CCNA Routing and Switching: Connecting Networks: Instructor Lab Manual
CCNA Routing and Switching: Connecting Networks: Instructor Lab Manual
Connecting Networks
Instructor Lab Manual
Objective
Identify the three layers of a hierarchical network and how they are used in network design.
Instructor Note: This activity can be completed individually or in small groups.
Scenario
A network administrator is tasked with designing an expanded network for the company.
After speaking with network administrators in other branches of the company, it was decided to use the Cisco
three-layer hierarchical network design model to guide the expansion. This model was chosen for its simple
influence upon network planning.
The three layers of the expanded network design include:
Access
Distribution
Core
Resources
Presentation software
Step 1: Use the Internet to research the Cisco three-layer design model for images only.
a. Find two images that show the three-layer hierarchical design model.
b. Note the online images web address.
Step 2: Study the two images you have selected from Step 1.
a. Notice the types of equipment in each layer of the designs you have chosen.
b. Differentiate why it is assumed the types of equipment shown in the images are located where they are
on the design.
c.
Comparison statements as to how the two images differ, but with an explanation of why they are
classified as three-level hierarchical designs.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 4
Design Hierarchy
Step 4: Present the slides to a classmate, another group, or the class for discussion.
Suggested Activity Example (no model numbers are given, as emphasis is on the
hierarchical functions of the network devices shown):
Slide 1:
Graphic 1
Access layer shows basic switches, Spanning Tree options, redundancy to the Distribution layer, and security
considerations.
Distribution layer shows redundancy, load balancing, and routing protocols linked to the Core layer.
Core layer shows load balancing, redundancy, routing protocols, and port aggregation.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 4
Design Hierarchy
Slide 2:
Graphic 2
Access layer shows PCs, access switches, VPN gateways, printers, teleworker, home office, and wireless
router. Also shown in this layer are redundant links to the distribution layer.
The distribution layer shows several multilayer switches and link connections to the core layer.
The core layer shows multilayer switches and connections to the distribution layer and the cloud.
Slide 3:
Basic equipment types are located in the access layer, closest to the user and work with the distribution layer
above it. Most of the network devices are located at this level on both images.
The distribution layer equipment interfaces with both core and access layers in both images. This hierarchical
level seems to contain the most sophisticated and multifunctional equipment. Redundancy is clearly apparent
to both core and access layers as shown in the first model. It would seem that high-powered multifunction
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 4
Design Hierarchy
switches would be located at this level of the two graphics. The number of network devices shown in both
graphics at this level is smaller than the access layer, but larger than the core layer.
As shown in the two previous graphics, the core layer has the most sophisticated equipment. There are fewer
network devices at this layer, which seems to indicate that the devices are highly functioning and fast traffic
processors.
Access
Distribution
Core
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 4
Objective
Describe borderless networks components.
Instructor Note: This activity can be completed individually or in small or large groups.
Scenario
You are the network administrator for your small- to medium-sized business. Borderless network services interest
you as you plan your networks future.
While planning for network policies and services, you realize that your wired and wireless networks need
manageability and deployment design.
Therefore, this leads you to consider the following Cisco borderless services as possible options for your
business:
Security TrustSec
Mobility Motion
Resources
Directions
Step 1: Select three Cisco borderless network services that interest you from the following list:
Security TrustSec
Mobility Motion
Step 2: Using the Internet, research your three selections. Consider finding short video
presentations and various websites of the three borderless network services you
selected. Be sure to take notes on your research:
a. Based on your research, create a basic definition of each borderless network service.
b. List at least three areas of assistance each borderless service offers to network administrators.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
Step 3: Prepare an informational matrix listing the three borderless network services you
selected. Include the video notes you completed in Steps 2a and b.
Step 4: Share your matrix with another student, group, or the entire class.
Note: As students listen to group presentations, they can take notes and submit them to the Instructor.
Borderless Network
Service
Security TrustSec
The Power of Cisco ISE
Basic Definition
Mobility Motion
Cisco Data In Motion
Application performance
App Velocity
Application Velocity
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
Multimedia performance
Medianet
Video-ready Network
with Cisco MediaNet
Energy management
EnergyWise
Lights Out - Cisco
EnergyWise
Security TrustSec
Mobility Motion
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Objective
Describe WAN access technologies available to small-to-medium-sized business networks.
Instructor Note:
This activity is can be completed individually or in small groups it can then be shared and discussed
with another group of students, with the entire class, or with the instructor.
At this point of the curriculum, students should learn that there are different types of network equipment
more suited for sizes of networks rather than which specific models of equipment should be considered
for purchase.
Scenario
Your medium-sized company is opening a new branch office to serve a wider, client-based network. This branch
will focus on regular, day-to-day network operations, but will also provide TelePresence, web conferencing, IP
telephony, video on demand, and wireless services.
Although you know that an ISP can provide WAN routers and switches to accommodate the branch office
connectivity for the network, you prefer to use your own customer premises equipment (CPE). To ensure
interoperability, Cisco devices have been used in all other branch-office WANs.
As the branch-office network administrator, it is your responsibility to research possible network devices for
purchase and use over the WAN.
Resources
Directions
Step 1:
Visit the Cisco Branch-WAN Business Calculator site. Accept the agreement to use the
calculator.
Step 2: Input information to help the calculator determine a preferred router or ISR option for
your branch and WAN (both).
Note: There is a slider tool within the calculator window that allows the choice of more service options for your
branch office and WAN.
Step 3: The calculator will suggest a possible router or ISR device solution for your branch
office and WAN. Use the tabs at the top of the calculator window to view the output.
Step 4: Create a matrix with three column headings and list some information provided by the
output in each category:
Energy savings
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Branching Out
Step 5: Discuss your research with a classmate, group, class, or your instructor. Include in
your discussion:
Additional factors you would consider before purchasing a router or ISR for your new branch office
Energy Savings
(output notes will vary per group depending on WAN considerations and services specified)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Objectives
Part 1: Investigate Dedicated WAN Technologies and Providers
Part 2: Investigate a Dedicated Leased Line Service Provider in Your Area
Background / Scenario
Todays broadband Internet services are fast, affordable, and secure using VPN technologies. However,
many companies still find the need for a 24-hour dedicated connection to the Internet or a dedicated point-topoint connection from one office location to another. In this lab, you will investigate the cost and availability of
purchasing a dedicated T1 Internet connection for your home or business.
Required Resources
Device with Internet access
Dedicated
Connection
(yes/no)
Copper
(yes/no)
Fiber
(yes/no)
Wireless
(yes/no)
Speed/Range
T1/DS1
yes
yes
yes
yes
1.544 Mb/s
T3/DS3
yes
yes
yes
yes
44.736 Mb/s
OC3 (SONET)
yes
no
yes
no
155.52 Mb/s
Frame Relay
yes
yes
yes
yes
ATM
yes
yes
yes
yes
MPLS
yes
yes
yes
yes
Up to 10 Gb/s
yes
yes
yes
no
Up to 10 Gb/s
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 5
Internet Service
Provider
T1/DS1/PRI
T3/DS3
OC3
(SONET)
Frame
Relay
ATM
MPLS
EPL
Ethernet Private Line
Comcast
Integra
x
x
tw telecom
AT&T
Cbeyond
Earthlink
Level 3
Communications
XO
Communications
Verizon
Type the Phone Number to connect to the WAN. This number should be a landline number.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 5
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 5
Click Continue.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 5
Reflection
1. What are the disadvantages to using a T1 leased line for personal home use? What would be a better
solution?
_______________________________________________________________________________________
A symmetrical service such as T1 would be more expensive and unnecessary for home use. Home users
typically do much more downloading than uploading and an asymmetrical service such as DSL or Cable could
provide faster downloads at a more affordable price.
2. When might the use of a dedicated WAN connection, of any type, be a good connectivity solution for a
business.
_______________________________________________________________________________________
Answers will vary. A business, which requires fast Internet speeds, both download and upload, and an
uninterrupted connection would benefit from a dedicated connection.
3. Describe other WAN technologies that provide high-speed, low-cost options that could be an alternative
solution to a T1 connection.
_______________________________________________________________________________________
Frame Relay, MPLS, and Metro Ethernet or Ethernet Private Line (EPL) are technologies that would be worth
researching.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 5
Objective
Select WAN access technologies to satisfy business requirements in a small-to-medium-sized business network.
Instructor Note: This activity can be completed individually or in small groups it can then be shared and
discussed with another group of students, with the entire class, or with the instructor.
Scenario
Your medium-sized company is upgrading its network. To make the most of the equipment currently in use, you
decide to purchase WAN modules instead of new equipment.
All branch offices use either Cisco 1900 or 2911 series ISRs. You will be updating these routers in several
locations. Each branch has its own ISP requirements to consider.
To update the devices, focus on the following WAN modules access types:
Ethernet
Broadband
BRI
Serial
Resources
Directions
Step 1: Visit Interfaces and Modules. On this page, you will see many options ISR interface
modules options remember that you currently own and use only the Cisco 1900 and
2900 series routers.
Note: If the above link is no longer valid, search the Cisco site for Interfaces and Modules.
Step 2: Create a comparison matrix listing the following WAN access types for your branch
networks:
Ethernet
Broadband
BRI
Serial WAN
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 5
Step 3: In the matrix, record the interface module type you need to purchase for your ISRs for
upgrade purposes.
Step 4: Use the Internet to research pictures of the modules. Provide a screenshot of the
module or a hyperlink to a picture of each module.
Step 5: Share your matrix with a classmate, group, class, or your instructor.
This is a good place to have students discuss the terminology. For instance, WIC2T = WAN Interface Card
with 2 serial ports.
Students can also add various cards to routers in PT and use commands such as show ip interface brief to
view the changes.
Please encourage students to read the datasheet information listed on the modular card graphics sites they
will become familiar with different interface types by doing so.
All graphics will vary as shown in the students final matrix the graphics shown in this Activity Example
Solution are representative in nature and were copied from the Cisco products sites. Each graphic is
hyperlinked to the source available at the time this activity was created.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 5
WAN
Access
Type
Multimode
VDSL2/ADSL/2/2+ EHWIC
Annex (A, B, and M
variations)*
Multimode EFM/ATM
SHDSL EHWIC
Ethernet
Broadband
2-port Channelized
E1/T1/ISDN PRI HWIC*
1-port Channelized
E1/T1/ISDN PRI HWIC
BRI
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 5
One-port clear-channel
T3/E3 Service Module
1-Port T1/Fractional T1
DSU/CSU High-Speed WAN
Interface Card*
T1/E1
Trunk
Voice and
WAN
Wireless
LANs and
WAN
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 5
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 5
Objectives
Describe the benefits of using PPP over HDLC in a WAN.
This activity can be completed individually or in small groups of 2-3 students per group.
Scenario
Your network engineering supervisor recently attended a networking conference where Layer 2 protocols were
discussed. He knows that you have Cisco equipment on the premises, but he would also like to offer security and
advanced TCP/IP options and controls on that same equipment by using the Point-to-Point Protocol (PPP).
After researching the PPP protocol, you find it offers some advantages over the HDLC protocol, currently used on
your network.
Create a matrix listing the advantages and disadvantages of using the HDLC vs. PPP protocols. When comparing
the two protocols, include:
Ease of configuration
Security options
Bandwidth consolidation
Share your chart with another student or class. Justify whether or not you would suggest sharing the matrix with
the network engineering supervisor to justify a change being made from HDLC to PPP for Layer 2 network
connectivity.
Resources
RFC 1661
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
PPP Persuasion
HDLC and PPP Comparison Chart
Criteria
HDLC
PPP
Ease of Configuration
Adaptability to Non-Proprietary
Network Equipment
Security Options
Not offered
Compression available
Bandwidth Consolidation
PPP
HDLC
CHAP
PAP
TDM
STDM
Bandwidth compression
Bandwidth consolidation
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Topology
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 27
Addressing Table
Device
Branch1
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
192.168.1.1
255.255.255.0
N/A
S0/0/0 (DCE)
10.1.1.1
255.255.255.252
N/A
S0/0/0
10.1.1.2
255.255.255.252
N/A
S0/0/1 (DCE)
10.2.2.2
255.255.255.252
N/A
Lo0
209.165.200.225
255.255.255.224
N/A
G0/1
192.168.3.1
255.255.255.0
N/A
S0/0/1
10.2.2.1
255.255.255.252
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
PC-C
NIC
192.168.3.3
255.255.255.0
192.168.3.1
Central
Branch3
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure PPP Encapsulation
Part 3: Configure PPP CHAP Authentication
Background / Scenario
The Point-to-Point Protocol (PPP) is a very common Layer 2 WAN protocol. PPP can be used to connect from
LANs to service provider WANs and for connection of LAN segments within an enterprise network.
In this lab, you will configure PPP encapsulation on dedicated serial links between the branch routers and a
central router. You will configure PPP Challenge Handshake Authentication Protocol (CHAP) on the PPP
serial links. You will also examine the effects of the encapsulation and authentication changes on the status of
the serial link.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 27
d. Create a message of the day (MOTD) banner warning users that unauthorized access is prohibited.
e. Assign class as the encrypted privileged EXEC mode password.
f.
Assign cisco as the console and vty password and enable login.
j.
Create Loopback0 on the Central router to simulate access to the Internet and assign an IP address
according to the Addressing Table.
Issue the show ip route ospf, show ip ospf interface brief, and show ip ospf neighbor commands on
all routers to verify that OSPF is configured correctly. Take note of the router ID for each router.
Branch1:
Branch1# show ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is 10.1.1.2 to network 0.0.0.0
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 27
PID
1
1
Area
0
0
IP Address/Mask
10.1.1.1/30
192.168.1.1/24
Cost
64
1
State
FULL/
Dead Time
00:00:33
Address
10.1.1.2
Interface
Serial0/0/0
Central:
Central# show ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is 0.0.0.0 to network 0.0.0.0
O
O
PID
1
1
Area
0
0
IP Address/Mask
10.2.2.2/30
10.1.1.2/30
Cost
64
64
Pri
0
0
State
FULL/
FULL/
Dead Time
00:00:33
00:00:36
Address
10.2.2.1
10.1.1.1
Interface
Serial0/0/1
Serial0/0/0
Branch3:
Branch3# show ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 27
PID
1
1
Area
0
0
IP Address/Mask
10.2.2.1/30
192.168.3.1/24
Cost
64
1
State
FULL/
Dead Time
00:00:37
Address
10.2.2.2
Interface
Serial0/0/1
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 27
What is the default serial encapsulation for a Cisco router? __________________________________ HDLC
Branch1(config-if)#
Jun 19 06:02:35.687: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0,
changed state to down
b. Issue the command to display the line status and line protocol for interface S0/0/0 on the Branch1 router.
Document the command issued. What is current interface status for S0/0/0?
____________________________________________________________________________________
Branch1# show ip interface brief
Line status is up, and line protocol is down.
Branch1# show ip interface brief
Interface
Embedded-Service-Engine0/0
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
Serial0/0/1
c.
IP-Address
unassigned
unassigned
192.168.1.1
10.1.1.1
unassigned
OK?
YES
YES
YES
YES
YES
Method
unset
unset
manual
manual
unset
Status
Protocol
administratively down down
administratively down down
up
up
up
down
administratively down down
Issue the encapsulation ppp command on interface S0/0/0 for the Central router to correct the serial
encapsulation mismatch.
Central(config)# interface s0/0/0
Central(config-if)# encapsulation ppp
Central(config-if)#
.Jun 19 06:03:41.186: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0,
changed state to up
.Jun 19 06:03:41.274: %OSPF-5-ADJCHG: Process 1, Nbr 192.168.1.1 on Serial0/0/0 from
LOADING to FULL, Loading Done
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 27
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 27
c.
Branch1#
Jun 20 02:20:45.795:
Jun 20 02:20:49.639:
Jun 20 02:20:50.147:
Jun 20 02:20:50.147:
Jun 20 02:20:50.159:
Jun 20 02:20:50.159:
Jun 20 02:20:50.159:
Se0/0/0
Se0/0/0
Se0/0/0
Se0/0/0
Se0/0/0
Se0/0/0
Se0/0/0
Central#
Jun 20 02:20:49.636:
Jun 20 02:20:50.148:
Jun 20 02:20:50.148:
Jun 20 02:20:50.148:
Jun 20 02:20:50.160:
Jun 20 02:20:50.160:
Jun 20 02:20:55.552:
Se0/0/0
Se0/0/0
Se0/0/0
Se0/0/0
Se0/0/0
Se0/0/0
Se0/0/0
Break the serial connection by returning the serial encapsulation to HDLC for interface S0/0/0 on the
Branch1 router. Record the command used to change the encapsulation to HDLC.
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 27
e. Observe the debug PPP messages on the Central router. The Central router continues to attempt to
establish a connection with Branch1 as indicated by the debug messages. When the interfaces are
unable to establish a connection, the interfaces go back down again. Furthermore, OSPF cannot
establish an adjacency with its neighbor due to the mismatched serial encapsulation.
Jun 20 02:29:50.296: Se0/0/0 PPP: Sending cstate DOWN notification
Jun 20 02:29:50.296: Se0/0/0 PPP: Processing CstateDown message
Jun 20 02:29:50.296: Se0/0/0 PPP DISC: Lower Layer disconnected
Jun 20 02:29:50.296: PPP: NET STOP send to AAA.
Jun 20 02:29:50.296: Se0/0/0 IPCP: Event[DOWN] State[Open to Starting]
Jun 20 02:29:50.296: Se0/0/0 IPCP: Event[CLOSE] State[Starting to Initial]
Jun 20 02:29:50.296: Se0/0/0 CDPCP: Event[DOWN] State[Open to Starting]
Jun 20 02:29:50.296: Se0/0/0 CDPCP: Event[CLOSE] State[Starting to Initial]
Jun 20 02:29:50.296: Se0/0/0 LCP: O TERMREQ [Open] id 2 len 4
Jun 20 02:29:50.296: Se0/0/0 LCP: Event[CLOSE] State[Open to Closing]
Jun 20 02:29:50.296: Se0/0/0 PPP: Phase is TERMINATING
Jun 20 02:29:50.296: Se0/0/0 Deleted neighbor route from AVL tree: topoid 0, address
10.1.1.1
Jun 20 02:29:50.296: Se0/0/0 IPCP: Remove route to 10.1.1.1
Jun 20 02:29:50.296: %OSPF-5-ADJCHG: Process 1, Nbr 192.168.1.1 on Serial0/0/0 from
FULL to DOWN, Neighbor Down: Interface down or detached
Jun 20 02:29:50.296: Se0/0/0 LCP: Event[DOWN] State[Closing to Initial]
Jun 20 02:29:50.296: Se0/0/0 PPP: Phase is DOWN
Jun 20 02:29:52.296: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0,
changed state to down
.Jun 20 02:29:52.296: Se0/0/0 PPP: Sending cstate UP notification
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 27
02:29:52.296:
02:29:52.296:
02:29:52.296:
02:29:52.296:
02:29:52.296:
02:29:52.296:
02:29:52.296:
02:29:52.296:
02:29:52.296:
02:29:52.296:
02:29:54.308:
02:29:54.308:
02:29:54.308:
02:29:56.080:
02:29:56.080:
omitted>
02:30:10.436:
02:30:10.436:
02:30:10.436:
02:30:12.452:
02:30:12.452:
02:30:12.452:
02:30:12.452:
02:30:12.452:
02:30:14.452:
02:30:14.452:
02:30:14.452:
02:30:14.452:
02:30:14.452:
02:30:14.452:
02:30:14.452:
02:30:14.452:
02:30:14.452:
02:30:16.080:
02:30:16.080:
omitted>
02:30:32.580:
02:30:32.580:
02:30:32.580:
02:30:34.596:
02:30:34.596:
02:30:34.596:
02:30:34.596:
02:30:34.596:
02:30:36.080:
02:30:36.596:
02:30:36.596:
02:30:36.596:
02:30:36.596:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 27
What happens when one end of the serial link is encapsulated with PPP and the other end of the link is
encapsulated with HDLC?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The link goes down, and the OSPF adjacency is broken. PPP keeps trying to establish a connection with
the opposite end of the link as indicated by the message Phase is ESTABLISHING. However, because
it keeps receiving a non-NCP packet, LCP fails to negotiate and the link stays down.
f.
Issue the encapsulation ppp command on the S0/0/0 interface for the Branch1 router to correct
mismatched encapsulation.
Branch1(config)# interface s0/0/0
Branch1(config-if)# encapsulation ppp
g. Observe the debug PPP messages from the Branch1 router as the Branch1 and Central routers establish
a connection.
Branch1(config-if)#
Jun 20 03:01:57.399: %OSPF-5-ADJCHG: Process 1, Nbr 209.165.200.225 on Serial0/0/0
from FULL to DOWN, Neighbor Down: Interface down or detached
Jun 20 03:01:59.399: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0,
changed state to down
Jun 20 03:01:59.399: Se0/0/0 PPP: Sending cstate UP notification
Jun 20 03:01:59.399: Se0/0/0 PPP: Processing CstateUp message
Jun 20 03:01:59.399: PPP: Alloc Context [30F8D4F0]
Jun 20 03:01:59.399: ppp9 PPP: Phase is ESTABLISHING
Jun 20 03:01:59.399: Se0/0/0 PPP: Using default call direction
Jun 20 03:01:59.399: Se0/0/0 PPP: Treating connection as a dedicated line
Jun 20 03:01:59.399: Se0/0/0 PPP: Session handle[BA000009] Session id[9]
Jun 20 03:01:59.399: Se0/0/0 LCP: Event[OPEN] State[Initial to Starting]
Jun 20 03:01:59.399: Se0/0/0 LCP: O CONFREQ [Starting] id 1 len 10
Jun 20 03:01:59.399: Se0/0/0 LCP:
MagicNumber 0x8D0EAC44 (0x05068D0EAC44)
Jun 20 03:01:59.399: Se0/0/0 LCP: Event[UP] State[Starting to REQsent]
Jun 20 03:01:59.407: Se0/0/0 PPP: I pkt type 0xC021, datagramsize 14 link[ppp]
Jun 20 03:01:59.407: Se0/0/0 LCP: I CONFREQ [REQsent] id 1 len 10
Jun 20 03:01:59.407: Se0/0/0 LCP:
MagicNumber 0x73B4F1AF (0x050673B4F1AF)
Jun 20 03:01:59.407: Se0/0/0 LCP: O CONFACK [REQsent] id 1 len 10
Jun 20 03:01:59.407: Se0/0/0 LCP:
MagicNumber 0x73B4F1AF (0x050673B4F1AF)
Jun 20 03:01:59.407: Se0/0/0 LCP: Event[Receive ConfReq+] State[REQsent to ACKsent]
Jun 20 03:01:59.407: Se0/0/0 PPP: I pkt type 0xC021, datagramsize 14 link[ppp]
Jun 20 03:01:59.407: Se0/0/0 LCP: I CONFACK [ACKsent] id 1 len 10
Jun 20 03:01:59.407: Se0/0/0 LCP:
MagicNumber 0x8D0EAC44 (0x05068D0EAC44)
Jun 20 03:01:59.407: Se0/0/0 LCP: Event[Receive ConfAck] State[ACKsent to Open]
Jun 20 03:01:59.439: Se0/0/0 PPP: Phase is FORWARDING, Attempting Forward
Jun 20 03:01:59.439: Se0/0/0 LCP: State is Open
Jun 20 03:01:59.439: Se0/0/0 PPP: Phase is ESTABLISHING, Finish LCP
Jun 20 03:01:59.439: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0,
changed state to up
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 27
h. Observe the debug PPP messages from the Central router as the Branch1 and Central routers establish
a connection.
Jun 20 03:01:59.393: Se0/0/0 PPP: I pkt type 0xC021, datagramsize 14 link[ppp]
Jun 20 03:01:59.393: Se0/0/0 LCP: I CONFREQ [Open] id 1 len 10
Jun 20 03:01:59.393: Se0/0/0 LCP:
MagicNumber 0x8D0EAC44 (0x05068D0EAC44)
Jun 20 03:01:59.393: Se0/0/0 PPP DISC: PPP Renegotiating
Jun 20 03:01:59.393: PPP: NET STOP send to AAA.
Jun 20 03:01:59.393: Se0/0/0 LCP: Event[LCP Reneg] State[Open to Open]
Jun 20 03:01:59.393: Se0/0/0 IPCP: Event[DOWN] State[Open to Starting]
Jun 20 03:01:59.393: Se0/0/0 IPCP: Event[CLOSE] State[Starting to Initial]
Jun 20 03:01:59.393: Se0/0/0 CDPCP: Event[DOWN] State[Open to Starting]
Jun 20 03:01:59.393: Se0/0/0 CDPCP: Event[CLOSE] State[Starting to Initial]
Jun 20 03:01:59.393: Se0/0/0 LCP: Event[DOWN] State[Open to Starting]
Jun 20 03:01:59.393: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0,
changed state to down
Jun 20 03:01:59.393: Se0/0/0 PPP: Outbound cdp packet dropped, NCP not negotiated
.Jun 20 03:01:59.393: Se0/0/0 PPP: Phase is DOWN
.Jun 20 03:01:59.393: Se0/0/0 Deleted neighbor route from AVL tree: topoid 0, address
10.1.1.1
.Jun 20 03:01:59.393: Se0/0/0 IPCP: Remove route to 10.1.1.1
.Jun 20 03:01:59.393: %OSPF-5-ADJCHG: Process 1, Nbr 192.168.1.1 on Serial0/0/0 from
FULL to DOWN, Neighbor Down: Interface down or detached
.Jun 20 03:01:59.397: PPP: Alloc Context [29F9F32C]
.Jun 20 03:01:59.397: ppp38 PPP: Phase is ESTABLISHING
.Jun 20 03:01:59.397: Se0/0/0 PPP: Using default call direction
.Jun 20 03:01:59.397: Se0/0/0 PPP: Treating connection as a dedicated line
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 27
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 27
From the debug message, what phases does PPP go through when the other end of the serial link on the
Central router is configured with PPP encapsulation?
____________________________________________________________________________________
____________________________________________________________________________________
PPP goes through the following phases: DOWN, ESTABLISHING, and UP.
What happens when PPP encapsulation is configured on each end of the serial link?
____________________________________________________________________________________
The link comes up, and the OSPF adjacency is restored.
i.
Issue the undebug all (or u all) command on the Branch1 and Central routers to turn off all debugging on
both routers.
j.
Issue the show ip interface brief command on the Branch1 and Central routers after the network
converges. What is the status for interface S0/0/0 on both routers?
____________________________________________________________________________________
Serial 0/0/0 has status up and protocol up.
Branch1# show ip interface brief
Interface
Embedded-Service-Engine0/0
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
Serial0/0/1
IP-Address
unassigned
unassigned
192.168.1.1
10.1.1.1
unassigned
OK?
YES
YES
YES
YES
YES
Method
unset
unset
manual
manual
unset
Status
Protocol
administratively down down
administratively down down
up
up
up
up
administratively down down
OK?
YES
YES
YES
YES
YES
YES
Method
unset
unset
unset
manual
manual
manual
Status
Protocol
administratively down down
administratively down down
administratively down down
up
up
up
up
up
up
k.
IP-Address
unassigned
unassigned
unassigned
10.1.1.2
10.2.2.2
209.165.200.225
Verify that the interface S0/0/0 on both Branch1 and Central routers are configured for PPP
encapsulation.
Record the command to verify the PPP encapsulation in the space provided below.
____________________________________________________________________________________
____________________________________________________________________________________
Branch1# show interfaces s0/0/0
Central# show interfaces s0/0/0
l.
Change the serial encapsulation for the link between the Central and Branch3 routers to PPP
encapsulation.
Central(config)# interface s0/0/1
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 27
Step 2: Configure PPP CHAP authentication for the link between the Central router and the
Branch3 router.
a. Configure a username for CHAP authentication.
Central(config)# username Branch3 password cisco
Branch3(config)# username Central password cisco
b. Issue the debug ppp commands on the Branch3 router to observe the process, which is associated with
authentication.
Branch3# debug ppp negotiation
PPP protocol negotiation debugging is on
c.
d. Examine the debug PPP messages on the Branch3 router during the negotiation with the Central router.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 27
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 16 of 27
Se0/0/1
Se0/0/1
Se0/0/1
Se0/0/1
Se0/0/1
From the PPP debug messages, what phases did the Branch3 router go through before the link is up with
the Central router?
____________________________________________________________________________________
____________________________________________________________________________________
PPP goes through the following phases: DOWN, ESTABLISHING, AUTHENTICATING, and UP.
e. Issue the debug ppp authentication command to observe the CHAP authentication messages on the
Central router.
Central# debug ppp authentication
PPP authentication debugging is on
f.
g. Observe the debug PPP messages relating to CHAP authentication on the Central router.
Central(config-if)#
.Jun 20 05:05:16.057: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/1,
changed state to down
.Jun 20 05:05:16.061: %OSPF-5-ADJCHG: Process 1, Nbr 192.168.3.1 on Serial0/0/1 from
FULL to DOWN, Neighbor Down: Interface down or detached
.Jun 20 05:05:16.061: Se0/0/1 PPP: Using default call direction
.Jun 20 05:05:16.061: Se0/0/1 PPP: Treating connection as a dedicated line
.Jun 20 05:05:16.061: Se0/0/1 PPP: Session handle[12000078] Session id[112]
.Jun 20 05:05:16.081: Se0/0/1 CHAP: O CHALLENGE id 1 len 28 from "Central"
.Jun 20 05:05:16.089: Se0/0/1 CHAP: I CHALLENGE id 1 len 28 from "Branch3"
.Jun 20 05:05:16.089: Se0/0/1 PPP: Sent CHAP SENDAUTH Request
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 17 of 27
h. Issue the undebug all (or u all) command on the Central and Branch3 routers to turn off all debugging.
Central# undebug all
All possible debugging has been turned off
c.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 18 of 27
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
20
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.229:
05:25:26.233:
05:25:26.233:
05:25:26.233:
05:25:26.233:
05:25:26.261:
05:25:26.261:
05:25:26.261:
05:25:26.265:
05:25:26.265:
05:25:26.265:
05:25:26.265:
05:25:26.265:
05:25:26.265:
05:25:26.265:
05:25:26.265:
05:25:26.265:
05:25:26.265:
05:25:26.265:
Explain what is causing the link to terminate. Correct the issue and document the command issued to
correct the issue in the space provided below.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The link terminated because the CHAP handshake cannot be completed without the correct user
credential on Branch1.
Branch1(config)# username Central password cisco
d. Issue the undebug all command on all routers to turn off debugging.
e. Verify end-to-end connectivity.
Reflection
1. What are the indicators that you may have a serial encapsulation mismatch on a serial link?
_______________________________________________________________________________________
Some of the indicators are: the network is no longer converged because some of the routes are removed and
the line protocol for the link is down.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 19 of 27
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Branch1
Branch1# show run
Building configuration...
Current configuration : 1832 bytes
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Branch1
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 20 of 27
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 21 of 27
Central
Central#show run
Building configuration...
Current configuration : 1964 bytes
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 22 of 27
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 23 of 27
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 24 of 27
Branch3
Branch3# show run
Building configuration...
Current configuration : 1929 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Branch3
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 25 of 27
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 26 of 27
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 27 of 27
Topology
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 23
Addressing Table
Device
R1
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
192.168.1.1
255.255.255.0
N/A
S0/0/0 (DCE)
192.168.12.1
255.255.255.252
N/A
S0/0/1
192.168.13.1
255.255.255.252
N/A
Lo0
209.165.200.225
255.255.255.252
N/A
S0/0/0
192.168.12.2
255.255.255.252
N/A
S0/0/1 (DCE)
192.168.23.1
255.255.255.252
N/A
G0/1
192.168.3.1
255.255.255.0
N/A
S0/0/0 (DCE)
192.168.13.2
255.255.255.252
N/A
S0/0/1
192.168.23.2
255.255.255.252
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
PC-C
NIC
192.168.3.3
255.255.255.0
192.168.3.1
R2
R3
Objectives
Part 1: Build the Network and Load Device Configurations
Part 2: Troubleshoot the Data Link Layer
Part 3: Troubleshoot the Network Layer
Background / Scenario
The routers at your company were configured by an inexperienced network engineer. Several errors in the
configuration have resulted in connectivity issues. Your manager has asked you to troubleshoot and correct
the configuration errors and document your work. Using your knowledge of PPP and standard testing
methods, find and correct the errors. Ensure that all of the serial links use PPP CHAP authentication, and that
all of the networks are reachable.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with a terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 23
From the show interfaces results for S0/0/0 and S0/0/1, what are possible issues with the PPP links?
____________________________________________________________________________________
____________________________________________________________________________________
The output indicates: Both S0/0/0 and S0/0/1 are shut down. PPP encapsulation has been applied to both
S0/0/0 and S0/0/1 interfaces. Besides the fact that the serial interface are administratively down, there
are still issues with the PPP configurations, such as mismatched authentication.
b. Use the debug ppp authentication command to view real-time PPP authentication output during
troubleshooting.
R1# debug ppp authentication
PPP authentication debugging is on
c.
Use the show run interface s0/0/0 command to examine the settings on S0/0/0.
R1# show run interface s0/0/0
Building configuration...
Current configuration : 143 bytes
!
interface Serial0/0/0
ip address 192.168.12.1 255.255.255.252
encapsulation ppp
shutdown
ppp authentication chap
clock rate 128000
end
Resolve all problems found for S0/0/0. Record the commands used to correct the configuration.
____________________________________________________________________________________
R1(config)# interface s0/0/0
R1(config-if)# no shutdown
After correcting the issue, what information does the debug output provide?
R1(config-if)# no shutdown
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
18
18
18
18
18
18
18
12:01:23.931:
12:01:23.931:
12:01:23.931:
12:01:23.931:
12:01:23.943:
12:01:23.947:
12:01:23.947:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 23
____________________________________________________________________________________
The debug output shows a successful CHAP negotiation process. PPP has been established on the link
connecting R1 S0/0/0 and R2 S0/0/0.
d. Use the show run interface s0/0/1 command to examine the settings on S0/0/1.
R1# show run interface s0/0/1
Building configuration...
Current configuration : 123 bytes
!
interface Serial0/0/1
ip address 192.168.31.1 255.255.255.252
encapsulation ppp
shutdown
ppp authentication pap
end
Resolve all problems found for S0/0/1. Record the commands used to correct the configuration.
____________________________________________________________________________________
____________________________________________________________________________________
R1(config)# interface s0/0/1
R1(config-if)# ppp authentication chap
R1(config-if)# no shutdown
After correcting the issue, what information does the debug output provide?
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
*Jun
18
18
18
18
18
18
18
18
18
18
18
18
18
18
18
12:13:57.819:
12:13:57.819:
12:13:57.819:
12:13:57.819:
12:13:57.831:
12:13:57.831:
12:13:57.831:
12:13:57.831:
12:13:57.831:
12:13:57.831:
12:13:57.831:
12:14:01.819:
12:14:01.819:
12:14:01.819:
12:14:01.831:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 23
____________________________________________________________________________________
____________________________________________________________________________________
The debug output shows an unsuccessful CHAP negotiation process and the interface is going up and
down. More configuration errors exist for the link connecting R1 S0/0/1 and R3 S0/0/0.
e. Use the no debug ppp authentication or undebug all command to turn off the debug PPP output.
f.
Use the show running-config | include username command to verify the correct username and
password configurations.
R1# show running-config | include username
username R2 password 0 chap123
username R3 password 0 chap123
Resolve all problems found. Record the commands used to correct the configuration.
____________________________________________________________________________________
No problems exist.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 23
Resolve all problems found for the interfaces. Record the commands used to correct the configuration.
____________________________________________________________________________________
____________________________________________________________________________________
R2(config)# interface s0/0/1
R2(config-if)# encapsulation ppp
R2(config-if)# ppp authentication chap
c.
Use the show running-config | include username command to verify the correct username and
password configurations.
R2# show running-config | include username
username R1 password 0 chap123
username r3 password 0 chap123
Resolve all problems found. Record the commands used to correct the configuration.
____________________________________________________________________________________
____________________________________________________________________________________
R2(config)# no username r3 password chap123
R2(config)# username R3 password chap123
d. Use the show ppp interface serial command for the serial interface that you are troubleshooting.
R2# show interfaces s0/0/1
Serial0/0/1 is up, line protocol is up
Hardware is GT96K Serial
Internet address is 192.168.23.1/30
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, LCP Open
Open: IPCP, CDPCP, loopback not set
Keepalive set (10 sec)
CRC checking enabled
Last input 00:00:07, output 00:00:00, output hang never
Last clearing of "show interface" counters 00:25:09
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/1/256 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
Available Bandwidth 1158 kilobits/sec
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
506 packets input, 27348 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 23
Resolve all problems found on the interfaces. Record the commands used to correct the configuration.
____________________________________________________________________________________
No problems exist with the S0/0/0 configuration.
c.
Use the show running-config | include username command to verify the correct username and
password configurations.
R3# show run | include username
username R2 password 0 chap123
username R3 password 0 chap123
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 23
Step 1: Verify that the interfaces listed in the Addressing Table are active and configured with
the correct IP address information.
Issue the show ip interface brief command on all routers to verify that the interfaces are in an up/up state.
R1# show ip interface brief
Interface
Embedded-Service-Engine0/0
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
Serial0/0/1
IP-Address
unassigned
unassigned
192.168.1.1
192.168.12.1
192.168.31.1
OK?
YES
YES
YES
YES
YES
Method
unset
unset
manual
manual
manual
Status
Protocol
administratively down down
administratively down down
up
up
up
up
up
up
OK?
YES
YES
YES
YES
YES
YES
Method
unset
unset
unset
manual
manual
manual
Status
Protocol
administratively down down
administratively down down
administratively down down
up
up
up
up
up
up
OK?
YES
YES
YES
YES
YES
Method
unset
unset
manual
manual
manual
Status
Protocol
administratively down down
administratively down down
up
up
up
up
up
up
IP-Address
unassigned
unassigned
unassigned
192.168.12.2
192.168.23.1
209.165.200.225
IP-Address
unassigned
unassigned
192.168.3.1
192.168.13.2
192.168.23.2
Resolve all problems found. Record the commands used to correct the configuration.
____________________________________________________________________________________
R1(config)# interface s0/0/1
R1(config-if)# ip address 192.168.13.1 255.255.255.252
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 23
Last Update
00:01:46
00:01:46
Resolve all problems found. Record the commands used to correct the configuration.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 16 of 23
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 17 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 18 of 23
Router R2
R2#show run
Building configuration...
Current configuration : 1866 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 19 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 20 of 23
Router R3
R3#show run
Building configuration...
Current configuration : 1888 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R3
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 21 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 22 of 23
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 23 of 23
Objective
Use show and debug commands to troubleshoot PPP.
Instructor Note: This activity should be completed by groups of three students, but it can be completed by all
individuals in a class at one time.
Scenario
Three friends who are enrolled in the Cisco Networking Academy want to check their knowledge of PPP network
configuration.
They set up a contest where each person will be tested on configuring PPP with defined PPP scenario
requirements and varying options. Each person devises a different configuration scenario.
The next day they get together and test each others configuration using their PPP scenario requirements.
Resources
Stopwatch or timer
The student, or group, completing the scenario correctly is declared the winner.
d. Begin the same process as Scenario 2.
1) Delete Scenario 1 configurations, but you can re-use the same.
2) Complete Steps 1 and 2 again using the next scenarios requirements.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
PPP Validation
Scenario 2
Scenario 3
PPP
CHAP
PAP
EIGRP
OSPF
Interface descriptions
Interface priorities
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Objective
Troubleshoot WAN issues that affect internetwork communications in a small- to medium-sized business network.
Instructor Notes:
This activity allows students to consider other options for WAN connectivity. They are mentioned in the
curriculum and allow students to explore the emerging network WAN communications options available to
todays small- to medium-sized business networks.
Scenario
As the network administrator, in your small- to medium-sized business, you have already moved from leased-line
WAN to Frame Relay connectivity for WAN network communication. You are responsible to keep current with all
future network upgrades.
To stay current with emerging and developing technologies, you find that there are some alternate options
available for WAN connectivity. Some of these include:
Frame Relay
Broadband DSL
GigaMAN
VPN
MPLS
Because you want to offer the best quality, lowest-cost WAN network service to your company, you decide to
research, at least, two emerging and developing technologies. It is your intent to gather information about these
two alternate WAN options to intelligently discuss the future goals of your network with your business manager
and other network administrators.
Resources
Presentation software
Directions
Step 1: Choose two of the following emerging and developing WAN technologies:
a. Frame Relay
b. Broadband DSL
c.
d. GigaMAN
e. VPN
f.
MPLS
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
Step 2: Create a matrix to record information about the two WAN technologies you chose. At a
minimum, include:
a. A short description of the technology
b. Physical requirements to set up the technology
1) Cabling requirements
2) Network devices necessary to operate the WAN technology
3) Who provides the network devices necessary to operate the WAN technology
c.
Step 3: Create a five-slide presentation for future use with discussions with your business
manager or other network administrators.
Physical Requirements
Benefits
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
Associated Costs
WAN technologies
Circuit-switched WANs
Packet-switched WANs
Leased-line connections
Point-to-Point connections
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Topology
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 38
Addressing Table
Device
Interface
Default Gateway
G0/0
192.168.1.1/24
2001:DB8:ACAD:A::1/64
FE80::1 link-local
N/A
S0/0/0 (DCE)
10.1.1.1/30
2001:DB8:ACAD:B::1/64
FE80::1 link-local
N/A
S0/0/0
N/A
N/A
S0/0/1 (DCE)
N/A
N/A
G0/0
192.168.3.1/24
2001:DB8:ACAD:C::3/64
FE80::3 link-local
N/A
S0/0/1
10.1.1.2/30
2001:DB8:ACAD:B::3/64
FE80::3 link-local
N/A
PC-A
NIC
192.168.1.3/24
2001:DB8:ACAD:A::A/64
192.168.1.1
FE80::1
PC-C
NIC
192.168.3.3/24
2001:DB8:ACAD:C::C/64
192.168.3.1
FE80::3
R1
FR
R3
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Configure a Frame Relay Switch
Part 3: Configure Basic Frame Relay
Part 4: Troubleshoot Frame Relay
Part 5: Configure a Frame Relay Subinterface
Background / Scenario
Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI
reference model. Unlike leased lines, Frame Relay requires only a single access circuit to the Frame Relay
provider to communicate with multiple sites that are connected to the same provider.
Frame Relay was one of the most extensively used WAN protocols, primarily because it was relatively
inexpensive compared to dedicated lines. In addition, configuring user equipment in a Frame Relay network is
fairly simple. With the advent of broadband services such as DSL and cable modem, GigaMAN (point-to-point
Ethernet service over fiber-optic cable), VPN, and Multiprotocol Label Switching (MPLS), Frame Relay has
become a less desirable solution for accessing the WAN. However, some rural areas do not have access to
these alternative solutions and still rely on Frame Relay for connectivity to the WAN.
In this lab, you will configure Frame Relay encapsulation on serial links. You will also configure a router to
simulate a Frame Relay switch. You will review Cisco standards and open standards that apply to Frame
Relay. You will also configure Frame Relay point-to-point subinterfaces.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 38
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
d. Assign cisco as the console and vty passwords and enable login.
e. Configure logging synchronous for the console line.
f.
Configure the IPv4 and IPv6 addresses listed in the Addressing Table for all interfaces. Do not activate
the serial interfaces at this time.
j.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 38
Local
Switched
Unused
Active
0
0
0
Inactive
0
1
0
Deleted
0
0
0
Static
0
0
0
DLCI = 103, DLCI USAGE = SWITCHED, PVC STATUS = INACTIVE, INTERFACE = Serial0/0/0
input pkts 0
output pkts 0
in bytes 0
out bytes 0
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 0
out bcast bytes 0
30 second input rate 0 bits/sec, 0 packets/sec
30 second output rate 0 bits/sec, 0 packets/sec
switched pkts 0
Detailed packet drop counters:
no out intf 0
out intf down 0
no out PVC 0
in PVC down 0
out PVC down 0
pkt too big 0
shaping Q full 0
pkt above DE 0
policing drop 0
connected to interface Serial0/0/1 301
pvc create time 00:00:53, last time pvc status changed 00:00:53
PVC Statistics for interface Serial0/0/1 (Frame Relay DCE)
Local
Switched
Unused
Active
0
0
0
Inactive
0
1
0
Deleted
0
0
0
Static
0
0
0
DLCI = 301, DLCI USAGE = SWITCHED, PVC STATUS = INACTIVE, INTERFACE = Serial0/0/1
input pkts 0
output pkts 0
in bytes 0
out bytes 0
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 0
out bcast bytes 0
30 second input rate 0 bits/sec, 0 packets/sec
30 second output rate 0 bits/sec, 0 packets/sec
switched pkts 0
Detailed packet drop counters:
no out intf 0
out intf down 0
no out PVC 0
in PVC down 0
out PVC down 0
pkt too big 0
shaping Q full 0
pkt above DE 0
policing drop 0
connected to interface Serial0/0/0 103
pvc create time 00:00:16, last time pvc status changed 00:00:16
b. Issue the show frame-relay route command. This is the Layer 2 route that Frame Relay traffic takes
through the network. (Do not confuse this with Layer 3 IP routing.)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 38
Input Dlci
103
301
Output Intf
Serial0/0/1
Serial0/0/0
Output Dlci
301
103
Status
inactive
inactive
Use the frame-relay map command to map an IP address to a DLCI statically. In addition to mapping an
IP to a DLCI, Cisco IOS software allows several other Layer 3 protocol addresses to be mapped. In the
following command, the broadcast keyword sends any multicast or broadcast traffic destined for this link
over the DLCI. Most routing protocols require the broadcast keyword to function properly over Frame
Relay. You can use the broadcast keyword on multiple DLCIs on the same interface. The traffic is
replicated to all PVCs.
Note: The IPv6 Frame Relay map to a global unicast address does not include the broadcast keyword.
However, the broadcast keyword is used in the mapping to the link-local address. IPv6 routing protocols
use link-local addresses for multicast routing updates; therefore, only the link-local address map requires
the broadcast keyword to forward multicast packets.
R1(config)# interface s0/0/0
R1(config-if)# frame-relay map ip 10.1.1.2 103 broadcast
R1(config-if)# frame-relay map ipv6 2001:db8:acad:b::3 103
R1(config-if)# frame-relay map ipv6 fe80::3 103 broadcast
d. For the router to ping its own interface, the DLCI must be created to map to the local interface.
R1(config)# interface s0/0/0
R1(config-if)# frame-relay map ip 10.1.1.1 103
R1(config-if)# frame-relay map ipv6 2001:db8:acad:b::1 103
e. Use the no shutdown command to activate S0/0/0.
R1(config-if)# no shutdown
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 38
frame-relay
frame-relay
frame-relay
frame-relay
frame-relay
no shutdown
map
map
map
map
map
Why is the no shutdown command used after the no frame-relay inverse-arp command?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
If you type the no shutdown command first, Inverse ARP may cause Frame Relay to learn Layer 2 to Layer 3
mappings that you may not want. By turning off the Frame Relay Inverse ARP before issuing the no
shutdown command, you ensure that only the statically mapped connections that you want are part of the
Frame Relay maps.
c.
Issue the show frame-relay pvc command to display PVC status information on R1 and R3.
R1# show frame-relay pvc
PVC Statistics for interface Serial0/0/0 (Frame Relay DTE)
Active
Inactive
Deleted
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Static
Page 7 of 38
1
0
0
0
0
0
0
0
0
0
0
0
DLCI = 103, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/0
input pkts 22
output pkts 154
in bytes 2240
out bytes 10860
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 134
out bcast bytes 8780
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
pvc create time 01:59:40, last time pvc status changed 01:55:14
Local
Switched
Unused
Active
1
0
0
Inactive
0
0
0
Deleted
0
0
0
Static
0
0
0
DLCI = 301, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/1
input pkts 158
output pkts 22
in bytes 11156
out bytes 2240
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 2
out bcast bytes 160
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
pvc create time 01:57:20, last time pvc status changed 01:56:19
d. Issue the show frame-relay route command on FR to verify that status of the Frame Relay map
statements.
FR# show frame-relay route
Input Intf
Serial0/0/0
Serial0/0/1
Input Dlci
103
301
Output Intf
Serial0/0/1
Serial0/0/0
Output Dlci
301
103
Status
active
active
e. Issue the show frame-relay map command on R1 and R3 to display a summary of the static and
dynamic mappings of Layer 3 addresses to DLCIs. Because Inverse ARP has been turned off, there are
only static maps.
R1# show frame-relay map
Serial0/0/0 (up): ipv6 FE80::3 dlci 103(0x67,0x1870), static,
broadcast,
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 38
Serial0/0/0
Serial0/0/0
Serial0/0/0
Serial0/0/0
Note: The FR router acts as a Layer 2 device, so there is no need to map Layer 3 addresses to Layer 2
DLCIs.
eigrp 1
no auto-summary
eigrp router-id 1.1.1.1
network 10.1.1.0 0.0.0.3
network 192.168.1.0
shutdown
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 38
c.
Ping R1 from R3. Pings should not be successful. However, debug messages on R1 show that the ICMP
packets from R3 are reaching R1.
Note: You should see console messages reporting the EIGRP adjacency going up and down. This is
sometimes called flapping.
R3# ping 10.1.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
R1#
*Jun 26 20:12:35.693:
BASE, dscp 0 topoid 0
R1#
*Jun 26 20:12:37.689:
BASE, dscp 0 topoid 0
R1#
*Jun 26 20:12:39.689:
BASE, dscp 0 topoid 0
R1#
*Jun 26 20:12:41.689:
BASE, dscp 0 topoid 0
R1#
*Jun 26 20:12:43.689:
BASE, dscp 0 topoid 0
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 38
f.
Re-apply the frame-relay map ip command to S0/0/0 on R1, but without using the broadcast keyword.
R1(config)# interface s0/0/0
R1(config-if)# frame-relay map ip 10.1.1.2 103
g. Ping R1 from R3. Pings should be successful, but the EIGRP adjacency continues to flap. It may take a
few minutes between each message because of the EIGRP timers.
R3# ping 10.1.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 28/28/28 ms
R1(config-if)#
*Jun 26 20:25:10.871: %DUAL-5-NBRCHANGE: EIGRP-IPv4
is down: Interface PEER-TERMINATION received
*Jun 26 20:28:13.673: %DUAL-5-NBRCHANGE: EIGRP-IPv4
is up: new adjacency
R1(config-if)#
*Jun 26 20:31:18.185: %DUAL-5-NBRCHANGE: EIGRP-IPv4
is down: retry limit exceeded
R1(config-if)#
*Jun 26 20:32:00.977: %DUAL-5-NBRCHANGE: EIGRP-IPv4
is up: new adjacency
R1(config-if)#
*Jun 26 20:35:05.489: %DUAL-5-NBRCHANGE: EIGRP-IPv4
is down: retry limit exceeded
Verify that the full routing table is restored and that you have end-to-end connectivity.
R1# show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 38
C
L
C
L
D
c.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 38
c.
On R3, issue the show frame-relay lmi command to display LMI information, including LMI type, number
of timeouts, and the amount of time since the last full update.
R3# show frame-relay lmi
LMI Statistics for interface Serial0/0/1 (Frame Relay DTE) LMI TYPE = ANSI
Invalid Unnumbered info 0
Invalid Prot Disc 0
Invalid dummy Call Ref 0
Invalid Msg Type 0
Invalid Status Message 0
Invalid Lock Shift 0
Invalid Information ID 0
Invalid Report IE Len 0
Invalid Report Request 0
Invalid Keep IE Len 0
Num Status Enq. Sent 2158
Num Status msgs Rcvd 2136
Num Update Status Rcvd 0
Num Status Timeouts 23
Last Full Status Req 00:00:05
Last Full Status Rcvd 00:04:35
d. On R3, issue the debug frame-relay lmi command. The LMI packets no longer display in pairs. While all
outgoing LMI messages are logged, no incoming messages display because R3 is expecting ANSI LMI,
and FR is sending Cisco LMI.
R3# debug frame-relay lmi
Frame Relay LMI debugging is on
Displaying all Frame Relay LMI data
R3#
*Jun 26 21:49:10.829: Serial0/0/1(out): StEnq, myseq 104, yourseen 0, DTE down
*Jun 26 21:49:10.829: datagramstart = 0xC313554, datagramsize = 14
*Jun 26 21:49:10.829: FR encap = 0x00010308
*Jun 26 21:49:10.829: 00 75 95 01 01 00 03 02 68 00
*Jun 26 21:49:10.829:
R3#
*Jun 26 21:49:20.829: Serial0/0/1(out): StEnq, myseq 105, yourseen 0, DTE down
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 38
26
26
26
26
e. Restore the LMI type back to Cisco on R3. Notice that the debug messages change after you issue this
command. The LMI sequence number has been reset to 1. R3 began to understand the LMI messages
coming in from FR. After R3 and FR have successfully exchanged LMI messages, the interface changed
state to up.
R3(config)# interface s0/0/1
R3(config-if)# frame-relay lmi-type cisco
R3(config-if)#
*Jun 26 21:51:20.829: Serial0/0/1(out): StEnq, myseq 117, yourseen 0, DTE down
*Jun 26 21:51:20.829: datagramstart = 0xC31F254, datagramsize = 14
*Jun 26 21:51:20.829: FR encap = 0x00010308
*Jun 26 21:51:20.829: 00 75 95 01 01 00 03 02 75 00
*Jun 26 21:51:20.829:
R3(config-if)#
*Jun 26 21:51:30.829: Serial0/0/1(out): StEnq, myseq 1, yourseen 0, DTE down
*Jun 26 21:51:30.829: datagramstart = 0xC31F3D4, datagramsize = 13
*Jun 26 21:51:30.829: FR encap = 0xFCF10309
*Jun 26 21:51:30.829: 00 75 01 01 00 03 02 01 00
*Jun 26 21:51:30.829:
*Jun 26 21:51:30.829: Serial0/0/1(in): Status, myseq 1, pak size 21
*Jun 26 21:51:30.829: RT IE 1, length 1, type 0
*Jun 26 21:51:30.829: KA IE 3, length 2, yourseq 1 , myseq 1
*Jun 26 21:51:30.829: PVC IE 0x7 , length 0x6 , dlci 301, stat
R3(config-if)#us 0x2 , bw 0
R3(config-if)#
*Jun 26 21:51:40.829: Serial0/0/1(out): StEnq, myseq 2, yourseen 1, DTE down
*Jun 26 21:51:40.829: datagramstart = 0xC313B54, datagramsize = 13
*Jun 26 21:51:40.829: FR encap = 0xFCF10309
*Jun 26 21:51:40.829: 00 75 01 01 01 03 02 02 01
*Jun 26 21:51:40.829:
*Jun 26 21:51:40.829: Serial0/0/1(in): Status, myseq 2, pak size 21
*Jun 26 21:51:40.829: RT IE 1, length 1, type 0
*Jun 26 21:51:40.829: KA IE 3, length 2, yourseq 2 , myseq 2
*Jun 26 21:51:40.829: PVC IE 0x7 , length 0x6 , dlci 301, stat
R3(config-if)#us 0x2 , bw 0
*Jun 26 21:51:51.829: %LINEPROTO-5-UPDOWN: Line protocol on Interface
Serial0/0/1, changed state to up
R3(config-if)#
f.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 38
Verify connectivity.
R1# ping 10.1.1.6
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.6, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 28/28/28 ms
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 16 of 38
d. Issue the show frame-relay pvc command on R1 and R3 to display the PVC status.
R1# show frame-relay pvc
PVC Statistics for interface Serial0/0/0 (Frame Relay DTE)
Local
Switched
Unused
Active
2
0
0
Inactive
0
0
0
Deleted
0
0
0
Static
0
0
0
DLCI = 103, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/0
input pkts 1170
output pkts 1408
in bytes 92566
out bytes 105327
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 1160
out bcast bytes 89034
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
pvc create time 07:53:13, last time pvc status changed 00:35:58
DLCI = 113, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/0.113
input pkts 86
output pkts 494
in bytes 20916
out bytes 45208
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 464
out bcast bytes 42088
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
pvc create time 00:35:58, last time pvc status changed 00:35:58
Local
Switched
Unused
Active
2
0
0
Inactive
0
0
0
Deleted
0
0
0
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Static
0
0
0
Page 17 of 38
DLCI = 301, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/1
input pkts 1406
output pkts 1176
in bytes 105143
out bytes 93110
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 1038
out bcast bytes 80878
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
pvc create time 07:51:07, last time pvc status changed 00:37:16
DLCI = 311, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/1.311
input pkts 513
output pkts 114
in bytes 47072
out bytes 30360
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in BECN pkts 0
out FECN pkts 0
in FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 74
out bcast bytes 26200
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
pvc create time 01:11:06, last time pvc status changed 00:37:16
e. Issue the show frame-relay route command on FR to verify the status of the Frame Relay map
statements.
FR# show frame-relay route
Input Intf
Serial0/0/0
Serial0/0/0
Serial0/0/1
Serial0/0/1
f.
Input Dlci
103
113
301
311
Output Intf
Serial0/0/1
Serial0/0/1
Serial0/0/0
Serial0/0/0
Output Dlci
301
311
103
113
Status
active
active
active
active
Issue the show frame-relay map command on R1 and R3 to verify the status of the Frame Relay map
statements.
R1# show frame-relay map
Serial0/0/0 (up): ip 10.1.1.2 dlci 103(0x67,0x1870), static,
broadcast,
CISCO, status defined, active
Serial0/0/0 (up): ipv6 FE80::3 dlci 103(0x67,0x1870), static,
broadcast,
CISCO, status defined, active
Serial0/0/0 (up): ipv6 2001:DB8:ACAD:B::1 dlci 103(0x67,0x1870), static,
CISCO, status defined, active
Serial0/0/0 (up): ip 10.1.1.1 dlci 103(0x67,0x1870), static,
CISCO, status defined, active
Serial0/0/0 (up): ipv6 2001:DB8:ACAD:B::3 dlci 103(0x67,0x1870), static,
CISCO, status defined, active
Serial0/0/0.113 (up): point-to-point dlci, dlci 113(0x71,0x1C10), broadcast
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 18 of 38
Reflection
1. What is a PVC and how is it used?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
A PVC is a permanent virtual circuit. This is a Layer 2 connection created between endpoints through a
Frame Relay cloud. There can be multiple PVCs per physical interface, allowing multiple point-to-point
connections or point-to-multipoint connections.
2. What is the purpose of a DLCI?
_______________________________________________________________________________________
A DLCI is a Layer 2 Frame Relay address that Inverse ARP uses to obtain an associated Layer 3 IP address.
3. What purpose does the Local Management Interface (LMI) serve in a Frame Relay network?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
The LMI is a signaling protocol that exchanges information between a router and a Frame Relay switch. The
LMI exchanges information on keepalives, PVC status (active, inactive, deleted, unused), and IP addresses
(when Inverse ARP is enabled). This information is used as a status mechanism between the router (DTE)
and the Frame Relay switch (DCE).
4. Why would you use subinterfaces with Frame Relay?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 19 of 38
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router R1 (After Parts 1 and 2 of this lab)
R1# show run
Building configuration...
Current configuration : 1606 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 20 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 21 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 22 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 23 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 24 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 25 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 26 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 27 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 28 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 29 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 30 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 31 of 38
Router R1 - Final
R1# show run
Building configuration...
Current configuration : 2296 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
ip cef
!
no ip domain lookup
ipv6 unicast-routing
ipv6 cef
!
multilink bundle-name authenticated
!
redundancy
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
ipv6 address FE80::1 link-local
ipv6 address 2001:DB8:ACAD:A::1/64
ipv6 eigrp 1
!
interface GigabitEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 32 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 33 of 38
Router FR (Final)
FR# show run
Building configuration...
Current configuration : 1769 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname FR
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
frame-relay switching
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 34 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 35 of 38
Router R3 (Final)
R3# show run
Building configuration...
Current configuration : 2298 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R3
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
ip cef
!
no ip domain lookup
ipv6 unicast-routing
ipv6 cef
!
multilink bundle-name authenticated
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
ipv6 address FE80::3 link-local
ipv6 address 2001:DB8:ACAD:C::3/64
ipv6 eigrp 1
!
interface GigabitEthernet0/1
no ip address
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 36 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 37 of 38
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 38 of 38
Topology
Addressing Table
Device
R1
Interface
IP Address
Subnet Mask
Default Gateway
G0/0
192.168.1.1
255.255.255.0
N/A
S0/0/0 (DCE)
10.1.1.1
255.255.255.252
N/A
S0/0/0
N/A
N/A
N/A
S0/0/1 (DCE)
N/A
N/A
N/A
G0/0
192.168.3.1
255.255.255.0
N/A
S0/0/1
10.1.1.2
255.255.255.252
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
PC-C
NIC
192.168.3.3
255.255.255.0
192.168.3.1
FR
R3
Objectives
Part 1: Build the Network and Load Device Configurations
Part 2: Troubleshoot Layer 3 Connectivity
Part 3: Troubleshoot Frame Relay
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 16
Background / Scenario
Frame Relay is a WAN protocol that operates at the physical and data link layers of the OSI reference model.
Unlike leased lines, Frame Relay requires only a single-access circuit to the Frame Relay provider to
communicate with multiple sites that are connected to the same provider. Configuring Frame Relay at the
customer site is generally simple; however, configuration problems can occur.
In this lab, R1 and R3 are experiencing problems communicating with each other. EIGRP is not working and
there may also be problems with the Frame Relay configuration. You have been assigned the job of finding
and correcting all problems on R1 and R3.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). Other routers and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers have been erased and have no startup configurations. If you are unsure,
contact your instructor.
Note: The FR router is acting as the Frame Relay switch, It does NOT have any configuration issues for you
to troubleshoot.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 16
Step 1: Verify that the interfaces listed in the Addressing Table are active and configured with
the correct IP address information.
a. Issue the show ip interface brief command on R1 and R3 to verify that the interfaces are in an up/up
state.
R1# show ip interface brief
Interface
Embedded-Service-Engine0/0
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
Serial0/0/1
IP-Address
unassigned
192.168.1.1
unassigned
10.1.1.5
unassigned
OK?
YES
YES
YES
YES
YES
Method
unset
manual
unset
manual
unset
Status
administratively
administratively
administratively
up
administratively
Protocol
down down
down down
down down
up
down down
OK?
YES
YES
YES
YES
Method
unset
manual
unset
unset
Status
Protocol
administratively down down
up
up
administratively down down
administratively down down
IP-Address
unassigned
192.168.30.1
unassigned
unassigned
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 16
10.1.1.2
YES manual up
up
b. Issue the show run | section interface command to view all the commands related to interfaces.
R1:
R1# show run | section interface
interface Embedded-Service-Engine0/0
no ip address
shutdown
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
shutdown
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
shutdown
duplex auto
speed auto
interface Serial0/0/0
ip address 10.1.1.5 255.255.255.252
encapsulation frame-relay
clock rate 128000
frame-relay map ip 10.1.1.2 101
no frame-relay inverse-arp
interface Serial0/0/1
no ip address
shutdown
R3:
R3# show run | section interface
interface Embedded-Service-Engine0/0
no ip address
shutdown
interface GigabitEthernet0/0
ip address 192.168.30.1 255.255.255.0
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
shutdown
duplex auto
speed auto
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 16
Resolve all problems found. Record the commands used to correct the configuration.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
R1(config)# interface g0/0
R1(config-if)# no shutdown
R1(config-if)# interface s0/0/0
R1(config-if)# ip address 10.1.1.1 255.255.255.252
R3(config)# interface g0/0
R3(config-if)# ip address 192.168.3.1 255.255.255.0
d. Using show commands, verify that R1 and R3 router interfaces match the IP addresses in the Addressing
Table.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 16
R3:
R3# show ip protocols
*** IP Routing is NSF aware ***
Routing Protocol is "eigrp 1"
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Default networks flagged in outgoing updates
Default networks accepted from incoming updates
EIGRP-IPv4 Protocol for AS(1)
Metric weight K1=1, K2=0, K3=1, K4=0, K5=0
NSF-aware route hold timer is 240
Router-ID: 3.3.3.3
Topology : 0 (base)
Active Timer: 3 min
Distance: internal 90 external 170
Maximum path: 4
Maximum hopcount 100
Maximum metric variance 1
Automatic Summarization: disabled
Maximum path: 4
Routing for Networks:
10.1.1.0/30
Routing Information Sources:
Gateway
Distance
Last Update
Distance: internal 90 external 170
Issue a show ip route command on both R1 and R3. Do any EIGRP routes display in the routing table of
R1 or R3? ______ No
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 16
C
L
C
L
C
L
C
L
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 16
R1 G0/0
R1 S0/0/0
R3 G0/0
R3 S0/0/1
R1
Yes
No
No
No
R3
No
No
Yes
Yes
Because IPv4 addressing and EIGRP configuration issues have been checked and corrected, the problems
must exist with the Frame Relay configuration.
Local
Switched
Unused
Active
1
0
0
Inactive
0
0
0
Deleted
0
0
0
Static
0
0
0
DLCI = 101, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/0
input pkts 10
output pkts 15
in bytes 1040
out bytes 1560
dropped pkts 0
in pkts dropped 0
out pkts dropped 0
out bytes dropped 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 0
out bcast bytes 0
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
pvc create time 04:20:07, last time pvc status changed 00:59:58
Local
Switched
Unused
Active
1
0
0
Inactive
0
0
0
Deleted
1
0
0
Static
0
0
0
DLCI = 201, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0/0/1
input pkts 20
out bytes 1040
out pkts dropped 0
in FECN pkts 0
out BECN pkts 0
output pkts 10
in bytes 2080
dropped pkts 0
in pkts dropped 0
out bytes dropped 0
in BECN pkts 0
out FECN pkts 0
in DE pkts 0
out DE pkts 0
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 16
R3:
R3# show frame-relay map
Serial0/0/1 (up): ip 10.1.1.2 dlci 201(0xC9,0x3090), static,
CISCO, status defined, active
Serial0/0/1 (up): ip 10.1.1.1 dlci 202(0xCA,0x30A0), static,
broadcast,
CISCO, status deleted
c.
R3:
R3# show frame-relay lmi
LMI Statistics for interface Serial0/0/1 (Frame Relay DTE) LMI TYPE = CISCO
Invalid Unnumbered info 0
Invalid Prot Disc 0
Invalid dummy Call Ref 0
Invalid Msg Type 0
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 16
b. Issue a show frame-relay map command on both R1 and R3. Are the DLCIs active? ________ Yes
R1# show frame-relay map
Serial0/0/0 (up): ip 10.1.1.1 dlci 101(0x65,0x1850), static,
CISCO, status defined, active
Serial0/0/0 (up): ip 10.1.1.2 dlci 101(0x65,0x1850), static,
broadcast,
CISCO, status defined, active
Reflection
Describe the troubleshooting methodology you used to solve the issues in this lab. Outline the steps that were
necessary to successfully meet the assignment.
_______________________________________________________________________________________
Answers will vary. Hopefully, students will answer that breaking a problem down into smaller steps helps with
troubleshooting. Solving IP addressing, then EIGRP and then Frame Relay issues separately instead of all at
once can make troubleshooting easier.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 16
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router R1
R1#sh run
Building configuration...
Current configuration : 1482 bytes
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no ip domain lookup
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 16
Router R3
R3#sh run
Building configuration...
Current configuration : 1448 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R3
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no ip domain lookup
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
ip address 10.1.1.2 255.255.255.252
encapsulation frame-relay
frame-relay map ip 10.1.1.1 201 broadcast
frame-relay map ip 10.1.1.2 201
no frame-relay inverse-arp
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 16 of 16
Objective
Describe Frame Relay operation.
Instructor Note: This activity can be completed singularly or in small groups and then shared between groups or
with the class.
Scenario
It has been decided that your company will use Frame Relay technology to provide video connectivity between
your main office location and two branch offices. The company will also use the new network for redundancy in
case their current ISP network connectivity is interrupted for any reason.
As usual, with any kind of network upgrade, you must develop a cost proposal for your administrator.
After doing some research, you decide to use this Frame Relay web site for your cost analysis. Costs listed on the
site are representative of real ISP costs they are referenced only to help you create your cost analysis design.
For more detailed instructions, open the PDF accompanying this activity.
Resources
Directions
Step 1: Use Packet Tracer to show your home office and two branch offices.
a. Use the Note tool to name the required three routers.
b. Include a Frame Relay router to show where connectivity will be placed on the ISP cloud.
c.
Include the ISP cloud in the topology so that the administrators can visualize where the new Frame Relay
service will connect to your Frame Relay device or router.
Step 2: Decide how many DLCI connections you need from your home office to your branch
offices.
a. Determine whether to use 1.544 T1 lines for all your DLCI circuits or combination bandwidth connections
of varying bandwidths.
b. Be able to justify your decisions made in Step 2a.
Step 3: Create a Frame Relay cost proposal matrix. Include approximate cost pricing found on
the Frame Relay web site. Include in your matrix:
a. Access costs to the ISP
1) Service area tariffs
2) Interstate area tariffs
b. Cost of the Frame Relay ports
c.
DLCI costs
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
Step 4: Present the cost analysis to solicit comments and approval from the company
administrators.
Instructor Example Activity Solution
Frame Relay Topology Example
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
$1,902
$525
$0
$360
Page 2 of 3
$1,125
$1,500
$90
Total One-Time Costs
$3,027*
*Does not include internetwork customer premises equipment costs, which could be charged by the ISP or
purchased by the company for Frame Relay connectivity; for example, CSU/DSUs.
Total Monthly Costs
$2,475
$5,502
Bandwidth cost
DLCI requirements
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Objective
Describe NAT characteristics.
This activity introduces students to the concept of network address translation.
Scenario
You work for a large university or school system. Because you are the network administrator, many professors,
administrative workers, and other network administrators need your assistance with their networks on a daily
basis. They call you at all working hours of the day and, because of the number of telephone calls, you cannot
complete your regular network administration tasks.
You need to find a way to limit when you take calls and from whom. You also need to mask your telephone
number so that when you call someone, another number is displayed to the recipient.
This scenario describes a very common problem for most small- to medium-sized businesses. Visit, How
Network Address Translation Works located at http://computer.howstuffworks.com/nat.htm/printable to view more
information about how the digital world handles these types of workday interruptions.
Use the PDF provided accompanying this activity to reflect further on how a process, known as NAT, could be the
answer to this scenarios challenge.
Resources
Internet connection
Directions
Step 1: Read Information on the Internet Site.
a. Go to How Network Address Translation Works located at
http://computer.howstuffworks.com/nat.htm/printable
b. Read the information provided to introduce the basic concepts of NAT.
c.
Record five facts you find to be interesting about the NAT process.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Conceptual NAT
c.
If a student reports a fact to the class that you did not record, add it to your list.
It is suggested that you display the Web page used as a basis for this activity while comparing facts
students report after reading the article.
Make sure you correct any misunderstandings found in the reading of the web article before moving to
the curriculum content.
At the end of the class or group meeting, reiterate that NAT is a process used to conserve network
address allocations and provide a measure of security for users.
NAT
Static NAT
Dynamic NAT
NAT Overload
NAT Overlap
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Topology
Addressing Table
Device
Gateway
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
192.168.1.1
255.255.255.0
N/A
S0/0/1
209.165.201.18
255.255.255.252
N/A
S0/0/0 (DCE)
209.165.201.17
255.255.255.252
N/A
Lo0
192.31.7.1
255.255.255.255
N/A
PC-A (Simulated
Server)
NIC
192.168.1.20
255.255.255.0
192.168.1.1
PC-B
NIC
192.168.1.21
255.255.255.0
192.168.1.1
ISP
Objectives
Part 1: Build the Network and Verify Connectivity
Part 2: Configure and Verify Static NAT
Part 3: Configure and Verify Dynamic NAT
Background / Scenario
Network Address Translation (NAT) is the process where a network device, such as a Cisco router, assigns a
public address to host devices inside a private network. The main reason to use NAT is to reduce the number
of public IP addresses that an organization uses because the number of available IPv4 public addresses is
limited.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 15
Required Resources
2 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Set the clock rate to 128000 for the DCE serial interfaces.
g. Configure logging synchronous to prevent console messages from interrupting the command entry.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 15
Inside local
192.168.1.20
Outside local
---
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Outside global
---
Page 3 of 15
Outside local
192.31.7.1:1
---
Outside global
192.31.7.1:1
---
A NAT entry was added to the table with ICMP listed as the protocol when PC-A sent an ICMP request
(ping) to 192.31.7.1 on ISP.
What port number was used in this ICMP exchange? ________________ 1, answers will vary.
Note: It may be necessary to disable the PC-A firewall for the ping to be successful.
c.
From PC-A, telnet to the ISP Lo0 interface and display the NAT table.
Pro Inside global
icmp 209.165.200.225:1
tcp 209.165.200.225:1034
--- 209.165.200.225
Inside local
192.168.1.20:1
192.168.1.20:1034
192.168.1.20
Outside local
192.31.7.1:1
192.31.7.1:23
---
Outside global
192.31.7.1:1
192.31.7.1:23
---
Note: The NAT for the ICMP request may have timed out and been removed from the NAT table.
What was the protocol used in this translation? ____________ tcp
What are the port numbers used?
Inside global / local: ________________ 1034, answers will vary.
Outside global / local: ________________ 23
d. Because static NAT was configured for PC-A, verify that pinging from ISP to PC-A at the static NAT public
address (209.165.200.225) is successful.
e. On the Gateway router, display the NAT table to verify the translation.
Gateway# show ip nat translations
Pro Inside global
Inside local
icmp 209.165.200.225:12 192.168.1.20:12
--- 209.165.200.225
192.168.1.20
Outside local
209.165.201.17:12
---
Outside global
209.165.201.17:12
---
Notice that the Outside local and Outside global addresses are the same. This address is the ISP remote
network source address. For the ping from the ISP to succeed, the Inside global static NAT address
209.165.200.225 was translated to the Inside local address of PC-A (192.168.1.20).
f.
Verify NAT statistics by using the show ip nat statistics command on the Gateway router.
Gateway# show ip nat statistics
Total active translations: 2 (1 static, 1 dynamic; 1 extended)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 15
Note: This is only a sample output. Your output may not match exactly.
Step 2: Define an access control list (ACL) that matches the LAN private IP address range.
ACL 1 is used to allow 192.168.1.0/24 network to be translated.
Gateway(config)# access-list 1 permit 192.168.1.0 0.0.0.255
Step 3: Verify that the NAT interface configurations are still valid.
Issue the show ip nat statistics command on the Gateway router to verify the NAT configurations.
Gateway# show ip nat statistics
Total active translations: 1 (1 static, 0 dynamic; 0 extended)
Peak translations: 0
Outside interfaces:
Serial0/0/1
Inside interfaces:
FastEthernet0/1
Hits: 0 Misses: 0
CEF Translated packets: 0, CEF Punted packets: 0
Expired translations: 0
Dynamic mappings:
Total doors: 0
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 15
Step 5: Define the NAT from the inside source list to the outside pool.
Note: Remember that NAT pool names are case-sensitive and the pool name entered here must match
that used in the previous step.
Gateway(config)# ip nat inside source list 1 pool public_access
Inside local
192.168.1.20
192.168.1.21:1
192.168.1.21
Outside local
--192.31.7.1:1
---
Outside global
--192.31.7.1:1
---
What is the translation of the Inside local host address for PC-B?
192.168.1.21 = _________________________________________________________ 209.165.200.242
A dynamic NAT entry was added to the table with ICMP as the protocol when PC-B sent an ICMP
message to 192.31.7.1 on ISP.
What port number was used in this ICMP exchange? ______________ 1, answers will vary.
b. From PC-B, open a browser and enter the IP address of the ISP-simulated web server (Lo0 interface).
When prompted, log in as webuser with a password of webpass.
c.
Inside global
209.165.200.225
209.165.200.242:1038
209.165.200.242:1039
209.165.200.242:1040
209.165.200.242:1041
209.165.200.242:1042
209.165.200.242:1043
209.165.200.242:1044
209.165.200.242:1045
209.165.200.242:1046
209.165.200.242:1047
209.165.200.242:1048
209.165.200.242:1049
209.165.200.242:1050
209.165.200.242:1051
209.165.200.242:1052
Inside local
192.168.1.20
192.168.1.21:1038
192.168.1.21:1039
192.168.1.21:1040
192.168.1.21:1041
192.168.1.21:1042
192.168.1.21:1043
192.168.1.21:1044
192.168.1.21:1045
192.168.1.21:1046
192.168.1.21:1047
192.168.1.21:1048
192.168.1.21:1049
192.168.1.21:1050
192.168.1.21:1051
192.168.1.21:1052
Outside local
--192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Outside global
--192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
192.31.7.1:80
Page 6 of 15
192.168.1.22
---
---
Note: This is only a sample output. Your output may not match exactly.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 15
Outside local
192.31.7.1:512
--192.31.7.1:512
---
Outside global
192.31.7.1:512
--192.31.7.1:512
---
Note: This is only a sample output. Your output may not match exactly.
Reflection
1. Why would NAT be used in a network?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary, but should include: whenever there are not enough public IP addresses and to avoid the
cost of purchasing public addresses from an ISP. NAT can also provide a measure of security by hiding
internal addresses from outside networks.
2. What are the limitations of NAT?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
NAT needs IP information or port number information in the IP header and TCP header of packets for
translation. Here is a partial list of protocols that cannot be used with NAT: SNMP, LDAP, Kerberos version 5.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 15
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Gateway (After Part 2)
Gateway# show run
Building configuration...
Current configuration : 1666 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Gateway
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 15
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 15
Gateway (Final)
Gateway# show run
Building configuration...
Current configuration : 1701 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Gateway
!
boot-start-marker
boot-end-marker
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 15
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 15
ISP (Final)
ISP# show run
Building configuration...
Current configuration : 1557 bytes
!
! Last configuration change at 09:16:34 UTC Sun Mar 24 2013
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 15
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 15
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 15
Topology
Addressing Table
Device
Gateway
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
192.168.1.1
255.255.255.0
N/A
S0/0/1
209.165.201.18
255.255.255.252
N/A
S0/0/0 (DCE)
209.165.201.17
255.255.255.252
N/A
Lo0
192.31.7.1
255.255.255.255
N/A
PC-A
NIC
192.168.1.20
255.255.255.0
192.168.1.1
PC-B
NIC
192.168.1.21
255.255.255.0
192.168.1.1
PC-C
NIC
192.168.1.22
255.255.255.0
192.168.1.1
ISP
Objectives
Part 1: Build the Network and Verify Connectivity
Part 2: Configure and Verify NAT Pool Overload
Part 3: Configure and Verify PAT
Background / Scenario
In the first part of the lab, your company is allocated the public IP address range of 209.165.200.224/29 by
the ISP. This provides the company with six public IP addresses. Dynamic NAT pool overload uses a pool of
IP addresses in a many-to-many relationship. The router uses the first IP address in the pool and assigns
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 12
Required Resources
2 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
g. Configure logging synchronous to prevent console messages from interrupting the command entry.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 12
Step 1: Define an access control list that matches the LAN private IP addresses.
ACL 1 is used to allow the 192.168.1.0/24 network to be translated.
Gateway(config)# access-list 1 permit 192.168.1.0 0.0.0.255
209.165.200.230
Step 3: Define the NAT from the inside source list to the outside pool.
Gateway(config)# ip nat inside source list 1 pool public_access overload
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 12
c.
Inside local
192.168.1.20:1
192.168.1.21:1
192.168.1.22:1
Outside local
192.31.7.1:1
192.31.7.1:1
192.31.7.1:1
Outside global
192.31.7.1:0
192.31.7.1:1
192.31.7.1:2
Note: Depending on how much time has elapsed since you performed the pings from each PC, you may
not see all three translations. ICMP translations have a short timeout value.
How many Inside local IP addresses are listed in the sample output above? __________ 3
How many Inside global IP addresses are listed? __________ 1
How many port numbers are used paired with the Inside global addresses? _________ 3
What would be the result of pinging the Inside local address of PC-A from the ISP router? Why?
____________________________________________________________________________________
____________________________________________________________________________________
The ping would fail because the router knows the location of the Inside global address in its routing table
but the Inside local address is not advertised.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 12
Step 4: Remove the NAT translation from inside source list to outside pool.
Gateway(config)# no ip nat inside source list 1 pool public_access overload
c.
Inside local
192.168.1.20:1
192.168.1.21:1
192.168.1.22:1
Outside local
192.31.7.1:1
192.31.7.1:1
192.31.7.1:1
Outside global
192.31.7.1:3
192.31.7.1:1
192.31.7.1:4
Reflection
What advantages does PAT provide?
_______________________________________________________________________________________
Answers will vary, but should include that PAT minimizes the number of public addresses needed to provide
Internet access, and that PAT, like NAT, serves to hide private addresses from outside networks.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 12
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router Gateway (After Part 2)
Gateway# show run
Building configuration...
Current configuration : 1790 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Gateway
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 12
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 12
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 12
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 12
Router ISP
ISP# show run
Building configuration...
Current configuration : 1487 bytes
!
version 15.2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 12
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 12
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 12
Topology
Addressing Table
Device
Gateway
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
192.168.1.1
255.255.255.0
N/A
S0/0/1
209.165.200.225
255.255.255.252
N/A
S0/0/0 (DCE)
209.165.200.226
255.255.255.252
N/A
Lo0
198.133.219.1
255.255.255.255
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
PC-B
NIC
192.168.1.4
255.255.255.0
192.168.1.1
ISP
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Troubleshoot Static NAT
Part 3: Troubleshoot Dynamic NAT
Background / Scenario
In this lab, the Gateway router was configured by an inexperienced network administrator at your company.
Several errors in the configuration have resulted in NAT issues. Your boss has asked you to troubleshoot and
correct the NAT errors and document your work. Ensure that the network supports the following:
PC-A acts as a web server with a static NAT and will be reachable from the outside using the
209.165.200.254 address.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 14
PC-B acts as a host computer and dynamically receives an IP address from the created pool of
addresses called NAT_POOL, which uses the 209.165.200.240/29 range.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switch have been erased and have no startup configurations. If you are
unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
2 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
g. Configure logging synchronous to prevent console messages from interrupting the command entry.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 14
On the Gateway router, enter the command that allows you to see all current NAT translations on the
Gateway router. Write the command in the space below.
____________________________________________________________________________________
show ip nat translations
Gateway# show ip nat translations
Pro Inside global
Inside local
Outside local
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Outside global
Page 3 of 14
192.168.2.3
---
---
Why are you seeing a NAT translation in the table, but none occurred when PC-A pinged the ISP
loopback interface? What is needed to correct the issue?
____________________________________________________________________________________
The static translation is for an incorrect inside local address.
d. Record any commands that are necessary to correct the static NAT configuration error.
____________________________________________________________________________________
____________________________________________________________________________________
Gateway(config)# no ip nat inside source static 192.168.2.3 209.165.200.254
Gateway(config)# ip nat inside source static 192.168.1.3 209.165.200.254
e. From PC-A, ping Lo0 on the ISP router. Do any NAT debug translations appear on the Gateway router?
____________________________________________________________________________________
No
f.
On the Gateway router, enter the command that allows you to observe the total number of current NATs.
Write the command in the space below.
____________________________________________________________________________________
show ip nat statistics
Gateway# show ip nat statistics
Total active translations: 1 (1 static, 0 dynamic; 0 extended)
Peak translations: 1, occurred 00:08:12 ago
Outside interfaces:
GigabitEthernet0/1, Serial0/0/0
Inside interfaces:
Hits: 0 Misses: 0
CEF Translated packets: 0, CEF Punted packets: 0
Expired translations: 0
Dynamic mappings:
-- Inside Source
[Id: 1] access-list NAT_ACL pool NATPOOL refcount 0
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 14
h. Are there any problems with the current configuration that prevent the static NAT from occurring?
____________________________________________________________________________________
Yes. The inside and outside NAT interfaces are incorrectly configured.
i.
Record any commands that are necessary to correct the static NAT configuration errors.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 14
From PC-A, ping Lo0 on the ISP router. Do any NAT debug translations appear on the Gateway router?
____________________________________________________________________________________
Yes
*Mar 18 23:53:50.707:
*Mar 18 23:53:50.715:
Gateway#
*Mar 18 23:53:51.711:
*Mar 18 23:53:51.719:
*Mar 18 23:53:52.707:
Gateway#
*Mar 18 23:53:52.715:
*Mar 18 23:53:53.707:
Gateway#
*Mar 18 23:53:53.715:
k.
Use the show ip nat translations verbose command to verify static NAT functionality.
Note: The timeout value for ICMP is very short. If you do not see all the translations in the output, redo
the ping.
Gateway# show ip nat translations verbose
Pro Inside global
Inside local
Outside local
Outside global
icmp 209.165.200.254:1
192.168.1.3:1
198.133.219.1:1
198.133.219.1:1
create 00:00:04, use 00:00:01 timeout:60000, left 00:00:58,
flags:
extended, use_count: 0, entry-id: 12, lc_entries: 0
--- 209.165.200.254
192.168.1.3
----create 00:30:09, use 00:00:04 timeout:0,
flags:
static, use_count: 1, entry-id: 2, lc_entries: 0
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 14
Record any commands that are necessary to correct the dynamic NAT configuration errors.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Gateway(config)# no ip nat inside source list NAT_ACL pool NATPOOL
Gateway(config)# ip nat inside source list NAT_ACL pool NAT_POOL
Gateway(config)# ip access-list standard NAT_ACL
Gateway(config-std-nacl)# no permit 192.168.10.0 0.0.0.255
Gateway(config-std-nacl)# permit 192.168.1.0 0.0.0.255
d. From PC-B, ping Lo0 on the ISP router. Do any NAT debug translations appear on the Gateway router?
____________________________________________________________________________________
Yes
*Mar 19 00:01:17.303:
*Mar 19 00:01:17.315:
Gateway#
*Mar 19 00:01:18.307:
*Mar 19 00:01:18.315:
*Mar 19 00:01:19.303:
Gateway#
*Mar 19 00:01:19.315:
*Mar 19 00:01:20.303:
*Mar 19 00:01:20.311:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 14
Reflection
1. What is the benefit of a static NAT?
_______________________________________________________________________________________
_______________________________________________________________________________________
A static NAT translation allows users from outside the LAN access to the computer or server on the internal
network.
2. What issues would arise if 10 host computers in this network were attempting simultaneous Internet
communication?
_______________________________________________________________________________________
_______________________________________________________________________________________
Not enough public addresses exist in the NAT pool to satisfy 10 simultaneous user sessions, but as hosts
drop off different hosts will be able to claim the pool addresses to access the Internet.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 14
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Config
Router Gateway
Gateway#show run
Building configuration...
Current configuration : 1805 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Gateway
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
!
!
no ip domain lookup
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 14
Router ISP
ISP#show run
Building configuration...
Current configuration : 1482 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ISP
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 14
Objective
Configure, verify and analyze static NAT, dynamic NAT and NAT with overloading.
Instructor Note: This activity can be completed individually or in small or large groups.
Scenario
Network address translation is not currently included in your companys network design. It has been decided to
configure some devices to use NAT services for connecting to the mail server.
Before deploying NAT live on the network, you prototype it using a network simulation program.
Resources
Directions
Step 1: Create a very small network topology using Packet Tracer, including, at minimum:
a. Two 1941 routers, interconnected
b. Two LAN switches, one per router
c.
Step 5: Configure NAT services on either router from the host PC or laptop to the mail server
Step 6: Produce output validating NAT operations on the simulated network.
a. Use the show ip nat statistics, show access-lists, and show ip nat translations commands to gather
information about NATs operation on the router
b. Copy and paste or save screenshots of the topology and output information to a word processing or
presentation document.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
NAT Check
Step 7: Explain the NAT design and output to another group or to the class.
Inside local
192.168.1.2:2
Outside local
192.168.3.2:2
Outside global
192.168.3.2:2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
NAT Check
2. Operation
3. Troubleshooting
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Objective
Select broadband solutions to support remote connectivity in a small- to medium-sized business network.
Instructor Note:
The three major types of broadband transmission as specified in the chapter content are the focus of this
activity.
Scenario
Telework employment opportunities are expanding in your local area every day. You have been offered
employment as a teleworker for a major corporation. The new employer requires teleworkers to have access the
Internet to fulfill their job responsibilities.
Research the following broadband Internet connection types that are available in your geographic area:
DSL
Cable
Satellite
Consider the advantages and disadvantages of each broadband variation as you notate your research, which
may include cost, speed, security, and ease of implementation or installation.
Resources
DSL
Cable
Satellite
Step 2: Decide which broadband options would be important to you as a teleworker in your
small or home office:
Cost
Speed
Security
Ease of implementation
Reliability
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Broadband Varieties
Step 3: Using the options from Step 2, create a matrix that lists the advantages and
disadvantages of each broadband type.
Step 4: Share your research with the class or another group.
Advantages
High-speed downloads of up to
1.5 Mb/s, which can be more or
less depending on the ISP.
Disadvantages
Broadband types
DSL
Cable
Satellite
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Objectives
Part 1: Investigate Broadband Distribution
Part 2: Research Broadband Access Options for Specific Scenarios
Background / Scenario
Although broadband Internet access options have increased dramatically in recent years, broadband access
varies greatly depending on location. In this lab, you will investigate current broadband distribution and
research broadband access options for specific scenarios.
Required Resources
Device with Internet access
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
ISP
c.
Connection Type
Download Speed
Time Warner
Cable
10-25 Mb/s
Frontier
ADSL
6-10 Mb/s
Click Show Wireless and Expand All. What, if any, wireless broadband Internet connections are
available in this location? Complete the table below. Answers will vary. See table below for examples.
ISP
Connection Type
Download Speed
Omnicity
Fixed Wireless
1.5-3 Mb/s
Verizon
Mobile Wireless
Sprint-Nextel
Mobile Wireless
d. Return to the home page and click Explore Map. The interactive map allows you to explore the
geographical availability of a number of broadband Internet options.
e. Highlight each of the wired connections independently (DSL, cable, and fiber). Selections are highlighted
in dark blue.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
For wired connections, order the wired broadband connections from least to greatest in terms of
geographical area covered. List your answer in the space provided.
____________________________________________________________________________________
Fiber, cable, and DSL
f.
In the gallery of maps at the bottom of the web page, select Broadband Availability Across
Demographic Characteristics. Display the population by density and compare the broadband
connection to the population distribution of the United States. What correlations can be drawn?
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Broadband access and speed is typically proportional to population density.
Connection Type
Download Speed
Google Fiber
Fiber
$70
1 Gb/s
Time Warner
Cable
$79
50 Mb/s
Choose one from the list of local ISPs that you selected. Give the reasons why you chose that particular ISP.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. The reasons are typically based on price per month, Internet speeds, or packages offered.
Scenario 2: You are moving to an area outside of Billings, Montana and are exploring home Internet
connections. You will be beyond the reach of cable or DSL connections. Research and detail two Internet
connections from which you can select in this area.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
ISP
Connection Type
Download Speed
Rural Broadband
Fixed Wireless
$40
3 Mb/s
Hughes Net
Satellite
$60
5 Mb/s
Choose one from the list of local ISPs that you selected. Give the reasons why you chose that particular ISP.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will. The reasons are typically based on price per month, Internet speeds, or packages offered.
Scenario 3: You are moving to New York City and your job requires you to have 24 hours anytime/anywhere
access. Research and detail two Internet connections from which you can select in this area.
ISP
Connection Type
Download Speed
Clear
Mobile Wireless
$50
6 Mb/s
Sprint
Mobile Wireless
$80 for 12 Mb
6 Mb/s
Choose one from the list of local ISPs that you selected. Give the reasons why you chose that particular ISP.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. The reasons are typically based on price per month, Internet speeds, or packages offered.
Scenario 4: You are small business owner with 10 employees who telecommute in the Fargo, North Dakota
area. The teleworkers live beyond the reach of cable Internet connections. Research and detail two Internet
connections from which you can select in this area.
ISP
Connection Type
Download Speed
Century Link
DSL
$29.99
12 Mb/s
I29
WiMAX
$39.99
3 Mb/s
Choose one from the list of local ISPs that you selected. Give the reasons why you chose that particular ISP.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. The reasons are typically based on price per month, Internet speeds, or packages offered.
Scenario 5: Your business in Washington, D.C. is expanding to 25 employees and will need to upgrade your
broadband access to include equipment colocation and web hosting. Research and detail two Internet
connections from which you can select in this area.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
ISP
Connection Type
Download Speed
Comcast
Cable
369.95
100 Mb/s
Windstream
DSL
129.99
6 Mb/s
Choose one from the list of local ISPs that you selected. Give the reasons why you chose that particular ISP.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. The reasons are typically based on price per month, Internet speeds, or packages offered.
Reflection
How do you think broadband Internet access will change in the future?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. Broadband Internet access will increase in geographical size and in speed with the further
development of wired and wireless technology and infrastructure. Access options and speeds will continue to
increase and with more availability to un-served and underserved areas.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 6
Topology
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
Cust1
G0/1
ISP
G0/1
N/A
N/A
N/A
Objectives
Part 1: Build the Network
Part 2: Configure the ISP Router
Part 3: Configure the Cust1 Router
Background / Scenario
ISPs often use Point-to-Point Protocol over Ethernet (PPPoE) on DSL links to their customers. PPP supports
the assignment of IP address information to a device at the remote end of a PPP link. More importantly, PPP
supports CHAP authentication. ISPs can check accounting records to see if a customers bill has been paid,
before letting them connect to the Internet.
In this lab, you will configure both the client and ISP side of the connection to set up PPPoE. Typically, you
would only configure the client end.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Ensure that the routers and switches have been erased and have no startup configurations. If you are
unsure, contact your instructor.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 10
Required Resources
2 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
Console cables to configure the Cisco IOS devices via the console ports
d. Create a message of the day (MOTD) banner warning users that unauthorized access is prohibited.
e. Assign class as the encrypted privileged EXEC mode password.
f.
Assign cisco as the console and vty password and enable login.
Create the Virtual Template and associate the IP address of G0/1 with it. Associate the Virtual Template
with the pool of addresses. Configure CHAP to authenticate customers.
ISP(config)# interface virtual-template 1
ISP(config-if)# ip address 10.0.0.254 255.255.255.0
ISP(config-if)# mtu 1492
ISP(config-if)# peer default ip address pool PPPoEPOOL
ISP(config-if)# ppp authentication chap callin
ISP(config-if)# exit
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 10
d. Set up debugging on the Cust1 router to display PPP and PPPoE negotiation.
Cust1# debug ppp authentication
Cust1# debug pppoe events
e. Enable the G0/1 interface on the Cust1 router and observe the debug output as the PPPoE dialer session
is established and CHAP authentication takes place.
Cust1(config)# interface g0/1
Cust1(config-if)# no shutdown
*Jul 30 19:28:42.427: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to
down
*Jul 30 19:28:46.175: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to
up
*Jul 30 19:28:47.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface
GigabitEthernet0/1, changed state to up
*Jul 30 19:29:03.839: padi timer expired
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 10
f.
19:29:03.839:
19:29:03.839:
19:29:05.887:
19:29:05.887:
19:29:05.895:
19:29:05.895:
19:29:05.899:
19:29:05.899:
19:29:05.899:
19:29:05.899:
19:29:05.903:
19:29:05.911:
19:29:05.911:
19:29:05.911:
19:29:05.919:
19:29:05.939:
19:29:05.939:
19:29:05.939:
19:29:05.939:
19:29:05.939:
19:29:05.939:
19:29:05.955:
19:29:05.955:
state to up
19:29:05.983:
19:29:05.983:
prepared
prepared
Issue a show ip interface brief command on the Cust1 router to display the IP address assigned by the
ISP router. Sample output is shown below. By what method was the IP address obtained?
_________________ PPP
Cust1# show ip interface brief
Interface
Embedded-Service-Engine0/0
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
Serial0/0/1
Dialer1
Virtual-Access1
Virtual-Access2
IP-Address
unassigned
unassigned
unassigned
unassigned
unassigned
10.0.0.1
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
YES
YES
YES
Method
unset
unset
unset
unset
unset
IPCP
unset
unset
Status
administratively
administratively
up
administratively
administratively
up
up
up
Protocol
down down
down down
up
down down
down down
up
up
up
g. Issue a show ip route command on the Cust1 router. Sample output is shown below.
Cust1# show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 10
C
C
h. Issue a show pppoe session on Cust1 router. Sample output is shown below.
Cust1# show pppoe session
1 client session
Uniq ID
N/A
i.
PPPoE
SID
1
RemMAC
LocMAC
30f7.0da3.0b01
30f7.0da3.0bc1
Port
Gi0/1
VT
VA
VA-st
Di1 Vi2
UP
State
Type
UP
Issue a ping to 10.0.0.254 from the Cust1 router. The ping should be successful. If not, troubleshoot until
you have connectivity.
Cust1# ping 10.0.0.254
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.254, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
Reflection
Why do ISPs who use DSL, primarily use PPPoE with their customers?
_______________________________________________________________________________________
The PPP protocol supports authentication over an Ethernet link. ISPs can authenticate customers and issue
an IP address.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 10
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router Cust1
Cust1# show run
Building configuration...
Current configuration : 1433 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Cust1
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
!
no ip domain lookup
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
interface Embedded-Service-Engine0/0
no ip address
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 10
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 10
Router ISP
ISP# show run
Building configuration...
Current configuration : 1485 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ISP
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
!
no ip domain lookup
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
username Cust1 password 0 ciscopppoe
!
bba-group pppoe global
virtual-template 1
!
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 10
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 10
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 10
Objective
Describe the business requirements of teleworking.
Instructor Note: This activity can be completed individually or in small groups.
Scenario
Your small- to medium-sized business has just been awarded a large marketing design contract. Because your
office space is limited, it has been decided that it would be a good idea to hire teleworkers to help with the
contract.
Therefore, a very general teleworking program must be designed for your company due to anticipation of
company growth. As more contracts are awarded, you will revise and expand the program to fit your companys
needs.
Develop a basic telework proposal outline for your company to consider as groundwork for a telework program.
Resources
Design work
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Telework Proposal
e. Field visits to clients
f.
g. Project management
2. Proposed Employee Selection Characteristics
a. Self-motivated and responsible
b. Well organized and self-disciplined
c.
Results oriented
d. Communicates effectively
e. Adaptable
f.
3. Equipment needed
a.
b.
Email account
c.
Telephone
Teleworker characteristics
Client-to-server repositories
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Objective
Explain the use of VPNs in securing site-to-site connectivity in a small- to medium-sized business network.
Instructor Note: This is an individual, student-based activity which then moves into a small, group-based activity
for discussion and design purposes. Once the small, group-based activity is completed, students will deliver a
presentation to the entire class.
Scenario
A small- to medium-sized business is growing and needs customers, teleworkers, and wired/wireless employees
to be able to access the main network from any location. As the network administrator for the business, you have
decided to implement VPNs for security, network access ease, and cost savings.
It is your job to ensure that all of the network administrators start the VPN planning process with the same
knowledge set.
Four basic VPN informational areas need to be researched and presented to the network administrative team:
Resources
Directions
Step 1: Individual students research all four of the following topics and take notes on their
research:
a. Topic 1: A concise definition of VPNs
b. Topic 2: Five general facts about VPNs
c.
Step 2: After students research their topics, groups of four students will be formed to discuss
their individual research.
a. Each group will agree on
1) One concise VPN definition
2) Five facts describing VPNs
3) One definition of IPsec as a VPN security option
4) One graphic showing a VPN network using tunneling
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Step 3: Each group will design a four-slide presentation (one slide per topic) to deliver to the
class for discussion.
A VPN uses public networks to send and receive private network data using special protocols.
VPN definition
VPN facts
VPN tunneling
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Topology
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 16
Addressing Table
Device
WEST
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
172.16.1.1
255.255.255.0
N/A
S0/0/0 (DCE)
10.1.1.1
255.255.255.252
N/A
Tunnel0
172.16.12.1
255.255.255.252
N/A
S0/0/0
10.1.1.2
255.255.255.252
N/A
S0/0/1 (DCE)
10.2.2.2
255.255.255.252
N/A
G0/1
172.16.2.1
255.255.255.0
N/A
S0/0/1
10.2.2.1
255.255.255.252
N/A
Tunnel0
172.16.12.2
255.255.255.252
N/A
PC-A
NIC
172.16.1.3
255.255.255.0
172.16.1.1
PC-C
NIC
172.16.2.3
255.255.255.0
172.16.2.1
ISP
EAST
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure a GRE Tunnel
Part 3: Enable Routing over the GRE Tunnel
Background / Scenario
Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate a variety of network layer
protocols between two locations over a public network, such as the Internet.
GRE can be used with:
-
In this lab, you will configure an unencrypted point-to-point GRE VPN tunnel and verify that network traffic is
using the tunnel. You will also configure the OSPF routing protocol inside the GRE VPN tunnel. The GRE
tunnel is between the WEST and EAST routers in OSPF area 0. The ISP has no knowledge of the GRE
tunnel. Communication between the WEST and EAST routers and the ISP is accomplished using default
static routes.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 16
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
d. Create a message of the day (MOTD) banner warning users that unauthorized access is prohibited.
e. Assign class as the encrypted privileged EXEC mode password.
f.
Assign cisco as the console and vty password and enable login.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 16
IP-Address
unassigned
unassigned
172.16.1.1
10.1.1.1
unassigned
172.16.12.1
OK?
YES
YES
YES
YES
YES
YES
Method
unset
unset
manual
manual
unset
manual
Status
Protocol
administratively down down
administratively down down
up
up
up
up
administratively down down
up
up
OK?
YES
YES
YES
YES
YES
YES
Method
unset
unset
manual
unset
manual
manual
Status
Protocol
administratively down down
administratively down down
up
up
administratively down down
up
up
up
up
IP-Address
unassigned
unassigned
172.16.2.1
unassigned
10.2.2.1
172.16.12.2
b. Issue the show interfaces tunnel 0 command to verify the tunneling protocol, tunnel source, and tunnel
destination used in this tunnel.
What is the tunneling protocol used? What are the tunnel source and destination IP addresses associated
with GRE tunnel on each router?
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 16
c.
Ping across the tunnel from the WEST router to the EAST router using the IP address of the tunnel
interface.
WEST# ping 172.16.12.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.12.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 32/34/36 ms
d. Use the traceroute command on the WEST to determine the path to the tunnel interface on the EAST
router. What is the path to the EAST router?
_____________________________________________________ 172.16.12.1 > 172.16.12.2
WEST# traceroute 172.16.12.2
Type escape sequence to abort.
Tracing the route to 172.16.12.2
VRF info: (vrf in name/id, vrf out name/id)
1 172.16.12.2 20 msec 20 msec *
e. Ping and trace the route across the tunnel from the EAST router to the WEST router using the IP address
of the tunnel interface.
What is the path to the WEST router from the EAST router? ____________________________________
172.16.12.2 > 172.16.12.1
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 16
The ping and traceroute commands should be successful. If not, troubleshoot before continuing to the
next part.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 16
C
L
O
C
L
What is the exit interface and IP address to reach the 172.16.2.0/24 network?
____________________________________________________________________________________
The tunnel 0 interface with an IP address of 172.16.12.2 is used to reach 172.16.2.0/24.
b. From the EAST router issue the command to verify the route to 172.16.1.0/24 LAN on the WEST router.
What is the exit interface and IP address to reach the 172.16.1.0/24 network?
____________________________________________________________________________________
The tunnel 0 interface with an IP address of 172.16.12.1 is used to reach 172.16.1.0/24.
EAST# show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is 10.2.2.2 to network 0.0.0.0
S*
C
L
O
C
L
C
L
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 16
Reflection
1. What other configurations are needed to create a secured GRE tunnel?
_______________________________________________________________________________________
IPsec can be configured to encrypt the data for a secured GRE tunnel.
2. If you added more LANs to the WEST or EAST router, what would you need to do so that the network will use
the GRE tunnel for traffic?
_______________________________________________________________________________________
The new networks would need to be added to the same routing protocols as the tunnel interface.
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router WEST
WEST# show run
Building configuration...
Current configuration : 1798 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname WEST
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 16
Router ISP
ISP# show run
Building configuration...
Current configuration : 1406 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ISP
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
ip cef
!
!
!
!
!
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
!
!
!
redundancy
!
!
!
!
!
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 16
Router EAST
EAST# show run
Building configuration...
Current configuration : 1802 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname EAST
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
ip cef
!
!
!
!
!
!
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 16
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 16 of 16
Objective
Explain the use of VPNs in securing site-to-site connectivity in a small- to medium-sized business network.
Instructor Note: This activity is best completed in small groups. It can then be shared with another group, the
class, or the instructor (as a group project).
Scenario
Your small- to medium-sized business has received quite a few new contracts lately. This has increased the need
for teleworkers and workload outsourcing. The new contract vendors and clients will also need access to your
network as the projects progress.
As network administrator for the business, you recognize that VPNs must be incorporated as a part of your
network strategy to support secure access by the teleworkers, employees, and vendors or clients.
To prepare for implementation of VPNs on the network, you devise a planning checklist to bring to the next
department meeting for discussion.
Resources
Step 1: Visit the VPN Discovery Tool, or any other Internet site with VPN-implementation, or
planning checklist examples.
Step 2: Use Packet Tracer to draw the current topology for your network; no device
configurations are necessary. Include:
Two branch offices: the Internet cloud and one headquarters location
Current network devices: servers, switches, routers/core routers, broadband ISR devices, and local user
workstations
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
Step 4: Using a word processing software program, create a small VPN planning checklist
based on your research from Step 1.
Step 5: Share your work with the class, another group, or your instructor.
Timeline Goal:
3 months
6 months
Phased-in approach:
9 months
Yes
No
1 year
VPN Factors to Support: (1=Most Important, 2=Very Important, 3=Somewhat Important, 4=Not Important)
Factor
Hardware
Software
Scalability
Cost
Interoperability
Security
Quality of Service
Network Maintenance
Applications Support
Customers/Vendors
Teleworkers
_____IPsec
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
_____Both
Page 2 of 3
_____OSPF
_____DHCP
_____DNS
Authentication to be used:
_____Digital Certificates
_____Shared Secrets
_____SSL
_____Passwords
_____IPsec
Encryption to be used:
_____DES
_____3DES
_____AES
_____SHA-1
_____Manual Exchange
Security methods
-
Authentication
Encryption
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Objective
Describe the different levels of router log messages.
Instructor Note: This activity is best completed in groups of two to three students.
Scenario
Currently, there are no formal policies or procedures for recording problems experienced on your companys
network. Furthermore, when network problems occur, you must try many methods to find the causes and this
troubleshooting approach takes time.
You know there must be a better way to resolve these issues. You decide to create a network maintenance plan
to keep repair records and pinpoint the causes of errors on the network.
Resources
Directions
Step 1: Brainstorm different types of network maintenance records you would like to keep.
Step 2: Sort the records types into main categories. Suggested categories include:
Traffic
Security
Step 3: Create an outline to guide the network maintenance planning process for the company.
II.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
III.
Network maintenance
Network recordkeeping
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Topology
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
S0/0/0 (DCE)
10.1.1.1
255.255.255.252
N/A
R2
S0/0/0
10.1.1.2
255.255.255.252
N/A
G0/0
172.16.2.1
255.255.255.0
N/A
NIC
172.16.2.3
255.255.255.0
172.16.2.1
PC-B
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure NTP
Part 3: Configure Syslog
Background / Scenario
Syslog messages that are generated by the network devices can be collected and archived on a syslog
server. The information can be used for monitoring, debugging, and troubleshooting purposes. The
administrator can control where the messages are stored and displayed. Syslog messages can be timestamped for analysis of the sequence of network events; therefore, it is important to synchronize the clock
across the network devices with a Network Time Protocol (NTP) server.
In this lab, you will configure R1 as the NTP server and R2 as a Syslog and NTP client. The syslog server
application, such as Tftp32d or other similar program, will be running on PC-B. Furthermore, you will control
the severity level of log messages that are collected and archived on the syslog server.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). Other routers and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers have been erased and have no startup configurations. If you are unsure,
contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 14
Required Resources
2 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 PC (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term, and Syslog
software, such as tftpd32)
Console cables to configure the Cisco IOS devices via the console ports
d. Create a message of the day (MOTD) banner warning users that unauthorized access is prohibited.
e. Assign class as the encrypted privileged EXEC mode password.
f.
Assign cisco as the console and vty password and enable login.
Set the clock rate to 128000 for the DCE serial interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 14
Record the information regarding the current time displayed in the following table.
Date
Time
Time Zone
Note: The time can also be set using the clock timezone command in the global configuration mode. For
more information regarding this command, research the clock timezone command at www.cisco.com to
determine the zone for your region.
Time
Time Zone
b. Configure R2 as the NTP client. Use the ntp server command to point to the IP address or hostname of
the NTP server. The ntp update-calendar command periodically updates the calendar with NTP time.
R2(config)# ntp server 10.1.1.1
R2(config)# ntp update-calendar
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 14
If the timestamp service is not enabled, use the following command to enable it.
R2(config)# service timestamps log datetime msec
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 14
Step 6: Configure and observe the effect of logging severity levels on R2.
a. Use the logging trap ? command to determine the various trap levels availability. When configuring a
level, the messages sent to the syslog server are the trap level configured and any lower levels.
R2(config)# logging trap ?
<0-7>
alerts
critical
debugging
emergencies
errors
informational
notifications
warnings
<cr>
(severity=1)
(severity=2)
(severity=7)
(severity=0)
(severity=3)
(severity=6)
(severity=5)
(severity=4)
If the logging trap warnings command was issued, which severity levels of messages are logged?
____________________________________________________________________________________
warnings (level 4) errors (level 3), critical (level 2), alerts (level 1), and emergency (level 0)
b. Change the logging severity level to 4.
R2(config)# logging trap warnings
or
R2(config)# logging trap 4
c.
Create interface Loopback0 on R2 and observe the log messages on both the terminal window and the
syslog server window on PC-B.
R2(config)# interface lo 0
R2(config-if)#
Jul 5 09:57:47.162: %LINK-3-UPDOWN: Interface Loopback0, changed state to up
Jul 5 09:57:48.162: %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0,
changed state to up
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 14
At severity level 4, are there any log messages on the syslog server? If any log messages appeared,
explain what appeared and why.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
There was a summary warning log message indicating a change in the interface state. The addition of the
interface was not enough to trigger and send more detailed informational messages to the syslog server
at level 4.
e. Change the logging severity level to 6.
R2(config)# logging trap informational
or
R2(config)# logging trap 6
f.
Clear the syslog entries on PC-B. Click Clear in the Tftpd32 dialog box.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 14
i.
Observe the syslog server output. Compare this result with the results at trapping level 4. What is your
observation?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
More log messages were trapped when the severity was set to 6 (informational) than when it was set at 4
(warnings).
Reflection
What is the problem with setting the level of severity too high (lowest level number) or too low (highest level
number) for syslog?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
When the severity level is set too high (lowest level number), the generated log could be missing important,
but not critical messages. However, setting it too low (highest level number), it can generate too many entries
and fill the logs with unnecessary information.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 14
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router R1
R1#show run
Building configuration...
Current configuration : 1572 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
ip cef
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 14
Router R2
Building configuration...
Current configuration : 1742 bytes
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 14
Objectives
Part 1: Survey Your Understanding of Network Monitoring
Part 2: Research Network Monitoring Tools
Part 3: Select a Network Monitoring Tool
Background / Scenario
Network monitoring is needed for any sized network. Proactively monitoring the network infrastructure can
assist network administrators with their day-to-day duties. The wide variety of networking tools available vary
in cost, depending on the features, number of network locations and number of nodes supported.
In this lab, you will conduct research on available network monitoring software. You will gather information on
software products and features of those products. You will investigate one product in greater detail and list
some of the key features available.
Required Resources
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
Step 2: Complete the following form for the network monitoring tools selected.
Vendor
Paessler: www.paessler.com
Nagios: www.nagios.org
Product Name
Features
Performance monitoring,
automated network device
discovery, network alerting, multivendor device support
PRTG
Nagios XI
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
Reflection
Based on your research, what conclusions have you reached regarding network monitoring software?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. Based on the sheer number of products available, choosing the right product is crucial. 30day trial versions can be nice as they allow the network administrator to work with a product before buying it.
There will be a learning curve to using the product, with whichever one is chosen.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Topology
Addressing Table
Device
R1
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
192.168.1.1
255.255.255.0
N/A
S0/0/0
192.168.2.1
255.255.255.252
N/A
R2
S0/0/0
192.168.2.2
255.255.255.252
N/A
S1
VLAN 1
192.168.1.2
255.255.255.0
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Configure an SNMP Manager and Agents
Part 3: Convert OID Codes with the Cisco SNMP Object Navigator
Background / Scenario
Simple Network Management Protocol (SNMP) is a network management protocol and an IETF standard
which can be used to both monitor and control clients on the network. SNMP can be used to get and set
variables related to the status and configuration of network hosts like routers and switches, as well as network
client computers. The SNMP manager can poll SNMP agents for data, or data can be automatically sent to
the SNMP manager by configuring traps on the SNMP agents.
In this lab, you will download, install, and configure SNMP management software on PC-A. You will also
configure a Cisco router and Cisco switch as SNMP agents. After capturing SNMP notification messages from
the SNMP agent, you will convert the MIB/Object ID codes to learn the details of the messages using the
Cisco SNMP Object Navigator.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and Cisco IOS versions can be used.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 20
Required Resources
2 Routers (Cisco 1941 with Cisco IOS, Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
Console cables to configure the Cisco IOS devices via the console ports
SNMP Management Software (PowerSNMP Free Manager by Dart Communications, or SolarWinds Kiwi
Syslog Server, Evaluation Version with 30 Day Trial)
Configure IP addresses as shown in the Addressing Table. (Do not configure the S0/0/0 interface on R1
at this time.)
d. Assign cisco as the console and vty password and enable login.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 20
Configure logging synchronous to prevent console messages from interrupting command entry.
g. Verify successful connectivity between the LAN devices by issuing the ping command.
h. Copy the running configuration to the startup configuration.
Click No if prompted to discover available SNMP agents. You will discover SNMP agents after configuring
SNMP on R1. PowerSNMP Free Manager supports SNMP version 1, 2, and 3. This lab uses SNMPv2.
d. In the pop-up Configuration window (if no pop-up window appear, go to Tools > Configuration), set the
local IP address to listen on 192.168.1.3 and click OK.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 20
Note: If prompted to discover available SNMP agents, click No and continue to next part of the lab.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 20
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 20
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 20
b. In the PowerSNMP Free Manager, R1 is added to the list of available SNMPv2 agents.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 20
Configure S1 as an SNMP agent. You can use the same snmp-server commands that you used to
configure R1.
S1(config)# snmp-server community ciscolab ro SNMP_ACL
S1(config)# snmp-server location snmp_manager
S1(config)# snmp-server contact ciscolab_admin
S1(config)# snmp-server host 192.168.1.3 version 2c ciscolab
S1(config)# snmp-server enable traps
S1(config)# ip access-list standard SNMP_ACL
S1(config-std-nacl)# permit 192.168.1.3
d. After S1 is configured, SNMP notifications from 192.168.1.2 display in the Traps window of the
PowerSNMP Free Manager. In the PowerSNMP Free Manager, add S1 as an SNMP agent using the
same process that you used to discover R1.
Part 3: Convert OID Codes with the Cisco SNMP Object Navigator
In Part 3, you will force SNMP notifications to be sent to the SNMP manager located at PC-A. You will then
convert the received OID codes to names to learn the nature of the messages. The MIB/OID codes can be
easily converted using the Cisco SNMP Object Navigator located at http://www.cisco.com.
interface s0/0/0
ip address 192.168.2.1 255.255.255.252
clock rate 128000
no shutdown
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 20
Navigate to the MIB Locator page. Click the SNMP Object Navigator.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 20
d. Using the SNMP Object Navigator page, decode the OID code number from the PowerSNMP Free
Manager generated in Part 3, Step 2. Enter the OID code number and click Translate.
e. Record the OID code numbers and their corresponding message translations below.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 20
Reflection
1. What are some of the potential benefits of monitoring a network with SNMP?
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary, but students may point to the ability of SNMP as an open and cross platform protocol to
work with many different devices including host computers on the network. SNMP benefits a network
administrator whose job it is to monitor the status and configuration of network hosts across the entire
network.
2. Why is it preferable to solely use read-only access when working with SNMPv2?
_______________________________________________________________________________________
_______________________________________________________________________________________
Because SNMPv2 supports only unencrypted community strings, using read-write access would be a greater
security risk.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 20
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router R1
R1#show run
Building configuration...
Current configuration : 5969 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
!
no ip domain lookup
ip cef
no ipv6 cef
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 20
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 20
ospf errors
ospf retransmit
ospf lsa
ospf cisco-specific state-change nssa-trans-change
ospf cisco-specific state-change shamlink interface
ospf cisco-specific state-change shamlink neighbor
ospf cisco-specific errors
ospf cisco-specific retransmit
ospf cisco-specific lsa
license
envmon
ethernet cfm cc mep-up mep-down cross-connect loop config
ethernet cfm crosscheck mep-missing mep-unknown service-up
flash insertion removal
auth-framework sec-violation
c3g
entity-sensor threshold
adslline
vdsl2line
icsudsu
isdn call-information
isdn layer2
isdn chan-not-avail
isdn ietf
ds0-busyout
ds1-loopback
energywise
vstack
mac-notification
bgp cbgp2
isis
ospfv3 state-change
ospfv3 errors
aaa_server
atm subif
cef resource-failure peer-state-change peer-fib-statememory bufferpeak
cnpd
config-copy
config
config-ctid
entity
fru-ctrl
resource-policy
event-manager
frame-relay multilink bundle-mismatch
frame-relay
frame-relay subif
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 20
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 20
Router R2
R2#show run
Building configuration...
Current configuration : 1251 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
!
no ip domain lookup
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 16 of 20
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 17 of 20
Switch S1
S1#show run
Building configuration...
Current configuration : 4618 bytes
!
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname S1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
system mtu routing 1500
!
no ip domain-lookup
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 18 of 20
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 19 of 20
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 20 of 20
Topology
Addressing Table
Device
R1
Interface
IP Address
Default Gateway
G0/0
192.168.1.1/24
N/A
S0/0/0 (DCE)
192.168.12.1/30
N/A
G0/0
192.168.2.1/24
N/A
S0/0/0
192.168.12.2/30
N/A
S0/0/1 (DCE)
192.168.23.1/30
N/A
G0/0
192.168.3.1/24
N/A
S0/0/1
192.168.23.2/30
N/A
PC-A
NIC
192.168.1.3
192.168.1.1
PC-B
NIC
192.168.2.3
192.168.2.1
PC-C
NIC
192.168.3.3
192.168.3.1
R2
R3
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Configure NetFlow on a Router
Part 3: Analyze NetFlow Using the CLI
Part 4: Explore NetFlow Collector and Analyzer Software
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 13
Background / Scenario
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a Cisco router or
multilayer switch. NetFlow enables network and security monitoring, network planning, traffic analysis, and IP
accounting. It is important not to confuse NetFlows purpose and results with that of packet capture hardware
and software. Packet capturing records all possible information exiting or entering a network device for later
analysis, NetFlow targets specific statistical information.
Flexible NetFlow is the latest NetFlow technology, improving on the original NetFlow by adding the capability
to customize the traffic analysis parameters. Flexible NetFlow uses the Version 9 export format. Starting with
Cisco IOS Release 15.1, many useful Flexible NetFlow commands are supported.
In this lab, you will configure NetFlow to capture both ingress (incoming) and egress (outgoing) packets. You
will use show commands to verify that NetFlow is operational and gathering statistical information. You will
also explore available options for NetFlow collection and analysis software.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). Other routers and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers have been erased and have no startup configurations. If you are unsure,
contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
d. Assign cisco as the console and vty passwords and enable login.
e. Encrypt the plain text passwords.
f.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 13
j.
Configure OSPF using Process ID 1 and advertise all networks. Ethernet interfaces should be passive.
k.
Create a local database on R3 with the username admin and password cisco with the privilege level at
15.
l.
On R3, enable the HTTP service and authenticate HTTP users by using the local database.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 13
b. Issue the show ip flow export command to review the NetFlow data export information.
R2# show ip flow export
Flow export v9 is enabled for main cache
Export source and destination details :
VRF ID : Default
Destination(1) 192.168.2.3 (9996)
Version 9 flow records
388 flows exported in 63 udp datagrams
0 flows failed due to lack of export packet
0 export packets were sent up to process level
0 export packets were dropped due to no fib
0 export packets were dropped due to adjacency issues
0 export packets were dropped due to fragmentation failures
0 export packets were dropped due to encapsulation fixup failures
From PC-A, browse to R3 using the 192.168.3.1 IP address. Login as admin with the password cisco.
Keep the browser open after you have logged into R3.
Note: Make sure the pop-up blocker is disabled on your browser.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 13
SrcIPaddress
112
DstIf
0.2
SrcIf
Se0/0/0
Se0/0/1
SrcIPaddress
192.168.12.1
192.168.23.2
DstIf
Null
Null
50
DstIPaddress
146
12.5
DstIPaddress
224.0.0.5
224.0.0.5
Pr SrcP DstP
59 0000 0000
59 0000 0000
Pkts
43
40
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 13
SrcIf
Se0/0/0
SrcIPaddress
192.168.12.1
DstIf
Null
DstIPaddress
224.0.0.5
Pr SrcP DstP
59 0000 0000
Pkts
35
SrcIf
Se0/0/1
SrcIPaddress
192.168.23.2
DstIf
Null
DstIPaddress
224.0.0.5
Pr SrcP DstP
59 0000 0000
Pkts
33
Reflection
1. What is the purpose of NetFlow collector software?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
NetFlow collector software receives the NetFlow data that is exported from routers and switches on the
network. It filters and aggregates the data according to the policies set up by the network administrator, and
stores this summarized or aggregated data, instead of raw flow data, to minimize disk space consumption.
2. What is the purpose of NetFlow analyzer software?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
NetFlow analyzer software provides the means to do near real-time visualization and analysis of recorded and
aggregated flow data. It allows you to specify the router, aggregation scheme, and the time interval in which
you wish to view. You can then sort and visualize the data in a manner which makes sense for the users (bar
charts, pie charts, or histograms of the sorted reports).
3. What are the seven critical fields used by the original NetFlow to distinguish flows?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 13
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 13
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 13
Router R2
R2# show run
Building configuration...
Current configuration : 1808 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 13
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 13
Router R3
R3# show run
Building configuration...
Current configuration : 1769 bytes
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R3
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
username admin privilege 15 secret 4 tnhtc92DXBhelxjYk8LWJrPV36S2i4ntXrpb4RFmfqY
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 13
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 13
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 13
Objective
Explain different resources that can be used to receive router log messages.
Instructor Note: This activity can be completed individually or in small groups and then shared with the class.
Scenario
As the network administrator for a small- to medium-sized business, you have just started using CLI network
monitoring on the company routers, switches, and servers.
You decide to create a situational listing explaining when to use each method. Network monitoring methods to
include are:
Syslog
SNMP
NetFlow
Resources
Directions
Step 1: Create several situations where Syslog, SNMP, and Net Flow would be used by a
network administrator.
Step 2: List the situations in matrix format and ask another student or group to identify which
CLI monitoring tool to use to gather information about the network issues described.
Step 3: Share the matrix with another group or the class.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Net Flow
Syslog
SNMP
Syslog
SNMP
Net Flow
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Objective
Troubleshoot IP connectivity using basic commands.
Instructor Note: This activity is best completed by groups of two students it can then be shared and discussed
with another group of students, with the entire class or with the instructor.
Scenario
You have just moved in to your new office, and your network is very small. After a long weekend of setting up the
new network, you discover that it is not working correctly.
Some of the devices cannot access each other and some cannot access the router which connects to the ISP.
It is your responsibility to troubleshoot and fix the problems. You decide to start with basic commands to identify
possible troubleshooting areas.
Resources
Directions
Step 1: Create a simple network topology using Packet Tracer software, including:
a. Two connected 1941 series routers
b. Two Cisco 2960 switches, one switch connected to each router to form two LANs
c.
Step 2: Configure the network and user devices and verify that everything is working correctly.
Make an error or two in the configurations. Be sure to turn off the Options,
Preferences, and the Show Link Lights setting available on the Packet Tracer software.
Step 3: Share your saved Packet Tracer file with another group have them find and fix the
problems using the following commands only:
ping
traceroute
telnet
show interface
show running-config
show protocols
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Network Breakdown
show vlan
Step 4: Share the results of the activity with the class or your instructor. How did the groups
fix the problems?
Troubleshooting procedures
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Objective
Using a systematic approach, troubleshoot issues in a small- to medium-sized business network.
Instructor Note: This activity is best completed in small groups. It can then be shared with another group, the
class, or the instructor (as a group project).
Scenario
As the network administrator for a small business, you want to implement a documentation system to use with
troubleshooting network-based problems.
After much thought, you decide to compile simple network documentation information into a file to be used when
network problems arise. You also know that if the company gets larger in the future, this file can be used to export
the information to a computerized, network software system.
To start the network documentation process, you include:
Network configuration information for major devices, including routers and switches.
Resources
Step 1: Create a Packet Tracer file to simulate a very small business network. Include these
devices:
Five user devices to include PCs, laptops, servers, and printers connected either of the two LANs.
Step 2: Create a word-processing file in matrix format to record each of the following main
network-documentation areas:
a. Physical topology and information
1) Type of device and model name
2) Network hostname
3) Location of the device
4) Cable connections types and ports
b. Logical topology information
1) IOS or OS image versions
2) IP addresses (IPv4, IPv6, or both)
3) Data-link addresses (MAC)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 5
Documentation Development
4) VLAN addresses
c.
Step 3: Share your Packet Tracer file and network documentation with a classmate, another
group, the class, or your Instructor according to the instructions provided. Discuss
how this information could be useful to any network administrator.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 5
Documentation Development
Logical Network Topology Diagram
Router
Model Name
Network Hostname
R1-MDF
IP address
192.168.1.1 GigabitEthernet0/0
10.10.10.1 GigabitEthernet0/1
MAC address
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 5
Documentation Development
0001.63b1.2702 (bia 0001.63b1.2702 GigabitEthernet0/1
none
VLAN address(es)
Network Configuration
Script (runningconfiguration)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 5
Documentation Development
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 5