Chapter 10 Lab
Chapter 10 Lab
Objectives
Part A Analyze the customer work order and proposed network design. Create a VLSM IP addressing scheme. Part B Build a multilayer network and connect to a simulated ISP. Configure basic settings on switches with multiple VLANs and VTP. Configure the STP root bridge. Configure basic settings on routers and inter-VLAN routing. Verify basic connectivity, device configuration, and functionality.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 19
Background / Preparation
AnyCompany is opening a new branch office (Remote Office 2) and has contracted you to extend the AnyCompany network into the new facilities. Corporate management has also decided that this would be a good time to restructure the existing network to provide increased levels of security and performance. The existing network consists of a head office, which houses 112 employees, and a business office (remote office 1), which houses 200 employees. The new office space (Remote Office 2) will initially house four distinct groups of employees but will expand as the company grows. For this reason, implement VLANs to help manage the traffic. Also use VTP to simplify the task of managing the VLANs. One of the groups occupying the new office is the sales force. This group requires wireless access to the company network. Because security is of great concern, the wireless network must be on its own VLAN. Initially the network in Remote Office 2 will consist of five VLANs. This lab focuses on the configuration of the Cisco 1800 router and 2960 switch, or comparable equipment, using Cisco IOS commands. The information in this lab applies to other routers and switches; however, the command syntax may vary. Depending on the router model, the interfaces may differ. For example, on some routers Serial 0 may be Serial 0/0 or Serial 0/0/0 and Ethernet 0 may be FastEthernet 0/0. It is recommenced to work in teams of three. Each person can be responsible for one of the three switches and its associated host PC. The team can work together to configure the two company routers. The following resources are required: One ISP router with one serial and one FastEthernet interface (preconfigured by instructor) Three Ethernet 2960 switches (or comparable) for Remote Office 2 LAN Two 1841 routers (or other routers), one with a FastEthernet interface and one with two serial interfaces One Wireless Access Point (optional) One Ethernet 2960 switch to connect wired PCs Three Windows XP-based PCs to act as wired clients One Discovery CD Server, preconfigured by instructor (optional if a Loopback is on ISP router) Cat 5 cabling as necessary (straight-through and crossover) Two Serial DTE/DCE cables for WAN links ISP work order (included in this lab)
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 19
Part A Review the work order and develop the VLSM subnet scheme
Task 1: Review the customer work order and proposed network.
You have received the following work order from your manager at the ISP. Review the work order to get a general understanding of what is to be done for the customer.
ABC-XYZ-ISP Inc.
Official Work Order
Customer: AnyCompany1 or AnyCompany2 (Circle the customer name assigned by your instructor) Address: 1234 Fifth Street, Anytown Customer Contact: Fred Pennypincher, Chief Financial Officer Phone number: 123-456-7890 Date: _____________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 19
CCNA Discovery Introducing Routing and Switching in the Enterprise Task 2: Develop the network scheme
NOTE: Be sure to have the instructor check your work for each step in this task before going on to Task 3. Step 1: Determine the size of the CIDR address block assigned a. The customer has been assigned CIDR network address: _______________________________ If network customer is AnyCompany1, use 172.20.0.0/22. If network customer is AnyCompany2, use 172.20.4.0/22. b. How many total host IP addresses does this CIDR address block represent? _____________________________________ Using this address block, you will develop a VLSM subnet scheme that will allow AnyCompanyX to support existing HQ and RO1 networks as well as the new RO2 network. Step 2: Determine the size of each VLSM block to accommodate users a. Based on the CIDR address assigned by the ISP and the number of users in each area or VLAN, optimally subnet this block of addresses to provide sufficient addresses for all offices (HQ, RO1, and RO2) and VLAN requirements. b. To start, determine the size of the subnet address block required for a network area or group of users. Fill in the table with this information. Look at the number of users for each area or subnet and determine the smallest power of 2 that will cover the requirement. As an example, if 93 addresses were required, a VLSM block of 128 (2^7) would be needed. The next smallest power of 2 is 64 (2^6), which does not cover the requirement. A block of 128 results in some unused addresses but also allows for growth. VLSM block size / No. of IPs (powers of 2)
Network Area HQ Network RO1 Network RO2 Network / VLANs VLAN 1 (Server Farm) VLAN 2 (Native/mgmt -IP) VLAN 11 (Dept 1) VLAN 12 (Dept 2) VLAN 13 (Dept 3) VLAN 101 (wireless) WAN link (RO2 to HQ) Total users and block sizes for RO2 RO2 block size to subdivide Total users and all VLSM blocks c.
18 users 9 users 75 users 112 users 38 users 52 users 2 306 N/A 618
To optimally allocate addresses from the /22 CIDR address, start by sorting the block sizes from largest to smallest. For this lab, add up the individual smaller blocks for each of the VLANs in the RO2 network and allocate a single larger block that will cover all the smaller block requirements. This keeps all of the subnets together for RO2 and aids in route summarization. Use the table below to order the network areas by the VLSM block size. List the large block for the entire RO2 network first, followed by the others. The larger RO2 block will be broken down into smaller subnets later.
Page 4 of 19
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Network Area / VLAN RO2 total block size (will be subdivided into smaller blocks) RO1 Network HQ Network RO2 - VLAN 11 (Dept 1) RO2 - VLAN 12 (Dept 2) RO2 - VLAN 13 (Dept 3s) RO2 - VLAN 101 (wireless) RO2 - VLAN 1 (Server Farm) RO2 - VLAN 2 (Native/mgmt -IP) RO2 - HQ Wan link
Step 3: Determine subnet addresses for the CIDR block a. Determine which blocks of CIDR address to assign to each area of the network or VLAN. Use the VLSM subnet chart (Appendix A) to enter the subnet information for each of the CIDR blocks. b. To determine the subnet addresses for the 172.20.0.0/22 or the 172.20.4.0/22 CIDR block, use the subnet calculator tool on the Cisco Network Academy website. With the subnet calculator tool, enter the Base Network Address (172.20.0.0 or 172.20.4.0) and the value of VLSM Mask 1 in dotted decimal, starting with 255.255.252.0 (/22). Click the Actions button Calculate Subnetting using VLSM. Use the same base address and increase the mask length by one each time to fill in the chart. NOTE: Entries for the subnet numbers for the /29 and /30 mask are not included in the table. Subdivide one of the /28s to a /30 for the WAN link. Step 4: Allocate blocks of addresses to each area of the network a. Fill in the following table based on the subnet information in the CIDR/VLSM Subnet Chart and the sorted table of address requirements. Draw lines around each of the blocks in the address table above, or color them in, and label each one according to the network area or VLAN to which it is assigned.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 19
Network Area / VLAN RO2 total block size (will be subdivided into smaller blocks) RO2 VLAN 11 (Dept 1) RO2 VLAN 12 (Dept 2) RO2 VLAN 13 (Dept 3) RO2 VLAN 101 (wireless) RO2 VLAN 1 (Server Farm) RO2 VLAN 2 (Native/mgmt IP) RO2 - WAN link RO1 Network HQ Network
Subnet Mask
b. Have the instructor verify that your addressing scheme is accurate and assigns address space efficiently. You should not have any overlapping subnets and should have unused contiguous blocks of addresses that can used for future subnets as the company grows.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 19
Step 2: Have the instructor check your work for this task before going on to Part B.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 7 of 19
Part B Physically construct the network and perform basic device configuration
Task 1: Build the network and connect cables to the interfaces and ports indicated
Connect your AnyCompanyX network router HQ to the ISP router. The ISP router and the Discovery CD Server should be preconfigured by the instructor. If ISP router is configured with a Loopback address in lieu of the Discovery CD Server, the HTTP server in the router must be enabled. If you are unsure, check with your instructor. NOTE: Make sure that the routers and the switches have been erased and have no startup configurations. Instructions for erasing both switch and router are provided in the Lab Manual, located on Academy Connection in the Tools section. NOTE: SDM Enabled Routers If the startup-config is erased in an SDM enabled router, SDM will no longer come up by default when the router is restarted. It will be necessary to build a basic router configuration using IOS commands. The steps provided in this lab use IOS commands and do not require the use of SDM. If you wish to use SDM, refer to the instructions in the Lab Manual, located on the Academy Connection in the Tools section or contact your instructor if necessary. The IP addresses used to configure the devices in the following tasks should be based on your solution for the VLSM scheme. NOTE: VLAN Mismatch Messages - You may want to wait until after the switches are configured to connect the trunk links. Otherwise, native VLAN mismatch messages come up until all switches are configured.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 8 of 19
Step 3: Create CHAP user ID and password Configure a username for the ISP router on the HQ router with a password of cisco for use with CHAP authentication. Step 4: Save the router running-config configuration to startup-config Step 5: Copy the router running-config to a text editor and save it for later use, if needed a. Open a text editor such as Windows Notepad. b. Issue the show running-config command. c. Copy the output and paste it into the text editor. d. Save the file on the Windows Desktop as HQ.txt.
Step 3: Save the router running-config configuration to startup-config Step 4: Copy the router running-config to a text editor and save it for later use, if needed a. Open a text editor such as Windows Notepad. b. Issue the show running-config command. c. Copy the output and paste it into the text editor. d. Save the file on the Windows Desktop as R2.txt. NOTE: If you need to use this file later, you will need to edit it to clean it up and make sure that the necessary interfaces have the no shutdown command applied to them.
Step 2: Configure the VLANs for Remote office 2 on S1 using the VLAN numbers and names shown in the chart below Assign ports to each VLAN as indicated. Use the same chart to configure switches S2 and S3:
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 19
RO2 VLAN Number VLAN 1 (default VLAN) VLAN 2 (Native/mgmt IP) VLAN 11 (Dept 1 users) VLAN 12 (Dept 2 users) VLAN 13 (Dept 3 users) VLAN 101 (wireless)
Step 3: Assign an IP address to the Management VLAN 2 on S1 a. Assign the VLAN 2 address according to the Device Interface / IP Address Chart in Part A, Task 3, Step1. b. Configure the switch with a default gateway to router R2 for VLAN 2. Step 4: Configure S1 switch ports Fa0/1, Fa0/2 and Fa0/3 as 802.1Q trunks The trunks carry VLAN information. Set each trunk to use VLAN 2 as the native VLAN. Step 5: Configure S1 as the root switch for STP Change the priority of native VLAN 2 from the default of 32769 to 4096. Step 6: Configure a VTP domain a. Configure the AnyCompanyX domain name (where X is 1 or 2) on S1 and a password of cisco. b. Configure S1 as the VTP server. Step 7: Save the switch running-config configuration to startup-config Step 8: Copy the switch running-config to a text editor and save it for later use, if needed
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 10 of 19
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 11 of 19
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 12 of 19
For the ping (icmp) entry, what is the inside local address and port number? ______________________________________________________ For the ping (icmp) entry, what is the inside global address and port number? ______________________________________________________ For the browser connection (tcp) entry, what is the inside local address and port number? ______________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 19
For the browser connection (tcp), what is the outside global address and port number? _______________ Step 5: Save the router running configuration to NVRAM.
Step 6: Remove the PC H1 cable from switch port Fa0/9 and connect the cable from PC H2 a. Ping from H2 to any IP address to cause a security violation on port Fa0/9. You should see security violation messages. b. Issue the show port-security interface command again for Fa0/9. What is the Port Status? _______________________________________ What is the Security Violation Count? _____________________________ What is the Source Address:Vlan? _______________________________) Step 7: Move the cables for the PCs back to their original ports and restore port Fa0/9 a. Clear the sticky address entry for port Fa0/9. b. To return the interface from error disable to administratively up, enter the shutdown command followed by the no shutdown command. Step 8: Save the switch running-config configuration to startup-config Step 9: Repeat Steps 1 through 6 to set port security for the other two switches, S2 and S3, and save the running config to startup-config
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 15 of 19
CCNA Discovery Introducing Routing and Switching in the Enterprise Task 5: Configure ACL Security on HQ and R2
NOTE: The following commands are based on IP address ranges for one possible solution to the VLSM scheme in part of the lab. Replace the address ranges with those that match the ones that you applied to the Remote Office 2 Hosts and VLANs. Step 1: Create and apply an Extended Numbered ACL on the edge router (HQ) a. The ACL allows replies to requests made by internal hosts to enter the network. Allow internal users to ping or trace any location on the Internet but do not allow any ping or trace access to people external to the enterprise. b. Apply the ACL to the NAT outside interface of the HQ router to protect the AnyCompanyX network. c. Test the ACL by pinging from H1, H2, and H3 to the ISP loopback address or the IP address of the Discovery CD Server. Were the pings successful? __________ d. Using a browser from H1, H2, and H3, enter the ISP router Loopback0 address or the IP address of the Discovery CD Server. Were you able to access the web interface of the router or the Web page from the server? __________ Step 2: Create and apply an Extended Named ACL on R2 a. The ACL allows web requests and pings to leave the Remote Office 2 network if they originated in VLANs 1, 11, 12, 13, or 101. Telnet traffic is permitted if it originated in VLAN 12, and FTP traffic is permitted if it originated in VLAN 13. All other traffic is denied. b. On the R2 router, apply the ACL to each Fa0/0 subinterface except Fa0/0.2, the native VLAN. c. Test the ACL by pinging from H1, H2, and H3 to the ISP loopback address or the IP address of the Discovery CD Server. Were the pings successful? __________ d. Using a browser from H1, H2, and H3, enter the ISP router Loopback0 address or the IP address of the Discovery CD Server. Were you able to access the web interface of the router or the Web page from the server? __________ e. Telnet from Host H1 in VLAN 11 to the HQ router using its S0/0/0 IP address. Were you able to telnet to it? __________ f. Telnet from Host H2 in VLAN 12 to the HQ router using its S0/0/0 IP address. Were you able to telnet to it? __________ g. Use the show access-lists command to verify that the ACL is working. Step 3: Create and apply a standard ACL to control VTY access to the HQ router a. The ACL should deny hosts from all VLANs on Remote Office 2 except for Host H2 on VLAN 12. This will still allow other hosts on VLAN 12 to access router R2 using telnet. b. Apply the ACL to VTY lines 0 through 4 on the R2 router. c. Telnet from Host H2 in VLAN 12 to the HQ router using its S0/0/0 IP address. Were you able to telnet to it? ___
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 16 of 19
NOTE: To find out exactly how the router is configured, look at the interfaces. Doing this will identify the type of router as well as how many interfaces the router has. There is no way to effectively list all of the combinations of configurations for each router class. What is provided are the identifiers for the possible combinations of interfaces in the device. This interface chart does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in IOS command to represent the interface.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 17 of 19
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 18 of 19
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 19 of 19