CCNA Routing and SwitchingPractice and Study Guide:                     Exercises, Activities, and Scenarios to Prepare                        for the ICND2 (200-101) Certification Exam  Instructor’s Answer Key  Allan Johnson     Cisco Press                     800 East 96th Street                     Indianapolis, Indiana 46240 USA     instructor.indb i                                                                 3/12/14 7:51 AM ii   CCNA Routing and Switching Practice and Study Guide     Publisher                  CCNA Routing and Switching Practice and                                                Paul Boger                  Study Guide:                                                                           Associate Publisher                                                                                                         Dave Dusthimer                  Exercises, Activities, and Scenarios to Prepare                  for the ICND2 (200-101) Certification Exam                                             Business Operation Manager,                                                                                                         Cisco Press                                                                                                         Jan Cornelssen                  Instructor’s Answer Key                  Allan Johnson                                                                          Executive Editor                                                                                                         Mary Beth Ray                  Copyright© 2014 Cisco Systems, Inc.                                                                                                         Managing Editor                  Cisco Press logo is a trademark of Cisco Systems, Inc.                                 Sandra Schroeder  Published by:                                                                          Senior Development Editor                  Cisco Press                                                                            Christopher Cleveland                  800 East 96th Street                                                                                                         Project Editor                  Indianapolis, IN 46240 USA                                                                                                         Mandie Frank                  All rights reserved. No part of this book may be reproduced or transmitted in any                                                                                                         Copy Editor                  form or by any means, electronic or mechanical, including photocopying, record-        Keith Cline                  ing, or by any information storage and retrieval system, without written permis-                  sion from the publisher, except for the inclusion of brief quotations in a review.     Technical Editor                                                                                                         Steve Stiles                  Printed in the United States of America                                                                                                         Editorial Assistant                  First Printing April 2014                                                              Vanessa Evans                  ISBN-13: 978-0-13-381341-8                                                             Designer                                                                                                         Mark Shirar                  ISBN-10: 0-13-381341-X                                                                                                         Composition                                                                                                         Tricia Bronkella                  Warning and Disclaimer                                                                                                         Proofreader                  This book is designed to provide information about networking. Every effort has        Sarah Kearns                  been made to make this book as complete and as accurate as possible, but no war-                  ranty or fitness is implied.                  The information is provided on an “as is” basis. The authors, Cisco Press, and                  Cisco Systems, Inc. shall have neither liability nor responsibility to any person or                  entity with respect to any loss or damages arising from the information contained                  in this book or from the use of the discs or programs that may accompany it.                  The opinions expressed in this book belong to the author and are not necessarily                  those of Cisco Systems, Inc.     instructor.indb ii                                                                                                                    3/12/14 7:51 AM iii     Trademark Acknowledgments                           All terms mentioned in this book that are known to be trademarks or service marks have been                           appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the accuracy of                           this information. Use of a term in this book should not be regarded as affecting the validity of                           any trademark or service mark.   Special Sales                           For information about buying this title in bulk quantities, or for special sales opportunities                           (which may include electronic versions; custom cover designs; and content particular to your                           business, training goals, marketing focus, or branding interests), please contact our corporate                           sales department at 
[email protected] or (800) 382-3419.                           For government sales inquiries, please contact 
[email protected].                           For questions about sales outside the U.S., please contact 
[email protected].   Feedback Information                           At Cisco Press, our goal is to create in-depth technical books of the highest quality and value.                           Each book is crafted with care and precision, undergoing rigorous development that involves                           the unique expertise of members from the professional technical community.                           Readers’ feedback is a natural continuation of this process. If you have any comments regard-                           ing how we could improve the quality of this book, or otherwise alter it to better suit your                           needs, you can contact us through email at 
[email protected]. Please make sure to                           include the book title and ISBN in your message.                           We greatly appreciate your assistance.     8     instructor.indb iii                                                                                                               3/12/14 7:51 AM iv   CCNA Routing and Switching Practice and Study Guide     About the Author                                  Allan Johnson entered the academic world in 1999 after 10 years as a business owner/opera-                                  tor to dedicate his efforts to his passion for teaching. He holds both an MBA and an M.Ed in                                  Occupational Training and Development. He is an information technology instructor at Del                                  Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and                                  energy to the CCNA Instructional Support Team, providing services to Networking Academy                                  instructors worldwide and creating training materials. He now works full time for Cisco                                  Networking Academy as a Learning Systems Developer.     instructor.indb iv                                                                                                              3/12/14 7:51 AM v     About the Technical Reviewer                     Steve Stiles is a Cisco Network Academy Instructor for Rhodes State College and a Cisco                     Certified Instructor Trainer, having earned CCNA Security and CCNP level certifications. He                     was the recipient of the 2012 Outstanding Teacher of the Year by the Ohio Association of                     Two-Year Colleges and co-recipient for the Outstanding Faculty of the Year at Rhodes State                     College.     instructor.indb v                                                                                                     3/12/14 7:51 AM  Thank you providing me the comfort and resting place only you                                  can give.indb vi                                                                                                          3/12/14 7:51 AM . Without the sacrifices you made during the project. this work would                                  not have come to fruition.                                  —Allan Johnson     instructor. Becky.                vi   CCNA Routing and Switching Practice and Study Guide                                      Dedication                                  For my wife.                        The Cisco Network Academy authors for the online curriculum and series of Companion                       Guides take the reader deeper. you amaze me with your ability to juggle multiple projects at                       once. Chris. Wayne Lewis. but for more advanced college-level technology                       courses and degrees.                       This is my seventh project with Christopher Cleveland as development editor. steering each from beginning to end. past the CCENT exam topics. His dedication to                       perfection pays dividends in countless. and Bob Vachon—for their excellent treatment of the material. as well. he was willing and able to do                       the arduous review work necessary to make sure that you get a book that is both technically                       accurate and unambiguous. when Mary Beth Ray contacted him. Thankfully. unseen ways.     instructor. and his excel-                       lent work building activities for the new Cisco Networking Academy curriculum. he was an                       obvious choice. it                       is reflected throughout this book. Executive Editor.                                                                                                                  vii                           Acknowledgments                       When I began to think of whom I would like to have as a technical editor for this work.indb vii                                                                                                     3/12/14 7:51 AM . Steve                       Stiles immediately came to mind. for providing me                       with much-needed guidance and support. I can always count on you to make the tough deci-                       sions. Thank you again. Thank you especially to Amy Gerrie and her team of authors—                       Rick Graziani. with the ultimate goal of not only                       preparing the student for CCENT certification. This book could not be a reality without your persis-                       tence. With his instructor and industry background.                       Mary Beth Rey. indb viii                                                                                                3/12/14 7:51 AM .                 viii   CCNA Routing and Switching Practice and Study Guide                                        Contents at a Glance                                                    Introduction   xvi                                     Part I: Scaling Networks                                     Chapter 1       Introduction to Scaling Networks          1                                     Chapter 2       LAN Redundancy         13                                     Chapter 3       Link Aggregation      31                                     Chapter 4       Wireless LANs     41                                     Chapter 5       Adjust and Troubleshoot Single-Area OSPF              57                                     Chapter 6       Multiarea OSPF       77                                     Chapter 7       EIGRP 87                                     Chapter 8       EIGRP Advanced Configurations and Troubleshooting          109                                     Chapter 9       IOS Images and Licensing          127                                     Part II: Connecting Networks                                     Chapter 10      Hierarchical Network Design         137                                     Chapter 11      Connecting to the WAN        147                                     Chapter 12      Point-to-Point Connections        155                                     Chapter 13      Frame Relay    171                                     Chapter 14      Network Address Translation for IPv4            181                                     Chapter 15      Broadband Solutions         193                                     Chapter 16      Securing Site-to-Site Connectivity            203                                     Chapter 17      Monitoring the Network        213                                     Chapter 18      Troubleshooting the Network         223     instructor. indb ix                                                                                          3/12/14 7:51 AM .1D Port Roles          17                                    Varieties of Spanning Tree Protocols            20                                       Comparing the STP Varieties         20                                       PVST+ Operation     21                                       Rapid PVST+ Operation         22                                    Spanning-Tree Configuration       23                                       PVST+ and Rapid PVST+ Configuration                    23                                    First Hop Redundancy Protocols         26                                       Identify FHRP Terminology          27                                       Identify the Type of FHRP          28                                       HSRP and GLBP Configuration and Verification                28                       Chapter 3     Link Aggregation     31                                    Link Aggregation Concepts     32                                       EtherChannel Advantages        32                                       EtherChannel Operation        32     instructor.                                                                                                       ix                          Contents                                    Introduction   xvi                       Part I: Scaling Networks                       Chapter 1     Introduction to Scaling Networks                1                                    Implementing a Network Design          2                                       Hierarchical Network Design         2                                       Identify Scalability Terminology         6                                    Selecting Network Devices     7                                       Selecting Switch Hardware       7                                       Selecting Router Hardware       8                                       Managing Devices    8                                          Basic Router Configuration Review               9                                          Basic Router Verification Review               10                                          Basic Switch Configuration Review               10                                          Basic Switch Verification Review               11                       Chapter 2     LAN Redundancy       13                                    Spanning-Tree Concepts      14                                       Draw a Redundant Topology           14                                       Purpose of Spanning Tree       15                                       Spanning-Tree Operation       15                                       Identify the 802. 11 Frame      45                                                    Wireless Media Contention        48                                                    Associating with an AP      50                                                    Channel Management Concepts            52                                                 Wireless LAN Security     53                                                    WLAN Security Terminology             53                                                    Identify the WLAN Security Characteristics                  54                                                 Wireless LAN Configuration     54                                                    Configuring WLAN Routers and Clients                   54                                                    Troubleshooting WLAN Issues            55                                  Chapter 5       Adjust and Troubleshoot Single-Area OSPF                       57                                                 Advanced Single-Area OSPF Configurations                  58                                                    Single-Area OSPF Configuration Review                  58                                                       Configuring Single-Area OSPFv2                58                                                       Verifying Single-Area OSPFv2             59                                                       Configuring Single-Area OSPFv3                59                                                       Verifying Single-Area OSPFv3             61                                                    Identify Network Types      62                                                 OSPF and Multi-Access Networks            63                                                    OSPF and Multi-Access Networks Completion Exercise                     63                                                    DR/BDR Election Exercise         65                                                    Redistributing an OSPF Default Route Exercise                    67                                                       OSPFv2 Default Route Redistribution                 67                                                       OSPFv3 Default Route Redistribution                 68                                                    Fine-Tuning OSPF Interfaces       69                                                    Securing OSPFv2 with MD5 Authentication                     69                                                 Troubleshooting Single-Area OSPF Implementations                     71                                                    OSPF Adjacency Issues       71                                                    Identify OSPFv2 Troubleshooting Commands                     71                                                    Identify OSPFv3 Troubleshooting Commands                     74     instructor.                x   CCNA Routing and Switching Practice and Study Guide                                                     Link Aggregation Configuration       33                                                    Configuring EtherChannel         34                                                       EtherChannel Configuration Scenario 1                34                                                       EtherChannel Configuration Scenario 1                34                                                       EtherChannel Configuration Scenario 1                35                                                    Verifying and Troubleshooting EtherChannel                  35                                  Chapter 4       Wireless LANs     41                                                 Wireless LAN Concepts     42                                                    Identify Wireless Technologies         42                                                    WLANs Components and Topologies                   44                                                 Wireless LAN Operations     45                                                    Label the 802.indb x                                                                                                              3/12/14 7:51 AM .                                                                                                               xi                          Chapter 6   Multiarea OSPF       77                                  Multiarea OSPF Operation     78                                     Multiarea OSPF Terminology and Concepts                  78                                     Multiarea OSPF LSA Operation             79                                     OSPF Routing Table and Types of Routes              79                                  Configuring Multiarea OSPF       80                                     Configuring Multiarea OSPF          80                                     Configuring Route Summarization for Multiarea OSPFv2                83                                     Verifying Multiarea OSPF       85                       Chapter 7   EIGRP 87                                  Characteristics of EIGRP    88                                     Describe Basic EIGRP Features            88                                     Identify and Describe EIGRP Packet Types                 88                                     Identify Elements of the EIGRP Message Formats                 89                                  Configuring EIGRP for IPv4    94                                     Configuring EIGRP with IPv4             94                                     Verifying EIGRP with IPv4          97                                  Operation of EIGRP    99                                     EIGRP Metric Concepts         99                                     DUAL Concepts Exercise         100                                     DUAL FSM Completion Exercise                 102                                  Configuring EIGRP for IPv6    104                                     Comparing EIGRP for IPv4 and EIGRP for IPv6                   104                                     Configuring and Verifying EIGRP for IPv6             105                       Chapter 8   EIGRP Advanced Configurations and Troubleshooting                      109                                  Advanced EIGRP Configurations          110                                     Automatic Summarization        110                                     Manual Summarization       112                                        IPv4 Manual Summarization             113                                        IPv6 Manual Summarization             115                                     Default Route Propagation       116                                     Fine-Tuning EIGRP Interfaces         118                                     Securing EIGRP Routing Updates               120                                  Troubleshoot EIGRP    121                                     Commands for Troubleshooting EIGRP                 121                                     Troubleshoot EIGRP Connectivity Issues              122                                        Connectivity Issue #1      122                                        Connectivity Issue #2      123                                        Connectivity Issue #3      123     instructor.indb xi                                                                                                 3/12/14 7:51 AM .  and Naming Conventions              128                                                       Backing Up Cisco IOS Images             131                                                   IOS Licensing   132                                                       Software Licensing     132                                                       License Verification and Management             133                                    Part II: Connecting Networks                                    Chapter 10      Hierarchical Network Design             137                                                   Hierarchical Network Design Overview              138                                                       Enterprise Network Campus Design              138                                                       Hierarchical Network Design         138                                                   Cisco Enterprise Architecture         139                                                       Modular Network Design            139                                                       Cisco Enterprise Architecture Model             140                                                   Evolving Network Architectures          144                                                       Cisco Enterprise Architectures          144                                                       Emerging Network Architectures            144                                    Chapter 11      Connecting to the WAN            147                                                   WAN Technologies Overview             148                                                       Network Types and Their Evolving WAN Needs                  148                                                       WAN Operations and Terminology                149                                                   Selecting a WAN Technology            151                                                       Varieties of WAN Link Connections             151                                                       Private and Public WAN Access Options               152                                    Chapter 12      Point-to-Point Connections             155                                                   Serial Point-to-Point Overview         156                                                       Serial Communications        156                                                       WAN Protocols        158                                                       HDLC Encapsulation          158                                                       HDLC Configuration and Troubleshooting                159                                                       Troubleshooting Serial Interfaces         159                                                   PPP Operation      160                                                       PPP Components        160                                                       PPP Sessions    162     instructor.indb xii                                                                                                     3/12/14 7:51 AM .                 xii   CCNA Routing and Switching Practice and Study Guide                                       Chapter 9       IOS Images and Licensing              127                                                   Managing IOS System Files         128                                                       IOS Families. Trains. indb xiii                                                                                          3/12/14 7:51 AM .                                                                                                       xiii                                         Configure PPP     165                                        Basic PPP Configuration with Options               165                                        PPP Authentication          167                                           PAP Configuration            168                                           CHAP Configuration             168                                     Troubleshoot WAN Connectivity              168                         Chapter 13   Frame Relay       171                                     Introduction to Frame Relay          172                                        Frame Relay Concepts and Terminology                172                                        Frame Relay Operation            173                                     Configure Frame Relay         176                                        Configure Basic Frame Relay             176                                        Configure Subinterfaces           177                                     Troubleshoot Connectivity           178                         Chapter 14   Network Address Translation for IPv4                   181                                     NAT Operation     181                                        NAT Characteristics         181                                     Configuring NAT        183                                        Configuring Static NAT            183                                        Configuring Dynamic NAT                184                                        Configuring Port Address Translation               185                                        A Word About Port Forwarding                 189                                        Configuring NAT and IPv6              189                                        Troubleshooting NAT             190                         Chapter 15   Broadband Solutions            193                                     Teleworking      194                                        Benefits of Teleworking           194                                        Costs of Teleworking            194                                        Business Requirements for Teleworker Services             194                                     Comparing Broadband Solutions              195                                        Cable    195                                        DSL     197                                        Broadband Wireless          199                                        Selecting Broadband Solutions            200                                     Configuring xDSL Connectivity             200                                        PPPoE Overview            200                                        Configuring PPPoE          201     instructor. indb xiv                                                                                                   3/12/14 7:51 AM .                xiv   CCNA Routing and Switching Practice and Study Guide                                      Chapter 16      Securing Site-to-Site Connectivity                203                                                  VPNs     204                                                     Fundamentals of VPNs          204                                                     Types of VPNs      204                                                  Site-to-Site GRE Tunnels        205                                                     Fundamentals of Generic Routing Encapsulation               205                                                     Configuring GRE Tunnels            206                                                  Introducing IPsec    208                                                     Internet Protocol Security         208                                                     IPsec Framework        208                                                  Remote Access       210                                                     Remote-Access VPN Solutions              210                                                     IPsec Remote-Access VPNs            211                                   Chapter 17      Monitoring the Network            213                                                  Syslog   214                                                     Syslog Operation       214                                                     Configuring Syslog       215                                                  SNMP     215                                                     SNMP Operation         215                                                     Configuring SNMP         218                                                  NetFlow 219                                                     NetFlow Operation        220                                                     Configuring NetFlow          220                                   Chapter 18      Troubleshooting the Network              223                                                  Troubleshooting with a Systematic Approach              224                                                     Network Documentation           224                                                     Troubleshooting Process and Methodologies              227                                                  Network Troubleshooting         230                                                     Troubleshooting Tools        231                                                     Network Troubleshooting and IP Connectivity                232     instructor.  In actual                            configuration examples and output (not general command syntax). The Command Reference describes these conventions as                      follows:                        ■   Boldface indicates commands and keywords that are entered literally as shown.                        ■   Vertical bars (|) separate alternative.                        ■   Square brackets [ ] indicate optional elements.                        ■   Italics indicate arguments for which you supply actual values. boldface indicates                            commands that are manually input by the user (such as a show command).                        ■   Braces { } indicate a required choice.     instructor. mutually exclusive elements.indb xv                                                                                                    3/12/14 7:51 AM .                                                                                                                 xv                          Icons Used in This Book                                                                                     DSU/CSU                         Router               Bridge              Hub                DSU/CSU                            Catalyst            Multilayer           ATM            ISDN/Frame Relay                        Switch               Switch             Switch               Switch                                Communication             Gateway            Access Server                               Server                         Command Syntax Conventions                      The conventions used to present command syntax in this book are the same conventions used                      in the IOS Command Reference.                        ■   Braces within brackets [{ }] indicate a required choice within an optional element. netacad. They are divided into five broad categories:                                     ■   LAN Switching Technologies                                     ■   IP Routing Technologies                                     ■   IP Services                                     ■   Troubleshooting                                     ■   WAN Technologies     instructor.com. Successfully completing                                  this course means that you should be able to configure and troubleshoot routers and switches                                  and resolve common issues with OSPF.indb xvi                                                                                                               3/12/14 7:51 AM . you can buy any or all of CCNA Routing and Switching                                  Companion Guides (CG) and Lab Manuals (LM) of the Academy’s popular online curriculum.                                  Successfully completing this course means that you should be able to configure and trouble-                                  shoot network devices and resolve common WAN issues and implement IPsec and virtual pri-                                  vate network (VPN) operations in a complex network. To learn more about CCNA Routing and                                  Switching courses and to find an Academy near you. if you are not an Academy student but would like to benefit from the extensive                                  authoring done for these courses. and VTP in both IPv4 and IPv6 networks. Passing the CCNA exam means that you have                                  the knowledge and skills required to successfully install. Ideally.                                  CN pulls everything from the first three courses together as the student learns the WAN                                  technologies and network services required by converged applications in a complex network.                                  However. the reader will have completed the first                                  two courses: Introduction to Networks (ITN) and Routing and Switching Essentials (RSE). and troubleshoot a                                  small branch office network.                xvi   CCNA Routing and Switching Practice and Study Guide                                      Introduction                                  The purpose of this book is to provide you with an extra resource for studying the exam top-                                  ics of the Interconnecting Cisco Networking Devices Part 2 (ICND2) exam that leads to Cisco                                  Certified Networking Associate (CCNA) certification. you will                                  have access to the tireless work of an outstanding team of Cisco Academy instructors dedi-                                  cated to providing students with comprehensive and engaging CCNA Routing and Switching                                  preparation course material. You can view the detailed exam topics any time at                                  http://learningnetwork. STP.                                  and operations of routers and switches in a large and complex network. operate. The titles and ISBNs for the first two courses of the CCNA                                  Routing and Switching CGs and LMs are as follows:                                     ■   Scaling Networks Companion Guide (ISBN: 9781587133282)                                     ■   Scaling Networks Lab Manual (ISBN: 9781587133251)                                     ■   Connecting Networks Companion Guide (ISBN: 9781587133329)                                     ■   Connecting Networks Lab Manual (ISBN: 9781587133312)                                     Goals and Methods                                  The most important goal of this book is to help you pass the 200-101 Interconnecting Cisco                                  Networking Devices Part 2 (ICND2) exam.                                  SN continues where RSE left off. visit http://www. EIGRP.com.cisco. taking the student deeper into the architecture. This book maps to the third and fourth                                  Cisco Networking Academy courses in the CCNA Routing and Switching curricula: Scaling                                  Networks (SN) and Connecting Networks (CN).                                  Although you will not have access to the Packet Tracer network simulator software. which is associated with the Cisco Certified                                  Network Associate (CCNA) certification. components.  whereas other Academies recommend the Practice Study Guide as                                        an additional resource to prepare for class exams and the CCNA certification. Many Academies use this Practice Study Guide as a                                        required tool in the course.and university-level                                        networking courses.indb xvii                                                                                                                                 3/12/14 7:51 AM . the Labs are available in the Lab                                        Manuals previously cited. However. Each chapter differs slightly and                                        includes some or all of the following types of practice:                                           ■   Vocabulary-matching exercises                                           ■   Concept question exercises                                           ■   Skill-building activities and scenarios                                           ■   Configuration scenarios                                           ■   Troubleshooting scenarios                                           Audience for This Book                                        This book’s main audience is anyone taking the CCNA Routing and Switching courses of the                                        Cisco Networking Academy curriculum. the Connecting Networks                                        Companion Guide. This                                        book has 18 chapters.                          Video                        Demonstration     instructor. progressing from Chapter 1 to Chapter 18. This book can also be used for college. These refer-                                        ences are provided so that you can. the num-                                        bering is sequential in this book. configurations. However. operations. and the online curriculum is sequential.                                        The secondary audiences for this book include people taking CCNA-related classes from pro-                                        fessional training organizations. A different topology affords you the opportunity to practice your knowl-                                        edge and skills without just simply recording the information you find in the text. and by anyone wanting to gain a detailed understanding of INCD2 routing                                        and switching concepts. complete those activities. However. their names the same as the online course chapters.                                        Most of the configuration chapters use a single topology where appropriate. the topology differs from the one used in the online curriculum and the                                        Companion Guide. you will find references to Packet Tracer and Lab activities. you should work through this                                        Practice and Study Guide in order beginning with Chapter 1.                        Packet Tracer                          Activity                                        Note: Throughout the book.                                        and outputs. at that point. The online cur-                                        riculum starts over at Chapter 1 in the Connecting Networks course.                                           How This Book Is Organized                                        Because the content of the Scaling Networks Companion Guide.                                                                                                                                              xvii                                            This book offers exercises that help you learn the concepts. and troubleshoot-                                        ing skills crucial to your success as a CCNA exam candidate.                                        The book covers the major topic headings in the same sequence as the online curriculum. The Packet Tracer activities                                        are accessible only if you have access to the online curriculum. This allows for                                        better continuity and easier understanding of routing and switching commands.  starts off network                                           design.                                       ■   Chapter 13. verification. “Link Aggregation”: This chapter’s exercises are devoted to the concepts. “IOS Images and Licensing”: This chapter is devoted to the crucial knowl-                                           edge and skills you need to manage IOS images. it is                                           still a viable option in depending on your location. In addition.                                       ■   Chapter 7. and troubleshooting of Frame Relay.                                       ■   Chapter 8. verifica-                                           tion. You will also practice basic router and switch configuration and veri-                                           fication. “Adjust and Troubleshoot Single-Area OSPF”: This chapter focuses on                                           advanced OSPF concepts. this                                           chapter includes exercises covering multiarea OSPF concepts and configuration. and troubleshooting. and still viable. configuration. WAN                                           options is PPP. “EIGRP”: The exercises in this chapter are devoted to the basic concepts and                                           configuration of Cisco’s routing protocol.                                       ■   Chapter 12. EIGRP for IPv4 and IPv6. configuration. and security. The                                           exercises focus on differentiating between all these WAN options. “Hierarchical Network Design”: Part II. opera-                                           tions. “EIGRP Advanced Configurations and Troubleshooting”: This chapter                                           focuses on advanced EIGRP concepts.                                      Part II: Connecting Networks                                       ■   Chapter 10. and troubleshooting.11. you will complete activities focused on WLAN compo-                                           nents. “Wireless LANs”: This chapter is all about wireless connectivity technolo-                                           gies. configuration. and troubleshooting of PPP with PAP and CHAP                                           authentication.                                           configuration. You will complete exercises that focus on various types of wireless and the stan-                                           dards for 802. This chapter includes exercises cover-                                           ing the concepts. Exercises in this chapter focus on the serial interface and then the con-                                           cepts.     instructor. Exercises focus on basic IOS image con-                                           cepts and management tasks. and troubleshooting of EtherChannel. much like Part I. topologies.                                       ■   Chapter 4. verification. “LAN Redundancy”: The exercises in this chapter cover the concepts. configuration. So.                                       ■   Chapter 9. “Point-to-Point Connections”: One of the older.                                       ■   Chapter 5. “Introduction to Scaling Networks”: This chapter provides vocabulary and                                           concept exercises to reinforce your understanding of hierarchical network design and                                           selecting hardware. “Frame Relay”: Although some may consider Frame Relay obsolete. “Multiarea OSPF”: The CCNA exam now includes multiarea OSPF. Exercises focus on the various types of network design models and architec-                                           tures. verification.                                       ■   Chapter 2.                 xviii   CCNA Routing and Switching Practice and Study Guide                                        Part I: Scaling Networks                                       ■   Chapter 1.                                       ■   Chapter 3.                                       ■   Chapter 11.indb xviii                                                                                                                   3/12/14 7:51 AM . verification. configuration. “Connecting to the WAN”: This chapter is a survey of all the various WAN                                           access options and technologies that are available for connecting today’s networks. and troubleshooting. verification.                                       ■   Chapter 6. and verification of all the current varieties of STP.  Practice activities include configuring. The exercises in this chapter cover three popular network monitoring tools: syslog.     instructor.                          ■   Chapter 16. and PAT.com to continue registration. This                              exercises in this chapter help you distinguish between the various broadband offerings                              on the market.                                                                                                                       xix                              ■   Chapter 14. and you then                       gain access to exclusive deals on other resources from Cisco Press. This chapter reviews                              troubleshooting methodologies and the tools and commands you use to troubleshoot                              a network. Becoming a member and registering is free. a link to the supplemental content will be listed on your My                       Registered Books page.indb xix                                                                                                          3/12/14 7:51 AM . you have                              practice troubleshooting skills in relation to specific technologies. Troubleshooting is a key skill to fine-tune now that you are close to taking                              your CCNA exam. This chapter focuses on exercises to reinforce your understanding of NAT                              operation and characteristics. Just about every router con-                              nected to the network uses NAT or forwards traffic to a NAT-enabled device for address                              translation. verifying.                         About the Cisco Press Website for This Book                       Cisco Press provides additional content that can be accessed by registering your individual                       book at the ciscopress. dynamic NAT.                       To register this book. “Network Address Translation for IPv4”: NAT was created to provide a                              temporary solution to the limited address space in IPv4.                          ■   Chapter 17.                              SNMP.asp and enter the                       book’s ISBN located on the back cover of this book. “Securing Site-to-Site Connectivity”: VPNs allow teleworkers and branch                              sites connect to the corporate network regardless of the underlying WAN access option.                              including IPsec and GRE configuration. “Monitoring the Network”: As a network administrator.com/bookstore/register.                       After you register the book.com website.ciscopress. and NetFlow. and trou-                              bleshooting static NAT. go to http://www.                              The exercises in this chapter are devoted to the concepts of the various VPN solutions.                          ■   Chapter 15. You’ll then be prompted to log in or join                       ciscopress. “Broadband Solutions”: Working from home or away from a central office                              has largely been made possible by the advent of broadband technologies and VPNs.                          ■   Chapter 18. you are more likely                              to be managing a network using a variety of tools rather than designing and building                              them. “Troubleshooting the Network”: Throughout your CCNA studies. indb xx   3/12/14 7:51 AM .instructor.  To keep pace with a business’s expansion                     and new emerging technologies.indb 1                                                                                                                3/12/14 7:51 AM . so does its networking requirements. This short chapter sets the stage for the rest of the course. and appropriate device selections                     that you can use to systematically design a highly functional network. A network that scales well is not                     only one that can handle growing traffic demands. the Cisco Enterprise Architecture modules. a network must be designed to scale. This chapter covers the hierarchical                     network design model.     instructor.                                                                                                           CHAPTER 1                                                    Introduction to Scaling Networks                        As a business grows. but also one designed with the inevitable need to                     expand.  IP telephony. To provide this kind of                                 reliability. and video applications for multiple business                                 units. including data files. label the three layers of the hierarchical design model.                                 Failover capability refers to the ability of a device to switch from a nonfunctioning module.                                 Designing a network using the three-layer hierarchical design model helps optimize the net-                                 work.                                   Hierarchical Network Design                                 Users expect enterprise networks to be up 99.                                  Figure 1-1    Hierarchical Design Model                                                                     Hierarchical Design Model                                                                Internet                     Internet     instructor. In Figure 1-1. email.indb 2                                                                                                                  3/12/14 7:51 AM .                2   CCNA Routing and Switching Practice and Study Guide                                     Implementing a Network Design                                 An enterprise network must be designed to support the exchange of various types of network                                 traffic. enterprise class equipment uses redundant power supplies and has failover capabili-                                 ties.                                 Describe what failover capability means for enterprise class equipment. or device to a functioning one with little or no break in service.                                 Why should a network be organized so that traffic stays local and is not propagated unneces-                                 sarily on to other portions of the network?                                 Keeping traffic local optimizes bandwidth.999 percent of the time.                                 service.      instructor. Enterprise Edge. and                     Remote.                     A failure domain is the area of a network that is impacted when a critical device or network                     service experiences problems. the core layer represents a high-speed back-                     bone layer between dispersed networks.indb 3                                                                                                          3/12/14 7:51 AM . Finally. The distribution layer is used to forward                     traffic from one local network to another.                     The Cisco Enterprise Architecture divides the network into functional components while                     still maintaining the core. and access layers. The primary Cisco Enterprise                     Architecture modules include Enterprise Campus. distribution.                     Briefly describe a failure domain.                                                                         Chapter 1: Introduction to Scaling Networks   3                         Figure 1-1a   Hierarchical Design Model (answer)                                                         Hierarchical Design Model                                                    Internet                     Internet                                                                                                          Core Layer                                                                                                    Distribution Layer                                                                                                        Access Layer                         Briefly describe each layer of the hierarchical design model.                     The access layer provides connectivity for the users.                     A well-designed network not only controls traffic but also limits the size of failure domains. Service Provider Edge.                                  Modules                                     1 Campus Core                                     2 Remote Access & VPN                                     3 Building Distribution                                     4 Internet Connectivity                                     5 Building Access                                     6 Server Farm & Data Center                                     7 WAN Site-to-Site VPN                                     8 E-Commerce                                 Figure 1-2    Cisco Enterprise Architecture                                            Enterprise Campus                               Enterprise Edge      Service       Remote                                                                                                             Provider Edge                                                                                                                             Enterprise                                                                                                                              Branch                                                            Campus Infrastructure Module                                                                                                                     ISP A                                                                                                                     ISP B       Enterprise                                                                                                                             Teleworker                                                                                                                    PSTN                                                                                                                               Enterprise                                                                                                                             Data Center                                                                                                               Frame Relay.                                                      Network                                                   Management     instructor.. .. MAN.                4   CCNA Routing and Switching Practice and Study Guide                                     Use the list of modules to label the parts of the Cisco Enterprise Architecture in Figure 1-2.indb 4                                                                                                                         3/12/14 7:51 AM .                                                                                                             ATM. . MAN..                                           Network                                        Management     instructor. .                                                                                                   ATM.                                                                                          Chapter 1: Introduction to Scaling Networks   5                         Figure 1-2a   Cisco Enterprise Architecture (answer)                               Enterprise Campus                               Enterprise Edge         Service           Remote                                                                                                   Provider Edge                                     5                                                                                  Enterprise                                                                                    8                                   Branch                                                   Campus Infrastructure Module                                                                                                       ISP A                                       3                                                                                    4                                                                                                       ISP B          Enterprise                                                                                                                      Teleworker                                    1                                                                                      2                                                                                                       PSTN                                         6                                                                              Enterprise                                                                                                                      Data Center                                                                                     7                                                                                                   Frame Relay.indb 5                                                                                                                           3/12/14 7:51 AM .  Supports new features and devices without                        requiring major equipment upgrades                     b. Link-state routing protocol with a two-layer                        hierarchical design                     d. Cisco proprietary distance vector routing pro. EtherChannel                        failure                     a. Allows for redundant paths by eliminating                                                                               e.        c. EIGRP                        tocol                                                                               d. OSPF                     c. Minimizes the possibility of a single point of         h. This is a one-to-one matching exercise. Scalable Routing Protocol                      e. Spanning Tree Protocol                     h. Wireless LANs                      f. Redundancy                         switching loops                                                                                f. Isolates routing updates and minimizes the             a. Increases flexibility. Technique for aggregating multiple links                        between equipment to increase bandwidth                g.indb 6                                                                                                      3/12/14 7:51 AM . Modular equipment                        size of routing tables                                 b.                6   CCNA Routing and Switching Practice and Study Guide                     Identify Scalability Terminology                 Match the definition on the left with the term on the right. and pro-                        vides mobility to users     instructor. reduces costs.                 Definition                                                 Terms                     g.  Refers to a switch’s ability to support the                                                                                   e.           a. Important consideration in a network where               i. How fast the interfaces will process network                            data                                                   h. Scalability                         e. Within an enterprise network.                      Business Consideration                                    Switch Feature                        a. Ability to adjust to growth of network users                                                                                   g. supported features. Fixed configuration                         i. Frame buffers                            appropriate number of devices on the network                                                                                   f. This is a one-to-one matching                     exercise. Should provide continuous access to the net. Cost                        h. Switches with insertable switching line/port                           cards     instructor. Port density                           other areas of the network                        c. Reliability                           work                                                    b.                                                                                       Chapter 1: Introduction to Scaling Networks   7                         Selecting Network Devices                     When designing a network. Depends on the number and speed of the                            interfaces. Provides electrical current to other device and                           support redundant power supplies                        g. both switches and routers play a critical role in                     network communication. and expansion                            capability                        b.indb 7                                                                                                                        3/12/14 7:51 AM . Power                           throughput                                                                                   d. Stackable                         j. Daisy-chain switches with high-bandwidth                c.                       Selecting Switch Hardware                     Match the business consideration on the left with the switch feature on the right. Switches with preset features or options                         f. it is important to select the proper hardware to meet current network requirements                     and to allow for network growth. Port speed                           there may be congested ports to servers or               j. Modular                        d. 255.1            255.168.16. and branch networks                               X                                     Managing Devices                                 A basic router or switch configuration includes the hostname for identification.0             192. Use the                                 address scheme in Table 1-2 in the following exercises that review the most common router and                                 switch configuration and verification commands.255.255.1.1.                                  Table 1-2     Router and Switch Addressing Table                                  Device     Interface         IPv4 Address          Subnet Mask               Default Gateway                                  R1         G0/0              172.                8   CCNA Routing and Switching Practice and Study Guide                    Packet Tracer    Packet Tracer .1.255.7/SwN 1.10. data center.252           N/A                                  S1         VLAN 1            192.16.168.0             N/A                                             S0/0/0            172. passwords for                                 security.1            255.255.5           255.indb 8                                                                                                                  3/12/14 7:51 AM . A router configuration                                 also includes basic routing.5)                  Activity                                  Selecting Router Hardware                                 In Table 1-1. select the router category that applies to each description.1.252           N/A                                             S0/0/1            192.                                  Table 1-1     Identify Router Category Features                                  Router Description                                             Branch       Network   Service                                                                                                 Routers       Edge     Provider                                                                                                              Routers   Routers                                  Fast performance with high security for data centers.Comparing 2960 and 3560 Switches (SN 1.1     instructor.255. and branch networks                                  Simple network configuration and management for LANs              X                                  and WANs                                  Optimizes services on a single platform                           X                                  End-to-end delivery of subscriber services                                                 X                                  Deliver next-generation Internet experiences across all                                    X                                  devices and locations                                  High capacity and scalability with hierarchical quality of                    X                                  service                                  Maximizes local services and ensures 24/7/365 uptime              X                                  Unites campus.255.168. and assignment of IP addresses to interfaces for connectivity.                                 In addition to configuration commands. router and switch verification commands are used to                                 verify the operational status of the router or switch and related network functionality.2.2.3.5          255.1.                         X                                  campus.255.                         ■   Privileged EXEC password is class.0.255.                        ■   Save the configuration.3 area 0                     R1(config-router)# do copy run start     instructor.0.255.16.                      Router(config)# hostname R1                     R1(config)# enable secret class                     R1(config)# line con 0                     R1(config-line)# password cisco                     R1(config-line)# login                     R1(config-line)# line vty 0 15                     R1(config-line)# password cisco                     R1(config-line)# login                     R1(config-line)# service password-encryption                     R1(config)# banner motd $ Authorized Access Only! $                     R1(config)# interface GigabitEthernet0/0                     R1(config-if)# ip address 172.168.0                     R1(config-if)# no shutdown                     R1(config-if)# interface Serial0/0/0                     R1(config-if)# ip address 172.255.1 255.3.0 0.255.                        ■   Interface addressing.168.                        ■   OSPF routing.1 255.3.255 area 0                     R1(config-router)# network 172.0. to implement a basic router configuration:                        ■   Hostname is R1.10.0.                        ■   Console and Telnet line’s password is cisco.                                                                          Chapter 1: Introduction to Scaling Networks   9                         Basic Router Configuration Review                     Using Table 1-2 and the following requirements. including the router                     prompt.3 area 0                     R1(config-router)# network 192.1.0 0.                        ■   Banner message-of-the-day.10.1.4 0.16.255.1                     R1(config-router)# network 172.16.1.5 255. including an appropriate router ID.255.0.16. record the commands.1.indb 9                                                                                                           3/12/14 7:51 AM .252                     R1(config-if)# no shutdown                     R1(config-if)# interface Serial0/0/1                     R1(config-if)# ip address 192.252                     R1(config-if)# no shutdown                     R1(config-if)# router ospf 10                     R1(config-router)# router-id 1.0.                 10   CCNA Routing and Switching Practice and Study Guide                                     Basic Router Verification Review                                 In Table 1-3.0                                 S1(config-if)# no shutdown                                 S1(config-if)# ip default-gateway 192. including status. record the verification command that will generate the described output. record the commands.                                    ■   Save the configuration.255.                                  Switch(config)# hostname S1                                 S1(config)# enable secret class                                 S1(config)# line con 0                                 S1(config-line)# password cisco                                 S1(config-line)# login                                 S1(config-line)# line vty 0 15                                 S1(config-line)# password cisco                                 S1(config-line)# login                                 S1(config-line)# service password-encryption                                 S1(config)# banner motd $ Authorized Access Only! $                                 S1(config)# interface vlan 1                                 S1(config-if)# ip address 192. and local interface that learned of neighbor                                  show interfaces              Displays one or all interfaces.1.168. router ID. bandwidth.                                    ■   Console and Telnet line’s password is cisco. and                                                               duplex type                                    Basic Switch Configuration Review                                 Using Table 1-2 and the following requirements.                                                               IP address. including router ID.1                                 S1(config-if)# do copy run start     instructor. including the switch                                 prompt. and outbound interface                                  show ip protocols            Displays information about routing protocols. to implement a basic switch configuration:                                    ■   Hostname is S1. including admin-                                                               istrative distance.1. and neighbors                                  show cdp neighbors           Displays information about directly connected Cisco devices                                  show ip interface brief      Displays all interfaces in an abbreviated format.                                    ■   Privileged EXEC password is class.255. state.indb 10                                                                                                                3/12/14 7:51 AM . including process                                                               ID.5 255.168.                                  Table 1-3     Router Verification Commands                                  Command                      Command Output                                  show ip route                Displays the routing table for known networks. metric.                                    ■   VLAN 1 interface addressing.                                    ■   Banner message-of-the-day. including IP                                                               address and status                                  show ip ospf neighbor        Displays information about neighbors.                                        Table 1-4    Router Verification Commands                                      Command                           Command Output                                      show cdp neighbors                Displays information about directly connected Cisco                                                                        devices                                      show port-security address        Displays all secure MAC addresses                                      show mac-address-table            Displays a table of learned MAC addresses. record the verification command that will generate the described output.                                                                                      Chapter 1: Introduction to Scaling Networks     11                                          Basic Switch Verification Review                                      In Table 1-4. and                                                                        action to be taken                         Packet Tracer                                      Packet Tracer . including the                                                                        port number and VLAN assigned to the port                                      show interfaces                   Displays one or all interfaces. including status. bandwidth. security violation count.indb 11                                                                                                                         3/12/14 7:51 AM .3.2)                        Challenge     instructor.                                                                        and duplex type                                      show port-security                Displays information about maximum MAC addresses                                                                        allowed.Skills Integration Challenge (SN 1. current counts.1. indb 12   3/12/14 7:51 AM .instructor.  another link needs to quickly take its place without introducing any traffic                      loops.indb 13                                                                                                               3/12/14 7:51 AM . In addition. IT administrators have to implement redundancy in their hierarchical networks.                                                                                                           CHAPTER 2                                                                                        LAN Redundancy                         Computer networks are inextricably linked to productivity in today’s small and medium-sized business-                      es. Consequently. When                      a switch connection is lost. This chapter investigates how Spanning Tree Protocol (STP) logically blocks physical loops in the                      network and how STP has evolved into a robust protocol that rapidly calculates which ports should be                      blocked in a VLAN-based network. the chapter briefly explores how Layer 3 redundancy is                      implemented through First Hop Redundancy Protocols (FHRPs).     instructor.  draw redundant links between the access. such as a failed network cable or switch. STP was developed to address                                 the issue of loops in a redundant Layer 2 design. Each distribution layer switch should have two links to the                                 core layer with each link connecting to a different core layer switch.                14   CCNA Routing and Switching Practice and Study Guide                                     Spanning-Tree Concepts                                 Redundancy increases the availability of a network topology by protecting the network from a                                 single point of failure.indb 14                                                                                                                 3/12/14 7:51 AM . and core switches. Each                                 access switch should have two links to the distribution layer with each link connecting to a                                 different distribution layer switch.                                  Figure 2-1     Redundant Topology                                                           C1                                     C2                       Core                                                                                                                       Distribution                                                 D1              D2                     D3             D4                                                                                                                           Access                                           S1           S2            S3           S4           S5            S6                                              PC1          PC2            PC3         PC4          PC5           PC6                                     Figure 2-1a      Redundant Topology (answer)                                                           C1                                     C2                       Core                                                                                                                       Distribution                                                 D1              D2                     D3             D4                                                                                                                           Access                                           S1           S2            S3           S4           S5            S6                                              PC1          PC2            PC3         PC4          PC5           PC6     instructor. distribution.                                   Draw a Redundant Topology                                 In Figure 2-1.  This switch                                      automatically becomes the root bridge.                                      The lowest BID value determines which switch is root. A switch port is considered                                      blocked when network traffic is prevented from entering or leaving that port. which is documented in IEEE 802.     instructor.Examining a Redundant Design (SN 2.5)                        Activity                                       Spanning-Tree Operation                                      Because Rapid Spanning Tree Protocol (RSTP). the STA calculates the shortest path to the root                                      bridge. Each BPDU contains a BID that identifies the switch that sent the BPDU.                                      supersedes the original STP documented in IEEE 802.                       Packet Tracer                                      Packet Tracer . The STA designates a single switch as the root                                      bridge and uses it as the reference point for all subsequent calculations. each switch may flood broad-                                             casts endlessly.                                      STP ensures that there is only one logical path between all destinations on the network by                                      intentionally blocking redundant paths that could cause a loop.                                      Specifically.1. Multiple copies of the same frame can cause unrecoverable errors. all references to STP assume                                      RSTP unless otherwise indicated.                                      STP uses the spanning-tree algorithm (STA) to determine which switch ports on a network need                                      to be blocking to prevent loops from occurring. Describe each of                                      the following issues:                                         ■   MAC database instability: Instability in the content of the MAC address table results                                             from copies of the same frame being received on different ports of the switch.1D-1998.5/SwN 4.                                         ■   Broadcast storms: Without some loop-avoidance process.1.                                                                                                     Chapter 2: LAN Redundancy     15                                          Purpose of Spanning Tree                                      STP prevents specific types of issues in a redundant topology like the one in Figure 2-1. STA chooses the path with the lowest                                      path cost.1.                                         ■   Multiple frame transmission: Multiple copies of unicast frames may be delivered to des-                                             tination stations.                                      You should be prepared to use a topology like Figure 2-1 to explain exactly how these three                                      issues would occur if STP was not implemented.1D-2004. This situation is commonly called a broadcast storm.                                      A bridge protocol data unit (BPDU) is a frame containing STP information exchanged by                                      switches running STP. Switches participat-                                      ing in STP determine which switch has the lowest bridge ID (BID) on the network. If there is more than one path to choose from.1. Many protocols expect to receive only a single copy of each transmis-                                             sion.                                      After the root bridge has been determined.indb 15                                                                                                                      3/12/14 7:51 AM . three potential issues would occur if STP was not implemented. Data for-                                             warding can be impaired when the switch consumes the resources that are coping with                                             instability in the MAC address table.  The port roles describe their relation in the network to                                 the root bridge and whether they are allowed to forward traffic:                                    ■   Root ports: Switch ports closest to the root bridge                                    ■   Designated ports: Nonroot ports that are still permitted to forward traffic on the                                        network                                    ■   Alternate and backup ports: Ports in a blocking state to prevent loops                                    ■   Disabled port: Ports that are administratively shut down                                 After a switch boots. it configures                                 the switch ports into distinct port roles. enter the spanning-tree cost value command in                                 interface configuration mode.                                 Record the commands.                                 To configure the port cost of an interface.                                 How would a switch determine that another switch is now the root bridge?                                 If the root ID in the BPDU received from another switch is lower than the root ID on the                                 receiving switch.                                  Table 2-1     Port Costs                                  Link Speed                         Cost (Revised IEEE                 Cost (Previous IEEE                                                                     Specification)                     Specification)                                  10 Gbps                            2                                  1                                  1 Gbps                             4                                  1                                  100 Mbps                           19                                 10                                  10 Mbps                            100                                100                                   Although switch ports have a default port cost associated with them. the receiving switch updates its cached root ID information to that of the                                 sending switch.indb 16                                                                                                                    3/12/14 7:51 AM . as shown here:                                  S2# show spanning-tree                                     VLAN0001                                   Spanning tree enabled protocol ieee     instructor. The range value can be between 1 and 200. to configure the port cost for F0/1 as 15:                                 S2(config)# interface f0/1                                 S2(config-if)# spanning-tree cost 15                                  To verify the port and path cost to the root bridge. the port cost is configu-                                 rable.                16   CCNA Routing and Switching Practice and Study Guide                                     When the STA has determined the “best” paths emanating from the root bridge. each switch identifies itself as the root bridge after boot. enter the show spanning-tree privileged                                 EXEC mode command. Initially. it sends BPDU frames containing the switch BID and the root ID every                                 2 seconds.000.                                 How does the STA determine path cost?                                 The path information is determined by summing up the individual egress port costs along the                                 path from the respective switch to the root bridge.000. including the switch prompt.                                 Record the default port costs for various link speeds in Table 2-1.  the bridge priority is a customizable value that you can use to influence                      which switch becomes the root bridge.---.Nbr Type                      ------------------.--------.                      Cisco enhanced its implementation of STP to include support for the extended system ID field. the switch with the lowest MAC address has the lower BID. they provide good exercise topologies for you to practice determining the                      STP port roles.                      which contains the ID of the VLAN with which the BPDU is associated.3      P2p                      Fa0/4                   Desg LIS 19            128.ef00                                     Cost           15                                     Port           1 (FastEthernet0/1)                                     Hello Time      2 sec     Max Age 20 sec    Forward Delay 15 sec                          Bridge ID    Priority       32769    (priority 32768 sys-id-ext 1)                                     Address        c07b.2      P2p                      Fa0/3                   Desg LIS 19            128.                      Of these three fields.indb 17                                                                                                       3/12/14 7:51 AM . use the priority values and MAC addresses to                      determine the root bridge.6      P2p<output omitted>                         The BID field of a BPDU frame contains three separate fields: bridge priority.--------------------------------                      Fa0/1                   Root FWD 15            128.                      Because using the extended system ID changes the number of bits available for the bridge pri-                      ority.-------. Then label the ports with one of the following:                         ■    RP: Root Port                         ■    DP: Designated Port                         ■    AP: Alternate Port     instructor.1D Port Roles                      The topologies in the next three figures do not necessarily represent an appropriate network                      design. The default value for this field is 32768. In Figures 2-2 through 2-4. However.1      P2p                      Fa0/2                   Altn BLK 19            128. the customizable values can only be multiples of 4096.                        Identify the 802. extended system                      ID.                                                                                        Chapter 2: LAN Redundancy   17                            Root ID      Priority       32769                                     Address        c025. and MAC address.5cd7.4      P2p                      Fa0/6                   Desg FWD 19            128.                      When two switches are configured with the same priority and have the same extended system                      ID.bcc4.--.a980                                     Hello Time      2 sec     Max Age 20 sec    Forward Delay 15 sec                                     Aging Time     15   sec                        Interface               Role Sts Cost          Prio. Scenario 1 (answer)                                                           G1/1                                               Root                                                                                                      G1/1                                                     S1          RP                              DP          S2                                                 F0/1                                                             F0/1                                                                                                      G1/2                                                    DP                                           DP           DP                                                      AP                                                        RP                                                          G1/2     RP                                                 F0/1                                                             F0/1                                                     S3                                                       S4                                                                  Device   Priority   MAC Address                                                                  S1      32769      000a:0001:1111                                                                  S2      24577      000a:0002:2222                                                                  S3      32769      000a:0003:3333                                                                  S4      32769      000a:0004:4444                                    Figure 2-3    802.1D Port Roles .1D Port Roles .Scenario 1                                                           G1/1                                                                                                      G1/1                                                     S1                                                      S2                                                 F0/1                                                             F0/1                                                                                                      G1/2                                                              G1/2                                                 F0/1                                                             F0/1                                                     S3                                                       S4                                                                  Device   Priority   MAC Address                                                                  S1      32769      000a:0001:1111                                                                  S2      24577      000a:0002:2222                                                                  S3      32769      000a:0003:3333                                                                  S4      32769      000a:0004:4444                                    Figure 2-2a   802.Scenario 2                                                           G1/1                                                                                                      G1/1                                                     S1                                                      S2                                                 F0/1                                                             F0/1                                                                                                      G1/2                                                              G1/2                                                 F0/1                                                             F0/1                                                     S3                                                       S4                                                                  Device   Priority   MAC Address                                                                  S1      24577      000a:0001:1111                                                                  S2      32769      000a:0002:2222                                                                  S3      32769      000a:0003:3333                                                                  S4      32769      000a:0004:4444     instructor.                18   CCNA Routing and Switching Practice and Study Guide                                     Figure 2-2    802.1D Port Roles .indb 18                                                                                                      3/12/14 7:51 AM . 1D Port Roles .                                                                                       Chapter 2: LAN Redundancy   19                          Figure 2-3a   802.Scenario 3                                                 G1/1                                                                                            G1/1                                          S1                                                       S2                                      F0/1                                                              F0/1                                                                                            G1/2                                                    G1/2                                      F0/1                                                              F0/1                                          S3                                                        S4                                                        Device   Priority   MAC Address                                                        S1      32769      000a:0001:1111                                                        S2      32769      000a:0002:2222                                                        S3      24577      000a:0003:3333                                                        S4      32769      000a:0004:4444                         Figure 2-4a   802.1D Port Roles .1D Port Roles .Scenario 3 (answer)                                                 G1/1                                                                                            G1/1                                          S1           DP                              AP          S2                                      F0/1                                                              F0/1                                                                                            G1/2                                         RP                                            RP           DP                                           DP                                                         RP                                                G1/2     DP                                      F0/1                                                              F0/1                                          S3                                                        S4                                        Root                                                       Device   Priority   MAC Address                                                        S1      32769      000a:0001:1111                                                        S2      32769      000a:0002:2222                                                        S3      24577      000a:0003:3333                                                        S4      32769      000a:0004:4444     instructor.Scenario 2 (answer)                                          Root                                                G1/1                                                                                            G1/1                                          S1           DP                              RP          S2                                      F0/1                                                              F0/1                                                                                            G1/2                                         DP                                            DP           DP                                           RP                                                         RP                                                G1/2     AP                                      F0/1                                                              F0/1                                          S3                                                        S4                                                        Device   Priority   MAC Address                                                        S1      24577      000a:0001:1111                                                        S2      32769      000a:0002:2222                                                        S3      32769      000a:0003:3333                                                        S4      32769      000a:0004:4444                         Figure 2-4    802.indb 19                                                                                                      3/12/14 7:51 AM . 1.                                   Comparing the STP Varieties                                 Identify each of the STP varieties described in the following list:                                    ■   Multiple Spanning Tree Protocol (MSTP): This is an IEEE that maps multiple VLANs                                        into the same spanning tree instance.1D              Low                    Slow             All VLANs                                  PVST+             Cisco               High                   Slow             Per VLAN                                  RSTP              802.                                    ■   Rapid PVST+: This is a Cisco enhancement that provides a separate instance of 802.Exercise 1                                  Protocol          Standard            Resources Needed       Convergence      Tree Calculation                                  STP               802.                                  Table 2-2     STP Characteristics .                                    ■   PVST+: This is a Cisco enhancement of STP that provides a separate 802.1w              Medium                 Fast             All VLANs                                  Rapid PVST+       Cisco               Very high              Fast             Per VLAN                                  MSTP              802.     instructor. A network administrator should know which type to implement based on the equip-                                 ment and topology needs.10)                                    Varieties of Spanning Tree Protocols                                 STP has been improved multiple times since its introduction in the original IEEE 802.1D version (802.                                 Complete the cells in Table 2-2 to identify each the characteristics of each STP variety.                                    ■   Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1.                                    ■   STP: This is the original IEEE 802.indb 20                                                                                                                3/12/14 7:51 AM .10/SwN 4.2.1D speci-                                 fication.                20   CCNA Routing and Switching Practice and Study Guide                                     Lab – Building a Switched Network with Redundant Links (SN 2. Some                                 characteristics apply to more than one STP variety.1D-2004: This is an updated version of the STP standard. Cisco       Medium or high         Fast             Per instance                                   In Table 2-3. incorporating IEEE                                        802.1w                                        per VLAN.                                    ■   802.1w: This is an evolution of STP that                                        provides faster convergence than STP.1D spanning                                        tree instance for each VLAN configured in the network.1w. indicate which varieties of STP are best described by the characteristic.1D-1998 and earlier) that provides a                                        loop-free topology in a network with redundant links.2.1s.                          ■   Listening: STP has determined that the port can be selected as a root port or designated                             port based upon the information in the BPDU frames it has received so far. At this point.                      There is only 1 root bridge and 1 tree.1D spanning-tree                 X                      instance for the entire bridged network.                             the switch port is not only receiving BPDU frames.                      First version of STP to address conver. but still provided only one                      STP instance. BPDU                       X                  X                      filter.                          PVST+ Operation                      After a switch boots.indb 21                                                                                                          3/12/14 7:51 AM . Provides a                      X                      separate 802. Briefly describe each                      state:                         ■   Blocking: The port is an alternate port and does not participate in frame forwarding.                      Maps multiple VLANs that have the                                                     X                      same traffic flow requirements into the                      same spanning-tree instance. The                             port continues to process received BPDU frames to determine the location and root ID                             of the root bridge and what port role the switch port should assume in the final active                             STP topology.          X                 X                      Uses 1 IEEE 802.                      Has the highest CPU and memory                                               X                      requirements.Exercise 2                      Characteristic                                  STP    PVST+     RSTP     Rapid     MSTP     MST                                                                                                PVST+                      A Cisco implementation of 802.                      regardless of the number of VLANs.                        X                  X                X                      Cisco enhancement of STP.     instructor. The port returns to blocking state if it is determined that the port                             does not provide the lowest cost path to the root bridge. the spanning tree is immediately determined as ports transition through                      five possible states and three BPDU timers on the way to convergence.1s that                                                         X                      provides up to 16 instances of RSTP.                      An evolution of STP that provides faster                           X                      STP convergence.                           X                      gence issues.                      Supports PortFast.            X                 X                      Cisco proprietary versions of STP. and loop guard.                      Can lead to suboptimal traffic flows. root guard. BPDU guard. it is also transmitting its own BPDU                             frames and informing adjacent switches that the switch port is preparing to participate                             in the active topology.                                                                                       Chapter 2: LAN Redundancy       21                          Table 2-3     STP Characteristics .                      Cisco enhancement of RSTP.1D spanning-tree instance                      for each VLAN.                                                   X                      The default STP mode for Cisco Catalyst                   X                      switches.  every active port in the switched network is either in the forwarding state or the                                 blocking state. The root port is the lowest-cost path from the nonroot bridge to the                                             root bridge.                                  Table 2-4      Operations Allowed at Each Port State                                  Operation Allowed                  Port State                                                                     Blocking     Listening   Learning    Forwarding    Disabled                                  Can receive and process BPDUs      Yes          Yes         Yes         Yes           No                                  Can forward data frames            No           No          No          Yes           No                                  received on interface                                  Can forward data frames         No              No          No          Yes           No                                  switched from another interface                                  Can learn MAC addresses            No           No          Yes         Yes           No                                     Rapid PVST+ Operation                                 RSTP (IEEE 802.                                 Step 1.                                 Once stable. The switch port is administratively disabled.1w) is an evolution of the original 802.                                 Step 4.                                 Step 3.1D-2004 standard. What is the primary difference between Rapid PVST+ and RSTP?                                 With Rapid PVST+.                                 RSTP identifies those ports that can be considered edge ports that are directly connected to                                 an end device. Rapid PVST+ is the Cisco implementation of RSTP on a per-                                 VLAN basis.                                    ■   Forwarding: The port is considered part of the active topology and forwards frames and                                        also sends and receives BPDU frames.                                 List and briefly describe the four steps PVST+ performs for each VLAN to provide a loop-free                                 logical topology.                                    ■   Disabled: The Layer 2 port does not participate in spanning tree and does not forward                                        or process frames.     instructor. Because edge ports are not connected to another switch.     Selects the designated port on each segment: The designated port is selected on the                                             switch that has the lowest-cost path to the root bridge. to logically break the loop topology.1D standard and is incorporated into                                 the IEEE 802.                22   CCNA Routing and Switching Practice and Study Guide                                        ■   Learning: The port prepares to participate in frame forwarding and begins to populate                                        the MAC address table.     Elects one root bridge: The root bridge is the switch with the lowest bridge ID.                                 Briefly describe the RSTP concept that corresponds to the PVST+ PortFast feature.                                 Step 2.                                 In Table 2-4. an independent instance of RSTP runs for each VLAN.     The remaining ports in the switched network are alternate ports: Alternate ports                                             normally remain in the blocking state.     Selects the root port on each nonroot bridge: STP establishes one root port on each                                             nonroot bridge.indb 22                                                                                                                 3/12/14 7:51 AM . answer the “Operation Allowed” question with “yes” or “no” for each port state. they can immediately                                 transition to the forwarding state.                       The root bridge is determined by the lowest BID + VLAN ID                                   X                      + MAC. backup. edge.                      Sends a BPDU “hello message” every 2 seconds. alternate.indb 23                                                                                                        3/12/14 7:51 AM . or both.                                               X                          Spanning-Tree Configuration                      It is crucial to understand the impact of a default switch configuration on STP convergence and                      what configurations can be applied to adjust the default behavior. indicate whether the characteristic describes PVST+.                        PVST+ and Rapid PVST+ Configuration                      Complete Table 2-6 to show the default spanning-tree configuration for a Cisco Catalyst 2960                      series switch.                         X                      CPU processing and trunk bandwidth usage is greater than                                    X                      with STP.            X                      Possible to have load sharing with some VLANS forwarding                                    X                      on each trunk.                                                                 X                      Port roles: root.                       Table 2-5      Comparing PVST+ and Rapid PVST+                      Characteristic                                                  PVST+    Rapid PVST+       Both                      Cisco proprietary protocol.1D STP instance for each VLAN.                                                                                     Chapter 2: LAN Redundancy       23                          What command implements Cisco’s version of an edge port?                      spanning-tree portfast                      In Table 2-5.                       Table 2-6      Default Switch Configuration                      Feature                                   Default Setting                      Enable state                              Enabled on VLAN 1                      Spanning-tree mode                        PVST+                      Switch priority                           32768                      Spanning-tree port priority               128                      (configurable on a per-interface basis)                      Spanning-tree port cost                   1000 Mbps: 4                      (configurable on a per-interface basis)                                                                100 Mbps: 19                                                                10 Mbps: 100                      Spanning-tree VLAN port priority          128                      (configurable on a per-VLAN basis)     instructor. Rapid PVST+.                      Ports can transition to forwarding state without relying on a                  X                      timer.                      Runs a separate IEEE 802. designated.                                  The BPDU guard feature protects the spanning tree from recalculations that might occur if a                                 BPDU is received on an edge port because it connected to a switch.--.3333                                               This bridge is the root                                               Hello Time    2 sec     Max Age 20 sec   Forward Delay 15 sec                                     Bridge ID   Priority     24577    (priority 24576 sys-id-ext 1)                                               Address      0019. Use the value 4096 when necessary:                                 S1(config)# spanning-tree vlan 1 root primary                                 !or                                 S1(config)# spanning-tree vlan 1 priority 4096                                  Record the command to verify that the local switch is now root:                                 S1# show spanning-tree                                   VLAN0001                                   Spanning tree enabled protocol ieee                                   Root ID     Priority     24577                                               Address      000A.b000                                               Hello Time    2 sec     Max Age 20 sec   Forward Delay 15 sec                                               Aging Time 300                                   Interface         Role Sts Cost          Prio.0033.aa9e.---.     instructor.--------------------------------                                 Fa0/1             Desg FWD 4            128.Nbr Type                                 ---------------.-------.--------.                24   CCNA Routing and Switching Practice and Study Guide                                      Feature                                   Default Setting                                  Spanning-tree VLAN port cost              1000 Mbps: 4                                  (configurable on a per-VLAN basis)                                                                            100 Mbps: 19                                                                            10 Mbps: 100                                  Spanning-tree timers                      Hello time: 2 seconds                                                                            Forward-delay time: 15 seconds                                                                            Maximum-aging time: 20 seconds                                                                            Transmit hold count: 6 BPDUs                                   Document the two different configuration commands that you can use to configure the bridge                                 priority value so that the switch is root for VLAN 1.2    Shr                                   Explain the purpose of the BPDU guard feature on Cisco switches.1    Shr                                 Fa0/2             Desg FWD 4            128.indb 24                                                                                                            3/12/14 7:51 AM .  showing only two distribution layer switch-                      es and one access layer switch. D1 should be the primary root for VLAN 1                      and VLAN 15 and the secondary root for VLAN 25. By default.                      Figure 2-5 represents a small section of Figure 2-1. and PC2 is assigned to VLAN 25.                      D1 commands                      D1(config)# spanning-tree vlan 1 root primary                      D1(config)# spanning-tree vlan 15 root primary                      D1(config)# spanning-tree vlan 25 root secondary                       D2 commands                      D2(config)# spanning-tree vlan 15 root secondary                      D2(config)# spanning-tree vlan 25 root primary     instructor.                       Figure 2-5    PVST+ Configuration Topology                                                Root for VLAN 15                 Root for VLAN 25                                                    D1                               D2                                                                        S1                                                                PC1           PC2                                                            VLAN 15        VLAN 25                         Based on these requirements.                                                                                        Chapter 2: LAN Redundancy    25                          What command interface configuration command enables BPDU guard?                      spanning-tree bpduguard enable                      What global configuration command will configure all nontrunking ports as edge ports?                      spanning-tree portfast default                      What global configuration command will configure BPDU guard on all PortFast-enabled                      ports?                      spanning-tree portfast bpduguard default                      The power of PVST+ is that it can load balance across redundant links. PC1 is assigned                      to VLAN 15. D2 should be the primary root for VLAN                      25 and the secondary root for VLAN 15. you must manually configure PVST+ to use the link.indb 25                                                                                                        3/12/14 7:51 AM . we have attached PC2 to S1. document the commands to modify the default PVST+ operation                      on D1 and D2. the least-                      favored redundant link is not used. So. For this example. Configuring Rapid PVST+. Through the use of a virtual IP address.3/SwN 4. a                                 high-availability network might also implement Layer 3 redundancy by sharing the default                                 gateway responsibility across multiple devices.2)                  Activity                                    First Hop Redundancy Protocols                                 Up to this point.                                 S1(config)# spanning-tree portfast default                                 S1(config)# spanning-tree portfast bpduguard default                                  Now.2.3.3. PortFast. In addition to Layer 1 and Layer 2 redundancy.1. The section reviews First Hop                                 Redundancy Protocols (FHRPs) that provide Layer 3 redundancy.1.indb 26                                                                                                              3/12/14 7:51 AM . and BPDU Guard (SN 2.2/SwN 4.3.5/SwN 4.     instructor.3.                26   CCNA Routing and Switching Practice and Study Guide                                     Document the commands to configure all nontrunking ports on S1 as edge ports with BPDU                                 guard enabled.Configuring Rapid PVST+ (SN 2. What command is                                 required?                                 spanning-tree mode rapid-pvst                                  Lab . we’ve been reviewing STP and how to manipulate the election of root bridges                                 and load balance across redundant links.3.2.2. assume that you want to run rapid PVST+ on all three switches.3.Configuring PVST+ (SN 2.3)                                  Packet Tracer .5)                Packet Tracer                  Activity                 Packet Tracer                                 Packet Tracer . two                                 Layer 3 devices can share the default gateway responsibility.2.  The Layer 2 address returned by ARP for an                            FHRP gateway     instructor. Two or more routers sharing a single MAC and                                                                                    d. Forwarding router                         h. A device that is part of a virtual router group                            assigned to the role of default gateway                  f. A Layer 3 address assigned to a protocol                             that shares the single address among multiple                             devices                         g. A device that is part of a virtual router group                            assigned the role of alternate default gateway                          f. First-hop redundancy                            way                                                                                    c. Default gateway                            failure of a device acting as the default gate. This is a one-to-one matching exercise. Virtual router                            traffic                         a.                                                                                                       Chapter 2: LAN Redundancy   27                          Identify FHRP Terminology                      Match the definition on the left with the terms on the right.                      Definitions                                               Terms                         b. Virtual MAC address                            router should take the active role in forwarding        h.        b.indb 27                                                                                                                      3/12/14 7:51 AM . A device that routes traffic destined to net-                            work segments beyond the source network                            segment                         e. Provides the mechanism for determining which            g. Virtual IP address                          d. The ability to dynamically recover from the             a. Redundancy rrotocol                            IP address                                                                                    e. Standby router                         c.  indicate whether the characteristic describes HSRP.168.1                                   standby 20 priority 120                                  <output omitted>     instructor.       X                                  by device.168.                                  A nonproprietary election protocol that allows several routers on a                   X                                  multi-access link to use the same virtual IPv4 address.1                 192.168.168.                                  One router is elected as the virtual router master.168. or GLBP. priority 120.168.                                 IP address 192.1.20.                                  Cisco-proprietary FHRP protocol that protects data traffic from a                            X                                  failed router or circuit while also allowing load sharing between a                                  group of redundant routers.1.                28   CCNA Routing and Switching Practice and Study Guide                                     Identify the Type of FHRP                                 In Table 2-7.255. and virtual IP address 192.                                  Table 2-7     FHRP Characteristics                                  FHRP Characteristic                                                        HSRP      VRRP   GLBP                                  Used in a group of routers for selecting an active device and a stand.                                  Figure 2-6    HSRP and GLBP Configuration Topology                                                                                   Core                                                          R2                   Virtual IP                      R1                                                   192.                                     HSRP and GLBP Configuration and Verification                                 Refer to the topology in Figure 2-6.1.20 255.10                                     Example 2-1 shows the HSRP configuration for R2.0                                   standby 20 ip 192.             X                                  ers acting as backups in case the virtual router master fails.1.1.1.255. with the other rout.indb 28                                                                                                                  3/12/14 7:51 AM . VRRP. R2 has been configured for HSRP group 20.                                  Example 2-1      R2 HSRP Configuration                                   R2# show run interface g0/1                                  <output omitted>                                  interface GigabitEthernet0/1                                   ip address 192.1.1.                                  Cisco-proprietary FHRP protocol designed to allow for transparent             X                                  failover of a first-hop IPv4 devices.168.20             192. 1.                                                 |                      Interface     Grp    Pri P State        Active       Standby         Virtual IP                      Gi0/1         20     210       Active   local        192.1.255.1.1.255.1                      R1(config-if)#standby 20 priority 210                        What command would generate the following output to verify the HSRP configuration?                       R1# show standby brief                                                 P indicates configured to preempt.255.1                        Now assume that all HSRP configurations have been removed.168.255.0                      R1(config-if)# no shutdown                      R1(config-if)# glbp 20 ip 192.1                      R1(config-if)# glbp 20 priority 210                        What command would generate the following output to verify the GLBP configuration?                       R1# show glbp                      GigabitEthernet0/0 .                       Example 2-2         R2 GLBP Configuration                        R2# show run interface g0/1                       <output omitted>                       interface GigabitEthernet0/1                        ip address 192.168.1.1.                                                                                     Chapter 2: LAN Redundancy   29                          Using the information in Example 2-1.168. document the commands to configure R1 to be in GLBP                      group 20 using a priority of 210.168. priority 120.20    192. last state change 00:03:05                        Virtual IP address is 192.168.Group 20                        State is Active                          1 state change.168.1.1     instructor. and virtual IP address 192.20.indb 29                                                                                                    3/12/14 7:51 AM .10 255.1.20 255.168.1.168.0                      R1(config-if)# no shutdown                      R1(config-if)#standby 20 ip 192.0                        glbp 20 ip 192.168. document the commands to configure R1 as the HSRP                      active router in group 20 using a priority of 210.168.168.1.                       R1(config)# interface GigabitEthernet0/1                      R1(config-if)# ip address 192. R2 has been configured for                      GLBP group 20.1.                      Example 2-2 shows the GLBP configuration for R2.1.255.                       R1(config)# interface GigabitEthernet0/1                      R1(config-if)# ip address 192.255. IP address 192.1                        glbp 20 priority 120                       <output omitted>                          Using the information in Example 2-2.10 255.                 30   CCNA Routing and Switching Practice and Study Guide                                      Hello time 3 sec.20 (primary).20)                                   There are 2 forwarders (1 active)                                   Forwarder 1                                     State is Active                                       1 state change.f671.792 secs                                   Redirect time 600 sec.f671. weighting 100 (expires in 9. weighting 100                                   Forwarder 2                                     State is Listen                                     MAC address is 0007.db58                                     Redirection enabled                                     Preemption enabled. min delay 30 sec                                     Active is 192.eb38 (192.eb38                                     Redirection enabled.b400. priority 120 (expires in 9.4. thresholds: lower 1.168.040 sec (maximum 14400 sec)                                     Preemption enabled.1.4/SwN 4. hold time 10 sec                                     Next hello sent in 1.3.4)     instructor.b400.312 sec)                                   Lab .040 sec remaining (maximum 600 sec)                                     Time to live: 14399.f671.10) local                                     0006.168. upper 100                                   Load balancing: round-robin                                   Group members:                                     0006.024 sec)                                   Priority 210 (configured)                                   Weighting 100 (default 100).Configuring HSRP and GLBP (SN 2.3.20. min delay 30 sec                                     Active is local.0a02 (learnt)                                     Owner ID is 0006.indb 30                                                                                           3/12/14 7:51 AM .1. 599. forwarder timeout 14400 sec                                   Preemption disabled                                   Active is local                                   Standby is 192.1.db58 (192.168.0a01 (default)                                     Owner ID is 0006. last state change 00:02:53                                     MAC address is 0007.1.168.f671.4.  This allows load sharing among the physical links.     instructor. rather than having a STP block one or more                      of the links.                                                                                                         CHAPTER 3                                                                                        Link Aggregation                         Link aggregation is the ability to create one logical link using multiple physical links between two                      devices.indb 31                                                                                                            3/12/14 7:51 AM .  even if its overall throughput decreases because of a lost link within the                                        EtherChannel. indicate the mode that is described.                                    ■   Active: The interface initiates negotiations with other interfaces by sending LACP                                        packets.                                 List at least three advantages to using EtherChannel:                                    ■   Most configuration tasks can be done on the EtherChannel interface instead of on each                                        individual port.                                 For PAgP. the EtherChannel remains                                        functional.                                    ■   Load balancing takes place between links that are part of the same EtherChannel.                                    ■   Desirable: The interface initiates negotiations with other interfaces by sending PAgP                                        packets.                                    ■   EtherChannel provides redundancy because the overall link is seen as one logical con-                                        nection.                                    ■   EtherChannel relies on existing switch ports.                                 For LACP. there are also two proto-                                 cols that can be used to configure the negotiation process: Port Aggregation Protocol (PAgP—                                 Cisco proprietary) and Link Aggregation Control Protocol (LACP—IEEE 802. Where there is only                                        one EtherChannel link.                                 These two protocols ensure that both sides of the link have compatible configurations—same                                 speed. but does not initi-                                        ate LACP negotiation.                                    ■   Auto: The interface responds to the PAgP packets that it receives. Assuming at least one physical link is present. duplex setting. but does not initiate                                        PAgP negotiation. and VLAN information. briefly describe each of the following modes:                                    ■   On: This mode forces the interface to channel without PAgP. However.indb 32                                                                                                                 3/12/14 7:51 AM . all physical links in the EtherChannel are active because STP sees                                        only one (logical) link.     instructor.                                   EtherChannel Advantages                                 EtherChannel technology was originally developed by Cisco as a technique of grouping several                                 Fast Ethernet or Gigabit Ethernet switch ports into one logical channel. briefly describe each of the following modes:                                    ■   On: This mode forces the interface to channel without LACP. The modes for each differ slightly.                                    ■   EtherChannel creates an aggregation that is seen as one logical link.                32   CCNA Routing and Switching Practice and Study Guide                                     Link Aggregation Concepts                                 One of the best ways to reduce the time it takes for STP convergence is to simply avoid STP.3ad).                                 EtherChannel is a form of link aggregation used in switched networks.                                 In Table 3-1.                                    ■   Passive: The interface responds to the LACP packets that it receives.                                   EtherChannel Operation                                 You can configure EtherChannel as static or unconditional. No need to upgrade.                                                                                       Chapter 3: Link Aggregation    33                          Table 3-1    PAgP and LACP Modes                      Mode               PAgP and/or LACP Mode Description                      Active             Initiates LACP negotiations with other interfaces.                      Desirable          Actively initiates PAgP negotiations with other interfaces.indb 33                                                                                                        3/12/14 7:51 AM .     instructor. two switches are using LACP. Does not initiate LACP                                         negotiations.                        The mode that is configured on each side of the EtherChannel link determines whether                      EtherChannel will be operational.                       Table 3-3    EtherChannel Negotiation Using LACP                      Switch 1 Mode                Switch 2 Mode                 EtherChannel Established?                      Passive                      On                            No                      Passive                      Active                        Yes                      On                           On                            Yes                      Passive                      Passive                       No                      On                           Active                        No                          Link Aggregation Configuration                      EtherChannel configuration is rather straightforward once you decide on which protocol you                      will use.                      Passive            Places an interface in a passive. the easiest method is to just force both sides to be on. Indicate with “yes” or “no” whether EtherChannel is                      established.                      On                 Forces EtherChannel state without PAgP or LACP initiated negotiations. responding state.                      In Table 3-2. Indicate with “yes” or “no” whether EtherChannel is                      established. responding state. two switches are using PAgP.                       Table 3-2    EtherChannel Negotiation Using PAgP                      Switch 1 Mode              Switch 2 Mode             EtherChannel Established?                      Auto                       Auto                      No                      Auto                       Desirable                 Yes                      On                         Desirable                 No                      On                         Off                       No                      Desirable                  Desirable                 Yes                        In Table 3-3.                      Auto               Places an interface in a passive. In fact. Does not initiate PAgP                                         negotiations.  LACP. to configure the S1 Fa0/1 and Fa0/2 into an                                 EtherChannel without negotiations.20     instructor. including the switch prompt. S1 should initiate the negotiations. Use the interface port-channel identifier command to                                              configure channel-wide settings like trunking.                                 As you can see from the configuration steps. participate in the EtherChannel group using the interface                                              range interface command. the way you specify whether to use PAgP.10.      The channel-group command automatically creates a port channel interface using                                              the identifier as the number. including the switch prompt. The channel should trunk. 10. and share the                                              same range of allowed VLANs on trunks.                                 So.                                  S1(config)# interface range fa0/1-2                                 S1(config-range-if)# channel-group 1 mode desirable                                 S1(config-range-if)# interface port-channel 1                                 S1(config-if)# switchport mode trunk                                 S1(config-if)# switchport trunk allowed vlan 1.                                              What are the requirements for each interface before they can form an EtherChannel?                                              All interfaces must support EtherChannel.                                  S1(config)# interface range fa0/1-2                                 S1(config-range-if)# channel-group 1 mode on                                 S1(config-range-if)# interface port-channel 1                                 S1(config-if)# switchport mode trunk                                 S1(config-if)# switchport trunk native vlan 99                                    EtherChannel Configuration Scenario 1                                 Record the commands.                                  Figure 3-1      EtherChannel Topology                                                                Fa0/1                                                        S1                                                 S2                                                               Fa0/2                                   EtherChannel Configuration Scenario 1                                 Record the commands. The keywords auto                                              and desirable enable PAgP. to configure the S1 Fa0/1 and Fa0/2 into                                 an EtherChannel using PAgP.                                 allowing only VLANs 1. be configured with the same speed and                                              duplex settings. native VLANs. complete the following steps:                                 Step 1. support the same VLAN or be configured as a trunk.                34   CCNA Routing and Switching Practice and Study Guide                                     Configuring EtherChannel                                 To configure EtherChannel. Then force the channel to trunking using native VLAN 99.indb 34                                                                                                                    3/12/14 7:51 AM .                                 Step 2.                                 Step 3. The keywords active and passive enable LACP.      Specify the interfaces that. consider Figure 3-1 in each of the following configuration scenarios. or allowed VLANs.                                 or no negotiations is by configuring one keyword in the channel-group command.      Create the port channel interface with the channel-group identifier mode {on | auto                                              | desirable | active | passive} command in interface range configuration mode. and 20. with those steps in mind. The                                              keyword on forces the port to channel without PAgP or LACP. 2.indb 35                                                                                                                     3/12/14 7:51 AM .                                                                                                    Chapter 3: Link Aggregation   35                                          EtherChannel Configuration Scenario 1                                      Record the commands.unsuitable for bundling                                                w . The channel should trunk.1. rxload 1/255                                       <output omitted>                                         S1# show etherchannel summary                                       Flags:   D . DLY 100 usec.2.failed to allocate aggregator                                                  M .suspended                                                H .3/SwN 5.8a01)                                         MTU 1500 bytes. to configure the S1 Fa0/1 and Fa0/2 into                                      an EtherChannel using LACP.Configuring EtherChannel (SN 3.                                            reliability 255/255. including the switch prompt. line protocol is up (connected)                                         Hardware is EtherChannel.4)                                       Packet Tracer . BW 200000 Kbit/sec.                                      allowing all VLANs.1.3)                      Packet Tracer                        Activity                                       Verifying and Troubleshooting EtherChannel                                      Record the commands used to display the output in Example 3-1.1.default port                                           Number of channel-groups in use: 1                                       Number of aggregators:              1     instructor.bundled in port-channel                                                I .not in use. txload 1/255.4/SwN 5.waiting to be aggregated                                                d .1.8a01 (bia 0cd9.stand-alone s .2.Configuring EtherChannel (SN 3.96e8.Layer3       S .Hot-standby (LACP only)                                                R .in use       f .                                       Example 3-1     EtherChannel Verification Commands                                       S1# show interface port-channel1                                       Port-channel1 is up.96e8. address is 0cd9.                                       S1(config)# interface range fa0/1-2                                      S1(config-range-if)# channel-group 1 mode passive                                      S1(config-range-if)# interface port-channel 1                                      S1(config-if)# switchport mode trunk                                        Lab . S1 should not initiate the negotiations.Layer2                                                U .down         P . minimum links not met                                                u .2.                     P .               Pseudo port-channel = Po1                                   Port index       = 0                 Load = 0x00                 Protocol =     LACP                                     Flags:    S .indb 36                                                                                                                 3/12/14 7:51 AM .Device is sending Slow LACPDUs               F .Device is in active mode.Device is in passive mode.                                             A .                36   CCNA Routing and Switching Practice and Study Guide                                       Group    Port-channel      Protocol       Ports                                   ------+-------------+-----------+-----------------------------------------------                                   1        Po1(SU)              LACP        Fa0/1(P)         Fa0/2(P)                                     S1# show etherchannel port-channel                                                      Channel-group listing:                                                      ----------------------                                     Group: 1                                   ----------                                                      Port-channels in the group:                                                      ---------------------------                                     Port-channel: Po1          (Primary Aggregator)                                     ------------                                     Age of the Port-channel           = 0d:00h:25m:17s                                   Logical slot/port         = 2/1               Number of ports = 2                                   HotStandBy port = null                                   Port state                = Port-channel Ag-Inuse                                   Protocol                  =    LACP                                   Port security             = Disabled                                     Ports in the Port-channel:                                     Index     Load     Port        EC state             No of bits                                   ------+------+------+------------------+-----------                                       0     00       Fa0/1       Active                  0                                       0     00       Fa0/2       Active                  0                                     Time since last port bundled:             0d:00h:05m:41s         Fa0/2                                   Time since last port Un-bundled: 0d:00h:05m:48s                  Fa0/2                                     S1# show interfaces f0/1 etherchannel                                   Port state       = Up Mstr Assoc In-Bndl                                   Channel group = 1                    Mode = Active               Gcchange = -                                   Port-channel     = Po1               GC   =     .     instructor.Device is sending fast LACPDUs.           Fa0/1(D)         Fa0/2(D)                       S1# show run | begin interface Port-channel     instructor.                           ■   Allowed VLANs on trunks must be the same for both sides.96d2.bundled in port-channel                                   I .Layer2                                   U .not in use.                                                                                               Chapter 3: Link Aggregation   37                           Local information:                                                          LACP port          Admin       Oper      Port            Port                       Port          Flags    State       Priority           Key         Key       Number          State                       Fa0/1         SA       bndl        32768              0x1         0x1       0x102           0x3D                         Partner's information:                                                LACP port                                 Admin    Oper     Port      Port                       Port          Flags    Priority    Dev ID               Age      key      Key      Number    State                       Fa0/1         SA       32768       0cd9.                           ■   Both sides of the channel must be configured with compatible PAgP or LACP dynamic                               negotiation options.indb 37                                                                                                                3/12/14 7:51 AM .unsuitable for bundling                                   w .waiting to be aggregated                                   d .4000        4s      0x0      0x1      0x102     0x3D                         Age of the port in the current state: 0d:00h:24m:59s                       S1#                         When troubleshooting an EtherChannel issue.Layer3         S . keep in mind the configuration restrictions for                      interfaces that participate in the channel.stand-alone s .default port                       Number of channel-groups in use: 1                       Number of aggregators:                     1                       Group      Port-channel   Protocol         Ports                       ------+-------------+-----------+-----------------------------------------------                       1          Po1(SD)             .down           P .suspended                                   H .                      Refer to the output for S1 and S2 in Example 3-2.failed to allocate aggregator                                   M .                       Example 3-2         Troubleshooting an EtherChannel Issue                        S1# show etherchannel summary                       Flags:      D .                           ■   All ports must be in the same VLANs or configured as trunks. minimum links not met                                   u . Record the command that generated the                      output.Hot-standby (LACP only)                                   R .                           ■   The link speed and duplex setting must match. List at least four restrictions.in use         f .                           ■   Trunking mode must be the same for each side of the channel.  you must first                                 remove the port channel.                38   CCNA Routing and Switching Practice and Study Guide                                       interface Port-channel1                                    switchport mode trunk                                   !                                   interface FastEthernet0/1                                    switchport mode trunk                                    channel-group 1 mode auto                                   !                                   interface FastEthernet0/2                                    switchport mode trunk                                    channel-group 1 mode auto                                   !                                   <output omitted>                                   S 1#                                   S2# show run | begin interface Port-channel                                   interface Port-channel1                                    switchport mode trunk                                   !                                   interface FastEthernet0/1                                    switchport mode trunk                                    channel-group 1 mode auto                                   !                                   interface FastEthernet0/2                                    switchport mode trunk                                    channel-group 1 mode auto                                   !                                   <output omitted>                                   S2#                                    Explain why the EtherChannel between S1 and S2 is down. spanning-tree errors cause the associated ports to go into                                 blocking or errdisabled state. and then configure the interfaces to use desirable mode. Otherwise. For this reason.                                 EtherChannel and spanning tree must interoperate. the order in which                                 EtherChannel-related commands are entered is important.                                 This can be done on one or both switches. which means that the interface will listen                                 for PAgP packets but will not initiate negotiations. what would you suggest to correct the issue                                 shown in Example 3-2 if the requirement is to use PAgP? What commands would be required?                                 Remove the port channel 1 interface.indb 38                                                                                                                 3/12/14 7:51 AM .2                                 S1(config-if-range)# channel-group 1 mode desirable     instructor. so the                                 channel is down.                                  S1(config)# no interface Port-channel 1                                 S1(config)# interface range f0/1 . With that in mind. To correct this issue. Neither side initiates negotiation.                                 Both sides of the link are set to the PAgP auto mode. 2.1.2                                      S2(config-if-range)# channel-group 1 mode desirable                                      S2(config-if-range)# no shutdown                                      S2(config-if-range)# interface Port-channel 1                                      S2(config-if)# switchport mode trunk                                        Lab .2.2.2.3/SwN 5.4/SwN 5.3.2.1.Troubleshooting EtherChannel (SN 3.4)                                       Packet Tracer .2)     instructor.2.Troubleshooting EtherChannel (SN 3.2.2.2/SwN 5.3.indb 39                                                                                                               3/12/14 7:51 AM .                                                                                              Chapter 3: Link Aggregation   39                                         S1(config-if-range)# interface Port-channel 1                                      S1(config-if)# switchport mode trunk                                      S2(config)# no interface Port-channel 1                                      S2(config)# interface range f0/1 .3)                      Packet Tracer                        Activity                                      Packet Tracer .Skills Integration Challenge (SN 3. indb 40   3/12/14 7:51 AM .instructor.  implementation. This chapter reviews WLAN technology. If you have a router at home. security. planning.     instructor. WLANs provide the ability to connect                      from any location at any time within the campus network. chances are it                      supports a wireless LAN (WLAN). com-                      ponents.indb 41                                                                                                          3/12/14 7:51 AM . WLANs use radio frequencies that present                      some unique design and implementation considerations.                                                                                                       CHAPTER 4                                                                                           Wireless LANs                         Wireless networks are becoming increasingly ubiquitous. and troubleshooting. In the work environment.  frequency or frequencies. 3G.                42   CCNA Routing and Switching Practice and Study Guide                                     Wireless LAN Concepts                                 Wireless access can result in increased productivity and more relaxed employees. indi-                                 cate the wireless technology described by each feature.15                                        X                                  Uses 2G. it became                                 important to maintain backward compatibility so that devices would still be able to connect to                                 newer and faster access points. Although the focus for the CCNA student is on WLANs.11 are listed in chronological order. For each one.11                                                  X                                   WLANs standards began in 1997 with the first 802. employees have the flexibility to work when they want.                                 indicate the maximum speed. and with what earlier versions the                                 specification is compatible (if any). and 4G variations                                                  X                                  Supports speeds up to 1 Gbps                                          X                                  Provides mobile broadband connectivity                                          X                                  Supports download speeds up to 10                                                           X                                  Mbps                                  Supports speeds up to 5 Mbps                                                    X                                  Distance transmissions of up to 300                          X                                  meters                                  Requires directional dish aligned with                                                      X                                  GEO device                                  Supports speeds up to 24 Mbps                      X                                  Transmission distances of up to 30 miles                              X                                  (50 km)                                  Distance transmissions of up to 100                X                                  meters                                  Supports speeds up to 7 Gbps                                 X                                  IEEE 802. all the current flavors of 802. In Table 4-1.                                 In Table 4-2. As the standard rapidly evolved. Subsequent revisions have                                 increased the speed and changed the frequency.16                                                           X                                  IEEE 802. you should also be                                 aware of the basic features of other wireless technologies and applications. This                                 section reviews basic wireless concepts and components.                                  Table 4-1      Identify the Wireless Technology                                  Wireless Technology Feature                   Bluetooth    Wi-Fi   WiMax     Cellular   Satellite                                  Clear line of sight required                                                                X                                  IEEE 802. With wire-                                 less networking. where they want. the term wireless encompasses a wide variety                                 of technologies.     instructor.                                   Identify Wireless Technologies                                 When referring to communication networks.indb 42                                                                                                                   3/12/14 7:51 AM .11 specification. 4 GHz                        802.11b         X               802.11g                        802.4 GHz (UHF)                   5 GHz (SFH)                    60 GHz (EHF)                      802.11b                      802.3 Gbps           5 GHz                          802.11ad         7 Gbps             2.11g         X               802.11ad          X                        As a network technician.11ac         1.11ac                      802.11b                      802.11n                      802.4 GHz. you should be aware of other wireless applications that could poten-                      tially cause problems with your WLAN implementations.                                                                                      Chapter 4: Wireless LANs      43                          Table 4-2    Comparing the WLAN Standards                      IEEE Standard Maximum Speed         Frequency                      Backward Compatibility                                                                                         With                      802.11n          600 Mbps           2.4 GHz                        None                      802.4 GHz and 5 GHz              802.11n         X              802. 5 GHz.11g                      802.                       Table 4-4    Wireless Application Frequencies                      Wireless Application           2. In Table 4-4. indicate in Table 4-3 the frequencies at which each standard                      operates.11ac                        802.11a          54 Mbps            5 GHz                          None                      802. indicate whether the feature describes LANs or WLANs.11a/b/g/n/ac                        Using your completed Table 4-2.11ad        X               802.11a         X              802.indb 43                                                                                                       3/12/14 7:51 AM .11a                         802.4 GHz (UHF)         5 GHz (SHF)             60 GHz (EHF)                      Cellular broadband             X                      Radar landing systems                                                        X                      GPS systems                    X                      Radio astronomy                                      X                       X                      Bluetooth                      X                      Satellite communications                             X                      Microwave communications                             X                        In Table 4-5.11           2 Mbps             2.11ac        X              802.11b          11 Mbps            2.11b                        802.11n         X               802. Some applications may use more than one frequency.4 GHz                        None                      802.11a/b/g                      802.11a/n                      802. and 60 GHz 802.11g          54 Mbps            2.11ad        X              802.     instructor. indicate the frequency                      for each wireless application.11a                      802.                       Table 4-3    WLAN Standards and Frequencies                      2.                               X                                  Allows for device mobility. tablets.3 LANs      802.indb 44                                                                                                                    3/12/14 7:51 AM .                                        such as in WLANs.                              X                                  Connects to an access point. Briefly explain                                 the difference between an autonomous AP and controller-based AP.                44   CCNA Routing and Switching Practice and Study Guide                                     Table 4-5     Comparing LANs and WLANs                                  WLAN or LAN Feature                                             802.                                 Two or more autonomous APs can be combined into a cluster to ease management require-                                 ments.11 wireless topologies:                                    ■   Ad hoc mode: When two devices connect wirelessly without the aid of an infrastructure                                        device. However.                                        X                                     WLANs Components and Topologies                                 Today. you can easily install a wireless network                                 interface card (NIC) to provide connectivity. such as a wireless router or AP. What four conditions must be met before a cluster can be formed:                                    ■   Clustering mode is enabled on the APs. In a home or small office network. such as Ethernet.                       X                                  Collision avoidance (CSMA/CA).11 WLANs                                  Collision detection (CSMA/CD).                                                         X                                  Connects to an Ethernet switch.                                                           X                                  Provides for better security. Controller-based APs are server-                                 dependent devices that require no initial configuration.     instructor.                                    ■   Infrastructure mode: When wireless clients interconnect via a wireless router or AP. Examples include Bluetooth and Wi-Fi Direct.                                      X                                  Radio frequencies (RFs) are used to interconnect devices.                                    ■   The APs joining the cluster have the same cluster name. A home router is a good example of an autonomous AP.                                 Briefly explain the two main 802. In such situations. desk-                                 top computers usually do not.                                                            X                                  Signal interference is normally not a problem.                                 Autonomous APs are standalone devices configured using the Cisco CLI or a GUI. it might not be desirable or                                 feasible to run cabling to a desktop.                                 Wireless NICs associate (and possibly authenticate) with an access point (AP). APs connect to the network infrastructure using the wired distribu-                                        tion system (DS). but are automatically configured and                                 managed by a WLAN controller. all laptops.                                 Autonomous APs are useful in situations where only a couple of APs are required in the net-                                 work. and smartphones include an integrated wireless NIC.                             X                                  Additional laws and regulations in local areas may apply.                                    ■   The APs use the same radio mode.                                       X                                  Cables are used to interconnect devices.                                    ■   The APs are connected on the same network segment. 3.10/SwN 8.3. 802.2. two or more BSSs can be joined through a common distri-                      bution system (DS) into an ESS.2.                       Figure 4-1    WLAN Topologies                          The topology on the left shows an example of infrastructure mode.                      Infrastructure mode uses two topology building blocks: a basic service set (BSS) and an                      extended service set (ESS). However.1. authenticating. and associating with an AP.                        Label the 802.1. When a single BSS                      provides insufficient RF coverage. label each field in the 802. The topology on the right                      shows an example of ad hoc mode.                      Ethernet does not have to worry about finding. CSMA/CA.Investigating Wireless Implementations (SN 4.11 uses a                      frame format similar to 802.     instructor.11 uses a collision detection system                      similar to Ethernet’s carrier sense multiple access collision detect (CSMA/CD). label the two wireless topologies with either infrastructure mode or ad hoc                      mode. Nor                      does Ethernet have to worry about managing channels on the wireless radio frequencies.11 Frame                      In Figure 4-2.                       Lab . AP association. Briefly describe each and how they interrelate.indb 45                                                                                                      3/12/14 7:51 AM .11 frame.                      A BSS consists of a single AP interconnecting all associated wireless clients.                                                                                       Chapter 4: Wireless LANs   45                          In Figure 4-1. but with more fields. and channel management. 802.11 frame.10)                         Wireless LAN Operations                      WLAN operations have similar structures and concepts to Ethernet’s 802. This                      section reviews the 802. 11 Frame Format (answer)                                                                            Header                      Payload       FCS                                                  Frame                                             Sequence                                                        Duration   Address1 Address2 Address3            Address4                                              Control                                            Control                                                                                                Power                                          Protocol Frame Frame                More                 More                                                               ToDS FromDS           Retry Manage.     Security Reserved                                          Version Type Subtype             Fragments               Data                                                                                            ment     instructor.indb 46                                                                                                         3/12/14 7:51 AM .11 Frame Format                                                                            Header                      Payload       FCS                                     Figure 4-2a     802.                46   CCNA Routing and Switching Practice and Study Guide                                     Figure 4-2      802.             c. Security                             ing device                         a.                      Subfield Description                                      Subfield                         e.indb 47                                                                                                                        3/12/14 7:51 AM .11 protocols is being used                         c. Protocol version                             being used                                             b. Power management                         d. Identifies the frame as either a management. Indicates whether encryption/authentication is          a. or data frame                                                                                    d. Frame subtype                         b. Specifies which 802. Indicates to an associated AP client that data                             is exiting a DS (distributed system)     instructor.                                                                                                         Chapter 4: Wireless LANs   47                          Match the subfield description on the left with the subfield on the right. FromDS                             control. Active or power-save mode status of the send-                                                                                    e. This is a one-to-one matching exercise.  a wire-                                 less client transmits only if the channel is clear. a wireless device that is sending                                 cannot also listen for collision. shared media environment. it assumes a collision occurred and                                 retries after a random waiting interval. However. All transmissions are acknowledged. So.                48   CCNA Routing and Switching Practice and Study Guide                                     Wireless Media Contention                                 A wireless device operates in a half-duplex.indb 48                                                                                                                    3/12/14 7:51 AM . unlike half-duplex Ethernet operations. a wireless device                                 must also sense the carrier because multiple devices have access—carrier sense multiple access                                 (CSMA). Therefore.                                 if a wireless client does not receive an acknowledgment. IEEE developed a collision avoidance (the CA in                                 CSMA/CA) mechanism called the distributed coordination function (DCF). Using DCF. label the missing steps in                                 the CSMA/CA process. Therefore. In the flowchart in Figure 4-3.                                  Figure 4-3    CSMA/CA Process                                                                 Start                                                             Assemble a Frame                                                                                       No                                                                       Yes                                                                                      No                                                                       Yes                                                       Transmit Application Data                                                                    End     instructor.                                                                                          Chapter 4: Wireless LANs   49                          Figure 4-3a   CSMA/CA Process (answer)                                                     Start                                                 Assemble a Frame                                                   Is the Channel          No                                                                            Wait for Random Backoff Time                                                    Idle?                                                          Yes                                                Transmit RTS                                                                          No                                              CTS Received?                                                          Yes                                           Transmit Application Data                                                        End     instructor.indb 49                                                                                                       3/12/14 7:51 AM .  Identifies the 802. it must first associate with an AP or wireless rout-                 er.                 Match the definitions on the left with the association parameter on the right. Channel settings                      d.                50    CCNA Routing and Switching Practice and Study Guide                     Associating with an AP                 Before a wireless device can communicate over the network.                 Definitions                                                 Security Parameter                      e. Refers to the frequency bands being used to                         transmit wireless data                      b. Password                         works in the same vicinity                                                                                c. Currently standards include WEP. This is a one-to-one matching                 activity. To do so. or                         WPA2                      c. it must discover and authenticate with an AP. Network mode                         ported by the AP                                                                                e.         b. Prevents intruders and other unwanted users                         from associating with the AP     instructor.indb 50                                                                                                                3/12/14 7:51 AM . WPA.11 WLAN standards sup-                                                                                d. Security mode                         to distinguish between multiple wireless net. SSID                      a. A unique identifier that wireless clients use          a. Chapter 4: Wireless LANs   51     To discover and connect with an AP or wireless routers, clients use a probing process, which                      can either be passive or active, as shown in Figure 4-4. Label each example as either passive or                      active.  Figure 4-4     Two Methods to Discover an AP  Sender                 Receiver                                   Sender               Receiver     Beacon Frame (0x08)      Probe Request Frame (0x04)                                                      • SSID                           • SSID                                                      • Supported standards            • Supported standards                                                      • Security settings  Beacon Frame (0x08)     Probe Response Frame (0x05)                                                      • SSID                           • SSID                                                      • Supported standards            • Supported standards                                                      • Security settings              • Security settings  Beacon Frame (0x08)                                                      • SSID                                                      • Supported standards                                                      • Security settings     Passive mode is illustrated on the left. Active mode is illustrated on the right.                      Briefly explain the two authentication mechanisms:                         ■   Open authentication: Fundamentally a NULL authentication where the wireless client                             says “authenticate me” and the AP responds with “yes.” Open authentication provides                             wireless connectivity to any wireless device and should only be used in situations where                             security is of no concern.                         ■   Shared-key authentication: Technique is based on a key that is pre-shared between the                             client and the AP.                      After discovering and authenticating with an AP or wireless router, the wireless device goes                      through an association process. Label Step 3 in Figure 4-5 with the association substeps.  Figure 4-5     The AP Association Process  Step 1 (Discovery):               Step 2 (Authentication):              Step 3 (Association):   Listen for beacon frames to                                            1                                                                        Agree with AP to share                                     find WLAN SSIDs                                                                         Open authentication                                       (passive mode)                                            or                                    or                   2                                Send a probe request to the                                                                         Initiate Shared Key                                AP with or without a known                                                                        authentication process                                   SSID (active mode)                                                  3     1.   Send client’s MAC address to AP.                        2.   Receive AP’s MAC address (BSSID).                        3.   Receive AP’s association identifier (AID).     instructor.indb 51                                                                                                                        3/12/14 7:51 AM 52    CCNA Routing and Switching Practice and Study Guide     Channel Management Concepts                 In wireless implementations, a common practice is for the radio wave frequencies to be allocated as ranges.                 Such ranges are then split into smaller ranges called channels. Depending on the 802.11 standard, there are vari-                 ous ways to manage these channels. Match the channels, frequency modulation technique, or standard on the                 right with the definitions on the left.                 Definitions                                                 Channels, Frequency Modulation, and Standards                      h. Spreads the signal over larger-frequency bands;        a. 11                         used by 802.11b, cordless phones, CDMA cel-            b. 12                         lular, and GPS networks                                                                                c. 13                      c. Number of channels identified in Europe for                                                                                d. 1,5,10                         802.11b                                                                                e. 1,6,11                      e. Nonoverlapping 802.11b channels                                                                                f. 802.11g                      i. Rapidly switches the signal over many fre-                         quency channels; used by the original 802.11           g. 802.11n                         standard, walkie-talkies, and Bluetooth                h. DSSS                      g. Supports four nonoverlapping channels and              i. FHSS                         channel bonding                                        j. OFDM                      a. Number of channels identified in North                         America for 802.11b                      j. Maximizes spectral efficiency without caus-                         ing adjacent channel interference; used by                         802.11a/g/n/ad     instructor.indb 52                                                                                                                  3/12/14 7:51 AM Chapter 4: Wireless LANs    53     Wireless LAN Security                      WLANs present unique security concerns because anyone within range of the AP and with the correct creden-                      tials can gain access to the network.   WLAN Security Terminology                      Match the definitions on the left with the WLAN security terms on the right. This is a one-to-one matching                      exercise.                      Definitions                                              WLAN Security Term                         k. Wireless home router connected to the corpo-          a. TKIP                            rate network without authorization                    b. Man-in-the-middle attack                          f. Attacker sends a series of “disassociate” com-       c. SSID cloaking                             mands to all wireless clients within a BSS                                                                                  d. AES                         g. Attacker takes advantage of the CSMA/CA                                                                                  e. WEP                            contention method to monopolize the band-                            width and deny all other clients access to the         f. Spoofed disconnect attack                            AP                                                    g. CTS Flood                          j. The 802.11i industry standard for securing           h. WPA                             wireless networks                                     i. MAC address filtering                         b. An AP configured with the same SSID as a               j. WPA2                            legitimate AP                                         k. Rogue AP                         a. Uses Message Integrity Check (MIC) to                            ensure the message has not been tampered                            with                         h. Basically WEP with TKIP encryption                         e. Obsolete wireless authentication method                          i. Manually allow or deny based on physical                             address                         c. Disable the transmission of the beacon                         d. Uses Counter Mode Cipher Block Chaining                            Message Authentication Code Protocol                            (CCMP), which allows destination hosts to                            recognize whether the bits have been tam-                            pered with     instructor.indb 53                                                                                                                     3/12/14 7:51 AM 54   CCNA Routing and Switching Practice and Study Guide     Identify the WLAN Security Characteristics                                 The best way to secure a wireless network is to use authentication and encryption systems.                                 The two major types of authentication are open authentication and shared authentication.                                 Open is basically no authentication. Shared-key authentication comes in three flavors: WEP,                                 WPA, and WPA2. In Table 4-6, indicate the authentication method for each characteristic.  Table 4-6     WLAN Security Characteristics                                  WLAN Security Characteristic           Open Authentication         Shared-Key Authentication                                                                                                     WEP        WPA        WPA2                                  TKIP data encryption                                                            X                                  AES data encryption                                                                        X                                  MIC authentication                                                              X                                  No password authentication                       X                                  Medium security risk                                                            X                                  Shared-key authentication                                           X                                  RC4 data encryption                                                 X                                  No data encryption                               X                                  Highest security risk                            X                                  Lowest security risk                                                                       X                                  High security risk                                                  X                                  CCMP authentication                                                                        X     Wireless LAN Configuration                                 Modern wireless routers offer a variety of features, and most are designed to be functional                                 right out of the box with the default settings. However, it is good practice to change this initial                                 configuration—particularly, the default administrator password—so that public known default                                 settings cannot be used to access the wireless settings.   Configuring WLAN Routers and Clients                                 The best way to practice configuring wireless routers is to complete the Lab and Packet Tracer                                 activities associated with the course. You can also make sure your own home router is config-                                 ured with some of the following settings:                                    ■   Change the administrator password.                                    ■   Change the IP addressing assigned through DHCP to wireless clients.                                    ■   Change the service set identification (SSID) name. However, if you disable SSID broad-                                        casts, users will have to manually enter the SSID.                                    ■   Enable the strongest authentication protocol supported by the wireless router: hopefully                                        WPA2.     instructor.indb 54                                                                                                                    3/12/14 7:51 AM Chapter 4: Wireless LANs    55     ■   Enable MAC address filtering if you know the devices that will be joining the WLAN.                                             Otherwise, you will have to manually add new devices each time someone wants to                                             access the WLAN.                                         ■   If desired, configure a guest network and password for guest users to access the WLAN.                                      If you do not have access to a wireless router, Packet Tracer, or Lab equipment, you can search                                      the Internet for “wireless router configuration simulation.” Several wireless router manufactur-                                      ers host a simulation web page where you can practice configuring their specific GUI.  Lab - Configuring a Wireless Router and Client (SN 4.4.2.3/SwN 8.4.2.3)  Packet Tracer - Configuring Wireless LAN Access (SN 4.4.2.2/SwN 8.4.2.2)                      Packet Tracer                        Activity  Troubleshooting WLAN Issues                                      Troubleshooting WLAN issues normally requires an elimination process. Start with the wire-                                      less client by checking the following:                                         ■   Does the client have a valid IP address configuration?                                         ■   Can the client successfully access the wired network?                                         ■   Is the client configured with the correct security settings?                                         ■   Is the client configured with the correct channel and SSID?                                         ■   Is the wireless NIC driver up-to-date?                                      If the wireless client is operating as expected, check the following:                                         ■   Is the AP powered on?                                         ■   How far away is the closest AP?                                         ■   Are other devices in the area interfering with the signal?                                         ■   Are there any cabling or connector issues?                                      Finally, check the configuration of the AP to verify that it conforms to the desired specifica-                                      tions.                                      Occasionally, issues with the AP software are identified and corrected by the manufacturer. So,                                      you should regularly check to make sure that the firmware is up-to-date on the AP.  Packet Tracer - Skills Integration Challenge (SN 4.5.1.2/SwN 8.5.1.2)                      Packet Tracer                        Challenge     instructor.indb 55                                                                                                                          3/12/14 7:51 AM instructor.indb 56   3/12/14 7:51 AM .      instructor. propagating a default router. fine-tuning Open Shortest Path First (OSPF) Protocol interfaces. you should already know how to configure basic                      single-area OSPF.indb 57                                                                                                              3/12/14 7:51 AM . including manipulating the designated router / backup designated router (DR/BDR) elec-                      tion. This chapter focuses on the concepts and configurations to fine-tune the operation                      of OSPF. and                      authenticating OSPF neighbors.                                                                                                           CHAPTER 5                              Adjust and Troubleshoot Single-Area OSPF                         Although we will spend a little bit of time on it. 192                                                    S0/0/0                             192.168.64/26                                              192.255.129                              255.1.1.1.168.252                                                    Router ID                          2.                                   Single-Area OSPF Configuration Review                                 The following activity may look familiar to you if you also used the CCENT Practice and                                 Study Guide.245                              255.248/30                               G0/0                                                                              S0/0/1                                                                   RTC                             384 kbps              S0/0/0   RTB                                                                                                                         DCE                                     Table 5-1       IPv4 Addressing Scheme for OSPFv2                                  Device            Interface                          IPv4 Address                               Subnet Mask                                  RTA               G0/0                               192.0/26                                                                                                     G0/0                                                                                                                 S0/0/1                                                                                         S0/0/0     RTA        DCE                                                                      192.255.246                              255.252                                                    S0/0/1                             192.65                               255.1.255.2                                  RTC               G0/0                               192.252                                                    S0/0/1                             192.255.253                              255.1.254                              255.255.255.1                                  RTB               G0/0                               192.1.252                                                    Router ID                          1.168.255.indb 58                                                                                                                                            3/12/14 7:51 AM .255.250                              255.168.168.192                                                    S0/0/0                             192.168.1. It is repeated here so that you can get back up to speed on OSPF before we look                                 at more advanced configurations.168.1.1.255.252/30                                       192.                58   CCNA Routing and Switching Practice and Study Guide                                     Advanced Single-Area OSPF Configurations                                 In this section.1.1.252                                                    Router ID                          3.255.128/26                                                           G0/0                              192. This first                                 topology shows IPv4 network addresses.255.168.255.255. The IPv4 addressing scheme is in Table 5-1.3     instructor.1.2.1.168. we review the concepts and configurations to fine-tune the operation of                                 OSPFv2 and OSPFv3.255.2.255.168.249                              255.168.3.244/30                                                                                                   OSPF                                                                                        T1                          T1                                                                                                   Area 0                                                                      S0/0/0                                                                     DCE                                                          S0/0/1     192.1.1                                255.168.1.255.252                                                    S0/0/1                             192.                                   Configuring Single-Area OSPFv2                                 Figure 5-1 shows the topology that we will use to configure OSPFv2 and OSPFv3.255.168.168.1.                                  Figure 5-1      OSPFv2 Topology with IPv4 Network Addresses                                                                                              192.192                                                    S0/0/0                             192.168.1.255.3.  the                      neighbors the router is receiving updates from.63 area 0                      RTA(config-router)# network 192. which is                      110 for OSPF. the router ID.                        Configuring Single-Area OSPFv3                      Figure 5-2 shows the same topology we used for OSPFv2.2.0.1.indb 59                                                                                                       3/12/14 7:51 AM .168.64 0. including the OSPF process ID.1.0.1.2                      RTB(config-router)# network 192.3 area 0                      RTB(config-router)# passive-interface g0/0                      RTC(config)# router ospf 1                      RTC(config-router)# router-id 3.0. this command displays the OSPF area information as well as the last time the SPF                      algorithm was calculated.168.244 0. including the router prompt.3                      RTC(config-router)#network 192.0.63 area 0                      RTC(config-router)#network 192.244 0.1.                      Table 5-2 shows the IPv6 addressing scheme.                                                            Chapter 5: Adjust and Troubleshoot Single-Area OSPF    59                          In the space provided.0.168. to con-                      figure the routers in Figure 5-1 with OSPFv2.1.0 0.     instructor.168.252 0.1.0.1                      RTA(config-router)# network 192. but with IPv6 network addresses. document the correct commands.                      In addition.                      The quickest way to verify Hello and Dead intervals is to use the show ip ospf interface com-                      mand.3 area 0                      RTC(config-router)# passive-interface g0/0                         Verifying Single-Area OSPFv2                      Fill in the missing command to complete the following sentences:                      The show ip ospf neighbor command can be used to verify and troubleshoot OSPF neighbor                      relationships.3.0.128 0.168.252 0. and the default administrative distance.63 area 0                      RTB(config-router)# network 192.                      The show ip protocols command is a quick way to verify vital OSPF configuration informa-                      tion.3 area 0                      RTA(config-router)# passive-interface g0/0                      RTB(config)# router ospf 1                      RTB(config-router)# router-id 2.0.1.1.3.0.                      RTA(config)# router ospf 1                      RTA(config-router)# router-id 1.168.0.0.0.                      The quickest way to verify OSPF convergence is to use the show ip route command to view                      the routing table for each router in the topology.1.                      The show ip ospf command can also be used to examine the OSPF process ID and router ID.168. Include commands to configure the router ID and                      disable updates on the LAN interface.0.2.3 area 0                      RTA(config-router)# network 192. networks the router is advertising.0. 3.2. Include commands to                                 enable IPv6 routing.2                                  RTC               G0/0                              2001:DB8:1:3::1/64                                                    S0/0/0                            2001:DB8:F:AC::2/64                                                    S0/0/1                            2001:DB8:F:BC::2/64                                                    Link-local                        FE80::C                                                    Router ID                         3.                                 including the router prompt.                                  RTA(config)# ipv6 unicast-routing                                 RTA(config)# ipv6 router ospf 10                                 RTA(config-rtr)# router-id 1. the commands are the same for                                 all three routers. Record the correct commands.indb 60                                                                                                                                            3/12/14 7:51 AM .                60   CCNA Routing and Switching Practice and Study Guide                                     Figure 5-2      OSPFv3 Topology with IPv6 Network Addresses                                                                                             2001:DB8:1:1::/64                                                                                                    G0/0                                                                                                               S0/0/1                                                                                        S0/0/0     RTA       DCE                                                                  2001:DB8:F:AC::/64                                         2001:DB8:F:AB::/64                                                                                                  OSPF                                                                                       T1                         T1                                                                                                  Area 0                                                                     S0/0/0                                                                    DCE                                                         S0/0/1     2001:DB8:1:2::/64                                              2001:DB8:1:3::/64                                                           G0/0                             2001:DB8:F:BC::/64                            G0/0                                                                             S0/0/1                                                                  RTC                             384 kbps             S0/0/0    RTB                                                                                                                       DCE                                     Table 5-2       IPv6 Addressing Scheme for OSPFv3                                  Device            Interface                         IPv6 Address/Prefix                                  RTA               G0/0                              2001:DB8:1:1::1/64                                                    S0/0/0                            2001:DB8:F:AC::1/64                                                    S0/0/1                            2001:DB8:F:AB::1/64                                                    Link-local                        FE80::A                                                    Router ID                         1.1. configure the router ID. you need to document only one router. change the reference bandwidth to 10000.1                                  RTB               G0/0                              2001:DB8:1:2::1/64                                                    S0/0/0                            2001:DB8:F:BC::1/64                                                    S0/0/1                            2001:DB8:F:AB::2/64                                                    Link-local                        FE80::B                                                    Router ID                         2.3                                   The routers are already configured with interface addressing.1.3. So.2. and                                 disable updates on the LAN interface.1. Except for the router ID.1.1                                 RTA(config-rtr)# auto-cost reference-bandwidth 10000                                 RTA(config-rtr)# passive-interface g0/0     instructor. to configure the routers with OSPFv3.                       The show ipv6 protocols command is a quick way to verify vital OSPF configuration informa-                      tion.                                                           Chapter 5: Adjust and Troubleshoot Single-Area OSPF       61                         RTA(config-rtr)# interface g0/0                      RTA(config-if)# ipv6 ospf 10 area 0                      RTA(config-if)# interface s0/0/0                      RTA(config-if)# ipv6 ospf 10 area 0                      RTA(config-if)# interface s0/0/1                      RTA(config-if)# ipv6 ospf 10 area 0                         Verifying Single-Area OSPFv3                      Fill in the missing command to complete the following sentences:                      The show ipv6 ospf neighbor command can be used to verify and troubleshoot OSPF neigh-                      bor relationships. However. including the OSPF process ID.Configuring Basic Single-Area OSPFv2 (SN 5. this command displays the OSPF area information as well as the last time the                      SPF algorithm was calculated.1.                       Lab . the quickest way to verify Hello and Dead intervals is to use the                      show ipv6 ospf interface command.                      To view a quick summary of OSPFv3-enabled interfaces.9)     instructor. the router ID. use the show ipv6 ospf interface                      brief command.                      The quickest way to verify OSPF convergence is to use the show ipv6 route command to view                      the routing table for each router in the topology.indb 61                                                                                                        3/12/14 7:51 AM . and interfaces the router is advertising.1.                      The show ipv6 ospf command can also be used to examine the OSPF process ID and router                      ID. In addition.  Connects distant OSPF networks to the back. This is a one-to-one matching exercise.                 Definitions                                                Network Type                      e.          a. Connects multiple routers using Frame Relay           c.indb 62                                                                                                             3/12/14 7:51 AM .                62   CCNA Routing and Switching Practice and Study Guide                     Identify Network Types                 Match the definition on the left with the network type on the right. Connects two routers directly on a single                         WAN network                      a. Broadcast multi-access                         bone area                                            b. Nonbroadcast multi-access                      b. Connects multiple routers in a hub-and-spoke         d. Virtual links                      d. Point to multipoint                      c. Point to point                         topology                                                                               e. Connects multiple routers using Ethernet tech-                         nology     instructor.  By default.5                      as the destination address.                      In Figure 5-4.                                                             Chapter 5: Adjust and Troubleshoot Single-Area OSPF       63                          In Figure 5-3.0.indb 63                                                                                                          3/12/14 7:51 AM .                      Examples of multi-access networks include Ethernet and Frame Relay. all OSPF                      routers have a priority of 1.0. If all OSPF routers have the same priority. The following exercises cover the con-                      cepts of multi-access networks in OSPF and the DR/BDR election process.0. nonbroad-                      cast multi-access (NBMA).                         OSPF and Multi-Access Networks                      A multi-access network is a network with more than two devices on the same shared media. Among other things. The DR and the                      BDR will receive LSAs at this address. it will send it using 224. point to multipoint. Frame Relay is a WAN                      technology that is discussed in a later CCNA course.0.                      If the router ID is not explicitly configured and a loopback interface is not configured. BDR.                      The DR/BDR election is based on OSPF priority and OSPF router ID.                        OSPF and Multi-Access Networks Completion Exercise                      Complete the missing words or phrases in the following paragraphs. broadcast multi-access. label each network type. If a DRother (a router that is not the DR) needs to send a link-state                      advertisement (LSA). the designated router is responsible for generating                      LSAs for the entire multi-access network which allows a reduction in routing update traffic. the highest router ID                      determines the DR and BDR.     instructor.6 as the destination address. the                      highest IP address on an active interface at the moment of OSPF process startup is used as the                      router ID. the hello protocol elects a designated router (DR) and a backup des-                      ignated router (BDR).                       Figure 5-3    Network Types                                                                            Internet                                              R2                                             Frame Relay                        R1                                          R3                           R3                                                                                        R3                         Starting from the top and going clockwise: point to point.                      On multi-access networks (networks supporting more than two routers) such as Ethernet and                      Frame-Relay networks.                      The DR. label the steps taken to elect the DR. and every other router in an OSPF network sends out Hellos using 224. 2/24                                                 S0/0: 10.168.1                                  Router C                            10.1.201.165.1/27                                                             S0/0: 10.1.1.1.1/24                           S0/0: 209.10. if applicable.10.168.10..1.16. Step 2b: Highest loopback address.1.10.1.168. Step 2c: Highest active interface IP                                 address. record the router ID for each router..201.168.4/24        G0/0: 10.10.indb 64                                                                                                                                        3/12/14 7:51 AM .2                                   In Table 5-4.19.1/32       G0/0: 10.165.1.1/24                                     In Table 5-3.3/24         G0/1: 10.                                                                                                                                             Step 2c                                     Step 1: Highest interface priority values.”     instructor.2/30      G0/1: 10.165. and then determine                                 which router will be the DR.16.13.1/30                                     G0/1: 10.1. indicate so with “none.168.2/27                                                           Lo0: 192. determine whether a DR will be elected for each network and record the DR’s                                 hostname.1.1                                  Router D                            192.13.10.10.10.                64   CCNA Routing and Switching Practice and Study Guide                                     Figure 5-4       Steps in the DR Election Process                                                                                                                                           Step 2a                                                                      If router values from Step 1                                               Step 1                                                     Step 2                         Step 2b                                                                  are exactly the same.5                                  Router B                            209.3                                  Router E                            192.                                 Use the topology in Figure 5-5 to determine the router ID for each router.then.                                  Table 5-3        Listing of Router IDs                                  Device                              Router ID                                  Router A                            192.10.1/24                                                                           Lo0: 192. If no DR is elected.10.5/32                                                                                   RTA                       RTB   S0/0: 209.10.1                                  Router F                            209. Step 2: Highest router ID.201.165.3/32                                                    Lo0    RTE                                    RTD                       RTC                                        192.201.2/24                    G0/0: 10. Step 2a: Highest manually                                 configured router ID.168.                                  Figure 5-5       Determine the Router ID                                                                                                                                        RTF                                                                                     G0/0: 10. 168.                       Figure 5-6    DR/BDR Election Exercise 1 Topology                                             Fa0/0 = 172.                       Setting the priority on the interface is another way to control DR or BDR.0                          None                      10.4                           Lo0 = 192.2                                            Lo0 = 192.16. assume that all routers are simultaneously booted and that router                      priorities are set to the default.1.1                        S0/0/0 = 192.1. Determine the network type.13.1.                      Refer to Figure 5-6 and answer the following questions.3                                                     RTA                                         RTB                                                                            RTC                                         RTD                                                                 Fa0/0 = 172.5.1.168.165.0                          Router B                         Note: Configure your OSPFv2 routers with a router ID to control the DR/BDR election. and label which                      router is elected as the DR and which router is elected as the BDR.1                          What is the router ID for RTA? 192.1.1.2                      What is the router ID for RTD? 192.16.168.168.168.4                      What is the router ID for RTB? 192.1.1.168.                                                                      Chapter 5: Adjust and Troubleshoot Single-Area OSPF          65                          Table 5-4     Listing of DRs                      Network                            DR                      209.2                           Lo0 = 192.168.3                      What is the router ID for RTC? 192.1     instructor.1. With OSPFv3.16.                      you must configure a router ID. The syntax for configuring OSPF priority                      is as follows:                      Router(config-if)# ip ospf priority priority                       Document the commands you use to configure on RTA to make sure that its priority will                      always win the DR/BDR election.1.1.                         DR/BDR Election Exercise                      In the following exercises.1.indb 65                                                                                                                      3/12/14 7:51 AM .0                      None                      10.                      In addition to configuring loopbacks.16.201.2                                                                 Lo0 = 192.5.4                                                                 S0/0/0 = 192.16.168.1. it is a good idea to configure RTA with an OSPF priority                      that will ensure it always wins the DR/BDR election.1.                      RTA(config)# interface Fa 0/0                      RTA(config-if)# ip ospf priority 2                      !Any priority higher than the default of 1 will work.1.168.10.0                          Router D                      10. if applicable.3                          Fa0/0 = 172.168.1                          Fa0/0 = 172. 0/24        Yes                                 RTC                                          RTD                                  172.16.17.168.1/30                                                                                          S0/0/0                 172.18.201. If applicable.2/24                                                                                              Fa0/1                  Fa0/0                                                                                   172.165.16.3/30                                     S0/0/0 = 192.1.1.2/30                                                  Lo0 = 10.168.1.168.0.1.168.1.                                  Figure 5-7       DR/BDR Election Exercise 2 Topology                                                                                    172.1/30                                                                                           OSPF                                                                                       Area 0                                                             Fa0/0                                                    Fa0/0                                                                                                              S0/0/0                                                                      S0/0/0                                                          RTC                                                           RTB                                                  Fa0/0 = 192.indb 66                                                                                                                                                3/12/14 7:51 AM .1.16.165.3/24                                      Fa0/0 = 192.1/30                                                                S0/0/0                                                                  S0/0/0                                                              RTD                                                                             RTB                                                             Fa0/0                                                                        Fa0/0                                                      172.1/24                 172.1.18.2/24                                                                       172.17.1.1/32     instructor.0.15.18.0/24        Yes                                 RTB                                          RTC                                  172.15.1.1.2/30                                                                                                     RTA         S0/0/1                                                             172.1.0/30        No                                  N/A                                          N/A                                  172.2/30                                                                                                      S0/0/0                                                                                        RTA                                                  ISP                                                                                            Fa0/0                                  S0/0/0 = 209.1/24                                                                               S0/0/0 = 209.1.2/30                                                                  172.1/24                                                                                                     RTC                                     Network              DR/BDR Election?                    Which Router Is the DR?                      Which Router Is the BDR?                                  172.1.                66   CCNA Routing and Switching Practice and Study Guide                                     Which router will be elected DR? RTA                                 Which router will be elected BDR? RTB                                 Refer to Figure 5-7 and determine whether there will be a DR/BDR election.168.2/24                                                  S0/0/0 = 192.15.1.17.                                  Figure 5-8       DR/BDR Election Exercise 3 Topology                                                                                Fa0/0 = 192.201.1.0/30        No                                  N/A                                          N/A                                   Refer to Figure 5-8 and answer the following questions. des-                                 ignate which router is DR and which router is BDR.1.0.  RTA is called the Autonomous System Boundary Router (ASBR)                      because it connects to an external routing domain that uses a different routing policy.165. it is desirable to have an                      Autonomous System Boundary Router (ASBR) redistribute a default route to the OSPF neigh-                      bors in the area. joins the 192.0/24 network with a router ID of                      209.168.1.0 serial 0/1/0     instructor.indb 67                                                                                                                                                     3/12/14 7:51 AM . Document the command to configure a static default                      route on RTA using the exit interface argument.0/24                                                    209.2/30                                                                                     RTA                                      209.0.0. This can be quickly accomplished in both OSPFv2 and OSPFv3. RTA will need                      a static default route pointing to ISP.1.64/26                                                                                    384 kbps               S0/0/0                                                 G0/0                                                                               G0/0                                                                                                            DCE                                                                S0/0/1                                                        RTC                     192.168.0.                        Redistributing an OSPF Default Route Exercise                      In some topology configurations and routing policy situations.0.202. notice that RTA is now our gateway router because it provides access outside the                      area.252/30         RTB and RTC            192.1.                        OSPFv2 Default Route Redistribution                      In Figure 5-9.168.1.128/26                 DCE                                                       S0/0/1              192.2                      What is the router ID for RTC? 10.0/24 network? RTA                      Which router is BDR for the 192.168. For OSPF.                                                                          Chapter 5: Adjust and Troubleshoot Single-Area OSPF                                     67                          What is the router ID for RTA? 209.1.201.165.168.201.168.201.9?                      Nothing.168.1                      Which router is DR for the 192. RTD.168.2                      What is the router ID for RTB? 192.1.1.165.0/24 network? RTB                      Now assume a priority of zero on RTA. the gateway router must be configured with two commands. In OSPF terminology.0 0. Both the DR and BDR have to go down before RTD can become the DR.248/30                                                                                                                       RTB                         Each routing protocol handles the propagation of default routing information a little different-                      ly.168.129/30                                                                                      OSPF                                                              S0/0/0                                                                                    Area 0                             192.                       Figure 5-9      Propagating a Default Route in OSPFv2                                                                                 192.165.                      RTA(config)# ip route 0.1.1/30       ISP                                                                           S0/0/0              S0/0/1                                                                                               DCE                  Static Route                                                                                      RTA                                                                                  Propagates                                                                                Default Route to                                                        192.1.0.168.244/30                                                                                                                                                  Public                                                                           T1                      T1                                                                                                                                                Web Server                                                                                                                                              209.1.0.168.0.168. First.201.0/26                                                                                     G0/0                              Default Route                                                                                                  S0/1/0                                   S0/0/0                              Address Space                                                                                                 DCE                                192. Which router is DR for the 192.1.0/24 network?                      RTB                      What will happen if another router.165. 165. Why?                                 Because neither router has a default route                                 Document the command that needs to be configured on RTA to fix this problem. RTB and RTC still cannot ping out-                                 side the 192.129. document the command necessary to configure ISP with a                                 static route pointing to the 192.0 255.                                  Figure 5-10     Propagating a Default Route in OSPFv3                                                                                              2001:DB8:1:1::/64                                                                                                                          2001:DB8:CAFE:1::F/64                                                                                               G0/0                            Default Route                                                                                                             S0/1/0                                   S0/0/0                                        Address Space                                                                                                  DCE                                          2001:DB:1::/48                                                     209.168.                                 ISP(config)# ipv6 route 2001:DB8:1::/48 serial 0/0/0                                  Document the command that will cause RTA to propagate the default router to RTB and RTC. any host on the LAN attached to RTA will be able to access ISP and be able to                                 ping the Public Web Server at 209.                68   CCNA Routing and Switching Practice and Study Guide                                     Using the exit interface argument.                                 ISP(config)# ip route 192.2/30                                                                                                  RTA                                    209.0/24 address space.255.201.                                 RTA(config)# router ospf 1                                 RTA(config-router)# default-information originate                                    OSPFv3 Default Route Redistribution                                 Configuring OSPFv3 to propagate a default route is essentially the same tasks as you do in                                 OSPFv2.165.1/30       ISP                                                                                        S0/0/0              S0/0/1                                                                                                            DCE                Static Route                                                                                                   RTA                                                                                               Propagates                                                                                             Default Route to                                                                  2001:DB8:1:AC::/64          RTB and RTC              2001:DB8:1:AB::/64                                                                                                                                                             Public                                                                                        T1                       T1                                                                                                                                                           Web Server                                                                                                                                                       2001:DB8:CAFE:F::F/64                                                                                                   OSPF                                                                             S0/0/0                                                                                                 Area 0                                       2001:DB8:1:3::/64                     DCE                                                   S0/0/1             2001:DB8:1:2::/64                                                                                                 384 kbps             S0/0/0                                                           G0/0                                                                                G0/0                                                                                                                       DCE                                                                               S0/0/1                                                                     RTC                 2001:DB8:1:BC::/64                                                                                                                                  RTB                                    Document the command to configure a static default route on RTA using the exit interface                                 argument.0/24 address space.165.1.                                 RTA(config)#ipv6 router ospf 1                                 RTA(config-rtr)#default-information originate     instructor.indb 68                                                                                                                                                            3/12/14 7:51 AM .168.168.                                 RTA(config)# ipv6 route ::/0 serial 0/1/0                                  Using the exit interface argument.202.1.0 serial 0/0/0                                  At this point.255.1. document the command necessary to configure ISP with a                                 static route pointing to the 2001:DB8:1::/48 address space. Figure 5-10 is an IPv6 version of Figure 5-9. However.201.                       Assume the routers in Figure 5-11 are using MD5 authentication to exchange OSPFv2 routing                      updates.                      Now refer to Figure 5-10. The                      default interval values result in efficient OSPF operation and seldom need to be modified.indb 69                                                                                                          3/12/14 7:51 AM .                      Again. Briefly explain the steps in MD5 authentication as R1 sends an OSPF message to R2. document the                      commands necessary to change these OSPFv2 intervals on the link between RTB and RTC to a                      value four times greater than the current value. what commands can you use to verify OSPF timers on an                      interface for both IPv4 and IPv6?                      show ip ospf interface                      show ipv6 ospf interface                        Securing OSPFv2 with MD5 Authentication                      Because routers are targets for network attacks.                       Figure 5-11   OSPFv2 MD5 Authentication Between R1 and R2                                                        S0/0/0                                                  R1                                       R2                                                                                  S0/0/1     instructor. Assuming that the current intervals are 10 and 40.                      RTB(config)# interface serial 0/0/0                      RTB(config-if)# ip ospf hello-interval 40                      RTB(config-if)# ip ospf dead-interval 160                      RTC(config)# interface serial 0/0/1                      RTC(config-if)# ip ospf hello-interval 40                      RTC(config-if)# ip ospf dead-interval 160                       Note that it is not necessary to configure the Dead interval as long as the desired interval is                      four times the Hello. you should always configure authentication                      services for OSPFv2 using the strongest authentication available: MD5 (message digest algo-                      rithm 5). The IOS will automatically increase the Dead interval to four times the                      configured Hello interval. refer to Figure 5-9. you can change them.                      RTB(config)# interface serial 0/0/0                      RTB(config-if)# ipv6 ospf hello-interval 40                      RTB(config-if)# ipv6 ospf dead-interval 160                      RTC(config)# interface serial 0/0/1                      RTC(config-if)# ipv6 ospf hello-interval 40                      RTC(config-if)# ipv6 ospf dead-interval 160                       Other than the show run command.                      However.                                                               Chapter 5: Adjust and Troubleshoot Single-Area OSPF     69                          Fine-Tuning OSPF Interfaces                      OSPF routers must use matching Hello intervals and Dead intervals on the same link. document the                      commands necessary to change the OSPFv3 intervals on the link between RTB and RTC to a                      value four times greater than the current value. Assuming that the current intervals are 10 and 40.  forcing all OSPF interfaces to use                                 authentication. Choose your own process ID and key values. Once received by R2.                                  RTB(config)# interface s0/0/0                                 RTB(config-if)# ip ospf message-digest-key 1 md5 cisco123                                 RTB(config-if)# ip ospf authentication message-digest                                 RTB(config-if)# interface s0/0/1                                 RTB(config-if)# ip ospf message-digest-key 1 md5 cisco123                                 RTB(config-if)# ip ospf authentication message-digest                                   What command can you use to verify OSPF MD5 authentication?                                 show ip ospf interface                                  Note: Cisco IOS supports a simple authentication method.                                 it combines the message with the key using MD5 to calculate a signature—known as a hash                                 value.                                 On a specific interface:                                 Router(config-if)# ip ospf message-digest-key key md5 password                                 Router(config-if)# ip ospf authentication message-digest                                  Refer to Figure 5-9. it com-                                 bines the message with the key and uses MD5 to calculate the signature.indb 70                                                                                                                    3/12/14 7:51 AM . However. Document the commands to configure RTA to use MD5 authentication                                 globally on all OSPF interfaces.                                 You can configure OSPFv2 MD5 authentication globally. it is not considered a best practice. So when R1 has a message to send to R2. Therefore. this method sends the password in                                 plain text. to enable OSPFv2 MD5 authen-                                 tication on all interfaces.                                  RTA(config)# router ospf 1                                 RTA(config-router)# area 0 authentication message-digest                                 RTA(config-router)# interface s0/0/0                                 RTA(config-if)# ip ospf message-digest-key 1 md5 cisco123                                 RTA(config-if)# interface s0/0/1                                 RTA(config-if)# ip ospf message-digest-key 1 md5 cisco123                                  Document the commands to configure RTB to use MD5 authentication on the serial interfaces                                 only.     instructor. R2 discards the message. R1 adds the signature to the message and sends it to R2.                70   CCNA Routing and Switching Practice and Study Guide                                     Both routers are configured with a pre-shared key. Choose your own process ID and key values. Or you can configure authentication on specific interfaces.                                 Document the command syntax.                                 In router configuration mode:                                 Router(config-router)# area area-id authentication message-digest                                  Then on each interface:                                 Router(config-if)# ip ospf message-digest-key key md5 password                                  Document the command syntax including the router prompt to enable OSPFv2 MD5 authenti-                                 cation only on specific interfaces. If not. If signatures match. including the router prompt.                                 R2 accepts the message.  Exstart. EX . Indicate the command used to                                      generate the output.Configuring OSPFv2 Advance Features (SN 5.static.indb 71                                                                                                                      3/12/14 7:51 AM .Configuring OSPFv2 Advance Features (SN 5.IS-IS inter area.mobile. or OSPF is not                                             configured correctly on the interface (OSPFv3).1.                                                                             Chapter 5: Adjust and Troubleshoot Single-Area OSPF   71                                          Lab . B . O . M .1.candidate default. What are the seven states OSPF                                      transitions through on its way to convergence?                                      Down. su . Solid understanding of OSPF operation                                      and the impact of the OSPF configuration commands is essential.IS-IS.5.1.5. IA .1.4.                                         ■   Authentication is misconfigured.                                       RTA# show ip route ospf                                      Codes: L .                                         ■   The interfaces are not on the same network.IS-IS level-1. R .7/RP 7.per-user static route     instructor.8/RP 7. * .BGP                                              D .OSPF NSSA external type 2                                              E1 . List at                                      least four reasons why adjacency might fail to establish.OSPF external type 1.                                         ■   OSPF Hello or Dead timers do not match.OSPF external type 2                                              i .4.EIGRP. Full                                        Identify OSPFv2 Troubleshooting Commands                                      The following output is from the topology shown in Figure 5-9.                                         ■   OSPF network types do not match. E2 .RIP. C .OSPF inter area                                              N1 .                                        OSPF Adjacency Issues                                      A common problem in OSPF convergence is a lack of adjacency with OSPF neighbors.8)                        Packet Tracer                                      Packet Tracer . Two-Way. Exchange.                                      What are the OSPFv2 and OSPFv3 commands you use to quickly verify adjacency between                                      OSPF routers?                                      show ip ospf neighbors                                      show ipv6 ospf neighbors                                      The command will list a state for each known OSPF router. L1 .local.                                         ■   There is a missing or incorrect OSPF network command (OSPFv2). S .                                         ■   Interface to neighbor is incorrectly configured as passive. U . N2 . Loading.OSPF NSSA external type 1.connected. L2 .IS-IS summary.OSPF.7)                        Activity                                         Troubleshooting Single-Area OSPF Implementations                                      Troubleshooting single-area OSPF is required skill for any network professional involved in the                                      implementation and maintenance of an OSPF network.EIGRP external. Init.IS-IS level-2                                              ia . 249         0     FULL/   .      00:00:32    192.0. Hello 10.246.      00:00:31    192.1.64/26 [110/65] via 192.1.1.1. Serial0/0/1                                  RTA# show ip ospf neighbor                                   Neighbor ID         Pri     State           Dead Time   Address         Interface                                 192. Dead 40.254. P .168. line protocol is up                                     Internet Address 192.168.1.168.0/24 is variably subnetted.1.168.1.1.1. 9 subnets.168.0                                           192.NHRP.168. Serial0/0/0                                                                 [110/128] via 192. 00:19:35.periodic downloaded static route. Network Type POINT_TO_POINT. maximum is 0 msec                                     Neighbor Count is 1.254.1.1.253/30. 00:19:35. H .168.0. flood queue length 0                                     Next 0x0(0)/0x0(0)                                     Last flood scan length is 1.ODR. 00:19:10. Attached via Network Statement                                     Process ID 1.168.168.168.                72   CCNA Routing and Switching Practice and Study Guide                                             o . Cost: 64                                     Topology-MTID      Cost      Disabled    Shutdown      Topology Name                                           0               64         no         no            Base                                     Transmit Delay is 1 sec.0. l .248/30 [110/128] via 192.168.indb 72                                                                                                    3/12/14 7:51 AM .168. Adjacent neighbor count is 1                                       Adjacent with neighbor 192.168.LISP                                          + .1.1.0 to network 0.254   Serial0/0/0                                 192.168.replicated route. Serial0/0/1                                 O          192. State POINT_TO_POINT                                     Timer intervals configured.253                                     It is an autonomous system boundary router     instructor.128/26 [110/65] via 192. Router ID 192.246.253.254         0     FULL/   . % .168.246   Serial0/0/1                                  RTA# show ip ospf interface serial 0/0/0                                 Serial0/0/0 is up. 3 masks                                 O          192.1. Wait 40. Serial0/0/0                                 O          192. 00:19:10.1.next hop override                                   Gateway of last resort is 0.0. Area 0. Retransmit 5                                       oob-resync timeout 40                                       Hello due in 00:00:03                                     Supports Link-local Signaling (LLS)                                     Cisco NSF helper support enabled                                     IETF NSF helper support enabled                                     Index 3/3.254                                     Suppress hello for 0 neighbor(s)                                  RTA# show ip protocols                                 *** IP Routing is NSF aware ***                                   Routing Protocol is "ospf 1"                                     Outgoing update filter list for all interfaces is not set                                     Incoming update filter list for all interfaces is not set                                     Router ID 192.168.1. maximum is 1                                     Last flood scan time is 0 msec. 1.1.                                                          Chapter 5: Adjust and Troubleshoot Single-Area OSPF   73                          Redistributing External Routes from.168.252 0.0.3 area 0                        Routing Information Sources:                          Gateway         Distance        Last Update                          192. Time elapsed: 00:23:27.                       Router is not originating router-LSAs with maximum metric                       Initial SPF schedule delay 5000 msecs                       Minimum hold time between two consecutive SPFs 10000 msecs                       Maximum wait time between two consecutive SPFs 10000 msecs                       Incremental-SPF disabled                       Minimum LSA interval 5 secs                       Minimum LSA arrival 1000 msecs                       LSA group pacing timer 240 secs                       Interface flood pacing timer 33 msecs                       Retransmission pacing timer 66 msecs                       Number of external LSA 1.246         110       00:18:13                          192. Maximum number of events: 1000. 1 normal 0 stub 0 nssa                        Maximum path: 4                        Routing for Networks:                          192.63 area 0                          192.3 area 0                          192.                        Number of areas in this router is 1.0.1.244 0. 1 normal 0 stub 0 nssa                       Number of areas transit capable is 0                       External flood list length 0                       IETF NSF helper support enabled                       Cisco NSF helper support enabled     instructor. Checksum Sum 0x003416                       Number of opaque AS LSA 0.0.360                       Supports only single TOS(TOS0) routes                       Supports opaque LSA                       Supports Link-local Signaling (LLS)                       Supports area transit capability                       Supports NSSA (compatible with RFC 3101)                       Event-log enabled.168.0. Mode: cyclic                       It is an autonomous system boundary router                       Redistributing External Routes from.1.0.253                       Start time: 00:44:46.168.168.1.0 0.254         110       00:17:48                        Distance: (default is 110)                       RTA# show ip ospf                       Routing Process "ospf 1" with ID 192.168.0.1.168.indb 73                                                                                                   3/12/14 7:51 AM .536. Checksum Sum 0x000000                       Number of DCbitless external and opaque AS LSA 0                       Number of DoNotAge external and opaque AS LSA 0                       Number of areas in this router is 1.                                   RTC# show ipv6 protocols                                 IPv6 Routing Protocol is "connected"                                 IPv6 Routing Protocol is "ND"                                 IPv6 Routing Protocol is "ospf 1"                                   Router ID 3. Checksum Sum 0x000000                                           Number of DCbitless LSA 0                                           Number of indication LSA 0                                           Number of DoNotAge LSA 0                                           Flood list length 0                                    Identify OSPFv3 Troubleshooting Commands                                 The following output is from the topology shown in Figure 5-10. line protocol is up                                   Link Local Address FE80::C.         00:00:39    6              Serial0/0/1                                 1. Checksum Sum 0x00E037                                           Number of opaque link LSA 0.3. 0 nssa                                   Interfaces (Area 0):                                     GigabitEthernet0/0                                     Serial0/0/1                                     Serial0/0/0                                   Redistribution:                                     None                                  RTC# show ipv6 ospf neighbor                                                  OSPFv3 Router with ID (3.         00:00:31    6              Serial0/0/0                                  RTC# show ipv6 ospf interface serial 0/0/1                                 Serial0/0/1 is up.2.472 ago                                           SPF algorithm executed 4 times                                           Area ranges are                                           Number of LSA 3.1. Instance ID 0.1.3. Interface ID 7                                   Area 0. Cost: 64                                   Transmit Delay is 1 sec.2.3.1             0   FULL/   .3. Indicate the command used                                 to generate the output.3) (Process ID 1)                                   Neighbor ID       Pri   State              Dead Time   Interface ID   Interface                                 2. Router ID 3.3                                   Network Type POINT_TO_POINT.3. State POINT_TO_POINT     instructor. 0 stub.3.indb 74                                                                                                          3/12/14 7:51 AM .3                                   Number of areas: 1 normal. Process ID 1.2             0   FULL/   .                74   CCNA Routing and Switching Practice and Study Guide                                      Reference bandwidth unit is 100 mbps                                     Area BACKBONE(0)                                           Number of interfaces in this area is 3                                           Area has no authentication                                           SPF algorithm last executed 00:16:47.  Mode: cyclic                       Router is not originating router-LSAs with maximum metric                       Initial SPF schedule delay 5000 msecs                       Minimum hold time between two consecutive SPFs 10000 msecs                       Maximum wait time between two consecutive SPFs 10000 msecs                       Minimum LSA interval 5 secs                       Minimum LSA arrival 1000 msecs                       LSA group pacing timer 240 secs                       Interface flood pacing timer 33 msecs                       Retransmission pacing timer 66 msecs                       Number of external LSA 1.OSPF Intra. OE2 . flood queue length 0                        Next 0x0(0)/0x0(0)/0x0(0)                        Last flood scan length is 2.OSPF Inter.Destination. maximum is 0 msec                        Neighbor Count is 1.ND Prefix. R . Maximum number of events: 1000.Local.ISIS summary. D .2                        Suppress hello for 0 neighbor(s)                       RTC# show ipv6 ospf                       Routing Process "ospfv3 1" with ID 3.EIGRP.ISIS interarea. NDr . Checksum Sum 0x00B657                       Number of areas in this router is 1.OSPF ext 2                             ON1 . Wait 40.Redirect                             O .2.3.3                       Event-log enabled.OSPF NSSA ext 1.11 entries                      Codes: C . DCE .BGP.indb 75                                                                                                    3/12/14 7:51 AM . OE1 .default .Per-user Static route                             B . maximum is 4                        Last flood scan time is 0 msec. U . Adjacent neighbor count is 1                          Adjacent with neighbor 2. IS . Dead 40.ISIS L2                             IA .RIP. OI . NDp . Retransmit 5                          Hello due in 00:00:06                        Graceful restart helper support enabled                        Index 1/2/2. I2 .ND Default.                                                           Chapter 5: Adjust and Troubleshoot Single-Area OSPF   75                           Timer intervals configured. 1 normal 0 stub 0 nssa                       Graceful restart helper support enabled                       Reference bandwidth unit is 100 mbps                       RFC1583 compatibility enabled                          Area BACKBONE(0)                             Number of interfaces in this area is 3                             SPF algorithm executed 4 times                             Number of LSA 15. EX . ON2 .OSPF NSSA ext 2     instructor.EIGRP external                             ND .2.3. Checksum Sum 0x07E293                             Number of DCbitless LSA 0                             Number of indication LSA 0                             Number of DoNotAge LSA 0                             Flood list length 0                       RTC#show ipv6 route ospf                      IPv6 Routing Table . Hello 10. L .ISIS L1.Static. S .Connected. I1 .OSPF ext 1. Skills Integration Challenge (SN 5.3.Troubleshooting Single-Area OSPFv2 (SN 5.2)     instructor. tag 1                                      via FE80::A.4/RP 7.2.3/RP                                 7.3.3.3.                76   CCNA Routing and Switching Practice and Study Guide                                    OE2 ::/0 [110/1].3)                                  Lab .3. directly connected                                 O   2001:DB8:1:AB::/64 [110/65]                                      via FE80::B.Troubleshooting Basic Single-Area OSPFv2 and OSPFv3 (SN 5.2.2.4)                                  Packet Tracer .2.2.2.2.Troubleshooting Advanced Single-Area OSPFv2 (SN 5.indb 76                                                                                           3/12/14 7:51 AM .3.3)                Packet Tracer                  Activity                                 Packet Tracer .3/RP 7.1.2/RP 7.1. GigabitEthernet0/0                                 O   2001:DB8:2:1::/64 [110/1]                                      via GigabitEthernet0/0.2. directly connected                                   Lab . GigabitEthernet0/0                                 O   2001:DB8:1:1::/64 [110/1]                                      via GigabitEthernet0/0.      instructor.                                                                                                          CHAPTER 6                                                                                           Multiarea OSPF                         In larger network implementations. This chapter reviews the concepts and configurations for multiarea OSPFv2 and OSPFv3. routing table entries. single-area OSPF can require a significant amount of CPU and                      memory resources. network administrators often implement multiarea                      OSPF to control the size of link-state databases.indb 77                                                                                                             3/12/14 7:51 AM . and the number of SPF calcula-                      tions. As the number of routers grows.                                     ■   OSPF does not perform route summarization by default. by convention.                                 Briefly describe the role of each of the following OSPF router types.                                    ■   The LSDB includes every link in the area which each router must maintain. A router can be more                                 than one type. even if every                                        link is not selected for the routing table.                                  Figure 6-1    Sample Multiarea OSPF Topology                                                         Area 1                  Area 0                    Area 2                                                            R1                       BB2                                                     R2                BB1                     BB3                                                                                                                R4                                                                                  BB4                                                             R3                                                                                 External AS     instructor.                                        but not an external network                                    ■   Autonomous System Boundary Router (ASBR): A router with at least one interface                                        attached to an external. recalculating the SFP algorithm consumes many CPU cycles.                                   Multiarea OSPF Terminology and Concepts                                 Briefly describe three issues that arise if an OSPF area becomes too big.                78   CCNA Routing and Switching Practice and Study Guide                                     Multiarea OSPF Operation                                 Multiarea OSPF was specifically designed to address several issues that result from single-area                                 OSPF growing beyond its constraints.indb 78                                                                                                                3/12/14 7:51 AM . non-OSPF network                                 In Table 6-1. indicate the OSPF router type for each router in Figure 6-1. con-                                        figured as area 0                                    ■   Area Border Router (ABR): A router with interfaces attached to multiple OSPF areas.                                    ■   In areas that are too large. so the routing table can                                        become very large.                                    ■   Internal router: A router with all of its interfaces in the same area                                    ■   Backbone router: A router that belongs to backbone area which is.  indicate the name for each LSA type.                      BB3 is advertising to Area 2 that BB4 is the                                           X                      ASBR.                      As DR.                      BB1 and BB3 do not forward these LSAs into            X                      Area 0. R2 sends this LSA type to R3.     instructor.                             X                      BB4 is advertising an external network to                                                        X                      BB3 and BB1. In Table 6-3.                       Table 6-3     Determine the LSA Type                      LSA Scenario                                      Type 1    Type 2        Type 3     Type 4    Type 5                      BB1 is advertising to Area 1 a link to an                                                        X                      external autonomous system. In Table 6-2. the routing table uses different codes to identify the various types of routes.                      BB2 is advertising its directly connected             X                      OSPF-enabled links to BB1 and BB3.                       Table 6-2     Most Common OSPF LSA Types                      LSA Type           Description                      1                  Router LSA                      2                  Network LSA                      3 and 4            Summary LSAs                      5                  AS External LSA                        Refer to Figure 6-1.                      BB2 is advertising the links in Area 0 to the                               X                      routers in Area 1. at the CCNA level we are                      only concerned with the first 5.indb 79                                                                                                              3/12/14 7:51 AM . Briefly describe each of the three OSPF route types shown. indicate which LSA type is used in each of the scenarios.                      Refer to Example 6-1.                                                                                          Chapter 6: Multiarea OSPF        79                          Table 6-1     Indentify the OSPF Router Type                      OSPF Router Type                 BB1    BB2      BB3       BB4       R1         R2      R3       R4                      Internal router                             X              X         X          X          X     X                      Backbone router                  X          X     X        X                      Area Border Router (ABR)         X                X                      Autonomous System                                          X                      Boundary Router (ASBR)                          Multiarea OSPF LSA Operation                      Although the RFCs for OSPF specify up to 11 different LSA types.                          OSPF Routing Table and Types of Routes                      Because of the different LSA types with routes originating from different areas and from non-                      OSPF networks. indb 80                                                                                                               3/12/14 7:51 AM .1.1.16. Serial0/0/0                                  BB1#                                    O: Indicates the router received router (type 1) and network (type 2) LSAs describing the                                 details within an area.0.0. GigabitEthernet0/0                                  C         172. Serial0/0/0                                  O         10.0.0.0/8 is variably subnetted. Calculate intra-area OSPF routes. 00:03:24.0.0. This is an interarea                                 route.0/21 [110/129] via 10.1. Serial0/0/0                                  O IA      172.0.0.0/23 is directly connected. 3 subnets.0.16. 4 masks                                  C         172.0/0 [110/1] via 10.0.0/30 [110/128] via 10.0.                                 O*E2: Indicates the router received an AS External (type 5) LSA either from an ABR or an                                 ASBR.16.1. 00:03:24.0/21 [110/129] via 10.0.                80   CCNA Routing and Switching Practice and Study Guide                                     Example 6-1      A Sample Multiarea OSPF Routing Table                                  BB1# show ip route | begin Gateway                                  Gateway of last resort is 10.0.0. 00:02:16.0/30 is directly connected. 00:03:24.0. Serial0/0/0                                         10.2/32 is directly connected.1/32 is directly connected.16.                                   1.0                                    O*E2   0.1. meaning that the route is intra-area. 00:03:24. GigabitEthernet0/1                                  L         172. GigabitEthernet0/1                                  O         172.0.1.                                   3.16.0.0/23 is directly connected.                                   2.16.0. Serial0/0/0                                  O IA      172. 2 masks                                  C         10.0.5. GigabitEthernet0/0                                  L         172.0.                                 List the steps in order that OSPF uses to calculate the best paths. This is an external route.0. Serial0/0/0                                         172. This section reviews configuring and verify-                                 ing multiarea OSPFv2 and OSPFv3.16.24.                                   Configuring Multiarea OSPF                                 We will use the topology in Figure 6-2 and the addressing in Table 6-4 to configure a dual-                                 stack network running multiarea OSPFv2 and OSPFv3.0.0/16 is variably subnetted.0.0.0.2.1/32 is directly connected. 7 subnets. Calculate best path to interarea OSPF routes.     instructor.0/24 [110/65] via 10.1 to network 0.16.2.16.                                 O IA: Indicates the router received a summary (type 3) LSA from an ABR. Calculate best path route to external non-OSPF networks. the configuration of multiarea OSPF is rather straightforward if you are                                 already comfortable configuring single-area OSPF. Serial0/0/0                                  L         10.                                    Configuring Multiarea OSPF                                 At the CCNA level.0. 2                                 255.1                            255.16.2     instructor.1.255.0.2.2.201.16.255.1 G0/0 G0/1 .1                                            10.1               209.16.2.0.252                                                                  2001:DB8:F:F::1/64                                     Link-Local                   FE80::2                                     Router ID                    2.255.1                                   172.1                      BB2            G0/0                         172.0/24                                                                   2001:DB8:5:1::/64                                                                           G0/0 .255.255.0                                                                  2001:DB8:5:1::1/64                                     S0/0/0                       10.indb 81                                                                                                                         3/12/14 7:51 AM .1                                 Area 2     .0/30                                         2001:DB8:0:E::/64                                       2001:DB8:0:F::/64                                                      .0.0.1.165.1 G0/0 G0/1 .2                                                         S0/0/0                              S0/0/1                                                BB1                                                       BB3                               Area 1   .0/23                   172.255.0.1                                 255.16.1                                 255.0                                                                  2001:DB8:1:1::2/64                                     G0/1                         172.16.24.165.0.1.255. finish documenting the addressing scheme in                      Table 6-4.0.252                                                                  2001:DB8:0:E::1/64                                     S0/0/1                       10.255.1.255.16.201.252                                                                  2001:DB8:0:E::2/64                                     Link-Local                   FE80::1                                     Router ID                    1.255.0.254.252                                                                  2001:DB8:0:F::1/64                                     Lo0                          209.0                               255.0                               255.5.                       Table 6-4      Addressing for the Dual-Stacked Multiarea OSPF Topology                      Device         Interface                    Addressing Information                      BB1            G0/0                         172.0/21                               2001:DB8:1:1::/64    2001:DB8:1:2::/64               2001:DB8:3:1::/64         2001:DB8:3:2::/64                          Based on the addressing shown in the topology.                                                                                                          Chapter 6: Multiarea OSPF   81                          Figure 6-2     Dual-Stacked Multiarea OSPF Topology                                            Area 0                                                                     172.0/23        172.0                                                                  2001:DB8:1:2::2/64                                     S0/0/0                       10.1                               255.2                                                .255.0/30                                                                                              2001:DB8:F:F::/64                                                                                        Lo0                                                                                                                       Internet                                                                            BB2                                                                   .5.0/30                 S0/0/0 S0/0/1                                                                                                    10.0.2.16.255.0/21            172.1                   .16.0.16.254. 3.16.0.2.0.0.0.1. you configure the area as part of the network command in                                 OSPF router configuration mode.1.0 0.255.1.16.0                   255.1.2.0.0.16.16.255 area 1                                 network 10.indb 82                                                                                                                3/12/14 7:51 AM .0. In OSPFv3.1. Include                                 default routing to the Internet with BB2 redistributing the IPv4 and IPv6 default routes to BB1                                 and BB2.                                 !BB1!!!!!!!!!!!!!!!!!!!                                 router ospf 10                                 router-id 1.0. Recall that for OSPFv2.2                                 network 172.0.0.2.0 0.248.5.16.24.16.0.                                 Document the OSPFv2 and OSPFv3 routing configurations for all three routers.255.252                                                                     2001:DB8:0:F::2/64                                              Link-Local             FE80::3                                              Router ID              3.2.3.0.255 area 0                                 network 10.2     instructor.1.0 0.1                                 interface g0/0                                 ipv6 ospf 10 area 1                                 interface g0/1                                 ipv6 ospf 10 area 1                                 interface s0/0/0                                 ipv6 ospf 10 area 0                                 !BB2!!!!!!!!!!!!!!!!!!!                                 ip route 0.3 area 0                                 network 10.                82   CCNA Routing and Switching Practice and Study Guide                                      Device      Interface              Addressing Information                                  BB3         G0/0                   172.0.2. you configure the area as part of the ipv6 ospf                                 command in interface configuration mode.0.0.1                                 network 172.3 area 0                                 ipv6 router ospf 10                                 router-id 1.0 0.0                                                                     2001:DB8:3:1::2/64                                              G0/1                   172.0.0.0 0.255.1.3                                   The only difference between configuring single-area OSPF and multiarea OSPF is assigning the                                 area value.0.248.0                                                                     2001:DB8:3:2::2/64                                              S0/0/1                 10.1                   255.0.0 Lo0                                 ipv6 route ::/0 Lo0                                 router ospf 10                                 router-id 2.255.2                      255.0 0.1.0.0.0 0.255 area 1                                 network 172.3 area 0                                 default-information originate                                 ipv6 router ospf 10                                 router-id 2. 0 0.255.0 0.                                                                                      Chapter 6: Multiarea OSPF   83                         default-information originate                      interface g0/0                      ipv6 ospf 10 area 0                      interface s0/0/0                      ipv6 ospf 10 area 0                      interface s0/0/1                      ipv6 ospf 10 area 0                      !BB3!!!!!!!!!!!!!!!!!!!                      router ospf 10                      router-id 3.24.0 Mask: 255.0                      Document the command to configure BB3 with an interarea summary route.252.0. In Figure 6-2.0.0.3.0                       What is the summary route for the two LANs attached to BB3:                      Address: 172.16.255 area 2                      network 10. BB1 and BB3 can sum-                      marize the two LANs into one network advertisement.0 255.16.     instructor.16.                      What is the command syntax to configure an ABR interarea summary route?                      Router(config-router)# area area-id range address mask                       What is the summary route for the two LANs attached to BB1:                      Address: 172.3.255.16.                      BB1(config-router)# area 1 range 172.3.16.16. you can manually configure ABRs and ASBRs to summarize net-                      works so that they will then inject them into another area. To reduce                      the size of routing tables.3                      network 172.                      BB3(config-router)# area 2 range 172.252.255.16.3.indb 83                                                                                                     3/12/14 7:51 AM .0 0.1.16.3                      interface g0/0                      ipv6 ospf 10 area 2                      interface g0/1                      ipv6 ospf 10 area 2                      interface s0/0/1                      ipv6 ospf 10 area 0                         Configuring Route Summarization for Multiarea OSPFv2                      ABRs do not automatically summarize network addresses across area boundaries.0.0.7.7.240.240.0.16.0 255.255.3 area 0                      ipv6 router ospf 10                      router-id 3.0                       Your OSPF routing tables should look like the output in Example 6-2.255 area 2                      network 172.0                      Document the command to configure BB1 with an interarea summary route.0.0 Mask: 255.  Serial0/0/0                                           172.1. 00:05:59.0.OSPF NSSA ext 2                                   OE2 ::/0 [110/1].0.16.0/30 [110/128] via 10.1 to network 0.0.0.0                                             172.0/0 [110/1] via 10. Serial0/0/1                                   BB2#                                   BB3# show ip route ospf | begin Gateway                                   Gateway of last resort is 10.0. Serial0/0/0                                   BB1#                                   BB2# show ip route ospf | begin Gateway                                   Gateway of last resort is 0. tag 10                                          via FE80::2.                84   CCNA Routing and Switching Practice and Study Guide                                     Example 6-2      Multiarea OSPFv2 and OSPFv3 Routing Tables                                   BB1# show ip route ospf | begin Gateway                                   Gateway of last resort is 10.0.0.0.1. Serial0/0/1                                   OI   2001:DB8:3:2::/64 [110/65]                                          via FE80::3.16.0.0. 4 masks                                   O IA       172. 3 subnets.0/16 is variably subnetted. ON2 .0.0. Serial0/0/0                                   OI   2001:DB8:3:2::/64 [110/129]                                          via FE80::2.1.16. 00:08:36.0.0                                     O*E2    0. Serial0/0/0                                   OI   2001:DB8:1:2::/64 [110/65]                                          via FE80::1.0. 00:08:36.16.indb 84                                                                                          3/12/14 7:51 AM .0.0.0. Serial0/0/0                                   OI   2001:DB8:3:1::/64 [110/129]                                          via FE80::2.0.16.OSPF ext 2.0.0. 00:08:36. 7 subnets.0/24 [110/65] via 10.0 to network 0. Null0                                   O          172.OSPF NSSA ext 1. Serial0/0/0                                   O IA       172.0.1.0/8 is variably subnetted.0/16 is variably subnetted.16.5.1.16.2. Serial0/0/0                                   BB1# show ipv6 route ospf | begin OE2                                            OE2 .0/20 [110/129] via 10.2.0.0.0. 5 masks                                   O          172.0.1.0     instructor. Serial0/0/1                                   BB2# show ipv6 route ospf | begin OI     2001                                   OI   2001:DB8:1:1::/64 [110/65]                                          via FE80::1.0/20 [110/65] via 10. 2 masks                                   O          10.0/22 is a summary.1 to network 0.1. Serial0/0/0                                   OI   2001:DB8:3:1::/64 [110/65]                                          via FE80::3.0.0.0. ON1 . 4 subnets.0.16.16.0/22 [110/65] via 10. Serial0/0/0                                           10.0. 00:08:36. Serial0/0/0                                   O    2001:DB8:5:1::/64 [110/65]                                          via FE80::2. Serial0/0/0                                   O IA       172.0. 00:04:44. Serial0/0/0                                   O    2001:DB8:0:F::/64 [110/128]                                          via FE80::2. 00:09:51.  Serial0/0/1                       O          172. 3 subnets. In Table 6-6.indb 85                                                                                                      3/12/14 7:51 AM .0. Serial0/0/1                       OI   2001:DB8:1:2::/64 [110/129]                              via FE80::2.OSPF NSSA ext 1.0.0.OSPF ext 2.16.0/16 is variably subnetted.0/30 [110/128] via 10.0. 00:05:31.16.0.                       Table 6-5     Multiarea OSPFv2 Verification Commands                      Verification Information             show ip     show ip ospf        show ip     show ip ospf                                                          protocols   interface brief     route ospf    database                      Process ID                             X              X                               X                      State of OSPF Interface                               X                      Networks Configured                    X                      Interface Cost                                        X                      Router ID                              X                                              X                      Administrative Distance                X                                X                      Number of Areas                        X                      Networks from Other Areas                                               X                      All Known Routes                                                                      X                      Total Cost of Route                                                     X                        Verification commands for multiarea OSPFv3 are almost identical to OSPFv2.1. tag 10                              via FE80::2.     instructor.0.5. 2 masks                       O          10.OSPF NSSA ext 2                       OE2 ::/0 [110/1]. 00:05:31.0/0 [110/1] via 10. 00:05:31.0. Serial0/0/1                       BB3#                          Verifying Multiarea OSPF                      In Table 6-5.                                                                                       Chapter 6: Multiarea OSPF   85                           O*E2    0. Serial0/0/1                       OI   2001:DB8:1:1::/64 [110/129]                              via FE80::2.1. ON1 .0.1.1. Serial0/0/1                       O    2001:DB8:0:E::/64 [110/128]                              via FE80::2.0/24 [110/65] via 10.0/20 is a summary.16.1. ON2 . 5 masks                       O IA       172. Serial0/0/1                       O          172. indicate which command or commands will provide the multiarea OSPFv2 verifi-                      cation information. 00:05:31. Null0                       BB3# show ipv6 route ospf | begin OE2                                OE2 . 00:05:31.1.0.0/22 [110/129] via 10. Serial0/0/1                       O    2001:DB8:5:1::/64 [110/65]                              via FE80::2. Serial0/0/1                               172.0. Serial0/0/1                               10.16.                      indicate which command or commands will provide the multiarea OSPFv3 verification informa-                      tion.0.16.1.0/8 is variably subnetted.0.1. 7 subnets. 2.10/RP 8.3.8/RP 8.3.3.9/RP 8.3.3.7/RP 8.6/RP 8.3.2.3.2.2.Troubleshooting Multiarea OSPFv2 and OSPFv3 (SN 6.indb 86                                                                                                          3/12/14 7:51 AM .                86   CCNA Routing and Switching Practice and Study Guide                                     Table 6-6     Multiarea OSPFv3 Verification Commands                                  Verification Information       show ipv6   show ipv6 ospf    show ipv6    show ipv6 ospf                                                                 protocols   interface brief   route ospf      database                                  Administrative Distance                                          X                                  All Known Routes                                                                X                                  Interface Cost                                   X                                  Networks from Other Areas                                        X              X                                  Number of Areas                    X                                  Process ID                         X             X                              X                                  Router ID                          X                                            X                                  State of OSPF Interface                          X                                  Total Cost of Route                                              X                                    Lab .Configuring Multiarea OSPFv2 (SN 6.2.2.7)     instructor.8)                                  Lab .6)                  Activity                                 Packet Tracer .Configuring Multiarea OSPFv3 (SN 6.2.Configuring Multiarea OSPFv3 (SN 6.10)                 Packet Tracer    Packet Tracer .9)                                  Lab .Configuring Multiarea OSPFv2 (SN 6.3.3.2.2.2.3.  EIGRP includes several features that are not commonly found in                      other distance vector routing protocols such as RIP (RIPv1 and RIPv2) and IGRP.                                                                                                        CHAPTER 7                                                                                                              EIGRP                         The main purpose in Cisco’s development of Enhanced Interior Gateway Routing Protocol (EIGRP) was                      to create a classless version of IGRP. it is still a distance vector routing protocol.     instructor. Although EIGRP may                      act like a link-state routing protocol.indb 87                                                                                                           3/12/14 7:51 AM .                                     ■   Maintaining the neighbor and topology tables of EIGRP routers that belong to that                                        protocol suite                                    ■   Building and translating protocol-specific packets for DUAL                                    ■   Interfacing DUAL to the protocol-specific routing table                                    ■   Computing the metric and passing this information to DUAL                                    ■   Implementing filtering and access lists                                    ■   Performing redistribution functions to and from other routing protocols                                    ■   Redistributing routes that are learned by other routing protocols                                 What are the IPv4 and IPv6 multicast addresses used by EIGRP’s RTP?                                 IPv4 uses 224.                                   Identify and Describe EIGRP Packet Types                                 Like the Open Shortest Path First (OSPF) Protocol. unique to EIGRP.                                 What protocol. provides for the delivery of EIGRP packets to neighbors?                                 Reliable Transport Protocol (RTP)                                 What is meant by the statement.0.indb 88                                                                                                                  3/12/14 7:51 AM . EIGRP relies on different types of packets                                 to maintain its tables and establish relationships with neighbor routers.                88   CCNA Routing and Switching Practice and Study Guide                                     Characteristics of EIGRP                                 EIGRP is considered an advanced distance vector routing protocol because it has characteris-                                 tics not found in other distance vector protocols like RIP and IGRP.     instructor.0. Instead.10 and IPv6 uses FF02::A. “EIGRP provides partial and bounded updates”?                                 EIGRP doesn’t send periodic updates (like RIP or IGRP).                                   Describe Basic EIGRP Features                                 A major difference between EIGRP and other distance vector protocols is the algorithm it uses                                 to calculate the best rate. provide a                                 brief description for each EIGRP packet type. These backup routes are maintain in a topology table                                 and can be immediately installed in the routing table if the primary route fails. EIGRP sends out a partial                                 update if there is a change in a route or routes. Bounded means that the partial update is only                                 sent to those routers that need it.                                 Protocol-dependent modules (PDMs) allow EIGRP to route several different network layer                                 protocols. Name and briefly describe this algorithm. List at least four functions of EIGRP’s PDMs.                                 The Diffusing Update Algorithm (DUAL) guarantees a loop-free route and provides backup                                 paths throughout the routing domain. In Table 7-1. indb 89                                                                                                            3/12/14 7:51 AM .                      Hello packets:                         ■   (Reliable/unreliable) (unicast/multicast) sent to the address. This type is actually a Hello packet with a nonzero value in                      the Acknowledgment field.                      Reply packets.                      An EIGRP router assumes that as long as it is receiving Hello packets from a neighbor.544 Mbps = 5 sec.                        Identify Elements of the EIGRP Message Formats                      Figure 7-1 shows an example of an encapsulated EIGRP message. Fill in the missing field                      contents. Neighbors (unicast/multicast) a reply to a query whether they have a route. or 15 seconds on most networks and 180                      seconds on networks with speeds of T1 or slower. to discover and                             maintain neighbors. asking neighbors for a new successor to a lost route.                      Acknowledgment packets.                      When encountered.                      this waiting period is three times the Hello interval. Sent (reliably/unreliably). 224. “Dataless” (unicast/multicast) packet that acknowledges the receipt                      of a packet that was sent reliably. Holdtime tells the router the maximum time the router                      should wait to receive the next Hello before declaring that neighbor as unreachable. circle whether the packet is reliable or unreliable and whether it is unicast                      or multicast. Hello interval (180 holdtime)                               ■   > 1. Hello interval (15 holdtime)                      Update packets. there are two types:                         ■   (Unicast/multicast) to new neighbor discovered. Queries are (unicast/multicast) (reliably/unreliably) during route recomputa-                      tion. If the time expires. EIGRP will declare the                      route as down.10. the                      neighbor and its routes remain viable.544 Mbps = 60 sec. contains routing information                         ■   (Unicast/multicast) to all neighbors when topology changes                      Query packets. contains the router’s neighbor table                         ■   Default Hello interval depends on the bandwidth:                               ■   ≤ 1.                                                                                                   Chapter 7: EIGRP      89                          Table 7-1      EIGRP Packet Types                      Packet Type                   Description                      Hello                         Used to discover other EIGRP routers in the network                      Acknowledgment                Used to acknowledge the receipt of any EIGRP packet                      Update                        Used to convey routing information to known destinations                      Query                         Used to request specific information from a neighbor router                      Reply                         Used to respond to a query                        Complete the missing elements in this exercise by filling in appropriate words or phrases.0.0.     instructor. By default. and DUAL will search for a new path by sending out queries.                 90   CCNA Routing and Switching Practice and Study Guide                                     Figure 7-1    Encapsulated EIGRP Message                                           Data Link Frame        IP Packet          EIGRP Packet                                                                                                        Type/Length/Values Types                                              Header              Header               Header                                          Data Link Frame                                         MAC Source Address = Address of Sending Interface                                         MAC Destination Address = Multicast: 01-00-5E-00-00-0A                                                             IP Packet                                                             IP Source Address = Address of Sending Interface                                                             IP Destination Address = Multicast:                                                             Protocol Field =   for EIGRP                                                                                 EIGRP Packet Header                                                                                 Opcode for EIGRP Packet Type                                                                                                        TLV Types                                                                                                      Some Types Include:                                                                                                      0x0001                                                                                                      0x0102                                                                                                      0x0103                                    Figure 7-1a   Encapsulated EIGRP Message (answer)                                           Data Link Frame        IP Packet          EIGRP Packet                                                                                                        Type/Length/Values Types                                              Header              Header               Header                                          Data Link Frame                                         MAC Source Address = Address of Sending Interface                                         MAC Destination Address = Multicast: 01-00-5E-00-00-0A                                                             IP Packet                                                             IP Source Address = Address of Sending Interface                                                             IP Destination Address = Multicast: 224.                                 Every EIGRP message includes the header as shown in Figure 7-2.0. regardless of its type.0. the Protocol field is set to 88 to indicate EIGRP.0.10.     instructor. Fill in the missing field con-                                 tents.10                                                             Protocol Field = 88 for EIGRP                                                                                 EIGRP Packet Header                                                                                 Opcode for EIGRP Packet Type                                                                                 AS Number                                                                                                      TLV Types                                                                                                      Some Types Include:                                                                                                      0x0001 EIGRP Parameters                                                                                                      0x0102 IP Internal Routes                                                                                                      0x0103 IP External Routes                                     The EIGRP packet header is included with every EIGRP packet. In the IP                                 packet header.indb 90                                                                                                                 3/12/14 7:51 AM . and the destination address is                                 set to the multicast 224.0.  one of the following:                         ■     Update                         ■     Query                         ■     Reply                         ■     Hello                      The number in the AS field is used to track multiple instances of EIGRP. Opcode specifies the EIGRP packet type.                      Encapsulated in the EIGRP packet header is the TLV (Type/Length/Values) shown in Figure                      7-3.                                                                                                                       Chapter 7: EIGRP   91                          Figure 7-2          EIGRP Packet Header                                                 Data Link Frame         IP Packet        EIGRP Packet                                                                                                             Type/Length/Values Types                                                    Header               Header             Header                                      Bit     0                     7 8                   15 16                 23 24                 31                                                     Version                                                 Checksum                                                                                          Flags                               EIGRP                                                                                        Sequence                               Header                                                                                          Ack                                  EIGRP                                                                                      Numbers TLVs                               Message                         Figure 7-2a         EIGRP Packet Header (answer)                                                 Data Link Frame         IP Packet        EIGRP Packet                                                                                                             Type/Length/Values Types                                                    Header               Header             Header                                      Bit     0                     7 8                   15 16                 23 24                 31                                                     Version                Opcode                           Checksum                                                                                          Flags                               EIGRP                                                                                        Sequence                               Header                                                                                          Ack                                                                                    Autonomous System                                EIGRP                                                                                      Numbers TLVs                               Message                         Important fields for our discussion include the Opcode field and the Autonomous System (AS)                      field.indb 91                                                                                                                             3/12/14 7:51 AM . Fill in the missing field contents.                       Figure 7-3          EIGRP Parameters TLV                                     Data Link Frame        IP Packet          EIGRP Packet         Type/Length/Values Types:                                        Header              Header               Header             EIGRP Parameters TLV                         Bit      0                      7 8                   15 16                  23 24                  31                                                  Type = 0x0001                                     Length                       Values                                                               Reserved     instructor.  only bandwidth and delay are weighted. Both are equally weighted.                92   CCNA Routing and Switching Practice and Study Guide                                     Figure 7-3a     EIGRP Parameters TLV (answer)                                                       Data Link Frame      IP Packet      EIGRP Packet        Type/Length/Values Types:                                                          Header            Header           Header            EIGRP Parameters TLV                                            Bit     0                     7 8              15 16                 23 24                   31                                                                   Type = 0x0001                               Length                                                             K1                    K2                    K3                  K4                                        Values                                                             K5               Reserved                        Hold Time                                    This EIGRP parameters message includes the weights that EIGRP uses for its composite metric. the                                 K1 field for bandwidth and the K3 field for delay are both set to 1. therefore.                                 The holdtime is the amount of time the EIGRP neighbor receiving this message should wait                                 before considering the advertising router to be down.                                 By default. The other K values are set                                 to 0. Fill in the missing field contents.                                  Figure 7-4      IP Internal Routes TLV                                                       Data Link Frame      IP Packet      EIGRP Packet        Type/Length/Values Types:                                                          Header            Header           Header             IP Internal Routes TLV                                            Bit     0                     7 8              15 16                  23 24                  31                                                                   Type = 0x0102                                Length                                                                                         Next Hop                                          Values                                                                                   MTU                                    Hope Count                                                         Reliability           Load                  Reserved                                     Figure 7-4a     IP Internal Routes TLV (answer)                                                       Data Link Frame      IP Packet      EIGRP Packet        Type/Length/Values Types:                                                          Header            Header           Header             IP Internal Routes TLV                                            Bit     0                     7 8              15 16                  23 24                  31                                                                   Type = 0x0102                                Length                                                                                         Next Hop                                                                                           Delay                                                                                         Bandwidth                                        Values                                                                                   MTU                                    Hope Count                                                         Reliability           Load                  Reserved                                                        Prefix Length                      Destination     instructor.indb 92                                                                                                                         3/12/14 7:51 AM .                                 Figure 7-4 shows the IP Internal message that is used to advertise EIGRP routes within an                                 autonomous system. 0 has a prefix length of 24.255.                      Figure 7-5 shows the IP External message that is used when external routes are imported into                      the EIGRP routing process.                      The subnet mask is specified as the prefix length or the number of network bits in the subnet                      mask.                      Explain how the delay value is calculated?                      Delay is calculated as the sum of delays from source to destination in units of 10 micro-                      seconds.255. Protocol ID              Flags             route.                                                                                 Delay                                                  Same                                                                               Bandwidth                                                value                                                                                                                                        fields used                                                                     MTU                                            Hope Count                                                                                                                                        in the IP                                         Reliability                Load                      Reserved                                  Internal                                        Prefix Length                            Destination                                            TLV. the subnet mask field (Prefix                      Length). Notice that the bottom half of the IP External TLV includes all the                      fields used by the IP Internal TLV.     instructor. the subnet mask 255.                                                                                                                             Chapter 7: EIGRP        93                          Important fields include the metric fields (Delay and Bandwidth). For example.                       Figure 7-5           IP External Routes TLV                                         Data Link Frame        IP Packet           EIGRP Packet        Type/Length/Values Types:                                            Header              Header                Header             IP External Routes TLV                            Bit       0                       7 8                   15 16                    23 24                   31                                                       Type = 0x0103                                       Length                                                                                                                                          Value                                                                            Originating Routers                                           fields                                                               Originating Autonomous System Number                                       used to                                                                                                                                          track                                                                                Arbitrary Tag                                             external                                                                                                                                          source of                       Values                            Reserved                         Ext. Fill in the missing field contents.indb 93                                                                                                                                        3/12/14 7:51 AM . Protocol ID              Flags             route.                      Explain how the bandwidth value is determined?                      Bandwidth is the lowest configured bandwidth of any interface along the route. and the Destination field.                         Figure 7-5a          IP External Routes TLV (answer)                                     Data Link Frame          IP Packet           EIGRP Packet        Type/Length/Values Types:                                        Header                Header                Header             IP External Routes TLV                          Bit     0                       7 8                     15 16                  23 24                      31                                                   Type = 0x0103                                       Length                                                                               Next Hop                                                 Value                                                                           Originating Routers                                          fields                                                             Originating Autonomous System Number                                       used to                                                                                                                                        track                                                                              Arbitrary Tag                                             external                                                                       External Protocol Metric                                         source of                      Values                           Reserved                         Ext.                                                                                                                                          Same                                                                                                                                          value                                                                                                                                          fields used                                                                       MTU                                           Hope Count                                                                                                                                          in the IP                                           Reliability               Load                        Reserved                                 Internal                                                                                                                                          TLV. 10.16. To stop unnecessary traffic from being sent out an interface where there are no other                                      EIGRP routers.10.                                   Configuring EIGRP with IPv4                                 Briefly explain the purpose of the autonomous system number in EIGRP configurations.13.1.indb 94                                                                                                                                           3/12/14 7:51 AM .                                 We will use the topology in Figure 7-6 and the addressing in Table 7-2 to configure a dual-                                 stack network running EIGRP for IPv4 and IPv6.                                 The autonomous system number functions as a process ID to help routers keep track of mul-                                 tiple running instances of EIGRP. If the router ID is not configured.                                 What are the two main reasons for using the passive-interface command?                                   1.0/24                                           2001:DB8:1:4::/64             G0/1                                                G0/1         2001:DB8:1:6::/64                                                                                           2001:DB8:F::/64     instructor.                                   2.0/23                                 172.10.                                  Figure 7-6      Dual-Stacked Multiarea EIGRP Topology                                                                             10.0/30                                                                                                G0/1                                                                                       G0/0                     2001:DB8:F:F::/64                                                                                                        Lo0                               Internet                                                                                      S0/0/0     HQ                                                                                                       S0/0/1                                                                    172.12.10.4.252/30                                                                   2001:DB8:F:1::/64                          2001:DB8:F:2::/64            10. use the highest IPv4 address loopback interfaces.10.0/22                                                                           2001:DB8:1:1::/64           2001:DB8:1:2::/64                                                                                                                   209.0.16.0/24                                                10. Tweaking EIGRP                                 with more advanced settings is the topic of the next chapter.0/22                10. To provide security to the EIGRP routing process by preventing a rogue device from                                      injecting false or less than optimal routing information. use the highest active IPv4 address of physical inter-                                      faces.165.                                   3.244/30                                  10.10.0/23                                                                             2001:DB8:1:5::/64                                              2001:DB8:1:3::/64                                                                                       768 kbps        512 kbps                                                                          S0/0/0                                        S0/0/1                                                                                                128 kbps                                                                  G0/0                                                            G0/0                                                                           B1     S0/0/1                      S0/0/0    B3                                             10.                                   2.248/30                            172.10. Use the IPv4 address configured with the eigrp router-id command.16.                94   CCNA Routing and Switching Practice and Study Guide                                     Configuring EIGRP for IPv4                                 Implementing EIGRP for IPv4 is with basic configurations is straightforward. It has nothing to do with the autonomous system number                                 assigned by IANA and RIRs to ISPs for their BGP routing configurations                                 What are the steps a Cisco router uses to choose its router ID?                                   1.1.1.8. If no loopbacks are configured.201. 252                                                         2001:DB8:F:2::1/64                                   Lo0                   209.245                 255.255.10.3                        Document the most basic routing commands you could use to configure EIGRP for IPv4.16.                      !B1!!!!!!!!!!!                      router eigrp 1                      eigrp router-id 1.255.3.10.0.165.252.255.1.255.0.255.                                                                                            Chapter 7: EIGRP   95                          Table 7-2    Addressing for the Dual-Stacked EIGRP Topology                      Device       Interface             Addressing Information                      HQ           G0/0                  10.1                      network 10.1.255.255.255.255.253                 255.2.0                                                         2001:DB8:1:5::1/64                                   G0/1                  10.0                                                         2001:DB8:1:1::1/64                                   G0/1                  10.16.10.0                                                         2001:DB8:1:6::1/64                                   S0/0/0                172.1                  255.254.0                                                         2001:DB8:1:3::1/64                                   G0/1                  10.16.255.255.13.2                      B1           G0/0                  10.1.1                   255.12.4.16.1.246                 255.252                                                         2001:DB8:F:1::1/64                                   S0/0/1                172.252                                                         2001:DB8:F::1/64                                   Link-Local            FE80::1                                   Router ID             1.10.255.1                   255.1.0                                                         2001:DB8:1:2::1/64                                   S0/0/0                172.252                                                         2001:DB8:F:1::2/64                                   S0/0/1                172.1.252                                                         2001:DB8:F:F::1/64                                   Link-Local            FE80::2                                   Router ID             2.255.16.252                                                         2001:DB8:F:2::2/64                                   Link-Local            FE80::3                                   Router ID             3.255.1                   255.                      Include the commands to configure the LAN interfaces as passive. The commands for all three                      routers are the same.255.249                255.250                255.indb 95                                                                                                  3/12/14 7:51 AM .10.255.254                255.1                  255.1                  255.8.10.10. except for the router ID configuration for each router.1.252                                                         2001:DB8:F::2/64                                   S0/0/1                172.0.1.255.1.255.0     instructor.201.252.3.255.1                255.16.255.1.254.0                                                         2001:DB8:1:4::1/64                                   S0/0/0                172.1                      B3           G0/0                  10.2.255.255. 0 0.0. for each router.16.1.0.0.10.1.0.0.4.3.252 0.3.10.3.3     instructor.0.0.0.0                                 no network 172.0.0.0.16.0.255                                 network 172.10.1.255                                 network 10.3                                 network 172.                96   CCNA Routing and Switching Practice and Study Guide                                    network 172.10.0.2.255                                 network 172.2                                 network 10.0.0                                 passive-interface g0/0                                 passive-interface g0/1                                 !B3!!!!!!!!!!!                                 router eigrp 1                                 eigrp router-id 3.0                                 no network 172.255                                 network 10.0.252 0.16.indb 96                                                                                                              3/12/14 7:51 AM .13.0 0. document the network commands you would configure if the policy                                 stated that you must also configure the wildcard mask for each interface participating in the                                 EIGRP routing domain.1.0.0                                 network 172.16.0                                 network 10.10.16.16.0.16.0.8.0.0 0.0 0.0.0.0.0.0.0                                 network 10.0.3                                 !HQ!!!!!!!!!!!                                 router eigrp 1                                 no network 10.248 0.3.248 0.0                                 passive-interface g0/0                                 passive-interface g0/1                                  Now.0.3                                 network 10.0                                 no network 172.0                                 network 172.0                                 network 10.0.0.0.12.16.0.3                                 !B3!!!!!!!!!!!                                 router eigrp 1                                 no network 10.0 0.0 0.2.0.0.16.1.10.10.                                 !B1!!!!!!!!!!!                                 router eigrp 1                                 no network 10.0.16.255                                 network 10.1.0                                 passive-interface g0/0                                 passive-interface g0/1                                 !HQ!!!!!!!!!!!                                 router eigrp 1                                 eigrp router-id 2.255                                 network 172.  K4=0.                       Example 7-1      EIGRP Neighbor Table for HQ                       HQ# show ip eigrp neighbors                       EIGRP-IPv4 Neighbors for AS(1)                       H     Address                  Interface                Hold Uptime     SRTT   RTO    Q   Seq                                                                               (sec)           (ms)         Cnt Num                       1     172. Because this configuration was done on a router with IOS 15.                      Use the show ip eigrp neighbors command to view the neighbor table and verify that EIGRP                      has established an adjacency with its neighbors. auto-                      matic summarization is disabled by default.2.254             Se0/0/1                    14 00:28:35      2   100    0   33                       0     172.1.                       Example 7-2      Verifying EIGRP Is Enabled on HQ                       HQ# show ip protocols                       *** IP Routing is NSF aware ***                         Routing Protocol is "eigrp 1"                           Outgoing update filter list for all interfaces is not set                           Incoming update filter list for all interfaces is not set                           Default networks flagged in outgoing updates                           Default networks accepted from incoming updates                           EIGRP-IPv4 Protocol for AS(1)                             Metric weight K1=1.250             Se0/0/0                    10 00:28:48      1   100    0   36                         As with OSPF. This command enables you to verify and trou-                      bleshoot EIGRP.1. Example 7-1 shows the neighbor table for HQ. routers must establish adjacencies with                      their neighbors.                                                                                              Chapter 7: EIGRP       97                          Verifying EIGRP with IPv4                      Before any updates can be sent or received by EIGRP. EIGRP routers establish adjacencies with neighbor routers by exchanging                      EIGRP Hello packets. K5=0                             NSF-aware route hold timer is 240                             Router-ID: 2.indb 97                                                                                                        3/12/14 7:51 AM .2                             Topology : 0 (base)                               Active Timer: 3 min                               Distance: internal 90 external 170                               Maximum path: 4                               Maximum hopcount 100                               Maximum metric variance 1                             Automatic Summarization: disabled                           Maximum path: 4     instructor. you can use the show ip protocols command shown in Example 7-2 to verify                      that EIGRP is enabled.16. K3=1.1. K2=0.16.2.  2 masks                                  D        172.246.0.10.10.0.0.1.1.4.10.1.0.4.1.249.0/16 is variably subnetted.                98   CCNA Routing and Switching Practice and Study Guide                                          Routing for Networks:                                        10.1.0/22                                        10.250            90      00:29:47                                      Distance: internal 90 external 170                                    Another way to verify that EIGRP and other functions of the router are configured properly is                                 to examine the routing tables with the show ip route command.248/30                                        172. Serial0/0/0                                  D         10.16.0/24 [90/2684416] via 172. notice that the output begins at the “Gateway of last resort is not set” statement.249.0/8 is variably subnetted.16. 5 subnets.16.10.16.16.252/30                                      Passive Interface(s):                                        GigabitEthernet0/0                                        GigabitEthernet0/1                                      Routing Information Sources:                                        Gateway           Distance      Last Update                                        172.1.0/24 [90/2684416] via 172.249.10.indb 98                                                                                                               3/12/14 7:51 AM .16. 8 subnets. Serial0/0/0                                  D         10. which stands for DUAL.16. Serial0/0/0                                  D         10.0/22 [90/2172416] via 172.16.13.249.0/22 [90/2172416] via 172. 00:43:44.0. What                                 command generated this output?                                 show ip route eigrp | begin Gateway                                  Example 7-3      B1 Routing Table with EIGRP Routes                                  B1# show ip route eigrp | begin Gateway                                  Gateway of last resort is not set                                           10. 4 masks                                  D         10. Serial0/0/0                                        172.10.1.16.1. EIGRP routes are denoted in                                 the routing table with a D.                                 Also.1. 00:43:31. Serial0/0/1                                  B1#     instructor. 00:43:44.0/22                                        172.                                 Example 7-3 shows output from the routing table for B1 with only the EIGRP routes shown.12.254            90      00:29:47                                        172. 00:43:31.16.16.252/30 [90/2681856] via 172.1. 00:00:05. 5)                                       Packet Tracer .000 bps. This metric is a static                                      value and is expressed in microseconds.2. The WIC-2T and HWIC-2T use the                                      default value of 1. We will review modifying the band-                                      width calculation to reflect actual values in the next chapter. which is the value for a T1 connection.2.                                        EIGRP Metric Concepts                                      List the values EIGRP uses in its composite metric to calculate the preferred path to a network:                                         ■   Bandwidth                                         ■   Delay                                         ■   Reliability                                         ■   Load                                      Record the formula used to calculate the default EIGRP composite metric.indb 99                                                                                                                            3/12/14 7:51 AM .Configuring Basic EIGRP with IPv4 (SN 7. This section reviews the values of the EIGRP metric and how EIGRP performs                                      the calculation to arrive at the metric displayed in the routing table.                                       Table 7-3      Interface Delay Values                                      Media                                   Delay                                      Ethernet                                1000                                      Fast Ethernet                           100                                      Gigabit Ethernet                        10                                      FDDI                                    100                                      T1 (serial default)                     20.2. If actual bandwidth of the link dif-                                      fers from the default value.4)                      Packet Tracer                        Activity                                         Operation of EIGRP                                      EIGRP uses the Diffusing Update Algorithm (DUAL) to select the best routes based on a com-                                      posite metric.                                      Delay is a measure of the time it takes for a packet to traverse a route.Configuring Basic EIGRP with IPv4 (SN 7.                                      Default metric = [K1 * Bandwidth + K3 * Delay] * 256                                      What command can you use to change the default K values?                                      Router(config-router)# metric weights tos k1 k2 k3 k4 k5                                       What command do you use to verify the K values used by EIGRP?                                      show ip protocols                                      What command enables you to verify the actual values of the EIGRP metric?                                      show interface                                      The bandwidth metric is displayed in Kbit (kilobits).                                                                                                                   Chapter 7: EIGRP      99                                          Lab .5/RP 4.000     instructor. you should modify the value.2.544.2.2.4/RP 4.                                      Complete Table 7-3.2.2. The value may or may                                      not reflect the actual physical bandwidth of the interface. 16. 8 subnets.0/22 [90/2172416] via 172. 2 masks                                  D            172.0.1. because the EIGRP composite metric defaults to bandwidth and delay only.16.16. Serial0/0/0                                  D            10.10.16.                                 Examine the following output for B1’s routing table shown in Example 7-4.249.13. 03:06:49.10.0/24 [90/2684416] via 172. reliabil-                                 ity and load are not normally considered in the calculation of metric.                                 However.000                                  1024 Kbps                             20.249.16.                                 A successor is a neighboring router that is used for packet forwarding and is the least-cost                                 route to the destination network.                                   DUAL Concepts Exercise                                 Dual provides the following:                                      ■   Loop-free paths                                      ■   Loop-free backup paths which can be used immediately                                      ■   Fast convergence                                      ■   Minimum bandwidth usage with bounded updates                                 Briefly explain the term successor. Serial0/0/0                                  D            10.000                                  56 Kbps                               20. 03:06:49.indb 100                                                                                                            3/12/14 7:51 AM .1. 03:06:50. Serial0/0/0                                  D            10.                                 Feasible distance (FD) is the lowest calculated metric to reach the destination network.252/30 [90/2681856] via 172.249.4.12.1.0/16 is variably subnetted.0/22 [90/2172416] via 172.1.249.0. 4 masks                                  D            10.               100    CCNA Routing and Switching Practice and Study Guide                                      Media                                 Delay                                  DS0 (64 Kbps)                         20.10. 03:06:49. 5 subnets.1.                                 Load is based on the worst value on a particular link and is computed based on packet rates.                                 Briefly explain what is meant by feasible distance. 03:06:49. Serial0/0/0     instructor.1.16.249.16.0.10. Serial0/0/0                                            172.0.0/24 [90/2684416] via 172.                                  Example 7-4       Feasible Distance and Successors in the B1 Routing Table                                  B1# show ip route eigrp | begin Gateway                                  Gateway of last resort is not set                                              10.0/8 is variably subnetted.000                                   Reliability is based on the worst value on a particular link and is computed based on keep-                                 alives. 16. A .1.249.16.indb 101                                                                                                      3/12/14 7:51 AM .16. 1 successors.0/24? 2684416                       Briefly explain the term feasible successor.1. FD is 3845120                                 via Connected. Serial0/0/0                        P 172. Serial0/0/0                                 via 172.                       The successor. feasible distance. FD is 2684416                                 via 172.                        Example 7-5     Successors and Feasible Successors in the B1 Topology Table                        B1# show ip eigrp topology                        EIGRP-IPv4 Topology Table for AS(1)/ID(1.16. FD is 2681856                                 via 172.                                r . 1 successors.1.16.12. which is HQ                       What is the feasible distance to 10. This table can be viewed                       using the show ip eigrp topology command.1. The reported distance is the metric that a router reports to a                       neighbor about its own cost to that network. Serial0/0/0                        P 172.                       The feasibility condition (FC) is met when a neighbor’s reported distance (RD) to a network is                       less than the local router’s feasible distance to the same destination network.1.Query.4.Active.246 (3847680/28160). Q .0/22.Reply.1.12.1.0/22? 172.16. Serial0/0/1                        P 10. Serial0/0/1     instructor. GigabitEthernet0/0                        P 172.10.244/30.10. s . Serial0/0/1                        P 10.10. Serial0/0/0                                 via 172.                       Briefly explain reported distance. 1 successors.10. FD is 2172416                                 via 172.Update.12. R .10.1. and any feasible successors with their reported distances are                       kept by a router in its EIGRP topology table or topology database. 1 successors.249 (2172416/28160).                                                                                                Chapter 7: EIGRP   101                           Answer the questions that follow:                       What is the IP address of the successor for network 10.16. 1 successors.0/23.1.                       The reported distance or advertised distance is simply an EIGRP neighbor’s feasible distance                       to the same destination network. FD is 28160                                 via Connected.1. 1 successors.Passive.249 (2681856/2169856). as shown in Example 7-5.249 (2684416/2172416).1.reply Status.1.0/24? 172.sia Status                          P 10.249.8.10.16.16.1)                        Codes: P .246 (4357120/2169856).4. FD is 2169856                                 via Connected.0/24.252/30.4.                       A backup path to other routers maintained in a separate table so that DUAL does not have to                       be recomputed when the successor becomes unavailable.10.0/22? 2172416                       What is the IP address of the successor for network 10. A feasible successor satisfies the fea-                       sibility condition                       Briefly explain feasibility condition. which is HQ                       What is the feasible distance to 10. U .248/30.16.  Serial0/0/1                                  P 10.249                                 What is the reported distance of the successor? 2172416                                 What is the feasible distance of the successor? 2684416                                 What is the IP address of the feasible successor? 172.                                 What is the IP address of the successor? 172. what events cause                                 those states.16. and what events result from those states.1. or routing algorithm will react to a set of input events.0/24.16.indb 102                                                                                                                 3/12/14 7:51 AM .0/22. 1 successors. 1 successors.12.10.16.10.13.                                   DUAL FSM Completion Exercise                                 A finite state machine (FSM) is an abstract machine.249 (2172416/28160). Designers use FSMs to describe how a                                 device. GigabitEthernet0/1                                    The topology table lists all successors and feasible successors that DUAL has calculated to des-                                 tination networks.0.     instructor.246 (3847680/28160).                                 Figure 7-7 is a simplified flowchart of DUAL’s FSM.16.10. Serial0/0/0                                           via 172..                                 What happens if an EIGRP router doesn’t have feasible successor in the topology table and the                                 router loses connection to the successor?                                 Then DUAL must be recomputed and neighbors queried for a possible backup route. FSMs define a set of possible states that something can go through.1. Fill in the flowchart with the states EIGRP                                 moves through when it loses connectivity with a successor. FD is 2172416                                           via 172.249 (2684416/2172416).1. 1 successors.0/24.0/23.1.10.. not a mechanical device with moving                                 parts. The flowchart should serve as a                                 visual study aid to help you remember how DUAL converges on new routes. FD is 2684416                                           via 172. FD is 28160                                           via Connected.16.               102    CCNA Routing and Switching Practice and Study Guide                                      P 10. computer program.1.10. Serial0/0/0                                  P 10.246                                 What is the reported distance of the feasible successor? 28160                                 What is the feasible distance of the feasible successor? 3847680                                 Notice that the reported distance of the feasible successor is less than the feasible distance of                                 the successor. Use the partial output in Example 9-5 to answer the following questions:                                 For route 10.                                                                                       Chapter 7: EIGRP   103                           Figure 7-7   DUAL FSM Flowchart                                                             Lost Connectivity to                                                                Successor                                                         Yes                          No                                                         Yes                                                                         No     instructor.indb 103                                                                                            3/12/14 7:51 AM .      instructor. in         Network from Topology                                                 Topology Table                 and Routing Tables                                     7. No need to configure network statements. assigning a router ID. or both.4. EIGRP for                                 IPv6.3.4 Packet Tracer . indicate whether an EIGRP feature is associated with EIGRP for IPv4. Configuring EIGRP                                 for IPv6 is actually easier than IPv4.indb 104                                                                                                                  3/12/14 7:51 AM .Investigating DUAL FSM                                    Configuring EIGRP for IPv6                                 EIGRP for IPv4 and EIGRP for IPv6 are almost identical in their operation. Then enable EIGRP on each interface you want                                 to participate in the EIGRP routing process.                                   Comparing EIGRP for IPv4 and EIGRP for IPv6                                 In Table 7-4.               104    CCNA Routing and Switching Practice and Study Guide                                     Figure 7-7     DUAL FSM Flowchart (answer)                                                                                  Lost Connectivity to                                                                                     Successor                                                                             Yes         Feasible          No     Place Destination                                              Promote to Successor                                                                                    Successor?              Network in Active State                                                   Install Successor in                                                  Routing Table                                                                             Yes       One or More               Query Neighbors for                                              Select New Successor                                                                                   New Routes?                  New Route                                                                                              No                                                   Install Feasible               Remove Destination                                              Successor(s). Simply enable                                 EIGRP for IPv6 globally. if any. 0.10 multicast                                      X                       FF02::10 multicast                                                             X                           Configuring and Verifying EIGRP for IPv6                       The steps to configure EIGRP for IPv6 are as follows:                       Step 1.indb 105                                                                                                        3/12/14 7:51 AM .                       Instructor Note: Although not required of the student.                       Step 2. and bounded updates                                                 X                       Neighbor discovery: Hello packets                                                         X                       224. partial.2.2.                       !HQ!!!!!!!!!!!                       en                       conf t                       ipv6 unicast-routing                       ipv6 router eigrp 1                       eigrp router-id 2. the IPv6 interface addressing is also                       including in the following scripts.                       With those steps in mind.                                                                                                 Chapter 7: EIGRP    105                           Table 7-4      Comparing EIGRP for IPv4 and IPv6                       Features                                           EIGRP for IPv4     EIGRP for IPv6     Both                       Advertised IPv4 networks                                  X                       Advertised IPv6 networks                                                       X                       Distance vector                                                                           X                       DUAL algorithm                                                                            X                       Default metric: bandwidth and delay                                                       X                       Transport protocol: RTP                                                                   X                       Incremental.0. document the configurations for each router shown in Figure 7-6.     Enable IPv6 routing.2                       no shutdown                       interface g0/0                       ipv6 address 2001:db8:1:1::1/64                       ipv6 address fe80::2 link-local                       ipv6 eigrp 1                       no shutdown                       interface g0/1                       ipv6 address 2001:db8:1:2::1/64                       ipv6 address fe80::2 link-local                       ipv6 eigrp 1                       no shutdown                       interface s0/0/0                       ipv6 address 2001:db8:f:1::1/64                       ipv6 address fe80::2 link-local     instructor.                       Step 3.     Enable the interfaces that are to participate in EIGRP for IPv6.     Enable EIGRP for IPv6 globally and configure the router ID. 3.3.3     instructor.               106    CCNA Routing and Switching Practice and Study Guide                                    ipv6 eigrp 1                                 no shutdown                                 interface s0/0/1                                 ipv6 address 2001:db8:f:2::1/64                                 ipv6 address fe80::2 link-local                                 ipv6 eigrp 1                                 no shutdown                                 int lo0                                 ipv6 address 2001:db8:f:f::1/64                                 end                                 !B1!!!!!!!!!!!                                 en                                 conf t                                 ipv6 unicast-routing                                 ipv6 router eigrp 1                                 eigrp router-id 1.indb 106                                                         3/12/14 7:51 AM .1                                 no shutdown                                 interface g0/0                                 ipv6 address 2001:db8:1:3::1/64                                 ipv6 address fe80::1 link-local                                 ipv6 eigrp 1                                 no shutdown                                 interface g0/1                                 ipv6 address 2001:db8:1:4::1/64                                 ipv6 address fe80::1 link-local                                 ipv6 eigrp 1                                 no shutdown                                 interface s0/0/0                                 ipv6 address 2001:db8:f:1::2/64                                 ipv6 address fe80::1 link-local                                 ipv6 eigrp 1                                 no shutdown                                 interface s0/0/1                                 ipv6 address 2001:db8:f::1/64                                 ipv6 address fe80::1 link-local                                 ipv6 eigrp 1                                 no shutdown                                 end                                 !B3!!!!!!!!!!!                                 en                                 conf t                                 ipv6 unicast-routing                                 ipv6 router eigrp 1                                 eigrp router-id 3.1.1.  K4=0.indb 107                                                                                                     3/12/14 7:51 AM . process ID. router                       ID. K2=0. K3=1. and administrative distances?                        B1# show ipv6 protocols                       IPv6 Routing Protocol is "connected"                       IPv6 Routing Protocol is "eigrp 1"                       EIGRP-IPv6 Protocol for AS(1)                           Metric weight K1=1.                                                                                            Chapter 7: EIGRP      107                          no shutdown                       interface g0/0                       ipv6 address 2001:db8:1:5::1/64                       ipv6 address fe80::3 link-local                       ipv6 eigrp 1                       no shutdown                       interface g0/1                       ipv6 address 2001:db8:1:6::1/64                       ipv6 address fe80::3 link-local                       ipv6 eigrp 1                       no shutdown                       interface s0/0/0                       ipv6 address 2001:db8:f::2/64                       ipv6 address fe80::3 link-local                       ipv6 eigrp 1                       no shutdown                       interface s0/0/1                       ipv6 address 2001:db8:f:2::2/64                       ipv6 address fe80::3 link-local                       ipv6 eigrp 1                       no shutdown                       end                        What command enables you to verify adjacency with other EIGRP routers?                        B1# show ipv6 eigrp neighbors                       EIGRP-IPv6 Neighbors for AS(1)                       H     Address                 Interface              Hold Uptime     SRTT   RTO    Q   Seq                                                                            (sec)           (ms)         Cnt Num                       1     Link-local address:     Se0/0/1                  11 00:14:52      1   186    0   50                             FE80::3                       0     Link-local address:     Se0/0/0                  12 00:14:53      1   100    0   25                             FE80::2                         What command enables you to display the EIGRP parameters.1.1                           Topology : 0 (base)                             Active Timer: 3 min     instructor.1. including the K values. K5=0                           NSF-aware route hold timer is 240                           Router-ID: 1.  Serial0/0/0                                 D     2001:DB8:1:6::/64 [90/2684416]                                        via FE80::2.ND Default.OSPF Inter. Serial0/0/0                                   Lab .Static.Configuring Basic EIGRP for IPv6 (SN 7.4. IS .3. S . L .ISIS summary. Serial0/0/0                                 D     2001:DB8:1:5::/64 [90/2684416]                                        via FE80::2.4.indb 108                                                                                                       3/12/14 7:51 AM . H . Serial0/0/0                                 D     2001:DB8:1:2::/64 [90/2172416]                                        via FE80::2. IA .5)                                  Packet Tracer .ISIS interarea. R .3.               108    CCNA Routing and Switching Practice and Study Guide                                          Distance: internal 90 external 170                                       Maximum path: 16                                       Maximum hopcount 100                                       Maximum metric variance 1                                       Interfaces:                                       Serial0/0/0                                       Serial0/0/1                                       GigabitEthernet0/0                                       GigabitEthernet0/1                                     Redistribution:                                       None                                 IPv6 Routing Protocol is "ND"                                   What command enables you to verify the EIGRP routes are installed in the routing table?                                  B1# show ipv6 route eigrp                                 IPv6 Routing Table . Serial0/0/0                                 D     2001:DB8:F:2::/64 [90/2681856]                                        via FE80::2.default . ND .ISIS L2.5/RP 4.Local.ND Prefix.5)                Packet Tracer                  Activity     instructor.OSPF ext 1                                          OE2 . O .3.Redirect. NDp .ISIS L1                                          I2 . I1 .Destination                                          NDr .Connected.Per-user Static route                                          B .BGP.14 entries                                 Codes: C . OE1 .4.4.OSPF ext 2. U .OSPF NSSA ext 2                                 D     2001:DB8:1:1::/64 [90/2172416]                                        via FE80::2. D . ON2 . DCE .RIP.3.OSPF NSSA ext 1.OSPF Intra.EIGRP external.4/RP 4.EIGRP                                          EX . ON1 . OI .NHRP.Configuring Basic EIGRP with IPv6 (SN 7.      instructor.                                                                                                           CHAPTER 8                                              EIGRP Advanced Configurations and                                                              Troubleshooting                        This chapter reviews the various ways you can adjust your Enhanced Interior Gateway Routing                       Protocol (EIGRP) implementation to provide additional capabilities and functionality. In addition. trou-                       bleshooting EIGRP is also covered.indb 109                                                                                                              3/12/14 7:51 AM . 10.                                 Automatic summarization is disabled by default in IOS 15 and later.0. What command including                                 the router prompt will enable automatic summarization?                                 Router(config-router)# auto-summary     instructor.                                  Table 8-1     Determine the Classful Networks Advertised by an EIGRP Router                                  Subnets                                        Classful Networks                                  10.0 WAN links.1. record the classful                                 address advertised by the router for each listing of subnets.0/23                                                          10.0. so the update from the neighbor is stored in the topology                                 table.0. automatic summarization in EIGRP was enabled by                                 default.16.               110    CCNA Routing and Switching Practice and Study Guide                                     Advanced EIGRP Configurations                                 Now that you are familiar with the basic configuration and verification commands for imple-                                 menting EIGRP. 192.0/24.2. the addressing scheme is dis-                                 contiguous.168.2.10.1.0.10.0.168. this section focuses on ways you can tweak the implementation to improve                                 performance.0/16                                  192. In Table 8-1. they will not advertise the specific sub-                                 nets that belong to 10.128/25.1.12.16.              192. enable load balancing.                                   Automatic Summarization                                 Before Cisco IOS 15.128/25                                   EIGRP automatic summarization should be used only if you are absolutely sure that you do                                 not have any discontiguous subnets.                                 Automatic summarization occurs at classful boundaries.168.                                 Assume an EIGRP router is using automatic summarization. B.0/25.0/22                 172. 192.0/24    10.0/8 address space.168.2(33).0/24.0/24                                                               B1                                      B3                                    If you enable automatic summarization on the routers.indb 110                                                                                                                 3/12/14 7:51 AM . they automatically sum-                                 marize the subnets to 10. Instead.0.252/30                                             10.0.0/22                                                                                 HQ                                                            172.10.10.16. 10.16.01(1)M and 12.8.0.0/25.168.16.248/30                      172. or C network will only advertise that network.0/24.1.0/8 across the 172.1.10.18.0/8 and advertise the classful network.0/24                                  192.10.0/22. But each router already has                                 a link in the 10. in Figure 8-1. 10. So an EIGRP router with several sub-                                 nets of a Class A.0/8                                  172.2.                                  Figure 8-1    EIGRP Automatic Summarization Topology with Discontiguous Subnets                                                            10.16. No routes to the subnets are installed.0.0. 172.11. Briefly explain the concept of automatic summarization.12.0.16. 192. and authenticate updates between EIGRP neighbors.168. For example. 254            90       00:01:30                             172.16.1.0.indb 111                                                                                                    3/12/14 7:51 AM .2. K2=0.16.0/16 for Gi0/0                               Summarizing 2 components with metric 2169856                             10.0.0. use the show ip eigrp topology all-links                       command to generate the output displayed in Example 8-2.0                          Routing Information Sources:                             Gateway           Distance       Last Update                             172. K4=0. Se0/0/1                               Summarizing 1 component with metric 28160                          Maximum path: 4                          Routing for Networks:                             10.16.0                             172.                        Example 8-1      Verifying Automatic Summarization Is in Effect                        HQ# show ip protocols                        *** IP Routing is NSF aware ***                          Routing Protocol is "eigrp 1"                          Outgoing update filter list for all interfaces is not set                          Incoming update filter list for all interfaces is not set                          Default networks flagged in outgoing updates                          Default networks accepted from incoming updates                          EIGRP-IPv4 Protocol for AS(1)                             Metric weight K1=1.0. K3=1.250            90       00:01:30                          Distance: internal 90 external 170                          To view the entire EIGRP topology table for HQ.1.0/8 for Se0/0/0.                                                  Chapter 8: EIGRP Advanced Configurations and Troubleshooting   111                           You can verify whether automatic summarization is enabled with the show ip protocols com-                       mand displayed in Example 8-1 for HQ from Figure 8-1.     instructor.16.2. K5=0                             NSF-aware route hold timer is 240                             Router-ID: 2.0.0.2                             Topology : 0 (base)                               Active Timer: 3 min                               Distance: internal 90 external 170                               Maximum path: 4                               Maximum hopcount 100                               Maximum metric variance 1                            Automatic Summarization: enabled                             172. 0/16 is a summary. U .Reply. GigabitEthernet0/0                                    You can see that HQ has a route for 10. 3 masks                                  D          172.0/16 is variably subnetted.0.0.16. This will help reduce the size of routing tables. Q .0/22. Serial0/0/1                                  P 172.250 (2172416/28160). FD is 2169856.Update.248/30.0.                                 The Null0 interface is installed in the routing table to prevent routing loops.                                  Example 8-3      Verifying the Summary Route Installed on HQ                                  HQ# show ip route eigrp | begin Gateway                                  Gateway of last resort is not set                                           10. FD is 28160.                                   Manual Summarization                                 In EIGRP design scenarios where it is not desirable to prevent discontiguous subnets. 5 subnets. Serial0/0/1                                  P 10. Serial0/0/0                                            via 172.0.Query. This is the route installed and                                 used by HQ.252/30.0/8 is variably subnetted.0. 00:09:01. R .1.254 (2172416/28160). Serial0/0/0                                  P 172. serno 8                                            via Connected. 1 successors.16. s .2.Active.               112    CCNA Routing and Switching Practice and Study Guide                                     Example 8-2      Viewing the Complete EIGRP Topology Table                                   HQ# show ip eigrp topology all-links                                  EIGRP-IPv4 Topology Table for AS(1)/ID(2.indb 112                                                                                                                3/12/14 7:51 AM .1.0. you may                                 still want to encourage scalable designs so that you can take advantage of EIGRP’s manual                                 summarization. 3 subnets. A .Passive.16. Null0                                         172. FD is 2169856.0.0. 1 successors. FD is 2169856. as verified with the show ip route eigrp command displayed in Example 8-3.0/16.16.reply Status. Null0                                  P 10. serno 4                                            via Summary (2169856/0).1.                                          r .sia Status                                    P 172. Null0                                    Briefly explain the purpose of the Null0 interface.0. serno 1                                            via Connected.     instructor.16. serno 2                                            via Connected.10. 3 masks                                  D          10.0.0.                                 However.0/8.2)                                  Codes: P . 00:08:42. serno 3                                            via Summary (28160/0). 1 successors.0. Null0                                            via 172. 1 successors.16.1. it also has its own summary route with a better metric.16.0/8 is a summary.2. FD is 28160.0/8 from both B1 and B3 in its topology table. 1 successors. 165.                       Step 3. “EIGRP.10. now the                       topology shows the contracted bandwidth rates on each of the serial interfaces.” However. find all the bits that match consecutively.                        Figure 8-2      Dual-Stack EIGRP Topology with Bandwidths                                                                    10.244/30                                  10. which in this example is 22.      Count the number of far-left matching bits.10.     instructor.10.4.10.      When there is a column of bits that do not match. start with the far-left bit.                       Once you have your summary.0/22                                                                 2001:DB8:1:1::/64           2001:DB8:1:2::/64                                                                                                         209. each router can summarizes the two local LANs into one summary route.0/22                10.10.                       In Figure 8-2.                        Note: The bandwidths shown in Figure 8-2 are not realistic for today’s network implementations that                       require gigabit speeds across WAN links. use the same technique you used to calculate a IPv4                       static summary routes:                       Step 1. Each interface that will send out an EIGRP update should have the command. This                                    number is used to determine the subnet mask for the summarized route: /22 or                                    255.0.10.indb 113                                                                                                                                      3/12/14 7:51 AM .16.10. This is the summary                                    boundary. These bandwidths are used for simplicity.13.0/24                                      10.                       Step 4.1. copy the matching 22 bits and add                                    all 0 bits to the end to make 32 bits.0.16.1.                       Step 6.                       Calculate the summary routes for each route and record the commands to configure the serial                       interfaces.8.252/30                                                         2001:DB8:F:1::/64                          2001:DB8:F:2::/64            10.255.0/30                                                                                      G0/1                                                                             G0/0                     2001:DB8:F:F::/64                                                                                              Lo0                               Internet                                                                            S0/0/0     HQ                                                                                             S0/0/1                                                          172.                       Step 2. We will use                       that information later to tune how EIGRP chooses the best route.                                                          Chapter 8: EIGRP Advanced Configurations and Troubleshooting                             113                           IPv4 Manual Summarization                       Figure 8-2 shows the same EIGRP topology we used in Chapter 7.      To find the subnet mask for summarization.1.252.      To find the network address for summarization.201.16.                       Step 5.0/24                                  2001:DB8:1:4::/64            G0/1                                                G0/1         2001:DB8:1:6::/64                                                                                 2001:DB8:F::/64                           To calculate the IPv4 summary routes.248/30                            172. stop.      Working from left to right.12. configure the desired interfaces with the ip summary-address                       eigrp command.0/23                                                                             2001:DB8:1:5::/64                                    2001:DB8:1:3::/64                                                                             768 kbps        512 kbps                                                                S0/0/0                                        S0/0/1                                                                                      128 kbps                                                        G0/0                                                            G0/0                                                                 B1     S0/0/1                      S0/0/0    B3                                    10.      Write out the networks to be summarized in binary.0/23                                172. 0.0/8 is variably subnetted.0/22                                 Command to configure Serial 0/0/0 and Serial 0/0/1:                                 ip summary-address eigrp 1 10.12.10.16.254.                                  Note: We have not yet configured the bandwidth values shown in Figure 8-2.12.0/21 [90/2172416] via 172.0.8.10.252.0/22             10.10.10.250.8.10.249. 4 masks                                  D          10.0/8 is variably subnetted.16.0                                  B3                                 Summary Route: 10.10. 2 masks                                  D          172. 00:01:43.16. 00:00:54.0                                  The following calculations focus on the third octet:                                                              HQ                      B1                       B3                                                             00000000                00001000                 00001100                                   LAN 2                      00000100                00001010                 00001101                                   Summary Route              10.0                                  B1                                 Summary Route: 10.1. Serial0/0/0                                  B1# show ip route eigrp | begin Gateway                                  Gateway of last resort is not set                                            10.10.255.0/22 is a summary.0.0/21            10.0/16 is variably subnetted.0/23 [90/2172416] via 172.10. 00:06:50. 00:01:43. your EIGRP routing tables                                 should look like Example 8-4. 00:06:21.10.12.10.10. 00:01:13. 4 masks                                  D          10.254.255. Null0     instructor.8.16.1.1.1.10.0/23                                 Command to configure Serial 0/0/0 and Serial 0/0/1:                                 ip summary-address eigrp 1 10.               114    CCNA Routing and Switching Practice and Study Guide                                     HQ                                 Summary Route: 10.254.16.0.0/23                                    If you are following along in a simulator or on lab equipment.0.8.248.0.16.0. 7 subnets.0.0/21                                 Command to configure Serial 0/0/0 and Serial 0/0/1:                                 ip summary-address eigrp 1 10.10.0 255. Null0                                  D          10. 5 subnets.12.0/22 [90/2172416] via 172. Serial0/0/0                                  D          10. 00:01:43.0.10.244/30 [90/2681856] via 172. Serial0/0/0                                  D          10.                                  Example 8-4      EIGRP Routing Tables with Manual Summarization in Effect                                  HQ# show ip route eigrp | begin Gateway                                  Gateway of last resort is not set                                            10.1. 7 subnets.0 255. Serial0/0/1                                          172.16.255.8.indb 114                                                                                                          3/12/14 7:51 AM .0.250.0 255.1. Serial0/0/1                                                                [90/2681856] via 172.0/21 is a summary.  Serial0/0/0                        D         10.12. which does not exist in IPv6.253.16.248/30 [90/2681856] via 172.                       You can manually configure IPv6 summary routes. a summary route on B1 would include all the IPv6 LANs in the                       topology.16.16.1. The calcula-                       tion focuses on the fourth hextet since it is the one that is changing:                       0000 0000 0000 0100 --> included in summary (B1 LAN)                       0000 0000 0000 0101 --> B3 LAN                       0000 0000 0000 0110 --> B3 LAN                       0000 0000 0000 0111 --> included in a B1 summary.0/16 is variably subnetted.16.16.0. 2 masks                        D         172.                                                 Chapter 8: EIGRP Advanced Configurations and Troubleshooting   115                            D         10. Null0                               172.1. 2 masks                        D         172.0/23 [90/2172416] via 172.0/22 [90/2172416] via 172. Serial0/0/1                                                   [90/2681856] via 172. 5 masks                        D         10.12. 5 subnets. 00:00:54.10.1.10.0.246.                       Automatic summarization is based on classful addressing.245.252/30 [90/2681856] via 172. 00:00:54.0. Serial0/0/1                        B3# show ip route eigrp | begin Gateway                        Gateway of last resort is not set                                 10.1. 00:00:48. 2001:DB8:1:4::/64.1.246.                       For example. If you summarized the IPv6 LANs on any of the routers.16.1. 5 subnets. But it                       would also include additional address space summarized by B1 if B1 also configured an IPv6                       manual summary route. Serial0/0/1                        D         10. Serial0/0/1                               172.1.16.16.16.8.1. 00:00:48.                       0000 0000 0000 0000                       0000 0000 0000 0001 --> HQ LAN                       0000 0000 0000 0010 --> HQ LAN                       0000 0000 0000 0011 --> B1 LAN                       0000 0000 0000 0100 --> B1 LAN                       0000 0000 0000 0101 --> B3 LAN                       0000 0000 0000 0110 --> B3 LAN                       0000 0000 0000 0111     instructor. if configured                        You can see that this summary would include the B1 IPv6 LAN.                       you would be including IPv6 LANs from one or both of the other routers. 00:00:54. the summary for the IPv6 LANs on B3 would be 2001:DB8:1:4::/62. In fact. 00:00:48.1.245. Serial0/0/0                           IPv6 Manual Summarization                       Briefly explain why IPv6 does not support automatic summarization.0/16 is variably subnetted.10. the IPv6 addressing in Figure 8-2                       was not designed for summary routes. Serial0/0/0                                                   [90/2681856] via 172.249.0.0/23 is a summary.0/21 [90/2172416] via 172. However. 00:00:19. 7 subnets.indb 115                                                                                                   3/12/14 7:51 AM .0/8 is variably subnetted.16.16. 00:00:48.10.0.253. Prove this using the following workspace to calculate what the IPv6 summary route                       would be for B1.  06:04:19.1.0.0 0.1.               116    CCNA Routing and Switching Practice and Study Guide                                     What would be the summary route for B1?                                 2001:DB8:1::/61                 Packet Tracer                                 Packet Tracer .1.10.5/RP 5. Serial0/0/0                                                              [90/2681856] via 172. 5 subnets.                                  HQ(config)# ip route 0.1.249 to network 0.0/0 [170/2297856] via 172.10.0.0. 06:04:19.10.0/23 [90/2172416] via 172.5)                                   Default Route Propagation                                 Propagating a default route in EIGRP requires one additional command in your EIGRP configu-                                 ration.249.2. including the router prompt.0.2. Serial0/0/0                                  D      2001:DB8:1:1::/64 [90/2172416]                                          via FE80::2.249.12.0.0/21 [90/2172416] via 172.252/30 [90/2681856] via 172. for both IPv4 and IPv6?                                 IPv4:                                 Router(config-router)# redistribute static                                  IPv6:                                 Router(config-rtr)# redistribute static                                  Figure 8-2 is using a Loopback interface to simulate a connection to the Internet.249.Configuring EIGRP Manual Summary Routes for IPv4 and IPv6 (SN                  Activity       8. Serial0/0/0                                  D           10.16.246.16.16.0.0. and redistribute the routes to                                 B1 and B3.16. 00:05:31.0.0/16 is variably subnetted. 06:04:19.0 Lo0                                 HQ(config)# ipv6 route ::/0 Lo0                                 HQ(config)# router eigrp 1                                 HQ(config-router)# redistribute static                                 HQ(config-router)# ipv6 router eigrp 1                                 HQ(config-rtr)# redistribute static                                   If you are following along in a simulator or on lab equipment.246.16.16. Serial0/0/1                                           172. 7 subnets.indb 116                                                                                                               3/12/14 7:51 AM .8. Record the                                 commands to configure an IPv4 default route. IPv6 default route.1.0. 06:04:19.0.0/8 is variably subnetted. 00:12:58. Serial0/0/1                                  B1# show ipv6 route eigrp | begin EX       ::/0                                  EX     ::/0 [170/2169856]                                          via FE80::2.0/22 is a summary.1.1.0. Serial0/0/0     instructor. 2 masks                                  D           172. Null0                                  D           10.16.0                                    D*EX     0. What is the command. 4 masks                                  D           10.1.1. your verification output for B1                                 and B3 should look like Example 8-5.0.16.                                  Example 8-5       EIGRP Routing Tables with Default Route Propagation                                  B1# show ip route eigrp | begin Gateway                                  Gateway of last resort is 172. Serial0/0/0                                           10.  Serial0/0/0                       D    2001:DB8:1:6::/64 [90/2172416]                              via FE80::3.1. Serial0/0/1                       B1# ping 209. 100-byte ICMP Echos to 2001:DB8:F:F::1. 00:13:32. round-trip min/avg/max = 1/1/4 ms                       B1# ping 2001:db8:f:f::1                       Type escape sequence to abort. Serial0/0/0                       D          10.0/23 is a summary.10.16. Serial0/0/1                       D    2001:DB8:1:2::/64 [90/2172416]                              via FE80::2. Serial0/0/1                       D    2001:DB8:F:2::/64 [90/2681856]                              via FE80::2. 100-byte ICMP Echos to 209.201.1. 06:04:52.0/22 [90/2172416] via 172.16.                                                Chapter 8: EIGRP Advanced Configurations and Troubleshooting   117                           D    2001:DB8:1:2::/64 [90/2172416]                              via FE80::2.0/0 [170/2297856] via 172.0.0.1. timeout is 2 seconds:                       !!!!!                       Success rate is 100 percent (5/5).10. Serial0/0/0                              via FE80::3. 5 masks                       D          10.0. Serial0/0/0                              via FE80::2. 06:04:52.12. Serial0/0/1                       B3# ping 209.253.10. 06:05:05. 7 subnets.16. 5 subnets.0.165. 06:04:52.248/30 [90/2681856] via 172.165.0.0.0/21 [90/2172416] via 172.1. timeout is 2 seconds:                       !!!!!                       Success rate is 100 percent (5/5). Serial0/0/1                                                  [90/2681856] via 172.1                       Type escape sequence to abort.0/16 is variably subnetted. 2 masks                       D          172.16.0                         D*EX    0. Serial0/0/0                       B3# show ipv6 route eigrp | begin EX     ::/0                       EX   ::/0 [170/2169856]                              via FE80::2.1.1.     instructor. Null0                               172.16.253.165.201.16. Serial0/0/1                       D    2001:DB8:1:1::/64 [90/2172416]                              via FE80::2.1.                       Sending 5. round-trip min/avg/max = 1/1/4 ms                       B3# show ip route eigrp | begin Gateway                       Gateway of last resort is 172.                       Sending 5.201. Serial0/0/1                       D          10.0.8.16.0/8 is variably subnetted.0.245.1                       Type escape sequence to abort.indb 117                                                                                                  3/12/14 7:51 AM .1.253. Serial0/0/1                               10.245.253 to network 0. Serial0/0/1                       D    2001:DB8:1:4::/64 [90/2172416]                              via FE80::1.16. 06:04:52. Serial0/0/0                       D    2001:DB8:F:1::/64 [90/2681856]                              via FE80::1.                                  Router(config-if)# ip hold-time eigrp as-number seconds                                  EIGRP has different default Hello intervals and holdtimes based on the type of link. Record the full syntax for this command.Propagating a Default Route in EIGRP for IPv4 and IPv6                                   Fine-Tuning EIGRP Interfaces                                 Bandwidth Utilization                                 By default.                                 Router(config-if)# ip bandwidth-percent eigrp as-number percent                                  This command uses the amount of configured bandwidth (or the default bandwidth) when cal-                                 culating the percent that EIGRP can use.indb 118                                                                                                              3/12/14 7:51 AM .544 Mbps         Multipoint Frame Relay      60 seconds               180 seconds                                  Greater Than       T1. Ethernet                5 seconds                15 seconds                                  1. make sure that you also change the holdtime to a value equal                                 to or greater than the Hello interval.                                 The ip bandwidth-percent eigrp command can be used to configure the percentage of band-                                 width that may be used by EIGRP on an interface. EIGRP will use only up to 50 percent of the bandwidth of an interface for EIGRP                                 information.1.                                  Sending 5.3.201.1. timeout is 2 seconds:                                  !!!!!                                  Success rate is 100 percent (5/5). This prevents the EIGRP process from overutilizing a link and not allowing                                 enough bandwidth for the routing of normal traffic.4 Packet Tracer . neighbor adjacency will go down after the                                 holdtime expires and before the next Hello interval. Complete                                 Table 8-2 with the default values. round-trip min/avg/max = 1/2/4 ms                                  B3# ping 2001:db8:f:f::1                                  Type escape sequence to abort.                                 Router(config-if)# ip hello-interval eigrp as-number seconds                                  If you change the Hello interval.165. 100-byte ICMP Echos to 2001:DB8:F:F::1. 100-byte ICMP Echos to 209.               118    CCNA Routing and Switching Practice and Study Guide                                      Sending 5.                                 Record the command to configure a different holdtime.544 Mbps     instructor.                                 Hello Intervals and Holdtimes                                 Hello intervals and holdtimes are configurable on a per-interface basis and do not have to                                 match with other EIGRP routers to establish adjacencies.                                  Table 8-2     Default Hello Intervals and Holdtimer for EIGRP                                  Bandwidth          Example Link                Default Hello Interval   Default Holdtime                                  1. Otherwise. timeout is 2 seconds:                                  !!!!!                                  Success rate is 100 percent (5/5). round-trip min/avg/max = 1/1/4 ms                                     8.                                 Record the command to configure a different Hello interval.                         Example 8-6      EIGRP Routing Tables After Bandwidth Configuration                        B1# show ip route eigrp | begin Gateway                        Gateway of last resort is 172.1.10. Notice                       that B1 and B3 are no longer using the 128-Kbps link to route to each other’s LANs.1.249.0/8 is variably subnetted.249. 7 subnets.16.                       Record the commands to configure the routers with the correct bandwidth values. 00:05:50. 00:05:21. Serial0/0/0                        D          10.10. You can see load                       balancing in effect in the routing tables shown in previous Examples 8-4 and 8-5.0.0/22 is a summary. Serial0/0/0                        D    2001:DB8:1:1::/64 [90/3847680]                               via FE80::2.                       they are each using the faster path through HQ.16.0.1.1. 5 subnets.0/23 [90/6026496] via 172. Serial0/0/0                                10.0/16 is variably subnetted.16.16.0                          D*EX    0. 4 masks                        D          10.indb 119                                                                                                           3/12/14 7:51 AM .                       By default.0.                       Load balancing is the ability of a router to use all local interfaces that routes with the same                       metric to a destination address.12.0/21 [90/3847680] via 172.0.0.249. 00:05:21.10.249 to network 0.252/30 [90/6023936] via 172.0.16.                       HQ(config)# int s0/0/0                       HQ(config-if)# bandwidth 768                       HQ(config-if)# int s0/0/1                       HQ(config-if)# bandwidth 512                       B1(config)# int s0/0/0                       B1(config-if)# bandwidth 768                       B1(config-if)# int s0/0/1                       B1(config-if)# bandwidth 128                       B3(config)# int s0/0/0                       B3(config-if)# bandwidth 128                       B3(config-if)# int s0/0/1                       B3(config-if)# bandwidth 512                        Once the routers are properly configured with the actual bandwidth values. Instead.                       The reason EIGRP is load balancing is that we have not configured the actual bandwidth                       shown in Figure 8-2.8.0/0 [170/3973120] via 172. Serial0/0/0     instructor. EIGRP recalculates                       the metrics and installs the best route in the routing table.16.16.1.0. EIGRP uses up to four equal-cost paths to load balance traffic. Null0                        D          10. Serial0/0/0                                172.1. Serial0/0/0                        B1# show ipv6 route eigrp | begin EX         ::/0                        EX   ::/0 [170/3845120]                               via FE80::2.0. 2 masks                        D          172. 00:05:50. 00:05:31.249.                                                   Chapter 8: EIGRP Advanced Configurations and Troubleshooting         119                           Load Balancing                       Briefly describe equal-cost load balancing. as shown in Example 8-6.  00:06:11. Serial0/0/1                                            10.1. 00:05:43. Serial0/0/1                                  D            10.8.253.0. Serial0/0/0                                  D    2001:DB8:1:6::/64 [90/6026496]                                           via FE80::2. Serial0/0/1                                  D    2001:DB8:1:1::/64 [90/5514496]                                           via FE80::2.1.253.0/23 is a summary.      Create a keychain and key. 5 subnets.1. Serial0/0/1                                  D    2001:DB8:1:4::/64 [90/6026496]                                           via FE80::2.12.                                              Router(config)# key chain name-of-chain                                              Router(config-keychain)# key key-id                                              Router(config-keychain-key)# key-string key-string-text     instructor.indb 120                                                                                                          3/12/14 7:51 AM .253.0/21 [90/5514496] via 172. Serial0/0/0                                  B3# show ip route eigrp | begin Gateway                                  Gateway of last resort is 172. The steps to configure EIGRP with MD5 authentication are                                 as follows:                                 Step 1.0. 2 masks                                  D            172.253 to network 0.0/22 [90/6026496] via 172.0/16 is variably subnetted.0.10. Serial0/0/1                                  D    2001:DB8:F:1::/64 [90/6023936]                                           via FE80::2.1. Serial0/0/1                                  D    2001:DB8:1:2::/64 [90/5514496]                                           via FE80::2.16.0.10. 00:05:43.               120    CCNA Routing and Switching Practice and Study Guide                                      D    2001:DB8:1:2::/64 [90/3847680]                                           via FE80::2.16.16.0                                    D*EX      0.10.16.0.                                              Record the command syntax including the router prompt to configure a keychain                                              and key. Serial0/0/1                                     Securing EIGRP Routing Updates                                 In most production networks.253. Serial0/0/1                                  B3# show ipv6 route eigrp | begin EX       ::/0                                  EX   ::/0 [170/5511936]                                           via FE80::2.248/30 [90/6023936] via 172.0. you would want to configure the EIGRP routers to authenticate                                 updates received from neighbors.1.0/8 is variably subnetted. Serial0/0/0                                  D    2001:DB8:F:2::/64 [90/6023936]                                           via FE80::2.16. Serial0/0/1                                  D            10.0. 00:05:43. 00:05:43. Null0                                            172.1. 5 masks                                  D            10.16.16.0/0 [170/5639936] via 172.0. 7 subnets.  the IPv4 version of the troubleshooting commands for EIGRP are listed.5)                          Troubleshoot EIGRP                       This section reviews the tools and procedures to troubleshoot EIGRP issues. Indicate which command or commands you would use to                       answer each of the questions.5/RP 5.Configuring Advanced EIGRP for IPv4 Features (SN 8. Use MYKEY as the keychain name. including the router prompt.1.16.1. Assume                       that B1 and B3 are already configured.                                 Router(config)# interface type number                                 Router(config-if)# ip authentication mode eigrp as-num md5                                 Router(config-if)# ip authentication key-chain eigrp as-num name-of-chain                        Now record the commands to configure HQ to authenticate updates from B1 and B3.254               Se0/0/1                    13 00:07:09        3   288    0   59                          Lab . and                       cisco123 as the key string.5.                                 Record the command syntax. to configure EIGRP                                 authentication using the keychain and key.   Configure EIGRP authentication to use the keychain and key.250               Se0/0/0                    10 00:06:25        2   192    0   59                        0   172.                                                  Chapter 8: EIGRP Advanced Configurations and Troubleshooting      121                           Step 2.5.indb 121                                                                                                       3/12/14 7:51 AM . 1 as the key ID. The same                       commands are available for IPv6.1.                        HQ(config)# key chain MYKEY                       HQ(config-keychain)# key 1                       HQ(config-keychain-key)# key-string cisco123                       HQ(config-keychain-key)# int s0/0/0                       HQ(config-if)# ip authentication mode eigrp 1 md5                       HQ(config-if)# ip authentication key-chain eigrp 1 MYKEY                       HQ(config-if)# int s0/0/1                       HQ(config-if)# ip authentication mode eigrp 1 md5                       HQ(config-if)# ip authentication key-chain eigrp 1 MYKEY                         Use the show ip eigrp neighbors command as displayed in Example 8-7 to verify that HQ has                       reestablished adjacency with B1 and B3.                         Commands for Troubleshooting EIGRP                       In Table 8-3.                        Example 8-7     Verifying EIGRP Authentication                         HQ# show ip eigrp neighbors                        EIGRP-IPv4 Neighbors for AS(1)                        H   Address                    Interface                Hold Uptime     SRTT     RTO    Q   Seq                                                                                (sec)           (ms)           Cnt Num                        1   172.1.     instructor.16. 245    YES manual up                        up     instructor.1.16.1       YES manual up                        up                                  Serial0/0/0                   172.16. Use the output in Example 8-8 to trouble-                                 shoot the first issue.250    YES manual up                        up                                  Serial0/0/1                   172.10.1       YES manual up                        up                                  GigabitEthernet0/1            10.8.16.0.16.10.1       YES manual up                        up                                  GigabitEthernet0/1            10.1.               122    CCNA Routing and Switching Practice and Study Guide                                     Table 8-3      Diagnosing EIGRP Connectivity Issues                                  Command                         Is the Neighbor      Is the Routing      Does Traffic Take                                                                  Table Correct?       Table Correct?      the Desired Path?                                  show ip eigrp neighbors                  X                                  show ip interface brief                  X                                  show ip eigrp interface                  X                                  show ip protocols                                          X                                  show ip route eigrp                                        X                      X                                    Troubleshoot EIGRP Connectivity Issues                                 Using the configuration for the devices in Figure 8-2 and the following command outputs diag-                                 nose the EIGRP connectivity issue and recommend a solution.1.                                  Example 8-8      Troubleshooting Command Output for Issue #1                                   HQ# show ip eigrp neighbors                                  EIGRP-IPv4 Neighbors for AS(1)                                  H   Address                    Interface               Hold Uptime      SRTT    RTO    Q   Seq                                                                                         (sec)            (ms)          Cnt Num                                  0   172.10.1.246               Se0/0/1                    12 00:26:47      9   1170    0   67                                  B1# show ip interface brief                                  Interface                     IP-Address      OK? Method Status                    Protocol                                  Embedded-Service-Engine0/0 unassigned         YES unset   administratively down down                                  GigabitEthernet0/0            10.16.253    YES manual up                        up                                  Loopback0                     209.1.165.16.250    YES manual up                        up                                  Serial0/0/1                   172.10.1   YES manual up                        up                                  B1# show ip eigrp neighbors                                  EIGRP-IPv4 Neighbors for AS(1)                                  H   Address                    Interface               Hold Uptime      SRTT    RTO    Q   Seq                                                                                         (sec)            (ms)          Cnt Num                                  1   172.1      YES manual up                        up                                  Serial0/0/0                   172.254               Se0/0/1                    10 00:23:18      1    288    0   65                                  HQ# show ip interface brief                                  Interface                     IP-Address      OK? Method Status                    Protocol                                  Embedded-Service-Engine0/0 unassigned         YES unset   administratively down down                                  GigabitEthernet0/0            10.1.10.indb 122                                                                                                               3/12/14 7:51 AM .                                   Connectivity Issue #1                                 HQ and B1 have not formed a neighbor adjacency.4.201.  K5=0                              NSF-aware route hold timer is 240                              Router-ID: 2. K2=0.248/30 link.1.                        Example 8-9      Troubleshooting Command Output for Issue #2                         HQ# show ipv6 eigrp neighbors                        EIGRP-IPv6 Neighbors for AS(1)                        H     Address                   Interface                Hold Uptime     SRTT   RTO    Q   Seq                                                                                 (sec)           (ms)         Cnt Num                        0     Link-local address:       Se0/0/0                    14 05:12:49      1   186    0   57                              FE80::1                        B3# show ipv6 eigrp neighbors                        EIGRP-IPv6 Neighbors for AS(2)                          Problem and Solution:                       B3 does not have EIGPR neighbors because it is configured with a different AS number than                       HQ. B3 is using a less-than-optimal route to reach the B1                       and HQ IPv4 LANs.indb 123                                                                                                        3/12/14 7:51 AM . K3=1.16. Change either one                       to use IP address 172.16. Example 8-9 displays the output for the                       second issue. K4=0.1.2                              Topology : 0 (base)                                Active Timer: 3 min     instructor.2.249 and the neighbor relationship will be restored. Configure B3 to use AS number 1 for its IPv6 EIGRP configuration.                                                   Chapter 8: EIGRP Advanced Configurations and Troubleshooting      123                           Problem and Solution:                       HQ and B1 are both using the same IP address on the 172.                         Connectivity Issue #3                       Although the IPv6 routes look correct. Use the output in Example 8-10 to troubleshoot the third issue.                        Example 8-10     Troubleshooting Command Output for Issue #3                         HQ# show ip protocols                        *** IP Routing is NSF aware ***                          Routing Protocol is "eigrp 1"                            Outgoing update filter list for all interfaces is not set                            Incoming update filter list for all interfaces is not set                            Default networks flagged in outgoing updates                            Default networks accepted from incoming updates                            Redistributing: static                            EIGRP-IPv4 Protocol for AS(1)                              Metric weight K1=1.2.                         Connectivity Issue #2                       HQ and B3 have not formed a neighbor adjacency. 1.1.0. Serial0/0/1     instructor. Serial0/0/0                                  B3# show ipv6 route eigrp | begin EX       ::/0                                  EX    ::/0 [170/5511936]                                         via FE80::2.16. 04:39:57.1. Serial0/0/1                                  D     2001:DB8:1:1::/64 [90/5514496]                                         via FE80::2.16.0                                    D*EX    0. Serial0/0/1                                  D     2001:DB8:1:2::/64 [90/5514496]                                         via FE80::2.0.250           90     00:00:41                                      Distance: internal 90 external 170                                  B3# show ip route eigrp | begin Gateway                                  Gateway of last resort is 172.0.245.248/30 [90/21024000] via 172.16.0                                      Passive Interface(s):                                        GigabitEthernet0/0                                        GigabitEthernet0/1                                        Serial0/0/1                                      Routing Information Sources:                                        Gateway         Distance      Last Update                                        172.10.0.0. 00:08:32. Serial0/0/0                                  D          10. Serial0/0/0                                          10.0.0/8 is variably subnetted.245.0.0/0 [170/21152000] via 172. Serial0/0/1                                  D     2001:DB8:1:4::/64 [90/6026496]                                         via FE80::2.indb 124                                                                                                 3/12/14 7:51 AM .16.0/21 [90/21026560] via 172.10.1. Null0                                          172.16.1.245 to network 0.1.0/23 is a summary.0                                        172.0/21 for Se0/0/0.0. Se0/0/1                                          Summarizing 2 components with metric 28160                                      Maximum path: 4                                      Routing for Networks:                                        10.0. 7 subnets. 2 masks                                  D          172.0. Serial0/0/0                                  D          10.16.254           90     00:17:55                                        172.16.8.1.12. 5 masks                                  D          10. 00:08:32.16.245.               124    CCNA Routing and Switching Practice and Study Guide                                              Distance: internal 90 external 170                                          Maximum path: 4                                          Maximum hopcount 100                                          Maximum metric variance 1                                        Automatic Summarization: disabled                                      Address Summarization:                                        10.0.10. Serial0/0/1                                  D     2001:DB8:F:1::/64 [90/6023936]                                         via FE80::2.0/22 [90/20514560] via 172.16.0.0/16 is variably subnetted.16.1. 00:08:32.245.10. 5 subnets. 00:08:32. 5)                         Activity                                       Packet Tracer .3.3.Troubleshooting Advanced EIGRP (SN 8.indb 125                                                                                                                      3/12/14 7:51 AM .3.3.7/RP 5.2.Skills Integration Challenge (SN 8.5/RP 5.Troubleshooting Basic EIGRP for IPv4 and IPv6 (SN 8.3.2.                                        Lab .Troubleshooting EIGRP for IPv4 (SN 8.1.3.6/RP 5.2.1.3. Therefore.2.2)     instructor.                                                                 Chapter 8: EIGRP Advanced Configurations and Troubleshooting      125                                           Problem and Solution:                                       The EIGRP configuration on HQ has the Serial 0/0/1 interface set to passive.3.7)                        Packet Tracer                                       Packet Tracer . HQ                                       and B3 have not established adjacency and HQ is not sending IPv4 routing updates to B3.2.6)                                        Lab .2.2/RP 5. instructor.indb 126   3/12/14 7:51 AM .                                                                                                          CHAPTER 9                                                                    IOS Images and Licensing                          Network administrators are responsible for managing the routers and switches owned by the organiza-                       tion. This responsibility includes backing up and upgrading software images when needed.indb 127                                                                                                           3/12/14 7:51 AM . This chapter                       reviews basic IOS image concepts and management tasks.     instructor.  These releases are also designated                                 as Maintenance Deployment releases (MD). VoFR. and 15. 3DES. 12. What are the                                 three features that distinguish an IOS software release family?                                    ■   Share the same code base                                    ■   Apply to a related platform (for example. A T train. and MPLS to IP Voice                                    ■   Enterprise Base: Includes AppleTalk. 15. and IP Telephony                                    ■   Advanced Security: Security and VPN features. VoIP.                                 These releases are organized into trains that may contain several releases over the life of a soft-                                 ware family.                                 A mainline train is always associated with a technology train (T train).                                 receives the same software bug fixes as the mainline train. and VPN                                    ■   SP (Service Provider) Services: Adds SSH/SSL. and IBM Support     instructor.4.                                        IPsec. which receives mostly soft-                                 ware (bug) fixes with the goal of increasing software quality.               128    CCNA Routing and Switching Practice and Study Guide                                     Managing IOS System Files                                 Cisco IOS software is a sophisticated operating system that includes multiple release versions                                 that are organized into software release families and software trains. such as 12. Then fill in the blanks for each part of the                                 IOS 12 software release numbering scheme. 1900 series routers)                                    ■   Overlap in support coverage                                 What are some major software releases within the software release family?                                 12. ATM.                                 Releases before IOS 15 consisted of eight packages for Cisco routers.indb 128                                                                                                                   3/12/14 7:51 AM .                                 T train releases are considered Early Deployment (ED) releases.4 software release family. and Naming Conventions                                 A software release family is comprised of multiple IOS software release versions. IDS/IPS.                                 Decoding the IOS release numbering conventions will go a long way in helping you understand                                 the various trains used in the IOS 12. VoATM.3.                                 What else does a T train include?                                 T trains receive new software and hardware support features.                                 The Cisco IOS Software 12. indicate whether                                 the release is a mainline train or a technology train.4 train is considered the mainline train. In Figure 9-1.1                                 Briefly describe a software train. including Cisco IOS Firewall.                                   IOS Families. Trains.4T.0. These packages were the                                 following:                                 Five nonpremium packages:                                    ■   IP Base: Entry-level Cisco IOS Software Image                                    ■   IP Voice: Converged voice and data. IPX.                                 New versions are created to fix bugs and add new features to an existing software family. 4T                           Figure 9-1a   The IOS 12.4(20) T   1                                                                           Train Number                                                                 Maintenance Identifier                                                   12.4?                       Instead of diverging into separate trains. service provider services.     instructor.4T                                                                       Train Identifier                                                   T Train            Rebuild Identifier                          Three premium packages:                          ■   Advanced Enterprise Services: Full Cisco IOS software features                          ■   Enterprise Services: Enterprise base and service provider services                          ■   Advanced IP Services: Advanced security.indb 129                                                                                                             3/12/14 7:51 AM .4(21 a)                                                        12.4(21 a)                                                                           Train Number                                                   12. New                       releases for the T trains are available two to three times a year. Cisco IOS 15 mainline releases are referred to as M trains. With                       the new IOS release model.                                                                                    Chapter 9: IOS Images and Licensing   129                           Figure 9-1    The IOS 12.4 Software Release Numbering Convention (answer)                                                                                               12. EM releases are available every                       16 to 20 months. Cisco IOS Software 15 mainline and T will have                       extended maintenance release (EM release) and standard maintenance release (T release).0 release model differ from the mainline and T trains of 12.4 Software Release Numbering Convention                                                                                               12.4(20) T   1                                                       12.4                                                                                               12. and support for IPv6                       How does the Cisco IOS 15.4                                                                Maintenance Identifier                                                Mainline Train        Rebuild Identifier                                                                                              12. indb 130                                                                                                                   3/12/14 7:51 AM .               130    CCNA Routing and Switching Practice and Study Guide                                     In Figure 9-2. The network administrator then activates feature sets using licensing keys.                                 With the Services on Demand model.                                 Decode the IOS 12 image name in Table 9-1.1 (1) T1                                                          15.0 (1) M1                                                          15.0M                  Major Release Number                                                                                Minor Release Number                                                                    M = Extended Maintenance Release                                                      EM Release          Maintenance Rebuild Number                                                                            New Feature Release Number                                                                                                        15. The first one is done for you. indicate whether the release is a mainline train or a technology train.                                 The IP base feature set is installed by default. Then fill in                                 the blanks for each part of the IOS 15 software release numbering scheme. all features are included in one universal image shipped                                 with all ISR G2s.                                 What is the key difference between universalk9 and universalk9_npe IOS images?                                 The universalk9_npe software image is provided for customers in those countries with import                                 requirements disallowing routers with strong cryptography functionality.0T                 Major Release Number                                                                               Minor Release Number                                                                    T = Standard Maintenance Release                                                       T Release         Maintenance Rebuild Number                                    Briefly explain how Services on Demand for Cisco Integrated Services Routers Generation Two                                 (ISR G2) works. The npe extension to                                 the image name stands for no payload encryption.0M                                                                                                           15.1 (1) T1                                                              15.0T                                     Figure 9-2a   The IOS 15 Software Release Numbering Convention (answer)                                                                          New Feature Release Number                                                                                                         15.0 (1) M1                                                              15.                                  Figure 9-2    The IOS 15 Software Release Numbering Convention                                                                                                         15.     instructor. 4         10            M       b                       bin                                                  services                       c3725-entbase-mz.T.124-10b.                       Step 3.10. you are copying the image c1900-universalk9-mz.bin                       services                           Backing Up Cisco IOS Images                       To back up an IOS image to a TFTP server.      Copy the image to the TFTP server using the copy source-url destination-url                                    command.bin from RTA to the                       TFTP server at 10. round-trip min/avg/max = 1/1/1 ms     instructor.124-12. 100-byte ICMP Echos to 10.    1900         Universal 15        3        2                 T                       SPA. including the router prompt. to complete this                       task.152-4.10.10.151-4. Use the show flash                                    command to determine the size of the image.                       Sending 5.       1841         Advanced 12. 2900            Universal 15        3        3                 M                       SPA.                        Table 9-2       Decoding IOS 15 Image Names                       IOS Images               Hardware Feature      Major   Minor   New Feature Maintenance Maintenance                                                         Set          Release Release Release     Release     Rebuild                       c1900-universalk9-mz.                       Step 2.10.bin            3725         Enterprise 12.M6.4       6             T                                                                            base                         Decode the IOS 15 image name in Table 9-2.SPA.153-3.10                         RTA# ping 10.124-6.                                                                                      Chapter 9: IOS Images and Licensing   131                           Table 9-1       Decoding IOS 12 Image Names                       IOS Images                              Hardware Feature        Train  Maintenance Train      Rebuild                                                                        Set            Number Release     Identifier Identifier                       c1841-ipbasek9-mz.bin            1841         Ipbasek9   12.10.T.                        Figure 9-3      Backing Up an IOS to a TFTP Server                                                         RTA                                                                                               TFTP Server                                                                                              10. timeout is 2 seconds:                       !!!!!                       Success rate is 100 percent (5/5).1841           Advanced 15         1        4                 M       6                       mz.bin                       c2900-universalk9-mz.10.10.M.      Verify the TFTP server has enough memory to accept the image file.10.10                       Type escape sequence to abort.M1.indb 131                                                                                                               3/12/14 7:51 AM . complete the following steps:                       Step 1.153-2.      Ping the TFTP server to test connectivity. The first one is done for you.10.10.                       In Figure 9-3.bin                       c1841-advipservicesk9. Record the commands.4       12            M                       c1841-advipservicesk9-mz.  Each device ships with the same universal                                 image. 2900. That all changed with 15.6/RP 10.M1. your router came with the IOS already installed for                                 the features you desired.0.path                                 1      67998028 Nov 30 1983 00:00:00 +00:00 c1900-universalk9-mz.5/RP                  Activity       10.-----date/time-----.                                 Step 2.Managing Cisco IOS Images (SN 9.                                   Software Licensing                                 The feature sets that you enable with licensing keys are called technology packages.     instructor.SPA.2.                                 and install a new version.   Install the license file.   Purchase the software package or feature to be installed.0.--length-.M1.bin]? <enter>                                 !!!!!!!!!!!!!!!!!!!!!!!!!                                 <output omitted>                                 67998028 bytes copied in 107.               132    CCNA Routing and Switching Practice and Study Guide                                    RTA# show flash                                 -#.1.10.1.SPA.bin                                   188608512 bytes available (68001792 bytes used)                                 RTA# copy flash tftp                                 Source filename []? c1900-universalk9-mz.indb 132                                                                                                                3/12/14 7:51 AM .152-4.M1.2. and 3900 series routers                                 What command enables you to view the licenses currently supported on the router?                                 Router# show license feature                                  What are the three major steps to activate a new software package or feature on the router?                                 Step 1.   Obtain a Software Activation License file from Cisco.SPA. What are                                 the four technology packages available?                                 IP Base                                 Data                                 Unified Communications (UC)                                 Security (SEC)                                 On which Cisco ISR G2 platforms can these licenses be used?                                 Cisco 1900.                                 Step 3.Using a TFTP Server to Upgrade a Cisco IOS Image (SN 9.5)                   Video                                 Video Demonstration .6)                Demonstration                                    IOS Licensing                                 Before Cisco IOS Software Release 15.1.2.928 secs (630031 bytes/sec)                                   RTA#                   Packet Tracer                                 Packet Tracer .10                                 Destination filename [c1900-universalk9-mz.152-4. You enable the features you need through the use of licensing keys.152-4.2. download. If you wanted to upgrade the feature set.10.bin                                 Address or name of remote host []? 10.1. you had to order.                                                                                  Chapter 9: IOS Images and Licensing   133                           What two things are needed to obtain a license?                       The product activation key (PAK) and a unique device identifier (UDI)                       How is the UDI constructed?                       The UDI is a combination of the product ID (PID). and the hardware                       version                       What command displays the UDI?                       Router# show license udi                        What command installs the license?                       Router# license install stored-location-url                          License Verification and Management                       After installing a license.indb 133                                                                                                          3/12/14 7:51 AM .                       What two commands are used in Example 9-1 to verify the licenses installed?                        Example 9-1       Verifying License Installation                        Router# show version | begin License Info:                        License Info:                          License UDI:                          -------------------------------------------------                        Device#    PID                     SN                        -------------------------------------------------                        *0         CISCO1941/K9              FTX163283RZ                            Technology Package License Information for Module:'c1900'                          -----------------------------------------------------------------                        Technology       Technology-package                Technology-package                                         Current         Type              Next reboot                        ------------------------------------------------------------------                        ipbase           ipbasek9        Permanent         ipbasek9                        security         securityk9      EvalRightToUse securityk9                        data             None            None              None                          Configuration register is 0x2102     instructor. you must reboot the router before the technology package is active                       and ready to use. the serial number (SN).  to clear the datak9 technology package. In Use                                           License Count: Non-Counted                                           License Priority: Medium                                  Index 2 Feature: securityk9                                           Period left: 8    weeks 1    day                                           Period Used: 2    days 0    hour                                           License Type: EvalRightToUse                                           License State: Active. the datak9 technology package is not in use. save them to flash.                                 Router(config)# license accept end user agreement                                 Router(config)# license boot module c1900 technology-package securityk9                                  What message do you receive when activate a package?                                 % use 'write' command to make license boot config take effect on next boot                                  To back up your license files. including                                 the router prompt.                                            Router(config)# license boot module c1900 technology-package datak9 disable                                  Step 2.indb 134                                                                                                           3/12/14 7:51 AM . including the router                                 prompt. to accept the EULA and activate the datak9 package. Record the commands. EULA not accepted                                           License Count: Non-Counted                                           License Priority: None                                  <output omitted>                                    In Example 9-1.                                 Router(config)# license save flash0:R1_license_files                                  Complete the following steps to uninstall a license:                                 Step 1. clear the license from storage. Record the command.                                            Router# license clear datak9                                            Router# configure terminal                                            Router(config)# no license boot module c1900 technology-package datak9                                            disable     instructor. including the router prompt.                                            to disable the datak9 technology package. In Use                                           License Count: Non-Counted                                           License Priority: Low                                  Index 3 Feature: datak9                                           Period left: Not Activated                                           Period Used: 0    minute    0   second                                           License Type: EvalRightToUse                                           License State: Not in Use.    Disable the technology package.    After reloading the router.                                            including the router prompt. to save the license files to flash. Record the commands. Record the command.               134    CCNA Routing and Switching Practice and Study Guide                                      Router# show license                                  Index 1 Feature: ipbasek9                                           Period left: Life time                                           License Type: Permanent                                           License State: Active. 4/RP 10.                                                                                      Chapter 9: IOS Images and Licensing   135                           Packet Tracer                                       Packet Tracer .1.3.1.3.3/RP 10.5/RP 10.2/RP 10.2.3.5)                       Demonstration     instructor.1.2)                         Activity                                       Packet Tracer .1.2.4)                          Video                                       Video Demonstration .3)                                        Packet Tracer .3.indb 135                                                                                                               3/12/14 7:51 AM .2.EIGRP Capstone (SN 9.Working with IOS 15 Image Licenses (SN 9.3.2.1.3.1.OSPF Capstone (SN 9.Skills Integration Challenge (SN 9. instructor.indb 136   3/12/14 7:51 AM . indb 137                                                                                                                3/12/14 7:51 AM .     instructor. and manageable. you still need a firm grasp of the benefits incurred from using a systematic design approach. Even if your direct responsibilities do not include actually designing the net-                       work.                       resilient.                                                                                                           CHAPTER 10                                                               Hierarchical Network Design                          Part of your job as a network administrator is understanding how to build networks that are flexible.                                     ■   Access layer: Provides workgroup/user access to the network                                    ■   Distribution layer: Provides policy-based connectivity and controls the boundary                                        between the access and core layers                                    ■   Core layer: Provides fast transport between distribution switches within the enterprise                                        campus                                 In Table 10-2.indb 138                                                                                                                  3/12/14 7:51 AM .                                   Enterprise Network Campus Design                                 What are the three main categories of network sizes and how are they distinguished?                                 Small network for up to 200 devices                                 Medium-sized network for 200 to 1000 devices                                 Large network for 1000+ devices                                 In Table 10-1. indicate the structured engineering principle that is best described by the char-                                 acteristic.                                  Table 10-1    Structured Engineering Principles                                  Characteristic                                 Hierarchy   Modularity Resiliency      Flexibility                                  Is available to users regardless of the                                      X                                  current conditions                                  High-level tool for designing a reliable           X                                  network                                  Can be easily modified                                                                      X                                  Examples include the data center and the                        X                                  Internet edge                                     Hierarchical Network Design                                 Briefly describe the three layers of the hierarchical network design. However. The size of the network is directly proportional to the complexity                                 of the design.               138    CCNA Routing and Switching Practice and Study Guide                                     Hierarchical Network Design Overview                                 Networks come in all sizes. structured engineering principles can help guide the designer in for-                                 mulating a plan even for the most complex networks. indicate the layer that is best described by the function                                  Table 10-2    Hierarchical Network Layer Functions                                  Layer Function                                                      Access   Distribution   Core                                  Highest speed switching of the three layers                                                     X                                  Policy-based security                                                             X                                  Port security                                                          X                                  Redundancy and load balancing                                                     X                                  Broadcast domain control                                                          X                                  Spanning tree                                                          X     instructor.                                                                           Chapter 10: Hierarchical Network Design     139                           Layer Function                                                      Access   Distribution   Core                       Layer 2 switching                                                     X                       Avoid CPU-intensive packet manipulation                                                         X                       Aggregates traffic from distribution devices                                                    X                       Aggregating LAN and WAN links                                                      X                         Briefly explain the concept of a collapsed core. These networks call for design approach where functions can be separated                       into modules.                       Network changes.                       Small networks and many medium-sized networks are not large enough to justify the expense                       and complexity of different devices at each of the three layers. or the introduction of new services can be made in a controlled                       and staged fashion.                       When a specific module no longer has sufficient capacity or is missing a new function or ser-                       vice. upgrades.                       In Table 10-3. branch sites. collabo-                       rate.      Services    Data     Enterprise                                                                          Distribution              Center      Edge                       Provides resources necessary to employees                                      X                       so that they can effectively create.                       X                       ways.                         Modular Network Design                       Briefly describe three benefits for using a modular approach to network design.                       and data centers. This reduces the costs of the                       design while still maintaining the benefits of a hierarchical design. and interact                       Could include wireless controls. But the networks for                       many organizations span larger areas than just a campus to include teleworkers. indicate which module is described by the feature. it can be updated or replaced by another module.                        Table 10-3    Features of Modules in the Enterprise Architecture                       Module Feature                                      Access. A collapsed core design incor-                       porates the distribution and core layer functions in one device. policy gate.indb 139                                                                                                         3/12/14 7:51 AM .                          Cisco Enterprise Architecture                       Hierarchical network design is fine for campus network implementations.                       Failures that occur within a module can be isolated from the remainder of the network.                       Security can be implemented on a modular basis. and unified communications services                       Fundamental component of a campus design                X                       Consists of the Internet Edge and WAN Edge                                                  X                       Provide connectivity outside the enterprise                                                 X                       Originally called the server farm                                              X     instructor. indb 140                                                                                              3/12/14 7:51 AM . label the modules of the Enterprise Architecture.                                  Figure 10-1   Identify Modules of the Enterprise Architecture                                            Services Block                                             Data Center                                                                        MetroE   HDLC                                     Figure 10-1a Identify Modules of the Enterprise Architecture (answer)                                                             Access                                                             Distribution                                         Services Block                                               Internet                                                                                                      Edge                                                             Core                                          Data Center                                                              WAN Edge                                                                     MetroE   HDLC                                     Cisco Enterprise Architecture Model                                 What are the three primary modules of the Cisco Enterprise Architecture model?                                 Enterprise Campus                                 Enterprise Edge                                 Service Provider Edge     instructor.               140    CCNA Routing and Switching Practice and Study Guide                                     In Figure 10-1.                         Table 10-5    Cisco Enterprise Architecture Model Functions                       Cisco Enterprise Architecture          Enterprise      Enterprise      Service        Remote                       Feature                                 Campus           Edge       Provider Edge                       Aggregates connectivity from vari.    Dual. and teleworkers?                       Service Provider Edge                       What are the submodules of the Enterprise Campus module?                       Building Access                       Building Distribution                       Campus Core                       Data Center                       What are the submodules of the Enterprise Edge module?                       E-Commerce                       Internet Connectivity                       Remote Access and VPN                       WAN Site-to-Site VPN                       What is the main purpose of the Service Provider Edge module?                       The Service Provider Edge module provides connectivity between the Enterprise Edge module                       and submodules of the Remote module (Branch Locations. Teleworkers. branches.                                                        X                       campus locations.                       Allows employees to work at non.indb 141                                                                                                       3/12/14 7:51 AM .                       Provides cost-effective access                                            X                       across large geographic areas.                       In Table 10-4.                        Table 10-4    Service Provider Designs                       Service Provider Connectivity Solution         Single.                                                                          Chapter 10: Hierarchical Network Design   141                           Which module provides connectivity to the data center.     instructor.                        X                       ous functional areas. indicate the service provider solution described. Data Center). indicate which module is best described by the function.    Multihomed       Dual-                                                                      Homed      Homed                     Multihomed                       Connections to 2 or more ISPs                                             X                       A single connection to 1 ISP                      X                       Multiple connections to 2 or more ISPs                                                  X                       2 or more connections to 1 ISP                                 X                        What are the submodules of the remote module?                       Enterprise Branch                       Enterprise Teleworker                       Enterprise Data Center                       In Table 10-5. indb 142                                                                                                            3/12/14 7:51 AM .                      X                                  wall and firewall routers.                                  Provides internal users with secure                      X                                  connectivity to Internet services.                                  Offsite data center to provide disas.                                              X                                  ter recovery and business continu-                                  ance services.                                  Incorporates the enterprise WAN                          X                                  links. server          X                                  farm.                                  Authenticates remote users and                           X                                  branch sites.                                   In Figure 10-2. and net-                                  work intrusion prevention systems.                                  Converges voice. and enterprise edge.                                  Routes traffic into the Campus Core                      X                                  submodule. label the modules and submodules of the Cisco Enterprise Architecture model.                                  Uses multicast traffic and QoS to           X                                  optimize network traffic.                                  High availability through resilient         X                                  hierarchical network design.                                  Access management with VLANs                X                                  and IPsec.                                  Devices located here include fire. and data                                       X                                  across a single IP communications                                  network.     instructor.               142    CCNA Routing and Switching Practice and Study Guide                                      Cisco Enterprise Architecture           Enterprise   Enterprise      Service      Remote                                  Feature                                  Campus        Edge       Provider Edge                                  Could use high-end Cisco Catalyst                                                   X                                  switches or just a ISR G2.                                  Mobile users connect using a local                                                  X                                  ISP. video.                                  Connects users with campus.                                  Supports security over Layer 2 and                                     X                                  Layer 3 WANs. depend-                                  ing on size of location.                                               Network                                           Management                           Figure 10-2a Cisco Enterprise Architecture Model (answer)                                  Enterprise Campus                                      Enterprise Edge              Service         Remote                                                                                                                  Provider Edge                                  Building Access                                                                                    Enterprise                                                                                         E-Commerce                                  Branch                                                       Campus Infrastructure Module                                                                                                                         ISP A                                 Building Distribution                                                                                             Internet                                                                                          Connectivity                                                                                                                     ISP B          Enterprise                                                                                                                                    Teleworker                                  Campus Core                                                                                        Remote Access and                                                                                            VPN                                                                                                                     PSTN                                  Server Farm and Data                                                                                Enterprise                                       Center                                                                                      Data Center                                                                                      WAN Site-to-site VPN                                                                                                                   Frame Relay. .                                                                                                                  ATM.                                                                                                        Chapter 10: Hierarchical Network Design   143                           Figure 10-2 Cisco Enterprise Architecture Model                                                                                             E-Commerce                                                           Campus Infrastructure Module                                                                                                                     ISP A                                 Building Distribution                                                                                                                        ISP B          Enterprise                                                                                                                                    Teleworker                                                                                                                         PSTN                                                                                          WAN Site-to-site VPN                                                                                                                   Frame Relay. .                                                                                                                  ATM..indb 143                                                                                                                                     3/12/14 7:51 AM . MAN. MAN.                                              Network                                           Management     instructor....                                    Cisco Enterprise Architectures                                 What are the top trends that are impacting networks?                                 Bring your own device (BYOD)                                 Online collaboration                                 Video communication                                 Cloud computing                                 What network architectures has Cisco introduced to address these trends?                                 Cisco Borderless Network Architecture                                 Collaboration Architecture                                 Data Center/Virtualization Architecture                                   Emerging Network Architectures                                 What are the two primary sets of services provided by the Cisco Borderless Network                                 Architecture?                                 Borderless end-point/user services                                 Borderless network services                                 What are the three layers of the Cisco Collaboration Architecture?                                 Application and Devices                                 Collaboration Services                                 Network and Computer Infrastructure                                 What are the three components of the Cisco Data Center/Virtualization Architecture?                                 Cisco Unified Management Solutions                                 Unified Fabric Solutions                                 Unified Computing Solutions                                 In Table 10-6.indb 144                                                                                                               3/12/14 7:51 AM . indicate the emerging network architecture described by the feature or service.               144    CCNA Routing and Switching Practice and Study Guide                                     Evolving Network Architectures                                 Network architectures need to rapidly evolve to meet the needs of users. employ-                                 ees and students alike used devices provided by the organization. Traditionally. However. Today’s enterprise networks should seamlessly provide services to users of all modes of                                 access.     instructor. you more than                                 likely currently use some type of mobile device to conduct some of your business or school                                 work. EIGRP (CN 1.OSPF (CN 1.                                       Applications include WebEx Meeting. and soft.1.3)     instructor.                                       Any device must be able to connect securely.4. WebEx                               X                                       Social.indb 145                                                                                                                      3/12/14 7:51 AM . Cisco Jabber.Skills Integration Challenge .                                                                                         Chapter 10: Hierarchical Network Design   145                                           Table 10-6   Emerging Network Architectures                                       Emerging Network Architecture Functions and           Cisco           Cisco        Cisco Data                                       Services                                            Borderless    Collaboration      Center/                                                                                           Networks      Architecture    Virtualization                                                                                                                         Architecture                                       Comprehensive set of technologies that bring                                            X                                       together the network.                                       Portfolio of products. applications.Skills Integration Challenge . computing.                         X                                       ware development kits that provide a compre-                                       hensive solution to allow people to cooperate                                       and contribute to the production of something.2)                         Challenge                                       Packet Tracer .            X                                       reliably.                                       Unified approach to deliver application services        X                                       to users in a highly distributed environment. and TelePresence. and storage                                       platforms.                          Packet Tracer                                       Packet Tracer .4. and seamlessly from anywhere.                                       Network infrastructure and services are united                                          X                                       via Cisco unified system services options.1. instructor.indb 146   3/12/14 7:51 AM CHAPTER 11  Connecting to the WAN    Wide-area networks (WANs) are used to connect remote LANs together. Various technologies are used                       to achieve this connection. This chapter reviews WAN technologies and the many WAN services avail-                       able.     instructor.indb 147                                                                                                        3/12/14 7:51 AM 148    CCNA Routing and Switching Practice and Study Guide     WAN Technologies Overview                                 WAN access options differ in technology, speed, and price. Each has advantages and disadvan-                                 tages. Selecting the best technology depends largely on the network design.   Network Types and Their Evolving WAN Needs                                 The WAN needs of a network depend greatly on the size of the network. These network types                                 run the spectrum from small offices that really only need a broadband connection to the                                 Internet all the way up to multinational enterprises that need a variety of WAN options to sat-                                 isfy local, regional, and global restrictions.                                 In Table 11-1, indicate the network type that fits each of the descriptions. Some descriptions                                 may apply to more than one network type.  Table 11-1    Identify the Network Type                                  Network Description          Small Office        Campus           Branch         Distributed                                                                Network            Network         Network          Network                                  Outsourced IT support             X                                  Very large sized busi-                                                               X                                  ness                                  Connectivity to the               X                                  Internet                                  Converged network and                                                                X                                  application services                                  Hundreds of employees                               X                X                                  Home, branch, and                                                                    X                                  regional offices, tele-                                  workers, and a central                                  office                                  Limited number of                 X                                  employees                                  In-house IT staff and                               X                X               X                                  network support                                  Thousands of                                                                         X                                  employees                                  Several remote, branch,                                              X                                  and regional offices                                  (one central office)                                  Small-sized business              X                                  LAN focus of opera-               X                                  tions with broadband                                  Small to medium-sized                               X                                  business                                  Multiple campus LANs                                X                                  Medium-sized business                                                X     instructor.indb 148                                                                                                               3/12/14 7:51 AM Chapter 11: Connecting to the WAN   149     WAN Operations and Terminology                       WANs operate at which layers of the OSI model?                       Data link (Layer 2) and physical (Layer 1)                       Which organizations are responsible for WAN standards?                       Telecommunication Industry Association and the Electronic Industries Alliance (TIA/EIA)                       International Organization for Standardization (ISO)                       Institute of Electrical and Electronics Engineers (IEEE)                       What are some of the Layer 2 WAN technologies?                       Frame Relay, Point-to-Point Protocol (PPP), MetroEthernet, VSAT, MPLS, Broadband                       Why is the Layer 2 address field not usually used in WAN services?                       WAN links are normally point to point. Therefore, there is no need for a data link layer address.     instructor.indb 149                                                                                                        3/12/14 7:51 AM 150      CCNA Routing and Switching Practice and Study Guide     Match the definition on the left with a term on the right. This exercise is a one-to-one matching.                Definitions                                                   Terms                       a. The boundary between customer equipment               g. Packet-switched network                          and service provider equipment                        n. WAN switch                       b. Devices inside the enterprise edge wiring             b. Customer premises equipment (CPE)                          closet that are owned or leased by the organi-                                                                                h. Central office (CO)                          zation                                                                                o. Dialup modem                       c. Provider equipment that resides in the WAN                                                                                p. Access server                          backbone capable of supporting routing pro-                          tocols                                                 f. Data communications equipment (DCE)                       d. Digital modem used by DSL or cable Internet            l. Router                          service providers                                     m. Data terminal equipment (DTE)                       e. Dynamically establishes a dedicated circuit            i. Local loop                          before communication starts                            j. CSU/DSU                        f. Provides an interface to connect subscribers to      e. Circuit-switched network                          a WAN link                                                                                a. Demarcation point                       g. Splits traffic so that it can be routed over the                                                                                d. Broadband modem                          shared network                                                                                k. Toll network                       h. Local service provider facility that connects                          the CPE to the provider network                       c. Core multilayer switch  i. Physical connection between the CPE to the                          CO                        j. Required by digital leased lines to provide ter-                          mination of the digital signal and convert into                          frames ready for transmission on the LAN                       k. Consists of the all-digital, long-haul commu-                          nications lines, switches, routers, and other                          equipment in the provider network                        l. Customer device that provides internetwork-                          ing and WAN access interface ports                       m. Customer device that transmits data over the                          WAN link                       n. Multiport device that sits at the service pro-                          vider edge to switch traffic                       o. Legacy technology device that converts digital                          signals into analog signals transmitted over                          telephone lines                       p. Legacy technology device that can support                          hundreds of dial-in and dial-out users     instructor.indb 150                                                                                                      3/12/14 7:51 AM                         Figure 11-1   WAN Access Options                                                                     WAN                                                                                                  Public                                              Dedicated                                          Internet     instructor.indb 151                                                                                                      3/12/14 7:51 AM . Use the list of WAN access                       options to label Figure 11-1. These options can be classified in various categories. Each type provides various WAN technolo-                       gies. Understanding which WAN access connections and technologies are best suited to your                       situation is an important part of network design.                         Varieties of WAN Link Connections                       Your ISP can recommend several WAN link connection options that based on your specific                       requirements.                                                                              Chapter 11: Connecting to the WAN    151                           Selecting a WAN Technology                       The WAN access connections your small to medium-sized business purchases could use a public                       or private WAN infrastructure—or a mix of both.                152    CCNA Routing and Switching Practice and Study Guide                                     Figure 11-1    WAN Access Options (answer)                                                                                    WAN                                                                      Private                                       Public                                                        Dedicated                     Switched                      Internet                                                       Leased              Circuit.                                  A permanent.              Packet.          Broadband                                                    Lines             Switched               Switched              VPN                                                        T1/E1              PSTN              Metro Ethernet           DSL                                                    T3/E3              ISDN                  MPLS                 Cable                                                                                          Frame Relay            Wireless                                                                                              ATM                                   Labels                                   T1/E1/T3/E3                       ATM                                   Switched                                  Frame Relay                       Circuit switched                      Packet switched                                  Metro Ethernet                    Cable                                 Wireless                                  MPLS                              PSTN                                  DSL                                  VPN                               Private                               Broadband                                  ISDN                              Leased lines                                    Private and Public WAN Access Options                                 As shown in Figure 11-1. WAN access options can first be classified as either private or public.                                  Table 11-2     Private WAN Access Options                                  Private WAN Access Options          Leased MPLS Ethernet ATM ISDN                  VSAT   Dialup Frame                                                                       Lines        WAN                                            Relay                                  Considered the most expensive         X                                  of all WAN access technologies. dedicated WAN            X                                  connection which uses a T. Some options are described more than once.or                                  E-carrier system.                                 Table 11-2 lists descriptions for various private WAN access options. Indicate which one is                                 described.indb 152                                                                                                                       3/12/14 7:51 AM .     instructor.                                  Analog telephone lines are used                                                            X                                  to provide a switched WAN con-                                  nection. Chapter 11: Connecting to the WAN   153     Private WAN Access Options            Leased MPLS Ethernet ATM ISDN    VSAT   Dialup Frame                                                              Lines        WAN                              Relay                       Satellite to router communica-                                           X                       tions for WAN connections.                       Delivers data using fixed 53-byte                           X                       packet cells over permanent and                       switched virtual circuits.                       Service providers and short-path              X                       labeling are used for leased lines,                       Ethernet WANs, and Frame                       Relay WANs.                       Connects multiple sites using                                                             X                       virtual circuits and data-link con-                       nection identifiers.                       Includes MetroE, EoMPLS,                             X                       and VPLS as WAN connection                       options.                       Converts analog to digital signals                                X                       to provide a switched WAN con-                       nection over telephone lines.                       A popular replacement for tra-                       X                       ditional Frame Relay and ATM                       WAN access technologies.     instructor.indb 153                                                                                                   3/12/14 7:51 AM 154      CCNA Routing and Switching Practice and Study Guide     Match the definition on the left with a public WAN access option on the right. This exercise is a one-to-one                 matching.  Definitions                                                 Public WAN Access Options  a. Radio and directional-antenna modem WAN              d. 3G/4G Cellular                          access option provided to public organizations       f. VPN Remote                       b. WAN access option that uses telephone lines          c. WiMax                          to transport data via multiplexed links              e. Satellite Internet                       c. High-speed long-distance wireless connections        b. DSL                          through nearby special service provider towers                                                                               h. Cable                       d. Cellular radio waves WAN access option used                                                                               a. Municipal WiFi                          with smartphones and tablets                                                                               g. VPN site-to-site                       e. Dish and modem-based WAN access option                          for rural users where cable and DSL are not                          available                       f. Secure Internet-based WAN access option                          used by teleworkers and extranet users                       g. Entire networks connected together by using                          VPN routers, firewalls, and security appliances                       h. A shared WAN access option that transports                          data using television-signal networks   Lab - Researching WAN Technologies (CN 2.2.4.3)     instructor.indb 154                                                                                                            3/12/14 7:51 AM CHAPTER 12  Point-to-Point Connections    Point-to-point connections are the most common type of WAN connections. These connections are                       also called serial or leased lines. This chapter reviews the terms, technology, and protocols used in                       serial connections.     instructor.indb 155                                                                                                           3/12/14 7:51 AM 156    CCNA Routing and Switching Practice and Study Guide     Serial Point-to-Point Overview                                 Understanding how point-to-point serial communication across a leased line works is impor-                                 tant to an overall understanding of how WANs function.   Serial Communications                                 Briefly explain the difference between serial and parallel communications.                                 In serial communications, the data is sent 1 bit at a time down one link. In parallel communica-                                 tions, bits are transmitted simultaneously over multiple links.                                 What is clock skew issue in parallel communications?                                 Clock skew is when the bits do not arrive at the same time causing synchronization issues.     instructor.indb 156                                                                                                                3/12/14 7:51 AM Chapter 12: Point-to-Point Connections   157     Match the serial communications definition on the left with a term on the right. This is a one-to-one matching                       exercise.                       Definitions                                               Terms                          a. Cable that allows two WAN end devices to be            h. Physical                             directly connected together                            k. DCE                          b. Signals sent sequentially 1 bit after another           f. Demarc                          c. A networking device that converts signals into         n. CPE                             an ISP WAN circuit format                                                                                     i. ISDN                          d. Universal ports that have replaced both                                                                                     l. DTE                             RS-232 and parallel ports on newer PCs                                                                                     j. Variable                          e. A WAN connection that interconnects two                             LANs directly                                          m. Parallel  f. The point at the customer site where the ISP          c. CSU/DSU                             network ends                                           d. USB                          g. A technique that reassembles multiple data             e. Leased line                             transmissions                                          a. Null modem                          h. The OSI layer where time-division multiplex-           b. Serial                             ing (TDM) operates                                     g. Bit interleaving                           i. A WAN technology that uses TDM                           j. The way that STDM divides bandwidth into                             multiple slots for data transmission                          k. Provides a clocking signal for the WAN circuit                           l. LAN/WAN routers at the customer location                          m. Transmission signals split between multiple                             wires concurrently                          n. The network equipment connected to the                             WAN circuit at the customer location     instructor.indb 157                                                                                                                      3/12/14 7:51 AM                                        X                                  nections between a DTE and DCE                                    HDLC Encapsulation                                 What is the major difference between the ISO 13239 HDLC standard and Cisco’s implementa-                                 tion of HDLC?                                 Cisco’s implementation of HDLC uses a Protocol field to support multiple protocols.25/LAPB   Frame Relay ATM                                  Provides connections over synchro.                                                  X                                  tion and flow control                                  Forms the basis for synchronous                   X                                  PPP                                  Built-in security with PAP and                              X                                  CHAP                                  Transfers data 53 bytes at a time so                                                            X                                  that processing can occur in hard-                                  ware                                  Next-generation protocol after X. Various                                 encapsulation protocols can be used to achieve the framing.indb 158                                                                                                                    3/12/14 7:51 AM .               158    CCNA Routing and Switching Practice and Study Guide                                     WAN Protocols                                 Just like LANs.                                  Figure 12-1   Cisco HDLC Frame Format                                     Figure 12-1a Cisco HDLC Frame Format (answer)                                                        Flag    Address      Control       Protocol   Data    FCS    Flag     instructor.                         X                                  nous and asynchronous circuits                                  International standard for cell relay                                                           X                                  Predecessor to Frame Relay                                                 X                                  Default encapsulation on a serial                 X                                  link between two Cisco devices                                  Eliminates the need for error correc.                                  Table 12-1    WAN Encapsulation Protocols                                  WAN Protocol Description                    HDLC          PPP    SLIP   X. data is encapsulated into frames before transmission onto a WAN link.                                 In Figure 12-1. label the fields of Cisco HDLC frame.25                                                     X                                  Largely replaced by PPP                                           X                                  An ITU-T standard that defines con. In Table 12-1. indicate which pro-                                 tocol best fits the description.                        Cabling is faulty or incorrect. indicate what status would display for each of the conditions of the serial interface.   Is Down.                        R1# configure terminal                       R1(config)# interface serial 0/0/0                       R1(config-if)# encapsulation hdlc                          Troubleshooting Serial Interfaces                       Troubleshooting the cause of a serial interface issue usually begins by entering the show inter-                       face serial command. Line      Up.indb 159                                                                                                                      3/12/14 7:51 AM .                       This is the proper status            X                       line condition.     instructor. This command can return one of six possible statuses for the line.                 X                       The clockrate command                                       X                       is not configured on the                       interface. Line     Administratively                                                           Line        Line       Line      Protocol      Protocol       Down. In                       Table 12-2. including the router prompt. to change the first serial interface on a 1900 series router                       to HDLC.    X Is Up.                       Some statuses are used more than once.                                                                                 Chapter 12: Point-to-Point Connections          159                           List the three different formats of the Control field.    Up.                       The router configuration                                                                              X                       includes the shutdown                       interface configuration                       command. Record the com-                       mands.                       Keepalives are not being                                    X                       sent by the remote router.                       Information (I) Frame                       Supervisory (S) Frame                       Unnumbered (U) Frame                        HDLC Configuration and Troubleshooting                       Although High-Level Data Link Control (HDLC) is the default encapsulation on Cisco synchro-                       nous serial lines. you may need to change the encapsulation back to HDLC. Line                                                         Protocol   Protocol    Protocol     Is Up        Is Down        Protocol Is                                                          Is Up     Is Down     Is Down    (Looped)      (Disabled)        Down                       A high error rate has                                                                 X                       occurred due to a WAN                       service provider problem.                       The same random sequence                                                X                       number in the keepalive is                       returned over the link.                        Table 12-2     Line Conditions and Status Indicators                       Condition of the Serial            Serial     Serial X    Serial    Serial X Is   Serial X Is     Serial X Is                       Interface                         X Is Up.                       The router is not sensing a                     X                       carrier detect (CD) signal.  configuring.                                    ■   HDLC-like framing for transporting multiprotocol packets over point-to-point links                                    ■   Link Control Protocol (LCP) for establishing.                                   PPP Components                                 Briefly described the three main components of PPP.Troubleshooting Serial Interfaces (CN 3. PPP encapsulates data frames for transmission over Layer 2 physi-                                 cal links. and testing the data-link                                        connection                                    ■   Network Control Protocols (NCPs) for establishing and configuring different network                                        layer protocols                                 In Figure 12-2.1.2.               160    CCNA Routing and Switching Practice and Study Guide                                     What command will show whether a DTE or DCE cable is attached to the interface?                                 show controllers                 Packet Tracer                                 Packet Tracer .                                  Figure 12-2 PPP Layered Architecture                                                                  IPv4                    IPv6                                                               IPCP                  IPv6CP                                                                                                      Network Layer                                                     PPP                                                                                                      Data Link Layer                                                                                                        Physical Layer                                     Figure 12-2a PPP Layered Architecture (answer)                                                                  IPv4                    IPv6                                                               IPCP                  IPv6CP                                                                                                      Network Layer                                                                 Network Control Protocol (NCP)                                                    PPP                                                                  Authentication. fill in the missing parts of the PPP layered architecture. Other Options                                                                                                      Data Link Layer                                                                   Link Control Protocol (LCP)                                                                   Synchronous or Asynchronous                                                                                                      Physical Layer                                                                         Physical Media     instructor.indb 160                                                                                                           3/12/14 7:51 AM .7)                  Activity                                    PPP Operation                                 PPP encapsulation has been carefully designed to retain compatibility with most commonly                                 used supporting hardware.                        PPP uses NCPs to negotiate the Layer 3 protocols that will be used to carry data packets.                          ■   Asynchronous serial                          ■   Synchronous serial                          ■   HSSI                          ■   ISDN                       What automatic configurations does the Link Control Protocol (LCP) provide at each end of                       the link?                          ■   Handling varying limits on packet size                          ■   Detecting common misconfiguration errors                          ■   Terminating the link                          ■   Determining when a link is functioning properly or when it is failing                       Briefly describe how PPP uses Network Control Protocol (NCP). configure.                        Figure 12-3 PPP Frame Format                                                                   Field Length. and error detection                    X                       Bring network layer protocols up and down                                                    X                       Encapsulate and negotiate options for IPv4 and IPv6                                          X                       Negotiate and set up control options on the WAN circuit                           X                       Handles limits on packet size                                                     X                       Establish. and test the data link connection                           X                       Uses standardized codes to indicate the network layer protocol                               X                       Determine if link is functioning properly                                         X                       Terminate the link                                                                X                       Manage packets from several network layer protocols                                          X                         Figure 12-3 shows the PPP frame format. compression.                       In Table 12-3. They                       provide functional fields containing standardized codes to indicate the network layer protocol                       type that PPP encapsulates. in Bytes                                              1         1         1          2        Variable   2 or 4    1                                              Flag     Address   Control   Protocol     Data      FCS      Flag     instructor. indicate whether each characteristic describes LCP or NCP.                        Table 12-3    LCP and NCP Characteristics                       Characteristic                                                                    LCP        NCP                       Can configure authentication.                                                                                   Chapter 12: Point-to-Point Connections   161                           List the type of physical interfaces supported by PPP. Answer the following questions about the specific                       features and purpose of each field.indb 161                                                                                                               3/12/14 7:51 AM .  providing a                                 connectionless link that does not require data links to be established.               162    CCNA Routing and Switching Practice and Study Guide                                     What is the bit pattern for the Flag field?                                 01111110                                 Why is the Address field all 1s or 0xFF?                                 On a point-to-point link. Complete                                 the flowchart by properly labeling it with the provided steps.                                 What is the purpose of the Control field?                                 The Control field calls for transmission of user data in an unsequenced frame. the frame is silently discarded.                                 What is the purpose of the Protocol field?                                 The Protocol field uses a 2-byte value to identify what network layer protocol is encapsulated                                 in the data.                                  Figure 12-4 Steps in the LCP Link Negotiation Process                                                Sends                                            Yes                                                                                All options                                           Configure-                                                                               acceptable?                                            Request                                                                                        No                                                                           Yes                             Yes                                                                                All options                    Authentication                                                                               recognized?                        option?                                                                                        No                               No                                                           Determine new                                                                                                                  Link is                                                          negotiation                                                                                                                established                                                          parameters     instructor. the destination node does not need to be addressed.                                 What is the default size of the information stored in the Data field?                                 1500 bytes                                 What does FCS stand for and what is the purpose of this field?                                 The Frame Check Sequence field is used by the receiver to test the integrity of the frame                                 received. If the FCS calculated by the receiver doesn’t match.indb 162                                                                                                               3/12/14 7:51 AM .                                   PPP Sessions                                 What are the three phase for establishing a PPP session?                                    ■   Phase 1: Link establishment and configuration negotiation                                    ■   Phase 2: Link quality determination (optional)                                    ■   Phase 3: Network layer protocol configuration negotiation                                 Figure 12-4 shows a partially labeled flowchart for the LCP link negotiation process.  the LCP passes control to the appropriate NCP. including the following:                          ■   Authentication using either PAP or CHAP                          ■   Compression using either Stacker or Predictor                          ■   Multilink that combines two or more channels to increase the WAN bandwidth                       After the link is established. Figure 12-5 shows                       the NCP process for IPv4.                                                                                    Chapter 12: Point-to-Point Connections         163                           Figure 12-4a Steps in the LCP Link Negotiation Process (answer)                                      Sends            Process                           Yes                                                                       All options              Send                 Receive                                 Configure. Complete the figure by properly labeling it with the provided phas-                       es and steps.                       Missing Labels for Figure 12-5                          ■   IPv4 Data Transfer                          ■   NCP Termination                          ■   IPCP Configure-Request                          ■   IPCP Configure-Ack                          ■   IPCP Terminate-Request                          ■   LCP Maintenance                          ■   IPCP Terminate-Ack                          ■   NCP Configuration     instructor.indb 163                                                                                                                      3/12/14 7:51 AM .       Configure-                                                                      acceptable?           Configure-Ack          Configure-Ack                                  Request           Request                                                                               No                                                                  Yes                                          Yes                                                   Send                All options          Authentication         Authentication                                               Configure-Nak          recognized?              Phase                  option?                                                                               No                                            No                                                Determine new             Send                                                                                                                      Link is                                               negotiation            Configure-                                                                                                                    established                                               parameters              Reject                           Missing Labels for Figure 12-4                          ■   Send Configure-Reject                          ■   Receive Configure-Ack                          ■   Process Configure-Request                          ■   Send Configure-Ack                          ■   Authentication Phase                          ■   Send Configure-Nak                       PPP can be configured to support optional functions.                164    CCNA Routing and Switching Practice and Study Guide                                     Figure 12-5 The NCP Process                                               LCP Configuration                                                                                    IPv4 DATA                                                                                Exchange                                                LCP Termination                                     Figure 12-5a The NCP Process (answer)                                                LCP Configuration                                                                  IPCP Configure-Request                                            NCP Configuration                             IPCP Configure-Ack                                             IPv4 Data Transfer                                                                                IPv4 DATA                                                  and                                                                                Exchange                                           LCP Maintenance                                                                  IPCP Terminate-Request                                             NCP Termination                              IPCP Terminate-Ack                                                LCP Termination     instructor.indb 164                                                                                          3/12/14 7:51 AM .  What                       happens if RTA is not configured with compression?                       During the LCP negotiation phase.1.0/30                                                                2001:DB8:1:F::/64                          Table 12-4   Addressing Table for PPP                       Device          Interface           IPv4 Address                      Subnet Mask                                                           IPv6 Address/Prefix                       RTA             S0/0/0              172.16.16. RTA and RTB will negotiate to not use compression. In addition.                       Record the command.                        Figure 12-6 PPP Topology                                                                                     S0/0/0                                                      S0/0/0                                                RTA                                     .255.252                                                           2001:DB8:1:F::1/64                       RTB             S0/0/0              172.255. PPP has many optional features the network administrator can choose to                       implement. to configure the same compression on RTA.1.                        RTA# configure terminal                       RTA(config)# interface serial 0/0/0                       RTA(config-if)# encapsulation ppp                         RTB is configured for software compression using the Stacker compression algorithm.1                                       RTB                                                                  172. including the router prompt. to configure                       RTA with a basic PPP configuration.                       RTA(config-if)# compress stac                        RTB is configured to take down the link if the quality falls below 70 percent.2                        255. RTB is already con-                       figured with PPP multilink to load balance the traffic to RTA.16.252                                                           2001:DB8:1:F::2/64                         Assume that the router interfaces are already configured with IPv4 and IPv6 addressing.     instructor. Record the commands. to configure the RTA multilink interface including IPv4 and IPv6 addressing                       and the necessary commands for the serial interfaces.                         Basic PPP Configuration with Options                       Figure 12-6 shows the topology and Table 12-4 shows the addressing we will use for PPP con-                       figuration. to configure the equivalent on RTA.                       RTA(config-if)# ppp quality 70                        In Figure 12-7. including                       the router prompt.1.255.255.                                                                            Chapter 12: Point-to-Point Connections   165                           Configure PPP                       PPP is a robust WAN protocol supporting multiple physical layer and network layer implemen-                       tations.1                        255.2                                                      . RTA and RTB are now using two serial links to transfer data.indb 165                                                                                                        3/12/14 7:51 AM . including the router prompt. Record the commands. RTB                       is fully configured with PPP. including the router prompt. Record the com-                       mand. Use the addressing in Table 12-4 for the                       multilink interface rather than Serial 0/0/0. 1. CDPCP.0/30                                                                          2001:DB8:1:F::/64                                   RTA(config)# interface multilink 1                                 RTA(config-if)# ip address 172.255.1 255. line protocol is up                                   Hardware is WIC MBRD Serial                                   Internet address is 172. LCP Open                                   Open: IPCP.               166    CCNA Routing and Switching Practice and Study Guide                                     Figure 12-7   PPP Multilink Topology                                                                                               S0/0/0                                                               S0/0/0                                                          RTA                                  S0/0/1   RTB                                                                 S0/0/1                                                                            172.16.indb 166                                                                                                      3/12/14 7:51 AM .                                  RTA# show interface serial 0/0/0                                 Serial0/0/0 is up. BW 1544 Kbit/sec. loopback not set                                   Keepalive set (10 sec)                                 <output omitted>                                   RTA# show ppp multilink                                   Multilink1                                   Bundle name: RTA                                   Remote Endpoint Discriminator: [1] RTB                                   Local Endpoint Discriminator: [1] RTA     instructor.1. IPV6CP.                                      reliability 255/255. Record the com-                                 mands used to generate the output on RTA. rxload 1/255                                   Encapsulation PPP.1/30                                   MTU 1500 bytes.255.1. CCP.16. txload 1/255.16.252                                 RTA(config-if)# ipv6 address 2001:db8:1:f::1/64                                 RTA(config-if)# ppp multilink                                 RTA(config-if)# ppp multilink group 1                                 RTA(config-if)# interface serial 0/0/0                                 RTA(config-if)# no ip address                                 RTA(config-if)# no ipv6 address                                 RTA(config-if)# encapsulation ppp                                 RTA(config-if)# ppp multilink                                 RTA(config-if)# ppp multilink group 1                                 RTA(config-if)# interface serial 0/0/1                                 RTA(config-if)# no ip address                                 RTA(config-if)# no ipv6 address                                 RTA(config-if)# encapsulation ppp                                 RTA(config-if)# ppp multilink                                 RTA(config-if)# ppp multilink group 1                                   You can verify the operation of PPP using the following show commands. DLY 20000 usec.  The                       password is never sent. 0 inactive (max 255. When you configure an interface with the ppp authentication pap com-                       mand.                       List three situations where PAP would be the appropriate choice for authentication.                       Step 1. 0x2 sent sequence                         Member links: 2 active.                                                                            Chapter 12: Point-to-Point Connections   167                            Bundle up for 00:01:20. ID. the hashed value. the link is vulnerable to attack.     RTB generates an ID and a random number.     RTA then sends the challenge ID. min not set)                              Se0/0/0. and sends that and its username as a                                   CHAP challenge packet to RTA. CHAP                       uses a three-way process with an encrypted hash value generated by the MD5 algorithm.                       CHAP challenges periodically to make sure that the remote node still has a valid password. and the shared secret pass-                                   word. and the two                                   systems agree to use CHAP authentication during the PPP LCP negotiation.indb 167                                                                                                        3/12/14 7:51 AM . load 1/255                         Receive buffer limit 24000 bytes.     RTA initially negotiates the link connection using LCP with router RTB.                       PAP is not interactive.     instructor. Why?                       PAP does not reauthenticate. 0 lost received                              0x2 received sequence.                       Step 4.                       Complete the missing information in the following steps as RTA authenticates with RTB using                       CHAP. total bandwidth 3088.                       Step 2. and its username (RTA) to RTB. frag timeout 1000 ms                              0/0 fragments/bytes in reassembly list                              0 lost fragments.                       PAP uses a two-way process to authenticate with unencrypted plain-text passwords. You are not prompted                       for a username. The receiving node checks the username and password combination and either                       accepts or rejects the connection. So. a hacker can piggyback on an open connection. 0 reordered                              0/0 discarded fragments/bytes. RTA then generates a unique MD5 hash                                   number using the RTB’s username.                       Step 3. since 00:01:20                              Se0/0/1. since 00:01:06                       No inactive multilink interfaces                          PPP Authentication                       Briefly explain the difference between PAP and CHAP. random number. the username and password are sent as one LCP data package.     RTA uses the username of the challenger (RTB) and cross references it with its local                                   database to find its associated password.                          ■    A large installed base of client applications that do not support CHAP                          ■    Incompatibilities between different vendor implementations of CHAP                          ■    Situations where a plain-text password must be available to simulate a login at the                               remote host                       Once PAP authentication is established. indb 168                                                                                                                 3/12/14 7:51 AM .3. the issue is probably                                 the PPP configuration.8)                                    Troubleshoot WAN Connectivity                                 If you cannot ping across a PPP link and you have checked the physical and data link layer                                 issues reviewed in the “Troubleshooting Serial Interfaces” section earlier.Configuring Basic PPP with Authentication (CN 3. what is the command syntax to configure                                 PPP authentication on an interface?                                 Router(config-if)# ppp authentication {chap | chap pap | pap chap | pap }                                  Assume that both PAP and CHAP are configured with the command ppp authentication chap                                 pap on the interface. CHAP.    RTB generates its own hash value using the ID.    RTB compares its hash value with the hash value sent by RTA.                                 The first method specified. Based on the descriptions in Table 12-5.                                 When authentication is local (no AAA/TACACS+).     instructor. will be used. Explain how authentication will proceed. PAP.                                 Step 6. RTB is already configured with PAP authentication with the password cisco123.7)                                  Lab .3.                                 Record the commands to configure PAP on RTA. You can use the debug command to troubleshoot PPP issues using the                                 debug ppp {parameter} syntax.2. will be requested during link negotiation. fill in the correspond-                                 ing parameter you would use with the debug ppp command.                                  RTA(config)# username RTB password cisco123                                 RTA(config)# interface s0/0/0                                 RTA(config-if)# ppp authentication pap                                 RTA(config-if)# ppp pap sent-username RTA password cisco123                                    CHAP Configuration                                 CHAP uses one less command than PAP. the second method specified.Configuring PAP and CHAP Authentication (CN 3. Now record the commands to remove PAP and con-                                 figure RTA to use CHAP authentication.                                  RTA(config)# interface s0/0/0                                 RTA(config-if)# no ppp authentication pap                                 RTA(config-if)# no ppp pap sent-username RTA password cisco123                                 RTA(config-if)# ppp authentication chap                                   Packet Tracer .2. the shared secret password. If the receiving                                 node is not configured for CHAP.               168    CCNA Routing and Switching Practice and Study Guide                                     Step 5. RTB sends a link established response to RTA. If the values are the                                            same. and the                                            random number it originally sent to RTA.                                   PAP Configuration                                 In Figure 12-6. 1.Troubleshooting Basic PPP with Authentication (CN 3.Skills Integration Challenge (CN 3.Troubleshooting PPP with Authentication (CN 3.4.5)                         Packet Tracer                                       Packet Tracer .indb 169                                                                                                                     3/12/14 7:51 AM .4)                         Activity                                       Packet Tracer .                                                                                         Chapter 12: Point-to-Point Connections   169                                           Table 12-5    Parameters for the debug ppp Command                                       Parameter          Usage                                       error              Displays issues associated with PPP connection negotiation and operation                                       compression        Displays information specific to the exchange of PPP connections using                                                          MPPC                                       negotiation        Displays PPP packets transmitted during PPP startup                                       packet             Displays PPP packets being sent and received                                       authentication     Displays authentication protocol messages                                       cbcp               Displays protocol errors and statistics associated with PPP connection                                                          negotiations using MSCB                                          Lab .4.1.1.2)     instructor.5. instructor.indb 170   3/12/14 7:51 AM .      instructor. Frame Relay has been a popular                       alternative to expensive dedicated leased lines. This chapter reviews Frame Relay technology.indb 171                                                                                                              3/12/14 7:51 AM . Frame Relay provides a cost-efficient solution for WAN                       access between multiple sites.                       and troubleshooting.                                                                                                         CHAPTER 13                                                                                                    Frame Relay                          Although newer services are rapidly replacing it in some locations. configuration. verification. 172      CCNA Routing and Switching Practice and Study Guide     Introduction to Frame Relay                Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI                reference model. Unlike leased lines, Frame Relay requires only a single access circuit to the Frame Relay pro-                vider to communicate with other sites connected to the same provider.   Frame Relay Concepts and Terminology                Match the definition on the left with a term on the right. Terms are only used once.  Definitions                                                  Terms                       a. Bandwidth “borrowing” from other PVCs                m. Access rate                          when available                                       n. ANSI                       b. Read Frame Relay was popular when com-               k. Black hole                          pared to private leased lines                                                                               a. Bursting                       c. A preconfigured logical path between two                                                                                f. CIR                          endpoints and assigned a DLCI                                                                               b. Cost savings                       d. A logical connection that is established                          dynamically for the time needed                      p. DE  e. The equivalent of 24 DS0 channels                    h. Disable  f. Guaranteed bandwidth for a specific PVC              l. DLCI  g. Downstream notification that there is conges-         r. DTE                          tion on a Frame Relay switch                         g. FECN                       h. Manual configuration will do this to the auto-       q. Inverse ARP                          sensing of LMI-type feature on Cisco routers          j. LMI                        i. Holding frame in a buffer before sending            c. PVC                        j. Frame Relay extension that allows the DTE to         i. Queuing                          discover the list of available DLCIs configured                                                                               o. Status                          on the access link                                                                               d. SVC                       k. A PVC that no longer exists                                                                               e. T1                        l. Used to identify each Frame Relay circuit                                                                                s. X.25                          endpoint                       m. Port bandwidth of the local loop                       n. One of the three LMI types other than cisco                          and q933a                       o. LMI provides these updates about Frame                          Relay connectivity                       p. Identifies the frames to be dropped in times of                          congestion                       q. Process used by LMI to associate network                          layer addresses to data link layer addresses                       r. The end of the Frame Relay connection that                          initiates requests about the status of its Frame                          Relay links                       s. Protocol replaced by Frame Relay     instructor.indb 172                                                                                                              3/12/14 7:51 AM Chapter 13: Frame Relay   173     Frame Relay Operation                       Frame Relay networks use permanent virtual circuits (PVCs), which uniquely define a logical                       path between two endpoints. Frame Relay is a more cost-effective option than leased lines for                       two reasons:                       The cost of a leased line includes the cost of a full end-to-end dedicated connection. The cost                       of Frame Relay includes only the cost to the local loop.                       Frame Relay shares bandwidth with other customers across the same physical circuit.                       The end of each PVC uses a number to identify it called the data link connection identifier                       (DLCI). What does it mean to say that these numbers are locally significant?                       Locally significant DLCIs means that only the local devices need to know this number. That                       way, the DLCI number can be reused on other equipment throughout the network.                       Frame Relay is statistically multiplexed, meaning that it transmits only one frame at a time, but                       that many logical connections can coexist on a single physical line.                       In Figure 13-1, label the missing fields in a standard Frame Relay frame.  Figure 13-1   Fields of the Standard Frame Relay Frame  8 bits     16 bits            Variable             16 bits   8 bits  Flag      Address              Data                 FCS      Flag     C/R EA                                     EA   Byte 1                        Byte 2    Figure 13-1a Fields of the Standard Frame Relay Frame (answer)  8 bits     16 bits            Variable             16 bits   8 bits  Flag      Address              Data                 FCS      Flag     DLCI        C/R EA       DLCI      FECN BECN DE        EA   Byte 1                        Byte 2     instructor.indb 173                                                                                                       3/12/14 7:51 AM 174    CCNA Routing and Switching Practice and Study Guide     Identify and briefly describe each of the three Frame Relay topologies.                                 Star topology: Also known as a hub-and-spoke topology with a central site connected to                                 branch sites. All branch-to-branch communication is sent through the central (hub) site.                                 Therefore, branch sites are only configured with one VC.                                 Full mesh: Every node is configured with a VC to every other node in the network. However,                                 each node usually only has one physical link to the local Frame Relay switch.                                 Partial mesh: Nodes may have more than one VC configured to remote locations. But all nodes                                 are not configured with all VCs, as in full mesh. This works better for larger networks where a                                 full-mesh topology would be cost prohibitive.                                 A router must know what remote Layer 3 address maps to the locally configured DLCI before                                 it can send data over the link. This mapping can be achieved statically or dynamically.                                 Briefly describe the IPv4 protocol that provides dynamic mapping.                                 Dynamic address mapping relies on Inverse ARP to resolve a next-hop network layer IPv4                                 address to a local DLCI value. The Frame Relay router sends out Inverse ARP requests on its                                 PVC to discover the protocol address of the remote device connected to the Frame Relay net-                                 work.                                 On Cisco routers, what must you do to make sure Inverse ARP is operational?                                 Nothing; Inverse ARP is enabled by default.                                 What is the command syntax to disable Inverse ARP?                                 Router(config-if)# no frame-relay inverse-arp  What is the command syntax to override dynamic mapping and statically configure the map?                                 Router(config-if)# frame-relay map protocol protocol-addressdlci [broadcast] [ietf]                                 [cisco]  Why would you use the keyword ietf?                                 Use the keyword ietf when connecting to a non-Cisco router.                                 Why would you use the keyword broadcast?                                 The keyword broadcast allows broadcast and multicast traffic to be sent over the VC, which                                 can greatly simplify the configuration of routing protocols like OSPF.                                 What command can you use to verify Frame Relay maps?                                 show frame-relay map                                 Briefly describe the Local Management Interface (LMI).                                 LMI is an extension of Frame Relay that provides additional capabilities including the ability                                 for DTEs to dynamically acquire information about the status of the network.                                 LMI uses reserved DLCIs in the range from 0 to 1023 to exchange LMI messages between the                                 DTE and DCE.                                 What are the three LMI types supported by Cisco routers?                                 CISCO, ANSI, Q933A                                 With Cisco IOS software release 11.2, the LMI type does not need to be configured because                                 it is autosensed.     instructor.indb 174                                                                                                               3/12/14 7:51 AM Chapter 13: Frame Relay   175     In Figure 13-2, RTA and RTB are both configured to use Frame Relay with the IPv4 addressing                       and DLCIs shown. RTA has just booted up. Fully explain how RTA will dynamically learn the                       DLCIs from the local Frame Relay switch and then dynamically learn the IPv4 address of RTB.  Figure 13-2 Frame Relay Topology   S0/0/0                                                   S0/0/0                                         10.10.10.1/30              Frame                  10.10.10.2/30                                                                    Relay  RTA                                                                       RTB                                             DLCI 201                                     DLCI 102  PVC    After booting, RTA will autosense the LMI type used on the local loop. Then RTA will send                       an LMI status inquiry message to the local Frame Relay switch. The local Frame Relay switch                       replies to the query with all the VCs configured on the access link. This will include the DLCI                       201, which the Frame Relay network has mapped internally to reach RTB. Once RTA has the                       DLCIs for the access link (only 201 in this example), it sends an Inverse ARP message which                       is forwarded by the Frame Relay network to RTB. RTB responds to the Inverse ARP message                       with its IPv4 address. When RTA receives the response from RTB, it will map the local DLCI                       201 to the IPv4 address of RTB.                       From the customer’s point of view, Frame Relay is one interface configured with one or more                       PVCs. The rate at which data will be accepted by the local Frame Relay switch is contracted.                       The access rate is the actual speed of the port connected to the service provider. It is not pos-                       sible to send data any faster. The committed information rate (CIR) is the rate at which the cus-                       tomer can send data into the Frame Relay network. All data at or below this rate is guaranteed.                       What does the term oversubscription mean in relation to Frame Relay? What problems can it                       cause?                       A service provider may decide to oversell an access link on the assumption that everyone that                       is subscribed on the link will not need to use the link for their full subscription all the time.                       Traffic will be dropped in situations where a link is oversubscribed and then subsequently                       overutilized.                       When the Frame Relay network is underutilized, customers can burst over their CIR at no addi-                       tional cost. The committed burst size (Bc) is a negotiated rate above the CIR that the customer                       can use to transmit for short bursts, and represents the maximum allowed traffic under normal                       working conditions. When sending at a rate higher than the CIR, the Discard Eligibility (DE)                       bit is set to 1 in every frame so that the Frame Relay network can discard the frame if conges-                       tion is occurring.                       However, when there is congestion on the Frame Relay network, the switch that is experienc-                       ing congestion will begin setting the Forward Explicit Congestion Notification (FECN) bit to                       1 to inform downstream devices that there is congestion on the network. It will also set the                       Backward Explicit Congestion Notification (BECN) bit to 1 and send a message to the source                       to throttle back the speed at which it is sending data. In addition, the Frame Relay switch expe-                       riencing congestion will discard every frame that has the DE bit set to 1.     instructor.indb 175                                                                                                       3/12/14 7:51 AM 176    CCNA Routing and Switching Practice and Study Guide     Configure Frame Relay                                 Frame Relay connections are created by configuring customer premise equipment (CPE) routers                                 or other devices to communicate with a service provider Frame Relay switch. The service provider                                 configures the Frame Relay switch, which helps keep end-user configuration tasks to a minimum.   Configure Basic Frame Relay                                 Because so many of the features of Frame Relay are enabled by default, configuration is                                 straightforward. Assuming the interface is correctly addressed, the basic configuration is simply                                 a matter of changing the encapsulation on the interface.                                 In Figure 13-3, RTB is configured and ready to send traffic on the Frame Relay network.                                 Assume RTA is already configured with IPv4 and IPv6 addressing. Record the commands,                                 including the router prompt, to enable Frame Relay.  Figure 13-3                                                  S0/0/0                                                    S0/0/0                                                  10.10.10.1/30                                      10.10.10.2/30                                                  2001:DB8:1:F::1/64                           2001:DB8:1:F::2/64                                                  Link Local: FE80::1        Frame             Link Local: FE80::2                                                                             Relay  RTA                                                                       RTB                                                       DLCI 201                                    DLCI 102  PVC                                 RTA# configure terminal                                 RTA(config)# interface serial 0/0/0                                 RTA(config-if)# encapsulation frame-relay   Connectivity between RTA and RTB should now be operational for IPv4 traffic. However, in                                 our example, IPv6 requires static mapping. You will need to map both the globally unique and                                 link local IPv6 addresses. Because the link local address is used for multicasts, you will need                                 to add the keyword broadcast to your frame relay map configuration. Record the commands,                                 including the router prompt, to statically configure RTA with IPv6 frame relay maps.                                 RTA(config)# interface s0/0/0                                 RTA(config-if)# frame-relay map ipv6 2001:db8:1:f::2 201                                 RTA(config-if)# frame-relay map ipv6 fe80::2 201 broadcast   Record the command used to generate the following output verifying the IPv4 and IPv6 maps.                                 RTA# show frame-relay map                                 Serial0/0/0 (up): ipv6 FE80::2 dlci 201(0xC9,0x3090), static,                                                 broadcast,                                                 CISCO, status defined, active                                 Serial0/0/0 (up): ipv6 2001:DB8:1:F::2 dlci 201(0xC9,0x3090), static,                                                 CISCO, status defined, active                                 Serial0/0/0 (up): ip 10.10.10.2 dlci 201(0xC9,0x3090), dynamic,                                                 broadcast,                                                 CISCO, status defined, active   Packet Tracer                                 Packet Tracer - Configuring Static Frame Relay Maps (CN 4.2.1.4)                  Activity     instructor.indb 176                                                                                                                 3/12/14 7:51 AM  including the router prompts.10. this can cause reachability issues                       without proper configuration. record the commands.10. In a Frame Relay nonbroadcast multi-                       access (NBMA) topology like the one shown in Figure 13-4.                       Broadcast and multicast replication: Broadcast and multicast traffic must be replicated for                       each PVC that is configured on the interface.10. you must create subinterfaces                       so that each PVC can have its own Layer 3 addressing.6/30                                                                                             DLCI 103                         Briefly describe the three reachability issues caused by NBMA topologies. configure sub-                       interfaces.                       What are the three ways to solve these reachability issues?                       One or more of the following: disable split horizon. build a full mesh topology.10.                        Figure 13-4 Frame Relay NBMA Topology                                                                                                 S0/0/0                                                                                         10.10.                        RTA(config)# interface serial 0/0/0                       RTA(config-if)# encapsulation frame-relay                       RTA(config-if)# no ip address                       RTA(config-if)# no shutdown                       RTA(config-if)# exit                       RTA(config)# interface serial 0/0/0.301                                          10.10.5/30                                                  RTC                                                                          PVC                   S0/0/0                                          DLCI 301                                       10.201 point-to-point                       RTA(config-subif)# ip address 10.                       Neighbor discovery: In OSPF.255.1 255.                       Split horizon: This rule states that an update received on a physical interface should not be                       retransmitted out that same physical interface.                                                                                         Chapter 13: Frame Relay      177                           Configure Subinterfaces                       When configuring a hub-and-spoke topology with Frame Relay. to configure RTA                       with Frame Relay using point-to-point subinterfaces.1/30                                          DLCI 201                                                       RTB                                                                    Frame Relay                                                                       NBMA                                   RTA                                          S0/0/0.10.2/30                                                                                             DLCI 102                                          S0/0/0.10. This can consume considerable bandwidth which                       might impact user traffic if the path already has low bandwidth.201                                          10.indb 177                                                                                                         3/12/14 7:51 AM . RTA is the hub router and RTB and RTC are spokes.10.                       In Figure 13-4. Given the information                       shown in Figure 13-4.252                       RTA(config-subif)# frame-relay interface-dlci 201                       RTA(config-fr-dlci)# exit                       RTA(config-subif)# exit     instructor.10. the DR/BDR election must result in the hub router as DR                       because it is the only router that has PVCs to all other routers.255. 301                                 RTA(config-subif)# ip address 10.2.2. and troubleshooting is necessary. 0 packets/sec                                   5 minute output rate 0 bits/sec.5 255.                                 Record the Frame Relay verification commands that generated the following output:                                  RTA# show frame-relay pvc                                   PVC Statistics for interface Serial0/0/0 (Frame Relay DTE)                                                  Active       Inactive        Deleted       Static                                   Local            1             0              0            0                                   Switched         0             0              0            0                                   Unused           0             0              0            0                                   DLCI = 201.255. Sent 14                Num Status msgs Rcvd 15     instructor.Configuring Frame Relay Point-to-Point Subinterfaces (CN 4.255. INTERFACE = Serial0/0/0                                     input pkts 1                output pkts 1              in bytes 34                                   out bytes 34                dropped pkts 0             in pkts dropped 0                                   out pkts dropped 0                   out bytes dropped 0                                   in FECN pkts 0              in BECN pkts 0             out FECN pkts 0                                   out BECN pkts 0             in DE pkts 0               out DE pkts 0                                   out bcast pkts 1            out bcast bytes 34                                   5 minute input rate 0 bits/sec. last time pvc status changed 00:01:38                                 RTA# show frame-relay lmi                                   LMI Statistics for interface Serial0/0/0 (Frame Relay DTE) LMI TYPE = CISCO                                   Invalid Unnumbered info 0              Invalid Prot Disc 0                                   Invalid dummy Call Ref 0               Invalid Msg Type 0                                   Invalid Status Message 0               Invalid Lock Shift 0                                   Invalid Information ID 0               Invalid Report IE Len 0                                   Invalid Report Request 0               Invalid Keep IE Len 0                                   Num Status Enq.2.10.indb 178                                                                                                           3/12/14 7:51 AM .               178    CCNA Routing and Switching Practice and Study Guide                                    RTA(config)# interface serial 0/0/0.2. Nonetheless.7)                  Packet Tracer                                 Packet Tracer .Configuring Frame Relay and Subinterfaces (CN 4. sometimes the network performs at                                 less-than-expected levels.252                                 RTA(config-subif)# frame-relay interface-dlci 301                                 RTA(config-fr-dlci)#                                   Lab . PVC STATUS = ACTIVE.6)                  Activity                                    Troubleshoot Connectivity                                 Frame Relay is generally a reliable service.10. 0 packets/sec                                   pvc create time 00:02:12. DLCI USAGE = LOCAL. 10. indicate which command enables you to verify the described information.                                       CISCO. LAPF state down                         Broadcast queue 0/64. LMI stat recvd 16.1/30                         MTU 1500 bytes. DTE LMI up                         LMI enq recvd 0.     show frame. loopback not set                         Keepalive set (10 sec)                         LMI enq sent    15.10.0x3090).                                       CISCO. txload 1/255. LMI upd sent     0                         LMI DLCI 1023    LMI type is CISCO   frame relay DTE                         FR SVC disabled. LMI upd recvd 0.indb 179                                                                                                      3/12/14 7:51 AM . active                       Serial0/0/0 (up): ipv6 2001:DB8:1:F::2 dlci 201(0xC9. BW 1544 Kbit/sec.                              reliability 255/255. rxload 1/255                         Encapsulation FRAME-RELAY. interface                         <output omitted>                         RTA# show frame-relay map                       Serial0/0/0 (up): ip 10.                        Table 13-1    Frame Relay Verification Commands                       Frame Relay Information         show interface    show frame.2 dlci 201(0xC9. active                       RTA#                         In Table 13-1. DLY 20000 usec. static.             X               X                       ries sent and received                       Layer 1 and Layer 2 status             X                       information                       LMI type                               X                                               X                       Invalid LMI types                                      X     instructor.   show frame-                       Verified                            serial          relay lmi        relay pvc     relay map                       Broadcast status for the PVC                                                           X                       PVC status                                                              X              X                       Number of LMI status que. Some                       information can be verified with more than one command.0x3090). static.                                       broadcast. line protocol is up                         Hardware is WIC MBRD Serial                         Internet address is 10.                                                                                         Chapter 13: Frame Relay   179                            Num Update Status Rcvd 0                 Num Status Timeouts 0                         Last Full Status Req 00:00:23            Last Full Status Rcvd 00:00:23                       RTA# show interface serial 0/0/0                       Serial0/0/0 is up. active                       Serial0/0/0 (up): ipv6 FE80::2 dlci 201(0xC9. LMI stat sent    0.10.                                       CISCO.                                       broadcast.0x3090). status defined. broadcasts sent/dropped 1/0. status defined. status defined. dynamic.10. 1.4.Skills Integration Challenge (CN 4.indb 180                                                                                                       3/12/14 7:51 AM .               180    CCNA Routing and Switching Practice and Study Guide                                      Frame Relay Information       show interface   show frame.  show frame-                                  Verified                          serial         relay lmi     relay pvc    relay map                                  Number of ECN packets in                                         X                                  and out                                  DLCI assigned to the PVC                                         X             X                                  The encapsulation type              X                                  Frame Relay DTE/DCE type            X                                    Packet Tracer .2)                Packet Tracer                  Challenge     instructor.  show frame. 0.                        Class        Address Range                                          CIDR Prefix                       A            10.0.255                              172.255                            192.16. But for the short term.0–172.0/16                        Briefly explain the following terms:                           ■   Inside local address: The address of the source as seen from inside the network.indb 181                                                                                                             3/12/14 7:51 AM . Only the registered holder of a public Internet address can assign that address to a                       network device.0.                           ■   Inside global address: The address of source as seen from the outside network.3 billion IPv4 addresses would not be enough.0.0.255.168.                                                                                                           CHAPTER 14                                            Network Address Translation for IPv4                          All public IPv4 addresses that transverse the Internet must be registered with a Regional Internet                       Registry (RIR).     instructor. Although                               uncommon.0–192.                           ■   Outside global address: The address of the destination as seen from the outside network.0–10.16.0.255.                         NAT Characteristics                       Fill in the table with the private addresses defined by RFC 1918. this address could differ from the globally routable address of the destination.255.255.                       it soon became obvious that 4.168.31.0/8                       B            172.0/12                       C            192. Networks are commonly implemented using private IPv4 addresses. several solutions were implemented by the IETF. With the proliferation of personal computing and the advent of the World Wide Web.0.168.255                                10.0.                       including Network Address Translation (NAT) and RFC 1918 private IPv4 addresses.                          NAT Operation                       There are not enough public IPv4 addresses to assign a unique address to each device connected to the                       Internet.                           ■   Outside local address: The address of the destination as seen from the inside network. The long-term solution                       was to eventually be IPv6. Most                               often the outside local and outside global addresses are the same.                                     ■   Port Address Translation (PAT): Many-to-one address mapping between local and global                                        addresses.0.                                 What is the difference between dynamic NAT and PAT?                                 Dynamic NAT uses a pool of public addresses and assigns them on a first-come. It is also useful for devices                                 that must be accessible by authorized personnel when offsite.1                                          Web Server                                                      Outside         Outside           Inside              Inside                                                    Local          Global            Global               Local                                    Types and Benefits of NAT                                 Briefly describe the three types of NAT:                                    ■   Static address translation (static NAT): One-to-one address mapping between local and                                        global addresses.51. This method is also known as overloading (NAT overloading).100.51.                                  Figure 14-1   Identify NAT Address Types                                           203.                                 When is it appropriate to use static NAT?                                 Static NAT is particularly useful for web servers or devices that must have a consistent address                                 that is accessible from the Internet.11                                                                                                                  192.168.2                                                                  WWW                                                PC1                                                                                                   R1                                                                             ISP                  192.               182    CCNA Routing and Switching Practice and Study Guide                                     In Figure 14-1. label each type of NAT address.168.                                    ■   Dynamic address translation (dynamic NAT): Many-to-many address mapping between                                        local and global addresses.                                 List and explain at least three advantages and three disadvantages to using NAT. such as a company web server.2                                                                  WWW                                                PC1                                                                                                   R1                                                                             ISP                  192.5                                                                                   198.1                                          Web Server                                     Figure 14-1a Identify NAT Address Types (Answer)                                           203.                                 Advantages                                    ■   Conserves the legally registered addressing scheme                                    ■   Increases the flexibility of connections to the public network     instructor.indb 182                                                                                                                 3/12/14 7:51 AM .51.11                                                                                                                  192.51.51.113. first-served                                 basis.0.51.168.100.5                                                                                   198.168.113. PAT maps multiple private addresses to one or a few public addresses using the source                                 port number to track connections. but not by the general public                                 on the Internet. 254                                                                           Static NAT                                                                           Translation                                                                                                              http://64.10                                                         209. Adding PAT to a dynamic NAT is as simple as adding a                                       keyword to the configuration.2.2.1     instructor.1.                                       Step 2.10.                                       Step 3.    Configure the inside interface of the LAN the device is attached to participate in                                                  NAT with the ip nat inside interface configuration command.indb 183                                                                                                                         3/12/14 7:51 AM .16.                                          ■   End-to-end IP traceability is lost.100.    Create a map between the inside local IP address and the inside global IP address                                                  with the ip nat inside source static local-ip global-ip global configuration com-                                                  mand.6/WAN 5.1. Static NAT and dynamic                                       NAT configurations vary slightly.6)                         Activity                                          Configuring NAT                                       Configuring NAT is straightforward if you follow a few simple steps.1.                                        Figure 14-2 Static NAT Configuration Topology                                                               Inside Network                      Outside Network                                                                                 S0/0/0                                                                                                   S0/1/0                                                                                                              Internet                                                                                            R2                                                 Web Server                                                               Client                                                 172.10 64.201.100.                                       R2(config)# ip nat inside source static 172.                                          ■   End-to-end functionality is degraded.1                                         The web server uses an inside local address 172.                                                                                   CHAPTER 14: Network Address Translation for IPv4   183                                              ■   Provides consistency for internal network addressing schemes                                          ■   Provides network security                                       Disadvantages                                          ■   Performance is degraded.1.10.                                          ■   Initiating TCP connections can be disrupted.    Configure the outside interface where NAT translation will occur with the ip nat                                                  outside interface configuration command.                                       Refer to the topology in Figure 14-2 to configure static NAT.10 that needs to be translated to the inside                                       global address 64.10.100.1.                                         Configuring Static NAT                                       Use the following steps to configure static NAT:                                       Step 1.165.16.                         Packet Tracer                                       Packet Tracer .                                          ■   Tunneling becomes more complicated.16. Record the command including router prompt to configure the                                       static translation on R2.Investigating NAT Operation (RSE 11.1. 0 64.252     instructor.     Configure the inside interface of the LAN the device is attached to participate in                                             NAT with the ip nat inside interface configuration command.0/24                                               PC1                                                                 Inside Network                  Outside Network                                           172.4/WAN 5.100.16.                                 Step 3.2.                                  R2(config)# interface Serial0/0/0                                 R2(config-if)# ip nat inside                                   Record the commands including router prompt to configure the outside interface.100.1.3 netmask 255.0/30.10                    Dynamic NAT                                            172. Record the command including router                                 prompt to configure the NAT pool with an appropriate name.     Configure an ACL to specify which inside local addresses will be translated using a                                             standard ACL.indb 184                                                                                                               3/12/14 7:51 AM .     Configure the outside interface where NAT translation will occur with the ip nat                                             outside interface configuration command.0/24                                   The pool of available addresses is 64.2.1.                                  R1(config)# ip nat pool NAT 64.2.0/30                                             172.                                  R2(config)# interface Serial0/1/0                                 R2(config-if)# ip nat outside                                    Packet Tracer .10.10.10.     Define the pool of addresses that will be used for dynamic translation using the                                             ip nat pool name start-ip end-ip {netmask netmask | prefix-length prefix-length}                                             global configuration command.16.                                 Step 2.4)                Packet Tracer                  Activity                                  Configuring Dynamic NAT                                 Use the following steps to configure dynamic NAT:                                 Step 1.100.     Bind the NAT pool to the ACL with the ip nat inside source list ACL-number pool                                             name global configuration command.                                 Refer to the topology in Figure 14-3 to configure dynamic NAT.16.100.                                  Figure 14-3 Dynamic NAT Configuration Topology                                           172.Configuring Static NAT (RP 11.10                                                                                 S0/0/0                                                                                                S0/1/0                                                                                                          Internet                                                           R1                              R2                                                                                                                     Server                                              PC2               NAT POOL: 64.               184    CCNA Routing and Switching Practice and Study Guide                                     Record the commands including router prompt to configure the inside interface.1.                                 Step 4.1.255.255.10.16.                                 Step 5.2. 2. 172.0/24     instructor.16.0.10                                                                                      S0/0/0                                                                                                       S0/1/0                                                                                                                     Internet                                                                R1                                R2                                                                                                                                Server                                                   PC2                                                  172.0 0.5)                         Activity                                        Configuring Port Address Translation                                       Configuring Port Address Translation (PAT) is just like configuring dynamic NAT except you                                       add the keyword overload to your binding configuration:                                        Router(config)# ip nat inside source list ACL-number pool name overload                                        However.2.2.0/24 and 172.16.0. In fact.1                                                172.16.1.2.”                                       To configure NAT to overload the public IP address on an interface.Configuring Dynamic and Static NAT (RP 11.0.10                                            64. need to be translated. this is what a home router does “out of the box.2.5/WAN 5.6)                         Packet Tracer   Packet Tracer . there is no pool configuration.255                                         Record the command including router prompt to bind the NAT pool to the ACL.0/24.2.16.                                        R1(config)# access-list 1 permit 172.indb 185                                                                                                                           3/12/14 7:51 AM .16.                                       Refer to the topology in Figure 14-4 to configure PAT.2. of course.                                                                                CHAPTER 14: Network Address Translation for IPv4        185                                           The two LANs. No other addresses are                                       allowed.0/24                                                    PC1                                                                      Inside Network                    Outside Network                                                172.16.16.0.1. Record the command including router prompt to configure the ACL.2.                                        Figure 14-4 Dynamic NAT Configuration Topology                                               172.100.10.2. use the following                                       command:                                       Router(config)# ip nat inside source list ACL-number interface type number overload                                        In this case.                                        R1(config)# ip nat inside source list 1 pool NAT                                        Record the commands including router prompt to configure the inside interface.                                        R2(config)# interface Serial0/1/0                                       R2(config-if)# ip nat outside                                         Lab .1.2.Configuring Dynamic NAT (RP 11.1.255                                       R1(config)# access-list 1 permit 172.                                        R2(config)# interface Serial0/0/0                                       R2(config-if)# ip nat inside                                         Record the commands including router prompt to configure the outside interface.2.0 0.2.16. a more common solution in a small business enterprise network is to simply overload                                       the IP address on the gateway router.6/WAN 5.                186    CCNA Routing and Switching Practice and Study Guide                                     R1 is using the public IP address 64.51. Use the options in Table 14-1 to fill in the source address (SA).51.1                    ISP                                             PC1                                                                                                            Internet                                                                     R1                                                                               64.5           192. PAT maintains a table of                                 inside and outside addresses mapped to port numbers to track connections between the source                                 and destination.10.5           192.10.168. Record the command                                 including router prompt to bind the ACL you configured for dynamic NAT to the Serial 0/1/0                                 interface.11                                  1150                         53                            192.168.indb 186                                                                                                                         3/12/14 7:51 AM .                                 The series of Figures 14-5 through 14-8 illustrate the PAT process overloading an interface                                 address.10.                                 and corresponding port numbers as the packet travels from source to destination and back.201.2                  192.11                                         192. the process of                                 translating inbound and outbound packets is a bit more involved.                                  R1(config)# ip nat inside source list 1 interface s0/1/0 overload                                  That’s it! The rest of the commands are the same as dynamic NAT.5              209.2                                                                                                                             Web Server                                                        SA                           DA                                                   Source Port               Destination Port                                                    1150                          80                                    Figure 14-5a Hop1: PC1 to NAT-Enabled R1 (Answer)                                                                                                                            209.2                                                                                                                             Web Server                                                        SA                           DA                                                192.201.168.51.165.165.51.201.1 on the Serial 0/1/0 interface.100.165.168.5                  1268                      209.11                                         192.11                                                 Source Port               Destination Port                                                    1150                          80     instructor.                                  Table 14-1      Addresses and Port Numbers                                  64.168.51.10.100.51.1              80                                   Figure 14-5 Hop 1: PC1 to NAT-Enabled R1                                                                                                                            209.100.168.100. destination address (DA).201.165.51.1                    ISP                                             PC1                                                                                                            Internet                                                                     R1                                                                               64.168. However. indb 187                                                                                                                 3/12/14 7:51 AM .10.2                                                                                                                 Web Server                                                                                     SA                         DA                                                                             64.168.2                                                                                                                 Web Server                                                                                     SA                         DA                                                                                Source Port              Destination Port     instructor.51.165.5       192.                                                                  CHAPTER 14: Network Address Translation for IPv4            187                           Figure 14-6 Hop 2: NAT-Enabled R1 to Web Server                                                                                                              209.11                             192.168.11                             192.51.51.100.11                             192.168.201.1                   ISP                                 PC1                                                                                           Internet                                                     R1                                                               64.5       192.201.2                                                                                                                 Web Server                                                                                     SA                         DA                                                                                Source Port              Destination Port                                                                                 1268                          Figure 14-6a Hop 2: NAT-Enabled R1 to Web Server (Answer)                                                                                                              209.2              209.165.51.51.168.5       192.201.10.100.201.165.168.100.1                   ISP                                 PC1                                                                                           Internet                                                     R1                                                               64.11                                                                              Source Port              Destination Port                                                                                 1268                        80                          Figure 14-7    Hop 3: Web Server to NAT-Enable R1                                                                                                              209.1                   ISP                                 PC1                                                                                           Internet                                                     R1                                                               64.51.100.168.10.165.10. 51.165.201.11                64.10.168.2                                                                                                                                 Web Server                                                      SA                          DA                                            209.51.1                     ISP                                            PC1                                                                                                           Internet                                                                  R1                                                                            64.51.10.51.11                                       192.168.5                                              Source Port               Destination Port                                                   80                         1150     instructor.               188    CCNA Routing and Switching Practice and Study Guide                                     Figure 14-7a Hop 3: Web Server to NAT-Enable R1 (Answer)                                                                                                                              209.5         192.100.201.165.11                                        192.168.100.5         192.1                     ISP                                            PC1                                                                                                           Internet                                                                  R1                                                                            64.165.100.168.168.201.10.165.100.11              192.168.165.1                     ISP                                            PC1                                                                                                           Internet                                                                  R1                                                                            64.11                                        192.201.201.51.5          192.51.2                                                                                            Source Port                Destination Port                                                                                                80                          1268                                    Figure 14-8 Hop 4: NAT-Enabled R1 to PC1                                                                                                                               209.2                                                                                                                                 Web Server                                                      SA                          DA                                                Source Port               Destination Port                                     Figure 14-8a Hop 4: NAT-Enabled R1 to PC1 (Answer)                                                                                                                               209.168.indb 188                                                                                                                            3/12/14 7:51 AM .2                                                                                                                                  Web Server                                                                                                   SA                           DA                                                                                          209.10.51.  label the missing parts of the IPv6 ULA address structure. where NAT can map outgoing requests against incoming replies.4)                                         Configuring NAT and IPv6                                       IPv6 includes both its own IPv6 private address space and NAT.                                                                               CHAPTER 14: Network Address Translation for IPv4   189                                           Lab .2.3.2.                                       The port forwarding configuration is commonly done in a GUI. However.Implementing Static and Dynamic NAT (RP 11.indb 189                                                                                                                     3/12/14 7:51 AM .Configuring NAT Pool Overload and PAT (RP 11.                                        Figure 14-9 IPv6 Unique Local Address Structure                                                                                     Bits                                                               L                          Subnet ID                                                                        Pseudo-                                                                                                       EUI-64.                                       In Figure 14-9.3. To resolve this problem. IPv6 uses a unique local address (ULA) for communication                                       within a local site.7)                         Packet Tracer   Packet Tracer .4.6/WAN 5.2. peer-to-peer connections work only from the inside                                       out.2.3. which are implemented                                       differently than they are for IPv4.6)                         Activity                                        A Word About Port Forwarding                                       Because NAT hides internal addresses.4/WAN                       Packet Tracer                         Activity      5. you can configure                                       port forwarding to identify specific ports that can be forwarded to inside hosts. you can also                                       configure port forwarding in the Cisco IOS adding the following command to your NAT                                       configuration:                                       Router(config)# ip nat inside source {static {tcp | udp local-ip local-port global-ip                                       global-port} [extendable]                                         Packet Tracer .3.2. Random.7/WAN 5. The problem is that NAT                                       does not allow requests initiated from the outside.Configuring Port Forwarding on a Linksys Router (RP 11. or                                                                    Random                                                                                                       Manual Configuration                                                                    Algorithm                                                         1 or 0     instructor.4.2.                                     ■   Allow sites to be combined or privately interconnected.                                   Troubleshooting NAT                                 When there are IPv4 connectivity problems in a NAT environment. Is there a static NAT implementa-                                            tion? Are the addresses in the dynamic pool actually valid? Are the inside and out-                                            side interfaces correctly identified?                                 Step 2. it is often difficult to                                 determine the cause of the problem. This                                 allows the IPv6 packet to be transmitted over an IPv4-only network.    Review in detail what is happening to the packet.indb 190                                                                                                                3/12/14 7:51 AM .    Review the purpose of the NAT configuration. The first step in solving the problem is to rule out NAT as                                 the cause.     instructor. without creating any address                                        conflicts or requiring renumbering of interfaces that use these prefixes                                    ■   Independent of any ISP and can be used for communications within a site without                                        having any Internet connectivity                                    ■   Not routable across the Internet.               190    CCNA Routing and Switching Practice and Study Guide                                     Figure 14-9a IPv6 Unique Local Address Structure (Answer)                                                                                Bits                                                 7         1          40                  16                   64                                                                                             /64                                              Prefix      L      Global ID         Subnet ID              Interface ID                                                                   Pseudo-                                                                                                   EUI-64. there is                                        no conflict with other addresses                                 What is the main purpose of NAT for IPv6?                                 To provide a translation mechanism between IPv6 and IPv4 networks                                 Briefly describe the three transition strategies to move from IPv4 to IPv6.                                 Step 4. which is now replaced with NAT64.                                 Step 3. Translation strategies                                 include NAT-PT. Briefly describe three characteristics of ULAs. Follow these steps to verify that NAT is operating as expected:                                 Step 1.    Use the clear ip nat translations * and debug ip nat commands to verify that NAT                                            is operating as expected.                                 Dual stack is when the devices are running protocols associated with both the IPv4 and IPv6.    Verify that correct translations exist in the translation table using the show ip nat                                            translations command. and verify that routers have the                                            correct routing information to move the packet. but if accidentally leaked by routing or DNS. or                                           FC00::/7            Random                                                                                                   Manual Configuration                                                               Algorithm                                                      1 or 0                                  ULAs are also known as local IPv6 addresses.                                 Tunneling for IPV6 is the process of encapsulating an IPv6 packet inside an IPv4 packet. Random. Check to see whether dynamic entries are re-created after                                            they are cleared. 3.1.4)                                        Packet Tracer .3.3.4.Troubleshooting NAT Configurations (RP 11.1.indb 191                                                                                                               3/12/14 7:51 AM .4/WAN                         Activity      5.5/WAN 5.1.2)     instructor.1.3.                                                                         CHAPTER 14: Network Address Translation for IPv4   191                                           Lab .Skills Integration Challenge (RP 11.4.5)                         Packet Tracer   Packet Tracer .Verifying and Troubleshooting NAT Configurations (RP 11.1.2/WAN 5.1. indb 192   3/12/14 7:51 AM .instructor.  working from                       home has become a popular option for both employees and companies alike. VPN. This chapter reviews DLS. There are several fac-                       tors to consider when choosing a broadband solution. Virtual private networks                       (VPN) allow workers to securely connect to the business from remote locations.indb 193                                                                                                           3/12/14 7:51 AM . wireless. cable.                       and the factors to consider when implementing broadband solutions.     instructor.                                                                                                       CHAPTER 15                                                                                Broadband Solutions                          With the advent of broadband technologies like digital subscriber line (DSL) and cable.      instructor.                                   Business Requirements for Teleworker Services                                 Both the teleworker and the business must meet certain minimum requirements to implement                                 teleworking services for the organization. indicate whether the teleworker or the                                 company is responsible for each requirement. indicate which group primarily receives the benefit described. employers.indb 194                                                                                                                3/12/14 7:51 AM .                                 Lack of technology support and services compared to colleagues that are in the office.                                 Teleworking can have its own set of distractions like household chores or leisure pursuits like                                 watching TV.               194    CCNA Routing and Switching Practice and Study Guide                                     Teleworking                                 Teleworking is working away from the traditional workplace by using telecommunication tech-                                 nologies such as broadband and VPN security.                                  Table 15-1    Benefits of Teleworking                                  Benefit                                             Employer      Government/      Individual                                                                                                     Community                                  Improves employee morale                               X                                  Decreases recruitment and retention costs              X                                  Reduces local infrastructure costs                                     X                                  Attracts local employment and development                              X                                  Saving time or earning more in the same time                                            X                                  Increases available time to care for dependents                                         X                                  Reduces absenteeism levels                             X                                  Reduces the impact of urban drift                                      X                                  Reduces costs associated with commuting                                                 X                                  Can reduce regional traffic delays                                     X                                  Flexibility to deal with personal tasks                                                 X                                  Customers experience improved response times           X                                     Costs of Teleworking                                 Teleworking does have some costs.                                   Benefits of Teleworking                                 The groups that benefit from teleworking include employees. In Table 15-1. local governments. as well. In Table 15-2. List at least two costs from the employer’s perspec-                                 tive and two costs from the employee’s perspective.                                 Employer                                 It may be difficult to keep track of employee progress on work.                                 and communities.                                 Employees                                 Teleworkers can feel isolated working alone.                                 Managers must use a different management style to oversee teleworkers.  DSL.                           X                       Manages VPN authentication procedures.                       The Data-over-Cable Service Interface Specification (DOCSIS) is the international standard                       developed by CableLabs that cable operators use to provide Internet access over their existing                       hybrid fiber-coaxial (HFC) infrastructure. connecting to the corporate network can be done                       in one of three ways: cable. and high-speed Internet                       access.                       Two-way communications occurs downstream in the 50.                         Cable                       Cable broadband uses a coaxial cable that carries radio frequency (RF) signals across the net-                       work. residential phone service.                                   X                           Comparing Broadband Solutions                       Depending on the location of the teleworker.to 860-MHz range and upstream in                       the 5. cable communications was one way.indb 195                                                                                                     3/12/14 7:51 AM .                                                                                Chapter 15: Broadband Solutions   195                           Table 15-2   Teleworker Services Requirements                       Responsibility                                                     Teleworker      Company                       Usually uses cable or DSL to access the VPN. What portion of the electromagnetic spectrum do these signals occupy?                       Radio frequencies occur between 1 KHz and 1 THz on the electromagnetic spectrum.                                                 X                       Uses client software for network access.                       Traditionally.                                   X                       Maintains VPN concentrators and security appliances. or broadband wireless.                       What two types of equipment are required to send digital modem signals upstream and down-                       stream on a cable system?                       Cable Modem Termination System (CMTS) at the headend of the cable operator                       Cable Modem (CM) on the subscriber end     instructor.                               X                       Uses network access while traveling.to 42-MHz range. Modern cable systems now provide two-way                       communication.                               X                       Determines link aggregation and VPN termination methods. What three main telecommunication services are offered by today’s cable                       companies?                       Cable companies now offer digital cable TV.                  Definitions                                                Terms                       a. Defines the communications and operation             c. Upstream                          the headend to subscribers                       d. Downstream                          support interface that permits the addition of                                                                               e.indb 196                                                                                    3/12/14 7:51 AM . DOCSIS                       b. HFC                        c. The direction of a signal transmission from                          subscribers to the headend     instructor.               196     CCNA Routing and Switching Practice and Study Guide                     Match the definition on the left with a term on the right. Terms are only used once. The direction of a signal transmission from          f. The rate at which current (voltage) cycles                          (computed as the number of waves per sec-                          ond)                       f. Combining both fiber-optic and coax cabling         d. Frequency                          high-speed data transfer to a traditional cable                          TV system                                            a. Located in the headend (and communicates                          with CMs located in subscriber homes)                       e. CMTS                          together into a hybrid cabling infrastructure       b.                        The local loop connection to the CO must be less than 3.39 miles (5.                       What two components are required to provide a DSL connection to the teleworker?                       Equipment required includes a transceiver (DSL modem). which connects the teleworker’s net-                       work to the DSL network and a DSL access multiplexer (DSLAM) located at the CO to com-                       bine individual DSL subscribers into one link to an ISP.indb 197                                                                                                    3/12/14 7:51 AM .46 km). What two devices                       can separate the signals?                       There are two ways to separate ADSL from voice at the customer premises: using a microfilter                       or using a splitter.                       The analog voice and ADSL signals must be separated to avoid interference.     instructor.                       Asymmetric DSL (ADSL) provides higher downstream bandwidth than upload speed.                       Symmetric DSL (SDSL) provides the same bandwidth in both directions.                                                                               Chapter 15: Broadband Solutions   197                           DSL                       Digital subscriber line (DSL) technology takes advantage of the additional bandwidth available                       in telephone networks between 3 KHz and 1 MHz.                       Briefly describe the two main types of DSL.  Terms are only used once. Category of DSL technology that provides                          equal high-speed downstream and upstream                          data capacities                       f. The category of DSL technology that provides        b. Transceiver                          high-speed downstream data capacity value                          with a lower upstream capacity value                       d. Located at the CO. A means of providing high-speed connections                          over pre-existing installed copper wire infra-                          structure     instructor.               198     CCNA Routing and Switching Practice and Study Guide                    Match the definition on the left with a term on the right. Sometimes referred to as the DSL modem.                 Definitions                                               Terms                       a.                                                                              d. SDSL                        c. ADSL                          individual DSL connections from subscribers         f. Device with one end connecting to a tele-                          phone device and the other end connecting to                          the telephony wall jack                       e.indb 198                                                                                   3/12/14 7:51 AM . a device that combines           c. DSL                          into one high-capacity link to an ISP                                                                              a. DSLAM                       b. Microfilter                          a device that connects the subscriber to the                          DSL network                                         e. indb 199                                                                                                                     3/12/14 7:51 AM . Employs a mesh network with an access                             points at each node for 802. Municipal WiFi                          b. Whether from your                       laptop or from a smartphone. A general term for Internet service from a                             mobile phone or any other mobile device that                             uses the same technology                          f. Terms are only used once.                       Match the definition on the left with a term on the right. urban or rural. Two-way satellite Internet using IP multicast-                             ing technology     instructor. VSAT                             cellular data (considered to be part of 4G)                                                                                     a.                                                                                                Chapter 15: Broadband Solutions   199                           Broadband Wireless                       Of the three broadband technologies.11 connections                          e. broadband wireless has a solution. Uses a point-to-multipoint topology to pro. wireless offers the largest variety of ways to connect. LTE                             speeds up to 1 Gbps                                                                                    d. 3G/4G Wireless                             vide wireless cellular broadband access at             b. Cellular broadband access that gets faster with                             each generation                                         e. WiMAX                          c.            c. Wireless Internet                           d. Newer and faster technology for high-speed                                                                                     f.                       Definitions                                               Terms                          a.  indicate the factors for each broadband solution.                                  Limited bandwidth that is                   X                                  distance sensitive.                                  Most municipalities do                                                   X                                  not have a mesh network                                  deployed. it is a                                  viable option. you want to consider several fac-                                 tors.  Cellular/   Wi-Fi   WiMAX Satellite                                                                                    to-the.     instructor.                                   PPPoE Overview                                 For the ISP. and upstream data rates                                  are often slow.                                     Configuring xDSL Connectivity                                 The underlying data-link protocol commonly used by Internet service providers (ISPs) to send                                 and receive data across DSL links is PPP over Ethernet (PPPoE). a teleworker would have a fiber-optic cable directly connected to the home office.                                  Table 15-3     Broadband Solutions: Factors to Consider                                  Factor to Consider                  Cable   DSL    Fiber.                                    X                                  bandwidth is limited. and the                                  upstream rate is proportion-                                  ally quite small compared to                                  downstream rate.                                  Bit rate is limited to 2 Mbps                                                     X                                  per subscriber.                                  Bandwidth is shared by many          X                                  users. and data                                  may not be unlimited.                                  Expensive. if it is available and                                  the SOHO is in range.indb 200                                                                                                                 3/12/14 7:51 AM . often provides                                  access where no other access                                  is possible. what are the benefits of using PPP?                                 PPP supports the ability to assign IP addresses to the remote end of the link. PPP with CHAP                                 authentication allows the ISP to check the customer’s records to make sure that the bill is paid. cell size is 1 to                                  2 km (1.                                 When selecting the broadband solution that is right for you.25 mi).   Mobile     Mesh                                                                                     Home                                  Requires fiber installation                         X                                  directly to the home. In Table 15-3.                                  Coverage is often an issue. limited capacity                                                               X                                  per subscriber.               200    CCNA Routing and Switching Practice and Study Guide                                     Selecting Broadband Solutions                                 Ideally.                        In Figure 15-1. understanding how PPPoE                       is implemented will help solidify your skills in configuring PPP.                                   ■   CHAP authentication with username and password assigned by ISP.                                   ■   MTU size is set to 1492. the ISP router is already configured.                                   ■   Dialer interface is assigned a pool. Why?                                  To allow for the additional 8-byte PPP header.                         Configuring PPPoE                       Although PPPoE configuration is beyond the scope of the course.                        Customer(config)# interface dialer 1                       Customer(config-if)# ip address negotiated                       Customer(config-if)# encapsulation ppp                       Customer(config-if)# ip mtu 1492                       Customer(config-if)# dialer pool 1     instructor.                       You can verify the dialer interface was assigned an IP address with the show ip interface brief                       command.                       Step 2. the MTU is reduced from the maxi-                                  mum Ethernet size of 1500 bytes to 1492.indb 201                                                                                                      3/12/14 7:51 AM .    Create a PPP tunnel using dialer interface with the following settings:                                   ■   Encapsulation is PPP.                       The two steps to configure PPPoE are as follows:                       Step 1.                                   ■   IP address is negotiated. which was later replaced with ISDN. Record the commands to configure the                       Customer router using the following CHAP information:                        Figure 15-1     PPPoE Configuration Topology                                                                                              Internet                                             G0/0                                           G0/0                                 Customer                                                            ISP                                              DSL Modem                           DSLAM                              ■   Username is CustomerBob.                          ■   Password is Bob$connect.    Enable PPPoE on the interface attached to the DSL modem and assign it as a PPPoE                                  client using the dialer pool defined in Step 1. which was then replaced by                       DSL.                                                                                 Chapter 15: Broadband Solutions   201                           What are the three stages of evolution in teleworker connections from the home that use PPP?                       First there was analog dialup. 3.Configuring a Router as a PPPoE Client for DSL Connectivity (CN 6.255.1 64.254 255.1.               202    CCNA Routing and Switching Practice and Study Guide                                     Customer(config-if)# ppp chap hostname CustomerBob                                 Customer(config-if)# ppp chap password Bob$connect                                 Customer(config-if)# no shutdown                                 Customer(config-if)# interface g0/0                                 Customer(config-if)# no ip address                                 Customer(config-if)# pppoe enable                                 Customer(config-if)# pppoe-client dial-pool-number 1                                 Customer(config-if)# no shutdown                                   If you want to configure this on lab equipment.3)     instructor.255.2.100. connect two routers through a switch or with a                                 crossover cable and use the following configuration for ISP:                                  username CustomerBob password Bob$connect                                 !                                 bba-group pppoe global                                  virtual-template 1                                 !                                 interface GigabitEthernet0/0                                  no ip address                                  pppoe enable group global                                  no shutdown                                 !                                 interface Virtual-Template1                                  mtu 1492                                  ip address 64.indb 202                                                                                                              3/12/14 7:51 AM .100.253                                   Lab .100.1.0                                  peer default ip address pool CUSTOMER_POOL                                  ppp authentication chap callin                                 !                                 ip local pool CUSTOMER_POOL 64.1.  Frame                       Relay. virtual private networks (VPNs) play an important                       role in today’s network implementations.                                                                                                         CHAPTER 16                                                  Securing Site-to-Site Connectivity                          Up to this point in our WAN discussions.     instructor. With the use of generic                       routing encapsulation (GRE) and IP security (IPsec).indb 203                                                                                                              3/12/14 7:51 AM . cable. digital subscriber line (DSL). Now it is time to turn our attention toward a                       popular solution for linking two sites or a teleworker to the corporate office. and wireless. including leased lines. we have covered access options.  Site-to-site VPNs support connections where the                                 two locations are permanent and contain more than one user. a firewall.                                 Briefly describe three different scenarios in which VPNs are a viable solution. branch.                                 Scalability: It is easy to add branches. a VPN gateway is needed. For example. a branch site or a                                 business partner site most likely would benefit from a site-to-site VPN. Remote-access VPNs                                 are best used for single user connection needs such as teleworkers and mobile users. and business partners to the                                 corporate network at the central site.                                 VPNs are ideal for connecting teleworkers. List three devices can serve as a VPN gateway.                                 Cost savings: VPNs allow organizations to replace expensive dedicated WAN links or modem                                 banks by using Internet connections to connect end users.                                   Fundamentals of VPNs                                 VPNs are used to create a private tunnel over the Internet regardless of the WAN access option                                 used to make the connection.                                 Briefly describe four benefits to using VPNs.                                 To implement a VPN. or users because ISP choices can be made                                 locally.indb 204                                                                                                                3/12/14 7:51 AM . partners.                                 A router. indicate the type of VPN described by each characteristic.                                   Types of VPNs                                 There are two main types of VPN networks.                                 What is the difference between VPN and secure VPN?                                 Secure VPNs are implemented with data encryption using IPsec.                                  Table 16-1    Comparing Site-to-Site and Remote-Access VPNs                                  Characteristic                                                  Site-to-Site     Remote-Access                                                                                                      VPN              VPNs                                  VPN is dynamically enabled when needed. remote/branch offices. and mobile workers can take advan-                                 tage of whatever broadband technology they are using to connect to the Internet.                                 Compatibility with broadband technology: Home.                                 Security: VPNs use advanced encryption technology to secure data as it travels across the                                 Internet.                                               X                                  Most likely uses VPN client software to establish VPN                                 X                                  connection and encrypt data.               204    CCNA Routing and Switching Practice and Study Guide                                     VPNs                                 With the proper implementation at that central site.                                  X     instructor. This is increasingly                                 important as more users need or want access to their corporate networks no matter their cur-                                 rent location.                                  Users have no knowledge of the VPN.                                 In Table 16-1. VPNs provide the flexibility of having safe                                 and secure connections regardless of the underlying access technology. and Cisco’s Adaptive Security Appliance (ASA) can all serve as VPN gate-                                 ways. 1.                                                                                                  Chapter 16: Securing Site-to-Site Connectivity                        205                                           Characteristic                                                                        Site-to-Site              Remote-Access                                                                                                                                 VPN                       VPNs                                       Connects networks together through peer VPN gateways.                                                                                   X                                       VPN connection is static.1.                                                                                              X                                       Connects teleworkers and mobile users.                                                                     X                          Packet Tracer   Packet Tracer . then encapsulated in an IP packet for trans-                                       port across the Internet.                                        Figure 16-1      GRE Encapsulated Packet                                                                      IP         GRE            IP    TCP                   Data                                           Figure 16-2 shows the topology we will use to configure GRE later in this section.1.0/30      10.100. is encapsulated with GRE.1/30                                                                               S0/0/0                                    S0/0/0                                                             G0/0                                                 PC1                                                                                            G0/0                                                                                                     Tunnel                                                                         RTB                                                       RTA                                                                                10.10/24                                                                                                                                         IPv4                                                                                                                                   Original Packet                                                                                                                       IP      GRE        Payload                                                                                                                 Header   Header      Packet     instructor. IPv6. or IPX                                       Figure 16-1 shows the basic fields in a GRE encapsulated packet.2/30        10.1.4)                         Activity                                          Site-to-Site GRE Tunnels                                       Generic routing encapsulation (GRE) is a site-to-site VPN tunneling protocol developed by                                       Cisco. DECnet. GRE can encapsulate a wide variety of protocol packet types inside IP tunnels.                                        Note: The public addressing is on the same subnet.1.                                       IPv4.2/30                                             10. AppleTalk. Notice how                                       the protocol packet.100.                                         X                                       Uses a client/server model.1.Configuring VPNs (Optional) (CN 7. The inside IP packet is using private addressing and the outside IP                                       packet is using public addressing.10. However.2/30                      64.10/24                      Tunnel1                                Tunnel1                           10. we are                                       doing it here so that you can easily attach to routers and use this configuration for practice. This is uncommon on real networks. IP.10.2.1.1.indb 205                                                                                                                                                           3/12/14 7:51 AM .1.                                         Fundamentals of Generic Routing Encapsulation                                       List three protocols that GRE can encapsulate.2.1.                                        Figure 16-2 GRE Topology                                                                                64.  The interface                                            numbers do not have to match between RTA and RTB.252                                 RTB(config-if)# tunnel source 64.100.                                   Configuring GRE Tunnels                                 In Figure 16-2 shown earlier. GRE is stateless.100. For RTB.    Specify the tunnel’s source IP address in the public part of the network with the                                            tunnel source ip-address command.255. Of course.10. assume the physical interfaces on RTA and RTB are configured                                 and active.0.               206    CCNA Routing and Switching Practice and Study Guide                                     GRE is defined by IETF RFC 2784.1.                                 To configure GRE on RTB. this address is the 64. 47 is used in the Protocol field to                                 indicate that a GRE header follows.255.indb 206                                                                                                                    3/12/14 7:51 AM .                                  RTB(config)# interface tunnel 1                                 RTB(config-if)# ip address 10.100.1.2 IP address configured on its S0/0/0 interface. use the following commands to troubleshoot the issue.0. However. complete the following steps:                                 Step 1. record the commands including the router prompt to configure RTB with a                                 GRE tunnel to RTA.0/30.0 0.1 IP address                                            configured on RTA’s S0/0/0.3 area 0                                   A number of commands can be used to verify the GRE tunnel is operational. In our topology.1.2                                 RTB(config-if)# tunnel destination 64.255 area 0                                 RTB(config-router)# network 10.1. GRE does not include any security mecha-                                 nisms to protect the payload.1. this address is the                                            64. Also.2 255. is what is needed here. The GRE header and additional IP header creates at least 24                                 bytes of additional overhead for tunneled packets. GRE IP.     instructor.                                 Step 4.0. The IP address must match the other side’s                                            configuration for tunnel destination ip-address. If                                 connectivity fails. in the future.2.    Configure routing to use the tunnel to advertise the private LANs at each site. The two routers on the tun-                                            nel should use addresses from the same subnet. For RTB.1.1                                 RTB(config-if)# router ospf 1                                 RTB(config-router)# network 10.0 0.0.1.1. a Protocol Type field specifies the OSI                                 Layer 3 protocol that is encapsulated (IP in Figure 16-2).1. In the outer IP header. The IP address must match the other                                            side’s tunnel source ip-address.1. the subnet is                                            10.                                 Step 2. meaning that it does                                 not include any flow-control mechanisms.    Configure an IP address for the tunnel interface.                                 Step 5.                                             Note: These steps do not include configuring the tunnel mode command because the                                            default. the                                 ultimate test is that PC1 should now be able to ping the server attached to the RTA LAN. Also assume that RTA is already configured with a GRE tunnel and OSPF routing. the GRE tunnel will most                                            likely be IPv6. In the GRE header.                                  Using these steps.                                 Step 3.    Specify the tunnel’s destination IP address in the public part of the network with                                            the tunnel destination ip-address command.100.    Create a tunnel interface using the interface tunnel number command.  why is the maximum transmission unit (MTU) set                                       at 1476 bytes?                                       The overhead for GRE is 24 bytes. 3 masks                                       O          10.3)                         Activity                                       Packet Tracer .1.1.Troubleshooting GRE (CN 7.0.                                                                                   Chapter 16: Securing Site-to-Site Connectivity   207                                           Record the commands and command filtering used to generate the following output.2.2/30                                           MTU 17916 bytes. 5 subnets.100. txload 1/255.0/8 is variably subnetted.1                                           Tunnel protocol/transport GRE/IP                                             Key disabled. 00:23:49.10.2.Configuring a Point-to-Point GRE VPN Tunnel (CN 7.1.0.1. DLY 50000 usec. Tunnel1                                       RTB# show interface Tunnel 1                                       Tunnel1 is up.5)                         Packet Tracer                                       Packet Tracer .1. which limits the encapsulated packet from the normal 1500                                       bytes to 1476 bytes.1.2.1          Tunnel1                                       RTB# show ip interface brief | include Tunnel                                       Tunnel1                       10.2.Configuring GRE (CN 7.0/24 [110/1001] via 10.2. sequencing disabled                                             Checksumming of packets disabled                                           Tunnel TTL 255.                                              reliability 255/255.2         YES manual up                         up                                       RTB# show ip route ospf | begin Gateway                                       Gateway of last resort is not set                                                 10.100. line protocol is up                                           Hardware is Tunnel                                           Internet address is 10.       00:00:34     10.1.1. rxload 1/255                                           Encapsulation TUNNEL.1.4)     instructor.indb 207                                                                                                                       3/12/14 7:51 AM .1.1.100.                                        Lab .1.2.1          0    FULL/   .                                        RTB# show ip ospf neighbor                                         Neighbor ID       Pri    State            Dead Time    Address           Interface                                       64. BW 100 Kbit/sec. Fast tunneling enabled                                           Tunnel transport MTU 1476 bytes                                       <output omitted>                                       RTB#                                         In the output from the last command shown.2. loopback not set                                           Keepalive not set                                           Tunnel source 64.1. destination 64.                                     ■   Anti-replay protection: This is the ability to detect and reject replayed packets and helps                                        prevent spoofing.                                 Hash-based Message Authentication Code (HMAC) is a mechanism for message authentication                                 using hash functions. the source and the destination use two different keys. Security Architecture for the Internet Protocol. it does not include any                                 kind of security.                                 What is the main difference between symmetric and asymmetric encryption?                                 In symmetric encryption. defines IP security. IPsec has uses a                                        hash to ensure that the packet has not been changed.                                   Internet Protocol Security                                 RFC 4301. longer keys (such                                 as 256-bit) provide stronger encryption and data confidentiality.                                 What is the main purpose of the Diffie-Hellman (DH) algorithm?                                 DH is a method for two parties to establish a shared secret key that will be used by encryption                                 and hash algorithms. So.               208    CCNA Routing and Switching Practice and Study Guide                                     Introducing IPsec                                 Although GRE is excellent for creating a tunnel across the Internet. any practice you do is purely optional. Briefly describe each of the four critical functions of IPsec security services. In addition. A keyed HMAC is a data integrity algorithm that guarantees the integ-                                 rity of a message.                                    ■   Data integrity: When data is received on the other end of the tunnel.                                 What are the two common HMAC algorithms?                                 MD5 and SHA     instructor. the sophistication                                 of the algorithm impacts confidentiality.                                 Encryption                                 What two factors impact the degree of confidentiality in an encryption algorithm?                                 The shorter a key used in the encryption.indb 208                                                                                                                  3/12/14 7:51 AM . Therefore. IPsec configuration is not a CCNA                                 Routing and Switching exam topic.                                 In what scenarios are symmetric and asymmetric encryption used?                                 Symmetric encryption is commonly used to encrypt the contents of a message.                                    ■   Confidentiality (encryption): IPsec provides strong algorithms used to encrypt the data                                        before it is sent across the VPN tunnel. or simply                                 IPsec. This section reviews basic IPsec concepts. the easier it is to hack.                                   IPsec Framework                                 Encryption protects data confidentiality and integrity. Authentication ensures that the sender                                 and receiver actually know and trust each other. Late and duplicate packets are dropped. the source and destination use a pre-shared key. and asymmet-                                 ric encryption is commonly used for digital certificates. whereas in asym-                                 metric encryption.                                    ■   Authentication: IPsec uses Internet Key Exchange (IKE) to authenticate that the connec-                                        tion is made with the desired communication partner.      instructor.                       Integrity: A hash algorithm is used to guarantee that the data has not been altered in transit.                       Confidentiality: The selection of an encryption algorithm to encrypt and decrypt the original                       message.                        Figure 16-3 IPsec Framework                                                       IPsec Framework                                                                                  Choices                                                                                             ESP +                                    IPsec Protocol                      AH        ESP                                                                                            AH                                       Confidentiality                               DES      3DES     AES      SEAL                                              Integrity                     MD5       SHA                                        Authentication                      PSK       RSA                                        Diffie-Hellman                      DH1       DH2      DH5      DH. It is manually configured and used to authenticate at each end. a VPN tunnel must also authenticate the                       device on the other end before the path can be considered secure.                                                                             Chapter 16: Securing Site-to-Site Connectivity   209                           Briefly describe the operation of an HMAC algorithm. However.                       Figure 16-3 is a depiction of the IPsec framework with all the possible algorithm choices for                       each piece in the framework.                       Authentication: A method is used to authenticate the two ends of a tunnel.                          ■   PSK: A secret key that is shared between the two parties using a secure channel before it                              needs to be used.                           Briefly describe each of the following:                       IPsec framework protocol: The protocol used to encapsulate the full packet. either PSK or RSA.                       The result is a hash that is appended to the original message...                       A shared secret key and variable-length message are combined and run through the algorithm. the                       Encapsulating Security Payload (ESP) is used. The receiving end reverses the                       process to decrypt the variable-length message. as we have seen.                          ■   RSA signatures: Digital certificates are obtained from a certificate authority and then are                              exchanged to authenticate peers.indb 209                                                                                                                 3/12/14 7:51 AM .                       DH algorithm: The method in which a shared secret key is established between peers. Most likely. Briefly describe the two                       main peer authentication methods.                       Authentication                       Encryption is crucial.                                          X                                  er-based file-sharing resources     instructor. spyware.                                  Table 16-2    Cisco SSL VPN Solutions                                  Cisco SSL VPN Solution Description         Cisco AnyConnect Secure     Cisco Secure Mobility                                                                              Mobility Client with SSL      Clientless SSL                                  Non-corporate-managed devices are                                                X                                  provided VPN remote access                                  Provides access to corporate resources                                           X                                  for devices that are not managed by                                  the corporation                                  Provides clients with a LAN-like full                 X                                  network access                                  Remote users establish the SSL session                                           X                                  using a web browser                                  A client application must be installed                X                                  on the end-user device                                  Requires a standalone application be                  X                                  installed on the end-user device                                  Access to services is limited to brows.               210    CCNA Routing and Switching Practice and Study Guide                    Packet Tracer                                 Packet Tracer . and complete network access without preinstalled desktop soft-                                 ware                                 Protection against viruses. worms. scaled. This section briefly reviews types of remote-access VPN solutions. and tailored to the access rights of                                 the individual. VPNs are an ideal remote-access solution for many reasons.                                 Web-based.3.                                 Secure communications can easily be implemented. label the two columns with the Cisco SSL VPN solution that is best described                                 by the statements.Configuring GRE over IPsec (Optional) (CN 7. and hackers on a VPN connection by integrating                                 network and endpoint security in the Cisco SSL VPN platform                                 Use of a single device for both SSL VPN and IPsec VPN                                 In Table 16-2.indb 210                                                                                                                3/12/14 7:51 AM .                                   Remote-Access VPN Solutions                                 What are the two primary methods for deploying remote-access VPNs?                                 IPsec and SSL                                 List three benefits or features of Cisco SSL VPN solutions. clientless access.2.8)                  Activity                                    Remote Access                                 As discussed earlier in this chapter. 5. key-length encryption. Label each based on the following descriptions.                                       X                                       56 to 256-bit.                                                    X                          Packet Tracer                                       Packet Tracer . indicate whether the characteristic belongs to                                       SSL or IPsec.                                                  X                                       One. and ease of use for both                                       site-to-site and remote-access IPsec VPNs.                                                     X                                       Any device can connect.or two-way authentication. The Cisco Easy VPN solution consists of three                                       components.                                        Table 16-3    Comparing SSL and IPsec                                       Characteristic                                                          SSL            IPsec                                       40.indb 211                                                                                                                         3/12/14 7:51 AM .to 256-bit key-length encryption.                                             X                                       Shared secrets or digital certificates for authentication. In Table 16-3.1. scalability.                                          X                                       Specifically configured devices can connect.2)                         Activity     instructor.                                    X                                       Access to all IP-based applications.Skills Integration Challenge (CN 7.                                          ■   Cisco Easy VPN Remote: A Cisco IOS router or Cisco ASA firewall acting as a VPN                                              client                                          ■   Cisco VPN Client: An application supported on a PC used to access a Cisco VPN server                                          ■   Cisco Easy VPN Server: A Cisco IOS router or Cisco ASA Firewall acting as the VPN                                              headend device in site-to-site or remote-access VPNs                                       IPsec exceeds SSL in many ways.                                                                                    Chapter 16: Securing Site-to-Site Connectivity    211                                           IPsec Remote-Access VPNs                                       The Cisco Easy VPN solution feature offers flexibility.                               X                                       Web applications and file sharing. instructor.indb 212   3/12/14 7:51 AM .                                                                                                          CHAPTER 17                                                                          Monitoring the Network                          Most of your CCNA studies have focused on implementing networking technologies. This chapter focuses on three popu-                       lar monitoring tools: Syslog. and NetFlow. several tools have evolved to help you do just that.     instructor. Simple Network Management Protocol (SNMP).                       Over the years. But what if there                       is currently no design or implementation to do in your job as network administrator? What if the net-                       work is already up and running? Then chances are you will be responsible for monitoring the network.indb 213                                                                                                              3/12/14 7:51 AM .  as shown in Example 17-1.                                  Table 17-1      Syslog Message Format                                  Field                    Example                                  Sequence Number          000040:                                  Timestamp                *Nov 13 15:20:40. to add this field to syslog messages.                                  Example 17-1       Syslog Message: Interface Is “Up” and “Up”                                   000039: *Nov 13 15:20:39. including the rout-                                 er prompt. changed state to up                                   By default. the Sequence Number field is not shown.                                 Router(config)# service sequence-numbers     instructor.                                    ■     RAM (logging buffer)                                    ■     Console line                                    ■     Terminal line                                    ■     Syslog server                                 Because you have configured many routers by now. use the second line of output from Example 17-1 to provide an example of each                                 field in the syslog message format. Briefly describe the three main syslog                                 functions.                                   Syslog Operation                                 Developed in the 1980s and documented as RFC 3164. Record the command.999: %LINK-3-UPDOWN: Interface GigabitEthernet0/0. syslog used UDP port 514 to send                                 notifications across IP networks to a syslog server.               214    CCNA Routing and Switching Practice and Study Guide                                     Syslog                                 The most common method of accessing system messages that networking devices provide is to                                 use a protocol called syslog.999:                                  Facility                 %LINEPROTO                                  Severity                 5                                  Mnemonic                 UPDOWN                                  Description              Line protocol on Interface GigabitEthernet0/0.999: %LINEPROTO-5-UPDOWN: Line protocol on Interface                                  GigabitEthernet0/0. changed                                  state to up                                  000040: *Nov 13 15:20:40.indb 214                                                                                                            3/12/14 7:51 AM . one of the more common messages you                                 have seen is the interface “up” and “up” message.                                    ■     Gathers logging information for monitoring and troubleshooting                                    ■     Can be configured to select the type of logging information that is captured                                    ■     Can be configured to send captured syslog messages to a destination IP address                                 List the four destinations these messages can be sent to. changed state to up                                    In Table 17-1.  The SNMP manager can collect     instructor.                                                                                              Chapter 17: Monitoring the Network   215                                           What are the two different methods to make sure the timestamp is accurate?                                       Manually set the date and time using the clock command. Since then.10.10. 1066.10                                       RTA(config)# logging trap 5                                       RTA(config)# logging source interface g0/0                                         What command will display the messages logged to RAM?                                       RTA# show logging                                         Lab .1.                                       Configure the router to get its date and time from an NTP server using the ntp server                                       ip-address command. SNMP                                       has undergone several revisions.10. The SNMP                                       manager is part of a network management system (NMS).10.10                                         RTA# configure terminal                                       RTA(config)# logging console                                       RTA(config)# logging buffer                                       RTA(config)# logging 10.5)                       Packet Tracer                         Activity                                          SNMP                                       SNMP began with a series of three RFCs back in 1988 (1065.2.                                        Figure 17-1   Syslog Configuration Topology                                                                          G0/0                                                                                                        Syslog                                                                 RTA                                    Server                                                                10. and 1067). record the commands including the                                       router prompt to configure the logging service on RTA with the following requirements:                                          ■   All logging messages should be sent to the console and to the buffer as well as the syslog                                              server.indb 215                                                                                                                       3/12/14 7:51 AM .Configuring Syslog and NTP (CN 8.                                          ■   Only log messages with severity 5 or lower.1.                                         SNMP Operation                                       SNMP is an application layer protocol that provides a standardized way of communicating                                       information between SNMP agents and SNMP managers using UDP port 162.6)                                        Packet Tracer .10.Configuring Syslog and NTP (CN 8. The SNMP                                       name is derived from RFC 1067.10. A Simple Network Management Protocol.1                             10.2.                                          ■   The source interface for logged messages should always be the G0/0 interface.                                         Configuring Syslog                                       Using the topology and addressing shown in Figure 17-1.                                  The MIB defines a variable using a MIB object ID.                                  set-request         Stores a value in a specific variable.     instructor.                                  get-next-request    Retrieves a value from a variable within a table. indicate whether the SNMP characteristic applies to                                 SNMPv2c. or both.                                  trap                An unsolicited message sent by an SNMP agent to an SNMP manager                                                      when some event has occurred. SNMPv3. All versions of SNMP                                 use SNMP managers.                                 In Table 17-2.                                 alter. The SNMP manager does                                                      not need to know the exact variable name. Label Figure 17-2 with the most common public variables. Agents can also be configured to forward directly to the NMS using “trap”                                 messages. agents. and MIBs. Cisco IOS supports all three versions. These IDs are derived hierarchically using                                 the scheme shown in Figure 17-2. In Table 17-3. such as multiple rows in a table. They are easy to intercept.                                   Although SNMPv1 is legacy. Each agent stores data about the device in the                                 Management Information Base (MIB) locally so that it is ready to respond to these messages                                 from the NMS.indb 216                                                                                                                  3/12/14 7:51 AM .                                  get-response        Replies to messages sent by an NMS. a sequential search is per-                                                      formed to find the needed variable from within a table.                                  get-bulk-request    Retrieves large blocks of data. you will most likely encounter                                 SNMPv3 or SNMPv2c. In today’s networks. access to the MIB is controlled through the use of two types of                                 community strings:                                    ■    Read-only(ro): Access to MIB variables but no changes allowed                                    ■    Read-write(rw): Access and manipulation of MIB variables allowed                                 Why is this type of access no longer considered best practice?                                 Community strings are sent in plain text across the network. and resend.                                  Table 17-2      SNMP Message Type                                  Operation           Description                                  get-request         Retrieves a value from a specific variable. only                                                      works with SNMPv2 or later.               216    CCNA Routing and Switching Practice and Study Guide                                     information from agents using “get” messages.                                  Table 17-3      Comparing SNMPv2c and SNMPv3                                  Characteristic                                                    SNMPv2c      SNMPv3        Both                                  Used for interoperability and includes message integrity                           X                                  Provides services for security models                                                         X                                  Uses community-based forms of security                                 X                                  Includes expanded error codes with types                                                      X                                  Provides services for both security models and security levels                     X                                  Authenticates the source of management messages                                    X                                  Cannot provide encrypted management messages                           X                                  Supported by Cisco IOS software                                                               X                                   In SNMPv1 and SNMPv2c. indicate the SNMP message type for each of the descriptions provided. read.                                                                            org (3).                      cisco flash group (10).                      cisco flash group (10).                                                                       enterprises (1).     instructor.                                                local variables (2).                          Management Information Base Object ID Scheme (answer)                                                                          iso (1).                         cisco mgmt (9).                                                interface group (2).                                                                        internet (1).indb 217                                                                                                                3/12/14 7:51 AM .                                                                          cisco (9).                                                                         private (4).                                                local variables (2).                         cisco mgmt (9).                                                                          dod (6).                                                                                        Chapter 17: Monitoring the Network   217                           Figure 17-2   Management Information Base Object ID Scheme                                                                            cisco (9).                                                interface group (2).  Record the commands                                 to configure SNMPv2 on RTA with the following requirements:                                    ■   Use an ACL to allow NMS read-only access to the router using community string                                        NMS_eyesonly.10.10                                                                                 Traps                                    RTA(config)# ip access-list standard SNMP                                 RTA(config-std-nacl)# permit 10.10.2.               218    CCNA Routing and Switching Practice and Study Guide                                     Lab .10.10 version 2c NMS_eyesonly                                 RTA(config)# snmp-server enable traps                                   Record the commands that generate the SNMP verification output for RTA shown in Example                                 17-2.                                    ■   Specify that 10.indb 218                                                                                                                3/12/14 7:51 AM .10                                 RTA(config-std-nacl)# exit                                 RTA(config)# snmp-server community NMS_eyesonly ro SNMP                                 RTA(config)# snmp-server location Aloha_Net                                 RTA(config)# snmp-server contact Bob Metcalfe                                 RTA(config)# snmp-server host 10.10 is the recipient of traps and explicitly configure the router to                                        send traps.10.Researching Network Monitoring Software (CN 8.                                  Example 17-2     SNMP Verification Commands                                   RTA# show snmp                                  Chassis: FTX163283RZ                                  Contact: Bob Metcalfe                                  Location: Aloha_Net                                  0 SNMP packets input                                        0 Bad SNMP version errors                                        0 Unknown community name                                        0 Illegal operation for community name supplied                                        0 Encoding errors                                        0 Number of requested variables                                        0 Number of altered variables     instructor.8)                                   Configuring SNMP                                 In Figure 17-3.1.10.10.10.1                              10.10. RTA is an SNMP agent and NMS is an SNMP manager.10.10.                                    ■   Location is Aloha_Net and the contact is Bob Metcalfe.                                  Figure 17-3   SNMP Configuration Topology                                                                                 Gets                                                                     G0/0                                                                                                    NMS                                                            RTA                                                          10. 10.indb 219                                                                                                    3/12/14 7:51 AM .162. 0 dropped.10. owners of networks were looking for a tool to measure TCP/IP flows.     instructor. 0/10. 0 sent.10. 0 dropped                        SNMP Engine:                           queue 0/1000 (current/max). which quickly gained popularity in the marketplace. Cisco engi-                       neers developed NetFlow. So. 0 dropped                          SNMP logging: enabled                            Logging to 10.                                                                            Chapter 17: Monitoring the Network   219                                0 Get-request PDUs                            0 Get-next PDUs                            0 Set-request PDUs                            0 Input queue packet drops (Maximum queue size 1000)                        0 SNMP packets output                            0 Too big errors (Maximum packet size 1500)                            0 No such name errors                            0 Bad values errors                            0 General errors                            0 Response PDUs                            0 Trap PDUs                        SNMP Dispatcher:                           queue 0/75 (current/max).                          RTA# show snmp community                          Community name: ILMI                        Community Index: cisco0                        Community SecurityName: ILMI                        storage-type: read-only           active                            Community name: NMS_eyesonly                        Community Index: cisco1                        Community SecurityName: NMS_eyesonly                        storage-type: nonvolatile         active access-list: SNMP                            Community name: NMS_eyesonly@1                        Community Index: cisco2                        Community SecurityName: NMS_eyesonly@1                        storage-type: nonvolatile         active access-list: SNMP                           NetFlow                       Although syslog and SNMP are powerful tools for collecting information about networking                       devices.                                   Collects IP data to record who used network resources and for what pur.indb 220                                                                                                                 3/12/14 7:51 AM .      Verify NetFlow is operational. CPU usage.      Configure where to send NetFlow data. destination port number.                                  Access to the MIB is controlled through community string settings.                                 Briefly describe four reasons to use NetFlow.                                    ■   Measuring who is using what network resources for what purpose                                    ■   Accounting and charging back according to the resource utilization level                                    ■   Using the measured information to do more effective network planning so that resource                                        allocation and deployment is well aligned with customer requirements                                    ■   Using the information to better structure and customize the set of available applications                                        and services to meet user needs and customer service requirements                                 NetFlow is not a replacement for SNMP.                   X                                  pose those resources were used. ToS marking.      Configure NetFlow to capture inbound and outbound packets. indicate whether the characteristic describes SNMP or NetFlow.                            X                                  A Management Information Base (MIB) is used to record network moni. Both have their purposes in network monitoring.                                   Define a TCP/IP flow. and memory usage are not recorded. complete the following steps:                                 Step 1. In                                 Table 17-4.                                  Table 17-4      Comparing SNMP and NetFlow                                  Characteristics                                                              SNMP        NetFlow                                  Agents can send traps to a network management system when defined                X                                  events occur. Layer                                 3 protocol type.                                 A flow is a unidirectional stream of packets between a source and a destination.             X                                  tored events.               220    CCNA Routing and Switching Practice and Study Guide                                     NetFlow Operation                                 What is the latest version of NetFlow called?                                 Flexible NetFlow                                 What improvements does it make over the original version?                                 Flexible NetFlow adds the capability to customize the traffic analysis parameters for the                                 specific requirements of a network administrator.                                 What fields in a packet are used to determine that the packet is from a different flow?                                 Source IP address. and input logical interface                                   Configuring NetFlow                                 To implement NetFlow on a router.                                  Interface errors.                                 Step 3.               X                                  An external server (collector) is used to record IP network monitored                      X                                  cache changes. destination IP address.                                 Step 2. source port number.     instructor. 000 .10.000 .000 .000 .                                                                                     Chapter 17: Monitoring the Network    221                           Using Figure 17-4 as a reference.10.000 .000 .000 . 4095 inactive.10                         RTA(config)# interface g0/0                       RTA(config-if)# ip flow ingress                       RTA(config-if)# ip flow egress                       RTA(config-if)# exit                       RTA(config)# ip flow-export destination 10.000 .998 .000                              512   544     576 1024 1536 2048 2560 3072 3584 4096 4608                           .1                                  10.000 .10 2055                       RTA(config)# ip flow-export version 9                         Record the commands that generated the NetFlow verification output on RTA shown in                       Example 17-3. 0 flow alloc failures                          Active flows timeout in 30 minutes                          Inactive flows timeout in 15 seconds                        IP Sub Flow Cache.10. record the commands configure RTA to capture and send                       NetFlow data from interface G0/0 to the collector using Version 9.000 . 34056 bytes                          1 active.000 . 32 added                          728 ager polls.000                          IP Flow Switching Cache. 0 force free                          1 chunk.10.000 .000 .000 .000 .10.000 .000 .000 .000 .000 .indb 221                                                                                                              3/12/14 7:51 AM .                        Example 17-3       NetFlow Verification                         RTA# show ip flow interface                        GigabitEthernet0/0                          ip flow ingress                          ip flow egress                        RTA# show ip cache flow                        IP packet size distribution (132959 total packets):                           1-32      64    96   128    160    192   224   256   288   320   352   384     416   448   480                           . 1 chunk added                          last clearing of statistics never     instructor. 1023 inactive. 28 added. 28 added to flow                          0 alloc failures.10.000 . 278544 bytes                          1 active.000 .                        Figure 17-4    NetFlow Configuration Topology                                                                                               NetFlow                                                                                              Collector                                                             G0/0                                                       RTA                                                10.000 . 10 (2055)                                    Version 9 flow records                                    63 flows exported in 29 udp datagrams                                    0 flows failed due to lack of export packet                                    0 export packets were sent up to process level                                    0 export packets were dropped due to no fib                                    0 export packets were dropped due to adjacency issues                                    0 export packets were dropped due to fragmentation failures                                    0 export packets were dropped due to encapsulation fixup failures                                    Lab .5      15.10.0                                  Total:               31        0.5                                  ICMP                 18        0.2                                    SrcIf          SrcIPaddress      DstIf            DstIPaddress     Pr SrcP DstP   Pkts                                    SrcIf          SrcIPaddress      DstIf            DstIPaddress     Pr SrcP DstP   Pkts                                  Gi0/0          10.3)     instructor.indb 222                                                                                                        3/12/14 7:51 AM .4      17.10.0       0.               222    CCNA Routing and Switching Practice and Study Guide                                      Protocol          Total      Flows   Packets Bytes      Packets Active(Sec) Idle(Sec)                                  -------.3.6      15.4       7.0       10225     32      37.10.         Flows       /Sec       /Flow   /Pkt      /Sec     /Flow     /Flow                                  UDP-other            13        0.Collecting and Analyzing NetFlow Data (CN 8.10       Local            10.1      15.10.10.3.0        4288     32      37.10.0           1    181       0.1       01 0000 0303       1                                  RTA# show ip flow export                                  Flow export v9 is enabled for main cache                                    Export source and destination details :                                    VRF ID : Default                                      Destination(1)   10. indb 223                                                                                                               3/12/14 7:51 AM . general                       troubleshooting methods. Users of the network do                       unexpected things.     instructor. and tools. So. This chapter reviews network documentation. networks would never fail.                                                                                                          CHAPTER 18                                                              Troubleshooting the Network                          In an ideal world. But mechanical failures happen. issues will arise that require a network administrator’s effective troubleshooting                       skills—one of the most sought after skills in IT.  With documentation in hand. floor.     instructor. rack.                                 Device name (purpose)                                 Operating system and version                                 MAC addresses                                 IPv4 and IPv6 addresses                                 Subnet mask and prefix length                                 Default gateway.               224    CCNA Routing and Switching Practice and Study Guide                                     Troubleshooting with a Systematic Approach                                 Documentation is the starting point and is a crucial factor in the success of any troubleshoot-                                 ing effort. and WINS server addresses                                 Any high-bandwidth network applications that the end system runs                                 In Table 18-1. and implement a solution.                                 Type of device.                                 Configuration files                                 Physical and logical topology diagrams                                 Baseline performance measurements                                 List at least four pieces of information that could be included in a network device’s configura-                                 tion documentation. DNS server. model designation                                 IOS image name                                 Device network hostname                                 Location of the device (building. room. panel)                                 Module types and in which module slot they are located                                 Data link layer addresses                                 Network layer addresses                                 List at least four pieces of information that could be included in an end system’s configuration                                 documentation. a network administrator can choose a troubleshooting                                 method. isolate the problem.indb 224                                                                                                                3/12/14 7:51 AM . indicate whether the feature is part of a physical topology document or logical                                 topology document.                                   Network Documentation                                 List three types of documentation a network administrator should have to effectively trouble-                                 shoot issues.  “Monitoring the Network.                       What is the minimum duration for capturing data to establish a baseline?                       7 days                       When is the best time to establish a baseline of network performance?                       During the hours when the network is used the most                       In Table 18-2.” the purpose of network monitoring                       is to watch network performance in comparison to a predetermined baseline.                                                                        Chapter 18: Troubleshooting the Network     225                           Table 18-1      Physical and Logical Topology Features                       Feature                                           Physical Topology        Logical Topology                       WAN technologies used                                                             X                       Interface identifiers                                                             X                       Connector type                                            X                       Device identifiers or names                                                       X                       Cable specification                                       X                       Operating system version                                  X                       Cabling endpoints                                         X                       Device type                                               X                       Data-link protocols                                                               X                       DLCI for virtual circuits                                                         X                       Site-to-site VPNs                                                                 X                       Static routes                                                                     X                       Cable type and identifier                                 X                       Routing protocols                                                                 X                       Connection type                                                                   X                       IP address and prefix lengths                                                     X                       Model and manufacturer                                    X                         As you learned in Chapter 17.                        Table 18-2      Benefits of Establishing a Network Baseline                       Statements                                                              Benefit   Not a Benefit                       Enable fast transport services between campuses                                        X                       Investigate if the network can meet the identified policies and use        X                       requirements                       Combine two hierarchical design layers                                                 X                       Locate areas of the network that are most heavily used                     X                       Identify the parts of the network that are least used                      X                       Identify where the most errors occur                                       X                       Establish the traffic patterns and loads for a normal or average day       X     instructor. indicate which statements describe benefits of establishing a network baseline.indb 225                                                                                                       3/12/14 7:51 AM .  Summarized table of the up/down status of all                                                                              d. show version                       e. Summary of the NetFlow accounting statistics                                                                              b. Detailed settings and status for device inter. show ip interface brief                          faces                                                                              h.                 Information Gathered                                      Command                       a.          a. Contents of the address resolution table            e. show ip cache flow                          device interfaces                       g. show ip route                       b. Summary of VLANs and access ports on a                          switch                       h. Contents of the routing table                                                                              c. it is often necessary to gather information directly from routers and switches                 using a variety of show commands. Current configuration of the device     instructor. show running-config                       d. show arp                          ware and hardware                                   g.     f. Uptime and information about device soft.               226     CCNA Routing and Switching Practice and Study Guide                     When documenting the network.indb 226                                                                                                            3/12/14 7:51 AM . show vlan                       c. show interface                       f. Match the information gathered on the left with the show command on the                 right.                                         Figure 18-1   Major Troubleshooting Stages                                                                                         Stage 1:                                                                                           Stage 2:                                                                                           Stage 3:                                                                                      No                                  Yes                                                                                              Problem Fixed?                                                         If it did not fix the problem or if it                                                      created another problem.Troubleshooting Challenge .1.                                       label the four major stages in the troubleshooting process.                                                                                                    Chapter 18: Troubleshooting the Network    227                           Packet Tracer                                       Packet Tracer .                                                     corrective action and start again.     instructor.8)                         Activity                                        Troubleshooting Process and Methodologies                                       All troubleshooting methodologies have four stages they share in common: three stages to find                                       and solve the problem and a final important stage after the problem is resolved.indb 227                                                                                                                                  3/12/14 7:51 AM . In Figure 18-1.1. undo                             Stage 4:                                                     corrective action and start again.Documenting the Network (CN 9.                                          Figure 18-1a Major Troubleshooting Stages (answer)                                                                                         Stage 1: Gather Symptoms                                                                                           Stage 2: Isolate the Problem                                                                                       Stage 3: Implement Corrective                                                                                               Action                                                                                      No                                  Yes                                                                                              Problem Fixed?                                                         If it did not fix the problem or if it                                                                                                               Stage 4: Document solution and                                                      created another problem. undo                                                                                                                       save changes.     Gather symptoms from suspect devices                                 Step 5.    Gather information                                 Step 2. Stage 4 is indeed the final and arguably most important stage.    Narrow the scope                                 Step 4. that is most likely an                                 oversight. However.               228    CCNA Routing and Switching Practice and Study Guide                                     Note: The Academy curriculum does not label the last stage as Stage 4.    Document symptoms     instructor.                                  The gathering symptoms stage can be broken into five steps:                                 Step 1.indb 228                                                                                                                      3/12/14 7:51 AM .    Determine ownership                                 Step 3.  traceroute                             networks                                                                                   a. show ipv6 interface brief                          c. ping                          e. Displays a summary status of all the IP               h. Displays the IP version 6 routing table                                                                                    f. Connects remotely to a device by IP address                                                                                   c. Sends an echo request to an address and waits                             for a reply                          h. show protocols                          d. debug ?                          b. show ipv6 route                             or URL                                                                                   g.indb 229                                                                                                                   3/12/14 7:51 AM .                                                                                      Chapter 18: Troubleshooting the Network   229                           In Step 1. In the following activity. show running-config                             Version 6 interfaces on a device                      e. telnet                           f.                       Information Gathered                                    Testing Command                          a. Offers a list of options for real-time diagnos-                             tics                                                  d. match the information gathered with the testing command. you will most likely use a variety of commands to progress through the process of gathering symp-                       toms. Shows global and interface specific status of                             Layer 3 protocols                          g. Shows the path a packet takes through the             b. Shows the current configuration of the device     instructor.                                     X                                  bleshooting guess to inves-                                  tigate a possible cause                                  Used for problems that                  X                                  likely involve software                                  settings                                  Compare a working and                                                     X                                  nonworking situation                                  while looking for the sig-                                  nificant differences                                  Use when suspected prob.               230    CCNA Routing and Switching Practice and Study Guide                                     In Table 18-3.                                  Table 18-3    Troubleshooting Methodologies                                  Statements                    Bottom    Top    Divide   Shoot from    Spot the    Move the                                                                  Up     Down   Conquer    the Hip     Difference   Problem                                  Disadvantage is it requires     X                                  you to check every device                                  and interface                                  Begins at the OSI applica. identify the troubleshooting methodology described by each statement. The section reviews                                 some of the tools used in today’s networks and some specific troubleshooting symptoms at                                 various OSI layers.       X                                  lem is cabling or device                                  failure                                  Begins at the OSI physical      X                                  layer                                  Swap the problematic                                                                  X                                  device with a known-                                  working device                                  Start with an informed                           X                                  guess for which OSI layer                                  to begin troubleshooting                                  Disadvantage is it requires             X                                  you to check every net-                                  work application                                     Network Troubleshooting                                 Effective troubleshooting requires good tools and systematic approaches.     instructor.indb 230                                                                                                            3/12/14 7:51 AM .             X                                  tion layer                                  Use an experienced trou.  Network Analysis Module                          e. draw network                             diagrams. Tests and certifies copper and fiber cables for                             different services and standards via a handheld                             device     instructor. Powerful troubleshooting and tracing tool that                             provides traffic tracking as it flows through a                             router                          g. configura-                             tion. Cable analyzer                          c. crossed wiring. Host-based protocol analyzer                             mation                                                e.       a. Tools that document tasks. Discovers VLAN configuration.indb 231                                                                                                                  3/12/14 7:51 AM .       h. Cisco IOS Embedded Packet Capture                          d. Knowledge Base                             and resistance                                        g. average and             b. Online repositories of experience-based infor. and establish network performance           i. Match the description on the left with the tool on                       the right. Measures electrical values of voltage. Tests data communication cabling for broken           d.                       Description                                              Software and Hardware Tools                          a. Digital multimeter                             wires.                                                                                     Chapter 18: Troubleshooting the Network   231                           Troubleshooting Tools                       A wide variety of software and hardware tools is available to make troubleshooting easier. Analyzes network traffic. and fault management                           j. Cable tester                          b. You can use these                       tools to gather and analyze symptoms of network problems. Provides a graphical representation of traffic                             from local and remote switches and routers                          h. Baseline establishment tool                             device                                                                                   j. Portable network analyzer                             peak bandwidth utilization using a portable                                                                                   c. Includes device-level monitoring. specifically source                             and destination frames                           i. and shorted connec-                             tions                           f. current. Network Management System Tool                             statistics                                            f.                                      X                                   Knowing which command to use to gather the necessary information for troubleshooting is                                 crucial to effectively and efficiently resolving problems.                                  A VPN connection is not working correctly across a NAT                        X                                  boundary. 6.                             X                                  The show processes cpu command displays usage way               X                                  beyond the baseline.                 X                                  The DNS server is not configured with the correct A                                    X                                  records. and 7                                  A computer is configured with the wrong default gateway.     instructor.                                  STP loops and route flapping are generating a broadcast              X                                  storm.                                  Table 18-4    Isolating the OSI Layer Where an Issue Resides                                  Network Problems and Issues                                     OSI Layers                                                                                                  1    2   3    4   5. one side is using the default Cisco encapsula. In Table 18-4.                                  A cable was damaged during a recent equipment install.                          X                                  SSH error messages display unknown/untrusted certificates.                                  On a PPP link.               232    CCNA Routing and Switching Practice and Study Guide                                     Network Troubleshooting and IP Connectivity                                 A network administrator should be able to quickly isolate the OSI layer where an issue is most                                 likely located.                                  A static route is sending packets to the wrong router. indicate the most likely layer associated with each issue.                   X                                  The routing table is missing routes and has unknown                      X                                  networks listed.indb 232                                                                                                              3/12/14 7:51 AM .       X                                  tion.          X                                  ACLs are misconfigured and blocking all web traffic. All the commands you have mastered                                 over the course of your CCNA studies are part of your troubleshooting toolkit.                                  Traffic is congested on a low capacity link and frames are      X                                  lost.                                  SNMP messages are unable to traverse NAT. This next exer-                                 cise only highlights a few.  Can be used to verify the transport layer                                                                                 f. Displays the known MAC addresses on a                             switch                          g. Displays input and output queue drops                          h. Clears the MAC to IP address table on a PC                                                                                d. Displays the MAC to IP address table for other                                                                                a.                       Command Output                                         Command                          a. Displays all known destinations on a Windows       e. show interfaces                          f. Displays the IP addressing information on a                             Windows PC     instructor.                                                                                  Chapter 18: Troubleshooting the Network   233                           Match the command output on the left with the command on the right. arp -d                          e. show ipv6 route                             router                                                                                c.indb 233                                                                                                               3/12/14 7:51 AM . route print                             IPv6 devices                                                                                g. Displays all known IPv6 destinations on a          b. telnet                          c. show ipv6 neighbors                             PC                                                 h. ipconfig                          b. show mac address-table                          d. Troubleshooting Enterprise Networks 1 (CN 9.1.Using Documentation to Solve Issues                                 (CN 9.2.               234    CCNA Routing and Switching Practice and Study Guide                                     Note: No book or study guide will effectively teach you how to troubleshoot networks. For those readers                                 with access to the Academy curriculum.15)                                  Packet Tracer .3.3.Troubleshooting Enterprise Networks 2 (CN 9.2.                  Packet Tracer                                 Packet Tracer .2.2. There is no doubt that you will be asked to trouble-                                 shoot several issues on the CCNA exam. To get proficient                                 at it.13)                                  Packet Tracer .CCNA Skills Integration Challenge (CN 9.                                 You might be surprised how fun and rewarding it can be.3.14)                                  Packet Tracer .Troubleshooting Enterprise Networks 3 (CN 9.indb 234                                                                                                                           3/12/14 7:51 AM .2)     instructor.Troubleshooting Challenge . you must practice troubleshooting on lab equipment and simulators.3. the Packet Tracer activities in this chapter are great resources for                                 just such practice sessions with your team. But you also know enough now that you can create your own                                 troubleshooting scenarios to try out on each other. This practice works best with                                 a partner or a team because (1) you can collaborate together to resolve issues and (2) you can swap roles.3.12)                  Activity                                 Packet Tracer . practice as much as you can now in preparation for the test.                                 taking turns breaking the network while the other person or team resolves the issue. So. indb 235   3/12/14 7:51 AM .instructor. instructor.indb 236   3/12/14 7:51 AM .