CCNA Routing and Switching S3
CCNA Routing and Switching S3
Scaling Networks
2. Do not close Packet Tracer when you are done. It will close
automatically.
3. Click the Submit Assessment button in the browser window to submit
your work.
Introduction
In Part I of this practice skills assessment, you will configure routing and
ACLs. You will configure dynamic routing with EIGRP for IPv4 and static
and default routes. In addition, you will configure two access control lists.
In Part II of this practice skills assessment, you will configure the Tech
Company network with RPVST+, port security, EtherChannel, DHCP,
VLANs and trunking, and routing between VLANs. In addition you will
perform an initial configuration on a switch, secure unused switch ports and
secure SVIs. You will also control access to the switch management
network with an access control list.
All IOS device configurations should be completed from a direct
terminal connection to the device console from an available host.
Some values that are required to complete the configurations have not
been given to you. In those cases, create the values that you need to
complete the requirements. These values may include certain IP
addresses, passwords, interface descriptions, banner text, and other
values.
When you have been given a text value, such as a password, user
name, DHCP pool name, ACL name, VLAN name, etc, you must enter
these values exactly as they are given in these instructions. If the
values do not match exactly, you may not receive credit for your
configuration.
For the sake of time, many repetitive but important configuration tasks have
been omitted from this activity. Many of these tasks, especially those related
to device security, are essential elements of a network configuration. The
intent of this activity is not to diminish the importance of full device
configurations.
You will practice and be assessed on the following skills:
Configure EtherChannel.
Configure trunking.
Assign access ports to VLANs.
Configure remote management settings.
Activate and configure RPVST+.
Secure unused switch ports.
Configure port security.
FL-B:
Configure EtherChannel.
Configure trunking.
Assign access ports to VLANs.
Configure remote management settings with SSH.
Activate RPVST+.
FL-C:
Configure EtherChannel.
Configure trunking.
Bldg-1
Main
Bldg-2
Interface
Network
Configuration Details
S0/0/0
192.168.100.20/30
S0/0/1
192.168.100.28/30
G0/0
192.168.8.0/24
G0/1
192.168.9.0/24
S0/0/0
192.168.100.20/30
S0/0/1
192.168.100.36/30
S0/1/0
203.0.113.16/29
S0/0/0
192.168.100.28/30
S0/0/1
192.168.100.36/30
G0/1.2
10.10.2.0/24
G0/1.4
10.10.4.0/24
G0/1.8
10.10.8.0/24
G0/1.15
10.10.15.0/24
G0/1.25
10.10.25.0/24
FL-A
SVI
10.10.25.0/24
FL-B
SVI
10.10.25.0/24
FL-C
SVI
10.10.25.0/24
Lab A-1
NIC
192.168.8.0/24
Lab B-2
NIC
192.168.9.0/24
IT-A
NIC
10.10.15.0/24
IT-B
NIC
10.10.15.0/24
15
25
Network
dept1 10.10.2.0/24
Devic
e
Switc
h
Ports
FL-A
Fa0/5
FL-C Fa0/7
FL-A
Fa0/1
0
FL-C
Fa0/1
0
FL-A
Fa0/1
5
FL-C
Fa0/1
5
FL-A
Fa0/2
4
FL-C
Fa0/2
4
FL-A
SVI
dept2 10.10.4.0/24
dept3 10.10.8.0/24
IT
10.10.15.0/2
4
manag 10.10.25.0/2
FL-B
e
4
FL-C
SVI
SVI
99
safe
N/A
all
unuse
FL-A
d
ports
Interfaces
FL-A
Fa0/1, Fa0/2
FL-C
Fa0/1, Fa0/2
FL-A
Fa0/3, Fa0/4
FL-B
Fa0/3, Fa0/4
FL-B
Fa0/5, Fa0/6
FL-C
Fa0/5, Fa0/6
Instructions
All configurations must be performed through a direct terminal
connection to the device console lines from an available host.
Part I: EIGRP Router Configuration
Step 1: Plan the Addressing.
Determine the IP addresses that you will use for the required interfaces on
the devices and LAN hosts. Follow the configuration details provided in the
Addressing Table.
Step 2: Configure Bldg-1.
Configure Bldg-1 with initial settings:
Configure the router host name: Bldg-1. This value must be entered
exactly as it appears here.
Configure IP addressing.
Configure EIGRP for IPv4 to route between the internal networks. Use
ASN 100.
Use the precise wild card masks for all network statements.
You are not required to route the manage VLAN network over EIGRP.
Prevent routing updates from being sent on the LAN networks. Do
not use the default keyword version of the command to do so.
Prevent EIGRP for IPv4 from performing automatic route
summarization on all routers.
b. On the Main router:
Configure EIGRP for IPv4 to distribute the default route to the other
routers.
Step 6: Customize EIGRP for IPv4.
Customize EIGRP for IPv4 by performing the following configuration tasks:
Set the bandwidth of the link between Bldg-1 and Main to 128 kb/s.
Allow only Test Host to ping addresses within the Tech Company
network. Only echo messages should be permitted.
Prevent all other Internet hosts (not only the Internet hosts visible in
the topology) from pinging addresses inside the Tech
Company network. Block echo messages only.
All other traffic should be allowed.
Your ACL should consist of three statements.
Your ACL should be placed in the most efficient location as possible
to conserve network bandwidth and device processing resources.
c. Control access to the management interfaces (SVI) of the three switches
attached to Bldg-2 as follows:
The VLAN names that you configure must match the values in the
table exactly.
Each switch should be configured with all of the VLANs shown in the
table.
Step 2: Assign switch ports to VLANs.
Using the VLAN table, assign the switch ports to the VLANs you created in
Step 1, as follows:
the switches that are attached to Bldg-2. Configure the switches so that
they can communicate with hosts on other networks. Full connectivity will be
established after routing between VLANs has been configured later in this
assessment.
Step 4: Configure Trunking and EtherChannel.
a. Use the information in the Port-Channel Groups table to configure
EtherChannel as follows:
Use LACP.
Activate BPDU Guard on all access ports that are connected to hosts.
Step 6: Configure switch security.
You are required to complete the following only on some of the devices in
the network for this assessment. In reality, security should be configured on
all devices in the network.
a. Secure unused switch ports. Following security best practices, do the
following on FL-A only:
Each switch port should accept only two MAC addresses before a
security action occurs.
All VLAN pool names must match the provided values above exactly.
Exclude the first five addresses from each pool.
Configure a DNS server address of 192.168.200.225.
All hosts should be able to communication with hosts on other
networks.
Step 8: Configure host addressing.
Note: This assessment is a simulation of a working network. Due to the
complexities of the protocols and technologies that are simulated in this
network, some connectivity tests may not succeed even though the network
has been properly configured. If all required configurations are complete, your
score will not be affected.
All hosts should be able to ping each other and the two external servers
after they have been addressed.
All contents are Copyright 1992 - 2016 Cisco Systems, Inc. All rights reserved. This
document is Cisco Public Information.