For Cisco's CCIE Routing & Switching Lab Exam, Lab 2
For Cisco's CCIE Routing & Switching Lab Exam, Lab 2
(v5)
for Cisco's CCIE Routing and Switching Lab Exam, Volume 2, Lab 2
Table of Contents
iPexpert's End-User License Agreement ................................................................................................................................. 4
U.S. Government - Restricted Rights....................................................................................................................................... 5
Welcome, and Thank You! ...................................................................................................................................................... 6
Feedback.................................................................................................................................................................................. 6
Technical Support and Freebies .............................................................................................................................................. 6
How to Use This Lab Preparation Workbook .......................................................................................................................... 7
Cisco's New Retake Policy ....................................................................................................................................................... 8
Cisco R&S V5 Blueprint (Primary Sections w/ Assigned Point Values) ................................................................................... 8
How to Use This Lab Preparation Workbook .......................................................................................................................... 8
Additional Information Pertaining to Cisco's CCIE R&S Lab Exam .......................................................................................... 8
Lab 2: Troubleshooting Section :: Detailed Solutions...................................................................................................................... 11
Detailed Solution Guide ........................................................................................................................................................11
General Rules ........................................................................................................................................................................11
Pre-Setup ...............................................................................................................................................................................12
Diagram 2.1: Layer 2 .............................................................................................................................................................13
Diagram 2.2: BGP ..................................................................................................................................................................14
Incident 1 .............................................................................................................................................................. 15
Incident 2...............................................................................................................................................................................19
Incident 3 ..............................................................................................................................................................................24
Incident 4...............................................................................................................................................................................33
Incident 5...............................................................................................................................................................................37
Incident 6...............................................................................................................................................................................41
Incident 7...............................................................................................................................................................................45
Incident 8...............................................................................................................................................................................50
Incident 9...............................................................................................................................................................................54
Incident 10.............................................................................................................................................................................59
Lab 2: Diagnostic Section :: Detailed Solutions ............................................................................................................................... 63
Before You Begin ...................................................................................................................................................................63
General Rules ........................................................................................................................................................................63
Ticket 1 ..................................................................................................................................................................................64
Ticket 2 ..................................................................................................................................................................................68
Ticket 3 ..................................................................................................................................................................................71
Lab 2: Configuration Section :: Detailed Solutions .......................................................................................................................... 73
Before You Begin ...................................................................................................................................................................73
General Rules ........................................................................................................................................................................73
Pre-Setup ...............................................................................................................................................................................74
Diagram 2.3: ..........................................................................................................................................................................75
Diagram 2.4: BGP...................................................................................................................................................................76
Diagram 2.5: IPv4 VPN...........................................................................................................................................................77
Diagram 2.6: IPv6 ..................................................................................................................................................................78
Diagram 2.7: MPLS VPN ........................................................................................................................................................79
Section 1.0: Layer 2 Technologies .............................................................................................................................................. 80
Task 1.1: Layer 2 VLANs ......................................................................................................................................... 80
Task 1.2: Switch-to-Switch Links ..........................................................................................................................................88
Version 5.1A
2|Page
3|P a g e
Version 5.1A
Version 5.1A
4|Page
5|P a g e
Version 5.1A
Feedback
At iPexpert, we value the feedback (both positive and constructive) offered by our clientele. Our
dedication to offering the best tools and content to help students succeed could not be possible
without your comments and suggestions. Your feedback is what continually keeps us enhancing our
product portfolio, and it is greatly appreciated. If there is anything you'd like us to know, please do so
via the [email protected] alias.
In addition, when you pass your CCIE Lab exam, we want to hear about it! Please email your Full
Name (used in the CCIE Verification Tool), CCIE number and the track to [email protected] and
let us know how iPexpert played a role in your success. We would like to be sure you're welcomed
into the "CCIE Club" appropriately, by sending you a gift for your accomplishment.
Version 5.1A
6|Page
A restructure of the way the lab is delivered. You will first have to complete a Troubleshooting
section where you'll have access to the rack that Cisco provides you to do so. The next section
consists of the Diagnostics section, which is done without access to your rack. The third section is
the Configuration section, which is the actual "lab" that most people focus on, and have been
primarily concerned about in the past. With this new lab structure, it's VERY IMPORTANT that you
are well prepared for all three Sections of the lab exam. At any point, you could fail the lab exam
if you don't receive enough points in 1 of the 3 sections.
Cisco has also made a drastic change in the topology that you'll be given. It's common knowledge
at the time of this book's publication that the topology you're given has gone from their previous
6 to 8 router / 4 switch topology (seen in the labs previous to V4), to a topology that could
potentially consist of up to 40 routers and 8 switches. It's imperative that you work through
practice scenarios on a large topology so you're familiar with the intricacies and technological
specifics that can be introduced with a topology that large.
Cisco has also changed their retake policy, which now requires their CCIE candidates to wait
longer durations before their next attempt(s). Below we have listed Cisco's new policy.
And, finally, Cisco has created this impressive blueprint and broken it into sections. Cisco provides
you with the 5 section titles and the number of points so you're able to understand how their
grading works and how much focus and attention is placed on that various section. The primary
section outline is provided below; however, we have not provided all of the topics and subtopics
that Cisco has provided. We recommend that you reference Cisco's website URL which provides
these details for the Routing and Switching V5 Lab - which will require you to have a CCO and
Cisco Learning Network login prior to being given access. That URL was found here at the date of
this book's publication.
7|P a g e
Version 5.1A
Version 5.1A
8|Page
9|P a g e
Version 5.1A
NOTE
THIS CONCLUDES ANY REFERENCED CONTENT SEEN OR FOUND ON CISCO'S LEARNING NETWORK.
Version 5.1A
10 | P a g e
General Rules
11|P a g e
You may modify, but not delete or remove any prefix-lists, route-maps, or access-lists.
Do not modify any IP addressing on any interfaces.
The BB routers are not accessible.
All Non ISP/backbone routers have an interface loopback 0 with the address 172.16.xx.xx, where
xx is the router number. ISP routers have loopback address of 172.168.2xx.2xx. Switches have
loopback addresses of 172.168.1xx.1xx.
Static/default routes are NOT allowed unless otherwise stated in the task.
Save your configurations often.
Version 5.1A
Pre-Setup
Please login to your vRack and load the initial Configuration.
This lab is intended to be used with online rack access. Connect to the terminal server and complete
the troubleshooting tasks as detailed below.
Version 5.1A
12 | P a g e
13|P a g e
Version 5.1A
Version 5.1A
14 | P a g e
Incident 1
(3 points)
Loopback0 of R21 cannot talk to Loopback0 of R22. Troubleshoot and fix the issues so that R21
can ping 172.16.22.22 sourced from its Loopback0 interface.
This incident contains multiple faults. Use the BGP diagram to aid you with troubleshooting.
15|P a g e
Version 5.1A
Solution
We need to first test the symptom outlined in the incident to confirm the issue. The incident states
that the loopback 0 interface of R21 cannot ping the loopback 0 interface of R22. Lets take a look.
R21
R21#ping 172.16.22.22 source loopback 0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.6.22.22, timeout is 2 seconds:
Packet sent with a source address of 172.16.21.21
.....
Success rate is 0 percent (0/5)
The IPv4 diagram shows that the Remote offices routers are connected to ISP4. Also, the task asks us
to use the BGP diagram. This signifies that BGP being used as a transport and that there may be a
problem with BGP. Also remember that we are allowed to look at and configure the ISP routers in
this Troubleshooting lab. Lets take a look at the BGP config of R21, R22, and ISP4.
R21
R21#sh run | sec bgp
router bgp 2121
bgp log-neighbor-changes
neighbor 1.1.1.26 remote-as 444
R22
R22#sh run | sec bgp
router bgp 2222
no bgp log-neighbor-changes
redistribute connected
neighbor 1.1.1.28 remote-as 4444
ISP4
ISP4#sh run | sec bgp
router bgp 444
bgp log-neighbor-changes
no bgp default ipv4-unicast
neighbor 172.16.207.207 remote-as 777
neighbor 172.16.207.207 ebgp-multihop 255
Version 5.1A
16 | P a g e
Notice that the neighbor command for R22s connection to ISP4 is in the wrong AS. It should be
AS444, not 4444. Also notice that R21 is not redistributing connected routes like R22 is. We will keep
that in our back pocket and first work through the wrong AS configuration on R22.
R22
R22(config)#router bgp 2222
R22(config-router)#no neighbor 1.1.1.28 remote-as 4444
R22(config-router)#neighbor 1.1.1.28 remote-as 444
R21
R21#ping 172.16.22.22 source loopback 0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.6.22.22, timeout is 2 seconds:
Packet sent with a source address of 172.16.21.21
.....
Success rate is 0 percent (0/5)
17|P a g e
Version 5.1A
R21
R21(config)#router bgp 2121
R21(config-router)#redistribute connected
Verification
Perform the ping outlined in the incident to verify we get good results.
R21
R21#ping 172.16.22.22 source loopback 0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.22.22, timeout is 2 seconds:
Packet sent with a source address of 172.16.21.21
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 16/16/17 ms
Summary of Changes
R21
R21(config)#router bgp 2121
R21(config-router)#redistribute connected
R22
R22(config)#router bgp 2222
R22(config-router)#no neighbor 1.1.1.28 remote-as 4444
R22(config-router)#neighbor 1.1.1.28 remote-as 444
Version 5.1A
18 | P a g e
Incident 2
(2 points)
BB3 has lost connectivity to the Chicago hub. Interface E0/0 of BB3 should learn its IP address
from R1 and participate in OSPF. The BB3 loopback network 172.16.113.113 should have full
reachability to all devices throughout the network.
19|P a g e
Version 5.1A
Solution
The incident states that BB3 should learn its IP address of E0/0 from R1. This leads us to conclude
that R1 is acting as a DHCP server. Also, we are not allowed to access or look at BB3 for this incident.
Lets test basic connectivity to E0/0 of BB3 as well as the 172.16.113.113 network from R1.
R1
R1#ping 10.10.1.254
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.1.254, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
R1#ping 172.16.113.113
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.113.113, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
R1 does not have basic layer 3 connectivity to BB3. Since the incident called out that R1 is providing
the IP address to BB3, lets take a look at the DHCP config on R1.
R1
R1#sh run | sec dhcp
ip dhcp pool BB3
network 10.10.1.252 255.255.255.252
ip dhcp pool BB3-E00
host 10.10.1.254 255.255.255.252
client-identifier aabb.cc01.f700
client-name BB3
Notice that a client identifier is configured and that there is only 1 available IP address in the DHCP
pool. Lets debug the DHCP process and bounce the link to see if we can glean any information.
R1
R1#debug ip dhcp server packet
DHCP server packet debugging is on.
Version 5.1A
20 | P a g e
Notice that the client identifier does not match. On R1, it was configured with the MAC address of
the E0/0 interface on BB3. However, Cisco uses a modified MAC address as the client-identifier, and
it is prepended with 01. This holds true for all default configurations of DHCP when the client is a
router or switch. Also notice that the decimal placement changes when prepending the client-id with
01. This is also important as the decimals are required in the client-id and must match exactly. Lets
change the client-id of BB3 on R1 under the DHCP process.
R1
R1(config)#ip dhcp pool BB3-E00
R1(dhcp-config)#no client-identifier aabb.cc01.f700
R1(dhcp-config)#client-identifier 01aa.bbcc.01f7.00
R1(dhcp-config)#int e0/0
R1(config-if)#shut
R1(config-if)#no shut
Lets now run the same verification test we ran initially to see where we stand now. We should have
Layer 3 connectivity to the E0/0 interface of BB3 now.
R1
R1#ping 10.10.1.254
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.1.254, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms
R1#ping 172.16.113.113
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.113.113, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
21|P a g e
Version 5.1A
R1
R1#debug ip ospf adj
OSPF adjacency debugging is on
R1#
02:55:02: OSPF-1 ADJ
0.0.0.1 in the header
R1#
There it is! The areas are mismatched between BB3 and R1. We now need to dig deep to figure out
what the area should be. Since we cannot login to BB3, we need to match the area that BB3 is
already configured for. The debug shows that the area id is 0.0.0.1. This equals a decimal value of 1.
If it was 0.0.0.10, then the decimal value would be 10. In OSPF, you can either use integer or dotted
decimal notation, as long as they equal each other when translated. In this case, we will use integer
notation. Lets change the area for this network to 1. Also keep in mind that the network command
for this network also encompasses other connected networks, so lets configure a more specific
network statemet for this specific segment.
R1
R1(config)#router ospf 1
R1(config-router)#network 10.10.1.253 0.0.0.0 area 1
%OSPF-5-ADJCHG: Process 1, Nbr 192.168.3.1 on Ethernet0/0 from LOADING to FULL,
Loading Done
Verification
R1
R1#ping 10.10.1.254
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.1.254, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
R1#ping 172.16.113.113
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.113.113, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
Version 5.1A
22 | P a g e
Summary of Changes
R1
R1(config)#ip dhcp pool BB3-E00
R1(dhcp-config)#no client-identifier aabb.cc01.f700
R1(dhcp-config)#client-identifier 01aa.bbcc.01f7.00
R1(config)#router ospf 1
R1(config-router)#network 10.10.1.253 0.0.0.0 area 1
23|P a g e
Version 5.1A
Incident 3
(2 points)
Users in the Miami Hub are complaining that they have lost connectivity to the Denver HQ office.
All provider-to-provider links should use MPLS VPN as the routing mechanism.
Troubleshoot and fix the issue so that all devices at the Miami Hub have full reachability to all
devices at the Denver HQ office and that both paths through ISP2 and ISP7 are in the BGP
topology table for vrf CORE.
Version 5.1A
24 | P a g e
Solution
Miami has lost connectivity to Denver HQ. Lets start by taking a look at the routing table of R2 and
see if it has routes to the 10.10.100.X networks since it is the exit point for Miami.
R2
R2#sh ip route 10.10.100.0
% Subnet not in table
R2 is not learning any routes for Denver. Now, lets take a look at R11 at Denver to see if it is learning
routes to Miami.
R11
R11#sh ip route 10.10.30.0
% Subnet not in table
At this point, R2 and R11 are not advertising their internal routes into BGP or there is an issue within
the BGP ISP network (or it could be a combination of both). Lets verify that the internal routes are
being advertised into BGP on R2 and R11:
R2
R2#sh run | sec bgp
redistribute bgp 202 metric 100 10 1 1 1
router bgp 202
bgp log-neighbor-changes
redistribute eigrp 300
neighbor 1.1.1.16 remote-as 111
R11
R11#sh run | sec bgp
router bgp 1111
bgp log-neighbor-changes
redistribute rip
neighbor 1.1.1.18 remote-as 333
We are redistributing our IGPs into BGP without any filtering. It is time to take a look at the routing
tables of the ISP routers. Lets look at both paths, first through ISP2 and ISP7.
25|P a g e
Version 5.1A
ISP2
ISP2#show ip route vrf CORE
As you can see, ISP2 is not learning any routes from Miami or Denver. There may be an issue with
BGP. Lets take a look at R2s BGP configuration.
ISP2
ISP2#show run | sec bgp
router bgp 222
bgp log-neighbor-changes
no bgp default ipv4-unicast
neighbor 172.16.201.201 remote-as 111
neighbor 172.16.201.201 ebgp-multihop 255
neighbor 172.16.201.201 update-source Loopback0
neighbor 172.16.203.203 remote-as 333
neighbor 172.16.203.203 ebgp-multihop 255
neighbor 172.16.203.203 update-source Loopback0
neighbor 172.16.207.207 remote-as 777
neighbor 172.16.207.207 ebgp-multihop 255
neighbor 172.16.207.207 update-source Loopback0
!
address-family ipv4
exit-address-family
!
address-family vpnv4
exit-address-family
Version 5.1A
26 | P a g e
ISP2 does not have any BGP vpnv4 neighbors! The MPLS core is configured to use MPLS VPN using
BGP. Also notice that unicast is disabled for ipv4. We need to activate each of its P-to-P neighbors in
the vpnv4 address family.
ISP2
ISP2(config)#router bgp 222
ISP2(config-router)#address-family vpnv4
ISP2(config-router-af)#neighbor 172.16.201.201 activate
ISP2(config-router-af)#neighbor 172.16.203.203 activate
ISP2(config-router-af)#neighbor 172.16.207.207 activate
Remember that there are 2 requirements for this task. First, we need to ping across the network.
The second requirement asks us to verify that the BGP topology table shows both paths between the
two networks, one through ISP2 and the second path through ISP7. Looking at the routing table of
ISP1, we can confirm this. Yet, we still cant ping. This is because even though the routes are being
learned, and the path through ISP2 should work, the route installed in the routing table still takes the
path of ISP7. While this is not the problem itself, it is indicative that ISP7 still has an issue.
ISP1
ISP1#sh ip bgp vpnv4 vrf CORE
BGP table version is 75, local router ID is 172.16.201.201
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal,
r RIB-failure, S Stale, m multipath, b backup-path, f RT-Filter,
x best-external, a additional-path, c RIB-compressed,
Origin codes: i - IGP, e - EGP, ? - incomplete
RPKI validation codes: V valid, I invalid, N Not found
Network
Next Hop
1.1.1.22/31
*>
*
1.1.1.24/31
*>
*
1.1.1.26/31
172.16.202.202
172.16.207.207
172.16.202.202
172.16.207.207
172.16.202.202
Results Truncated
27|P a g e
Version 5.1A
ISP7
ISP7#sh run int s4/0
interface Serial4/0
ip address 1.1.1.32 255.255.255.254
serial restart-delay 0
We can also confirm this by looking at the MPLS forwarding table of ISP7 (only part of command
output is shown):
ISP7
ISP7#sh mpls forwarding-table vrf CORE
Local
Outgoing
Prefix
Bytes Label
Outgoing
Label
Label
or Tunnel Id
Switched
interface
33
41
10.10.30.0/31[V] 0
drop
34
47
10.10.30.0/30[V] 0
drop
35
52
10.10.30.8/30[V] 0
drop
36
53
10.10.30.24/30[V]
Label
Label
or Tunnel Id
37
44
\
Switched
interface
drop
10.10.30.32/30[V]
\
0
38
48
10.10.30.40/30[V]
drop
\
0
39
49
10.10.30.48/30[V]
drop
\
Version 5.1A
Next Hop
drop
28 | P a g e
46
10.10.30.56/30[V]
\
0
47
25
10.10.100.0/29[V]
drop
\
0
48
38
drop
10.10.100.32/29[V]
drop
Results Truncated
MPLS is NOT enabled between the P-to-P links. When looking at the MPLS forwarding table, the
packets are being dropped because there is not an exit interface specified. Lets enable MPLS on
these links.
ISP7
ISP7(config-if)#int s5/3
ISP7(config-if)#mpls ip
ISP7(config-if)#int s4/0
ISP7(config-if)#mpls ip
ISP7(config-if)#int s4/1
ISP7(config-if)#mpls ip
Now lets take a look at the MPLS forwarding table again. We should see routes to both 10.10.30.X
and 10.10.100.X with destination interfaces.
ISP7
ISP7#sh mpls forwarding-table vrf CORE
Local
Outgoing
Prefix
Bytes Label
Outgoing
Label
Label
or Tunnel Id
Switched
interface
33
41
10.10.30.0/31[V] 0
Se5/3
point2point
34
47
10.10.30.0/30[V] 0
Se5/3
point2point
35
52
10.10.30.8/30[V] 0
Se5/3
point2point
36
53
10.10.30.24/30[V]
Se5/3
point2point
Se5/3
point2point
Se5/3
point2point
\
0
37
44
10.10.30.32/30[V]
\
0
38
48
10.10.30.40/30[V]
\
0
39
29|P a g e
49
10.10.30.48/30[V]
Next Hop
Version 5.1A
46
10.10.30.56/30[V]
Se5/3
\
0
47
25
10.10.100.0/29[V]
Se5/3
\
0
48
38
Se4/1
point2point
point2point
10.10.100.32/29[V]
Se4/1
point2point
Results Truncated
Verification
We need to verify 2 things. First, that Miami can ping Denver. Second, that ISP1 and ISP3 show both
paths in the BGP topology table.
R5
R5#ping 10.10.100.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.100.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 29/31/34 ms
We have reachability! Now, lets make sure both paths exist in the BGP topology tables of ISP1 and
ISP3.
ISP1
ISP1#sh ip bgp vpnv4 all 10.10.100.0 255.255.255.248
BGP routing table entry for 111:111:10.10.100.0/29, version 216
Paths: (2 available, best #2, table CORE)
Advertised to update-groups:
4
Refresh Epoch 1
222 333 1111
172.16.202.202 (metric 2297856) from 172.16.202.202 (172.16.202.202)
Origin incomplete, localpref 100, valid, external
Extended Community: RT:111:111
mpls labels in/out 31/60
rx pathid: 0, tx pathid: 0
Refresh Epoch 1
Version 5.1A
30 | P a g e
ISP3
ISP3#sh ip bgp vpnv4 all 10.10.30.0 255.255.255.252
BGP routing table entry for 111:111:10.10.30.0/30, version 189
Paths: (2 available, best #2, table CORE)
Advertised to update-groups:
1
Refresh Epoch 2
222 111 202
172.16.202.202 (metric 2297856) from 172.16.202.202 (172.16.202.202)
Origin incomplete, localpref 100, valid, external
Extended Community: RT:111:111
mpls labels in/out 41/37
rx pathid: 0, tx pathid: 0
Refresh Epoch 1
777 111 202
172.16.207.207 (metric 2297856) from 172.16.207.207 (172.16.207.207)
Origin incomplete, localpref 100, valid, external, best
Extended Community: RT:111:111
mpls labels in/out 41/34
rx pathid: 0, tx pathid: 0x0
31|P a g e
Version 5.1A
Summary of Changes
ISP7
ISP7(config-if)#int s5/3
ISP7(config-if)#mpls ip
ISP7(config-if)#int s4/0
ISP7(config-if)#mpls ip
ISP7(config-if)#int s4/1
ISP7(config-if)#mpls ip
ISP2
ISP2(config)#router bgp 222
ISP2(config-router)#address-family vpnv4
ISP2(config-router-af)#neighbor 172.16.201.201 activate
ISP2(config-router-af)#neighbor 172.16.203.203 activate
ISP2(config-router-af)#neighbor 172.16.207.207 activate
Version 5.1A
32 | P a g e
Incident 4
(2 points)
IPv6 customers at the Denver HQ office are reporting limited reachability between their IPv6
addresses.
Fix the issues so that connectivity is restored and the following ping commands show successful
results:
R11#ping 7777:135::15
R15#ping 7777:111::11
33|P a g e
Version 5.1A
Solution
We need to start by verifying the issue. The incident asks us for 2 specific pings.
R11
R11#ping 7777:135::15
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 7777:135::15, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
R15
R15#ping 7777:111::11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 7777:111::11, timeout is 2 seconds:
R11
R11#traceroute 7777:135::15
Type escape sequence to abort.
Tracing the route to 7777:135::15
R15
R15#traceroute 7777::11:11
Type escape sequence to abort.
Tracing the route to 7777::11:11
Version 5.1A
34 | P a g e
R15
%OSPFv3-4-AREA_MISMATCH: OSPFv3-1-IPv6 Received packet with incorrect area from
FE80::A8BB:CCFF:FE00:D10, Ethernet0/1, area 0.0.0.1, packet area 0.0.0.0
There is an area mismatch for OSPFv3. Lets take a look at the OSPF configuration of R13 to verify
what are it should be in. Remember that OSPFv3 is configured under the interface.
R13
R13#sh run int e0/1
interface Ethernet0/1
ip address 10.10.100.25 255.255.255.248
ipv6 address 7777:135::13/64
ipv6 ospf 1 area 0
Lets change the OSPFv3 area to 0 on R15 and observe the results.
R15
R15(config)#int e0/1
R15(config-if)#ipv6 ospf 1 area 0
%OSPFv3-5-ADJCHG: Process 1, Nbr 172.16.13.13 on Ethernet0/1 from LOADING to FULL,
Loading Done
Verification
R11
R11#ping 7777:135::15
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 7777:135::15, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
35|P a g e
Version 5.1A
R15
R15#ping 7777:111::11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 7777:111::11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/15 ms
Summary of Changes
R15
R15(config)#int e0/1
R15(config-if)#ipv6 ospf 1 area 0
Version 5.1A
36 | P a g e
Incident 5
(3 points)
Users are reporting that customers connecting to the 10.10.30.252/30 network are only getting
half of the bandwidth that was guaranteed in their Customer Agreement. The Customer
Agreement states that 10.10.30.252/30 should get 3Mbps of bandwidth to the rest of the
network.
Troubleshoot and fix the issue. Ensure that users connected to the 10.10.30.252/30 network get
3Mbps bandwidth when connecting to the rest of the network.
37|P a g e
Version 5.1A
Solution
There are 2 serial links connected between R6 and R9. On the IPv4 diagram, there is only 1 IP address
for this link. This leads to a conclusion that there is some form of bonding going on, typically PPP
multilink. Lets take a look at the interface configurations of R6 and R9.
R6
R6#sh run int s3/0
interface Serial3/0
bandwidth 1500
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
serial restart-delay 0
R9
R9#sh run int s3/0
interface Serial3/0
bandwidth 1500
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
serial restart-delay 0
end
Version 5.1A
38 | P a g e
The serial interfaces are part of ppp-multilink 1. Notice that S3/1 of R9 is not part of the multilink.
That is definitely a problem. Lets add it to the multilink.
R9
R9(config)#int s3/1
R9(config-if)#ppp multilink group 1
Verification
At this point, the multilink interface should have come up. Lets take a look at the multilink interface.
R9
R9#sh int multilink 1
Multilink1 is up, line protocol is up
Hardware is multilink group interface
Internet address is 10.10.30.66/30
MTU 1500 bytes, BW 3000 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, LCP Open, multilink Open
Open: IPCP, CDPCP, loopback not set
Keepalive set (10 sec)
DTR is pulsed for 2 seconds on reset
Last input 00:00:00, output never, output hang never
Last clearing of "show interface" counters 00:57:24
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
36 packets input, 5750 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
39|P a g e
Version 5.1A
R6
R6#sh int multilink 1
Multilink1 is up, line protocol is up
Hardware is multilink group interface
Internet address is 10.10.30.65/30
MTU 1500 bytes, BW 3000 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, LCP Open, multilink Open
Open: IPCP, CDPCP, loopback not set
Keepalive set (10 sec)
DTR is pulsed for 2 seconds on reset
Last input 00:00:02, output never, output hang never
Last clearing of "show interface" counters 11:03:46
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
85 packets input, 9627 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
91 packets output, 10839 bytes, 0 underruns
0 output errors, 0 collisions, 5 interface resets
0 unknown protocol drops
0 output buffer failures, 0 output buffers swapped out
0 carrier transitions
Summary of Changes
R9
R9(config)#int s3/1
R9(config-if)#ppp multilink group 1
Version 5.1A
40 | P a g e
Incident 6
(2 points)
The Network Admins at the Miami Hub report that R9 cannot ping all members of the
225.10.10.10 group. PIM should not be enabled on any interfaces of R9.
The loopback 0 interface of R5 is the Rendezvous Point for the multicast network.
Fix the issues so that connectivity is restored and the following ping command shows a successful
result:
41|P a g e
Version 5.1A
Solution
Perform the ping to the multicast group as outlined in the incident to verify the issue.
R9
R9#ping 225.10.10.10 source 10.10.30.26 rep 1
Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 225.10.10.10, timeout is 2 seconds:
Packet sent with a source address of 10.10.30.26
Reply to request 0 from 10.10.30.25, 1 ms
We only get one response and it was from the directly connected peer, R5. Lets take a look at the
Multicast configuration on R9 and R5.
R9
R9#sh run | sec multicast
(no output)
R9#sh run | sec igmp
(no output)
Version 5.1A
42 | P a g e
R5
R5#sh run | sec multicast
ip multicast-routing
Multicast routing IS enabled on R5. So is bidirectional PIM. The only issue is that R5 is not running
PIM on the link towards R9. Lets think about that for a second. R9 does not have PIM enabled
either. How can this work? The incident states that PIM should not be enabled on any interfaces of
R9. PIM bidirectional is the key here. PIM bi-directional mode will never build a (S,G) entry. Rather,
it builds a (*,G). The benefit of using bidirectional mode is Multicast up AND down the shared tree,
rather than just down. There is also no RPF check! The server does not need to run PIM, rather, its
upstream router to the RP does. So lets enable PIM on the e0/1 interface of R5 and observe the
results.
R5
R5(config)#int e0/1
R5(config-if)#ip pim dense-mode
Verification
R9
R9#ping 225.10.10.10 source 10.10.30.26 rep 5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 225.10.10.10, timeout is 2 seconds:
43|P a g e
Version 5.1A
Summary of Changes
R5
R5(config)#int e0/1
R9
R9#ping 225.10.10.10 source 10.10.30.26 rep 5
Version 5.1A
44 | P a g e
Incident 7
(2 points)
All traffic sourced or destined for R7 should use the serial connection between R8 and R7, and
not the Ethernet connection between R2 and R7. The Ethernet connection has only 512Kbps of
bandwidth and the serial connection has 45Mbps of bandwidth.
Fix the issue so that R7 prefers the serial connection R8, and then to R2, so that it is assigned the
appropriate bandwidth on both connections.
Also verify that both paths are in R7s EIGRP topology table.
45|P a g e
Version 5.1A
Solution
The incident states that users connected to R7 are reporting slow connectivity. It also points out a
few key pieces of information. First, all traffic from R7 should use the serial link to R8, and not the
Ethernet interface connected to R2. Second, it states that the Ethernet interface is only 512Kbps and
the said Serial interface is 45Mbps on R7. Also note that the topology is using EIGRP as the routing
protocol and know that EIGRP uses bandwidth and delay as its primary attributes to compute its
metric. Lets take a look at the interface configurations of R7, R8, and R2 first to verify bandwidth
settings.
R2
R2#sh run int e0/0
interface Ethernet0/0
bandwidth 512
ip address 10.10.30.49 255.255.255.252
R7
R7#sh run int e0/0
interface Ethernet0/0
bandwidth 512
ip address 10.10.30.50 255.255.255.252
R8
R8#sh run int s3/0
interface Serial3/0
bandwidth 45
ip address 10.10.30.57 255.255.255.252
serial restart-delay 0
The bandwidth on the serial interfaces is set to 45Kbps, not 45Mbps. Lets get the bandwidth issue
fixed first and then go from there.
Version 5.1A
46 | P a g e
R7
R7(config)#int s3/0
R7(config-if)#bandwidth 45000
R8
R8(config)#int s3/0
R8(config-if)#bandwidth 45000
Now lets perform a traceroute from R7 to R2, VLAN 82 to see which route it takes. It should take the
route through R8, even though R2 is directly connected.
R7
R7#traceroute 10.10.30.2
Type escape sequence to abort.
Tracing the route to 10.10.30.2
VRF info: (vrf in name/id, vrf out name/id)
1 10.10.30.57 1 msec 0 msec 0 msec
2 10.10.30.34 5 msec 5 msec 0 msec
3 10.10.30.10 5 msec 6 msec 1 msec
4 10.10.30.41 2 msec *
3 msec
OK so the path is actually via R8, but then also via R4 and R5, not directly to R2. Lets take a look at
R8s EIGRP configuration. It should peer with 3 different directly connected neighbors, R7, R2, and
R4.
R8
R8# sh ip eigrp nei
EIGRP-IPv4 Neighbors for AS(300)
H
Address
Interface
Hold Uptime
(sec)
SRTT
RTO
(ms)
Seq
Cnt Num
10.10.30.34
Et0/0
13 00:11:06
100
11
10.10.30.58
Se3/0
11 00:11:38
175
3324
25
R8
%DUAL-6-NBRINFO: EIGRP-IPv4 300:neighbor 10.10.30.2 (Ethernet0/1) is blocked: not on
common subnet (10.10.30.1/31)
47|P a g e
Version 5.1A
R8
R8(config)#int e0/1
R8(config-if)#ip address 10.10.30.1 255.255.255.252
R8
R8#show ip eigrp nei
EIGRP-IPv4 Neighbors for AS(300)
H
Address
Interface
Hold Uptime
SRTT
RTO
(sec)
Seq
(ms)
10.10.30.2
Et0/1
11 00:01:27
100
232
10.10.30.34
Et0/0
11 00:17:48
100
14
10.10.30.58
Se3/0
12 00:18:20
89
534
33
Cnt Num
Verification
Perform a traceroute from R7 to VLAN 82 of R2 and the Vlan 95 interface of R9 and verify that it is
taking a path through R8.
R7
R7#traceroute 10.10.30.2
Type escape sequence to abort.
Tracing the route to 10.10.30.2
VRF info: (vrf in name/id, vrf out name/id)
1 10.10.30.57 2 msec 0 msec 1 msec
2 10.10.30.2 1 msec *
2 msec
R7#traceroute 10.10.30.26
Type escape sequence to abort.
Tracing the route to 10.10.30.26
VRF info: (vrf in name/id, vrf out name/id)
1 10.10.30.57 1 msec 0 msec 0 msec
2 10.10.30.2 1 msec 1 msec 0 msec
3 10.10.30.42 1 msec 1 msec 1 msec
4 10.10.30.26 2 msec *
Version 5.1A
3 msec
48 | P a g e
Summary of Changes
R7
R7(config)#int s3/0
R7(config-if)#bandwidth 45000
R8
R8(config)#int s3/0
R8(config-if)#bandwidth 45000
R8(config)#int e0/1
R8(config-if)#ip address 10.10.30.1 255.255.255.252
49|P a g e
Version 5.1A
Incident 8
(3 points)
Users on VLAN 169 at the Atlanta Hub have lost connectivity to the rest of the network.
Troubleshoot the incident and fix any issues to restore VLAN 169 connectivity.
Version 5.1A
50 | P a g e
Solution
We can start troubleshooting this incident by verifying basic layer 3 connectivity between R19 and
R16.
R19
R19#ping 10.10.200.42
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.200.42, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
We indeed cannot ping R16, which is directly connected. The ticket specifies to use the Layer 2
diagram. This leads to the conclusion that there is an issue with layer 2. Lets take a look at the
switch ports connecting VLAN 169 according to the layer 2 diagram.
SW8
SW8#sh run int e0/0 (R16 Connection)
interface Ethernet0/0
switchport access vlan 169
switchport mode access
duplex auto
Well, there is our first problem. SW8 is not allowing VLAN 169 across the trunk. Lets add VLAN 169
into the allowed vlan statement.
SW8
SW8(config)#int e1/0
SW8(config-if)#switchport trunk allowed vlan add 169
Lets verify that VLAN 169 is now allowed across the trunk by looking at the trunk interface.
51|P a g e
Version 5.1A
SW8
SW8#sh int trunk (Results Truncated)
Port
Mode
Encapsulation
Status
Native vlan
Et1/0
on
802.1q
trunking
Port
Et1/0
169,179
Port
Et1/0
179
Port
Et1/0
179
Now the VLAN is being allowed across the trunk, but is still not showing as forwarding or active on the
trunk. We need to verify that the VLAN actually exists in the VLAN database.
SW8
SW8#show vlan
VLAN Name
Status
Ports
default
active
169
VLAN0169
act/lshut Et0/0
172
VLAN0172
active
Et1/1
187
VLAN0187
active
Et0/2
Look at that, VLAN 169 is shutdown. Lets no shut the VLAN and observe the results.
SW8
SW8(config)#vlan 169
SW8(config-vlan)#no shut
Version 5.1A
52 | P a g e
Verification
R19
R19#ping 10.10.200.42
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.200.42, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
Lets also ping from R16 E0/1 to the rest of the Atlanta Hub network.
R16
R16#ping 10.10.200.25
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.200.25, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
R16#ping 10.10.200.17
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.200.17, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
*** Note you might need to reload SW7 if your ping is failing ***
Summary of Changes
SW8
SW8(config)#int e1/0
SW8(config-if)#switchport trunk allowed vlan add 169
SW8(config)#vlan 169
SW8(config-vlan)#no shut
SW8(config-vlan)#exit
53|P a g e
Version 5.1A
Incident 9
(2 points)
Network Time is not updating on R20. Ensure that R20 uses authentication for NTP and that it is
working with 2 NTP servers for time synchronization.
R17 should be the preferred NTP server and R19 should be the secondary NTP server.
Version 5.1A
54 | P a g e
Solution
This is a very specific incident and the ticket outlines what is needed. First, R20 should use NTP,
preferring R17 as the primary NTP server and R19 as the secondary NTP server. Also, this NTP
communication should be authenticated. Lets start by looking at the NTP associations on R20 to get
an idea of where the issue is.
R20
R20#sh ntp associations
address
ref clock
st when
poll reach
delay offset
disp
*~172.16.17.17
127.127.1.1
920
1024
377
0.000 0.000
1.992
~172.16.19.19
172.16.17.17
830
1024
377
R17 is showing as the preferred NTP server and R19 is showing up as well as secondary. However, we
are not able to see the authentication with this command. We need to show ntp associations in
detail to see authentication.
R20
R20# sh ntp associations detail
172.16.17.17 configured, ipv4, our_master, sane, valid, stratum 2
ref ID 127.127.1.1
our mode client, peer mode server, our poll intvl 1024, peer poll intvl 1024
root delay 0.00 msec, root disp 2.18, reach 377, sync dist 5.80
delay 0.00 msec, offset 0.0000 msec, dispersion 1.98, jitter 0.97 msec
precision 2**10, version 4
assoc id 129, assoc name 172.16.17.17
assoc in packets 1005, assoc out packets 1006, assoc error packets 0
org time 00000000.00000000 (01:00:00.000 CET Mon Jan 1 1900)
rec time D7E6D251.245A1D10 (23:36:01.142 CET Mon Oct 13 2014)
xmt time D7E6D251.245A1D10 (23:36:01.142 CET Mon Oct 13 2014)
filtdelay =
55|P a g e
1.00
0.00
1.00
1.00
1.00
1.00
1.00
1.00
Version 5.1A
0.50
0.00
0.50
0.50
0.50
0.50
0.50
0.50
filterror =
1.95
1.98
2.01
2.04
2.07
2.10
2.13
2.16
minpoll = 6, maxpoll = 10
172.16.19.19 configured, ipv4, insane, invalid, stratum 3
ref ID 172.16.17.17
our mode client, peer mode server, our poll intvl 64, peer poll intvl 64
root delay 0.00 msec, root disp 7.98, reach 1, sync dist 198.64
delay 0.00 msec, offset 0.0000 msec, dispersion 189.48, jitter 0.97 msec
precision 2**10, version 4
assoc id 131, assoc name 172.16.19.19
assoc in packets 6, assoc out packets 6, assoc error packets 0
org time 00000000.00000000 (01:00:00.000 CET Mon Jan 1 1900)
rec time D7E6D270.245A1D10 (23:36:32.142 CET Mon Oct 13 2014)
xmt time D7E6D270.245A1D10 (23:36:32.142 CET Mon Oct 13 2014)
filtdelay =
1.00
1.00
1.00
0.00
1.00
1.00
0.00
0.00
filtoffset =
0.50
0.50
0.50
0.00
0.50
0.50
0.00
0.00
filterror =
1.95
1.98
2.01
2.04
2.07
minpoll = 6, maxpoll = 10
There are few things to notice here. First, R19 is showing insane meaning we can talk to it but we
are not synchronizing with it. Second, there is no authentication showing up. Now it is time to look
at the NTP configs for R17 and R19.
R17
R17#show run | section ntp
ntp authentication-key 1 md5 08285C56 7
ntp trusted-key 1
ntp source Loopback0
ntp master 2
ntp peer 172.16.19.19
R19
R19#show run | section ntp
ntp authentication-key 1 md5 030D4B13 7
ntp trusted-key 1
ntp source Loopback0
ntp master 1
ntp peer 172.16.17.17
Version 5.1A
56 | P a g e
R20
R20(config)#ntp server 172.16.17.17 key 1 prefer
R20(config)#ntp server 172.16.19.19 key 1
Verification
R20
R20#sh ntp association detail
172.16.17.17 configured, ipv4, authenticated, sane, valid, stratum 2
ref ID 127.127.1.1
our mode client, peer mode server, our poll intvl 128, peer poll intvl 128
root delay 0.00 msec, root disp 2.22, reach 17, sync dist 7.05
delay 0.00 msec, offset 0.0000 msec, dispersion 3.41, jitter 0.97 msec
precision 2**10, version 4
assoc id 132, assoc name 172.16.17.17
assoc in packets 11, assoc out packets 11, assoc error packets 0
org time 00000000.00000000 (01:00:00.000 CET Mon Jan 1 1900)
rec time D7E6D624.245A1D10 (23:52:20.142 CET Mon Oct 13 2014)
xmt time D7E6D624.245A1D10 (23:52:20.142 CET Mon Oct 13 2014)
filtdelay =
0.00
1.00
1.00
1.00
0.00
0.00
1.00
1.00
filtoffset =
0.00
0.50
0.50
0.50
0.00
0.00
0.50
0.50
filterror =
1.95
1.98
3.97
4.00
5.02
5.91
5.94
5.97
minpoll = 6, maxpoll = 10
57|P a g e
Version 5.1A
1.00
1.00
1.00
0.00
1.00
0.00
0.00
1.00
filtoffset =
0.50
0.50
0.50
0.00
0.50
0.00
0.00
0.50
filterror =
1.95
1.98
3.84
3.87
3.90
3.93
3.96
3.99
minpoll = 6, maxpoll = 10
Summary of Changes
R20
R20(config)#ntp server 172.16.17.17 key 1 prefer
R20(config)#ntp server 172.16.19.19 key 1
Version 5.1A
58 | P a g e
Incident 10
(3 points)
Resolve the issue so that the peer relationship is formed from R23 to ISP4. The fix action must be
applied to R23 and not to ISP4.
59|P a g e
Version 5.1A
Solution
The incident states that R23 cannot form a BGP relationship with ISP4. We need to establish basic
Layer 3 connectivity and then start looking at the BGP configuration of R23 and ISP4 to see if we can
get any base information to start with.
R23
R23#ping 1.1.1.30
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.30, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 8/8/9 ms
ISP4
ISP4#sh run | section bgp
router bgp 444
bgp log-neighbor-changes
no bgp default ipv4-unicast
neighbor 172.16.207.207 remote-as 777
neighbor 172.16.207.207 ebgp-multihop 255
neighbor 172.16.207.207 update-source Loopback0
!
address-family ipv4
exit-address-family
!
address-family vpnv4
neighbor 172.16.207.207 activate
neighbor 172.16.207.207 send-community extended
exit-address-family
!
address-family ipv4 vrf CORE
neighbor 1.1.1.27 remote-as 2121
Version 5.1A
60 | P a g e
We have basic layer 3 connectivity. There is one thing that stands out in the BGP configuration of
ISP4. There is TTL-Security configured for the R23 peering. Remember that when TTL-Security is
configured on one side, the other side needs to be configured with multi-hop, or also needs to be
configured with TTL-Security. By default, a router sends out a TTL of 1. This forces a peer to be
directly connected. With this in mind, this also states that a router will only accept BGP peerings with
a TTL of 1. The TTL-Security feature inverts the direction in thich the TTL is counted. By enabling this
feature, the accepted TTL is set to 255 minus the hop-count, in this case 2. So now the peering will
ONLY accept messages with a TTL greater than or equal to 253. Lets set TTL-Security on R23. We
could also enable multihop (with TTL set to 253-255) to satisfy the requirements of this incident.
R23
R23(config)#router bgp 2323
R23(config-router)#neighbor 1.1.1.30 ttl-security hops 2
Verification
R23
R23#sh ip bgp neighbor
BGPneighbor is 1.1.1.30,
61|P a g e
Version 5.1A
Sent
Rcvd
Opens:
Notifications:
Updates:
Keepalives:
Route Refresh:
Total:
10
Summary of Changes
R23
R23(config)#router bgp 2323
R23(config-router)#neighbor 1.1.1.30 ttl-security hops 2
This concludes the Troubleshooting Section of iPexpert's R&S Lab 2 Detailed Solution Guide, Volume 2
Copyright iPexpert. All Rights Reserved.
Version 5.1A
62 | P a g e
General Rules
63|P a g e
Version 5.1A
Ticket 1
(3 points)
A new trouble ticket has been escalated to you. The following information has been provided to help
with understanding the issue. Suggest the best methods to correct the issue.
Once we have the above information, we will review, assign an engineer, and get back to you.
Kimye East
iPexpert Level 2 Engineer
Office: 999-999-9999 | [email protected]
Version 5.1A
64 | P a g e
65|P a g e
Version 5.1A
Network Diagram
Acme HQ
DMVPN Hub
R1
Int Tun 10
10.10.10.1
Int E0/0
12.12.12.1
ISP1
Int Tun 10
10.10.10.2
Int E0/0
2.2.2.1
Int Tun 10
10.10.10.3
Int E0/0
3.3.3.1
R2
R3
Acquisition 1
Acquisition 2
This ticket has been assigned to you. You need to respond to the email thread with 2 suggestions for
best practices when using OSPF with DMVPN. Select the 2 best suggestions from the list below:
Use OSPF point-to-point as the network type on the tunnel interface of the DMVPN hub.
Use OSPF point-to-multipoint as the network type on tunnel interfaces of all 3 routers.
Manually set the OSPF timers on the DMVPN hub router to match those of the spoke routers.
Version 5.1A
66 | P a g e
Solution
You need to respond to the email thread with 2 suggestions for best practices when using OSPF with
DMVPN. Select the 2 best suggestions from the list below:
Use OSPF point-to-point as the network type on the tunnel interface of the DMVPN hub.
Use OSPF point-to-multipoint as the network type on tunnel interfaces of all 3 routers.
Manually set the OSPF timers on the DMVPN hub router to match those of the spoke routers.
Explanation
We need to remember that the task is asking for us to recommend the best practices out of the list
that is provided. While there may be better ways to perform the task or fix the issue, we need to
follow the guidelines of the test.
The first answer is to make the DMVPN hub the DR for the DMVPN network. In this implementation,
the hub is the only device that can send OSPF hellos to all spokes, which is the responsibility of the
DR.
The second answer is to config the DMVPN interfaces as broadcast. Non-broadcast and point-tomultipoint would also work but would not be the best practice here. Non-broadcast is not listed as
an option and does not scale well at all. Since the neighboring is not done dynamically, eachneighbor
has to be manually configured under the OSPF process. Point-to-Multipoint does not work for this
scenario because the last sentence of the email thread states that the Spokes should communicate
directly with each other and not traverse the Hub. Point-to-Multipoint would force traffic through
the hubs. The best answer here is to use broadcast as the network type. If we use broadcast, and
force the Hub to be DR, then the DR would be responsible for handling LSAs, while allowing the
Spokes to have direct communication.
67|P a g e
Version 5.1A
Ticket 2
(3 points)
A new trouble ticket has been escalated to you. The following information has been provided to help
with understanding the issue. Select the correct configuration to present to the customer.
Version 5.1A
68 | P a g e
Based on the information in the ticket, select the configuration that meets all of the needs of the
customer from the list below. Choose 1:
69|P a g e
Version 5.1A
Solution
Based on the information in the ticket, select the configuration that meets all of the needs of the
customer from the list below. Choose 1:
Explanation
There are a few requirements here that will lead to the answer. First, they only want 1 line in the
ACL. Second, we need to match on the first and last octet since the second and third octets at the
sites change. Third, they want there sequence numbers to go in increments of 10, starting at 10. The
selected answer is the only one that matches all of the given criteria.
Version 5.1A
70 | P a g e
Ticket 3
(3 points)
You are developing a proposal for an internal VoIP service for a client, Risky Business. They are having
issues with voice quality over their WAN. Phones within each local LAN are not having any issues. You
have been tasked with creating a QoS policy that can be applied to minimize jitter, delay, and give
voice packets priority on the network. Review the information provided and select the 3 most
relevant considerations when developing a QoS policy to support VoIP.
Network Information
All phones at Headquarters are connected to Cisco 3750 switches and have port speeds of 1Gbps.
The switches are interconnected via 10Gbps fiber connections and each have a redundant path. The
network uses MST spanning-tree for loop avoidance. The switches only perform at layer 2 and do not
provide routing. A pair of Cisco 3900 ISR routers provides the routing. The switches connect to the ISR
routers via a trunk and the ISR routers utilize sub-interfaces with 802.1q tagging.
The phones at the other sites are setup similarly, but the networks are much smaller.
For WAN connectivity, each remote site has 2 T-1s using PPP multilink and HQ has 2 DS-3s using PPP
multilink, all connecting to a private MPLS cloud.
You need to identify common practices/pitfalls for a QoS policy when designed for VoIP in your
proposal. Select the 3 best common practices/pitfalls from the list below that apply to this scenario
for your proposal.
71|P a g e
In addition to QoS, disabling PPP interleaving will help improve call quality and reduce jitter
and delay.
In addition to QoS, using RTP header compression on the PPP links will help improve call
quality and reduce voice latency.
Use a priority-queue to give the voice packets priority over other data.
Using RTP header compression on the PPP links will degrade voice call quality.
In addition to QoS, enabling PPP interleaving will help improve call quality and reduce jitter
and delay.
Version 5.1A
Solution
You need to identify common practices/pitfalls for a QoS policy when designed for VoIP in your
proposal. Select the 3 best common practices/pitfalls from the list below that apply to this scenario
for your proposal.
In addition to QoS, disabling PPP interleaving will help improve call quality and reduce jitter and
delay.
In addition to QoS, using RTP header compression on the PPP links will help improve call quality
and reduce voice latency.
Use a priority-queue to give the voice packets priority over other data.
When configured with a bandwidth or bandwidth percentage, a priority-queue does not allocate
bandwidth and shares bandwidth with the other queues.
Using RTP header compression on the PPP links will degrade voice call quality.
In addition to QoS, enabling PPP interleaving will help improve call quality and reduce jitter and
delay.
Explanation
Enabling PPP interleaving helps with voice quality over slower serial links. Data packets tend to be
very large, usually 1500 bytes and voice packets are usually smaller, around 20-100 bytes, depending
on the codecs used. Interleaving allows the larger data packets to be broken into smaller ones and
interleaving the smaller voice packets with them so that they do not have to wait on the bigger
packets to get serialized.
RTP header compression also helps with jitter and delay. It is not a requirement, but it is a best
practice defined by Cisco. By enabling this, the RTP header is reduced from 40 bytes to 2-4 bytes.
This significately reduces the amount of bandwidth consumed by the RTP protocol and reduces the
size of the voice packet.
Giving voice traffic a priority queue guarantees that the voice traffic gets the defined amount of
bandwidth no matter what is on the link. It is a best practice however there are some pitfalls to be
careful of and must be considered. First, the priority queue is dedicated and does not share
resources with other queues. Second, it also polices traffic to the given bandwidth that is defined,
limiting what the voice traffic can use.
This concludes the Diagnostic Section of iPexpert's R&S Lab 2 Workbook, Volume 2
Copyright iPexpert. All Rights Reserved.
Version 5.1A
72 | P a g e
General Rules
73|P a g e
All IPv4 addresses are pre-configured except SVI, tunnel, sub-interfaces, and IPv6 interfaces
unless otherwise noted.
All Service Provider routers are pre-configured and cannot be accessed during the lab.
Do not modify any IP addressing on any interfaces unless instructed to do so.
The BB routers are not accessible.
Static/default routes are NOT allowed unless otherwise stated in the task.
Save your configurations often.
Version 5.1A
Pre-Setup
Please login to your vRack and load the initial Configuration.
This lab is intended to be used with online rack access. Connect to the terminal server and complete
the troubleshooting tasks as detailed below.
Version 5.1A
74 | P a g e
75|P a g e
Version 5.1A
Version 5.1A
76 | P a g e
77|P a g e
Version 5.1A
Version 5.1A
78 | P a g e
79|P a g e
Version 5.1A
(14 points)
(4 points)
HQ MPLS Core
o
SW2 should always be the VTP master. SW1 should not learn any VLANs from SW2, but should
pass VLAN information using VTP. All other switches should be set to client. SW1 should know
about all local VLANs.
Do not configure any VLANs on SW3 or SW4. They should learn the VLANs from the VTP server.
SW5, SW6, SW7, and SW8 should pass VTP information but not use it to configure VLANs.
Solution
We will work this task from the top down. The first part of this task is to configure the necessary
VLANs for SW1-4. We are to use VTP and SW2 is the VTP master. Also, SW1 should not to
participate in VTP but should pass VTP traffic. We need to first create the VLANs on SW2 and then
on SW1 since it will not learn them via VTP.
Now, lets configure SW1 and SW2 for VTP. We configure SW3 and SW4 next.
80|P a g e
Version 5.1A
SW1
SW1(config)#vtp mode transparent
SW1(config)#vtp domain IPX
SW1(config)#vtp password IPExpert!
SW1(config)#vtp version 2
SW2
SW2(config)#vtp mode server
SW2(config)#vtp domain IPX
SW2(config)#vtp password IPExpert!
SW2(config)#vtp version 2
We now move on to SW5 and SW6. These switches need to be in VTP Transparent mode. Configure
the VLANs and VTP as follows:
Verification
NOTE
Some commands are truncated.
81|P a g e
Version 5.1A
SW1
SW1#show vlan
VLAN Name
Status
Ports
VLAN0017
active
19
VLAN0019
31
VLAN0031
active
59
VLAN0059
active
67
VLAN0067
active
120
VLAN0120
510
VLAN0510
active
666
VLAN0666
active
999
VLAN0999
active
active
active
: 1 to 3
: 2
: IPX
: Disabled
: Disabled
Device ID
: aabb.cc00.6500
Feature VLAN:
-------------VTP Operating Mode
: Transparent
: 1005
: 14
Configuration Revision
: 0
SW2
SW2#show vlan
VLAN Name
Status
Ports
VLAN0017
19
VLAN0019
31
VLAN0031
active
59
VLAN0059
active
Version 5.1A
active
active
82 | P a g e
VLAN0067
active
120
VLAN0120
510
VLAN0510
active
666
VLAN0666
active
999
VLAN0999
active
active
: 1 to 3
: 2
: IPX
: Disabled
: Disabled
Device ID
: aabb.cc00.6600
Feature VLAN:
-------------VTP Operating Mode
: Server
: 1005
: 14
Configuration Revision
: 2
SW3
SW3#show vlan
VLAN Name
Status
Ports
VLAN0017
19
VLAN0019
31
VLAN0031
active
59
VLAN0059
active
67
VLAN0067
active
120
VLAN0120
510
VLAN0510
active
666
VLAN0666
active
999
VLAN0999
active
83|P a g e
active
active
active
Version 5.1A
: 1 to 3
: 2
: IPX
: Disabled
: Disabled
Device ID
: aabb.cc00.6700
Feature VLAN:
-------------VTP Operating Mode
: Client
: 1005
: 14
Configuration Revision
: 2
SW4
SW4#show vlan
VLAN Name
Status
Ports
VLAN0017
active
19
VLAN0019
31
VLAN0031
active
59
VLAN0059
active
67
VLAN0067
active
120
VLAN0120
510
VLAN0510
active
666
VLAN0666
active
999
VLAN0999
active
active
active
: 1 to 3
: 2
: IPX
: Disabled
: Disabled
Device ID
: aabb.cc00.6800
Version 5.1A
84 | P a g e
Feature VLAN:
-------------VTP Operating Mode
: Client
: 1005
: 14
Configuration Revision
: 2
SW5
SW5#show vlan
VLAN Name
Status
Ports
VLAN0102
active
114
VLAN0114
active
121
VLAN0121
active
123
VLAN0123
active
134
VLAN0134
active
: 1 to 3
: 1
: Disabled
: Disabled
Device ID
: aabb.cc00.6900
: Transparent
: 1005
: 10
Configuration Revision
: 0
85|P a g e
Version 5.1A
SW6
SW6#show vlan
102
VLAN0102
active
114
VLAN0114
active
121
VLAN0121
active
123
VLAN0123
active
134
VLAN0134
active
: 1 to 3
: 1
: Disabled
: Disabled
Device ID
: aabb.cc00.6a00
Feature VLAN:
-------------VTP Operating Mode
: Transparent
: 1005
: 10
Configuration Revision
: 0
SW7
SW7#show vlan
168
VLAN0168
active
169
VLAN0169
active
179
VLAN0179
active
189
VLAN0189
active
207
VLAN0207
active
209
VLAN0209
active
: 1 to 3
: 1
: Disabled
Version 5.1A
86 | P a g e
: Disabled
Device ID
: aabb.cc00.6b00
Feature VLAN:
-------------VTP Operating Mode
: Transparent
: 1005
: 11
Configuration Revision
: 0
SW8
SW8#show vlan
168
VLAN0168
active
169
VLAN0169
active
179
VLAN0179
active
189
VLAN0189
active
207
VLAN0207
active
209
VLAN0209
active
: 1 to 3
: 1
: Disabled
: Disabled
Device ID
: aabb.cc00.6c00
Feature VLAN:
-------------VTP Operating Mode
: Transparent
: 1005
: 11
Configuration Revision
: 0
87|P a g e
Version 5.1A
Using the Layer 2 diagram, configure the switch-to-switch links on SW1, SW2, SW3, and SW4 as
dot1q trunks.
o
Create an ether-channel using interfaces e4/0 and e4/1 between SW1 and SW4. Perform the
same task between SW2 and SW3.
o
Make sure that the trunk configuration is not negotiated and is always on.
Create an ether-channel using interfaces e3/0, e3/1 and 3/2 on both SW1 and SW2.
o
(4 points)
Configure the switch-to-switch links on SW5, SW6, SW7, and SW8 as dot1q trunks.
o
Ensure that only the VLANs needed for the topology are allowed across the trunks.
Solution
The first bullet asks us to configure the inter-switch links in the HQ MPLS Core topology. The only
gotcha here is that is specifies us to use dot1q and to not allow trunk negotiation.
Version 5.1A
88 | P a g e
Next, we need to configure EtherChannel between SW1 and SW3, and between SW2 and SW4. The
task asks us to use a non-propriatary protocol, which tells us that we need to use LACP.
The final part to this task is to create the trunks between SW5-SW6 and SW7-SW8. The trunk needs
to be dot1q and not negotiated. We also need to only allow the VLANs needed for each area.
89|P a g e
Version 5.1A
Verification
Lets first verify that SW1, SW2, SW3, and SW4 are using the port-channels, the port-channels are
setup for PAgP and LACP, and that the trunks are setup as dot1q trunks. The results below are from
SW1, but you will need to perform this verification on each switch.
SW1
SW1#show etherchannel summ
Number of channel-groups in use: 2
Number of aggregators:
Group
Ports
Port-channel
Protocol
------+-------------+-----------+----------------------------------------------1
Po1(SU)
PAgP
Et3/0(P)
Et3/1(P)
Po2(SU)
LACP
Et4/0(P)
Et4/1(P)
Et3/2(P)
Mode
Encapsulation
Status
Native vlan
Et5/0
on
802.1q
trunking
Po2
on
802.1q
trunking
Po1
on
802.1q
trunking
Port
Et5/0
1-4094
Po2
1-4094
Po1
1-4094
Port
Et5/0
1,17,19,31,59,67,120,510,666,999
Po2
1,17,19,31,59,67,120,510,666,999
Po1
1,17,19,31,59,67,120,510,666,999
Port
Et5/0
1,17,19,31,59,67,120,510,666,999
Po2
1,17,19,31,59,67,120,510,666,999
Po1
1,17,19,31,59,67,120,510,666,999
Version 5.1A
90 | P a g e
SW5
SW5#show interface trunk
Port
Mode
Encapsulation
Status
Native vlan
Et2/0
on
802.1q
trunking
Et2/1
on
802.1q
trunking
Et2/2
on
802.1q
trunking
Et2/3
on
802.1q
trunking
Port
Et2/0
102,114,121,123,134
Et2/1
102,114,121,123,134
Et2/2
102,114,121,123,134
Et2/3
102,114,121,123,134
Port
Et2/0
102,114,121,123,134
Et2/1
102,114,121,123,134
Et2/2
102,114,121,123,134
Et2/3
102,114,121,123,134
Port
Et2/0
102,114,121,123,134
Et2/1
102,114,121,123,134
Et2/2
102,114,121,123,134
Et2/3
102,114,121,123,134
91|P a g e
Version 5.1A
SW7
SW7#sh int tru
Port
Mode
Encapsulation
Status
Native vlan
Et2/0
on
802.1q
trunking
Et2/1
on
802.1q
trunking
Et2/2
on
802.1q
trunking
Et2/3
on
802.1q
trunking
Port
Et2/0
168,179,189,207,209
Et2/1
168,179,189,207,209
Et2/2
168,179,189,207,209
Et2/3
168,179,189,207,209
Port
Et2/0
168,179,189,207,209
Et2/1
168,179,189,207,209
Et2/2
168,179,189,207,209
Et2/3
168,179,189,207,209
Port
Et2/0
168,179,189,207,209
Et2/1
168,179,189,207,209
Et2/2
168,179,189,207,209
Port
Et2/3
168,179,189,207,209
(3 points)
Using the IPv4 and Layer 2 diagrams, configure each Router connection in the correct VLAN.
All Switch-to-Router interfaces should be set as an access port except those connected to subinterfaces. Sub-interfaces should be set up as an 802.1q trunk without negotiation. These trunk
links should only allow the VLANs needed for the topology to function correctly.
Version 5.1A
92 | P a g e
Solution
Keeping all of these interfaces straight and jumping between the Layer 2 and IPv4 diagrams can be a
chore. Be sure to verify that you are configuring the correct interface on the switch. It is easy to
transpose the router interface and the switch interface. Also remember that there are a few trunks
needed for Routers with sub-interfaces. These trunks should be setup for 802.1q encapsulation and
to only allow the vlans needed on the trunks.
SW1
SW1(config)#int e0/1
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 120
SW1(config)#int e0/3
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 31
SW1(config)#int e1/1
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 59
SW1(config)#int e1/2
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 120
SW1(config)#int e5/3
SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 999
SW2
SW2(config)#int e0/1
SW2(config-if)#switchport trunk encapsulation dot1q
SW2(config-if)#switchport mode trunk
SW2(config-if)#switchport trunk allowed vlan 17,31
SW2(config)#int e1/3
SW2(config-if)#switchport mode access
SW2(config-if)#switchport access vlan 17
93|P a g e
Version 5.1A
SW2(config)#int e2/0
SW2(config-if)#switchport mode access
SW2(config-if)#switchport access vlan 666
SW3
SW3(config)#interface e1/1
SW3(config-if)#switchport mode access
SW3(config-if)#switchport access vlan 510
SW3(config)#interface e1/0
SW3(config-if)#switchport mode access
SW3(config-if)#switchport access vlan 510
SW4
SW4(config)#int e1/2
SW4(config-if)#switchport mode access
SW4(config-if)#switchport access vlan 67
SW4(config)#int e1/3
SW4(config-if)#switchport mode access
SW4(config-if)#switchport access vlan 67
SW4(config)#int e2/1
SW4(config-if)#switchport mode access
SW4(config-if)#switchport access vlan 999
SW5
SW5(config)#int e0/1
SW5(config-if)#switchport mode access
SW5(config-if)#switchport access vlan 114
SW5(config)#int e0/2
SW5(config-if)#switchport trunk encapsulation dot1q
Version 5.1A
94 | P a g e
SW5(config)#int e1/0
SW5(config-if)#switchport mode access
SW5(config-if)#switchport access vlan 123
SW5(config)#int e1/1
SW5(config-if)#switchport mode access
SW5(config-if)#switchport access vlan 114
SW6
SW6(config)#int e0/0
SW6(config-if)#switchport mode access
SW6(config-if)#switchport access vlan 102
SW6(config)#int e0/1
SW6(config-if)#switchport mode access
SW6(config-if)#switchport access vlan 121
SW6(config)#int e0/2
SW6(config-if)#switchport mode access
SW6(config-if)#switchport access vlan 121
SW6(config)#int e1/0
SW6(config-if)#switchport mode access
SW6(config-if)#switchport access vlan 134
SW6(config)#int e1/2
SW6(config-if)#switchport mode access
SW6(config-if)#switchport access vlan 134
SW7
SW7(config)#int e0/0
SW7(config-if)#switchport mode access
SW7(config-if)#switchport access vlan 169
SW7(config)#int e0/1
95|P a g e
Version 5.1A
SW7(config)#int e0/3
SW7(config-if)#switchport mode access
SW7(config-if)#switchport access vlan 189
SW7(config)#int e1/0
SW7(config-if)#switchport trunk encapsulation dot1q
SW7(config-if)#switchport mode trunk
SW7(config-if)#switchport trunk allowed vlan 169,189
SW7(config)#int e1/1
SW7(config-if)#switchport mode access
SW7(config-if)#switchport access vlan 207
SW8
SW8(config)#int e0/0
SW8(config-if)#switchport mode access
SW8(config-if)#switchport access vlan 168
SW8(config)#int e0/1
SW8(config-if)#switchport mode access
SW8(config-if)#switchport access vlan 179
SW8(config)#int e0/2
SW8(config-if)#switchport mode access
SW8(config-if)#switchport access vlan 168
SW8(config)#int e1/0
SW8(config-if)#switchport trunk encapsulation dot1q
SW8(config-if)#switchport mode trunk
SW8(config-if)#switchport trunk allowed vlan 179,209
SW8(config)#int e1/1
SW8(config-if)#switchport mode access
SW8(config-if)#switchport access vlan 209
Version 5.1A
96 | P a g e
Verification
The best way to verify this section is to ping all directly connected peers from each device. Below is
the output from R1 but you will need to do this from EVERY device connected Layer3 through a
switch. This is extremely important. You do not want to be in a situation where you are
troubleshooting Layer 2 issues while configuring other technologies.
R1
R1#ping 192.168.1.17
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.17, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms
R1#ping 192.168.1.9
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.9, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms
R1#ping 192.168.1.21
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.21, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms
(3 points)
SW1 should be the primary root bridge for all even VLANs and the secondary root for all
odd VLANs.
SW2 should be the primary root bridge for all odd VLANs and the secondary root bridge
for all even VLANs.
All non-trunking ports on SW1, SW2, SW3, and SW4 should participate in STP and move directly
into the forwarding state when enabled. Use a single command on each device to accomplish
this.
All non-trunking ports on SW1, SW2, SW3, and SW4 should be shutdown when a BPDU is
received. Use a single command on each device to accomplish this.
97|P a g e
Version 5.1A
Solution
The task asks us to configure spanning-tree to have 3 instances for SW1, SW2, SW3, and SW4. We
can do this using MST. We need to create an instance for even VLANs, for odd VLANs. The third
instance will be instance zero which is created by default.
Now lets configure the Root and Backup Root bridges for the instances. SW1 is the primary for even
VLANs (instance 2) and secondary for odd VLANs. SW2 is primary for odd VLANs (instance 1) and
secondar for even VLANs.
SW1
SW1(config)#spanning-tree mst 2 root primary
SW1(config)#spanning-tree mst 1 root secondary
SW2
SW2(config)#spanning-tree mst 1 root primary
SW2(config)#spanning-tree mst 2 root secondary
The next part of this task asks us to configure each switchport to go to the forwarding STP state
immediately and only use 1 command to accomplish this. This is the STP port-fast feature. You can
enable port-fast globally with 1 command.
Just with the last step, we need to enable BPDU-guard globally since the task asks for ports to be
shutdown if a BPDU is detected on an interface and to enable this with 1 command.
Version 5.1A
98 | P a g e
Verification
We need to verify a few things. First, spanning-tree needs to be in MST mode and running 3
instances. Also, the root bridges are setup properly. And last, that BPDU and PortFast are enabled.
SW1
SW1#sh spanning-tree mst
##### MST0
vlans mapped:
1-16,18,20-30,32-58,60-66,68-119,121-509
511-665,667-998,1000-4094
Bridge
address aabb.cc00.6500
Root
Operational
Configured
Interface
priority
20
Prio.Nbr Type
128.2
Shr Edge
Et0/2
128.3
Shr Edge
Et0/3
128.4
Shr Edge
Et1/1
128.6
Shr Edge
Et5/0
128.21
Shr
Po1
128.65
Shr
Po2
128.66
Shr
##### MST1
vlans mapped:
Bridge
address aabb.cc00.6500
priority
Root
address aabb.cc00.6600
priority
port
cost
2000000
Interface
17,19,31,59,67,999
Po1
rem hops 19
Prio.Nbr Type
128.4
Shr Edge
Et1/1
128.6
Shr Edge
Et5/0
128.21
Shr
Et5/3
128.24
Shr Edge
Po1
128.65
Shr
Po2
128.66
Shr
##### MST2
99|P a g e
vlans mapped:
120,510,666
Version 5.1A
address aabb.cc00.6500
Root
Interface
priority
Prio.Nbr Type
128.2
Shr Edge
Et1/2
128.7
Shr Edge
Et5/0
128.21
Shr
Po1
128.65
Shr
Po2
128.66
Shr
SW2
SW2#show spanning-tree mst
##### MST0
vlans mapped:
1-16,18,20-30,32-58,60-66,68-119,121-509
511-665,667-998,1000-4094
Bridge
address aabb.cc00.6600
priority
Root
address aabb.cc00.6500
priority
port
path cost
priority
Po1
Interface
20
Prio.Nbr Type
128.2
Shr
Et0/2
128.3
Shr Edge
Et0/3
128.4
Shr Edge
Et1/3
128.8
Shr Edge
Et2/0
128.9
Shr Edge
Et2/1
128.10
Shr Edge
Et5/0
128.21
Shr
Et5/3
128.24
Shr Edge
Po1
128.65
Shr
Po2
128.66
Shr
##### MST1
vlans mapped:
Bridge
address aabb.cc00.6600
Version 5.1A
17,19,31,59,67,999
priority
100 | P a g e
Interface
Prio.Nbr Type
128.2
Shr
Et1/3
128.8
Shr Edge
Et2/1
128.10
Shr Edge
Et5/0
128.21
Shr
Po1
128.65
Shr
Po2
128.66
Shr
##### MST2
vlans mapped:
Bridge
address aabb.cc00.6600
priority
Root
address aabb.cc00.6500
priority
port
cost
2000000
Interface
120,510,666
Po1
rem hops 19
Prio.Nbr Type
128.9
Shr Edge
Et5/0
128.21
Shr
Po1
128.65
Shr
Po2
128.66
Shr
SW3
SW3#show spanning-tree mst
##### MST0
vlans mapped:
1-16,18,20-30,32-58,60-66,68-119,121-509
511-665,667-998,1000-4094
Bridge
address aabb.cc00.6700
priority
Root
address aabb.cc00.6500
priority
port
path cost
priority
Et5/0
Configured
Interface
20
Prio.Nbr Type
101|P a g e
128.6
Shr Edge
Version 5.1A
128.13
Shr
Et3/1
128.14
Shr
Et5/0
128.21
Shr
Po2
128.65
Shr
##### MST1
vlans mapped:
Bridge
address aabb.cc00.6700
priority
Root
address aabb.cc00.6600
priority
port
cost
1000000
Interface
17,19,31,59,67,999
Po2
rem hops 19
Prio.Nbr Type
128.13
Shr
Et3/1
128.14
Shr
Et5/0
128.21
Shr
Po2
128.65
Shr
##### MST2
vlans mapped:
Bridge
address aabb.cc00.6700
priority
Root
address aabb.cc00.6500
priority
port
cost
2000000
Interface
120,510,666
Et5/0
rem hops 19
Prio.Nbr Type
128.5
Shr Edge
Et1/1
128.6
Shr Edge
Et3/0
128.13
Shr
Et3/1
128.14
Shr
Et5/0
128.21
Shr
Po2
128.65
Shr
SW4
SW4#show spanning-tree mst
##### MST0
vlans mapped:
1-16,18,20-30,32-58,60-66,68-119,121-509
511-665,667-998,1000-4094
Bridge
address aabb.cc00.6800
priority
Root
address aabb.cc00.6500
priority
Version 5.1A
102 | P a g e
Po2
path cost
priority
Interface
hello time 2 , forward delay 15, max age 20, max hops
20
Prio.Nbr Type
128.7
Shr Edge
Et1/3
128.8
Shr Edge
Et2/0
128.9
Shr Edge
Et2/1
128.10
Shr Edge
Et3/0
128.13
Shr
Et3/1
128.14
Shr
Et5/0
128.21
Shr
Po2
128.65
Shr
##### MST1
vlans mapped:
Bridge
address aabb.cc00.6800
priority
Root
address aabb.cc00.6600
priority
port
cost
2000000
Interface
17,31,59,67,999
Et5/0
rem hops 19
Prio.Nbr Type
128.7
Shr Edge
Et1/3
128.8
Shr Edge
Et2/1
128.10
Shr Edge
Et3/0
128.13
Shr
Et3/1
128.14
Shr
Et5/0
128.21
Shr
Po2
128.65
Shr
##### MST2
vlans mapped:
Bridge
address aabb.cc00.6800
priority
Root
address aabb.cc00.6500
priority
port
cost
1000000
Interface
120,510,666
Po2
rem hops 19
Prio.Nbr Type
103|P a g e
Version 5.1A
128.13
Shr
Et3/1
128.14
Shr
Et5/0
128.21
Shr
Po2
128.65
Shr
Version 5.1A
104 | P a g e
Enable EIGRP in AS 111 on all interfaces that do not leave the autonomous system.
Ensure that no interfaces advertise hello messages other than the ones specified.
o
(28 points)
(2 points)
Advertise the Loopback0 interface of each device into EIGRP as internal routes.
Authenticate all EIGRP neighbor relationships using the MD5 password IPXpert!.
Solution
There are two parts to this configuration. First, it states that we should use EIGRP wide metrics. This
is done by configuring EIGRP using named mode. The second part to this is that EIGRP is using
authentication. We will configure authentication after we get EIGRP up. Lets start with bringing
EIGRP up. The task states that we should not advertise hellos out of interfaces that are not part of
the EIGRP topology. We can do this by using host network statements specific to the interface.
R1
R1(config)#router eigrp CORE
R1(config-router)#address-family ipv4 autonomous-system 111
R1(config-router-af)#network 192.168.1.18 0.0.0.0
R1(config-router-af)#network 192.168.1.10 0.0.0.0
R1(config-router-af)#network 192.168.1.22 0.0.0.0
R1(config-router-af)#network 172.16.1.1 0.0.0.0
R2
R2(config)#router eigrp CORE
R2(config-router)#address-family ipv4 autonomous-system 111
R2(config-router-af)#network 192.168.1.253 0.0.0.0
R2(config-router-af)#network 172.16.2.2 0.0.0.0
105|P a g e
Version 5.1A
R3
R3(config)#router eigrp CORE
R3(config-router)#address-family ipv4 autonomous-system 111
R3(config-router-af)#network 192.168.1.254 0.0.0.0
R3(config-router-af)#network 192.168.1.17 0.0.0.0
R3(config-router-af)#network 172.16.3.3 0.0.0.0
R4
R4(config)#router eigrp CORE
R4(config-router)#address-family ipv4 autonomous-system 111
R4(config-router-af)#network 192.168.1.26 0.0.0.0
R4(config-router-af)#network 192.168.1.21 0.0.0.0
R4(config-router-af)#network 172.16.4.4 0.0.0.0
R5
R5(config)#router eigrp CORE
R5(config-router)#address-family ipv4 autonomous-system 111
R5(config-router-af)#network 192.168.1.25 0.0.0.0
R5(config-router-af)#network 192.168.1.13 0.0.0.0
R5(config-router-af)#network 172.16.5.5 0.0.0.0
R6
R6(config)#router eigrp CORE
R6(config-router)#address-family ipv4 autonomous-system 111
R6(config-router-af)#network 192.168.1.5 0.0.0.0
R6(config-router-af)#network 192.168.1.246 0.0.0.0
R6(config-router-af)#network 172.16.6.6 0.0.0.0
R7
R7(config)#router eigrp CORE
R7(config-router)#address-family ipv4 autonomous-system 111
R7(config-router-af)#network 192.168.1.9 0.0.0.0
R7(config-router-af)#network 192.168.1.6 0.0.0.0
R7(config-router-af)#network 192.168.1.241 0.0.0.0
R7(config-router-af)#network 172.16.7.7 0.0.0.0
Version 5.1A
106 | P a g e
R8
R8(config)#router eigrp CORE
R8(config-router)#address-family ipv4 autonomous-system 111
R8(config-router-af)#network 192.168.1.242 0.0.0.0
R8(config-router-af)#network 192.168.1.1 0.0.0.0
R8(config-router-af)#network 172.16.8.8 0.0.0.0
R9
R9(config)#router eigrp CORE
R9(config-router)#address-family ipv4 autonomous-system 111
R9(config-router-af)#network 192.168.1.14 0.0.0.0
R9(config-router-af)#network 192.168.1.245 0.0.0.0
R9(config-router-af)#network 192.168.1.97 0.0.0.0
R9(config-router-af)#network 172.16.9.9 0.0.0.0
Now, lets configure authentication. With EIGRP named mode, this task has become more
streamlined. First, define the key-chain, then apply it to the default interface under EIGRP.
Verification
We can verify connectivity by running the below TCL script to ping all subnets within the EIGRP 111
topology, including loopback interfaces. All results should be succesfull from the generated pings.
107|P a g e
Version 5.1A
Version 5.1A
108 | P a g e
Enable EIGRP in AS 112 on all interfaces that do not leave the autonomous system.
Ensure that no interfaces advertise hello messages other than the ones specified.
o
(4 points)
When using the network command, use only the class-full network.
Advertise the Loopback0 interface of each device into EIGRP as internal routes.
R24 and R25 should peer with EIGRP via their tunnel interfaces and advertise their loopback
interfaces.
Verify full connectivity in Dallas as well as to the loopback interfaces of R24 and R25.
Solution
There are a few things to note here. First, we are to use classfull network statements. Second, we
should use the passive-interface default feature. Third, we should NOT use named mode. Finally, we
are supposed to advertise the tunnel interfaces of R24 and R25 but we have not configured the
tunnels yet. We will need to revist this once we bring up the tunnels. Lets get EIGRP configured.
R10
R10(config)#router eigrp 112
R10(config-router)#network 172.16.0.0
R10(config-router)#network 192.168.11.0
R10(config-router)#passive-interface default
R10(config-router)#no passive-interface e0/1
R11
R11(config)#router eigrp 112
R11(config-router)#network 172.16.0.0
R11(config-router)#network 192.168.11.0
R11(config-router)#passive-interface default
R11(config-router)#no passive-interface e0/0
R11(config-router)#no passive-interface e0/1
109|P a g e
Version 5.1A
R12
R12(config)#router eigrp 112
R12(config-router)#network 172.16.0.0
R12(config-router)#network 192.168.11.0
R12(config-router)#passive-interface default
R12(config-router)#no passive-interface e0/0.102
R12(config-router)#no passive-interface e0/0.123
R12(config-router)#no passive-interface e0/1
R13
R13(config)#router eigrp 112
R13(config-router)#network 172.16.0.0
R13(config-router)#network 192.168.11.0
R13(config-router)#passive-interface default
R13(config-router)#no passive-interface e0/0
R13(config-router)#no passive-interface e0/1
R14
R14(config)#router eigrp 112
R14(config-router)#network 172.16.0.0
R14(config-router)#network 192.168.11.0
R14(config-router)#passive-interface default
R14(config-router)#no passive-interface e0/0
R14(config-router)#no passive-interface e0/1
Verification
We will run the same verification as the last task on each device. We will verify R24 and R25 as soon
as we configure the Tunnels in a later task.
Version 5.1A
110 | P a g e
(4 points)
Enable OSPF 0 on all interfaces that do not leave the autonomous system.
R19 should be the DR, and there should not be a BDR elected for VLANs 169, 179, 189, and 209.
o
Ensure no other device can become DR/BDR for the specified VLANs.
Advertise the loopback 0 interface of all devices in area 0 with their original mask.
The Teleworker offices should be in OSPF area 1 and peer with R20 via the tunnel interface.
Verify full connectivity in Seattle HQ, along with the Teleworker office Loopback interfaces.
111|P a g e
Version 5.1A
Solution
We need to configure OSPF along with MD5 authentication as follows:
(config)#interface e0/0
(config-if)#ip ospf message-digest-key 1 md5 IPXOSPF
(config-if)#ip ospf prio 0
(config)#interface e0/1
(config-if)#ip ospf prio 0
(config-if)#ip ospf message-digest-key 1 md5 IPXOSPF
R19
R19(config)#router ospf 1
R19(config-router)# area 0 authentication message-digest
R19(config-router)# network 172.16.0.0 0.0.255.255 area 0
R19(config-router)# network 192.168.54.0 0.0.0.255 area 0
R19(config-router)#interface e0/0.169
R19(config-subif)#ip ospf message-digest-key 1 md5 IPXOSPF
R19(config-subif)#interface e0/0.189
R19(config-subif)#ip ospf message-digest-key 1 md5 IPXOSPF
R19(config-subif)#interface e0/1.179
R19(config-subif)#ip ospf message-digest-key 1 md5 IPXOSPF
R19(config-subif)#interface e0/1.209
R19(config-subif)#ip ospf message-digest-key 1 md5 IPXOSPF
The task asks for us to advertise the loopback interfaces with their original masks. The network
commands for the loopbacks are already added to OSPF but the routes are showing up as /32 host
routes. By default, OSPF advertised loopback interfaces with /32 masks. We can change this
behavior by setting the OSPF network type of the interface to point-to-point.
Version 5.1A
112 | P a g e
The next part of this task asks us to add the Teleworker offices into OSPF via the tunnel interfaces.
We have not configured the tunnel interfaces yet so we will need to do this once we get to that part
in the Lab. Write it down as a reminder.
Verification
Run the following TCL script for the area on all devices to test full reachability.
R19
R19#sh ip ospf ne
Neighbor ID
Pri
State
Dead Time
Address
Interface
172.16.20.20
FULL/DROTHER
00:00:39
192.168.54.18
Ethernet0/1.209
172.16.17.17
FULL/DROTHER
00:00:39
192.168.54.22
Ethernet0/1.179
172.16.18.18
FULL/DROTHER
00:00:39
192.168.54.14
Ethernet0/0.189
172.16.16.16
FULL/DROTHER
00:00:39
192.168.54.9
Ethernet0/0.169
113|P a g e
Version 5.1A
(5 points)
Use the BGP and MPLS VPN diagrams to accomplish this task.
The HQ MPLS Core is a transit network and does not have reachability to the VRF networks
specified in the MPLS VPN diagram.
Make the following BGP VPNv4 peerings in the HQ MPLS Core using interface Loopback 0:
o
Solution
According to the task, all HQ MPLS BGP peerigns are EBGP, so we do not need to configure routereflectors or have full mesh. It also states that the peerings are to use Loopback 0 as the source and
that the peerings should be VPNv4, not IPv4, using R6 as the main P router for the topology. We also
need to disable the IPv4 address-family by default. Lets configure the peerings within the HQ MPLS
Core topology first.
Version 5.1A
114 | P a g e
R6
R6(config)#router bgp 65106
R6(config-router)# bgp log-neighbor-changes
R6(config-router)# no bgp default ipv4-unicast
R6(config-router)#neighbor 172.16.1.1 remote-as 65101
R6(config-router)#neighbor 172.16.1.1 ebgp-multihop 255
R6(config-router)#neighbor 172.16.1.1 update-source Loopback0
R6(config-router)#neighbor 172.16.2.2 remote-as 65102
R6(config-router)#neighbor 172.16.2.2 ebgp-multihop 255
R6(config-router)#neighbor 172.16.2.2 update-source Loopback0
R6(config-router)#neighbor 172.16.3.3 remote-as 65103
R6(config-router)#neighbor 172.16.3.3 ebgp-multihop 255
R6(config-router)#neighbor 172.16.3.3 update-source Loopback0
R6(config-router)#neighbor 172.16.5.5 remote-as 65105
R6(config-router)#neighbor 172.16.5.5 ebgp-multihop 255
R6(config-router)#neighbor 172.16.5.5 update-source Loopback0
R6(config-router)#neighbor 172.16.7.7 remote-as 65107
R6(config-router)#neighbor 172.16.7.7 ebgp-multihop 255
R6(config-router)#neighbor 172.16.7.7 update-source Loopback0
R6(config-router)#neighbor 172.16.9.9 remote-as 65109
R6(config-router)#neighbor 172.16.9.9 ebgp-multihop 255
R6(config-router)#neighbor 172.16.9.9 update-source Loopback0
R6(config-router)#address-family vpnv4
R6(config-router-af)#neighbor 172.16.1.1 activate
R6(config-router-af)#neighbor 172.16.1.1 send-community extended
R6(config-router-af)#neighbor 172.16.2.2 activate
R6(config-router-af)#neighbor 172.16.2.2 send-community extended
R6(config-router-af)#neighbor 172.16.3.3 activate
R6(config-router-af)#neighbor 172.16.3.3 send-community extended
R6(config-router-af)#neighbor 172.16.5.5 activate
R6(config-router-af)#neighbor 172.16.5.5 send-community extended
R6(config-router-af)#neighbor 172.16.7.7 activate
R6(config-router-af)#neighbor 172.16.7.7 send-community extended
R6(config-router-af)#neighbor 172.16.9.9 activate
R6(config-router-af)#neighbor 172.16.9.9 send-community extended
115|P a g e
Version 5.1A
(config-router-af)#
Verification
We will verify connectivity under the MPLS task later in the lab.
(1 point)
Solution
Create the peering as described in the task. Use the directly connected links and not the loopbacks.
Remember that R11 should learn a default route from ISP2.
R11
R11(config)#router bgp 65111
R11(config-router)#neighbor 2.2.11.1 remote-as 222
Now, lets perform mutual redistribution between EIGRP 112 and BGP 65111.
Version 5.1A
116 | P a g e
R11
R11(config)#router bgp 65111
R11(config-router)#redistribute eigrp 112
Verification
Since there are not any routes advertised into BGP yet, we will verify this task in a later section.
(2 points)
Solution
Configure the peerings as outlined in the task. We will perform redistribution next.
R18
R18(config)#router bgp 65154
R18(config-router)#neighbor 3.3.18.1 remote-as 333
R20
R20(config)#router bgp 65154
R20(config-router)#neigh 6.6.20.1 remote-as 666
117|P a g e
Version 5.1A
R18
R18(config)#router ospf 1
R18(config-router)# redistribute bgp 65154 subnets
Verification
Lets make sure we are learning routes from BGP on R18. We should not be learning any routes on
VRF TELE yet.
R18
R18#sh ip route bgp
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
Version 5.1A
118 | P a g e
(3 points)
R21, R22, and R23 should learn their addressing via PPP from the provider.
Solution
First thing to notice is that R21, R22, and R23 should learn their IP addresses via PPP. Lets configure
that first.
Now that we have communication to the provider from the TeleWorker Routers, lets peer them via
BGP.
119|P a g e
Version 5.1A
R21
R21(config)#router bgp 65121
R21(config-router)#neigh 4.4.21.1 remote-as 444
R22
R22(config)#router bgp 65122
R22(config-router)#neigh 4.4.22.1 remote-as 444
R23
R23(config-if)#router bgp 65123
R23(config-router)#neigh 4.4.23.1 remote-as 444
R24
R24(config)#router bgp 65124
R24(config-router)#neigh 6.6.24.1 remote-as 666
R25
R25(config)#router bgp 65125
R25(config-router)#neigh 6.6.25.1 remote-as 666
Verification
We will perform our verification at the end of the MPLS VPN task.
(4 points)
Version 5.1A
120 | P a g e
Table 2.8
Device
R16
R17
R18
R19
R20
Interface
IPv6 Address
E0/0
E0/1
E0/0
E0/1
E0/0
E0/1
E0/0.169
E0/0.189
E0/1.209
E0/1.179
E0/0
E0/1
2003:169::16/64
2003:168::16/64
2003:172::17/64
2003:179::17/64
2003:189::18/64
2003:168::18/64
2003:169::19/64
2003:189::19/64
2003:209::19/64
2003:179::19/64
2003:172::20/64
2003:209::20/64
Configure OSPFv3 area 0 and advertise the networks specified in the IPv6 diagram.
Configure EIGRP AS 616 and advertise the networks specified in the IPv6 diagram.
Solution
The first part of this task is to assign the IPv6 addressing to the interfaces according to the table
provided.
R16
R16(config)#int e0/0
R16(config-if)#ipv6 address 2003:169::16/64
R16(config-if)#int e0/1
R16(config-if)#ipv6 address 2003:168::16/64
R17
R17(config)#int e0/0
R17(config-if)#ipv6 address 2003:172::17/64
R17(config)#int e0/1
R17(config-if)#ipv6 address 2003:179::17/64
121|P a g e
Version 5.1A
R18
R18(config)#int e0/0
R18(config-if)#ipv6 address 2003:189::18/64
R18(config)#int e0/1
R18(config-if)#ipv6 address 2003:168::18/64
R19
R19(config)#int e0/0.169
R19(config-subif)#ipv6 address 2003:169::19/64
R19(config)#int e0/0.189
R19(config-subif)#ipv6 address 2003:189::19/64
R19(config)#int e0/1.209
R19(config-subif)#ipv6 address 2003:209::19/64
R19(config)#int e0/1.179
R19(config-subif)#ipv6 address 2003:179::19/64
R20
R20(config)#int e0/0
R20(config-if)#ipv6 address 2003:172::20/64
R20(config-if)#int e0/1
R20(config-if)#ipv6 address 2003:209::20/64
R16
R16(config)#ipv6 unicast-routing
R16(config)#int e0/0
R16(config-if)# ipv6 ospf 1 area 0
R16(config)#int e0/1
R16(config-if)# ipv6 ospf 1 area 0
R18
R18(config)#ipv6 unicast-routing
R18(config)#int e0/0
R18(config-if)#ipv6 ospf 1 area 0
Version 5.1A
122 | P a g e
R19
R19(config)#ipv6 unicast-routing
R19(config)#int e0/0.169
R19(config-subif)# ipv6 ospf 1 area 0
R19(config)#int e0/0.189
R19(config-subif)# ipv6 ospf 1 area 0
R17
R17(config)#ipv6 unicast-routing
R17(config)#ipv6 router eigrp 616
R17(config-rtr)#exit
R17(config)#int e0/0
R17(config-if)#ipv6 eigrp 616
R17(config-if)#int e0/1
R17(config-if)#ipv6 eigrp 616
R19
R19(config)#ipv6 unicast-routing
R19(config)#ipv6 router eigrp 616
R19(config-rtr)#exit
R19(config-if)#int e0/1.209
R19(config-subif)#ipv6 eigrp 616
R19(config-subif)#int e0/1.179
R19(config-subif)#ipv6 eigrp 616
R20
R20(config)#ipv6 unicast-routing
R20(config)#ipv6 router eigrp 616
R20(config-rtr)#exit
R20(config)#int e0/0
R20(config-if)#ipv6 eigrp 616
R20(config-if)#int e0/1
R20(config-if)#ipv6 eigrp 616
123|P a g e
Version 5.1A
R19
R19(config)#ipv6 router ospf 1
R19(config-router-af)#redistribute eigrp 616 include-connected
Verification
At this point, we should have full reachability between all IPv6 addresses. Use a TCL script to verify.
Version 5.1A
124 | P a g e
(3 points)
Interface
R11
E0/1
R12
E0/0.102
E0/1
Join the E0/0.102 interface of R12 to the PIM dense multicast group of 224.1.1.10.
Ping the multicast group from R11, and ensure that R11 receives a reply from R12 on multicast
group 224.1.1.10.
Solution
Configure the interfaces listed in the table for dense-mode and join R12s E0/0.102 interface to the
IGMP group of 224.1.1.10.
R11
R11(config)#int e0/1
R11(config-if)#ip pim dense-mode
R12
R12(config)#ip multicast-routing
R12(config)#int e0/0.102
R12(config-subif)#ip pim dense-mode
R12(config-subif)#ip igmp join-group 224.1.1.10
R12(config)#int e0/1
R12(config-if)#ip pim dense-mode
Verification
R11
R11#ping 224.1.1.10
Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 224.1.1.10, timeout is 2 seconds:
125|P a g e
Version 5.1A
All ISPs have agreed to pass MPLS VPN information throughout their networks.
(15 points)
(6 points)
Make the following BGP IPv4 peerings in the HQ MPLS Core using the directly connected serial
interfaces:
o
The PE ISP routers have already been configured with the correct VRFs.
The serial interfaces of the TeleWorker offices need connectivity to the S2/2 interface of
R20 at the Seattle HQ offices.
Solution
The first step to this task is to configure the VRFs.
Version 5.1A
126 | P a g e
Now lets configure the provider interfaces for the correct VRFs. Remember that when you add an
interface to a VRF, you lose your IP address configuration.
R2
R2(config)#interface s3/3
R2(config-if)#ip vrf forwarding CORE
R2(config-if)#ip address 2.2.2.2 255.255.255.0
R3
R3(config)#int s2/2
R3(config-if)#ip vrf forwarding TELE
R3(config-if)#ip address 1.1.3.3 255.255.255.0
R5
R5(config)#int s2/0
R5(config-if)#ip vrf forwarding CORE
R5(config-if)#ip address 4.4.5.5 255.255.255.0
Configure BGP for the VRF on the provider connected links. R3 will be the exit point for VRF TELE,
and R2/R5 will be the exit point for VRF CORE.
127|P a g e
Version 5.1A
R2
R2(config)#router bgp 65102
R2(config-router)#address-family ipv4 vrf CORE
R2(config-router-af)#neighbor 2.2.2.1 remote-as 222
R2(config-router-af)#neighbor 2.2.2.1 send-community extended
R3
R3(config)#router bgp 65103
R3(config-router)#address-family ipv4 vrf TELE
R3(config-router-af)#neigh 1.1.3.1 remote-as 111
R3(config-router-af)#neigh 1.1.3.1 send-community extended
R5
R5(config)#router bgp 65105
R5(config-router)#address-family ipv4 vrf CORE
R5(config-router-af)#neigh 4.4.5.1 remote-as 444
R5(config-router-af)#neigh 4.4.5.1 send-community extended
Verification
Check the peerings. Then we need to verify that the TeleWorker offices have connectivity to the serial
interface of R20 and do not have access to any thing else. Note that the output below is truncated
and only shown for R23 make sure that R21 and R22 can also ping 6.6.20.20.
R5
R5#sh bgp vpnv4 un all sum
BGP router identifier 172.16.5.5, local AS number 65105
BGP table version is 428, main routing table version 428
36 network entries using 5472 bytes of memory
36 path entries using 2880 bytes of memory
8/6 BGP path/bestpath attribute entries using 1216 bytes of memory
6 BGP AS-PATH entries using 176 bytes of memory
2 BGP extended community entries using 48 bytes of memory
0 BGP route-map cache entries using 0 bytes of memory
0 BGP filter-list cache entries using 0 bytes of memory
BGP using 9792 total bytes of memory
BGP activity 153/117 prefixes, 153/117 paths, scan interval 60 secs
Version 5.1A
128 | P a g e
Neighbor
AS MsgRcvd MsgSent
TblVer
State/PfxRcd
4.4.5.1
444
15
19
428
0 00:09:05
172.16.6.6
65106
262
232
428
0 03:22:01
33
R23
#sh ip route bgp
4.0.0.0/8 is variably subnetted, 8 subnets, 2 masks
B
#ping 6.6.20.20
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 6.6.20.20, timeout is 2 seconds:
!!!!!
Next, we need to make sure that Dallas can talk to Seattle. The output below is from R14, but you
need to verify from all devices.
R14
R14#sh ip route eigrp | i EX
D EX
D EX
D EX
D EX
D EX
D EX
D EX
D EX
129|P a g e
Version 5.1A
D EX
D EX
D EX
D EX
D EX
D EX
D EX
D EX
D EX
172.16.16.0/24
D EX
172.16.17.0/24
D EX
172.16.18.0/24
D EX
172.16.19.0/24
D EX
172.16.20.0/24
D EX
172.16.201.0/24
D EX
172.16.202.0/24
D EX
172.16.203.0/24
D EX
172.16.204.0/24
D EX
172.16.206.0/24
D EX
172.16.207.0/24
D EX
D EX
D EX
D EX
D EX
D EX
R14#ping 192.168.54.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.54.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 23/25/27 ms
Version 5.1A
130 | P a g e
(4 points)
Use the IPv4 VPN diagram to assign addressing to the tunnel interfaces.
Use Interface Serial 2/0 on R21, R22, and R23 as the source interface.
The Teleworker sites should have full reachability to all devices in Seattle HQ and Dallas when
sourced from the Loopback XX (router number) interfaces.
o
Also advertise Loopback XX (router number) on each of the TeleWorker devices into OSPF area 1.
Solution
Lets start with the hub.
R20
R20(config)#interface Tunnel20
R20(config-if)# ip address 10.10.20.1 255.255.255.0
R20(config-if)# no ip redirects
R20(config-if)# ip nhrp map multicast dynamic
R20(config-if)# ip nhrp network-id 20
R20(config-if)# ip ospf network point-to-multipoint
R20(config-if)# tunnel source Serial2/2
R20(config-if)# tunnel mode gre multipoint
Version 5.1A
R21
R21(config)#interface Tunnel21
R21(config-if)# ip address 10.10.20.21 255.255.255.0
R21(config-if)# no ip redirects
R21(config-if)# ip nhrp map multicast dynamic
R21(config-if)# ip nhrp map multicast 6.6.20.20
R21(config-if)# ip nhrp map 10.10.20.1 6.6.20.20
R21(config-if)# ip nhrp network-id 20
R21(config-if)# ip nhrp nhs 10.10.20.1
R21(config-if)# ip ospf network point-to-multipoint
R21(config-if)# tunnel source Serial2/0
R21(config-if)# tunnel mode gre multipoint
R22
R22(config)#interface Tunnel22
R22(config-if)# ip address 10.10.20.22 255.255.255.0
R22(config-if)# no ip redirects
R22(config-if)# ip nhrp map multicast dynamic
R22(config-if)# ip nhrp map multicast 6.6.20.20
R22(config-if)# ip nhrp map 10.10.20.1 6.6.20.20
R22(config-if)# ip nhrp network-id 20
R22(config-if)# ip nhrp nhs 10.10.20.1
R22(config-if)# ip ospf network point-to-multipoint
R22(config-if)# tunnel source Serial2/0
R22(config-if)# tunnel mode gre multipoint
R23
R23(config)#interface Tunnel23
R23(config-if)# ip address 10.10.20.23 255.255.255.0
R23(config-if)# no ip redirects
R23(config-if)# ip nhrp map multicast dynamic
R23(config-if)# ip nhrp map multicast 6.6.20.20
R23(config-if)# ip nhrp map 10.10.20.1 6.6.20.20
R23(config-if)# ip nhrp network-id 20
R23(config-if)# ip nhrp nhs 10.10.20.1
R23(config-if)# ip ospf network point-to-multipoint
R23(config-if)# tunnel source Serial2/0
R23(config-if)# tunnel mode gre multipoint
Version 5.1A
132 | P a g e
Verification
From R21, R22, and R23, ping to all devices in Seattle HQ and Dallas using the following TCL Script.
R20#sh dmvpn
Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete
N - NATed, L - Local, X - No Socket
# Ent --> Number of NHRP entries with same NBMA peer
NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting
UpDn Time --> Up or Down Time for a Tunnel
==========================================================================
# Ent
UpDn Tm Attrb
10.10.20.21
UP 00:01:45
1 4.4.22.22
10.10.20.22
UP 00:01:28
1 4.4.23.23
10.10.20.23
UP 00:01:18
133|P a g e
Version 5.1A
Version 5.1A
134 | P a g e
(2 points)
Encrypt the DMVPN network between Seattle HQ and the TeleWorker offices using the following
parameters:
o
Solution
Configure the crypto policy using the parameters specified in the task.
Verification
First, we will look at the DMVPN peers and the crypto connections to verify encryption is working.
Then, we will run the TCL script again to verify we still have full reachability.
135|P a g e
Version 5.1A
R20
R20#show dmvpn
Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete
N - NATed, L - Local, X - No Socket
# Ent --> Number of NHRP entries with same NBMA peer
NHS Status: E --> Expecting Replies, R --> Responding, W --> Waiting
UpDn Time --> Up or Down Time for a Tunnel
==========================================================================
# Ent
UpDn Tm Attrb
10.10.20.21
UP 00:00:41
1 4.4.22.22
10.10.20.22
UP 00:00:40
1 4.4.23.23
10.10.20.23
UP 00:00:40
src
state
6.6.20.20
4.4.21.21
QM_IDLE
1009 ACTIVE
6.6.20.20
4.4.22.22
QM_IDLE
1010 ACTIVE
6.6.20.20
4.4.23.23
QM_IDLE
1011 ACTIVE
Version 5.1A
conn-id status
136 | P a g e
137|P a g e
Version 5.1A
(3 points)
The Distro-Center needs to connect directly with the Dallas, TX offices. Create 2 separate Static
Virtual Tunnel interfaces on R11 for this connectivity.
The Distro-Center Routers should be setup with Static Virtual Tunnel interfaces to connect back
to Dallas.
All tunnel interfaces should not be configured with an IP address and should use the IP address of
the serial interfaces as the IP of the tunnel interface.
The connected serial interfaces should also be used as the source of each tunnel interface.
Encryption: 3des
Peer R24 and R25 via EIGRP with R11 and advertise the Loopback24 and Loopback25 interfaces
into EIGRP. The routes should be in the EIGRP topology table, but the BGP routes should be
installed in the routing tables of R24 and R25.
Solution
First, create the ISAKMP policy and the IPSec profile using the paremeters outlined in the task.
Version 5.1A
138 | P a g e
Now lets create the static tunnels on R11 since it is acting as a multi-termination point. We need to
use the serial interfaces of all 3 routers as the source and destination for the tunnels.
R11
R11(config)#interface Tunnel24
R11(config-if)# ip unnumbered Serial2/3
R11(config-if)# tunnel source Serial2/3
R11(config-if)# tunnel mode ipsec ipv4
R11(config-if)# tunnel destination 6.6.24.24
R11(config-if)# tunnel protection ipsec profile IPExpertProfile1
R11(config-if)#interface Tunnel25
R11(config-if)# ip unnumbered Serial2/3
R11(config-if)# tunnel source Serial2/3
R11(config-if)# tunnel mode ipsec ipv4
R11(config-if)# tunnel destination 6.6.25.25
R11(config-if)# tunnel protection ipsec profile IPExpertProfile1
Build the tunnel interface on R24 and R25 the same way.
The last part of this task asks us to add R24 and R25 into EIGRP and advertise their loopbacks. One
big thing to remember here is that in the earlier EIGRP task, it calls for AS112 to use the passiveinterface default command. Do not forget this as you are configuring your EIGRP processes or you
will not get points for the previous EIGRP section.
139|P a g e
Version 5.1A
R11
R11(config)#router eigrp 112
R11(config-router)# network 2.2.11.11 0.0.0.0
R11(config-router)#no passive-interface tunnel 24
R11(config-router)#no passive-interface tunnel 25
R24
R24(config)#router eigrp 112
R24(config-router)# passive-interface default
R24(config-router)# network 6.6.24.24 0.0.0.0
R24(config-router)# network 10.10.24.1 0.0.0.0
R24(config-router)# no passive-interface tunnel 11
R25(config-router)# no passive-interface loop 24
R25
R25(config)#router eigrp 112
R25(config-router)# passive-interface default
R25(config-router)# network 6.6.25.25 0.0.0.0
R25(config-router)# network 10.10.25.1 0.0.0.0
R25(config-router)# no passive-interface tunnel 11
R25(config-router)# no passive-interface loop 25
Verification
There are a few verifications that we need to do. First, verify that the tunnels are up. Second, verify
that the EIGRP adjacencies are formed. Lastly, verify that the routes are showing up in the EIGRP
topology table, but not the routing table.
R11
R11#sh crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst
src
state
conn-id status
6.6.25.25
2.2.11.11
QM_IDLE
1005 ACTIVE
6.6.24.24
2.2.11.11
QM_IDLE
1006 ACTIVE
Version 5.1A
140 | P a g e
Address
Interface
Hold Uptime
SRTT
(sec)
(ms)
RTO
Seq
Cnt Num
6.6.25.25
Tu25
12 00:02:19
577
3462
18
6.6.24.24
Tu24
14 00:02:20
70
1440
27
192.168.11.14
Et0/0
11 02:55:51
100
64
192.168.11.1
Et0/1
12 02:56:34
100
92
R24
R24#sh ip route
Gateway of last resort is not set
141|P a g e
Version 5.1A
Version 5.1A
142 | P a g e
143|P a g e
Version 5.1A
Version 5.1A
144 | P a g e
(5 Points)
(3 points)
Configure R3 so that telnet is allowed to the device only from the 192.168.1.0/24 network during
the non-business hours of 5:00pm-8:00am, Monday-Friday. Also allow access over the weekend.
Solution
Configure the time-based ACL as outlined in the task so that telnet is only allowed on R3 during nonbusiness hours. We need to first configure the time-range.
R3
R3(config)#time-range WORK-WEEK
R3(config-time-range)# periodic weekdays 17:00 to 23:59
R3(config-time-range)# periodic weekdays 00:00 to 7:59
R3(config-time-range)# periodic weekend 0:00 to 23:59
Then, we need to configure the Access-list and apply it to the vty lines.
R3
R3(config)#access-list 101 permit tcp 192.168.1.0 0.0.0.255 any eq telnet time-range
WORK-WEEK
R3(config)#line vty 0 4
R3(config-line)# access-class 101 in
R3(config-line)# login
R3(config-line)# password cisco
R3(config-line)# transport input telnet
Verification
From R2, attempt to telnet to R3. This could be successful if you are within the time frame-specified.
The input below shows it being denied since the ACL is not active.
145|P a g e
Version 5.1A
R2
R2#telnet 192.168.1.254
Trying 192.168.1.254 ...
% Connection refused by remote host
R3 should show the ACL as unactive or active depending on what time it is.
R3
R3#show access-list 101
Extended IP access list 101
10 permit tcp 192.168.1.0 0.0.0.255 any eq telnet time-range WORK-WEEK (inactive)
(2 points)
All passwords should be encrypted as level 7 by default on all devices in the HQ MPLS Core
network.
o
HTTP should be disabled and HTTPS should use port 8080 on all devices in the HQ MPLS Core
network.
No devices in the HQ MPLS Core network should show any MPLS VPN hop when originating a
traceroute from either VRF CORE or VRF TELE.
Solution
Since all parts of this task relate to the HQ MPLS Core network, lets configure them at the same time.
First, we need to enable service-password encryption. Then, we need to disable HTTP and change
the HTTPS port to 8080. Last, we need to disable MPLS ttls so that the MPLS hops do not show up in
a traceroute.
Version 5.1A
146 | P a g e
Verification
To test the password encryption, we can look at the line VTY password of R3 and verify that it is
encrypted.
R3
R3#sh run | sec line
line vty 0 4
access-class 101 in
password 7 121A0C041104
login
transport input telnet
147|P a g e
Version 5.1A
(5 Points)
(3 points)
Configure R6 to send a copy of its running configuration to an FTP server located at 10.10.1.1
every 5 minutes.
The FTP server has the username IPExpert and the password IPXPass for FTP.
The configuration file should be saved on 10.10.1.1 under the directory IPX with the filename
R6.txt and include version numbers.
Solution
We need to first setup the ftp username/password and hard-code an interface for FTP sessions:
R6
R6(config)#ip ftp username IPExpert
R6(config)#ip ftp password IPXPass
R6(config)#ip ftp source-interface loopback 0
Next, we need to setup configuration archiving using the parameters specified in the task. It calls for
a specific filename and for a specific directory location. Also note that we need to include revision
numbers. We need to also use FTP passive-mode which is done by setting the file prompt to quiet.
R6
R6(config)#archive
R6(config-archive)# path ftp://10.10.1.1/IPX/R6.cfg
R6(config-archive)# time-period 5
R6(config-archive)#file prompt quiet
Verification
R6 should generate a log every 5 minutes as follows:
R6
Writing IPX/R6.cfg-Nov--3-11-04-26-0
Version 5.1A
148 | P a g e
(2 points)
.98 should be the only IP that is generated. All other IPs should be reserved.
Interface E0/0 on BB1 is pre-configured to use this IP pool. From R9, verify that BB1 pulled IP
address 192.168.1.98 and that R9 can ping 192.68.1.98.
BB1 should form an EIGRP neighbor adjacency with R9. BB1 should be reachable from the HQ
MPLS Core network.
Soluiton
Configure R9 as a DHCP server for BB1 using the details outlined in the task.
R9
R9(config)#ip dhcp excluded-address 192.168.1.96 192.168.1.97
Verification
Lets go up to R3 and ping BB1s loopback interface.
R3
R3#ping 172.16.111.111
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.111.111, timeout is 2 seconds:
149|P a g e
Version 5.1A
R9
R9#sh ip dhcp binding
Bindings from all pools not associated with VRF:
IP address
Client-ID/
Lease expiration
Type
Automatic
Hardware address/
User name
192.168.1.98
0063.6973.636f.2d61.
6162.622e.6363.3031.
2e66.3530.302d.4574.
302f.30
This
Section
of iPexpert's
R&S 1-Week
Lab
Experience Volume
DSG, Lab21
Thisconcludes
concludesthe
theDiagnostic
Configuration
Section
and iPexpert's
R&S Lab
2 Workbook,
Copyright iPexpert. All Rights Reserved.
Version 5.1A
150 | P a g e