CCNP ROUTE Lab manual from the Cisco Academy lesforgesdessalles.info JiveServlet/previewBody//CCNP%20ROUTE%% lesforgesdessalles.info After finishing this course you will be ready for Cisco CCNP Switch exam In addition, each lecture has a pdf manual which includes the lab tutorial. The following publication, CCNP Lab Workbook, is designed to assist version of INE's CCIE Routing & Switching Lab Workbook (IEWB-RS) Hardware.
|Language:||English, Spanish, Japanese|
|ePub File Size:||27.81 MB|
|PDF File Size:||13.60 MB|
|Distribution:||Free* [*Regsitration Required]|
CCNP. CISCO CERTIFIED NETWORK PROFESSIONAL. LAB MANUAL Lab 1 – Basic EIGRP Configuration. R2 . Lab 3 – Route Summarization with EIGRP. CCNP ROUTE Student Lab Manual. This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for. The only authorized Lab Manual for the Cisco Networking Academy CCNP. courses that employ industry-relevant instructional approaches to prepare students for professional-level jobs: CCNP ROUTE: Implementing IP Routing, CCNP SWITCH: Implementing IP Switching, and CCNP TSHOOT.
Redistributing a protocol with a higher administrative distance into a protocol with a lower administrative distance will likely cause sub-optimal routing problems. If you do not. It's time to troubleshoot. Be the first to like this. R1 would then drop that traffic because there is no redistribution in place yet. R6 R6 sh ip route in E2 E1.
Why not share! An annual anal Embed Size px. Start on. Show related SlideShares at end. WordPress Shortcode. Published in: It would be considered as an over configuration.
Adding the broadcast keyword to the spoke routers isn't incorrect configuration, but the general rule of thumb is to add the broadcast keyword on your hub mappings only. Add the frame relay mappings to R2 and R3 and verify connectivity. Sending 5.
When the neighbors reform. So far with this configuration. Just in case. Unless of course you decide to do so. That satisfies one requirement. The interface configurations were not displayed above.. R4 and R5.
R2 and R3. Using this command is very useful to prevent misconfigurations when there is more than 1 routing protocol in your environment. This must be done so that a new election will take place.. It's also a good idea to use the passive-interface command on any interfaces that are service provider facing. Virtual Links You may have also noticed that R6 is not receiving any routes. Area 46 needs to be connected to the backbone.
The virtual link will be created between R2 and R4. A transit autonomous system must be used to form the virtual link. This can be accomplished with a virtual link or a GRE tunnel. The transit AS must have a full routing table and can not be a stub area. The reason is that area 46 is not connected to area 0.
In this lab. What is a virtual link? A virtual link is what I would call a virtual area 0 interface that can be used to connect areas that are not connected to the backbone.
The syntax for creating a virtual link is as follows under router configuration mode. Cost of using 10 Transmit Delay is 1 sec.
Transit area R6 ping Packet sent with a source address of Sending a default route can be accomplished with the default-information originate command with the always keyword. It's time to troubleshoot. A chart is included listing the different OSPF network types. If you have not done this yet. To get the loopback interfaces to display their correct subnet mask.
An engineer could risk black-holing traffic destined for outside networks if there is no default route in the routing table. If you do not use the always keyword. Default Routing Let's take a look at the default route first. One of the requirements was that the loopback interfaces need to have the native subnet mask in the routing table.
In a production environment. OSPF will treat loopback interfaces as network hosts. The reason we are using the always keyword is so R1 will advertise the default route. OSPF external type 1. R6 R6 sh ip route in E2 E1. Please refer to Example 2. Example 2. I would like to expand on a concept that we saw in the OSPF section. R2 and R3 did not reform. Target IP address: You may often see the extended ping feature used in a single line IOS command.
You should use both methods and see what works for you. This command can be used to make all interfaces passive. Verify the configuration by using the IOS extended ping feature.
It's important at the professional level to be able to use the tools that IOS provides. Extended commands [n]: From there. R4 is using R2 as the next hop and the requirement states that R3 should be the next hop. Sweep range of sizes [n]: It's time to. Set DF bit in IP header? Validate reply data? Data pattern [0xABCD]: Refer to Example 2. Sending If that can happen. If you do not. There is no link between R2 and R3. R2 interface Tunnel10 ip address That's a problem.
Each protocol can then add the necessary transport encapsulation. If the tunnel endpoints have connectivity. It can transport multiple protocols.
Our goal should be to find a way to get R5s routes to the routing table of R4.
R1 would then drop that traffic because there is no redistribution in place yet. R3 would send that traffic to the next hop using the default route. This can be further verified by using the traceroute command on R4.
Hops 3 Example 2. Verify by examining the routing table on R4.
You could also use R3 if you prefer. By default. Tracing the route to Timeout in seconds : Probe count : Minimum Time to Live : Maximum Time to Live : Port Number : In today's networks.
A key and a key string are used to create the md5 hash. This is very similar to RIP. This means that if you configured key 5 on one side of the link.
The other requirement is that R2 should only install the summary route and the 3rd loopback of R5 into the IP routing table. Write out all of the subnets in binary and summarize the interesting octet. It makes learning easier if the engineer can see what's happening behind the scenes.
All of the values that are equal have been put in bold type. The interesting octet is the octet where the values are changing. The total number of bits in common are In this example. Change the key numbers on one side to see the results.
I would also encourage the use of other debugs. Console messages should be sent stating that there is an authentication failure. To find the summary to use.
R3 is receiving routes about R5. So the summary route will be Tunnel10 Null0 Tunnel10 R2 show ip route The requirement was that R2 should only have the summary route and the 3rd loopback of R5 in the routing table. Notice that the In Example 2. Of course R3 will have the more specific routes since it is the source of summarization.
To get the 3rd loopback of R5to be installed as well as the summary route. Redistributing a protocol with a higher administrative distance into a protocol with a lower administrative distance will likely cause sub-optimal routing problems. Redistribution Redistribution is of of those topics that can make even a seasoned engineer cringe. Tunnel10 By the output of Example 2. This typically occurs during corporate acquisitions and outsourced IT. Concerns about routing loops occur when there are multiple points of redistribution in the network.
This makes route filtering more efficient when multiple points of redistribution are present.