Anda di halaman 1dari 25

CCNA 3 ROUTING AND SWITCHING SCALING NETWORKS

EIGRP PRACTICE SKILLS ASSESSMENT PACKET TRACER


Shyaman Asanka Abeywickrema 7:20 AM

CCNA 3 Routing and Switching


Scaling Networks
EIGRP Practice Skills Assessment Packet Tracer
A few things to keep in mind while completing this activity:
1.

Do not use the browser Back button or close or reload any exam
windows during the exam.

2.

Do not close Packet Tracer when you are done. It will close
automatically.

3.

Click the Submit Assessment button in the browser window to submit


your work.
Introduction
In Part I of this practice skills assessment, you will configure routing and ACLs. You will
configure dynamic routing with EIGRP for IPv4 and static and default routes. In
addition, you will configure two access control lists.
In Part II of this practice skills assessment, you will configure the Medical Company
network with RPVST+, port security, EtherChannel, DHCP, VLANs and trunking, and
routing between VLANs. In addition you will perform an initial configuration on a
switch, secure unused switch ports and secure SVIs. You will also control access to
the switch management network with an access control list.
All IOS device configurations should be completed from a direct
terminal connection to the device console from an available host.
Some values that are required to complete the configurations have
not been given to you. In those cases, create the values that you
need to complete the requirements. These values may include
certain IP addresses, passwords, interface descriptions, banner
text, and other values.
For the sake of time, many repetitive but important configuration tasks have been
omitted from this activity. Many of these tasks, especially those related to device
security, are essential elements of a network configuration. The intent of this activity is
not to diminish the importance of full device configurations.

You will practice and be assessed on the following skills:

Configuration of initial device settings

IPv4 address assignment and configuration

Configuration and addressing of device interfaces

Configuration of the EIGRP for IPv4 routing protocol

Configuration of a default route

Configuration of ACL to limit device access

Configuration of switch management settings including SSH

Configuration of port security

Configuration of unused switch ports according to security best


practices

Configuration of RPVST+

Configuration of EtherChannel

Configuration of a router as a DHCP server

Configuration of VLANs and trunks

Configuration of routing between VLANs


You are required to do the following:
East:

Configure initial device settings.


Configure interfaces with IPv4 addresses, descriptions, and other
settings.

Configure and customize EIGRP for IPv4.


Central:

Configure interfaces with IPv4 addresses, descriptions, and other


settings.

Configure and customize EIGRP for IPv4.

Configure named and numbered ACLs.

Configure and propagate a default route through EIGRP for IPv4.


West:

Configure interfaces with IPv4 addresses, descriptions, and other


settings.
Configure DHCP pools and excluded addresses.

Configure routing between VLANs.

Configure EIGRP for IPv4.

Configure EIGRP for IPv4 route summarization.

Configure an ACL to limit access to the switch management network.


Bldg1:

Create and name VLANs.

Configure EtherChannel.

Configure trunking.

Assign access ports to VLANs.

Configure remote management settings.

Activate and configure RPVST+.

Secure unused switch ports.

Configure port security.


Bldg2:

Create and name VLANs.

Configure EtherChannel.

Configure trunking.

Assign access ports to VLANs.

Configure remote management settings with SSH.

Activate RPVST+.
Bldg3:

Create and name VLANs.

Configure EtherChannel.

Configure trunking.

Assign access ports to VLANs.

Configure remote management settings.

Activate and configure RPVST+.


Internal PC hosts:

Configure as DHCP clients.

Assign Static IPv4 addresses where indicated.


Tables

Note: You are provided with the networks that interfaces should be configured on.
Unless you are told to do differently in the detailed instructions below, you are free to
choose the host addresses to assign.
Addressing Table:
Device

Interface

Network

Configuration Details

East

S0/0/0

192.168.100.20

any address in the network

/30
S0/0/1

192.168.100.28

any address in the network

/30

Central

G0/0

192.168.8.0/24

first host address

G0/1

192.168.9.0/24

first host address

S0/0/0

192.168.100.20

any address in the network

/30
S0/0/1

192.168.100.36

any address in the network

/30
S0/1/0

203.0.113.16/2
9

(The first address in this network is already in use on

ISP router. Any other address in the network can b


assigned to this interface.)

West

S0/0/0

192.168.100.28

any address in the network

/30
S0/0/1

192.168.100.36

any address in the network

/30
G0/1.2

10.10.2.0/24

first address in the network

G0/1.4

10.10.4.0/24

first address in the network

G0/1.8

10.10.8.0/24

first address in the network

G0/1.15

10.10.15.0/24

first address in the network

G0/1.25

10.10.25.0/24

first address in the network

Bldg1

SVI

10.10.25.0/24

the highest address in the network

Bldg2

SVI

10.10.25.0/24

the second to the highest address in the network

Bldg3

SVI

10.10.25.0/24

the third to the highest address in the network

Host 1

NIC

192.168.8.0/24

any available address in the network

Host 2

NIC

192.168.9.0/24

any available address in the network

NetAdmin 1

NIC

10.10.15.0/24

any available address in the network

NetAdmin 2

NIC

10.10.15.0/24

any available address in the network

VLAN Switch Port Assignment Table:


VLAN

Name

Network

Device

Switch Ports

LAB-A

10.10.2.0/24

Bldg1

Fa0/5

Bldg3

Fa0/7

Bldg1

Fa0/10

Bldg3

Fa0/10

Bldg1

Fa0/15

Bldg3

Fa0/15

Bldg1

Fa0/24

Bldg3

Fa0/24

Bldg1

SVI

Bldg2

SVI

Bldg3

SVI

Bldg1

all unused ports

15

25

99

LAB-B

LAB-C

NetAdmin

SW-Admin

spare

10.10.4.0/24

10.10.8.0/24

10.10.15.0/24

10.10.25.0/24

N/A

Port-Channel Group Interfaces:


Channel

Device

Interfaces

Bldg1

Fa0/1, Fa0/2

Bldg3

Fa0/1, Fa0/2

Bldg1

Fa0/3, Fa0/4

Bldg2

Fa0/3, Fa0/4

Bldg2

Fa0/5, Fa0/6

Bldg3

Fa0/5, Fa0/6

Instructions
All configurations must be performed through a direct terminal
connection to the device console lines from an available host.

Part I: EIGRP Router Configuration


Step 1: Plan the Addressing.
Determine the IP addresses that you will use for the required interfaces on the devices
and LAN hosts. Follow the configuration details provided in the Addressing Table.
Step 2: Configure East.
Configure East with initial settings:

Configure the router host name: East. This value must be entered
exactly as it appears here.
Prevent the router from attempting to resolve command line entries
to IP addresses.
Protect device configurations from unauthorized access with an
encrypted secret password.

Secure the router console and remote access lines.

Prevent system status messages from interrupting console output.

Configure a message-of-the-day banner.

Encrypt all clear text passwords.


Hostname East
No ip domain look up
Enable secret class
Line console 0
Password cisco
Logging sinchronus
Login
Line vty 0 4
Password cisco
login
Banner motd Authorized Access Only
Service password-encryption

Step 3: Configure the Router Interfaces.

Use the information in the addressing table to configure the interfaces of all routers for
full connectivity with the following:

Configure IP addressing.
Descriptions for all physical interfaces.
Configure DCE settings where required. Use a rate of 128000.
The Ethernet subinterfaces on West will be configured later in this
assessment.
Step 4: Configure inter-VLAN routing on West.
Configure router West to route between VLANs using information in the Addressing
Table and VLAN Switch Port Assignment Table. The VLANs will be configured on the
switches later in this assessment.

Do not route the VLAN 99 network.


Step 5: Configure EIGRP Routing and a default route.
a. On all routers:

Configure EIGRP for IPv4 to route between the internal networks. Use
ASN 100.
Use the precise wild card masks for all network statements.
You are not required to route the SW-Admin VLAN network over
EIGRP.
Prevent routing updates from being sent on the LAN networks. Do
not use the default keyword version of the command to do so.
Prevent EIGRP for IPv4 from performing automatic route
summarization on all routers.
b. On the Central router:

Configure a default route to the Internet. Use the exit interface


argument.

Configure EIGRP for IPv4 to distribute the default route to the other
routers.
Step 6: Customize EIGRP for IPv4.
Customize EIGRP for IPv4 by performing the following configuration tasks:

Set the bandwidth of the link between East and Central to 128 kb/s.
Create a summary route for the LANs connected to Bldg3. It should
include all networks from 10.10.0.0 to 10.10.15.0.

Do not include the SW-Admin VLAN network in the summary route.


Configure EIGRP for IPv4 with the route summary so that it will be
sent to the other routers. Be sure to configure the summary on all of the
appropriate interfaces.

Step 7: Configure Access Control Lists.


You will configure two access control lists in this step. You should use
the any and host keywords in the ACL statements where appropriate. The ACL
specifications are as follows:
a. Restrict access to the vty lines on Central with an ACL:

Create a named standard ACL using the name TELNET-BLOCK. Be


sure that you enter this name exactly as it appears in this instruction.
Allow only Test PC to access the vty lines of Central.
No other Internet hosts (including hosts not visible in the topology)
should be able to access the vty lines of Central.
Your solution should consist of one ACL statement.
b. Block ping requests from the Internet with an ACL:

Use access list number 101.


Allow only Test PC to ping addresses within the Medical Company
network. Only echo messages should be permitted.
Prevent all other Internet hosts (not only the Internet hosts visible in
the topology) from pinging addresses inside the Medical Company network.
Block echo messages only.
All other traffic should be allowed.
Your ACL should consist of three statements.
Your ACL should be placed in the most efficient location as possible to
conserve network bandwidth and device processing resources.
c. Control access to the management interfaces (SVI) of the three switches attached
to West as follows:
Create a standard ACL.
Use the number 1 for the list.
Permit only addresses from the NetAdmin VLAN network to access
any address on the SW-Admin VLAN network.
Hosts on the NetAdmin VLAN network should be able to reach all
other destinations.
Your list should consist of one statement.
Part II: Switching and DHCP Configuration
Step 1: Create and name VLANs.
On all three switches that are attached to West, create and name the VLANs shown
in the VLAN Table.

The VLAN names that you configure must match the values in the
table exactly.

Each switch should be configured with all of the VLANs shown in the
table.
Step 2: Assign switch ports to VLANs.
Using the VLAN table, assign the switch ports to the VLANs you created in Step 1, as
follows:

All switch ports that you assign to VLANs should be configured


to static access mode.
All switch ports that you assign to VLANs should be activated.
Step 3: Configure the SVIs.
Refer to the Addressing Table. Create and address the SVIs on all three of the
switches that are attached to West. Configure the switches so that they can
communicate with hosts on other networks. Full connectivity will be established after
routing between VLANs has been configured later in this assessment.
Step 4: Configure Trunking and EtherChannel.
a. Use the information in the Port-Channel Groups table to configure EtherChannel as
follows:

Use LACP.
The switch ports on both sides of Channels 1 and 2 should initiate
negotiations for channel establishment.
The switch ports on the Bldg2 side of the Channel 3 should initiate
negotiations with the switch ports on Bldg3.
The switch ports on the Bldg3 side of Channel 3 should not initiate
negotiations with the switch ports on the other side of the channel.
All channels should be ready to forward data after they have been
configured.
b. Configure all port-channel interfaces as trunks.
c. Configure static trunking on the switch port on Bldg2 that is connected to West.
Step 5: Configure Rapid PVST+.
Configure Rapid PVST+ settings as follows:
a. Activate Rapid PVST+ and set root priorities.

All three switches should be configured to run Rapid PVST+.


Bldg1 should be configured as root primary for VLAN 2 and VLAN 4
using the default primary priority values.

Bldg1 should be configured as root secondary for VLAN 8 and VLAN


15 using the default secondary priority values.
Bldg3 should be configured as root primary for VLAN 8 and VLAN
15 using the default primary priority values.
Bldg3 should be configured as root secondary for VLAN 2 and VLAN
4 using the default secondary priority values.
b. Activate PortFast and BPDU Guard on the active Bldg3 switch access ports.

Configure PortFast on all access ports that are connected to hosts.

Activate BPDU Guard on all access ports that are connected to hosts.
Step 6: Configure switch security.
You are required to complete the following only on some of the devices in the
network for this assessment. In reality, security should be configured on all devices in
the network.
a. Secure unused switch ports. Following security best practices, do the following
on Bldg1 only:

Shutdown all unused switch ports.


Configure all unused switch ports as static access ports.
Ensure that all unused switch ports have been assigned to VLAN 99.
b. Configure port security on all active access ports on Bldg1.

Each switch port should accept only two MAC addresses before a
security action occurs.
The learned MAC addresses should be recorded in the running
configuration.
If a security violation occurs, the switch ports should provide
notification that a violation has occurred but not place the interface in an
err-disabled state.
c. On Bldg2, configure the virtual terminal lines to accept only SSH connections.
Use a domain name of ccnaPTSA.com.
Use a modulus value of 1024.
Configure SSH version 2.
Configure the vty lines to only accept SSH connections.
Configure user-based authentication for the SSH connections with a
user name of netadmin and a secret password of SSH_secret9. The
user name and password must match the values provided here exactly in
case, punctuation, and spelling.
Step 7: Configure West as a DHCP server for the hosts attached to
the Bldg1 and Bldg2 switches.
Configure three DHCP pools as follows:

Create a DHCP pool for hosts on VLAN 2 using the pool


name vlan2pool.
Create a DHCP pool for hosts on VLAN 4 using the pool
name vlan4pool.
Create a DHCP pool for hosts on VLAN 8 using the pool
name vlan8pool.
All VLAN pool names must match the provided values exactly.

Exclude the first five addresses from each pool.


Configure a DNS server address of 192.168.200.225.
All hosts should be able to communication with hosts on other
networks.
Step 8: Configure host addressing.
All hosts should be able to ping each other and the two external servers after they
have been addressed.

Hosts on VLANs 2, 4, and 8 should be configured to receive addresses


dynamically over DHCP.

Hosts on VLAN 15 should be addressed statically as indicated in the


addressing table. Once configured, the hosts should be able to ping hosts
on other networks.

Hosts on the LANs attached to East should be statically assigned


addressing that enables them to communicate with hosts on other
networks.
Theese Configurations ate Created By Asitha Indunil Meegama
From Srilanka.
Student of Srilanka Institiute of Infromation Technology and Curtin
University of Technology Australia.
I have scored 98% for this and i have corrected my mistake also
here.
You can score 100%
1. Before begin please read the whole assesment.
2. And change the host name of Esat or Site 1 router accordingly.
3. To apply theese commands in each device go to global
Configuration mode { (config)# } and paste them all there without
changing.
Thanks !!!
***BLDG1*** or ***SW-A***

ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
ip address 10.10.25.254 255.255.255.0
no shutdown
interface fa0/5
switchport mode acces
switchport acces vlan 2
interface fa0/10
switchport mode acces
switchport acces vlan 4
interface fa0/15
switchport mode acces
switchport acces vlan 8
interface fa0/24

switchport mode acces


switchport acces vlan 15
interface range fa0/6-9,fa0/11-14,fa0/16-23
switchport mode acces
switchport acces vlan 99
shutdown
interface range gi1/1-2
switchport mode acces
switchport acces vlan 99
shutdown
ETHERCHANNEL
interface range fa0/1-2
channel-group 1 mode active
interface port-channel 1
switchport mode trunk
interface range fa0/3-4
channel-group 2 mode active
interface port-channel 2
switchport mode trunk
PVST+
spanning-tree mode rapid-pvst
spanning-tree vlan 2 root primary
spanning-tree vlan 4 root primary
spanning-tree vlan 8 root secondary
spanning-tree vlan 15 root secondary
SECURITY

interface fa0/5
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/10
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/15
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/24
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky

***BLDG2*** or ***SW-B***
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4

name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
ip address 10.10.25.253 255.255.255.0
no shutdown
interface gi 1/1
switchport mode trunk
ETHERCHANNEL
interface range fa0/3-4
channel-group 2 mode active
interface port-channel 2
switchport mode trunk
interface range fa0/5-6
channel-group 3 mode active
interface port-channel 3
switchport mode trunk
PVST+
spanning-tree mode rapid-pvst
SSH

hostname SW-B
ip ssh version 2
ip domain-name ccnaPTSA.com
crypto key generate rsa
1024
username netadmin password SSH_secret9
line vty 0 4
login local
transport input ssh
line vty 5 15
login local
transport input ssh

***BLDG3*** or ***SW-C***
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null

interface vlan 25
ip address 10.10.25.252 255.255.255.0
no shutdown
interface fa0/7
switchport mode acces
switchport acces vlan 2
interface fa0/10
switchport mode acces
switchport acces vlan 4
interface fa0/15
switchport mode acces
switchport acces vlan 8
interface fa0/24
switchport mode acces
switchport acces vlan 15
ETHERCHANNEL
interface range fa0/1-2
channel-group 1 mode active
no shutdown
interface port-channel 1
switchport mode trunk
interface range fa0/5-6
channel-group 3 mode passive
no shutdown
interface port-channel 3
switchport mode trunk

PVST+
spanning-tree mode rapid-pvst
spanning-tree vlan 2 root secondary
spanning-tree vlan 4 root secondary
spanning-tree vlan 8 root primary
spanning-tree vlan 15 root primary
Port Fast BPDU Guard
interface range fa0/7, fa0/10, fa0/15, fa0/24
spanning-tree portfast
spanning-tree bpduguard enable
no shutdown

***Central*** or ***HQ***
ip route 0.0.0.0 0.0.0.0 s0/1/0
interface serial 0/0/0
bandwidth 128
ip address 192.168.100.22 255.255.255.252
description SITE
no shutdown
interface serial 0/0/1
bandwidth 128
ip address 192.168.100.37 255.255.255.252
description SITE
clock rate 128000
no shutdown
interface serial 0/1/0

bandwidth 128
ip address 203.0.113.18 255.255.255.248
description INTERNET
no shutdown
EIGRP
router eigrp 100
redistribute static
network 192.168.100.20 0.0.0.3
network 192.168.100.36 0.0.0.3
no auto-summary
ACCESS LIST
ip access-list standard TELNET-BLOCK
permit host 198.51.100.5
access-list 101 permit icmp 198.51.100.5 0.0.0.0 any echo
access-list 101 deny icmp any any echo
access-list 101 permit ip any any
line vty 0 4
access-class TELNET-BLOCK in
interface serial 0/1/0
ip access-group 101 in

***East*** or ***Site1***
hostname Site-1
no ip domain-lookup
enable secret cisco
line console 0

logging synchronous
password cisco
login
line vty 0 4
password cisco
login
service password-encryption
banner motd * Authorized acces only *
interface serial 0/0/0
bandwidth 128
ip address 192.168.100.21 255.255.255.252
description HQ
clock rate 128000
no shutdown
interface serial 0/0/1
bandwidth 128
ip address 192.168.100.29 255.255.255.252
description HQ
no shutdown
interface gi 0/0
ip address 192.168.8.1 255.255.255.0
description SITE
no shutdown
interface gi 0/1
ip address 192.168.9.1 255.255.255.0
no shutdown

EIGRP
router eigrp 100
passive-interface GigabitEthernet0/0
passive-interface GigabitEthernet0/1
network 192.168.100.20 0.0.0.3
network 192.168.100.28 0.0.0.3
network 192.168.8.0 0.0.0.255
network 192.168.9.0 0.0.0.255
no auto-summary

***West*** or ***Site2***
interface serial 0/0/0
bandwidth 128
ip address 192.168.100.30 255.255.255.252
description SITE
no shutdown
interface serial 0/0/1
bandwidth 128
ip address 192.168.100.38 255.255.255.252
description SITE
no shutdown
interface gig 0/1
description SITE
no shutdown
interface gi 0/1.2
encapsulation dot1q 2

ip address 10.10.2.1 255.255.255.0


interface gi 0/1.4
encapsulation dot1q 4
ip address 10.10.4.1 255.255.255.0
interface gi 0/1.8
encapsulation dot1q 8
ip address 10.10.8.1 255.255.255.0
interface gi 0/1.15
encapsulation dot1q 15
ip address 10.10.15.1 255.255.255.0
interface gi 0/1.25
encapsulation dot1q 25
ip address 10.10.25.1 255.255.255.0
EIGRP
router eigrp 100
passive-interface GigabitEthernet0/1
network 192.168.100.28 0.0.0.3
network 192.168.100.36 0.0.0.3
network 10.10.2.0 0.0.0.255
network 10.10.4.0 0.0.0.255
network 10.10.8.0 0.0.0.255
network 10.10.15.0 0.0.0.255
no auto-summary
passive-interface g0/1.2
passive-interface g0/1.4
passive-interface g0/1.8

passive-interface g0/1.15
ROUTE SUMMARIZATION
interface serial 0/0/0
ip summary-address eigrp 100 10.10.0.0 255.255.240.0
interface serial 0/0/1
ip summary-address eigrp 100 10.10.0.0 255.255.240.0
DHCP
ip dhcp excluded-address 10.10.2.1 10.10.2.5
ip dhcp excluded-address 10.10.4.1 10.10.4.5
ip dhcp excluded-address 10.10.8.1 10.10.8.5
ip dhcp pool vlan2pool
network 10.10.2.0 255.255.255.0
default-router 10.10.2.1
dns-server 192.168.200.225
ip dhcp pool vlan4pool
network 10.10.4.0 255.255.255.0
default-router 10.10.4.1
dns-server 192.168.200.225
ip dhcp pool vlan8pool
network 10.10.8.0 255.255.255.0
default-router 10.10.8.1
dns-server 192.168.200.225
ACCESS LIST
access-list 1 permit 10.10.15.0 0.0.0.255
interface gi0/1.25
ip access-group 1 out

Anda mungkin juga menyukai