cisco icnd1 lab guide v1.0

65
© 2010 Marc Bouchard Cisco CCENT Lab Guide Covers all topics for the ICND1 exam Version 1.0 Written by Marc Bouchard www.subnet192.com

Upload: pentatonicman1

Post on 12-Oct-2015

23 views

Category:

Documents


0 download

DESCRIPTION

CCNA Guide

TRANSCRIPT

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    1/65

    2010 Marc Bouchard

    Cisco CCENT Lab Guide

    Covers all topics for the ICND1 exam

    Version 1.0

    Written by

    Marc Bouchard

    www.subnet192.com

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    2/65

    www.subnet192.com2

    C i C C E N T

    L b G i d

    Contents

    Introduction ............................................................................................................................................ 3

    Recommended training material ............................................................................................................. 3

    Recommended lab equipment................................................................................................................. 3

    How this guide works ............................................................................................................................ 4

    Lab 1 Configuring S1 Basic switch configurations .......................... .......................... ............................ 5

    Enabling connectivity ....................................................................................................................... 5

    Enhancing security ........................................................................................................................... 9

    Configure Ports and Port Security .................................................................................................. 13

    Configure VLANs ............................................................................................................................ 17

    Flash and nvram management ....................................................................................................... 20

    Miscellaneous commands of interest ............................................................................................. 23

    Lab 2 Configuring R1 Basic router configurations ............................................................................. 25

    Enabling connectivity ..................................................................................................................... 25

    Enhancing security ......................................................................................................................... 29

    Flash and nvram management ....................................................................................................... 33

    Lab 3 Interconnecting components ..................................................................................................... 35

    Configuring S2 and S3 .................................................................................................................... 35

    Session Management ..................................................................................................................... 37

    Network identification ................................................................................................................... 40

    Lab 4 Full topology.............................................................................................................................. 45

    Configuring R2 and R3.................................................................................................................... 45

    Serial Connectivity ......................................................................................................................... 47

    PPP with Authentication ................................................................................................................ 50

    Routing: Static Routes .................................................................................................................... 52

    Routing: RIP ................................................................................................................................... 60

    References & Resources ........................................................................................................................ 65

    Software................................................................................................................................................ 65

    Special thanks ..................................................................................................................................... 65

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    3/65

    www.subnet192.com3

    CiscoCCENT

    LabGuide

    Introduction

    Studying for the CCENT/CCNA exams is challenging. There are a lot of resources out there, lots of

    material but there was nothing I could find to meet my objective: provide me with a challenge, and then

    show a step by step explanation to validate the tasks.

    This guide is in no way endorsed by Cisco Systems. I created this document out of personal need and to

    help myself memorize and learn the various commands and configurations. I thought I should share this

    with others to assist in actually learning hands-on skills with Cisco equipment. Also, note that I didnt

    reinvent the wheel here. Most of this is inspired from personal experience in my own lab, from

    information gathered on the internet, from some of the simulators, etc.

    This guide is provided FREE of charge. If you paid for this guide, you got ripped off. I do

    however accept donations of any amount via Paypal at [email protected] if you find this

    guide of use and want to thank me for my efforts. Visit my site at www.subnet192.comfor

    more information and the latest guides!

    Recommended training material

    The following are what I personally used to pass the certification. I find that going through a CBT before

    hitting the books helps a lot to make the book easier to understand.

    CBT Nuggets ICND1 training by Jeremy Cioara.

    Cisco Press ICND1 by Wendell Odom.

    Recommended lab equipmentFinding the right gear to build a lab is quite a daunting task. There is a multitude of models and versions,as well as modules to customize each device. While you can get by with simulators, (I have tried them

    all), nothing compares to working with the real deal.

    My recommendations, for a reasonably priced lab that would get you through the CCENT and CCNA

    curriculum would be the following. Note that not all of them are used for the CCENT, but will be useful

    at the CCNA level.

    3 Cisco 2950 series switches

    3 Cisco 2620XM 128/45 series routers

    3 WIC-2T serial interfaces

    3 DCE/DTE Smart Serial cables (for the WIC-2T to WIC-2T connections)

    1 NM-4A/S serial interface

    3 Serial to Smart Serial cables (for the NM-4A/S to WIC-2T connections)

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    4/65

    www.subnet192.com4

    C i C C E N T

    L b G i d

    How this guide works

    First off, this is not intended to explain any of the concepts. There are fantastic books out there for that

    job. This guide attempts to make you think about what you need to do, which commands are required

    to complete each step and so on.

    Lab 1 and 2 will focus on standalone device configurations. However, you dont go far if nothing is

    interconnected. The objective is to make you build your lab, practicing commands as you go.

    The goal topology is the following, based on my recommendations for hardware above. You can also

    perform most of the steps using Ciscos Packet Tracer software if you are part of the Cisco Learning

    Academy, but be aware that some commands are not implemented like SSH support, etc.

    Device ID Interface IP Address Default Gateway

    PC Ethernet adapter 192.168.1.100/24 192.168.1.1

    S1 Vlan 1 192.168.1.5/24 192.168.1.1

    S2 Vlan 1 192.168.1.6/24 192.168.1.1

    S3 Vlan 1 192.168.1.7/24 192.168.1.1

    R1 FastEthernet 0/0 192.168.1.1/24

    R1 Serial 0/0 172.16.0.1/30

    R2 FastEthernet 0/0 10.50.0.1/24

    R2 Serial 0/0 172.16.1.1/30

    R2 Serial 0/1 172.16.0.2/30R3 FastEthernet 0/0 69.70.16.147/29

    R3 Serial 0/0 172.16.1.2/30

    For R3s FastEthernet 0/0 interface, if you have an internet connection available, substitute the IP

    address for your own static address. This will provide you with real connectivity to the internet in your

    lab.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    5/65

    www.subnet192.com5

    CiscoCCENT

    LabGuide

    Lab 1 Configuring S1 Basic switch configurations

    Material required: 1 switch, 1 PC, console (rollover) cable, Ethernet cable

    Enabling connectivity

    Objectives

    This lab will guide you in configuring a switch from a factory default state.

    Preparation Connect the console (rollover) cable from the PC to the Console port of the switch.

    Connect the Ethernet cable from the PC to the FastEthernet 0/1 port of the switch.

    Configure the PCs Ethernet port to 100mbps/Full Duplex.

    Tasks

    Open a terminal emulator session to the switch

    Erase the current configuration (reset to factory default) then reboot the switch.

    Set the host name to S1.

    Set the console password to cisco.

    Set the privileged mode password to ciscoexec. Set the IP address and default gateway using the topology reference table, and enable the

    interface.

    Enable Telnet connectivity on all ports, using password remote.

    Configure all ports to 100mbps/full duplex.

    Verify the running configuration.

    View the interface list summary.

    Test the Telnet connection from the PC to the switch.

    View currently connected users.

    Save the configuration.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    6/65

    www.subnet192.com6

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )

    Enter privileged mode

    Switch>enable

    Enter configuration mode

    Switch#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    Erase the startup configuration file (reset to factory defaults)

    Switch#write eraseErasing the nvram filesystem will remove all configuration files! Continue? [confirm]Switch#reloadProceed with reload? [confirm]

    OR

    Switch#erase startup-configErasing the nvram filesystem will remove all configuration files! Continue? [confirm]Switch#reloadProceed with reload? [confirm]

    Set the host name

    Switch(config)#hostname 1

    Set the console password

    S1(config)#line console 0S1(config-line)#password ciscoS1(config-line)#exit

    Set the privileged mode password

    S1(config)#enable password ciscoexec

    Configure the IP address and default gateway, and enable the interface

    S1(config)#interface vlan 1

    S1(config-if)#ip address 192.168.1.5 255.255.255.0S1(config-if)#no shutdownS1(config-if)#exitS1(config)#ip default-gateway 192.168.1.1

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    7/65

    www.subnet192.com7

    CiscoCCENT

    LabGuide

    Enable Telnet connectivity

    S1(config)#line vty 0 15S1(config-line)#password remoteS1(config-line)#loginS1(config-line)#transport input telnetS1(config-line)#exit

    Configure all ports to 100mbps/full duplex.

    S1(config)#interface range fastEthernet 0/1 - 24S1(config-if-range)#speed 100S1(config-if-range)#duplex fullS1(config-if-range)#exitS1(config)#exit

    Verify the running configuration

    The following output has been edited for space considerations.

    S1#show running-configBuilding configuration...

    Current configuration: 2673 bytes!version 12.1no service password-encryption!hostname S1

    !enable password ciscoexec

    !interface FastEthernet0/1speed 100duplex full

    !!interface Vlan1ip address 192.168.1.5 255.255.255.0

    !ip default-gateway 192.168.1.1

    !line con 0password 0 cisco

    line vty 0 4password 0 remote

    logintransport input telnet

    line vty 5 15password 0 remotelogin

    transport input telnet

    !End

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    8/65

    www.subnet192.com8

    C i C C E N T

    L b G i d

    View the interface list summary

    S1#show ip interface briefInterface IP-Address OK? Method Status ProtocolVlan1 192.168.1.5 YES manual up upFastEthernet0/1 unassigned YES unset up upFastEthernet0/2 unassigned YES unset down downFastEthernet0/3 unassigned YES unset down downFastEthernet0/4 unassigned YES unset down down

    Test the Telnet connection

    From your PC connected to switch via an Ethernet cable, open your terminal emulator software

    and connect to the switch using the Telnet protocol.

    View currently connected users

    S1#show usersLine User Host(s) Idle Location

    0 con 0 idle 00:00:30* 1 vty 0 idle 00:00:00 192.168.1.100

    Interface User Mode Idle Peer Address

    Save the configuration

    S1#copy running-config startup-configDestination filename [startup-config]?Building configuration...[OK]

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    9/65

    www.subnet192.com9

    CiscoCCENT

    LabGuide

    Enhancing security

    Objectives

    Your switch has been configured in the previous lab, but could use a bit more security. Complete the

    following tasks to enhance the security of your switch. Note that several tasks here do NOT work in

    Packet Tracer or on a non-crypto IOS.

    Tasks

    Set the secured privileged mode password to ciscosecret

    Set notification banners

    o Message of the Day: AUTHORIZED PERSONEL ONLY

    o Login: ACCESS RESTRICTED

    Encrypt all clear text passwords

    Enable SSH connectivity with local authentication. Leave Telnet enabled for the purpose of the

    lab.

    o

    Create an account named admin with a password of ciscoo Use domain name subnet192.com

    o Configure the terminal port ranges independently (0-4 and 5-15)

    Verify the cryptographic key

    Save the configuration

    Verify your configuration

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    10/65

    www.subnet192.com1

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )

    Enter privileged mode

    S1>enable

    Enter configuration mode

    S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    Set the secured privileged mode password

    S1(config)#enable secret ciscosecret

    Set notification banners (Login and Message of the Day)

    S1(config)#banner login ! ACCE RE TRICTED !S1(config)#banner motd ! AUTHORIZED PER ONEL ONLY !

    Encrypt all clear text passwords

    S1(config)#service password-encryption

    Enable SSH connectivity with local authentication

    S1(config)#ip domain-name subnet192.comS1(config)#username adminpassword ciscoS1(config)#crypto key generate rsaThe name for the keys will be: S1.subnet192.comChoose the size of the key modulus in the range of 360 to 2048 for your General PurposeKeysChoosing a key modulus greater than 512 may take a few minutes.How many bits in the modulus [512]:Generating RSA keys ...[OK]

    S1(config)#line vty 0 4S1(config-line)#login localS1(config-line)#transport input ssh telnetS1(config-line)#line vty 5 15S1(config-line)#login local

    S1(config-line)#transport input ssh telnetS1(config-line)#exitS1(config)#exit

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    11/65

    www.subnet192.com11

    CiscoCCENT

    LabGuide

    Verify cryptographic key

    S1#Show crypto key mypubkey rsa% Key pair was generated at: 21:31:48 EST Mar 6 1993Key name: S1.subnet192.comUsage: General Purpose KeyKey Data:305C300D 06092A86 4886F70D 01010105 00034B00 30480241 00F242D9 39F85F01A50E9A4F 37055405 2DB4D613 6C5259CF ACF5AB5B E28DFAB2 D1020301 0001

    % Key pair was generated at: 08:32:29 EST Mar 7 1993Key name: S1.subnet192.com.serverUsage: Encryption KeyKey Data:307C300D 06092A86 4886F70D 01010105 00036B00 30680261 00B1509F 1EDFEA0A39F7C421 3D1F86EF 752E5937 EACADEBC F959D757 218F4068 AB020301 0001

    Save the configuration

    S1#copy running-config startup-configDestination filename [startup-config]?Building configuration...

    [OK]

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    12/65

    www.subnet192.com1

    C i C C E N T

    L b G i d

    Verify the configuration

    The following output has been edited for space considerations.

    S1#show running-config

    Building configuration...

    Current configuration : 2126 bytes!version 12.1service password-encryption!hostname S1!enable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p.enable password 7 094F471A1A0A120A0E0F!username admin password 7 070C285F4D06ip subnet-zero!ip domain-name subnet192.comip ssh time-out 120

    ip ssh authentication-retries 3!interface FastEthernet0/1speed 100duplex full

    !interface FastEthernet0/24speed 100duplex full

    !interface Vlan1ip address 192.168.1.5 255.255.255.0no ip route-cache

    !ip default-gateway 192.168.1.1ip http serverbanner login ^C ACCESS RESTRICTED ^Cbanner motd ^C AUTHORIZED PERSONEL ONLY ^C!line con 0password 7 02050D480809

    line vty 0 4password 7 105C0C140A0317login localtransport input ssh

    line vty 5 15password 7 105C0C140A0317login localtransport input ssh

    !end

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    13/65

    www.subnet192.com13

    CiscoCCENT

    LabGuide

    Configure Ports and Port Security

    Objectives

    Your switch has been setup with all the basic settings, the remote access connections are now secured,

    but what about the access ports? Anybody can connect anything to any port at this point. You can make

    the switch even more secure by preventing unauthorized devices from connecting.

    Tasks

    Disable unused ports (13 to 24)

    View the MAC address table

    View the current port security settings on port 12

    Enable Port Security on port 12

    o Make the port shutdown in case of violation

    o

    Allow a single MAC address only

    o

    Let the switch learn the MAC address of the device currently plugged in.

    o

    Plug in any device on port 12 and try to ping something, to send a packet out so theswitch learns the MAC address

    View the current port security settings on port 12

    Plug in a different device in that port to trigger port violation rules

    View the current port security settings on port 12 post violation

    Restore connectivity on violated port

    Verify your configuration

    o

    List all ports with Port Security enabled

    o List all MAC addresses linked to Port Security enabled ports

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    14/65

    www.subnet192.com1

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )

    Enter privileged mode

    S1>enable

    Enter configuration mode

    S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    Disable unused ports (13 to 24)

    S1(config)#interface range fastEthernet 0/13 - 24S1(config-if)#shutdownS1(config-if)#exitS1(config)#exit

    View the MAC address table

    S1#show mac-address-tableMac Address Table

    -------------------------------------------

    Vlan Mac Address Type Ports---- ----------- -------- -----All 000a.4117.5300 STATIC CPUAll 0100.0ccc.cccc STATIC CPUAll 0100.0ccc.cccd STATIC CPU

    All 0100.0cdd.dddd STATIC CPU1 0004.2007.6d2b DYNAMIC Fa0/1

    View the current port security settings on port 12

    S1#show port-security interface fastEthernet 0/12Port Security : DisabledPort Status : Secure-downViolation Mode : ShutdownAging Time : 0 minsAging Type : AbsoluteSecureStatic Address Aging : DisabledMaximum MAC Addresses : 1Total MAC Addresses : 0Configured MAC Addresses : 0

    Sticky MAC Addresses : 0Last Source Address : 0000.0000.0000Security Violation Count : 0

    Enter configuration mode

    S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    15/65

    www.subnet192.com15

    CiscoCCENT

    LabGuide

    Enable port security on port 12

    S1(config)#interface fastEthernet 0/12S1(config-if)#switchport mode accessS1(config-if)#switchport port-securityS1(config-if)#switchport port-security maximum 1S1(config-if)#switchport port-security mac-address stickyS1(config-if)#switchport port-security violation shutdownS1(config-if)#exitS1(config)#exit

    View the new port security settings on port 12

    S1#show port-security interface fastEthernet 0/12Port Security : EnabledPort Status : ecure-upViolation Mode : ShutdownAging Time : 0 minsAging Type : AbsoluteSecureStatic Address Aging : DisabledMaximum MAC Addresses : 1

    Total MAC Addresses : 1Configured MAC Addresses : 0Sticky MAC Addresses : 1Last Source Address : 0005.5e17.4a40Security Violation Count : 0

    View the new port security settings on port 12 post violation

    S1#show port-security interface fastEthernet 0/12Port Security : EnabledPort Status : ecure-shutdownViolation Mode : ShutdownAging Time : 0 minsAging Type : AbsoluteSecureStatic Address Aging : Disabled

    Maximum MAC Addresses : 1Total MAC Addresses : 1Configured MAC Addresses : 0Sticky MAC Addresses : 1Last Source Address : 000d.bd11.c580Security Violation Count : 1

    Enter configuration mode

    S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    Restore connectivity on violated port

    S1(config)#interface fastEthernet 0/12S1(config-if)#shutdownS1(config-if)#no shutdownS1(config-if)#exitS1(config)#exit

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    16/65

    www.subnet192.com1

    C i C C E N T

    L b G i d

    Verify your configuration

    S1#show port-securitySecure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action

    (Count) (Count) (Count)---------------------------------------------------------------------------

    Fa0/12 1 1 1 Shutdown---------------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0Max Addresses limit in System (excluding one mac per port) : 1024

    S1#show port-security addressSecure Mac Address Table

    -------------------------------------------------------------------Vlan Mac Address Type Ports Remaining Age

    (mins)---- ----------- ---- ----- -------------

    1 0005.5e17.4a40 SecureSticky Fa0/12 --------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0Max Addresses limit in System (excluding one mac per port) : 1024

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    17/65

    www.subnet192.com17

    CiscoCCENT

    LabGuide

    Configure VLANs

    Objectives

    By default, all ports are members of VLAN 1. Create new VLANs and assign them ports.

    TasksCreate VLANs

    o Create VLAN 10, with a description of Sales

    o Create VLAN 20, with a description of Marketing

    o

    Create VLAN 30, with a description of Research

    Assign ports to VLANs

    o Assign ports 5-6 to VLAN 10

    o Assign ports 7-8 to VLAN 20

    o Assign ports 9 to VLAN 30

    Review VLAN configuration

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    18/65

    www.subnet192.com1

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ) or via

    Telnet.

    Enter privileged mode

    S1>enable

    Enter configuration mode

    S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    Create VLANs

    S1(config)#VLAN 10S1(config-vlan)#name alesS1(config-vlan)#VLAN 20S1(config-vlan)#name MarketingS1(config-vlan)#VLAN 30S1(config-vlan)#name ResearchS1(config-vlan)#exit

    Assign ports to VLANs

    S1(config)#interface range fastEthernet 0/5 - 6S1(config-if-range)#switchport access vlan 10

    S1(config)#interface range fastEthernet 0/7 - 8S1(config-if-range)#switchport access vlan 20

    S1(config)#interface fastEthernet 0/9

    S1(config-if)#switchport access vlan 30S1(config-if)#exitS1(config)#exit

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    19/65

    www.subnet192.com19

    CiscoCCENT

    LabGuide

    Review VLAN configuration

    S1#show vlan brief

    VLAN Name Status Ports---- ------------------------ --------- ---------------------------1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4,

    Fa0/10, Fa0/11. Fa0/12, Fa0/13,Fa0/14, Fa0/15. Fa0/16, Fa0/17,Fa0/18, Fa0/19. Fa0/20, Fa0/21,Fa0/22, Fa0/23. Fa0/24

    10 Sales active Fa0/5, Fa0/620 Marketing active Fa0/7, Fa0/830 Research active Fa0/91002 fddi-default act/unsup1003 token-ring-default act/unsup1004 fddinet-default act/unsup1005 trnet-default act/unsup

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    20/65

    www.subnet192.com2

    C i C C E N T

    L b G i d

    Flash and nvram management

    Objectives

    Managing and safeguarding the IOS image and configurations.

    Preparation Install TFTPD32 on your PC.

    Create a folder on your PC with a new IOS image to upload to the switch.

    Tasks

    Backup the configuration to TFTP.

    View the contents of flash memory.

    Backup the current IOS image to TFTP.

    From the IOS, send a new IOS image to a switch using TFTP.

    From ROMMON, send a new IOS image to a switch using TFTP.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    21/65

    www.subnet192.com21

    CiscoCCENT

    LabGuide

    Walkthrough

    Enter privileged mode

    S1>enable

    Backup the configuration to TFTP

    S1#copy startup-config tftpAddress or name of remote host []? 192.168.1.100Destination filename [s1-confg]?

    View the contents of the flash memory

    S1#dir flash:Directory of flash:/

    2 -rwx 112 Mar 01 1993 01:37:46 +00:00 info3 -rwx 330 Mar 01 1993 01:42:25 +00:00 env_vars

    4 -rwx 2126 Mar 01 1993 00:09:19 +00:00 config.text5 -rwx 1100 Mar 01 1993 00:09:19 +00:00 private-config.text7 -rwx 3721946 Mar 01 1993 01:40:37 +00:00 c2950-i6k2l2q4-mz.121-22.EA13.bin8 drwx 4416 Mar 01 1993 01:41:38 +00:00 html

    332 -rwx 112 Mar 01 1993 01:42:17 +00:00 info.ver333 -rwx 976 Mar 07 1993 02:47:58 +00:00 vlan.dat

    7741440 bytes total (2142208 bytes free)

    Backup the current IOS to TFTP

    S1#copy flash tftpSource filename []? c2950-i6k2l2q4-mz.121-22.EA13.binAddress or name of remote host []? 192.168.1.100Destination filename [c2950-i6k2l2q4-mz.121-22.EA13.bin]?

    !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!3721946 bytes copied in 27.988 secs (132984 bytes/sec)

    From the IOS, send a new IOS image to a switch using TFTP

    S1#copy tftp flashAddress or name of remote host []? 192.168.1.100Source filename []? c2950-i6k2l2q4-mz.121-22.EA13.binDestination filename [c2950-i6k2l2q4-mz.121-22.EA13.bin]?##################################################################################################################################################[ok]

    S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.S1(config)#boot system flash c2950-i6k2l2q4-mz.121-22.EA13.binS1(config)#exit

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    22/65

    www.subnet192.com2

    C i C C E N T

    L b G i d

    From ROMMON, send a new IOS image to a switch using TFTP

    To get into ROMMON, press CTRL-BREAK during the boot sequence (power up) of the switch.

    ROMMON>IP_ADDRESS=192.168.1.5ROMMON>IP_SUBNET_MASK=255.255.255.0

    ROMMON>DEFAULT_GATEWAY=192.168.1.1ROMMON>TFTP_SERVER=192.168.1.100ROMMON>TFTP_FILE= c2950-i6k2l2q4-mz.121-22.EA13.binROMMON>tftpdnld

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    23/65

    www.subnet192.com23

    CiscoCCENT

    LabGuide

    Miscellaneous commands of interest

    Objectives

    There are some commands that you can use to improve the device management experience. Here are

    some more configuration tasks you can perform.

    Tasks

    Configure the console logging to not overlap the command prompt

    Disable the session timeout

    Create an alias called save to save your running configuration to nvram:

    Prevent DNS lookups

    Create an entry in the host name table called TFTPServer and test connectivity

    Configure the command history buffer to remember 15 commands.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    24/65

    www.subnet192.com2

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ) or via

    Telnet.

    Enter configuration mode

    S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    Configure the console logging to not overlap the command prompt

    S1(config)#line console 0S1(config-line)#logging synchronousS1(config-line)#exit

    Disable the session timeout

    S1(config)#line console 0S1(config-line)#exec-timeout 0S1(config-line)#exit

    Create an alias called save to save your running configuration to nvram:

    S1(config)#alias exec save copy running-config startup-config

    Prevent DNS lookup

    S1(config)#no ip domain-lookup

    Create an entry in the host name table called TFTPServer and test connectivity

    S1(config)#ip host TFTPServer 192.168.1.100S1(config)#exitS1#ping TFTPServerType escape sequence to abort.Sending 5, 100-byte ICMP Echos to 192.168.1.100, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms

    Configure the command history buffer to remember 15 commands

    S1#terminal history size 15

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    25/65

    www.subnet192.com25

    CiscoCCENT

    LabGuide

    Lab 2 Configuring R1 Basic router configurations

    Material required: 1 router, 1 PC, console (rollover) cable, crossover Ethernet cable

    Enabling connectivity

    Objectives

    This lab will guide you in configuring a router from a factory default state. The steps in this lab are very

    similar to the basic switch configuration, with minor (but important) differences.

    Preparation

    Connect the console (rollover) cable from the PC to the Console port of the router.

    Connect the crossover Ethernet cable from the PC to the FastEthernet 0/0 port of the router.

    Tasks

    Restore the router to factory defaults

    Set the host name

    Set the console password

    Set the privileged mode password

    Configure the FastEthernet 0/0 interface.

    o Set the IP address and subnet mask

    o Configure to 100mbps/Full Duplex

    o Enable the interface

    Enable Telnet connectivity

    Verify the running configuration

    View the interface list summary

    Test the Telnet connection

    View currently connected users and which lines are used.

    Save the configuration

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    26/65

    www.subnet192.com2

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )

    Enter privileged mode

    Router>enable

    Enter configuration mode

    Router#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    Set the host name

    Router(config)#hostname R1

    Set the console password

    R1(config)#line console 0R1(config-line)#password ciscoR1(config-line)#exit

    Set the privileged mode password

    R1(config)#enable password ciscoexec

    Configure the FastEthernet 0/0 interface

    R1(config)#interface fastethernet 0/0R1(config-if)#ip address 192.168.1.1 255.255.255.0R1(config-if)#no shutdownR1(config-if)#speed 100R1(config-if)#duplex fullR1(config-if)#exit

    Enable Telnet connectivity

    R1(config)#line vty 0 4R1(config-line)#password remoteR1(config-line)#loginR1(config-line)#transport input telnetR1(config-line)#exitR1(config)#exit

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    27/65

    www.subnet192.com27

    CiscoCCENT

    LabGuide

    Verify the running configuration

    The following output has been edited for space considerations.

    R1#show running-config

    Building configuration...

    Current configuration : 834 bytes!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname R1!boot-start-markerboot-end-marker!enable password ciscoexec!interface FastEthernet0/0

    ip address 192.168.1.1 255.255.255.0speed 100full-duplex

    !interface Serial0/0no ip addressshutdown

    !interface Serial0/1no ip addressshutdown

    !ip forward-protocol nd!ip http serverno ip http secure-server!line con 0password cisco

    line aux 0line vty 0 4password remotelogintransport input telnet

    !end

    View the interface list summary

    R1#show ip interface briefInterface IP-Address OK? Method Status Protocol

    FastEthernet0/0 192.168.1.1 YES manual up upSerial0/0 unassigned YES unset administratively down downSerial0/1 unassigned YES unset administratively down down

    Test the Telnet connection

    From your PC connected to switch via an Ethernet cable, open your terminal emulator software

    and connect to the switch using the Telnet protocol.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    28/65

    www.subnet192.com2

    C i C C E N T

    L b G i d

    View currently connected users and which lines are used.

    R1#show usersLine User Host(s) Idle Location0 con 0 idle 00:03:35

    * 66 vty 0 idle 00:00:00 192.168.1.100

    Interface User Mode Idle Peer Address

    R1#show lineTty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int

    * 0 CTY - - - - - 0 1 0/0 -65 AUX 9600/9600 - - - - - 0 0 0/0 -

    * 66 VTY - - - - - 1 0 0/0 -67 VTY - - - - - 0 0 0/0 -68 VTY - - - - - 0 0 0/0 -69 VTY - - - - - 0 0 0/0 -70 VTY - - - - - 0 0 0/0 -

    Line(s) not in async mode -or- with no hardware support:1-64

    Save the configuration

    R1#copy running-config startup-configDestination filename [startup-config]?Building configuration...[OK]

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    29/65

    www.subnet192.com29

    CiscoCCENT

    LabGuide

    Enhancing security

    Objectives

    Your router has been configured in the previous lab, but could use a bit more security. Complete the

    following tasks to enhance the security of your router.

    Tasks

    Set the secured privileged mode password to ciscosecret

    Set notification banners

    o Message of the Day: AUTHORIZED PERSONEL ONLY

    o Login: ACCESS RESTRICTED

    Encrypt all clear text passwords

    Enable SSH connectivity with local authentication. Disable Telnet.

    o

    Create an account named admin with a password of cisco

    o

    Use domain name subnet192.com

    Verify the cryptographic key Save the configuration

    Verify your configuration

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    30/65

    www.subnet192.com3

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )

    Enter privileged mode

    R1>enable

    Enter configuration mode

    R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    Set the secured privileged mode password

    R1(config)#enable secret ciscosecret

    Set notification banners (Login and Message of the Day)

    R1(config)#banner login ! ACCE RE TRICTED !R1(config)#banner motd ! AUTHORIZED PER ONEL ONLY !

    Encrypt all clear text passwords

    R1(config)#service password-encryption

    Enable SSH connectivity with local authentication. Disable Telnet.

    R1(config)#ip domain-name subnet192.comR1(config)#username adminpassword ciscoR1(config)#crypto key generate rsaThe name for the keys will be: R1.subnet192.comChoose the size of the key modulus in the range of 360 to 2048 for your General PurposeKeysChoosing a key modulus greater than 512 may take a few minutes.How many bits in the modulus [512]:Generating RSA keys ...[OK]

    R1(config)#line vty 0 4R1(config-line)#login localR1(config-line)#transport input sshR1(config-line)#exitR1(config)#exit

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    31/65

    www.subnet192.com31

    CiscoCCENT

    LabGuide

    Verify cryptographic key

    R1#Show crypto key mypubkey rsa% Key pair was generated at: 21:31:48 EST Mar 6 1993Key name: R1.subnet192.comUsage: General Purpose KeyKey Data:305C300D 06092A86 4886F70D 01010105 00034B00 30480241 00F242D9 39F85F01A50E9A4F 37055405 2DB4D613 6C5259CF ACF5AB5B E28DFAB2 D1020301 0001

    % Key pair was generated at: 08:32:29 EST Mar 7 1993Key name: R1.subnet192.com.serverUsage: Encryption KeyKey Data:307C300D 06092A86 4886F70D 01010105 00036B00 30680261 00B1509F 1EDFEA0A39F7C421 3D1F86EF 752E5937 EACADEBC F959D757 218F4068 AB020301 0001

    Save the configuration

    R1#copy running-config startup-configDestination filename [startup-config]?Building configuration...

    [OK]

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    32/65

    www.subnet192.com3

    C i C C E N T

    L b G i d

    Verify the configuration

    The following output has been edited for space considerations.

    R1#show running-config

    Building configuration...

    Current configuration : 1010 bytes!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecservice password-encryption!hostname R1!boot-start-markerboot-end-marker!enable password 7 045802150C2E49560C1A!ip domain name subnet192.com

    ip auth-proxy max-nodata-conns 3ip admission max-nodata-conns 3!username admin password 7 0822455D0A16!interface FastEthernet0/0ip address 192.168.1.1 255.255.255.0speed 100full-duplex

    !interface Serial0/0no ip addressshutdown

    !interface Serial0/1no ip addressshutdown

    !ip forward-protocol nd!ip http serverno ip http secure-server!banner login ^C ACCESS RESTRICTED ^Cbanner motd ^C AUTHORIZED PERSONEL ONLY ^C!line con 0password 7 121A0C041104

    line aux 0line vty 0 4password 7 1317121F041801login localtransport input ssh

    !End

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    33/65

    www.subnet192.com33

    CiscoCCENT

    LabGuide

    Flash and nvram management

    Objectives

    Managing and safeguarding the IOS image and configurations.

    Preparation Install TFTPD32 on your PC (if not done in Lab 1)

    Create a folder on your PC with a new IOS image to upload to the router.

    Tasks

    Backup the configuration to TFTP.

    View the contents of flash memory.

    Backup the current IOS image to TFTP.

    From the IOS, send a new IOS image to a switch using TFTP.

    From ROMMON, send a new IOS image to a switch using TFTP.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    34/65

    www.subnet192.com3

    C i C C E N T

    L b G i d

    Walkthrough

    Enter privileged mode

    R1>enable

    Backup the configuration to TFTP

    R1#copy startup-config tftpAddress or name of remote host []? 192.168.1.100Destination filename [r1-confg]?

    View the contents of the flash memory

    R1#dir flash:Directory of flash:/

    1 -rw- 28542192 c2600-advipservicesk9-mz.124-23.bin

    49807356 bytes total (21265100 bytes free)

    Backup the current IOS to TFTP

    R1#copy flash tftp

    Source filename []? c2600-advipservicesk9-mz.124-23.binAddress or name of remote host []? 192.168.1.100

    Destination filename [c2600-advipservicesk9-mz.124-23.bin]?!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!3721946 bytes copied in 27.988 secs (132984 bytes/sec)

    From the IOS, send a new IOS image to a switch using TFTP

    R1#copy tftp flashAddress or name of remote host []? 192.168.1.100

    Source filename []?c2600-advipservicesk9-mz.124-23.binDestination filename [c2600-advipservicesk9-mz.124-23.bin]?##################################################################################################################################################[ok]

    R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    R1(config)#boot system flash c2600-advipservicesk9-mz.124-23.binR1(config)#exit

    From ROMMON, send a new IOS image to a switch using TFTP

    To get into ROMMON, press CTRL-BREAK during the boot sequence (power up) of the switch.

    ROMMON>IP_ADDRESS=192.168.1.1ROMMON>IP_SUBNET_MASK=255.255.255.0ROMMON>DEFAULT_GATEWAY=192.168.1.1ROMMON>TFTP_SERVER=192.168.1.100ROMMON>TFTP_FILE= c2600-advipservicesk9-mz.124-23.binROMMON>tftpdnld

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    35/65

    www.subnet192.com35

    CiscoCCENT

    LabGuide

    Lab 3 Interconnecting components

    Objectives

    Lets build on what we have learned so far and start adding more devices to our lab. Lets add 2 more

    switches and connect the R1 router to our topology.

    Configuring S2 and S3

    Objectives

    Configure the additional switches to create a functional multi-component environment.

    Preparation

    Connect R1s FastEthernet 0/0 interface to FastEthernet port 0/1 of S1.

    Connect S2s FastEthernet port 0/1 to FastEthernet port 0/2 of S1

    Connect S3s FastEthernet port 0/1 to FastEthernet port 0/3 of S1

    Connect the PC to FastEthernet port 0/4 of S1.

    Tasks

    Using what you have practiced so far, configure the new S2 and S3 switches like you did in Lab 1

    Enabling connectivity. Alternatively, you can use the script in the walkthrough section to

    automate the configuration.

    Disable SSH on S1 and remove the local user Admin account. This will make connectivity easier

    for future labs.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    36/65

    www.subnet192.com3

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).

    S2 and S3 configuration script

    Start by resetting the switches to the factory default, and reload. Once restarted, when back atthe Switch> prompt, copy and paste the following script to configure it. Items in bold vary from

    device to device.

    enableconfigure terminalhostname 2service password-encryptionalias exec save copy run startip default-gateway 192.168.1.1enable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p.enable password 7 094F471A1A0A120A0E0Fip domain-name subnet192.com

    interface range fa0/1 24speed 100duplex fullexitinterface vlan 1ip address 192.168.1.6255.255.255.0exitbanner login ^C ACCESS RESTRICTED ^Cbanner motd ^C AUTHORIZED PERSONEL ONLY ^Cline con 0password 7 02050D480809line vty 0 4password 7 105C0C140A0317logintransport input telnetline vty 5 15password 7 105C0C140A0317transport input telnetendsave

    Disable SSH on S1, remove the admin account.

    S1#configure terminalS1(config)#line vty 0 15S1(config-line)#transport input telnetS1(config-line)#loginS1(config-line)#exitS1(config)#no username adminpassword cisco

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    37/65

    www.subnet192.com37

    CiscoCCENT

    LabGuide

    Session Management

    Objectives

    Experiment with remote sessions between devices.

    Tasks Session management

    o From S1, open a telnet connection to S2 (192.168.1.6)

    o

    Return to the S1 prompt without closing the connection to S2.

    o

    From S1, open a telnet connection to S3 (192.168.1.7)

    o Return to the S1 prompt without closing the connection to S3.

    o Display the list of opened sessions (notice which one has a *)

    o Resume the S2 session (192.168.1.6)

    o Display the users connected to S2.

    o Close the session to S2 permanently.

    o

    Verify that the session is closed.o From the S1 prompt, close the session to S3.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    38/65

    www.subnet192.com3

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).

    From S1, open a telnet connection to S2 (192.168.1.6)

    S1>telnet 192.168.1.6Trying 192.168.1.6 ... OpenAUTHORIZED PERSONEL ONLYACCESS RESTRICTED

    User Access VerificationPassword:

    Return to the S1 prompt without closing the connection to S2.

    CTRL-SHIFT-6 then X

    From S1, open a telnet connection to S3 (192.168.1.7)

    S1>telnet 192.168.1.7Trying 192.168.1.7 ... OpenAUTHORIZED PERSONEL ONLYACCESS RESTRICTED

    User Access VerificationPassword:

    Return to the S1 prompt without closing the connection to S3.

    CTRL-SHIFT-6 then X

    Display the list of opened sessions (notice which one has a *)

    S1>show sessionsConn Host Address Byte Idle Conn Name

    1 192.168.1.6 192.168.1.6 0 0 192.168.1.6* 2 192.168.1.7 192.168.1.7 0 0 192.168.1.7

    Resume the S2 session (192.168.1.6)

    S1>resume 1

    or simplyS1>1

    Display the users connected to S2.

    S2>show usersLine User Host(s) Idle Location

    * 1 vty 0 idle 00:00:00 192.168.1.5

    Interface User Mode Idle Peer Address

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    39/65

    www.subnet192.com39

    CiscoCCENT

    LabGuide

    Close the session to S2 permanently.

    S2>exit[Connection to 192.168.1.6 closed by foreign host]

    Verify that the session is closed.

    S1>show sessionsConn Host Address Byte Idle Conn Name* 2 192.168.1.7 192.168.1.7 0 3 192.168.1.7

    From the S1 prompt, close the session to S3 (192.168.1.7)

    S1>disconnect 2

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    40/65

    www.subnet192.com4

    C i C C E N T

    L b G i d

    Network identification

    Objectives

    Discover connected devices and document the topology of an unknown environment.

    TasksAssume you dont know the topology of the network and you need to document it. You connect to

    switch S1 thru the console port and from there; you must use various commands to help you create the

    diagram with port and IP information:

    Device ID S1.subnet192.com S2.subnet192.com S3.subnet192.com R1.subnet192.com

    IP address/mask

    Platform

    Capabilities

    IOS version

    Incoming port to S1 n/a

    Outgoing port from device n/a

    Start by getting the information about the device youre connected to. Remember, this is an

    unknown network to you, so find out as much as you can from this device! Do this without

    looking at the running or startup configuration.

    Display a summary list of all the devices known to S1.

    Display detailed information about each of these devices, from the S1 prompt.

    Use telnet to go to the other devices to complete the missing information.

    o Display a summary list of all the mac-addresses known to S1.

    o Display a summary list of all the devices known to S2.

    o Display a summary list of all the devices known to S3.

    o

    Display a summary list of all the devices known to R1.

    Using all these steps should allow you to document your network

    and even draw out your diagram from scratch, identifying which

    devices are visible and which interface to use to get to them.

    Once you have completed the table, configure R1 to not advertise its presence to others.

    Display a summary list of all the devices known to S1. R1 should no longer be listed (it might

    take a few minutes to disappear)

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    41/65

    www.subnet192.com41

    CiscoCCENT

    LabGuide

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).

    Show information about the local device

    S1>show versionCisco Internetwork Operating System SoftwareIOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22)EA13 IO VersionTechnical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by cisco Systems, Inc.Compiled Fri 27-Feb-09 22:20 by amvarmaImage text-base: 0x80010000, data-base: 0x80680000

    ROM: Bootstrap program is C2950 boot loader

    S1 uptime is 1 hour, 51 minutesSystem returned to ROM by power-onSystem image file is "flash:c2950-i6k2l2q4-mz.121-22.EA13.bin"

    cisco WS-C2950-24 (RC32300) processor (revision E0) with 19912K bytes of memory.Processor board ID FHK0626X0H9Last reset from system-reset

    Running Standard Image24 FastEthernet/IEEE 802.3 interface(s)

    32K bytes of flash-simulated non-volatile configuration memory.Base ethernet MAC Address: 00:0A:41:17:53:00Motherboard assembly number: 73-5781-10Power supply part number: 34-0965-01Motherboard serial number: FOC0625077SPower supply serial number: DAB0625576EModel revision number: E0Motherboard revision number: B0

    Model number: W -C2950-24 PlatformSystem serial number: FHK0626X0H9Configuration register is 0xF

    S1>show ip interfaceVlan1 is up, line protocol is up

    Internet address is 192.168.1.5/24 IP address/maskBroadcast address is 255.255.255.255Address determined by non-volatile memoryMTU is 1500 bytesHelper address is not setDirected broadcast forwarding is disabledOutgoing access list is not setInbound access list is not setProxy ARP is enabledLocal Proxy ARP is disabledSecurity level is defaultSplit horizon is enabledICMP redirects are always sentICMP unreachables are always sentICMP mask replies are never sentIP fast switching is disabledIP fast switching on the same interface is disabledIP Null turbo vectorIP multicast fast switching is disabledIP multicast distributed fast switching is disabled

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    42/65

    www.subnet192.com4

    C i C C E N T

    L b G i d

    Display a summary list of all the devices known to S1

    S1>show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

    S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone

    Device ID Local Intrfce Holdtme Capability Platform Port IDS3.subnet192.com Fas 0/3 176 S I WS-C2950G-Fas 0/1S2.subnet192.com Fas 0/2 175 S I WS-C2950G-Fas 0/1R1.subnet192.com Fas 0/1 144 R 2620 Fas 0/0

    Display detailed information about each of these devices, from the S1 prompt

    S1>show cdp neighbors detail-------------------------

    Device ID: 3.subnet192.com Device IDEntry address(es):

    IP address: 192.168.1.7Platform: cisco W -C2950G-24-EI, Capabilities: witch IGMP Platform & capabilities

    Interface: FastEthernet0/3, Port ID (outgoing port): FastEthernet0/1 I/O Ports

    Holdtime : 157 sec

    Version :Cisco Internetwork Operating System Software

    IOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22) EA13 IO VersionTechnical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by cisco Systems, Inc.Compiled Fri 27-Feb-09 22:20 by amvarma

    advertisement version: 2Protocol Hello: OUI=0x00000C, Protocol ID=0x0112; payload len=27,value=00000000FFFFFFFF010221FF00000000000000131A2C2700FF0000Native VLAN: 1Duplex: fullManagement address(es):IP address: 192.168.1.7

    -------------------------Device ID: S2.subnet192.comEntry address(es):IP address: 192.168.1.6

    Platform: cisco WS-C2950G-12-EI, Capabilities: Switch IGMPInterface: FastEthernet0/2, Port ID (outgoing port): FastEthernet0/1Holdtime : 91 sec

    Version :Cisco Internetwork Operating System SoftwareIOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22)EA13, RELEASE SOFTWARE (fc2)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by cisco Systems, Inc.Compiled Fri 27-Feb-09 22:20 by amvarma

    advertisement version: 2

    Protocol Hello: OUI=0x00000C, Protocol ID=0x0112; payload len=27,value=00000000FFFFFFFF010221FF00000000000000152B1C9A40FF0000Native VLAN: 1Duplex: fullManagement address(es):IP address: 192.168.1.6

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    43/65

    www.subnet192.com43

    CiscoCCENT

    LabGuide

    -------------------------Device ID: R1.subnet192.comEntry address(es):

    IP address: 192.168.1.1Platform: cisco 2620, Capabilities: RouterInterface: FastEthernet0/1, Port ID (outgoing port): FastEthernet0/0Holdtime : 39 sec

    Version :Cisco Internetwork Operating System SoftwareIOS (tm) C2600 Software (C2600-D-M), Version 12.2(5a), RELEASE SOFTWARE (fc1)Copyright (c) 1986-2001 by cisco Systems, Inc.Compiled Thu 04-Oct-01 19:45 by pwade

    advertisement version: 2Duplex: fullManagement address(es):

    Display a summary list of all the mac-addresses known to S1

    S1>show mac address-tableMac Address Table

    -------------------------------------------

    Vlan Mac Address Type Ports---- ----------- -------- -----All 000a.4117.5300 STATIC CPUAll 0100.0ccc.cccc STATIC CPUAll 0100.0ccc.cccd STATIC CPUAll 0100.0cdd.dddd STATIC CPU1 0005.5e17.4a40 DYNAMIC Fa0/11 0013.1a2c.2701 DYNAMIC Fa0/31 0015.2b1c.9a41 DYNAMIC Fa0/2

    Total Mac Addresses for this criterion: 7

    Display a summary list of all the devices known to S2

    S1#telnet 192.168.1.6Trying 192.168.1.6 ... Open

    AUTHORIZED PERSONEL ONLYACCESS RESTRICTED

    User Access Verification

    Password:

    S2>show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

    S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone

    Device ID Local Intrfce Holdtme Capability Platform Port IDS1.subnet192.com Fas 0/1 144 S I WS-C2950-2Fas 0/2

    S2>exit

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    44/65

    www.subnet192.com4

    C i C C E N T

    L b G i d

    Display a summary list of all the devices known to S3

    S1#telnet 192.168.1.7Trying 192.168.1.7 ... Open

    AUTHORIZED PERSONEL ONLYACCESS RESTRICTED

    User Access Verification

    Password:

    S3>show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

    S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone

    Device ID Local Intrfce Holdtme Capability Platform Port IDS1.subnet192.com Fas 0/1 144 S I WS-C2950-2Fas 0/3

    S3>exit

    Display a summary list of all the devices known to R1

    S1#telnet 192.168.1.1Trying 192.168.1.1 ... Open

    AUTHORIZED PERSONEL ONLYACCESS RESTRICTED

    User Access Verification

    Password:

    R1>show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

    S - Switch, H - Host, I - IGMP, r - Repeater

    Device ID Local Intrfce Holdtme Capability Platform Port ID

    S1.subnet192.com Fas 0/0 167 S I WS-C2950-2Fas 0/1

    R1>exit

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    45/65

    www.subnet192.com45

    CiscoCCENT

    LabGuide

    Lab 4 Full topology

    Objectives

    In this lab we complete the topology and start having fun with routing protocols.

    Preparation

    Configure R2 and R3 using the steps from Lab 2.

    Connect R1 Serial 0/0 interface (DCE) to Serial 0/1 of R2 (DTE).

    Connect R2 Serial 0/0 interface (DCE) to Serial 0/1 of R3 (DTE).

    Connect your internet link to R3s FastEthernet interface.

    Connect any device in the Ethernet port of R2 and R3 to bring the link up.

    Configuring R2 and R3

    Objectives

    Configure the serial interfaces to simulate WAN connectivity between the routers.

    Tasks

    Using what you have practiced so far, configure the new R2 and R3 routers like you did in Lab 2

    Enabling connectivity. Alternatively, you can use the script in the walkthrough section to

    automate the configuration. Disable SSH on R1 and remove the local user Admin account. This will make connectivity easier

    for future labs.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    46/65

    www.subnet192.com4

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).

    R2 and R3 configuration script

    Start by resetting the routers to the factory default, and reload. Once restarted, when back atthe Router> prompt, copy and paste the following script to configure it. Items in bold vary from

    device to device.

    enableconfigure terminalhostname R2service password-encryptionalias exec save copy run startenable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p.enable password 7 094F471A1A0A120A0E0Fip domain-name subnet192.cominterface fastethernet 0/0ip address 10.50.0.1 255.255.255.0

    no shutdownspeed 100duplex fullexitbanner login ^C ACCESS RESTRICTED ^Cbanner motd ^C AUTHORIZED PERSONEL ONLY ^Cline con 0logging synchronouspassword 7 02050D480809line vty 0 4password 7 105C0C140A0317logintransport input telnetline vty 5 15password 7 105C0C140A0317transport input telnet

    endsave

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    47/65

    www.subnet192.com47

    CiscoCCENT

    LabGuide

    Serial Connectivity

    Objectives

    Configure the serial interfaces to simulate WAN connectivity between the routers.

    Tasks Verify that serial interface 0/0 on R1 is the DCE

    Configure serial interface 0/0 on R1 with a clock rate of 56000.

    Configure serial interface 0/1 on R2.

    Verify that serial interface 0/0 on R2 is the DCE

    Configure serial interface 0/0 on R2 with a clock rate of 9600.

    Configure serial interface 0/1 on R3.

    Display R2s neighbors list to validate connectivity with R1 and R3.

    Verify the WAN protocol used by R2 on serial interface 0/1.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    48/65

    www.subnet192.com4

    C i C C E N T

    L b G i d

    Walkthrough

    Connect via the console cable or telnet using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).

    Verify that serial interface 0/0 on R1 is the DCE

    R1#show controllers serial 0/0Interface Serial0/0Hardware is PowerQUICC MPC860

    DCE V.35, no clock DCE or DTE status and clock rate

    idb at 0x8497AB4C, driver data structure at 0x84982270SCC Registers:General [GSMR]=0x2:0x00000030, Protocol-specific [PSMR]=0x8Events [SCCE]=0x0000, Mask [SCCM]=0x001F, Status [SCCS]=0x06Transmit on Demand [TODR]=0x0, Data Sync [DSR]=0x7E7EInterrupt Registers:Config [CICR]=0x00367F80, Pending [CIPR]=0x00000A00Mask [CIMR]=0x30200440, In-srv [CISR]=0x00000000Command register [CR]=0x640

    Configure interface S0/0 on R1 with a clock rate of 56000

    R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R1(config)#R1(config)#interface serial 0/0R1(config-if)#ip address 172.16.0.1 255.255.255.252R1(config-if)#no shutdownR1(config-if)#clock rate 56000R1(config)#

    Configure interface S0/1 on R2 as the DTE

    R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    R2(config)#R2(config)#interface serial 0/1R2(config-if)#ip address 172.16.0.2 255.255.255.252R2(config-if)#no shutdownR2(config-if)#

    Verify that serial interface 0/0 on R2 is the DCE

    R2#show controllers serial 0/0Interface Serial0/0Hardware is PowerQUICC MPC860DCE V.35, no clock DCE or DTE status and clock rate

    idb at 0x8497AB4C, driver data structure at 0x84982270SCC Registers:

    General [GSMR]=0x2:0x00000030, Protocol-specific [PSMR]=0x8Events [SCCE]=0x0000, Mask [SCCM]=0x001F, Status [SCCS]=0x06Transmit on Demand [TODR]=0x0, Data Sync [DSR]=0x7E7EInterrupt Registers:Config [CICR]=0x00367F80, Pending [CIPR]=0x00000A00Mask [CIMR]=0x30200440, In-srv [CISR]=0x00000000Command register [CR]=0x640

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    49/65

    www.subnet192.com49

    CiscoCCENT

    LabGuide

    Configure interface S0/0 on R2 with a clock rate of 9600

    R2(config)#interface serial 0/0R2(config-if)#ip address 172.16.1.1 255.255.255.252R2(config-if)#clock rate 9600R2(config-if)#no shutdownR2(config-if)#

    Configure interface S0/1 on R3 as the DTE

    R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R2(config)#R2(config)#interface serial 0/1R2(config-if)#ip address 172.16.1.2 255.255.255.252R2(config-if)#no shutdownR2(config-if)#

    Display R2s neighbors list to validate connectivity with R1 and R3

    R2#show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge

    S - Switch, H - Host, I - IGMP, r - Repeater

    Device ID Local Intrfce Holdtme Capability Platform Port IDR3.subnet192.com Ser 0/0 150 R S I 2620XM Ser 0/1R1.subnet192.com Ser 0/1 172 R S I 2620XM Ser 0/0R2#

    Verify the WAN protocol used by R2 on serial interface 0/1

    R2#show interfaces serial 0/1Serial0/1 is up, line protocol is up

    Hardware is PowerQUICC Serial

    Internet address is 172.16.0.2/30MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,reliability 255/255, txload 1/255, rxload 1/255

    Encapsulation HDLC, loopback not set WAN encapsulation protocolKeepalive set (10 sec)Last input 00:00:03, output 00:00:09, output hang neverLast clearing of "show interface" counters neverInput queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0Queueing strategy: weighted fairOutput queue: 0/1000/64/0 (size/max total/threshold/drops)

    Conversations 0/2/256 (active/max active/max total)Reserved Conversations 0/0 (allocated/max allocated)Available Bandwidth 1158 kilobits/sec

    5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec

    112 packets input, 8720 bytes, 0 no bufferReceived 92 broadcasts, 0 runts, 0 giants, 0 throttles

    0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort137 packets output, 9981 bytes, 0 underruns0 output errors, 0 collisions, 13 interface resets0 unknown protocol drops0 output buffer failures, 0 output buffers swapped out28 carrier transitionsDCD=up DSR=up DTR=up RTS=up CTS=up

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    50/65

    www.subnet192.com5

    C i C C E N T

    L b G i d

    PPP with Authentication

    Objectives

    Serial connectivity defaults to HDLC encapsulation on Cisco equipment. We will change it to PPP and use

    CHAP authentication.

    Tasks

    Enable PPP encapsulation on serial interface 0/0 of R1

    o

    The serial link with R2 will go down.

    Display the status of serial interface 0/0.

    Enable PPP encapsulation on serial interface 0/1 of R2

    o The serial link with R1 will come back up.

    Enable CHAP on both serial interfaces of the link between R1 and R2.

    o

    Create the security accounts on both routers

    o

    Enable CHAP authentication on both routers

    The link between R1 and R2 is now using PPP and the link between R2 and R3 will be using HDLC.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    51/65

    www.subnet192.com51

    CiscoCCENT

    LabGuide

    Walkthrough

    Enable PPP encapsulation on serial interface 0/0 of R1

    R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.

    R1(config)#interface serial 0/0R1(config-if)#encapsulation ppp

    Display the status of serial interface 0/0

    R1#show interfaces serial 0/0

    Serial0/0 is up, line protocol is down Link is downHardware is PowerQUICC SerialInternet address is 172.16.0.1/30MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,

    reliability 252/255, txload 1/255, rxload 1/255

    Encapsulation PPP, loopback not set WAN encapsulation protocolKeepalive set (10 sec)LCP ListenClosed: IPCP, CDPCPLast input 00:00:02, output 00:00:08, output hang neverLast clearing of "show interface" counters 00:00:26Queueing strategy: fifoOutput queue 0/40, 0 drops; input queue 0/75, 0 drops5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec

    4 packets input, 423 bytes, 0 no bufferReceived 0 broadcasts, 0 runts, 0 giants, 0 throttles1 input errors, 0 CRC, 1 frame, 0 overrun, 0 ignored, 0 abort9 packets output, 126 bytes, 0 underruns0 output errors, 0 collisions, 1 interface resets0 output buffer failures, 0 output buffers swapped out0 carrier transitionsDCD=up DSR=up DTR=up RTS=up CTS=up

    Enable PPP encapsulation on serial interface 0/1 of R2

    R2#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R2(config)#interface serial 0/1R2(config-if)#encapsulation ppp

    Enable CHAP on both serial interfaces of the link between R1 and R2

    On R1:

    R1(config)#user R2 password subnet192R1#configure terminal

    Enter configuration commands, one per line. End with CNTL/Z.R1(config)#interface serial 0/0R1(config)#ppp authentication chap

    On R2:

    R2(config)#user R1 password subnet192R2#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R2(config)#interface serial 0/1R2(config)#ppp authentication chap

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    52/65

    www.subnet192.com5

    C i C C E N T

    L b G i d

    Routing: Static Routes

    Objectives

    Understanding static routes, default routes and connected routes.

    TasksConnectivity between all devices is established but at the moment, the routers dont know the paths to

    any other routes other than the connected ones.

    One way trip

    From R1:

    o

    Display the routing table.

    Note the connected routes, already known by the router as they are locally

    connected to its interface.

    o Create a static route to R2s 10.50.0.0/24 network, using the IP address of R2s interface

    as the next hop.o Test the connectivity to the 10.50.0.1 interface using ping.

    From S1:

    o

    Test the connectivity to the 10.50.0.1 interface using ping.

    Round trip!

    From R2:

    o

    Display the routing table.

    Note the connected routes, already known by the router as they are locally

    connected to its interface.

    o Create a static route to R1s 192.168.1.0/24 network, using the IP address of R1s

    interface as the next hop.

    o Test the connectivity to the 192.168.1.1 interface using ping.

    From S1:

    o

    Test the connectivity to the 10.50.0.1 interface using ping.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    53/65

    www.subnet192.com53

    CiscoCCENT

    LabGuide

    Around the world!

    From R1:

    o

    Create a static route to R3s 69.70.16.144/29 network, using the IP address of R2s

    interface as the next hop.

    o

    Test the connectivity to the 69.70.16.147 interface using ping. Create all the missing routes to make the lab fully connected (use the WAN interfaces as the

    next hop).

    o

    R1 needs three routes.

    69.70.16.144/29 network on R3

    10.50.0.0/24 network on R2

    R2-R3 WAN link

    o R2 needs two routes.

    69.70.16.144/29 network on R3

    192.168.1.0/24 network on R1

    o

    R3 needs three routes (use the interface ID instead of the IP address of the next hop).

    192.168.1.0/24 network on R1

    10.50.0.0/24 network on R2

    R1-R2 WAN link

    Display the routing tables on each router.

    From S1, test the connectivity to any of the interfaces on the network.

    From R3, do a traceroute to Switch 3.

    Now that the internal network is fully operational, lets add external connectivity (note that there is NO

    protection (i.e. firewall or other) in this lab. Proceed at your own risk.)

    Create a default route on all routers to reach the internet interface (FastEthernet 0/0 on R3).

    Verify that the default route is now enabled on R3.

    Configure name server 4.2.2.2 (DNS) on R3.

    Test internet connectivity from R3 using www.google.comas the destination address.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    54/65

    www.subnet192.com5

    C i C C E N T

    L b G i d

    Walkthrough

    One way trip

    On R1, display the routing table

    R1#show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPi - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area* - candidate default, U - per-user static route, o - ODRP - periodic downloaded static route

    Gateway of last resort is not set No default route

    172.16.0.0/16 is variably subnetted, 2 subnets, 2 masksC 172.16.0.0/30 is directly connected, erial0/0 Connected route

    C 172.16.0.2/32 is directly connected, erial0/0 Connected route

    C 192.168.1.0/24 is directly connected, FastEthernet0/0 Connected route

    On R1, create a static route to R2s 10.50.0.0/24 network

    R1(config)#ip route 10.50.0.0 255.255.255.0 172.16.0.2R1(config)#exit

    On R1, test the connectivity to the 10.50.0.1 interface using ping

    R1#ping 10.50.0.1

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds:!!!!!uccess rate is 100 percent (5/5), round-trip min/avg/max = 32/32/36 ms Ping success!

    ** This pings from interface 172.16.0.1 to 10.50.0.1 uses the static route defined on the previous step.

    The R2 router already knows the route to 172.16.0.1 so the ping works.

    On S1, test the connectivity to the 10.50.0.1 interface using ping

    S1>ping 10.50.0.1

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds:

    .....uccess rate is 0 percent (0/5) Ping failure!

    ** The ping fails! Well actually, the ping reaches the 10.50.0.1 interface but because R2 doesnt know

    the path to the 192.168.1.0/24 network, it cant return the response to the ping.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    55/65

    www.subnet192.com55

    CiscoCCENT

    LabGuide

    Round trip!

    On R2, display the routing table

    R2#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route

    Gateway of last resort is not set

    172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksC 172.16.0.0/30 is directly connected, erial0/1 Connected route

    C 172.16.1.0/30 is directly connected, erial0/0 Connected route

    C 172.16.0.1/32 is directly connected, erial0/1 Connected route

    10.0.0.0/24 is subnetted, 1 subnets

    C 10.50.0.0 is directly connected, FastEthernet0/0 Connected route

    On R2, create a static route to R1s 192.168.1.0/24 network

    R2(config)#ip route 192.168.1.0 255.255.255.0 172.16.0.1R2(config)#exit

    On R2, test the connectivity to the 192.168.1.1 interface using ping

    R1#ping 192.168.1.1

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:!!!!!

    uccess rate is 100 percent (5/5), round-trip min/avg/max = 32/32/36 ms Ping success!

    ** This pings from interface 172.16.0.2 to 192.168.1.1 uses the static route defined on the previous

    step. The R1 router already knows the route to 172.16.0.2 so the ping works.

    On S1, test the connectivity to the 10.50.0.1 interface using ping

    S1>ping 10.50.0.1

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds:!!!!!uccess rate is 100 percent (5/5), round-trip min/avg/max = 32/33/36 ms Ping success!

    ** The ping works! Now that R2 knows the path to the 192.168.1.0/24 network, it is able to return the

    response to the ping.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    56/65

    www.subnet192.com5

    C i C C E N T

    L b G i d

    Around the world!

    On R1, create a static route to R3s 69.70.16.144/29 network, using the IP address

    of R2s interface as the next hop.

    R1(config)#ip route 69.70.16.144 255.255.255.248 172.16.0.2R1(config)#exit

    Test the connectivity to the 69.70.16.147 interface using ping

    R1#ping 69.70.16.147

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds:U.U.Uuccess rate is 0 percent (0/5) Ping failure!

    ** The ping fails! The packet is sent to R2 but R2 has no idea where to forward it to

    Create all the missing routes to make the lab fully connected

    To establish full connectivity, more static routes need to be configured. These are the routes that are

    missing to make the entire network fully connected.

    R1 needs to know about R2-R3s serial WAN link (the other two routes are already configured).

    R1(config)#ip route 172.16.1.0 255.255.255.252 172.16.0.2

    R2 needs to know about R3s Ethernet subnet (the other route is already configured).

    R2(config)#ip route 69.70.16.144 255.255.255.248 172.16.1.2

    R3 needs to know about R1s Ethernet subnet and R2s Ethernet subnet, and about the R1-R2 serial

    WAN link.

    R3(config)#ip route 192.168.1.0 255.255.255.0 serial 0/1R3(config)#ip route 10.50.0.0 255.255.255.0 serial 0/1R3(config)#ip route 172.16.0.0 255.255.255.252 serial 0/1

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    57/65

    www.subnet192.com57

    CiscoCCENT

    LabGuide

    Display the routing tables on each router

    R1#show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPi - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area* - candidate default, U - per-user static route, o - ODRP - periodic downloaded static route

    Gateway of last resort is not set

    69.0.0.0/29 is subnetted, 1 subnets

    69.70.16.144 [1/0] via 172.16.0.2 tatic route

    172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksC 172.16.0.0/30 is directly connected, Serial0/0

    172.16.1.0/30 [1/0] via 172.16.0.2 tatic route

    C 172.16.0.2/32 is directly connected, Serial0/010.0.0.0/24 is subnetted, 1 subnets

    10.50.0.0 [1/0] via 172.16.0.2 tatic route

    C 192.168.1.0/24 is directly connected, FastEthernet0/0

    R2#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route

    Gateway of last resort is not set

    69.0.0.0/29 is subnetted, 1 subnets69.70.16.144 [1/0] via 172.16.1.2 tatic route

    172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksC 172.16.0.0/30 is directly connected, Serial0/1

    C 172.16.1.0/30 is directly connected, Serial0/0C 172.16.0.1/32 is directly connected, Serial0/110.0.0.0/24 is subnetted, 1 subnets

    C 10.50.0.0 is directly connected, FastEthernet0/0192.168.1.0/24 [1/0] via 172.16.0.1 tatic route

    R3#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route

    Gateway of last resort is not set

    69.0.0.0/29 is subnetted, 1 subnetsC 69.70.16.144 is directly connected, FastEthernet0/0

    172.16.0.0/30 is subnetted, 2 subnets

    172.16.0.0 is directly connected, erial0/1 tatic route

    C 172.16.1.0 is directly connected, Serial0/110.0.0.0/24 is subnetted, 1 subnets

    10.50.0.0 is directly connected, erial0/1 tatic route

    192.168.1.0/24 is directly connected, erial0/1 tatic route

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    58/65

    www.subnet192.com5

    C i C C E N T

    L b G i d

    From S1, test the connectivity to any of the interfaces on the network

    ** Here we simply test the farthest connection available from S1 on the diagram, but all the internal

    networks are now reachable from any component of the network.

    S1>ping 69.70.16.147

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms

    From R3, do a traceroute to Switch 3

    R3#traceroute 192.168.1.7

    Type escape sequence to abort.Tracing the route to 192.168.1.7

    1 172.16.1.1 84 msec 84 msec 88 msec

    2 172.16.0.1 100 msec 100 msec 100 msec3 192.168.1.7 104 msec 100 msec *

    Create a default route on all routers to reach the internet

    R1(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0R2(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0R3(config)#ip route 0.0.0.0 0.0.0.0 FastEthernet 0/0

    Verify that the default route is now enabled on R3

    R3#show ip routeCodes: C - connected, - static, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route

    Gateway of last resort is 0.0.0.0 to network 0.0.0.0 Default route configured!

    69.0.0.0/29 is subnetted, 1 subnetsC 69.70.16.144 is directly connected, FastEthernet0/0

    172.16.0.0/30 is subnetted, 2 subnetsS 172.16.0.0 is directly connected, Serial0/1C 172.16.1.0 is directly connected, Serial0/1

    10.0.0.0/24 is subnetted, 1 subnetsS 10.50.0.0 is directly connected, Serial0/1

    S 192.168.1.0/24 is directly connected, Serial0/1* 0.0.0.0/0 is directly connected, FastEthernet0/0 Note the * next to the

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    59/65

    www.subnet192.com59

    CiscoCCENT

    LabGuide

    Configure name server 4.2.2.2 (DNS) on R3

    R3(config)#ip name-server 4.2.2.2

    Test internet connectivity from R3 using www.google.comas the destination

    R3#ping www.google.com

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 74.125.95.106, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 48/50/52 ms

    ** NOTE: You will not be able to ping or resolve internet addresses from any other device on the

    network. Remember that everything inside the network is using NON-ROUTABLE addresses. Until NAT is

    implemented on the network, no other device other than R3 can access the internet (it has a public

    address!).

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    60/65

    www.subnet192.com6

    C i C C E N T

    L b G i d

    Routing: RIP

    Objectives

    Creating all of the static routes was tedious work! Routing protocols allow much simpler management of

    routes.

    Tasks

    Remove all static routes created in the previous section on all routers. Use the running

    configuration to help you.

    Enable RIP on all the routers and advertise all the subnets

    Display the routing protocol information

    From R3, ping the S3 switch.

    Enable RIP debug mode to view RIP synchronization messages.

    Disable all debug information.

    Display the routing table.

    From S1, test the connectivity to any of the interfaces on the network.

    From R3, do a traceroute to Switch 3.

    Now that the internal network is fully operational, lets add external connectivity (note that there is NO

    protection (i.e. firewall or other) in this lab. Proceed at your own risk.)

    Create a default route on R3 for the internet interface and propagate it to other routers via RIP.

    Verify that the default route is now enabled on R3.

    Test internet connectivity from R3 using www.google.comas the destination address.

    Verify that other routers are receiving the default route via RIP.

    Attempt to perform all the tasks listed above before going through the walkthrough.

    Attempt to perform all the tasks listed above before going through the walkthrough.

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    61/65

    www.subnet192.com61

    CiscoCCENT

    LabGuide

    Walkthrough

    Remove all static routes created in the previous section

    Start by looking at the running configuration of each router

    R1#show run | include ip routeip route 0.0.0.0 0.0.0.0 Serial0/0ip route 10.50.0.0 255.255.255.0 172.16.0.2ip route 69.70.16.144 255.255.255.248 172.16.0.2ip route 172.16.1.0 255.255.255.252 172.16.0.2

    Then issue a no command in front of the ip route statement.

    S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R1(config)#no ip route 0.0.0.0 0.0.0.0 Serial0/0R1(config)#no ip route 10.50.0.0 255.255.255.0 172.16.0.2R1(config)#no ip route 69.70.16.144 255.255.255.248 172.16.0.2R1(config)#no ip route 172.16.1.0 255.255.255.252 172.16.0.2

    Repeat for the other two routers.

    Enable RIP on all the routers and advertise all the subnets

    R1(config)#router ripR1(config-router)#network 172.16.0.0R1(config-router)#network 192.168.1.0

    R2(config)#router ripR2(config-router)#network 172.16.0.0R2(config-router)#network 10.50.0.0

    R3(config)#router ripR3(config-router)#network 172.16.0.0

    Display the routing protocol information

    R1#show ip protocolsRouting Protocol is "rip"

    Sending updates every 30 seconds, next due in 11 secondsInvalid after 180 seconds, hold down 180, flushed after 240Outgoing update filter list for all interfaces is not setIncoming update filter list for all interfaces is not setRedistributing: ripDefault version control: send version 1, receive any versionInterface Send Recv Triggered RIP Key-chainFastEthernet0/0 1 1 2Serial0/0 1 1 2

    Automatic network summarization is in effect

    Maximum path: 4Routing for Networks:172.16.0.0192.168.1.0

    Routing Information Sources:Gateway Distance Last Update172.16.0.2 120 00:00:06

    Distance: (default is 120)

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    62/65

    www.subnet192.com6

    C i C C E N T

    L b G i d

    From R3, ping the S3 switch

    R3#ping 192.168.1.7

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 192.168.1.7, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms

    Enable RIP debug mode to view RIP synchronization messages

    R3#debug ip ripRIP protocol debugging is onR3#*Mar 25 14:31:07.639: RIP: received v1 update from 172.16.1.1 on Serial0/1*Mar 25 14:31:07.639: 10.0.0.0 in 1 hops*Mar 25 14:31:07.639: 172.16.0.0 in 1 hops*Mar 25 14:31:07.639: 172.16.0.1 in 1 hops*Mar 25 14:31:07.639: 192.168.1.0 in 2 hops

    *Mar 25 14:31:08.859: RIP: sending v1 update to 255.255.255.255 via Serial0/1(172.16.1.2)*Mar 25 14:31:08.859: RIP: build update entries - suppressing null update

    Disable all debug information

    R3#no debug allAll possible debugging has been turned off

    Display the routing table on R1

    R1#show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP

    D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPi - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area* - candidate default, U - per-user static route, o - ODRP - periodic downloaded static route

    Gateway of last resort is not set

    172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksC 172.16.0.0/30 is directly connected, Serial0/0

    R 172.16.1.0/30 [120/1] via 172.16.0.2, 00:00:24, erial0/0 RIP route

    C 172.16.0.2/32 is directly connected, Serial0/0R 10.0.0.0/8 [120/1] via 172.16.0.2, 00:02:38, erial0/0 RIP route

    C 192.168.1.0/24 is directly connected, FastEthernet0/0

  • 5/21/2018 Cisco ICND1 Lab Guide v1.0

    63/65

    www.subnet192.com63

    CiscoCCENT

    LabGuide

    From S1, test the connectivity to any of the interfaces on the network

    ** Here we simply test the farthest connection available from S1 on the diagram, but all the internal

    networks are now reachable from any component of the network.

    S1>ping 69.70.16.147

    Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms

    From R3, do a traceroute to Switch 3

    R3#traceroute 192.168.1.7

    Type escape sequence to abort.Tracing the route to 192.168.1.7

    1 172.16.1.1 84 msec 84 msec 88 msec

    2 172.16.0.1 100 msec 100 msec 100 msec3 192.168.1.7 104 msec 100 msec *

    Create a default route on R3 for the internet interface and propagate it to other

    routers via RIP

    R3(config)#ip route 0.0.0.0 0.0.0.0 fastEthernet 0/0R3(config)#router ripR3(config-router)#default-information originate

    Verify that the default route is now enabled on R3

    R3#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route

    Gateway of last resort is 0.0.0.0 to network 0.0.0.0

    69.0.0.0/29 is subnetted, 1 subnetsC 69.70.16.144 is directly connected, FastEthernet0/0

    172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks

    R 172.16.0.0/30 [120/1] via 172.16.1.1, 00:00:11, erial0/1 RIP route

    C 172.16.1.0/30 is directly connected, Serial0/1

    R 172.16.0.1/32 [120/1] via 172.16.1.1, 00:00:11, erial0/1 RIP route

    R 10.0.0.0/8 [120/1] via 172.16.1.1, 00:00:11, erial0/1 RIP route