28/6/ ICND1 Assesment Lab Free Cisco labs for CCNA, CCNP and CCIE students! Presented by René Molenaar - CCIE # HOME SHOP LABS BLOG. Below you will find all CCNA, CCNP and CCIE R&S labs that you are looking for, if you have trouble understanding some of these topics then you might enjoy. The following publication, CCNP Lab Workbook, is designed to assist version of INE's CCIE Routing & Switching Lab Workbook (IEWB-RS) Hardware.
|Language:||English, Spanish, Indonesian|
|ePub File Size:||21.74 MB|
|PDF File Size:||14.16 MB|
|Distribution:||Free* [*Regsitration Required]|
homeranking.info - Download as PDF File .pdf), Text File .txt) or read online. CCNP. CISCO CERTIFIED NETWORK PROFESSIONAL. LAB MANUAL Lab 1 – Basic EIGRP Configuration. R2. R1 Lab 2 – Configuring ip default-network. use by instructors in the CCNP TSHOOT course as part of an official Cisco Note: This lab uses Cisco routers with Cisco IOS Release (24)T1 and the.
You have done a great job. What command or commands can we use to find out the router ID? Layer3 S. Switch write erase or Switch erase startup-config Switch reload It is also important to clear any non-default vlans from the vlan database. I feel people like you, Jermey have done a great job. Reply Protozaur says April 7, at Hemant Rajak.
Reply HaHussle says November 9, at I need your help please. Reply farxad says November 18, at Loved it. Reply rsanjeev23 says March 1, at Reply ciscofreak23 says March 10, at Reply irfan says April 1, at Reply Protozaur says April 7, at Reply cscecela says June 7, at When I open it all it has is a.
Any help would be appreciated.
Reply e01estal says June 15, at Please advise? Reply Nagendrafreddie says July 22, at You have done a great job. I am aspiring to grow in networking domain. I have been studying CCNA stuff since 1. I some how feel my approach is not quite right.
But after going through this website I am little more con dent than before. Is it possible to clear CCNA with self study? I have lot of video stuffs, books etc. Its quite dif cult to nd the best teachers around.
I feel people like you, Jermey have done a great job. Reply jwmurphy says September 25, at Well done Rene!! Reply Skeem says January 17, at The PC wont open the le. Reply Anonymous says April 6, at Reply hkouadio says April 16, at Can anyone provide assistance on how to set the lab on Mac? And it says a mail has been sent to activate but I never receive any mail.
Would you please send me your guide lines? Regards, Nizam https: Neither downloads are working in GNS3 as is. Reply William Canache says September 10, at Muy buen Lab.
Reply Markus says October 7, at A little evil though It was interesting to gure that out. So I did everything myself rst, everything worked. I wanted to see what you did, so I imported the nal con g that you had.
I had a shock, the passwords did not work! Maybe that was just me Thanks! Reply James says May 28, at Reply Leave a reply: Logged in as threemillions.
Log out? Comment https: Check that you have full trunk connectivity between the switches in your Pod and that the two distribution switches can also connect to each other. Lab 3: Sh spanning-tree root Sh spanning-tree vlan Sh spanning-tree summary Spanning-tree mode pvst mst rapid-pvst Spanning-tree vlan root primary Spanning-tree vlan root secondary.
Before you begin any configuration changes. DSW1 needs to be the Root Bridge for vlans 1.
We are now tasked with controlling the Root Bridge location. Once you have completed this task re-examine the spanning-tree status of all your switches. Take a note of the port roles and states of each switch in your Pod. Example outputs using only default setting. Nbr Type How would you achieve this and did you see a change afterwards?
Output example after changing the Bridge Priorities. ASW1 sh spanning-tree vlan 1 Take note of which port is the root port. Then run an extended ping to either While the ping is running, unplug the cable located in the root port of the access switch. The ping should now fail while spanning-tree recalculates the new root port, approximately seconds will elapse before the ping starts working again. After plugging the cable back into the port you will notice that spanning-tree will go through the recalculation for a second time.
The following CLI command output can be used to identify the spanning-tree type of the switch and connecting switches. DSW1 must provide the first hop redundancy for clients located in vlan 2 and have a priority set to 50 greater than the default value used by DSW2. Lab 4: Next configure HSRP. Clients located in vlan 2 will have their default gateway address set to Both switches must take control of their respective standby groups and configure the devices so that the local router takes control over the active router if it has a higher priority.
DSW2 must provide the first hop redundancy for clients located in vlan 3 and again have a priority set to 50 greater than the default value used by DSW1. DSW1 Interface Vlan 2 DSW1 sh standby brief P indicates configured to preempt. The following shows the correct states of both switches. Output examples. DSW1 takes control and becomes the active device once more. DSW2 sh standby brief P indicates configured to preempt. Group 2 State is Active 4 state changes.
Group 3 State is Standby 3 state changes. DSW1 sh standby Vlan2. Standby router is local Priority default IP redundancy name is "hsrp-Vl" default. Remove the layer 2 etherchannel port. Lab 5: Layer 3 Etherchannel Lab Objective. Create a layer 3 etherchannel link without using any dynamic protocols.
Shut down interfaces Vlan2 and Vlan3 on both distribution switches. You are tasked with linking the two distribution switches via a layer 3 etherchannel interface. DSW1 sh etherchannel Channel-group listing: Lab 6: Switch Security Lab Objectives. Port security should be configured on all access switch ports which are not connected to other switches. Configure all access switches with the following features. Limit the maximum number of mac addresses on a port to 1. Mac addresses should be dynamically learnt and any address violation should be filtered and a trap message sent.
Create a VACL on the distribution switches to prevent any client in vlans 2 or 3 from performing Telnet sessions to any destination. IP access-list extended Show access-lists Show vlan access-map Spanning-tree portfast bpduguard default Switchport mode access Switchport nonegotiate Switchport port-security Vlan access-map NAME 10 Action drop Action forward Match ip address Switchport port-security violation restrict.
Lab 7: Confirm that the new voice vlans are supported across the trunk links. The catalyst and switches use different queuing policies when auto-qos is applied. Physical Topology. The lab equipment consists of a route pod. If there are odd numbers of students in the classroom a set of pre-defined configuration files are available and will require copying across into the routers located in pod 2.
Each lab will consist of a Lab Objective. Example Outputs and a completed Configuration File. Commands used in the lab. Switch write erase or Switch erase startup-config Switch reload Subsequent labs may rely on the previous lab working correctly.
Set all Ethernet ports to full duplex. Vty access should be protected by a password of cisco.
Each router must have a unique hostname. Set a password to protect privilege mode. Once the routers are connected you are required to perform the following tasks.
Give each interface the following IP address. Configure the point-to-point serial interfaces with a bandwidth and clock rate as close as possible to kpbs. Interfaces not used in the lab should be shutdown. Wire the routers together using the topology map shown on the lab introduction page and remember that students work in pairs but are responsible for their own pod. This process will be necessary for each router in POD2 and for every lab thereafter.
Using the topology diagram below configure the following tasks and parameters. How many neighbours would you expect to see on each router and why? Use the following parameters to complete the task.
Now execute the relevant command to prevent this summary from happening on all routers in your pod. You should observe a Using the relevant command observe and record the contents of the topology table and make careful note of the feasible and advertised distance of the remote networks on both routers. Security has recently become an issue within the organisation and you are now required to configure an authentication method between neighbouring routers within your pod only. Odd numbered router.
Network Feasible Distance Advertised Distance. Run the topology command again on both routers and observe any changes in the FD and AD values. I would now like you to reconfigure your odd numbered router to a bandwidth of kps and a delay of 10ms on the serial interfaces. Network Feasible Distance Advertised Distance Assuming that you have configured the correct bandwidth statement at both ends of the serial link connecting your two routers.
If you have correctly navigated through the final sections of the lab you should note. Even numbered router. Labs answers Show ip eigrp neighbors Only one neighbour.
Auto-summarisation at the classful boundary point is turned on by default. IS-IS level OSPF inter area N1. EIGRP external. Null0 BGP D. OSPF external type 2 i. IS-IS level-2 ia. OSPF external type 1. Null0 C IS-IS summary. With auto-summarization turned on R2 sh ip route Codes: Loopback0 IS-IS inter area.
R4 sh ip route Codes: R2 sh ip route Codes: With Auto-summarization turned off.
FD is via Using the same bandwidth and delay values. FD is via Connected. Then cut and paste the basic configurations back into each router using the following files. Implement OSPF in a single area.
Does OSPF perform auto-summarization like eigrp? Because of trust issues across the serial links configure a clear text authentication method. Inspect the routing table and identify any OSPF routes contained within. Enable OSPF on all routers inside your pod and use a process id which is the same as routers hostname number.
Quiz Question. Do you see any of the following entries. Remember to turn off the debug once you have seen the packet exchanges. O OIA OE2 you may see this type if you have loaded the pre-configured configuration files into the routers in pod 2 OE1 ON2 ON1 Because we only have a single backbone area we should only be able to observe entries that originate within our own area and labelled with an O tag.
Use the appropriate commands to verify that each router can see two neighbours and that they are exchanging routes. All interfaces should be explicitly identified when using the wildcard mask and placed into the backbone area.
To observe the initial OSPF exchange mechanism. What command or commands can we use to find out the router ID? Make a note of the router ID on each router.
I would now like you to control the router id manually using the routerid command. R1 We are now going to introduce an LSA type 5 external paths into OSPF by typing in the followings commands into the odd numbered routers only. Please set up the following values. Rx config ip route Remember that the backbone area can support LSA types 1. Now configure and guarantee that the lowest numbered router in your pod will always become the DR on the lan segment.
Execute the most appropriate command which will indicate what type of link state you have with your neighbours. Remember to save your configs before doing anything drastic. After setting these values check to see if the router id has changed. Verify this once you have completed this task. Each router is connected to its neighbours either by a FastEthernet connection or a serial link.
R1 sh ip route Codes: R3 sh ip route Codes: Results shown after the redistribution of the static route on the odd numbered routers. Remember the odd numbered routers will advertise their statics routes to their OSPF neighbours.
O E2 OSPF external type 2 Gateway of last resort is not set 1.
Reconfigure your routers to reflect the topology show in the diagram. If so what type and how is this indicated in the routing table?
Once all of the adjacencies are recovered.