Escolar Documentos
Profissional Documentos
Cultura Documentos
Permission is granted to
print and copy this document for non-commercial distribution and exclusive use by
instructors in the CCNA Discovery Designing and Supporting Computer Networks
course as part of an official Cisco Networking Academy.
CCNA Discovery
StadiumCompany Story
The Discovery Designing and Supporting Computer Networks course uses the fictional StadiumCompany
network upgrade story in the main text and media presentation and in Packet Tracer activities. StadiumCompany
is a stadium management company that manages a large sports facility.
When the sports facility was built, the network that supported its business offices and security services provided
state-of-the-art communications capabilities. Over the years, the company added new equipment and increased
the number of connections without considering the overall business goals and long-term infrastructure design.
Some projects went ahead without an understanding of the bandwidth, traffic prioritization, and other
requirements needed to support this advanced and business-critical network. Now the StadiumCompany
management wants to improve the customer experience by adding high-tech features and support for concerts,
but the underlying network cannot support these additions.
The StadiumCompany management understands that they do not have sufficient network expertise to support the
network upgrade. The StadiumCompany decides to hire network consultants to provide design, project
management, and implementation support. The project will be implemented in three phases. The first phase is to
plan the project and prepare the high-level network design. The second phase is to develop the detailed network
design. The third phase is to implement the design.
After a few meetings, StadiumCompany hires the NetworkingCompany, a local network design and consulting
firm to support the phase 1, high-level design. NetworkingCompany is a Cisco Premier Partner employing 20
network engineers who have various CCNA, CCDA, CCNP, CCDP, and CCIE certifications and significant
industry experience.
To create the high-level design, the NetworkingCompany first interviewed the staff at the stadium and developed
a profile of the organization and the facility.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 6
CCNA Discovery
Designing and Supporting Computer Networks
StadiumCompany Organization
The StadiumCompany provides the network infrastructure and facilities at the stadium. The StadiumCompany has
170 full-time people:
35 managers and executives
135 salaried personnel
Approximately 80 additional hourly workers are hired as needed to support events in the facility and security
departments.
Stadium
Management
Offices
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 6
CCNA Discovery
Designing and Supporting Computer Networks
The stadium is approximately 725 feet wide by 900 feet long (approximately 220 meters wide by 375 meters
long). There are two levels. Because of the size of the facility, multiple wiring closets connected with fiber-optic
cabling are distributed throughout the stadium.
The Team A and Team B locker rooms and player lounges are on the first level of the south side of the stadium.
The team offices are on the second level and measure 50 feet x 200 feet (approximately 15 meters wide by 60
meters long)
The office and locker room of the visiting team are also located on the first level.
StadiumCompany offices are in the north side of the stadium on both levels. The office space on the first level
measures 200 feet x 60 feet (approximately 60 meters wide by 18 meters long), and measures 200 feet x 50 feet
(approximately 60 meters wide by 15 meters long) on the second level.
Team A and Team B are in different sports leagues with different seasons. They both contract with the
StadiumCompany for offices and services at the stadium.
Team A Organization
Team A has 90 people in the organization:
4 executives
12 coaches
14 support staff (including doctors, masseuse, secretary, assistants, finance and accounting)
60 players
Team A has 15 offices in the stadium to support their non-player staff. Five of these offices are shared. There are
24 PCs and 28 phones installed in the offices.
Team A also has a player locker room and a large player lounge and workout room. The non-player staff uses the
facility year round. Players have access to the locker room and workout equipment both during the season and
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 6
CCNA Discovery
Designing and Supporting Computer Networks
the off-season. There are 5 phones in the locker room, and 15 phones in the player lounge. There are rumors that
Team A recently installed a wireless hub in the player lounge.
Team B Organization
Team B has 64 people in the organization:
4 executives
8 coaches
12 support staff (including doctors, masseuse, secretary, assistants, finance and accounting)
40 players
Team B has 12 offices in the stadium to support their non-player staff. Three of the offices are shared. There are
19 PCs and 22 phones installed in the offices. They also have a player locker room and a large player lounge.
The non-player staff uses the facility year round. Players have access to the locker room and workout equipment
both during the season and the off season. There are 5 phones in the locker room, and 15 phones in the player
lounge.
Concession Vendor
A concession vendor manages the concessions provided at games and events. There are five full-time
employees. They use two private and two shared offices with five PCs and seven phones. These offices are
located on the south side of the stadium between the Team A and Team B office space. Two part-time employees
take orders from the luxury boxes during events. The concession vendor uses seasonal hourly workers to support
32 permanent concession stands and other services distributed throughout the stadium. At this time, there are no
phones or PCs in the concession areas.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 6
CCNA Discovery
Designing and Supporting Computer Networks
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 6
CCNA Discovery
Designing and Supporting Computer Networks
The stadium is connected to the local ISP using ISP1, a managed services router owned by the ISP. The two
remote sites have a connection to the same ISP supported by the ISP2 and ISP3 routers provisioned and
managed by the ISP. This connection provides the remote sites access to the databases located on servers in the
StadiumCompany management offices. The StadiumCompany also has a perimeter router named Edge Router
that connects to the ISP1 router at the stadium.
StadiumCompany Plans
The StadiumCompany wants to add new services, such as video, to their network. They are also thinking about
replacing the existing digital voice PBX. They would like better access to their existing security camera network.
Two new remote sites are planned in the near future:
A film production company that has been hired to provide video during and after the sporting events and
concerts needs to connect to the stadium network to exchange files.
Team A is expanding to a remote office location. They are requesting access to the same network resources
that they use on the stadium LAN.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 6
1.2.1
1.2.3
1.3.1
1.3.2
1.3.4
1.4.1
1.4.2
1.5.1
1.5.3
3.1.1
3.1.3
3.1.4
3.2.4
3.3.3
3.4.3
5.2.2
5.3.2
5.3.4
5.5.3
6.1.1
6.1.2
6.1.3
6.2.3
6.2.5
7.1.4
7.2.2
7.2.3
7.2.4
7.2.5
7.3.2
7.3.4
8.1.2
8.2.5
3
2
3
2
3
4
2
2
2
5
2
3
4
2
3
3
2
2
2
4
2
2
4
3
3
3
2
2
2
3
3
3
4
CCNA Discovery
Designing and Supporting Computer Networks
Objectives
Compare the routing tables of a partial mesh topology with a full mesh topology
Observe the convergence of the network when an interface is shut down and brought back up
Examine the EIGRP packets in the Simulation Mode as the network converges
Background / Preparation
You have been provided with a partial mesh and a full mesh topology to examine in this exercise. The interfaces
have been addressed and EIGRP has been configured as the routing protocol. All necessary configuration
commands have been entered into the routers and the networks are fully functional.
Required file: Comparing Mesh Topologies.pka
Step 1: Compare the routing tables of the partial mesh and full mesh topology
a. Use the Inspect tool
to examine the routing table on HQP and HQF.
b. Notice the difference in the number of routes in each table.
c. Record the routes to 192.168.0.204 network on HQP and the routes to the 172.16.3.196 network on HQF.
Routes to 192.168.0.204
_______________________________________________________________________________________
_______________________________________________________________________________________
Routes to 172.16.3.196
_______________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
_______________________________________________________________________________________
Step 2: Examine the routing table and observe the convergence of a partial mesh topology
a.
b.
c.
d.
e.
Shut down the interface S0/0/1 on BR2P and observe the routing table on HQP.
Note that two routes to the 192.168.0.204 network were removed.
Bring the interface S0/0/1 back up and observe the routing table on HQP.
Observe the convergence of the network (it may take a minute for both routes to be re-installed).
Examine the routing table on HQP again. Which interface is used to reach network 192.168.0.160?
f.
______________________________________________________________________________________
On router BR2P, shut down the interface S0/0/0. How will HQP get to the 192.168.0.160 network now?
______________________________________________________________________________________
g. Bring interface S0/0/0 on BR2P back up and observe the convergence of the network (it may take a
minute).
h. What happens to the routes to the 192.168.0.160 network that were in the routing table?
i.
______________________________________________________________________________________
Repeat Step 2 process in the Simulation Mode with only the EIGRP filter active. Use the Capture /
Forward button to examine the EIGRP packets and routing table as the network converges.
Step 3: Examine the routing table and observe the convergence of a full mesh topology
a.
b.
c.
d.
e.
Shut down the interface S0/0/1 on BR2F and observe the routing table on HQF.
Note that two routes to the 172.16.3.196 network were removed.
Bring the interface S0/0/1 back up and observe the routing table on HQF.
Observe the convergence of the network (it may take a minute for both routes to be re-installed).
Examine the routing table on HQF again. Which interface is used to reach network 172.16.3.128?
f.
_____________________________________________________________________________________
On router BR2F, shut down the interface S0/0/0. How will HQF get to the 172.16.3.128 network now?
_____________________________________________________________________________________
g. Bring interface S0/0/0 on BR2F back up and observe the convergence of the network (it may take a
minute).
h. What happens to the routes to the 172.16.3.128 network that were in the routing table?
i.
_____________________________________________________________________________________
Repeat Step 3 process in the Simulation Mode with only the EIGRP filter active. Use the Capture /
Forward button to examine the EIGRP packets and routing table as the network converges.
Reflection
1. On router BR2P, when you shut down the interface S0/0/0, why was the one original route to the
192.168.0.160 network replaced with two routes?
______________________________________________________________________________________
______________________________________________________________________________________
2. What are the advantages and disadvantages of a full mesh topology?
_____________________________________________________________________________________
_____________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objectives
Connect and configure WAN connections
Configure EIGRP to advertise specific networks
Observe the convergence of the network through the CLI window when an interface is shut down and
brought back up
Examine the EIGRP packets in the Simulation Mode as the network converges
Background / Preparation
You have been provided a topology in which HQ, Branch1, Branch2, and Branch3 are pre-configured. A new
router has been added to the topology (New_Branch) that is partially configured. You will need to connect
New_Branch to HQ and Branch1, complete the configuration of the new router, and then examine the
convergence of the network.
Required file: Observing Network Convergence.pka
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
a. Configure New_Branch with EIGRP and the autonomous system number 3
b. Advertise specifically the directly connected networks
Reflection
1. What output was shown in the CLI window once EIGRP had converged?
______________________________________________________________________________________
______________________________________________________________________________________
2. When the WAN link between HQ and New_Branch went down, what happened to the EIGRP packets on
the New LAN?
_____________________________________________________________________________________
_____________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Demonstrate the functions performed by the Distribution Layer devices.
Background / Preparation
VLANs can be added to a network for security purposes and traffic control. Devices on separate VLANs are
unable to communicate unless a router has been configured to help with this communication. Observe how
packet filtering and route summarization traverse the network using simulation mode.
Required file: Demonstrating Distribution Layer Functions
Step 1: Setup Simulation filters to capture routing protocols
a.
b.
c.
d.
e.
f.
Step 2: Test connectivity between the network devices using Realtime mode.
a. From PC0 ping PC1, PC2, PC3, and PC4.
b. From PC1 ping PC0, PC2, PC4, PC3
Step 3: Test connectivity between the network devices using Simulation mode
a. Switch from Realtime mode to Simulation mode.
b. Create a simple PDU from PC0 to PC1. Click Capture/Forward until the PDU has made the complete trip
to PC1 and back.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
c. In the event list view the PDU events.
d. Create another PDU from PC0 to PC2.
Reflection
a. Why cant PC0 communicate with PC1 but PC1 can communicate with PC0s default gateway?
c.
Why must a router be in the topology to have communication between the VLANs?
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
a. Observe the flow of network traffic in different topologies
b. Observe the change of flow in network traffic when a point of failure is introduced into the network
Background / Preparation
This activity has three different topologies: a partial mesh, a star, and a full mesh. When this activity is started,
you will need to allow time for each network topology to converge. This may take several minutes. Once
the networks have converged, you will note the following:
a. The partial mesh topology will have one link light on the PM4 switch that remains amber.
b. The star topology will have all the link lights green.
c. The full mesh topology will have three link lights amber; one on the FM1 switch and two on the FM3
switch.
Required file: Investigating Failure Domains.pka
In the partial mesh and full mesh topology the network has redundant links. However, in order to avoid switching
loops some of the links have been shutdown as noted by the amber link light. Note that the star topology does not
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 3
CCNA Discovery
Designing and Supporting Computer Networks
have redundant links between switches. Why are all of the link lights green in this topology?
___________________________________________________________________________
Good Distribution Layer design can limit the parts of the network that are affected by a network failure. The failure
of a single device should not cause the network to go down. In this activity you will observe the flow of the
network traffic in each topology. Then you will introduce a point of failure in each network topology by deleting a
trunk link between two switches. Once the link is removed, you will need to allow time for the network to reconverge. After the network has re-converged, you will again observe the flow of traffic and note how the network
failure affected the flow of traffic.
Reflection
1. How was the effect of the network failure in the star topology different from the partial mesh and full mesh
topologies?
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 3
CCNA Discovery
Designing and Supporting Computer Networks
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2. What effect did the removal of the link in the star topology have on the hosts that were attached to the
Star2 switch?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 3
CCNA Discovery
Designing and Supporting Computer Networks
Objectives
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Background / Preparation
This activity demonstrates how the flow of network traffic is affected by applying an ACL to permit or deny traffic in
the network. The network administrator has decided that all external web traffic goes only to the Web server.
Also, in order to protect the data o their employees, the HR server is only accessible to HR employees.
Therefore, ACLs will need to be implemented on the network. Another network technician has already configured
the necessary ACLs on both the Gateway and Distribution2 routers. However, the ACLs have not been applied to
an interface. You have been asked to apply the ACLs and verify that the appropriate traffic is permitted or denied.
Required file: Placing ACLs
Step 2: Examine the Access Control Lists that are configured on the routers
a. Access the Distribution1 router. Use the following commands to view the ACL that has been configured
on the Distribution1 router:
show running-config
show access-lists 1
b. Access the Gateway router. Use the following commands to view the ACL that has been configured on
the Gateway router:
show running-config
show access-lists 100
Reflection
1. How can ACLs be used to control the flow of network traffic?
_______________________________________________________________________________________
2. By default, what is always the last statement in an ACL?
_______________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Describe the function of the Network Access Layer including equipment usually installed in the wiring closets.
Background / Preparation
Equipment installed at the Network Access Layer usually consists of Layer 2 switches. These switches
connect to workgroup servers, workstations, and other end user equipment. The Network Access Layer
switches then connect to Layer 3 devices, such as routers and multi-layer switches, at the Network
Distribution Layer.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
A new office space is being created for users in the Sales and Marketing departments of an organization, the
PCs have been set up and configured in the office area and a Layer 2 switch has been installed in the wiring
closet. You will connect the switch to the end user devices and to the router in the Network Distribution Layer.
You will then configure the switch and verify connectivity to key devices in the network.
Required file: Exploring Access Layer Functions.pka
Using the proper cable, connect PC Marketing2 to the next interface on switch Access1B.
Using the CLI on switch Access1B, configure the interface that connects to PC Marketing2 to carry
traffic for all only VLAN 21.
d. Check your configuration using the Check Results button. Correct any errors in the configuration.
From the Web Browser on PC Sales2, request a web page from URL http://www.Discovery.com (in
Packet Tracer the URL is case sensitive). The page should be displayed.
d. Switch to Simulation mode. From the Web Browser on PC Sales2 click the Go button to request
the page again. Click the Auto Capture / Play button to observe the flow of traffic from the Access
layer through the hierarchical network to the server farm.
Step 4: Reflection
a. Why are the Sales and HR servers connected to the network at the Access Layer?
b. If you wanted to restrict access to the HR server which hierarchical network layer would you place the
necessary configuration?
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Background / Preparation
You have been given the task of designing a network using a star topology. The star topology is one with a
central point of connectivity. The central device should be a switch.
Required file: Creating Topologies.pka
Step 2: Reflection
a. What outcome would there be if a hub had been used instead of a switch?
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
____________________________________________________________
____________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Observe and record the way in which traffic moves to and from the servers on the network.
Background / Preparation
An enterprise has installed servers containing sales and human resources information at the Access Layer of
their network and an intranet web server and a DNS server in a server farm off of the Core Layer of the
network. This activity will observe the flow of traffic between a typical PC at the Access Layer and three of
the servers in the network.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
From the desktop of PC HR2, ping the Web server at IP address 192.168.0.3.
Step 2: Observe and record the way traffic moves in the network.
a. Switch to Simulation mode. Click the Auto Capture / Play button to send a packet between PC
HR2 and the HR server and back. Count the number of intermediate devices the packet passes
through.
b. Switch to scenario To Sales. Click the Auto Capture / Play button to send a packet between PC
HR2 and the Sales server and back. Count the number of intermediate devices the packet passes
through.
c.
Switch to scenario To Web. Click the Auto Capture / Play button to send a packet between PC HR2
and the Web server and back. Count the number of intermediate devices the packet passes through.
Step 3: Reflection
a. Based on your observations, what be would two advantages of putting all of the servers in the server
farm?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Background / Preparation
The physical topology of the first network (Topology 1) has been designed without redundancy. To test the fault
tolerance of the network, links should be removed to test the effect on the network and to determine if the network
can recover from the removed link.
The physical topology of the second network (Topology 2) has been designed and redundancy has been
incorporated into the design. To test the fault tolerance of the network, links should be removed to test the effect
on the network and to determine if the network can recover from the downed link.
Required file: Using Redundant Links on Server Farm Devices.pka
Step 1: Examine the network and the status of the links in Topology 1
a.
b.
c.
d.
Examine Topology 1
View the network and the active links within the network.
Note which links are active and which links are blocked.
Open PC1-A. At the command prompt, enter a command to send 100 ICMP requests to Server Web-A.
The command format is ping n 100 192.168.2.3.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Step 3: Examine the network and the status of the links in Topology 2
a. Examine Topology 2.
b. View the network and note the active links within the topology.
c. Open PC1-B. At the command prompt, enter a command to send 100 ICMP requests to Server Web-A.
The command format is ping n 100 192.168.4.3
d. Open PC2-B. At the command prompt, enter a command to send 100 ICMP requests to Server
Marketing-B. The command format is ping n 100 192.168.4.6.
Reflection
a. Using the network without redundant equipment, what advantage would be gained by adding 1 additional
switch to the design?
________________________________________________________________
________________________________________________________________
________________________________________________________________
b. When a network is designed to have redundancy and Spanning Tree is disabled on the Layer 2 switches,
what effect would it have on the network?
_________________________________________________________________
_________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Use router and switch commands to obtain information about an existing network.
Background / Preparation
You have been given the task of documenting a large campus network. When you arrive at the site you
discover that the network administrator is not available and he has the only keys to the wiring closets and the
cabinets containing the existing network documentation. Since information on the network is needed as soon
as possible, you decide to discover as much information as possible using router and switch commands.
You are given access to the administrators PC and are told that the Telnet access password for all devices is
cisco and the password to enter privileged exec mode is class.
Issue IOS commands such as show running-config, show ip route, show interfaces, show ip
interface brief, show version and other commands to learn about the device.
d. Issue IOS commands such as show cdp neighbors and show cdp neighbors detail to discover
information about connected devices. It may take a few minutes for the network to converge. If you do
not see any neighboring devices initially, repeat the command until you do.
e. Document the information you gather in the appropriate table below.
f.
To not overuse the resources of Packet Tracer, do not Telnet from device to device. Always exit to
the command prompt before accessing the next device.
d. Repeat the process until all devices in the network are discovered and documented.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 10
CCNA Discovery
Designing and Supporting Computer Networks
e. As you work, sketch out a diagram of the network devices and their interconnections.
Device Tables:
Router
Hostname _________________________
Model _________________________ IOS version ______________________________
Interface
IP Address
Subnet Mask
Connects to Device
Connects to Interface
Router
Hostname _________________________
Model _________________________ IOS version ______________________________
Interface
IP Address
Subnet Mask
Connects to Device
Connects to Interface
Router
Hostname _________________________
Model _________________________ IOS version ______________________________
Interface
IP Address
Subnet Mask
Connects to Device
Connects to Interface
Router
Hostname _________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Model _________________________ IOS version ______________________________
Interface
IP Address
Subnet Mask
Connects to Device
Connects to Interface
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 7 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
Switch
Hostname _________________________
Model _________________________ IOS version ______________________________
IP Address _______________________ Subnet Mask __________________________
Default Gateway ________________________
Trunk Ports
Connects to Device
Connects to Interface
VLAN Number
VLAN Name
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 8 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Network Diagram:
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 9 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Step 3: Reflection
a. We used this technique to discover and document a campus LAN. Would the same technique work
for an enterprise network that included WAN links?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. Could we use this technique in a network that included routers and switches from a manufacturer
other than Cisco? Why or why not?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 10 of 10
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Use a logical network diagram of the existing network to create a modularized view of the network.
Background / Preparation
Start with the logical diagram showing the critical network devices and representative user devices. Group
the devices by their role within the network design hierarchy.
The final step is to create the modular block diagram of the network.
Required file: Creating Modular Block Diagrams.pka
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Step 1: Group the devices by their role within the network design hierarchy.
a. Using the Palette tool (second button from the right on the Main Tool Bar), drag an ellipse to
highlight the client devices in pink.
b. Using the Palette tool, drag an ellipse to highlight the access layer devices in light blue.
c.
Using the Palette tool, drag an ellipse to highlight the distribution layer devices in light green.
d. Using the Palette tool, drag an ellipse to highlight the core layer devices in yellow.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Access
Distribution
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Step 3: Reflection
a. Why is it important to group devices by their role within the network design hierarchy to analyze an
existing network?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. What is an advantage of describing a network using a modular block diagram instead of in a narrative
fashion?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Identify and document the strengths and weaknesses of the existing network.
Background / Preparation
In the previous activity you created a modular block diagram of the Film Company network. The next step is
to examine the physical layout of the devices in the network, the cabling plant and the device configurations to
identify and document the strengths and weaknesses of the existing network.
Packet Tracer provides a limited physical view of the network where devices are placed in wiring closets in
various buildings in various cities. The physical view in this activity represents the building containing the Film
Company and the building containing their ISP located in the same city. The Film Company building contains
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 4
CCNA Discovery
Designing and Supporting Computer Networks
a wiring closet containing the MDF and POP that serves the general office functions and a wiring closet for
the production area. Since all devices must be placed in wiring closets, wiring closets containing typical
clients devices used by the general office staff and the production staff have been placed in the approximate
center of their respective areas. There is a conference room that is also used by visitors with wireless laptop
computers that is represented by a wiring closet in its center. Assume all cabling in the Film Company
building is category 5 UTP.
Enter each of the wiring closets and note where the various client devices and network devices are
located.
Look for information on the speed of various links, passwords, traffic filtering and any other
information you can gather.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Network Ratings:
Lowest
1
Highest
2
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Step 4: Reflection
a. List the strengths of the existing network.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. List the weaknesses of the existing network.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Objectives
Background / Preparation
You have been asked to upgrade a Cisco 1841 router with the latest IOS image to support encryption. The
network administrator has informed you that the necessary IOS image has already been downloaded to the
Network_Server. It is your task to verify the current IOS image and install the new image through the TFTP server
that is installed on the network server. You will also need to configure the router to use the new IOS image.
Required file: Installing Cisco IOS Software
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
g. You will be prompted for the destination filename. The default filename will appear in brackets as shown:
[c1841-ipbasek9-mz.124-12.bin]
h. Press Enter to accept the default name.
i. The image should now begin transferring from the server and you should see output that resembles the
following:
Accessing tftp://192.168.1.10/c1841-ipbasek9-mz.124-12.bin....
Loading c1841-ipbasek9-mz.124-12.bin from 192.168.1.10:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!
[OK - 16599160 bytes]
16599160 bytes copied in 16.126 secs (230327 bytes/sec)
Router#
Step 5: Verify that the proper image is loaded when the router boots up
a. Save the current router configuration to NVRAM
b. Restart the router by entering the following command:
Router#reload
c. Allow the router to reboot completely, then enter the privileged EXEC mode
d. Use the following command to verify that the proper IOS image was loaded when the router booted up:
Router#show version
e. Check your answer by clicking the Check Results button.
Reflection
a. Why would you want to have access to multiple IOS images on a router?
______________________________________________________________________________________
______________________________________________________________________________________
b. What are two other locations that a router will look to obtain an IOS if it cannot locate one in flash?
_____________________________________________________________________________________
_____________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Reflection
a. The ability to add different modules allows for flexibility with networking devices. What type of
connectivity will adding a WIC-2T module allow?
_________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
_________________________________________________________________
_________________________________________________________________
b. What would happen to your existing configuration if you move a module from Slot 1 to Slot 2?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Background / Preparation
A wireless network consists of one or more wireless access points to provide coverage for wireless clients in
an office environment. The goal of the site survey is to find the optimal number and placement of access
points to provide coverage where it is needed and, for security reasons, to minimize coverage where it is not
needed. We will use the tools available in Packet Tracer to simulate a site survey of a one story office
building with two access points installed in the ceiling.
The Linksys WRT300N wireless access routers are used to simulate access points installed in the ceiling, a
PC with a Linksys WMP300N interface installed is used to simulate a laptop computer with wireless capability.
Required file: Placing Wireless Access Points.pka
Click the Physical Workplace tab in the upper left hand corner of the interface. Click on the Home
City to enter it. The crosshatch ovals represent areas of wireless coverage. Note the areas outside
of the Corporate Office that have coverage.
d. Click on the Corporate Office to enter it. Observe the areas of coverage inside the building and the
placement of the access points and the Wireless PC. In a real environment the wireless coverage
areas would be invisible. Mark the location of the access points on the Building Diagram below. Mark
the location if the Wireless PC and note the signal strength for each access point.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 3
CCNA Discovery
Designing and Supporting Computer Networks
e. Move the Wireless PC to different locations around the office. For each location, access the Wireless
PC window and click the Refresh button. Note on the Building Diagram, at each location, the access
points (if any) and their signal strength. Minimize the Wireless PC window.
f.
Building Diagram:
Step 3: Reflection
a. If the coverage shown in the Physical view represents the maximum power output of the access
point, could the building be covered by a single access point?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. On real equipment, what else could be done to minimize coverage outside of the building?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 3
CCNA Discovery
Designing and Supporting Computer Networks
c.
What types of problems would you encounter when you have overlapping coverage of access points
using the same channel?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 3
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Design and diagram the Distribution Layer topology to support given network business and technical
requirements.
Select the appropriate media, cables, ports, and connectors to connect switches to other network
devices and hosts
Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 3
CCNA Discovery
Designing and Supporting Computer Networks
Why is Spanning Tree Protocol necessary where there are redundant links?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Background / Preparation
Equipment installed at the Network Distribution Layer usually consists of multi-layer, modular switches that
connect to Layer 2 Access Layer switches through redundant links. These Distribution Layer switches then
connect to Core Layer devices, also through redundant links. Spanning Tree Protocol allows these redundant
connections without the problems associated with switching loops.
Packet Tracer only supports devices typically found in the CCNA academy lab bundle, not the type of
switches typically used at the Network Distribution Layer. We will use regular Layer 2 switches to represent
these switches as we connect the redundant links between the Access and Distribution Layer switches and
observe the operation of Spanning Tree Protocol.
Required file: Connecting Access and Distribution Layer Switches.pka
Step 1: Connect the Access Layer switches to the Distribution Layer switches.
a. Using the proper cables, connect the first interface on switch Access1 to the first interface on switch
Distribution1 and the second interface on switch Access1 to the first interface on switch
Distribution2.
b. Using the proper cables, connect the first interface on switch Access2 to the second interface on
switch Distribution1 and the second interface on switch Access2 to the second interface on switch
Distribution2.
c.
Using the proper cables, connect the first interface on switch Access3 to the third interface on switch
Distribution1 and the second interface on switch Access3 to the third interface on switch
Distribution2.
d. Using the proper cables, connect the first interface on switch Access4 to the fourth interface on
switch Distribution1 and the second interface on switch Access4 to the fourth interface on switch
Distribution2.
e. Check your configuration using the Check Results button. Correct any errors in the configuration.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 3
CCNA Discovery
Designing and Supporting Computer Networks
Step 3: Reflection
a. Why do you think Spanning Tree Protocol blocked the links that it did?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. Would Spanning Tree Protocol be necessary if we used routers at the Network Distribution Layer?
Why or why not?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 3
CCNA Discovery
Designing and Supporting Computer Networks
Objective
The show commands are very powerful commands for troubleshooting and monitoring networks. They give a
static image of the network at a given time. The use of a variety of show commands will give a clear picture of
how the networking is communicating and transferring data.
Background / Preparation
The physical topology of the network has been designed using Frame Relay. To test the network connectivity,
use a variety of show commands.
Required file: Examining WAN Connections.pka
Step 1: Examine the configuration of Branch1 and Branch2.
a. Click on Branch1 and use various show commands to view the connectivity to the network.
b. Use the show running-configuration command to view the router configuration.
c. Use the show ip interface brief command to view the status of the interfaces.
d. Use the various show frame-relay map, show frame-relay pvc, and show frame-relay lmi commands
to see the status of the Frame-relay circuit.
e. Click on Branch 2 and use various show commands to view the connectivity to the network.
f. Use the show running-configuration command to view the router configuration.
g. Use the show ip interface brief command to view the status of the interfaces.
h. Use the various show frame-relay map, show frame-relay pvc, and show frame-relay lmi commands
to see the status of the Frame-relay circuit.
Step 2: Examine the configuration of Main.
a. Click on Main and use a variety of show commands to view the connectivity to the network.
b. Use the show running-configuration command to view the router configuration.
c. Use the show ip interface brief command to view the status of the interfaces.
d. To view the status of the frame-relay configurations use the show frame-relay lmi, show frame-relay
map, and show frame-relay pvc commands.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Reflection
a. In what situations would it be beneficial to use the various show commands?
________________________________________________________________________________
________________________________________________________________________________
b. What beneficial information can be obtained from the various show commands?
________________________________________________________________________________
________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Observe the network behavior using static and default routing only and compare it to the behavior of dynamic
routing.
Background / Preparation
In this exercise, you will observe what the adaptability of dynamic routing compared to static and default routing.
The Ticket Sales Office network is currently configured using static and default routing.
Required file: Observing Static and Dynamic Routing.pka
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Reflection
1. What are the advantages of using dynamic routing? Static and default routing?
________________________________________________________________________________
________________________________________________________________________________
2. The static routes in this lab were set with an administrative distance of 130. What would have
happened if they were set at 30? At 230?
________________________________________________________________________________
.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Background / Preparation
As part of an IT staff, you have been asked to work with the network designer to define the firewall rule set to
be implemented in the new network design. The firewall rule set dictates the exact types of network activity
permitted. As the designer of a network, you are responsible for the first line of security on the network. The
security policies will dictate which users and groups are permitted access to what resources, and what type of
access is denied. When designing firewall rule sets and access control lists, the general policy is to deny all
traffic that is either not specifically authorized or is not in response to a permitted inquiry. Each firewall rule set
may require more than one ACL statement and may require both inbound and outbound placement. In this
scenario, you will be creating a sampling of ACLs that might be applied in a firewall rule set.
Required file: Implementing Access Control Lists.pka
Issue IOS commands such as show running-config, show ip route, show interfaces, show ip
interface brief, show version and other commands to learn about the device.
d. Issue IOS commands such as show cdp neighbors and show cdp neighbors detail to discover
information about connected devices. It may take a few minutes for the network to converge. If you do
not see any neighboring devices initially, repeat the command until you do.
e. Document the information you gather in the appropriate table below.
f.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
To not overuse the resources of Packet Tracer, do not Telnet from device to device. Always exit to
the command prompt before accessing the next device.
d. Repeat the process until all devices in the network are discovered and documented.
e. As you work, sketch out a diagram of the network devices and their interconnections.
Step 3: Examine the Access Control Lists that are configured on the routers
a. Click on the CLI tab on Edge1 to examine the ACLs that have been configured
b. Use the following commands to view the ACLs that have been configured on the routers:
show running-config
show access-lists 100
After examining the ACLs determine where the ACLs should be applied
The ACL must be applied to an interface before it will affect the network traffic
Remember that only one ACL per port, per protocol, per direction is allowed.
Using the CLI mode, apply the ACL to the appropriate interface on the Edge1 router
Reflection
1. With the current ACL applied, would you be able to Telnet from the Outside PC to the Edge1 router at
172.16.1.2? Why?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. Why is it always necessary to have at least one Permit statement in an ACL?
_______________________________________________________________________________________
_______________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2
CCNA Discovery
Designing and Supporting Computer Networks
R2
R3
R4
R2 HostA
R2 HostB
R2
Printer-A
R2 HostC
R2 HostD
R3 HostA
R3 HostB
R3
Printer-B
R3 HostC
R3 HostD
R4 HostA
R4 HostB
R4
Printer-C
R4 HostC
R4 HostD
Interface
S0/0/0
S0/0/1
S0/1/0
Fa0/0
S0/0/0
Fa0/0
S0/0/0
Fa0/0
S0/0/0
NIC
IP Address
Subnet Mask
Default Gateway
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
NIC
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 5
CCNA Discovery
Designing and Supporting Computer Networks
Learning Objectives
Introduction
In this lab, you have been given the IP addresses included in 192.168.8.0/22. Use this range of IP addresses to
subnet and provide the IP addressing for the network. The network has the following addressing requirements:
The WAN links between each of the routers will require an IP address for each end of the link.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 5
CCNA Discovery
Designing and Supporting Computer Networks
Fill in the following chart with the subnet information.
Subnet Number
Subnet IP
First Usable
Last Usable
Broadcast Address
0
1
2
3
4
5
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 5
CCNA Discovery
Designing and Supporting Computer Networks
Step 5. Assign and configure addresses on the host devices (PCs and Printers) of R2.
1.
2.
3.
4.
5.
Assign and configure the second valid host address in the R2 LAN subnet on R2 Host-A.
Assign and configure the third valid host address in the R2 LAN subnet onR2 Host-B.
Assign and configure the fourth valid host address in the R2 LAN subnet on Printer-A.
Assign and configure the fifth valid host address in the R2 LAN subnet on R2 Host-C.
Assign and configure the sixth valid host address in the R2 LAN subnet on R2 Host-D.
Step 6. Assign and configure addresses on the host devices (PCs and Printers) of R3.
1.
2.
3.
4.
5.
Assign and configure the second valid host address in the R3 LAN subnet on R3 Host-A.
Assign and configure the third valid host address in the R3 LAN subnet on R3 Host-B.
Assign and configure the fourth valid host address in the R3 LAN subnet on Printer-B.
Assign and configure the fifth valid host address in the R3 LAN subnet on R3 Host-C.
Assign and configure the sixth valid host address in the R3 LAN subnet on R3 Host-D.
Step 7. Assign and configure addresses on the host devices (PCs and Printers) of R4.
1.
2.
3.
4.
5.
Assign and configure the second valid host address in the R4 LAN subnet on R4 Host-A.
Assign and configure the third valid host address in the R4 LAN subnet on R4 Host-B.
Assign and configure the fourth valid host address in the R4 LAN subnet on Printer-C.
Assign and configure the fifth valid host address in the R4 LAN subnet on R4 Host-C.
Assign and configure the sixth valid host address in the R4 LAN subnet on R4 Host-D.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 5
CCNA Discovery
Designing and Supporting Computer Networks
Task 7: Reflection
1. How many IP addresses in 192.168.8.0/22 are wasted in this design?
2. What change(s) could be made to this IP addressing scheme to be more efficient?
3. Would route summarization have occurred in a non-hierarchical design?
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 5
CCNA Discovery
Designing and Supporting Computer Networks
R2
R3
R4
R2
Host-A
R2
Host-B
Printer0
R2
Host-C
R2
Host-D
R3
Host-A
R3
Host-B
Printer1
R3
Host-C
R3
Host-D
R4
Host-A
R4
Host-B
Printer2
R4
Host-C
R4
Host-D
Interface
S0/0/0
S0/0/1
S0/1/0
Fa0/0
S0/0/0
Fa0/0
S0/0/0
Fa0/0
S0/0/0
NIC
IP Address
209.165.202.245
209.165.202.249
2092.168.202.253
192.168.40.33
209.165.202.249
192.168.40.65
209.165.202.250
192.168.40.97
209.165.202.254
192.168.40.34
Subnet Mask
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.224
255.255.255.252
255.255.255.224
255.255.255.252
255.255.255.224
255.255.255.252
255.255.255.224
Default Gateway
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
192.168.40.33
NIC
192.168.40.35
255.255.255.224
192.168.40.33
NIC
NIC
192.168.40.36
192.168.40.37
255.255.255.224
255.255.255.224
192.168.40.33
192.168.40.33
NIC
192.168.40.38
255.255.255.224
192.168.40.33
NIC
192.168.40.66
255.255.255.224
192.168.40.65
NIC
192.168.40.67
255.255.255.224
192.168.40.65
NIC
NIC
192.168.40.68
192.168.40.69
255.255.255.224
255.255.255.224
192.168.40.65
192.168.40.65
NIC
192.168.40.70
255.255.255.224
192.168.40.65
NIC
192.168.40.98
255.255.255.224
192.168.40.97
NIC
192.168.40.99
255.255.255.224
192.168.40.97
NIC
NIC
192.168.40.100
192.168.40.101
255.255.255.224
255.255.255.224
192.168.40.97
192.168.40.97
NIC
192.168.40.102
255.255.255.224
192.168.40.97
Objectives
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 3
CCNA Discovery
Designing and Supporting Computer Networks
Background / Preparation
In this lab activity, you will be given a preconfigured topology with discontiguous subnetworks. The routers are
configured with RIPv2 and auto-summarization is running by default. The discontiguous networks are each of
the three LANs separated by the WAN links. The default auto-summarization in RIPv2 is preventing traffic
from routing properly throughout this topology.
This activity has multiple windows of instructions. Select the ">" button to view the next portion of instructions.
Required file: Resolving Discontiguous Network Problems.pka
Step 2. Verify that Host-A, Host-B, Host-C, Host-D, and Printer can ping their respective default
gateways. If the pings are unsuccessful, check device configurations.
Step 3. Verify end device connectivity.
1.
2.
3.
4.
5.
6.
7.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 3
CCNA Discovery
Designing and Supporting Computer Networks
2. Assume R1 is sending a packet to 192.168.40.34. What out-going interfaces on R1 are identified as a
path to any IP address in the range of 192.168.40.0/24?
3. Which of these out-going interfaces can be used to successfully send a packet to 192.168.40.34?
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 3
CCNA Discovery
Designing and Supporting Computer Networks
R2
R3
Interface
Fa0/0
Fa0/1
S0/0/0
S0/0/1
Fa0/0
Fa0/1
S0/0/0
S0/0/1
Fa0/0
Fa0/1
S0/0/0
S0/0/1
IP Address
Subnet Mask
Default Gateway
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
Objectives
Background / Preparation
In this activity, you have been given the network address 192.168.1.0/24 to subnet and provide the IP addressing
for the network shown in the Topology Diagram. VLSM will be used so that the addressing requirements can be
met using the 192.168.1.0/24 network. The network has the following addressing requirements:
The link from R1 to R2 will require an IP address for each end of the link.
The link from R1 to R3 will require an IP address for each end of the link.
The link from R2 to R3 will require an IP address for each end of the link.
This activity has multiple windows of instructions. Select the ">" button to view the next portion of instructions.
Required file: Applying VLSM Addressing.pka
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Broadcast
Address
Broadcast
Address
Step 3. Determine the subnet information for the next largest network segment or segments.
In this case, the two R2 LANs are the next largest subnets.
1. How many IP addresses are needed for each LAN?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Step 4. Assign subnet to R2 LANs. Start with the IP address following the R1 LAN subnets.
1. Assign the next available subnet to R2 LAN1.
2. Fill in the chart below with the appropriate information. R2 LAN1 Subnet.
Network
Decimal
Subnet Mask
First Usable IP
Last Usable IP
Address
Subnet Mask
Bits
Address
Address
Broadcast
Address
Broadcast
Address
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Step 5. Determine the subnet information for the next largest network segment or segments.
In this case, the two R3 LANs are the next largest subnets.
1. How many IP addresses are needed for each LAN?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Broadcast
Address
Broadcast
Address
Step 7. Determine the subnet information for the links between the routers.
1. How many IP addresses are needed for each link?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Step 8. Assign subnets to links. Start with the IP address following the R3 LAN subnets.
1. Assign the next available subnet to the link between the R1 and R2 routers.
2. Fill in the chart below with the appropriate information. Link between R1 and R2 Subnet.
Network
Decimal
Subnet Mask
First Usable IP
Last Usable IP
Broadcast
Address
Subnet Mask
Bits
Address
Address
Address
3. Assign the next available subnet to the link between the R1 and R3 routers.
4. Fill in the chart below with the appropriate information. Link between R1 and R3 Subnet.
Network
Decimal
Subnet Mask
First Usable IP
Last Usable IP
Broadcast
Address
Subnet Mask
Bits
Address
Address
Address
5. Assign the next available subnet to the link between the R2 and R3 routers.
6. Fill in the chart below with the appropriate information. Link between R2 and R3 Subnet.
Network
Decimal
Subnet Mask
First Usable IP
Last Usable IP
Broadcast
Address
Subnet Mask
Bits
Address
Address
Address
Task 3: Assign IP Addresses to the Network Devices Assign the appropriate addresses
to the device interfaces.
Step 1. Assign addresses to the R1 router.
1.
2.
3.
4.
Assign the first valid host address in the R1 LAN 1 subnet to the Fa0/0 LAN interface.
Assign the first valid host address in the R1 LAN 2 subnet to the Fa0/1 LAN interface.
Assign the first valid host address in the link between R1 and R2 subnet to the S0/0/0 interface.
Assign the first valid host address in the link between R1 and R3 subnet to the S0/0/1 interface.
Page 3 of 4
CCNA Discovery
Designing and Supporting Computer Networks
1.
2.
3.
4.
Assign the first valid host address in the R2 LAN1 subnet to the Fa0/0 LAN interface.
Assign the first valid host address in the R2 LAN2 subnet to the Fa0/1 LAN interface.
Assign the last valid host address on the link between R2 and R1 subnet to the S0/0/0 interface.
Assign the first valid host address on the link between R2 and R3 subnet to the S0/0/1 interface.
Assign the first valid host address in the R3 LAN1 subnet to the Fa0/0 LAN interface.
Assign the first valid host address in the R3 LAN 2 subnet to the Fa0/1 LAN interface.
Assign the last valid host address on the link between R1 and R3 subnet to the S0/0/1 interface.
Assign the last valid host address on the link between R2 and R3 subnet to the S0/0/0 interface.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 4
CCNA Discovery
Designing and Supporting Computer Networks
R2
R3
Interface
Fa0/0
Fa0/1
S0/0/0
S0/0/1
Fa0/0
Fa0/1
S0/0/0
S0/0/1
Fa0/0
Fa0/1
S0/0/0
S0/0/1
IP Address
Subnet Mask
209.165.202.1
209.165.202.5
255.255.255.252
255.255.255.252
209.165.202.9
209.165.202.2
255.255.255.252
255.255.255.252
209.165.202.6
209.165.202.10
255.255.255.252
255.255.255.252
Default Gateway
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Learning Objectives
Introduction
In this activity, you have been given the network address 172.16.0.0/16 to subnet and provide
the IP addressing for the network shown in the Topology Diagram. VLSM will be used so that
the addressing requirements can be met using the 172.16.0.0/16 network. The network has the
following addressing requirements:
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
192.168.
Step 3. Determine the subnet information for the next largest network segment or
segments.
In this case, the R1 LAN 2 is the next largest subnet.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
Step 5. Determine the subnet information for the next largest network segment or
segments.
In this case, the R2 LAN 1 is the next largest subnet.
1. How many IP addresses are needed for the R2 LAN 1?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Step 6. Assign the subnet to R2 LAN 1.
Start with the IP address following the R1 LAN 2 subnet.
1. Assign the next subnet to R2 LAN 1.
2. Fill in the chart below with the appropriate information.
R2 LAN 1 Subnet
Network
Address
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Step 7. Determine the subnet information for the next largest network segment or
segments.
In this case, the R2 LAN 2 is the next largest subnet.
1. How many IP addresses are needed for the R2 LAN 2?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
Step 9. Determine the subnet information for the next largest network segment or
segments.
In this case, the R3 LAN 1 is the next largest subnet.
1. How many IP addresses are needed for the R3 LAN 1?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Step 10. Assign the subnet to R3 LAN 1.
Start with the IP address following the R2 LAN 2 subnet.
1. Assign the next subnet to R3 LAN 1.
2. Fill in the chart below with the appropriate information.
R3 LAN 1 Subnet
Network
Address
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Step 11. Determine the subnet information for the next largest network segment or
segments.
In this case, the R3 LAN 2 is the next largest subnet.
1. How many IP addresses are needed for the R3 LAN 2?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 6
CCNA Discovery
Designing and Supporting Computer Networks
2. Assign the first valid host address in the R3 LAN 2 subnet to the Fa0/1 LAN
interface.
At the end of this task your completion rate should be 60%.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 6
CCNA Discovery
Designing and Supporting Computer Networks
R2 Host-A
Interface
S0/0/0
S0/0/1
S0/1/0
Fa0/0
S0/0/0
Fa0/0
S0/0/0
Fa0/0
S0/0/0
NIC
R2 Host-B
NIC
R2 Printer-A
NIC
R2 Host-C
NIC
R2 Host-D
NIC
R3 Host-A
NIC
R3 Host-B
NIC
R3 Printer-B
NIC
R3 Host-C
NIC
R3 Host-D
NIC
R4 Host-A
NIC
R4 Host-B
NIC
R4 Printer-C
NIC
R4 Host-C
NIC
R4 Host-D
NIC
R2
R3
R4
IP Address
Subnet Mask
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Default Gateway
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Page 1 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Learning Objectives
Introduction
In this activity, you have been given the network address 172.16.0.0/16 to subnet and provide
the IP addressing for the network shown in the Topology Diagram. VLSM will be used so that
the addressing requirements can be met using the 172.16.0.0/16 network. Subnet 0 will also be
used. The network has the following addressing requirements:
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Subnet
Mask Bits
Broadcast
Address
Step 3. Determine the subnet information for the next largest network segment or
segments.
In this case, the R3 LAN is the next largest subnet.
1. How many IP addresses are needed for the R3 LAN?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Step 4. Assign the subnet to R3 LAN. Start with the IP address following the R2 LAN
subnet.
1. Assign the next subnet to R3 LAN.
2. Fill in the chart below with the appropriate information.
R3 LAN Subnet
Network
Address
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
Step 5. Determine the subnet information for the next largest network segment or
segments.
In this case, the R4 LAN is the next largest subnet.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
Step 7. Determine the subnet information for the links between the routers.
1. How many IP addresses are needed for each link?
2. What is the smallest size subnet that can be used to meet this requirement?
3. What is the maximum number of IP addresses that can be assigned in this size subnet?
Step 8: Assign subnets to links.
Start with the IP address following the R4 LAN subnets.
1. Assign the next available subnet to the link between the R1 and R2 routers.
2. Fill in the chart below with the appropriate information.
Network
Address
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
3. Assign the next available subnet to the link between the R1 and R3 routers.
4. Fill in the chart below with the appropriate information.
Network
Address
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
5. Assign the next available subnet to the link between the R1 and R4 routers.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Decimal
Subnet Mask
Subnet
Mask Bits
Broadcast
Address
At
the end of this task your completion rate should be 0%.
Assign the second valid host address in the R2 LAN subnet to R2 Host-A.
Assign the third valid host address in the R2 LAN subnet to R2 Host-B.
Assign the fourth valid host address in the R2 LAN subnet to R2 Printer-A.
Assign the fifth valid host address in the R2 LAN subnet to R2 Host-C.
Assign the sixth valid host address in the R2 LAN subnet to R2 Host-D.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Step 6: Assign addresses to the host devices (PCs and Printer) of R3.
1.
2.
3.
4.
5.
Assign the second valid host address in the R3 LAN subnet to R3 Host-A.
Assign the third valid host address in the R3 LAN subnet to R3 Host-B.
Assign the fourth valid host address in the R3 LAN subnet to R3 Printer -B.
Assign the fifth valid host address in the R3 LAN subnet to R3 Host-C.
Assign the sixth valid host address in the R3 LAN subnet to R3 Host-D.
Step 7: Assign addresses to the host devices (PCs and Printer) of R4.
1.
2.
3.
4.
5.
Assign the second valid host address in the R4 LAN subnet to R4 Host-A.
Assign the third valid host address in the R4 LAN subnet to R4 Host-B.
Assign the fourth valid host address in the R4 LAN subnet to R4 Printer-C.
Assign the fifth valid host address in the R4 LAN subnet to R4 Host-C.
Assign the sixth valid host address in the R4 LAN subnet to R4 Host-D.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Describe various tools and methods used to validate that the design is working as anticipated.
Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet,
SSH, arp, ipconfig), show & debug commands
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 6
CCNA Discovery
Designing and Supporting Computer Networks
Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other
utilities
Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
How can these techniques be used to document a prototype network that was designed by somebody
else?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Background / Preparation
The router and switch IOS provides a number of commands in the CLI that provide detailed and summary
information about the configuration and operation of the device. These are known as show commands.
This activity will use Packet Tracer to practice using various show commands to explore the configuration of
routers and switches in a configured prototype network.
Required file: Using Commands to Test Network Functionality.pka
Issue the command show ip interface brief and list five pieces of information the command displays.
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 6
CCNA Discovery
Designing and Supporting Computer Networks
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
d. Issue the command show version and list five pieces of information the command displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
e. Issue the command show cdp neighbors and list five pieces of information the command displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
f.
Issue the command show cdp neighbors detail and list three additional pieces of information the
command displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Issue the command show ip interface brief and list five pieces of information the command displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 6
CCNA Discovery
Designing and Supporting Computer Networks
d. Issue the command show interface and list five pieces of information the command displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
e. Issue the command show version and list five pieces of information the command displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
f.
Issue the command show ip route and list five pieces of information the command displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
g. Issue the command show ip protocols and list five pieces of information the command displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
h. Issue the command show ip eigrp neighbors and list five pieces of information the command
displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
i.
Issue the command show ip eigrp topology and list five pieces of information the command
displays.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 6
CCNA Discovery
Designing and Supporting Computer Networks
____________________________________________________________________________
j.
Issue the command show cdp neighbors detail and write down IP addresses you can use to reach
neighboring devices.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. Verify the flow of traffic through the network by issuing the tracert command from PC1 to the various
devices in the network.
Step 4: Reflection
a. What are some other commands you can think of to discover more information about the network?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. If the results of your testing are not as expected, what commands could be used to observe real-time
traffic flowing through a device?
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 6
CCNA Discovery
Designing and Supporting Computer Networks
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 6
Start Date
Network Build (Setup)
Testing Date
End Date
Table of Contents
ATTENDEES
INTRODUCTION
EQUIPMENT
TEST 1. PROCEDURES:
TEST 1. CONCLUSIONS
APPENDIX
Attendees
Name
Company
Position
Introduction
An introduction to the testing explaining briefly what the purpose of the test is, and what should
be observed. Include a brief description of testing goals. List all tests you intend to run.
For example:
The purpose of this test plan is to demonstrate that the basic connectivity and routing protocol are
configured correctly. This prototype network is used to test various aspects of the proposed design.
Demonstrate the routing protocol operates correctly and that the web server is accessible
through the network.
Equipment
List all of the equipment needed to perform the tests. Be sure to include cables, optional
connectors or components, and software.
Qty. Req
Model
2960 Layer 2
switch
1841
ISR
routers with 2
FastEthernet
ports and 2
Serial ports
Personal
Computer enddevices
Personal
Computer
Server
Cat 5 or above
straightthrough patch
cables.
Cat 5 or above
cross-over
patch cables
V.35
DTE
Serial Cables
V.35
DCE
Serial Cables
2
2
Any additional
options or
software required
Substitute
12.2 or above
FastEthernet
NIC
none
none
n/a
none
none
n/a
None
None
n/a
None
None
n/a
none
none
FastEthernet
NIC
12.2 or above
Windows, MAC, or
Linux operating system
For each test to be performed state the goals of the test, the data to record during the test, and the
estimated time to perform the test.
Data to Record:
Configurations
Routing Tables
CPU & Memory
Ping Test Output
Estimated Time:
120 minutes
Test 1. Procedures:
Itemize the procedures to follow to perform the test.
1. Connect and configure the prototype network according to the Installation Checklist.
2. Console into one of the devices in the topology and ping all of the other devices in the topology.
Record any anomalies.
3. Examine the show running-config and show ip route output. Copy and paste the
results into a document for later use.
4. Telnet to all of the other devices and get the same information.
5. Use the traceroute commands to verify that the traffic is taking the correct routes through the
network.
6. Test IP connectivity between host devices on the same VLAN.
7. Verify EIGRP configuration using show ip route and show ip protocols, and
show ip eigrp topology or show ip eigrp interfaces.
3. EIGRP routes are advertised correctly and are installed into the routing tables on all of the
routers.
4. Web pages stored on the Discovery Server are available to both PCs.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Build and test a prototype network for use in the Stadium Prototype Test Plan.
Background / Preparation
In this exercise, you will use the installation checklist provided by the network designer to build the prototype
network. Once the network is built and configured, you can perform the Basic Connectivity Test specified in
the designers test plan. Download the Stadium Prototype Test Plan document. Complete the Stadium
Prototype Test Plan document after the prototype network has been built.
Required files: Building the Prototype Network.pka, Stadium Prototype Test Plan.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 1
Start Date
Network Build (Setup)
Testing Date
End Date
Table of Contents
ATTENDEES
INTRODUCTION
EQUIPMENT
TEST 1. PROCEDURES:
TEST 1. CONCLUSIONS
APPENDIX
10
Attendees
Name
Company
Position
Introduction
An introduction to the testing explaining briefly what the purpose of the test is, and what should
be observed. Include a brief description of testing goals. List all tests you intend to run.
The purpose of this test plan is to demonstrate that the network can recover from failed links due to its
redundant design. This prototype network is used to test various aspects of the proposed design.
Verify that redundant links allow successful recovery from failed links.
Compare the operation of static routes with the operation of a dynamic routing protocol when a
link fails.
Equipment
List all of the equipment needed to perform the tests. Be sure to include cables, optional
connectors or components, and software.
Qty. Req
Model
2960 Layer 2
switch
1841
ISR
routers with 2
FastEthernet
ports and 2
Serial ports
Personal
Computer enddevices
Personal
Computer
Server
Cat 5 or above
straightthrough patch
cables.
Cat 5 or above
cross-over
patch cables
V.35
DTE
Serial Cables
V.35
DCE
Serial Cables
1
1
Any additional
options or
software required
Substitute
12.2 or above
FastEthernet
NIC
none
none
n/a
none
none
n/a
None
None
n/a
None
None
n/a
none
none
FastEthernet
NIC
12.2 or above
Windows, MAC, or
Linux operating system
Device
Designation
Interface
IP Address
Subnet mask
R1
Fa0/0
172.18.4.1
255.255.255.0
R1
R2
R2
R3
R3
R3
R4
R4
S1
S2
S3
S4
PC1
PC2
Discovery
Server
Fa0/1
Fa0/0
Fa0/1
Fa0/0
Fa0/1
S0/1/0 *
Fa0/0
S0/1/0 *
VLAN1
VLAN1
VLAN1
VLAN1
172.18.0.5
172.18.4.2
172.18.0.13
172.18.0.14
172.18.0.6
172.18.0.17
172.18.8.1
172.18.0.18
172.18.4.3
172.18.4.4
172.18.4.5
172.18.8.2
172.18.4.10
172.18.8.10
255.255.255.252
255.255.255.0
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.252
255.255.255. 0
255.255.255. 0
255.255.255. 0
255.255.255.0
255.255.255.0
255.255.255.0
172.18.4.25
255.255.255.0
For each test to be performed state the goals of the test, the data to record during the test, and the
estimated time to perform the test.
Data to Record:
Configurations
Routing Tables
Spanning Tree Output
CPU & Memory
Ping Test Output
Trace Route Output
Estimated Time:
120 minutes
Test 1. Procedures:
Itemize the procedures to follow to perform the test.
Step 1: Verify the configuration and operation of EIGRP.
1. Console into one of the devices in the topology and ping all of the other devices in the topology.
Record any anomalies.
2. Telnet to router R1 and examine the show running-config, and show ip route output.
Copy and paste the results into a document for later use.
3. Telnet to all of the other routers and get the same information.
4. Use the tracert between PC1 and PC2 to verify the path that the traffic is taking through the
network.
5. Verify EIGRP configuration using show ip protocols, show ip eigrp topology, and
show ip eigrp interfaces.
6. Record the results of this step in the Test1: Results and Conclusions section of this test plan.
Step 2: Verify the configuration and operation of Spanning Tree Protocol.
1. Telnet to switch S1 and examine show running-config output. Copy and paste the results
into a document for later use.
2. Telnet to switches S2 and S3 and get the same information.
3. Wait a few seconds for the Spanning Tree topology to converge.
Step 3: Simulate a failure in the switched portion of the network and verify and observe recovery.
1. From PC1 issue the command ping -n 1000 172.18.4.25 to ping the Discovery server
through the switched network.
2. To simulate a link failure, remove the link between S1 and S3.
3. Observe the output of the extended ping and when it begins to succeed again, press Ctrl-C to
interrupt it.
4. Telnet to all three switches and issue the command show spanning-tree vlan 1.
5. Record the results of this step in the Test1: Results and Conclusions section of this test plan.
Step 4: Simulate a failure in the routed portion of the network and verify and observe recovery.
1. From PC1 issue the command ping -n 1000 172.18.8.10 to ping PC2 through the routed
network.
2. To simulate a link failure, remove the link between R2 and R3.
3. Observe the output of the extended ping and after several more iterations, press Ctrl-C to
interrupt it.
4. Use the tracert command from PC1 to PC2 to verify the path that the traffic is taking through
the network.
5. Telnet to all of the routers and issue the command show ip route.
6. Record the results of this step in the Test1: Results and Conclusions section of this test plan.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Develop methodologies for comparing devices and topologies.
Background / Preparation
The purpose of this test plan is to demonstrate that the network can recover from failed links due to its
redundant design. This prototype network is used to test various aspects of the proposed design. Download
and complete the Stadium Redundancy Test Plan document.
Required files: Testing Redundancy in the Network Design.pka and Stadium Redundancy Test Plan (Testing
Redundancy in the Network Design Test Plan) and Installation Checklist (Network Redundancy Installation
Checklist).
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 1
Start Date
Network Build (Setup)
Testing Date
End Date
Table of Contents
ATTENDEES
INTRODUCTION
EQUIPMENT
TEST 1. PROCEDURES:
TEST 1. CONCLUSIONS
APPENDIX
10
Attendees
Name
Company
Position
Introduction
An introduction to the testing explaining briefly what the purpose of the test is, and what should
be observed. Include a brief description of testing goals. List all tests you intend to run.
The purpose of this test plan is to demonstrate that the basic connectivity and routing protocol are
configured correctly. This prototype network is used to test various aspects of the proposed design.
Compare the operation of static routes with the operation of a dynamic routing protocol when a
link fails.
Equipment
List all of the equipment needed to perform the tests. Be sure to include cables, optional
connectors or components, and software.
Qty. Req
Model
2960 Layer 2
switch
1841
ISR
routers with 2
FastEthernet
ports and 2
Serial ports
Personal
Computer enddevices
Personal
Computer
Server
Cat 5 or above
straightthrough patch
cables.
Cat 5 or above
cross-over
patch cables
V.35
DTE
Serial Cables
V.35
DCE
Serial Cables
1
1
Any additional
options or
software required
Substitute
12.2 or above
FastEthernet
NIC
none
none
n/a
none
none
n/a
None
None
n/a
None
None
n/a
none
none
FastEthernet
NIC
12.2 or above
Windows, MAC, or
Linux operating system
Device
Designation
Interface
IP Address
Subnet mask
R1
Fa0/0
172.18.4.1
255.255.255.0
R1
R2
R2
R3
R3
R3
R4
R4
S1
S2
S3
S4
PC1
PC2
Discovery
Server
Fa0/1
Fa0/0
Fa0/1
Fa0/0
Fa0/1
S0/1/0 *
Fa0/0
S0/1/0 *
VLAN1
VLAN1
VLAN1
VLAN1
172.18.0.5
172.18.4.2
172.18.0.13
172.18.0.14
172.18.0.6
172.18.0.17
172.18.8.1
172.18.0.18
172.18.4.3
172.18.4.4
172.18.4.5
172.18.8.2
172.18.4.10
172.18.8.10
255.255.255.252
255.255.255.0
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.252
255.255.255. 0
255.255.255. 0
255.255.255. 0
255.255.255.0
255.255.255.0
255.255.255.0
172.18.4.25
255.255.255.0
For each test to be performed state the goals of the test, the data to record during the test, and the
estimated time to perform the test.
Data to Record:
Configurations
Routing Tables
CPU & Memory
Ping Test Output
Trace Route Output
Estimated Time:
120 minutes
Test 1. Procedures:
Itemize the procedures to follow to perform the test.
Step 1: Verify the configuration and operation of EIGRP.
1. Console into one of the devices in the topology and ping all of the other devices in the topology.
Record any anomalies.
2. Telnet to router R1 and examine the show running-config, and show ip route output.
Copy and paste the results into a document for later use.
3. Telnet to all of the other routers and get the same information.
4. Use the tracert between PC1 and PC2 to verify the path that the traffic is taking through the
network.
5. Verify EIGRP configuration using show ip route, show ip protocols, show ip eigrp
topology, and show ip eigrp interfaces.
6. Record the results of this step in the Test1: Results and Conclusions section of this test plan.
Step 2: Verify that EIGRP can recover from a routed link failure.
1. Telnet to Router R2.
2. Disable the link between R2 and R3 by shutting down interface fa0/1 on R2.
3. Wait a few seconds for the EIGRP topology to converge.
4. Examine the show ip route output. Copy and paste the results into a document for later use.
5. Compare the command output with the previously recorded show ip route output for R2.
6. Use the tracert command on PC1 and PC2 to verify the path that the traffic is taking through
the network.
7. Record the results of this step in the Test1: Results and Conclusions section of this test plan.
Step 4: Verify that static routes can recover from a link failure.
1. Telnet to router R2.
2. Disable the link between R2 and R3 by shutting down interface fa0/1 on R2.
3. Examine the show ip route output. Copy and paste the results into a document for later use.
4. Compare the output with the previously recorded output from steps 1 and 2.
5. Use the tracert command on PC1 and PC2 to verify the path that the traffic is taking through
the network.
6. Record the results of this step in the Test1: Results and Conclusions section of this test plan.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Develop methodologies for selecting and testing the appropriate routing protocol based on network
requirements.
Background / Preparation
The purpose of this test plan is to demonstrate that the basic connectivity and routing protocol are configured
correctly. This prototype network is used to test various aspects of the proposed design. Download and
complete the Stadium Routing Protocol Test Plan document.
Required files: Testing a Multi-Router Network with Redundant Links.pka and Stadium Routing Protocol Test
Plan.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 1
Start Date
Network Build (Setup)
Testing Date
End Date
Table of Contents
ATTENDEES
INTRODUCTION
EQUIPMENT
TEST 1. PROCEDURES:
TEST 1. CONCLUSIONS
APPENDIX
10
Attendees
Name
Company
Position
Introduction
An introduction to the testing explaining briefly what the purpose of the test is, and what should
be observed. Include a brief description of testing goals. List all tests you intend to run.
The purpose of this test plan is to validate the IP addressing scheme and to examine the content of the
core routing tables and test schemes to reduce the number of entries. This prototype network is used to
test various aspects of the proposed design.
Verify the IP address scheme and that all devices are fully reachable.
Examine ways to reduce the size of the core routing tables by using route summarization.
Equipment
List all of the equipment needed to perform the tests. Be sure to include cables, optional
connectors or components, and software.
Qty. Req
Model
2960 Layer 2
switch
1841
ISR
routers with 2
FastEthernet
ports and 2
Serial ports
Personal
Computer enddevices
Personal
Computer
Server
Cat 5 or above
straightthrough patch
cables.
Cat 5 or above
cross-over
patch cables
V.35
DTE
Serial Cables
V.35
DCE
Serial Cables
3
3
Any additional
options or
software required
Substitute
12.2 or above
FastEthernet
NIC
none
none
n/a
none
none
n/a
None
None
n/a
None
None
n/a
none
none
FastEthernet
NIC
12.2 or above
Windows, MAC, or
Linux operating system
Device
Designation
Interface
IP Address
Subnet mask
R1
Fa0/0
172.16.4.1
255.255.255.0
R1
R1
R2
R2
R2
R3
R3
R3
R4
R4
S1
S2
S3
S4
PC1
PC2
Discovery
Server
Fa0/1
S0/1/0
Fa0/0
Fa0/1
S0/1/0
S0/0/0
S0/0/1
S0/1/0
Fa0/0
S0/1/0
VLAN1
VLAN1
VLAN1
VLAN1
172.15.5.1
192.168.1.1
172.17.6.1
172.17.7.1
192.168.2.1
192.168.1.2
192.168.2.2
192.168.0.1
172.18.0.1
192.168.0.2
172.16.4.3
172.16.5.2
172.17.6.2
172.17.7.2
172.18.4.10
172.18.0.10
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.0.0
255.255.255.0
255.255.255. 0
255.255.255. 0
255.255.255. 0
255.255.255.0
255.255.255.0
255.255.0.0
172.18.4.25
255.255.255.0
For each test to be performed state the goals of the test, the data to record during the test, and the
estimated time to perform the test.
Data to Record:
Configurations
Routing Tables
CPU & Memory
Ping Test Output
Trace Route Output
Estimated Time:
120 minutes
Test 1. Procedures:
Itemize the procedures to follow to perform the test.
Step 1: Verify the configuration and operation of EIGRP.
1. Console into one of the devices in the topology and ping all of the other devices in the topology.
Record any anomalies.
2. Telnet to router R1 and examine the show running-config, and show ip route output.
Copy and paste the results into a document for later use.
3. Telnet to all of the other routers and get the same information.
4. Use the tracert between PC1 and PC2 to verify the path that the traffic is taking through the
network.
5. Verify EIGRP configuration using show ip protocols, show ip eigrp topology, and
show ip eigrp interfaces.
6. Record the results of this step in the Test1: Results and Conclusions section of this test plan.
Step 2: Configure the routers to allow automatic summarization.
1. Telnet to every router.
2. On each router, enter router configuration mode by issuing the command router eigrp 1.
3. Enter the command auto-summary to allow automatic summarization.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
Start Date
Network Build (Setup)
Testing Date
End Date
Table of Contents
ATTENDEES
INTRODUCTION
EQUIPMENT
TEST 1. PROCEDURES:
TEST 1. CONCLUSIONS
APPENDIX
10
Attendees
Name
Company
Position
Introduction
An introduction to the testing explaining briefly what the purpose of the test is, and what should
be observed. Include a brief description of testing goals. List all tests you intend to run.
For example:
The purpose of this test plan is to add access control lists to the prototype network to secure unauthorized
access to the server farm and to demonstrate that the access control lists are configured correctly. This
revised prototype network is used to test various aspects of the proposed design.
Plan access control lists to prevent unauthorized access to the server farm.
Configure access control lists on Distribution Layer devices and apply them to the proper
interfaces in the proper direction.
Verify proper operation of the access control lists by verifying that permitted traffic gets through
to the servers and unauthorized traffic is blocked.
Equipment
List all of the equipment needed to perform the tests. Be sure to include cables, optional
connectors or components, and software.
Qty. Req
Model
2960 Layer 2
switch
1841
ISR
routers with 2
FastEthernet
ports and 2
Serial ports
Personal
Computer enddevices
Personal
Computer
Server
Cat 5 or above
straightthrough patch
cables.
Cat 5 or above
cross-over
patch cables
V.35
DTE
Serial Cables
V.35
DCE
Serial Cables
12
5
5
Any additional
options or
software required
Substitute
12.2 or above
FastEthernet
NIC
none
none
n/a
none
none
n/a
None
None
n/a
None
None
n/a
none
none
FastEthernet
NIC
12.2 or above
Windows, MAC, or
Linux operating system
Device
Designation
Interface
IP Address
Subnet mask
Gateway
R1
Fa0/0.1
172.18.2.1
255.255.255.0
N/A
R1
Fa0/0.21
172.18.21.1
255.255.255.0
N/A
R1
Fa0/0.22
172.18.22.1
255.255.255.0
N/A
R1
Fa0/0.23
172.18.23.1
255.255.255.0
N/A
R1
R1
R1
R2
R2
R2
R2
R2
R2
R2
R3
R3
R3
R4
R4
R4
R5
R5
R5
S1
S2
S3
S4
S5
PC1
PC2
PC3
Web 1A
Web 1B
DNS A
DNS B
Fa0/1
S0/1/0 * DTE
S0/1/1 * DCE
Fa0/0.1
Fa0/0.21
Fa0/0.22
Fa0/0.23
Fa0/1
S0/1/0 * DTE
S0/1/1 * DTE
Fa0/0
S0/1/0 * DTE
S0/1/1 * DCE
Fa0/0
S0/1/0 * DTE
S0/1/1 * DCE
Fa0/0
S0/1/0 * DCE
S0/1/1 * DCE
VLAN1
VLAN1
VLAN1
VLAN1
VLAN1
172.18.0.17
172.18.0.13
172.18.0.25
172.18.2.2
172.18.21.2
172.18.22.2
172.18.23.2
172.18.0.21
172.18.0.10
172.18.0.26
172.18.0.18
172.18.0.1
172.18.0.9
172.18.0.22
172.18.0.5
172.18.0.14
172.18.1.1
172.18.0.2
172.18.0.6
172.18.2.3
172.18.2.4
172.18.2.5
172.18.2.6
172.18.1.2
172.18.23.10
172.18.1.10
172.18.1.11
172.18.21.3
172.18.21.4
172.18.22.3
172.18.22.4
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
172.18.2.1
172.18.2.1
172.18.2.1
172.18.2.1
172.18.1.1
172.18.23.1
172.18.1.1
172.18.1.1
172.18.21.1
172.18.21.2
172.18.22.1
172.18.22.2
172.18.23.3
172.18.23.4
255.255.255.0
255.255.255.0
172.18.23.1
172.18.23.2
Web 2A
Web 2B
For each test to be performed state the goals of the test, the data to record during the test, and the
estimated time to perform the test.
Data to Record:
Configurations
Router configurations
ACL information
Ping Test Output
Web page access information
Estimated Time:
120 minutes
Test 1. Procedures:
Itemize the procedures to follow to perform the test.
Step 1: Verify full connectivity from all PCs to all servers.
1. From PC1 and PC2 ping all of the servers in the topology. Record the results.
2. From PC1 and PC2 access the following web pages: www.web1a.com, www.web1b.com,
www.web2a.com, and www.web2b.com. Record the results.
3. From PC2, ping the Fa0/1 interface of routers R1 and R2 to verify connectivity and then telnet to
routers R1 and R2 and get the show running-config output. Copy and paste the results into
a document for later use.
Step 2: Plan access control lists to prevent unauthorized access to the server farm.
1. Design an access control list numbered 101 to allow only web access from hosts on the internal
network, 172.18.0.0/16, to any device and deny all other traffic. Design an access control list
numbered 102 to allow only DNS access from hosts on the internal network, 172.18.0.0/16, to any
device and deny all other traffic.
Step 3: Configure and apply access control lists.
1. Telnet to routers R1 and R2 and add both access control lists and apply them on to the proper
interfaces in the proper direction to protect the servers connected to that interface.
Step 4: Verify proper operation of the access control lists.
1. From PC1 and PC2 ping all of the servers in the topology. Record the results.
2. From PC1 and PC2 access the following web pages: www.web1a.com, www.web1b.com,
www.web2a.com, and www.web2b.com. Record the results.
3. Telnet to routers R1 and R2 and document the final cofiguration using show runningconfig, and show access-lists.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
Start Date
Network Build (Setup)
Testing Date
End Date
Table of Contents
ATTENDEES
INTRODUCTION
EQUIPMENT
TEST 1. PROCEDURES:
TEST 1. CONCLUSIONS
APPENDIX
10
Attendees
Name
Company
Position
Introduction
An introduction to the testing explaining briefly what the purpose of the test is, and what should
be observed. Include a brief description of testing goals. List all tests you intend to run.
For example:
The purpose of this test plan is to add access control lists to the prototype network to secure unauthorized
access to the server farm and to demonstrate that the access control lists are configured correctly. This
revised prototype network is used to test various aspects of the proposed design.
Plan access control lists to prevent unauthorized access to the server farm.
Configure access control lists on Distribution Layer devices and apply them to the proper
interfaces in the proper direction.
Verify proper operation of the access control lists by verifying that permitted traffic gets through
to the servers and unauthorized traffic is blocked.
Equipment
List all of the equipment needed to perform the tests. Be sure to include cables, optional
connectors or components, and software.
Qty. Req
Model
2960 Layer 2
switch
1841
ISR
routers with 2
FastEthernet
ports and 2
Serial ports
Personal
Computer enddevices
Personal
Computer
Server
Cat 5 or above
straightthrough patch
cables.
Cat 5 or above
cross-over
patch cables
V.35
DTE
Serial Cables
V.35
DCE
Serial Cables
12
5
5
Any additional
options or
software required
Substitute
12.2 or above
FastEthernet
NIC
none
none
n/a
none
none
n/a
None
None
n/a
None
None
n/a
none
none
FastEthernet
NIC
12.2 or above
Windows, MAC, or
Linux operating system
Device
Designation
Interface
IP Address
Subnet mask
Gateway
R1
Fa0/0.1
172.18.2.1
255.255.255.0
N/A
R1
Fa0/0.21
172.18.21.1
255.255.255.0
N/A
R1
Fa0/0.22
172.18.22.1
255.255.255.0
N/A
R1
Fa0/0.23
172.18.23.1
255.255.255.0
N/A
R1
R1
R1
R2
R2
R2
R2
R2
R2
R2
R3
R3
R3
R4
R4
R4
R5
R5
R5
S1
S2
S3
S4
S5
PC1
PC2
PC3
Web 1A
Web 1B
DNS A
DNS B
Fa0/1
S0/1/0 * DTE
S0/1/1 * DCE
Fa0/0.1
Fa0/0.21
Fa0/0.22
Fa0/0.23
Fa0/1
S0/1/0 * DTE
S0/1/1 * DTE
Fa0/0
S0/1/0 * DTE
S0/1/1 * DCE
Fa0/0
S0/1/0 * DTE
S0/1/1 * DCE
Fa0/0
S0/1/0 * DCE
S0/1/1 * DCE
VLAN1
VLAN1
VLAN1
VLAN1
VLAN1
172.18.0.17
172.18.0.13
172.18.0.25
172.18.2.2
172.18.21.2
172.18.22.2
172.18.23.2
172.18.0.21
172.18.0.10
172.18.0.26
172.18.0.18
172.18.0.1
172.18.0.9
172.18.0.22
172.18.0.5
172.18.0.14
172.18.1.1
172.18.0.2
172.18.0.6
172.18.2.3
172.18.2.4
172.18.2.5
172.18.2.6
172.18.1.2
172.18.23.10
172.18.1.10
172.18.1.11
172.18.21.3
172.18.21.4
172.18.22.3
172.18.22.4
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.252
255.255.255.252
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
172.18.2.1
172.18.2.1
172.18.2.1
172.18.2.1
172.18.1.1
172.18.23.1
172.18.1.1
172.18.1.1
172.18.21.1
172.18.21.2
172.18.22.1
172.18.22.2
172.18.23.3
172.18.23.4
255.255.255.0
255.255.255.0
172.18.23.1
172.18.23.2
Web 2A
Web 2B
For each test to be performed state the goals of the test, the data to record during the test, and the
estimated time to perform the test.
Data to Record:
Configurations
Router configurations
ACL information
Ping Test Output
Web page access information
Estimated Time:
120 minutes
Test 1. Procedures:
Itemize the procedures to follow to perform the test.
Step 1: Verify full connectivity from all PCs to all servers.
1. From PC1 and PC2 ping all of the servers in the topology. Record the results.
2. From PC1 and PC2 access the following web pages: www.web1a.com, www.web1b.com,
www.web2a.com, and www.web2b.com. Record the results.
3. From PC2, ping the Fa0/1 interface of routers R1 and R2 to verify connectivity and then telnet to
routers R1 and R2 and get the show running-config output. Copy and paste the results into
a document for later use.
Step 2: Plan access control lists to prevent unauthorized access to the server farm.
1. Design an access control list numbered 101 to allow only web access from hosts on the internal
network, 172.18.0.0/16, to any device and deny all other traffic. Design an access control list
numbered 102 to allow only DNS access from hosts on the internal network, 172.18.0.0/16, to any
device and deny all other traffic.
Step 3: Configure and apply access control lists.
1. Telnet to routers R1 and R2 and add both access control lists and apply them on to the proper
interfaces in the proper direction to protect the servers connected to that interface.
Step 4: Verify proper operation of the access control lists.
1. From PC1 and PC2 ping all of the servers in the topology. Record the results.
2. From PC1 and PC2 access the following web pages: www.web1a.com, www.web1b.com,
www.web2a.com, and www.web2b.com. Record the results.
3. Telnet to routers R1 and R2 and document the final cofiguration using show runningconfig, and show access-lists.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
CCNA Discovery
Designing and Supporting Computer Networks
Objective
Develop methodologies for comparing devices and topologies.
Background / Preparation
The purpose of this test plan is to add ACLs to the prototype network to secure unauthorized access to the
server farm and to demonstrate that the ACLs are configured correctly. Download and complete the Stadium
ACL Test Plan (Testing ACLs) document.
Required files: Testing ACLs.pka and Stadium ACL Test Plan (Testing ACLs).
Page 1 of 1
CCNA Discovery
Designing and Supporting Computer Networks: Prototyping the WAN
Objectives
Background / Preparation
The XYZ Corporation is planning to expand soon. They are planning to open a new branch office that will connect
to the main company network through the ISP. This will require router R0 in the existing network to be upgraded
and new equipment be purchased and configured. They would also like to add some wireless connectivity to the
existing network. And finally, they wish to set up some basic security through using access control lists (ACLs).
The network administrator has provided you with a simulated model of the current network and a diagram of the
new expanded network. You have been asked to modify the existing simulation to verify that the new devices and
configurations will work as planned prior to purchasing new equipment and making changes to the live network.
Required file: Configuring a WAN Connection Using PPP.pka
Task 1
Step 1: Upgrade the WAN interfaces on router R0
a. Remove the NM-4A/S WAN module
b. Add a WIC-2T module in Slot0
c. Add a WIC-2T module in Slot1
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Task 2
Step 1: Set up additional devices for new branch network
a.
b.
c.
d.
Task 3
Step 1: Set up additional devices for new wireless network
a. Add a Linksys-WRT300N wireless router below router R3
b. Connect the Internet port on the Linksys device to R3 F0/1 (be careful about which type of cable you use)
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 4
CCNA Discovery
Designing and Supporting Computer Networks
Use a Simple PDU to send icmp packets from PC4 to the wireless router (repeat if fails)
Use a Simple PDU to send icmp packets from PC4 to R3 (repeat if fails)
Use a Simple PDU to send icmp packets from PC4 to PC0 (repeat if fails)
Use a Simple PDU to send icmp packets from PC4 to PC1 (repeat if fails)
Use a Simple PDU to send icmp packets from PC4 to PC2 (repeat if fails)
Use a Simple PDU to send icmp packets from PC4 to PC3 (repeat if fails)
Use a Simple PDU to send icmp packets from PC4 to PC5 (repeat if fails)
Task 4
Company XYZ wishes to set up some basic security through using access control lists (ACLs). The ACL should
permit all www traffic to the Web Server. Permit any return traffic that originated in the 192.168.3.0 network. Allow
the ICMP protocol to receive echo replies and unreachable messages. The ACL should deny all other traffic.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 4
CCNA Discovery
Designing and Supporting Computer Networks
On PC4, open the Web Browser and type 192.168.3.250 in as the URL (should display the server
web page)
On PC5, open the Web Browser and type 192.168.3.250 in as the URL (should display the server
web page)
d. Troubleshoot if needed
Reflection
1. How could using simulation software such as Packet Tracer be beneficial to network personnel?
______________________________________________________________________________________________
______________________________________________________________________________________________
2. What are some limitations to using simulation software such as Packet Tracer?
______________________________________________________________________________________________
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 4
Start Date
Network Build (Setup)
Testing Date
End Date
Table of Contents
ATTENDEES ...................................................................................................................3
INTRODUCTION .............................................................................................................4
EQUIPMENT....................................................................................................................5
DESIGN AND TOPOLOGY DIAGRAM ...........................................................................6
TEST 1. DESCRIPTION: FRAME RELAY CONNECTIVITY TEST.................................8
TEST 1. RESULTS AND CONCLUSIONS ......................................................................9
TEST 2. DESCRIPTION: FLOATING STATIC ROUTES CONFIGURATION TEST .....10
TEST 2. RESULTS AND CONCLUSIONS ....................................................................11
TEST 3. DESCRIPTION: LINK FAILURE TEST ..........................................................12
TEST 3. RESULTS AND CONCLUSIONS ....................................................................13
APPENDIX.....................................................................................................................14
Attendees
Name
Company
NetworkingCompany
Position
Account Manager
NetworkingCompany
NetworkingCompany
Network Designer
System Engineer
Instructor note: Students can enter their own names in the roles they choose, or make up names for the
attendees.
Introduction
An introduction to the testing explaining briefly what the purpose of the test is, and what should
be observed. Include a brief description of testing goals. List all tests you intend to run.
Purpose of this test:
Tests to run:
Verify physical and IP connectivity between Edge2 and BR3 on the prototype network.
Document operation.
Demonstrate routing of traffic between separate Edge2 and BR3 with Frame network active.
Document operation.
Equipment
List all of the equipment needed to perform the tests. Be sure to include cables, optional
connectors or components, and software.
Any additional
options or
software required
Qty. Req
Model
Personal
FastEthernet
Computer end- NIC
devices
Substitute
IOS Software
Rev.
At least one
PC and any
other IP enddevice
(camera,
printer, etc.)
Windows,
MAC or Linux
operating
system.
IP Address Plan:
Device Name
Interface
IP Address
Subnet Mask
DLCI
Edge2
Serial 0/1/1
172.18.0.9
255.255.255.252
110
Edge2
Fa 0/1
172.18.0.249
255.255.255.252
BR3
Serial 0/1/0
172.18.0.10
255.255.255.252
BR3
Fa 0/0
172.18.225.249
255.255.255.252
BR3
Fa0/1
172.18.225.1
255.255.255.128
ISPX
Fa0/0
172.18.225.250
255.255.255.252
ISPX
Fa0/1
172.18.0.250
255.255.255.252
100
For each test to be performed state the goals of the test, the data to record during the test, and the
estimated time to perform the test. Test 1 is given as an example.
Estimated Time:
45 minutes total
30 minutes build
15 minutes test
Test 1. Procedures:
Itemize the procedures to follow to perform the test.
1. Build the topology according to the diagram shown in Figure 1 without Ethernet backup link.
Assign IP addresses according to the IP address plan. To configure the serial connections
through the Frame Relay network, you will need to change the encapsulation type to frame relay.
Then use the frame-relay map ip command to identify what circuit needs to be used to reach
the distant IP address. Lastly, turn on the interface. For example, on the Edge2 router, you need
to enter:
Edge2(config)#interface Serial 0/1/1
Edge2(config)#encapsulation frame-relay
Edge2(config-if)#frame-relay map ip 172.18.0.10 100 broadcast
Edge2(config-if)#no shutdown
Notice that you are using the BR3 Serial 0/1/0 address and connecting it to the local 100 DLCI.
The broadcast will allow EIGRP multicast updates to use the link as well. The BR3 router Serial
0/1/0 will need to be configured in a like manner.
2. Create a basic configuration on each device. Include applicable passwords, device names,
default routes, default gateways, and activate interfaces.
3. Console into one of the devices in the topology and ping all of the other devices in the topology.
Record any anomalies.
4. Telnet to each device in the configuration and verify that each is reachable.
5. Start a log file and get the show running-config, show ip route, show processes
cpu sorted, show interfaces and the first few lines of show memory . Save the log file
for later analysis. Repeat for all devices in the topology.
Data to Record:
Routing tables
CPU & Memory
Ping Test Output
Estimated Time:
30 minutes total
15 minutes configure
15 minutes test
Test 2. Procedures:
Itemize the procedures to follow to perform the test.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
_____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_________________________________________________________________________
2.
_________________________________________________________________________
3. __________________________________________________________________________
.
Data to Record:
Router Configuration
IP Routing Table Information
CPU & Memory
Ping Test Output
Estimated Time:
20 minutes total
10 minutes configure
10 minutes test
Test 3. Procedures:
Itemize the procedures to follow to perform the test.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
_____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_________________________________________________________________________
2.
_________________________________________________________________________
3. __________________________________________________________________________
Appendix
Record the starting configurations, any modifications, log file or command output, and any other
relevant documentation.
CCNA Discovery
Designing and Supporting Computer Networks: Prototyping the WAN
Objectives
Using the test plan, configure the backup links and verify the failover works as expected.
Background / Preparation
In this exercise, you will configure a Frame Relay network and a backup link. Once the network is built and
configured, you can perform a Frame Relay Connectivity Test, Floating Static Routes Configuration Test and a
Link Failure Test specified in the designers test plan. Download and complete the Redundancy Test Plan
document in addition to the PT activity.
Required files: Testing Design Redundancy.pka and Redundancy Test Plan
Configure Edge2 and BR3 hostnames and LAN connection to Switch0. Use the address table in the
Redundancy Test Plan. To configure the serial connections through the Frame Relay network, you will need
to change the encapsulation type to frame relay. Then use the frame-relay map ip command to identify what
circuit needs to be used to reach the distant IP address. Lastly, turn on the interface. For example, on the
Edge2 router, you need to enter:
Edge2(config)#interface Serial 0/1/1
Edge2(config)#encapsulation frame-relay
Edge2(config-if)#frame-relay map ip 172.18.0.10 100 broadcast
Edge2(config-if)#no shutdown
Notice that you are using the BR3 Serial 0/1/0 address and connecting it to the local 100 DLCI. The
broadcast will allow EIGRP multicast updates to use the link as well. The BR3 router Serial 0/1/0 will need to
be configured in a like manner.
Configure EIGRP (AS 1) on Edge2 and BR3. Advertise only the networks connected to the FrameCloud and
Switch0. On BR3, do not send advertisements out fa0/1.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 2
CCNA Discovery
Designing and Supporting Computer Networks
On Edge2, configure fa0/1 using the addressing given in the Test Plan.
On Edge2, configure floating static routes (AD=130) to 172.18.225.0/25 and 172.18.225.248/30 through
the back-up network using the local interface argument.
On BR3, configure fa0/0 using the addressing given in the Test Plan.
On BR3, configure a floating default route (AD=130) through fa0/0.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 2