Upload
pentatonicman1
View
26
Download
0
Embed Size (px)
DESCRIPTION
CCNA Guide
Citation preview
5/21/2018 Cisco ICND1 Lab Guide v1.0
1/65
2010 Marc Bouchard
Cisco CCENT Lab Guide
Covers all topics for the ICND1 exam
Version 1.0
Written by
Marc Bouchard
www.subnet192.com
5/21/2018 Cisco ICND1 Lab Guide v1.0
2/65
www.subnet192.com2
C i C C E N T
L b G i d
Contents
Introduction ............................................................................................................................................ 3
Recommended training material ............................................................................................................. 3
Recommended lab equipment................................................................................................................. 3
How this guide works ............................................................................................................................ 4
Lab 1 Configuring S1 Basic switch configurations .......................... .......................... ............................ 5
Enabling connectivity ....................................................................................................................... 5
Enhancing security ........................................................................................................................... 9
Configure Ports and Port Security .................................................................................................. 13
Configure VLANs ............................................................................................................................ 17
Flash and nvram management ....................................................................................................... 20
Miscellaneous commands of interest ............................................................................................. 23
Lab 2 Configuring R1 Basic router configurations ............................................................................. 25
Enabling connectivity ..................................................................................................................... 25
Enhancing security ......................................................................................................................... 29
Flash and nvram management ....................................................................................................... 33
Lab 3 Interconnecting components ..................................................................................................... 35
Configuring S2 and S3 .................................................................................................................... 35
Session Management ..................................................................................................................... 37
Network identification ................................................................................................................... 40
Lab 4 Full topology.............................................................................................................................. 45
Configuring R2 and R3.................................................................................................................... 45
Serial Connectivity ......................................................................................................................... 47
PPP with Authentication ................................................................................................................ 50
Routing: Static Routes .................................................................................................................... 52
Routing: RIP ................................................................................................................................... 60
References & Resources ........................................................................................................................ 65
Software................................................................................................................................................ 65
Special thanks ..................................................................................................................................... 65
5/21/2018 Cisco ICND1 Lab Guide v1.0
3/65
www.subnet192.com3
CiscoCCENT
LabGuide
Introduction
Studying for the CCENT/CCNA exams is challenging. There are a lot of resources out there, lots of
material but there was nothing I could find to meet my objective: provide me with a challenge, and then
show a step by step explanation to validate the tasks.
This guide is in no way endorsed by Cisco Systems. I created this document out of personal need and to
help myself memorize and learn the various commands and configurations. I thought I should share this
with others to assist in actually learning hands-on skills with Cisco equipment. Also, note that I didnt
reinvent the wheel here. Most of this is inspired from personal experience in my own lab, from
information gathered on the internet, from some of the simulators, etc.
This guide is provided FREE of charge. If you paid for this guide, you got ripped off. I do
however accept donations of any amount via Paypal at [email protected] if you find this
guide of use and want to thank me for my efforts. Visit my site at www.subnet192.comfor
more information and the latest guides!
Recommended training material
The following are what I personally used to pass the certification. I find that going through a CBT before
hitting the books helps a lot to make the book easier to understand.
CBT Nuggets ICND1 training by Jeremy Cioara.
Cisco Press ICND1 by Wendell Odom.
Recommended lab equipmentFinding the right gear to build a lab is quite a daunting task. There is a multitude of models and versions,as well as modules to customize each device. While you can get by with simulators, (I have tried them
all), nothing compares to working with the real deal.
My recommendations, for a reasonably priced lab that would get you through the CCENT and CCNA
curriculum would be the following. Note that not all of them are used for the CCENT, but will be useful
at the CCNA level.
3 Cisco 2950 series switches
3 Cisco 2620XM 128/45 series routers
3 WIC-2T serial interfaces
3 DCE/DTE Smart Serial cables (for the WIC-2T to WIC-2T connections)
1 NM-4A/S serial interface
3 Serial to Smart Serial cables (for the NM-4A/S to WIC-2T connections)
5/21/2018 Cisco ICND1 Lab Guide v1.0
4/65
www.subnet192.com4
C i C C E N T
L b G i d
How this guide works
First off, this is not intended to explain any of the concepts. There are fantastic books out there for that
job. This guide attempts to make you think about what you need to do, which commands are required
to complete each step and so on.
Lab 1 and 2 will focus on standalone device configurations. However, you dont go far if nothing is
interconnected. The objective is to make you build your lab, practicing commands as you go.
The goal topology is the following, based on my recommendations for hardware above. You can also
perform most of the steps using Ciscos Packet Tracer software if you are part of the Cisco Learning
Academy, but be aware that some commands are not implemented like SSH support, etc.
Device ID Interface IP Address Default Gateway
PC Ethernet adapter 192.168.1.100/24 192.168.1.1
S1 Vlan 1 192.168.1.5/24 192.168.1.1
S2 Vlan 1 192.168.1.6/24 192.168.1.1
S3 Vlan 1 192.168.1.7/24 192.168.1.1
R1 FastEthernet 0/0 192.168.1.1/24
R1 Serial 0/0 172.16.0.1/30
R2 FastEthernet 0/0 10.50.0.1/24
R2 Serial 0/0 172.16.1.1/30
R2 Serial 0/1 172.16.0.2/30R3 FastEthernet 0/0 69.70.16.147/29
R3 Serial 0/0 172.16.1.2/30
For R3s FastEthernet 0/0 interface, if you have an internet connection available, substitute the IP
address for your own static address. This will provide you with real connectivity to the internet in your
lab.
5/21/2018 Cisco ICND1 Lab Guide v1.0
5/65
www.subnet192.com5
CiscoCCENT
LabGuide
Lab 1 Configuring S1 Basic switch configurations
Material required: 1 switch, 1 PC, console (rollover) cable, Ethernet cable
Enabling connectivity
Objectives
This lab will guide you in configuring a switch from a factory default state.
Preparation Connect the console (rollover) cable from the PC to the Console port of the switch.
Connect the Ethernet cable from the PC to the FastEthernet 0/1 port of the switch.
Configure the PCs Ethernet port to 100mbps/Full Duplex.
Tasks
Open a terminal emulator session to the switch
Erase the current configuration (reset to factory default) then reboot the switch.
Set the host name to S1.
Set the console password to cisco.
Set the privileged mode password to ciscoexec. Set the IP address and default gateway using the topology reference table, and enable the
interface.
Enable Telnet connectivity on all ports, using password remote.
Configure all ports to 100mbps/full duplex.
Verify the running configuration.
View the interface list summary.
Test the Telnet connection from the PC to the switch.
View currently connected users.
Save the configuration.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
6/65
www.subnet192.com6
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )
Enter privileged mode
Switch>enable
Enter configuration mode
Switch#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Erase the startup configuration file (reset to factory defaults)
Switch#write eraseErasing the nvram filesystem will remove all configuration files! Continue? [confirm]Switch#reloadProceed with reload? [confirm]
OR
Switch#erase startup-configErasing the nvram filesystem will remove all configuration files! Continue? [confirm]Switch#reloadProceed with reload? [confirm]
Set the host name
Switch(config)#hostname 1
Set the console password
S1(config)#line console 0S1(config-line)#password ciscoS1(config-line)#exit
Set the privileged mode password
S1(config)#enable password ciscoexec
Configure the IP address and default gateway, and enable the interface
S1(config)#interface vlan 1
S1(config-if)#ip address 192.168.1.5 255.255.255.0S1(config-if)#no shutdownS1(config-if)#exitS1(config)#ip default-gateway 192.168.1.1
5/21/2018 Cisco ICND1 Lab Guide v1.0
7/65
www.subnet192.com7
CiscoCCENT
LabGuide
Enable Telnet connectivity
S1(config)#line vty 0 15S1(config-line)#password remoteS1(config-line)#loginS1(config-line)#transport input telnetS1(config-line)#exit
Configure all ports to 100mbps/full duplex.
S1(config)#interface range fastEthernet 0/1 - 24S1(config-if-range)#speed 100S1(config-if-range)#duplex fullS1(config-if-range)#exitS1(config)#exit
Verify the running configuration
The following output has been edited for space considerations.
S1#show running-configBuilding configuration...
Current configuration: 2673 bytes!version 12.1no service password-encryption!hostname S1
!enable password ciscoexec
!interface FastEthernet0/1speed 100duplex full
!!interface Vlan1ip address 192.168.1.5 255.255.255.0
!ip default-gateway 192.168.1.1
!line con 0password 0 cisco
line vty 0 4password 0 remote
logintransport input telnet
line vty 5 15password 0 remotelogin
transport input telnet
!End
5/21/2018 Cisco ICND1 Lab Guide v1.0
8/65
www.subnet192.com8
C i C C E N T
L b G i d
View the interface list summary
S1#show ip interface briefInterface IP-Address OK? Method Status ProtocolVlan1 192.168.1.5 YES manual up upFastEthernet0/1 unassigned YES unset up upFastEthernet0/2 unassigned YES unset down downFastEthernet0/3 unassigned YES unset down downFastEthernet0/4 unassigned YES unset down down
Test the Telnet connection
From your PC connected to switch via an Ethernet cable, open your terminal emulator software
and connect to the switch using the Telnet protocol.
View currently connected users
S1#show usersLine User Host(s) Idle Location
0 con 0 idle 00:00:30* 1 vty 0 idle 00:00:00 192.168.1.100
Interface User Mode Idle Peer Address
Save the configuration
S1#copy running-config startup-configDestination filename [startup-config]?Building configuration...[OK]
5/21/2018 Cisco ICND1 Lab Guide v1.0
9/65
www.subnet192.com9
CiscoCCENT
LabGuide
Enhancing security
Objectives
Your switch has been configured in the previous lab, but could use a bit more security. Complete the
following tasks to enhance the security of your switch. Note that several tasks here do NOT work in
Packet Tracer or on a non-crypto IOS.
Tasks
Set the secured privileged mode password to ciscosecret
Set notification banners
o Message of the Day: AUTHORIZED PERSONEL ONLY
o Login: ACCESS RESTRICTED
Encrypt all clear text passwords
Enable SSH connectivity with local authentication. Leave Telnet enabled for the purpose of the
lab.
o
Create an account named admin with a password of ciscoo Use domain name subnet192.com
o Configure the terminal port ranges independently (0-4 and 5-15)
Verify the cryptographic key
Save the configuration
Verify your configuration
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
10/65
www.subnet192.com1
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )
Enter privileged mode
S1>enable
Enter configuration mode
S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Set the secured privileged mode password
S1(config)#enable secret ciscosecret
Set notification banners (Login and Message of the Day)
S1(config)#banner login ! ACCE RE TRICTED !S1(config)#banner motd ! AUTHORIZED PER ONEL ONLY !
Encrypt all clear text passwords
S1(config)#service password-encryption
Enable SSH connectivity with local authentication
S1(config)#ip domain-name subnet192.comS1(config)#username adminpassword ciscoS1(config)#crypto key generate rsaThe name for the keys will be: S1.subnet192.comChoose the size of the key modulus in the range of 360 to 2048 for your General PurposeKeysChoosing a key modulus greater than 512 may take a few minutes.How many bits in the modulus [512]:Generating RSA keys ...[OK]
S1(config)#line vty 0 4S1(config-line)#login localS1(config-line)#transport input ssh telnetS1(config-line)#line vty 5 15S1(config-line)#login local
S1(config-line)#transport input ssh telnetS1(config-line)#exitS1(config)#exit
5/21/2018 Cisco ICND1 Lab Guide v1.0
11/65
www.subnet192.com11
CiscoCCENT
LabGuide
Verify cryptographic key
S1#Show crypto key mypubkey rsa% Key pair was generated at: 21:31:48 EST Mar 6 1993Key name: S1.subnet192.comUsage: General Purpose KeyKey Data:305C300D 06092A86 4886F70D 01010105 00034B00 30480241 00F242D9 39F85F01A50E9A4F 37055405 2DB4D613 6C5259CF ACF5AB5B E28DFAB2 D1020301 0001
% Key pair was generated at: 08:32:29 EST Mar 7 1993Key name: S1.subnet192.com.serverUsage: Encryption KeyKey Data:307C300D 06092A86 4886F70D 01010105 00036B00 30680261 00B1509F 1EDFEA0A39F7C421 3D1F86EF 752E5937 EACADEBC F959D757 218F4068 AB020301 0001
Save the configuration
S1#copy running-config startup-configDestination filename [startup-config]?Building configuration...
[OK]
5/21/2018 Cisco ICND1 Lab Guide v1.0
12/65
www.subnet192.com1
C i C C E N T
L b G i d
Verify the configuration
The following output has been edited for space considerations.
S1#show running-config
Building configuration...
Current configuration : 2126 bytes!version 12.1service password-encryption!hostname S1!enable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p.enable password 7 094F471A1A0A120A0E0F!username admin password 7 070C285F4D06ip subnet-zero!ip domain-name subnet192.comip ssh time-out 120
ip ssh authentication-retries 3!interface FastEthernet0/1speed 100duplex full
!interface FastEthernet0/24speed 100duplex full
!interface Vlan1ip address 192.168.1.5 255.255.255.0no ip route-cache
!ip default-gateway 192.168.1.1ip http serverbanner login ^C ACCESS RESTRICTED ^Cbanner motd ^C AUTHORIZED PERSONEL ONLY ^C!line con 0password 7 02050D480809
line vty 0 4password 7 105C0C140A0317login localtransport input ssh
line vty 5 15password 7 105C0C140A0317login localtransport input ssh
!end
5/21/2018 Cisco ICND1 Lab Guide v1.0
13/65
www.subnet192.com13
CiscoCCENT
LabGuide
Configure Ports and Port Security
Objectives
Your switch has been setup with all the basic settings, the remote access connections are now secured,
but what about the access ports? Anybody can connect anything to any port at this point. You can make
the switch even more secure by preventing unauthorized devices from connecting.
Tasks
Disable unused ports (13 to 24)
View the MAC address table
View the current port security settings on port 12
Enable Port Security on port 12
o Make the port shutdown in case of violation
o
Allow a single MAC address only
o
Let the switch learn the MAC address of the device currently plugged in.
o
Plug in any device on port 12 and try to ping something, to send a packet out so theswitch learns the MAC address
View the current port security settings on port 12
Plug in a different device in that port to trigger port violation rules
View the current port security settings on port 12 post violation
Restore connectivity on violated port
Verify your configuration
o
List all ports with Port Security enabled
o List all MAC addresses linked to Port Security enabled ports
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
14/65
www.subnet192.com1
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )
Enter privileged mode
S1>enable
Enter configuration mode
S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Disable unused ports (13 to 24)
S1(config)#interface range fastEthernet 0/13 - 24S1(config-if)#shutdownS1(config-if)#exitS1(config)#exit
View the MAC address table
S1#show mac-address-tableMac Address Table
-------------------------------------------
Vlan Mac Address Type Ports---- ----------- -------- -----All 000a.4117.5300 STATIC CPUAll 0100.0ccc.cccc STATIC CPUAll 0100.0ccc.cccd STATIC CPU
All 0100.0cdd.dddd STATIC CPU1 0004.2007.6d2b DYNAMIC Fa0/1
View the current port security settings on port 12
S1#show port-security interface fastEthernet 0/12Port Security : DisabledPort Status : Secure-downViolation Mode : ShutdownAging Time : 0 minsAging Type : AbsoluteSecureStatic Address Aging : DisabledMaximum MAC Addresses : 1Total MAC Addresses : 0Configured MAC Addresses : 0
Sticky MAC Addresses : 0Last Source Address : 0000.0000.0000Security Violation Count : 0
Enter configuration mode
S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
5/21/2018 Cisco ICND1 Lab Guide v1.0
15/65
www.subnet192.com15
CiscoCCENT
LabGuide
Enable port security on port 12
S1(config)#interface fastEthernet 0/12S1(config-if)#switchport mode accessS1(config-if)#switchport port-securityS1(config-if)#switchport port-security maximum 1S1(config-if)#switchport port-security mac-address stickyS1(config-if)#switchport port-security violation shutdownS1(config-if)#exitS1(config)#exit
View the new port security settings on port 12
S1#show port-security interface fastEthernet 0/12Port Security : EnabledPort Status : ecure-upViolation Mode : ShutdownAging Time : 0 minsAging Type : AbsoluteSecureStatic Address Aging : DisabledMaximum MAC Addresses : 1
Total MAC Addresses : 1Configured MAC Addresses : 0Sticky MAC Addresses : 1Last Source Address : 0005.5e17.4a40Security Violation Count : 0
View the new port security settings on port 12 post violation
S1#show port-security interface fastEthernet 0/12Port Security : EnabledPort Status : ecure-shutdownViolation Mode : ShutdownAging Time : 0 minsAging Type : AbsoluteSecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1Total MAC Addresses : 1Configured MAC Addresses : 0Sticky MAC Addresses : 1Last Source Address : 000d.bd11.c580Security Violation Count : 1
Enter configuration mode
S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Restore connectivity on violated port
S1(config)#interface fastEthernet 0/12S1(config-if)#shutdownS1(config-if)#no shutdownS1(config-if)#exitS1(config)#exit
5/21/2018 Cisco ICND1 Lab Guide v1.0
16/65
www.subnet192.com1
C i C C E N T
L b G i d
Verify your configuration
S1#show port-securitySecure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)---------------------------------------------------------------------------
Fa0/12 1 1 1 Shutdown---------------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0Max Addresses limit in System (excluding one mac per port) : 1024
S1#show port-security addressSecure Mac Address Table
-------------------------------------------------------------------Vlan Mac Address Type Ports Remaining Age
(mins)---- ----------- ---- ----- -------------
1 0005.5e17.4a40 SecureSticky Fa0/12 --------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0Max Addresses limit in System (excluding one mac per port) : 1024
5/21/2018 Cisco ICND1 Lab Guide v1.0
17/65
www.subnet192.com17
CiscoCCENT
LabGuide
Configure VLANs
Objectives
By default, all ports are members of VLAN 1. Create new VLANs and assign them ports.
TasksCreate VLANs
o Create VLAN 10, with a description of Sales
o Create VLAN 20, with a description of Marketing
o
Create VLAN 30, with a description of Research
Assign ports to VLANs
o Assign ports 5-6 to VLAN 10
o Assign ports 7-8 to VLAN 20
o Assign ports 9 to VLAN 30
Review VLAN configuration
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
18/65
www.subnet192.com1
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ) or via
Telnet.
Enter privileged mode
S1>enable
Enter configuration mode
S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Create VLANs
S1(config)#VLAN 10S1(config-vlan)#name alesS1(config-vlan)#VLAN 20S1(config-vlan)#name MarketingS1(config-vlan)#VLAN 30S1(config-vlan)#name ResearchS1(config-vlan)#exit
Assign ports to VLANs
S1(config)#interface range fastEthernet 0/5 - 6S1(config-if-range)#switchport access vlan 10
S1(config)#interface range fastEthernet 0/7 - 8S1(config-if-range)#switchport access vlan 20
S1(config)#interface fastEthernet 0/9
S1(config-if)#switchport access vlan 30S1(config-if)#exitS1(config)#exit
5/21/2018 Cisco ICND1 Lab Guide v1.0
19/65
www.subnet192.com19
CiscoCCENT
LabGuide
Review VLAN configuration
S1#show vlan brief
VLAN Name Status Ports---- ------------------------ --------- ---------------------------1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4,
Fa0/10, Fa0/11. Fa0/12, Fa0/13,Fa0/14, Fa0/15. Fa0/16, Fa0/17,Fa0/18, Fa0/19. Fa0/20, Fa0/21,Fa0/22, Fa0/23. Fa0/24
10 Sales active Fa0/5, Fa0/620 Marketing active Fa0/7, Fa0/830 Research active Fa0/91002 fddi-default act/unsup1003 token-ring-default act/unsup1004 fddinet-default act/unsup1005 trnet-default act/unsup
5/21/2018 Cisco ICND1 Lab Guide v1.0
20/65
www.subnet192.com2
C i C C E N T
L b G i d
Flash and nvram management
Objectives
Managing and safeguarding the IOS image and configurations.
Preparation Install TFTPD32 on your PC.
Create a folder on your PC with a new IOS image to upload to the switch.
Tasks
Backup the configuration to TFTP.
View the contents of flash memory.
Backup the current IOS image to TFTP.
From the IOS, send a new IOS image to a switch using TFTP.
From ROMMON, send a new IOS image to a switch using TFTP.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
21/65
www.subnet192.com21
CiscoCCENT
LabGuide
Walkthrough
Enter privileged mode
S1>enable
Backup the configuration to TFTP
S1#copy startup-config tftpAddress or name of remote host []? 192.168.1.100Destination filename [s1-confg]?
View the contents of the flash memory
S1#dir flash:Directory of flash:/
2 -rwx 112 Mar 01 1993 01:37:46 +00:00 info3 -rwx 330 Mar 01 1993 01:42:25 +00:00 env_vars
4 -rwx 2126 Mar 01 1993 00:09:19 +00:00 config.text5 -rwx 1100 Mar 01 1993 00:09:19 +00:00 private-config.text7 -rwx 3721946 Mar 01 1993 01:40:37 +00:00 c2950-i6k2l2q4-mz.121-22.EA13.bin8 drwx 4416 Mar 01 1993 01:41:38 +00:00 html
332 -rwx 112 Mar 01 1993 01:42:17 +00:00 info.ver333 -rwx 976 Mar 07 1993 02:47:58 +00:00 vlan.dat
7741440 bytes total (2142208 bytes free)
Backup the current IOS to TFTP
S1#copy flash tftpSource filename []? c2950-i6k2l2q4-mz.121-22.EA13.binAddress or name of remote host []? 192.168.1.100Destination filename [c2950-i6k2l2q4-mz.121-22.EA13.bin]?
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!3721946 bytes copied in 27.988 secs (132984 bytes/sec)
From the IOS, send a new IOS image to a switch using TFTP
S1#copy tftp flashAddress or name of remote host []? 192.168.1.100Source filename []? c2950-i6k2l2q4-mz.121-22.EA13.binDestination filename [c2950-i6k2l2q4-mz.121-22.EA13.bin]?##################################################################################################################################################[ok]
S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.S1(config)#boot system flash c2950-i6k2l2q4-mz.121-22.EA13.binS1(config)#exit
5/21/2018 Cisco ICND1 Lab Guide v1.0
22/65
www.subnet192.com2
C i C C E N T
L b G i d
From ROMMON, send a new IOS image to a switch using TFTP
To get into ROMMON, press CTRL-BREAK during the boot sequence (power up) of the switch.
ROMMON>IP_ADDRESS=192.168.1.5ROMMON>IP_SUBNET_MASK=255.255.255.0
ROMMON>DEFAULT_GATEWAY=192.168.1.1ROMMON>TFTP_SERVER=192.168.1.100ROMMON>TFTP_FILE= c2950-i6k2l2q4-mz.121-22.EA13.binROMMON>tftpdnld
5/21/2018 Cisco ICND1 Lab Guide v1.0
23/65
www.subnet192.com23
CiscoCCENT
LabGuide
Miscellaneous commands of interest
Objectives
There are some commands that you can use to improve the device management experience. Here are
some more configuration tasks you can perform.
Tasks
Configure the console logging to not overlap the command prompt
Disable the session timeout
Create an alias called save to save your running configuration to nvram:
Prevent DNS lookups
Create an entry in the host name table called TFTPServer and test connectivity
Configure the command history buffer to remember 15 commands.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
24/65
www.subnet192.com2
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ) or via
Telnet.
Enter configuration mode
S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Configure the console logging to not overlap the command prompt
S1(config)#line console 0S1(config-line)#logging synchronousS1(config-line)#exit
Disable the session timeout
S1(config)#line console 0S1(config-line)#exec-timeout 0S1(config-line)#exit
Create an alias called save to save your running configuration to nvram:
S1(config)#alias exec save copy running-config startup-config
Prevent DNS lookup
S1(config)#no ip domain-lookup
Create an entry in the host name table called TFTPServer and test connectivity
S1(config)#ip host TFTPServer 192.168.1.100S1(config)#exitS1#ping TFTPServerType escape sequence to abort.Sending 5, 100-byte ICMP Echos to 192.168.1.100, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
Configure the command history buffer to remember 15 commands
S1#terminal history size 15
5/21/2018 Cisco ICND1 Lab Guide v1.0
25/65
www.subnet192.com25
CiscoCCENT
LabGuide
Lab 2 Configuring R1 Basic router configurations
Material required: 1 router, 1 PC, console (rollover) cable, crossover Ethernet cable
Enabling connectivity
Objectives
This lab will guide you in configuring a router from a factory default state. The steps in this lab are very
similar to the basic switch configuration, with minor (but important) differences.
Preparation
Connect the console (rollover) cable from the PC to the Console port of the router.
Connect the crossover Ethernet cable from the PC to the FastEthernet 0/0 port of the router.
Tasks
Restore the router to factory defaults
Set the host name
Set the console password
Set the privileged mode password
Configure the FastEthernet 0/0 interface.
o Set the IP address and subnet mask
o Configure to 100mbps/Full Duplex
o Enable the interface
Enable Telnet connectivity
Verify the running configuration
View the interface list summary
Test the Telnet connection
View currently connected users and which lines are used.
Save the configuration
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
26/65
www.subnet192.com2
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )
Enter privileged mode
Router>enable
Enter configuration mode
Router#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Set the host name
Router(config)#hostname R1
Set the console password
R1(config)#line console 0R1(config-line)#password ciscoR1(config-line)#exit
Set the privileged mode password
R1(config)#enable password ciscoexec
Configure the FastEthernet 0/0 interface
R1(config)#interface fastethernet 0/0R1(config-if)#ip address 192.168.1.1 255.255.255.0R1(config-if)#no shutdownR1(config-if)#speed 100R1(config-if)#duplex fullR1(config-if)#exit
Enable Telnet connectivity
R1(config)#line vty 0 4R1(config-line)#password remoteR1(config-line)#loginR1(config-line)#transport input telnetR1(config-line)#exitR1(config)#exit
5/21/2018 Cisco ICND1 Lab Guide v1.0
27/65
www.subnet192.com27
CiscoCCENT
LabGuide
Verify the running configuration
The following output has been edited for space considerations.
R1#show running-config
Building configuration...
Current configuration : 834 bytes!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname R1!boot-start-markerboot-end-marker!enable password ciscoexec!interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0speed 100full-duplex
!interface Serial0/0no ip addressshutdown
!interface Serial0/1no ip addressshutdown
!ip forward-protocol nd!ip http serverno ip http secure-server!line con 0password cisco
line aux 0line vty 0 4password remotelogintransport input telnet
!end
View the interface list summary
R1#show ip interface briefInterface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.1.1 YES manual up upSerial0/0 unassigned YES unset administratively down downSerial0/1 unassigned YES unset administratively down down
Test the Telnet connection
From your PC connected to switch via an Ethernet cable, open your terminal emulator software
and connect to the switch using the Telnet protocol.
5/21/2018 Cisco ICND1 Lab Guide v1.0
28/65
www.subnet192.com2
C i C C E N T
L b G i d
View currently connected users and which lines are used.
R1#show usersLine User Host(s) Idle Location0 con 0 idle 00:03:35
* 66 vty 0 idle 00:00:00 192.168.1.100
Interface User Mode Idle Peer Address
R1#show lineTty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int
* 0 CTY - - - - - 0 1 0/0 -65 AUX 9600/9600 - - - - - 0 0 0/0 -
* 66 VTY - - - - - 1 0 0/0 -67 VTY - - - - - 0 0 0/0 -68 VTY - - - - - 0 0 0/0 -69 VTY - - - - - 0 0 0/0 -70 VTY - - - - - 0 0 0/0 -
Line(s) not in async mode -or- with no hardware support:1-64
Save the configuration
R1#copy running-config startup-configDestination filename [startup-config]?Building configuration...[OK]
5/21/2018 Cisco ICND1 Lab Guide v1.0
29/65
www.subnet192.com29
CiscoCCENT
LabGuide
Enhancing security
Objectives
Your router has been configured in the previous lab, but could use a bit more security. Complete the
following tasks to enhance the security of your router.
Tasks
Set the secured privileged mode password to ciscosecret
Set notification banners
o Message of the Day: AUTHORIZED PERSONEL ONLY
o Login: ACCESS RESTRICTED
Encrypt all clear text passwords
Enable SSH connectivity with local authentication. Disable Telnet.
o
Create an account named admin with a password of cisco
o
Use domain name subnet192.com
Verify the cryptographic key Save the configuration
Verify your configuration
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
30/65
www.subnet192.com3
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal )
Enter privileged mode
R1>enable
Enter configuration mode
R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
Set the secured privileged mode password
R1(config)#enable secret ciscosecret
Set notification banners (Login and Message of the Day)
R1(config)#banner login ! ACCE RE TRICTED !R1(config)#banner motd ! AUTHORIZED PER ONEL ONLY !
Encrypt all clear text passwords
R1(config)#service password-encryption
Enable SSH connectivity with local authentication. Disable Telnet.
R1(config)#ip domain-name subnet192.comR1(config)#username adminpassword ciscoR1(config)#crypto key generate rsaThe name for the keys will be: R1.subnet192.comChoose the size of the key modulus in the range of 360 to 2048 for your General PurposeKeysChoosing a key modulus greater than 512 may take a few minutes.How many bits in the modulus [512]:Generating RSA keys ...[OK]
R1(config)#line vty 0 4R1(config-line)#login localR1(config-line)#transport input sshR1(config-line)#exitR1(config)#exit
5/21/2018 Cisco ICND1 Lab Guide v1.0
31/65
www.subnet192.com31
CiscoCCENT
LabGuide
Verify cryptographic key
R1#Show crypto key mypubkey rsa% Key pair was generated at: 21:31:48 EST Mar 6 1993Key name: R1.subnet192.comUsage: General Purpose KeyKey Data:305C300D 06092A86 4886F70D 01010105 00034B00 30480241 00F242D9 39F85F01A50E9A4F 37055405 2DB4D613 6C5259CF ACF5AB5B E28DFAB2 D1020301 0001
% Key pair was generated at: 08:32:29 EST Mar 7 1993Key name: R1.subnet192.com.serverUsage: Encryption KeyKey Data:307C300D 06092A86 4886F70D 01010105 00036B00 30680261 00B1509F 1EDFEA0A39F7C421 3D1F86EF 752E5937 EACADEBC F959D757 218F4068 AB020301 0001
Save the configuration
R1#copy running-config startup-configDestination filename [startup-config]?Building configuration...
[OK]
5/21/2018 Cisco ICND1 Lab Guide v1.0
32/65
www.subnet192.com3
C i C C E N T
L b G i d
Verify the configuration
The following output has been edited for space considerations.
R1#show running-config
Building configuration...
Current configuration : 1010 bytes!version 12.4service timestamps debug datetime msecservice timestamps log datetime msecservice password-encryption!hostname R1!boot-start-markerboot-end-marker!enable password 7 045802150C2E49560C1A!ip domain name subnet192.com
ip auth-proxy max-nodata-conns 3ip admission max-nodata-conns 3!username admin password 7 0822455D0A16!interface FastEthernet0/0ip address 192.168.1.1 255.255.255.0speed 100full-duplex
!interface Serial0/0no ip addressshutdown
!interface Serial0/1no ip addressshutdown
!ip forward-protocol nd!ip http serverno ip http secure-server!banner login ^C ACCESS RESTRICTED ^Cbanner motd ^C AUTHORIZED PERSONEL ONLY ^C!line con 0password 7 121A0C041104
line aux 0line vty 0 4password 7 1317121F041801login localtransport input ssh
!End
5/21/2018 Cisco ICND1 Lab Guide v1.0
33/65
www.subnet192.com33
CiscoCCENT
LabGuide
Flash and nvram management
Objectives
Managing and safeguarding the IOS image and configurations.
Preparation Install TFTPD32 on your PC (if not done in Lab 1)
Create a folder on your PC with a new IOS image to upload to the router.
Tasks
Backup the configuration to TFTP.
View the contents of flash memory.
Backup the current IOS image to TFTP.
From the IOS, send a new IOS image to a switch using TFTP.
From ROMMON, send a new IOS image to a switch using TFTP.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
34/65
www.subnet192.com3
C i C C E N T
L b G i d
Walkthrough
Enter privileged mode
R1>enable
Backup the configuration to TFTP
R1#copy startup-config tftpAddress or name of remote host []? 192.168.1.100Destination filename [r1-confg]?
View the contents of the flash memory
R1#dir flash:Directory of flash:/
1 -rw- 28542192 c2600-advipservicesk9-mz.124-23.bin
49807356 bytes total (21265100 bytes free)
Backup the current IOS to TFTP
R1#copy flash tftp
Source filename []? c2600-advipservicesk9-mz.124-23.binAddress or name of remote host []? 192.168.1.100
Destination filename [c2600-advipservicesk9-mz.124-23.bin]?!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!3721946 bytes copied in 27.988 secs (132984 bytes/sec)
From the IOS, send a new IOS image to a switch using TFTP
R1#copy tftp flashAddress or name of remote host []? 192.168.1.100
Source filename []?c2600-advipservicesk9-mz.124-23.binDestination filename [c2600-advipservicesk9-mz.124-23.bin]?##################################################################################################################################################[ok]
R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
R1(config)#boot system flash c2600-advipservicesk9-mz.124-23.binR1(config)#exit
From ROMMON, send a new IOS image to a switch using TFTP
To get into ROMMON, press CTRL-BREAK during the boot sequence (power up) of the switch.
ROMMON>IP_ADDRESS=192.168.1.1ROMMON>IP_SUBNET_MASK=255.255.255.0ROMMON>DEFAULT_GATEWAY=192.168.1.1ROMMON>TFTP_SERVER=192.168.1.100ROMMON>TFTP_FILE= c2600-advipservicesk9-mz.124-23.binROMMON>tftpdnld
5/21/2018 Cisco ICND1 Lab Guide v1.0
35/65
www.subnet192.com35
CiscoCCENT
LabGuide
Lab 3 Interconnecting components
Objectives
Lets build on what we have learned so far and start adding more devices to our lab. Lets add 2 more
switches and connect the R1 router to our topology.
Configuring S2 and S3
Objectives
Configure the additional switches to create a functional multi-component environment.
Preparation
Connect R1s FastEthernet 0/0 interface to FastEthernet port 0/1 of S1.
Connect S2s FastEthernet port 0/1 to FastEthernet port 0/2 of S1
Connect S3s FastEthernet port 0/1 to FastEthernet port 0/3 of S1
Connect the PC to FastEthernet port 0/4 of S1.
Tasks
Using what you have practiced so far, configure the new S2 and S3 switches like you did in Lab 1
Enabling connectivity. Alternatively, you can use the script in the walkthrough section to
automate the configuration.
Disable SSH on S1 and remove the local user Admin account. This will make connectivity easier
for future labs.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
36/65
www.subnet192.com3
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).
S2 and S3 configuration script
Start by resetting the switches to the factory default, and reload. Once restarted, when back atthe Switch> prompt, copy and paste the following script to configure it. Items in bold vary from
device to device.
enableconfigure terminalhostname 2service password-encryptionalias exec save copy run startip default-gateway 192.168.1.1enable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p.enable password 7 094F471A1A0A120A0E0Fip domain-name subnet192.com
interface range fa0/1 24speed 100duplex fullexitinterface vlan 1ip address 192.168.1.6255.255.255.0exitbanner login ^C ACCESS RESTRICTED ^Cbanner motd ^C AUTHORIZED PERSONEL ONLY ^Cline con 0password 7 02050D480809line vty 0 4password 7 105C0C140A0317logintransport input telnetline vty 5 15password 7 105C0C140A0317transport input telnetendsave
Disable SSH on S1, remove the admin account.
S1#configure terminalS1(config)#line vty 0 15S1(config-line)#transport input telnetS1(config-line)#loginS1(config-line)#exitS1(config)#no username adminpassword cisco
5/21/2018 Cisco ICND1 Lab Guide v1.0
37/65
www.subnet192.com37
CiscoCCENT
LabGuide
Session Management
Objectives
Experiment with remote sessions between devices.
Tasks Session management
o From S1, open a telnet connection to S2 (192.168.1.6)
o
Return to the S1 prompt without closing the connection to S2.
o
From S1, open a telnet connection to S3 (192.168.1.7)
o Return to the S1 prompt without closing the connection to S3.
o Display the list of opened sessions (notice which one has a *)
o Resume the S2 session (192.168.1.6)
o Display the users connected to S2.
o Close the session to S2 permanently.
o
Verify that the session is closed.o From the S1 prompt, close the session to S3.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
38/65
www.subnet192.com3
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).
From S1, open a telnet connection to S2 (192.168.1.6)
S1>telnet 192.168.1.6Trying 192.168.1.6 ... OpenAUTHORIZED PERSONEL ONLYACCESS RESTRICTED
User Access VerificationPassword:
Return to the S1 prompt without closing the connection to S2.
CTRL-SHIFT-6 then X
From S1, open a telnet connection to S3 (192.168.1.7)
S1>telnet 192.168.1.7Trying 192.168.1.7 ... OpenAUTHORIZED PERSONEL ONLYACCESS RESTRICTED
User Access VerificationPassword:
Return to the S1 prompt without closing the connection to S3.
CTRL-SHIFT-6 then X
Display the list of opened sessions (notice which one has a *)
S1>show sessionsConn Host Address Byte Idle Conn Name
1 192.168.1.6 192.168.1.6 0 0 192.168.1.6* 2 192.168.1.7 192.168.1.7 0 0 192.168.1.7
Resume the S2 session (192.168.1.6)
S1>resume 1
or simplyS1>1
Display the users connected to S2.
S2>show usersLine User Host(s) Idle Location
* 1 vty 0 idle 00:00:00 192.168.1.5
Interface User Mode Idle Peer Address
5/21/2018 Cisco ICND1 Lab Guide v1.0
39/65
www.subnet192.com39
CiscoCCENT
LabGuide
Close the session to S2 permanently.
S2>exit[Connection to 192.168.1.6 closed by foreign host]
Verify that the session is closed.
S1>show sessionsConn Host Address Byte Idle Conn Name* 2 192.168.1.7 192.168.1.7 0 3 192.168.1.7
From the S1 prompt, close the session to S3 (192.168.1.7)
S1>disconnect 2
5/21/2018 Cisco ICND1 Lab Guide v1.0
40/65
www.subnet192.com4
C i C C E N T
L b G i d
Network identification
Objectives
Discover connected devices and document the topology of an unknown environment.
TasksAssume you dont know the topology of the network and you need to document it. You connect to
switch S1 thru the console port and from there; you must use various commands to help you create the
diagram with port and IP information:
Device ID S1.subnet192.com S2.subnet192.com S3.subnet192.com R1.subnet192.com
IP address/mask
Platform
Capabilities
IOS version
Incoming port to S1 n/a
Outgoing port from device n/a
Start by getting the information about the device youre connected to. Remember, this is an
unknown network to you, so find out as much as you can from this device! Do this without
looking at the running or startup configuration.
Display a summary list of all the devices known to S1.
Display detailed information about each of these devices, from the S1 prompt.
Use telnet to go to the other devices to complete the missing information.
o Display a summary list of all the mac-addresses known to S1.
o Display a summary list of all the devices known to S2.
o Display a summary list of all the devices known to S3.
o
Display a summary list of all the devices known to R1.
Using all these steps should allow you to document your network
and even draw out your diagram from scratch, identifying which
devices are visible and which interface to use to get to them.
Once you have completed the table, configure R1 to not advertise its presence to others.
Display a summary list of all the devices known to S1. R1 should no longer be listed (it might
take a few minutes to disappear)
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
41/65
www.subnet192.com41
CiscoCCENT
LabGuide
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).
Show information about the local device
S1>show versionCisco Internetwork Operating System SoftwareIOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22)EA13 IO VersionTechnical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by cisco Systems, Inc.Compiled Fri 27-Feb-09 22:20 by amvarmaImage text-base: 0x80010000, data-base: 0x80680000
ROM: Bootstrap program is C2950 boot loader
S1 uptime is 1 hour, 51 minutesSystem returned to ROM by power-onSystem image file is "flash:c2950-i6k2l2q4-mz.121-22.EA13.bin"
cisco WS-C2950-24 (RC32300) processor (revision E0) with 19912K bytes of memory.Processor board ID FHK0626X0H9Last reset from system-reset
Running Standard Image24 FastEthernet/IEEE 802.3 interface(s)
32K bytes of flash-simulated non-volatile configuration memory.Base ethernet MAC Address: 00:0A:41:17:53:00Motherboard assembly number: 73-5781-10Power supply part number: 34-0965-01Motherboard serial number: FOC0625077SPower supply serial number: DAB0625576EModel revision number: E0Motherboard revision number: B0
Model number: W -C2950-24 PlatformSystem serial number: FHK0626X0H9Configuration register is 0xF
S1>show ip interfaceVlan1 is up, line protocol is up
Internet address is 192.168.1.5/24 IP address/maskBroadcast address is 255.255.255.255Address determined by non-volatile memoryMTU is 1500 bytesHelper address is not setDirected broadcast forwarding is disabledOutgoing access list is not setInbound access list is not setProxy ARP is enabledLocal Proxy ARP is disabledSecurity level is defaultSplit horizon is enabledICMP redirects are always sentICMP unreachables are always sentICMP mask replies are never sentIP fast switching is disabledIP fast switching on the same interface is disabledIP Null turbo vectorIP multicast fast switching is disabledIP multicast distributed fast switching is disabled
5/21/2018 Cisco ICND1 Lab Guide v1.0
42/65
www.subnet192.com4
C i C C E N T
L b G i d
Display a summary list of all the devices known to S1
S1>show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID Local Intrfce Holdtme Capability Platform Port IDS3.subnet192.com Fas 0/3 176 S I WS-C2950G-Fas 0/1S2.subnet192.com Fas 0/2 175 S I WS-C2950G-Fas 0/1R1.subnet192.com Fas 0/1 144 R 2620 Fas 0/0
Display detailed information about each of these devices, from the S1 prompt
S1>show cdp neighbors detail-------------------------
Device ID: 3.subnet192.com Device IDEntry address(es):
IP address: 192.168.1.7Platform: cisco W -C2950G-24-EI, Capabilities: witch IGMP Platform & capabilities
Interface: FastEthernet0/3, Port ID (outgoing port): FastEthernet0/1 I/O Ports
Holdtime : 157 sec
Version :Cisco Internetwork Operating System Software
IOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22) EA13 IO VersionTechnical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by cisco Systems, Inc.Compiled Fri 27-Feb-09 22:20 by amvarma
advertisement version: 2Protocol Hello: OUI=0x00000C, Protocol ID=0x0112; payload len=27,value=00000000FFFFFFFF010221FF00000000000000131A2C2700FF0000Native VLAN: 1Duplex: fullManagement address(es):IP address: 192.168.1.7
-------------------------Device ID: S2.subnet192.comEntry address(es):IP address: 192.168.1.6
Platform: cisco WS-C2950G-12-EI, Capabilities: Switch IGMPInterface: FastEthernet0/2, Port ID (outgoing port): FastEthernet0/1Holdtime : 91 sec
Version :Cisco Internetwork Operating System SoftwareIOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22)EA13, RELEASE SOFTWARE (fc2)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by cisco Systems, Inc.Compiled Fri 27-Feb-09 22:20 by amvarma
advertisement version: 2
Protocol Hello: OUI=0x00000C, Protocol ID=0x0112; payload len=27,value=00000000FFFFFFFF010221FF00000000000000152B1C9A40FF0000Native VLAN: 1Duplex: fullManagement address(es):IP address: 192.168.1.6
5/21/2018 Cisco ICND1 Lab Guide v1.0
43/65
www.subnet192.com43
CiscoCCENT
LabGuide
-------------------------Device ID: R1.subnet192.comEntry address(es):
IP address: 192.168.1.1Platform: cisco 2620, Capabilities: RouterInterface: FastEthernet0/1, Port ID (outgoing port): FastEthernet0/0Holdtime : 39 sec
Version :Cisco Internetwork Operating System SoftwareIOS (tm) C2600 Software (C2600-D-M), Version 12.2(5a), RELEASE SOFTWARE (fc1)Copyright (c) 1986-2001 by cisco Systems, Inc.Compiled Thu 04-Oct-01 19:45 by pwade
advertisement version: 2Duplex: fullManagement address(es):
Display a summary list of all the mac-addresses known to S1
S1>show mac address-tableMac Address Table
-------------------------------------------
Vlan Mac Address Type Ports---- ----------- -------- -----All 000a.4117.5300 STATIC CPUAll 0100.0ccc.cccc STATIC CPUAll 0100.0ccc.cccd STATIC CPUAll 0100.0cdd.dddd STATIC CPU1 0005.5e17.4a40 DYNAMIC Fa0/11 0013.1a2c.2701 DYNAMIC Fa0/31 0015.2b1c.9a41 DYNAMIC Fa0/2
Total Mac Addresses for this criterion: 7
Display a summary list of all the devices known to S2
S1#telnet 192.168.1.6Trying 192.168.1.6 ... Open
AUTHORIZED PERSONEL ONLYACCESS RESTRICTED
User Access Verification
Password:
S2>show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID Local Intrfce Holdtme Capability Platform Port IDS1.subnet192.com Fas 0/1 144 S I WS-C2950-2Fas 0/2
S2>exit
5/21/2018 Cisco ICND1 Lab Guide v1.0
44/65
www.subnet192.com4
C i C C E N T
L b G i d
Display a summary list of all the devices known to S3
S1#telnet 192.168.1.7Trying 192.168.1.7 ... Open
AUTHORIZED PERSONEL ONLYACCESS RESTRICTED
User Access Verification
Password:
S3>show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID Local Intrfce Holdtme Capability Platform Port IDS1.subnet192.com Fas 0/1 144 S I WS-C2950-2Fas 0/3
S3>exit
Display a summary list of all the devices known to R1
S1#telnet 192.168.1.1Trying 192.168.1.1 ... Open
AUTHORIZED PERSONEL ONLYACCESS RESTRICTED
User Access Verification
Password:
R1>show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
Device ID Local Intrfce Holdtme Capability Platform Port ID
S1.subnet192.com Fas 0/0 167 S I WS-C2950-2Fas 0/1
R1>exit
5/21/2018 Cisco ICND1 Lab Guide v1.0
45/65
www.subnet192.com45
CiscoCCENT
LabGuide
Lab 4 Full topology
Objectives
In this lab we complete the topology and start having fun with routing protocols.
Preparation
Configure R2 and R3 using the steps from Lab 2.
Connect R1 Serial 0/0 interface (DCE) to Serial 0/1 of R2 (DTE).
Connect R2 Serial 0/0 interface (DCE) to Serial 0/1 of R3 (DTE).
Connect your internet link to R3s FastEthernet interface.
Connect any device in the Ethernet port of R2 and R3 to bring the link up.
Configuring R2 and R3
Objectives
Configure the serial interfaces to simulate WAN connectivity between the routers.
Tasks
Using what you have practiced so far, configure the new R2 and R3 routers like you did in Lab 2
Enabling connectivity. Alternatively, you can use the script in the walkthrough section to
automate the configuration. Disable SSH on R1 and remove the local user Admin account. This will make connectivity easier
for future labs.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
46/65
www.subnet192.com4
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).
R2 and R3 configuration script
Start by resetting the routers to the factory default, and reload. Once restarted, when back atthe Router> prompt, copy and paste the following script to configure it. Items in bold vary from
device to device.
enableconfigure terminalhostname R2service password-encryptionalias exec save copy run startenable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p.enable password 7 094F471A1A0A120A0E0Fip domain-name subnet192.cominterface fastethernet 0/0ip address 10.50.0.1 255.255.255.0
no shutdownspeed 100duplex fullexitbanner login ^C ACCESS RESTRICTED ^Cbanner motd ^C AUTHORIZED PERSONEL ONLY ^Cline con 0logging synchronouspassword 7 02050D480809line vty 0 4password 7 105C0C140A0317logintransport input telnetline vty 5 15password 7 105C0C140A0317transport input telnet
endsave
5/21/2018 Cisco ICND1 Lab Guide v1.0
47/65
www.subnet192.com47
CiscoCCENT
LabGuide
Serial Connectivity
Objectives
Configure the serial interfaces to simulate WAN connectivity between the routers.
Tasks Verify that serial interface 0/0 on R1 is the DCE
Configure serial interface 0/0 on R1 with a clock rate of 56000.
Configure serial interface 0/1 on R2.
Verify that serial interface 0/0 on R2 is the DCE
Configure serial interface 0/0 on R2 with a clock rate of 9600.
Configure serial interface 0/1 on R3.
Display R2s neighbors list to validate connectivity with R1 and R3.
Verify the WAN protocol used by R2 on serial interface 0/1.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
48/65
www.subnet192.com4
C i C C E N T
L b G i d
Walkthrough
Connect via the console cable or telnet using a terminal emulator (Putty, Tera-term, Hyper-Terminal ).
Verify that serial interface 0/0 on R1 is the DCE
R1#show controllers serial 0/0Interface Serial0/0Hardware is PowerQUICC MPC860
DCE V.35, no clock DCE or DTE status and clock rate
idb at 0x8497AB4C, driver data structure at 0x84982270SCC Registers:General [GSMR]=0x2:0x00000030, Protocol-specific [PSMR]=0x8Events [SCCE]=0x0000, Mask [SCCM]=0x001F, Status [SCCS]=0x06Transmit on Demand [TODR]=0x0, Data Sync [DSR]=0x7E7EInterrupt Registers:Config [CICR]=0x00367F80, Pending [CIPR]=0x00000A00Mask [CIMR]=0x30200440, In-srv [CISR]=0x00000000Command register [CR]=0x640
Configure interface S0/0 on R1 with a clock rate of 56000
R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R1(config)#R1(config)#interface serial 0/0R1(config-if)#ip address 172.16.0.1 255.255.255.252R1(config-if)#no shutdownR1(config-if)#clock rate 56000R1(config)#
Configure interface S0/1 on R2 as the DTE
R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
R2(config)#R2(config)#interface serial 0/1R2(config-if)#ip address 172.16.0.2 255.255.255.252R2(config-if)#no shutdownR2(config-if)#
Verify that serial interface 0/0 on R2 is the DCE
R2#show controllers serial 0/0Interface Serial0/0Hardware is PowerQUICC MPC860DCE V.35, no clock DCE or DTE status and clock rate
idb at 0x8497AB4C, driver data structure at 0x84982270SCC Registers:
General [GSMR]=0x2:0x00000030, Protocol-specific [PSMR]=0x8Events [SCCE]=0x0000, Mask [SCCM]=0x001F, Status [SCCS]=0x06Transmit on Demand [TODR]=0x0, Data Sync [DSR]=0x7E7EInterrupt Registers:Config [CICR]=0x00367F80, Pending [CIPR]=0x00000A00Mask [CIMR]=0x30200440, In-srv [CISR]=0x00000000Command register [CR]=0x640
5/21/2018 Cisco ICND1 Lab Guide v1.0
49/65
www.subnet192.com49
CiscoCCENT
LabGuide
Configure interface S0/0 on R2 with a clock rate of 9600
R2(config)#interface serial 0/0R2(config-if)#ip address 172.16.1.1 255.255.255.252R2(config-if)#clock rate 9600R2(config-if)#no shutdownR2(config-if)#
Configure interface S0/1 on R3 as the DTE
R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R2(config)#R2(config)#interface serial 0/1R2(config-if)#ip address 172.16.1.2 255.255.255.252R2(config-if)#no shutdownR2(config-if)#
Display R2s neighbors list to validate connectivity with R1 and R3
R2#show cdp neighborsCapability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
Device ID Local Intrfce Holdtme Capability Platform Port IDR3.subnet192.com Ser 0/0 150 R S I 2620XM Ser 0/1R1.subnet192.com Ser 0/1 172 R S I 2620XM Ser 0/0R2#
Verify the WAN protocol used by R2 on serial interface 0/1
R2#show interfaces serial 0/1Serial0/1 is up, line protocol is up
Hardware is PowerQUICC Serial
Internet address is 172.16.0.2/30MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set WAN encapsulation protocolKeepalive set (10 sec)Last input 00:00:03, output 00:00:09, output hang neverLast clearing of "show interface" counters neverInput queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0Queueing strategy: weighted fairOutput queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/2/256 (active/max active/max total)Reserved Conversations 0/0 (allocated/max allocated)Available Bandwidth 1158 kilobits/sec
5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec
112 packets input, 8720 bytes, 0 no bufferReceived 92 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort137 packets output, 9981 bytes, 0 underruns0 output errors, 0 collisions, 13 interface resets0 unknown protocol drops0 output buffer failures, 0 output buffers swapped out28 carrier transitionsDCD=up DSR=up DTR=up RTS=up CTS=up
5/21/2018 Cisco ICND1 Lab Guide v1.0
50/65
www.subnet192.com5
C i C C E N T
L b G i d
PPP with Authentication
Objectives
Serial connectivity defaults to HDLC encapsulation on Cisco equipment. We will change it to PPP and use
CHAP authentication.
Tasks
Enable PPP encapsulation on serial interface 0/0 of R1
o
The serial link with R2 will go down.
Display the status of serial interface 0/0.
Enable PPP encapsulation on serial interface 0/1 of R2
o The serial link with R1 will come back up.
Enable CHAP on both serial interfaces of the link between R1 and R2.
o
Create the security accounts on both routers
o
Enable CHAP authentication on both routers
The link between R1 and R2 is now using PPP and the link between R2 and R3 will be using HDLC.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
51/65
www.subnet192.com51
CiscoCCENT
LabGuide
Walkthrough
Enable PPP encapsulation on serial interface 0/0 of R1
R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface serial 0/0R1(config-if)#encapsulation ppp
Display the status of serial interface 0/0
R1#show interfaces serial 0/0
Serial0/0 is up, line protocol is down Link is downHardware is PowerQUICC SerialInternet address is 172.16.0.1/30MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 252/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set WAN encapsulation protocolKeepalive set (10 sec)LCP ListenClosed: IPCP, CDPCPLast input 00:00:02, output 00:00:08, output hang neverLast clearing of "show interface" counters 00:00:26Queueing strategy: fifoOutput queue 0/40, 0 drops; input queue 0/75, 0 drops5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec
4 packets input, 423 bytes, 0 no bufferReceived 0 broadcasts, 0 runts, 0 giants, 0 throttles1 input errors, 0 CRC, 1 frame, 0 overrun, 0 ignored, 0 abort9 packets output, 126 bytes, 0 underruns0 output errors, 0 collisions, 1 interface resets0 output buffer failures, 0 output buffers swapped out0 carrier transitionsDCD=up DSR=up DTR=up RTS=up CTS=up
Enable PPP encapsulation on serial interface 0/1 of R2
R2#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R2(config)#interface serial 0/1R2(config-if)#encapsulation ppp
Enable CHAP on both serial interfaces of the link between R1 and R2
On R1:
R1(config)#user R2 password subnet192R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.R1(config)#interface serial 0/0R1(config)#ppp authentication chap
On R2:
R2(config)#user R1 password subnet192R2#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R2(config)#interface serial 0/1R2(config)#ppp authentication chap
5/21/2018 Cisco ICND1 Lab Guide v1.0
52/65
www.subnet192.com5
C i C C E N T
L b G i d
Routing: Static Routes
Objectives
Understanding static routes, default routes and connected routes.
TasksConnectivity between all devices is established but at the moment, the routers dont know the paths to
any other routes other than the connected ones.
One way trip
From R1:
o
Display the routing table.
Note the connected routes, already known by the router as they are locally
connected to its interface.
o Create a static route to R2s 10.50.0.0/24 network, using the IP address of R2s interface
as the next hop.o Test the connectivity to the 10.50.0.1 interface using ping.
From S1:
o
Test the connectivity to the 10.50.0.1 interface using ping.
Round trip!
From R2:
o
Display the routing table.
Note the connected routes, already known by the router as they are locally
connected to its interface.
o Create a static route to R1s 192.168.1.0/24 network, using the IP address of R1s
interface as the next hop.
o Test the connectivity to the 192.168.1.1 interface using ping.
From S1:
o
Test the connectivity to the 10.50.0.1 interface using ping.
5/21/2018 Cisco ICND1 Lab Guide v1.0
53/65
www.subnet192.com53
CiscoCCENT
LabGuide
Around the world!
From R1:
o
Create a static route to R3s 69.70.16.144/29 network, using the IP address of R2s
interface as the next hop.
o
Test the connectivity to the 69.70.16.147 interface using ping. Create all the missing routes to make the lab fully connected (use the WAN interfaces as the
next hop).
o
R1 needs three routes.
69.70.16.144/29 network on R3
10.50.0.0/24 network on R2
R2-R3 WAN link
o R2 needs two routes.
69.70.16.144/29 network on R3
192.168.1.0/24 network on R1
o
R3 needs three routes (use the interface ID instead of the IP address of the next hop).
192.168.1.0/24 network on R1
10.50.0.0/24 network on R2
R1-R2 WAN link
Display the routing tables on each router.
From S1, test the connectivity to any of the interfaces on the network.
From R3, do a traceroute to Switch 3.
Now that the internal network is fully operational, lets add external connectivity (note that there is NO
protection (i.e. firewall or other) in this lab. Proceed at your own risk.)
Create a default route on all routers to reach the internet interface (FastEthernet 0/0 on R3).
Verify that the default route is now enabled on R3.
Configure name server 4.2.2.2 (DNS) on R3.
Test internet connectivity from R3 using www.google.comas the destination address.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
54/65
www.subnet192.com5
C i C C E N T
L b G i d
Walkthrough
One way trip
On R1, display the routing table
R1#show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPi - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area* - candidate default, U - per-user static route, o - ODRP - periodic downloaded static route
Gateway of last resort is not set No default route
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masksC 172.16.0.0/30 is directly connected, erial0/0 Connected route
C 172.16.0.2/32 is directly connected, erial0/0 Connected route
C 192.168.1.0/24 is directly connected, FastEthernet0/0 Connected route
On R1, create a static route to R2s 10.50.0.0/24 network
R1(config)#ip route 10.50.0.0 255.255.255.0 172.16.0.2R1(config)#exit
On R1, test the connectivity to the 10.50.0.1 interface using ping
R1#ping 10.50.0.1
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds:!!!!!uccess rate is 100 percent (5/5), round-trip min/avg/max = 32/32/36 ms Ping success!
** This pings from interface 172.16.0.1 to 10.50.0.1 uses the static route defined on the previous step.
The R2 router already knows the route to 172.16.0.1 so the ping works.
On S1, test the connectivity to the 10.50.0.1 interface using ping
S1>ping 10.50.0.1
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds:
.....uccess rate is 0 percent (0/5) Ping failure!
** The ping fails! Well actually, the ping reaches the 10.50.0.1 interface but because R2 doesnt know
the path to the 192.168.1.0/24 network, it cant return the response to the ping.
5/21/2018 Cisco ICND1 Lab Guide v1.0
55/65
www.subnet192.com55
CiscoCCENT
LabGuide
Round trip!
On R2, display the routing table
R2#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route
Gateway of last resort is not set
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksC 172.16.0.0/30 is directly connected, erial0/1 Connected route
C 172.16.1.0/30 is directly connected, erial0/0 Connected route
C 172.16.0.1/32 is directly connected, erial0/1 Connected route
10.0.0.0/24 is subnetted, 1 subnets
C 10.50.0.0 is directly connected, FastEthernet0/0 Connected route
On R2, create a static route to R1s 192.168.1.0/24 network
R2(config)#ip route 192.168.1.0 255.255.255.0 172.16.0.1R2(config)#exit
On R2, test the connectivity to the 192.168.1.1 interface using ping
R1#ping 192.168.1.1
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:!!!!!
uccess rate is 100 percent (5/5), round-trip min/avg/max = 32/32/36 ms Ping success!
** This pings from interface 172.16.0.2 to 192.168.1.1 uses the static route defined on the previous
step. The R1 router already knows the route to 172.16.0.2 so the ping works.
On S1, test the connectivity to the 10.50.0.1 interface using ping
S1>ping 10.50.0.1
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds:!!!!!uccess rate is 100 percent (5/5), round-trip min/avg/max = 32/33/36 ms Ping success!
** The ping works! Now that R2 knows the path to the 192.168.1.0/24 network, it is able to return the
response to the ping.
5/21/2018 Cisco ICND1 Lab Guide v1.0
56/65
www.subnet192.com5
C i C C E N T
L b G i d
Around the world!
On R1, create a static route to R3s 69.70.16.144/29 network, using the IP address
of R2s interface as the next hop.
R1(config)#ip route 69.70.16.144 255.255.255.248 172.16.0.2R1(config)#exit
Test the connectivity to the 69.70.16.147 interface using ping
R1#ping 69.70.16.147
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds:U.U.Uuccess rate is 0 percent (0/5) Ping failure!
** The ping fails! The packet is sent to R2 but R2 has no idea where to forward it to
Create all the missing routes to make the lab fully connected
To establish full connectivity, more static routes need to be configured. These are the routes that are
missing to make the entire network fully connected.
R1 needs to know about R2-R3s serial WAN link (the other two routes are already configured).
R1(config)#ip route 172.16.1.0 255.255.255.252 172.16.0.2
R2 needs to know about R3s Ethernet subnet (the other route is already configured).
R2(config)#ip route 69.70.16.144 255.255.255.248 172.16.1.2
R3 needs to know about R1s Ethernet subnet and R2s Ethernet subnet, and about the R1-R2 serial
WAN link.
R3(config)#ip route 192.168.1.0 255.255.255.0 serial 0/1R3(config)#ip route 10.50.0.0 255.255.255.0 serial 0/1R3(config)#ip route 172.16.0.0 255.255.255.252 serial 0/1
5/21/2018 Cisco ICND1 Lab Guide v1.0
57/65
www.subnet192.com57
CiscoCCENT
LabGuide
Display the routing tables on each router
R1#show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPi - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area* - candidate default, U - per-user static route, o - ODRP - periodic downloaded static route
Gateway of last resort is not set
69.0.0.0/29 is subnetted, 1 subnets
69.70.16.144 [1/0] via 172.16.0.2 tatic route
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksC 172.16.0.0/30 is directly connected, Serial0/0
172.16.1.0/30 [1/0] via 172.16.0.2 tatic route
C 172.16.0.2/32 is directly connected, Serial0/010.0.0.0/24 is subnetted, 1 subnets
10.50.0.0 [1/0] via 172.16.0.2 tatic route
C 192.168.1.0/24 is directly connected, FastEthernet0/0
R2#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route
Gateway of last resort is not set
69.0.0.0/29 is subnetted, 1 subnets69.70.16.144 [1/0] via 172.16.1.2 tatic route
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksC 172.16.0.0/30 is directly connected, Serial0/1
C 172.16.1.0/30 is directly connected, Serial0/0C 172.16.0.1/32 is directly connected, Serial0/110.0.0.0/24 is subnetted, 1 subnets
C 10.50.0.0 is directly connected, FastEthernet0/0192.168.1.0/24 [1/0] via 172.16.0.1 tatic route
R3#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route
Gateway of last resort is not set
69.0.0.0/29 is subnetted, 1 subnetsC 69.70.16.144 is directly connected, FastEthernet0/0
172.16.0.0/30 is subnetted, 2 subnets
172.16.0.0 is directly connected, erial0/1 tatic route
C 172.16.1.0 is directly connected, Serial0/110.0.0.0/24 is subnetted, 1 subnets
10.50.0.0 is directly connected, erial0/1 tatic route
192.168.1.0/24 is directly connected, erial0/1 tatic route
5/21/2018 Cisco ICND1 Lab Guide v1.0
58/65
www.subnet192.com5
C i C C E N T
L b G i d
From S1, test the connectivity to any of the interfaces on the network
** Here we simply test the farthest connection available from S1 on the diagram, but all the internal
networks are now reachable from any component of the network.
S1>ping 69.70.16.147
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms
From R3, do a traceroute to Switch 3
R3#traceroute 192.168.1.7
Type escape sequence to abort.Tracing the route to 192.168.1.7
1 172.16.1.1 84 msec 84 msec 88 msec
2 172.16.0.1 100 msec 100 msec 100 msec3 192.168.1.7 104 msec 100 msec *
Create a default route on all routers to reach the internet
R1(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0R2(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0R3(config)#ip route 0.0.0.0 0.0.0.0 FastEthernet 0/0
Verify that the default route is now enabled on R3
R3#show ip routeCodes: C - connected, - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route
Gateway of last resort is 0.0.0.0 to network 0.0.0.0 Default route configured!
69.0.0.0/29 is subnetted, 1 subnetsC 69.70.16.144 is directly connected, FastEthernet0/0
172.16.0.0/30 is subnetted, 2 subnetsS 172.16.0.0 is directly connected, Serial0/1C 172.16.1.0 is directly connected, Serial0/1
10.0.0.0/24 is subnetted, 1 subnetsS 10.50.0.0 is directly connected, Serial0/1
S 192.168.1.0/24 is directly connected, Serial0/1* 0.0.0.0/0 is directly connected, FastEthernet0/0 Note the * next to the
5/21/2018 Cisco ICND1 Lab Guide v1.0
59/65
www.subnet192.com59
CiscoCCENT
LabGuide
Configure name server 4.2.2.2 (DNS) on R3
R3(config)#ip name-server 4.2.2.2
Test internet connectivity from R3 using www.google.comas the destination
R3#ping www.google.com
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 74.125.95.106, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 48/50/52 ms
** NOTE: You will not be able to ping or resolve internet addresses from any other device on the
network. Remember that everything inside the network is using NON-ROUTABLE addresses. Until NAT is
implemented on the network, no other device other than R3 can access the internet (it has a public
address!).
5/21/2018 Cisco ICND1 Lab Guide v1.0
60/65
www.subnet192.com6
C i C C E N T
L b G i d
Routing: RIP
Objectives
Creating all of the static routes was tedious work! Routing protocols allow much simpler management of
routes.
Tasks
Remove all static routes created in the previous section on all routers. Use the running
configuration to help you.
Enable RIP on all the routers and advertise all the subnets
Display the routing protocol information
From R3, ping the S3 switch.
Enable RIP debug mode to view RIP synchronization messages.
Disable all debug information.
Display the routing table.
From S1, test the connectivity to any of the interfaces on the network.
From R3, do a traceroute to Switch 3.
Now that the internal network is fully operational, lets add external connectivity (note that there is NO
protection (i.e. firewall or other) in this lab. Proceed at your own risk.)
Create a default route on R3 for the internet interface and propagate it to other routers via RIP.
Verify that the default route is now enabled on R3.
Test internet connectivity from R3 using www.google.comas the destination address.
Verify that other routers are receiving the default route via RIP.
Attempt to perform all the tasks listed above before going through the walkthrough.
Attempt to perform all the tasks listed above before going through the walkthrough.
5/21/2018 Cisco ICND1 Lab Guide v1.0
61/65
www.subnet192.com61
CiscoCCENT
LabGuide
Walkthrough
Remove all static routes created in the previous section
Start by looking at the running configuration of each router
R1#show run | include ip routeip route 0.0.0.0 0.0.0.0 Serial0/0ip route 10.50.0.0 255.255.255.0 172.16.0.2ip route 69.70.16.144 255.255.255.248 172.16.0.2ip route 172.16.1.0 255.255.255.252 172.16.0.2
Then issue a no command in front of the ip route statement.
S1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R1(config)#no ip route 0.0.0.0 0.0.0.0 Serial0/0R1(config)#no ip route 10.50.0.0 255.255.255.0 172.16.0.2R1(config)#no ip route 69.70.16.144 255.255.255.248 172.16.0.2R1(config)#no ip route 172.16.1.0 255.255.255.252 172.16.0.2
Repeat for the other two routers.
Enable RIP on all the routers and advertise all the subnets
R1(config)#router ripR1(config-router)#network 172.16.0.0R1(config-router)#network 192.168.1.0
R2(config)#router ripR2(config-router)#network 172.16.0.0R2(config-router)#network 10.50.0.0
R3(config)#router ripR3(config-router)#network 172.16.0.0
Display the routing protocol information
R1#show ip protocolsRouting Protocol is "rip"
Sending updates every 30 seconds, next due in 11 secondsInvalid after 180 seconds, hold down 180, flushed after 240Outgoing update filter list for all interfaces is not setIncoming update filter list for all interfaces is not setRedistributing: ripDefault version control: send version 1, receive any versionInterface Send Recv Triggered RIP Key-chainFastEthernet0/0 1 1 2Serial0/0 1 1 2
Automatic network summarization is in effect
Maximum path: 4Routing for Networks:172.16.0.0192.168.1.0
Routing Information Sources:Gateway Distance Last Update172.16.0.2 120 00:00:06
Distance: (default is 120)
5/21/2018 Cisco ICND1 Lab Guide v1.0
62/65
www.subnet192.com6
C i C C E N T
L b G i d
From R3, ping the S3 switch
R3#ping 192.168.1.7
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 192.168.1.7, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms
Enable RIP debug mode to view RIP synchronization messages
R3#debug ip ripRIP protocol debugging is onR3#*Mar 25 14:31:07.639: RIP: received v1 update from 172.16.1.1 on Serial0/1*Mar 25 14:31:07.639: 10.0.0.0 in 1 hops*Mar 25 14:31:07.639: 172.16.0.0 in 1 hops*Mar 25 14:31:07.639: 172.16.0.1 in 1 hops*Mar 25 14:31:07.639: 192.168.1.0 in 2 hops
*Mar 25 14:31:08.859: RIP: sending v1 update to 255.255.255.255 via Serial0/1(172.16.1.2)*Mar 25 14:31:08.859: RIP: build update entries - suppressing null update
Disable all debug information
R3#no debug allAll possible debugging has been turned off
Display the routing table on R1
R1#show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGPi - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area* - candidate default, U - per-user static route, o - ODRP - periodic downloaded static route
Gateway of last resort is not set
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksC 172.16.0.0/30 is directly connected, Serial0/0
R 172.16.1.0/30 [120/1] via 172.16.0.2, 00:00:24, erial0/0 RIP route
C 172.16.0.2/32 is directly connected, Serial0/0R 10.0.0.0/8 [120/1] via 172.16.0.2, 00:02:38, erial0/0 RIP route
C 192.168.1.0/24 is directly connected, FastEthernet0/0
5/21/2018 Cisco ICND1 Lab Guide v1.0
63/65
www.subnet192.com63
CiscoCCENT
LabGuide
From S1, test the connectivity to any of the interfaces on the network
** Here we simply test the farthest connection available from S1 on the diagram, but all the internal
networks are now reachable from any component of the network.
S1>ping 69.70.16.147
Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms
From R3, do a traceroute to Switch 3
R3#traceroute 192.168.1.7
Type escape sequence to abort.Tracing the route to 192.168.1.7
1 172.16.1.1 84 msec 84 msec 88 msec
2 172.16.0.1 100 msec 100 msec 100 msec3 192.168.1.7 104 msec 100 msec *
Create a default route on R3 for the internet interface and propagate it to other
routers via RIP
R3(config)#ip route 0.0.0.0 0.0.0.0 fastEthernet 0/0R3(config)#router ripR3(config-router)#default-information originate
Verify that the default route is now enabled on R3
R3#show ip routeCodes: C - connected, S - static, R - RIP, M - mobile, B - BGPD - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter areaN1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2E1 - OSPF external type 1, E2 - OSPF external type 2i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2ia - IS-IS inter area, * - candidate default, U - per-user static routeo - ODR, P - periodic downloaded static route
Gateway of last resort is 0.0.0.0 to network 0.0.0.0
69.0.0.0/29 is subnetted, 1 subnetsC 69.70.16.144 is directly connected, FastEthernet0/0
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks
R 172.16.0.0/30 [120/1] via 172.16.1.1, 00:00:11, erial0/1 RIP route
C 172.16.1.0/30 is directly connected, Serial0/1
R 172.16.0.1/32 [120/1] via 172.16.1.1, 00:00:11, erial0/1 RIP route
R 10.0.0.0/8 [120/1] via 172.16.1.1, 00:00:11, erial0/1 RIP route