Cisco CCENT Lab Guide Covers all topics for the ICND1 exam
Version 1.0 Written by Marc Bouchard www.subnet192.com
© 2010 Marc Bouchard
Contents Introduction ............................................................................................................................................ 3 Recommended training material ............................................................................................................. 3 Recommended lab equipment................................................................................................................. 3 How this guide works…............................................................................................................................ 4 Lab 1 – Configuring S1 – Basic switch configurations................................................................................ 5 Enabling connectivity ....................................................................................................................... 5 Enhancing security ........................................................................................................................... 9 Configure Ports and Port Security .................................................................................................. 13 Configure VLANs ............................................................................................................................ 17 Flash and nvram management ....................................................................................................... 20 Miscellaneous commands of interest ............................................................................................. 23 Lab 2 – Configuring R1 – Basic router configurations ............................................................................. 25 Enabling connectivity ..................................................................................................................... 25 Enhancing security ......................................................................................................................... 29 Flash and nvram management ....................................................................................................... 33 Lab 3 – Interconnecting components ..................................................................................................... 35 Configuring S2 and S3 .................................................................................................................... 35 Session Management..................................................................................................................... 37 Network identification ................................................................................................................... 40 Lab 4 – Full topology.............................................................................................................................. 45 Configuring R2 and R3.................................................................................................................... 45 Serial Connectivity ......................................................................................................................... 47 PPP with Authentication ................................................................................................................ 50 Routing: Static Routes .................................................................................................................... 52
References & Resources ........................................................................................................................ 65 Software................................................................................................................................................ 65 Special thanks… ..................................................................................................................................... 65
www.subnet192.com
Cisco CCENT Lab Guide
Routing: RIP ................................................................................................................................... 60
2
Introduction Studying for the CCENT/CCNA exams is challenging. There are a lot of resources out there, lots of material but there was nothing I could find to meet my objective: provide me with a challenge, and then show a step by step explanation to validate the tasks. This guide is in no way endorsed by Cisco Systems. I created this document out of personal need and to help myself memorize and learn the various commands and configurations. I thought I should share this with others to assist in actually learning hands-on skills with Cisco equipment. Also, note that I didn’t reinvent the wheel here. Most of this is inspired from personal experience in my own lab, from information gathered on the internet, from some of the simulators, etc.
This guide is provided FREE of charge. If you paid for this guide, you got ripped off. I do however accept donations of any amount via Paypal at
[email protected] if you find this guide of use and want to thank me for my efforts. Visit my site at www.subnet192.com for more information and the latest guides!
Recommended training material The following are what I personally used to pass the certification. I find that going through a CBT before hitting the books helps a lot to make the book easier to understand.
CBT Nuggets ICND1 training by Jeremy Cioara. Cisco Press ICND1 by Wendell Odom.
Recommended lab equipment Finding the right gear to build a lab is quite a daunting task. There is a multitude of models and versions, as well as modules to customize each device. While you can get by with simulators, (I have tried them all), nothing compares to working with the real deal. My recommendations, for a reasonably priced lab that would get you through the CCENT and CCNA curriculum would be the following. Note that not all of them are used for the CCENT, but will be useful at the CCNA level.
Cisco CCENT Lab Guide
3 Cisco 2950 series switches
3
3 Cisco 2620XM 128/45 series routers 3 WIC-2T serial interfaces 3 DCE/DTE Smart Serial cables (for the WIC-2T to WIC-2T connections) 1 NM-4A/S serial interface 3 Serial to Smart Serial cables (for the NM-4A/S to WIC-2T connections)
www.subnet192.com
How this guide works… First off, this is not intended to explain any of the concepts. There are fantastic books out there for that job. This guide attempts to make you think about what you need to do, which commands are required to complete each step and so on. Lab 1 and 2 will focus on standalone device configurations. However, you don’t go far if nothing is interconnected. The objective is to make you build your lab, practicing commands as you go. The goal topology is the following, based on my recommendations for hardware above. You can also perform most of the steps using Cisco’s Packet Tracer software if you are part of the Cisco Learning Academy, but be aware that some commands are not implemented like SSH support, etc.
Interface Ethernet adapter Vlan 1 Vlan 1 Vlan 1 FastEthernet 0/0 Serial 0/0 FastEthernet 0/0 Serial 0/0 Serial 0/1 FastEthernet 0/0 Serial 0/0
IP Address 192.168.1.100/24 192.168.1.5/24 192.168.1.6/24 192.168.1.7/24 192.168.1.1/24 172.16.0.1/30 10.50.0.1/24 172.16.1.1/30 172.16.0.2/30 69.70.16.147/29 172.16.1.2/30
Default Gateway 192.168.1.1 192.168.1.1 192.168.1.1 192.168.1.1
For R3’s FastEthernet 0/0 interface, if you have an internet connection available, substitute the IP address for your own static address. This will provide you with real connectivity to the internet in your lab.
www.subnet192.com
Cisco CCENT Lab Guide
Device ID PC S1 S2 S3 R1 R1 R2 R2 R2 R3 R3
4
Lab 1 – Configuring S1 – Basic switch configurations Material required: 1 switch, 1 PC, console (rollover) cable, Ethernet cable
Enabling connectivity Objectives This lab will guide you in configuring a switch from a factory default state. Preparation Connect the console (rollover) cable from the PC to the Console port of the switch. Connect the Ethernet cable from the PC to the FastEthernet 0/1 port of the switch. Configure the PC’s Ethernet port to 100mbps/Full Duplex. Tasks
Cisco CCENT Lab Guide
5
Open a terminal emulator session to the switch Erase the current configuration (reset to factory default) then reboot the switch. Set the host name to “S1”. Set the console password to “cisco”. Set the privileged mode password to “ciscoexec”. Set the IP address and default gateway using the topology reference table, and enable the interface. Enable Telnet connectivity on all ports, using password “remote”. Configure all ports to 100mbps/full duplex. Verify the running configuration. View the interface list summary. Test the Telnet connection from the PC to the switch. View currently connected users. Save the configuration.
Attempt to perform all the tasks listed above before going through the walkthrough.
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …) Enter privileged mode Switch>enable
Enter configuration mode Switch#configure terminal Enter configuration commands, one per line.
End with CNTL/Z.
Erase the startup configuration file (reset to factory defaults) Switch#write erase Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] Switch#reload Proceed with reload? [confirm]
OR Switch#erase startup-config Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] Switch#reload Proceed with reload? [confirm]
Set the host name Switch(config)#hostname S1
Set the console password S1(config)#line console 0 S1(config-line)#password cisco S1(config-line)#exit
Set the privileged mode password S1(config)#enable password ciscoexec
S1(config)#interface vlan 1 S1(config-if)#ip address 192.168.1.5 255.255.255.0 S1(config-if)#no shutdown S1(config-if)#exit S1(config)#ip default-gateway 192.168.1.1
www.subnet192.com
Cisco CCENT Lab Guide
Configure the IP address and default gateway, and enable the interface
6
Enable Telnet connectivity S1(config)#line vty 0 15 S1(config-line)#password remote S1(config-line)#login S1(config-line)#transport input telnet S1(config-line)#exit
Configure all ports to 100mbps/full duplex. S1(config)#interface range fastEthernet 0/1 - 24 S1(config-if-range)#speed 100 S1(config-if-range)#duplex full S1(config-if-range)#exit S1(config)#exit
Verify the running configuration The following output has been edited for space considerations.
Cisco CCENT Lab Guide
S1#show running-config Building configuration...
7
Current configuration: 2673 bytes ! version 12.1 no service password-encryption ! hostname S1 ! enable password ciscoexec ! interface FastEthernet0/1 speed 100 duplex full ! … ! interface Vlan1 ip address 192.168.1.5 255.255.255.0 ! ip default-gateway 192.168.1.1 ! line con 0 password 0 cisco line vty 0 4 password 0 remote login transport input telnet line vty 5 15 password 0 remote login transport input telnet ! End
www.subnet192.com
View the interface list summary S1#show ip interface brief Interface IP-Address Vlan1 192.168.1.5 FastEthernet0/1 unassigned FastEthernet0/2 unassigned FastEthernet0/3 unassigned FastEthernet0/4 unassigned …
OK? YES YES YES YES YES
Method manual unset unset unset unset
Status up up down down down
Protocol up up down down down
Test the Telnet connection From your PC connected to switch via an Ethernet cable, open your terminal emulator software and connect to the switch using the Telnet protocol.
View currently connected users S1#show users Line 0 con 0 * 1 vty 0 Interface
User
User
Host(s) idle idle Mode
Idle Location 00:00:30 00:00:00 192.168.1.100 Idle
Peer Address
Save the configuration
Cisco CCENT Lab Guide
S1#copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK]
www.subnet192.com
8
Enhancing security Objectives Your switch has been configured in the previous lab, but could use a bit more security. Complete the following tasks to enhance the security of your switch. Note that several tasks here do NOT work in Packet Tracer or on a non-crypto IOS. Tasks Set the secured privileged mode password to “ciscosecret” Set notification banners o Message of the Day: “AUTHORIZED PERSONEL ONLY” o Login: “ACCESS RESTRICTED” Encrypt all clear text passwords Enable SSH connectivity with local authentication. Leave Telnet enabled for the purpose of the lab. o Create an account named “admin” with a password of “cisco” o Use domain name “subnet192.com” o Configure the terminal port ranges independently (0-4 and 5-15) Verify the cryptographic key Save the configuration Verify your configuration
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
9
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …) Enter privileged mode S1>enable
Enter configuration mode S1#configure terminal Enter configuration commands, one per line.
End with CNTL/Z.
Set the secured privileged mode password S1(config)#enable secret ciscosecret
Set notification banners (Login and Message of the Day) S1(config)#banner login ! ACCESS RESTRICTED ! S1(config)#banner motd ! AUTHORIZED PERSONEL ONLY !
Encrypt all clear text passwords S1(config)#service password-encryption
Enable SSH connectivity with local authentication
S1(config)#line vty 0 4 S1(config-line)#login local S1(config-line)#transport input ssh telnet S1(config-line)#line vty 5 15 S1(config-line)#login local S1(config-line)#transport input ssh telnet S1(config-line)#exit S1(config)#exit
www.subnet192.com
Cisco CCENT Lab Guide
S1(config)#ip domain-name subnet192.com S1(config)#username admin password cisco S1(config)#crypto key generate rsa The name for the keys will be: S1.subnet192.com Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys Choosing a key modulus greater than 512 may take a few minutes. How many bits in the modulus [512]: Generating RSA keys ... [OK]
10
Verify cryptographic key S1#Show crypto key mypubkey rsa % Key pair was generated at: 21:31:48 Key name: S1.subnet192.com Usage: General Purpose Key Key Data: 305C300D 06092A86 4886F70D 01010105 A50E9A4F 37055405 2DB4D613 6C5259CF % Key pair was generated at: 08:32:29 Key name: S1.subnet192.com.server Usage: Encryption Key Key Data: 307C300D 06092A86 4886F70D 01010105 39F7C421 3D1F86EF 752E5937 EACADEBC
EST Mar 6 1993
00034B00 30480241 00F242D9 39F85F01 ACF5AB5B E28DFAB2 D1020301 0001 EST Mar 7 1993
00036B00 30680261 00B1509F 1EDFEA0A F959D757 218F4068 AB020301 0001
Save the configuration
Cisco CCENT Lab Guide
S1#copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK]
11
www.subnet192.com
Verify the configuration The following output has been edited for space considerations. S1#show running-config Building configuration...
Cisco CCENT Lab Guide
Current configuration : 2126 bytes ! version 12.1 service password-encryption ! hostname S1 ! enable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p. enable password 7 094F471A1A0A120A0E0F ! username admin password 7 070C285F4D06 ip subnet-zero ! ip domain-name subnet192.com ip ssh time-out 120 ip ssh authentication-retries 3 ! interface FastEthernet0/1 speed 100 duplex full ! interface FastEthernet0/24 speed 100 duplex full ! interface Vlan1 ip address 192.168.1.5 255.255.255.0 no ip route-cache ! ip default-gateway 192.168.1.1 ip http server banner login ^C ACCESS RESTRICTED ^C banner motd ^C AUTHORIZED PERSONEL ONLY ^C ! line con 0 password 7 02050D480809 line vty 0 4 password 7 105C0C140A0317 login local transport input ssh line vty 5 15 password 7 105C0C140A0317 login local transport input ssh ! end
www.subnet192.com
12
Configure Ports and Port Security Objectives Your switch has been setup with all the basic settings, the remote access connections are now secured, but what about the access ports? Anybody can connect anything to any port at this point. You can make the switch even more secure by preventing unauthorized devices from connecting. Tasks
Disable unused ports (13 to 24) View the MAC address table View the current port security settings on port 12 Enable Port Security on port 12 o Make the port shutdown in case of violation o Allow a single MAC address only o Let the switch learn the MAC address of the device currently plugged in. o Plug in any device on port 12 and try to ping something, to send a packet out so the switch learns the MAC address View the current port security settings on port 12 Plug in a different device in that port to trigger port violation rules View the current port security settings on port 12 post violation Restore connectivity on violated port Verify your configuration o List all ports with Port Security enabled o List all MAC addresses linked to Port Security enabled ports
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
13
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …) Enter privileged mode S1>enable
Enter configuration mode S1#configure terminal Enter configuration commands, one per line.
End with CNTL/Z.
Disable unused ports (13 to 24) S1(config)#interface range fastEthernet 0/13 - 24 S1(config-if)#shutdown S1(config-if)#exit S1(config)#exit
View the MAC address table S1#show mac-address-table Mac Address Table ------------------------------------------Vlan ---All All All All 1
Mac Address ----------000a.4117.5300 0100.0ccc.cccc 0100.0ccc.cccd 0100.0cdd.dddd 0004.2007.6d2b
Type -------STATIC STATIC STATIC STATIC DYNAMIC
Ports ----CPU CPU CPU CPU Fa0/1
S1#show port-security interface Port Security Port Status Violation Mode Aging Time Aging Type SecureStatic Address Aging : Maximum MAC Addresses : Total MAC Addresses : Configured MAC Addresses : Sticky MAC Addresses : Last Source Address : Security Violation Count :
fastEthernet 0/12 : Disabled : Secure-down : Shutdown : 0 mins : Absolute Disabled 1 0 0 0 0000.0000.0000 0
Enter configuration mode S1#configure terminal Enter configuration commands, one per line.
www.subnet192.com
End with CNTL/Z.
Cisco CCENT Lab Guide
View the current port security settings on port 12
14
Enable port security on port 12 S1(config)#interface fastEthernet 0/12 S1(config-if)#switchport mode access S1(config-if)#switchport port-security S1(config-if)#switchport port-security maximum 1 S1(config-if)#switchport port-security mac-address sticky S1(config-if)#switchport port-security violation shutdown S1(config-if)#exit S1(config)#exit
View the new port security settings on port 12 S1#show port-security interface Port Security : Port Status : Violation Mode : Aging Time : Aging Type : SecureStatic Address Aging : Maximum MAC Addresses : Total MAC Addresses : Configured MAC Addresses : Sticky MAC Addresses : Last Source Address : Security Violation Count :
fastEthernet 0/12 Enabled Secure-up Shutdown 0 mins Absolute Disabled 1 1 0 1 0005.5e17.4a40 0
View the new port security settings on port 12 post violation S1#show port-security interface Port Security : Port Status : Violation Mode : Aging Time : Aging Type : SecureStatic Address Aging : Maximum MAC Addresses : Total MAC Addresses : Configured MAC Addresses : Sticky MAC Addresses : Last Source Address : Security Violation Count :
fastEthernet 0/12 Enabled Secure-shutdown Shutdown 0 mins Absolute Disabled 1 1 0 1 000d.bd11.c580 1
Enter configuration mode S1#configure terminal Enter configuration commands, one per line.
End with CNTL/Z.
Cisco CCENT Lab Guide
Restore connectivity on violated port
15
S1(config)#interface fastEthernet 0/12 S1(config-if)#shutdown S1(config-if)#no shutdown S1(config-if)#exit S1(config)#exit
www.subnet192.com
Verify your configuration S1#show port-security Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action (Count) (Count) (Count) --------------------------------------------------------------------------Fa0/12 1 1 1 Shutdown --------------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0 Max Addresses limit in System (excluding one mac per port) : 1024
Cisco CCENT Lab Guide
S1#show port-security address Secure Mac Address Table ------------------------------------------------------------------Vlan Mac Address Type Ports Remaining Age (mins) --------------------------------1 0005.5e17.4a40 SecureSticky Fa0/12 ------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0 Max Addresses limit in System (excluding one mac per port) : 1024
www.subnet192.com
16
Configure VLANs Objectives By default, all ports are members of VLAN 1. Create new VLANs and assign them ports. Tasks Create VLANs
o Create VLAN 10, with a description of “Sales” o Create VLAN 20, with a description of “Marketing” o Create VLAN 30, with a description of “Research” Assign ports to VLANs o Assign ports 5-6 to VLAN 10 o Assign ports 7-8 to VLAN 20 o Assign ports 9 to VLAN 30 Review VLAN configuration
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
17
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …) or via Telnet. Enter privileged mode S1>enable
Enter configuration mode S1#configure terminal Enter configuration commands, one per line.
End with CNTL/Z.
Create VLANs S1(config)#VLAN 10 S1(config-vlan)#name S1(config-vlan)#VLAN S1(config-vlan)#name S1(config-vlan)#VLAN S1(config-vlan)#name S1(config-vlan)#exit
Sales 20 Marketing 30 Research
Assign ports to VLANs S1(config)#interface range fastEthernet 0/5 - 6 S1(config-if-range)#switchport access vlan 10 S1(config)#interface range fastEthernet 0/7 - 8 S1(config-if-range)#switchport access vlan 20
Cisco CCENT Lab Guide
S1(config)#interface fastEthernet 0/9 S1(config-if)#switchport access vlan 30 S1(config-if)#exit S1(config)#exit
www.subnet192.com
18
Review VLAN configuration S1#show vlan brief VLAN Name ---- -----------------------1 default
Status --------active
10 20 30 1002 1003 1004 1005
active active active act/unsup act/unsup act/unsup act/unsup
Cisco CCENT Lab Guide
Sales Marketing Research fddi-default token-ring-default fddinet-default trnet-default
Ports --------------------------Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/10, Fa0/11. Fa0/12, Fa0/13, Fa0/14, Fa0/15. Fa0/16, Fa0/17, Fa0/18, Fa0/19. Fa0/20, Fa0/21, Fa0/22, Fa0/23. Fa0/24 Fa0/5, Fa0/6 Fa0/7, Fa0/8 Fa0/9
19
www.subnet192.com
Flash and nvram management Objectives Managing and safeguarding the IOS image and configurations. Preparation Install TFTPD32 on your PC. Create a folder on your PC with a new IOS image to upload to the switch. Tasks
Backup the configuration to TFTP. View the contents of flash memory. Backup the current IOS image to TFTP. From the IOS, send a new IOS image to a switch using TFTP. From ROMMON, send a new IOS image to a switch using TFTP.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
www.subnet192.com
20
Walkthrough Enter privileged mode S1>enable
Backup the configuration to TFTP S1#copy startup-config tftp Address or name of remote host []? 192.168.1.100 Destination filename [s1-confg]?
View the contents of the flash memory S1#dir flash: Directory of flash:/ 2 3 4 5 7 8 332 333
-rwx -rwx -rwx -rwx -rwx drwx -rwx -rwx
112 330 2126 1100 3721946 4416 112 976
Mar Mar Mar Mar Mar Mar Mar Mar
01 01 01 01 01 01 01 07
1993 1993 1993 1993 1993 1993 1993 1993
01:37:46 01:42:25 00:09:19 00:09:19 01:40:37 01:41:38 01:42:17 02:47:58
+00:00 +00:00 +00:00 +00:00 +00:00 +00:00 +00:00 +00:00
info env_vars config.text private-config.text c2950-i6k2l2q4-mz.121-22.EA13.bin html info.ver vlan.dat
7741440 bytes total (2142208 bytes free)
Backup the current IOS to TFTP S1#copy flash tftp Source filename []? c2950-i6k2l2q4-mz.121-22.EA13.bin Address or name of remote host []? 192.168.1.100 Destination filename [c2950-i6k2l2q4-mz.121-22.EA13.bin]? !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! 3721946 bytes copied in 27.988 secs (132984 bytes/sec)
From the IOS, send a new IOS image to a switch using TFTP
Cisco CCENT Lab Guide
S1#copy tftp flash Address or name of remote host []? 192.168.1.100 Source filename []? c2950-i6k2l2q4-mz.121-22.EA13.bin Destination filename [c2950-i6k2l2q4-mz.121-22.EA13.bin]? ######################################################################################### #########################################################[ok]
21
S1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. S1(config)#boot system flash c2950-i6k2l2q4-mz.121-22.EA13.bin S1(config)#exit
www.subnet192.com
From ROMMON, send a new IOS image to a switch using TFTP To get into ROMMON, press CTRL-BREAK during the boot sequence (power up) of the switch.
Cisco CCENT Lab Guide
ROMMON>IP_ADDRESS=192.168.1.5 ROMMON>IP_SUBNET_MASK=255.255.255.0 ROMMON>DEFAULT_GATEWAY=192.168.1.1 ROMMON>TFTP_SERVER=192.168.1.100 ROMMON>TFTP_FILE= c2950-i6k2l2q4-mz.121-22.EA13.bin ROMMON>tftpdnld
www.subnet192.com
22
Miscellaneous commands of interest Objectives There are some commands that you can use to improve the device management experience. Here are some more configuration tasks you can perform. Tasks
Configure the console logging to not overlap the command prompt Disable the session timeout Create an alias called “save” to save your running configuration to nvram: Prevent DNS lookups Create an entry in the host name table called “TFTPServer” and test connectivity Configure the command history buffer to remember 15 commands.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
23
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …) or via Telnet. Enter configuration mode S1#configure terminal Enter configuration commands, one per line.
End with CNTL/Z.
Configure the console logging to not overlap the command prompt S1(config)#line console 0 S1(config-line)#logging synchronous S1(config-line)#exit
Disable the session timeout S1(config)#line console 0 S1(config-line)#exec-timeout 0 S1(config-line)#exit
Create an alias called “save” to save your running configuration to nvram: S1(config)#alias exec save copy running-config startup-config
Prevent DNS lookup S1(config)#no ip domain-lookup
Create an entry in the host name table called “TFTPServer” and test connectivity S1(config)#ip host TFTPServer 192.168.1.100 S1(config)#exit S1#ping TFTPServer Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.100, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
Configure the command history buffer to remember 15 commands
Cisco CCENT Lab Guide
S1#terminal history size 15
www.subnet192.com
24
Lab 2 – Configuring R1 – Basic router configurations Material required: 1 router, 1 PC, console (rollover) cable, crossover Ethernet cable
Enabling connectivity Objectives This lab will guide you in configuring a router from a factory default state. The steps in this lab are very similar to the basic switch configuration, with minor (but important) differences. Preparation Connect the console (rollover) cable from the PC to the Console port of the router. Connect the crossover Ethernet cable from the PC to the FastEthernet 0/0 port of the router.
Cisco CCENT Lab Guide
Tasks
25
Restore the router to factory defaults Set the host name Set the console password Set the privileged mode password Configure the FastEthernet 0/0 interface. o Set the IP address and subnet mask o Configure to 100mbps/Full Duplex o Enable the interface Enable Telnet connectivity Verify the running configuration View the interface list summary Test the Telnet connection View currently connected users and which lines are used. Save the configuration
Attempt to perform all the tasks listed above before going through the walkthrough.
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …) Enter privileged mode Router>enable
Enter configuration mode Router#configure terminal Enter configuration commands, one per line.
End with CNTL/Z.
Set the host name Router(config)#hostname R1
Set the console password R1(config)#line console 0 R1(config-line)#password cisco R1(config-line)#exit
Set the privileged mode password R1(config)#enable password ciscoexec
Configure the FastEthernet 0/0 interface R1(config)#interface fastethernet 0/0 R1(config-if)#ip address 192.168.1.1 255.255.255.0 R1(config-if)#no shutdown R1(config-if)#speed 100 R1(config-if)#duplex full R1(config-if)#exit
Enable Telnet connectivity
Cisco CCENT Lab Guide
R1(config)#line vty 0 4 R1(config-line)#password remote R1(config-line)#login R1(config-line)#transport input telnet R1(config-line)#exit R1(config)#exit
www.subnet192.com
26
Verify the running configuration The following output has been edited for space considerations. R1#show running-config Building configuration... Current configuration : 834 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname R1 ! boot-start-marker boot-end-marker ! enable password ciscoexec ! interface FastEthernet0/0 ip address 192.168.1.1 255.255.255.0 speed 100 full-duplex ! interface Serial0/0 no ip address shutdown ! interface Serial0/1 no ip address shutdown ! ip forward-protocol nd ! ip http server no ip http secure-server ! line con 0 password cisco line aux 0 line vty 0 4 password remote login transport input telnet ! end
Cisco CCENT Lab Guide
View the interface list summary
27
R1#show ip interface brief Interface IP-Address FastEthernet0/0 192.168.1.1 Serial0/0 unassigned Serial0/1 unassigned
OK? YES YES YES
Method manual unset unset
Status Protocol up up administratively down down administratively down down
Test the Telnet connection From your PC connected to switch via an Ethernet cable, open your terminal emulator software and connect to the switch using the Telnet protocol.
www.subnet192.com
View currently connected users and which lines are used. R1#show users Line 0 con 0 * 66 vty 0 Interface
User
Host(s) idle idle
User
Idle Location 00:03:35 00:00:00 192.168.1.100
R1#show line Tty Typ Tx/Rx * 0 CTY 65 AUX 9600/9600 * 66 VTY 67 VTY 68 VTY 69 VTY 70 VTY
Mode
-
A Modem -
Idle
Roty AccO AccI -
Peer Address Uses 0 0 1 0 0 0 0
Noise 1 0 0 0 0 0 0
Overruns 0/0 0/0 0/0 0/0 0/0 0/0 0/0
Int -
Line(s) not in async mode -or- with no hardware support: 1-64
Save the configuration
Cisco CCENT Lab Guide
R1#copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK]
www.subnet192.com
28
Enhancing security Objectives Your router has been configured in the previous lab, but could use a bit more security. Complete the following tasks to enhance the security of your router. Tasks Set the secured privileged mode password to “ciscosecret” Set notification banners o Message of the Day: “AUTHORIZED PERSONEL ONLY” o Login: “ACCESS RESTRICTED” Encrypt all clear text passwords Enable SSH connectivity with local authentication. Disable Telnet. o Create an account named “admin” with a password of “cisco” o Use domain name “subnet192.com” Verify the cryptographic key Save the configuration Verify your configuration
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
29
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …) Enter privileged mode R1>enable
Enter configuration mode R1#configure terminal Enter configuration commands, one per line.
End with CNTL/Z.
Set the secured privileged mode password R1(config)#enable secret ciscosecret
Set notification banners (Login and Message of the Day) R1(config)#banner login ! ACCESS RESTRICTED ! R1(config)#banner motd ! AUTHORIZED PERSONEL ONLY !
Encrypt all clear text passwords R1(config)#service password-encryption
Enable SSH connectivity with local authentication. Disable Telnet. R1(config)#ip domain-name subnet192.com R1(config)#username admin password cisco R1(config)#crypto key generate rsa The name for the keys will be: R1.subnet192.com Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys Choosing a key modulus greater than 512 may take a few minutes. How many bits in the modulus [512]: Generating RSA keys ... [OK]
Cisco CCENT Lab Guide
R1(config)#line vty 0 4 R1(config-line)#login local R1(config-line)#transport input ssh R1(config-line)#exit R1(config)#exit
www.subnet192.com
30
Verify cryptographic key R1#Show crypto key mypubkey rsa % Key pair was generated at: 21:31:48 Key name: R1.subnet192.com Usage: General Purpose Key Key Data: 305C300D 06092A86 4886F70D 01010105 A50E9A4F 37055405 2DB4D613 6C5259CF % Key pair was generated at: 08:32:29 Key name: R1.subnet192.com.server Usage: Encryption Key Key Data: 307C300D 06092A86 4886F70D 01010105 39F7C421 3D1F86EF 752E5937 EACADEBC
EST Mar 6 1993
00034B00 30480241 00F242D9 39F85F01 ACF5AB5B E28DFAB2 D1020301 0001 EST Mar 7 1993
00036B00 30680261 00B1509F 1EDFEA0A F959D757 218F4068 AB020301 0001
Save the configuration
Cisco CCENT Lab Guide
R1#copy running-config startup-config Destination filename [startup-config]? Building configuration... [OK]
31
www.subnet192.com
Verify the configuration The following output has been edited for space considerations.
Current configuration : 1010 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname R1 ! boot-start-marker boot-end-marker ! enable password 7 045802150C2E49560C1A ! ip domain name subnet192.com ip auth-proxy max-nodata-conns 3 ip admission max-nodata-conns 3 ! username admin password 7 0822455D0A16 ! interface FastEthernet0/0 ip address 192.168.1.1 255.255.255.0 speed 100 full-duplex ! interface Serial0/0 no ip address shutdown ! interface Serial0/1 no ip address shutdown ! ip forward-protocol nd ! ip http server no ip http secure-server ! banner login ^C ACCESS RESTRICTED ^C banner motd ^C AUTHORIZED PERSONEL ONLY ^C ! line con 0 password 7 121A0C041104 line aux 0 line vty 0 4 password 7 1317121F041801 login local transport input ssh ! End
www.subnet192.com
Cisco CCENT Lab Guide
R1#show running-config Building configuration...
32
Flash and nvram management Objectives Managing and safeguarding the IOS image and configurations. Preparation Install TFTPD32 on your PC (if not done in Lab 1) Create a folder on your PC with a new IOS image to upload to the router. Tasks
Backup the configuration to TFTP. View the contents of flash memory. Backup the current IOS image to TFTP. From the IOS, send a new IOS image to a switch using TFTP. From ROMMON, send a new IOS image to a switch using TFTP.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
33
www.subnet192.com
Walkthrough Enter privileged mode R1>enable
Backup the configuration to TFTP R1#copy startup-config tftp Address or name of remote host []? 192.168.1.100 Destination filename [r1-confg]?
View the contents of the flash memory R1#dir flash: Directory of flash:/ 1
-rw-
28542192
c2600-advipservicesk9-mz.124-23.bin
49807356 bytes total (21265100 bytes free)
Backup the current IOS to TFTP R1#copy flash tftp Source filename []? c2600-advipservicesk9-mz.124-23.bin Address or name of remote host []? 192.168.1.100 Destination filename [c2600-advipservicesk9-mz.124-23.bin]? !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! 3721946 bytes copied in 27.988 secs (132984 bytes/sec)
From the IOS, send a new IOS image to a switch using TFTP R1#copy tftp flash Address or name of remote host []? 192.168.1.100 Source filename []?c2600-advipservicesk9-mz.124-23.bin Destination filename [c2600-advipservicesk9-mz.124-23.bin]? ######################################################################################### #########################################################[ok] R1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. R1(config)#boot system flash c2600-advipservicesk9-mz.124-23.bin R1(config)#exit
To get into ROMMON, press CTRL-BREAK during the boot sequence (power up) of the switch. ROMMON>IP_ADDRESS=192.168.1.1 ROMMON>IP_SUBNET_MASK=255.255.255.0 ROMMON>DEFAULT_GATEWAY=192.168.1.1 ROMMON>TFTP_SERVER=192.168.1.100 ROMMON>TFTP_FILE= c2600-advipservicesk9-mz.124-23.bin ROMMON>tftpdnld
www.subnet192.com
Cisco CCENT Lab Guide
From ROMMON, send a new IOS image to a switch using TFTP
34
Lab 3 – Interconnecting components Objectives Let’s build on what we have learned so far and start adding more devices to our lab. Let’s add 2 more switches and connect the R1 router to our topology.
Configuring S2 and S3 Objectives Configure the additional switches to create a functional multi-component environment. Preparation Connect R1’s FastEthernet 0/0 interface to FastEthernet port 0/1 of S1. Connect S2’s FastEthernet port 0/1 to FastEthernet port 0/2 of S1 Connect S3’s FastEthernet port 0/1 to FastEthernet port 0/3 of S1 Connect the PC to FastEthernet port 0/4 of S1. Tasks Using what you have practiced so far, configure the new S2 and S3 switches like you did in Lab 1 – Enabling connectivity. Alternatively, you can use the script in the walkthrough section to automate the configuration. Disable SSH on S1 and remove the local user ‘Admin’ account. This will make connectivity easier for future labs.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
35
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …). S2 and S3 configuration script Start by resetting the switches to the factory default, and reload. Once restarted, when back at the Switch> prompt, copy and paste the following script to configure it. Items in bold vary from device to device. enable configure terminal hostname S2 service password-encryption alias exec save copy run start ip default-gateway 192.168.1.1 enable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p. enable password 7 094F471A1A0A120A0E0F ip domain-name subnet192.com interface range fa0/1 – 24 speed 100 duplex full exit interface vlan 1 ip address 192.168.1.6 255.255.255.0 exit banner login ^C ACCESS RESTRICTED ^C banner motd ^C AUTHORIZED PERSONEL ONLY ^C line con 0 password 7 02050D480809 line vty 0 4 password 7 105C0C140A0317 login transport input telnet line vty 5 15 password 7 105C0C140A0317 transport input telnet end save
Disable SSH on S1, remove the admin account.
Cisco CCENT Lab Guide
S1#configure terminal S1(config)#line vty 0 15 S1(config-line)#transport input telnet S1(config-line)#login S1(config-line)#exit S1(config)#no username admin password cisco
www.subnet192.com
36
Session Management Objectives Experiment with remote sessions between devices. Tasks Session management o From S1, open a telnet connection to S2 (192.168.1.6) o Return to the S1 prompt without closing the connection to S2. o From S1, open a telnet connection to S3 (192.168.1.7) o Return to the S1 prompt without closing the connection to S3. o Display the list of opened sessions (notice which one has a *) o Resume the S2 session (192.168.1.6) o Display the users connected to S2. o Close the session to S2 permanently. o Verify that the session is closed. o From the S1 prompt, close the session to S3.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
37
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …). From S1, open a telnet connection to S2 (192.168.1.6) S1>telnet 192.168.1.6 Trying 192.168.1.6 ... Open AUTHORIZED PERSONEL ONLY ACCESS RESTRICTED User Access Verification Password:
Return to the S1 prompt without closing the connection to S2. CTRL-SHIFT-6 then X From S1, open a telnet connection to S3 (192.168.1.7) S1>telnet 192.168.1.7 Trying 192.168.1.7 ... Open AUTHORIZED PERSONEL ONLY ACCESS RESTRICTED User Access Verification Password:
Return to the S1 prompt without closing the connection to S3. CTRL-SHIFT-6 then X Display the list of opened sessions (notice which one has a *) S1>show sessions Conn Host 1 192.168.1.6 * 2 192.168.1.7
Address 192.168.1.6 192.168.1.7
Byte 0 0
Idle Conn Name 0 192.168.1.6 0 192.168.1.7
Resume the S2 session (192.168.1.6) S1>resume 1
or simply Display the users connected to S2. S2>show users Line * 1 vty 0 Interface
www.subnet192.com
User User
Host(s) idle Mode
Idle Location 00:00:00 192.168.1.5 Idle
Peer Address
Cisco CCENT Lab Guide
S1>1
38
Close the session to S2 permanently. S2>exit [Connection to 192.168.1.6 closed by foreign host]
Verify that the session is closed. S1>show sessions Conn Host * 2 192.168.1.7
Address 192.168.1.7
Byte 0
Idle Conn Name 3 192.168.1.7
From the S1 prompt, close the session to S3 (192.168.1.7)
Cisco CCENT Lab Guide
S1>disconnect 2
39
www.subnet192.com
Network identification Objectives Discover connected devices and document the topology of an unknown environment. Tasks Assume you don’t know the topology of the network and you need to document it. You connect to switch S1 thru the console port and from there; you must use various commands to help you create the diagram with port and IP information: Device ID IP address/mask Platform Capabilities IOS version Incoming port to S1 Outgoing port from device
S1.subnet192.com
S2.subnet192.com
S3.subnet192.com
R1.subnet192.com
n/a n/a
Start by getting the information about the device you’re connected to. Remember, this is an unknown network to you, so find out as much as you can from this device! Do this without looking at the running or startup configuration. Display a summary list of all the devices known to S1. Display detailed information about each of these devices, from the S1 prompt. Use telnet to go to the other devices to complete the missing information. o Display a summary list of all the mac-addresses known to S1. o Display a summary list of all the devices known to S2. o Display a summary list of all the devices known to S3. o Display a summary list of all the devices known to R1.
Once you have completed the table, configure R1 to not advertise its presence to others. Display a summary list of all the devices known to S1. R1 should no longer be listed (it might take a few minutes to disappear)
Attempt to perform all the tasks listed above before going through the walkthrough.
www.subnet192.com
Cisco CCENT Lab Guide
Using all these steps should allow you to document your network and even draw out your diagram from scratch, identifying which devices are visible and which interface to use to get to them.
40
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …). Show information about the local device S1>show version Cisco Internetwork Operating System Software IOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22)EA13 IOS Version Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2009 by cisco Systems, Inc. Compiled Fri 27-Feb-09 22:20 by amvarma Image text-base: 0x80010000, data-base: 0x80680000 ROM: Bootstrap program is C2950 boot loader S1 uptime is 1 hour, 51 minutes System returned to ROM by power-on System image file is "flash:c2950-i6k2l2q4-mz.121-22.EA13.bin" cisco WS-C2950-24 (RC32300) processor (revision E0) with 19912K bytes of memory. Processor board ID FHK0626X0H9 Last reset from system-reset Running Standard Image 24 FastEthernet/IEEE 802.3 interface(s)
Cisco CCENT Lab Guide
32K bytes of flash-simulated non-volatile configuration memory. Base ethernet MAC Address: 00:0A:41:17:53:00 Motherboard assembly number: 73-5781-10 Power supply part number: 34-0965-01 Motherboard serial number: FOC0625077S Power supply serial number: DAB0625576E Model revision number: E0 Motherboard revision number: B0 Model number: WS-C2950-24 Platform System serial number: FHK0626X0H9 Configuration register is 0xF
41
S1>show ip interface Vlan1 is up, line protocol is up Internet address is 192.168.1.5/24 IP address/mask Broadcast address is 255.255.255.255 Address determined by non-volatile memory MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Outgoing access list is not set Inbound access list is not set Proxy ARP is enabled Local Proxy ARP is disabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is disabled IP fast switching on the same interface is disabled IP Null turbo vector IP multicast fast switching is disabled IP multicast distributed fast switching is disabled
…
www.subnet192.com
Display a summary list of all the devices known to S1 S1>show cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone Device ID S3.subnet192.com S2.subnet192.com R1.subnet192.com
Local Intrfce Fas 0/3 Fas 0/2 Fas 0/1
Holdtme 176 175 144
Capability S I S I R
Platform Port ID WS-C2950G-Fas 0/1 WS-C2950G-Fas 0/1 2620 Fas 0/0
Display detailed information about each of these devices, from the S1 prompt S1>show cdp neighbors detail ------------------------Device ID: S3.subnet192.com Device ID Entry address(es): IP address: 192.168.1.7 Platform: cisco WS-C2950G-24-EI, Capabilities: Switch IGMP Platform & capabilities Interface: FastEthernet0/3, Port ID (outgoing port): FastEthernet0/1 I/O Ports Holdtime : 157 sec Version : Cisco Internetwork Operating System Software IOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22) EA13 IOS Version Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2009 by cisco Systems, Inc. Compiled Fri 27-Feb-09 22:20 by amvarma advertisement version: 2 Protocol Hello: OUI=0x00000C, Protocol ID=0x0112; payload len=27, value=00000000FFFFFFFF010221FF00000000000000131A2C2700FF0000 Native VLAN: 1 Duplex: full Management address(es): IP address: 192.168.1.7 ------------------------Device ID: S2.subnet192.com Entry address(es): IP address: 192.168.1.6 Platform: cisco WS-C2950G-12-EI, Capabilities: Switch IGMP Interface: FastEthernet0/2, Port ID (outgoing port): FastEthernet0/1 Holdtime : 91 sec
advertisement version: 2 Protocol Hello: OUI=0x00000C, Protocol ID=0x0112; payload len=27, value=00000000FFFFFFFF010221FF00000000000000152B1C9A40FF0000 Native VLAN: 1 Duplex: full Management address(es): IP address: 192.168.1.6
www.subnet192.com
Cisco CCENT Lab Guide
Version : Cisco Internetwork Operating System Software IOS (tm) C2950 Software (C2950-I6K2L2Q4-M), Version 12.1(22)EA13, RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2009 by cisco Systems, Inc. Compiled Fri 27-Feb-09 22:20 by amvarma
42
------------------------Device ID: R1.subnet192.com Entry address(es): IP address: 192.168.1.1 Platform: cisco 2620, Capabilities: Router Interface: FastEthernet0/1, Port ID (outgoing port): FastEthernet0/0 Holdtime : 39 sec Version : Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-D-M), Version 12.2(5a), RELEASE SOFTWARE (fc1) Copyright (c) 1986-2001 by cisco Systems, Inc. Compiled Thu 04-Oct-01 19:45 by pwade advertisement version: 2 Duplex: full Management address(es):
Display a summary list of all the mac-addresses known to S1 S1>show mac address-table Mac Address Table ------------------------------------------Vlan Mac Address Type Ports ------------------------All 000a.4117.5300 STATIC CPU All 0100.0ccc.cccc STATIC CPU All 0100.0ccc.cccd STATIC CPU All 0100.0cdd.dddd STATIC CPU 1 0005.5e17.4a40 DYNAMIC Fa0/1 1 0013.1a2c.2701 DYNAMIC Fa0/3 1 0015.2b1c.9a41 DYNAMIC Fa0/2 Total Mac Addresses for this criterion: 7
Display a summary list of all the devices known to S2 S1#telnet 192.168.1.6 Trying 192.168.1.6 ... Open AUTHORIZED PERSONEL ONLY ACCESS RESTRICTED User Access Verification Password: S2>show cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Cisco CCENT Lab Guide
Device ID Local Intrfce S1.subnet192.com Fas 0/1
43
Holdtme 144
Capability S I
Platform Port ID WS-C2950-2Fas 0/2
S2>exit
www.subnet192.com
Display a summary list of all the devices known to S3 S1#telnet 192.168.1.7 Trying 192.168.1.7 ... Open AUTHORIZED PERSONEL ONLY ACCESS RESTRICTED User Access Verification Password: S3>show cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone Device ID Local Intrfce S1.subnet192.com Fas 0/1
Holdtme 144
Capability S I
Platform Port ID WS-C2950-2Fas 0/3
S3>exit
Display a summary list of all the devices known to R1 S1#telnet 192.168.1.1 Trying 192.168.1.1 ... Open AUTHORIZED PERSONEL ONLY ACCESS RESTRICTED User Access Verification Password: R1>show cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater Device ID Local Intrfce S1.subnet192.com Fas 0/0
Holdtme 167
Capability S I
Platform Port ID WS-C2950-2Fas 0/1
Cisco CCENT Lab Guide
R1>exit
www.subnet192.com
44
Lab 4 – Full topology Objectives In this lab we complete the topology and start having fun with routing protocols.
Preparation Configure R2 and R3 using the steps from Lab 2. Connect R1 Serial 0/0 interface (DCE) to Serial 0/1 of R2 (DTE). Connect R2 Serial 0/0 interface (DCE) to Serial 0/1 of R3 (DTE). Connect your internet link to R3’s FastEthernet interface. Connect any device in the Ethernet port of R2 and R3 to bring the link up.
Configuring R2 and R3
Cisco CCENT Lab Guide
Objectives Configure the serial interfaces to simulate WAN connectivity between the routers.
45
Tasks Using what you have practiced so far, configure the new R2 and R3 routers like you did in Lab 2 – Enabling connectivity. Alternatively, you can use the script in the walkthrough section to automate the configuration. Disable SSH on R1 and remove the local user ‘Admin’ account. This will make connectivity easier for future labs. Attempt to perform all the tasks listed above before going through the walkthrough.
www.subnet192.com
Walkthrough Connect via the console cable using a terminal emulator (Putty, Tera-term, Hyper-Terminal …). R2 and R3 configuration script Start by resetting the routers to the factory default, and reload. Once restarted, when back at the Router> prompt, copy and paste the following script to configure it. Items in bold vary from device to device.
Cisco CCENT Lab Guide
enable configure terminal hostname R2 service password-encryption alias exec save copy run start enable secret 5 $1$h81C$6qczYbE/ul7.g.VH/jV7p. enable password 7 094F471A1A0A120A0E0F ip domain-name subnet192.com interface fastethernet 0/0 ip address 10.50.0.1 255.255.255.0 no shutdown speed 100 duplex full exit banner login ^C ACCESS RESTRICTED ^C banner motd ^C AUTHORIZED PERSONEL ONLY ^C line con 0 logging synchronous password 7 02050D480809 line vty 0 4 password 7 105C0C140A0317 login transport input telnet line vty 5 15 password 7 105C0C140A0317 transport input telnet end save
www.subnet192.com
46
Serial Connectivity Objectives Configure the serial interfaces to simulate WAN connectivity between the routers. Tasks
Verify that serial interface 0/0 on R1 is the DCE Configure serial interface 0/0 on R1 with a clock rate of 56000. Configure serial interface 0/1 on R2. Verify that serial interface 0/0 on R2 is the DCE Configure serial interface 0/0 on R2 with a clock rate of 9600. Configure serial interface 0/1 on R3. Display R2’s neighbors list to validate connectivity with R1 and R3. Verify the WAN protocol used by R2 on serial interface 0/1.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
47
www.subnet192.com
Walkthrough Connect via the console cable or telnet using a terminal emulator (Putty, Tera-term, Hyper-Terminal …). Verify that serial interface 0/0 on R1 is the DCE R1#show controllers serial 0/0 Interface Serial0/0 Hardware is PowerQUICC MPC860 DCE V.35, no clock DCE or DTE status and clock rate idb at 0x8497AB4C, driver data structure at 0x84982270 SCC Registers: General [GSMR]=0x2:0x00000030, Protocol-specific [PSMR]=0x8 Events [SCCE]=0x0000, Mask [SCCM]=0x001F, Status [SCCS]=0x06 Transmit on Demand [TODR]=0x0, Data Sync [DSR]=0x7E7E Interrupt Registers: Config [CICR]=0x00367F80, Pending [CIPR]=0x00000A00 Mask [CIMR]=0x30200440, In-srv [CISR]=0x00000000 Command register [CR]=0x640 …
Configure interface S0/0 on R1 with a clock rate of 56000 R1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. R1(config)# R1(config)#interface serial 0/0 R1(config-if)#ip address 172.16.0.1 255.255.255.252 R1(config-if)#no shutdown R1(config-if)#clock rate 56000 R1(config)#
Configure interface S0/1 on R2 as the DTE R1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. R2(config)# R2(config)#interface serial 0/1 R2(config-if)#ip address 172.16.0.2 255.255.255.252 R2(config-if)#no shutdown R2(config-if)#
R2#show controllers serial 0/0 Interface Serial0/0 Hardware is PowerQUICC MPC860 DCE V.35, no clock DCE or DTE status and clock rate idb at 0x8497AB4C, driver data structure at 0x84982270 SCC Registers: General [GSMR]=0x2:0x00000030, Protocol-specific [PSMR]=0x8 Events [SCCE]=0x0000, Mask [SCCM]=0x001F, Status [SCCS]=0x06 Transmit on Demand [TODR]=0x0, Data Sync [DSR]=0x7E7E Interrupt Registers: Config [CICR]=0x00367F80, Pending [CIPR]=0x00000A00 Mask [CIMR]=0x30200440, In-srv [CISR]=0x00000000 Command register [CR]=0x640 …
www.subnet192.com
Cisco CCENT Lab Guide
Verify that serial interface 0/0 on R2 is the DCE
48
Configure interface S0/0 on R2 with a clock rate of 9600 R2(config)#interface serial 0/0 R2(config-if)#ip address 172.16.1.1 255.255.255.252 R2(config-if)#clock rate 9600 R2(config-if)#no shutdown R2(config-if)#
Configure interface S0/1 on R3 as the DTE R1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. R2(config)# R2(config)#interface serial 0/1 R2(config-if)#ip address 172.16.1.2 255.255.255.252 R2(config-if)#no shutdown R2(config-if)#
Display R2’s neighbors list to validate connectivity with R1 and R3 R2#show cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater Device ID Local Intrfce R3.subnet192.com Ser 0/0 R1.subnet192.com Ser 0/1 R2#
Holdtme 150 172
Capability R S I R S I
Platform 2620XM 2620XM
Port ID Ser 0/1 Ser 0/0
Cisco CCENT Lab Guide
Verify the WAN protocol used by R2 on serial interface 0/1
49
R2#show interfaces serial 0/1 Serial0/1 is up, line protocol is up Hardware is PowerQUICC Serial Internet address is 172.16.0.2/30 MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation HDLC, loopback not set WAN encapsulation protocol Keepalive set (10 sec) Last input 00:00:03, output 00:00:09, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: weighted fair Output queue: 0/1000/64/0 (size/max total/threshold/drops) Conversations 0/2/256 (active/max active/max total) Reserved Conversations 0/0 (allocated/max allocated) Available Bandwidth 1158 kilobits/sec 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 112 packets input, 8720 bytes, 0 no buffer Received 92 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 137 packets output, 9981 bytes, 0 underruns 0 output errors, 0 collisions, 13 interface resets 0 unknown protocol drops 0 output buffer failures, 0 output buffers swapped out 28 carrier transitions DCD=up DSR=up DTR=up RTS=up CTS=up
www.subnet192.com
PPP with Authentication Objectives Serial connectivity defaults to HDLC encapsulation on Cisco equipment. We will change it to PPP and use CHAP authentication. Tasks Enable PPP encapsulation on serial interface 0/0 of R1 o The serial link with R2 will go down. Display the status of serial interface 0/0. Enable PPP encapsulation on serial interface 0/1 of R2 o The serial link with R1 will come back up. Enable CHAP on both serial interfaces of the link between R1 and R2. o Create the security accounts on both routers o Enable CHAP authentication on both routers The link between R1 and R2 is now using PPP and the link between R2 and R3 will be using HDLC.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
www.subnet192.com
50
Walkthrough Enable PPP encapsulation on serial interface 0/0 of R1 R1#configure terminal Enter configuration commands, one per line. R1(config)#interface serial 0/0 R1(config-if)#encapsulation ppp
End with CNTL/Z.
Display the status of serial interface 0/0 R1#show interfaces serial 0/0 Serial0/0 is up, line protocol is down Link is down Hardware is PowerQUICC Serial Internet address is 172.16.0.1/30 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 252/255, txload 1/255, rxload 1/255 Encapsulation PPP, loopback not set WAN encapsulation protocol Keepalive set (10 sec) LCP Listen Closed: IPCP, CDPCP Last input 00:00:02, output 00:00:08, output hang never Last clearing of "show interface" counters 00:00:26 Queueing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75, 0 drops 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 4 packets input, 423 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 1 input errors, 0 CRC, 1 frame, 0 overrun, 0 ignored, 0 abort 9 packets output, 126 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 output buffer failures, 0 output buffers swapped out 0 carrier transitions DCD=up DSR=up DTR=up RTS=up CTS=up
Enable PPP encapsulation on serial interface 0/1 of R2 R2#configure terminal Enter configuration commands, one per line. R2(config)#interface serial 0/1 R2(config-if)#encapsulation ppp
End with CNTL/Z.
Enable CHAP on both serial interfaces of the link between R1 and R2
Cisco CCENT Lab Guide
On R1:
51
R1(config)#user R2 password subnet192 R1#configure terminal Enter configuration commands, one per line. R1(config)#interface serial 0/0 R1(config)#ppp authentication chap
End with CNTL/Z.
R2(config)#user R1 password subnet192 R2#configure terminal Enter configuration commands, one per line. R2(config)#interface serial 0/1 R2(config)#ppp authentication chap
End with CNTL/Z.
On R2:
www.subnet192.com
Routing: Static Routes Objectives Understanding static routes, default routes and connected routes. Tasks Connectivity between all devices is established but at the moment, the routers don’t know the paths to any other routes other than the connected ones. One way trip…
From R1: o Display the routing table. Note the connected routes, already known by the router as they are locally connected to its interface. o Create a static route to R2’s 10.50.0.0/24 network, using the IP address of R2’s interface as the next hop. o Test the connectivity to the 10.50.0.1 interface using ping. From S1: o Test the connectivity to the 10.50.0.1 interface using ping.
Round trip!
Cisco CCENT Lab Guide
From R2: o Display the routing table. Note the connected routes, already known by the router as they are locally connected to its interface. o Create a static route to R1’s 192.168.1.0/24 network, using the IP address of R1’s interface as the next hop. o Test the connectivity to the 192.168.1.1 interface using ping. From S1: o Test the connectivity to the 10.50.0.1 interface using ping.
www.subnet192.com
52
Around the world!
From R1: o Create a static route to R3’s 69.70.16.144/29 network, using the IP address of R2’s interface as the next hop. o Test the connectivity to the 69.70.16.147 interface using ping. Create all the missing routes to make the lab fully connected (use the WAN interfaces as the next hop). o R1 needs three routes. 69.70.16.144/29 network on R3 10.50.0.0/24 network on R2 R2-R3 WAN link o R2 needs two routes. 69.70.16.144/29 network on R3 192.168.1.0/24 network on R1 o R3 needs three routes (use the interface ID instead of the IP address of the next hop). 192.168.1.0/24 network on R1 10.50.0.0/24 network on R2 R1-R2 WAN link Display the routing tables on each router.
From S1, test the connectivity to any of the interfaces on the network. From R3, do a traceroute to Switch 3.
Now that the internal network is fully operational, let’s add external connectivity (note that there is NO protection (i.e. firewall or other) in this lab. Proceed at your own risk.)
Create a default route on all routers to reach the internet interface (FastEthernet 0/0 on R3). Verify that the default route is now enabled on R3. Configure name server 4.2.2.2 (DNS) on R3. Test internet connectivity from R3 using www.google.com as the destination address.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
53
www.subnet192.com
Walkthrough
One way trip… On R1, display the routing table R1#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is not set No default route
C C C
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks 172.16.0.0/30 is directly connected, Serial0/0 Connected route 172.16.0.2/32 is directly connected, Serial0/0 Connected route 192.168.1.0/24 is directly connected, FastEthernet0/0 Connected route
On R1, create a static route to R2’s 10.50.0.0/24 network… R1(config)#ip route 10.50.0.0 255.255.255.0 172.16.0.2 R1(config)#exit
On R1, test the connectivity to the 10.50.0.1 interface using ping R1#ping 10.50.0.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/36 ms Ping success!
** This pings from interface 172.16.0.1 to 10.50.0.1 uses the static route defined on the previous step. The R2 router already knows the route to 172.16.0.1 so the ping works. On S1, test the connectivity to the 10.50.0.1 interface using ping
Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds: ..... Success rate is 0 percent (0/5) Ping failure!
** The ping fails! Well actually, the ping reaches the 10.50.0.1 interface but because R2 doesn’t know the path to the 192.168.1.0/24 network, it can’t return the response to the ping.
www.subnet192.com
Cisco CCENT Lab Guide
S1>ping 10.50.0.1
54
Round trip! On R2, display the routing table R2#show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set
C C C C
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks 172.16.0.0/30 is directly connected, Serial0/1 Connected route 172.16.1.0/30 is directly connected, Serial0/0 Connected route 172.16.0.1/32 is directly connected, Serial0/1 Connected route 10.0.0.0/24 is subnetted, 1 subnets 10.50.0.0 is directly connected, FastEthernet0/0 Connected route
On R2, create a static route to R1’s 192.168.1.0/24 network… R2(config)#ip route 192.168.1.0 255.255.255.0 172.16.0.1 R2(config)#exit
On R2, test the connectivity to the 192.168.1.1 interface using ping R1#ping 192.168.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/36 ms Ping success!
** This pings from interface 172.16.0.2 to 192.168.1.1 uses the static route defined on the previous step. The R1 router already knows the route to 172.16.0.2 so the ping works. On S1, test the connectivity to the 10.50.0.1 interface using ping S1>ping 10.50.0.1
Cisco CCENT Lab Guide
Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.50.0.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 32/33/36 ms Ping success!
55
** The ping works! Now that R2 knows the path to the 192.168.1.0/24 network, it is able to return the response to the ping.
www.subnet192.com
Around the world! On R1, create a static route to R3’s 69.70.16.144/29 network, using the IP address of R2’s interface as the next hop. R1(config)#ip route 69.70.16.144 255.255.255.248 172.16.0.2 R1(config)#exit
Test the connectivity to the 69.70.16.147 interface using ping R1#ping 69.70.16.147 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds: U.U.U Success rate is 0 percent (0/5) Ping failure!
** The ping fails! The packet is sent to R2 but R2 has no idea where to forward it to… Create all the missing routes to make the lab fully connected To establish full connectivity, more static routes need to be configured. These are the routes that are missing to make the entire network fully connected. R1 needs to know about R2-R3’s serial WAN link (the other two routes are already configured). R1(config)#ip route 172.16.1.0 255.255.255.252 172.16.0.2
R2 needs to know about R3’s Ethernet subnet (the other route is already configured). R2(config)#ip route 69.70.16.144 255.255.255.248 172.16.1.2
R3 needs to know about R1’s Ethernet subnet and R2’s Ethernet subnet, and about the R1-R2 serial WAN link.
Cisco CCENT Lab Guide
R3(config)#ip route 192.168.1.0 255.255.255.0 serial 0/1 R3(config)#ip route 10.50.0.0 255.255.255.0 serial 0/1 R3(config)#ip route 172.16.0.0 255.255.255.252 serial 0/1
www.subnet192.com
56
Display the routing tables on each router R1#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is not set
S C S C S C
69.0.0.0/29 is subnetted, 1 subnets 69.70.16.144 [1/0] via 172.16.0.2 Static route 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks 172.16.0.0/30 is directly connected, Serial0/0 172.16.1.0/30 [1/0] via 172.16.0.2 Static route 172.16.0.2/32 is directly connected, Serial0/0 10.0.0.0/24 is subnetted, 1 subnets 10.50.0.0 [1/0] via 172.16.0.2 Static route 192.168.1.0/24 is directly connected, FastEthernet0/0
R2#show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set
S C C C C S
69.0.0.0/29 is subnetted, 1 subnets 69.70.16.144 [1/0] via 172.16.1.2 Static route 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks 172.16.0.0/30 is directly connected, Serial0/1 172.16.1.0/30 is directly connected, Serial0/0 172.16.0.1/32 is directly connected, Serial0/1 10.0.0.0/24 is subnetted, 1 subnets 10.50.0.0 is directly connected, FastEthernet0/0 192.168.1.0/24 [1/0] via 172.16.0.1 Static route
Cisco CCENT Lab Guide
R3#show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route
57
Gateway of last resort is not set C S C S S
69.0.0.0/29 is subnetted, 1 subnets 69.70.16.144 is directly connected, FastEthernet0/0 172.16.0.0/30 is subnetted, 2 subnets 172.16.0.0 is directly connected, Serial0/1 Static route 172.16.1.0 is directly connected, Serial0/1 10.0.0.0/24 is subnetted, 1 subnets 10.50.0.0 is directly connected, Serial0/1 Static route 192.168.1.0/24 is directly connected, Serial0/1 Static route
www.subnet192.com
From S1, test the connectivity to any of the interfaces on the network ** Here we simply test the farthest connection available from S1 on the diagram, but all the internal networks are now reachable from any component of the network. S1>ping 69.70.16.147 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms
From R3, do a traceroute to Switch 3 R3#traceroute 192.168.1.7 Type escape sequence to abort. Tracing the route to 192.168.1.7 1 172.16.1.1 84 msec 84 msec 88 msec 2 172.16.0.1 100 msec 100 msec 100 msec 3 192.168.1.7 104 msec 100 msec *
Create a default route on all routers to reach the internet R1(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0 R2(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0 R3(config)#ip route 0.0.0.0 0.0.0.0 FastEthernet 0/0
Verify that the default route is now enabled on R3 R3#show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route
C S C S S S*
69.0.0.0/29 is subnetted, 1 subnets 69.70.16.144 is directly connected, FastEthernet0/0 172.16.0.0/30 is subnetted, 2 subnets 172.16.0.0 is directly connected, Serial0/1 172.16.1.0 is directly connected, Serial0/1 10.0.0.0/24 is subnetted, 1 subnets 10.50.0.0 is directly connected, Serial0/1 192.168.1.0/24 is directly connected, Serial0/1 0.0.0.0/0 is directly connected, FastEthernet0/0 Note the * next to the S
www.subnet192.com
Cisco CCENT Lab Guide
Gateway of last resort is 0.0.0.0 to network 0.0.0.0 Default route configured!
58
Configure name server 4.2.2.2 (DNS) on R3 R3(config)#ip name-server 4.2.2.2
Test internet connectivity from R3 using www.google.com as the destination R3#ping www.google.com Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 74.125.95.106, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 48/50/52 ms
Cisco CCENT Lab Guide
** NOTE: You will not be able to ping or resolve internet addresses from any other device on the network. Remember that everything inside the network is using NON-ROUTABLE addresses. Until NAT is implemented on the network, no other device other than R3 can access the internet (it has a public address!).
59
www.subnet192.com
Routing: RIP Objectives Creating all of the static routes was tedious work! Routing protocols allow much simpler management of routes. Tasks Remove all static routes created in the previous section on all routers. Use the running configuration to help you. Enable RIP on all the routers and advertise all the subnets Display the routing protocol information From R3, ping the S3 switch. Enable RIP debug mode to view RIP synchronization messages. Disable all debug information. Display the routing table. From S1, test the connectivity to any of the interfaces on the network. From R3, do a traceroute to Switch 3. Now that the internal network is fully operational, let’s add external connectivity (note that there is NO protection (i.e. firewall or other) in this lab. Proceed at your own risk.)
Create a default route on R3 for the internet interface and propagate it to other routers via RIP. Verify that the default route is now enabled on R3. Test internet connectivity from R3 using www.google.com as the destination address. Verify that other routers are receiving the default route via RIP.
Attempt to perform all the tasks listed above before going through the walkthrough.
Cisco CCENT Lab Guide
Attempt to perform all the tasks listed above before going through the walkthrough.
www.subnet192.com
60
Walkthrough Remove all static routes created in the previous section Start by looking at the running configuration of each router R1#show run | include ip route ip route 0.0.0.0 0.0.0.0 Serial0/0 ip route 10.50.0.0 255.255.255.0 172.16.0.2 ip route 69.70.16.144 255.255.255.248 172.16.0.2 ip route 172.16.1.0 255.255.255.252 172.16.0.2
Then issue a no command in front of the ip route statement. S1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. R1(config)#no ip route 0.0.0.0 0.0.0.0 Serial0/0 R1(config)#no ip route 10.50.0.0 255.255.255.0 172.16.0.2 R1(config)#no ip route 69.70.16.144 255.255.255.248 172.16.0.2 R1(config)#no ip route 172.16.1.0 255.255.255.252 172.16.0.2
Repeat for the other two routers. Enable RIP on all the routers and advertise all the subnets R1(config)#router rip R1(config-router)#network 172.16.0.0 R1(config-router)#network 192.168.1.0 R2(config)#router rip R2(config-router)#network 172.16.0.0 R2(config-router)#network 10.50.0.0 R3(config)#router rip R3(config-router)#network 172.16.0.0
Cisco CCENT Lab Guide
Display the routing protocol information
61
R1#show ip protocols Routing Protocol is "rip" Sending updates every 30 seconds, next due in 11 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Outgoing update filter list for all interfaces is not set Incoming update filter list for all interfaces is not set Redistributing: rip Default version control: send version 1, receive any version Interface Send Recv Triggered RIP Key-chain FastEthernet0/0 1 1 2 Serial0/0 1 1 2 Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 172.16.0.0 192.168.1.0 Routing Information Sources: Gateway Distance Last Update 172.16.0.2 120 00:00:06 Distance: (default is 120)
www.subnet192.com
From R3, ping the S3 switch R3#ping 192.168.1.7 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.7, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms
Enable RIP debug mode to view RIP synchronization messages R3#debug ip rip RIP protocol debugging is on R3# *Mar 25 14:31:07.639: RIP: received v1 update from 172.16.1.1 on Serial0/1 *Mar 25 14:31:07.639: 10.0.0.0 in 1 hops *Mar 25 14:31:07.639: 172.16.0.0 in 1 hops *Mar 25 14:31:07.639: 172.16.0.1 in 1 hops *Mar 25 14:31:07.639: 192.168.1.0 in 2 hops *Mar 25 14:31:08.859: RIP: sending v1 update to 255.255.255.255 via Serial0/1 (172.16.1.2) *Mar 25 14:31:08.859: RIP: build update entries - suppressing null update
Disable all debug information R3#no debug all All possible debugging has been turned off
Display the routing table on R1 R1#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is not set 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks 172.16.0.0/30 is directly connected, Serial0/0 172.16.1.0/30 [120/1] via 172.16.0.2, 00:00:24, Serial0/0 RIP route 172.16.0.2/32 is directly connected, Serial0/0 10.0.0.0/8 [120/1] via 172.16.0.2, 00:02:38, Serial0/0 RIP route 192.168.1.0/24 is directly connected, FastEthernet0/0
Cisco CCENT Lab Guide
C R C R C
www.subnet192.com
62
From S1, test the connectivity to any of the interfaces on the network ** Here we simply test the farthest connection available from S1 on the diagram, but all the internal networks are now reachable from any component of the network. S1>ping 69.70.16.147 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 69.70.16.147, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 216/216/216 ms
From R3, do a traceroute to Switch 3 R3#traceroute 192.168.1.7 Type escape sequence to abort. Tracing the route to 192.168.1.7 1 172.16.1.1 84 msec 84 msec 88 msec 2 172.16.0.1 100 msec 100 msec 100 msec 3 192.168.1.7 104 msec 100 msec *
Create a default route on R3 for the internet interface and propagate it to other routers via RIP R3(config)#ip route 0.0.0.0 0.0.0.0 fastEthernet 0/0 R3(config)#router rip R3(config-router)#default-information originate
Verify that the default route is now enabled on R3 R3#show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is 0.0.0.0 to network 0.0.0.0
Cisco CCENT Lab Guide
C
63
R C R R R S*
69.0.0.0/29 is subnetted, 1 subnets 69.70.16.144 is directly connected, FastEthernet0/0 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks 172.16.0.0/30 [120/1] via 172.16.1.1, 00:00:11, Serial0/1 RIP route 172.16.1.0/30 is directly connected, Serial0/1 172.16.0.1/32 [120/1] via 172.16.1.1, 00:00:11, Serial0/1 RIP route 10.0.0.0/8 [120/1] via 172.16.1.1, 00:00:11, Serial0/1 RIP route 192.168.1.0/24 [120/2] via 172.16.1.1, 00:00:11, Serial0/1 RIP route 0.0.0.0/0 is directly connected, FastEthernet0/0 Static route
www.subnet192.com
Test internet connectivity from R3 using www.google.com as the destination R3#ping www.google.com Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 74.125.95.106, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 48/50/52 ms
** NOTE: You will not be able to ping or resolve internet addresses from any other device on the network. Remember that everything inside the network is using NON-ROUTABLE addresses. Until NAT is implemented on the network, no other device other than R3 can access the internet (it has a public address!).
Verify that other routers are receiving the default route via RIP R1#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is 172.16.0.2 to network 0.0.0.0 Default route configured! 172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks 172.16.0.0/30 is directly connected, Serial0/0 172.16.1.0/30 [120/1] via 172.16.0.2, 00:00:03, Serial0/0 172.16.0.2/32 is directly connected, Serial0/0 10.0.0.0/8 [120/1] via 172.16.0.2, 00:00:03, Serial0/0 192.168.1.0/24 is directly connected, FastEthernet0/0 0.0.0.0/0 [120/2] via 172.16.0.2, 00:00:03, Serial0/0 Note the * next to the R
Cisco CCENT Lab Guide
C R C R C R*
www.subnet192.com
64
References & Resources Cisco official certification information http://www.cisco.com/web/learning/le3/learning_career_certifications_and_learning_paths_home.html The Cisco Learning Network https://learningnetwork.cisco.com/index.jspa?ciscoHome=true Cisco Feature Navigator http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp Wendell Odom’s CertSkills http://www.certskills.com/
Software Dynagen/Dynamips Cisco emulator http://dynagen.org/ Tera Term terminal emulator http://en.sourceforge.jp/projects/ttssh2/ TFTPD32 TFTP server http://tftpd32.jounin.net/
Special thanks… To my wife Luz and my son Ian, for understanding my passion for technology; and to all of you who went through this whole guide and thought… “Wow! What a great guide, I can pass this exam easily now! This guy rocks!” … and then went to Paypal and sent in a donation to
[email protected] to thank me for all my hard work. Cisco CCENT Lab Guide
Good luck with the exam!
65
Marc Bouchard http://www.subnet192.com
www.subnet192.com