Configuration Exercises


1

The routing configuration for Router A in Figure 13-7 is displayed in Example 13-33.

Figure 13-7. The network for Configuration Exercises 1 through 4.


Configure a route filter at A that will prevent subnet 172.16.12.0/24 from being known by any router other than E.

Example 13-33. Router A's configuration for the network shown in Figure 13-7.
router rip redistribute eigrp 1 metric 3 passive-interface Ethernet0 passive-interface Ethernet1 network 172.16.0.0 ! router eigrp 1 redistribute rip metric 10000 1000 255 1 1500 passive-interface Ethernet2 passive-interface Ethernet3 network 172.16.0.0

2

Configure a route filter at A in Figure 13-7 that will prevent D from learning about subnet 172.16.10.0/24.

3

Configure a route filter at A in Figure 13-7 that will allow only subnets 172.16.2.0/24, 172.16.8.0/24, and 172.16.9.0/24 to be advertised into the RIP domain.

4

Configure a route filter at A in Figure 13-7 that will prevent B from learning about any of the subnets in the RIP domain.

5

OSPFv3 for IPv6 is added to Routers A, B and C. RIPng is added to Routers A, D, and E. IPv6 prefixes 2001:db8:0:1::/64, 2001:db8:0:2::/64, and 2001:db8:0:3::/64 are connected to Router B. Prefixes 2001:db8:0:a::/64, 2001:db8:0:b::/64, and 2001:db8:0:c::/64 are connected to Router E. Configure a route filter at A in Figure 13-7 that prevents the prefixes 2001:db8:0:a::/64 and 2001:db8:0:b::/64 from being advertised to D.

6

Table 13-1 shows the interface addresses for all routers in Figure 13-8. Routers A and B are running EIGRP, and Routers E and F are running IS-IS. C and D are redistributing. Configure distance commands for C and D that will prevent loops and route feedback but will still allow redundant paths.

Table 13-1. The interface addresses of the routers in Figure 13-8.

Router

Interface

Address

Mask

A

E0

S0

S1

S2

192.168.1.1

192.168.10.254

192.168.10.249

192.168.10.245

255.255.255.0

255.255.255.252

255.255.255.252

255.255.255.252

B

E0

S0

S1

192.168.2.1

192.168.10.246

192.168.10.241

255.255.255.0

255.255.255.252

255.255.255.252

C

S0

S1

S2

192.168.10.253

192.168.10.234

192.168.10.225

255.255.255.252

255.255.255.252

255.255.255.252

D

S0

S1

S2

192.168.10.250

192.168.10.242

192.168.10.237

255.255.255.252

255.255.255.252

255.255.255.252

E

E0

S0

S1

192.168.4.1

192.168.10.226

192.168.10.229

255.255.255.0

255.255.255.252

255.255.255.252

F

E0

S0

S1

S2

192.168.3.1

192.168.10.230

192.168.10.233

192.168.10.238

255.255.255.0

255.255.255.252

255.255.255.252

255.255.255.252


Figure 13-8. The network for Configuration Exercises 6 through 8.


7

Using the distance command, configure Router D in Figure 13-8 to accept EIGRP routes only from Router A. If the link to A fails, D should not accept routes from Router B, although D should still advertise routes to B.

8

Remove the configuration added to D in Configuration Exercise 7. Configure Router C in Figure 13-8 to route to all destinations, including the networks and subnets of the IS-IS domain, via Router A. C should route through E and F only if the link to A fails.




CCIE Professional Development Routing TCP/IP (Vol. 12005)
Routing TCP/IP, Volume 1 (2nd Edition)
ISBN: 1587052024
EAN: 2147483647
Year: 2005
Pages: 233

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net