If you configured this correctly as shown in Example 5-33, you have scored 3 points. This task is accomplished by mapping the IP addresses to the respective hostnames. Example 5-33 shows the necessary commands to accomplish this task and the verification. Example 5-33. R4 IP Hostnames ConfigurationR4#sh run Building configuration... Current configuration : 1561 bytes ! version 12.2 ! hostname R4 ! ! no ip domain-lookup ip host Sw1 160.10.11.10 ip host R6 160.10.6.6 ip host R5 160.10.5.5 ip host R4 160.10.4.4 ip host R3 160.10.3.3 ip host R2 160.10.2.2 ip host R1 160.10.1.1 ! R4# R4#ping r6 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 160.10.6.6, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/5/8 ms R4# R4#telnet sw1 Trying Sw1 (160.10.11.10)... Open User Access Verification Password: Sw1>en Password: Sw1#exit [Connection to sw1 closed by foreign host] R4#
If you configured this correctly as shown in Example 5-34, you have scored 2 points. Example 5-34 shows the necessary command to accomplish this task. HP Probe Proxy support allows the Cisco IOS software to respond to HP Probe Proxy name requests. These requests are typically used at sites that have HP equipment and are already using HP Probe Proxy. The ip probe proxy command allows Cisco IOS to respond to HP Probe Proxy name requests. The ip hp-host command maps the HP Probe host. Example 5-34. R3 Configuring HP Probe Proxy (IP Addressing and Services Configuration)R3#sh run | incl hp ip hp-host HP_Probe 160.10.33.254 R3# R3# R3#sh run int fa0/1 Building configuration... Current configuration : 172 bytes ! interface FastEthernet0/1 ip address 160.10.33.3 255.255.255.0 ip probe proxy end R3#
If you configured this correctly as shown in Example 5-35, you have scored 3 points. Example 5-35 shows the configuration needed to be applied on R1. The IP addresses used on ACL 2 in R1 came from a traceroute from R3 and R5 to verify which path is used for each router to reach R1. Example 5-35. R1 Configuration as TFTP Server with Access List to Permit Access Only from R3 and R5 R1#sh run | b access-list 2 access-list 2 permit 160.10.32.2 access-list 2 permit 160.10.37.2 ! tftp-server flash:c2600-jk8o3s-mz.122-16.bin 2 !
If you configured this correctly as shown in Example 5-36, you have scored 2 points. Example 5-36 shows the configuration need on R3. As in the previous question, if R3 fails to get the IOS image from Flash memory, R3 will try to get it from R1. NOTE You should also to change the configuration register to 0x010F to complete the task. You do not need to configure. This is to give you an idea, you need to go through the IOS features to understand what is available and how to configure them. Example 5-36. R3 Configuration to Load a System File from a Remote Location R3#sh run | b boot boot system flash c2600-jk8o3s-mz.122-16.bin boot system tftp c2600-jk8o3s-mz.122-16.bin 160.10.1.1 |