Progress Field Values

 <  Free Open Study  >  

Timed Portion

Lab Rules

  • No static routes or floating static routes are used unless specifically stated.

  • Follow the instructions exactly. Be careful to propagate routes only where and when instructed. Use the PVCs only as directed by the instructions.

  • Primary configurations might need to be modified for Part II only when you finish the primary configurations.

  • You can use the configuration guides and the Cisco Documentation CD-ROM for your only reference material.

  • You have 8 1/2 hours to complete this portion of the lab. Do not talk to anyone during this phase.

  • It is recommended that you read the entire lab before beginning.

  • Make an accurate and precise network illustration.

  • Use Figure 18-10 as a reference for the physical layout of the lab.

Section I: Basic IP Configuration

  1. Access server: Configure the access server/router so that all the routers and the switches can be accessed through reverse Telnet. Password-protect all routers and switches with the password cisco.

  2. IP address assignment: Assign an IP addresses to all physical interfaces, as denoted in Figure 18-10. Use the major network of 133.7. x.x on all interfaces. Configure a loopback address on each router; use 133.7. x.x, where x.x is the router number. For example, R5's loopback would be 133.7.5.5. Use a 24-bit mask on all interfaces except for the following:

    R1: Use the IP address of 160.100.2.1/24 on the Ethernet segment; use VLAN 10 for this segment.

    R2, R3, R6: Use a 22-bit address on VLAN 30 between all the routers.

    R3: Use a 26-bit address on Ring 1.

    R4: Use the IP address of 10.10.10.1 on Ring 2. Allow the subnet on the ring to have 14 hosts on it. Use the IP address of 133.7.77.1/24 on VLAN 2.

    R5: Use a 26-bit address on VLAN 55.

  3. Full IP and IPX connectivity to all Ethernet, Token Ring, and loopback interfaces will be expected unless noted.

  4. Document the network thoroughly; include all OSPF areas, IP/IPX address, IPX networks, and so on.

Section II: Catalyst/LAN Configuration

  1. Configure the VLANs as depicted in Figure 18-10. Assign an IP address of 133.7.10.254 to the Catalyst. Configure the Catalyst switch that so it can be managed/telnetted from any router in the lab.

  2. Configure the Catalyst ports in VLAN 30 so that they will work only with R2, R3, and R6. If any other device is plugged into these ports, have the Catalyst deactivate the port.

  3. Configure the Catalysts so that if the backplane of the switch gets overloaded, the ports in VLAN 30 get serviced before the ports on VLAN 55.

  4. Password-protect VTP. Use the password of Cisco_CCIE.

Section III: OSPF and Frame Relay Configuration

  1. Configure the Frame Relay network as shown on Figure 18-10. Do not allow any dynamic PVC mapping from R1 to R5.

  2. R1, R3, and R5 should share the same IP subnet. Configure this subnet to be in Area 10.

  3. Configure VLAN 30 to be in OSPF Area 0. Configure VLAN 55 to be in OSPF Area 55.

  4. Configure Ring 1 of R3 to be in Area 20. Configure the ISDN network between R5 and R2 to be in Area 100.

Section IV: Routing Protocols and Redistribution

  1. Configure IGRP on HDLC circuit between R2/R4 and on Backbone 2. Redistribute IGRP into OSPF. Do not put Ring 2 into any routing protocol.

  2. Advertise a default route to R4's Backbone 2 without configuring summarization or using a static route. Ensure that every interface on R4 except Ring 2 has complete IP connectivity to the lab network.

  3. Configure RIP on R1's Ethernet segment or Backbone 1. Some routes will come from the backbone network. They are 192.190.100.0/24, 192.190.101.0/24, and 192.190.102.0/24. Advertise these as one network into the rest of lab network.

  4. Prevent all lab routes from being broadcast unto the Backbone 1 segment.

  5. Ensure full IP reachability between OSPF, IGRP, and RIP domains, except for the network on Ring 2.

Section V: ATM and EIGRP

  1. Configure the ATM interface on R6 to be part of the EIGRP autonomous system 2010.

  2. Configure R6 so that it can ping the ATM lab router without using Inverse ARP.

  3. Configure MD5 authentication for EIGRP AS 2010.

Section VI: ISDN Configuration

  1. Configure the ISDN interfaces on R2 and R5. Configure the ISDN calling so that only R5 can place a call. Use CHAP authentication; use cisco11 as the password. Ensure that you can ping the local ISDN interfaces before moving on.

  2. Configure the ISDN interfaces as part of the OSPF domain. Ensure that the link becomes active only upon changes in the routing table, unless otherwise stated. Only TCP traffic should bring up the link; routing updates should not.

Section VII: IPX Configuration

  1. Configure IPX networks on all interfaces except the loopbacks, ISDN network, Backbone 2, and the ATM network.

  2. Configure IPX NLSP on the HDLC network on R2/R4 and on Ring 2. Use IPX RIP on VLAN 30. Use IPX EIGRP on Frame, VLAN 55, and on Backbone 1 of R1. Ensure that all routers have IPX reachability to all IPX networks.

  3. Configure IPX SAP on R5, which supports print services. This SAP is called fakepserver and has socket 451. Ensure that all routers can see this SAP.

  4. Configure R2 so that the IPX network assigned to VLAN 55 will not be propagated to R4.

Section VIII: Miscellaneous Cisco IOS Software Configuration

  1. The IP network assigned to Ring 2 should not be advertised by any routing protocol. Allow the users of this ring to have full IP reachability to the lab network without using redistribution, static routes, or default routes.

  2. Deny R1 from ping ing R2, but allow R2 to ping R1.

 <  Free Open Study  >  


CCIE Practical Studies, Volume I
CCIE Practical Studies, Volume I
ISBN: 1587200023
EAN: 2147483647
Year: 2001
Pages: 283
Authors: Karl Solie

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net