CCNP ROUTE Lab manual from the Cisco Academy soundofheaven.info JiveServlet/previewBody//CCNP%20ROUTE%% soundofheaven.info After finishing this course you will be ready for Cisco CCNP Switch exam In addition, each lecture has a pdf manual which includes the lab tutorial. The following publication, CCNP Lab Workbook, is designed to assist version of INE's CCIE Routing & Switching Lab Workbook (IEWB-RS) Hardware.
|Language:||English, Spanish, Arabic|
|Genre:||Health & Fitness|
|ePub File Size:||21.48 MB|
|PDF File Size:||18.49 MB|
|Distribution:||Free* [*Regsitration Required]|
CCNP. CISCO CERTIFIED NETWORK PROFESSIONAL. LAB MANUAL Lab 1 – Basic EIGRP Configuration. R2 . Lab 3 – Route Summarization with EIGRP. CCNP ROUTE Student Lab Manual. This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for. The only authorized Lab Manual for the Cisco Networking Academy CCNP. courses that employ industry-relevant instructional approaches to prepare students for professional-level jobs: CCNP ROUTE: Implementing IP Routing, CCNP SWITCH: Implementing IP Switching, and CCNP TSHOOT.
Why not share! This must be done so that a new election will take place.. This challenge lab is meant to help prepare individuals for the CCNP route exam. It makes learning easier if the engineer can see what's happening behind the scenes. Minimum Time to Live : Transit area
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime. Upcoming SlideShare. Like this presentation? Why not share! An annual anal Embed Size px. Start on. Show related SlideShares at end. WordPress Shortcode. Published in: Full Name Comment goes here.
Cost of using 10 Transmit Delay is 1 sec. Transit area R6 ping Packet sent with a source address of Sending a default route can be accomplished with the default-information originate command with the always keyword. It's time to troubleshoot. A chart is included listing the different OSPF network types. If you have not done this yet.
To get the loopback interfaces to display their correct subnet mask. An engineer could risk black-holing traffic destined for outside networks if there is no default route in the routing table.
If you do not use the always keyword. Default Routing Let's take a look at the default route first. One of the requirements was that the loopback interfaces need to have the native subnet mask in the routing table.
In a production environment. OSPF will treat loopback interfaces as network hosts. The reason we are using the always keyword is so R1 will advertise the default route. OSPF external type 1. R6 R6 sh ip route in E2 E1. Please refer to Example 2.
Example 2. I would like to expand on a concept that we saw in the OSPF section. R2 and R3 did not reform. Target IP address: You may often see the extended ping feature used in a single line IOS command. You should use both methods and see what works for you. This command can be used to make all interfaces passive. Verify the configuration by using the IOS extended ping feature.
It's important at the professional level to be able to use the tools that IOS provides. Extended commands [n]: From there. R4 is using R2 as the next hop and the requirement states that R3 should be the next hop. Sweep range of sizes [n]: It's time to. Set DF bit in IP header?
Validate reply data? Data pattern [0xABCD]: Refer to Example 2. Sending If that can happen. If you do not. There is no link between R2 and R3. R2 interface Tunnel10 ip address That's a problem. Each protocol can then add the necessary transport encapsulation.
If the tunnel endpoints have connectivity. It can transport multiple protocols. Our goal should be to find a way to get R5s routes to the routing table of R4. R1 would then drop that traffic because there is no redistribution in place yet.
R3 would send that traffic to the next hop using the default route. This can be further verified by using the traceroute command on R4.
Hops 3 Example 2. Verify by examining the routing table on R4. You could also use R3 if you prefer. By default. Tracing the route to Timeout in seconds : Probe count : Minimum Time to Live : Maximum Time to Live : Port Number : In today's networks. A key and a key string are used to create the md5 hash. This is very similar to RIP.
This means that if you configured key 5 on one side of the link. The other requirement is that R2 should only install the summary route and the 3rd loopback of R5 into the IP routing table. Write out all of the subnets in binary and summarize the interesting octet. It makes learning easier if the engineer can see what's happening behind the scenes.
All of the values that are equal have been put in bold type. The interesting octet is the octet where the values are changing.
The total number of bits in common are In this example. Change the key numbers on one side to see the results. I would also encourage the use of other debugs. Console messages should be sent stating that there is an authentication failure. To find the summary to use. R3 is receiving routes about R5. So the summary route will be Tunnel10 Null0 Tunnel10 R2 show ip route The requirement was that R2 should only have the summary route and the 3rd loopback of R5 in the routing table.
Notice that the In Example 2. Of course R3 will have the more specific routes since it is the source of summarization. To get the 3rd loopback of R5to be installed as well as the summary route. Redistributing a protocol with a higher administrative distance into a protocol with a lower administrative distance will likely cause sub-optimal routing problems. Redistribution Redistribution is of of those topics that can make even a seasoned engineer cringe. Tunnel10 By the output of Example 2.
This typically occurs during corporate acquisitions and outsourced IT. Concerns about routing loops occur when there are multiple points of redistribution in the network. This makes route filtering more efficient when multiple points of redistribution are present.
For the exercise. If not carefully controlled. R2 sh ip route eigrp Of of the things that are unique to each IGP is how the protocol calculates the metric.
Example 3. The details of route maps will not be covered in this exercise. The first few requirements can be fulfilled with just one route map.
It is assumed that the student has covered this material and is familiar with the concept of route maps in context with redistribution. Since the requirement asks for mutual redistribution and to set route tagging. The ACL does not permit or deny the traffic. If the route map finds a match of the OSPF protocol. That route map is saying that it will match on the source protocol. In our case. Use what makes sense to you.
Remember we will use the route map's permit or deny action to tell the router whether or not it should be redistributing when a match is made. Let's take a look at the output of R1 after the redistribution statement was entered. That's OSPF.
The first thing we need to do is define our access lists to classify the traffic we need to match on in our route map. The next step is to create our route maps. You can set the tag to anything you like. False R1 RT: False RT: R1 add No TOS-capability. FD is Inaccessible. DC LS Type: