Sponsor

Hiển thị các bài đăng có nhãn CCNA v5.0 cisco. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn CCNA v5.0 cisco. Hiển thị tất cả bài đăng

CCNA 4 R&S Connecting Networks Chapter 3 v5.0 Exam Answers 2014

Thứ Ba, 15 tháng 4, 2014

CCNA 4 R&S Connecting Networks Chapter 3 v5.0 Exam Answers 2014

1.
Which address is used in the Address field of a PPP frame?
a single byte of binary 10101010
a single byte of binary 11111111*
the IP address of the serial interface
a single byte of binary 00000000
2
How does PPP interface with different network layer protocols?
by specifying the protocol during link establishment through LCP
by encoding the information field in the PPP frame
by using separate NCPs*
by negotiating with the network layer handler
3
Place the options in the following order: 
Compression 
Multilink 
Maximum Receive Unit 
– not scored – 
Authentication Protocol
4
Which command can be used to view the cable type that is attached to a serial interface?
Router(config)# show controllers*
Router(config)# show ip interface
Router(config)# show interfaces
Router(config)# show ip interface brief
5
In which situation would the use of PAP be preferable to the use of CHAP?
when plain text passwords are needed to simulate login at the remote host*
when router resources are limited
when multilink PPP is used
when a network administrator prefers it because of ease of configuration
6
Which protocol will terminate the PPP link after the exchange of data is complete?
IPCP
LCP*
IPXCP
NCP
7
Refer to the exhibit. Which statement describes the status of the PPP connection?
Both the link-establishment and network-layer phase completed successfully.*
Only the network-layer phase completed successfully.
Only the link-establishment phase completed successfully.
Neither the link-establishment phase nor the network-layer phase completed successfully.
8
Which is an advantage of using PPP on a serial link instead of HDLC?
option for session establishment
higher speed transmission
option for authentication*
fixed-size frames
9
Which three statements are true about PPP? (Choose three.)
PPP can use synchronous and asynchronous circuits.*
PPP carries packets from several network layer protocols in LCPs.
PPP can only be used between two Cisco devices.
PPP uses LCPs to agree on format options such as authentication, compression, and error detection.*
PPP uses LCPs to establish, configure, and test the data link connection.*
10
When configuring Multilink PPP, where is the IP address for the multilink bundle configured?
on a subinterface
on a physical serial interface
on a physical Ethernet interface
on a multilink interface*
11
Which field marks the beginning and end of an HDLC frame?
FCS
Flag*
Control
Data
12

Refer to the exhibit. Based on the debug command output that is shown, which statement is true of the operation of PPP.
Both PAP and CHAP authentication were attempted.
A PPP session was successfully established.*
CHAP authentication failed because of an unknown hostname.
The debug output is from router R2.
13
During a PPP session establishment phase, which two messages are sent by the requested party if the options are not acceptable? (Choose two.)
Configure-Reject*
Code-Reject
Discard-Request
Configure-Nak*
Protocol-Reject
14
A network administrator is evaluating authentication protocols for a PPP link. Which three factors might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.)
uses an unpredictable variable challenge value to prevent playback attacks*
uses a three-way authentication periodically during the session to reconfirm identities*
transmits login information in encrypted format*
control by the remote host of the frequency and timing of login events
establishes identities with a two-way handshake
makes authorized network administrator intervention a requirement to establish each session
15
Place the options in the following order: 
Step 3 
Step 2 
Step 4 
Step 1 
– not scored – 
Step 5 
Step 6
16
What are three components of PPP? (Choose three.)
LCP*
multilink
NCP*
HDLC-like framing*

compression
authentication
17
Refer to the exhibit. A network administrator is configuring the PPP link between the two routers. However, the PPP link cannot be established. Based on the partial output of the show running-config command, what is the cause of the problem?​
The passwords do not match.*
The usernames do not match.
The passwords should be longer than 8 characters.
The interface IP addresses are in different subnets.
18
Which PPP option can detect links that are in a looped-back condition?
Magic Number*
Callback
MRU
ACCM
19
Which three are types of LCP frames used with PPP? (Choose three.)
link-negotiation frames
link-acknowledgment frames
link-maintenance frames*
link-termination frames*
link-establishment frames*
link-control frames
20
At which layer of the OSI model does multiplexing take place?
Layer 3
Layer 4
Layer 2
Layer 1*
21
Place the options in the following order: 
Phase 3 
– not scored – 
Phase 1 
Phase 2
22
Which three physical layer interfaces support PPP? (Choose three.)
GigabitEthernet
asynchronous serial*
HSSI*
synchronous serial*

POTS
FastEthernet
23

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Why is the serial link between router R1 and router R2 not operational?
The encapsulation in both routers does not match.
The passwords are different in both routers.
In each case the expected username is not the same as the remote router hostname.*
The authentication type is not the same in both routers.
24
Which serial 0/0/0 interface state will be shown if no serial cable is attached to the router, but everything else has been correctly configured and turned on?
Serial 0/0/0 is up, line protocol is down
Serial 0/0/0 is administratively down, line protocol is down
Serial 0/0/0 is up (disabled)
Serial 0/0/0 is up, line protocol is up
Serial 0/0/0 is down, line protocol is down*
Serial 0/0/0 is up (looped)
Read more ...

CCNA 4 R&S Connecting Networks Chapter 2 v5.0 Exam Answers 2014

Thứ Ba, 15 tháng 4, 2014

CCNA 4 R&S Connecting Networks Chapter 2 v5.0 Exam Answers 2014

1.
Which WAN technology is cell-based and well suited to carry voice and video traffic?
VSAT
ISDN
Frame Relay
ATM*
2
Which WAN connectivity method would be used in a remote location where there are no service provider networks?
VPN
WiMAX
cable
VSAT*
3
Which network scenario will require the use of a WAN?
Employees need to access web pages that are hosted on the corporate web servers in the DMZ within their building.
Employees need to connect to the corporate email server through a VPN while traveling.*
Employee workstations need to obtain dynamically assigned IP addresses.
Employees in the branch office need to share files with the headquarters office that is located in a separate building on the same campus network.
4
Which two technologies use the PSTN network to provide an Internet connection? (Choose two.)
ATM
ISDN*
Frame Relay
MPLS
dialup*
5
Which geographic scope requirement would be considered a distributed WAN scope?
regional
one-to-one
global
local
one-to-many
many-to-many*
6
What are two advantages of packet switching over circuit switching? (Choose two.)
A connection through the service provider network is established quickly before communications start.
There are fewer delays in the data communications processes.
The communication costs are lower.
Multiple pairs of nodes can communicate over the same network channel.*
A dedicated secure circuit is established between each pair of communicating nodes.
7
Which connectivity method would be best for a corporate employee who works from home two days a week, but needs secure access to internal corporate databases?
VPN*
WiMAX
DSL
cable
8
Place the options in the following order:
- not scored – 
CPE 
Local Loop 
– not scored – 
DTE 
DCE
9
Which wireless technology provides Internet access through cellular networks?
satellite
municipal WiFi
LTE*
WiMAX
10
What is a requirement of a connectionless packet-switched network?
Full addressing information must be carried in each data packet.*
A virtual circuit is created for the duration of the packet delivery.
Each packet has to carry only an identifier.
The network predetermines the route for a packet.
11
A customer needs a WAN virtual connection that provides high-speed, dedicated bandwidth between two sites. Which type of WAN connection would best fulfill this need?
circuit-switched network
packet-switched network
MPLS
Ethernet WAN*
12
Which WAN technology establishes a dedicated constant point-to-point connection between two sites?
ATM
Frame Relay
leased lines*
ISDN
13
A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended?
Frame Relay
Ethernet WAN*
ISDN
VSAT
14
A home user lives within 10 miles (16 kilometers) of the Internet provider network. Which type of technology provides high-speed broadband service with wireless access for this home user?
WiMAX*
DSL
802.11
municipal Wi-Fi
15
Which two devices are needed when a digital leased line is used to provide a connection between the customer and the service provider? (Choose two.)
dialup modem
access server
DSU*
CSU*
Layer 2 switch
16
Place the options in the following order: 
uses traditional video network 
uses traditional phone network 
set up by a city to provide free Internet access 
slow access (upload speed is about one-tenth download speed) 
– not scored -
17
What is a feature of dense wavelength-division multiplexing (DWDM) technology?
It replaces SONET and SDH technologies.
It provides Layer 3 support for long distance data communications.
It provides a 10 Gb/s multiplexed signal over analog copper telephone lines.
It enables bidirectional communications over one strand of fiber.*
18
What is the recommended technology to use over a public WAN infrastructure when a branch office is connected to the corporate site?
municipal Wi-Fi
VPN*
ATM
ISDN
19
A small company with 10 employees uses a single LAN to share information between computers. Which type of connection to the Internet would be appropriate for this company?
a broadband service, such as DSL, through their local service provider*
a dialup connection that is supplied by their local telephone service provider
Virtual Private Networks that would enable the company to connect easily and securely with employees
private dedicated lines through their local service provider
20
What is a long distance fiber-optic media technology that supports both SONET and SDH, and assigns incoming optical signals to specific wavelengths of light?
ATM
MPLS
ISDN
DWDM*
21
A new corporation needs a data network that must meet certain requirements. The network must provide a low cost connection to sales people dispersed over a large geographical area. Which two types of WAN infrastructure would meet the requirements? (Choose two.)
private infrastructure
dedicated
public infrastructure*
Internet*
satellite
22
What are two common high-bandwidth fiber-optic media standards? (Choose two.)
ITU
ANSI
ATM
SDH*
SONET*
Read more ...

CCNA 4 R&S Connecting Networks Chapter 1 v5.0 Exam Answers 2014

Thứ Ba, 15 tháng 4, 2014

CCNA 4 R&S Connecting Networks Chapter 1 v5.0 Exam Answers 2014


What are two structured engineering principles necessary for successful implementation of a network design? (Choose two.)
modularity*
security
availability
quality of service
resiliency*

What is an important first consideration when starting to design a network?
size of the network* 
access security
protocols to be used
type of applications

Which layer of the Cisco Collaboration Architecture contains unified communications and conference software such as Cisco WebEx Meetings, WebEx Social, Cisco Jabber, and TelePresence?
service provider edge
enterprise WAN
applications and devices* 
services module

In which layer of the hierarchical enterprise LAN design model would PoE for VoIP phones and access points be considered?
core
physical
data link
access* 
distribution

Which network module is the fundamental component of a campus design?
access-distribution module* 
services module
data center
enterprise edge

In a hierarchical network design, which layers may be combined into a collapsed core for smaller networks?
core, distribution, and access
distribution and access
core and access
core and distribution*
7

Refer to the exhibit. Which type of ISP connectivity to the service provider edge is being used by company A?
dual-homed
dual-multihomed
single-homed
multihomed*

What is one advantage to designing networks in building block fashion for large companies?
mobility
redundancy
increased network access time
failure isolation*

A network engineer wants to redesign the wireless network and make use of wireless network controllers that manage the many deployed wireless access points. In which network design module of the campus network architecture would the centralized wireless network controllers be found?
services* 
access-distribution
enterprise edge
data center
10 
Which two devices would commonly be found at the access layer of the hierarchical enterprise LAN design model? (Choose two.)
Layer 3 device
firewall
access point* 
Layer 2 switch* 
modular switch
11 
Which approach in networking allows for network changes, upgrades, or the introduction of new services in a controlled and staged fashion?
modular* 
network module
borderless
static
12

Refer to the exhibit. Which type of Cisco hierarchical LAN design model is used at school site 1?
7 layer
two-tier collapsed core* 
three-tier
3 layer
13 
Which three network architectures have been introduced by Cisco to address the emerging technology challenges created by the evolving business models? (Choose three.)
Cisco Collaboration* 
Cisco Data Center* 
Cisco Borderless* 
Cisco Enterprise Edge
Cisco Enterprise Campus
Cisco Enterprise Branch
14 
Which Cisco technology allows diverse network devices to connect securely, reliably, and seamlessly to enterprise network resources?
Cisco AnyConnect*
enterprise edge
building distribution
service provider edge
15 
The network design for a college with users at five sites is being developed. Where in the campus network architecture would servers used by all users be located?
services
enterprise edge
data center* 
access-distribution
16 
What is creating a new challenge for IT departments by changing the border of the enterprise network?
tablets* 
company-owned desktops
energy costs
access layer switching
17 
Which network architecture functions through a combination of technologies that include wired, wireless, security, and more?
Cisco Borderless* 
Cisco Enterprise Campus
Cisco Enterprise Edge
Cisco Enterprise Branch
18 
Which network architecture combines individual components to provide a comprehensive solution allowing people to cooperate and contribute to the production of something?
Cisco Enterprise Campus Architecture
Cisco Enterprise Branch Architecture
Cisco Borderless Network Architecture
Cisco Collaboration Architecture*
19 
Fill in the blank.
Reducing the complexity of network design by dividing a network into smaller
areas is an example of a ” hierarchical ” network model.​
20 
Fill in the blank. Use the abbreviation.
Under the Cisco Enterprise Edge module, the submodule that provides remote access
including authentication and IPS appliances is the ” VPN ” and remote access submodule.
21

Place the options in the following order:
- not scored – 
core 
ccess 
distribution
22

Place the options in the following order:
[+] campus core 
[+] building distribution 
[+] data center
[#] VPN and remote access 
[#] DMZ 
[#] e-commerce
[+] Order does not matter within this group.
[#] Order does not matter within this group.
Read more ...

CCNA 3 Routing and Switching Scaling Networks OSPF Practice Skills Assessment – Packet Tracer

Thứ Ba, 15 tháng 4, 2014
CCNA Routing and Switching
Scaling Networks
OSPF Practice Skills Assessment – Packet Tracer
A few things to keep in mind while completing this activity:
  1. Do not use the browser Back button or close or reload any exam windows during the exam.
  2. Do not close Packet Tracer when you are done. It will close automatically.
  3. Click the Submit Assessment button in the browser window to submit your work.
Introduction
In Part I of this practice skills assessment, you will configure the Company A network with routing and ACLs. You will configure dynamic routing with OSPFv2 and distribute a default route. In addition, you will configure two access control lists.
In Part II of this practice skills assessment, you will configure the Company A network with RPVST+, port security, EtherChannel, DHCP, VLANs and trunking, and routing between VLANs. In addition you will perform an initial configuration on a switch, secure switch ports and create SVIs. You will also control access to the switch management network with an access control list.
All IOS device configurations should be completed from a direct terminal connection to the device console from an available host.
Some values that are required to complete the configurations have not been given to you. In those cases, create the values that you need to complete the requirements. These values may include certain IP addresses, passwords, interface descriptions, banner text, and other values.
For the sake of time, many repetitive but important configuration tasks have been omitted from this activity. Many of these tasks, especially those related to device security, are essential elements of a network configuration. The intent of this activity is not to diminish the importance of full device configurations.
You will practice and be assessed on the following skills:
  • Configuration of initial device settings
  • IPv4 address assignment and configuration
  • Configuration and addressing of device interfaces
  • Configuration of the OSPFv2 routing protocol
  • Configuration of a default route
  • Configuration of ACL to limit device access
  • Configuration of switch management settings including SSH
  • Configuration of port security
  • Configuration of unused switch ports according to security best practices
  • Configuration of RPVST+
  • Configuration of  EtherChannel
  • Configuration of a router as a DHCP server
  • Configuration of VLANs and trunks
  • Configuration of routing between VLANs
You are required to do the following:
Site 1:
  • Configure initial device settings.
  • Configure interfaces with IPv4 addresses, descriptions, and other settings.
  • Configure and customize OSPFv2.
HQ:
  • Configure interfaces with IPv4 addresses, descriptions, and other settings.
  • Configure and customize OSPFv2.
  • Configure named and numbered ACLs.
  • Configure and propagate a default route through OSPFv2.
Site 2:
  • Configure interfaces with IPv4 addresses, descriptions, and other settings.
  • Configure DHCP pools and excluded addresses.
  • Configure routing between VLANs.
  • Configure a standard ACL.
  • Configure OSPFv2.
SW-A:
  • Create and name VLANs.
  • Configure EtherChannel.
  • Configure trunking.
  • Assign access ports to VLANs.
  • Configure remote management settings.
  • Activate and configure RPVST+.
  • Secure unused switch ports.
  • Configure port security.
SW-B:
  • Create and name VLANs.
  • Configure EtherChannel.
  • Configure trunking.
  • Assign access ports to VLANs.
  • Configure remote management settings with SSH.
  • Activate RPVST+.
SW-C:
  • Create and name VLANs.
  • Configure EtherChannel.
  • Configure trunking.
  • Assign access ports to VLANs.
  • Configure remote management settings.
  • Activate and configure RPVST+.
  • Configure switch ports with PortFast and BPDU Guard.
Internal PC hosts:
  • Configure as DHCP clients.
  • Assign static IPv4 addresses where indicated.

Tables
Note: You are provided with the networks that interfaces should be configured on. Unless you are told to do differently in the detailed instructions below, you are free to choose the host addresses to assign.
Addressing Table:
Device
Interface
Network
Configuration Details
Site 1
S0/0/0
192.168.100.20/30
any address in the network
G0/0
192.168.8.0/24
first host address
G0/1
192.168.9.0/24
first host address
HQ
S0/0/0
192.168.100.20/30
any address in the network
S0/0/1
192.168.100.36/30
any address in the network
S0/1/0
203.0.113.16/29
(The first address in this network is already in use on the ISP router. Any other address in the network can be assigned to this interface.)
Site 2
S0/0/1
192.168.100.36/30
any address in the network
G0/1.2
10.10.2.0/24
first address in the network
G0/1.4
10.10.4.0/24
first address in the network
G0/1.8
10.10.8.0/24
first address in the network
G0/1.15
10.10.15.0/24
first address in the network
G0/1.25
10.10.25.0/24
first address in the network
SW-A
SVI
10.10.25.0/24
the highest address in the network
SW-B
SVI
10.10.25.0/24
the second to the highest address in the network
SW-C
SVI
10.10.25.0/24
the third to the highest address in the network
Manage-1A
NIC
192.168.8.0/24
any address in the network
Clerk-1C
NIC
192.168.9.0/24
any address in the network
Admin-A
NIC
10.10.15.0/24
any available address in network
Admin-B
NIC
10.10.15.0/24
any available address in network
VLAN Switch Port Assignment Table:
VLAN
Name
Network
Device
Switch Ports
2
sales
10.10.2.0/24
SW-A
Fa0/5
SW-C
Fa0/7
4
prod
10.10.4.0/24
SW-A
Fa0/10
SW-C
Fa0/10
8
acct
10.10.8.0/24
SW-A
Fa0/15
SW-C
Fa0/15
15
admin
10.10.15.0/24
SW-A
Fa0/24
SW-C
Fa0/24
25
SVI-NET
10.10.25.0/24
SW-A
SVI
SW-B
SVI
SW-C
SVI
99
null
N/A
SW-A
all unused ports
Port-Channel Groups:
Channel
Device
Interfaces
1
SW-A
Fa0/1, Fa0/2
SW-C
Fa0/1, Fa0/2
2
SW-A
Fa0/3, Fa0/4
SW-B
Fa0/3, Fa0/4
3
SW-B
Fa0/5, Fa0/6
SW-C
Fa0/5, Fa0/6
Instructions

All configurations must be performed through a direct terminal connection to the device console line from an available host.
Part I: OSPFv2 Router Configuration
Step 1: Plan the Addressing.
Determine the IP addresses that you will use for the required interfaces on the devices and LAN hosts. Follow the configuration details provided in the Addressing Table.
Step 2: Configure Site 1.
Configure Site 1 with initial settings:
  • Configure the router host name: Site-1. This value must be entered exactly as it appears here.
  • Prevent the router from attempting to resolve command line entries to IP addresses.
  • Protect device configurations from unauthorized access with an encrypted secret password.
  • Secure the router console and remote access lines.
  • Prevent system status messages from interrupting console output.
  • Configure a message-of-the-day banner.
  • Encrypt all clear text passwords.
Step 3: Configure the Router Interfaces.
Configure the interfaces of all routers for full connectivity with the following:
  • IP addressing
  • Descriptions for serial interfaces.
  • Configure DCE settings where required. Use a rate of 128000.
  • The Ethernet subinterfaces on Site 2 will configured later in this assessment.
Step 4: Configure inter-VLAN routing on Site 2.
Configure router Site 2 to route between VLANs using information in the Addressing Table and VLAN Switch Port Assignment Table. The VLANs will be configured on the switches later in this assessment.
  • Do not route the VLAN 99 network.
Step 5: Configure Default Routing.
On HQ, configure a default route to the Internet. Use the exit interface argument. 
Step 6: Configure OSPF Routing.
a. On all routers:
  • Configure multiarea OSPFv2 to route between all internal networks. Use a process ID of 1.
  • Use the area numbers shown in the topology.
  • Use the correct wild card masks for all network statements.
  • You are not required to route the SVI-NET VLAN network on Site 2.
  • Prevent routing updates from being sent to the LANs.
b. On the HQ router:
  • Configure multiarea OSPFv2 to distribute the default route to the other routers.
Step 7: Customize Multiarea OSPFv2.
Customize multiarea OSPFv2 by performing the following configuration tasks:
a. Set the bandwidth of all serial interfaces to 128 kb/s.
b. Configure OSPF router IDs as follows:
  • Site 1: 1.1.1.1
  • HQ: 2.2.2.2
  • Site 2: 3.3.3.3
  • The configured router IDs should be in effect on all three routes.
c. Configure the OSPF cost of the link between Site 1 and HQ to 7500.
Step 8: Configure OSPF MD5 Authentication on the Required Interfaces.
Configure OSPF to authenticate routing updates with MD5 authentication on the OSPF interfaces.
  • Use a key value of 1.
  • Use xyz_OSPF as the password.
  • Apply MD5 authentication to the required interfaces.
Step 9: Configure Access Control Lists.
You will configure two access control lists in this step. You should use the any and host keywords in the ACL statements as required. The ACL specifications are as follows:
a. Restrict access to the vty lines on HQ with an ACL:
  • Create a named standard ACL using the name TELNET-BLOCK. Be sure that you enter this name exactly as it appears in this instruction.
  • Allow only Admin Host to access the vty lines of HQ.
  • No other Internet hosts (including hosts not visible in the topology) should be able to access the vty lines of HQ.
  • Your solution should consist of one ACL statement.
  • Your ACL should be placed in the most efficient location as possible to conserve network bandwidth and device processing resources.
b. Block ping requests from the Internet with an ACL:
  • Use access list number 101.
  • Allow only Admin Host to ping addresses within the Company A network. Only echo messages should be permitted.
  • Prevent all other Internet hosts (not only the Internet hosts visible in the topology) from pinging addresses inside the Company A network. Block echo messages only.
  • All other traffic should be allowed.
  • Your ACL should consist of three statements.
  • Your ACL should be placed in the most efficient location as possible to conserve network bandwidth and device processing resources.
c. Control access to the management interfaces (SVI) of the three switches attached to Site 2 as follows:
  • Create a standard ACL.
  • Use the number 1 for the list.
  • Permit only addresses from the admin VLAN network to access any address on the SVI-NET VLAN network.
  • Hosts on the  admin VLAN network should be able to reach all other destinations.
  • Your list should consist of one statement.
  • Your ACL should be placed in the most efficient location as possible to conserve network bandwidth and device processing resources.
  • You will be able to test this ACL at the end of Part II  of this assessment.
Part II: Switching and DHCP Configuration
Step 1: Create and name VLANs.
On all three switches that are attached to Site 2, create and name the VLANs shown in the VLAN Table.
  • The VLAN names that you configure must match the values in the table exactly.
  • Each switch should be configured with all of the VLANs shown in the table.
Step 2:  Assign switch ports to VLANs.
Using the VLAN table, assign switch ports to the VLANs you created in Step 1, as follows:
  • All switch ports that you assign to VLANsn should be configured to static access mode.
  • All switch ports that you assign to VLANs should be activated.
  • Note that all of the unused ports on SW-A should be assigned to VLAN 99. This configuration step on switches SW-B and SW-C is not required in this assessment for the sake of time.
  • Secure the unused switch ports on SW-A by shutting them down.
Step 3:  Configure the SVIs.
Refer to the Addressing Table. Create and address the SVIs on all three of the switches that are attached to Site 2. Configure the switches so that they can communicate with hosts on other networks. Full connectivity will be established after routing between VLANs has been configured later in this assessment.
Step 4:  Configure Trunking and EtherChannel.
a. Use the information in the Port-Channel Groups table to configure EtherChannel as follows:
  • Use LACP.
  • The switch ports on both sides of Channels 1 and 2 should initiate negotiations for channel establishment.
  • The switch ports on the SW-B side of Channel 3 should initiate negotiations with the switch ports on SW-C.
  • The switch ports on the SW-C side of Channel 3 should not initiate negotiations with the switch ports on the other side of the channel.
  • All channels should be ready to forward data after they have been configured.
b. Configure all port-channel interfaces as trunks.
c. Configure static trunking on the switch port on SW-B that is connected to Site 2.
Step 5:  Configure Rapid PVST+.
Configure Rapid PVST+ as follows:
a. Activate Rapid PVST+ and set root priorities.
  • All three switches should be configured to run Rapid PVST+.
  • SW-A should be configured as root primary for VLAN 2 and VLAN 4 using the default primary priority values.
  • SW-A should be configured as root secondary for VLAN 8 and VLAN 15 using the default secondary priority values.
  • SW-C should be configured as root primary for VLAN 8 and VLAN 15 using the default primary priority values.
  • SW-C should be configured as root secondary for VLAN 2 and VLAN 4 using the default secondary priority values.
b. Activate PortFast and BPDU Guard on the active SW-C switch access ports.
  • On SW-C, configure PortFast on the access ports that are connected to hosts.
  • On SW-C, activate BPDU Guard on the access ports that are connected to hosts.
Step 6:  Configure switch security.
You are required to complete the following only on some of the devices in the network for this assessment. In reality, security should be configured on all devices in the network.
a. Configure port security on all active access ports that have hosts connected on SW-A.
  • Each active access port should accept only two MAC addresses before a security action occurs.
  • The learned MAC addresses should be recorded in the running configuration.
  • If a security violation occurs, the switch ports should provide notification that a violation has occurred but not place the interface in an err-disabled state.
b. On SW-B, configure the virtual terminal lines to accept only SSH connections.
  • Use a domain name of ccnaPTSA.com.
  • Use SW-B as the host name.
  • Use a modulus value of 1024.
  • Configure SSH version 2.
  • Configure the vty lines to only accept SSH connections.
  • Configure user-based authentication for the SSH connections with a user name ofnetadmin and a secret password of SSH_secret9. The user name and password must match the values provided here exactly.
c. Ensure that all unused switch ports on SW-A have been secured as follows:
  • They should be assigned to VLAN 99.
  • They should all be in access mode.
  • They should be shutdown.
Step 7: Configure Site 2 as a DHCP server for the hosts attached to the SW-A and SW-C switches.
Configure three DHCP pools as follows:
  • Refer to the information in the Addressing Table.
  • Create a DHCP pool for hosts on VLAN 2 using the pool name vlan2pool.
  • Create a DHCP pool for hosts on VLAN 4 using the pool name vlan4pool.
  • Create a DHCP pool for hosts on VLAN 8 using the pool name vlan8pool.
  • All VLAN pool names must match the provided values exactly.
  • Exclude the first five addresses from each pool.
  • Configure a DNS server address of 192.168.200.225.
  • All hosts should be able to communication with hosts on other networks.
Step 8: Configure host addressing.
Hosts should be able to ping each other and external hosts after they have been correctly addressed, where permitted.
  • Hosts on VLANs 2, 4, and 8 should be configured to receive addresses dynamically over DHCP.
  • Hosts on VLAN 15 should be addressed statically as indicated in the Addressing Table. Once configured, the hosts should be able to ping hosts on other networks.
  • Hosts on the LANs attached to Site 1 should be statically assigned addresses that enable them to communicate with hosts on other networks, as indicated in the Addressing Table.
Configuration
#####–SITE 1
hostname East
no ip domain-lookup
enable secret cisco
line console 0
logging synchronous
password cisco
login
line aux 0
password cisco
login
line vty 0 15
password cisco
login
service password-encryption
banner motd @Authorized acces only!@
interface serial 0/0/0
bandwidth 128
clock rate 12800
ip address 192.168.100.22 255.255.255.252
description 2-Central
ip ospf cost 7500
ip ospf message-digest-key 1 md5 xyz_OSPF
ip ospf authentication message-digest
no shutdown
exit
interface gi 0/0
ip address 192.168.8.1 255.255.255.0
description Manage-1A
no shutdown
interface gi 0/1
ip address 192.168.9.1 255.255.255.0
description Clerk-1C
no shutdown
exit
— OSPF
router ospf 1
router-id 1.1.1.1
area 0 authentication message-digest
network 192.168.100.20 0.0.0.3 area 0
network 192.168.8.0 0.0.0.255 area 1
network 192.168.9.0 0.0.0.255 area 1
passive-interface GigabitEthernet0/0
passive-interface GigabitEthernet0/1
no auto-summary
exit
####################
########–HQ
hostname Central
no ip domain-lookup
enable secret cisco
line console 0
logging synchronous
password cisco
login
line aux 0
password cisco
login
line vty 0 15
password cisco
login
service password-encryption
banner motd @Authorized acces only @
ip route 0.0.0.0 0.0.0.0 s0/1/0
interface serial 0/0/0
bandwidth 128
ip address 192.168.100.21 255.255.255.252
description 2-East
ip ospf cost 7500
ip ospf message-digest-key 1 md5 xyz_OSPF
ip ospf authentication message-digest
no shutdown
exit
interface serial 0/0/1
bandwidth 128
ip address 192.168.100.37 255.255.255.252
description 2-West
clock rate 128000
ip ospf message-digest-key 1 md5 xyz_OSPF
ip ospf authentication message-digest
no shutdown
exit
interface serial 0/1/0
bandwidth 128
ip address 203.0.113.18 255.255.255.248
description 2-INTERNET
no shutdown
exit
— OSPF
router ospf 1
router-id 2.2.2.2
area 0 authentication message-digest
default-information originate
network 192.168.100.20 0.0.0.3 area 0
network 192.168.100.36 0.0.0.3 area 0
passive-interface Serial0/1/0
no auto-summary
exit
–ACCESS LIST
ip access-list standard TELNET-BLOCK
permit host 198.51.100.5
line vty 0 15
access-class TELNET-BLOCK in
interface serial 0/1/0
ip access-group 101 in
exit
#######################
###### –SITE 2
hostname West
no ip domain-lookup
enable secret cisco
line console 0
logging synchronous
password cisco
login
line vty 0 15
password cisco
login
service password-encryption
banner motd @Authorized acces only.@
interface serial 0/0/1
bandwidth 128
ip address 192.168.100.38 255.255.255.252
description 2-Central
ip ospf message-digest-key 1 md5 xyz_OSPF
ip ospf authentication message-digest
no shutdown
interface gi 0/1
no shutdown
interface gi 0/1.2
encapsulation dot1q 2
ip address 10.10.2.1 255.255.255.0
interface gi 0/1.4
encapsulation dot1q 4
ip address 10.10.4.1 255.255.255.0
interface gi 0/1.8
encapsulation dot1q 8
ip address 10.10.8.1 255.255.255.0
interface gi 0/1.15
encapsulation dot1q 15
ip address 10.10.15.1 255.255.255.0
interface gi 0/1.25
encapsulation dot1q 25
ip address 10.10.25.1 255.255.255.0
exit
— OSPF
router ospf 1
router-id 3.3.3.3
passive-interface GigabitEthernet0/1
network 192.168.100.36 0.0.0.3 area 0
network 10.10.2.0 0.0.0.255 area 2
network 10.10.4.0 0.0.0.255 area 2
network 10.10.8.0 0.0.0.255 area 2
network 10.10.15.0 0.0.0.255 area 2
no auto-summary
passive-interface g0/1.2
passive-interface g0/1.4
passive-interface g0/1.8
passive-interface g0/1.15
exit
– ROUTE SUMMARIZATION
interface serial 0/0/1
ip summary-address eigrp 100 10.10.0.0 255.255.240.0
– DHCP
ip dhcp excluded-address 10.10.2.1 10.10.2.5
ip dhcp excluded-address 10.10.4.1 10.10.4.5
ip dhcp excluded-address 10.10.8.1 10.10.8.5
ip dhcp pool vlan2pool
network 10.10.2.0 255.255.255.0
default-router 10.10.2.1
dns-server 192.168.200.225
ip dhcp pool vlan4pool
network 10.10.4.0 255.255.255.0
default-router 10.10.4.1
dns-server 192.168.200.225
ip dhcp pool vlan8pool
network 10.10.8.0 255.255.255.0
default-router 10.10.8.1
dns-server 192.168.200.225
exit
–ACCESS LIST
access-list 1 permit 10.10.15.0 0.0.0.255
interface gi0/1.25
ip access-group 1 out
#######–SW-A
hostname Bldg1
no ip domain-lookup
enable secret cisco
line console 0
logging synchronous
password cisco
login
line vty 0 15
password cisco
login
service password-encryption
banner motd @Authorized acces only!@
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
ip address 10.10.25.254 255.255.255.0
no shutdown
interface fa0/5
switchport mode acces
switchport acces vlan 2
interface fa0/10
switchport mode acces
switchport acces vlan 4
interface fa0/15
switchport mode acces
switchport acces vlan 8
interface fa0/24
switchport mode acces
switchport acces vlan 15
interface range fa0/6-9,fa0/11-14,fa0/16-23
switchport mode acces
switchport acces vlan 99
shutdown
interface range gi1/1-2
switchport mode acces
switchport acces vlan 99
shutdown
– ETHERCHANNEL
interface range fa0/1-2
channel-group 1 mode active
interface port-channel 1
switchport mode trunk
interface range fa0/3-4
channel-group 2 mode active
interface port-channel 2
switchport mode trunk
exit
–PVST+
spanning-tree mode rapid-pvst
spanning-tree vlan 2 root primary
spanning-tree vlan 4 root primary
spanning-tree vlan 8 root secondary
spanning-tree vlan 15 root secondary
–SECURITY
interface fa0/5
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/10
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/15
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
interface fa0/24
switchport port-security
switchport port-security violation restrict
switchport port-security maximum 2
switchport port-security mac-address sticky
#######–SW-B
hostname Bldg2
no ip domain-lookup
enable secret cisco
line console 0
logging synchronous
password cisco
login
line vty 0 15
password cisco
login
service password-encryption
banner motd @Authorized acces only!@
– SSH
ip ssh version 2
ip domain-name ccnaPTSA.com
crypto key generate rsa
username netadmin password SSH_secret9
line vty 0 4
login local
transport input ssh
line vty 5 15
login local
transport input ssh
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
ip address 10.10.25.253 255.255.255.0
no shutdown
interface gi 1/1
switchport mode trunk
– ETHERCHANNEL
interface range fa0/3-4
channel-group 2 mode active
interface port-channel 2
switchport mode trunk
interface range fa0/5-6
channel-group 3 mode active
interface port-channel 3
switchport mode trunk
–PVST+
spanning-tree mode rapid-pvst
#########– SW-C
hostname Bldg3
no ip domain-lookup
enable secret cisco
line console 0
logging synchronous
password cisco
login
line vty 0 15
password cisco
login
service password-encryption
banner motd @Authorized acces only !@
ip default-gateway 10.10.25.1
vlan 2
name sales
vlan 4
name prod
vlan 8
name acct
vlan 15
name admin
vlan 25
name SVI-NET
vlan 99
name null
interface vlan 25
ip address 10.10.25.252 255.255.255.0
no shutdown
interface fa0/7
switchport mode acces
switchport acces vlan 2
interface fa0/10
switchport mode acces
switchport acces vlan 4
interface fa0/15
switchport mode acces
switchport acces vlan 8
interface fa0/24
switchport mode acces
switchport acces vlan 15
– ETHERCHANNEL
interface range fa0/1-2
channel-group 1 mode active
no shutdown
interface port-channel 1
switchport mode trunk
interface range fa0/5-6
channel-group 3 mode passive
no shutdown
interface port-channel 3
switchport mode trunk
–PVST+
spanning-tree mode rapid-pvst
spanning-tree vlan 2 root secondary
spanning-tree vlan 4 root secondary
spanning-tree vlan 8 root primary
spanning-tree vlan 15 root primary
–Port Fast BPDU Guard
interface range fa0/7, fa0/10, fa0/15, fa0/24
spanning-tree portfast
spanning-tree bpduguard enable
no shutdown
Read more ...

Advertisment