Ccna 4 instructor lab manual download




















R1 R1 show run! You will also learn how to configure a router as a Frame Relay switch. There are both Cisco standards and Open standards that apply to Frame Relay.

You will learn both. Pay special attention in the lab section in which you intentionally break the Frame Relay configurations. This will help you in the Troubleshooting lab associated with this chapter. You can use any current router in your lab as long as it has the required interfaces shown in the topology. Be sure to change your cabling to reflect the topology diagram. Note: If you use , , or routers, the router output and interface descriptions appear differently.

The serial interfaces should remain shutdown until the Frame Relay! Task 3: Configure Frame Relay You will now set up a basic point-to-point Frame Relay connection between routers 1 and 2. What does DLCI stand for? What is a PVC and how is it used? There can be multiple PVCs per physical interface, allowing multiple point-to- point connections or point-to-multipoint connections. This command enables Frame Relay switching globally on the router, allowing it to forward frames based on the incoming DLCI rather than on an IP address basis: FR-Switch config frame-relay switching Change the interface encapsulation type to Frame Relay.

FR-Switch config-if frame-relay intf-type dce Note: Frame Relay interface types do not need to match the underlying physical interface type. You can verify the configuration using the show frame-relay pvc command.

The PVC you have created does not have any endpoints configured. Issue the show frame-relay route command. This is the Layer 2 route that Frame Relay traffic takes through the network. Do not confuse this with Layer 3 IP routing.

Although Inverse ARP is useful, it is not always reliable. A frame switch drops any traffic it receives that has no DLCI in the header, because it has no way of determining how to route the data. The broadcast keyword in the following command sends any multicast or broadcast traffic destined for this link over the DLCI. Most routing protocols require the broadcast keyword to properly function over Frame Relay.

You can use the broadcast keyword on multiple DLCIs on the same interface. The traffic is replicated to all PVCs. R1 config-if frame-relay map ip R1 config-if no shutdown Why is the no shutdown command used after the no frame-relay inverse-arp command?

By turning off Frame Relay Inverse ARP before issuing the no shutdown command, you ensure that only the statically mapped connections that you want are part of the Frame Relay maps.

Step 3: Configure R2 for Frame Relay. It may take several seconds after bringing up the interfaces for the PVC to become active. Step 1: Ping R1 and R2. Ensure that you can ping router R2 from router R1. R1 ping The show frame-relay pvc command displays information on all PVCs configured on the router. The output also includes the associated DLCI. The show frame-relay map command displays information on the static and dynamic mappings of Layer 3 addresses to DLCIs. Because Inverse ARP has been turned off, there are only static maps.

What are the three different types of LMI? The output gives detailed information on all LMI data. Keepalives are sent every 10 seconds, so you may have to wait until you see any output. The debug output shows two LMI packets: the first outgoing, the second incoming. All possible debugging has been turned off Notice that the output shows an outgoing LMI packet with a sequence number of A variety of tools are available for troubleshooting Frame Relay connectivity issues.

To learn about troubleshooting, you will break the Frame Relay connection established earlier and then re- establish it.

Step 1: Remove the frame map from R1. R1 configure terminal Enter configuration commands, one per line. You will get no response. R2 ping The following debug message appears on R1: R2 ping Why does the ping fail? Issuing the show frame-relay map command returns a blank line.

R1 show frame-relay map R1 Turn off all debugging with the undebug all command, and re-apply the frame-relay map ip command but without using the broadcast keyword. All possible debugging has been turned off R1 configure terminal Enter configuration commands, one per line. Replace the Frame Relay map statement and include the broadcast keyword this time.

Verify that the full routing table is restored and that you have full end-to-end connectivity. R2 config-if encapsulation frame-relay ietf Notice that the interface does not go down. You might be surprised by this. If your network is composed entirely of Cisco routers, then it does not make any difference whether you use the default Cisco Frame Relay encapsulation or the IETF standard.

Cisco routers understand both types of incoming frames. The command encapsulation frame-relay ietf forces the Cisco router to encapsulate its outgoing frames using the IETF standard. This standard can be correctly understood by the router of another vendor. Although FR Switch and R2 are using different encapsulation types, they are still passing traffic.

Change the encapsulation type back to the default: R2 config-if encapsulation frame-relay Step 3: Change the LMI type. R2 configure terminal Enter configuration commands, one per line. When 60 seconds have passed, the interface changes its state to Up Down, because R2 and FR Switch are no longer exchanging keepalives or any other link-state information. Issue the debug frame-relay lmi command.

Notice that LMI packets are no longer showing up in pairs. While all outgoing LMI messages are logged, no incoming messages are shown. Task 5: Configure a Frame Relay Sub-interface Frame Relay supports two types of sub-interfaces: point-to-point and point-to-multipoint. Point-to- multipoint sub-interfaces support non-broadcast multi-access topologies.

For example, a hub and spoke topology would use a point-to-multipoint sub-interface. In this lab, you will create a point-to- point sub-interface. Create subinterface as a point-to-point interface. Frame Relay encapsulation must be specified on the physical interface before subinterfaces can be created. You should be able to ping across the new PVC.

If you need assistance, refer to the Basic Frame Relay lab. However, try to do as much on your own as possible. Do not activate the serial interfaces. Step 4: Test connectivity between the PCs and their local routers. Use the DLCIs in the topology diagram.

Do not automatically discover IP addresses on the far end of links. Activate the link after full configuration. Enable broadcast traffic on the DLCIs. Step 2: Restore full connectivity to your network. Step 3: Verify full connectivity to your network. Ping from PC to PC. Step 2: Restore the PVC. Step 3: Verify full end-to-end connectivity.

Task 9: Document the Router Configurations On each router, issue the show run command and capture the configurations.

Task Clean Up Erase the configurations and reload the routers. Scenario In this lab, you will practice troubleshooting a misconfigured Frame Relay environment.

Load or have your instructor load the configurations below into your routers. Locate and repair all errors in the configurations and establish end-to-end connectivity. Your final configuration should match the topology diagram and addressing table. All passwords are set to cisco except the enable secret password which is set to class. Step 3: Import the configurations.

Router 1! The DLCI is mistyped and needs to be corrected for connectivity. A Frame Relay map for the interface IP address is often overlooked,! The broadcast keyword was forgotten. Without the broadcast keyword,! This prevents! EIGRP from forming adjacencies. This command must be removed for the link to work. It is common to forget that interfaces on a router! Without a route statement, the Frame Relay switch does not know how!

Task 3: Document the Router Configurations On each router, issue the show run command and capture the configurations. Task 4: Clean Up Erase the configurations and reload the routers.

You will also learn how to manage Cisco IOS software. Instructor Notes This basic security lab allows students to practice the core skills presented in this chapter. While many instructors will prefer to allow students to complete this lab in whole, some instructors may wish to divide the lab to accommodate shorter lab periods. For this reason, guidelines are provided here to direct you on how to best divide this lab.

Answer configs are provided after Task 7 in this document. Answer configs for the complete lab are provided at the end of this document. If additional granularity is needed, students can complete Task 6 independently of the other tasks in this lab. Note: This lab was developed and tested using routers. If you use , , or series routers, the router outputs and interface descriptions might be different. Step 2: Configure Ethernet interfaces. Use a local database on R1 to configure secure passwords.

Use ciscoccna for all passwords in this lab. If somehow hackers are able to penetrate this first layer of defense, using an enable secret password prevents them from being able to alter the configuration of the device. This provides an additional layer of security. The username command creates a username and password that is stored locally on the router. The default privilege level of the user is 0 the least amount of access.

You can change the level of access for a user by adding the keyword privilege before the password keyword. R1 config username ccna password ciscoccna The aaa command enables AAA authentication, authorization, and accounting globally on the router.

This is used when connecting to the router. R1 config aaa new-model You can create an authentication list that is accessed when someone attempts to log in to the device after applying it to vty and console lines. The local keyword indicates that the user database is stored locally on the router. This is less secure. To apply simple encryption to the passwords, enter the following command in global config mode: R1 config service password-encryption Verify this with the show run command.

R1 show run service password-encryption! Step 2: Secure the console and VTY lines. You can cause the router to log out a line that has been idle for a specified time. If a network engineer was logged into a networking device and was suddenly called away, this command automatically logs the user out after the specified time. The following commands cause the line to log out after 5 minutes. The router blocks login attempts for 5 minutes if someone fails five attempts within 2 minutes.

This is set especially low for the purpose of this lab. An additional measure is to log each time this happens. R1 config login block-for attempt 2 within R1 config security authentication failure rate 5 log To verify this, attempt to connect to R1 from R2 via Telnet with an incorrect username and password.

On R2: R2 telnet Is this the most desirable setup? This is not secure because it gives information about the network structure. The first step in hacking a network is network reconnaissance in which you try to map out the existing network before deciding how to attack it.

The passive-interface command prevents routers from sending routing updates to all interfaces except those interfaces configured to participate in routing updates. This command is issued as part of the RIP configuration. The first command puts all interfaces into passive mode the interface only receives RIP updates. The second command returns specific interfaces from passive to active mode both sending and receiving RIP updates.

The next is to have RIP updates password protected. To do this, you must first configure a key to use. These will be the same interfaces that were enabled using the no passive-interface command earlier.

You can view this on R1 using the show ip route command and confirming that no routes from R2 appear in the routing table. Remember that each active interface must be configured. After all three routers have been configured to use routing authentication, the routing tables should repopulate with all RIP routes. R1 should now have all the routes via RIP. Confirm this with the show ip route command.

SNMP logging can be useful in monitoring network activity. The captured information can be sent to a syslog server on the network, where it can be analyzed and archived. You should be careful when configuring logging syslog on the router. When choosing the designated log host, remember that the log host should be connected to a trusted or protected network or an isolated and dedicated router interface.

In this lab, you will configure PC1 as the syslog server for R1. In this example, the IP address of PC1 is used. R1 config logging In the next step, you will define the level of severity for messages to be sent to the syslog server. The level of SNMP messages can be adjusted to allow the administrator to determine what kinds of messages are sent to the syslog device.

Routers support different levels of logging. The eight levels range from 0 emergencies , indicating that the system is unstable, to 7 debugging , which sends messages that include router information. To configure the severity levels, you use the keyword associated with the level, as shown in the table. Severity Level Keyword Description 0 emergencies System unusable 1 alerts Immediate action required 2 critical Critical conditions 3 errors Error conditions 4 warnings Warning conditions 5 notifications Normal but significant condition 6 informational Informational messages 7 debugging Debugging messages The logging trap command sets the severity level.

The severity level includes the level specified and anything below it severity-wise. Set R1 to level 4 to capture messages with severity level 4, 5, 6, and 7. R1 config logging trap warnings What is the danger of setting the level of severity too high or too low? Important messages are harder to find among less useful messages. Also it can cause network congestion.

The danger in setting the level too low is that not enough information is provided when attempting to identify a problem. Note: If you installed syslog software on PC1, generate and look at syslog software for messages.

Why should you disable unused interfaces on network devices? Disabling these interfaces prevents them from being used for man-in-the- middle attacks or DHCP spoofing. All other interfaces on R1 should be administratively shut down using the shutdown interface configuration command.

Interfaces manually shut down are listed as administratively down. Many services are not needed in most modern networks. Leaving unused services enabled leaves ports open that can be used to compromise a network. Disable each of these services on R1. These commands are entered at the interface level and should be applied to every interface on R1. R1 config-if no ip redirects R1 config-if no ip proxy-arp R1 config-if no ip unreachables R1 config-if no ip directed-broadcast R1 config-if no ip mask-reply R1 config-if no mop enabled What kind of attack does disabling IP redirects, IP unreachables, and IP directed broadcasts mitigate?

Disabling these services reduces the information received by such attempts. Step 4: Use AutoSecure to secure a Cisco router.

By using a single command in CLI mode, the AutoSecure feature allows you to disable common IP services that can be exploited for network attacks and enable IP services and features that can aid in the defense of a network when under attack. AutoSecure simplifies the security configuration of a router and hardens the router configuration. Using the AutoSecure feature, you can apply the same security features that you just applied except for securing RIP to a router much faster.

Because you have already secured R1, use the auto secure command on R3. All configuration changes will be shown. For a detailed explanation of how the configuration changes enhance security and any possible side effects, please refer to Cisco. At any prompt you may enter '? Use ctrl-c to abort this session at any prompt. Gathering information about the router for AutoSecure Is this router connected to internet? Yes Enter domain-name: cisco. Enabling CEF This might impact the memory requirements for your platform Enabling unicast rpf on all interfaces connected to internet Configure CBAC firewall feature: no Tcp intercept feature is used prevent tcp syn attack On the servers in the network.

However, there are advantages to doing it manually, as you will see in the troubleshooting lab. When you use AutoSecure, you may disable a service you need. Always use caution and think about the services that you require before using AutoSecure. Cisco IOS is the software that routers use to operate. Your router may have enough memory to store multiple Cisco IOS images.

It is important to know which files are stored on your router. Issue the show flash command to view the contents of the flash memory of your router. Caution: Be very careful when issuing commands that involve the flash memory.

Mistyping a command could result in the deletion of the Cisco IOS image. You can use the dir all command to show all files on the router. In this lab, however, we do not use actual Cisco IOS files because any mistakes made in entering the commands could lead to erasing the Cisco IOS image of the device. Why is it important to have an updated version of Cisco IOS software? Having an updated version ensures that the latest security fixes are included in the running Cisco IOS software.

One way to test this is to ping between these devices. This file can be a blank text file, because this step only serves to illustrate the steps involved. Each TFTP program differs in where files are stored. Consult your TFTP server help file to determine the root folder. From R1, retrieve the file and save it to the flash memory. R2 copy tftp flash Address or name of remote host []? Loading test from This can be useful if there is a device that needs an image and you have one that is already using that image.

Remember that Cisco IOS images are specific to router platforms and memory requirements. Use caution when transferring a Cisco IOS image from one router to another.

The command syntax is: tftp-server nvram: [filename1 [alias filename2] The command below configures R2 as a TFTP server. R2 supplies its startup config file to devices requesting it via TFTP we are using the startup config for the sake of simplicity and ease. The alias keyword allows devices to request the file using the alias test instead of the full filename. R2 config tftp-server nvram:startup-config alias test Now we can request the file from R2 using R1.

R1 copy tftp flash Address or name of remote host []? Be very careful when doing this! Accidentally erasing flash memory will mean that you have to re-install the entire IOS image for the router. If the router prompts you to erase flash, something is very wrong. You rarely want to erase the entire flash. Do NOT hit enter. Erase flash:? Delete flash:test? Delete flash:test-router? This is an example only. Do not complete this task.

Do NOT complete on your routers. Only read it. Loading cipbase-mz. If for some reason you can no longer access a device because you do not know, have lost, or have forgotten a password, you can still gain access by changing the configuration register. The configuration register tells the router which configuration to load on bootup.

In the configuration register, you can instruct the router to boot from a blank configuration that is not password protected.

The first step in changing the configuration register is to view the current setting using the show version command. These steps are performed on R3.

The Break key is different on different computers. Frequently, it is in the upper right hand corner of the keyboard. A break causes the device to enter a mode called ROMmon.

This mode does not require the device to have access to a Cisco IOS image file. R3 reload Proceed with reload? Reload Reason: Reload command. System Bootstrap, Version This configuration does not have a password configured, but supports Cisco IOS commands.

Change the value of the configuration register to 0x Step 4: Restore the router. Now we copy the startup configuration to the running configuration, restore the configuration, and then change the configuration register back to the default 0x To copy the startup configuration from NVRAM to running memory, type copy startup-config running-config.

If there is no IP address, troubleshoot the workstation and router configurations and repeat Step What are the IP addresses assigned to the hosts? Remote router configuration Router configure terminal Router config hostname remote remote config enable password cisco remote config enable secret class remote config line console 0 remote config-line password cisco remote config-line login remote config-line exit remote config line vty 0 4 remote config-line password cisco remote config-line login remote config-line exit remote config interface fastethernet 0 remote config-if ip address DHCP pool configurations Campus pool campus config ip dhcp pool campus campus dhcp-config network Lab 3.

Step 2 Configure the Paris interface as shown Configure the Paris router serial interface as follows: Paris config interface serial 0 Paris config-if ip address Serial 0 is up, line protocol is down. What type of problem is indicated in the last statement? Data link layer 2 related c. Internet address is Encapsulation HDLC Step 6 Enter the command show interface serial 0 refer to interface chart on Paris Paris show interface serial 0 This will show the details of interface serial 0.

Answer the following questions: a. Serial 0 is up, line protocol is down.. Encapsulation HDLC d. Layer 2 e. Why is the interface down? Remove the clock rate statement from the Paris router using the no version of the command and then add it to the London router configuration. Step 8 Enter the command show interface serial 0 on Paris Paris show interface serial 0 a.

Serial 0 is up, line protocol is up. What is the difference in the Line and Protocol status recorded on Paris earlier? Now both are UP due to the correct clock rate setting.

Step 9 Verify that the serial connection is functioning by pinging the serial interface of the other router London ping Can the serial interface on the Paris router be pinged from London? Yes b. Can the serial interface on the London router be pinged from Paris?

If the answer is no for either question, troubleshoot the router configurations to find the error. Then do the pings again until the answer to both questions is yes. London ping Paris Router configure terminal Router config hostname Paris Paris config enable password cisco Paris config enable secret class Paris config line vty 0 4 Paris config-line password cisco Paris config-line login Paris config-line line con 0 Paris config-line password cisco Paris config-line login Paris config-line interface serial 0 Paris config-if ip address Note: Refer to the erase and reload instructions sheet.

Step 2 Configure the Dublin interface as shown Configure the Dublin router serial interface as follows: Dublin config interface serial 0 Dublin config-if ip address This will show the details of interface serial 0. Serial 0 is up line protocol is up. Step 7 Change the encapsulation type Change the encapsulation type to PPP by typing encapsulation ppp at the interface serial 0 configuration mode prompt on both routers.

Can the serial interface on the Dublin router be pinged from Washington? Can the serial interface on the Washington router be pinged from Dublin?

Washington ping Washington Router configure terminal Router config hostname Washington Washington config enable password cisco Washington config enable secret class Washington config line vty 0 4 Washington config-line password cisco Washington config-line login Washington config-line line con 0 Washington config-line password cisco Washington config-line login Washington config-line exit Washington config interface serial 0 Washington config-if ip address Step 2 Configure the Tokyo interface as shown Configure the Tokyo router serial interface as follows: Tokyo config interface serial 0 Tokyo config-if ip address Step 7 Verify that the serial connection is functioning by pinging the serial interface of the other router Madrid ping Then do the pings again until both pings are successful.

The passwords must be the same on both routers. The username must reflect the other routers hostname exactly. The password and user names are case sensitive: Madrid config username Tokyo password cisco Madrid config interface serial 0 Madrid config-if ppp authentication chap Step 9 Verify that the serial connection is functioning a.

Verify that the serial connection is functioning by pinging the serial interface of the other router: Madrid ping The password and user names are case sensitive: Tokyo config username Madrid password cisco Tokyo config interface serial 0 Tokyo config-if ppp authentication chap Step 11 Verify that the serial connection is functioning a. Verify that the serial connection is functioning by pinging the serial interface of the other router: Tokyo ping Username was setup on Tokyo. Tokyo ping Tokyo Router configure terminal Router config hostname Tokyo Tokyo config enable password cisco Tokyo config enable secret class Tokyo config line vty 0 4 Tokyo config-line password cisco Tokyo config-line login Tokyo config-line line con 0 Tokyo config-line password cisco Tokyo config-line login Tokyo config-line exit Tokyo config interface serial 0 Tokyo config-if ip address Step 2 Configure the Warsaw interface as shown Configure the Warsaw router serial interface as follows: Warsaw config interface serial 0 Warsaw config-if ip address Encapsulation HDLC Step 6 Enter the command show interface serial 0 refer to interface chart on Warsaw Warsaw show interface serial 0 This will show the details of interface serial 0.

Note: For the router, use the command debug ppp tasks. Step 8 Change the encapsulation type a. Change the encapsulation type to PPP by typing encapsulation ppp at the interface serial 0 configuration mode prompt on both routers.

Brasilia config-if encapsulation ppp Warsaw config-if encapsulation ppp b. What did the debug function report when the PPP encapsulation was applied to each router? Turn off the debug function by typing undebug all at the privileged EXEC mode prompt.

Ping the other router to verify that there is connectivity between the two routers. Brasilia ping Can the serial interface on the Warsaw router be pinged from Brasilia?

Can the serial interface on the Brasilia router be pinged from Warsaw? Brasilia Warsaw ping Brasilia Router configure terminal Router config hostname Brasilia Brasilia config enable password cisco Brasilia config enable secret class Brasilia config line vty 0 4 Brasilia config-line password cisco Brasilia config-line login Brasilia config-line line con 0 Brasilia config-line password cisco Brasilia config-line login Brasilia config-line interface serial 0 Brasilia config-if ip address The string in parenthesis is the legal abbreviation that can be used in IOS command to represent the interface.

List the following information discovered from issuing this command. Encapsulation d. Encapsulation HDLC e. Layer 2 f. If the Serial interface was configured, why did the show interface serial 0 output show that the interface is down?

Remove the clock rate statement from the Paris router using the no version of the command and then add it to the London routers configuration. London configure terminal London config interface serial 0 London config-if clock rate London config-if exit Step 8 Enter the command show cdp neighbors on London a. Is there any output from the command?

Should there be output? It may take 60 seconds or more before output occurs. Is there output? What is the output saying? Request Timeout d. Paris e. PPP Encapsulation is not set f.

What were the encapsulations listed for the interfaces? PPP Paris? HDLC g. Is there an issue with the above statement? Yes h. What is the issue? The router encapsulations do not match each other. Is there any output from the debug command? Convert the encapsulation to PPP on the Paris router. Does it confirm link establishment?

Encapsulation PPP c. Both are UP. Step 13 Verify that the serial connection is functioning by pinging the serial interface of the other router London ping From London, can the serial interface ping the Paris router? From Paris, can the serial interface ping the London router? Paris ping Paris Router configure terminal Paris config hostname Paris Paris config enable password cisco Paris config enable secret class Paris config line vty 0 4 Paris config-line password cisco Paris config-line login Paris config-line line con 0 Paris config-line password cisco Paris config-line login Paris config-line exit Paris config-line interface serial 0 Paris config-if ip address Lab 4.

If an ISDN router is not available, review the lab and perform as many noninterface commands as possible. It is configured, on the router, using the keyword basic-ni.

What is the Layer 1 status? Deactivated c. What is the ISDN switch type? To specify the ISDN switch type use the isdn switch-type command at the global configuration mode prompt.

The different switch types available may be reviewed using the isdn switch-type? Ottawa config isdn switch-type? How many different switch types are available? Ottawa show isdn status b. Ottawa configure terminal Ottawa config interface bri 0 Ottawa config-if no shutdown Step 6 Review switch status a. Ottawa show isdn status a. Active b. Has the Layer 2 status changed? To configure the SPIDs issue the following commands: Ottawa config interface bri 0 Ottawa config-if isdn spid1 Ottawa config-if isdn spid2 Step 8 Review switch status a.

What does the output specify about spid1? What does the output specify about spid2? The reason for this is that they were specified after the ISDN interface was enabled.

To send the SPID values the interface must be reset. Step 9 Resetting the interface a. This will cause all ISDN parameters to be renegotiated. Issue the clear command on the router and then check the ISDN interface status.

Save the configuration and reboot the router. The history table has a maximum of how many entries? History table has a maximum of entries. History table data is retained for how long? History table data is retained for a maximum of 15 Minutes. If ISDN routers are not available, review the lab to become familiar with the process.

Step 2 Define switch type and spid numbers The switch type and spid numbers need to be specified on the routers. Router config hostname Tokyo Tokyo config enable secret class Tokyo config isdn switch-type basic-ni Tokyo config interface fastethernet 0 Tokyo config-if ip address Step 3 Defining static routes for DDR a.

Use static and default routes instead of dynamic routing, in order to reduce the cost of the dialup connection. To configure a static route, the network address of the network to be reached must be known. The IP address of the next router on the path to this destination must be known as well. Moscow configure terminal Moscow config ip route Perform a show IP route to verify routes exist.

For the moment, declare that all IP traffic is interesting. This is done using the dialer-list command: Tokyo configure terminal Tokyo config dialer-list 1 protocol ip permit Tokyo config interface bri 0 Tokyo config-if dialer-group 1 Tokyo config-if end Step 5 Configuring DDR dialer information a. Configure the correct dialer information so that the dialer profile and dialer interface function correctly.

Configure the dial information: Tokyo configure terminal Tokyo config interface bri 0 Tokyo config-if dialer idle-timeout Tokyo config-if dialer map ip The dial information must specify the remote name of the remote router in the dialer profile. It must also specify the dial string, or phone number, to use to contact the remote device.

To configure the dial information on Tokyo, use the following: Tokyo config interface dialer 1 Tokyo config-if dialer remote-name Moscow Tokyo config-if dialer string Tokyo config-if dialer string c.

To configure the dial information on Moscow, use the following: Moscow config-if interface dialer 0 Moscow config-if dialer remote-name Tokyo Moscow config-if dialer string Moscow config-if dialer string Step 8 Associate dialer profiles a. To associate the dialer profiles with real dialer interfaces create a dialer pool putting the interfaces and the associated profiles in a common pool.

On Moscow, the commands syntax is the following: Moscow config-if interface bri 0 Moscow config-if dialer pool-member 1 Moscow config-if interface dialer 1 Moscow config-if dialer pool 1 Step 9 Configure dialer timeouts a. Configure a dialer idle-timeout of 60 seconds for each of the dialer interfaces: Tokyo config interface dialer 1 Tokyo config-if dialer idle-timeout 60 b.

Repeat these commands on Moscow. Step 10 View the Tokyo router configuration a. To view the configuration, use the show running-config command: Tokyo show running-config b. What authentication is being used?

CHAP c. What are the dialer strings on the Tokyo router? Current configuration : bytes! Now, generate some interesting traffic across the DDR link from both remote routers, Moscow and Tokyo, to verify that connections are made correctly and the dialer profiles are functioning: Tokyo ping Were the pings successful?

If not troubleshoot the router configuration. Use the show dialer command to show us the reason for the call. This information is shown for each channel. Tokyo show dialer e. Which dialer strings are associated with Dialer1? What is the last status for dial string in the Dialer0 readout? Use the show interface command and note that the output shows that the interface is spoofing. This provides a mechanism for the interface to simulate an active state for internal processes, such as routing, on the router.

Tokyo Router config hostname Tokyo Tokyo config enable secret class Tokyo config isdn switch-type basic-ni Tokyo config ip route 0. Step 2 Define switch type and spid numbers To configure the switch type and spid numbers use the following commands. Step 3 Defining static routes for DDR Use static and default routes instead of dynamic routing, in order to reduce the cost of the dialup connection.

TUTORIAL cisco ccna 4 wan technologies v31 instructor lab manual tutorial Get instant access for cisco ccna 4 wan technologies v31 instructor lab manual tutorial. Simply follow the link provided above and you can directly download cisco ccna 4 wan technologies v31 instructor lab manual tutorial and save it to your computer or else you can also read online through our library.

CHAPTER cisco ccna 4 wan technologies v31 instructor lab manual chapter Get instant access for cisco ccna 4 wan technologies v31 instructor lab manual chapter. Simply follow the link provided above and you can directly download cisco ccna 4 wan technologies v31 instructor lab manual chapter and save it to your computer or else you can also read online through our library.

EDITION cisco ccna 4 wan technologies v31 instructor lab manual edition Get instant access for cisco ccna 4 wan technologies v31 instructor lab manual edition. Simply follow the link provided above and you can directly download cisco ccna 4 wan technologies v31 instructor lab manual edition and save it to your computer or else you can also read online through our library.

Simply follow the link provided above and you can directly download cisco ccna 4 wan technologies v31 instructor lab manual instruction and save it to your computer or else you can also read online through our library.



0コメント

  • 1000 / 1000