ENetwork Basic Configuration PT Practice SBA

CCNA Exploration: 网络基础知识 (版本 4.0)

A few things to keep in mind while completing this activity:

1 Do not use the browser Back button or close or reload any exam windows during the exam.

2 Do not close Packet Tracer when you are done. It will close automatically.

3 Click the Submit Assessment button to submit your work.

Introduction

In this practice Packet Tracer Skills Exam, you will:

  • design and implement an addressing scheme to meet stated requirements

  • configure, verify, and troubleshoot connectivity between all devices in the network

Addressing Table





































Device

Interface

Address

Subnet Mask

Default Gateway

Router1

Fa0/0

172.16.1.1

255.255.255.224

n/a

Fa0/1

172.16.1.33

255.255.255.240

n/a

Switch1

VLAN1

172.16.1.2

255.255.255.224


PC1

NIC

172.16.1.30

225.255.255.224

172.16.1.1

PC2

NIC

172.16.1.36

255.255.255.240

172.16.1.33

NOTE: The initial network has some errors. To aid in configuring and verifying the devices, as well as in troubleshooting the existing errors, use a printed version of these instructions to fill in the missing address information in the table during Step 1.

Step 1: Determine the IP Addressing Scheme.

Design an addressing scheme and fill in the Addressing Table based on the following requirements:

a.     Subnet the address space 172.16.1.0/24 to provide 30 host addresses for LAN 1 while wasting the least amount of address space.

b.    Assign the first available subnet to LAN 1.

c.     Assign the lowest (first) host address in this subnet to the Fa0/0 interface on Router1.

d.    Assign the second address in this subnet to the VLAN 1 interface on Switch1.

e.     Assign the highest (last) host IP address in this subnet to PC1.

Switch>en
Switch#config t
Switch(config)#host Switch1
Switch1(config)#inter vlan 1
Switch1(config-if)#ip add 172.16.1.2 255.255.255.224
Switch1(config-if)#no shut

Switch1(config-if)#exit
Switch1(config)#ip default-gateway 172.16.1.1
Switch1(config)#enable secret class
Switch1(config)#line cons 0
Switch1(config-line)#password cisco
Switch1(config-line)#login
Switch1(config-line)#exit
Switch1(config)#line vty 0 2
Switch1(config-line)#password cisco
Switch1(config-line)#login
Switch1(config-line)#exit
Switch1(config)#banner motd #Authorized access only!#
Switch1(config)#^Z
Switch1#ping 172.16.1.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.1.1, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 3/24/31 ms

Switch1#ping 172.16.1.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 19/28/32 ms

Step 2: Configure Router1.

a.     Configure Router1 with these basic parameters:

·         Use Router1 as the router name.

·         Use class as the encrypted password for privileged EXEC mode.

·         Require password-protected logins for the console line.  Use cisco as the password.

·         Require password-protected logins for the vty lines.  Use cisco as the password.

·         Configure the banner message-of-the-day as Authorized access only!

b.    Configure the two Fast Ethernet interfaces.

·         Configure the router interfaces according to your completed addressing table.

·         Configure each interface with a description.

c.     Close the terminal window after completing the router configuration.

Router(config)#host Router1
Router1(config)#inter f0/0
Router1(config-if)#ip add 172.16.1.1 255.255.255.224 
Router1(config-if)#no shut

Router1(config-if)#inter f0/1
Router1(config-if)#ip add 172.16.1.33 255.255.255.240
Router1(config-if)#no shut

Router1(config-if)#exit
Router1(config)#enable secret class
Router1(config)#line cons 0
Router1(config-line)#password cisco
Router1(config-line)#login
Router1(config-line)#exit
Router1(config)#line vty 0
Router1(config-line)#password cisco
Router1(config-line)#login
Router1(config-line)#exit
Router1(config)#banner mot
Router1(config)#banner motd #Authorized access only!#
Router1(config)#inter f0/0
Router1(config-if)#description tongxiangPC1
Router1(config-if)#exit
Router1(config)#inter f 0/1
Router1(config-if)#description tongxiangPC2
Router1(config-if)#^Z

Step 3: Configure Switch1 and Verify Connectivity.

a.     Remove the console connection between PC1 and Router1.

b.    Connect PC1 to the Switch1 console port.

c.     Configure Switch1 with these basic parameters:

·         Use Switch1 for the switch name.

·         Use class as the encrypted password for privileged EXEC mode.

·         Require password-protected logins for the console line.  Use cisco as the password.

·         Require password-protected logins for the vty lines.  Use cisco as the password.

·         Configure the banner message-of-the-day as Authorized access only!

d.    Configure interface VLAN 1.

e.     Configure the default gateway.

f.     Test that Switch1 is able to ping the default gateway.

Step 4: Configure and Verify PC1 Addressing.

a.     Use the IP addressing you determined in Step 1 and configure PC1 with the correct addressing.

b.    Test that PC1 is able to ping the default gateway.

Step 5: Verify and Troubleshoot End-to-End Connectivity.

Verify that PC1 is able to ping PC2. If the ping fails, locate and correct any errors. For example, make sure PC2 is configured correctly with appropriate addressing for the subnet it belongs to.

Version 2.0
Created in Packet Tracer 5.3.2 and Marvel 1.0.1
All contents are Copyright ? 1992 - 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

ENetwork Basic Configuration PT Practice SBA

时间: 2024-10-18 07:40:09

ENetwork Basic Configuration PT Practice SBA的相关文章

3-redundancy protocol-HSRP Configuration on Cisco IOS

In this section we will do an HSRP configuration to understand the issue better. To do this we will use the below the topology [t'pld]. At the end ofthis article, you will find the GNS3 configuration lab of this lesson. Before the HSRP configuration,

Jmeter-Maven-Plugin高级应用:Proxy Configuration

Proxy Configuration Pages 12 Home Adding additional libraries to the classpath Advanced Configuration Basic Configuration Configuring the jvm that the jmeter process runs in FAQ Log Levels Modifying Properties Proxy Configuration Remote Server Config

Jmeter-Maven-Plugin高级应用:Remote Server Configuration

Remote Server Configuration Pages 12 Home Adding additional libraries to the classpath Advanced Configuration Basic Configuration Configuring the jvm that the jmeter process runs in FAQ Log Levels Modifying Properties Proxy Configuration Remote Serve

Python 5th Day

进一步理解装饰器 如果有如下逻辑: def connect_db(): print 'connect db' def close_db(): print 'close db' def query_user(): connect_db() print 'query the user' close_db() 如果我们把 query_user 的具体逻辑再封装为一个新函数,然后将新函数传入 query_data, 那么以后再需要不同的查询方法,就再封装新的函数就可以了. def query_user(

Chapter 4: Spring and AOP:Spring's AOP Framework

Spring's AOP Framework Let's begin by looking at Spring's own AOP framework — a proxy-based framework that works in pure Java. You can use it in any application server and all the required classes are included in the Spring distribution. Although man

Manual install on Windows 7 with Apache and MySQL

These are instructions for installing on Windows 7 desktop (they may also be useful for a server install with some thought to security) using individual components rather than a one click installer. This is intended only as a testing/evaluation insta

Cross-Domain Security For Data Vault

Cross-domain security for data vault is described. At least one database is accessible from a plurality of network domains, each network domain having a domain security level. The at least one database includes at least one partitioned data table tha

openStack CI(Continuous interaction)/CD(Continuous delivery) Gerrit/Jenkins安装及集成,插件配置

preFace: CI/CD practice part contains the following action items and fields of expertise: Gerrit installation and basic configuration? Jenkins installation and basic configuration? Jenkins and Gerrit interaction (Gerrit plugin setup for Jenkins)? Bri

Centos 7下IPV6 有状态DHCPV6配置

yum源安装kea yum install epel-release yum install kea DEMON ps aux| grep kea rpm -qa kea 查看dhcpv6默认配置 cat /etc/kea/kea.conf 启动kea-dhcpv6并查看kea启动过程 systemctl start kea-dhcp6 systemctl status kea-dhcp6 systemctl -l status kea-dhcp6 通过tcpdump查看服务器数据包交互过程 t