Uploaded by varehan

334431368-Ccnpv7-Tshoot-Skills-assessment-student

advertisement
CCNPv7 TSHOOT
Skills Assessment
Base Topology
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 13
CCNPv7 TSHOOT
Skills Assessment
Overlay Topology
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 13
CCNPv7 TSHOOT
Skills Assessment
Device Interfaces and Links Table
From Device
Interface
To Device
Interface
Layer 1 and 2 Features and Protocols Used
ALS1
F0/1
DLS1
F0/1
EtherChannel Po1, 802.1Q
ALS1
F0/2
DLS1
F0/2
EtherChannel Po1, 802.1Q
ALS1
F0/3
DLS2
F0/1
EtherChannel Po2, 802.1Q
ALS1
F0/4
DLS2
F0/2
EtherChannel Po2, 802.1Q
ALS1
F0/18
PC-B
NIC
100Base-T
ALS1
F0/18
R2
G0/0
100Base-T
DLS1
F0/3
DLS2
F0/3
EtherChannel Po10, 802.1Q
DLS1
F0/4
DLS2
F0/4
EtherChannel Po10, 802.1Q
DLS1
F0/5
R1
G0/1
100 Mb/s, DLS1 F0/5 is a routed L3 port (logical)
DLS1
F0/6
SRV1
NIC
100Base-T
DLS2
F0/5
R3
G0/1
100 Mb/s, DLS2 F0/5 is a routed L3 port (logical)
R1
S0/0/0.1
R2
S0/0/0.1
WAN link, Frame Relay
R1
S0/0/0.2
R2
S0/0/0.2
WAN link, Frame Relay
R2
S0/0/1.1
R3
S0/0/1.1
WAN link, Frame Relay
R2
S0/0/1.2
R3
S0/0/1.2
WAN link, Frame Relay
R3
G0/0
PC-C
NIC
100Base-T
VLAN Definition Table
VLAN #
Name
Description
VLAN Members
99
MANAGEMENT
Management VLAN
ALS1, DLS1, DLS2
100
SERVERS
Internal Servers
ALS1, DLS1, DLS2, SRV1
110
GUEST
Guest VLAN
ALS1, DLS1, DLS2
120
OFFICE
Office VLAN
ALS1, DLS1, DLS2, PC-B, R2
200
VOICE
Voice VLAN
ALS1, DLS1, DLS2
300
O-PEER
DLS1-DLS2 OSPF Peering
ALS1, DLS1, DLS2
666
NATIVE
IEEE 802.1Q Trunk VLAN
ALS1, DLS1, DLS2
999
PARKING_LOT
Unused Switch Ports
ALS1, DLS1, DLS2
Subnet Table
Description
IPv4 Subnet
IPv6 Prefix
Devices/Descriptions
10.1.99.0/24
2001:DB8:CAFE:99::/64
ALS1, DLS1, DLS2
VLANs
MANAGEMENT VLAN 99
SERVERS VLAN 100
10.1.100.0/24
2001:DB8:CAFE:100::/64
SRV1
GUEST VLAN 110
10.1.110.0/24
2001:DB8:CAFE:110::/64
N/A
OFFICE VLAN 120
10.1.120.0/24
2001:DB8:CAFE:120::/64
PC-B
VOICE VLAN 200
10.1.200.0/24
2001:DB8:CAFE:200::/64
ALS1, DLS1, DLS2
O-PEER VLAN 300
10.1.30.0/24
2001:DB8:CAFE:300::/64
ALS1, DLS1, DLS2
NATIVE VLAN 666
N/A
N/A
ALS1, DLS1, DLS2
PARKING_LOT VLAN 999
N/A
N/A
ALS1, DLS1, DLS2
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 13
CCNPv7 TSHOOT
Skills Assessment
Description
IPv4 Subnet
IPv6 Prefix
Devices/Descriptions
DLS1-R1
10.1.2.0/30
2001:DB8:CAFE:20::/64
DLS1 and R1 GE link
DLS2-R3
10.1.2.12/30
2001:DB8:CAFE:212::/64
DLS2 and R3 GE link
R2-R1 via S0/0/0.1
209.165.200.224/30
2001:DB8:FEED:10::/126
P2P back-to-back Frame Relay link
R2-R1 via S0/0/0.2
209.165.200.228/30
2001:DB8:CAFE:6::/126
P2P back-to-back Frame Relay link
R2-R3 via S0/0/1.1
209.165.200.220/30
2001:DB8:FEED:14::/126
P2P back-to-back Frame Relay link
R2-R3 via S0/0/1.2
10.1.90.2/31
2001:DB8:CAFE:90::/126
P2P back-to-back Frame Relay link
ALS1-R2
10.1.120.0/64
2001:DB8:CAFE:120::/64
Temporary ISP link
Uplinks and ISP Links
IP Address Table
Device Name
Interface
IPv4 Address/Prefix
IPv6 Address/Prefix
Additional Information
ALS1
VLAN 99
10.1.99.251/24
2001:DB8:CAFE:99::A1/64
SVI
ALS1
VLAN 110
10.1.110.251/24
2001:DB8:CAFE:110::A1/64
SVI
ALS1
VLAN 120
10.1.120.251/24
2001:DB8:CAFE:120::A1/64
SVI
ALS1
VLAN 200
10.1.200.251/24
2001:DB8:CAFE:200::A1/64
SVI
ALS1
VLAN 300
10.1.30.251/24
2001:DB8:CAFE:300::A1/64
SVI
DLS1
VLAN 99
10.1.99.252/24
2001:DB8:CAFE:99::D1/64
SVI
DLS1
VLAN 100
10.1.100.252/24
2001:DB8:CAFE:100::D1/64
SVI
DLS1
VLAN 110
10.1.110.252/24
2001:DB8:CAFE:110::D1/64
SVI
DLS1
VLAN 120
10.1.120.252/24
2001:DB8:CAFE:120::D1/64
SVI
DLS1
VLAN 200
10.1.200.252/24
2001:DB8:CAFE:200::D1/64
SVI
DLS1
VLAN 300
10.1.30.252/24
2001:DB8:CAFE:300::D1/64
SVI
DLS1
F0/5
10.1.2.1/30
2001:DB8:CAFE:20::D1/64
Routed Port to R1
DLS1
Loopback 0
10.1.211.1/32
2001:DB8:CAFE:2110::D1/128
Anchor
DLS1
Tunnel 0
N/A
FC00::D1/7
GRE to R2: R1 RIPngFree
DLS2
VLAN 99
10.1.99.253/24
2001:DB8:CAFE:99::D2/64
SVI
DLS2
VLAN 100
10.1.100.253/24
2001:DB8:CAFE:100::D2/64
SVI
DLS2
VLAN 110
10.1.110.253/24
2001:DB8:CAFE:110::D2/64
SVI
DLS2
VLAN 120
10.1.120.253/24
2001:DB8:CAFE:120::D2/64
SVI
DLS2
VLAN 200
10.1.200.253/24
2001:DB8:CAFE:200::D2/64
SVI
DLS2
VLAN 300
10.1.30.253/24
2001:DB8:CAFE:300::D2/64
SVI
DLS2
F0/5
10.1.2.13/30
2001:DB8:CAFE:212::D2/64
Routed Port to R3
R1
G0/1
10.1.2.2/30
2001:DB8:CAFE:20::1/64
R1
S0/0/0.1
209.165.200.225/30
2001:DB8:FEED:10::1/126
R1
S0/0/0.2
209.165.200.229/30
2001:DB8:CAFE:6::1/126
R1
Loopback 0
192.168.1.1/32
2001:DB8:CAFE:201::1/128
iBGP Peer
R1
Tunnel 0
N/A
ABCD::1/16
GRE to R3: LAN Failover
R2
G0/0
DHCPv4 in range
10.1.120.6-10.1.120.250
SLAAC in
2001:DB8:CAFE:120::/64
R2
S0/0/0.1
209.165.200.226
2001:DB8:FEED:10::2/126
R2
S0/0/0.2
209.165.200.230/126
2001:DB8:CAFE:6::2/126
R2
S0/0/1.1
209.165.200.222/30
2001:DB8:FEED:14::2/126
R2
S0/0/1.2
10.1.90.2/31
2001:DB8:CAFE:90::2/126
R2
Loopback 0
2.2.2.2/32
2001:DB8:FEED:222::2/128
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
VRF VPN_A
Page 4 of 13
CCNPv7 TSHOOT
Skills Assessment
R2
Loopback 1
2.2.2.2/32
2001:DB8:FEED:222::2/128
VRF VPN_B
R2
Loopback 2
20.20.20.20/32
2001:DB8:CAFE:2020::2/128
EIGRP & RIP
R2
Loopback 3
22.22.22.22/8
2001:DB8:EFAC::2/48
Internet (Global)
R2
Loopback 4
22.22.22.22/8
2001:DB8:EFAC::2/48
Internet (VPN_A Path)
R2
Loopback 5
22.22.22.22/8
2001:DB8:EFAC::2/48
Internet (VPN_B Path)
R2
Tunnel 0
N/A
FC00:2/7
GRE to DLS1: R1 RIPngFree
R3
G0/0
10.1.80.1/25
2001:DB8:CAFE:800::1/64
Collocated Office LAN
R3
G0/1
10.1.2.14/30
2001:DB8:CAFE:212::3/64
R3
S0/0/1.1
209.165.200.221/30
2001:DB8:FEED:14::3/126
R3
S0/0/1.2
10.1.90.3/31
2001:DB8:CAFE:90::3/126
R3
Loopback 0
192.168.3.1/32
2001:DB8:CAFE:203::1/128
iBGP Peer
R3
Loopback 1
10.1.80.129/25 from DHCP
Pool Simulatedv4LAN
2001:DB8:CAFE:801::1/64
Collocated Office Simulated
LAN
R3
Tunnel 0
N/A
ABCD::3/16
GRE to R1: LAN Failover
SRV1
NIC
10.1.100.1/24
2001:DB8:CAFE:100::1/64
Static addresses
PC-B
NIC
In range
10.1.120.6-10.1.120.250
In
2001:DB8:CAFE:120:ABCD::/80
Addresses via DHCPv4/6
server DLS1 or DLS2
PC-C
NIC
In range
10.1.80.4-10.1.80.126
In
2001:DB8:CAFE:800:ABCD::/80
Addresses via DHCP relay to
DHCPv4/6 server DLS2
Troubleshooting and Maintenance Tools Table
Configured Feature
Devices
Target Server
Target Tool or Application
System message logging
All
SRV1
Syslog server
Configuration archive
All
SRV1
TFTP server
SNMPv2c traps
All
SRV1
SNMP Monitor
NTPv4
All
R2
NTP server, stratum 3
NetFlow Top-Talkers
R1 G0/1 ingress flow,
R3 G0/1 ingress flow
Local
Local on the router
Security Features Table
Security Feature Configured
Implementation Method or Commands
Password security
Enable secret cisco; password encryption
Login authentication
AAA local database authentication; username/password is cisco/cisco
Secure remote management
Telnet disabled on all devices; SSH IPv6 access list on ALS1 vty ports 0-4
Trunk port security on switches
switchport mode trunk, switchport nonegotiate, unused NATIVE
VLAN 666, only prescribed VLANs allowed on trunk
Access port security on switches
switchport mode access, PortFast (spanning-tree portfast
default globally), port security on ALS1 (max ten sticky MAC addresses),
BPDU Guard (spanning-tree bpduguard enable on access ports)
Proxy ARP Disabled on SVIs
no ip proxy-arp
VLAN security
Unused ports placed in PARKING_LOT VLAN 999; only VLANs 99, 100, 110,
120, 200, 300 allowed on the trunks
VTPv3 security
vtp password cisco hidden on the switches
OSPFv2 MD5 authentication for DLS1
and DLS2 adjacency on VLAN 300
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 cisco
OSPFv3 SHA authentication for DLS1
and DLS2 adjacency on VLAN 300
ipv6 ospf authentication ipsec spi 500 sha1
1234567890123456789012345678901234567890
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 13
CCNPv7 TSHOOT
Skills Assessment
Objectives
Part 1: Build the physical network topology.
Part 2: Load the functioning base device config file from flash to the running config for each device and test
network connectivity.
Part 3: Copy the Skills Assessment error file from the TFTP server into flash for each device.
Part 4: Erase the startup config and copy the Skills Assessment error file from flash to the running config for
each device.
Part 5: Troubleshoot the errors introduced.
Exam Overview
This Skills Assessment is the final practical exam for the course CCNPv7 TSHOOT. The exam is divided into
five parts, which must be completed sequentially. In Part 1, you build the physical network. In Part 2, you load
functioning config files on all devices and verify access to the TFTP server. In Part 3, you copy the error files
from the TFTP server to flash for the respective devices and in Part 4 you erase the base configs and load the
error configs. You troubleshoot and resolve the errors in Part 5. This exam combines the process of course
setup with the actual troubleshooting process.
In addition to correcting configurations and restoring basic connectivity, network protocols such as SSH and
NTP must also be verified.
Note: Refer to the Base Topology and Overlay Topology diagrams and accompanying tables at the beginning
of this document when building the network or troubleshooting issues. All necessary data is provided to
methodically troubleshoot the network issues.
This lab uses Cisco ISR G2 routers running Cisco IOS 15.4(3) images with IP Base and Security packages
enabled, and Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15.0(2) IP Services and LAN Base
images, respectively. The 3560 and 2960 switches are configured with the SDM templates dual-ipv4-andipv6 routing and lanbase-routing, respectively. Depending on the router or switch model and Cisco IOS
Software version, the commands available and output produced might vary from what is shown in this lab.
Required Resources
•
3 routers (Cisco IOS Release 15.4 or comparable)
•
2 multilayer switches and 1 access layer switch (Cisco IOS Release 15.0(2) or comparable with Fast
Ethernet interfaces)
•
SRV1 (PC with static IP address): Windows 7 with RADIUS, TFTP, and syslog servers, plus an SSH
client, SNMP monitor, and WireShark software
•
PC-B (DHCP client): Windows 7 with SSH client and WireShark software
•
PC-C (DHCP client): Windows 7 with SSH client and WireShark software
•
Serial and Ethernet cables, as shown in the topology
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 13
CCNPv7 TSHOOT
Skills Assessment
Part 1: Build the Physical Network
Connect all devices as shown in the Base Topology and Overlay Topology. You must use the interfaces
specified in the Device Interfaces and Links table at the beginning of the Skills Assessment.
Part 2: Load the Skills Assessment Base Device Configuration Files from
Flash
Use the following procedure to copy the functional base Skills Assessment configuration (non-error) file from
flash to the running config for each device and test network connectivity.
Step 1: Verify the existence and location of the Skills Assessment base configuration files.
The base configuration files should be present in flash under the tshoot directory for a given device. Use the
show flash command to verify the presence of this directory. You can also verify the contents of the
directory using the cd and dir commands. If the directory and files are not present, contact your
administrator.
ALS1# show flash
Directory of flash:/
9
3
5
6
7
8
10
-rwx
drwx
-rwx
-rwx
-rwx
-rwx
-rwx
916
512
11792247
7192
106
1906
7199
Feb
Sep
Feb
Sep
Feb
Sep
Sep
28
22
28
26
28
26
26
1993
2014
1993
2014
1993
2014
2014
16:04:03
10:40:59
16:24:48
10:53:31
18:13:09
10:53:31
10:53:31
-08:00
-07:00
-08:00
-07:00
-08:00
-07:00
-07:00
vlan.dat
tshoot
c2960-lanbasek9-mz.150-2.SE6.bin
multiple-fs
info
private-config.text
config.text
27998208 bytes total (16070656 bytes free)
ALS1# cd tshoot
ALS1# dir
Directory of flash:/tshoot/
9 -rwx
<output omitted>
7979
Sep 22 2014 11:26:14 -07:00
SA-ALS1-BASE-Cfg.txt
Step 2: Erase the startup config from NVRAM.
Step 3: Delete the VLAN database from flash (switches only).
Step 4: Reload the device, but do not save the system configuration if prompted.
Step 5: When the device restarts, do not enter the initial configuration dialog, but terminate
autoinstall if prompted.
Step 6: Copy the Skills Assessment device configuration file from flash to the running config.
The format of these files is SA-xxx-BASE-Cfg.txt, where xxx is the name of the device. For example:
Switch# copy flash:/tshoot/SA-ALS1-BASE-Cfg.txt running-config
Destination filename [running-config]? Enter
Note: Although it is possible to copy the file to the startup config and reload the device, the RSA keys for SSH
cannot be generated from the startup config.
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 7 of 13
CCNPv7 TSHOOT
Skills Assessment
Step 7: Copy the running config to the startup config.
Even if you see an Autosave message indicating that the running configuration has been saved to NVRAM,
copy the running config to the startup config manually.
Note: If the device is rebooted at this point, you can log in remotely with the username cisco and the
password cisco. To access privileged EXEC mode, use the enable password cisco.
Note: Although it is not considered security best practice, the exec-timeout for the console line is set to 0
(no time out) to facilitate performance of this Skills Assessment.
Step 8: Repeat steps 2 through 7 for all other devices in the network.
Step 9: Set the time on the NTP server R2.
Set the correct time on the NTP server R2 using the clock set command.
Step 10: Configure the PCs.
a. Configure SRV1 with the static IP address 10.1.100.1/24 and the default gateway 10.1.100.254.
b. Start the syslog server and TFTP server on SRV1.
c.
Configure PC-B and PC-C as DHCP clients.
d. Release and renew the DHCP leases on PC-B and PC-C.
e. Test connectivity from each PC. Troubleshoot if necessary.
Part 3: Copy the Skills Assessment Error Files from the TFTP Server
Step 1: Verify connectivity with the TFTP server SRV1.
You must be able to access the TFTP server on SRV1 from each network device to copy the error files. From
each device (ALS1, DLS1, DLS2, R1, R2, and R3) ping SRV1 at 10.1.100.1.
Note: If the pings are not successful, verify physical network cabling and connections and verify that the Skills
Assessment base config file is loaded as the running config in each device. You can exit from the user EXEC
mode prompt to see the MOTD login banner, which indicates the file currently loaded. For example:
*** Switch ALS1 Skills Assessment BASE Config ***
If you still cannot access SRV1 from a particular device, contact your administrator.
Step 2: Verify the TFTP server configuration.
Verify that the TFTP server on SRV1 is running and that the error files are present in the default TFTP
directory. The format of these files is SA-xxx-Error-Cfg.txt, where xxx is the name of the device.
Step 3: Copy the TFTP server Skills Assessment error file to flash.
Copy the appropriate Skills Assessment error file from the TFTP server into the flash:/tshoot directory for
each device.
Step 4: Release and renew the DHCP leases on PC-B and PC-C. Verify that R2 has received
DHCPv4 and SLAAC addresses.
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 8 of 13
CCNPv7 TSHOOT
Skills Assessment
Part 4: Load the Skills Assessment Error Files from Flash to the Running
Config
For each device, follow the procedure similar to what is described in Part 2. An abbreviated version is
provided below.
Step 1: Erase the startup config.
Step 2: Delete vlan.dat (switches only).
Step 3: On the switches, configure the SDM template: dual-ipv4-and-ipv6 routing on 3560
switches and lanbase-routing on 2960 switches.
Step 4: Issue the reload command and respond as indicated in Part 2.
Step 5: Copy the Skills Assessment error file from flash to the running config.
Step 6: Copy the running config to the startup config.
Part 5: Troubleshoot the Errors Introduced
The Skills Assessment error files introduce various problems, including issues related to MST, VTPv3, NTP,
SSH, VLANs, VLAN trunks, EtherChannel, DHCPv4, DHCPv6, SLAAC, HSRP with object tracking, RIPv2,
RIPng, Named EIGRP, OSPFv2, OSPFv3 for IPv6 with and without address families, MP-BGP, redistribution,
route authentication, route filtering, securing switched networks, and local AAA.
Hint: Two configuration errors are introduced in each device for a total of 12 errors.
Step 1: Perform connectivity tests.
Use connectivity testing tools such as ping, traceroute, tracert (PC), and CDP to determine the extent of
connectivity loss. Use the following table to record the results of the connectivity tests. Be sure to ping from
each PC to enough network device interfaces, and from the network devices to enough network device
interfaces, to determine an appropriate troubleshooting strategy.
Note: You can use the Ping Test table in Step 3 as a starting point. Or you can use your own version of the
Tcl scripts below (adding addresses from the IP Address Table above and starting in Privileged EXEC mode),
to test reachability from a Cisco device to any destination:
tclsh
foreach address {
192.168.3.1
192.168.1.1
} { ping $address }
tclsh
foreach address {
2001:db8:feed:10::2
2001:db8:cafe:203::1
} { ping $address }
Network Connectivity Test Table
Command
From Device/Interface/IP
To Device/Interface/IP
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Result
Page 9 of 13
CCNPv7 TSHOOT
Skills Assessment
Step 2: Document, resolve, and verify the issues discovered.
Using the tools available, such as show and debug commands, discover each problem, correct it, and
document the corrective action taken. Use the Problem Resolution and Verification table to document the
problem discovered, the affected devices, and the solution to the problem, including the commands used.
Note: For each device, after issuing corrective commands, copy the running config to the startup config.
Tip: If connecting from one device to another via SSH, issue the terminal monitor command so that
console and debug messages generated on the remote device can be viewed on the local console.
Problem Resolution and Verification Table
Device
Problem or Error
Discovered
Corrective Action (commands
used)
Verification Commands
(more than one command
can be used)
ALS1
ALS1
DLS1
DLS1
DLS2
DLS2
R1
R1
R2
R2
R3
R3
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 10 of 13
CCNPv7 TSHOOT
Skills Assessment
Notes
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
Step 3: Demonstrate basic network connectivity after correcting errors.
With all devices connected and all problems resolved, you should be able to ping from any device in the
network to any other device. Perform pings according to the Ping Test table below.
Note: All pings in the table must be successful. If not, there are issues that need to be resolved.
Ping Test Table
From Device/Interface/IP
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
To Device/Interface/IP
PC-C
HSRP default gateway
SRV1
ALS1 MANAGEMENT
DLS1 MANAGEMENT
DLS2 MANAGEMENT
R1 F0/1
R2 Lo1
R2 Lo2
R2 Lo3
R3 G0/0
PC-C
PC-C
PC-C
PC-C
PC-C
PC-C
PC-C
PC-C
R3 default gateway
SRV1
ALS1 MANAGEMENT
DLS1 MANAGEMENT
DLS2 MANAGEMENT
R1 G0/1
R2 Lo0
R3 G0/1
ALS1 MANAGEMENT VLAN 99
ALS1 MANAGEMENT VLAN 99
ALS1 MANAGEMENT VLAN 99
ALS1 MANAGEMENT VLAN 99
ALS1 MANAGEMENT VLAN 99
DLS1 MANAGEMENT
DLS2 MANAGEMENT
R1 G0/1
R2 Lo1
R3 G0/1
Successful (Y/N)
Notes
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 11 of 13
CCNPv7 TSHOOT
Skills Assessment
Step 4: Demonstrate SSH connectivity.
From PC-B, connect to each network device using SSH (from an SSH client such as PuTTY) to verify remote
management capability.
Note: Connecting to each device via SSH must be successful. If not, there are issues that need to be
resolved.
Remote Access Test Table
From Device
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
To Device/Interface/IP
ALS1 MANAGEMENT
DLS1 MANAGEMENT
DLS2 MANAGEMENT
R1 G0/1
R2 S0/0/0.1
R3 G0/1
SSH (Y/N)
Step 5: Demonstrate NTP functionality.
Check each network device to verify that it has synchronized with the NTP server R2.
Note: Each device must synchronize with the NTP server R2. If not, there are issues that need to be
resolved.
NTP Synchronization Table
Device
ALS1
DLS1
DLS2
R1
R2
R3
NTP Status Synched (Y/N)
Step 6: Demonstrate network redundancy for PC-B after correcting errors.
a. Shut down DLS2 port F0/5.
b. Ping from PC-B to all other devices in the network. Pings from PC-B to each of the other PCs and
network devices must be successful. If not, there are issues that need to be resolved.
c.
Renew and release the PC-B IP address. PC-B should be able to obtain an IP address on subnet
10.1.120.0/24. If not, there are issues that need to be resolved.
Redundancy Test Table
From Device/Interface/IP
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
PC-B
To Device/Interface/IP
HSRP default gateway
PC-C
SRV1
ALS1 MANAGEMENT
DLS1 MANAGEMENT
DLS2 MANAGEMENT
R1 S0/0/1.1
R2 Lo1
R3 S0/0/1.1
Result
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 12 of 13
CCNPv7 TSHOOT
Skills Assessment
Notes
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 13 of 13
Download
Random flashcards
Nomads

17 Cards

Marketing

46 Cards

African nomads

18 Cards

Ethnology

14 Cards

Create flashcards