CCNA 2 Version 3 Hands-on Final (Instructor's Guide)

advertisement
CCNA 2 Version 3 Hands-on Final (Instructor’s Guide)
Student name _______________________________ Date __________________ Start time ____________
This is the basic setup. The hosts require an operating system with TCP/IP installed and a web browser.
The hands-on final is designed for students to wire and program one side of the internetwork. The
student will be assigned either Anniston or Boaz and its associated components. The GAD router is to be
programmed by the instructor with the provided configuration. This configuration is very lengthy and
should be pasted in sections to prevent overrun.
The student can be assigned one of 10 different versions from either Branch location. The version will
determine the WAN network assigned, as well as the IGRP Autonomous System number. This allows for
20 different combinations plus unlimited variations in the LAN assignments. These are further explained
in the appropriate sections.
Circle one:
Location: Anniston or Boaz
Circle one:
Version 1 2 3 4 5 6 7 8 9 10
Instructor provided information:
The WAN IP network address is _________________ with a subnet mask of _______________.
The local LAN has been assigned an IP network address of ______________________________.
Each subnet of the above network needs to accommodate ___________ host addresses.
Use the ______ useable subnet for the LAN. Do NOT use subnet zero as the first subnet.
The IGRP AS number is ________.
S0/0 (S0)
DCE
GAD
S0/1 (S1)
DCE
S0/0 (S0)
S0/0 (S0)
Anniston
IBM Compatible
Boaz
IBM Compatible
Management
Production
IBM Compatible
IBM Compatible
Management
Production
There are 4 elements of this exam that can be weighted or can be a pass or fail exam.
This exam will occur in stages. Each element is a set of instructions that needs to be accomplished. The
instructor will initial each task as they are completed. Proceed to the next task only after the instructor has
approved the current task.
The 5 elements of this exam are:
12345-
planning
security
cabling
basic configuration
troubleshooting
The basic theme here is that Gadsden (GAD) is regional headquarters of the company. Anniston and Boaz
are branch offices. Each network associate (student) will be responsible for single branch office. The
internetwork team leader (instructor) is responsible for the regional router (GAD).
A network address and specific number of hosts per subnet has been assigned for the local LAN. From the
instructor provided information, the subnet address, the subnet mask, the first and last useable addresses, and
the broadcast address for each site’s LAN need to be determined.
This part of the exam is to test the student’s ability to subnet. This hands-on final allows for many
combinations. The instructor needs to assign the student a network address to be applied to the LAN,
as well as how many hosts per network are needed. The instructor can assign the student virtually ANY
network (except as below) and any number of hosts per network of 3 or more.
Addresses NOT to assign to the student: for the LAN:
192.168.1.0 – 192.168.10.0
192.168.101.0 – 192.168.110.0
172.16.0.0
209.0.0.0
62.0.0.0
198.0.0.0
the network assigned to the other branch (Anniston or Boaz)
The only issue to take care in is that there must be at least 10 subnets. That means that if assigning a
Class C address, no more than 14 hosts per network and when assigning a Class B address no more
than 4094 hosts per network should be assigned.
CCNA 2 Hands-on Version Assignment
Router
Final
segment version
number
WAN network
address
GAD Router Interface IGRP AS
address
Anniston
Anniston
Anniston
Anniston
Anniston
Anniston
Anniston
Anniston
Anniston
Anniston
1
2
3
4
5
6
7
8
9
10
192.168.1.0 /24
192.168.2.0 /24
192.168.3.0 /24
192.168.4.0 /24
192.168.5.0 /24
192.168.6.0 /24
192.168.7.0 /24
192.168.8.0 /24
192.168.9.0 /24
192.168.10.0 /24
192.168.1.1
192.168.2.1
192.168.3.1
192.168.4.1
192.168.5.1
192.168.6.1
192.168.7.1
192.168.8.1
192.168.9.1
192.168.10.1
1
2
3
4
5
6
7
8
9
10
Boaz
Boaz
Boaz
Boaz
Boaz
Boaz
Boaz
Boaz
Boaz
Boaz
1
2
3
4
5
6
7
8
9
10
192.168.101.0 /24
192.168.102.0 /24
192.168.103.0 /24
192.168.104.0 /24
192.168.105.0 /24
192.168.106.0 /24
192.168.107.0 /24
192.168.108.0 /24
192.168.109.0 /24
192.168.110.0 /24
192.168.101.1
192.168.102.1
192.168.103.1
192.168.104.1
192.168.105.1
192.168.106.1
192.168.107.1
192.168.108.1
192.168.109.1
192.168.110.1
101
102
103
104
105
106
107
108
109
110
Step 1 – Planning
Points __________________
The student is asked to plan the network subnets for the first 10 useable networks. The instructor
should plan this ahead of time so they are known.
Using the chart below, plan the first 10 usable subnets of the LAN network address assigned to you.
Subnet
(useable)
Subnet
Subnet
mask
First host
Last host
Broadcast
Address
(/x)
1
2
3
4
5
6
7
8
9
10
The configuration provided for the GAD router accommodates a variety of address for the WAN to the
branch. The WAN assignment will be based on the version number and the serial port on the GAD
router. The WAN connected to serial 0/0 (from GAD to Anniston) is assigned to use networks
192.168.1.0 –192.168.10.0. If the student on the Anniston site is assigned version 1 of the final, the
192.168.1.0 network should be assigned and an IGRP AS of 1 will be used.
The WAN assignments for the serial 0/1 (from GAD to Boaz), offsets the version number by 100. If the
student on the Boaz site is assigned version 1 of the final, the 192.168.101.0 network should be assigned
and an IGRP AS of 101 will be used.
The WAN interface of GAD is assigned the lowest useable address in the network.
Identify and use the second lowest useable WAN address for your S0 interface of the router assigned to you
_________________________.
The subnet number should be equal to the version number assigned to the student.
The student should properly select the address ranges for the Production and Management hosts. The
most significant bit of the host range should divide the address ranges. For example, if the subnet is
172.16.1.128 /26 the address range of the subnet would be 172.16.1.129 – 172.16.1.191. The lower
address range (production) is 172.16.1.129 – 172.16.1.159. The upper address range (management) is
172.16.1.160- 172.16.1.190. This chart below shows the binary representation of the last octet this
example.
Number
Lower
Range
Upper
Range
129
191
160
190
Network Bits
1
1
1
1
0
0
0
0
Host
Decision
Bit
0
0
1
1
Remaining Host Bits
0
0
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
0
0
For "Security" purposes, all of the production floor workstations will be assigned the lower half of the IP
address numbers of the subnet assigned by the instructor. All of network devices and management stations
will be assigned the upper half of the IP address numbers of the subnet assigned by the instructor. From this
upper half range of addresses, the Ethernet router interface is to be assigned the highest useable address.
Identify the required IP address of the Ethernet interface on your assigned router. ___________________
The host configurations must also be planned. Using the chart below, complete the host information.
Branch:
Anniston or Boaz
Production Host Range
(Lower half)
Management Host Range
(Upper half)
IP address range
Production Host
IP address ___________________________
Subnet Mask __________________
Default Gateway ___________________________
Management Host
IP address ___________________________
Subnet Mask __________________
Default Gateway ___________________________
Before proceeding to the next step have instructor approve this step.
Instructor _______________________________
Step2 – Security
Points __________________
There are several security concerns in the internetwork. Access Control List(s) should be developed to
address these issues. The following are the concerns:
1. The company has an intranet web server host that all systems can reach at IP address 172.16.0.1 with
only HTTP access. No other protocols will be permitted to this site.
2. The company also has a server pool in the 209.0.0.0 /24 network. The server pool addresses are
divided into halves. The servers in the upper half of the address range should only be reachable by
management hosts (all IP protocols). The servers in the lower half of the address range should be
reachable by all LAN hosts (all IP protocols). The servers should not be accessible any other hosts.
3. The company has discovered an Internet Web server at 198.0.0.1 that is known to contain viruses.
All hosts are to be banned from reaching this site.
Before proceeding to the next step have instructor approve this step.
Instructor ______________________________
Step 3 –Cabling
Points __________________
Now that the planning process is complete, it is time to construct the Physical layer. Using the diagram,
connect all the associated hardware for the local branch.
This should be a straightforward process. As long as the student uses the proper cables and does not
omit any of the connections. A hub can be substituted for a switch. When using a switch, make sure
that all custom configurations are erased. In particular, make sure the switch is using a single VLAN. If
using a hub, make sure that the student does not use an uplink port.
Below is a checklist to assure the proper connection.
Device
connection to Switch/Hub
S0/0 or S0/1
connection
[ ]
Anniston
Cat 5 straight
Serial (DTE)
[ ]
Boaz
Cat 5 straight
Serial (DTE)
[ ]
GAD
n/a
Serial (DCE)
[ ]
Production
Cat 5 straight
n/a
[ ]
Management
Cat 5 straight
n/a
Before proceeding to the next step have instructor approve this step.
Instructor _______________________________
Step 4 – Basic Configuration
Points __________________
The student is tested on the same basic configuration elements as have been used in lab throughout
the course. A checklist is provided below for some of the critical configuration items.
Criteria
passwords
Make sure that the student configures the console, secret, and VTY
passwords. (The VTY password can
Host Name
The student should configure the host name of Anniston or Boaz.
IP Address
The FastEthernet should be configured with the highest address in the
subnet. The Serial interface can be configured with any address in the
appropriate Class C EXCEPT the lowest.(GAD’s interface is .1)
Host Table
Make sure the router has host table entries for GAD
Message of
the Day
Make sure there is a properly functioning MOTD and that it reflects a
proper security message. (Do not attempt to …)
Serial 0/0
description
The serial interface should have a description for identifying that it
connects to GAD’s appropriate interface.
Fa 0/0
This description should identify that it connect to the LAN
Checked
description
Routing
Protocol
The routing protocol should be configured as IGRP with an
Autonomous System Number equal to the version number. There should
be 2 network statements. One for the WAN (192.168.y.0) and one for
the network assigned to the LAN.
Hosts
Make sure the hosts are configured with the appropriate IP address,
subnetmask, and gateway. The routers address (highest address in
subnet) should be the gateway on both hosts.
Connectivity From the hosts command prompt, make sure that the host can ping
GAD’s Serial interface as well as the loopback interfaces.
172.16.0.1, 209.0.0.1, 209.0.0.254, 62.0.0.1, and 198.0.0.1.
Browsing
Also make sure that the web browser on the host can bring up the login
popup for the loopback interfaces.
172.16.0.1, 209.0.0.1, 209.0.0.254, 62.0.0.1, and 198.0.0.1.
Apply a basic configuration to the router. This configuration should include contain all the normal
configuration items. These include (but not limited to): router name, passwords, interface descriptions,
routing, host table, and a banner to be displayed before login.
The routing and connectivity should be verified before notifying the instructor.
Before proceeding to the next step have instructor approve this step.
Instructor _______________________________
Step 4 – Security
Points __________________
This section tests the student’s skills to design and apply IP ACL lists for different purposes. The
following will require the student to develop a ACL statements for:
- Network to host for a specific protocol
- A range of hosts to a range of hosts all protocols
- Network to specific host all protocols
These can be accomplished using one access list applied in on the FastEthernet interface of applied
out on the serial interface. The answers provided are ONLY examples. There are many ways to
accomplish the intended outcome. Functionality should be tested.
There are several security concerns in the internetwork. Access Control List(s) should be developed to
address these issues. The following are the concerns:
1.
Access-list 100 permit tcp lan_address wildcard host 172.16.0.1 eq 80
Access-list 100 deny ip lan_address wildcard host 172.16.0.1
Where the lan_address is the subnet address of the LAN and the wildcard is the complement of the
subnetmask. Example: subnet 172.18.1.0 255.255.255.0 = address 172.18.1.0 wildcard 0.0.0.255
--- Make sure that the source is the whole subnet not just the specific hosts. --1.
The company has an intranet web server host that all systems can reach at IP address 172.16.0.1 with
only HTTP access. No other protocols will be permitted to this site.
2
Access-list 100 deny ip lan_address low_wildcard 209.0.0.128 0.0.0.127
Access-list 100 permit ip lan_address wildcard 209.0.0.0 0.0.0.255
Access-list 100 deny ip any 209.0.0.0 0.0.0.255
Where the lan_address is the subnet address of the LAN and the low_wildcard is the complement of
the subnetmask except the most significant host bit is 0. Example: subnet 172.18.1.0 255.255.255.0
= lan_address 172.18.1.0 low_wildcard 0.0.0.127
Where the lan_address is the subnet address of the LAN and the wildcard is the complement of the
subnetmask. Example: subnet 172.18.1.0 255.255.255.0 = address 172.18.1.0 wildcard 0.0.0.255
---- Make sure that the source is not just the specific hosts. --2. The company also has a server pool in the 209.0.0.0 /24 network. The server pool addresses are divided
into halves. The servers in the upper half of the address range should only be reachable by management hosts
(all IP protocols). The servers in the lower half of the address range should be reachable by all LAN hosts
(all IP protocols). The servers should not be accessible any other hosts.
3
Access-list 100 deny ip any host 198.0.0.1
3. The company has discovered an Internet Web server at 198.0.0.1 that is known to contain viruses.
All hosts are to be banned from reaching this site.
Tests
1.
The web browser on both hosts can bring up the login of IP address 172.16.0.1 but neither can ping
nor telnet.
2.
Management host can browse, ping, telnet … 209.0.0.1 and 209.0.0.254. Production host can browse,
ping, telnet … 209.0.0.1 but NOT 209.0.0.254.
3.
Neither host can browse, ping, telnet …198.0.0.1.
4.
The web browser on both hosts can bring up the login of IP address 62.0.0.1 (can also ping, telnet..)
Before proceeding to the next step have instructor approve this step.
Instructor _______________________________
Step 5 – Troubleshooting
Points __________________ (Optional)
This is an important part of the hands-on exam. The instructor should be more interested in the
troubleshooting methodology than correcting the problems. Students should not extensively use the
show run command. They should also not be allowed to paste the configuration back into the router to
correct the problem.
The student should use and document the appropriate show and debug commands to isolate the
problems.
As a general rule, one Physical layer problem and one configuration problem should be introduced.
Now that everything successfully configured, the instructor create some problems. The steps and commands
used correct these issues must be documented. The show run command should be used only as a last resort.
Symptom / Cause
Commands / Results
Instructor _______________________________
Grade ______________________________
Detailed Solutions
End time __________________
Initials
These are some recommended problems to be introduced and commands/methods to diagnose them.
Physical Issues
Pull the Cat 5 cable partially out of the router or hub far enough to turn of link lights or put a
bad/wrong Cat 5 cable in LAN.
- show interfaces or show ip interface brief
Power off router or remove power cord.
- visual inspection
Reverse the cable on the serial connection (DTE – DCE)
- show interfaces or show ip interface brief
- show controller serial
- show cdp neighbor
Connect 2 DCE cables back to back on the serial connection
- show interfaces or show ip interface brief
- show controller seria
- show cdp neighborl
Configuration Issues
Shutdown an interface
Example :
…if)# shutdown
Commands for troubleshooting
- show interfaces or show ip interface brief
Change the IP address to a similar one in another subnet
Example changing 172.32.24.1 /24 to 172.32.42.1 /24
…if)#ip address 172.32.42.1 255.255.255.0
Commands for troubleshooting
- show interfaces or show ip interface brief
- show ip route
Change the network statements in the routing protocol to similar network
Example changing 172.32.0.0 to 172.23.0.0
…-router)# no network 172.32.0.0
…-router)#network 172.23.0.0 ]
Commands for troubleshooting
- show ip route
- show ip protocols
Change the IGRP autonomous system number to something similar
Example changing AS from 102 to 120
…config)#no router igrp 102
…config)#no router igrp 120
…-router)#network xxx.yyy.zzz.aaa
…-router)#network rrr.sss.ttt.uuu
Commands for troubleshooting
- show ip route
- show ip protocols
Remove the IGRP routing protocol
Example removing AS 102
…config)#no router igrp 102
Commands for troubleshooting
- show ip route
- show ip protocols
Use a static route to override the route from the routing protocol to send traffic to null 0 (or to some other
ACTIVE interface)
Example rerouting route 172.16.0.0 255.255.0.0 to null 0
…config)#ip route 172.16.0.0 255.255.0.0 null 0
Commands for troubleshooting
- show ip route
- show ip protocols
Change the secret password so student has to do password recovery
Example change secret password to sneaky
…config)#enable secret sneaky
When introducing configuration changes a couple of things need to be done to insure the student does
not easily find the problems. One of these issues is that the changes are captured in the history buffer on
the router. The student can use the arrow keys (ctrl-p) or show history to see the changes made. Another
is that if the configuration changes made to the router are not saved to start up, the student can restart the
router to correct the configuration problems. A final issue is that the terminal emulation program often
has a buffer that will keep a copy of the changes. The student an look through the buffer to see the
changes that have been made.
]
For the reasons above, it is recommended that steps be taken to prevent the student from an “easy fix”.
After the configuration changes are made to inject a problem in the student’s router:
- issue a copy running-config startup-config command
- power cycle the router
- close the terminal session.
Download