IEWB-RS Volume 2 Lab 1: Difficulty Rating (10 Highest) : 5 Lab Overview
IEWB-RS Volume 2 Lab 1: Difficulty Rating (10 Highest) : 5 Lab Overview
IEWB-RS Volume 2 Lab 1: Difficulty Rating (10 Highest) : 5 Lab Overview
Lab Instructions:
Prior to starting, ensure that the initial configuration scripts for this lab have been
applied. For a current copy of these scripts, see the Internetwork Expert
members’ site at http://members.internetworkexpert.com
Refer to the attached diagrams for interface and protocol assignments. Any
reference to X in an IP address refers to your rack number, while any reference
to Y in an IP address refers to your router number.
Upon completion, all devices should have full IP reachability to all networks in the
routing domain, including any networks generated by the backbone routers
unless explicitly specified.
Grading:
This practice lab consists of various sections totaling 100 points. A score of 80
points is required to achieve a passing score. A section must work 100% with the
requirements given in order to be awarded the points for that section. No partial
credit is awarded. If a section has multiple possible solutions, choose the solution
that best meets the requirements.
Point Values:
The point values for each section are as follows:
GOOD LUCK!
Troubleshooting:
There are three issues with the initial configurations applied to the devices that
will need to be resolved before the lab can be completed.
2 Points
1.2 Trunking
Configure trunking between the switches according to the table below.
2 Points
2 Points
2 Points
2 Points
3 Points
2. IP IGP Routing
2.1 OSPF
Configure OSPF area 0 on the Frame Relay connection between R3, R4,
and R5.
Ensure that R5 is always elected the Designated Router for this segment.
Do not use the neighbor statement under the OSPF process to
accomplish this.
Advertise the Loopback 0 interfaces of R3, R4, & R5 into OSPF area 0.
3 Points
2.2 OSPF
Configure OSPF area 45 on VLAN 45 between R4 and R5.
Ensure that host devices running OSPF on this segment cannot intercept
the OSPF communication between R4 and R5.
3 Points
2.3 OSPF
Configure OSPF area 46 on VLAN 46 between R4 and R6.
Advertise R6’s Loopback 0 interface into OSPF area 46.
Advertise VLAN 6 into OSPF on R6; do not use the network or ip ospf
statements to accomplish this.
2 Points
2.4 OSPF
The Ethernet link between R4 and R5 will be used primarily as a backup
of the Frame Relay circuit between them.
Configure the network so that traffic is only sent over this Ethernet
segment if the Frame Relay circuit between R4 and R5 is down.
Do not use the backup interface command to accomplish this.
2 Points
2.5 OSPF
To minimize downtime in the event of a failure configure the network so
that R4 can detect a loss of the Frame Relay circuit to R5 within 1 second.
2 Points
2.6 EIGRP
Configure EIGRP AS 100 on R1, R2, R3, R5, SW1, SW2, and SW4.
Configure EIGRP on the Ethernet segments as below:
Device 1 Device 2
R1 SW1
R2 SW2
R5 SW4
SW1 SW4
Configure EIGRP on the Frame Relay network between R1, R2, and R3.
Advertise the Loopback 0 interfaces of R1, R2, SW1, SW2, and SW4 into
the EIGRP domain.
Do not send EIGRP packets out any other interfaces; do not use the
passive-interface command to accomplish this.
3 Points
2.7 EIGRP
Advertise VLAN 33 and R3’s interface Fa0/1 into the EIGRP domain.
These prefixes should appear as follows throughout the EIGRP domain:
D EX 204.12.X.0 [170/…
D EX 183.X.39.0 [170/…
2 Points
2.8 EIGRP
Configure EIGRP AS 10 on R6, and enable EIGRP on the Frame Relay
segment between R6 and BB1.
Administrators of your network are concerned about false routing
information being injected from the provider network. In order to ensure
that all routes learned over the Frame Relay cloud are legitimate configure
R6 to use the most secure authentication for any neighbor relationships
formed on this interface.
Use key number 1 with a password of CISCO for this authentication.
2 Points
2.9 RIPv2
Configure RIP on SW4.
Enable RIP on the Ethernet segment connecting to BB2.
In order to protect against false route injection from RIP as well, configure
SW4 to use the strongest authentication on any RIP updates received on
this Ethernet segment using key 1 and the password CISCO.
2 Points
2 Points
2 Points
3 Points
3 Points
2.14 RIPng
Enable RIPng on VLAN 46, VLAN 105, and the tunnel interfaces.
Use CISCO as the identifier string for the RIPng processes on both R4
and R5.
R4 and R5 should be able to ping other's IPv6 enabled Ethernet interfaces
using their respective hostnames.
3 Points
3. BGP
3.1 BGP Peering
Configure BGP on the following devices with the following AS numbers:
Device BGP AS
R1 200
R2 200
R3 100
R4 100
R5 100
R6 100
SW1 200
SW4 200
BB1 54
BB2 254
BB3 54
Device 1 Device 2
R6 BB1
R5 R3
R5 R4
R5 R6
R5 SW4
SW4 BB2
SW4 SW1
SW1 R1
R1 R2
R3 R2
R3 BB3
The BGP peering sessions between R4 & R5 and R5 & R6 should remain
up if R4 loses its connection to the Frame Relay cloud.
Administrators of your network are concerned about insecure BGP
updates being passed over VLAN 102. To resolve this configure SW4 to
authenticate its BGP peering session with BB2 using the password
CISCO.
3 Points
3 Points
3 Points
3 Points
4.2 Syslog
In order to keep track of important device notifications your corporate
policy now requires that all devices send their log messages to the syslog
server located at 183.X.17.100.
Configure all devices in the network to conform to this policy.
R1 through R6 should send log messages using facility local5.
SW1 and SW4 should send log messages using facility local6.
In order to ease in identifying where specific log messages are originated
from ensure that all devices source their logging messages from their
respective Loopback0 interfaces.
3 Points
4.3 NTP
After implementing syslog logging your NOC engineers have noticed
inconsistent timestamps on your device logs. In order to resolve this
problem you have decided to maintain consistent time by implementing
Network Time Protocol.
Configure R3 and R6 to get network time from BB3 and BB1 respectively.
Configure R1, R2, and SW1 to get network time from R3.
Configure R4, R5, and SW4 to get network time from R6.
R3 should fail over and get network time from R6 in the event that BB3
becomes unavailable.
R6 should fail over and get network time from R3 in the event that BB1
becomes unavailable.
3 Points
2 Points
3 Points
3 Points
3 Points
5. IP Multicast
5.1 PIM
Configure IP Multicast routing on R2, R3, and R5.
Configure PIM on the following interfaces:
Device Interface
R2 Fa0/0
R2 S0/0
R3 Fa0/0
R3 S1/0
R3 S1/1
R5 Fa0/0
R5 S0/0
2 Points
5.2 RP Assignment
Configure R3 to announce its most reliable interface as the RP for all
multicast groups using auto-rp.
R2 should be responsible for group to RP mappings.
2 Points
3 Points
2 Points
6. QoS
6.1 Frame Relay Traffic Shaping
You have been noticing drops on R5’s connection to the Frame Relay
cloud. After further investigation, you have discovered that R5 has been
overwhelming R3 and R4’s connections to the Frame Relay cloud.
Configure Frame Relay Traffic Shaping on R5 in order to resolve this
issue.
R5’s connection to the Frame Relay cloud supports a transmission rate of
1536Kbps.
R5 should send at an average rate of 128Kbps on DLCI 513 to R3.
R5 should send at an average rate of 512Kbps on DLCI 504 to R4.
In the case that the Frame Relay cloud notifies R5 of congestion it should
reduce its sending rate to no lower than 96Kbps for the DLCI to R3 and
384Kbps for the DLCI to R4.
In the case that R5 has accumulated credit it should be allowed to burst
up to the maximum transmission rate supported on the circuit to R4.
Bursting on the circuit to R3 should not be allowed.
Assume an interval (Tc) of 50ms.
3 Points
3 Points
6.3 CBWFQ
Your company plans to reduce expenses by sending PSTN calls to the
remote office connected to R5 across the WAN. Currently the WAN link is
used primarily for data transfers and remote desktop application.
Configure R5 to allocate 64Kbps of PVC bandwidth to VoIP bearer traffic,
which is marked as DSCP EF.
At the same time, guarantee 30% of remaining bandwidth to Citrix
application traffic.
Set the queue depth for the Citrix traffic class to 16 packets.
All other remaining traffic should receive flow-based fair scheduling.
3 Points
7. Security
7.1 Denial of Service Tracking
Your network administrators have been getting complaints from users that
the web server with the IP address 183.X.28.100 is inaccessible. After
further investigation you have determined that this server is undergoing a
TCP SYN attack.
In order to assist in tracking down the source of this attack configure R3
and SW4 to generate a log message when HTTP SYN packets are
received on VLANs 33 or 102 respectively that are destined for
183.X.28.100.
These log messages should include the MAC address of the device which
forwarded the packet onto the segment.
3 Points
2 Points
2 Points