50 likes | 227 Views
ICND2 – OSPF – Mark Lab. Reset for lab 4 Configure 2 loopback interfaces on both routers RTR1 – 10.X.X.2/32 and 10.X.X.3/32 (area X) RTR2 – 10.X.X.4/32 and 10.X.X.5/32 (area X+1) Place them in area ‘X’, and area X+1 Summarize your area routes Area x range 10.x.x.2/31, area x+1 range …
E N D
ICND2 – OSPF – Mark Lab • Reset for lab 4 • Configure 2 loopback interfaces on both routers • RTR1 – 10.X.X.2/32 and 10.X.X.3/32 (area X) • RTR2 – 10.X.X.4/32 and 10.X.X.5/32 (area X+1) • Place them in area ‘X’, and area X+1 • Summarize your area routes • Area x range 10.x.x.2/31, area x+1 range … • Ensure your RID is that of your loopback interface, if not make the router choose that as its RID. • Confirm the routes on your loopbacks are accessible by pinging them from the core router. • From your loopback interface ping 10.1.1.1 (tftp server) • Reset for lab 6 at completion.
ICND2 – EIGRP – Mark Lab • Reset for lab 8 • Create 2 loopback interfaces on each RTR: • RTR-1 IPs:1.X.X.2 and 1.X.X.3 • RTR-2 IPs:1.X.X.4 and 1.X.X.5 • Summarize these networks to /31 summaries on the Frame Relay Serial interface (hint – this is an interface command) • Verify these networks are seen on the core RTR. • Do not send EIGRP out your Ethernets • Why is the summary and the more explicit seen on the core? • Reset for 8 and go to lunch – 12:45 we start.
ICND2 – NAT+ - Mark Lab • Reset for lab 10 • Shutdown your Frame Relay interface on RTR-2 • Shutdown the Fast E-net interface on RTR-2 • Configure NAT on RTR-1 for traffic taking the Frame Relay interface as follows: • Pod Switch: Static NAT to 1.X.X.1 for Telnet, SSH ONLY • All other traffic to use 1.X.X.2 – 1.X.X.3 (assume 100 clients) • From RTR-2 ensure you can ping, trace, and telnet to the Core router • From the Core RTR ping and telnet to the switch • What network/s should not be seen on the Core RTR? • Let me know when you are done • Reset for Lab 11
RTR-1 Interface serial 1/0 /and/ interface fast-ethernet 0/0 Ip nat inside Interface serial 1/1 Ip nat outside ! Ip nat inside source static tcp 192.168.11.10 23 1.1.1.1 23 Ip nat inside source static tcp 192.168.11.10 22 1.1.1.1 22 Ip nat inside source list 1 pool Mark ! Ip nat pool Mark 1.1.1.2 1.1.1.3 netmask 255.255.255.0 ! Interface loopback 2 Ip address 1.1.1.5 255.255.255.0 ! Access-list 1 deny host 192.168.11.10 Access-list 1 permit 192.168.0.0 0.0.255.255 ! Router eigrp 100 No network 192.168.0.0 0.0.255.255 Network 192.168.1.201 0.0.0.0 Network 1.1.1.0 0.0.0.255 No auto-summary RTR-2 Conf t Interface Fa 0/0 Shutdown Interface serial 1/0 Shutdown
ICND2 – Mark Lab – IPv4 • Configure both RTRs for OSPF • Fast-E = Area X (pod number) • Create 2 loopbacks per RTR and use 1.x.y.z addressing as long as the 2 are contiguous. Place them in Area X+1. • Area 0 is to the core • Run authentication between your pod RTRs • No authentication to the core • Confirm routes are properly seen on the core • Create an ACL that only allows trace route, ping, telnet, and TCP ports 6000-6500 into your POD from the Core. • From the Core confirm the ACL works: Can you access your Switch from the Core? • Change the serial between RTRs to PPP w/ CHAP authentication using password “This_is_fun”