10.2.6 Packet Tracer – Use LLDP to Map a Network (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Addressing Table Device Interface IP Address Subnet Mask Local Interface and Connected Neighbor Edge G0/0 192.168.1.1 255.255.255.0 G0/1 – S1 S0/0/0 209.165.200.5 255.255.255.252 S0/0/0 – ISP S1 SVI 192.168.1.2 255.255.255.0 RBO-Edge G0/0 209.165.200.10 255.255.255.252 G0/0 – ISP RBO-Edge G0/1 192.168.3.249 255.255.255.252 G0/0 – RBO-Firewall RBO-Firewall G0/0 192.168.3.250 255.255.255.252 G0/0 – RBO-Edge RBO-Firewall G0/1 192.168.4.129 255.255.255.128 G0/1 – sw-rbo1 sw-rbo1 SVI 192.168.4.131 255.255.255.128 blank sw-rbo1 G0/1 N/A N/A G0/1 – RBO-Firewall sw-rbo1…
Author: CCNA Exam Answers
10.1.5 Packet Tracer – Use CDP to Map a Network (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Addressing Table Device Interface IP Address Subnet Mask Local Interface and Connected Neighbor Edge1 G0/0 192.168.1.1 255.255.255.0 G0/1 – S1 S0/0/0 209.165.200.5 255.255.255.252 S0/0/0 – ISP Branch-Edge S0/0/1 209.165.200.10 255.255.255.252 S0/0/1 – ISP Branch-Edge G0/0 192.168.3.249 255.255.255.248 G0/0 – Branch-Firewall Branch-Firewall G0/0 192.168.3.253 255.255.255.248 G0/0 – Branch-Edge Branch-Firewall G0/1 192.168.4.129 255.255.255.128 G0/1 – sw-br-floor2 sw-br-floor1 G0/1 G0/1 – sw-br-floor3 sw-br-floor1 G0/2 G0/2 – sw-br-floor2 sw-br-floor2 G0/1 G0/1 – Branch-Firewall sw-br-floor2 G0/2…
7.6.1 Packet Tracer – WAN Concepts (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this activity, you will investigate various types of WANs by exploring a topology that uses diverse connectivity technologies. Describe different WAN connectivity options. Background / Scenario You will explore WAN technologies that are used to connect business and home users to data services. Note: There is no scoring in this activity. Instructions Part 1: Investigate Consumer WAN Technologies for Home and Mobile Devices. Step 1: Explore Consumer WAN Technologies. In this step, you…
6.8.1 Packet Tracer – Configure NAT for IPv4 (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Addressing Table Device Interface IP Address R1 S0/0/0 10.1.1.1/30 F0/0 192.168.10.1/24 R2 S0/0/0 10.1.1.2/30 S0/0/1 10.2.2.1/30 S0/1/0 209.165.200.225/27 F0/0/0 192.168.20.1/24 R3 S0/0/1 10.2.2.2/30 F0/0 192.168.30.1/24 PC1 NIC 192.168.10.10/24 PC2 NIC 192.168.30.10/24 local.pka NIC 192.168.20.254/24 Outside PC NIC 209.165.201.14/28 cisco.pka NIC 209.165.201.30/28 Objectives Configure Dynamic NAT with PAT Configure Static NAT Background / Scenario In this lab, you will configure a router with dynamic NAT with PAT. This will translate addresses from the three…
6.6.7 Packet Tracer – Configure PAT (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Configure Dynamic NAT with Overload Part 2: Verify Dynamic NAT with Overload Implementation Part 3: Configure PAT using an Interface Part 4: Verify PAT Interface Implementation Part 1: Configure Dynamic NAT with Overload Step 1: Configure traffic that will be permitted. On R1, configure one statement for ACL 1 to permit any address belonging to 172.16.0.0/16. R1(config)# access-list 1 permit 172.16.0.0 0.0.255.255 Step 2: Configure a pool of address for NAT. Configure…
6.5.6 Packet Tracer – Configure Dynamic NAT (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Configure Dynamic NAT Part 2: Verify NAT Implementation Instructions Part 1: Configure Dynamic NAT Step 1: Configure traffic that will be permitted. On R2, configure one statement for ACL 1 to permit any address belonging to the 172.16.0.0/16 network. R2(config)# access-list 1 permit 172.16.0.0 0.0.255.255 Step 2: Configure a pool of address for NAT. Configure R2 with a NAT pool that uses two addresses in the 209.165.200.228/30 address space. R2(config)# ip…
6.4.5 Packet Tracer – Configure Static NAT (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Test Access without NAT Part 2: Configure Static NAT Part 3: Test Access with NAT Scenario In IPv4 configured networks, clients and servers use private addressing. Before packets with private addressing can cross the internet, they need to be translated to public addressing. Servers that are accessed from outside the organization are usually assigned both a public and a private static IP address. In this activity, you will configure static NAT…
6.2.7 Packet Tracer – Investigate NAT Operation (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Addressing Table The following table provides addressing for networking device interfaces only. Device Interface IP Address and Prefix R2 G0/0 10.255.255.245/30 G0/1 10.255.255.249/30 G0/2 10.10.10.1/24 S0/0/0 64.100.100.2/27 S0/0/1.1 64.100.200.2/30 R4 G0/0 172.16.0.1/24 S0/0/0 64.100.150.1/30 S0/0/1.1 64.100.200.1/30 WRS LAN 192.168.0.1/24 Internet 64.104.223.2/30 Objectives Part 1: Investigate NAT Operation Across the Intranet Part 2: Investigate NAT Operation Across the Internet Part 3: Conduct Further Investigations Scenario As a frame travels across a network, the MAC addresses…
5.5.1 Packet Tracer – IPv4 ACL Implementation Challenge (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Addressing Table Device Interface IP Address Branch G0/0/0 192.168.1.1/26 G0/0/1 192.168.1.65/29 S0/1/0 192.0.2.1/30 S0/1/1 192.168.3.1/30 HQ G0/0/0 192.168.2.1/27 G0/0/1 192.168.2.33/28 S0/1/1 192.168.3.2/30 PC-1 NIC 192.168.1.10/26 PC-2 NIC 192.168.1.20/26 PC-3 NIC 192.168.1.30/26 Admin NIC 192.168.1.67/29 Enterprise Web Server NIC 192.168.1.70/29 Branch PC NIC 192.168.2.17/27 Branch Server NIC 192.168.2.45/28 Internet User NIC 198.51.100.218/24 External Web Server NIC 203.0.113.73/24 Objectives Configure a router with standard named ACLs. Configure a router with extended named ACLs. Configure a…
5.4.13 Packet Tracer – Configure Extended IPv4 ACLs – Scenario 2 (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Addressing Table Device Interface IP Address Subnet Mask Default Gateway RT1 G0/0 172.31.1.126 255.255.255.224 N/A S0/0/0 209.165.1.2 255.255.255.252 PC1 NIC 172.31.1.101 255.255.255.224 172.31.1.126 PC2 NIC 172.31.1.102 255.255.255.224 172.31.1.126 PC3 NIC 172.31.1.103 255.255.255.224 172.31.1.126 Server1 NIC 64.101.255.254 255.254.0.0 64.100.1.1 Server2 NIC 64.103.255.254 255.254.0.0 64.102.1.1 Objectives Part 1: Configure a Named Extended ACL Part 2: Apply and Verify the Extended ACL Background / Scenario In this scenario, specific devices on the LAN…
5.4.12 Packet Tracer – Configure Extended IPv4 ACLs – Scenario 1 (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 172.22.34.65 255.255.255.224 N/A G0/1 172.22.34.97 255.255.255.240 G0/2 172.22.34.1 255.255.255.192 Server NIC 172.22.34.62 255.255.255.192 172.22.34.1 PC1 NIC 172.22.34.66 255.255.255.224 172.22.34.65 PC2 NIC 172.22.34.98 255.255.255.240 172.22.34.97 Objectives Part 1: Configure, Apply and Verify an Extended Numbered ACL Part 2: Configure, Apply and Verify an Extended Named ACL Background / Scenario Two employees need access to services provided by the server.…
5.2.7 Packet Tracer – Configure and Modify Standard IPv4 ACLs (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/0 192.168.10.1 255.255.255.0 N/A G0/0/1 192.168.20.1 255.255.255.0 S0/1/0 (DCE) 10.1.1.1 255.255.255.252 Edge S0/1/0 10.1.1.2 255.255.255.252 N/A S0/1/1 (DCE) 10.2.2.2 255.255.255.252 S0/2/1 209.165.200.225 255.255.255.224 R3 G0/0/0 192.168.30.1 255.255.255.0 N/A G0/0/1 192.168.40.1 255.255.255.0 S0/1/1 10.2.2.1 255.255.255.252 S1 VLAN 1 192.168.10.11 255.255.255.0 192.168.10.1 S2 VLAN 1 192.168.20.11 255.255.255.0 192.168.20.1 S3 VLAN 1 192.168.30.11 255.255.255.0 192.168.30.1 S4 VLAN 1 192.168.40.11 255.255.255.0 192.168.40.1 PC-A NIC…