CCNP Encore Lab
CCNP Encore Lab
LAB OVERVIEW
This guide covers the following subjects:
▪ Time Synchronization: This section describes the need for synchronizing time in
an environment and covers Network Time Protocol and its operations to keep time consistent across
devices.
▪ First-Hop Redundancy Protocol: This section gives details on how multiple routers can provide
resilient gateway functionality to hosts at the Layer 2/Layer 3 boundaries.
▪ Network Address Translation (NAT): This section explains how a router can translate IP addresses
from one network realm to another.
In addition to routing and switching network packets, a router can perform additional functions to enhance a
network. This chapter covers time synchronization, virtual Gateway technologies, and Network Address
Translation.
2 By Justin O. OLANGI
II. NETWORK TIME PROTOCOL LAB
A device’s system time is used to measure periods of idle state or computation. Ensuring that the time is
consistent on a system is important because applications often use the system time to tune internal
processes.
From the perspective of managing a network, it is important that the time be synchronized between network
devices for several reasons:
For more details about NTP, see the Cisco CCNP ENCOR course.
3 By Justin O. OLANGI
III. NTP CONFIGURATION
The configuration of an NTP client is pretty straightforward. The client configuration uses the global
configuration command ntp server ip-address [prefer] [source interface-id]. The source interface, which is
optional, is used to stipulate the source IP address for queries for that server.
Multiple NTP servers can be configured for redundancy, and adding the optional prefer keyword indicates
which NTP server time synchronization should come from.
Cisco devices can act as a server after they have been able to query an NTP server.
III.1 Build the Network and Configure Basic Device Settings and Interface Addressing
a. R1
Router(config)# hostname R1
R1(config)# ip domain lookup source-interface g0/0
R1(config)# ip name-server 8.8.8.8 8.8.4.4
R1(config)# ip domain name ccnp.lab.nt
4 By Justin O. OLANGI
R1(config)# interface g0/2.20
R1(config-if)# description DEFAULT-GATEWAY-VLAN20
R1(config-if)# encapsulation dot1q 20
R1(config-if)# ip address 172.16.20.1 255.255.255.0
R1(config-if)# exit
R1(config)# interface g0/2
R1(config-if)# no shut
R1(config-if)# exit
b. R2
Router(config)# hostname R2
R2(config)# ip domain lookup source-interface g0/0
R2(config)# ip name-server 8.8.8.8 8.8.4.4
R2(config)# ip domain name ccnp.lab.nt
5 By Justin O. OLANGI
R2(config-if)# ip address 172.16.20.2 255.255.255.0
R2(config-if)# exit
c. SW1
Switch(config)# hostname SW1
SW1(config)# ip domain lookup source-interface vlan 1
SW1(config)# ip name-server 8.8.8.8 8.8.4.4
SW1(config)# ip domain name ccnp.lab.nt
SW1(config)# vlan 10
SW1(config-vlan)# name Users10
SW1(config-vlan)# exit
SW1(config)# vlan 20
SW1(config-vlan)# name Users20
SW1(config-vlan)# exit
6 By Justin O. OLANGI
SW1(config)# interface g0/0
SW1(config-if)# switchport trunk encapsulation dot1q
SW1(config-if)# switchport mode trunk
SW1(config-if)# switchport trunk allowed vlan 1,10,20
SW1(config-if)# switchport trunk native vlan 1
SW1(config-if)# switchport nonegotiate
SW1(config-if)# exit
c. SW2
Switch(config)# hostname SW2
SW2(config)# ip domain lookup source-interface vlan 1
SW2(config)# ip name-server 8.8.8.8 8.8.4.4
SW2(config)# ip domain name ccnp.lab.nt
SW2(config)# vlan 10
SW2(config-vlan)# name Users10
SW2(config-vlan)# exit
SW2(config)# vlan 20
SW2(config-vlan)# name Users20
SW2(config-vlan)# exit
7 By Justin O. OLANGI
SW2(config)# interface g0/0
SW2(config-if)# switchport trunk encapsulation dot1q
SW2(config-if)# switchport mode trunk
SW2(config-if)# switchport trunk allowed vlan 1,10,20
SW2(config-if)# switchport trunk native vlan 1
SW2(config-if)# switchport nonegotiate
SW2(config-if)# exit
III.2.1 Configure
a. R1
R1(config)# clock timezone WAT +1
R1(config)# ntp server ntp2.ispa-drc.cd prefer Will be selected
R1(config)# ntp server ntp1.ispa-drc.cd
R1(config)# ntp server 1.1.1.1
b. R2
R1(config)# clock timezone WAT +1
R1(config)# ntp server ntp2.ispa-drc.cd
R1(config)# ntp server ntp1.ispa-drc.cd prefer Will be selected
R1(config)# ntp server 1.1.1.1
III.2.1 Verify
a. R1
8 By Justin O. OLANGI
b. R2
III.3.1 Configure
a. R1
R1(config)# interface g0/2.1
R1(config-if)# ntp broadcast destination 172.16.1.255 VLAN 1 Broadcast
R1(config-if)# exit IP address
b. R2
R2(config)# interface g0/2.1
VLAN 1 Broadcast
R2(config-if)# ntp broadcast destination 172.16.1.255
R2(config-if)# exit IP address
c. SW1
SW1(config)# interface vlan 1
SW1(config-if)# ntp broadcast client
SW1(config-if)# exit
d. SW2
SW2(config)# interface vlan 1
SW2(config-if)# ntp broadcast client
SW2(config-if)# exit
a. R1
R1(config)# ntp peer 10.0.0.2 Neighbor IP address
b. R2
R2(config)# ntp peer 10.0.0.1 Neighbor IP address
9 By Justin O. OLANGI
III.4.2 Configure between SW1 and SW2
c. SW1
SW1(config)# ntp peer 172.16.1.4 Neighbor IP address
b. SW2
SW2(config)# ntp peer 172.16.1.3 Neighbor IP address
PC1> show ip
NAME : PC1[1]
IP/MASK : 172.16.20.10/24
GATEWAY : 172.16.20.2
DNS : 8.8.8.8 8.8.4.4
DHCP SERVER : 172.16.20.2
DHCP LEASE : 85472, 86400/43200/75600
MAC : 00:50:79:66:68:06
LPORT : 20000
RHOST:PORT : 127.0.0.1:30000
MTU : 1500
PC1>
10 By Justin O. OLANGI
Ping from PC1 to 192.168.106.183
The deployment of first-hop redundancy protocols (FHRPs) solves the problem of hosts configuring multiple
gateways. FHRPs work by creating a virtual IP (VIP) Gateway instance that is shared between the Layer 3
devices. This book covers the following FHRPs:
11 By Justin O. OLANGI
IV. HOT STANDBY ROUTER PROTOCOL LAB
Hot Standby Routing Protocol (HSRP) is a Cisco proprietary protocol that provides transparent failover of
the first-hop device, which typically acts as a gateway to the hosts.
HSRP provides routing redundancy for IP hosts on an Ethernet network configured with a default gateway
IP address. A minimum of two devices are required to enable HSRP: One device acts as the active device
and takes care of forwarding the packets, and the other acts as a standby that is ready to take over the role
of active device in the event of a failure.
For more details about HSRPv2 and HSRPv3, see the Cisco CCNP ENCOR course.
12 By Justin O. OLANGI
V. HSRP CONFIGURATION
The following steps show how to configure an HSRP virtual IP (VIP) gateway instance:
Step 1. Define the HSRP instance by using the command standby instance-id ip vip-address.
Step 2. (Optional) Configure HSRP router preemption to allow a more preferred router to take the active
router status from an inferior active HSRP router. Enable preemption with the command standby instance-id
preempt.
Step 3. (Optional) Define the HSRP priority by using the command standby instance-id priority priority. The
priority is a value between 0 and 255.
Step 4. Define the HSRP MAC Address (Optional). The MAC address can be set with the command standby
instance-id macaddress mac-address. Most organizations accept the automatically generated MAC address,
but in some migration scenarios, the MAC address needs to be statically set to ease transitions when the
hosts may have a different MAC address in their ARP table.
Step 5. (Optional) Define the HSRP timers by using the command standby instance-id timers {seconds |
msec milliseconds}. HSRP can poll in intervals of 1 to 254 seconds or 15 to 999 milliseconds.
V.1 Build the Network and Interface Addressing for our HSRP Implementation
We're going to keep the previous configuration on interfaces, IP address, NTP, EtherChannel, but we'll
modify the Default Gateway on the switches and the DHCP server with a new default address.
a. R1
R1(config)# ip dhcp pool VLAN 20
R1(config-dhcp)# network 172.16.20.0 255.255.255.0
R1(config-dhcp)# no default-router 172.16.20.2
R1(config-dhcp)# default-router 172.16.20.3
R1(config-dhcp)# dns-server 8.8.8.8 8.8.4.4
R1(config-dhcp)# ip dhcp excluded-address 172.16.20.1 172.16.20.9
b. R2
R2(config)# ip dhcp pool VLAN 10
R2(dhcp-config)# network 172.16.10.0 255.255.255.0
R2(dhcp-config)# no default-router 172.16.10.1
R2(dhcp-config)# default-router 172.16.10.3
R2(dhcp-config)# dns-server 8.8.8.8 8.8.4.4
R2(dhcp-config)# ip dhcp excluded-address 172.16.10.1 172.16.10.9
13 By Justin O. OLANGI
c. SW1
SW1(config)# no ip default-gateway 172.16.1.1
SW1(config)# ip default-gateway 172.16.1.254
d. SW2
SW2(config)# no ip default-gateway 172.16.1.1
SW2(config)# ip default-gateway 172.16.1.254
a. R1
R1(config)# interface g0/2.1
R1(config-if)# standby version 2
R1(config-if)# standby 1 ip 172.16.1.254
R1(config-if)# standby 1 priority 200
R1(config-if)# standby 1 preempt
b. R2
R2(config)# interface g0/2.1
R2(config-if)# standby version 2
R2(config-if)# standby 1 ip 172.16.1.254
R2(config-if)# standby 1 priority 150
R2(config-if)# standby 1 preempt
14 By Justin O. OLANGI
R2(config-if)# standby 1 priority 200
R2(config-if)# standby 1 preempt
a. R1
b. R2
To ensure optimal traffic flow when a WAN link goes down, in our case these are GigabitEthernet interfaces
0/0 for R1 and R2, it would be nice to be able to determine the availability of routes or the interface state to
which FHRP route traffic is directed.
Object tracking offers a flexible and customizable mechanism for linking with FHRPs and other routing
components (for example, conditional installation of a static route). With this feature, users can track specific
objects in the network and take necessary action when any object’s state change affects network traffic.
Tracking of routes in the routing table is accomplished with the command track object number ip route
route/prefix-length reachability. The status object tracking can be viewed with the command show track
[object-number].
15 By Justin O. OLANGI
a. R1 : Track interface G0/0 Line Protocol State, Static route reachability
R1(config)# track 1 interface g0/0 line-protocol
R1(config-track)# track 2 ip route 0.0.0.0/0 reachability
R1(config-track)# track 3 ip route 1.1.1.1/32 reachability
R1(config-track)# exit
16 By Justin O. OLANGI
c. R1 : Apply the tracking in HSRP
R2(config)#int g0/0
R2(config-if)#shut
R2(config-if)#
.Nov 26 11:55:13.111: %TRACK-6-STATE: 1 interface Gi0/0 line-protocol Up -> Down
.Nov 26 11:55:27.625: %TRACK-6-STATE: 2 ip route 0.0.0.0/0 reachability Up -> Down
.Nov 26 11:55:27.625: %TRACK-6-STATE: 3 ip route 1.1.1.1/32 reachability Up -> Down
R2(config-if)#
R2(config-if)#
.Nov 26 11:55:26.238: %HSRP-5-STATECHANGE: GigabitEthernet0/2.20 Grp 1 state Speak -> Standby
R2(config-if)#
R2(config-if)#do show standby br
P indicates configured to preempt.
|
Interface Grp Pri P State Active Standby Virtual IP
Gi0/2.1 1 150 P Standby 172.16.1.1 local 172.16.1.254
Gi0/2.10 1 150 P Standby 172.16.10.1 local 172.16.10.3
Gi0/2.20 1 0 P Standby 172.16.20.1 local 172.16.20.3
R2(config-if)#
R1 is now in Active mode for VLAN 20 because R2's priority for VLAN 20 has been changed to 0
17 By Justin O. OLANGI
PC1>
PC1> ping 192.168.106.183 -t
a. R1
b. R2
18 By Justin O. OLANGI
R2(config)#do show standby
GigabitEthernet0/2.20 - Group 1 (version 2)
State is Active
17 state changes, last state change 00:00:39
Virtual IP address is 172.16.20.3
Active virtual MAC address is 0000.0c9f.f001
Local virtual MAC address is 0000.0c9f.f001 (v2 default)
Hello time 1 sec, hold time 3 sec
Next hello sent in 0.432 secs
Authentication MD5, key-string
Preemption enabled
Active router is local
Standby router is 172.16.20.1, priority 150 (expires in 3.296 sec)
Priority 200 (configured 200)
Track object 1 state Up decrement 100
Track object 2 state Up decrement 100
Track object 3 state Up decrement 100
Group name is "hsrp-Gi0/2.20-1" (default)
R2(config)#
19 By Justin O. OLANGI
VI. VIRTUAL ROUTER REDUNDANCY PROTOCOL
Virtual Router Redundancy Protocol (VRRP) is an industry standard and operates similarly to HSRP. The
behavior of VRRP is so close to that of HSRP that the following différences should be noted:
▪ The preferred active router controlling the VIP gateway is called the master router. All other VRRP
routers are known as backup routers.
▪ VRRP enables preemption by default.
▪ The MAC address of the VIP gateway uses the structure 0000.5e00.01xx, where xx reflects the group
ID in hex.
▪ VRRP uses the multicast address 224.0.0.18 for communication.
For more details about VRRP, see the Cisco CCNP ENCOR course.
20 By Justin O. OLANGI
VII. VRRP CONFIGURATION
VII.1 Legacy VRRP Configuration
Early VRRP configuration supported only VRRPv2 and was non-hierarchical in its configuration. The
following steps are used for configuring older software versions with VRRP:
Step 1. Define the VRRP instance by using the command vrrp instance-id ip vip-address.
Step 2. (Optional) Define the VRRP priority by using the command vrrp instance-id priority priority. The
priority is a value between 0 and 255.
Step 3. (Optional) Enable object tracking so that the priority is decremented when the object is false. Do so
by using the command vrrp instance-id track object-id decrement decrement-value. The decrement value
should be high enough so that when it is removed from the priority, the value is lower than that of the other
VRRP router.
Step 4. (Optional) Establish VRRP authentication by using the command vrrp instance-id authentication
{text-password | text text-password | md5 {key-chain key-chain | key-string key-string}}.
The newer version of IOS XE software provides configuration of VRRP in a multi-address format that is
hierarchical. The steps for configuring hierarchical VRRP are as follows:
Step 1. Enable VRRPv3 on the router by using the command fhrp version vrrp v3.
Step 2. Define the VRRP instance by using the command vrrp instance-id addressfamily {ipv4 | ipv6}. This
places the configuration prompt into the VRRP group for additional configuration.
Step 3. (Optional) Change VRRP to Version 2 by using the command vrrpv2. VRRPv2 and VRRPv3 are not
compatible.
Step 4. Define the gateway VIP by using the command address ip-address.
Step 5. (Optional) Define the VRRP priority by using the command priority priority. The priority is a value
between 0 and 255.
Step 6. (Optional) Enable object tracking so that the priority is decremented when the object is false. Do so
by using the command track object-id decrement decrement-value. The decrement value should be high
enough so that when it is removed from the priority, the value is lower than that of the other VRRP router.
21 By Justin O. OLANGI
In this lab we have chosen the second configuration: Hierarchical VRRP Configuration.
VII.3 Build the Network and Interface Addressing for our VRRP Implementation
We're going to keep the previous configuration on interfaces, IP address, NTP, EtherChannel, but we'll
modify the Default Gateway on the switches and the DHCP server with a new default address.
a. R1
R1(config)# interface g0/2.1
R1(config-if)# no standby version 2
R1(config-if)# no standby 1 ip 172.16.1.254
R1(config-if)# no standby 1 priority 150
R1(config-if)# no standby 1 preempt
R1(config-if)# no standby 1 authentication md5 key-string Encor@123
R1(config-if)# no standby 1 timers 1 3
R1(config-if)# no standby 1 track 1 decrement 100
R1(config-if)# no standby 1 track 2 decrement 100
R1(config-if)# no standby 1 track 3 decrement 100
R1(config-if)# exit
b. R2
R2(config)# interface g0/2.1
R2(config-if)# no standby version 2
R2(config-if)# no standby 1 ip 172.16.1.254
R2(config-if)# no standby 1 priority 150
R2(config-if)# no standby 1 preempt
R2(config-if)# no standby 1 authentication md5 key-string Encor@123
22 By Justin O. OLANGI
R2(config-if)# no standby 1 timers 1 3
R2(config-if)# exit
a. R1
R1(config)# fhrp version vrrp v3
23 By Justin O. OLANGI
R1(config)# int g0/2.20
R1(config-if)# vrrp 1 address-family ipv4
R1(config-if-vrrp)# address 172.16.20.3
R1(config-if-vrrp)# priority 150
R1(config-if-vrrp)# exit
R1(config-if)# exit
b. R2
R1(config)# fhrp version vrrp v3
a. R1
24 By Justin O. OLANGI
b. R2
R2#show vrrp br
Interface Grp A-F Pri Time Own Pre State Master addr/Group addr
Gi0/2.1 1 IPv4 150 3414 N Y BACKUP 172.16.1.1 172.16.1.254
Gi0/2.10 1 IPv4 150 3414 N Y BACKUP 172.16.10.1 172.16.10.3
Gi0/2.20 1 IPv4 200 0 N Y MASTER 172.16.20.2(local) 172.16.20.3
R2#
25 By Justin O. OLANGI
VIII. GATEWAY LOAD BALANCING PROTOCOL
As the name suggests, Gateway Load Balancing Protocol (GLBP) provides gateway redundancy and load-
balancing capability to a network segment. It provides redundancy with an active/standby gateway, and it
provides load-balancing capability by ensuring that each member of the GLBP group takes care of forwarding
the traffic to the appropriate gateway.
▪ Active virtual gateway (AVG): The participating routers elect one AVG per GLBP group to respond
to initial ARP requests for the VIP. For example, when a local PC sends an ARP request for the VIP,
the AVG is responsible for replying to the ARP request with the virtual MAC address of the AVF.
▪ Active virtual forwarder (AVF): The AVF routes traffic received from assigned hosts. A unique
virtual MAC address is created and assigned by the AVG to the AVFs. The AVF is assigned to a host
when the AVG replies to the ARP request with the assigned AVF’s virtual MAC address. ARP replies
are unicast and are not heard by other hosts on that broadcast segment. When a host sends traffic
to the virtual AVF MAC, the current router is responsible for routing it to the appropriate network. The
AVFs are also recognized as Fwd instances on the routers.
GLBP supports four active AVFs and one AVG per GLBP group. A router can be an AVG and an AVF at the
same time. In the event of a failure of the AVG, there is not a disruption of traffic due to the AVG role
transferring to a standby AVG device. In the event of a Failure of an AVF, another router takes over the
forwarding responsibilities for that AVF, which includes the virtual MAC address for that instance.
For more details about GLBP, see the Cisco CCNP ENCOR course.
26 By Justin O. OLANGI
IX. GLBP CONFIGURATION
The following steps detail how to configure a GLBP:
Step 1. Define the GLBP instance by using the command glbp instance-id ip vip-address.
Step 2. (Optional) Configure GLBP preemption to allow for a more preferred router to take the active virtual
gateway status from an inferior active GLBP router. Preemption is enabled with the command glbp instance-
id preempt.
Step 3. (Optional) Define the GLBP priority by using the command glbp instance-id priority priority. The
priority is a value between 0 and 255.
Step 4. (Optional) Define the GLBP timers by using the command glbp instance-id timers {hello-seconds |
msec hello-milliseconds} {hold-seconds | msec hold-milliseconds}.
Step 5. (Optional) Establish GLBP authentication by using the command glbp instance-id authentication
{text text-password | md5 {key-chain key-chain | key-string key-string}}.
IX.1 Build the Network and Interface Addressing for our GLBP Implementation
We're going to keep the previous configuration on interfaces, IP address, NTP, EtherChannel, but we'll
modify the Default Gateway on the switches and the DHCP server with a new default address.
a. R1
R1(config)# interface g0/2.1
R1(config-if)# no vrrp 1 address-family ipv4
R1(config-if)# exit
27 By Justin O. OLANGI
b. R2
R2(config)# interface g0/2.1
R2(config-if)# no vrrp 1 address-family ipv4
R2(config-if)# exit
a. R1
R1(config)# int g0/2.1
R1(config-if)# glbp 1 priority 200
R1(config-if)# glbp 1 ip 172.16.1.254
R1(config-if)# glbp 1 preempt
R1(config-if)# glbp 1 timers 1 3
R1(config-if)# glbp 1 authentication md5 key-string Encor@123
R1(config-if)# glbp 1 load-balancing weighted
R1(config-if)# glbp 1 weight 200 lower 110 upper 190
R1(config-if)# glbp 1 weight track 1 decrement 100
R1(config-if)# glbp 1 weight track 2 decrement 100
R1(config-if)# glbp 1 weight track 3 decrement 100
R1(config-if)# exit
28 By Justin O. OLANGI
R1(config)# int g0/2.20
R1(config-if)# glbp 3 priority 150
R1(config-if)# glbp 3 ip 172.16.20.3
R1(config-if)# glbp 3 preempt
R1(config-if)# glbp 3 timers 1 3
R1(config-if)# glbp 3 authentication md5 key-string Encor@123
R1(config-if)# glbp 3 load-balancing weighted
R1(config-if)# glbp 3 weight 110 lower 85 upper 105
R1(config-if)# glbp 3 weight track 1 decrement 100
R1(config-if)# glbp 3 weight track 2 decrement 100
R1(config-if)# glbp 3 weight track 3 decrement 100
R1(config-if)# exit
b. R2
R2(config)# int g0/2.1
R2(config-if)# glbp 1 priority 150
R2(config-if)# glbp 1 ip 172.16.1.254
R2(config-if)# glbp 1 preempt
R2(config-if)# glbp 1 timers 1 3
R2(config-if)# glbp 1 authentication md5 key-string Encor@123
R2(config-if)# glbp 1 load-balancing weighted
R2(config-if)# glbp 1 weight 110 lower 85 upper 105
R2(config-if)# glbp 1 weight track 1 decrement 100
R2(config-if)# glbp 1 weight track 2 decrement 100
R2(config-if)# glbp 1 weight track 3 decrement 100
R2(config-if)# exit
29 By Justin O. OLANGI
IX.2.2 Verify GLBP
a. R1
R1 is the AVG Active for VLAN 1 and VLAN 10 priority 200 to respond to initial ARP requests for the VIP.
R1 is AVF Active for all VLAN and routes traffic received from assigned hosts for load balancing.
b. R2
R2 is the AVG Active for VLAN 20 priority 200 to respond to initial ARP requests for the VIP.
R2 is AVF Active for all VLAN and routes traffic received from assigned hosts for load balancing.
30 By Justin O. OLANGI
31 By Justin O. OLANGI
X. NAT CONFIGURATION
Four important terms are related to NAT:
▪ Inside local: The actual private IP address assigned to a device on the inside network(s).
▪ Inside global: The public IP address that represents one or more inside local IP addresses to the
outside.
▪ Outside local: The IP address of an outside host as it appears to the inside network. The IP address
does not have to be reachable by the outside but is considered private and must be reachable by the
inside network.
▪ Outside global: The public IP address assigned to a host on the outside network. This IP address
must be reachable by the outside network.
▪ Static NAT: Provides a static one-to-one mapping of a local IP address to a global IP address.
▪ Pooled NAT: Provides a dynamic one-to-one mapping of a local IP address to a global IP address.
The global IP address is temporarily assigned to a local IP address. After a certain amount of idle
NAT time, the global IP address is returned to the pool.
▪ Port Address Translation (PAT): Provides a dynamic many-to-one mapping of many local IP
addresses to one global IP address. The NAT device needs a mechanism to identify the specific
private IP address for the return network traffic. The NAT device translates the private IP address
and port to a different global IP address and port. The port is unique from any other ports, which
enables the NAT device to track the global IP address to local IP addresses based on the unique port
mapping.
We're going to keep the previous configuration on interfaces, IP address, NTP, EtherChannel, but we'll
modify the Default Gateway on the switches and the DHCP and GLBP.
a. R1
R1(config)# access-list 10 permit 172.16.0.0 0.0.255.255
R1(config)# ip nat inside source list 10 interface g0/0 overload
32 By Justin O. OLANGI
R1(config)# interface g0/2.1
R1(config-if)# ip nat inside
R1(config-if)# exit
b. R2
R2(config)# access-list 10 permit 172.16.0.0 0.0.255.255
R2(config)# ip nat inside source list 10 interface g0/0 overload
a. R1
33 By Justin O. OLANGI
b. R2
34 By Justin O. OLANGI
XI. REVIEW
XI.1 HSRP Review (Cisco)
HSRPv1 HSRPv2
Timers Does not support millisecond Supports millisecond timer
timer values values
Group range 0 to 255 0 to 4095
Multicast address 224.0.0.2 224.0.0.102
MAC address range 0000.0C07.ACxy, where xy is a 0000.0C9F.F000 to
hex value representing the 0000.0C9F.FFFF
HSRP group number
Internet Protocol IPv4 IPv4 and IPv6
VRRPv2 VRRPv3
Timers Does not support millisecond Supports millisecond timer
timer values values
Group range 0 to 255 0 to 4095
Multicast address 224.0.0.18 224.0.0.18
MAC address range 0000.5e00.01xx 0000.5e00.01xx (IPv4)
0000.5e00.02xx (IPv6)
Internet Protocol IPv4 IPv4 and IPv6
GLBPv1 GLBPv2
Group range 0 to 1023 0 to 4095
Multicast address 224.0.0.102 224.0.0.102
MAC address range 0007.b4xx.xxyy 0007.b4xx.xxyy
0007.b6xx.xxyy
Internet Protocol IPv4 IPv4 and IPv6
35 By Justin O. OLANGI