CCNA-Bootcamp Lab Tasks
CCNA-Bootcamp Lab Tasks
Lab Tasks
ine.com
Base Topology Diagram
Lab Guidelines
ine.com
Base Topology Diagram
Lab Objectives (Wireshark)
ine.com
Topology Diagram
Lab Tasks (TCP Capture & Display)
ine.com
Topology Diagram
A B G
L
C H K
TBD D J
E
Lab IPv4 Addressing (Basic IOS Commands)
1. Connect to device CSR1 and use the “config replace” command to load
the configuration “IOS-Basics” from Flash memory.
a) To confirm that your “config replace” command worked, issue a command
to confirm that at least one interface on this device now has an IPv4
address configured
b) Confirm that this device now has an enable-secret password of “cisco”
2. Repeat the same steps above on devices R1 and R3
3. Confirm that (from within the CLI of CSR1) you can now ping R1s IP
address (on Segment-B) and R3’s IP address (on Segment-D).
4. Save your Running-Config to your Startup-Config on these devices
Note that without IPv4 routing enabled, devices can only ping IPv4
addresses at the other end of their directly-connected cables.
Lab Tasks (Cisco IOS Basics)
Note that without IPv4 routing enabled, devices can only ping IPv4
addresses at the other end of their directly-connected cables.
Lab Tasks (Cisco IOS Basics)
8. Login to device CSR2 and configure it with the same parameters you
used on R2 (except IP addresses and hostname should be different).
9. Configure CSR2 such that it will accept incoming Telnet requests so
long as the requestor supplies the following credentials:
a. Username = INE
b. Password = cisco
10.Verify your configuration by:
a. Successfully pinging R1, R2 and R3 from CSR2
b. Telnetting to CSR2 from R2
11.Save your Running-Config to your Startup-Config
Lab Tasks (Cisco IOS Basics)
12.Login to device R4 and configure it with the same parameters you used
on R2 & CSR2 (except IP addresses and hostname should be different).
13.Configure R4 such that it will accept incoming SSH requests so long as
the requestor supplies the following credentials:
a. Username = INE
b. Password = cisco
You may use whatever domain-name you wish but ensure your RSA keysize is 1024-bits.
16.On any IOS-based device in your topology, see if you can issue various
IOS commands that:
a. Display the contents of the configuration file currently in-use
b. Display the contents of the saved configuration file that will be loaded upon
the next reload of the device
c. Display a summary of every interface on the device, the interface naming
convention, interface state, and if any IP addresses have been configured
Thanks For
Participating!
Lab Task
Introduction To Cisco Switching
ine.com
Topology Diagram
VLAN-2
VLAN-3
802.1q (DTP)
802.1q (static)
V.2
VLAN-2
VLAN-3
802.1q (DTP)
V.3
V.3 VLAN-2
VLAN-3
Lab Tasks (Intro To Switching)
8. Login to switches Sw1 and Sw2 and create VLANS-2, and 3 on those
switches as well
a. Apply the same names to these VLANs as you did on Sw3
b. Also disable all interfaces that are not a part of the topology diagram
9. Both Sw2 and Sw3 should have Layer-3 management interfaces
(SVIs) for VLAN-2 using the following IPv4 addresses:
a. Sw2: 2.2.2.2 255.255.255.0
b. Sw3: 2.2.2.3 255.255.255.0
c. Ensure these interfaces are administratively “Up”
Lab Tasks (Intro To Switching)
ine.com
Topology Diagram
VLAN-2 (Root)
VLAN-3 (Secondary Root)
VLAN-2
VLAN-3
V.3
V.3
6. Ensure that from Sw1 you can ping all of the IPv4 addresses on Sw2
and Sw3. If these pings don’t work…troubleshoot and resolve the
problem(s).
7. Bundle both links connecting Sw1 and Sw2 into a Layer-2
Etherchannel using Cisco’s PAgP to form the channel.
a. Use channel-group number “1” in your configuration
b. Sw1 should initiate the PAgP frame exchange
8. Bundle both links connecting Sw2 and Sw3 into a Layer-2
Etherchannel using the IEEE’s LACP to form the channel.
a. Use channel-group number “2” in your configuration
b. Sw2 should initiate the LACP frame exchange
Lab Tasks (RSTP & Etherchannels)
ine.com
Topology Diagram
DHCP Server
.2
11.11.11.0/24
DHCP Relay
.1
3.3.3.11/24
Vlan-3
Vlan-3
DHCP Client
Lab Tasks (Implementing & Viewing DHCP)
5. On your Ubuntu host, start the Wireshark application, capturing all frames on
the ENS-192 connection (which connects Ubuntu to Sw3)
6. Move to R3 and:
a. Shutdown interface Gigabit0/1
b. Configure its Gigabit0/1 interface as a DHCP client
c. Enable interface Gigabit0/1
7. All of the DHCP transactions between the DHCP Client (R3) and the DHCP
Server (R1) should have been captured and viewable via Wireshark on the
Ubuntu host. View those packets now.
8. After a DHCP address has been allocated to R3, go back to R1 (the IOS DHCP
Server) and familiarize yourself with the output of “show ip dhcp binding”
Lab Tasks (Implementing & Viewing DHCP)
ine.com
Topology Diagram
DHCP Server
.2
11.11.11.0/24
DHCP Relay
.1
3.3.3.11/24
Vlan-3
Vlan-3
DHCP Client
Lab Tasks (Port Security)
1. On devices R3 and Sw3, use the “config replace” command to load the
configuration titled, “Port-Security” from flash memory.
2. Enable Port-Security on interface Gigabit0/1 of Sw3 with only a single
command.
a. Familiarize yourself with the output of the command, “show port-security”
b. Familiarize yourself with the output of the command, “show port-security interface
Gigabit0/1”
3. Open a second Telnet window (so you can watch R3 and Sw3 simultaneously)
and move to R3 and change the mac address of interface Gigabit0/1 on this
device to 00bb.bbbb.bbbb
a. Did you see any SYSLOG messages in Sw3 as a result of the action you just took on
R3?
b. View the output again of the commands in step-2a and 2b above and notice the
“Port Status” and “Last Source Address” fields.
Lab Tasks (Port Security)
10.Move back to R3 and change its MAC address again, this time to
00dd.dddd.dddd
a. From R3 ping the default-gateway address of 3.3.3.11 again. This time (because
Sw3 is seeing a third incoming MAC address) this should cause a violation and the
ping should fail.
b. View the output of “show port-security interface gigabit0/1” and notice the “Port
Status” is “Secure-up” but you DO see the third MAC address that was dropped.
Thanks For
Participating!
Lab Task
DHCP Snooping & Dynamic ARP Inspection
ine.com
Topology Diagram
DHCP Server
.2
11.11.11.0/24
DHCP Relay
.1
ROGUE
DHCP Server
3.3.3.11/24
Vlan-3
Vlan-3
DHCP Client
Lab Tasks (DHCP Snooping)
1. On the following devices, use the “config replace” command to load the
configuration titled, “Snoop-Inspect” from flash memory:
a. Sw1
b. Sw3
c. R1
d. R3
e. CSR1
Lab Tasks (DHCP Snooping)
8. Configure DHCP Snooping on Sw3 in such a way that the the Rogue DHCP
Server is rendered powerless but DHCP transactions can still occur to/from the
legitimate DHCP Server.
***NOTE: Remember to disable Sw1 from adding Option-82 (the “Information Option”) to
DHCP messages.
11.From R3, ensure it can still ping the IPv4 address it received via DHCP as its
Default-Gateway (3.3.3.11)
12.Move over to device Sw1 and do the following:
a. Remove the Rogue DHCP Pool
b. Reconfigure interface VLAN 3 with the correct IPv4 address (3.3.3.1 /24)
c. Ensure that from Sw1 you can ping CSR1 at 3.3.3.11
13.Ensure you have at least two Telnet windows open so you can view the output
of Sw1 and Sw3 simultaneously.
Lab Tasks (Dynamic ARP Inspection)
16.Notice that even with Dynamic ARP Inspection enabled on Sw3, pings from R3
to 3.3.3.11 should still be successful:
14. This is because DAI can validate the legitimacy of R3 via the DHCP Snooping
Binding Table. No such validation is possible for Sw1 which has a static IPv4
address.
17.Using an interface-level command (related to Dynamic ARP Inspection) on
Sw3, make it possible for Sw1 to ping CSR1 (at 3.3.3.11)
Lab Tasks (Dynamic ARP Inspection)
ine.com
Topology Diagram
E
C H
1. On the following devices, use the “config replace” command to load the
configuration titled, “Routing-Basics” from flash memory:
+ Sw3
+ CSR1
+ R2
Lab Tasks (Routing Basics)
7. Provide the Ubuntu host IPv4 static routes it will need to accomplish the rest of
this lab using the following commands within the Terminal app:
a. sudo route add –net 3.3.3.0/24 gw 192.168.1.254 ens224
b. sudo route add –net 21.21.21.0/24 gw 192.168.1.254 ens224
c. sudo route add –net 22.22.22.0/24 gw 192.168.1.254 ens224
8. Confirm that your routes are now in the routing table of the Ubuntu host by
viewing the output of the “route” command like you did previously.
9. From the Terminal app of the Ubuntu host, attempt the following:
a. Ping the IPv4 address of 3.3.3.3 assigned to interface VLAN-3 on Sw3. This ping
should now succeed because Ubuntu has a route to it.
Lab Tasks (Routing Basics)
10.Your objective is to be able to ping from the Ubuntu host to the IPv4 address
configured on interface Gigabit0/0 of R2. In order to accomplish this, configure
IPv4 static routes in devices Sw3, CSR1 and R2 using the following guidelines:
a. Sw3 and CSR1 should contain one-or-more routes to specific destination prefixes
with a mask of /24 and an IPv4 address as the next-hop for those routes.
b. R2 should contain a single static, default route so that it can reply to traffic sourced
from the Ubuntu host.
11.Configure device R2 as an HTTP server with the following commands:
R2(config)#username Test privilege 15 password Test
R2(config)#ip http server
R2(config)#ip http authentication local
Lab Tasks (Routing Basics)
12.Open a web browser in the Ubuntu box and browse to the web interface of R2
at http://22.22.22.2
13.Familiarize yourself with the basic Web GUI that IOS provides.
Lab Tasks (Routing Basics)
14.Open Wireshark on the Ubuntu box and start capturing packets on the ENS-
224 interface (connected to Gigabit0/1 on Sw3).
a. If your HTTP session to R2 is no longer running, start it up again.
b. Capture several packets associated with this HTTP session to R2
15.Answer the following questions about the packets you captured?
a. What was the initial TTL value of these packets? ___________
b. What were the Layer-2 source and destination MAC addresses?
L2 Src =_________________________ L2 Dest=_______________________________
c. What were the Layer-3 source and destination IPv4 addreses?
L3 Src =_________________________ L2=3 Dest=_______________________________
Lab Tasks (Routing Basics)
16.Stop your Wireshark capture of ENS-224 and turn it on again, this time
capturing packets on the ENS-192 interface. You should still be capturing
packets related to your web-browsing session to R2’s GUI.
17.Answer the following questions about the packets you captured?
a. Did the TTL value of these packets change as they were routed by Sw3?
___________
b. Did the Layer-2 source and destination MAC addresses change as they were
transmitted by Sw3?
L2 Src =_________________________ L2 Dest=_____________________________
c. Did the Layer-3 source and destination IPv4 addreses change as they were
transmitted by Sw3?
L3 Src =_________________________ L2=3 Dest=___________________________
18.Stop your wireshark capture and close your web browser on the Ubuntu box.
Thanks For
Participating!
CCNA 200-301 Bootcamp
IPv6 Basics
ine.com
Topology Diagram
Segment-A Segment-B
200a:1111:2222:aaaa::/64 200a:ffff:dddd:eeee::/64
Gig1/0 Gig5 Gig2 Gig0/1
Sw3 CSR1 R2
1. On the following devices, use the “config replace” command to load the
configuration titled, “IPv6-Basics” from flash memory:
+ Sw3
+ CSR1
+ R2
Lab Tasks (IPv6 Basics)
4. On R2, configure a static IPv6 route so that it has reachability to all IPv6
addresses on Segment-A.
5. Verify that your IPv6 static route is correct by:
a. Viewing the IPv6 Routing Table on R2
b. IPv6 Telnetting from R2 to CSR1’s IPv6 address on Segment-A
Lab Tasks (IPv6 Basics)
6. On the Ubuntu host, enable the Wireshark application and start capturing on
interface ENS-192
7. Move over to Sw3 and do the following:
a. Disable interface Gigabit1/0
b. Convert interface Gigabit1/0 into a routed port
c. Configure interface Gigabit1/0 to obtain an IPv6 address via SLAAC
d. Enable interface Gigabit1/0
8. On the Ubuntu host, watch the IPv6 Neighbor Discovery (and SLAAC) process
via the packets you captured on Wireshark
NOTE: If Sw3 doesn’t receive the IPv6 packets you expected from CSR1 remember
that there is an IPv6-related Global Configuration command on CSR1 to enable it to
respond to the SLAAC process on Sw3
Lab Tasks (IPv6 Basics)
ine.com
Topology Diagram
A B L G
E
F
C H
Lab Tasks (OSPF Routing)
1. Use the “config replace” command to load the configuration titled, “OSPF-
Routing” from flash memory on all devices shown in the topology diagram.
2. Configure OSPFv2 (for IPv4) on all devices with links in OSPF Area-51 using
the following guidelines (read through ALL guidelines on all slides prior to
implementing any configuration):
a) Devices CSR2 and R1 should have OSPF activated on their networks via interface-
level commands
b) Devices CSR1 and R2 should have OSPF activated on their networks via OSPF
“network” commands utilizing wildcard masks that match the length of their
networks.
Lab Tasks (OSPF Routing)
f) Notice that all OSPF routes in the table are currently “Intra Area” routes as denoted by the “O”
preceding them.
g) Modify OSPF cost values on whichever links you think are appropriate such that CSR2 selects
interface Gigabit1 to reach Segment-B (11.11.11.0/24).
Lab Tasks (OSPF Routing)
10.Lastly, imagine if router CSR2 were connected to another large network that
was running a different routing protocol (such as EIGRP or RIP).
a. Imagine that CSR2 has learned all those non-OSPF routes and, wants to provide IP
reachability to those remote networks to the routers speaking OSPF.
b. Let’s simulate this by configuring a Loopback0 interface on CSR2 and provide it the IP address
of 222.222.222.2/24. Do NOT advertise this network into OSPF
c. Configure an OSPF-related command on CSR2 such that it advertises an IPv4 default route to
all OSPF routers.
i. You can verify this was successful by viewing the output of “show ip route ospf” in any router and you
should see an ospf route for 0.0.0.0/0
ii. From any device, you should now be able to ping the IP address that you placed on Loopback0 of
CSR2.
Default route in Sw3’s
IP Routing Table.
Thanks For
Participating!
CCNA 200-301 Bootcamp
Access-Lists
ine.com
Topology Diagram
A B L G
E
F
C H
Lab Tasks (Access-Lists)
1. Use the “config replace” command to load the configuration titled, “ACL-Lab”
from flash memory on all devices shown in the topology diagram.
2. Configure a standard, numbered access-list such that any IP packets sourced
from Segment-A or Segment-E are not allowed to reach any hosts (including
router interfaces) on Segment-G
a. IP packets sourced from any other segment should be unaffected by the ACL
b. This ACL must be created using only two lines of ACEs (Access-Control Entries)
c. This ACL must be implemented on as few interfaces as possible.
d. If implemented correctly, Sw2 should not be able to ping either of the interface IP
addresses connected to Segment-G.
e. If implemented correctly, Sw3 should not be able to ping either of the interface IP
addresses on Segment-G when those pings are sourced from Gig2/0 but it
SHOULD be able to ping those same addresses if the pings are sourced from
Gig1/0.
Lab Tasks (Access-Lists)
Verification:
Lab Tasks (Access-Lists)
Verification:
ine.com
Topology Diagram
A L G
B
E
F
C H
J
K
Lab Tasks (NAT)
1. Use the “config replace” command to load the configuration titled, “NAT-Lab”
from flash memory on all devices shown in the topology diagram.
2. Upon loading the configuration file, you should notice that (on CSR2) interfaces
Gigabit1 and Gigabit7 are shutdown. This is intentional. Please leave them in
this state.
3. CSR2 has also been configured with a Loopback interface with the address of
8.8.8.8/32. Login into either Sw2 or Sw3 and verify that they have learned of
this address via OSPF.
a. If not, troubleshoot and resolve.
Lab Tasks (Static NAT)
ine.com
Lab Tasks (WLC Configuration)
1. From the Ubuntu host, open a web browser and browse to the Cisco 9800
WLAN Controller at 172.16.1.100
a. Username = cisco
b. Password = cisco
NOTE: If you see, “Warning: Potential Security Risk Ahead” click on
”Advanced” followed by “Accept the risk and continue”
Lab Tasks (WLC Configuration)
5. From the main Dashboard, create a new WLAN with these settings:
a) WLAN name = INE-Test
b) Status = Enabled
c) Security settings:
a) WPA + WPA2
b) AES (CCMP 128) encryption (default)
c) Key management = PSK (pre-shared key)
d) Pre-Shared Key = INE-Rocks
Verification
Thanks For
Participating!
CCNA 200-301 Bootcamp
Applying QoS Policies To WLANs
ine.com
Lab Tasks (WLC Configuration)
1. From the Ubuntu host, open a web browser and browse to the Cisco 9800
WLAN Controller at 172.16.1.100
a. Username = cisco
b. Password = cisco
NOTE: If you see, “Warning: Potential Security Risk Ahead” click on
”Advanced” followed by “Accept the risk and continue”
2. Apply the “Platinum” Precious Metal QoS Policy to the ”CCNA Bootcamp”
WLAN you created in the previous lab.
a. This policy should be applied against both upstream and downstream traffic in this
WLAN
b. You may name your new Policy and Tag whatever you wish
Lab Verification