CCNA Discovery 1 Module 1 Exam Answers Version 4.0

CCNA Discovery 1 Module 1 Exam Answers Version 4.0

Oleh: Irma Permata Sari/02842

 

CCNA Discovery 1 Module 1 Exam Answers

Version 4.0

1. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
• RAM
• CPU
• video card
• sound card
• operating system

2. What are two advantages of purchasing a preassembled computer? (Choose two.)
• usually a lower cost
• exact components may be specified
• extended waiting period for assembly
• adequate for performing most general applications
• suited for customers with special needs

3. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
• RAM
• NIC
• video card
• sound card
• storage device

4. Which adapter card enables a computer system to exchange information with other systems on a local network?
• modem card
• controller card
• video card
• sound card
• network interface card

5. What is the main storage drive used by servers, desktops, and laptops?
• tape drive
• hard drive
• optical drive (DVD)
• floppy disk drive

6. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
• CPU
• surge suppressor
• motherboard
• hard drive

7. What are two examples of output peripheral devices? (Choose two.)
• printer
• speakers

• flash drive
• external DVD
• external modem

8. What two functions does a UPS provide that a surge protector does not ? (Choose two.)
• protects the computer from voltage surges
• provides backup power from an internal battery
• protects the computer from sudden voltage spikes
• gives the user time to phone the electrical company
• gives the user time to safely shut down the computer if the power fails
• provides backup power through a generator provided by the wall outlet

9. What is a word processor?
• It is a physical computer component.
• It is a program designed to perform a specific function.
• It is a program that controls the computer resources.
• It is a functional part of an operating system.

10. What is the purpose of the ASCII code?
• translates bits into bytes
• interprets graphics digitally
• translates digital computer language into binary language
• represents letters, characters, and numbers with bits

11. Why do servers often contain duplicate or redundant parts?
• Servers require more power and thus require more components.
• Servers should be accessible at all times.
• Servers can be designed as standalone towers or rack mounted.
• Servers are required by networking standards to have duplicate parts.

12. What are two benefits of hooking up a laptop to a docking station? (Choose two.)
• Mobility is increased.
• An external monitor can be used.
• Alternate connectivity options may be available.

• The keyboard can be changed to a QWERTY-style keyboard.
• More wireless security options are available.

13. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
• CAD
• presentation

• spreadsheet
• word processing
• medical practice management
• contacts/scheduling management

14. Which three terms describe different types of computers? (Choose three.)
• operating system
• network
• laptop
• desktop

• Windows
• mainframe

15. How is a server different from a workstation computer?
• The server works as a standalone computer.
• The server provides services to clients.
• The workstation has fewer applications installed.
• The workstation has more users who attach to it.

16. How many values are possible using a single binary digit?
• 1
• 2
• 4
• 8
• 9
• 16

17. What measurement is commonly associated with computer processing speed?
• bits
• pixels
• hertz
• bytes

18. What can be used to prevent electrostatic discharge (ESD)?
• dry and non humid conditions
• carpeted floor
• grounding strap
• uncluttered work space

19. If a peripheral device is not functioning, what are three things you should do to solve the problem? (Choose three.)
• Use the testing functionality on the peripheral itself, if available.
• Verify that all cables are connected properly.

• Disconnect all cables connected to the computer except those connected to the peripheral.
• Ensure that the peripheral is powered on.
• Disconnect the peripheral and verify that the computer is operating normally.
• Reload the computer operating system.

20. Which two steps should be performed when installing a peripheral device? (Choose two.)
• Download and install the most current driver.
• Connect the peripheral using any cable and any available port on the computer.
• Connect the peripheral using an appropriate cable or wireless connection.
• Test the peripheral on another machine before installing it on the one where
it will be used.
• Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.

21. In newer operating systems, how are system resources assigned by default when components are installed?
• manually assigned by the operating system
• manually assigned by the administrator
• statically assigned by the component to a preset resource
• dynamically assigned between the component and the operating system

CCNA Discovery 1 Module 2 Exam Answers Version 4.0

CCNA Discovery 1 Module 2 Exam Answers Version 4.0

Oleh: Irma Permata Sari/02842

 

1. An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
• clean install
• upgrade
• multi-boot
• virtualization

2. Which two statements should be included in a pre-installation checklist when upgrading an operating system? (Choose two.)
• Verify that the hardware resources have multiple partitions.
• Verify that the hardware resources meet or exceed the published minimum requirements.
• Complete a full backup of all important files and data.
• Overwrite any data currently contained on the drive to remove all contents.
• Verify that the hardware resources are certified to work with the existing operating system prior to upgrading.

3. Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)
• closest server
• operating system
• IP address
• subnet mask
• default gateway
• network card driver

4. Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.)
• partition
• file system
• computer name
• IP address
• operating system

5. Which method of interacting with an operating system involves typing commands at a command prompt?
• CLI
• GUI
• redirector
• kernel translator

6. What are three characteristics of an operating system that is released under the GPL (GNU Public License)? (Choose three.)
• full access to source code
• software often available free
• structured development cycle
• can be expensive to purchase
• limits what end-user can do with code
• support normally user-based and often free

7. What is the purpose of a default gateway?
• physically connects a computer to a network
• provides a permanent address to a computer
• identifies the network to which a computer is connected
• identifies the logical address of a networked computer and uniquely identifies it to the rest of the network
• identifies the device that allows local network computers to communicate with devices on other networks

8. Which two statements are true about drive partitions? (Choose two.)
• Partitions are necessary in multi-boot installations.
• A hard drive can be divided into an operating system partition and a data partition.
• User data is never overwritten when a drive is partitioned.
• A disk partition is a defined section of an operating system.
• Each partition requires a different file system type.

9. What occurs when computers are configured to receive their network configurations dynamically?
• Each computer receives a permanent IP address.
• A network administrator enters information on each computer.
• Each computer requests configuration information from a server.
• An NIC automatically provides configuration information to the computer and stores that configuration information.

10. What are two ways that a user can interact with an operating system shell? (Choose two.)
• CLI
• OS
• GUI
• NIC
• kernel

11. Which three resource specifications are given by the manufacturer to ensure that an operating system performs as designed? (Choose three.)
• required hard disk space
• type of accelerated graphics card
recommended amount of RAM
• printer requirements
• processor type and speed
• type of keyboard

CCNA Discovery 1 Module 4 Exam Answers Version 4.0

CCNA Discovery 1 Module 4 Exam Answers Version 4.0

Oleh: Irma Permata Sari/02842

 

1. Which definition describes the term Internet?
• a group of PCs connected together on a LAN
• a group of PCs connected together by an ISP
• a network of networks that connects countries around the world
• a worldwide collection of networks controlled by a single organization

2. What type of connection point is a point of presence (POP)?
• between a client and a host
• between two local networks
• between a computer and a switch
• between an ISP and a home-based LAN

3. What is the term for the group of high-speed data links that interconnect ISPs?
• Internet LAN
• ISP backbone
• Internet gateways
• Internet providers
• Internet backbone

4. Which device can act as a router, switch, and wireless access point in one package?
• hub
• bridge
• modem
• repeater
• ISR

5. What are three characteristics of business class ISP service? (Choose three.)
• fast connections
• extra web space

• free Windows upgrade
• cheapest cost available to all users
• additional e-mail accounts
• replacement hardware at no cost

6. What is a major characteristic of asymmetric Internet service?
• Download speeds and upload speeds are equal.
• Download speeds are slower than upload speeds.
• Upload speeds and download speeds are different.
• Upload speeds and download speeds are irrelevant.

7. Which three elements are required to successfully connect to the Internet? (Choose three.)
• an IP address
• file sharing enabled
• a network connection
• server services enabled
• access to an Internet service provider
• an address obtained directly from the RIR

8. What term describes each router through which a packet travels when moving between source and destination networks?
• NOC
• ISP
• hop
• segment

9. What does the tracert command test?
• NIC functionality
• the ISP bandwidth
• the network path to a destination
• the destination application functionality

10. What type of end-user connectivity requires that an ISP have a DSLAM device in their network?
• analog technology
• cable modem technology
• digital subscriber line technology
• wireless technology

11. Why would an ISP require a CMTS device on their network?
• to connect end users using cable technology
• to connect end users using analog technology
• to connect end users using wireless technology
• to connect end users using digital subscriber line technology

12. Refer to the graphic. What type of cabling is shown?
• STP
• UTP
• coax
• fiber

13. Refer to the graphic. What type of cabling is shown?
• STP
• UTP
• coax
• fiber

14. Which two places are most appropriate to use UTP cabling? (Choose two.)
• between buildings
• in a home office network
• where EMI is an issue
• in a cable TV network
• inside a school building
• in a manufacturing environment with hundreds of electrical devices

15. What does adherence to cabling standards ensure?
• data security
• no loss of signal
• no electromagnetic interference
• reliable data communications

16. Refer to the graphic. What type of cable is shown?
• crossover
• eight coax channels
multimode fiber
• single-mode fiber
• straight-through

17. What connector is used to terminate Ethernet unshielded twisted pair (UTP) cabling?
• ST
• BNC
• RJ-11
• RJ-45

18. Which two characteristics describe copper patch panels? (Choose two.)
• uses RJ-11 jacks
• uses RJ-45 jacks
• supports only data transmissions
• allows quick rearrangements of network connections
• forwards transmissions based on MAC addresses

19. What are two advantages of cable management? (Choose two.)
• requires no preplanning
• aids in isolation of cabling problems
• protects cables from physical damage

• provides compliance with future standards
• provides a short-term solution for cable installation

20. What are two common causes of signal degradation when using UTP cabling? (Choose two.)
• installing cables in conduit
• having improper termination
• losing light over long distances
• installing low quality cable shielding
• using low quality cables or connectors

21. What are three commonly followed standards for constructing and installing cabling? (Choose three.)
• pinouts
• cable lengths
• connector color

• connector types
• cost per meter (foot
)
• tensile strength of plastic insulator

CCNA Discovery 1 Module 1 Exam Answers Version 4.0

CCNA Discovery 1 Module 5 Exam Answers Version 4.0

Oleh: Irma Permata Sari/02842

 

1. How large are IPv4 addresses?
• 8 bits
• 16 bits
• 32 bits
• 64 bits
• 128 bits

2. Refer to the graphic. A user at the workstation cannot connect to the server. All cables have been tested and are working and all devices have IP addressing. However, the user cannot ping the server. What is causing the problem?
• The router interface does not have a default gateway.
• The switch does not have an IP address and default gateway.
• The workstation and server are on different logical networks.
• The workstation does not know the MAC address of the switch.

3. Which part of an IP address identifies a specific device on a network?
• first two octets
• third and fourth octets
• network portion
• host portion
• only the fourth octet

4. Given a host with the IP address 172.32.65.13 and a default subnet mask, to which network does the host belong?
• 172.32.65.0
• 172.32.65.32
• 172.32.0.0
• 172.32.32.0

5. Which default subnet mask provides the most host bits?
• 255.0.0.0
• 255.255.0.0
• 255.255.255.0
• 255.255.255.252

6. How many bits are available for Class B host IP addresses using a default subnet mask?
• 4
• 8
• 16
• 24

7. How many usable hosts are available given a Class C IP address with the default subnet mask?
• 254
• 255
• 256
• 510
• 511
• 512

8. Assuming a default mask, which portion of the IP address 175.124.35.4 represents the host?
• 175.124
• 35.4
• .4
• 124.35.4
• 175.124.35

9. Which of the following are private IP addresses? (Choose three.)
• 10.1.1.1
• 172.32.5.2
• 192.167.10.10
• 172.16.4.4
• 192.168.5.5
• 224.6.6.6

10. What destination IP address is used in a unicast packet?
• a specific host
• a group of hosts
• the default gateway
• the network broadcast address

11. What is the destination MAC address in a multicast Ethernet frame?
• the MAC address of the sending host
• the MAC address of the destination host
• an address that begins with 01-00-5E in hexadecimal
• a 48-bit hexadecimal address expressed as FF-FF-FF-FF-FF-FF

12. Yvonne is talking to her friend on the phone. What type of message is this?
• broadcast
• simulcast
• multicast
• unicast

13. What information must be included within a unicast message for it to be delivered on an Ethernet network?
• MAC and IP addresses for the default router
• IP address and subnet mask of the default gateway
• MAC and IP addresses that correspond to a destination group
MAC and IP addresses that correspond to a specific destination host

14. A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
• The configuration is permanent and nothing changes.
• The address lease is automatically renewed until the PC is returned.
• The address is returned to the pool for reuse when the lease expires.
• The configuration is held by the server to be reissued when the PC is returned.

15. Which type of server dynamically assigns an IP address to a host?
• ARP
• DHCP
• DNS
• RARP

16. Which three statements describe a DHCP Discover message? (Choose three.)
• The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
• The destination IP address is 255.255.255.255.
• The message comes from a server offering an IP address.
• The message comes from a client seeking an IP address.
• All hosts receive the message, but only a DHCP server replies.
• Only the DHCP server receives the message.

17. Refer to the graphic. A host connects to a Linksys integrated router that is also a DHCP server and receives an IP address from it. Which address does the host need to access the ISP and the Internet?
• IP address of the destination host
• public gateway IP address of the ISP
• external IP address of the integrated router that connects to the ISP
• internal IP address of the integrated router that connects to the local network

18. Which statement is true concerning private IP addresses?
• ensures that two networks separated by the Internet use unique IP network numbers
• allows internal hosts to communicate with servers across the Internet
• solves the issue of a finite number of available public IP addresses
• allows for ISPs to be able to quickly determine network location

19. What is one of the purposes of NAT?
• filters network traffic based on IP address ranges
• prevents external users from detecting the IP addresses used on a network
• inspects traffic that might be harmful or used in an attack against the network
• translates IP addresses into easy-to-remember domain names

20. Which two statements describe packets that are sent through a Linksys integrated router using NAT? (Choose two.)
• Packets that are sent to any destination need to be translated.
• Packets that are sent to hosts on the same network need to be translated.
• Packets that are sent to a destination outside the local network need to be translated.
• Packets that are sent to a destination outside a local network do not need to be translated.
• Packets that are sent between hosts on the same local network do not need to be translated.

21. Refer to the graphic. NAT and DHCP are installed on the Linksys integrated router. Which IP address is most likely to be assigned to the local computer, Host1?
• 10.0.0.17
• 128.107.1.2
• 192.135.250.0
• 209.165.201.1

Tugas CCNA 3 Lab 9.5.2 Troubleshooting ACL Configuration and Placement

Lab 9.5.2 Troubleshooting ACL Configuration and Placement

Step 1: Connect the equipment

  1. Connect the Fa0/0 interface of Router 1 to the Fa0/1 interface of the switch using a straight-through cable.
  2. Connect each host to the Fa0/2 switch port of the switch using a straight-through cable.
  3. Connect serial cables from Router 1 to Router 2 according to the topology diagram.
  4. Connect both hosts on Router 2 to the Fa0/0 and Fa0/1 of Router 2 using crossover cables according to the above topology.

Step 2: Load the preconfiguration on ISP

  1. See your instructor for obtaining the preconfigurations for this lab.
  2. Connect Host 1 to the console port of Router 1 to perform loading the preconfigurations using a terminal emulation program.
  3. Transfer the configuration from Host 1 to Router 1:

1) In the terminal emulation program on H1, choose Transfer > Send Text File.

2) Locate the preconfiguration file and choose Open to start the transfer of the preconfiguration to Router 1.

3) When the transfer is complete, save the configuration.

Step 3: Load the preconfiguration on HQ

Copy the preconfiguration on HQ using the process detailed in Step 2.

Step 4: Configure hosts H1 and H2

  1. Configure the Ethernet interfaces of H1 and H2 with the IP addresses and default gateways from the addressing table.
  2. Test the PC configuration by pinging the default gateway from each PC.

Step 5: Configure the web server host H3

  1. Load the Discovery LIVE CD on Host H3. The server’s Ethernet interface is preconfigured with the IP address and default gateway shown in the addressing table. If using another web server, configure the IP address and subnet mask to match that in the table.
  2. Test the PC configuration by pinging the default gateway from the PC.

Step 6: Troubleshoot the HQ router and access list 101

  1. Begin troubleshooting with the HQ router.

Access list 101 is implemented to protect the internal corporate network zone, which houses private servers and internal clients. No other network should be able to access it. Protecting the corporate network begins by specifying which traffic can exit out of the network.

  1. Examine the HQ router to find possible configuration errors. Begin by viewing the summary of access list 101. Enter the command show access-list 101.
  2. Verify reachability by pinging all systems and routers from
  3. If any errors were found, make the necessary configuration changes to HQ. Remember that access lists have to be deleted and re-entered if there is any discrepancy in the commands. E
  4. Issue the command show ip interface fa0/0.
  5. Perform the pings from Step 6c again. If the pings are not successful, continue to troubleshoot other access lists.

 

Step 7: Troubleshoot the HQ router and access list 102

  1. Continue troubleshooting with the HQ router. Access list 102 is implemented to limit the traffic into the corporate network
  2. Examine the HQ router to find possible configuration errors. Begin by viewing the summary of access list 102. Enter the command show access-list 102.
  3. Verify reachability by pinging all systems and routers from each system. If the access list is working correctly, H1 cannot ping H2, but all of the other pings should be successful.

Can H2 ping the web server? __________ no

Can H2 ping H1? __________ no

Can H1 ping the web server? __________ no

Can H1 ping H2? __________ no

  1. If any errors were found, make the necessary configuration changes to HQ. Remember to delete the entire access list before making the corrections. The commands must be in logical, sequential order.
  2. H2 should be able to ping H1. However, H1 should not be able to ping H2 at this point. Open a web browser, such as Windows Explorer, Netscape Navigator, or Firefox and enter the address of the web server in the address location. Verify that H2 has web access to the web server.
  3. Issue the command show ip interface fa0/0.

Is the access list applied in the correct direction on the interface? __________ yes

 

Step 8: Troubleshoot the HQ router and access list 111

  1. Continue troubleshooting with the HQ router. Access list 111 is implemented to protect the DMZ network.
  2. Examine the HQ router to find possible configuration errors. Begin by viewing the summary of access list 111. Enter the command show access-list 111.
  3. Verify reachability by pinging all systems and routers from each system. H1 should not be able to ping H2, but all other pings should be successful if the access list is correct.

 

Step 9: Troubleshoot the HQ router and access list 112

  1. Continue troubleshooting with the HQ router. Access list 112 is implemented to protect the DMZ network.
  2. Examine the HQ router to find possible configuration errors. Begin by viewing the summary of access list 112. Enter the command show access-list 112.
  3. Verify reachability by pinging all systems and routers from each system. Only H2 should be able to successful ping all locations. If the access list is correct, H1 should not be able to ping the web server or H2.

 

Step 10: Troubleshoot the HQ router and access list 121

  1. Continue troubleshooting with the HQ router.mAccess list 121 is implemented to deter spoofing.
  2. Examine the HQ router to find possible configuration errors. Begin by viewing the summary of access list 121. Enter the command show access-list 121.
  3. Verify reachability by pinging all systems and routers from each system. If the access list is correct, only H2 should successfully ping the web server.
  4. d. Issue the command show interface serial0/0/0.

Is the access list applied in the correct direction on the interface? __________ no

Step 11: Reflection

There were a number of configuration errors in the preconfigurations that were provided for this lab. Use this space below to write a brief description of the errors that you found. Jawaban: The student should briefly summarize the errors encountered with the ACLs.

Tugas CCNA 3 Lab 9.4.2 Troubleshooting WAN and PPP Connectivity

Lab 9.4.2 Troubleshooting WAN and PPP Connectivity

 

Step 1: Connect the equipment

Connect the equipment as shown in the topology diagram.

Step 2: Load the preconfiguration on R1

  1. See your instructor for obtaining the preconfigurations for this lab. Instructor note: The preconfigurations and final configurations can be found at the end of this lab.
  2. Connect PC1 to the console port of Router 1 to perform loading the preconfigurations using a terminal emulation program.
  3. Transfer the configuration from PC1 to Router 1:

1) In the terminal emulation program on PC1, choose Transfer > Send Text File.

2) Locate the preconfiguration file and choose Open to start the transfer of the preconfiguration to

Router 1.

Step 3: Load the preconfiguration on R2

Copy the preconfiguration on R2 using the process detailed in Step 2.

Step 4: Troubleshoot R1

a. Enter the command show interfaces serial 0/0/0 to view the details of the interface.

b. If any errors were found, make the necessary configuration changes to R1.

Step 5: Show the details of Serial interface 0/0/0 on R2

a. Enter the command show interface serial 0/0/0 to view the details of the interface.

b. If any errors were found, make the necessary configuration changes to R2.

Step 6: Turn on PPP debugging

a. Turn on the PPP debug function on both routers by entering debug ppp authentication at the

privileged EXEC mode prompt.

b. Turn off the debug function by entering undebug all at the privileged EXEC mode prompt of both

routers.

Step 7: Show the details of the configuration on R2

a. Enter the command show run to view the details of the interface.

b. If any errors were found, make the necessary configuration changes to R2.

R2(config-if)#ppp authentication chap

Step 8: Verify that the serial connection is functioning

a. Ping from R1 to R2 to verify that there is connectivity between the two routers.

b. If the answer for either question is no, troubleshoot the router configurations to find the error. Then do

the pings again until the answer to both questions is yes.

Step 9: Reflection

  1. The IP address and subnet mask for R1 s0/0/0 is 196.168.15.1 and 255.255.255.252. R2s s0/0/0 interface was misconfigured to 192.168.15.2 and an incorrect subnet mask of 255.255.255.254. If all PPP authentication and all other parameters were configured correctly would R1 have been able to ping R2? Why or why not? Jawaban: No, there are only two hosts possible with a subnet mask of 255.255.255.254. There is only one host bit left and both are invalid as host addresses.
  2. What command allows you to view the details of a specific interface? Jawaban: Show interface serial 0/0/0 or whichever interface you desire.
  3. When should you use the debug function in a router? Jawaban: when you want to troubleshoot or to view what is occurring in real-time on the network. Caution should be used so as to minimize the negative impact debugging has on network performance.
  4. What is the default serial encapsulation on a Cisco router? Jawaban: HDLC
  5. There were a number of configuration errors in the preconfigurations that were provided for this lab. Use this space below to write a brief description of the errors that you found. Jawaban: The student should briefly summarize the errors encountered during troubleshooting.

Tugas CCNA 3 Lab 9.3.4 Troubleshooting OSPF Default Route Redistribution

Lab 9.3.4 Troubleshooting OSPF Default Route Redistribution

Step 1: Connect the equipment

  1. Cable the network as shown in the topology diagram.
  2. Connect Host 1 to the console port of Router 1 using a console cable to perform configurations.

Step 2: Perform basic configuration on Router 1

Configure Router 1 with a hostname, assign IP addresses to interfaces, assign privileged passwords, and configure for secure console and Telnet access according to the addressing table and topology diagram. Configure OSPF to advertise networks between routers. Save the configuration. This router will serve as an internal router to the network.

Step 3: Perform basic configuration on Router 2

Perform basic configuration on Router 2 with a hostname, assign IP addresses to interfaces, assign privileged passwords, and configure for secure console and Telnet access according to the addressing table and topology diagram. Configure OSPF to advertise networks between routers 1 and 2. Save the configuration. This router will serve as the router connecting the network to the ISP.

Step 4: Perform basic configuration on Router 3

Perform basic configuration on Router 3 with a hostname, assign IP addresses to interfaces, assign privileged passwords, and configure for secure console and Telnet access according to the addressing table and topology diagram. OSPF will not be configured on this router. Save the configuration. This router will serve as the ISP side router.

Step 5: Configure the hosts with IP address, subnet mask, and default gateway

a. Configure Host 1 and Host 2 with the proper IP address, subnet mask, and default gateway.

1) Host 1 should be assigned 192.168.1.5 /24 and the default gateway of 192.168.1.1.

2) Host 2 should be assigned 10.0.1.10 /24 and the default gateway of 10.0.1.1.

b. Each host should be able to ping its default gateway. If the ping is not successful, troubleshoot as

necessary. Check and verify that the workstation has been assigned a specific IP address and default

gateway.

Step 6: Configure default routing

In this scenario, the devices will have the following functions:

  • • Router 1 (R1) will be an internal enterprise network router.
  • • Router 2 (GW) is to serve as the gateway router connecting the network to the ISP.
  • • Router 3 (ISP) represents the ISP side of the Internet connection.
  • • Host 1 represents an internal network host.
  • • Host 2 (or loopback interface) connected to Router 3 represents a resource on the Internet.

Step 7: Troubleshooting default routing

Default routing is susceptible to many of the same issues that can cause problems with any OSPF route propagation

  1. Shut down the S0/0/1 interface on Router ISP and observe the routing table on Router R1.
  2. Observe that the default route is no longer present.
  3. Troubleshooting becomes more difficult when the GW router is configured to always send the default routing information. Configure this option on the GW router now.

Step 8: Reflection

  1. Can a default route be advertised by an OSPF router that does not have the next hop in its routing table? Jawaban: Yes, if the default-information originate always command is configured; otherwise, no.
  2. List three things that can cause OSPF default route propagation to fail? Jawaban: any OSPF router configuration error or network issue such as: mismatched areas, mismatched timers, incorrect IP addresses, interfaces down, incorrect networks being advertised, etc.
  3. What type of OSPF router does a router that injects a default route into the OSPF process become? Jawaban: An Autonomous System Boundary Router, because the default route points to a network outside of the OSPF domain.
  4. What is an advantage and a disadvantage of using the default-information originate command over configuring default routes on all routers? Jawaban: An advantage is that it is much easier to configure and manage a single static route and redistribution command than to have to configure on each device. Disadvantages are that any OSPF error can cause the loss of the default route and it tends to be more difficult to troubleshoot

Tugas CCNA 3 Lab 9.3.4 Troubleshooting Default Route Redistribution with EIGRP

Lab 9.3.4 Troubleshooting Default Route Redistribution with EIGRP

Step 1: Connect the equipment

  1. Connect the Serial 0/0/0 interface of Router 1 to the Serial 0/0/0 interface of Router 2 using a serial cable.
  2. Connect the Serial 0/0/1 interface of Router 2 to the Serial 0/0/0 interface of the ISP router using a serial cable.
  3. Connect Host H1 to the console of Router 1 using a rollover cable to perform configurations and use a crossover cable to connect the NIC of H1 to the Fa0/0 of R1.
  4. Connect Host H2 to the console of Router 2 using a rollover cable to perform configurations and use a crossover cable to connect the NIC of H2 to the Fa0/0 of R2.
  5. Connect Host H3 to the console of ISP using a rollover cable to perform configurations.

Step 2: Load the preconfigurations for R1, R2, and ISP

  1. See your instructor to obtain the preconfigurations for this lab. Instructor note: The preconfigurations and final configurations can be found at the end of this lab.
  2. Connect the PC to the console ports of the routers for loading the preconfigurations using a terminal emulation program.
  3. Transfer the configuration from H1 to Router 1:

1) In the terminal emulation program on H1, choose Transfer > Send Text File.

2) Locate the file for the configuration of Router 1 provided by your instructor and choose Open to start the transfer of the preconfiguration to Router 1.

3) When the transfer is complete, save the configuration. 4.

  1. Repeat the transfer process from H2 to Router 2:

1) In the terminal emulation program on H2, choose Transfer > Send Text File.

2) Locate the file for the configuration of Router 2 provided by your instructor, and choose Open to start the transfer of the preconfiguration to Router 2.

3) When the transfer is complete, save the configuration.

  1. Repeat the transfer process from H3 to ISP:

1) In the terminal emulation program on H3, choose Transfer > Send Text File.

2) Locate the file for the configuration of ISP provided by your instructor, and choose Open to start the transfer of the preconfiguration to ISP.

3) When the transfer is complete, save the configuration.

Step 3: Configure the hosts with IP address, subnet mask, and default gateway

1. Configure each host with the proper IP address, subnet mask, and default gateway.

1) H1 should be assigned 192.168.1.2 with a subnet mask of 255.255.255.0 and the default gateway of 192.168.1.1.

2) H2 should be assigned 192.168.2.2 with a subnet mask of 255.255.255.0 and the default

gateway of 192.168.2.1.

H1 ping the FastEthernet interface of R1? __________ yes

Step 4: Check connectivity between hosts H1 and H2

a. Ping from Host H1 to Host H2.

Is the ping successful? __________ No

Step 5: Show the routing tables for each router

From the enable or privileged EXEC mode of both routers, examine the routing table entries, using the

show ip route command on each router.

Step 6: Verify that routing updates are being sent

a. Type the commands debug ip eigrp and clear ip route * at the privileged EXEC mode

prompt of R1. Wait for at least 45 seconds.

Was there any output from the debug commands on R1? __________ yes

What is missing from the debug output on R1? __________________________________________

_______________________________________________________________________________

The installation of a route toward the ISP, EIGRP is not properly configured.

b. On R1, use the show ip protocols command to determine the problem. Review the topology

diagram and the networks that should be associated with each router interface.

c. On R2, use the show ip protocols and show ip route commands to determine the problem.

Review the topology diagram and the networks that should be associated with each router interface.

Step 7: Show the routing tables for each router

From the enable or privileged EXEC mode of both routers, examine the routing table entries, using the show

ip route command on each router.

Step 8: Show the EIGRP topology table entries for each router

a. To view the topology table, issue the show ip eigrp topology command on R1.

b. To view more specific information about a topology table entry, use an IP address with this command:

Step 9: Show the EIGRP traffic entries for R1

Issue the show ip eigrp traffic command on R1.

What were the results?

Step 10: Test network connectivity

From H1, is it possible to ping the FastEthernet interface of R2? __________ yes

From H1, is it possible to ping Host H2? __________ yes

From H1, is it possible to ping the S0/0/0 of the ISP? __________ yes

From H2, is it possible to ping the FastEthernet interface of R1? __________ yes

From H2, is it possible to ping Host H1? __________ yes

From H2, is it possible to ping the S0/0/0 of the ISP? ________ yes

If any answer is no, troubleshoot to find the error. Ping again until successful.

Step 11: Reflection

  1. What does ping test? Jawaban: it tests to see if another device on a network can be reached and the average time it takes a packet to reach the destination and return to the source.
  2. When should the show ip protocols and show ip eigrp topology commands be used? Jawaban: The show ip protocols and show ip eigrp topology commands should be used first to determine routing-related problems. If the problem is not determined, then use debug commands.
  3. When should the debug ip eigrp command be used? Jawaban:  to see if updates are being sent on a network to determine if it is functioning properly. It is a great troubleshooting command but should be used with caution because it can severely interrupt a network.

Tugas CCNA 3 Lab 9.3.3 Troubleshooting OSPF Routing Issues

Lab 9.3.3 Troubleshooting OSPF Routing Issues

Step 1: Connect the equipment

  1. Connect the Fa0/0 interface of each router to the Fa0/1 interface of each switch using a straightthrough cable.
  2. Connect each host to the Fa0/2 switch port of each switch using a straight-through cable.
  3. Connect serial cables from each router to the other routers according to the topology diagram.

Step 2: Load the preconfiguration on R1

  1. See your instructor to obtain the preconfigurations for this lab. Instructor note: The preconfigurations are included at the end of this lab.
  2. Connect a Host H1 to the console port of Router 1 for loading the preconfigurations using a terminal emulation program.
  3. Transfer the configuration from H1 to Router 1:

1) In the terminal emulation program on the PC, choose Transfer > Send Text File.

2) Locate the file for the configuration of Router 1 provided by your instructor and choose Open to start the transfer of the preconfiguration to Router 1.

3) When the transfer is complete, save the configuration.

Step 3: Load the preconfiguration on R2

Copy the preconfiguration on R2 using the process detailed in Step 2.

Step 4: Load the preconfiguration on R3

Copy the preconfiguration on R3 using the process detailed in Step 2.

Step 5: Troubleshoot Router R1 Issues

You are a network administrator, located at the same site as the R1 router, and a user calls the help desk stating that they cannot connect to a file server. You determine that the user is on the 192.168.1.0 network (R1) and that the server is on the 192.168.3.0 network (R3). You visit the user and begin troubleshooting.

  1. Begin troubleshooting at host H1 connected to the R1 router
  2. b. Examine the R1 router to find possible configuration errors. Begin by viewing the summary of status information for each interface on the router.
  3. Check to see if there are routes to the other networks by examining the output of the show ip

route command.

  1. Check the OSPF neighbor adjacencies on R1 using the show ip ospf neighbors command.

Step 6: Troubleshoot Router R3 Issues

  1. To help diagnose potential problems with R3, telnet from R1 to the R3 router using the IP address of the R3 S0/0/0 interface (172.16.7.10) and enter the vty password (cisco) for R3 when prompted. Enter privileged EXEC mode (password class).
  2. While connected to R3 via Telnet, use the show ip route command to see which OSPF routes R3 has learned.
  3. Use the show ip protocols command to determine which networks R3 is advertising.

 

Step 7: Troubleshoot Router R2 Issues – Part A

You have resolved the problems with access to the file server on the 192.168.3.0 network.

Step 8: Troubleshoot Router R2 Issues – Part B

Although you resolved the problem with OSPF area mismatch on the R2 WAN link, many of your users stillcannot connect to the ISP through R2. You suspect that the problem is still with R2 but is not related to theOSPF area mismatch problem solved earlier.

  1. To verify this, issue more test pings to the ISP.
  2. You note that only users on the R2 LAN can access the Internet and users on R2 and R3 LANs cannot.

 

Step 9: Reflection

A number of configuration errors appeared in the preconfigurations that were provided for this lab. Use this space below to write a brief description of the errors that you found on each router.? Jawaban: The student should briefly summarize the errors identified in this lab.