Packet Tracer - Configuring IPv4 Static and Default Routes Addressing Table Objectives Part 1: Examine the Network and Evaluate the Need for Static Routing Part 2: Configure Static and Default Routes Part 3: Verify Connectivity Background In this activity, you will configure static and default routes. A static route is a route that is entered manually by the network administrator to create a reliable and safe route. There are four different static routes that are used in this activity: a recursive static route, a directly attached static route, a fully specified static route, and a default route. Part 1: Examine the Network and Evaluate the Need for Static Routing a. Looking at the topology diagram, how many networks are there in total? b. How many networks are directly connected to R1, R2, and R3? c. How many static routes are required by each router to reach networks that are not directly ...
Packet Tracer – Troubleshooting Enterprise Networks 3 Addressing Table Background This activity uses a variety of technologies you have encountered during your CCNA studies, including routing, port security, EtherChannel, DHCP, NAT, PPP, and Frame Relay. Your task is to review the requirements, isolate and resolve any issues, and then document the steps you took to verify the requirements. Note: This activity begins with a partial score. Requirements DHCP · R1 is the DHCP server for the R1 LAN. Switching Technologies · Port security is configured to only allow PC1 to access S1's F0/3 interface. All violations should disable the interface. · Link aggregation using EtherChannel is configured on S2, S3, and S4. Routing · All routers are configured with OSPF process ID 1 and no routing updates should be sent across interfaces that do n...
Packet Tracer - Layer 2 VLAN Security Objectives · Connect a new redundant link between SW-1 and SW-2. · Enable trunking and configure security on the new trunk link between SW-1 and SW-2. · Create a new management VLAN (VLAN 20) and attach a management PC to that VLAN. · Implement an ACL to prevent outside users from accessing the management VLAN. Background / Scenario A company’s network is currently set up using two separate VLANs: VLAN 5 and VLAN 10. In addition, all trunk ports are configured with native VLAN 15. A network administrator wants to add a redundant link between switch SW-1 and SW-2. The link must have trunking enabled and all security requirements should be in place. In addition, the network administrator wants to connect a management PC to switch SW-A. The administrator would like to enable the management PC to connect to ...
Nhận xét
Đăng nhận xét