Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

QUESTION 1:

Discuss TWO (2) potential problems that you may encounter when implementing

redistribution.

1. Redistributing from OSPF to EIGRP


- The 10.0.0.0/8 network comes from the OSPF domain and is being redistributed into EIGRP
domain by Router B. However, Router A never sees the 10.0.0.0/8 route in its routing table.

2. Redistributing from RIP to EIGRP


- The network 150.150.0.0/16 is not getting redistributed into the EIGRP domain.
QUESTION 2: List any FOUR (4) commands that you might use to troubleshoot your network if an
issue(s) arise.

1. Ping
2. Tracert
3. Ipconfig
4. pathping

QUESTION 3: Briefly discuss additional security feature(s) that you might apply to strengthen your
network.

Securing the Command Line


The Cisco IOS CLI privilege levels are divided into four categories:-

1. Privilege level 0
2. User EXEC mode
3. Privileged EXEC mode
4. Custom privileged modes

Each of these privilege levels can be protected by passwords. The first level is protected by the
passwords configured in the terminal lines. The password can be encrypted using the command
service password-encryption.

Below are the example of command to protect the lines :-

R1#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

R1(config)#line vty 0 15

R1(config-line)#password Cisco210

R1(config-line)#exit

R1(config)#line console 0

R1(config-line)#password Cisco210

R1(config-line)#
QUESTION 4:

The employees in the RedLert Sdn Bhd are complaining about the slowness of the company network,
particularly when trying to access the Internet. Examine the Figure 1 and the configuration in Figure
2, and answer the following questions;

A. There are problems with Router B. The routing table is inconsistent, and the system is
extremely slow. Determine the potential problem and the effect it will have.
The potential problem that might occur is routing loops. A routing loop is an issue that occurs
when the routers forward packets such that the same single packet ends up back at the same
router repeatedly in the network. Routing loops occur when there is a problem in the routing
table which can cause a slow network as inaccurate data is being added to the routing table
and this causes abundance loss of data packets and the waste of bandwidth.

B. Router A is having problems connecting to Area 0, which is causing problems in other areas
because this router is used to connect to Area 0. In examining the Figure 1 and 2, identify
the problems that occur and the effect it will have.

C. Using GNS3 simulator, apply the commands that would be used to correct the configuration
problems that you have identified in Question 1(A) and 1(B). Screenshot the necessary
output that will show the problem arise have been solved. Note: Please use information
given in Figure 1 and 2. The network address for link to Internet is 202.11.20.0/30.
QUESTION 5:

In this scenario, you need to implement Border Gateway Protocol (BGP) routing protocol in order to
ensure that all networks are converge successfully.

A. Based on this information, complete the following tasks given; A. Based on Figure 3, produce
an IP addressing table. (Hint: You may plan the IP address assigning accordingly)

Device Interface IP Address Subnet Mask


R1 S1/0 131.108.255.1 255.255.255.252
S1/1 131.108.255.5 255.255.255.252
Lo0 131.108.1.1 255.255.255.0
R2 S1/0 131.108.255.2 255.255.255.252
S1/1 131.108.255.6 255.255.255.252
Lo1 161.108.1.1 255.255.255.0

B. Configure all the routers as shown in Figure 3. Include in your banner with your Name and
Student ID. Password to be use: CCNPXXX or/and YearXXX with XXX is you last 3 digits of
your student ID. Write all password(s) you use in these configurations.

enable secret CCNP210


banner motd #Unauthorized access is strictly prohibited by Nurul Atikah 52211119210#
line console 0
password CCNP210
line vty 0 4
password CCNP210
service password-encryption
C. You must ensure that a load balancing approach has been used in your configuration.
Explain how you intend to ensure that load balancing is achieved.
D. Identify the method that you may use to ensure that the routers can both route to the
remote network. Apply it in your configurations.
E. Verify and display (screenshot) the following output;
i. BGP table

ii. Load balancing is achieved


iii. Connectivity test
iv. Routing table
F. Document all your configurations in .docs or .txt format.

You might also like