8.5.1 Packet Tracer – Troubleshooting Enterprise Networks 1 Answers

8.5.1 Packet Tracer – Troubleshooting Enterprise Networks 1 Answers

Topology

8.5.1 Packet Tracer - Troubleshooting Enterprise Networks 1 Answers 2

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway
R1 Fa0/0 192.168.10.1 255.255.255.0 N/A
Fa0/1 192.168.11.1 255.255.255.0 N/A
S0/0/0 10.1.1.1 255.255.255.252 N/A
S0/0/1 10.3.3.1 255.255.255.252 N/A
R2 Fa0/1 192.168.20.1 255.255.255.0 N/A
S0/0/0 10.1.1.2 255.255.255.252 N/A
S0/0/1 10.2.2.1 255.255.255.252 N/A
Lo0 209.165.200.225 255.255.255.224 209.165.200.226
R3 Fa0/1 N/A N/A N/A
Fa0/1.11 192.168.11.3 255.255.255.0 N/A
Fa0/1.30 192.168.30.1 255.255.255.0 N/A
S0/0/0 10.3.3.2 255.255.255.252 N/A
S0/0/1 10.2.2.2 255.255.255.252 N/A
S1 VLAN10 DHCP 255.255.255.0 N/A
S2 VLAN11 192.168.11.2 255.255.255.0 N/A
S3 VLAN30 192.168.30.2 255.255.255.0 N/A
PC1 NIC DHCP DHCP DHCP
PC2 NIC 192.168.11.10 255.255.255.0 192.168.11.1
PC3 NIC 192.168.30.10 255.255.255.0 192.168.30.1
TFTP Server NIC 192.168.20.254 255.255.255.0 192.168.20.1

Learning Objectives

  • Find and correct all network errors.
  • Verify that requirements are fully met.
  • Document the corrected network.

Scenario

You have been asked to correct configuration errors in the company network. For this activity, do not use login or password protection on any console lines to prevent accidental lockout. Use ciscoccna for all passwords in this scenario.

Note: Because this activity is cumulative, you will be using all the knowledge and troubleshooting techniques that you have acquired from the previous material to successfully complete this activity.

Requirements

  • S2 is the spanning-tree root for VLAN 11, and S3 is the spanning-tree root for VLAN 30.
  • S3 is a VTP server with S2 as a client.
  • The serial link between R1 and R2 is Frame Relay.
  • The serial link between R2 and R3 uses HDLC encapsulation.
  • The serial link between R1 and R3 uses PPP.
  • The serial link between R1 and R3 is authenticated using CHAP.
  • R2 must have secure login procedures because it is the Internet edge router.
  • All vty lines, except those belonging to R2, allow connections only from the subnets shown in the topology diagram, excluding the public address.
  • Source IP address spoofing should be prevented on all links that do not connect to other routers.
  • R3 must not be able to telnet to R2 through the directly connected serial link.
  • R3 has access to both VLAN 11 and 30 via its Fast Ethernet port 0/0.
  • The TFTP server should not get any traffic that has a source address outside the subnet. All devices have access to the TFTP server.
  • All devices on the 192.168.10.0 subnet must be able to get their IP addresses from DHCP on R1.
  • All addresses shown in the diagram must be reachable from every device.

Task 1: Find and Correct All Network Errors

Task 2: Verify that Requirements are Fully Met

Because time constraints prevent troubleshooting a problem on each topic, only a select number of topics have problems. However, to reinforce and strengthen troubleshooting skills, you should verify that each requirement is met. To do this, present an example of each requirement (for example a show or debug command).

Task 3: Document the Corrected Network

Download Packet Tracer (.pka) file:

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x