CCNA 2: SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers

[Updated on July 27, 2020 – 100% Scored]

CCNAv7: Switching, Routing, and Wireless Essentials v7.0 (SRWE)

Final PTSA Part 1

A few things to keep in mind while completing this activity:

  • 1. Do not use the browser Back button or close or reload any exam windows during the exam.
  • 2. Do not close Packet Tracer when you are done. It will close automatically.
  • 3. Click the Submit Assessment button in the browser window to submit your work.

Introduction

In this assessment you are configuring a network that is using EtherChannel and routing between VLANs. For the sake of time, you will not be asked to perform all configurations on all network devices as you may be required to do in a real network or other assessment. Instead, you will use the skills and knowledge that you have learned in the labs in this course to configure the router and switches in the topology. In addition to EtherChannel and inter-VLAN routing, this task involves creating VLANs and trunks, and performing basic router and switch configuration.
You are not required to configure host addressing.
You will practice and be assessed on the following skills:

  • Configuration of initial settings on a router.
  • Configuration of initial settings on a switch, including SVI and SSH.
  • Configuration of VLANs.
  • Configuration of switchport VLAN membership.
  • EtherChannel configuration.
  • Troubleshooting VLANs.
  • Configuration of static trunking and DTP.
  • Configuration of routing between VLANs on a Layer 3 switch
  • Configuration of router-on-a-stick inter- VLAN routing on a router.
  • Configure default gateways on hosts.
Addressing Table
Device Interface IP Address Subnet Mask
R-1 G0/0/0 192.168.0.1 255.255.255.0
G0/0/1.40  192.168.40.1 255.255.255.0
G0/0/1.50  192.168.50.1 255.255.255.0
G0/0/1.60  192.168.60.1 255.255.255.0
G0/0/1.99  192.168.99.17 255.255.255.240
S0/1/0 209.165.201.2 255.255.255.252
MULTI-1 G1/1/1 192.168.0.2 255.255.255.0
VLAN10 192.168.10.1 255.255.255.0
VLAN20 192.168.20.1 255.255.255.0
VLAN30 192.168.30.1 255.255.255.0
VLAN99 192.168.99.2 255.255.255.240
S-3 VLAN99 192.168.99.18 255.255.255.240
Host 1 NIC 192.168.10.10 255.255.255.0
Host 2 NIC 192.168.20.20 255.255.255.0
Host 3 NIC 192.168.30.30 255.255.255.0
Host 4 NIC 192.168.10.11 255.255.255.0
Host 5 NIC 192.168.20.21 255.255.255.0
Host 6 NIC 192.168.30.31 255.255.255.0
Host 7 NIC 192.168.40.40 255.255.255.0
Host 8 NIC 192.168.50.50 255.255.255.0
Host 9 NIC 192.168.60.60 255.255.255.0
Admin Host NIC 192.168.99.19 255.255.255.0
Wed Server NIC 203.0.113.100 255.255.255.0
VLAN Table
VLAN Name IP Network Subnet Mask Devices
10 B1F1 192.168.10.0 255.255.255.0 MULTI-1, S-1, S-2
20 B1F2 192.168.20.0 255.255.255.0 MULTI-1, S-1, S-2
30 B1F4 192.168.30.0 255.255.255.0 MULTI-1, S-1, S-2
40 B3 192.168.40.0 255.255.255.0 S-3
50 B4 192.168.50.0 255.255.255.0 S-3
60 B5 192.168.60.0 255.255.255.0 S-3
99 NetAdmin 192.168.99.16 255.255.255.240 S-3
Port to VLAN Assignment Table
Device VLAN VLAN Name Port Assignments
S-1 10 B1F1 F0/7-10
20 B1F2 F0/11-15
30 B1F4 F0/16-24
S-2 10 B1F1 F0/7-10
20 B1F2 F0/11-15
30 B1F4 F0/16-24
S-3 40 B3 F0/1-5
50 B4 F0/6-10
60 B5 F0/11-15
99 NetAdmin Native F0/24

Background / Scenario

A corporation is planning to implement EtherChannel and a new VLAN design in order to make the network more efficient. You have been asked to work on a design and prototype of the new network. You have created the logical topology and now need to configure the devices in order to evaluate the design. You will configure VLANs and access port VLAN membership on access layer switches. You will also configure EtherChannel and trunking. Finally, you will configure a router and a Layer 3 switch to route between VLANs. Some addressing had already been configured.

Instructions

Part 1: Basic Router Configuration

Step 1: Configure router R-1 with required settings.

a. Open a command window on router R-1 and move to privileged EXEC mode
b. Copy and paste the following configuration into the R-1 router CLI.

Router(config)#ip route 192.168.10.0 255.255.255.0 GigabitEthernet0/0/0
Router(config)#ip route 192.168.20.0 255.255.255.0 GigabitEthernet0/0/0
Router(config)#ip route 192.168.30.0 255.255.255.0 GigabitEthernet0/0/0
Router(config)#ip route 192.168.99.0 255.255.255.240 GigabitEthernet0/0/0

Be sure to press the Enter key after the last line to return to privileged EXEC mode prompt.
c. Configure the following settings on the router
– The enable secret password.
– A console password
– Remote access to the VTY lines.
– A banner MOTD message.
– The device hostname according to the value in the addressing table.
– All clear text passwords should be encrypted.
– Interface addressing on g0/0/0 and s0/1/0
– Interface descriptions on g0/0/0 and s0/1/0.

Router(config)#no ip domain lookup
Router(config)#enable secret class

Router(config)#line console 0
Router(config-line)#password cisco
Router(config-line)#login
Router(config-line)#exit

Router(config)#line vty 0 4
Router(config-line)#password cisco
Router(config-line)#login
Router(config-line)#exit

Router(config)#banner motd #Authorized Access Only!#

Router(config)#hostname R-1

R-1(config)#service password-encryption

R-1(config)#interface g0/0/0
R-1(config-if)#ip address 192.168.0.1 255.255.255.0
R-1(config-if)#no shutdown
R-1(config-if)#description Link to LAN 1
R-1(config-if)#exit

R-1(config)#interface s0/1/0
R-1(config-if)#ip address 209.165.201.2 255.255.255.252
R-1(config-if)#no shutdown
R-1(config-if)#description Link to Internet
R-1(config-if)#exit

Note: Be sure to make a record of the passwords that you create.

Part 2: Basic Switch Configuration

Step 1: Configure Remote Management Addressing

a. Configure SVI 99 on switch S-3 with IP addressing according to the Addressing Table
b. The S-3 switch SVI should be reachable from other networks.

S-3(config)#interface vlan 99
S-3(config-if)#ip address 192.168.99.18 255.255.255.240
S-3(config-if)#no shutdown
S-3(config-if)#exit
S-3(config)#
S-3(config)#ip default-gateway 192.168.99.17

Step 2: Configure Secure Remote Access

a. Configure SSH as follows:
– Username: admin password: C1sco123!
– Modulus bits 1024
– All VTY lines should accept SSH connections only
– Connections should require the previously configured username and password.
– IP domain name: acad.pt

S-3(config)#ip domain-name acad.pt
S-3(config)#crypto key generate rsa
How many bits in the modulus [512]: 1024

S-3(config)#username admin password C1sco123!
S-3(config)#enable secret C1sco123!
S-3(config)#line vty 0 15
S-3(config-line)#transport input ssh
S-3(config-line)#login local
S-3(config-line)#exit
S-3(config)#ip ssh version 2

b. Test SSH connectivity to ensure that all necessary settings have been configured. If unable to connect, correct any issues and verify connectivity

Part 3: VLAN Configuration

Step 1: Configure VLANs according to the VLAN table.

Use the VLAN Table to create and name the VLANs on the appropriate switches.


MULTI-1

MULTI-1(config)#vlan 10
MULTI-1(config-vlan)#name B1F1
MULTI-1(config-vlan)#interface vlan 10
MULTI-1(config-if)#description B1F1
MULTI-1(config-if)#ip address 192.168.10.1 255.255.255.0
MULTI-1(config-if)#exit
MULTI-1(config)#
MULTI-1(config)#vlan 20
MULTI-1(config-vlan)#name B1F2
MULTI-1(config-vlan)#interface vlan 20
MULTI-1(config-if)#description B1F2
MULTI-1(config-if)#ip address 192.168.20.1 255.255.255.0
MULTI-1(config-if)#exit
MULTI-1(config)#
MULTI-1(config)#vlan 30
MULTI-1(config-vlan)#name B1F4
MULTI-1(config-vlan)#interface vlan 30
MULTI-1(config-if)#description B1F4
MULTI-1(config-if)#ip address 192.168.30.1 255.255.255.0
MULTI-1(config-if)#exit
MULTI-1(config)#
MULTI-1(config)#vlan 99
MULTI-1(config-vlan)#name NetAdmin
MULTI-1(config-vlan)#interface vlan 99
MULTI-1(config-if)#description NetAdmin
MULTI-1(config-if)#ip address 192.168.99.2 255.255.255.240
MULTI-1(config-if)#exit


S-1

S-1(config)#vlan 10
S-1(config-vlan)#name B1F1
S-1(config-vlan)#interface vlan 10
S-1(config-if)#description B1F1
S-1(config-if)#exit
S-1(config)#
S-1(config)#vlan 20
S-1(config-vlan)#name B1F2
S-1(config-vlan)#interface vlan 20
S-1(config-if)#description B1F2
S-1(config-if)#exit
S-1(config)#
S-1(config)#vlan 30
S-1(config-vlan)#name B1F4
S-1(config-vlan)#interface vlan 30
S-1(config-if)#description B1F4
S-1(config-if)#exit


S-2

S-2(config)#vlan 10
S-2(config-vlan)#name B1F1
S-2(config-vlan)#interface vlan 10
S-2(config-if)#description B1F1
S-2(config-if)#exit
S-2(config)#
S-2(config)#vlan 20
S-2(config-vlan)#name B1F2
S-2(config-vlan)#interface vlan 20
S-2(config-if)#description B1F2
S-2(config-if)#exit
S-2(config)#
S-2(config)#vlan 30
S-2(config-vlan)#name B1F4
S-2(config-vlan)#interface vlan 30
S-2(config-if)#description B1F4
S-2(config-if)#exit

S-3

S-3(config)#vlan 40
S-3(config-vlan)#name B3
S-3(config-vlan)#interface vlan 40
S-3(config-if)#ip address 192.168.40.1 255.255.255.0
S-3(config-if)#description B3
S-3(config-if)#exit
S-3(config)#
S-3(config)#vlan 50
S-3(config-vlan)#name B4
S-3(config-vlan)#interface vlan 50
S-3(config-if)#ip address 192.168.50.1 255.255.255.0
S-3(config-if)#description B4
S-3(config-if)#exit
S-3(config)#
S-3(config)#vlan 60
S-3(config-vlan)#name B5
S-3(config-vlan)#interface vlan 60
S-3(config-if)#ip address 192.168.60.1 255.255.255.0
S-3(config-if)#description B5
S-3(config-if)#exit
S-3(config)#
S-3(config)#vlan 99
S-3(config-vlan)#name NetAdmin
S-3(config-vlan)#interface vlan 99
S-3(config-if)#ip address 192.168.99.18 255.255.255.240
S-3(config-if)#description NetAdmin
S-3(config-if)#exit

Step 2: Assign switch ports to VLANs.

Assign VLAN membership to static access switchports according to the Port to VLAN Assignment table.


S-1

S-1(config)#interface range f0/7-10
S-1(config-if-range)#switchport mode access
S-1(config-if-range)#switchport access vlan 10
S-1(config-if-range)#exit
S-1(config)#interface range f0/11-15
S-1(config-if-range)#switchport mode access
S-1(config-if-range)#switchport access vlan 20
S-1(config-if-range)#exit
S-1(config)#interface range f0/16-24
S-1(config-if-range)#switchport mode access
S-1(config-if-range)#switchport access vlan 30
S-1(config-if-range)#exit


S-2

S-2(config)#interface range f0/7-10
S-2(config-if-range)#switchport mode access
S-2(config-if-range)#switchport access vlan 10
S-2(config-if-range)#exit
S-2(config)#interface range f0/11-15
S-2(config-if-range)#switchport mode access
S-2(config-if-range)#switchport access vlan 20
S-2(config-if-range)#exit
S-2(config)#interface range f0/16-24
S-2(config-if-range)#switchport mode access
S-2(config-if-range)#switchport access vlan 30
S-2(config-if-range)#exit


S-3

S-3(config)#interface range f0/1-5
S-3(config-if-range)#switchport mode access
S-3(config-if-range)#switchport access vlan 40
S-3(config-if-range)#exit
S-3(config)#interface range f0/6-10
S-3(config-if-range)#switchport mode access
S-3(config-if-range)#switchport access vlan 50
S-3(config-if-range)#exit
S-3(config)#interface range f0/11-15
S-3(config-if-range)#switchport mode access
S-3(config-if-range)#switchport access vlan 60
S-3(config-if-range)#exit
S-3(config)#interface f0/24
S-3(config-if)#switchport mode access
S-3(config-if)#switchport access vlan 99
S-3(config-if)#exit

Part 4: EtherChannel and Trunking Configuration

EtherChannel Port Assignments Table

Channel Group Devices in Groups Ports in Group
1 MULTI-1 G1/0/1, G1/0/2
SW-1 G0/1, G0/2
2 MULTI-1 G1/0/3, G1/0/4
SW-2 G0/1, G0/2
3 SW-1 F0/5, F0/6
SW-2 F0/5, F0/6

Step 1: Configure EtherChannels

Create EtherChannels according to the EtherChannel Port Assignments Table. Use the Cisco LACP protocol. Both sides of the channel should form the channel without negotiation


MULTI-1

MULTI-1(config)#interface range g1/0/1-2
MULTI-1(config-if-range)#channel-group 1 mode active
MULTI-1(config-if-range)#exit
MULTI-1(config)#
MULTI-1(config)#interface range g1/0/3-4
MULTI-1(config-if-range)#channel-group 2 mode active
MULTI-1(config-if-range)#exit


S-1

S-1(config)#interface range g0/1-2
S-1(config-if-range)#channel-group 1 mode active
S-1(config-if-range)#exit
S-1(config)#
S-1(config)#interface range f0/5-6
S-1(config-if-range)#channel-group 3 mode active
S-1(config-if-range)#exit


S-2

S-2(config)#interface range g0/1-2
S-2(config-if-range)#channel-group 2 mode active
S-2(config-if-range)#exit
S-2(config)#
S-2(config)#interface range f0/5-6
S-2(config-if-range)#channel-group 3 mode active
S-2(config-if-range)#exit

Step 2: Configure Trunking on the EtherChannels

a. Configure the port channel interfaces as static trunks. Disable DTP negotiation on all trunks
b. Troubleshoot any issues that prevent the formation of the EtherChannels.


MULTI-1

MULTI-1(config)#interface port-channel 1
MULTI-1(config-if)#switchport mode trunk
MULTI-1(config-if)#switchport trunk allowed vlan 10,20,30
MULTI-1(config-if)#exit
MULTI-1(config)#
MULTI-1(config)#interface port-channel 2
MULTI-1(config-if)#switchport mode trunk
MULTI-1(config-if)#switchport trunk allowed vlan 10,20,30
MULTI-1(config-if)#exit


S-1

S-1(config)#interface port-channel 1
S-1(config-if)#switchport mode trunk 
S-1(config-if)#switchport nonegotiate
S-1(config-if)#exit
S-1(config)#
S-1(config)#interface port-channel 3
S-1(config-if)#switchport mode trunk 

S-1(config-if)#switchport nonegotiate
S-1(config-if)#exit


S-2

S-2(config)#interface port-channel 2
S-2(config-if)#switchport mode trunk 
S-2(config-if)#switchport nonegotiate
S-2(config-if)#exit
S-2(config)#
S-2(config)#interface port-channel 3
S-2(config-if)#switchport mode trunk 

S-2(config-if)#switchport nonegotiate
S-2(config-if)#exit


Note: Packet Tracer requires configuration of trunking and DTP mode on both portchannel interfaces and the component physical interfaces.

Step 3: Configure a static trunk uplink

a. On the S-3 switch, configure the port that is connected to R-1 g0/0/0 as a static trunk
b. Configure the NetAdmin VLAN as the native VLAN
c. Disable DTP on the port.
S-3

S-3(config)#interface g0/1
S-3(config-if)#switchport mode trunk
S-3(config-if)#switchport nonegotiate
S-3(config-if)#switchport trunk native vlan 99
S-3(config-if)#switchport trunk allowed vlan 40,50,60,99
S-3(config-if)#exit

Part 5: Configure Inter-VLAN Routing

Step 1: Configure inter-VLAN routing on the Layer 3 switch

a. Configure Inter-VLAN routing on the MULTI-1 Layer 3 switch for all VLANs in the VLAN Table that are configured on MULTI-1.
b. Configure the switchport on MULTI-1 that is connected to R-1 with an IP address as shown in the Addressing Table.

MULTI-1(config)#ip routing
MULTI-1(config)#interface g1/1/1
MULTI-1(config-if)#no switchport
MULTI-1(config-if)#ip address 192.168.0.2 255.255.255.0

Step 2: Configure router-on-a-stick inter-VLAN routing on a router.

a. Configure inter-VLAN routing on R-1 for all the VLANs that are configured on the S-3 switch. Use the information in the Addressing Table
b. Be sure to configure descriptions of all interfaces
R-1

R-1(config)#interface g0/0/1
R-1(config-if)#no shutdown 
R-1(config)#interface g0/0/1.40
R-1(config-subif)#description "Gateway for VLAN40"
R-1(config-subif)#encapsulation dot1q 40
R-1(config-subif)#ip address 192.168.40.1 255.255.255.0
R-1(config-subif)#exit
R-1(config)#interface g0/0/1.50
R-1(config-subif)#description "Gateway for VLAN50"
R-1(config-subif)#encapsulation dot1q 50
R-1(config-subif)#ip address 192.168.50.1 255.255.255.0
R-1(config-subif)#exit
R-1(config)#interface g0/0/1.60
R-1(config-subif)#description "Gateway for VLAN60"
R-1(config-subif)#encapsulation dot1q 60
R-1(config-subif)#ip address 192.168.60.1 255.255.255.0
R-1(config-subif)#exit
R-1(config)#interface g0/0/1.99
R-1(config-subif)#description "Gateway for VLAN99"
R-1(config-subif)#encapsulation dot1q 99 native
R-1(config-subif)#ip address 192.168.99.17 255.255.255.240
R-1(config-subif)#exit

Step 3: Configure default gateways on hosts.

a Configure default gateway addresses on all hosts on the LANs.

Default gateway on PC1 and PC4: 192.168.10.1
Default gateway on PC2 and PC5: 192.168.20.1
Default gateway on PC3 and PC6: 192.168.30.1

Default gateway on PC7: 192.168.40.1
Default gateway on PC8: 192.168.50.1
Default gateway on PC9: 192.168.60.1
Default gateway on PC99: 192.168.99.17


b. Verify connectivity between all hosts on both LANs with each other and the Web Server server
c. Verify that a host can connect to the SVI of switch S-2 over SSH.

Intructions – Answers

Router R-1

en
conf t
ip route 192.168.10.0 255.255.255.0 GigabitEthernet0/0/0
ip route 192.168.20.0 255.255.255.0 GigabitEthernet0/0/0
ip route 192.168.30.0 255.255.255.0 GigabitEthernet0/0/0
ip route 192.168.99.0 255.255.255.240 GigabitEthernet0/0/0
no ip domain lookup

enable secret class
line console 0
password cisco
login
exit
line vty 0 4
password cisco
login
exit
banner motd #Authorized Access Only!#
hostname R-1
service password-encryption
interface g0/0/0
ip address 192.168.0.1 255.255.255.0
no shutdown
description "R1 G0/0/0"
exit
interface s0/1/0
ip address 209.165.201.2 255.255.255.252
no shutdown
description "R1 S0/1/0"
exit

interface g0/0/1
no shutdown

interface g0/0/1.40
description "Gateway for VLAN40"
encapsulation dot1q 40
ip address 192.168.40.1 255.255.255.0
exit
interface g0/0/1.50
description "Gateway for VLAN50"
encapsulation dot1q 50
ip address 192.168.50.1 255.255.255.0
exit
interface g0/0/1.60
description "Gateway for VLAN60"
encapsulation dot1q 60
ip address 192.168.60.1 255.255.255.0
exit
interface g0/0/1.99
description "Gateway for VLAN99"
encapsulation dot1q 99 native
ip address 192.168.99.17 255.255.255.240
end
copy running-config startup-config

S-3 Switch

en
config t
interface vlan 99
ip address 192.168.99.18 255.255.255.240
no shutdown
exit
ip default-gateway 192.168.99.17
ip domain-name acad.pt
crypto key generate rsa
1024

username admin password C1sco123!
enable secret C1sco123!
line vty 0 15
transport input ssh
login local
exit
ip ssh version 2

vlan 40
name B3
exit
interface vlan 40
ip address 192.168.40.1 255.255.255.0
description B3
exit
vlan 50
name B4
exit
interface vlan 50
ip address 192.168.50.1 255.255.255.0
description B4
exit
vlan 60
name B5
exit
interface vlan 60
ip address 192.168.60.1 255.255.255.0
description B5
exit
vlan 99
name NetAdmin
exit
interface vlan 99
ip address 192.168.99.18 255.255.255.240
description NetAdmin
exit

interface range f0/1-5
switchport mode access
switchport access vlan 40
exit
interface range f0/6-10
switchport mode access
switchport access vlan 50
exit
interface range f0/11-15
switchport mode access
switchport access vlan 60
exit
interface f0/24
switchport mode access
switchport access vlan 99
exit
interface g0/1
switchport mode trunk
switchport nonegotiate
switchport trunk allowed vlan 40,50,60,99
switchport trunk native vlan 99
end
copy running-config startup-config

MULTI-1 Switch

en
config t
vlan 10
name B1F1
interface vlan 10
description B1F1
ip address 192.168.10.1 255.255.255.0
exit
vlan 20
name B1F2
interface vlan 20
description B1F2
ip address 192.168.20.1 255.255.255.0
exit
vlan 30
name B1F4
interface vlan 30
description B1F4
ip address 192.168.30.1 255.255.255.0
exit
vlan 99
name NetAdmin
interface vlan 99
description NetAdmin
ip address 192.168.99.2 255.255.255.240
exit

ip routing
interface g1/1/1
no switchport
ip address 192.168.0.2 255.255.255.0
exit

interface range g1/0/1-2
channel-group 1 mode active
exit
interface port-channel 1
switchport mode trunk
switchport trunk allowed vlan 10,20,30
exit
interface range g1/0/3-4
channel-group 2 mode active
exit
interface port-channel 2
switchport mode trunk
switchport trunk allowed vlan 10,20,30
end
copy running-config startup-config

S-1 Switch

enable
config terminal
vlan 10
name B1F1
interface vlan 10
description B1F1
exit
vlan 20
name B1F2
interface vlan 20
description B1F2
exit
vlan 30
name B1F4
interface vlan 30
description B1F4
exit

interface range f0/7-10
switchport mode access
switchport access vlan 10
exit
interface range f0/11-15
switchport mode access
switchport access vlan 20
exit
interface range f0/16-24
switchport mode access
switchport access vlan 30
exit

interface range g0/1-2
channel-group 1 mode active
exit
interface port-channel 1
switchport mode trunk 
switchport nonegotiate
exit
interface range f0/5-6
channel-group 3 mode active
exit
interface port-channel 3
switchport mode trunk 
switchport nonegotiate
end
copy running-config startup-config

S-2 Switch

en
config t
vlan 10
name B1F1
interface vlan 10
description B1F1
exit
vlan 20
name B1F2
interface vlan 20
description B1F2
exit
vlan 30
name B1F4
interface vlan 30
description B1F4
exit

interface range f0/7-10
switchport mode access
switchport access vlan 10
exit
interface range f0/11-15
switchport mode access
switchport access vlan 20
exit
interface range f0/16-24
switchport mode access
switchport access vlan 30
exit

interface range g0/1-2
channel-group 2 mode active
exit
interface port-channel 2
switchport mode trunk 
switchport nonegotiate
exit
interface range f0/5-6
channel-group 3 mode active
exit
interface port-channel 3
switchport mode trunk 
switchport nonegotiate
end
copy running-config startup-config

Configure default gateway addresses on all hosts on the LANs.

Default gateway on Host1 and Host4: 192.168.10.1
Default gateway on Host2 and Host5: 192.168.20.1
Default gateway on Host3 and Host6: 192.168.30.1

Default gateway on Host7: 192.168.40.1
Default gateway on Host8: 192.168.50.1
Default gateway on Host9: 192.168.60.1

Default gateway on Host99: 192.168.99.17

Download PDF and Packet Tracer files:


Related Articles

guest
37 Comments
Inline Feedbacks
View all comments
Kevin Mitnick
Kevin Mitnick
13 minutes ago

Very wierd, got 100%, almost nothing pinged

victor
victor
2 days ago

“Switchport trunk encapsulation dot1q” needs to be added before “switchport mode trunk” on L3 Sw for port channels

SorryILY
SorryILY
13 days ago

Got 94.5%
Already set “encapsulation dot1q” and Host’s Gateway
What is the DNS for the host?

Alexandra
Alexandra
23 days ago
good
Last edited 23 days ago by Alexandra
Shree
Shree
1 month ago

i forgot the router passwords. can anything be done?

Sophat Phoem
Sophat Phoem
1 month ago

You will not get 100% because the is no interface vlan99 is configured on MULTI-1 Switch!

Last edited 1 month ago by Sophat Phoem
F**k Packet tracer
F**k Packet tracer
1 month ago

when i do the same configuration by my self it gives me 47.3
But when I copy paste this it gives me 90.
WTF of Packet tracer?

lutherking
lutherking
2 months ago

what is the dns of host?

Marco97
Marco97
3 months ago

This configuration is not complete

Egho
Egho
3 months ago

Set default gateways to PC’s

Conan Ali Kun
Conan Ali Kun
4 months ago

Please help this incorrect answer

  1. Network:Router0:Ports:GigabitEthernet0/0/1:PowerIncorrect
  2. Network:[[LAN1-PC1Var]]:Default GatewayIncorrect
  3. Network:[[LAN1-PC2Var]]:Default GatewayIncorrect  
  4. Network:[[LAN1-PC3Var]]:Default GatewayIncorrect  
  5. Network:[[LAN1-PC4Var]]:Default GatewayIncorrect  
  6. Network:[[LAN1-PC5Var]]:Default GatewayIncorrect  
  7. Network:[[LAN1-PC6Var]]:Default GatewayIncorrect 
  8. Network:[[LAN2-PC1Var]]:Default GatewayIncorrect   
  9. Network:[[LAN2-PC2Var]]:Default GatewayIncorrect  
  10. Network:[[LAN2-PC3Var]]:Default GatewayIncorrect  
  11. Network:[[LAN2-99Var]]:Default GatewayIncorrect
Prayogia
Prayogia
4 months ago

i got 91%

dont forget to config gateway and DNS on clients

Mayer Reflino
Mayer Reflino
4 months ago

I’m not sure the netmask of NetAdmin in IP table is /24, but when I check it it’s /28 on the PC config.

Arkov49
Arkov49
4 months ago

i only get 82,3%

Rox
Rox
4 months ago

What is the gateway for the hosts?

Anonym
Anonym
4 months ago

Could someone upload the original .pka? I only have those with the designation SW-2 to SW-4, but SW-1 and SW-3 are used here. The configurations do not match 100%!

sbh
sbh
4 months ago

will the same toppolpgy will be given in pt assessment test

CPS
CPS
5 months ago

Network:SW-4:Ports:GigabitEthernet0/1:Nonegotiate Incorrect SW 4

A F
A F
6 months ago

After all the configuration on the devices is done, you must configure the default gateway on each of the hosts as well. Then perform verification – connect via SSH to S-3. Ping the Server from the Hosts. Ping host-to-host in the same VLAN…

A F
A F
6 months ago

This configuration will give you 100/110 score, which is 90% percentile

A F
A F
6 months ago

Before you are doing “switchport mode trunk”, if you are getting error such as:
Command rejected: An interface whose trunk encapsulation is “Auto” can not be configured to “trunk” mode.
You need to first enter: switchport trunk encapsulation dot1q
Then enter switchport mode trunk

A F
A F
6 months ago

From what I’ve seen, after this config, the Web Server is still not reachable from the hosts… Trying to figure it out still

A F
A F
6 months ago

It is missing a no shut command on interface G0/0/1 of R-1 without this no shut, the interface will be down and there will not be connectivity with S-3

jOHN
jOHN
6 months ago

is it sure this test will be ?

ooiittbb
ooiittbb
6 months ago

Hello Team,

Is there .pka file for the topology ?

thanks !