OSPF Practice Skills Assessment - Packet Tracer
OSPF Practice Skills Assessment - Packet Tracer
OSPF Practice Skills Assessment - Packet Tracer
Scaling Networks
For the sake of time, many repetitive but important configuration tasks have
been omitted from this activity. Many of these tasks, especially those related
to device security, are essential elements of a network configuration. The
intent of this activity is not to diminish the importance of full device
configurations.
You will practice and be assessed on the following skills:
Main:
Building 2:
FL-A:
FL-B:
FL-C:
Internal PC hosts:
Tables
Note: You are provided with the networks that interfaces should be configured
on. Unless you are told to do differently in the detailed instructions below, you
are free to choose the host addresses to assign.
Addressing Table:
Device
Building 1
Interface
Network
S0/0/0
192.168.100.20/30
G0/0
G0/1
S0/0/0
S0/0/1
Main
S0/1/0
S0/0/1
G0/1.2
Building 2
G0/1.4
G0/1.8
G0/1.15
G0/1.25
Configuration
Details
FL-A
SVI
10.10.25.0/24
FL-B
SVI
10.10.25.0/24
FL-C
SVI
10.10.25.0/24
Lab A-1
NIC
192.168.8.0/24
Lab B-2
NIC
192.168.9.0/24
NIC
10.10.15.0/24
NIC
10.10.15.0/24
NetAdmin1
NetAdmin2
network
the highest
address in the
network
the second to the
highest address in
the network
the third to the
highest address in
the network
any address in the
network
any address in the
network
any available
address in network
any available
address in network
Name
Network
Device
FL-A
FL-C
FL-A
dept2 10.10.4.0/24
FL-C
FL-A
dept3 10.10.8.0/24
FL-C
FL-A
NetAdmin 10.10.15.0/24
FL-C
FL-A
manage 10.10.25.0/24 FL-B
FL-C
dept1
10.10.2.0/24
safe
N/A
Port-Channel Groups:
FL-A
Switch
Ports
Fa0/5
Fa0/7
Fa0/10
Fa0/10
Fa0/15
Fa0/15
Fa0/24
Fa0/24
SVI
SVI
SVI
all unused
ports
Channel Device
FL-A
1
FL-C
FL-A
2
FL-B
FL-B
3
FL-C
Interfaces
Fa0/1, Fa0/2
Fa0/1, Fa0/2
Fa0/3, Fa0/4
Fa0/3, Fa0/4
Fa0/5, Fa0/6
Fa0/5, Fa0/6
Instructions
All configurations must be performed through a direct terminal
connection to the device console line from an available host.
Part I: OSPFv2 Router Configuration
Step 1: Plan the Addressing.
Determine the IP addresses that you will use for the required interfaces on the
devices and LAN hosts. Follow the configuration details provided in the
Addressing Table.
Step 2: Configure Building 1.
Configure Building 1 with initial settings:
Configure the router host name: Bldg-1. This value must be entered
exactly as it appears here.
Prevent the router from attempting to resolve command line entries to IP
addresses.
Protect device configurations from unauthorized access with an
encrypted secret password.
Secure the router console and remote access lines.
Prevent system status messages from interrupting console output.
Configure a message-of-the-day banner.
Encrypt all clear text passwords.
IP addressing
Descriptions for the three connected interfaces of Main.
Configure DCE settings where required. Use a rate of 128000.
The Ethernet subinterfaces on Building 2 will configured later in this
assessment.
Building 1: 1.1.1.1
Main: 2.2.2.2
Building 2: 3.3.3.3
The configured router IDs should be in effect on all three routes.
Allow only Test Host to ping addresses within the Tech Company
network. Only echo messages should be permitted.
Prevent all other Internet hosts (not only the Internet hosts visible in the
topology) from pinging addresses inside the Tech Company network.
Block echo messages only.
All other traffic should be allowed.
Your ACL should consist of three statements.
Your ACL should be placed in the most efficient location as possible to
conserve network bandwidth and device processing resources.
The VLAN names that you configure must match the values in the table
exactly.
Each switch should be configured with all of the VLANs shown in the
table.
Use LACP.
The switch ports on both sides of Channels 1 and 2 should initiate
negotiations for channel establishment.
The switch ports on the FL-B side of Channel 3 should initiate
negotiations with the switch ports on FL-C.
The switch ports on the FL-C side of Channel 3 should not initiate
negotiations with the switch ports on the other side of the channel.
All channels should be ready to forward data after they have been
configured.
Each active access port should accept only two MAC addresses before
a security action occurs.
The learned MAC addresses should be recorded in the running
configuration.
If a security violation occurs, the switch ports should provide notification
that a violation has occurred but not place the interface in an errdisabled state.
c. Ensure that all unused switch ports on FL-A have been secured as follows:
Hosts should be able to ping each other and external hosts after they have
been correctly addressed, where permitted.