CCNP Switch Workbook
CCNP Switch Workbook
Tasks
On each of your switches, perform the following:
As you access each switch, issue a command to view the quantity, and
naming convention, of all interfaces in that switch. You may want to write
down the starting and ending interface names/numbers of each switch.
Assign a descriptive Hostname of your choosing for each device shown in
the topology diagram.
Configure an enable password of ine (all letters lowercase).
Configure a command so that if you mistype a command in the future, the
switch will not attempt to perform a DNS resolution/lookup.
Shut down all interfaces, then enable only those interfaces that connect to
devices shown in the topology diagram.
Configure the switch with a command so that if, while you are typing
something, a syslog message is displayed, the switch will automatically
repeat what you were typing.
Configure each switch to allow incoming Telnet sessions for remote
management. Configure a local password of ine to authenticate any
incoming Telnet sessions.
On each of your routers, configure the following:
As you access each router, issue a command to view the quantity, and
naming convention, of all interfaces in that router. You may want to write
down the starting and ending interface names/numbers of each router.
Configure each router to allow incoming Telnet sessions for remote
management. Configure a local password of ine to authenticate any
incoming Telnet sessions.
Rack1SW1#show interface status
Switch-1 Configuration
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname Switch-1
Switch-1(config)#enable password INE
Switch-1(config)#no ip domain-lookup
Switch-1(config)#interface range fast0/1 - 24 , gig 0/1 - 2
Switch-1(config-if-range)#shutdown
Switch-1(config-if-range)#
Switch-1(config-if-range)#
Switch-1(config-if-range)#exit
Switch-1(config)#interface range fast 0/1 - 2 , fast 0/10 - 15
Switch-1(config-if-range)#no shutdown
Switch-1(config-if-range)#
Switch-1(config-if-range)#exit Switch-1(config)#line console 0
Switch-1(config-line)#logging synchronous
Switch-1(config-line)# Switch-1(config-line)#line vty 0 5
Switch-1(config-line)#password INE
Switch-1(config-line)#end
Switch-1#
Router-1 Configuration
Rtr-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Rtr-1(config)#line vty 0 5
Rtr-1(config-line)#password ine
Rtr-1(config-line)#end
Rtr-1#
Perform the same commands above on Router-2 through Router-4,
substituting an appropriate Hostname and interface numbers.
Verification
At this time, the only VLANs that should exist in your switches are the default
VLANs, so all routers should be in VLAN-1 (although they are configured for
different IP subnets).
If you have configured the preceding tasks correctly, you should be able to ping and
telnet between any pair of routers that are in the same subnet. For example, from
Router-1 you should be able to ping and telnet to the IP address of 10.10.10.10
(Router-2's IP address) as well as 10.10.10.33 (also pre-configured on Router-2).
Router-1 Verification
Rtr-1#ping 10.10.10.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.10, timeout is 2 seconds: .!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/4 ms
Rtr-1# Rtr-1#telnet 10.10.10.10
Trying 10.10.10.10 ... Open
Rtr-2>enable
Password:
Rtr-2#
Rtr-2#exit
Tasks
Configure VTP on all of your switches using the following guidelines:
All switches should utilize a version of VTP that provides support for Token
Ring VLANs should you ever implement those in the future.
Switch-1 is the only switch that should allow you to manually add (or
remove) VLANs. This switch will dynamically propagate any VLAN changes
you make to other switches within the same VTP domain.
All remaining switches can dynamically add or remove VLANs via receipt of
VTP messages from a VTP server, but you should not be able to manually
add (or remove) VLANs from any other switches other than Switch-1.
All switches should be placed in the VTP domain INE.
Your switches should not accept any un-authenticated VTP information from
any rogue switches. VTP messages should be sent with an MD5 hash of INE
.
On Switch-1, configure VLANs 2, 3, 4, and 5 and verify that these VLANs have been
propagated to Switch-2 and Switch-3 via VTP.
All preconfigured Enable passwords are ine
Switch-1 Configuration
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#vtp version 2
Switch-1(config)#vtp mode server
Device mode already VTP Server for VLANS. Switch-1(config)#vtp domain INE
Changing VTP domain name from NULL to INE
Switch-1(config)#
*Mar 1 00:22:58.223: %SW_VLAN-6-VTP_DOMAIN_NAME_CHG: VTP domain name changed to INE. Switch-1(config)#
vtp password INE
Setting device VTP password to INE Switch-1(config)#vlan 2-5
Switch-1(config-vlan)#exit
Switch-1(config)#end
Switch-1#
Switch-2 Configuration
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#vtp password INE
Setting device VLAN database password to INE Switch-2(config)#vtp mode client
Switch-3 Configuration
Switch-3#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-3(config)#vtp password INE
Setting device VLAN database password to INE Switch-3(config)#vtp mode client
Verification
The first criteria required you to run VTP version-2. VTP version-3 would also have
met the stated criteria; however, the switches in this lab do not support VTP version-
3. In the above configurations, you'll notice that the VTP version and VTP domain
name were only manually configured on Switch-1. This information was then
dynamically learned by Switch-2 and Switch-3 (although it would not have hurt
anything had you configured this information manually on those two switches as
well).
The VTP password of INE had to be manually configured on all three switches.
Finally, VTP Client mode had to be specified manually on Switch-2 and Switch-3.
Had you selected VTP Transparent mode for these two switches, they would not
have had the capability to dynamically learn of any new VLANs from the VTP Server
(Switch-1).
To verify that VTP successfully propagated the new VLANs created on Switch-1 (the
VTP Server), you would use the command show vtp status to confirm that all
switches were synchronized to the same VTP Configuration Revision number, and
the command show vlan to confirm that Switch-2 and Switch-3 had learned of
VLANs 2-5.
Switch-1 Verification
Switch-1#show vtp status
VTP Version capable : 1 to 3 VTP version running : 2
VTP Domain Name : INE
VTP Pruning Mode : Disabled
VTP Traps Generation : Disabled
Device ID : 0019.2f45.ec00
Configuration last modified by 0.0.0.0 at 3-1-93 00:23:28
Local updater ID is 0.0.0.0 (no valid interface found)
Feature VLAN:
-------------- VTP Operating Mode : Server
Maximum VLANs supported locally : 1005
Number of existing VLANs : 9 Configuration Revision : 2
MD5 digest : 0xBE 0x7E 0x34 0x0A 0xA4 0x67 0x5C 0x2C
0x22 0x5C 0xD3 0x91 0x4D 0x06 0x94 0x6B
Switch-1#
Switch-1#show vlan
Switch-2 Verification
Switch-2#show vtp status
VTP Version : running VTP2
Configuration Revision : 2
Maximum VLANs supported locally : 1005
Number of existing VLANs : 9 VTP Operating Mode : Client
VTP Domain Name : INE
Switch-2#show vlan
Switch-3 Verification
Switch-3#show vtp status
VTP Version : running VTP2
Configuration Revision : 2
Switch-3#show vlan
Tasks
Configure all inter-switch links shown in the topology diagram above as 802.1q VLAN
Trunks using the following criteria:
802.1q Trunks should be negotiated between switches using some
combination of DTP modes.
If an 802.1q Trunk stops receiving DTP keepalives from its peer switch, that
Trunk should fallback to an Access Port in VLAN-2.
The Native VLAN of all 802.1q Trunks should be set to VLAN-3.
Switch-1 Configuration
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch-1(config)#interface range fastethernet 0/10 - 15 Switch-1(config-if-range)#
switchport trunk encapsulation dot1q
Switch-1(config-if-range)#switchport mode dynamic desirable
Switch-1(config-if-range)#switchport access vlan 2
Switch-1(config-if-range)#switchport trunk native vlan 3
Switch-1(config-if-range)#no shutdown
Switch-1(config-if-range)#end
Switch-1#
Verification
Many switches that support both ISL and 802.1q Trunking methods will first require
you to select one or the other before configuring the switchport mode command.
That's why this example started with the switchport trunk encapsulation dot1q
command.
The first two criteria required you to use some form of the switchport mode dynamic
command. In the example, all of the switchports have been configured as dynamic
desirable , but you could also have selected dynamic auto on one side of any given
link (as long as the other side of that same link was desirable ).
The command switchport access vlan 2 ensured that if this interface ever fell back to
being an Access Switchport, it would be in Access VLAN-2. Finally, you needed to
use the switchport trunk native vlan command to ensure that the Native VLAN was
set to VLAN-3.
To verify that your interfaces were operational as 802.1q VLAN Trunks (and utilizing
VLAN-3 as the Native VLAN), there are several commands you could have issued.
Shown below is the output of the command show interface trunk .
Switch-1 Verification
Switch-1#show interface trunk
Name: Fa0/1
Access Mode VLAN: 1 (default)
Name: Fa0/2
Access Mode VLAN: 1 (default)
Name: Fa0/3
Access Mode VLAN: 1 (default)
Name: Fa0/4
Access Mode VLAN: 1 (default)
Name: Fa0/5
Access Mode VLAN: 1 (default)
Name: Fa0/6
Access Mode VLAN: 1 (default)
Name: Fa0/7
Access Mode VLAN: 1 (default)
Name: Fa0/8
Access Mode VLAN: 1 (default)
Name: Fa0/9
Access Mode VLAN: 1 (default) Name: Fa0/10
Access Mode VLAN: 2 (VLAN0002)
Name: Fa0/11
Access Mode VLAN: 2 (VLAN0002)
Name: Fa0/12
Access Mode VLAN: 2 (VLAN0002)
Name: Fa0/13
Access Mode VLAN: 2 (VLAN0002)
Name: Fa0/14
Access Mode VLAN: 2 (VLAN0002)
Name: Fa0/15
Access Mode VLAN: 2 (VLAN0002)
Name: Fa0/16
Access Mode VLAN: 1 (default)
Name: Fa0/17
Access Mode VLAN: 1 (default)
Name: Fa0/18
Access Mode VLAN: 1 (default)
Name: Fa0/19
Access Mode VLAN: 1 (default)
Name: Fa0/20
Access Mode VLAN: 1 (default)
Name: Fa0/21
Access Mode VLAN: 1 (default)
Name: Fa0/22
Access Mode VLAN: 1 (default)
Name: Fa0/23
Access Mode VLAN: 1 (default)
Name: Fa0/24
Access Mode VLAN: 1 (default)
Name: Gi0/1
Access Mode VLAN: 1 (default)
Name: Gi0/2
Access Mode VLAN: 1 (default)
Switch-1#
CCNP SWITCH Workbook - CCNP - Basic
Switching Review Lab
1.4 EtherChannel
Load the CCNP-Switch-Task1-4 initial configurations before starting.
Tasks
Configure the three links connecting Switch-1 to Switch-2 into an EtherChannel
bundle using PAgP to dynamically negotiate and maintain this EtherChannel.
Switch-1 Configuration
Switch-1#config t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#
interface range fast 0/10 - 12
Switch-1(config-if-range)#shutdown
Switch-1(config-if-range)#
*Mar 1 19:19:19.702: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down
Switch-1(config-if-range)#
*Mar 1 19:19:21.590: %LINK-5-CHANGED: Interface FastEthernet0/10, changed state to administratively down
*Mar 1 19:19:21.632: %LINK-5-CHANGED: Interface FastEthernet0/11, changed state to administratively down
*Mar 1 19:19:21.674: %LINK-5-CHANGED: Interface FastEthernet0/12, changed state to administratively down
*Mar 1 19:19:22.596: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to down
Switch-1(config-if-range)#
*Mar 1 19:19:22.638: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed state to down
*Mar 1 19:19:22.680: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/12, changed state to down
Switch-1(config-if-range)# Switch-1(config-if-range)#channel-protocol pagp
Switch-1(config-if-range)#channel-group 1 mode desirable
Creating a port-channel interface Port-channel 1
Switch-1(config-if-range)#
*Mar 1 19:19:49.700: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up
Switch-1(config-if-range)#no shutdown
Switch-1(config-if-range)#end
Switch-1#
Switch-2 Configuration
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#int range fast 0/10 - 12
Switch-2(config-if-range)#shutdown
Switch-2(config-if-range)#channel-protocol pagp
Switch-2(config-if-range)#channel-group 1 mode auto
Switch-2(config-if-range)#end
Switch-2#
Switch-2#
Switch-2#
Switch-2#
*Mar 1 19:22:52.971: %SYS-5-CONFIG_I: Configured from console by console
Switch-2#
Switch-2#
*Mar 1 19:22:54.203: %LINK-3-UPDOWN: Interface FastEthernet0/10, changed state to up
*Mar 1 19:22:54.215: %LINK-3-UPDOWN: Interface FastEthernet0/11, changed state to up
*Mar 1 19:22:54.227: %LINK-3-UPDOWN: Interface FastEthernet0/12, changed state to up
Switch-2#
*Mar 1 19:22:59.667: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/12, changed state to up
*Mar 1 19:22:59.739: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed state to up
*Mar 1 19:23:00.563: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to up
Switch-2#
*Mar 1 19:23:00.655: %LINK-3-UPDOWN: Interface Port-channel1, changed state to up
*Mar 1 19:23:01.655: %LINEPROTO-5-UPDOWN: Line protocol on Interface Port-channel1, changed state to up
Switch-2#
Verification
Similar to the use of DTP for VLAN Trunks, both PAgP and LACP can be used to
dynamically negotiate and maintain EtherChannels. In the example above, the
command channel-protocol pagp was not absolutely necessary because PAgP is
inferred in the next command, channel-group 1 mode auto (the auto and desirable
keywords can only be used with PAgP). However, the channel-protocol command
was inserted so that anyone reading this configuration file in the future would have
no doubt about our intent to use PAgP and not LACP. Also, it is always wise to first
administratively disable ( shutdown ) any interfaces before making a Layer-1 or Layer-
2 change to those interfaces.
The command show etherchannel summary is used below to verify that the
EtherChannel between Switch-1 and Switch-2 is functional. Notice that this has
been configured as a Layer-2 EtherChannel.
Switch-1 Verification
Switch-1#show etherchannel summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only) R - Layer3 S - Layer2
U - in use
f - failed to allocate aggregator
Switch-1#
CCNP SWITCH Workbook - CCNP - Basic
Switching Review Lab
Tasks
Configure the interfaces on Switch-1, Switch-2, and Switch-3 that are connected to
routers into the appropriate VLANs as shown in the topology diagram above.
Switchports connected to routers should never transmit, or respond to, DTP
frames.
Verify that from any switch you can ping and telnet into any other switch.
Switch-1(config-if)#end
Switch-1#
*Mar 1 21:09:07.503: %SYS-5-CONFIG_I: Configured from console by console
Switch-1#
Switch-2 Configuration
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#
interface range fast 0/1 - 2
Switch-2(config-if-range)#switchport mode access
Switch-2(config-if-range)#switchport access vlan 3
Switch-2(config-if-range)#no shutdown
Switch-2(config-if-range)#exit Switch-2(config)#interface range fast0/3 - 4
Switch-2(config-if-range)#switchport mode access
Switch-2(config-if-range)#switchport access vlan 5
Switch-2(config-if-range)#no shutdown
Switch-2(config-if-range)#exit Switch-2(config)#interface vlan 1
Switch-2(config-if)#ip address 1.1.1.22 255.255.255.0
Switch-2(config-if)#no shutdown
Switch-2(config-if)#end
Switch-2#
Switch-3 Configuration
Switch-3#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-3(config)#int range fast 0/3 - 4
Switch-3(config-if-range)#switchport mode access
Switch-3(config-if-range)#switchport access vlan 4
Switch-3(config-if-range)#no shutdown
Switch-3(config-if-range)#exit Switch-3(config)#interface vlan 1
Switch-3(config-if)#ip address 1.1.1.33 255.255.255.0
Switch-3(config-if)#no shutdown
Switch-3(config-if)#end
Switch-3#
Verification
The stated criteria, "Switchports connected to routers should never transmit, or
respond to, DTP frames," hopefully made you aware that you needed to use the
command switchport mode access on these interfaces. Had you neglected to type
that command, your interfaces would have remained in the default state of
switchport mode dynamic <auto|desirable> and would have been in a state
where they could respond to incoming DTP frames.
Switch-1 Verification
Switch-1#show interface switchport | i (Name|Access)
Name: Fa0/1
Access Mode VLAN: 2 (VLAN0002)
Name: Fa0/2
Access Mode VLAN: 2 (VLAN0002)
Switch-1#ping 1.1.1.22
Repeat the commands above on Switch-2 and Switch-3 for verification, pinging the
appropriate IP addresses.
CCNP SWITCH Workbook - 2. Multilayer
Switching, DHCP, and SDM
Tasks
In this task, Switch-1 will be the central device able to route packets between the
subnets shown in the topology diagram. As such, configure a Switched Virtual
Interface(s) for VLAN-2, VLAN-3, VLAN-4, and VLAN-5 using the IP addresses and
subnet masks shown below.
SVI IP Address
2 10.10.10.9 /29
3 10.10.10.33 /29
4 30.30.30.1 /26
5 20.20.20.97 /27
Verify that the SVIs you just created in Switch-1 are in the state UP/UP.
Enable IP routing on Switch-1.
Switch-1 Configuration
<output omitted for brevity>
!ip routing
!
interface Vlan1
ip address 1.1.1.11 255.255.255.0
!
interface Vlan2
ip address 10.10.10.9 255.255.255.248
!
interface Vlan3
ip address 10.10.10.33 255.255.255.248
!
interface Vlan4
ip address 30.30.30.1 255.255.255.192
!
interface Vlan5 ip address 20.20.20.97 255.255.255.224
!
<output omitted for brevity>
Switch-1 Verification
Switch-1#sho ip interface brief
The command output above would verify that you correctly configured the SVIs
specified in this task, but not that the switch has the ability to route packets to/from
these SVIs. To verify that Switch-1 is now capable of routing packets, you would
have to inspect the IP routing table, looking for Connected routes to the subnets
you assigned to the SVIs.
Switch-1#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Switch-1#
CCNP SWITCH Workbook - 2. Multilayer
Switching, DHCP, and SDM
Tasks
In this task, Switch-1 will be configured as a DHCP Server, and all four routers will be
DHCP Clients.
Configure DHCP Server functionality on Switch-1 using the following criteria:
Switch-1 Configuration
<output omitted for brevity>
!
!
ip dhcp pool vlan2
network 10.10.10.8 255.255.255.248
default-router 10.10.10.9
!
ip dhcp pool vlan3
network 10.10.10.32 255.255.255.248
default-router 10.10.10.33
!
ip dhcp pool vlan4
network 30.30.30.0 255.255.255.192
default-router 30.30.30.1
!
ip dhcp pool vlan5
network 20.20.20.96 255.255.255.224 default-router 20.20.20.97
!
<output omitted for brevity>
Router-2 Configuration
Rtr-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Rtr-2(config)#interface range fast0/0 - 1
Rtr-2(config-if-range)#shutdown
Rtr-2(config-if-range)#ip address dhcp
Rtr-2(config-if-range)#no shutdown
Rtr-2(config-if-range)#end
Rtr-2#
Rtr-2#
Oct 29 13:25:05.413: %SYS-5-CONFIG_I: Configured from console by console
Rtr-2#
Oct 29 13:25:06.649: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
Oct 29 13:25:07.649: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
Rtr-2#
Oct 29 13:25:07.673: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
Rtr-2#
Rtr-2#
Oct 29 13:25:45.165: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/0 assigned DHCP address 10.10.10.11, mask 255.2
Rtr-2#
Oct 29 13:25:49.265: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/1 assigned DHCP address 10.10.10.35, mask 255.2
Rtr-2#
Switch-1 Verification
Switch-1#sho ip dhcp server statistics
Manual bindings 0
Expired bindings 0
Malformed messages 0
Secure arp entries 0
Renew messages 0
Message Received
BOOTREQUEST 0 DHCPDISCOVER 12
DHCPREQUEST 9
DHCPDECLINE 0
DHCPRELEASE 3
DHCPINFORM 0
Message Sent
BOOTREPLY 0 DHCPOFFER 12
DHCPACK 9
DHCPNAK 0
Switch-1#
3031.612e.3663.3330.
2e38.6664.662d.4661.
302f.31
20.20.20.99 0063.6973.636f.2d30. Mar 03 1993 12:51 AM Automatic
3031.382e.6239.6261.
2e36.6464.382d.4661.
302f.30
20.20.20.100 0063.6973.636f.2d30. Mar 03 1993 12:51 AM Automatic
3031.632e.3538.3965.
2e37.6165.312d.4661.
302f.31
30.30.30.2 0063.6973.636f.2d30. Mar 03 1993 12:51 AM Automatic
3031.382e.6239.6261.
2e36.6464.392d.4661.
302f.31
30.30.30.3 0063.6973.636f.2d30. Mar 03 1993 12:51 AM Automatic
3031.632e.3538.3965.
2e37.6165.302d.4661.
302f.30
Switch-1#
CCNP SWITCH Workbook - Multilayer
Switching, DHCP, and SDM
Tasks
In this task, you'll gain exposure to some of the commands used to monitor the CEF
and TCAM tables in switches. There's little you typically need to do to configure or
modify these tables, but knowing how to view their contents can prove to be useful
in a production environment.
Cisco Express Forwarding (CEF) uses two tables, the Forwarding Information Base
(FIB) and the Adjacency Table. Let's first look at the FIB. In Switch-1, issue the
command show ip cef and answer the following four questions.
Question 1
Do you have any "Drop" entries? If so, do you understand why they are there?
Switch-1 Verification
Switch-1#show ip cef
Prefix Next Hop Interface
0.0.0.0/0 no route 0.0.0.0/8 drop
0.0.0.0/32 receive
1.1.1.0/24 attached Vlan1
1.1.1.0/32 receive Vlan1
1.1.1.11/32 receive Vlan1
1.1.1.22/32 attached Vlan1
1.1.1.33/32 attached Vlan1
1.1.1.255/32 receive Vlan1
10.10.10.8/29 attached Vlan2
10.10.10.8/32 receive Vlan2
10.10.10.9/32 receive Vlan2
10.10.10.10/32 attached Vlan2
10.10.10.11/32 attached Vlan2
10.10.10.15/32 receive Vlan2
10.10.10.32/29 attached Vlan3
10.10.10.32/32 receive Vlan3
10.10.10.33/32 receive Vlan3
10.10.10.34/32 attached Vlan3
10.10.10.35/32 attached Vlan3
10.10.10.39/32 receive Vlan3
20.20.20.96/27 attached Vlan5
Prefix Next Hop Interface
20.20.20.96/32 receive Vlan5
20.20.20.97/32 receive Vlan5
20.20.20.99/32 attached Vlan5
20.20.20.100/32 attached Vlan5
20.20.20.127/32 receive Vlan5
30.30.30.0/26 attached Vlan4
30.30.30.0/32 receive Vlan4
30.30.30.1/32 receive Vlan4
30.30.30.2/32 attached Vlan4
30.30.30.3/32 attached Vlan4
30.30.30.63/32 receive Vlan4 127.0.0.0/8 drop
224.0.0.0/4 drop
224.0.0.0/24 receive 240.0.0.0/4 drop
255.255.255.255/32 receive
Switch-1#
In a router or switch that is NOT running CEF, if a packet were received that
ultimately needed to be dropped/discarded (such as a packet with a destination IP
address of 127.anything), the CPU of the device would first have to be interrupted
from its current task, invoke the IP Input process, look up the destination of the
packet, discover that there was no matching route in the IP Routing table, and then
discard the packet. That's a lot of work to do on a packet that will ultimately be
thrown away!
When using CEF (and especially in switches that download CEF tables into
hardware TCAM tables for faster processing), 99% of packets never need to be
seen by the CPU at all. Instead, in this same example, a packet that was received
with a destination IP address of 127.anything would be matched by the "Drop" entry
in the CEF table and be dropped...without ever bothering the CPU to look up that
packet.
Question 2
In that same output of show ip cef , you should see that most of your entries fall into
the categories of Attached or Receive. Do you understand the differences between
the two?
Switch-1 Verification
Switch-1#show ip cef
Prefix Next Hop Interface
0.0.0.0/0 no route
0.0.0.0/8 drop
0.0.0.0/32 receive
1.1.1.0/24 attached Vlan1
1.1.1.0/32 receive Vlan1 1.1.1.11/32 receive Vlan1
1.1.1.22/32 attached Vlan1
In a CEF FIB table, any ingress IP packet matching an entry marked Receive will be
sent to the CPU for processing. As an example, from a previous task you configured
the IP address 1.1.1.11 on Interface VLAN-1 of Switch-1. If a packet were received
by the switch with an exact 32-bit match of the destination IP address of 1.1.1.11,
this packet would naturally have to be sent to the CPU for processing because the
packet was, indeed, meant for the switch itself. So the CPU would need to "receive"
this packet to inspect its contents (the packet might contain a Telnet request for the
switch, or maybe someone was trying to ping the switch).
Notice the entry for 1.1.1.22/32. This is the IP address of interface VLAN-1 on
Switch-2. For this entry to be visible in the FIB table of Switch-1, we know that, at
some point in time, Switch-1 generated an ARP Request for 1.1.1.22 and received
an ARP Reply (most likely because an administrator, logged in to the CLI of Switch-
1, issued a Ping or Telnet to Switch-2). Switch-1 recognized the following about the
IP address of 1.1.1.22: * That IP address was not locally configured on Switch-1
itself (thus it was not classified as a "Receive" entry). * That IP address was a host
belonging to the subnet 1.1.1.0/24, which is "attached" (directly-connected to)
Switch-1.
Question 3
Count the total number of entries you see in the output of show ip cef . If this switch
were a Distribution or Core switch in a live, production environment, manually
counting these entries (which could easily number into the tens of thousands) would
be impossible. Wouldn't it be great if there were a command that gave you the total
count of entries? There is!
Compare the count you just made with the output of the command show ip cef epoch .
Switch-1 Verification
Switch-1#show ip cef
Switch-1#
Question 4
The CEF FIB table contains all of the IP destinations that the switch knows about,
as well as the egress interface for that destination (physical interface or VLAN
interface). But it does not contain the Layer 2 rewrite information to create a new
Ethernet header for those packets. That information is contained in the CEF
Adjacency Table.
Switch-1#show ip cef
Prefix Next Hop Interface
What does the adjacency look like that is associated with this FIB entry? Issue the
command show ip cef adjacency Vlan2 10.10.10.8 . Your output should resemble the
following:
Switch-1#
Does this output indicate that packets going to unknown hosts in the 10.10.10.8/29
subnet will be discarded/dropped? No. When using this command with an IP
address, you will only see adjacencies for host addresses. 10.10.10.8 is not a host
address in this case; it is a subnet address. So in our example, if a packet were
received with a destination of 10.10.10.14 and the only matching FIB entry was an
"attached" entry for 10.10.10.8/29, this would point to a Glean adjacency (not a
normal adjacency used for Host addresses).
Packets with destinations that match a Glean adjacency are packets that:
Temporarily, a Punt Adjacency will be created for that specific destination address.
The packet that was received will be "punted" to the CPU of the switch, which will
trigger the switch to transmit an ARP Request for that host (the original packet will
then be dropped).
When the ARP Response is returned, the switch will have all of the Layer 2 rewrite
information it needs to change that Punt Adjacency into a normal adjacency for all
future packets received for that host (until the ARP entry expires or is deleted).
To view this special type of Glean Adjacency, issue the command show ip cef
adjacency glean .
Finally, let's look at a valid adjacency for a known host IP address. Issue the
following commands and compare their output:
show ip cef adjacency vlan1 1.1.1.22 detail
show ip cef adjacency vlan1 1.1.1.22 internal
show adjacency 1.1.1.22 detail
Switch-1 Verification
Switch-1# Switch-1#show ip cef adjacency vlan1 1.1.1.22 detail
IPv4 CEF is enabled for distributed and running
VRF Default:
38 prefixes (38/0 fwd/non-fwd)
Table id 0
Database epoch: 2 (38 entries at this epoch)
Tasks
In this task, you will gain exposure to some of the commands used to monitor and
change the Switch Database Manager (SDM) within Cisco switches.
Issue a command to view the current SDM template in use on Switch-1. Notice the
memory allocation for each section of the TCAM.
Switch-1 Verification
Switch-1#show sdm prefer
The current template is "desktop default" template.
Switch-1#
Issue a command to view the SDM template called Routing. Notice the different
TCAM allocation in this template as compared to your current template.
Switch-1 Verification
Switch-1#show sdm prefer routing
"desktop routing" template:
Switch-1 Verification
Switch-1#copy running-config startup-config
Switch-1#config t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#sdm prefer routing
Changes to the running SDM preferences have been stored, but cannot take effect
until the next reload.
Use 'show sdm prefer' to see what SDM preference is currently active.
Switch-1(config)#end
Switch-1#
*Mar 2 20:52:58.569: %SYS-5-CONFIG_I: Configured from console by console
Switch-1#
Switch-1#reload
Switch-1#
CCNP SWITCH Workbook - PVST 802.1d
Spanning-Tree
Tasks
In this task, you will manipulate 802.1d PVST Spanning-Tree parameters to ensure
that pre-determined switches take on the role of Spanning-Tree Root Bridge for
certain VLANs.
Issue a command to ensure that Switch-2 is the Spanning-Tree Root Bridge for
VLAN-3 with a Bridge Priority of 8192.
Issue a command to ensure that Switch-1 is the Spanning-Tree Root Bridge for
VLAN-4 with a Bridge Priority of 8192.
Switch-1(config)#end
Switch-1#
Tasks
In this task, you will manipulate 802.1d PVST Spanning-Tree commands to force a
specific forwarding path for VLAN-3 traffic. Notice the topology diagram above.
When this task is complete, traffic (pings) from Router-2 to Router-3 (both in VLAN-
3) will take the path indicated by the dashed arrows.
Switch-3 Configuration
Switch-3#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch-3(config)#int fast 0/15 Switch-3(config-if)#spanning-tree vlan 3 cost 9
Switch-3(config-if)#end
Switch-3#
Verification
Before any configuration was completed, frames sent to/from Router-3 to Router-2
(on VLAN-3) would have taken the following path, because this was the only path
that wasn't blocked.
To force the forwarding path that we wanted (with only a single command and
limited to our original criteria), the only method was to make Switch-3 believe that
the cumulative cost of getting to the Root Bridge (Switch-2) via Switch-1 was lower
(less) than its directly connected cost to the Root.
Because Switch-3 had a directly connected FastEthernet link to the Root Bridge
(with an associated cost of 19), you had to make Switch-3 believe that the
cumulative upstream cost to reach the Root Bridge by way of Switch-1 was LESS
than 19.
Moving our attention to Switch-1 for a moment, hopefully you noticed that Switch-1
has a 3-port FastEthernet EtherChannel as its Root Port. Locally viewed by Switch-
1, this EtherChannel has a cost of nine (9).
Switch-1#
show spanning-tree vlan 3
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 8195
Address 000c.8581.a500 Cost 9
Port 56 (Port-channel1)
Factoring in the additional FastEthernet link between Switch-3 and Switch-1, the
total cumulative cost of this path (for Switch-3 to reach the VLAN-3 Root Bridge)
was 19 + 9 = 27. Clearly, the cost of 27 was not as good as the direct cost to the
Root Bridge of 19 that Switch-3 selected.
The solution was (on Switch-3) to locally reduce the cost of FastEthernet 0/15 to a
value of "x" so that 9 + x < 19. So "x" could take any value of nine (9) or less. In the
configuration example, a value of nine (9) was selected so that the total cost to
reach the VLAN-3 Root Bridge (by way of Switch-1) would be 18...which was less
than Switch-3's directly connected cost of 19.
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 8195
Address 000c.8581.a500
Cost 9
Port 56 (Port-channel1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 8195
Address 000c.8581.a500
Cost 18
Port 15 (FastEthernet0/15)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Tasks
In this task, you will manipulate 802.1d PVST Spanning-Tree commands to force a
specific forwarding path for VLAN-4 traffic. Notice the topology diagram above.
When this task is complete, traffic (pings) from Router-1 to Router-4 (both in VLAN-
4) will take the path indicated by the dashed arrows.
With only a single spanning-tree command (on any single switch), ensure that Switch-
3 selects interface FastEthernet0/14 as its Root Port for VLAN-4.
You are not allowed to modify port cost on any switch to accomplish this.
You are not allowed to disable any interfaces to accomplish this.
You are not allowed to change Root Bridge selection to accomplish this.
Using no more than two spanning-tree commands (on any two switches), ensure that
Switch-2 selects interface FastEthernet0/18 as its Root Port for VLAN-4.
You are not allowed to disable any interfaces to accomplish this.
You are not allowed to change Root Bridge selection to accomplish this.
When you have completed the tasks above, ensure that your Spanning-Tree
forwarding path for VLAN-4 resembles the topology image at the top of this page.
Switch-1(config-if)#end
Switch-1#
Switch-3 Verification
Switch-3# show spanning-tree vlan 4
VLAN0004
Spanning tree enabled protocol ieee
Root ID Priority 8196
Address 0019.2f45.ec00
Cost 19 Port 14 (FastEthernet0/14)
Because you were not allowed to manipulate any port cost values to accomplish the
first objective, the only other method available was to manipulate the Sending Port-
ID of interface FastEthernet0/14 on Switch-1.
Recall that when a switch has two or more equal-cost paths to the root, the next
logical tie breaker is to view the Sending Bridge-IDs of BPDUs received on those
paths. If one Sending Bridge-ID of an upstream switch is numerically lower than
another upstream switch, the tie is broken.
However, in this case, BDPUs received on ports 0/13 through 0/15 (on Switch-3) all
contained the same Sending Bridge-ID: the Bridge-ID of Switch-1.
So the next (and last) tie breaker in this instance was for Switch-3 to look at the
Sending Port-IDs in the BPDUs it was receiving from Switch-1. Recall that the
Sending Port-ID field within a BPDU is a two-part field containing a Port-ID and a
Port-Priority. The Port-ID section cannot be manipulated or changed, but the Port-
Priority field can be changed via Cisco IOS CLI commands.
The default Port Priority of Cisco switches (using 12.x or 15.x IOS) is 128.
Lowering this value to something less than 128 (sixteen (16) was selected in this
example) on port 0/14 of Switch-1 made port 0/14 more preferable (from a Spanning-
Tree perspective) than ports 0/13 or 0/15 to any downstream switch connected to
these three ports (Switch-3).
Switch-2(config-if)#end
Switch-2#
By artificially increasing the cost of the EtherChannel upstream to the Root Bridge to
39, this path was now less preferable than two hops of FastEthernet (total,
cumulative cost of 38) by way of Switch-3 to reach the Root Bridge.
However, left at this stage, interface FastEthernet0/16 was selected as the Root
Port on Switch-2 and the remaining interfaces connected to Switch-3 were blocked.
The objectives stated that we needed traffic to flow on FastEthernet0/18; therefore,
a second step is needed.
VLAN0004
Spanning tree enabled protocol ieee
Root ID Priority 8196
Address 0019.2f45.ec00
Cost 38 Port 16 (FastEthernet0/16)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Switch-2(config-if)#end
Switch-2#
The same objective could have been achieved by reducing the Port-
Priority (to something less than 128) on interface FastEthernet0/18 of
Switch-3.
Verification
Your forwarding path for VLAN-4 should now resemble this.
Switch-2
#sho spanning-tree vlan 4
VLAN0004
Spanning tree enabled protocol ieee
Root ID Priority 8196
Address 0019.2f45.ec00
Cost 37
Port 18 (FastEthernet0/18)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Switch-3
#sho spanning-tree vlan 4
VLAN0004
Spanning tree enabled protocol ieee
Root ID Priority 8196
Address 0019.2f45.ec00
Cost 19
Port 14 (FastEthernet0/14)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Switch-1#
sho spanning-tree vlan 4
VLAN0004
Spanning tree enabled protocol ieee
Root ID Priority 8196
Address 0019.2f45.ec00 This bridge is the root
Tasks
In this task, you will configure some optional Spanning-Tree features that provide
faster reconvergence when changes are detected in the STP topology.
Switch-1(config)#end
Switch-1#
Verification of Portfast
The command show spanning-tree detail active shows you which ports have portfast
enabled by default, but, as you can see from the output below, the output of that
command is pretty verbose.
Port path cost 19, Port priority 128, Port Identifier 128.3.
Designated root has priority 8196, address 0019.2f45.ec00
Designated bridge has priority 8196, address 0019.2f45.ec00
Designated port id is 128.3, designated path cost 0
Timers: message age 0, forward delay 0, hold 0
Number of transitions to forwarding state: 1 The port is in the portfast mode by default
The output of this command can be reduced by using the pipe symbol, the "include"
keyword, and creative use of regular expressions (not something you're expected to
know as part of the CCNP exam, but still fun to play around with).
Switch-2(config)#end
Switch-2#
Verification of UplinkFast
Switch-2#show spanning-tree summary
Switch is in pvst mode
Root bridge for: VLAN0003
Extended system ID is enabled
Portfast Default is enabled
PortFast BPDU Guard Default is disabled
Portfast BPDU Filter Default is disabled
Loopguard Default is disabled
EtherChannel misconfig guard is enabled UplinkFast is enabled
...
<output omitted for brevity>
Switch-2#show spanning-tree uplinkfast
UplinkFast is enabled
UplinkFast statistics
-----------------------
Number of transitions via uplinkFast (all VLANs) : 0
Number of proxy multicast addresses transmitted (all VLANs) : 0
To test UplinkFast, will shut down/disable the Root Port for VLAN-1
(FastEthernet0/16).
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch-2(config)#interface fast0/16
Switch-2(config-if)#shutdown
Switch-2(config-if)#^Z
Switch-2#
*Mar 3 01:18:58.079: STP FAST: UPLINKFAST: make_forwarding on VLAN0001 FastEthernet0/17 root port id new: 128.17 pr
...
<output omitted for brevity>
...
Switch-2#un all
All possible debugging has been turned off
Switch-2#
Switch-1(config)#end
Switch-1#
Verification of BackboneFast
Switch-1#show spanning-tree summary
Switch is in pvst mode
Root bridge for: VLAN0004
Extended system ID is enabled
Portfast Default is enabled
PortFast BPDU Guard Default is disabled
Portfast BPDU Filter Default is disabled
Loopguard Default is disabled
EtherChannel misconfig guard is enabled
UplinkFast is disabled BackboneFast is enabled
...
<output omitted for brevity>
CCNP SWITCH Workbook - PVST 802.1d
Spanning-Tree
In this section, you will gain exposure to the 802.1d Spanning-Tree topology change
process and how it is affected by STP timers.
Task 1
Disable the Portfast feature on interface Fastethernet0/3 of Switch-3.
Switch-3 Configuration
Switch-3#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-3(config)#int fast 0/3
Switch-3(config-if)#no spanning-tree portfast
Switch-3(config-if)#end
Switch-3 Verification
Switch-3#sho spanning-tree interface fast0/3 portfast
VLAN0003 disabled
Switch-3#
Task 2
When a port that is NOT configured for Portfast is disabled, moves from learning to
forwarding, or moves from learning to blocking, the switch is triggered to send a
Spanning-Tree Topology Change Notification toward the Root Bridge. Let's view
this in action:
Switch-3(config-if)#
Task 3
When the STP Root Bridge receives a topology change notification within a
particular VLAN, it responds by setting the "Topology Change" flag within its next
few BPDUs that it transmits into that VLAN. As switches receive BPDUs with the
TC-Flag set, they will reduce their MAC Address-Table Aging timer (sometimes
called the CAM Aging Time) down to the value of the STP Forwarding Delay timer
for all MAC addresses learned within that VLAN. The Root Bridge will do this as well
for its own MAC addresses learned within that VLAN.
The Root Bridge will continue to transmit BPDUs with the TC-Flag set until the
Forwarding-Delay + Max-Age timers expire (35 seconds total), at which point
the remaining BPDUs sent will reset the TC-Flag back to zero and all MAC Address-
Table timers for that VLAN will increase back to their default value (300 seconds).
The next task will enable you to see this process in action.
If you haven't already done so, ensure that you have enabled ( no shutdown ) interface
FastEthernet0/3 of Switch-3.
While still within interface configuration mode ( Switch(config-if)# ), issue the
command do show spanning-tree vlan 3 and notice the "Aging Time" (which reflects
the MAC Address-Table Aging Time for this particular VLAN).
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 8195
Address 000c.8581.a500
Cost 18
Port 15 (FastEthernet0/15)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
If you disabled the previous debug, turn it back on again with the command do
Switch-3(config-if)#
With a text editor like Notepad or Wordpad, type the commands "
do show clock " and " do show spanning-tree vlan 3 ".
Then copy both commands so that you can rapidly paste them into
your Telnet client over and over again without typing anything.
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 8195
Address 000c.8581.a500
Cost 18
Port 15 (FastEthernet0/15)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 8195
Address 000c.8581.a500
Cost 18
Port 15 (FastEthernet0/15)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Switch-3#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-3(config)#int fast 0/3
Switch-3(config-if)#spanning-tree portfast
%Warning: portfast should only be enabled on ports connected to a single
host. Connecting hubs, concentrators, switches, bridges, etc... to this
interface when portfast is enabled, can cause temporary bridging loops.
Use with CAUTION
Switch-3#
Switch-3#
CCNP SWITCH Workbook - PVST 802.1d
Spanning-Tree
In this section, you will gain exposure to an optional security feature that can protect
your switch from receiving, and processing, BPDUs from rogue devices.
Task 1
Verify that interface FastEthernet0/1 on Switch-2 still has Portfast operational.
Configure an additional feature on Fast0/1 so that if this port receives an incoming
BPDU, it will go into the err-disable state.
Configure another feature that will automatically bring any port out of err-disable after
30 seconds, no matter what caused the port to become err-disabled.
Switch-2 Configuration
Switch-2#sho spanning-tree int fast 0/1 portfast
VLAN0003 enabled
Switch-2#
Switch-2(config)#int fast 0/1
Switch-2(config-if)#spanning-tree bpduguard enable
Switch-2(config)#end
Switch-3 Verification
Switch-2#show errdisable recovery
Switch-2#
Task 2
To see the BPDUGuard feature in action, we need the device connected to
FastEthernet0/1 on Switch-2 (which is Router-2 in this case) to send a BPDU.
Normally, routers do not participate in Spanning-Tree, but with Cisco IOS, there is
almost always a way to work around any problem.
First, ensure that you have two simultaneous Telnet windows open. One should be
to Router-2, and the other should be to Switch-2.
Router-2 Configuration
Rtr-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Rtr-2(config)#bridge 1 protocol ieee
Rtr-2(config)#bridge 1 priority 4096
Rtr-2(config)#interface fast0/1
Rtr-2(config-if)#shutdown
Rtr-2(config-if)#no ip address
Rtr-2(config-if)#
Oct 31 12:31:52.702: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to administratively down
Oct 31 12:31:53.702: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to down
Rtr-2(config-if)#bridge-group 1
Rtr-2(config-if)#
Rtr-2(config-if)#no shut
Rtr-2(config-if)#
Oct 31 12:35:37.298: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
Oct 31 12:35:38.298: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
Rtr-2(config-if)#
Oct 31 12:35:45.218: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to down
Rtr-2(config-if)#
Switch-2#
*Mar 3 23:58:53.038: %PM-4-ERR_DISABLE: bpduguard error detected on Fa0/1, putting Fa0/1 in err-disable state
Switch-2#
30-seconds later, the errdisable recovery feature attempts to bring the port back
up, but moments later ANOTHER BPDU is received, causing BPDUGuard to
errdisable the port.
Switch-2#
Task 3
Go back to Router-2 and remove the commands that caused it to participate in
Spanning-Tree.
Rtr-2(config)#int fast0/1
Rtr-2(config-if)#shut
Oct 31 12:42:59.650: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to administratively down
Rtr-2(config-if)#no bridge-group 1
Rtr-2(config-if)#no shut
Rtr-2(config-if)#end
Rtr-2#
CCNP SWITCH Workbook - PVST 802.1d
Spanning-Tree
In this section, you will gain exposure to the BPDUFilter, LoopGuard, and
RootGuard Spanning-Tree features.
Switch-3 Configuration
Switch-3#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-3(config)#
int range fast 0/14 - 15 , fast 0/17 - 18
Switch-3(config-if-range)#shutdown
Switch-3(config-if-range)#end
Switch-3#
VLAN0004
Spanning tree enabled protocol ieee
Root ID Priority 8196
Address 0019.2f45.ec00 This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0004
Spanning tree enabled protocol ieee
Root ID Priority 8196
Address 0019.2f45.ec00
Cost 3038
Port 16 (FastEthernet0/16)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0004
Spanning tree enabled protocol ieee
Root ID Priority 8196
Address 0019.2f45.ec00
Cost 19
Port 13 (FastEthernet0/13)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Switch-1 Configuration
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#int port-channel 1
Switch-1(config-if)#spanning-tree bpdufilter enable
Switch-1(config-if)#end
If your loop is up for any length of time, you will also start seeing
messages that resemble this: %SW_MATM-4-MACFLAP_NOTIF:
Host xxxx.xxxx.xxxx in vlan x is flapping...
Task 3: LoopGuard
Implement the LoopGuard feature to prevent this type of STP Loop from forming:
Remove the BPDUFilter feature from the Port-Channel interface of Switch-1.
Wait for Spanning-Tree to reconverge by Blocking the EtherChannel on
Switch-2.
Configure the LoopGuard feature on interface Port-Channel 1 of Switch-2.
Re-configure BPDUFilter on interface Port-Channel 1 of Switch-1.
This time, after Switch-2 stops receiving BPDUs on its Port-Channel
(after Max-Age expires), its EtherChannel should NOT go into the
Forwarding state (which caused the loop prior to implementation of
LoopGuard) but instead should remain in the Blocking state.
Switch-1 Configuration
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#int port-channel 1
Switch-1(config-if)#spanning-tree bpdufilter disable
Switch-1(config-if)#end
Switch-2 Configuration
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch-2(config)#int port-channel 1 Switch-2(config-if)#spanning-tree guard loop
Switch-2(config-if)#
Switch-2#
Switch-1(config-if)#end
Switch-1#
Switch-2#
*Mar 4 01:12:27.633: %SPANTREE-2-LOOPGUARD_BLOCK: Loop guard blocking port Port-channel1 on VLAN0001.
Switch-2#
Switch-2#
Switch-1#
conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch-1(config)#int port-channel 1 Switch-1(config-if)#spanning-tree bpdufilter disable
Switch-1(config-if)#end
Switch-1#
Task 4: RootGuard
Implement the RootGuard feature to provide our STP topology with a secured
perimeter, beyond which no unauthorized switch will be able to take over the position
of Root Bridge.
Configure the Spanning-Tree Root Guard feature on interface
FastEthernet0/4 of Switch-2.
Move to Router-4 and disable interface FastEthernet0/1.
While still within the configuration of Router-4, enable Spanning-Tree on this
router and give it a Bridge-Priority of 4096.
Enable interface FastEthernet0/1 on Router-4. As soon as it transmits a
Superior BPDU to Switch-2, the Root Guard feature on Switch-2 should
place port 0/4 into the Root Inconsistent state.
Switch-2#
Rtr-4(config-if)#
Rtr-4(config-if)#
Rtr-4(config-if)#no shutdown
Switch-2#
*Mar 4 01:33:35.201: %SPANTREE-2-ROOTGUARD_BLOCK: Root guard blocking port FastEthernet0/4 on VLAN0004.
Switch-2#
*Mar 4 01:33:35.789: %LINK-3-UPDOWN: Interface FastEthernet0/4, changed state to up
*Mar 4 01:33:36.789: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/4, changed state to up
Switch-2#
Tasks
In this task, you will enable 802.1w Rapid Spanning-Tree on two of your switches
and compare the behavior of this protocol against another switch running 802.1d
PVST.
Switch-1 Configuration
Switch-1#config t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#
spanning-tree mode rapid-pvst
Switch-1(config)#spanning-tree vlan 1 root primary
Switch-1(config)#spanning-tree vlan 2 root primary
Switch-1(config)#spanning-tree vlan 3 root primary
Switch-1(config)#spanning-tree vlan 4 root primary
Switch-1(config)#spanning-tree vlan 5 root primary
Switch-1(config)#end
Switch-1#
Switch-3 Configuration
Switch-3#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-3(config)#
spanning-tree mode rapid-pvst
Switch-3(config)#end
Switch-3#
Switch-1#
Switch-2#
Switch-3#
Issue the command show spanning-tree vlan 1 and notice which neighboring switches
are running 802.1w (Rapid PVST) with Switch-1, and which neighboring switches are
running 802.1d STP with Switch-1.
Disable ports 0/13 and 0/10 on Switch-1.
Turn on the IOS debug, debug spanning-tree switch state .
Enable port 0/10 (leading to your 802.1d neighbor) and take note of the total time
taken to move to the Forwarding state on this link.
Enable port 0/13 (leading to your 802.1w RSTP neighbor) and take note of the total
time taken to move to the Forwarding state on this link.
Switch-1 Verification
Switch-1#sho spanning-tree vlan 1
In the output above, notice that Switch-1 is running 802.1w RSTP and
has noticed that a neighboring switch on port 0/10 is in 802.1d
Spanning-Tree mode.
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#
interface range fast 0/10 , fast 0/13
Switch-1(config-if-range)#shutdown
Switch-1#
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#int fast 0/10
Switch-1(config-if)#no shut
Switch-1(config-if)#
*Mar 1 00:42:54.262: %LINK-3-UPDOWN: Interface FastEthernet0/10, changed state to up
Switch-1(config-if)# *Mar 1 00:42:56.804: STP SW: Fa0/10 newblocking
req for 1 vlans
*Mar 1 00:42:57.810: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to up
Switch-1(config-if)# *Mar 1 00:43:11.811: STP SW: Fa0/10 newlearning
req for 1 vlans
Switch-1(config-if)# *Mar 1 00:43:26.818: STP SW: Fa0/10 newforwarding
req for 1 vlans
Switch-1(config-if)#
Switch-1(config-if)#
Switch-1(config-if)#interface fast0/13
Switch-1(config-if)#no shut
Switch-1(config-if)#^Z
Switch-1#
Switch-1#
*Mar 1 00:46:37.013: %LINK-3-UPDOWN: Interface FastEthernet0/13, changed state to up
Switch-1# *Mar 1 00:46:39.563: STP SW: Fa0/13 newblocking
req for 1 vlans *Mar 1 00:46:39.580: STP SW: Fa0/13 newforwarding
req for 1 vlans
*Mar 1 00:46:40.570: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/13, changed state to up
Switch-1#
Tasks
In this task, you will implement some preliminary configurations to convert part of
your switched topology over to 802.1s MST.
Switch-1 Configuration
Switch-1(config)#spanning-tree mst configuration
Switch-1(config-mst)#name INE
Switch-1(config-mst)#instance 1 vlan 1-3
Switch-1(config-mst)#instance 2 vlan 4-4094
Switch-1(config-mst)#exit
Switch-1(config)#spanning-tree mode mst
Switch-1(config)#end
Switch-3 Configuration
Switch-3(config)# Switch-3(config)#spanning-tree mst configuration
Switch-3(config-mst)#name INE
Switch-3(config-mst)#instance 1 vlan 1-3
Switch-3(config-mst)#instance 2 vlan 4-4094
Switch-3(config-mst)#exit
Switch-3(config)#spanning-tree mode mst
Switch-3(config)#end
Switch-3#
-------------------------------------------------------------------------------
Switch-1#
Switch-1#
Tasks
In this task, you will modify your existing 802.1s MST configuration to accomplish
per-instance load balancing of traffic.
Look at the topology diagram above and notice the change of VLAN interface
assignment on Switch-3 and the change of IP address on Router-3, as well as the
SVIs configured on Switch-1 and Switch-2.
The above-mentioned changes have not been configured yet; configure them
yourself now.
Switch-1#
Switch-3#
Switch-2#
View the topology diagram again and notice the dashed arrows, which indicate the
STP Forwarding paths for VLAN-3 and VLAN-4 traffic.
Configure your switches to accomplish the load balancing paths shown in the
diagram, using the following criteria:
Ensure that Switch-1 is the STP Root Bridge for the MST Instance
containing VLAN-3.
Ensure that Switch-3 is the STP Root Bridge for the MST Instance
containing VLAN-4.
All commands configured to manipulate VLAN-3 traffic should ONLY be
configured on Switch-1.
Switch-1#
When manipulating 802.1s MST values, hopefully you remembered that you must
manipulate values related to MST Instances, not individual VLANs. When VLAN-3 is
part of Instance-1, there is no way to manipulate the STP forwarding path ONLY for
VLAN-3. You must manipulate the STP forwarding path for the instance that VLAN-
3 is a part of.
In the configuration above, the command spanning-tree mst 1 root primary was used
to ensure that Switch-1 would become the STP Root Bridge for Instance-1. As an
alternative, you could have used the command spanning-tree mst 1 priority <value>
and then selected some priority value less than 32768.
Because the criteria stated that any load-balancing configuration you implemented
to affect Instance-1 could ONLY be done on Switch-1, you did not have the option of
manipulating STP port-cost values. Instead, your only option was to decrease the
STP port-priority of interface FastEthernet0/14 on Switch-1 so that this interface
would be viewed as the preferred path by downstream Switch-3.
Switch-3#
VLAN0003
Spanning tree enabled protocol ieee
Root ID Priority 32768
Address 000e.830d.f680
Cost 19
Port 16 (FastEthernet0/16)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32771 (priority 32768 sys-id-ext 3)
Address 000c.8581.a500
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 300 sec
Switch-3#
In order to accomplish the STP Forwarding Path shown for VLAN-4, you only
needed to ensure that Switch-3 was configured as the STP Root Bridge for Instance-
2. In this example, we manually lowered the Bridge Priority to accomplish that
objective. Once that was completed, Instance-2 (and VLAN-4) traffic naturally took
the paths shown in the diagram without further configuration.
MST Load-Balancing Verification for Instance-2
(VLAN-4)
Switch-1#sho spanning-tree mst 2
##### MST2 vlans mapped: 4-4094
Bridge address 0019.2f45.ec00 priority 32770 (32768 sysid 2)
Root address 000e.830d.f680 priority 8194 (8192 sysid 2)
port Fa0/13 cost 200000 rem hops 19
Switch-1#
Tasks
In this task, you will gain exposure to the VLAN Access-Maps feature (often called
VACLs) to restrict intra-VLAN traffic between hosts. Note that although the topology
diagram shows four "hosts," you will actually be using routers as your hosts.
Verify that all four hosts can ping and telnet to each other. All pre-configured Telnet
passwords are ine.
After performing the verification above, create, and apply, a VACL in Switch-2 that
meets the following criteria:
Allows Host-1 to initiate ICMP pings all devices except Host-3.
Neither Host-2 or Host-3 should be able to initiate Telnet sessions to each
other.
All other traffic, not explicitly denied above, should be forwarded.
Switch-2 Configuration
<output omitted for brevity>
!
vlan access-map INE 10
action drop
match ip address 101
vlan access-map INE 20
action forward
!
vlan filter INE vlan-list 1
!
<output omitted for brevity>
!
access-list 101 permit icmp host 1.1.1.1 host 1.1.1.3 echo
access-list 101 permit tcp host 1.1.1.2 host 1.1.1.3 eq telnet
access-list 101 permit tcp host 1.1.1.3 host 1.1.1.2 eq telnet
!
<output omitted for brevity>
When configuring VLAN Access-Maps (VACLs), there is almost always more than a
single approach that can be taken. Configuration of access-lists can sometimes be
more of an art than a science. In this example, a couple of things that were
mentioned (or inferred) in the initial criteria needed to be noticed:
The first criterion that referenced ICMP pings said that Host-1 should not be allowed
to initiate pings to Host-3, but it NEVER mentioned that Host-3 could not initiate
ICMP Pings to Host-1. So a correct VACL configuration should have allowed Host-3
to ping Host-1, but NOT vice-versa.
You could have created a second access-list (ACL 102 perhaps) that permitted all
traffic, and then associated that ACL with Sequence-20 of the VLAN Access-Map.
However, recall that when a VLAN Access-Map has no "match" statement it will, by
default, match everything. So an extra ACL permitting any/any would have been
redundant.
VACL Verification
Switch-2#sho vlan access-map
Switch-2#
Host-1#
Host-3#
Host-1>exit
Host-2#
CCNP SWITCH Workbook - VLAN Access-
Lists
Tasks
In this task, you will gain exposure to how a "deny" keyword in an access-list affects
VACL processing.
Verify that all four hosts can ping and telnet to each other. All pre-configured Telnet
passwords are ine.
After performing the verification above, create, and apply, a VACL in Switch-2 that
meets the following criteria:
Host-1 and Host-2 should be allowed to telnet to each other.
All other IP traffic within VLAN-1, not explicitly allowed above, should be
dropped by the VACL.
You may only configure Access-List 101 for use in this lab (the quantity of
lines, or Access Control Entries (ACEs), within ACL 101 are up to you), but
only a SINGLE line (ACE) of that ACL is allowed to use the permit
keyword. All other lines must use the deny keyword.
Switch-2 Configuration
<output omitted for brevity>
!
vlan access-map INE 10
action drop
match ip address 101
vlan access-map INE 20
action forward
!
vlan filter INE vlan-list 1
!
<output omitted for brevity>
! access-list 101 deny
tcp host 1.1.1.1 host 1.1.1.2 eq telnet access-list 101 deny
tcp host 1.1.1.1 eq telnet host 1.1.1.2 access-list 101 deny
tcp host 1.1.1.2 host 1.1.1.1 eq telnet access-list 101 deny
tcp host 1.1.1.2 eq telnet host 1.1.1.1 access-list 101 permit
ip any any
!
<output omitted for brevity>
Although the criteria specified in the objectives forced you to configure your access-
list and VACL in a way that was rather inefficient, there was a reason for this. The
objective of this lab was to reinforce the concept that if a packet, inspected by a
VACL Sequence, matches a "deny" statement within a access-list, processing of the
VACL is done for that sequence, and the packet must now be inspected against the
next sequence of that VACL. In other words, a packet that matches a "deny" in the
ACL is "denied" (prevented) from taking the Action specified in that VACL
Sequence, and must now be re-processed by the next Sequence of that same
VACL.
VACL Verification
Switch-2#show vlan access-map
Host-1#telnet 1.1.1.2
Trying 1.1.1.2 ... Open
Password:
Host-2>exit
Host-2#telnet 1.1.1.1
Trying 1.1.1.1 ... Open
Password:
Host-1>exit
All other types of traffic between hosts would fail at this point.
CCNP SWITCH Workbook - VLAN Access-
Lists
Tasks
In this task, you will troubleshoot a misconfigured VACL.
So do that now: Log in to the various devices in the topology and try to determine
which of the customer's stated objectives are NOT being met by the pre-configured
VACL.
At first glance, only a single problem appears to be presenting itself. Currently, Host-
4 is allowed to telnet to either of the IP addresses configured on Switch-1, but the
second bullet states that NO hosts should be allowed to telnet to ANY IP address on
Switch-1.
After sharing this problem with the customer, he is reassured that you actually know
what you're talking about and have identified the same problem that he did. He now
trusts you to attempt to fix this problem.
The customer has one additional demand: After each change you apply to his
switch, he insists that you test all stated objectives again. If you find that any of your
changes have created ANOTHER problem, he wants to know about it immediately
and will re-assess his troubleshooting contract with you.
Fixing the First Problem
When initially configured, the VLAN access-map had only been applied against
VLAN-1. By not having the VACL applied against VLAN-4, there was nothing to
prevent Host-4 from telnetting to either of the IP addresses on Switch-1, and that
was supposed to be denied. The fix to this problem was to add VLAN-4 to the vlan
filter command.
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#
vlan filter INE vlan-list 1 ,4
Switch-2(config)#end
Switch-2#
Host-4#telnet 1.1.1.11
Trying 1.1.1.11 ... % Connection timed out; remote host not responding
Host-4#telnet 4.4.4.11
Trying 4.4.4.11 ... % Connection timed out; remote host not responding
So the fix above did solve the initial problem that was identified. However, it also
created a new problem, and the customer is not happy.
You have noticed that Host-4 cannot ping its own default gateway of 4.4.4.11,
although the criteria specifically stated that this traffic should be allowed. The
customer slams down the telephone and walks away angry; however, after a few
minutes he calls back and states that if you can fix the new problem you caused
without causing any additional problems, he will maintain his contract with you.
Host-4#
As you can see, the last line of the access-list means that any packet, from any
source, is permitted to be dropped by the first sequence of the VACL named,
"INE". Because you just applied this VACL against VLAN-4, now packets from Host-
4 are matching this line of the ACL and being dropped by the VACL.
Somehow you must modify the last line of this ACL without causing any other
problems in the process.
First, treat this numbered access-list as if it were a named access-list, thereby giving
you the ability to edit it. Adding the new sequence number of 55, in this case, will
cause the VACL only to match on packets with a source address of 1.1.1.anything
and drop those packets if they are going to the SVI for VLAN-4. This line will NOT
match packets sourced from Host-4. However, Sequence-50 (which is dropping
packets from Host-4) is still being processed BEFORE Sequence-55.
The last step is to remove Sequence-50 from this ACL, and it is for this reason that
you decided to modify this ACL as if it were a named access-list. There is no way to
remove a single line of an ACL if you treat it as a numbered ACL without first
deleting the entire ACL and then re-copying it back to the device...which would
create additional problems.
Switch-2(config-ext-nacl)# no 50
Switch-2(config-ext-nacl)#do show ip access-list
Switch-2(config-ext-nacl)#end
Switch-2#
Host-4#
CCNP SWITCH Workbook - Private-VLANs
Tasks
In this task, you will configure and test Private VLANs using Community VLANs.
You are an Internet Service Provider who also offers the additional service of
hosting a customer's physical server(s) at your location. You have decided to
implement a Private VLAN solution so that servers belonging to multiple customers
can all share the same physical switch and share the same IP subnet, yet maintain
privacy at the Datalink Layer.
In this lab, even though the term "servers" are mentioned, in reality
Router-1, Router-2, Switch-2, and Switch-3 will be your devices
emulating servers. To initiate pings from one "server" to another, you
will need to access the CLI of these devices.
Before you configure anything on Switch-1, verify that all servers can ping each
other. Your Private VLAN solution will change this behavior.
Configure a Private VLAN solution on Switch-1, using the topology diagram as your
guide:
Servers belonging to the same company should be able to ping each other.
Servers belonging to different companies should not be able to ping each
other.
You may select any VLAN numbers you wish, keeping in mind the rules of
Private VLANs.
At this point in time, no servers will have a default gateway.
Switch-1 Configuration
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#vtp mode transparent
Setting device to VTP Transparent mode for VLANS. Switch-1(config)#vlan 12
Switch-1(config-vlan)#private-vlan community
Switch-1(config-vlan)#exit Switch-1(config)#vlan 2233
Switch-1(config-vlan)#private-vlan community
Switch-1(config-vlan)#exit Switch-1(config)#vlan 111
Switch-1(config-vlan)#private-vlan primary
Switch-1(config-vlan)#private-vlan association 12,2233
Switch-1(config-vlan)#exit Switch-1(config)#int range fast 0/1 - 2
Switch-1(config-if-range)#switchport mode private-vlan host
Switch-1(config-if-range)#switchport private-vlan host-association 111 12
Switch-1(config-if-range)#exit
Switch-1(config)# Switch-1(config)#int range fast 0/10 , fast 0/15
Switch-1(config-if-range)#switchport mode private-vlan host
Switch-1(config-if-range)#switchport private-vlan host-association 111 2233
Switch-1(config-if-range)#end
Switch-1#
Verification
To begin, you needed to remember that to configure Private VLANs, a switch must
first be in VTP Transparent mode. Also, no matter which VLAN numbers you
selected, you needed to adhere to these guidelines to meet the objectives of this lab:
Create two Community VLANs, because you are hosting servers from two different
companies.
Create a single Primary VLAN, because all of those servers had to be in the same IP
Subnet.
Associate both of your Community VLANs to your Primary VLAN.
Access the physical interfaces on Switch-1 connected to your "servers" and
configure them as follows:
Configure as Private-VLAN Host Ports (switchport mode private-vlan host
)
Inform each interface about the Private VLAN pair it was associated with (
switchport private-vlan host-association)
Switch-1 recognizes that the VLANs you created are not "normal" VLANs but either
Primary or Community Private-VLANs.
Switch-1 recognizes that the physical interfaces connected to your servers are not
"Access" switchports, but rather private-vlan host ports, and in the correct Private-
VLAN assignments.
Switch-1#
Cust-A-Server-1>
Cust-B-Server-1>
CCNP SWITCH Workbook - Private-VLANs
Tasks
In this task, you will configure and test Private VLANs using a combination of
Community and Isolated Secondary VLANs.
You are an Internet Service Provider who also offers the additional service of
hosting a customer's physical server(s) at your location. You have decided to
implement a Private VLAN solution so that servers belonging to multiple customers
can all share the same physical switch and the same IP subnet, yet maintain privacy
at the Datalink Layer.
Before you configure anything on Switch-1, verify that all servers can ping each
other. Your Private VLAN solution will change this behavior.
Configure a Private VLAN solution on Switch-1, using the topology diagram as your
guide:
Servers belonging to Customer-A should be able to ping each other.
Customer-B and Customer-C each own a single server. Place both of these
servers into a single Secondary VLAN so that they may neither ping each
other nor the servers owned by Customer-A.
You may select any VLAN numbers you wish, keeping in mind the rules of
Private VLANs.
At this point in time, no servers will have a default gateway.
Switch-1 Configuration
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#vtp mode transparent
Setting device to VTP Transparent mode for VLANS. Switch-1(config)#vlan 12
Switch-1(config-vlan)#private-vlan community
Switch-1(config-vlan)#exit Switch-1(config)#vlan 2233
Switch-1(config-vlan)#private-vlan isolated
Switch-1(config-vlan)#exit Switch-1(config)#vlan 111
Switch-1(config-vlan)#private-vlan primary
Switch-1(config-vlan)#private-vlan association 12,2233
Switch-1(config-vlan)#exit Switch-1(config)#int range fast 0/1 - 2
Switch-1(config-if-range)#switchport mode private-vlan host
Switch-1(config-if-range)#switchport private-vlan host-association 111 12
Switch-1(config-if-range)#exit Switch-1(config)#int range fast 0/10 , fast 0/15
Switch-1(config-if-range)#switchport mode private-vlan host
Switch-1(config-if-range)#switchport private-vlan host-association 111 2233
Switch-1(config-if-range)#end
Switch-1#
Verification
To begin, you needed to remember that to configure Private VLANs, a switch must
first be in VTP Transparent mode. Also, no matter which VLAN numbers you
selected, you needed to adhere to these guidelines to meet the objectives of this lab:
Switch-1 recognizes that the VLANs you created are not "normal" VLANs but either
Primary, Community, or Isolated Private-VLANs.
Switch-1 recognizes that the physical interfaces connected to your servers are not
"Access" switchports, but rather private-vlan host ports, and in the correct Private-
VLAN assignments.
Switch-1#
Cust-A-Server-1>
At this point, because they are in an Isolated Private VLAN and have no default
gateway, the servers owned by Customer-B and Customer-C should not be able to
ping anything.
CCNP SWITCH Workbook - Private-VLANs
Tasks
In this task, you will configure and test Private VLAN Promiscuous Ports.
Before you configure anything on Switch-1, verify that your Private VLANs exist and
are assigned to the correct ports.
Currently, all servers have a default-gateway configured of 1.1.1.111, but they cannot
reach this IP address nor can they reach any other IP addresses outside of their own
subnet.
Configure interface VLAN 111 on Switch-1 as the Private-VLAN Promiscuous Port
such that:
All servers should be able to ping the IP address of their default-gateway
(1.1.1.111).
The Network Administrator's PC (Router-3) should be able to ping any of the
servers.
Switch-1 Configuration
Switch-1#conf t Switch-1(config)#interface vlan 111
Switch-1(config-if)#private-vlan mapping 12,2233
Switch-1(config-if)#end
Switch-1# *Mar 1 02:38:31.355: %PV-6-PV_MSG: Created a private vlan mapping, Primary 111, Secondary 12
*Mar 1 02:38:31.355: %PV-6-PV_MSG: Created a private vlan mapping, Primary 111, Secondary 2233
Switch-1#
Switch-1#
Cust-A-Server-1>
Cust-A-Server-2>ping 1.1.1.111
Cust-A-Server-2>
Cust-B-Server-1>ping 1.1.1.111
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.111, timeout is 2 seconds:
!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
Cust-B-Server-1>
Cust-C-Server-1>ping 1.1.1.111
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.111, timeout is 2 seconds:
!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
Cust-C-Server-1>
Admin-PC>ping 1.1.1.1
Tasks
In this task, you will configure a physical switchport as a Private VLAN Promiscuous
Port.
Before you configure anything on Switch-1, verify that your Private VLANs exist and
are assigned to the correct ports.
Currently, all servers have a default-gateway configured of 1.1.1.111, but they are
unable to reach this IP address, nor can they reach any other IP addresses outside
of their own subnet.
Configure interface FastEthernet0/14 on Switch-1 as the Private-VLAN Promiscuous
Port so that:
All servers should be able to ping the IP address of their default-gateway
(1.1.1.111).
All servers should be able to ping the IP address of 33.33.33.3.
Switch-1 Configuration
Switch-1#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#int fast0/14
Switch-1(config-if)#switchport mode private-vlan promiscuous
Switch-1(config-if)#switchport private-vlan mapping 111 12
Switch-1(config-if)#switchport private-vlan mapping 111 2233
Switch-1(config-if)#end
Switch-1#
Notice that the command above, which is useful for verifying an SVI configured as a
PVLAN Promiscuous Port, does not help when verifying a physical interface as the
Promiscuous Port.
Task
Most of the topology shown in the diagram, including the Corporate
DHCP Server, VLANs, Routing, and IP addresses, have been pre-
configured. You will configure the Rogue DHCP Server in this task.
In this lab, even though the terms "servers" and "clients" are
mentioned, in reality, your routers are acting as these devices.
Before you configure anything, ensure that the Corporate DHCP Server is reachable
and functional by:
Disabling interface FastEthernet0/1 on DHCP Client-R2 and DHCP Client-
R2.
Enabling these interfaces.
Waiting and watching for IP interface assignment via DHCP.
Client-R2#
Client-R4>
en
Client-R4#conf t
Enter configuration commands, one per line. End with CNTL/Z. Client-R4(config)#int fast0/1
Client-R4(config-if)#shutdown
Client-R4(config-if)#
Nov 6 07:05:11.002: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to administratively down
Nov 6 07:05:12.002: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to down
Client-R4(config-if)#no shutdown
Client-R4(config-if)#end
Client-R4#
Nov 6 07:05:19.966: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
Client-R4#
Client-R4#
Nov 6 07:05:20.070: %SYS-5-CONFIG_I: Configured from console by console
Nov 6 07:05:20.966: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
Client-R4#
Nov 6 07:05:29.122: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/1 assigned DHCP address 24.24.24.4, mask 255.25
Client-R4#
Task
Currently, any broadcasts sent by either Client-R2 or Client-R4 are flooded by Switch-
2 and visible to the other clients as well as Router-3 (Rogue DHCP Server). This
means that when (as an example) Client-R2 transmits a broadcast DHCP Discover
packet, and broadcast DHCP Request packet, these are visible to other devices
within VLAN-24.
Verify this for yourself by doing the following:
Ensure that you have two Telnet windows open at the same time: a window
to R2, and another window to R4.
On Client-R4, enter the command debug ip udp port 67 . This command will
display any IP packets that Client-R4 has received and forwarded to its own
CPU, with a source, or destination, UDP port 67 (the DHCP Server port).
On Client-R2, shutdown interface FastEthernet0/1 and then enable this
interface. The debug running on Client-R4 will prove that it has received the
DHCP broadcasts sent to and from Client-R2.
Turn off all debugging on Client-R4 with the command undebug all (or
simply u all ).
Client-R4>
en Client-R4#debug ip udp port 67
UDP packet debugging is on
Client-R4#
Client-R2(config)#int fast 0/1
Client-R2(config-if)#shutdown
Client-R2(config-if)#no shutdown
Client-R4
# Nov 6 07:23:41.881: UDP: rcvd src=0.0.0.0(68), dst=255.255.255.255(67)
, length=320
Client-R4# Nov 6 07:23:43.885: UDP: rcvd src=24.24.24.22(67), dst=255.255.255.255(68)
, length=308 Nov 6 07:23:43.885: UDP: rcvd src=0.0.0.0(68), dst=255.255.255.255(67)
, length=332 Nov 6 07:23:43.889: UDP: rcvd src=24.24.24.22(67), dst=255.255.255.255(68)
, length=308
Client-R4#
...
Client-R4#undebug all
All possible debugging has been turned off
Task
Complete the configuration of R3 as a Rogue DHCP Server by doing the following:
Enable the command service dhcp .
Create a DHCP Pool (using the name INE).
Your pool should provide IP addresses within the correct subnet of
24.24.24.0/24.
Your pool should be configured to intentionally offer an INCORRECT IP
address of 24.24.24.33 (the Rogue DHCP Server) as the Default-Router for
all DHCP clients.
Your pool should be configured with a DHCP Lease time of 7 days.
Typically, when DHCP clients receive more than a single offer in response to their
DHCP Discover packet, they will accept the very first offer they received.
In this case, because the Rogue DHCP Server is located in the same VLAN as the
DHCP clients, any DHCP offer sent from this device should be accepted before any
legitimate offer sent from the Corporate DHCP Server. This will result in DHCP
clients being given an IP address in the correct subnet, but their default-gateway
assignment will be wrong. Any packets they attempt to send off-subnet will be sent
to R3 (the Rogue DHCP Server) because the clients believe that device is their
Default-Gateway.
To verify this:
If the above steps do not work, and you still have a default-route
pointing at your legitimate Default-Gateway of 24.24.24.22, disable
FastEthernet0/1 on CLient-R2, wait at least 30 seconds, and then
enable this interface again.
Verification
Client-R2
(config)#int fast 0/1 Client-R2(config-if)#shutdown
Client-R2(config-if)# Client-R2(config-if)#no shutdown
Client-R2(config-if)#
Client-R2(config-if)#end
Client-R2#
*Nov 6 07:38:43.343: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/1 assigned DHCP address 24.24.24.2, mask 255.2
Client-R2#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
Gateway of last resort is 24.24.24.33 to network 0.0.0.0
S* 0.0.0.0/0 [254/0] via 24.24.24.33
Ping an off-subnet address like 1.1.1.11. Does your ping succeed? Why or why not?
Client-R2#ping 1.1.1.11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.11, timeout is 2 seconds:
!!!!! Success rate is 100 percent (5/5)
, round-trip min/avg/max = 1/1/4 ms
Client-R2#
You can see in the above example that pinging an off-subnet address DID work; but
how was that possible if Client-R2 now believes the Rogue DHCP Server (R3) is
the default-gateway?
Any IP packets that Client-R2 sends to an off-subnet address are (at Layer 2) being
addressed to the destination MAC address of its default-gateway (the Rogue DHCP
Server in this case).
When those Ethernet frames arrive on R3 (Rogue DHCP Server), R3 believes those
frames are meant for itself so the Ethernet header is removed, revealing the IP
packet inside.
Our Rogue DHCP Server (R3 in this example) has been pre-configured for IP
routing. So when it inspects the packet it received (originally sent by Client-R2) and
realizes that the packet is NOT meant for itself, it routes that packet to its OWN
default-gateway of 24.24.24.22.
In this manner, packets sent off-subnet by the DHCP clients are actually getting
routed, but they are getting routed by the wrong device (Rogue DHCP Server). This
can be viewed by doing the following steps:
In the Rogue DHCP Server (R3), enable the command debug ip packet detail .
Issue another ICMP Ping from Client-R2 to any off-subnet address (1.1.1.11 is used
in the example below).
Look at the debug output captured by R3. This proves that these ICMP pings sent by
Client-R2 were actually sent to, and routed by, the Rogue DHCP Server.
Verification
Rogue-Server-R3>
en Rogue-Server-R3#debug ip packet detail
IP packet debugging is on (detailed)
Rogue-Server-R3#
Client-R2#ping 1.1.1.11
In summary, this task has demonstrated the need for DHCP snooping by showing
how:
All DHCP broadcast-based packets are seen by all devices within a VLAN.
The above observation allows placement of a Rogue DHCP Server within a VLAN
that can offer DHCP clients incorrect information.
CCNP SWITCH Workbook - Switching
Security Features
Task
All of the topology shown in the diagram, including the Corporate
DHCP Server, Rogue DHCP Server, VLANs, routing, and IP
addresses, have been pre-configured. You will configure the DHCP
Snooping feature in this task.
In this lab, even though the terms "servers" and "clients" are
mentioned, in reality, your routers are acting as these devices.
Configure DHCP Snooping on Switch-2.
Verify that DHCP Snooping is functional by:
1: Verify that the DHCP Snooping feature has been enabled correctly by
viewing the output of the command show ip dhcp snooping .
2: View the DHCP Snooping Binding Database and look for entries created
by DHCP Clients R2 and R4.
3: Verify that all DHCP clients received their DHCP information from the
Corporate DHCP Server.
4: Verify that the Rogue DHCP Server never had any visibility to DHCP
broadcasts generated by the clients.
5: Verify that DHCP clients did not have visibility to each other's DHCP
broadcasts.
Switch-2 Configuration
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#ip dhcp snooping
Switch-2(config)#ip dhcp snooping vlan 24
Verification 1
Switch-2#show ip dhcp snooping
Switch DHCP snooping is enabled
DHCP snooping is configured on following VLANs: 24
DHCP snooping is operational on following VLANs: 24
Verification 2
Client-R2#
conf t Client-R2(config)#int fast 0/1
Client-R2(config-if)#shutdown
Client-R2(config-if)#no shutdown
Client-R2(config-if)#end
Client-R2#
Client-R2#
*Nov 6 09:08:09.903: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/1 assigned DHCP address 24.24.24.9, mask 255.2
Client-R4
#conf t Client-R4(config)#int fast 0/1
Client-R4(config-if)#shutdown
Client-R4(config-if)#no shutdown
Client-R4(config-if)#end
Client-R4#
Client-R4#
Nov 6 09:14:51.205: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/1 assigned DHCP address 24.24.24.4, mask 255.25
Switch-2#
Verification 3
DHCP-Server-R1# show ip dhcp pool
Pool INE :
Utilization mark (high/low) : 100 / 0
Subnet size (first/next) : 0 / 0
Total addresses : 254 Leased addresses : 2
Pending event : none
1 subnet is currently in the pool : Current index IP address range Leased addresses
24.24.24.10 24.24.24.1 - 24.24.24.254 2
DHCP-Server-R1#
3031.612e.3663.3330.
2e38.6664.662d.4661.
302f.31
DHCP-Server-R1#
Verification 4
Rogue-Server-R3>
en
Rogue-Server-R3#conf t
Enter configuration commands, one per line. End with CNTL/Z. Rogue-Server-R3(config)#
logging buffer debug
Rogue-Server-R3(config)#end
Rogue-Server-R3#
Nov 6 09:25:29.333: %SYS-5-CONFIG_I: Configured from console by console Rogue-Server-R3#
debug ip udp port 67
UDP packet debugging is on
Rogue-Server-R3#clear log
In the previous task, we saw how flooded DHCP packets were captured by this
debug. Now with DHCP Snooping enabled on the switch, those packets will NOT be
flooded and this debug on the Rogue DHCP Server (R3) should pick up...nothing.
Client-R2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Client-R2(config)# int fast 0/1
Client-R2(config-if)# shutdown
Client-R2(config-if)# Client-R2(config-if)# no shutdown
Client-R2(config-if)#end
Client-R2#
Client-R2#
*Nov 6 09:23:18.031: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/1 assigned DHCP address 24.24.24.9, mask 255.2
Rogue-Server-R3#show log
Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering
The debug we enabled has not captured any UDP Port-67 packets, as expected.
Verification 5
Just follow the exact same steps as in Verification 4, but this time enable debug ip
udp port 67 on DHCP Client-R4. Just like the previous verification step, R4 should
receive no output from this debug.
Task
Notice that in the previous steps, you enabled DHCP Snooping on a switch (Switch-
2) that was configured as a DHCP Relay Agent. In other words, when Switch-2
receives DHCP broadcasts on its VLAN-24 Switched Virtual Interface, it
encapsulates those and routes them toward the Corporate DHCP Server as
unicasts.
Now, change the configuration of Switch-1 and Switch-2 so they match the topology
diagram below (notice that Switch-1 is now configured as the DHCP Relay Agent,
and the link between Switch-1 and Switch-2 is a Layer-2 Access Switchport. Do
NOT change any of your existing DHCP Snooping configuration on Switch-2.
Switch-2 Configuration
Switch-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#int fast 0/10
Switch-2(config-if)#switchport
Switch-2(config-if)#switchport mode access
Switch-2(config-if)#switchport access vlan 24
Switch-2(config-if)#exit Switch-2(config)#no interface vlan 24
Switch-2(config)#end
Switch-2#
Switch-1 Configuration
Switch-1#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#interface vlan 24
Switch-1(config-if)#ip address 24.24.24.22 255.255.255.0
Switch-1(config-if)#ip helper-address 1.1.1.1
Switch-1(config-if)#no shut
Switch-1(config-if)#exit Switch-1(config)#vlan 24
Switch-1(config-vlan)#exit Switch-1(config)#interface fast 0/10
Switch-1(config-if)#switchport
Switch-1(config-if)#switchport access vlan 24
Switch-1(config-if)#switchport mode access
Switch-1(config-if)#end
Switch-1#
Task
Test to see if DHCP Snooping is still functional on Switch-2. If not, do you know
WHY?
Verification
Client-R2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Client-R2(config)#int fast 0/1
Client-R2(config-if)#shutdown
Client-R2(config-if)# Client-R2(config-if)#no shutdown
Client-R2(config-if)#end
Client-R2#
*Nov 6 10:03:17.267: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
Client-R2#
You should have noticed on both Client-R2 and Client-R4 that they are no longer
able to obtain DHCP information from any DHCP Server.
Task
Fix DHCP Snooping on Switch-2 so that both DHCP clients can, once again, obtain
DHCP information from the Corporate DHCP Server.
Switch-2 Configuration
Switch-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#
no ip dhcp snooping information option
Switch-2(config)#interface FastEthernet0/10
Switch-2(config-if)#ip dhcp snooping trust
Switch-2(config-if)#end
Switch-2#
What did you learn about DHCP Snooping after changing the topology?
1. When a switch is operating as a Layer-3 switch and a DHCP Relay Agent, the Layer-
3 SVI that receives inbound DHCP broadcasts from clients is, by default, trusted by
DHCP Snooping. So there is no need to configure any interfaces (physical or virtual)
as DHCP Snooping Trusted interfaces.
2. When a switch is operating as a Layer-2 switch, and all DHCP clients as well as any
ports that lead to trusted DHCP servers are Layer-2 Switchports, then the physical
interfaces leading upstream to trusted DHCP servers must be configured with the
ip dhcp snooping trust command.
3. When a switch is operating as a Layer-2 switch, it will, by default, insert the DHCP
Option-82 into any DHCP client packets it receives. However, most DHCP servers
(including Cisco routers and switches configured as DHCP servers) cannot recognize
Option-82 and will drop any DHCP client packets that contain this option. To fix this,
we needed to configure the DHCP snooping switch to NOT insert Option-82 into
DHCP Client packets by using the command no ip dhcp snooping information option .
CCNP SWITCH Workbook - Switching
Security Features
In this lab, even though the terms "servers" and "clients" are
mentioned, in reality, your routers are acting as these devices.
Task
In this first task, you'll learn why the Dynamic ARP Inspection feature can be useful
within a network.
On Client-R2, issue the command show ip arp 24.24.24.22 several times repeatedly
over the course of a minute or so; what do you notice?
On Client-R2, perform an extended ping of 1.1.1.1 using a count of 2,000 and
note the results.
Malicious-User#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Malicious-User(config)#int fast 0/0
Malicious-User(config-if)#ip add 24.24.24.22 255.255.255.0
Malicious-User(config-if)#end
Malicious-User#
Malicious-User#
Malicious-User#
Nov 6 13:21:05.495: IP ARP: Gratuitous ARP throttled.
Nov 6 13:21:05.495: IP ARP: 24.24.24.22 added to arp_defense_Q
Malicious-User#
Nov 6 13:21:06.487: IP ARP: 24.24.24.22 removed from arp_defense_Q
Nov 6 13:21:06.487: IP ARP: sent rep src 24.24.24.22 0018.b9ba.6dd8,
dst 24.24.24.22 0018.b9ba.6dd8 FastEthernet0/0
Cisco routers and switches automatically send a gratuitous ARP response either the
moment you change an IP address on an interface or after that interface comes up
from previously being disabled.
In the output above, we can see that when you duplicated Switch-1's IP address (by
configuring it on FastEthernet0/0 of R3, the Malicious User), both R3 and Switch-1
got into an ARP war, whereby they continually sent gratuitous ARP responses for
their IP addresses. Both devices realized (through the reception of the other's ARP
response) that there was a duplicate IP addressing conflict; however, this realization
did nothing to stop them from perpetually sending gratuitous ARP responses.
On the clients, we see that the ARP table is now being "poisoned" by the Malicious
User. In this case, because both the Malicious User and the device that legitimately
owns the address of 24.24.24.22 are constantly sending gratuitous ARPs, the
client's ARP cache will keep bouncing back and forth between both MAC addresses.
What effect does it have on the client when, temporarily at least, it has the wrong
MAC information for its default-gateway?
Client-R2#sho ip route
<output omitted for brevity>
The static route above was dynamically created when Client-R2 obtained a DHCP
IP address, and along with it learned of the default-gateway of 24.24.24.22. But
because the MAC address learned for that same gateway is fluctuating between
Switch-1 and the Malicious User, this is what happens when we actually try to USE
that default-gateway for packet routing:
Your output will probably differ from the example shown above, but
you should at least see a few dropped packets in your own output.
This task has demonstrated the need for Dynamic ARP Inspection. This entire
problem occurred because the Malicious User spoofed the IP address of the default-
gateway and was able to poison the ARP Cache (even if only temporarily) on all the
clients within the VLAN. If the REAL default-gateway had not transmitted any
gratuitous ARPs, the clients' ARP caches would have been permanently poisoned,
and they would have been completely unable to send any packets out of their own
subnet.
In the next task, you'll see how Dynamic ARP Inspection solves this problem.
CCNP SWITCH Workbook - Switching
Security Features
Task
In the previous task, you learned why the Dynamic ARP Inspection feature can be
useful within a network. Now you'll configure it and watch it solve that problem.
Switch-2 Configuration
Switch-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#ip arp inspection vlan 24
Switch-2(config)#int fast Switch-2(config)#int fast 0/10
Switch-2(config-if)#ip arp inspect trust
Switch-2(config-if)#end
...
<output omitted for brevity>
Verification 2
Switch-1# show int vlan 24
Vlan24 is up, line protocol is up Hardware is EtherSVI, address is 0019.2f45.ec41
(bia 0019.2f45.ec41) Internet address is 24.24.24.22/24
Verification 3
Client-R2#ping 1.1.1.1 repeat 1000
Type escape sequence to abort.
Sending 1000, 100-byte ICMP Echos to 1.1.1.1, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!! Success rate is 100 percent (1000/1000)
, round-trip min/avg/max = 1/2/36 ms
Client-R2#
Why did this work? Remember that Dynamic ARP Inspection works alongside
DHCP Snooping. DHCP Snooping (which was pre-configured for you in this lab)
builds a DHCP Snooping Binding Table from the DHCP Client-Server transactions it
observes.
When an ARP request or an ARP reply arrives on a switch configured for Dynamic
ARP Inspection, DAI looks into that DHCP Snooping Binding Table to see if it can
verify that the device transmitting the ARP is actually valid.
In this case, the Malicious User had a static IP address, so whenever the Malicious
User transmitted a spoofed Gratuitous ARP reply, Switch-2 (running DAI) would
intercept it and attempt to verify the validity of that user. However, DAI within Switch-
2 was unable to find a corresponding DHCP Snooping Binding entry for that IP
address/MAC Address learned on port 0/3. Because DAI couldn't verify the validity
of the sender of that Gratuitous ARP Reply (from the Malicious User), the switch
dropped the packet and would log the following message:
The legitimate owner of 24.24.24.22 (Switch-1) also was not participating in DHCP.
So we had to use the command ip arp inspection trust on Switch-2's interface
leading toward Switch-1 (FastEthernet0/10).
CCNP SWITCH Workbook - Switching
Security Features
In this lab, even though the terms "servers" and "clients" are
mentioned, in reality, your routers are acting as these devices.
Task
In this task, you'll see how the IP Source Guard feature can prevent IP
spoofing attacks.
First, ensure that your current topology is up and functional (you may have to
enable some interfaces).
Verify that both DHCP clients (R2 and R3) have obtained IP addresses and a default-
gateway via DHCP.
Verify that DHCP Snooping is configured and active on Switch-2, VLAN-24, and that
this switch has some entries in the DHCP Snooping Binding Table for the two DHCP
clients.
Verify that both DHCP clients can ping the DHCP server (at 1.1.1.1) as well as the
Corporate Email Server at 24.24.24.100.
Client-R2#sho ip route
<output omitted for brevity>
Malicious-User#sho ip route
<output omitted for brevity>
Malicious-User#ping 1.1.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.1, timeout is 2 seconds:
!!!!! Success rate is 100 percent (5/5)
, round-trip min/avg/max = 1/2/4 ms Malicious-User#ping 24.24.24.100
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 24.24.24.100, timeout is 2 seconds:
.!!!! Success rate is 80 percent (4/5)
, round-trip min/avg/max = 1/1/4 ms
Malicious-User#
To prevent the attack from being traced back to his machine, the Malicious User
decides to spoof the source IP address of his pings. He has no need to receive
responses to his pings, he just wants his pings to reach the server.
DHCP-Server-R1#
Malicious-User#ping 1.1.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.1, timeout is 2 seconds:
!!!!!Success rate is 100 percent (5/5)
, round-trip min/avg/max = 1/2/4 ms
Malicious-User#
DHCP-Server-R1#show log
<output omitted for brevity>
Nov 7 12:38:56.423: %SYS-5-CONFIG_I: Configured from console by console Nov 7 12:39:19.039: ICMP:
echo reply sent, src 1.1.1.1, dst 24.24.24.2
, topology BASE, dscp 0 topoid 0 Nov 7 12:39:19.039: ICMP: echo reply sent, src 1.1.1.1, dst 24.24.24.2
, topology BASE, dscp 0 topoid 0 Nov 7 12:39:19.043: ICMP: echo reply sent, src 1.1.1.1, dst 24.24.24.2
, topology BASE, dscp 0 topoid 0 Nov 7 12:39:19.043: ICMP: echo reply sent, src 1.1.1.1, dst 24.24.24.2
, topology BASE, dscp 0 topoid 0 Nov 7 12:39:19.047: ICMP: echo reply sent, src 1.1.1.1, dst 24.24.24.2
, topology BASE, dscp 0 topoid 0
DHCP-Server-R1#
Malicious-User#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Malicious-User(config)#
interface loopback 0
Malicious-User(config-if)#ip add 3.3.3.3 255.255.255.255
Malicious-User(config-if)#end
Malicious-User#
DHCP-Server-R1#
Nov 7 12:45:45.235: ICMP: echo reply sent, src 1.1.1.1, dst 3.3.3.3
, topology BASE, dscp 0 topoid 0 Nov 7 12:45:45.239:
ICMP: dst (1.1.1.1) host unreachable rcv from 1.1.1.11
DHCP-Server-R1#
DHCP-Server-R1#
On Switch-2, enable the IP Source Guard feature on the two interfaces connected
to your DHCP clients (FastEthernet0/1 and FastEthernet0/3).
Issue the command show ip verify source to confirm that this feature has been
activated on the correct interfaces.
Switch-2(config-if-range)#end
Switch-2#
Once again, initiate the extended ping from the Malicious User, using the source IP
address of 3.3.3.3.
The IP Source Guard feature works in hardware, so you will not see any syslogs or
debug output to indicate that it is working.
To verify that the IP Source Guard feature successfully dropped the "spoofed"
packets from the Malicious User:
View the output of debug ip icmp on the DHCP server. You should see...nothing.
This indicates that no ICMP packets were received.
Malicious-User#ping 1.1.1.1 repeat 50 source 3.3.3.3
DHCP-Server-R1#show debug
Generic IP:
_ICMP packet debugging is on_
<no output is seen>
DHCP-Server-R1#
Imagine that interface FastEthernet0/4 was connected to a hub. This hub is not only
connected to the Corporate Email Server, but also to a training room as shown
below. You probably would NOT want that interface to be a DHCP snooping trusted
interface, and you probably WOULD want to enable IP Source Guard on this
interface.
Do that now.
Switch-2 Configuration
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#int fast 0/4
Switch-2(config-if)#no ip dhcp snooping trust
Switch-2(config-if)#ip verify source
Switch-2(config-if)#end
Switch-2#
Initiate a ping from the Corporate Email Server (R4) to the Corporate DHCP Server.
The ping should fail. Do you understand why?
Corporate-Email-Server#ping 1.1.1.1
Corporate-Email-Server#
Issue the command show ip verify source on Switch-2. Pay special attention to the
status of port 0/4. Do you understand the output you are viewing?
As mentioned earlier, IP Source Guard relies on being able to match the source IP
address and incoming interface of IP packets against what it finds in the DHCP
Snooping Binding Table. However, the Corporate Email Server is not participating in
DHCP; it has a static address.
Because IP Source Guard cannot find any entry in the DHCP Snooping Binding
Table for interface FastEthernet0/4, yet it knows that this interface is a DHCP
snooping untrusted interface, it automatically places a dynamic ACL blocking all
inbound IP packets received on this interface.
To fix this, we need to create a static IP entry that IP Source Guard can use to verify
the validity of packets received from the Corporate Email Server.
In Switch-2, configure a static IP entry so that IP Source Guard will no longer block
packets received from the Corporate Email Server.
Corporate-Email-Server#ping 1.1.1.1
7.6 Storm-Control
Load the CCNP-Switch-Task7-6 initial configurations before starting.
Task
In this task, you'll see how the Storm-Control feature can prevent the
devastating effects of bridging loops.
Switch-2 Configuration
Switch-2#config t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#int range fast0/10 - 12
Switch-2(config-if-range)#storm-control broadcast level ? <0.00 - 100.00> Enter rising threshold
pps Enter suppression level in packets per second
Switch-2(config-if-range)#end
Switch-2#
Task
Right now, there are not many broadcasts going on in this topology. To make things
interesting (and trigger Storm-Control), let's induce a broadcast storm.
To begin, we'll intentionally create a bridging loop in this topology (do not try this in
your production network).
The above configurations should cause all three interfaces (FastEthernet0/10 - 12)
connecting Switch-1 to Switch-2 to be in Forwarding state on both sides of the links.
Switch-1#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-1(config)#
spanning-tree vlan 1 priority 0
Switch-1(config)#end
Switch-1#
Switch-1#show spanning-tree vlan 1
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 1
Address 0019.2f45.ec00
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 1 (priority 0 sys-id-ext 1)
Address 0019.2f45.ec00
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15 sec
Switch-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#int range fast0/10 - 12
Switch-2(config-if-range)#spanning-tree bpdufilter enable
Switch-2(config-if-range)#end
Switch-2#
Switch-2#show spanning-tree vlan 1
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8581.a500
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Task
Now that we have a broadcast loop between Switch-1 and Switch-2, any broadcasts
that are received by either of these switches (on VLAN-1) will be constantly
replicated and forwarded around this loop. Any other ports, also in VLAN-1, will
suffer from broadcasts as well.
View the running-configuration of Router-4. You will notice that the pre-config for this
lab created a static ARP entry on this router for 1.1.1.2 with a broadcast MAC
address.
Host#sh run
Building configuration...
In theory, when you try to ping 1.1.1.2 from the host (Router-4), all pings to this
address should be sent at Layer 2 to the broadcast destination MAC address
(because of the static ARP entry). These broadcasts will be replicated infinitely by
Switch-1 and Switch-2 as they are propagated across the bridging loop.
Initiate a ping from the Host to 1.1.1.2 with a repeat count of 1000. You will not
see any replies to these pings; this is simply to generate broadcast traffic on VLAN-1.
Repeat the command on Switch-2, show interface fastethernet0/10 | i packets output ,
every couple of seconds.
Notice that the continuous ping you are transmitting from the host has a default
timeout of 2 seconds. So the output of the command above should be incrementing
every couple of seconds.
On Switch-2, enter the command interface range fast0/11 - 12 and press Enter.
While within interface range configuration mode, enter the command
do show interface fastethernet0/10 | i packets output .
The moment that Spanning-Tree places FastEthernet0/11 and 0/12 into the
Forwarding state and your bridging loop is induced, you should notice that the
quantity of packets output on Fast0/10 dramatically increases.
Shut down port 0/11 and 0/12 as soon as you start seeing the "packets output"
counter increasing out of control.
Task
If they are not already down, shut down all three interfaces on Switch-2
connecting it to Switch-1 (FastEthernet0/10 - 12).
Change the action of Storm-Control to automatically shutdown these three
interfaces when broadcast storms trigger this feature.
Configure the errdisable recovery feature as follows:
The feature should be allowed to automatically recover a port that was
placed into the err-disable state due to Storm-Control.
The feature should automatically recover ports that meet the criteria above
after 30 seconds.
Storm-Control Modification - Configuration
Switch-2(config)#
Task
In this final task, you will observe the Storm-Control feature as it shuts down some
interfaces. You will then see the Error-Disable Recovery feature enable these ports
automatically after 30 seconds...only to see them shut down again moments later by
Storm-Control.
Ensure that your continuous ping from the host to 1.1.1.2 is still active. If not, restart
it.
In Switch-2, using the interface range command, enable ports 0/10 - 12.
Switch-2(config)#interface range fast 0/10 - 12
Switch-2(config-if-range)#no shutdown
Switch-2(config-if-range)#end
Switch-2#
Switch-2#
*Mar 1 03:09:39.063: %SYS-5-CONFIG_I: Configured from console by console
Switch-2#
*Mar 1 03:09:40.235: %LINK-3-UPDOWN: Interface FastEthernet0/10, changed state to up
*Mar 1 03:09:40.247: %LINK-3-UPDOWN: Interface FastEthernet0/11, changed state to up
*Mar 1 03:09:40.259: %LINK-3-UPDOWN: Interface FastEthernet0/12, changed state to up
Switch-2# *Mar 1 03: 09:43.799 : %LINEPROTO-5-UPDOWN:
Line protocol on Interface FastEthernet0/11, changed state to up
*Mar 1 03: 09:43.919 : %LINEPROTO-5-UPDOWN:
Line protocol on Interface FastEthernet0/12, changed state to up
*Mar 1 03: 09:43.959 : %LINEPROTO-5-UPDOWN:
Line protocol on Interface FastEthernet0/10, changed state to up
Switch-2#
Notice that about 30 seconds after the Line protocol of all three
interfaces changes state to up, and Spanning-Tree places the ports
into the Forwarding state, a Broadcast storm is detected by Storm-
Control.
Switch-2#
Switch-2#
Switch-2#
*Mar 1 03:10:13.703: %SW_MATM-4-MACFLAP_NOTIF: Host 001c.589e.7ae1 in vlan 1 is flapping between port Fa0/12 and po
*Mar 1 03: 10:14.135 : %PM-4-ERR_DISABLE:
storm-control error detected on Fa0/10, putting Fa0/10 in err-disable state
*Mar 1 03:10:14.247: %STORM_CONTROL-3-SHUTDOWN: A packet storm was detected on Fa0/10. The interface has been disab
Switch-2# *Mar 1 03: 10:14.247 : %PM-4-ERR_DISABLE:
storm-control error detected on Fa0/11, putting Fa0/11 in err-disable state
*Mar 1 03: 10:14.355 : %PM-4-ERR_DISABLE:
storm-control error detected on Fa0/12, putting Fa0/12 in err-disable state
Switch-2#
*Mar 1 03:10:15.183: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to down
*Mar 1 03:10:15.291: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed state to down
*Mar 1 03:10:15.367: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/12, changed state to down
Switch-2#
*Mar 1 03:10:16.243: %LINK-3-UPDOWN: Interface FastEthernet0/10, changed state to down
*Mar 1 03:10:16.351: %LINK-3-UPDOWN: Interface FastEthernet0/11, changed state to down *Mar 1 03:10:
16.379
: %LINK-3-UPDOWN: Interface FastEthernet0/12, changed state to down
Switch-2#
Switch-2#
Switch-2#
Switch-2# *Mar 1 03:10: 44.247: %PM-4-ERR_RECOVER:
Attempting to recover from storm-control err-disable state on Fa0/10 *Mar 1 03:10:
44.355: %PM-4-ERR_RECOVER:
Attempting to recover from storm-control err-disable state on Fa0/11 *Mar 1 03:10:
44.371: %PM-4-ERR_RECOVER:
Attempting to recover from storm-control err-disable state on Fa0/12
Switch-2#
Switch-2#
Switch-2#
*Mar 1 03:10:47.899: %LINK-3-UPDOWN: Interface FastEthernet0/11, changed state to up
*Mar 1 03:10:47.979: %LINK-3-UPDOWN: Interface FastEthernet0/12, changed state to up
*Mar 1 03:10:48.063: %LINK-3-UPDOWN: Interface FastEthernet0/10, changed state to up
Switch-2#
*Mar 1 03:10:49.915: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed state to up
*Mar 1 03:10:49.995: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/12, changed state to up
*Mar 1 03: 10:50.075
: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to up
Switch-2#
Switch-2#
Switch-2#
*Mar 1 03:11:19.691: %SW_MATM-4-MACFLAP_NOTIF: Host 001c.589e.7ae1 in vlan 1 is flapping between port Fa0/12 and po
*Mar 1 03: 11:19.939 : %PM-4-ERR_DISABLE:
storm-control error detected on Fa0/10, putting Fa0/10 in err-disable state
*Mar 1 03: 11:20.055
: %STORM_CONTROL-3-SHUTDOWN: A packet storm was detected on Fa0/10. The interface has been disabled.
*Mar 1 03: 11:20.055 : %PM-4-ERR_DISABLE:
storm-control error detected on Fa0/11, putting Fa0/11 in err-disable state
*Mar 1 03: 11:20.163 : %PM-4-ERR_DISABLE:
storm-control error detected on Fa0/12, putting Fa0/12 in err-disable state
*Mar 1 03:11:20.987: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/10, changed state to down
*Mar 1 03:11:21.099: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/11, changed state to down
*Mar 1 03:11:21.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/12, changed state to down
Switch-2#
*Mar 1 03:11:22.047: %LINK-3-UPDOWN: Interface FastEthernet0/10, changed state to down
*Mar 1 03:11:22.159: %LINK-3-UPDOWN: Interface FastEthernet0/11, changed state to down
*Mar 1 03:11:22.187: %LINK-3-UPDOWN: Interface FastEthernet0/12, changed state to down
Switch-2#
Switch-2#
Switch-2#
Task
In this first task, you will complete a basic HSRP configuration.
First, ensure that your current topology is up and functional (you may have to
enable some interfaces).
Verify that your DHCP client (R4) has obtained an IP address via DHCP.
The IP address of the default-gateway (1.2.3.123) will not be
reachable yet because you have not configured HSRP on any routers
at this point.
Task
Configure HSRP on Router-1, Router-2, and Router-3 following these guidelines:
HSRP will provide gateway redundancy for the DHCP client (R4).
Use an HSRP Group number of one (1).
Use an HSRP Virtual-IP address of 1.2.3.123.
Without using any "show" commands, can you predict which router will be the
HSRP Active router? The HSRP Standby router?
Verify whether your prediction about the routers playing the roles of HSRP Active
and Standby were correct.
Router-1(config-if)#end
Router-1#
Router-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#int fast 0/1
Router-2(config-if)#standby 1 ip 1.2.3.123
Router-2(config-if)#end
Router-2#
Router-3#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-3(config)#int fast 0/0
Router-3(config-if)#standby 1 ip 1.2.3.123
Router-3(config-if)#end
Router-3#
HSRP Verification
By default, the very first router to be configured with HSRP would assume the role of
the HSRP Active router. Subsequent to that, even though HSRP Preemption is
disabled by default, all remaining routers connected to the same HSRP Group will
elect amongst each other the HSRP Standby router based on highest IP address
(because all routers have the same, default HSRP priority).
If a new router comes online later with a higher IP address than the current HSRP
Standby router, the new router will assume the role of HSRP Standby.
In the example below, Router-1 was the first router to be configured with HSRP so it
became the HSRP Active router. Router-3 was the last router to be configured with
HSRP, but it has a higher interface IP address than Router-2 so Router-3 became
the HSRP Standby router.
Router-1#show standby
FastEthernet0/1 - Group 1 State is Active
2 state changes, last state change 00:09:39
Virtual IP address is 1.2.3.123
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.080 secs
Preemption disabled Active router is local
Standby router is 1.2.3.3
, priority 100 (expires in 9.440 sec)
Priority 100 (default 100)
Group name is "hsrp-Fa0/1-1" (default)
Router-1#
Router-2#show standby
FastEthernet0/1 - Group 1 State is Listen
4 state changes, last state change 00:03:23
Virtual IP address is 1.2.3.123
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default)
Hello time 3 sec, hold time 10 sec
Preemption disabled Active router is 1.2.3.1
, priority 100 (expires in 9.792 sec) Standby router is 1.2.3.3
, priority 100 (expires in 11.040 sec)
Priority 100 (default 100)
Group name is "hsrp-Fa0/1-1" (default)
Router-2#
Router-3#show standby
FastEthernet0/0 - Group 1 State is Standby
3 state changes, last state change 00:03:28
Virtual IP address is 1.2.3.123
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 1.616 secs
Preemption disabled Active router is 1.2.3.1
, priority 100 (expires in 10.096 sec) Standby router is local
As you know, HSRP utilizes a virtual MAC address at the OSI Datalink Layer. This
MAC address is monitored at any given time by the HSRP Active Router.
View the HSRP Virtual MAC address in the MAC Address-Table of Switch-2.
For this next task, you'll need to have two Telnet windows open simultaneously. One
window should allow you to view the output of the DHCP client (R4) while the other
allows you to make changes to Switch-2.
Begin a continuous ping from the DHCP client (R4) to the IP address of
111.111.111.111 (repeat count of 10,000).
Shut down the FastEthernet interface of Switch-2 that connects to your HSRP
Active router.
Monitor how many (if any) pings are lost (and the length of time until pings resume)
until one of the other routers assumes the role of HSRP Active Router.
How long did it take for the HSRP Standby Router to switch over to HSRP Active?
...
<output omitted for brevity>
Switch-2(config-if)#
In the test above, pings were stopped for about 10 seconds and then resumed.
CCNP SWITCH Workbook - First Hop
Redundancy Protocols
Task
In this task, you will configure HSRP Preemption so that Router-2 always
becomes the HSRP Active router.
First, ensure that your current topology is up and functional (you may have to
enable some interfaces).
Router-2 Configuration
Router-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#int fast 0/1
Router-2(config-if)#shutdown
Router-2(config-if)#
Nov 18 08:03:28.943: %HSRP-5-STATECHANGE: FastEthernet0/1 Grp 1 state Standby -> Init
Router-2(config-if)#
Nov 18 08:03:30.939: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to administratively down
Nov 18 08:03:31.939: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to down
Router-2(config-if)#standby 1 priority 101
Router-2(config-if)#standby 1 preempt
Router-2(config-if)#do debug standby
HSRP debugging is on
Router-2(config-if)#
Router-2(config-if)#no shutdown
Router-2(config-if)#^Z
Router-2#
Router-2#
Nov 18 08:06:22.231: HSRP: Fa0/1 Interface UP
Nov 18 08:06:22.231: HSRP: Fa0/1 Starting minimum intf delay (1 secs)
Nov 18 08:06:22.231: HSRP: Fa0/1 ARP reload
Nov 18 08:06:22.231: HSRP: Fa0/1 ARP reload
Nov 18 08:06:22.295: HSRP: Fa0/1 Nbr 1.2.3.1 Passive timer expired
Nov 18 08:06:22.295: HSRP: Fa0/1 Nbr 1.2.3.1 is no longer passive
Nov 18 08:06:22.295: HSRP: Fa0/1 Nbr 1.2.3.1 destroyed
Nov 18 08:06:23.223: HSRP: Fa0/1 Intf min delay expired
Nov 18 08:06:23.223: HSRP: Fa0/1 Grp 1 Init: a/HSRP enabled
Nov 18 08:06:23.223: HSRP: Fa0/1 Grp 1 Init -> Listen
Nov 18 08:06:23.223: HSRP: Fa0/1 Interface adv out, Passive, active 0 passive 1 Nov 18 08:06:23.223:
HSRP: Fa0/1 Grp 1 Redundancy "hsrp-Fa0/1-1" state Init -> Backup
Nov 18 08:06:23.223: HSRP: Fa0/1 IP Redundancy "hsrp-Fa0/1-1" update, Init -> Backup
Router-2#
Router-2#
Nov 18 08:06:23.315: %SYS-5-CONFIG_I: Configured from console by console
Nov 18 08:06:24.219: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
Router-2#
Nov 18 08:06:24.475: HSRP: Fa0/1 Grp 1 MAC addr update Delete from SMF 0000.0c07.ac01
Nov 18 08:06:25.155: HSRP: Fa0/1 Grp 1 Hello in 1.2.3.1 Standby pri 100 vIP 1.2.3.123
Nov 18 08:06:25.155: HSRP: Fa0/1 Grp 1 Listen: l/Hello rcvd from lower pri Standby router (100/1.2.3.1)
Nov 18 08:06:25.155: HSRP: Fa0/1 Grp 1 Standby router is 1.2.3.1
Nov 18 08:06:25.155: HSRP: Fa0/1 Nbr 1.2.3.1 created
Nov 18 08:06:25.155: HSRP: Fa0/1 Nbr 1.2.3.1 standby for group 1 Nov 18 08:06:25.155:
HSRP: Fa0/1 Grp 1 Listen -> Speak
Nov 18 08:06:25.155: HSRP: Fa0/1 Grp 1 Redundancy "hsrp-Fa0/1-1" state Backup -> Speak
Nov 18 08:06:25.159: HSRP: Fa0/1 Grp 1 Hello out 1.2.3.2 Speak pri 101 vIP 1.2.3.123
Nov 18 08:06:25.159: HSRP: Fa0/1 IP Redundancy "hsrp-Fa0/1-1" standby, unknown -> 1.2.3.1
Nov 18 08:06:25.159: HSRP: Fa0/1 IP Redundancy "hsrp-Fa0/1-1" update, Backup -> Speak
Router-2#
Nov 18 08:06:25.219: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
Nov 18 08:06:26.147: HSRP: Fa0/1 Grp 1 Hello in 1.2.3.3 Active pri 100 vIP 1.2.3.123
Nov 18 08:06:26.151: HSRP: Fa0/1 Grp 1 Active router is 1.2.3.3
Nov 18 08:06:26.151: HSRP: Fa0/1 Nbr 1.2.3.3 is no longer passive Nov 18 08:06:26.151:
HSRP: Fa0/1 Nbr 1.2.3.3 active for group 1
Nov 18 08:06:26.151: HSRP: Fa0/1 Interface adv out, Passive, active 0 passive 1 Nov 18 08:06:26.151:
HSRP: Fa0/1 Grp 1 Speak: h/Hello rcvd from lower pri Active router (100/1.2.3.3)
Nov 18 08:06:26.151: HSRP: Fa0/1 Grp 1 Active router is local, was 1.2.3.3
Nov 18 08:06:26.151: HSRP: Fa0/1 Nbr 1.2.3.3 no longer active for group 1 (Speak)
Nov 18 08:06:26.151: HSRP: Fa0/1 Nbr 1.2.3.3 Was active or standby - start passive holddown
Nov 18 08:06:26.151: HSRP: Fa0/1 Interface adv out, Active, active 1 passive 1
Nov 18 08:06:26.151: HSRP: Fa0/1 Grp 1 Coup out 1.2.3.2 Speak pri 101 vIP 1.2.3.123
Nov 18 08:06:26.151: HSRP: Fa0/1 Grp 1 Speak -> Active Nov 18 08:06:26.151:
%HSRP-5-STATECHANGE: FastEthernet0/1 Grp 1 state Speak -> Active
Nov 18 08:06:26.151: HSRP: Fa0/1 Interface adv out, Active, active 1 passive 0
Nov 18 08:06:26.151: HSRP: Fa0/1 Grp 1 Redundancy "hsrp-Fa0/1-1" state Speak -> Active
Nov 18 08:06:26.151: HSRP: Fa0/1 Grp 1 Hello out 1.2.3.2 Active pri 101 vIP 1.2.3.123
Nov 18 08:06:26.155: HSRP: Fa0/1 Grp 1 Added 1.2.3.123 to ARP (0000.0c07.ac01)
Nov 18 08:06:26.155: HSRP: Fa0/1 Grp 1 Activating MAC 0000.0c07.ac01
Nov 18 08:06:26.155: HSRP: Fa0/1 Grp 1 Adding 0000.0c07.ac01 to MAC address filter
Nov 18 08:06:26.155: HSRP: Fa0/1 IP Redundancy "hsrp-Fa0/1-1" update, Speak -> Active
Nov 18 08:06:26.155: HSRP: Fa0/1 Interface adv in, Passive, active 0, passive 1, from 1.2.3.1
Router-2#
Nov 18 08:06:26.155: HSRP: Fa0/1 Interface adv in, Passive, active 0, passive 1, from 1.2.3.3
Nov 18 08:06:26.163: HSRP: Fa0/1 Grp 1 Hello in 1.2.3.3 Speak pri 100 vIP 1.2.3.123
Router-2#
Nov 18 08:06:28.903: HSRP: Fa0/1 Grp 1 Hello in 1.2.3.3 Speak pri 100 vIP 1.2.3.123
Nov 18 08:06:29.115: HSRP: Fa0/1 Grp 1 Hello out 1.2.3.2 Active pri 101 vIP 1.2.3.123
Nov 18 08:06:29.147: HSRP: Fa0/1 IP Redundancy "hsrp-Fa0/1-1" update, Active -> Active
Router-2#
Nov 18 08:06:31.559: HSRP: Fa0/1 Grp 1 Hello in 1.2.3.3 Speak pri 100 vIP 1.2.3.123
Nov 18 08:06:31.915: HSRP: Fa0/1 Grp 1 Hello out 1.2.3.2 Active pri 101 vIP 1.2.3.123
Router-2#
Nov 18 08:06:34.427: HSRP: Fa0/1 Grp 1 Hello out 1.2.3.2 Active pri 101 vIP 1.2.3.123
Nov 18 08:06:34.551: HSRP: Fa0/1 Grp 1 Hello in 1.2.3.3 Speak pri 100 vIP 1.2.3.123
Router-2# Nov 18 08:06:36.699: HSRP: Fa0/1 Grp 1 Standby router is unknown, was 1.2.3.1
Nov 18 08:06:36.699: HSRP: Fa0/1 Nbr 1.2.3.1 no longer standby for group 1 (Active)
Nov 18 08:06:36.699: HSRP: Fa0/1 Nbr 1.2.3.1 Was active or standby - start passive holddown
Nov 18 08:06:37.275: HSRP: Fa0/1 Grp 1 Hello out 1.2.3.2 Active pri 101 vIP 1.2.3.123
Nov 18 08:06:37.431: HSRP: Fa0/1 Grp 1 Hello in 1.2.3.3 Speak
pri 100 vIP 1.2.3.123
Router-2# Nov 18 08:06:37.975: HSRP: Fa0/1 Grp 1 Hello in 1.2.3.3 Standby
pri 100 vIP 1.2.3.123 Nov 18 08:06:37.975: HSRP: Fa0/1 Grp 1 Standby router is 1.2.3.3
Task
Modify the HSRP timers on Router-2 so that:
This router transmits HSRP Hello packets every 100msecs.
This router uses an HSRP Holdtime of 300msecs.
Router-2 Configuration
Router-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#int fast 0/1
Router-2(config-if)#standby 1 timers msec 100 msec 300
Router-2(config-if)#end
Router-2#
Task
Verify whether your changes have reduced the HSRP convergence time by doing
the following:
On Router-3:
In global configuration mode, enter logging buffer debug . This will copy all
debug output to a memory buffer (log).
While still in global configuration mode, enter service timestamps debug
datetime msec . This command will ensure that timestamps, down to
Router-3#
Switch-2>
en
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#int fast 0/1
Switch-2(config-if)#shutdown
Switch-2(config-if)#end
Switch-2#
Go back to Router-3 and disable all debugs with the command undebug all
View the debug output on Router-3 by entering the command show log .
How did Router-3 first learn that the HSRP Active Router (Router-2) was no
longer alive?
After determining that the HSRP Active Router was no longer alive, how
long did it take Router-3 to assume the role of HSRP Active?
Router-3#undebug all
All possible debugging has been turned off Router-3#show log
...
<output omitted for brevity>
1. The last HSRP Hello that Router-3 receives from the HSRP Active Router (Router-2)
is at timestamp 08:51:54.743.
2. The "Active Timer" (Holdtime) on Router-3 does not expire until 08:52:05.527,
which is roughly 10 cseconds after it received the last HSRP Hello from Router-2.
3. At that same timestamp of 08:52:05.527, Router-3 assumes the HSRP Active Router
role.
You can see from the image above that the HSRP Active Router DOES include its
Hello Advertisement Interval, and also tells its HSRP peers how long to wait until
declaring the Active router to be down (the Holdtime) as fields within the HSRP
Hello packet. So if Router-2 was advertising sub-second timers, why did Router-3
wait 10 seconds before transitioning its state to Active?
The problem here is that both of these fields within the packet are only 1-byte in
length. These fields are too small to contain any value greater than 255 (or
11111111 in binary). How could they be used to advertise something like 300
milliseconds? Or 800 milliseconds? When you configure sub-second values on the
HSRP Active router (as you did in Router-2), the value of both the Hello and
Holdtime fields will be set to one (1).
When an HSRP Router receives a HSRP Hello packet with timers of one (1), there
is no way for that receiving router to determine whether the advertised Holdtime is
really 1-second...or something LESS than 1-second. The receiving router will
basically ignore those advertised timers and stick with the default timers (Hello = 3-
seconds and Holdtime = 10-seconds).
In summary, even though you configured Router-2 to transmit its Hello packets
every 100 milliseconds and configured a Holdtime of 300 milliseconds, it did not
decrease the HSRP convergence time because Router-2 had no way to place those
specific values within the HSRP Hello packet.
Task
Configure both Router-1 and Router-3 with the exact same HSRP timers you
configured on Router-2.
Perform the same set of steps you did in the proceeding task and view the new
convergence time of HSRP.
Router-3>enRouter-3#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-3(config)#int fast 0/0
Router-3(config-if)#standby 1 timers msec 100 msec 300
Router-3(config-if)#end
Router-3#
Router-3# Router-3#show standby
FastEthernet0/0 - Group 1
State is Standby
13 state changes, last state change 00:32:19
Virtual IP address is 1.2.3.123
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default) Hello time 100 msec, hold time 300 msec
Next hello sent in 0.032 secs
Preemption disabled
Active router is 1.2.3.2, priority 101 (expires in 0.352 sec)
Standby router is local
Priority 100 (default 100)
Group name is "hsrp-Fa0/0-1" (default)
Router-3#
Router-3#
Switch-2>
en
Switch-2#conf t
Enter configuration commands, one per line. End with CNTL/Z. Switch-2(config)#int fast 0/1
Switch-2(config-if)#shutdown
Switch-2(config-if)#end
Switch-2#
Router-3#show log
...
<output omitted for brevity>
...
Nov 18 09:35:49.647: HSRP: Fa0/0 Grp 1 Hello in 1.2.3.2 Active pri 101 vIP 1.2.3.123
Nov 18 09:35:49.695: HSRP: Fa0/0 Grp 1 Hello out 1.2.3.3 Standby pri 100 vIP 1.2.3.123 Nov 18
09:35:49.743: HSRP: Fa0/0 Grp 1 Hello in 1.2.3.2 Active
pri 101 vIP 1.2.3.123
Nov 18 09:35:49.807: HSRP: Fa0/0 Grp 1 Hello out 1.2.3.3 Standby pri 100 vIP 1.2.3.123
Nov 18 09:35:49.919: HSRP: Fa0/0 Grp 1 Hello out 1.2.3.3 Standby pri 100 vIP 1.2.3.123
Nov 18 09:35:50.015: HSRP: Fa0/0 Grp 1 Hello out 1.2.3.3 Standby pri 100 vIP 1.2.3.123 Nov 18
09:35:50.079 : HSRP: Fa0/0 Grp 1 Standby: c/ Active timer expired (1.2.3.2)
Nov 18 09:35:50.079: HSRP: Fa0/0 Grp 1 Active router is local, was 1.2.3.2
Nov 18 09:35:50.079: HSRP: Fa0/0 Nbr 1.2.3.2 no longer active for group 1 (Standby)
Nov 18 09:35:50.079: HSRP: Fa0/0 Nbr 1.2.3.2 Was active or standby - start passive holddown
Nov 18 09:35:50.079: HSRP: Fa0/0 Grp 1 Standby router is unknown, was local
Nov 18 09:35:50.079: HSRP: Fa0/0 Grp 1 Standby -> Active
Nov 18 09:35:50.079: %HSRP-5-STATECHANGE: FastEthernet0/0 Grp 1 state Standby -> Active
Nov 18 09:35:50.079: HSRP: Fa0/0 Interface adv out, Active, active 1 passive 0
Nov 18 09:35:50.079: HSRP: Fa0/0 Grp 1 Redundancy "hsrp-Fa0/0-1" state Standby -> Active
Nov 18 09:35:50.079: HSRP: Fa0/0 Grp 1 Hello out 1.2.3.3 Active pri 100 vIP 1.2.3.123
Nov 18 09:35:50.079: HSRP: Fa0/0 Grp 1 Added 1.2.3.123 to ARP (0000.0c07.ac01)
Nov 18 09:35:50.079: HSRP: Fa0/0 Grp 1 Activating MAC 0000.0c07.ac01 Nov 18
09:35:50.079: HSRP: Fa0/0 Grp 1 Adding 0000.0c07.ac01 to MAC address filter
Nov 18 09:35:50.079: HSRP: Fa0/0 IP Redundancy "hsrp-Fa0/0-1" standby, local -> unknown
Nov 18 09:35:50.083: HSRP: Fa0/0 IP Redundancy "hsrp-Fa0/0-1" update, Standby -> Active
Nov 18 09:35:50.083: HSRP: Fa0/0 Grp 1 Hello in 1.2.3.1 Speak pri 100 vIP 1.2.3.123
Nov 18 09:35:50.175: HSRP: Fa0/0 Grp 1 Hello out 1.2.3.3 Active pri 100 vIP 1.2.3.123
Now that we have changed the Hello and Hold timers locally on both Router-1 and
Router-3, they are aware that HSRP is expected to receive HSRP Hello packets
much more quickly than every 3 seconds.
Above we can see that the last HSRP Hello received from the Active Router
(Router-2) was at timestamp 09:35:49.743. Then, about 300 milliseconds later,
that router is declared dead (the Active timer expired at 50.079) and Router-3
assumes the role of the HSRP Active router.
CCNP SWITCH Workbook - First Hop
Redundancy Protocols
Task
In this task, you will configure HSRP to monitor a Track Object.
First, ensure that your current topology is up and functional (you may have to
enable some interfaces).
Router Configuration
Router-1#conf t Router-1(config)#track 1 ip route 111.111.111.0/24 reachability
Router-1(config-if)#end
Router-1#
Router-2>enable
Router-2#config t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#
track 1 ip route 111.111.111.0/24 reachability
Router-2(config-track)#exit Router-2(config)#int fast 0/1
Router-2(config-if)#standby 1 track 1 decrement 50
Router-2(config-if)#end
Router-2#
Router-2#
Nov 18 11:25:07.194: %SYS-5-CONFIG_I: Configured from console by console
Router-2#
Router-3#config t
Enter configuration commands, one per line. End with CNTL/Z. Router-3(config)#
track 1 ip route 111.111.111.0/24 reachability
Router-3(config-track)#exit Router-3(config)#int fast 0/0
Router-3(config-if)#standby 1 track 1 decrement 50
Router-3(config-if)#end
Router-3#
Configuration Verification
Router-3#show standby
FastEthernet0/0 - Group 1
State is Active
17 state changes, last state change 01:51:17
Virtual IP address is 1.2.3.123
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default)
Hello time 100 msec, hold time 300 msec
Next hello sent in 0.016 secs
Preemption disabled
Active router is local
Standby router is 1.2.3.1, priority 100 (expires in 0.256 sec)
Priority 100 (default 100) Track object 1 state Up decrement 50
Router-3#show track
Track 1
IP route 111.111.111.0 255.255.255.0 reachability
Reachability is Up (EIGRP)
1 change, last change 00:01:46
First-hop interface is FastEthernet0/1 Tracked by:
HSRP FastEthernet0/0 1
Router-3#
Task
Configure HSRP Preemption on Routers-1, 2, and 3.
Ensure that Router-1, Router-2, and Router-3 have the following HSRP Priority
values:
Router-1: 110
Router-2: 120
Router-3: 130
Ensure that Router-3 is the current HSRP Active Router.
Configuration
Router-1(config)#int fast 0/1
Router-1(config-if)#standby 1 priority 110
Router-1(config-if)#standby 1 preempt
Router-1(config-if)#end
Router-1#
Router-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#int fast 0/1
Router-2(config-if)#standby 1 priority 120
Router-2(config-if)#standby 1 preempt
Router-2(config-if)#end
Router-3
(config)#int fast 0/0 Router-3(config-if)#standby 1 priority 130
Router-3(config-if)#standby 1 preempt
Router-3(config-if)#end
Router-3#
Verification
Router-3#show standby
FastEthernet0/0 - Group 1
State is Active
22 state changes, last state change 00:00:28
Virtual IP address is 1.2.3.123
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default)
Hello time 100 msec, hold time 300 msec
Next hello sent in 0.032 secs
Preemption enabled Active router is local
Task
Verify that HSRP Object Tracking is functional by performing the following tasks:
Verification
Switch-3(config)#interface FastEthernet0/13
Switch-3(config-if)#shut
Router-2#show standby
FastEthernet0/1 - Group 1 State is Active
21 state changes, last state change 00:02:32
Virtual IP address is 1.2.3.123
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default)
Hello time 100 msec, hold time 300 msec
Next hello sent in 0.016 secs
Preemption enabled Active router is local
8.4 VRRP
Load the CCNP-Switch-Task8-4 initial configurations before starting.
Task
In this first task, you will complete a basic VRRP configuration.
First, ensure that your current topology is up and functional (you may have to
enable some interfaces).
Verify that your DHCP client (R4) has obtained an IP address via DHCP.
The IP address of the default-gateway (1.2.3.123) will not be
reachable yet because you have not configured VRRP on any routers.
Task
Configure VRRP on Router-1, Router-2, and Router-3 following these guidelines:
VRRP will provide gateway redundancy for the DHCP client (R4).
Use a VRRP Group number of one (1).
Use a VRRP Virtual-IP address of 1.2.3.123.
Without using any "show" commands, can you predict which router will be the
VRRP Master router?
Verify whether your prediction about the router playing the role of VRRP Master was
correct.
Router-1(config-if)#end
Router-1#
Router-2#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-2(config)#int fast 0/1
Router-2(config-if)#vrrp 1 ip 1.2.3.123
Router-2(config-if)#end
Router-2#
Router-3#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-3(config)#int fast 0/0
Router-3(config-if)#vrrp 1 ip 1.2.3.123
Router-3(config-if)#end
Router-3#
VRRP Verification
By default, the very first router to be configured with VRRP would assume the role of
the VRRP Master router.
Unlike HSRP, VRRP does have Preemption enabled by default. If a new router
comes online with a higher IP address or priority than the current VRRP Master
router, the new router will assume the role of VRRP Master.
As you configured VRRP you would have noticed that, regardless of the order in
which you configured VRRP onto routers-1, 2, and 3, Router-3 would have become
the VRRP Master simply by virtue of it having the highest IP address in the VRRP
Group.
Router-3#
Nov 18 12:02:43.202: %VRRP-6-STATECHANGE: Fa0/0 Grp 1 state Init -> Backup
Router-3#
Nov 18 12:02:44.182: %SYS-5-CONFIG_I: Configured from console by console
Router-3# Nov 18 12:02:46.818: %VRRP-6-STATECHANGE: Fa0/0 Grp 1 state Backup -> Master
Router-3#
Router-3#show vrrp
FastEthernet0/0 - Group 1 State is Master
Priority is 100
Master Router is 1.2.3.3 (local), priority is 100
Master Advertisement interval is 1.000 sec
Master Down interval is 3.609 sec
Router-3#
For this task, you will need to have two Telnet windows opened simultaneously. One
window should allow you to view the output of the DHCP client (R4) while the other
allows you to make changes to Switch-2.
Begin a continuous ping from the DHCP client (R4) to the IP address of
111.111.111.111 (repeat count of 10,000).
Shut down the FastEthernet interface of Switch-2 that connects to your VRRP
Master router.
Monitor how many (if any) pings are lost (and the length of time until pings resume)
until one of the other routers assumes the role of VRRP Master Router.
How long did it take for a new VRRP Master Router to be elected and become
active?
Host#ping 111.111.111.111 repeat 10000
Type escape sequence to abort.
Sending 10000, 100-byte ICMP Echos to 111.111.111.111, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
<output omitted for brevity> !!!!!!!!!!!!!!!!! ...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
In the test above, pings were stopped for about 3 seconds and then resumed.
CCNP SWITCH Workbook - First Hop
Redundancy Protocols
Task
In this lab, you will complete a basic GLBP configuration.
First, ensure that your current topology is up and functional (you may have to
enable some interfaces).
Verify that your DHCP clients (Sw1 and R2) have obtained an IP address via DHCP.
The IP address of the default-gateway (1.2.3.123) will not be
reachable yet because you have not configured GLBP on any routers.
Task
Configure GLBP on Router-1, Router-3, and Router-4 following these guidelines:
GLBP will provide gateway redundancy for the DHCP client (R4).
Use a GLBP Group number of one (1).
Use a GLBP Virtual-IP address of 1.2.3.123.
Without using any "show" commands, can you predict which router will be the
GLBP Active Virtual Gateway (AVG) router?
Verify whether your prediction about the router playing the role of GLBP AVG was
correct.
Router-1(config-if)#end
Router-1#
Router-4#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-4(config)#int fast 0/1
Router-4(config-if)#glbp 1 ip 1.2.3.123
Router-4(config-if)#end
Router-4#
Router-3#
conf t
Enter configuration commands, one per line. End with CNTL/Z. Router-3(config)#int fast 0/0
Router-3(config-if)#glbp 1 ip 1.2.3.123
Router-3(config-if)#end
Router-3#
GLBP Verification
By default, the very first router to be configured with GLBP would assume the role of
the GLBP AVG router.
Similar to HSRP, GLBP does not have Preemption enabled by default. After the
GLBP AVG is initially elected, that router will remain as the GLBP AVG, even if a
new router comes online with a higher IP address or priority than the current GLBP
AVG router.
As you configured GLBP you would have noticed that, regardless of the order in
which you configured GLBP onto routers-1, 3, and 4, the first router you configured
for GLBP would have become the GLBP AVG.
In the examples below, GLBP was first configured on Router-3, followed by Router-
1 and then Router-4. Notice that the first router configured (Router-3) remained the
GLBP AVG, even though Router-4 has a higher IP address.
In the output below, any time you see the term Active, this refers to the Active
Virtual Gateway (AVG). It does NOT mean Active Virtual Forwarder.
Router-3#show glbp
By default, GLBP operates on a round-robin basis. The router serving as the AVG
will listen for ARP requests from hosts for the GLBP Virtual-IP address and respond
with the MAC addresses of each AVF. To test this, we should see that even though
Host-1 (Sw1) and Host-2 (R2) have learned of the same Default-Gateway
(1.2.3.123), each host should have a different MAC address (that was learned via
ARP) for its Default-Gateway.
In Host-1 (Sw1), initiate a ping to the default-gateway address of 1.2.3.123. This ping
is simply a mechanism to force Host-1 to ARP for its default-gateway.
Have Host-2 (R2) also ping its default-gateway address of 1.2.3.123.
Look in the ARP tables of both Host-1 and Host-2 and notice the MAC address that
was learned for 1.2.3.123.
Did both hosts learn of the same MAC address?
Can you identify which AVF has been assigned to each host?
Host-1#ping 1.2.3.123
Host-2>
en Host-2#ping 1.2.3.123
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.2.3.123, timeout is 2 seconds:
..!!!
Success rate is 60 percent (3/5), round-trip min/avg/max = 1/1/1 ms
Host-2#
Host-2#show ip arp 1.2.3.123
Protocol Address Age (min) Hardware Addr Type Interface Internet
1.2.3.123 0 0007.b400.0102
ARPA FastEthernet0/1
Host-2#
Router-3#show glbp
FastEthernet0/0 - Group 1
State is Active
1 state change, last state change 00:17:45
Virtual IP address is 1.2.3.123
Hello time 3 sec, hold time 10 sec
Next hello sent in 1.824 secs
Redirect time 600 sec, forwarder timeout 14400 sec
Preemption disabled
Active is local
Standby is 1.2.3.4, priority 100 (expires in 8.096 sec)
Priority 100 (default)
Weighting 100 (default 100), thresholds: lower 1, upper 100
Load balancing: round-robin
Group members: 0018.b9ba.6dd8 (1.2.3.3) local
001c.589e.7ae1 (1.2.3.4) 001f.ca05.eab1 (1.2.3.1)
There are 3 forwarders (1 active)
Forwarder 1
State is Active
1 state change, last state change 00:17:33
MAC address is 0007.b400.0101 (default) Owner ID is 0018.b9ba.6dd8
Redirection enabled
Preemption enabled, min delay 30 sec
Active is local, weighting 100 Client selection count: 1
Forwarder 2
State is Listen
MAC address is 0007.b400.0102 (learnt) Owner ID is 001f.ca05.eab1
Redirection enabled, 598.784 sec remaining (maximum 600 sec)
Time to live: 14398.784 sec (maximum 14400 sec)
Preemption enabled, min delay 30 sec
Active is 1.2.3.1 (primary), weighting 100 (expires in 10.624 sec) Client selection count: 1
Forwarder 3
State is Listen
MAC address is 0007.b400.0103 (learnt)
Owner ID is 001c.589e.7ae1
Redirection enabled, 598.112 sec remaining (maximum 600 sec)
Time to live: 14398.112 sec (maximum 14400 sec)
Preemption enabled, min delay 30 sec
Active is 1.2.3.4 (primary), weighting 100 (expires in 8.672 sec)
Router-3#
CCNP SWITCH Workbook - CCNP Switch
Workbook Introduction
Welcome!
Thank you for using this workbook as part of your preparations for pursuing your
CCNP SWITCH certification. The sections and tasks within this workbook are
designed to give you hands-on experience with the majority of topics defined as "
Configure and verify" within the CCNP SWITCH version 2.0 blueprint.
Although it is advisable to begin with the first task in each section and then work
progressively through that section, the individual tasks were designed in such a way
that you can start with any task you wish without following any specific order. After
you have downloaded the initial configurations for a task, you may begin working on
that task, even if you have not completed the tasks that preceded it.
Diagrams
There is one main diagram supplied with this workbook that should be used to give
you a complete understanding of the network topology. Often, you will find that there
are individual diagrams for each section, but these are all permutations of the main
diagram shown below.
Aside from the links shown below, there are other links (not displayed in the
topology diagram) that lead to other devices not used in this workbook. To prevent
unexpected behavior, it is always recommended that you shut down all links on
all three switches as your first step, and then enable only those links
displayed in the topology for any given task.