123
123
Lab11
10.2
Lab2
Lab3
b. Ensure that the OSI Model tab is selected. Under the Out Layers column, ensure that
the Layer 7 box is highlighted.
What is the text displayed next to the Layer 7 label? HTTP
What information is listed in the numbered steps directly below the In Layers and Out
Layers boxes?
1. The HTTP client sends a HTTP request to the server.
c. Click Next Layer. Layer 4 should be highlighted. What is the Dst Port value? 80
f. Click the Outbound PDU Details tab.Information listed under the PDU Details is
reflective of the layers within the TCP/IP model.
Note: The information listed under the Ethernet II section provides even more detailed
information than is listed under Layer 2 on the OSI Model tab. The Outbound PDU
Details provides more descriptive and detailed information. The values under DEST
MAC and SRC MAC within the Ethernet II section of the PDU Details appear on the OSI
Model tab under Layer 2, but are not identified as such.
What is the common information listed under the IP section of PDU Details as compared
to the information listed under the OSI Model tab? With which layer is it associated?
SRC IP and DST IP at Layer 3
What is the common information listed under the TCP section of PDU Details, as
compared to the information listed under the OSI Model tab, and with which layer is it
associated?
SRC PORT and DEST PORT at Layer 4
What is the Host listed under the HTTP section of the PDU Details? What layer would
this information be associated with under the OSI Model tab?
www.osi.local, Layer 7
g. Click the next colored square box under the Event List > Info column. Only Layer 1 is
active (not grayed out). The device is moving the frame from the buffer and placing it on
to the network.
h. Advance to the next HTTP Info box within the Event List and click the colored square
box. This window contains both In Layers and Out Layers. Notice the direction of the
arrow directly under the In Layers column; it is pointing upward, indicating the direction
the information is travelling. Scroll through these layers making note of the items
previously viewed. At the top of the column the arrow points to the right. This denotes
that the server is now sending the information back to the client.
Comparing the information displayed in the In Layers column with that of the Out
Layers column, what are the major differences?
The Src and Dst Ports, Src and Dst IPs and MAC addresses have been swapped.
i. Click the Outbound PDU Details tab. Scroll down to the HTTP section.What is the first
line in the HTTP message that displays?
HTTP/1.1 200 OK – this means that the request was successful and the page delivered
from the server.
j. Click the last colored square box under the Info column. How many tabs are displayed
with this event and why?
Just 2, one for the OSI Model and one for Inbound PDU Details because this is the
receiving device
In Part 2 of this activity, you will use the Packet Tracer Simulation mode to view and examine
some of the other protocols comprising of the TCP/IP suite.
b. In the Event List Filters > Visible Events section, click Show All.
These extra entries play various roles within the TCP/IP suite. If the Address Resolution Protocol
(ARP) is listed, it searches MAC addresses. DNS is responsible for converting a name (for
example, www.osi.local) to an IP address. The additional TCP events are responsible for
connecting, agreeing on communication parameters, and disconnecting the communications
sessions between the devices. These protocols have been mentioned previously and will be
further discussed as the course progresses. Currently there are over 35 possible protocols
(event types) available for capture within Packet Tracer.
c. Click the first DNS event in the Info column. Explore the OSI Model and PDU Detail tabs and
note the encapsulation process. As you look at the OSI Model tab with Layer 7 highlighted, a
description of what is occurring is listed directly below the In Layers and Out Layers (“1. The
DNS client sends a DNS query to the DNS server.”). This is very useful information to help
understand what is occurring during the communication process.
d. Click the Outbound PDU Details tab. What information is listed in the NAME : in the DNS
QUERY section?
www.osi.local
e. Click the last DNS Info colored square box in the event list. Which device is displayed?
The Web Client
What is the value listed next to ADDRESS: in the DNS ANSWER section of the Inbound PDU
Details?
192.168.1.254 – the address of the Web Server
f. Find the first HTTP event in the list and click the colored square box of the TCP event
immediately following this event. Highlight Layer 4 in the OSI Model tab. In the numbered list
directly below the In Layers and Out Layers, what is the information displayed under items 4
and 5?
4. The TCP connection is successful. 5. The device sets the connection state to ESTABLISHED.
TCP manages the connecting and disconnecting of the communications channel along with
other responsibilities. This particular event shows that the communication channel has been
ESTABLISHED.
g. Click the last TCP event. Highlight Layer 4 in the OSI Model tab. Examine the steps listed
directly below In Layers and Out Layers. What is the purpose of this event, based on the
information provided in the last item in the list (should be item 4)?
CLOSING the connection.
Lab4
a. Click the Primary Network icon. Hold the mouse pointer over the various cables. What is
located on the table to the right of the blue rack?
Configuration Terminal
b. Click the Home Network icon. Why is there no rack to hold the equipment?
Home networks typically do not have racks.
Lab5.2
c. What is the IPv4 address of the 3rd hop in the Packet Tracer traceroute output?
10.110.178.133
d. Which router and interface in the monterey.ca building is configured with this IPv4 address?
rur02.monterey.ca.sfba.comcast.net; GigabitEthernet0/0
e. What is the IPv4 address of the 4th hop in the Packet Tracer traceroute output?
10.139.198.129
f. Which router and interface in the monterey.ca building is configured with this IPv4 address?
rur01.monterey.ca.sfba.comcast.net; GigabitEthernet0/0
g. Why do you think the IP addresses for the other interfaces are not shown in the traceroute
output?
Those interfaces are the source for the packets that are sent to the next hop destination.
Source IP addresses are not shown in traceroute output.
h. List the hops in your own traceroute output that belong to your local ISP.
Answers will vary.
Lab8.2
Step 1: Generate additional traffic to populate the switch MAC address table.
a. Click Switch1and then the CLI tab. Enter the show mac-address-table command. Do the
entries correspond to those in the table above? Yes
b. Click Switch0, then the CLI tab. Enter the show mac-address-table command. Do the entries
correspond to those in the table above? Yes
Why are two MAC addresses associated with one port? Because both devices connect to one
port through the Access Point.
c. Type arp –a. What is the IP address of the new ARP table entry? 172.16.31.1
d. Enter arp -d to clear the ARP table and switch to Simulation mode.
f. Click Capture/Forward. Click the PDU that is now at Switch1. What is the target destination IP
destination address of the ARP request? 172.16.31.1
g. The destination IP address is not 10.10.10.1. Why? The gateway address of the router
interface is stored in the IPv4 configuration of the hosts. If the receiving host is not on the same
network, the source uses the ARP process to determine a MAC address for the router interface
serving as the gateway.
a. Switch to Realtime mode. Click Router1 and then the CLI tab.
b. Enter privileged EXEC mode and then the show mac-address-table command. How many
MAC addresses are in the table? Why? Zero, This command means something completely
different than the switch command show mac address-table.
c. Enter the show arp command. Is there an entry for 172.16.31.2? Yes
What happens to the first ping in a situation where the router responds to the ARP request? It
times out.
Lab6.2
All hosts on the LAN will receive this broadcast frame. The host with the IP address of
192.168.1.1 (default gateway) will send a unicast reply to the source (PC host). This reply
contains the MAC address of the NIC of the default gateway.
Why does the PC send out a broadcast ARP prior to sending the first ping request?
The PC cannot send a ping request to a host until it determines the destination MAC address, so
that it can build the frame header for that ping request. The ARP broadcast is used to request
the MAC address of the host with the IP address contained in the ARP.
What is the Vendor ID (OUI) of the Source NIC in the ARP reply?
ource:
Destination:
What are the source and destination IP addresses contained in the data field of the frame?
Source:
Destination:
Layer 2 frames never leave the LAN. When a ping is issued to a remote host, the source will use
the default gateway MAC address for the frame destination. The default gateway receives the
packet, strips the Layer 2 frame information from the packet and then creates a new frame
header with the MAC address of the next hop. This process continues from router to router until
the packet reaches its destination IP address.
Lab6.1
Lab7.2
Lab8.1
c. Click the Simulation button in the lower right corner of the Packet Tracer Topology window.
d. Click the Show All/None button in the lower left part of the Simulation Panel. Make
certain Event List Filters – Visible Events displays None.
e. From the command prompt on PCA1, issue the command ping -n 1 2001:db8:acad:1::b. This
will start the process of pinging PCA2.
f. Click the Play Capture Forward button, which is displayed as an arrow pointing to the right
with a vertical bar within the Play Controls box. The status bar above the Play Controls should
read Captured to 150. (The exact number may vary.)
g. Click the Edit Filters button. Select the IPv6 tab at the top and check the boxes
for ICMPv6 and NDP. Click the red X in the upper right of the Edit ACL Filters window. The
captured events should now be listed. You should have approximately 12 entries in the window.
Question:
Why are ND PDUs present?
In order to send ICMPv6 ping packets to PCA2, PCA1 needs to know the MAC address of the
destination. IPv6 ND requests this information on the network.
h. Click the square in the Type column for the first event, which should be ICMPv6.
Question:
Because the message starts with this event there is only an Outbound PDU. Under the OSI
Model tab, what is the Message Type listed for ICMPv6?
ICMPv6 Echo Message Type: 128
Notice there is no Layer 2 addressing. Click the Next Layer >> button to get an explanation
about the ND (Neighbor Discovery) process.
i. Click the square next to the next event in the Simulation Panel. It should be at device PCA1
and the type should be NDP.
Questions:
What changed in the Layer 3 addressing?
The destination address is now an IPv6 multicast address of FF02::1:FF00:B
When a host does not know the MAC address of the destination, a special multicast MAC
address is used by IPv6 Neighbor Discovery as the Layer 2 destination address.
Question:
Is there any difference between the In Layers and Out Layers for Layer 2?
No. The switch does not alter Layer 2 information, it only forwards the frame.
k. Select the first NDP event at PCA2. Click the Outbound PDU Details.
Question:
What addresses are displayed for the following?
Note: The addresses in the fields may be wrapped, adjust the size of the PDU window to make
address information easier to read.
Question:
l. Select the first NDP event at RTA. Why are there no Out Layers?
The IPv6 address does not match the router’s address so it drops the packet.
m. Click through the Next Layer >> button until the end and read steps 4 through 7 for further
explanation.
Question:
Does PCA1 now have all of the necessary information to communicate with PCA2?
Yes, it now knows both the destination IPv6 address as well as the destination MAC address of
PCA2.
o. Click the last ICMPv6 event at PCA1. Notice this is the last communication listed.
Question:
What is the ICMPv6 Echo Message Type?
The ICMPv6 Echo Message Type is 129, an echo reply.
p. Click the Reset Simulation button in the Simulation Panel. From the command prompt of
PCA1 repeat the ping to PCA2. (Hint: you should be able to press the up arrow to bring the
previous command back.)
q. Click the Capture Forward button 5 times to complete the ping process.
Question:
Why weren’t there any NDP events?
PCA1 already knows the MAC address of PCA2 so it doesn’t need to use Neighbor Discovery.
2. How does a router help to minimize the amount of IPv6 Neighbor Discovery traffic on a
network?
The router keeps neighbor tables so that it doesn’t need to initiate ND for every destination
host.
How does IPv6 minimize the impact of the ND process on network hosts?
It uses a multicast address so that only a handful of addresses would be listening to the
Neighbor Discovery messages. IPv6 creates a specially crafted multicast destination MAC
address which includes a portion of the node address.
3. How does the Neighbor Discovery process differ when a destination host is on the same LAN
and when it is on a remote LAN?
When a destination host is on the same LAN segment only the device that matches the IPv6
address responds and other devices drop the packet. When the device is remote the gateway
device (usually a router) provides the MAC address of the interface on the local interface for the
destination MAC and then searches for the MAC address on the remote network. The router will
then place the responding IPv6/MAC address pair in the IPv6 Neighbor table. (similar to an ARP
table in IPv4)
Lab8.3
Lab9.3
Lab14
When you ping www.cisco.com, do you get the same IP address as the example? Explain.
Answer will vary depending upon where you are geographically. Cisco hosts its web content on
a series of mirror servers. This means that Cisco uploads the exact same content to
geographically diverse (spread out all over the world) servers. When someone tries to reach
www.cisco.com, the traffic is directed to the closest mirror server.
Type the IP address that you obtained when you pinged www.cisco.com into a browser. Does
the web site display? Explain.
The Cisco web site does not display. There are at least two possible explanations for this: 1.
Some web servers are configured to accept IP addresses sent from a browser and some are not.
2. It may be a firewall rule in the Cisco security system that prohibits an IP address from being
sent via a browser. Depending on the Web Browser you can also get a message saying the
connection is not secure or there is a certificate error.
C:\> nslookup
Address: 1.1.1.1
>
Note: The IP address from your location will most likely be different because Cisco uses
mirrored servers in various locations around the world.
Under addresses, in addition to the 172.230.155.162 IP address, there are the following
numbers: 2600:1404:a:395::b33 and 2600:1404:a:38e:::b33. What are these?
IPv6 (IP version 6) IP addresses at which the web site is reachable.
Lab17.2
1. What could prevent ping or traceroute responses from reaching the originating device beside
network connectivity issues?
Firewall on the PCs, access lists command, routing issues, interface is down, network delay
2. If you ping a non-existent address on the remote network, such as 209.165.200.227, what is
the message displayed by the ping command? What does this mean? If you ping a valid host
address and receive this response, what should you check?
Request timed out or periods (.). This means that there was no response in the default time
period. Some of the items you may check: router is down, destination host is down, return
route to your device and latency of the response is not more than the default time period
3. If you ping an address that does not exist in any network in your topology, such as
192.168.5.3, from a Windows-based PC, what is the message displayed by the ping command?
What does this message indicate?
Destination host unreachable. This message indicates that there is no route to the destination
as the network is not listed by the routing table.
4. What is the IPv4 TTL value set on the Windows host? What is the IPv4 TTL value set on a
Cisco device?
Windows sets the TTL value to 128 and the Cisco device will set the TTL value to 255.
5. What is the IPv6 Hop Limit value set on the Windows host? What is the IPv6 Hop Limit value
set on a Cisco device?
Windows sets the TTL value to 128, which is the same as IPv4 TTL value and the Cisco device will
set the TTL value to 64.
Lab35
Step 1: Configure an ACL to permit FTP and ICMP from PC1 LAN.
a. From global configuration mode on R1, enter the following command to determine the first
valid number for an extended access list.
R1(config)# access-list ?
d. When configured and applied, this ACL should permit FTP and ICMP. ICMP is listed above, but
FTP is not. This is because FTP is an application layer protocol that uses TCP at the transport
layer. Enter TCP to further refine the ACL help.
e. The source address can represent a single device, such as PC1, by using the host keyword and
then the IP address of PC1. Using the keyword any permits any host on any network. Filtering
can also be done by a network address. In this case, it is any host that has an address belonging
to the 172.22.34.64/27 network. Enter this network address, followed by a question mark.
f. Calculate the wildcard mask by determining the binary opposite of the /27 subnet mask.
11111111.11111111.11111111.11100000 = 255.255.255.224
00000000.00000000.00000000.00011111 = 0.0.0.31
established established
<cr>
i. Notice that one of the options is <cr> (carriage return). In other words, you can
press Enter and the statement would permit all TCP traffic. However, we are only permitting FTP
traffic; therefore, enter the eq keyword, followed by a question mark to display the available
options. Then, enter ftp and press Enter.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62 eq ftp
j. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC1 to Server.
Note that the access list number remains the same and a specific type of ICMP traffic does not
need to be specified.
l. Execute the show access-list command and verify that access list 100 contains the correct
statements. Notice that the statement deny any any does not appear at the end of the access
list. The default execution of an access list is that if a packet does not match a statement in the
access list, it is not permitted through the interface.
R1#show access-lists
From R1’s perspective, the traffic that ACL 100 applies to is inbound from the network
connected to the Gigabit Ethernet 0/0 interface. Enter interface configuration mode and apply
the ACL.
Note: On an actual operational network, it is not a good practice to apply an untested access list
to an active interface.
a. Ping from PC1 to Server. If the pings are unsuccessful, verify the IP addresses before
continuing.
b. FTP from PC1 to Server. The username and password are both cisco.
ftp> quit
d. Ping from PC1 to PC2. The destination host should be unreachable, because the ACL did not
explicitly permit the traffic.
Step 1: Configure an ACL to permit HTTP access and ICMP from PC2 LAN.
a. Named ACLs start with the ip keyword. From global configuration mode of R1, enter the
following command, followed by a question mark.
R1(config)# ip access-list ?
b. You can configure named standard and extended ACLs. This access list filters both source and
destination IP addresses; therefore, it must be extended. Enter HTTP_ONLY as the name. (For
Packet Tracer scoring, the name is case-sensitive and the access list statements must be the
correct order.)
c. The prompt changes. You are now in extended named ACL configuration mode. All devices on
the PC2 LAN need TCP access. Enter the network address, followed by a question mark.
255.255.255.255
- 255.255.255.240
-----------------
= 0. 0. 0. 15
e. Finish the statement by specifying the server address as you did in Part 1 and
filtering www traffic.
f. Create a second access list statement to permit ICMP (ping, etc.) traffic
from PC2 to Server. Note: The prompt remains the same and a specific type of ICMP traffic does
not need to be specified.
g. All other traffic is denied, by default. Exit extended named ACL configuration mode.
h. Execute the show access-list command and verify that access list HTTP_ONLY contains the
correct statements.
From R1’s perspective, the traffic that access list HTTP_ONLY applies to is inbound from the
network connected to the Gigabit Ethernet 0/1 interface. Enter interface configuration mode
and apply the ACL.
Note: On an actual operational network, it is not a good practice to apply an untested access list
to an active interface. It should be avoided if possible.
a. Ping from PC2 to Server. If the ping is unsuccessful, verify the IP addresses before continuing.
b. From PC2 open a web browser and enter the IP address of the Server. The web page of the
Server should be displayed.
c. FTP from PC2 to Server. The connection should fail. If not, troubleshoot the access list
statements and the access-group configurations on the interfaces.
Answer Script
Router R1
enable
configure terminal
ip access-group 100 in
ip access-group HTTP_ONLY in
lab36
Addressing Table
a. Create a named extended IP access list on router RT1 which will deny PC1 access to the HTTP
and HTTPS services of Server1 and Server2. Four access control statements are required.
What is the command to begin the configuration of an extended access list with the name ACL?
c. Next, enter the statement that denies access from PC1 to Server1, only for HTTPS (port 443).
d. Enter the statement that denies access from PC1 to Server2, only for HTTP. Refer to the
addressing table for the IP address of Server 2.
e. Enter the statement that denies access from PC1 to Server2, only for HTTPS.
a. Enter the statement that denies access from PC2 to Server1, only for FTP (port 21 only).
b. Enter the statement that denies access from PC2 to Server2, only for FTP (port 21 only).
a. Enter the statement that denies ICMP access from PC3 to Server1.
b. Enter the statement that denies ICMP access from PC3 to Server2.
By default, an access list denies all traffic that does not match any rule in the list. Enter the
command that permits all traffic that does not match any of the configured access list
statements.
Before any access list is applied, the configuration needs to be verified to make sure that there
are no typographical errors and that the statements are in the correct order. To view the current
configuration of the access list, use either the show access-lists or the show running-
config command.
The traffic to be filtered is coming from the 172.31.1.96/27 network and is destined for remote
networks. Appropriate ACL placement depends on the relationship of the traffic with respect
to RT1. In general, extended access lists should be placed on the interface closest to the source
of the traffic.
Step 1: Apply the ACL to the correct interface and in the correct direction.
Note: In an actual operational network, an untested ACL should never be applied to an active
interface. This is not a good practice and can disrupt network operation.
On which interface should the named ACL be applied, and in which direction?
a. Access the websites of Server1 and Server2 using the web browser of PC1. Use both the
HTTP and HTTPS protocols. Use the show access-lists command to view which access list
statement permitted or denied the traffic. The output of the show access-lists command
displays the number of packets that match each statement since the last time the counters were
cleared, or the router rebooted.
Note: To clear the counters on an access list, use the clear access-list counters command.
RT1#show ip access-lists
b. Access FTP of Server1 and Server2 using PC1. The username and password is cisco.
d. Repeat Step 2a to Step 2c with PC2 and PC3 to verify proper access list operation.
Answer Configuration
Router RT1
enable
configure terminal
interface GigabitEthernet0/0
ip access-group ACL in
end
lab38
Apply the ACL on the interface closest to the source of the traffic to be blocked.
Verify that the ACL is operating as intended by conducting the following tests:
The logs now indicate that your server is receiving pings from many different IPv6 addresses in a
Distributed Denial of Service (DDoS) attack. You must filter ICMP ping requests to your server.
In this case, ICMP traffic can come from any source. To ensure that ICMP traffic is blocked,
regardless of its source or any changes that occur to the network topology, apply the ACL
closest to the destination.
Answer script
Router R1
enable
config t
interface GigabitEthernet0/1
end
Router R3
enable
config t
interface GigabitEthernet0/0
end
lab17.1
a. From PC-A, ping the default gateway using the IPv4 address (GigabitEthernet 0/0/1 interface
of R1).
In this example, four ICMP requests that have 32 bytes each, were sent. The responses were
received in less than one millisecond with no packet loss. The transmission and reply time can
increase as the ICMP requests and responses are processed by more devices during the journey
to and from the destination.
This can also be done using the IPv6 address of the default gateway (GigabitEthernet 0/0/1
interface of R1).
b. From PC-A, ping the addresses listed in the following table and record the average round trip
time and IPv4 TTL, or IPv6 Hop Limit.
192.168.1.1 (R1) <1 (Answers will vary.) 255 (Answers will vary.)
64.100.0.1 (ISP) <1 (Answers will vary.) 254 (Answers will vary.)
*Answers Note: The average round trip time was increased if the message “Request timed out”
was displayed during the first ICMP request. ARP caused the delay, and this resulted in packet
loss.
From S1, attempt to ping ISP and External using IPv4 and IPv6 addresses.
Part 2: Use Tracert and Traceroute Commands for Basic Network Testing
The commands for tracing routes can be found on PCs and network devices. For a Windows-
based PC, the tracert command uses ICMP messages to trace the path to the destination.
The traceroute command uses the User Datagram Protocol (UDP) datagrams for tracing routes
to the destination for Cisco devices and other Unix-like PCs.
In this part, you will examine the traceroute commands and determine the path that a packet
travels to the destination. You will use the tracert command from the PCs and
the traceroute command from the Cisco devices. You will also examine the options that are
available for fine tuning the traceroute results.
1 * * 1 ms 192.168.1.1
2 * 0 ms 0 ms 64.100.0.1
3 0 ms * 0 ms 64.100.0.1
5 0 ms * 0 ms 64.100.0.1
Control-C
^C
C:\>
The tracert result indicates the path from PC-A to External is from PC-A to R1 to ISP and is
unable to arrive at External. The tracert results indicate an issue at the ISP router.
b. Repeat the tracert command using the IPv6 address. At the command prompt,
enter tracert 2001:db8:acad:200::226.
1 * 0 msec 0 msec
3 64.100.0.1 !H * !H
4 * *
<output omitted>
<output omitted>
The traceroute command has additional options. You can use the ? or just press Enter after
typing
traceroute at the prompt to explore these options.
The following link provides more information regarding the ping and traceroute commands for
a Cisco device:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/
products_tech_note09186a00800a6057.shtml
Step 1: Access the network location where the connectivity issue is occurring.
From the previous steps, you had determined that there is an issue at the ISP router using
the ping and traceroute commands. You have remote SSH access to all the network devices
using username admin and password class.
a. From the terminal of S1, SSH into the ISP router using the G0/0/0 interface to correct the
problem.
b. Use the show commands to examine the running configurations for the ISP router.
interface GigabitEthernet0/0/0
ip address 64.100.0.1 255.255.255.252
duplex auto
speed auto
interface GigabitEthernet0/0/1
negotiation auto
speed auto
<output omitted>
The outputs of the show run and show ip interface brief commands indicate that the
GigabitEthernet 0/0/1 interface is up/up but that it is configured with an incorrect IP address.
c. Correct the issues you found. From the command prompt on PC-A, copy and paste the
following configuration into the ISP router to correct the issue in the SSH session to the ISP
router.
configure terminal
interface g0/0/1
no shutdown
The default ping command sends four requests of 32 bytes each. It waits 4,000 milliseconds (4
seconds) for each response to be returned before displaying the “Request timed out” message.
The ping command can be fine-tuned for troubleshooting a network.
C:\> ping
b. Using the –t option, ping External to verify that External is reachable. The -t option will
continuously ping the target until stopped. Use Ctrl+c to stop the ping sequence.
span>
Reply from 209.165.200.226: bytes=32 time<1ms TTL=126
span>
Reply from 209.165.200.226: bytes=32 time<1ms TTL=126
span>
c. To illustrate the results when a host is unreachable, shut down the GigabitEthernet 0/0/1
interface on the ISP router. From switch S1, SSH to the ISP G0/0/0 interface. Use the
password class.
d. Use the shutdown command to disable the GigabitEthernet 0/0/1 interface on the ISP router.
command.
While the network is functioning correctly, the ping command can determine whether the
destination responded and how long it took to receive a reply from the destination. If a network
connectivity problem exists, the ping command displays an error message.
e. Re-enable the GigabitEthernet 0/0/1 interface on the ISP router (using the no
shutdown command) before moving onto the next step. After about 30 seconds, the ping
should be successful again.
g. The above steps can be repeated for the IPv6 address to obtain an ICMP error message.
Step 2: Test network connectivity from the R1 network using Cisco devices.
The ping command is also available on Cisco devices. In this step, the ping command is
examined using R1 and S1.
a. From R1, ping External on the external network using the IP address of 209.165.200.226.
!!!!!
b. Because a local host table was configured on R1, you can ping Externalv4 on the external
network using the hostname configured from R1.
c. In the privileged EXEC mode, there are more options available for the ping command. At the
command line, type ping and press Enter. Use ipv6 as the protocol.
Input 2001:db8:acad:200::226 or external for the target IPv6 address. Press Enter to accept the
default value for other options.
R1# ping
!!!!!
d. You can use an extended ping to observe where there is a network issue. Start
the ping command to 209.165.200.226 with a repeat count of 50000. Then, shut down the
GigabitEthernet 0/0/1 interface on the ISP router.
From the SSH session to ISP on switch S1, disable the GigabitEthernet 0/0/1 interface on ISP.
e. From the SSH session, enable the GigabitEthernet 0/0/1 interface on ISP after the
exclamation points (!) have replaced by the letter U and periods (.). After about 30 seconds, the
ping should be successful again. Press Ctrl+Shift+6 to stop the ping command.
R1# ping
Protocol [ip]:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
<output omitted>
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!.U.U.U.U.U.
U.U................!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
<output omitted>
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!
The letter U in the results indicates that a destination is unreachable. An error PDU was received
by R1. Each period (.) in the output indicates that the ping timed out while waiting for a reply
from External. In this example, 1% of the packets were lost during the simulated network
outage.
The ping command is extremely useful when troubleshooting network connectivity. However,
ping cannot indicate the location of a problem when a ping is not successful.
The tracert (or traceroute) command can display network latency and path information.
f. In the PT activity window, click Check Results to verify all the assessment items and
connectivity tests are correct.
Reflection Questions
1. What could prevent ping or traceroute responses from reaching the originating device beside
network connectivity issues?
Firewall on the PCs, access list commands, routing issues, interface is down, network delay
2. If you ping a non-existent address on the remote network, such as 209.165.200.227, what is
the message displayed by the ping command? What does this mean? If you ping a valid host
address and receive this response, what should you check?
Request timed out or periods (.). This means that there was no response in the default time
period. Some of the items you may check: router is down, destination host is down, return
route to your device and latency of the response is not more than the default time period
3. If you ping an address that does not exist in any network in your topology, such as
192.168.5.3, from a Windows-based PC, what is the message displayed by the ping command?
What does this message indicate?
Destination host unreachable. This message indicates that there is no route to the destination
as the network is not listed by the routing table.
Lab18
Connectivity Issues:
1. Server 1 is set to receive its IP address over DHCP. It should be statically configured with the
correct IP address, subnet mask, and default gateway.
2. Router RTR-3 interface G0/0/1 has been configured with the wrong IPv6 address. The
address should be 2001:DB8:5::1/64 as shown in the addressing table.
RTR-3
enable
config terminal
interface g0/0/1
3. Note: The G0/0/1 interface may need to be shut down and brought back up in order for the
new route to take effect. The old route may still show up in the routing table as well.
4. PC-4 is configured with the wrong default gateway address. It should be 10.10.5.1 as shown
in the addressing table.
Lab21
College Router
enable
config terminal
hostname College
password cisco
login
line vty 0 15
password cisco
login
exit
service password-encryption
interface g0/0
no shutdown
interface g0/1
no shutdown
exit
ipv6 unicast-routing
end
Class-B Switch
enable
configure terminal
hostname Class-B
line console 0
password cisco
login
line vty 0 4
password cisco
login
exit
service password-encryption
interface vlan 1
description Vlan 1
no shutdown
end