IEWB-RS Version 4.0 Solutions Guide Lab 6
1. Bridging and Switching
Task 1.1
SW1:
vtp domain NET12
!
vlan 5,6,10,27,32
!
interface FastEthernet0/3
switchport access vlan 32
!
interface FastEthernet0/5
switchport access vlan 5
SW2:
vtp domain NET12
vtp mode client
!
interface FastEthernet0/2
switchport access vlan 27
!
interface FastEthernet0/6
switchport access vlan 6
!
interface FastEthernet0/10
switchport access vlan 10
!
interface FastEthernet0/14
switchport access vlan 27
!
interface FastEthernet0/24
switchport access vlan 32
SW3:
vtp domain NET34
!
vlan 363
!
interface FastEthernet0/3
switchport access vlan 363
!
interface FastEthernet0/24
switchport access vlan 363
SW4:
vtp domain NET34
vtp mode client
!
interface FastEthernet0/6
switchport access vlan 363
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 1
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 1.1 Verification
Perform basic verification:
Rack1SW1#show vtp status | include Domain
VTP Domain Name : NET12
Rack1SW1#show vlan brief | exclude (unsup|^1 |^ )
VLAN Name Status Ports
---- ----------------------- --------- -------------------------------
5 VLAN0005 active Fa0/5
6 VLAN0006 active
7 VLAN0007 active
27 VLAN0027 active
32 VLAN0032 active Fa0/3
77 VLAN0077 active
777 VLAN0777 active
Rack1SW2#show vtp status | include (Operating Mode|Domain)
VTP Operating Mode : Client
VTP Domain Name : NET12
Rack1SW2#show vlan brief | exclude (unsup|^1 |^ )
VLAN Name Status Ports
---- ----------------------- --------- -------------------------------
Rack1SW3#show vtp status | include Domain
Quick Note
VTP Domain Name : NET34
The VLANs will not appear
on the VTP clients until
Rack1SW3#show vlan brief | exclude (unsup|^1 |^ )
trunking has been enabled.
VLAN Name Status Ports
---- ------------------------ --------- -------------------------------
363 VLAN0363 active Fa0/3, Fa0/24
Rack1SW4#show vtp status | include (Operating Mode|Domain)
VTP Operating Mode : Client
VTP Domain Name : NET34
Rack1SW4#show vlan brief | exclude (unsup|^1 |^ )
VLAN Name Status Ports
---- ------------------------ --------- -------------------------------
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 2
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 1.2
SW4:
interface range Fa0/13 - 21
switchport mode dynamic auto
Task 1.2 Breakdown
As discussed in previous solutions the default mode for the 3560 is already
dynamic auto but the 3550 s default mode is dynamic desirable.
Note
Cisco plans to phase out the 3550s long term in the CCIE lab and replace
them with the 3560s. This does not mean you could not possibly still have a
3550 in your rack.
Task 1.2 Verification
Rack1SW4#show interface fa0/13 switchport | include Administrative Mode
Administrative Mode: dynamic auto
Task 1.3
SW1:
interface FastEthernet0/13
switchport trunk encapsulation dot1q
switchport mode trunk
! Quick Note
interface range Fa0/16,Fa0/19 When the allowed vlan
switchport trunk encapsulation dot1q except option is used the
switchport mode trunk configuration will show the
switchport trunk allowed vlan except 7,77,777 command without the
except option displaying all
SW2, SW3, and SW4:
of the allowed VLANs.
interface FastEthernet0/13
switchport trunk encapsulation dot1q
switchport mode trunk
Task 1.3 Verification
Rack1SW1#show interface trunk | include (Encap|802|allowed on|4094)
Port Mode Encapsulation Status Native vlan
Fa0/13 on 802.1q trunking 1
Fa0/16 on 802.1q trunking 1
Fa0/19 on 802.1q trunking 1
Port Vlans allowed on trunk
Fa0/13 1-4094
Fa0/16 1-6,8-76,78-776,778-4094
Fa0/19 1-6,8-76,78-776,778-4094
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 3
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 1.4
SW1:
spanning-tree vlan 1-4094 root primary
Task 1.4 Verification
Rack1SW1#show interface trunk | begin allowed and active
Port Vlans allowed and active in management domain
Fa0/13 1,5-7,10,27,32,77,777
Fa0/16 1,5-6,10,27,32
Fa0/19 1,5-6,10,27,32
Port Vlans in spanning tree forwarding state and not pruned
Fa0/13 1,5-7,10,27,32,77,777
Fa0/16 1,5-6,10,27,32
Fa0/19 1,5-6,10,27,32
Task 1.5
SW3 and SW4:
interface Port-channel34
switchport trunk encapsulation isl
switchport mode trunk
!
interface FastEthernet0/19
switchport trunk encapsulation isl
switchport mode trunk
channel-group 34 mode desirable
!
interface FastEthernet0/20
switchport trunk encapsulation isl
switchport mode trunk
channel-group 34 mode desirable
Task 1.5 Verification
Rack1SW3#show etherchannel summary | begin Group
Group Port-channel Protocol Ports
------+-------------+-----------+---------------------------------
34 Po34(SU) LACP Fa0/19(P) Fa0/20(P)
Rack1SW3#show interface po34 trunk
Port Mode Encapsulation Status Native vlan
Po34 on isl trunking 1
Port Vlans allowed on trunk
Po34 1-4094
Port Vlans allowed and active in management domain
Po34 1,40,45,49-50,59,363
Port Vlans in spanning tree forwarding state and not pruned
Po34 40,45,49-50,59,363
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 4
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 1.6
SW1:
vlan 4,40,45,49
SW3:
vlan 40,45,49,50,59
R4:
interface Ethernet0/0.4
encapsulation dot1Q 4
ip address 191.1.4.4 255.255.255.0
!
interface Ethernet0/0.40
encapsulation dot1Q 40
ip address 191.1.40.4 255.255.255.0
!
interface Ethernet0/0.45
encapsulation dot1Q 45
ip address 191.1.45.4 255.255.255.128
!
interface Ethernet0/0.49
encapsulation dot1Q 49
ip address 191.1.49.4 255.255.255.0
R5:
interface Ethernet0/1.45
encapsulation dot1Q 45
ip address 191.1.45.5 255.255.255.128
!
interface Ethernet0/1.50
encapsulation dot1Q 50
ip address 191.1.50.5 255.255.255.0
!
interface Ethernet0/1.59
encapsulation dot1Q 59
ip address 191.1.59.5 255.255.255.0
SW2:
interface FastEthernet0/4
switchport trunk encapsulation dot1q
switchport mode trunk
SW3:
interface FastEthernet0/5
switchport trunk encapsulation dot1q
switchport mode trunk
Task 1.6 Verification
Rack1R4#ping 191.1.45.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.45.5, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 5
IEWB-RS Version 4.0 Solutions Guide Lab 6
Rack1SW3#ping 191.1.49.4
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.49.4, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Rack1SW3#ping 191.1.59.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.59.5, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Rack1SW4#ping 191.1.40.4
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.40.4, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Rack1SW4#ping 191.1.50.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.50.5, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Task 1.7
SW3 and SW4:
system mtu 1504
SW3:
vlan 100
SW3:
interface FastEthernet0/18
switchport access vlan 100
switchport mode dot1q-tunnel
l2protocol-tunnel cdp
no cdp enable
SW4:
interface FastEthernet0/4
switchport access vlan 100
switchport mode dot1q-tunnel
l2protocol-tunnel cdp
no cdp enable
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 6
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 1.7 Breakdown
The basic concept behind 802.1q tunneling (QinQ) is to allow for an additional
tag to be applied to the Ethernet frame. This is commonly used by service
providers to provide end-to-end transparent Ethernet services for their customers
(Metro Ethernet). This additional tag, sometimes called the metro tag, allows for
the service provider to carry all of the customer s traffic in a single separate
VLAN without concern as to what traffic is being carried. This traffic could be
unicast, broadcast, multicast, CDP, STP, or VTP.
QinQ tunneling can additionally allow the customer to trunk transparently across
the service provider s network. When the customer s switch is trunking to the
service provider s switch, all of the customer s trunks are carried inside the single
metro VLAN when transiting the service provider s switches. In this case the
Ethernet frames will carry two tags. The inner tag which was assigned by the
customer s switches (i.e. the customers VLANs) and the outer tag which is
assigned by the service provider s edge switch (Metro tag). In order to support
the additional extra 4 byte metro tag the system MTU should be set to 1504. The
default system MTU is 1500 bytes.
When using QinQ tunneling CDP, STP and VTP are not carried across the tunnel
by default. To allow for the carrying of these protocols the interfaces on the
service provider s edge switches need to be configured.
Additionally QinQ also provides support for Etherchannel between customer
sites. This will discussed in future labs.
Note
In this task SW2 and R4 are considered the customer devices and SW3 &
SW4 are the provider edge switches.
Task 1.7 Verification
Rack1R4#ping 191.1.48.8
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.48.8, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Rack1R4#show cdp neighbors e0/1 | include SW2
Rack1SW2 Eth 0/1 121 S I WS-C3560-2Fas 0/18
Rack1SW2#show cdp neighbors fa0/18 | include R4
Rack1R4 Fas 0/18 134 R S I 3640 Eth 0/1
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 7
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 1.8
SW2:
interface FastEthernet0/10
switchport mode access
switchport port-security
switchport port-security maximum 4
switchport port-security violation restrict
switchport port-security mac-address 0050.7014.8ef0
switchport port-security mac-address 00c0.144e.07bf
switchport port-security mac-address 00d0.341c.7871
switchport port-security mac-address 00d0.586e.b710
!
logging 191.1.7.100
Task 1.8 Breakdown
Layer 2 security based on source MAC address of a frame is controlled by port
security. Port security allows you to define either specific MAC addresses that
can send traffic into a port or how many MAC addresses can send traffic into a
port. The first step in enabling port security is to set the port mode to access.
Port security is not supported on dynamic ports. This is accomplished by issuing
the switchport mode access command. Next, enable port security by issuing
the switchport port-security interface command.
By default port security only allows one MAC address to use a port. Since the
above task states that four MAC address should be allowed entry, and
specifically lists their addresses. Therefore the maximum allowed addresses
must be increased by issuing the switchport port-security maximum [num]
command. Next the addresses are defined by issuing the switchport
port-security mac-address [address] command.
Next, the task states that other hosts which try to access the port should be
logged. By default the violate action of port security is shutdown. This means
that the port it is sent to err-disabled state when either an insecure MAC is heard,
or the maximum MAC addresses is exceeded. In addition to shutdown, restrict
and protect are included as additional violate actions. When the violation mode
is set to protect, traffic from MAC addresses that are not secure or are in excess
of the maximum value is discarded. When violation is set to restrict the behavior
is the same as protect, but a syslog message an SNMP trap is generated as well.
Use the interface level command switchport port-security violation command
to change the violation mode.
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 8
IEWB-RS Version 4.0 Solutions Guide Lab 6
Further Reading
Configuring Port-Based Traffic Control
Task 1.8 Verification
Verify the port-security configuration:
Rack1SW2#show port-security interface fa0/10
Port Security : Enabled
Port Status : Secure-down
Violation Mode : Restrict
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 4
Total MAC Addresses : 4
Configured MAC Addresses : 4
Sticky MAC Addresses : 0
Last Source Address:Vlan : 0000.0000.0000:0
Security Violation Count : 0
Verify the configured secure MAC addresses:
Rack1SW2#show port-security interface fa0/10 address
Secure Mac Address Table
-----------------------------------------------------------------------
Vlan Mac Address Type Ports Remaining
Age
(mins)
---- ----------- ---- ----- ------------
10 0050.7014.8ef0 SecureConfigured Fa0/10 -
10 00c0.144e.07bf SecureConfigured Fa0/10 -
10 00d0.341c.7871 SecureConfigured Fa0/10 -
10 00d0.586e.b710 SecureConfigured Fa0/10 -
-----------------------------------------------------------------------
Total Addresses: 4
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 9
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 1.9
SW2:
spanning-tree portfast bpdufilter default
!
interface FastEthernet0/10
spanning-tree portfast
Task 1.9 Verification
Due to the fact the interface is not in the up/up state you will need
to rely on the configuration for verification.
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 10
IEWB-RS Version 4.0 Solutions Guide Lab 6
2. Frame-Relay
Task 2.1
R1:
interface Serial0/0
ip address 191.1.125.1 255.255.255.0
encapsulation frame-relay
frame-relay map ip 191.1.125.5 105 broadcast
frame-relay map ip 191.1.125.2 102 broadcast
no frame-relay inverse-arp
R2:
interface Serial0/0
ip address 191.1.125.2 255.255.255.0
encapsulation frame-relay
frame-relay map ip 191.1.125.5 201
frame-relay map ip 191.1.125.1 201 broadcast
no frame-relay inverse-arp
R5:
interface Serial0/0
ip address 191.1.125.5 255.255.255.0
encapsulation frame-relay
frame-relay map ip 191.1.125.1 501 broadcast
frame-relay map ip 191.1.125.2 501
no frame-relay inverse-arp
Task 2.1 Verification
Rack1R1#show frame-relay map
Serial0/0 (up): ip 191.1.125.5 dlci 105(0x69,0x1890), static,
broadcast,
CISCO, status defined, active
Serial0/0 (up): ip 191.1.125.2 dlci 102(0x66,0x1860), static,
broadcast,
CISCO, status defined, active
Verify spoke-to-hub and spoke-to-spoke reachability:
Rack1R5#ping 191.1.125.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.125.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 28/30/32 ms
Rack1R5#ping 191.1.125.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.125.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 32/35/40 ms
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 11
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 2.2
R3:
interface Serial1/0
ip address 191.1.34.3 255.255.255.0
encapsulation frame-relay
frame-relay map ip 191.1.34.3 304
frame-relay map ip 191.1.34.4 304 broadcast
no frame-relay inverse-arp
R4:
interface Serial0/0
ip address 191.1.34.4 255.255.255.0
encapsulation frame-relay
frame-relay map ip 191.1.34.3 403 broadcast
no frame-relay inverse-arp
Task 2.2 Breakdown
Since all traffic sent to a multipoint NBMA circuit requires layer 3 to layer 2
resolution, a device using either a main interface or a multipoint subinterface in
Frame Relay cannot send traffic to itself (i.e. cannot ping itself). In order to
enable this behavior traffic destined for the local interface must be sent to the
other end of the circuit, and then redirected back. This configuration is the same
as any other layer 3 to layer 2 resolution in Frame Relay, and can be used to
ensure that the layer 2 circuit is up end to end.
Task 2.2 Verification
Rack1R3#show frame-relay map
Serial1/0 (up): ip 191.1.34.3 dlci 304(0x130,0x4C00), static,
CISCO, status defined, active
Serial1/0 (up): ip 191.1.34.4 dlci 304(0x130,0x4C00), static,
broadcast,
CISCO, status defined, active
Rack1R3#ping 191.1.34.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 191.1.34.3, timeout is 2 seconds:
!!!!!
Rack1R4#debug ip packet detail
IP packet debugging is on (detailed)
IP: s=191.1.34.3 (Serial0/0), d=191.1.34.3 (Serial0/0), len 100,
redirected packet must be redirected back to R3
ICMP type=8, code=0
ICMP: redirect sent to 191.1.34.3 for dest 191.1.34.3, use gw
191.1.34.3
IP: s=191.1.34.4 (local), d=191.1.34.3 (Serial0/0), len 56, sending
ICMP type=5, code=1 Redirect Datagram for the Host
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 12
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 2.3
R6:
interface Serial0/0/0
encapsulation frame-relay
no frame-relay inverse-arp IP 100
no frame-relay inverse-arp IP 101
no frame-relay inverse-arp IP 201
no frame-relay inverse-arp IP 301
no frame-relay inverse-arp IP 401
Task 2.3 Breakdown
Inverse-ARP can be disabled on an interface for all DLCIs using the no frame-
relay inverse-arp command or for a particular DLCI by using the no frame-relay
inverse-arp ip
command.
Task 2.3 Verification
Rack1R6#debug frame-relay packet
Frame Relay packet debugging is on
Serial0/0/0(o): dlci 51(0xC31), pkt encaps 0x0300 0x8000 0x0000 0x806
(ARP), datagramsize 34
FR: Sending INARP Request on interface Serial0/0/0 dlci 51 for link
7(IP) broadcast dequeue
Serial0/0/0(o):Pkt sent on dlci 51(0xC31), pkt encaps 0x300 0x8000 0x0
0x806 (ARP), datagramsize 34
Serial0/0/0(i): dlci 51(0xC31), pkt encaps 0x0300 0x8000 0x0000 0x806
(ARP), datagramsize 34
Serial0/0/0: frame relay INARP received
Rack1R6#show frame-relay map
Serial0/0/0 (up): ip 54.1.3.254 dlci 51(0x33,0xC30), dynamic,
broadcast,, status defined, active
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 13
IEWB-RS Version 4.0 Solutions Guide Lab 6
Task 2.4
R1:
interface Serial0/1
encapsulation ppp
ip tcp header-compression
ip tcp compression-connections 256
R2:
interface Serial0/1
encapsulation ppp
R3:
interface Serial1/2
encapsulation ppp
clockrate 64000
ip tcp header-compression
ip tcp compression-connections 256
!
interface Serial1/3
encapsulation ppp
clockrate 64000
Task 2.4 Verification
Rack1R3#show ip tcp header-compression
TCP/IP header compression statistics:
Interface Serial1/2 (compression on, VJ)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
Rack1R3#telnet 191.1.13.1
Trying 191.1.13.1 ... Open
User Access Verification
Password:
Rack1R1>exit
[Connection to 191.1.31.1 closed by foreign host]
Rack1R3#show ip tcp header-compression
TCP/IP header compression statistics:
Interface Serial1/2 (compression on, VJ)
Rcvd: 28 total, 27 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 31 total, 30 compressed, 0 status msgs, 0 not predicted
1019 bytes saved, 274 bytes sent
4.71 efficiency improvement factor
Connect: 256 rx slots, 256 tx slots,
1 misses, 0 collisions, 0 negative cache hits, 255 free contexts
96% hit ratio, five minute miss rate 0 misses/sec, 0 max
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 14
IEWB-RS Version 4.0 Solutions Guide Lab 6
3.1 Interior Gateway Routing
Task 3.1
R1:
router ospf 1
router-id 150.1.1.1
network 191.1.125.1 0.0.0.0 area 0
neighbor 191.1.125.2
neighbor 191.1.125.5
R2:
interface Serial0/0
ip ospf priority 0
!
router ospf 1
router-id 150.1.2.2
network 191.1.125.2 0.0.0.0 area 0
R5:
interface Serial0/0
ip ospf priority 0
!
router ospf 1
router-id 150.1.5.5
network 191.1.125.5 0.0.0.0 area 0
Task 3.1 Breakdown
As the Frame Relay section dictates that R1, R2, and R5 must use the main
interface for their hub-and-spoke configuration, the default OSPF network type
will be non-broadcast. Additionally since this section dictates that the ip ospf
network command cannot be used on any of these devices, the default of non-
broadcast must remain. Therefore R1 has been configured to specify its unicast
neighbors, R2 and R5, and R2 and R5 have adjusted their OSPF priority value to
take themselves out of the DR/BDR election. As R1 is the only device on this
segment that has a direct layer 2 connection to all endpoints of the network, it is
mandatory that R1 be elected the DR.
Task 3.1 Verification
Verify OSPF network type (non-broadcast) and the DR for the segment:
Rack1R1#show ip ospf interface s0/0
Serial0/0 is up, line protocol is up
Internet Address 191.1.125.1/24, Area 0
Process ID 1, Router ID 150.1.1.1,Network Type NON_BROADCAST,Cost: 64
Transmit Delay is 1 sec, State DR, Priority 1
Designated Router (ID) 150.1.1.1, Interface address 191.1.125.1
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 15
IEWB-RS Version 4.0 Solutions Guide Lab 6
Verify the OSPF neighbors:
Rack1R1#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address
Interface
150.1.5.5 0 FULL/DROTHER 00:01:43 191.1.125.5 Serial0/0
150.1.2.2 0 FULL/DROTHER 00:01:34 191.1.125.2 Serial0/0
Task 3.2
R1:
router ospf 1
network 191.1.13.1 0.0.0.0 area 13
R2:
router ospf 1
network 191.1.23.2 0.0.0.0 area 23
network 191.1.27.2 0.0.0.0 area 27
R3:
router ospf 1
router-id 150.1.3.3
network 191.1.13.3 0.0.0.0 area 13
network 191.1.23.3 0.0.0.0 area 23
R4:
router ospf 1
router-id 150.1.4.4
network 191.1.45.4 0.0.0.0 area 45
network 191.1.40.4 0.0.0.0 area 90
network 191.1.49.4 0.0.0.0 area 90
!
Quick Note
interface Ethernet0/0.40
The system MTU on SW3 and SW4 was
ip ospf mtu-ignore
altered earlier in the lab to support QinQ.
!
interface Ethernet0/0.49
ip ospf mtu-ignore
R5:
router ospf 1
network 191.1.5.5 0.0.0.0 area 5
network 191.1.45.5 0.0.0.0 area 45
network 191.1.50.5 0.0.0.0 area 90
network 191.1.59.5 0.0.0.0 area 90
!
interface Loopback0
Quick Note
ip ospf 1 area 0
The area used is arbitrary since the task didn t
!
specify what area to put the loopback in.
interface Ethernet0/1.50
ip ospf mtu-ignore
!
interface Ethernet0/1.59
ip ospf mtu-ignore
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 16
IEWB-RS Version 4.0 Solutions Guide Lab 6
SW1:
ip routing
!
router ospf 1
router-id 150.1.7.7
network 191.1.27.7 0.0.0.0 area 27
network 191.1.7.7 0.0.0.0 area 27
network 191.1.77.7 0.0.0.0 area 27
network 191.1.177.7 0.0.0.0 area 27
SW3:
ip routing
!
router ospf 1
router-id 150.1.9.9
network 191.1.49.9 0.0.0.0 area 90
network 191.1.59.9 0.0.0.0 area 90
SW4:
ip routing
!
router ospf 1
router-id 150.1.10.10
network 191.1.40.10 0.0.0.0 area 90
network 191.1.50.10 0.0.0.0 area 90
R1, R2, R3, R4, SW1, SW3, and SW4:
router ospf 1
redistribute connected subnets route-map CONNECTED->OSPF
!
route-map CONNECTED->OSPF permit 10
match interface Loopback0
Task 3.2 Breakdown
This task requires that the Loopback 0 interfaces of all devices be advertised into
the OSPF domain, but to accomplish this without using the network statement
under the OSPF process. Therefore these networks are originated through
redistribution. Note that a route-map is called on each of these devices to ensure
that the Loopback 0 network is the only interface that is redistributed into the
OSPF domain.
Task 3.2 Verification
Verify that redistributed Loopback0 prefixes are announced as external
prefixes:
Rack1R1#show ip route ospf | include E2
O E2 150.1.7.0 [110/20] via 191.1.125.2, 00:01:11, Serial0/0
O E2 150.1.4.0 [110/20] via 191.1.125.5, 00:01:11, Serial0/0
O E2 150.1.3.0 [110/20] via 191.1.13.3, 00:01:11, Serial0/1
O E2 150.1.2.0 [110/20] via 191.1.125.2, 00:01:11, Serial0/0
O E2 150.1.10.0/24 [110/20] via 191.1.125.5, 00:01:11, Serial0/0
O E2 150.1.9.0/24 [110/20] via 191.1.125.5, 00:01:11, Serial0/0
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 17
IEWB-RS Version 4.0 Solutions Guide Lab 6
Verify that R5 s Loopback 0 prefix appears as either intra-area or
inter-area.
Rack1R1#show ip route ospf | include 150.1.5.5
150.1.5.5/32 [110/65] via 191.1.125.5, 00:01:39, Serial0/0
Task 3.3
R2:
router ospf 1
area 23 virtual-link 150.1.3.3
R3:
interface Serial1/0
ip ospf network point-to-point
!
router ospf 1
area 23 virtual-link 150.1.2.2
area 34 virtual-link 150.1.4.4
network 191.1.34.3 0.0.0.0 area 34
R4:
interface Serial0/0
ip ospf network point-to-point
!
interface Ethernet0/0.45
ip ospf cost 9999
!
router ospf 1
area 34 virtual-link 150.1.3.3
area 45 virtual-link 150.1.5.5
network 191.1.34.4 0.0.0.0 area 34
network 191.1.48.4 0.0.0.0 area 48
R5:
interface Ethernet0/1.45
ip ospf cost 9999
router ospf 1
area 45 virtual-link 150.1.4.4
SW2:
ip routing
!
router ospf 1
router-id 150.1.8.8
network 150.1.8.8 0.0.0.0 area 48
network 191.1.48.8 0.0.0.0 area 48
Task 3.3 Breakdown
From the above configuration it is evident that multiple OSPF areas are
discontiguous from OSPF area 0. Specifically these areas are area 34 between
R3 and R4, and area 48 between R4 and SW2. To deal with this issue multiple
virtual-links have been created throughout the domain. A virtual-link between R2
Copyright © 2007 Internetwork Expert www.InternetworkExpert.com
6 - 18
IEWB-RS Version 4.0 Solutions Guide Lab 6
and R3 over area 23 connects area 34 with area 0. This virtual-link is then
further extended over area 34 between R3 and R4 to connect area 48 to area 0
(virtual-links can be cascaded as in this scenario). An additional virtual-link is
configured between R4 and R5 to ensure reachability to the rest of the routing
domain when R4 loses its connection to R3 over the Frame Relay cloud.
Next, the stipulation is placed on R3 and R4 that neither of these devices should
be elected the DR for their Frame Relay segment. As the default OSPF network
type for their interfaces is non-broadcast, which does have a DR/BDR election,
this must be modified. In the above output the OSPF network-type has been
changed to point-to-point; however the network types point-to-multipoint or point-
to-multipoint non-broadcast would have also been acceptable.
Task 3.3 Verification
Verify the virtual-links and new OSPF neighbors:
Rack1R3#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
150.1.4.4 0 FULL/ - - 191.1.34.4 OSPF_VL1
150.1.2.2 0 FULL/ - - 191.1.23.2 OSPF_VL0
150.1.1.1 0 FULL/ - 00:00:32 191.1.13.1 Serial1/2
150.1.2.2 0 FULL/ - 00:00:32 191.1.23.2 Serial1/3
150.1.4.4 0 FULL/ - 00:00:33 191.1.34.4 Serial1/0
Verify OSPF network type on R3 (no DR should be elected):
Rack1R3#show ip ospf interface s1/0
Serial1/0 is up, line protocol is up
Internet Address 191.1.34.3/24, Area 34
Process ID 1,Router ID 150.1.3.3,Network Type POINT_TO_POINT,Cost: 781
Transmit Delay is 1 sec, State POINT_TO_POINT,