Rabu, 08 Desember 2010

Lab 3.4.1 Creating VLANs and Assigned Ports

Mike Putri
06477/2008

Objectives
•  Configure three VLANs on a switch.
• Verify connectivity.
Background / Preparation
This lab focuses on the basic VLAN configuration of the Cisco 2960 switch (or similar) using Cisco IOS commands. The information in this lab applies to other switches; however, command syntax may vary. Depending upon the switch model, the interface designations may differ. For example, modular switches have multiple slots; therefore, the Fast Ethernet ports may be Fast Ethernet 0/1 or Fast Ethernet 1/1, depending on the slot and port.
The following resources are required:
•  One Cisco 2960 switch or other comparable switch
•  Three Windows-based PCs with a terminal emulation program
•  One RJ-45-to-DB-9 connector console cable to configure the switch
•  Three straight-through Ethernet cables to connect from the PCs to Switch 1
NOTE: Make sure that the switch has been erased and has no startup configurations. Instructions for erasing the switch are provided in the Lab Manual, located on Academy Connection in the Tools section.
Step 1: Connect the equipment
a.  Connect PC1 to the switch with a console cable.
b.  Connect PC1 to switch port Fast Ethernet 0/4 with a straight-through Ethernet cable.
c.  Connect PC2 to switch port Fast Ethernet 0/5 with a straight-through Ethernet cable.
d.  Connect PC3 to switch port Fast Ethernet 0/7 with a straight-through Ethernet cable.
Step 2: Perform basic PC configuration
Use this table to configure addressing on the PCs.
Step 3: Configure Switch 1
a.  Configure Switch 1 with a hostname and console, Telnet, and privileged passwords.
b.  Configure Switch 1 with the VLAN 1 IP address of 172.16.1.2/24.
Switch1(config)#interface vlan1
Switch1(config-if)#ip address 172.16.1.2 255.255.255.0
Switch1(config-if)#no shutdown
Switch1(config-if)#exit
c.  Create VLAN 10, named Faculty, and VLAN 20, named Students.
Switch1(config)#vlan 10
Switch1(config-vlan)#name Faculty
Switch1(config-v exit  lan)#
Switch1(config)#vlan 20
Switch1(config-vlan)#name Students
Switch1(config-vlan)#exit
d.  Configure Switch 1 with the default gateway address of 172.16.1.1.
Switch1(config)#ip default-gateway 172.16.1.1
e.  Configure Switch 1 to place interfaces Fa0/5 and Fa0/6 in VLAN 10.
Switch1(config)#interface Fa0/5
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 10
Switch1(config-if)#interface Fa0/6
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 10
Switch1(config-if)#exit
f.  Configure Switch 1 to place interfaces Fa0/7 and Fa0/8 in VLAN 20.
Switch1(config)#interface Fa0/7
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 20
Switch1(config-if)#interface Fa0/8
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 20
Switch1(config-if)#end
Switch1#
g.  Save the configuration.
Switch1#copy running-config startup-config
h.  By default, there is only a single VLAN for all ports. You cannot rename or delete VLAN 1. Therefore, no further configuration is necessary to assign the rest of the ports to VLAN 1. To prove this, issue the command show vlan brief.
i. Are all other switch ports in VLAN 1? Jawaban = ya semua ports berada pada VLAN 1
j. Which switch ports are in VLAN 10? Jawaban = Fa0/5 – Fa0/6
k. Which switch ports are in VLAN 20? Jawaban = Fa0/7 – Fa0/8
l. Issue the command show vlan.  What difference is noticed between the two commands show vlan brief and show vlan? Jawaban = perbedaan antara command show vlan brief dan show vlan ialah pada show vlan brief hanya sedikit sekali informasi yagn diberikan, jika pada show vlan tiap – tiap port pada switch dirincinya.
Step 4: Verify connectivity
a.  Ping from each PC to Switch1 address of 172.16.1.2.
Are PC1 pings successful? Ya , berhasil
Are PC2 pings successful? Ya, berhasil
Are PC3 pings successful?ya, berhasil
b.  Ping from PC1 to PC2 and PC3.
Can PC1 ping PC2? Tidak  berhasil
Can PC1 ping PC3? Tidak berhasil.
Step 5: Reflection
a. Why can PC1 ping Switch1 when PC2 and PC3 cannot? Jawaban = karena PC1 memiliki alamat IP address 172.16.1.1 subnet bitnya langsung termasuk yang dipakai sebagai gateway. Sedangkan PC2 dan PC3 tidak.
b. The PCs cannot ping each other. Why? Jawaban = karena masing masing PC berada pada kelas yang berbeda, yaitu PC1 =172.16.1.1 . Pc2= 176.16.10.1 sedangkan PC3 = 172.16.30.

CCNA Lab 3.3.3 Building a switched Network with Redudant Link

Mike Putri
06477/2008

Step 1: Cable the network
a.       Connect Host 1 to Switch 1 Fast Ethernet port Fa0/7, using a straight-through Ethernet cable.
b.      Connect Host 2 to Switch 2 Fast Ethernet port Fa0/8, using a straight-through Ethernet cable.
c.       Connect Switch 1 Fast Ethernet port Fa0/1 to Switch 2 Fast Ethernet port Fa0/1, using a crossover Ethernet cable.
d.      Create a redundant link between the switches by connecting Switch 1 Fast Ethernet port Fa0/4 to Switch 2 Fast Ethernet port Fa0/4, using a crossover Ethernet cable. What typically undesirable traffic pattern have you created by using the two crossover cables between the two switches?
Predict: What do you think the switches will do to keep this from becoming a problem?
Step 2: Configure the switches
Step 3: Configure the hosts
a.       Configure each host to use an IP address in the same network as the switches.
b.      Configure each host to use the same subnet mask as the switches. Why is no default gateway specified for this network?
Step 4: Verify connectivity
a.       To verify that the network is set up successfully, ping from Host 1 to Host 2. Was the ping successful?
b.      If the ping is not successful, verify the connections and configurations again. Check to ensure that all cables are correct and that connections are seated. If the ping is not successful, what utility could you use to determine where the connection is failing?
Step 5: Examine interface VLAN 1 information
a.       From the terminal emulation session on either switch, enter the command show interface vlan1 ? at the privileged EXEC mode prompt.
SwitchA#show interface vlan1 ?
List some of the options that are available
b.      On SwitchA, enter the command show interface vlan1 at the privileged EXEC mode prompt. SwitchA#show interface vlan1
What is the MAC address of the switch?
What other term for MAC address is used?
c.       On SwitchB, enter the command show interface vlan1 at the privileged EXEC mode prompt. What is the MAC address of the switch?
Which switch should be the root of the spanning tree for this network?
Step 6: Examine the spanning-tree tables on each switch
a.       On SwitchA, enter the command show spanning-tree at the privileged EXEC mode prompt.
b.      On SwitchB, enter the command show spanning-tree at the privileged EXEC mode prompt.
c.       Examine the outputs and answer the following questions:
Which switch is the root bridge?
What is the priority of the root bridge?
What is the bridge ID of the root bridge?
Which ports are forwarding on the root bridge?
Which ports are blocking on the root bridge?
What is the priority of the non-root bridge?
What is the bridge ID of the non-root bridge?
Which ports are forwarding on the non-root bridge?
Which ports are blocking on the non-root bridge?
d.      Examine the link lights on both switches.
Can you tell which port is in blocking state?
Why is there no change in the link lights?
Step 7: Reassign the root bridge
What would you do if you wanted a different switch to be the root bridge for this network?
Why might you want to do this?
For the purposes of this lab, assume that the switch that is currently the root bridge is undesirable. The example assumes that SwitchB is preferred as the root switch. To “force” SwitchB to become the new root bridge, you need to configure a new priority for it.
a.        Go to the console and enter configuration mode on SwitchB.
b.      Determine the options that can be configured for the Spanning Tree Protocol by issuing this command: SwitchB(config)#spanning-tree ?
c.       List the options that are available: _____________________
d.      Set the priority of the switch to 4096.
SwitchB(config)#spanning-tree vlan 1 priority 4096
SwitchB(config)#exit
Step 8: Look at the spanning-tree table
a.       On SwitchA, enter show spanning-tree at the privileged EXEC mode prompt.
b.      On SwitchB, enter show spanning-tree at the privileged EXEC mode prompt.
c.       Examine the outputs and answer the following questions:
Which switch is the root bridge?
What is the priority of the root bridge?
What is the bridge ID of the root bridge?
Which ports are forwarding on the root bridge?
Which ports are blocking on the root bridge?
What is the priority of the non-root bridge?
What is the bridge ID of the non-root bridge?
Which ports are forwarding on the non-root bridge?
Which ports are blocking on the non-root bridge?
Step 9: Verify the running configuration file on the root bridge
a.       On the switch that was changed to be the root bridge, enter the show running-config command at the privileged EXEC mode prompt.
b.      Locate the spanning-tree priority information for this switch.
c.       How can you tell from the information given that this switch is the root bridge?
Step 10: Reflection
Suppose that you are adding new switches to a company’s network. Why should you plan the physical design carefully? Why should you be prepared to make adjustments to factory default settings?

CCNA Lab 3.3.2 configuring Verifying, and TroubleShooting VLANs

Mike Putri
06477/2008

Objectives
•  Observe default switch VLAN configuration and operation.
•  Configure static VLANs on a switch.
•  Verify VLAN configuration and operation.
•  Modify an existing VLAN configuration.
Background / Preparation
This lab focuses on the basic VLAN configuration of the Cisco 2960 switch (or similar) using Cisco IOS commands. The information in this lab applies to other switches; however, command syntax may vary. Depending upon the switch model, the interface designations may differ. For example, modular switches have multiple slots; therefore, the Fast Ethernet ports may be FastEthernet 0/1 or FastEthernet 1/1, depending on the slot and port. The router used can be any router.
The following resources are required:
•  One Cisco 2960 switch or equivalent switch
•  One Cisco 1841 router or equivalent
•  Two Windows-based PCs with a terminal emulation program
•  At least one RJ-45-to-DB-9 connector console cable to configure the switch and the router
•  Three straight-through Ethernet cables to connect from the PCs to Switch 1
NOTE: Make sure that the router and all the switches have been erased and have no startup configurations. For detailed instructions, refer to the Lab Manual that is located on Academy Connection in the Tools section.
NOTE: SDM Routers – If the startup-config is erased in an SDM router, SDM will no longer come up by default when the router is restarted. It will be necessary to build a basic router configuration using IOS commands. Contact your instructor if necessary.
Step 1: Connect the equipment
a.  Connect the router Fa0/0 interface with a straight-through cable to Switch 1 Fa0/8 interface.
b.  Connect the Host 1a Ethernet interface with a straight-through cable to Switch 1 Fa0/2 interface.
c.  Connect the Host 1b Ethernet interface with a straight-through cable to Switch 1 Fa0/3 interface.
d.  Connect a PC with a console cable to perform configurations on the router and switches.
e.  Configure IP addresses on the hosts as shown in the chart.
Step 2: Perform basic configuration on the router
a.  Connect a PC to the console port of the router to perform configurations using a terminal emulation program.
b.  Configure Router 1 with a hostname and console, Telnet, and privileged passwords according to the table diagram.
Step 3: Configure Switch 1
a.  Configure S1 hostname and passwords.
b.  Configure Switch 1 with a hostname and console, Telnet, and privileged passwords according to the
addressing table.
c.  Configure S1 with an IP address and default gateway.
S1(config)#interface vlan1
S1(config-if)#ip address 172.16.1.2 255.255.255.0
S1(config-if)#no shutdown
S1(config-if)#exit
S1(config)#ip default-gateway 172.16.1.1
S1(config)#end
Step 4: Verify connectivity and default VLAN configuration
a.  Verify LAN connectivity by pinging from the router to the switch and the hosts. Also verify that you can ping from host to host.
b.  Verify default VLAN configuration with the show vlan command on S1.
S1#show vlan
Are all switch ports assigned to VLAN 1? Ya, VLAN 1 port switchnya memang pada S1
Step 5: Configure VLANs on S1
a.  Create and name two additional VLANs on S1.
S1(config)#vlan 20
S1(config-vlan)#name fred
S1(config-vlan)#exit
S1(config)#vlan 30
S1(config-vlan)#name wilma
S1(config-vlan)#exit
b.  Verify the creation of the new VLANs with the show vlan command.
S1#show vlan
Do the new VLANs appear in the output? ya
What interfaces belong to the new VLANs? R1 yaitu FA0/0
c.  Assign interfaces to VLANs. Assign S1 port Fa0/2 to VLAN 20 and ports Fa0/3 – Fa0/8 to VLAN 30.
S1(config)#int Fa0/2
S1(config-if)#switchport access vlan 20
S1(config-if)#exit
S1(config-)#interface range Fa0/3 – 8
S1(config-if-range)#switchport access vlan 30
S1(config-if-range)#end
S1#show running-config
Observe that the switchport access command was applied to ports Fa0/2 – Fa0/8.
d.  Verify the port assignments of the new VLANs with the show vlan command.
S1#show vlan
Which interfaces now belong to VLAN 1? R1
Which interfaces belong to VLAN 20? S1
Which interfaces belong to VLAN 30? 1b
e.  Other commands can be used to show different amounts of information or specific pieces of
information. Enter the following commands on S1 and observe the output:
S1#show vlan brief
Is all of the basic VLAN membership information shown? Tidak semuanya ditampilkan pada command show VLAN brief
S1#show vlan id 30
What information is shown?hanya IP address
S1#show vlan name fred
What information is shown? Nama – nama port yang terhubung.
Step 6: Verify VLAN segmentation
In the previous step, the ports connected to R1 and Host 1b were placed in one VLAN and Host 1a was
placed in another. Even though these hosts are connected to one switch, it appears as if there are two
separate switches. Connectivity tests will prove this.
a.  Ping from Host 1b to R1.
Were the pings successful? Ya berhasil
b.  Ping from Host 1b to Host 1a.
Were the pings successful?berhasil
c.  Ping from Host 1b to R1.
Were the pings successful? tidak
Why were some pings successful and others not?
Karena beberapa ada yang perlu dilakukan VLAN agar dapat berkomunikasi sedangkan yang lain hanya perlu switch agar dapat berkomunikasi.
How could Host 1b communicate with Host 1a in different VLAN?
Menggunakan interface dari R1
Step 7: Change and delete VLAN configurations
a.  Reassign S1 port Fa0/3 to VLAN 20.
S1(config)#interface Fa0/3
S1(config-if)#switchport access vlan 20
S1(config)#end
S1#show vlan
Does the output reflect the VLAN membership change? ya
b.  Remove VLAN 30.
Which two commands would be used to delete all VLAN configuration and return to the default
configuration?
Step 8: Reflection
a.  Why would VLANs be configured in a network? Jawaban = vlan dapat digunakan untuk menghubungkan dan membatasi dan juga bias memferivikasi ports ports yagn bisa terkoneksi.
b.  What must be set up to communicate between VLANS?
Yang harus diatur ialah menentukan VLAN 1 berserta IP address dan Gateway
c.  With no configuration, what VLAN are all ports a member of?
VLAN1k

Lab 3.4.3 Part B configuring Inter V-LAN Routing

Mike Putri
06477/2008

Step 1: Connect the equipment
Step 2: Perform basic configurations on the router
Step 3: Configure VLAN trunking on the router
Step 4: .Configure Switch 1
Are all other switch ports in VLAN 1?
Which switch ports are in VLAN 10?
Which switch ports are in VLAN 20?
Issue the command show vlan.
What difference is noticed between the two commands show vlan brief and show vlan?
Step 5: Configure VLAN trunking on Switch 1
Which interfaces on Switch 1 are in trunk mode?
Which VLANs are allowed and active in the management domain?
Step 6: Configure VTP on Switch 1
Step 7: Configure Switch 2
Step 8: Configure VLAN trunking on Switch 2
Step 9: Configure VTP on Switch 2
Switch2(config)#vtp mode client
From Switch 2, verify that all VLANs have been propagated across the domain by issuing the command show vtp status.
What is the VTP version used on Switch 2?
What is the maximum VLANs supported locally?
What VTP operating mode is used on Switch 2?
What is the VTP domain name?
How did Switch 2 learn the domain name and VLAN information?
Step 10: Verify connectivity
The router and switches should be able to ping the interfaces of the other devices.
a.       From each device, issue a ping to all interfaces.
Are the router pings successful?
b.      From Switch 1, ping to all other devices.
Are Switch 1 pings successful?
From Switch 2, ping to all other devices.
Are Switch 2 pings successful? __________ If the ping is not successful, verify the connections and configurations again. Check to ensure that all cables are correct and that connections are seated. Check the router and switch configurations.
Step 11: Reflection
a.       Why would VLANs be configured in a network?
b.      Why would a VLAN benefit from trunking?
c.       Why should VTP be used?
d.      Which device provides connectivity between different VLANs?
e.       What are some benefits of VLANs

Lab 3.4.3 Part A configuring Inter V-LAN Routing

Mike Putri
06477/2008
Step 1: Connect the equipment
Step 2: Perform basic configurations on the router
Step 3: Configure Fast Ethernet connections for each VLAN on the router
Step 4: Configure Switch 1
Step 5: Configure Switch 2
Step 6: Configure Switch 3
Step 7: Configure Host 1
Step 8: Configure Host 2
Step 9: Configure Host 3
Step 10: Configure the server
Step 11: Verify connectivity
The router should be able to ping the interfaces of the other devices.
a.       From the router, issue a ping to Host 1.
Is the ping successful?
b.      From the router, issue a ping to Host 2.
Is the ping successful?
c.       From the router, issue a ping to Host 3.
Is the ping successful?
d.      From the router, issue a ping to the server.
Is the ping successful?
Host 1 should be able to ping all other devices.
a.       From Host 1, ping Host 2.
Is the ping successful?
b.      From Host 1, ping the server.
Is the ping successful?
Why can Host 1 ping the server?
c.       From the server, ping Host 1.
Is the ping successful?
d.      From Switch 3, issue the command show spanning-tree.
Which ports are being used on Switch 3?
What is the role of each of these ports?
Which switch is acting as the root?
What is the protocol that allows VLANs to communicate without switching loops?
Step 12: Reflection
a.       Why does this topology not scale well?
b.      Why would a VLAN benefit from trunking?
c.       Which device provides connectivity between different VLANs?

CCNA Lab 3.1.4 Applying Basic Switch Security

mike Putri
06477/2008

Step 1: Connect PC1 to the switch
Step 2: Connect PC2 to the switch
Step 3: Configure PC3 but do not connect
Step 4: Perform an initial configuration on the switch
a. Configure the hostname of the switch as Switch1
b.      Set the privileged EXEC mode password to cisco.
c.       Set the privileged EXEC mode secret password to class.
d.      Configure the console and virtual terminal lines to use a password and require it at login.
e.       Exit from the console session and log in again.
Which password was required to enter privileged EXEC mode?
Why?
Step 5: Configure the switch management interface on VLAN 1
a.       Enter the interface configuration mode for VLAN 1.
b.      Set the IP address, subnet mask, and default gateway for the management interface.
Why does interface VLAN 1 require an IP address in this LAN?
What is the purpose of the default gateway?
Step 6: Verify the management LANs settings
a.       Verify that the IP address of the management interface on the switch VLAN 1 and the IP address of PC1 and PC2 are on the same local network. Use the show running-config command to check the IP address configuration of the switch.
b.      Verify the interface settings on VLAN 1.
What is the bandwidth on this interface?
What are the VLAN states?
VLAN 1 is __________ and line protocol is __________.
Step 7: Disable the switch from being an http server
Step 8: Verify connectivity
a.       To verify that hosts and switch are correctly configured, ping the switch IP address from the hosts. Were the pings successful?
If the ping is not successful, verify the connections and configurations again. Check to ensure that all cables are correct and that connections are seated. Check the host and switch configurations.
b.      Save the configuration.
Step 9: Record the host MAC addresses
Determine and record the Layer 2 addresses of the PC network interface cards. From the command prompt of each PC, enter ipconfig /all.
PC1 __________________________________________________
PC2 __________________________________________________
PC3 __________________________________________________
Step 10: Determine what MAC addresses the switch has learned
Determine what MAC addresses the switch has learned by using the show mac-address-table command at the privileged EXEC mode prompt.
How many dynamic addresses are there?
How many total MAC addresses are there?
Do the MAC addresses match the host MAC addresses?
Step 11: View the show mac-address-table options
View the options that the show mac-address-table command has available.
Switch1(config)#show mac-address-table ?
What options are available?
Step 12: Set up a static MAC address
Step 13: Verify the results
a.    Verify the MAC address table entries.
Switch1#show mac-address-table
How many dynamic MAC addresses are there now?
How many static MAC addresses are there now?
b.    Remove the static entry from the MAC Address Table.
Step 14: List port security options
a. Determine the options for setting port security on interface FastEthernet 0/4.
What are some available options?
b. To allow the switch port FastEthernet 0/4 to accept only one device, configure port security.
c. Exit configuration mode and check the port security settings.
If a host other than PC2 attempts to connect to Fa0/4, what will happen?
Step 15: Limit the number of hosts per port
a.       On interface FastEthernet 0/4, set the port security maximum MAC count to 1.
b.      Disconnect the PC attached to FastEthernet 0/4. Connect PC3 to FastEthernet 0/4. PC3 has been given the IP address of 192.168.1.5 and has not yet been attached to the switch. It may be necessary to ping the switch address 192.168.1.2 to generate some traffic. Record any observations. _____________________________________
Step 16: Configure the port to shut down if there is a security violation
a. In the event of a security violation, the interface should be shut down. To make the port security shut down, enter the following command: Switch1(config-if)#switchport port-security violation shutdown
What other action options are available with port security?
b. If necessary, ping the switch address 192.168.1.2 from the PC3 192.168.1.5. This PC is now connected to interface FastEthernet 0/4. This ensures that there is traffic from the PC to the switch.
c.Record any observations. _____________________________________________________________________________
d. Check the port security settings
Step 17: Show port 0/4 configuration information
FastEthernet0/4 is __________ and line protocol is __________.
Step 18: Reactivate the port
Step 19: Disable unused ports
Step 20: Reflection
a.       Why would port security be enabled on a switch?
b.      Why should unused ports on a switch be disabled?

Rabu, 01 Desember 2010

CCNA DISCOVERY 3 MODUL 4 EXAM ANSWER VERSION 4.0

 
MIKE PUTRI
06477/2008

1. A network engineer is implementing a network design using VLSM for network 192.168.1.0/24. After subnetting the network, the engineer has decided to take one of the subnets, 192.168.1.16/28 and subnet it further to provide for point-to-point serial link addresses. What is the maximum number of subnets that can be created from the 192.168.1.16/28 subnet for serial connections?
• 1
• 2
• 4
• 6
• 8
• 16


2. When running NAT, what is the purpose of address overloading?
• limit the number of hosts that can connect to the WAN
• allow multiple inside addresses to share a single global address
• force hosts to wait for an available address
• allow an outside host to share inside global addresses


3. What two advantages does CIDR provide to a network? (Choose two.)
• reduced routing table size
• dynamic address assignment
• automatic route redistribution
• reduced routing update traffic
• automatic summarization at classful boundaries


4. How does a router keep track of which inside local address is used when NAT overload is configured?
• The router adds an additional bit to the source IP address and maintains a separate table.
• The router modifies the QoS field.
• The router uses TCP or UDP port numbers.
• The router uses a manual entry that is created and maintained in the database of the router.


5. What is a characteristic of a classful routing protocol on the network?
• All subnets are seen by all routers.
• CIDR addresses are advertised.
• A subnet can be further subnetted down and advertised correctly.
• Updates received by a router in a different major network have the default mask applied.


6. Refer to the exhibit. Which address is an inside global address?
• 10.1.1.1
• 10.1.1.2
• 198.18.1.55
• 64.100.0.1


7. Refer to the exhibit. All networks that are shown have a /24 prefix. Assuming that all routes have been discovered by all routers in the network, which address will successfully summarize only the networks that are shown?
• 192.168.8.0/21
• 192.168.8.0/24
• 192.168.16.0/20
• 192.168.16.0/21
• 192.168.16.0/24


8. What is the CIDR prefix designation that summarizes the entire reserved Class B RFC 1918 internal address range?
• /4
• /8
• /12
• /16
• /20


9. Which NAT term refers to the IP address of your inside host as it appears to the outside network?
• inside global IP address
• outside global IP address
• inside local IP address
• outside local IP address


10. A network administrator is asked to design a new addressing scheme for a corporate network. Presently, there are 500 users at the head office, 200 users at sales, 425 at manufacturing, and 50 at the research site. Which statement defines the correct VLSM addressing map with minimal waste using the 172.16.0.0/16 network?
• 172.16.0.0/20 head office
172.16.1.0/21 manufacturing
172.16.1.0/22 sales
172.16.3.0/26 research
• 172.16.48.0/19 head office
172.16.16.0/20 manufacturing
172.16.48.128 sales
172.16.48.0/26 research
• 172.16.2.0/23 head office
172.16.4.0/23 manufacturing
172.16.6.0/24 sales
172.16.7.0/26 research

• 172.16.2.0/22 head office
172.16.3.0/23 manufacturing
172.16.4.0/26 sales
172.16.4.128/25 research


11. A company using a Class B IP addressing scheme needs as many as 100 subnetworks. Assuming that variable length subnetting is not used and all subnets require at least 300 hosts, what subnet mask is appropriate to use?
• 255.255.0.0
• 255.255.240.0
• 255.255.254.0
• 255.255.255.0
• 255.255.255.128
• 255.255.255.192


12. Host A in the exhibit is assigned the IP address 10.118.197.55/20. How many more network devices can be added to this same subnetwork?
• 253
• 509
• 1021
• 2045
• 4093


13. Refer to the exhibit. RIP version 2 is configured as the network routing protocol and all of the default parameters remain the same. Which update is sent from R2 to R3 about the 10.16.1.0/24 network connected to R1?
• 10.16.0.0/16
• 10.0.0.0/24
• 10.0.0.0/8
• 10.16.1.0/24


14. What range of networks are summarized by the address and mask, 192.168.32.0/19?
• 192.168.0.0/24 - 192.168.32.0/24
• 192.168.0.0/24 - 192.168.31.0/24
• 192.168.32.0/24 – 192.168.64.0/24
• 192.168.32.0/24 – 192.168.63.0/24


15. Refer to the exhibit. Based on the output of the show ip nat translations command, which kind of address translation is in effect on this router?
• static
• public
• overload
• private


16. How many addresses will be available for dynamic NAT translation when a router is configured with the following commands?
• Router(config)#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224
• Router(config)#ip nat inside source list 9 pool TAME
• 7
• 8
• 9
• 10
• 24
• 31

17. Refer to the exhibit. Which two IP addresses could be assigned to the hosts that are shown in the exhibit? (Choose two.)
• 192.168.65.31
• 192.168.65.32
• 192.168.65.35
• 192.168.65.60

• 192.168.65.63
• 192.168.65.64


18. What are the network and broadcast addresses for host 192.168.100.130/27? (Choose two.)
• network 192.168.100.0
• network 192.168.100.128
• network 192.168.100.130
• broadcast 192.168.100.157
• broadcast 192.168.100.159
• broadcast 192.168.100.255


19. Refer to the exhibit. Which two are valid VLSM network addresses for the serial link between Router1 and Router2? (Choose two.)
• 192.168.1.4/30
• 192.168.1.8/30

• 192.168.1.90/30
• 192.168.1.101/30
• 192.168.1.190/30


20. When configuring NAT on a Cisco router, what is the inside local IP address?
• the IP address of an inside host as it appears to the outside network
• the IP address of an outside host as it appears to the inside network
• the IP address of an inside host as it appears to the inside network
• the configured IP address assigned to a host in the outside network