CCNP ROUTE Instructor Lab Manual. use by instructors in the CCNP TSHOOT course as part of an This lab uses Cisco routers with Cisco IOS. CCNP TSHOOT Student Lab Manual. Share? CCNP Routing and Switching TSHOOT Official Cert Instructor Lab Manual. Download Ccnp Tshoot Instructor Lab Manual free pdf, Download Ccnp Tshoot ccnp tshoot instructor lab manual. this document is exclusive property of.
|Published (Last):||16 March 2004|
|PDF File Size:||5.21 Mb|
|ePub File Size:||15.17 Mb|
|Price:||Free* [*Free Regsitration Required]|
Discuss which verification techniques could be used to find these types of issues. The file in flash can then be loaded into the running config using the procedure described in Task 2. Use Cisco Discovery Protocol and show commands to verify the Layer 1 and Layer 2 connections of the lab topology.
Proper verification should uncover both issues. Based on documentation, baselines, and knowledge of your network in general, the first step is to determine the path that you would expect frames to follow between the affected hosts.
For this lab and subsequent labs, the student is responsible for loading the lzb or trouble ticket configurations as required using the procedure described labb Task 2.
Analyze the configurations of your assigned devices for configuration options that help support a more secure network implementation, such as password security, login authentication, secure remote management, switch trunk and access port security, and VLANs.
When trying to determine what could cause the MAC address not to be learned on the next switch, consider the following questions: Changing parameters on the port channel tsgoot changes them on the physical member ports, thus the parameter on the port channel and the individual ports remain consistent.
CCNP TSHOOT 6.0 Student Lab Manual
If the directory and files are not present, contact your instructor. Your oab is to diagnose and solve this problem, making sure that the consultant gets access to SRV1. Instructors can use a TFTP server, USB drive, flash memory card or other method to copy all the course configuration files into the flash: All team members can access all devices via Telnet or SSH for nondisruptive diagnostic action without permission of the responsible team member.
Document the troubleshooting and maintenance applications or tools in use with the network devices in the Troubleshooting and Maintenance Tools table.
Displays an overview of all existing VLANs and the ports Page 18 of 79 show cdp neighbors detail show spanning-tree vlan vlan show spanning-tree inconsistentports show spanning-tree summary show mac address-table address mac-addr show mac-address-table interface intf-id show vlan brief All contents are Copyright? Alternately, you can use the PC browser to connect to Is DHCP in use?
DLS2 is the standby.
To simulate an Internet connection, you can ping the R2 Lo0 address at Which security measures have been implemented, such as passwords, login authentication, trunks, and port Instruxtor. The focus of this lab is to allow the students to familiarize themselves with the lab environment.
Diagnose and resolve Layer 2 connectivity problems. Physical and Logical Topology Diagrams The physical and logical topologies, including interface designations and IP addresses, are provided to assist the troubleshooting effort.
Background User computers, servers, and printers all connect to the access layer of the hierarchical model. The sample output is shown on following pages. thoot
Change the encapsulation on each physical interface to dot1q. Analyze the configurations of the devices for services that support troubleshooting and maintenance, such as syslog, Simple Network Management Instruchor SNMPand other network management features. This command applies to access ports as well as trunk ports. Interface Type and information includes: Instructpr gives you a starting point for gathering information about what is actually happening on the network, and it makes it easier to spot abnormal behavior.
Review trouble ticket Lab TT-C. The major Network Layer tests are ping and traceroute to a specific IP address. Record your entries in the Security Features table. The configs provided here are not running-config outputs. Device Configurations Important Instructor Note: Which commands did gshoot use to analyze the spanning-tree characteristics?
This directory contains the baseline configuration file for that device as well as the configuration files for the labs in this course.
Are any access lists used to filter cdnp on the network? The show running-config interface po2 command on DLS2 indicates that Po2 encapsulation is dot1q, the native VLAN isand the trunks allowed are 10, 20, 30, 50, and Reference configurations for all devices are provided at the end of the lab.
The following device access methods are in effect after loading the configuration files: Encapsulation is isl but should be vlan dot1q. Diagram the spanning tree for VLAN If you are looking for the MAC address of a specific host, use the show mac-address-table address macaddress option.
On live networks, the test traffic that you are generating will be lost against the background of the live traffic patterns in most cases. However, it is the most definitive proof that traffic is or is not flowing along specific paths and tshot.
The baseline configuration file for each device and the final show running-config outputs are included at the end of this lab. Outline the troubleshooting approach and validation steps. Do not assign either PC a static address. Edge for edge PortFast ports. This cfnp all Layer 2 traffic on these links including Cisco Discovery Protocol packets to fail.
Load the device trouble ticket configuration files for TT-C. No data frames will be transmitted. The show running-config interface po2 and show running-config interface po10 commands on DLS2 confirm that Po2 encapsulation is dot1q and the native VLAN is Determining the expected path and verifying the actual path gshoot go hand-in-hand.