8.3.1.2 Packet Tracer

CCNA 3 Lab 8.4.1.2 Packet Tracer - Skills Integration Challenge Instruction Answers.pdf.pka file download completed 100% scored 2019 2020. 8.3.1.2 Packet Tracer – CCNA Skills Integration Challenge Packet Tracer – CCNA Skills Integration Challenge Answer Note: Red font color or gray highlights indicate text that appears in the Answer copy only. Topology Addressing Table Device Interface IP Address Subnet Mask HQ G0/0 10.0.1.1 255.255.255.0 G0/1 192.0.2.1 255.255.255.0 S0/0/0 10.255.255.1 255.255.255.252 S0/0/1 10.255.255.253. 8.3.1.2 Packet Tracer - Skills Integration Challenge.pka.

Packet Tracer - Skills Integration Challenge Topology
Addressing Table IPv4 Address Device
Subnet Mask
Interface IPv6 Address/Prefix S0/0/0
172.31.6.1
255.255.255.252
S0/0/1
10.10.8.1
255.255.255.252
S0/1/0
209.165.200.226
255.255.255.224
R1
S0/0/0
172.31.6.2
255.255.255.252
R2
S0/0/1
10.10.8.2
255.255.255.252
S0/0/0
2001:DB8:A001:6::1/64
S0/0/1
2001:DB8:A001:7::1/64
S0/1/0
2001:DB8:CAFE:1::2/64
R3
S0/0/0
2001:DB8:A001:7::2/64
R4
S0/0/1
2001:DB8:A001:6::2/64
IPv4-Edge
IPv6-Edge
Scenario In this activity, you are tasked with implementing EIGRP for IPv4 and IPv6 on two separate networks. Your task includes enabling EIGRP, assigning router-IDs, changing the hello timers, configuring EIGRP summary routes and limiting EIGRP advertisements.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
Packet Tracer - Skills Integration Challenge
Requirements EIGRP for IPv4 
Implement EIGRP on IPv4 enabled routers using Autonomous System 1. -
Use the classful network address for the loopback interfaces.
-
Use the wildcard mask to advertise the /30 networks between R1, R2 and IPv4-Edge.
-
Use the default method to only allow EIGRP updates out the active EIGRP serial interfaces.
-
Advertisements should not be summarized.

Configure a directly attached default route on IPv4-Edge and propagate it in EIGRP updates.

Configure the serial interfaces between R1, R2 and IPv4-Edge to send hellos every 10 seconds.

On R1 and R2, configure an EIGRP summary route for the loopback networks. R1 Loopback Networks
R2 Loopback Networks
172.31.0.0/25
10.10.0.0/24
172.31.0.128/25
10.10.1.0/24
172.31.1.0/25
10.10.2.0/23
172.31.1.128/25
10.10.4.0/22
Summary:
Summary:

R1 and R2 should only have four EIGRP routes in the routing table, one of which is the default route (D*EX). IPv4-Edge should only have two EIGRP routes in the routing table.

Verify R1 and R2 can ping the IPv4 Server. IPv4 Server should also be able to ping every loopback address on R1 and R2.
EIGRP for IPv6 
Implement EIGRP on IPv6 enabled routers using Autonomous System 1. -
Assign IPv6-Edge with the router-ID of 1.1.1.1
-
Assign R3 with the router-ID of 3.3.3.3
-
Assign R4 with the router-ID of 4.4.4.4

Configure a directly attached default route on IPv6-Edge and propagate it in EIGRP updates.

On R3 and R4, configure an EIGRP summary route for the loopback networks. R3 Loopback Networks

R4 Loopback Networks
2001:DB8:1:1:A000::1/72
2001:DB8:1:1:BB80::1/76
2001:DB8:1:1:A100::1/72
2001:DB8:1:1:BB90::1/76
2001:DB8:1:1:A200::1/72
2001:DB8:1:1:BBA0::1/76
2001:DB8:1:1:A300::1/72
2001:DB8:1:1:BBB0::1/76
Summary:
Summary:
R3 and R4 should only have four EIGRP routes in the routing table, counting the default external route. IPv6-Edge should only have two EIGRP routes in the routing table.
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
Packet Tracer - Skills Integration Challenge 
Verify R3 and R4 can ping the IPv6 Server. IPv6 Server should also be able to ping every loopback address on R3 and R4.
Suggested Scoring Rubric Note: Packet Tracer does not currently grade EIGRP for IPv6 summary routes. Therefore, part of your grade depends on routing table verification by your instructor.
Scored Work
Possible Points
IPv6-Edge Routing Table
10
Packet Tracer Score
90
Total Score
100
© 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Earned Points
Page 3 of 3

Last Updated on April 29, 2018 by

8.3.1.2 Packet Tracer – CCNA Skills Integration Challenge

Packet Tracer – CCNA Skills Integration Challenge

Answer Note: Red font color or gray highlights indicate text that appears in the Answer copy only.

Topology

8.3.1.2 Packet Tracer – CCNA Skills Integration Challenge

8.3.1.2 Packet Tracer

Addressing Table

DeviceInterfaceIP AddressSubnet Mask
HQG0/010.0.1.1255.255.255.0
G0/1192.0.2.1255.255.255.0
S0/0/010.255.255.1255.255.255.252
S0/0/110.255.255.253255.255.255.252
S0/1/0209.165.201.1255.255.255.252
B1G0/0.1010.1.10.1255.255.255.0
G0/0.2010.1.20.1255.255.255.0
G0/0.3010.1.30.1255.255.255.0
G0/0.9910.1.99.1255.255.255.0
S0/0/010.255.255.2255.255.255.252
B1-S2VLAN 9910.1.99.22255.255.255.0

VLAN Configurations and Port Mappings

VLAN NumberNetwork AddressVLAN NamePort Mappings
1010.1.10.0/24AdminF0/6
2010.1.20.0/24SalesF0/11
3010.1.30.0/24ProductionF0/16
9910.1.99.0/24Mgmt&NativeF0/1-4
999N/ABlackHoleUnused Ports

Scenario

In this comprehensive CCNA skills activity, the XYZ Corporation uses a combination of eBGP and PPP for WAN connections. Other technologies include NAT, DHCP, static and default routing, EIGRP for IPv4, inter-VLAN routing, and VLAN configurations. Security configurations include SSH, port security, switch security, and ACLs.

Note: Only HQ, B1, B1-S2, and the PCs are accessible. The user EXEC password is cisco and the privileged EXEC password is class.

Requirements

PPP

  • Configure the WAN link from HQ to the Internet using PPP encapsulation and CHAP authentication.
    • Create a user ISP with the password of cisco.
  • Configure the WAN link from HQ to NewB using PPP encapsulation and PAP authentication.
    • Create a user NewB with the password of cisco.

Note: The ppp pap sent-username is not graded by Packet Tracer. However, it must be configured before the link will come up between HQ and NewB.

eBGP

  • Configure eBGP between HQ and the Internet.
    • HQ belongs to AS 65000.
    • The IP address for the BGP router in the Internet cloud is 209.165.201.2.
    • Advertise the 192.0.2.0/24 network to the Internet.

NAT

  • Configure dynamic NAT on HQ
    • Allow all addresses for the 10.0.0.0/8 address space to be translated using a standard access list named NAT.
    • XYZ Corporation owns the 209.165.200.240/29 address space. The pool, HQ, uses addresses .241 to .245 with a /29 mask. Bind the NAT ACL to the pool HQ. Configure PAT.
    • The connections to the Internet and HQ-DataCenter are outside XYZ Corporation.

Inter-VLAN Routing

  • Configure B1 for inter-VLAN routing.
    • Using the addressing table for branch routers, configure and activate the LAN interface for inter-VLAN routing. VLAN 99 is the native VLAN.

Static and Default Routing

  • Configure HQ with a static route to the NewB LAN. Use the exit interface as an argument.
  • Configure B1 with a default route to HQ. Use the next-hop IP address as an argument.

EIGRP Routing

  • Configure and optimize HQ and B1 with EIGRP routing.
    • Use autonomous system 100.
    • Disable EIGRP updates on appropriate interfaces.

VLANs and Trunking Configurations

Note: Logging to the console is turned off on B1-S2 so that the Native VLAN mismatch messages will not interrupt your configurations. If you would prefer to view console messages, enter the global configuration command logging console.

  • Configure trunking and VLANs on B1-S2.
    • Create and name the VLANs listed in the VLAN Configuration and Port Mappings table on B1-S2 only.
    • Configure the VLAN 99 interface and default gateway.
    • Set trunking mode to on for F0/1 – F0/4.
    • Assign VLANs to the appropriate access ports.
    • Disable all unused ports and assign the BlackHole VLAN.

Port Security

  • Use the following policy to establish port security on the B1-S2 access ports:
    • Allow two MAC addresses to be learned on the port.
    • Configure the learned MAC addresses to be added to the configuration.
    • Set the port to send a message if there is a security violation. Traffic is still allowed from the first two MAC addresses learned.

8.3.1.2 Packet Tracer Answers

SSH

  • Configure HQ to use SSH for remote access.
    • Set the modulus to 2048. The domain name is CCNASkills.com.
    • The username is admin and the password is adminonly.
    • Only SSH should be allowed on VTY lines.
    • Modify the SSH defaults: version 2; 60-second timeout; two retries.
8.3.1.2 Packet Tracer

DHCP

Packet Tracer 8.4.1.2

  • On B1, configure a DHCP pool for the Sales VLAN 20 using the following requirements:
    • Exclude the first 10 IP addresses in the range.
    • The case-sensitive pool name is VLAN20.
    • Include the DNS server attached to the HQ LAN as part of the DHCP configuration.
  • Configure the Sales PC to use DHCP.

Click Sales PC > Desktop > IP Configuration
Change to DHCP and verify PC gets addressing information

Access List Policy

  • Because HQ is connected to the Internet, configure and apply a named ACL called HQINBOUND in the following order:
    • Allow inbound BGP updates (TCP port 179) for any source to any destination.
    • Allow inbound HTTP requests from any source to the HQ-DataCenter network.
    • Allow only established TCP sessions from the Internet.
    • Allow only inbound ping replies from the Internet.
    • Explicitly block all other inbound access from the Internet.

Connectivity

  • Verify full connectivity from each PC to WWW.pka and www.cisco.pka.
  • The Outside Host should be able to access the webpage at WWW.pka.
  • All the test in Scenario 0 should be successful.