Topology
Layer 2 Technologies
Some Layer 2 settings have been pre-configured for you; VLANs have been
created and assigned to the switchports according to the diagram supplied with
the task.
Ensure SW2 is the primary STP root bridge for VLAN105
Configure the network in such a way to ensure that VLAN 102’s traffic never traverses SW3.
Additionally ensure that no other VLAN traffic follows the path that VLAN 102 does through the switched network.
Ports Fa1/6 on SW1 and Fa1/5 on SW2 connect to your corporate conference room.
Recently your network administrator has been getting complaints that when users plug their laptops into the conference room it either takes a very long time to get an IP address from the DHCP server, or the DHCP request times out. After further investigation, you have discovered that spanning-tree convergence time is to blame. In order to resolve this configure SW1 and SW2 so that users in VLAN 28 do not have to wait for spanning-tree’s forwarding delay when they connect to the network.
Ensure that any ports in VLAN 28 will be shut down if a device running spanning-tree protocol is detected.
Some IGP protocol settings and IP addressing have been preconfigured for you.
Notice that there might be some issues deliberately introduced into the initial
configurations. Use the diagram as you reference to fix those.
Ensure that R5 is always elected the Designated Router for the segment
between R3, R4 and R5.
Ensure that host devices running OSPF on the segment between R4 and
R5 cannot intercept the OSPF communication between R4 and R5.
Advertise VLAN 6 into OSPF on R6; do not use the network or ip ospf
statements to accomplish this.
Configure the network so that traffic is only sent over this Ethernet
segment if the Frame Relay circuit between R4 and R5 is down.
Do not use the backup interface command to accomplish this.
To minimize downtime in the event of a failure configure the network so
that R4 can detect a loss of the Frame Relay circuit to R5 within 1 second.
4 Points
Advertise VLAN 33 and R3’s interface Fa0/1 into the EIGRP domain.
These prefixes should appear as follows throughout the EIGRP domain:
D EX
D EX
204.12.X.0 [170/…
183.X.39.0 [170/…
In order to ensure that all routes learned over the Frame Relay cloud via
EIGRP are legitimate configure R6 to use the most secure authentication
for any neighbor relationships formed on this interface.
Use key number 1 with a password of CISCO for this authentication.
In order to protect against false route injection from RIP as well, configure
SW4 to use the strongest authentication on any RIP updates received on
this Ethernet segment using key 1 and the password CISCO.
Redistribute between RIP and EIGRP on SW4.
Redistribute between OSPF and EIGRP on R3, R5, and R6.
R5 should still be able to reach this prefix if the Frame Relay circuit
between R2 and R3 is down.