Skip to content

desain dan perancangan Jaringan

2011 April 9
Posted by afnipratama

Network Operating Sistem
Sistem Operasi merukan Media yang menjembatani antara perangkat hardware dan brainware, sistem operasilah yang pertamakali beroperasi ketika kita menjalankan sebuah perangkat komputer, dan pada jaringan komputer salah satu software yang kita butuhkan adalah NOS (Network Operating System).
Sistem operasi jaringan (Inggris: network operating system) adalah sebuah jenis sistem operasi yang ditujukan untuk menangani jaringan. Umumnya, sistem operasi ini terdiri atas banyak layanan atau service yang ditujukan untuk melayani pengguna, seperti layanan berbagi berkas, layanan berbagi alat pencetak (printer), DNS Service, HTTP Service, dan lain sebagainya. Istilah ini populer pada akhir dekade 1980-an hingga awal dekade 1990-an. (dikutip dari Wikipedia).

Umumnya, sistem operasi Jaringan terdiri atas banyak layanan atau service yang ditujukan untuk melayani pengguna, seperti layanan berbagi berkas, layanan berbagi alat pencetak (printer), DNS Service, HTTP Service, dan lain sebagainya. Istilah ini populer pada akhir dekade 1980-an hingga awal dekade 1990-an.
Beberapa sistem operasi jaringan yang umum dijumpai adalah sebagai berikut:

·         Microsoft MS-NET·         Microsoft LAN Manager·         Novell NetWare·         Microsoft Windows NT Server·         GNU/Linux·         Banyan VINES·         Beberapa varian UNIX, seperti SCO OpenServer, Novell UnixWare, atau Solaris
Sesuai fungsi komputer pada sebuah jaringan, maka tipe jaringan komputer dibedakan menjadi dua tipe:
·         Jaringan peer to peer·         Jaringan client/server
Jaringan peer to peer

Setiap komputer yang terhubung pada jaringan dapat berkomunikasi dengan komputer-komputer lain secara langsung tanpa melalui komputer perantara. Pada jaringan ini sumber daya terbagi pada seluruh komputer yang terhubung dalam jaringan tersebut, baik sumber daya yang berupa perangkat keras maupun perangkat lunak dan datanya Komputer yang terhubung dalam jaringan peer to peer pada prinsipnya mampu untuk bekerja sendiri sebagai sebuah komputer stand alone. Tipe jaringan seperti ini sesuai untuk membangun sebuah workgroup dimana masing-masing penguna komputer bisa saling berbagi pakai penggunaan perangkat keras.
Jaringan client/server
·         Terdapat sebuah komputer berfungsi sebagai server sedangkan komputer yang lain berfungsi sebagai client·         Komputer server berfungsi dan bertugas melayani seluruh komputer yang terdapat dalam jaringan tersebut.·         Sedangkan komputer client (workstation) sesuai dengan namanya menerima lanyanan dari komputer server
Untuk membangun suatu jaringan client-server diperlukan beberapa bagian:

1. Suatu komputer sebagai pusat data yang disebut sebagai file-server.

2. Komputer sebagai tempat kerja yang disebut sebagai workstation.

3.Peralatan jaringan seperti network interface card, hub dan lainnya.

4.Media penghubung antarkomputer.

5.  System operasi jaringan seperti Windows 2000 server, Windows 2003 server, windows NT server, NetWare, unix, dan lainnya.

6.System operasi untuk workstation seperti DOS, Windows 3.1x, windows 9x, windows NT workstation, Windows XP, dan lainnya.
Komputer server bertugas dan berfungsi untuk:

  • Melayani dan mengontrol seluruh jaringan.
  • Melayani permintaan-permintaan dari komputer workstation.
  • Mengontrol hubungan komputer satu dengan komputer yang lain, termasuk hubungannya dengan perangkat-perangkat lain yang terdapat di dalam jaringan.

Adapun bentuk layanan (service) yang diberikan komputer service adalah:

  • Disk sharing, yaitu berupa penggunaan kapasitas disk secara bersama pada komputer client.
  • Print sharing, yaitu berupa penggunaan perangkat printer secara bersama-sama.
  • Penggunaan perangkat-perangkat lain secara bersama, demikian pula dengan data dan sistem aplikasi yang ada.·         Mengatur keamanan jaringan dan data dalam jaringan.
  • Mengatur dan mengontrol hak dan waktu akses perangkat-perangkat yang ada dalam jaringan.
  • Untuk memilih komputer server harus memperhatikan :Sistem operasi yang digunakan,Sistem aplikasi yang akan dijalankan,Arsitektur jaringan yang diterapkan, Jumlah komputer workstation dalam jaringan yang dilayani, Kemampuan dan daya tahan beroperasi dalam jangka waktu tak terbatas, Kompatibelitas terhadap produk jaringan lainnya, Dukungan teknis dari vendor perangkat tersebut.

Perangkat lunak dalam sebuah jaringan komputer terdiri dari dua perangkat utama, yaitu:

  • Perangkat lunak sistem operasi jaringan.
  • Sistem aplikasi yang digunakan untuk bekerja

Contoh sistem operasi jaringan :

  • Novell Netware dari Novell dengan dedicated servernya.
  • Windows NT dari Microsoft.
  • Unix yang dikenal dengan multiusernya.

(di kutip dari http://iboed.ifastnet.com/?page_id=11)

CCNA Discovery 3 Module 3 Exam Answers Version 4.0

2011 January 12
Posted by afnipratama

CCNA Discovery 3 Module 3 Exam Answers Version 4.0

CCNA Discovery 3 Module 3 Exam Answers Version 4.0

1.
Refer to the exhibit. What two statements can be concluded from the information that is shown in the exhibit? (Choose two.)
• All ports that are listed in the exhibit are access ports.
• ARP requests from Host1 will be forwarded to Host2.
• Attaching Host1 to port 3 will automatically allow communication between both hosts.
• The default gateway for each host must be changed to 192.168.3.250/28 to allow communication between both hosts.
• A router connected to the switch is needed to forward traffic between the hosts.

2.     

A router is configured to connect to a trunked uplink as shown in the exhibit. A packet is received on the FastEthernet 0/1 physical interface from VLAN 10. The packet destination address is 192.168.1.120. What will the router do with this packet?
• The router will forward the packet out interface FastEthernet 0/1.1 tagged for VLAN 10.
• The router will forward the packet out interface FastEthernet 0/1.2 tagged for VLAN 60.
• The router will forward the packet out interface FastEthernet 0/1.3 tagged for VLAN 60.
• The router will forward the packet out interface FastEthernet 0/1.3 tagged for VLAN 120.
• The router will not process the packet since the source and destination are on the same subnet.
• The router will drop the packet since no network that includes the source address is attached to the router.

3.      The information contained in a BPDU is used for which two purposes? (Choose two.)
• to prevent loops by sharing bridging tables between connected switches
• to set the duplex mode of a redundant link
• to determine the shortest path to the root bridge
• to determine which ports will forward frames as part of the spanning tree

• to activate looped paths throughout the network

4.      A router has two serial interfaces and two Fast Ethernet interfaces. This router must be connected to a WAN link and to a switch that supports four VLANs. How can this be accomplished in the most efficient and cost-effective manner to support inter-VLAN routing between the four VLANs?
• Connect a smaller router to the serial interface to handle the inter-VLAN traffic.
• Add two additional Fast Ethernet interfaces to the router to allow one VLAN per interface.
• Connect a trunked uplink from the switch to one Fast Ethernet interface on the router and create logical subinterfaces for each VLAN.
• Use serial-to-Fast Ethernet transceivers to connect two of the VLANs to the serial ports on the router. Support the other two VLANs directly to the available FastEthernet ports.

5.      When are MAC addresses removed from the CAM table?
• at regular 30 second intervals
• when a broadcast packet is received
• when the IP Address of a host is changed
• after they have been idle for a certain period of time

6.     

Refer to the exhibit. Switch1 is not participating in the VTP management process with the other switches. Which two are possible reasons for this? (Choose two.)
• Switch2 is in transparent mode.
• Switch1 is in client mode.
• Switch1 is using VTP version 1 and Switch2 is using VTP version 2.
• Switch2 is in server mode.
Switch1 is in a different management domain.
• Switch1 has no VLANs.

7.      Which three must be used when a router interface is configured for VLAN trunking? (Choose three.)
• one subinterface per VLAN
• one physical interface for each subinterface
• one IP network or subnetwork for each subinterface
• one trunked link per VLAN
• a management domain for each subinterface
• a compatible trunking protocol encapsulation for each subinterface

8.     

Refer to the exhibit. The switches are connected with trunks within the same VTP management domain. Each switch is labeled with its VTP mode. A new VLAN is added to Switch3. This VLAN does not show up on the other switches. What is the reason for this?
• VLANs cannot be created on transparent mode switches.
• Server mode switches neither listen to nor forward VTP messages from transparent mode switches.
• VLANs created on transparent mode switches are not included in VTP advertisements.
• There are no ports assigned to the new VLAN on the other switches.
• Transparent mode switches do not forward VTP advertisements.

9.      Which two criteria are used by STP to select a root bridge? (Choose two.)
• memory size
• bridge priority
• switching speed
• number of ports
• base MAC address
• switch location

10.  Which three steps should be taken before moving a Catalyst switch to a new VTP management domain? (Choose three.)
• Reboot the switch.
• Reset the VTP counters to allow the switch to synchronize with the other switches in the domain.

• Download the VTP database from the VTP server in the new domain.
• Configure the VTP server in the domain to recognize the BID of the new switch.
• Select the correct VTP mode and version.
• Configure the switch with the name of the new management domain.

11.  Which two items will prevent broadcasts from being sent throughout the network? (Choose two.)
• bridges
• routers
• switches
• VLANs
• hubs

12.  Which two characteristics describe a port in the STP blocking state? (Choose two.)
• provides port security
• displays a steady green light
• learns MAC addresses as BPDUs are processed
• discards data frames received from the attached segment
• receives BPDUs and directs them to the system module

13.  What is the first step in the process of convergence in a spanning tree topology?
• election of the root bridge
• determination of the designated port for each segment
• blocking of the non-designated ports
• selection of the designated trunk port
• activation of the root port for each segment

14.  In which STP state does a switch port transmit user data and learn MAC addresses?
• blocking
• learning
• disabling
• listening
• forwarding

15.  What is the purpose of VTP?
• maintaining consistency in VLAN configuration across the network
• routing frames from one VLAN to another
• routing the frames along the best path between switches
• tagging user data frames with VLAN membership information
• distributing BPDUs to maintain loop-free switched paths

16.  Which statement best describes adaptive cut-through switching?
• The switch initially forwards all traffic using cut-through switching and then changes to store-and-forward switching if errors exceed a threshold value.
• The switch initially forwards all traffic using cut-through switching and then changes to fast-forward switching if errors exceed a threshold value.

• The switch initially forwards all traffic using cut-through switching and then temporarily disables the port if errors exceed a threshold value.
• The switch initially forwards all traffic using store-and-forward switching and then changes to cut-through switching if errors exceed a threshold value.

17.  Using STP, how long does it take for a switch port to go from the blocking state to the forwarding state?
• 2 seconds
• 15 seconds
• 20 seconds
• 50 seconds

18.

Refer to the exhibit. The switches are interconnected by trunked links and are configured for VTP as shown. A new VLAN is added to Switch1. Which three actions will occur? (Choose three.)
• Switch1 will not add the VLAN to its database and will pass the update to Switch 2.
• Switch2 will add the VLAN to its database and pass the update to Switch3.
• Switch3 will pass the VTP update to Switch4.
• Switch3 will add the VLAN to its database.
• Switch4 will add the VLAN to its database.
• Switch4 will not receive the update.

19.  Which Catalyst feature causes a switch port to enter the spanning-tree forwarding state immediately?
• backbonefast
• uplinkfast
• portfast
• rapid spanning tree

20.
Refer to the exhibit. Which set of commands would be used on the router to provide communication between the two hosts connected to the switch?
• Router(config)# interface vlan 2
Router(config-if)# ip address 192.168.2.1 255.255.255.0
Router(config-if)# no shutdown
Router(config)# interface vlan 3
Router(config-if)# ip address 192.168.3.1 255.255.255.0
Router(config-if)# no shutdown
• Router(config)# interface fastethernet 0/0
Router(config-if)# no shutdown
Router(config-if)# interface fastethernet 0/0.2
Router(config-subif)# encapsulation dot1q 2
Router(config-subif)# ip address 192.168.2.1 255.255.255.0
Router(config-if)# interface fastethernet 0/0.3
Router(config-subif)# encapsulation dot1q 3
Router(config-subif)# ip address 192.168.3.1 255.255.255.0
• Router(config)# interface vlan 2
Router(config-if)# switchport mode trunk dot1q
Router(config)# interface vlan 3
Router(config-if)# switchport mode trunk dot1q
• Router(config)# interface fastethernet 0/0
Router(config-if)# mode trunk dot1q 2 3
Router(config-if)# ip address 192.168.2.1 255.255.255.0v

ugas CCNA 2 Lab 7.3.3 a Examining Cached DNS information on a windows DNS

2011 January 12
Posted by afnipratama

ugas CCNA 2 Lab 7.3.3 a Examining Cached DNS information on a windows DNS

Lab 7.3.3 a Examining Cached DNS information on a windows DNS
server

Step 1: use the windows server administrative tool
Step 2: perform a DNS lookup
Step 3: Examine the chaced DNS entries
Step 4: reflection
a.       The DNS server had to do a query to the cisco.com domain name servers to resolve name (www.cisco.com) to an IP address what do you think would happen the next time this website is visited again a few minutes? Maka aka nada ns3 karena alamat www.cisco.com diakses untuk yang ketiga kalinya

b.      What would happen if there are no requests for this website for a longer period of time? Tidak akan terjadi apa-apa record-nya tidak akan bertamba

Tugas CCNA 2 Lab 7.3.3.b Creating Primari and secondary forward lookup zones

2011 January 12
Posted by afnipratama

Tugas CCNA 2 Lab 7.3.3.b Creating Primari and secondary forward lookup zones

Lab 7.3.3.b Creating Primari and secondary forward lookup zones

Step 1: Create a primary forward lookup zone on windows
Step 2: add a host record to the primary forward lookup zone
Step 3: create a secondary forward lookup zone
Step 4: reflection
What is the major benefit of having a primary and secondary DNS server in a zone?
Primary DNS server: computer menjalankan fungsi name server baerdasarkan data base yang dimilikinya

Secondary DNS server: computer menjalankan fungsi name server berdasarkan database yang diambil dari ptimary server

Tugas CCNA 2 Lab 8.3.1 Interpreting a service level agreement

2011 January 12
Posted by afnipratama

Tugas CCNA 2 Lab 8.3.1 Interpreting a service level agreement

Lab 8.3.1 Interpreting a service level agreement

Step 1: review typical customer needs

Step 2: Analyze a sample SLA and identify key components

a. Read over the sample SLA that follows and answer these questions regarding content, ISP responsibilities, and customer requirements.

b. According to this agreement, can the ISP be held liable for damage to equipment owned by the customer [Client] or data loss that occurs due to accidental actions by ISP vendor staff or other persons? bisa

c.What are some examples of One Time Services included in the SLA? E-mail service, electronic interchange, online accounting, secure remote workerr support, remote indtrumentation and control system, and backup and recovery service.

d. What are some examples of On going Services included in the SLA? E-mail service, online acounting e. When will regular downtime maintenance be scheduled and how many business days notice must the ISP give of any scheduled downtime? Banyak jam dalam satu hari dan banyak hari dalam senulan.What does the ISP’s network monitoring system do when an error condition is detected? What is the stated availability of the Systems Administrators in the event of a system failure? What is “usage monitoring” and how does the ISP provide this service? Dengan memantau kerja sistem

f. Regarding problem severity and ISP response time, what is the difference in response between “Level 1 – normal business hours” and “Level 3 – normal business hours”? pada level satu baru mendeteksi problem dan pada level 3 sudah ada pengontrolan

g. On what factors are the penalties for service outages based? Provides an estimate for the cost to the customer for a service outage for each of the services the customer wants covered by an SLA.

Tugas CCNA 2 Lab 8.3.2 conducting a Network capture with wireshark

2011 January 12
Posted by afnipratama

Tugas CCNA 2 Lab 8.3.2 conducting a Network capture with wireshark

Lab 8.3.2 conducting a Network capture with wireshark

Step 1: install and launch Wireshark
Step 2: select an interface to  use for capturing pakets
Step 3 : Analysyze web trafict information (optional)
a.       The conection to the google server with a query to the DNS server to lookup the server IP address. The destination server IP address will most likely start with 64.x.x.x what is the source and destination of the first packet sent to the google server?
Source: 192.168.1.103
Destination: 65.24.7.3
b.      Open another browser window and go to the ARIN who is database http://www.arin .net/whois/ or use another whois lookup tool and enter thr IP address of the destination server. To what organization is this IP address assigned? 192.168.1.103
c.       What are the protocols is used to establish the connection to the web server and deliver the web page to your local host? TCP
d.      What is the color used to establish the connection to the server and deliver the web page to your local host? hijau
e.       What is the color used to highlight the traffic between your host and the google web server? gray
Step 5: filter a network capture
a.       Open a command prompt window by clicking start > all programs > run and typing cmd.
b.      Ping a host IP address on your local network and observer? ICMP
c.       When icmp is typed in the filter text box what kind of raffic is was displayed? Ketika kita menge-ping host IP address yang ada di jaringan local kita
d.      Click the filter: Expression button on the wireshark eindow. Scroll down the list and view the filter possibilities there. Are TCP, HTTP,ARP and other protocols listed? Ya ada
Step 6:reflection
a.       There are hundreads of filters listed in the filter: expression option. It may be possible that, in a large network , there would be enormounts and many different types of traffic. Which three filters in the long list do you think might be most useful to a network administrator
b.      Is wreshark a tool for out of band or in band network monitoring

Explain your answare

Tugas ccna2 Lab 8.4.2 planning a backup solution

2011 January 12
Posted by afnipratama

Tugas ccna2 Lab 8.4.2 planning a backup solution

Lab 8.4.2 planning a backup solution

step 1: choose the media and backup hardware
Equipment / media
price
quality
USB and solid-state drives
$30-$90
medium
fireWire drives
$180
best
CD-RW and DVD+RW/-RW drives
$100
medium
Step 2: design a backup plan and procedure
a.       Describe the equipment recommended and explain why you selected this equipment
Saya memilih media di atas Karena saya melihat dari segi kapasitas dan segi ekonomis
b.      Describe location of the equipment in the network and the network link speeds to the equipment
c.       Describe the backup media to be used and also explain why you selected this media
d.      Describe the backup schedule

e.       Describe the backup and restore procedure, including what kind of backup (Normal, differential, incremental), how it will be tested what kind of maintenance the equipment requires. How tapes will be labeled and where tapes that have been backed up will be stored. When backups need to be restored, what is the procedure for a file a folder a driver (use extra sheets it necessary)

Tugas CCNA 3 Lab 9.3.3 Troubleshooting OSPF Routing Issues

2011 January 12
Posted by afnipratama

Tugas CCNA 3 Lab 9.3.3 Troubleshooting OSPF Routing Issues

Lab 9.3.3 Troubleshooting OSPF Routing Issues

Step 1: Connect the equipment

  1. Connect the Fa0/0 interface of each router to the Fa0/1 interface of each switch using a straightthrough cable.
  2. Connect each host to the Fa0/2 switch port of each switch using a straight-through cable.
  3. Connect serial cables from each router to the other routers according to the topology diagram.

Step 2: Load the preconfiguration on R1

  1. See your instructor to obtain the preconfigurations for this lab. Instructor note: The preconfigurations are included at the end of this lab.
  2. Connect a Host H1 to the console port of Router 1 for loading the preconfigurations using a terminal emulation program.
  3. Transfer the configuration from H1 to Router 1:

1) In the terminal emulation program on the PC, choose Transfer > Send Text File.

2) Locate the file for the configuration of Router 1 provided by your instructor and choose Open to start the transfer of the preconfiguration to Router 1.

3) When the transfer is complete, save the configuration.

Step 3: Load the preconfiguration on R2

Copy the preconfiguration on R2 using the process detailed in Step 2.

Step 4: Load the preconfiguration on R3

Copy the preconfiguration on R3 using the process detailed in Step 2.

Step 5: Troubleshoot Router R1 Issues

You are a network administrator, located at the same site as the R1 router, and a user calls the help desk stating that they cannot connect to a file server. You determine that the user is on the 192.168.1.0 network (R1) and that the server is on the 192.168.3.0 network (R3). You visit the user and begin troubleshooting.

  1. Begin troubleshooting at host H1 connected to the R1 router
  2. b. Examine the R1 router to find possible configuration errors. Begin by viewing the summary of status information for each interface on the router.
  3. Check to see if there are routes to the other networks by examining the output of the show ip

route command.

  1. Check the OSPF neighbor adjacencies on R1 using the show ip ospf neighbors command.

Step 6: Troubleshoot Router R3 Issues

  1. To help diagnose potential problems with R3, telnet from R1 to the R3 router using the IP address of the R3 S0/0/0 interface (172.16.7.10) and enter the vty password (cisco) for R3 when prompted. Enter privileged EXEC mode (password class).
  2. While connected to R3 via Telnet, use the show ip route command to see which OSPF routes R3 has learned.
  3. Use the show ip protocols command to determine which networks R3 is advertising.

Step 7: Troubleshoot Router R2 Issues – Part A

You have resolved the problems with access to the file server on the 192.168.3.0 network.

Step 8: Troubleshoot Router R2 Issues – Part B

Although you resolved the problem with OSPF area mismatch on the R2 WAN link, many of your users stillcannot connect to the ISP through R2. You suspect that the problem is still with R2 but is not related to theOSPF area mismatch problem solved earlier.

  1. To verify this, issue more test pings to the ISP.
  2. You note that only users on the R2 LAN can access the Internet and users on R2 and R3 LANs cannot.

Step 9: Reflection

A number of configuration errors appeared in the preconfigurations that were provided for this lab. Use this space below to write a brief description of the errors that you found on each router.? Jawaban: The student should briefly summarize the errors identified in this lab.

Tugas CCNA 3 Lab 9.3.4 Troubleshooting Default Route Redistribution with EIGRP

2011 January 12
Posted by afnipratama

Tugas CCNA 3 Lab 9.3.4 Troubleshooting Default Route Redistribution with EIGRP

Lab 9.3.4 Troubleshooting Default Route Redistribution with EIGRP

Step 1: Connect the equipment

  1. Connect the Serial 0/0/0 interface of Router 1 to the Serial 0/0/0 interface of Router 2 using a serial cable.
  2. Connect the Serial 0/0/1 interface of Router 2 to the Serial 0/0/0 interface of the ISP router using a serial cable.
  3. Connect Host H1 to the console of Router 1 using a rollover cable to perform configurations and use a crossover cable to connect the NIC of H1 to the Fa0/0 of R1.
  4. Connect Host H2 to the console of Router 2 using a rollover cable to perform configurations and use a crossover cable to connect the NIC of H2 to the Fa0/0 of R2.
  5. Connect Host H3 to the console of ISP using a rollover cable to perform configurations.

Step 2: Load the preconfigurations for R1, R2, and ISP

  1. See your instructor to obtain the preconfigurations for this lab. Instructor note: The preconfigurations and final configurations can be found at the end of this lab.
  2. Connect the PC to the console ports of the routers for loading the preconfigurations using a terminal emulation program.
  3. Transfer the configuration from H1 to Router 1:

1) In the terminal emulation program on H1, choose Transfer > Send Text File.

2) Locate the file for the configuration of Router 1 provided by your instructor and choose Open to start the transfer of the preconfiguration to Router 1.

3) When the transfer is complete, save the configuration. 4.

  1. Repeat the transfer process from H2 to Router 2:

1) In the terminal emulation program on H2, choose Transfer > Send Text File.

2) Locate the file for the configuration of Router 2 provided by your instructor, and choose Open to start the transfer of the preconfiguration to Router 2.

3) When the transfer is complete, save the configuration.

  1. Repeat the transfer process from H3 to ISP:

1) In the terminal emulation program on H3, choose Transfer > Send Text File.

2) Locate the file for the configuration of ISP provided by your instructor, and choose Open to start the transfer of the preconfiguration to ISP.

3) When the transfer is complete, save the configuration.

Step 3: Configure the hosts with IP address, subnet mask, and default gateway

1. Configure each host with the proper IP address, subnet mask, and default gateway.

1) H1 should be assigned 192.168.1.2 with a subnet mask of 255.255.255.0 and the default gateway of 192.168.1.1.

2) H2 should be assigned 192.168.2.2 with a subnet mask of 255.255.255.0 and the default

gateway of 192.168.2.1.

H1 ping the FastEthernet interface of R1? __________ yes

Step 4: Check connectivity between hosts H1 and H2

a. Ping from Host H1 to Host H2.

Is the ping successful? __________ No

Step 5: Show the routing tables for each router

From the enable or privileged EXEC mode of both routers, examine the routing table entries, using the

show ip route command on each router.

Step 6: Verify that routing updates are being sent

a. Type the commands debug ip eigrp and clear ip route * at the privileged EXEC mode

prompt of R1. Wait for at least 45 seconds.

Was there any output from the debug commands on R1? __________ yes

What is missing from the debug output on R1? __________________________________________

_______________________________________________________________________________

The installation of a route toward the ISP, EIGRP is not properly configured.

b. On R1, use the show ip protocols command to determine the problem. Review the topology

diagram and the networks that should be associated with each router interface.

c. On R2, use the show ip protocols and show ip route commands to determine the problem.

Review the topology diagram and the networks that should be associated with each router interface.

Step 7: Show the routing tables for each router

From the enable or privileged EXEC mode of both routers, examine the routing table entries, using the show

ip route command on each router.

Step 8: Show the EIGRP topology table entries for each router

a. To view the topology table, issue the show ip eigrp topology command on R1.

b. To view more specific information about a topology table entry, use an IP address with this command:

Step 9: Show the EIGRP traffic entries for R1

Issue the show ip eigrp traffic command on R1.

What were the results?

Step 10: Test network connectivity

From H1, is it possible to ping the FastEthernet interface of R2? __________ yes

From H1, is it possible to ping Host H2? __________ yes

From H1, is it possible to ping the S0/0/0 of the ISP? __________ yes

From H2, is it possible to ping the FastEthernet interface of R1? __________ yes

From H2, is it possible to ping Host H1? __________ yes

From H2, is it possible to ping the S0/0/0 of the ISP? ________ yes

If any answer is no, troubleshoot to find the error. Ping again until successful.

Step 11: Reflection

  1. What does ping test? Jawaban: it tests to see if another device on a network can be reached and the average time it takes a packet to reach the destination and return to the source.
  2. When should the show ip protocols and show ip eigrp topology commands be used? Jawaban: The show ip protocols and show ip eigrp topology commands should be used first to determine routing-related problems. If the problem is not determined, then use debug commands.
  3. When should the debug ip eigrp command be used? Jawaban:  to see if updates are being sent on a network to determine if it is functioning properly. It is a great troubleshooting command but should be used with caution because it can severely interrupt a network.

Tugas CCNA 3 Lab 9.3.4 Troubleshooting OSPF Default Route Redistribution

2011 January 12
Posted by afnipratama

Tugas CCNA 3 Lab 9.3.4 Troubleshooting OSPF Default Route Redistribution

Lab 9.3.4 Troubleshooting OSPF Default Route Redistribution

Step 1: Connect the equipment

  1. Cable the network as shown in the topology diagram.
  2. Connect Host 1 to the console port of Router 1 using a console cable to perform configurations.

Step 2: Perform basic configuration on Router 1

Configure Router 1 with a hostname, assign IP addresses to interfaces, assign privileged passwords, and configure for secure console and Telnet access according to the addressing table and topology diagram. Configure OSPF to advertise networks between routers. Save the configuration. This router will serve as an internal router to the network.

Step 3: Perform basic configuration on Router 2

Perform basic configuration on Router 2 with a hostname, assign IP addresses to interfaces, assign privileged passwords, and configure for secure console and Telnet access according to the addressing table and topology diagram. Configure OSPF to advertise networks between routers 1 and 2. Save the configuration. This router will serve as the router connecting the network to the ISP.

Step 4: Perform basic configuration on Router 3

Perform basic configuration on Router 3 with a hostname, assign IP addresses to interfaces, assign privileged passwords, and configure for secure console and Telnet access according to the addressing table and topology diagram. OSPF will not be configured on this router. Save the configuration. This router will serve as the ISP side router.

Step 5: Configure the hosts with IP address, subnet mask, and default gateway

a. Configure Host 1 and Host 2 with the proper IP address, subnet mask, and default gateway.

1) Host 1 should be assigned 192.168.1.5 /24 and the default gateway of 192.168.1.1.

2) Host 2 should be assigned 10.0.1.10 /24 and the default gateway of 10.0.1.1.

b. Each host should be able to ping its default gateway. If the ping is not successful, troubleshoot as

necessary. Check and verify that the workstation has been assigned a specific IP address and default

gateway.

Step 6: Configure default routing

In this scenario, the devices will have the following functions:

  • • Router 1 (R1) will be an internal enterprise network router.
  • • Router 2 (GW) is to serve as the gateway router connecting the network to the ISP.
  • • Router 3 (ISP) represents the ISP side of the Internet connection.
  • • Host 1 represents an internal network host.
  • • Host 2 (or loopback interface) connected to Router 3 represents a resource on the Internet.

Step 7: Troubleshooting default routing

Default routing is susceptible to many of the same issues that can cause problems with any OSPF route propagation

  1. Shut down the S0/0/1 interface on Router ISP and observe the routing table on Router R1.
  2. Observe that the default route is no longer present.
  3. Troubleshooting becomes more difficult when the GW router is configured to always send the default routing information. Configure this option on the GW router now.

Step 8: Reflection

  1. Can a default route be advertised by an OSPF router that does not have the next hop in its routing table? Jawaban: Yes, if the default-information originate always command is configured; otherwise, no.
  2. List three things that can cause OSPF default route propagation to fail? Jawaban: any OSPF router configuration error or network issue such as: mismatched areas, mismatched timers, incorrect IP addresses, interfaces down, incorrect networks being advertised, etc.
  3. What type of OSPF router does a router that injects a default route into the OSPF process become? Jawaban: An Autonomous System Boundary Router, because the default route points to a network outside of the OSPF domain.
  4. What is an advantage and a disadvantage of using the default-information originate command over configuring default routes on all routers? Jawaban: An advantage is that it is much easier to configure and manage a single static route and redistribution command than to have to configure on each device. Disadvantages are that any OSPF error can cause the loss of the default route and it tends to be more difficult to troubleshoot