Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

CCNP 642-811 BCMSN Exam Certification Guide - Cisco press

.pdf
Скачиваний:
161
Добавлен:
24.05.2014
Размер:
10.85 Mб
Скачать

C H A P T E R 21

Scenarios for Final Preparation

This chapter presents scenarios that you can use to review most of the concepts contained in this book. The scenarios are designed to assist you in final preparation for the BCMSN exam. Case studies are presented with network diagrams and questions covering many switching topics.

This chapter emphasizes an overall understanding of switching concepts, configuration commands, and network operation. Although the Cisco BCMSN exam might not contain scenarios of this type, you can become better prepared by thinking about the “bigger picture” of a network and how you can apply each switching topic.

Scenario 1: Trunking and DTP

This scenario is built around a network of switches connected by trunking links. You need to think about how DTP operates and how trunks are negotiated (or not) between switches.

Consider the network shown in Figure 21-1 and answer the questions that follow. Assume that all switches shown support DTP.

498 Chapter 21: Scenarios for Final Preparation

Figure 21-1 Diagram for Scenario 1

PC-1

VLAN 1

10.5.5.72

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

switchport mode

switchport mode

Catalyst B

Catalyst A

 

 

 

 

dynamic auto

dynamic Auto

interface vlan 1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

interface vlan 1

 

 

 

 

 

 

 

gig 0/1

gig 0/1

 

 

 

 

 

 

 

 

 

 

10.1.5.3

10.1.5.2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

switchport mode

 

gig 0/2

 

 

 

 

 

 

 

 

 

 

 

 

trunk

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

switchport mode

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

dynamic desirable

 

 

gig 0/1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

PC-2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Catalyst C

 

 

 

 

 

 

 

 

 

 

VLAN 1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

10.5.5.50

 

interface vlan 1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

10.1.5.1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

All Trunks Carry

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

all VLANs.

 

PC-3

 

 

 

PC-4

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

VLAN 1

 

 

VLAN 2

 

 

 

 

 

 

 

 

 

 

 

 

10.5.5.100

 

 

 

 

10.1.100.17

 

 

 

 

 

 

 

 

 

 

 

 

1.What is the mode of the link between Catalyst A and Catalyst B?

2.Suppose the network administrator types these commands for interface GigabitEthernet 0/1 on Catalyst B:

switchport mode trunk switchport nonegotiate

What will the link mode be now?

3.Catalyst B has been given the command no switchport nonegotiate for interface GigabitEthernet 0/1. What is the link mode now?

4.What is the mode of the link between Catalyst A and Catalyst C?

5.Assume that all links between Catalyst switches are in trunking mode, transporting VLANs 1 through 1005. Can PC-2 ping PC-4?

6.Suppose PC-1 begins to generate a broadcast storm. Where would the effects of this storm be experienced in this network? Consider both devices and links. Will PC-4 receive the broadcasts?

Scenario 2: VLANs, Trunking, and VTP 499

Scenario 2: VLANs, Trunking, and VTP

This scenario is designed to stir your thinking about VLAN and trunking connectivity. You also need to examine switch configurations and apply them to a network diagram. See the diagram shown in Figure 21-2 and answer the questions that follow. Portions of the configurations of the three Catalyst switches are shown above them.

Figure 21-2 Diagram for Scenario 2

Catalyst A

interface gigabitethernet 0/1 switchport mode access switchport access vlan 2

interface fastethernet 0/1 switchport mode access switchport access vlan 2

Catalyst B

interface gigabitethernet 0/1 switchport mode access switchport access vlan 10

interface fastethernet 0/1 switchport mode access switchport access vlan 10

interface gigabitethernet 0/2 switchport trunk encapsulation isl switchport mode trunk

Catalyst C

interface gigabitethernet 0/1 switchport encapsulatiion dot1q switchport mode trunk

interface fastethernet 0/1 switchport mode access switchport access vlan 10

 

 

 

 

 

 

 

 

gig 0/1

gig 0/1

 

 

 

 

 

 

 

gig 0/2

gig 0/1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

fast 0/1

 

 

 

 

 

fast 0/1

 

 

 

 

 

 

fast 0/1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

PC-1

 

 

 

PC-2

 

 

PC-3

VLAN 2

 

 

VLAN 10

 

VLAN 10

10.2.2.1

 

 

 

10.2.2.2

10.1.1.1

1.PC-1 and PC-2 are both configured with IP addresses on the same subnet. Notice that each PC connects to a different VLAN number. Given the switch configurations shown, can PC-1 ping PC-2?

2.PC-2 and PC-3 are assigned to the same IP subnet and the same VLAN. Can PC-2 and PC-3 ping each other?

3.Will the trunk link between Catalyst B and C come up successfully?

4.Suppose the trunk between Catalyst B and C is configured properly. Where will VLAN1 be pruned? Why?

5.Suppose Catalyst A is a VTP server, Catalyst C is a VTP client, and Catalyst B is configured for VTP transparent mode. All switches are in the “Bermuda” management domain. If VLAN14 is created on Catalyst A, which switches will also create VLAN 14 using VTP?

6.If VLAN 15 is created on Catalyst B, what other switches will also create VLAN 15 via VTP?

7.If VLAN 16 is created on Catalyst C, what will happen?

500 Chapter 21: Scenarios for Final Preparation

Scenario 3: Traditional STP

This scenario exercises your ability to think through the Spanning Tree Protocol operation. You are presented with a simple network of two switches. This keeps the STP complexity to a minimum while forcing you to think through the STP convergence process on a live network. Given the network diagram shown in Figure 21-3, complete the following exercises.

Figure 21-3 Network Diagram for Scenario 3

Catalyst A 32768.00-d0-58-a3-83-c9

fa1/1 fa1/2 g2/1

10 100 1000 Mbps Mbps Mbps

fa1/1 fa1/2 g2/1

Catalyst B 32768.00-d0-58-a3-83-ca

1.Manually compute the Spanning Tree topology. Note which switch is the Root Bridge, which ports are Root Ports and Designated Ports, and which ports are in the Blocking state.

2.If the 100-Mbps link (port FastEthernet 1/2) is disconnected, what happens with the STP?

3.If the 1000-Mbps link (port GigabitEthernet 2/1) is disconnected, how much time will elapse before the two switches can communicate again? (Assume both switches use the default STP timer values and no additional features for faster convergence.)

4.Assume that for some reason the physical 1000-Mbps link (port GigabitEthernet 2/1) stays up and active, but BPDUs are not allowed to pass (that is, an access list filter is blocking BPDUs). What happens and when?

Scenario 4: Advanced STP

A small network consists of two core switches, Catalyst C1 and C2, and an access switch, A1,

as shown in Figure 21-4. Advanced Spanning Tree Protocol features will improve the convergence times and reduce the number of STP instances. Answer these questions.

 

Scenario 5: Router Redundancy with HSRP and GLBP 501

Figure 21-4 Network Diagram for Scenario 4

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Catalyst C1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Catalyst C2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Trunk

 

 

 

 

 

 

 

 

Links

Catalyst A1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

VLAN 99

 

 

 

 

 

 

 

 

 

 

 

 

(Management)

 

VLANs

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

VLANs

100

 

 

 

200

 

101

 

 

 

 

 

 

201

 

102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

202

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

103203

104204

1.To prevent the possibility of a unidirectional link occurring on switch A1’s uplinks, what switch feature can be used? What commands are necessary to enable this feature? Assume that the links should be disabled if a unidirectional condition is found. Which switches need to be configured this way?

2.For the links between switch A1 and the user PCs, what command is needed to configure these as RSTP edge ports?

3.Suppose MST is to be configured to reduce the number of STP instances, because 12 unique VLANs are being used across the network. How many MST instances are needed for the three switches shown in figure 21-4, assuming that traffic should be load-balanced across the two uplinks of switch A1?

4.What commands are needed to configure switch C1 for MST?

5.Now, make sure that C1 is configured as the Root Bridge for one MST instance. What commands are needed?

Scenario 5: Router Redundancy with HSRP and GLBP

This scenario covers two methods by which you can configure multilayer switches to provide redundant router or gateway functionality: HSRP and GLBP.

502Chapter 21: Scenarios for Final Preparation

1.A network consists of two VLANs: 101 and 102. Suppose the PCs in VLAN 101 (192.168.101.0/24) use address 192.168.101.1 as their default gateway. The PCs in VLAN 102 (192.168.102.0/24) use 192.168.102.1. What commands are necessary to configure HSRP on a Catalyst switch so that it becomes the active router for VLAN 101 and the standby router for VLAN 102? If a failed router interface is restored, control should be passed back to it from the HSRP standby router. (You can use IP addresses 192.168.101.2 and 192.168.102.2, if needed.)

2.GLBP is to be used in the network shown in Figure 21-5. Answer the following questions about this network.

Figure 21-5 Network Diagram for Scenario 5

Standby AVG / AVF

 

 

AVG

 

 

AVF

 

VLAN 10

 

 

VLAN 10

 

VLAN 10

192.168.10.10

192.168.10.11

192.168.10.12

Catalyst A

 

 

 

 

Catalyst B

 

 

 

 

 

 

 

 

Catalyst C

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

GLBP Gateway

192.168.10.1

VLAN 10

a.What command should you use to make Catalyst B become the active virtual gateway (AVG) for GLBP group 10?

b.The virtual gateway address is 192.168.10.1. Which switches should be configured for this, and with what command?

Scenario 6: Multicast 503

c.Give the command needed on the AVG to implement round-robin load-balancing, evenly distributing the virtual gateway MAC addresses across the set of AVFs.

d.Each of the AVF switches must be configured to become members of GLBP group 10. How can this be accomplished?

Scenario 6: Multicast

This scenario tests your knowledge of various multicast switching features. Think about how multicast traffic traverses a network, as well as how switches can be configured to participate in building multicast topologies. Then, consider how you can configure the switches to limit the forwarding of unnecessary multicast traffic.

1.Under what conditions is IGMP snooping more suitable than CGMP for handling multicast traffic?

2.Figure 21-6 shows a network diagram. Assume that all switches use the default multicast configurations. Where in the network will multicast traffic originating from PC-1 on Catalyst A (VLAN 101) be seen?

Figure 21-6 Network Diagram for Scenario 6

 

 

PC-1

 

 

PC-2

 

 

PC-3

 

PC-4

VLAN 101

VLAN 102

VLAN 101

VLAN 102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Catalyst A

 

 

 

 

 

 

 

Catalyst B

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

gig 2/1

 

 

gig 2/1

 

 

 

 

 

 

 

 

 

Trunk Links

 

 

 

 

 

 

 

 

 

 

 

VLANs 101,102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Catalyst C

Catalyst D

504 Chapter 21: Scenarios for Final Preparation

3.What configuration is needed on Catalysts C and D to limit multicast traffic to only those ports that explicitly join multicast groups, using CGMP with PIM dense mode? Assume this is needed on both VLANs 101 and 102. What configuration is needed on Catalysts A and B, which are not capable of IGMP snooping.

Scenario 7: QoS in a Switched Network

This scenario uses a simple two-switch network to reinforce the concepts needed to properly implement QoS. Think about QoS trust within this network, and how the switches can use QoS information to provide appropriate delivery of data and voice applications. Use Figure 21-7 as a reference for the following questions.

Figure 21-7 Network Diagram for Scenario 7

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3/1

 

 

IP

 

 

 

 

 

 

 

 

 

 

Public

1/1

 

1/2

1/1

 

 

 

Cisco

User PC

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Network

 

 

 

 

 

3/2

IP Phone

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Catalyst A

Catalyst B

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

User PC

1.Where should a QoS trust boundary be implemented? In other words, which switches should trust incoming QoS information and which ones should not?

2.If Catalyst A port 1/1 is to have inbound QoS untrusted, what commands should you use?

3.Suppose two mission-critical applications are running on the “public” network. One is a streaming video application that uses UDP port 5000. The other is Citrix. What commands could you use on Catalyst A to configure a QoS class map that will classify this traffic specifically?

4.What other commands are necessary to use the class map from Question 3 in a complete QoS policy? Classified traffic should receive a DSCP codepoint AF31 (26). The policy will be applied to Catalyst A interface Gigabit 1/1.

5.After the DSCP has been marked to AF31, are additional commands needed to mark the IP Precedence value to 3?

Scenario 8: Securing Access and Managing Traffic in a Switched Network 505

6.On Catalyst B, configure interface FastEthernet 3/1 to inform the IP Phone to use VLAN 17 for voice traffic. Also, add a configuration command to ensure that no QoS trust is extended to the IP Phone’s PC data port.

7.When voice traffic enters switch Catalyst B from the IP Phone on interface FastEthernet 3/1, it will be forwarded out Catalyst B’s interface GigabitEthernet 1/1. What egress queue will the voice traffic be placed in on that interface? (Assume the interface is queue type 1p2q2t.)

Scenario 8: Securing Access and Managing Traffic in a Switched Network

This scenario is designed to stir your thinking about how to control access to switched networks, how to control traffic within a VLAN, and how to monitor traffic.

1.Network administrators want to have tight control over hosts moving around within their network. A Catalyst 3550 needs to have port-level security enabled on all 48 FastEthernet access layer ports. Only one host should be connected per port, so the default behavior of shutting the port down is acceptable. What commands are necessary to do this?

2.Port-level security is desired on a Catalyst 3550 interface FastEthernet 0/18, where 24 users are connected via an Ethernet hub. Rather than have the switch port shut down upon a security violation, network administrators want only the hosts in violation to be rejected. What command can accomplish this?

3.Configure a VLAN access control list that can perform packet filtering within a VLAN. Users in the 192.168.191.0 255.255.255.0 network should be allowed to use only HTTP (www) traffic to the web server 192.168.191.199/24, on VLAN 180. How can you configure the VACL to accomplish this?

4.Assume that a server is connected to interface GigabitEthernet 3/3 on a Catalyst 6500. What command can be used to monitor traffic transmitted and received on the server port with a network analyzer connected to interface GigabitEthernet 5/8 on the same switch?

5.Suppose that the only network analyzer available has a 10/100 Ethernet NIC. It is connected to Catalyst 6500 interface FastEthernet 2/1, to monitor the server on GigabitEthernet 3/3. Explain any problems you might encounter with this setup.

Соседние файлы в предмете Сети и Телекоммуникации