设为首页收藏本站language 语言切换
查看: 14177|回复: 28
收起左侧

[其他] CCIE LAB RS4.0 K3的的拓扑图 2011.10

  [复制链接]
发表于 2011-10-8 10:28:48 | 显示全部楼层 |阅读模式
本帖最后由 ω`)河锅_晓斋 于 2011-10-8 10:29 编辑
: A0 z) w5 x* g+ A- r
: v6 f; H" C2 }& S* x4 ?7 d Untitled.jpg
发表于 2011-10-8 10:47:55 | 显示全部楼层
沙发 2011-10-8 10:47:55 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-8 11:22:27 | 显示全部楼层
这个不是什么K3,国外叫4.1,而且你这个图也不是原版的,是别人自己画的!!!!!
板凳 2011-10-8 11:22:27 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-8 13:02:43 | 显示全部楼层
地板 2011-10-8 13:02:43 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-8 13:14:31 | 显示全部楼层
5# 2011-10-8 13:14:31 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-8 14:38:37 | 显示全部楼层
6# 2011-10-8 14:38:37 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-9 08:45:06 | 显示全部楼层
那你又该图吗
7# 2011-10-9 08:45:06 回复 收起回复
回复 支持 反对

使用道具 举报

 成长值: 36655
发表于 2011-10-10 00:22:46 | 显示全部楼层
我可以证实这个图是真的。请问你有题目吗?
8# 2011-10-10 00:22:46 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-10 07:43:50 | 显示全部楼层
9# 2011-10-10 07:43:50 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-10 08:36:08 | 显示全部楼层
{:soso_e179:}
10# 2011-10-10 08:36:08 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-11 11:37:49 | 显示全部楼层
简直是不知真假啊
11# 2011-10-11 11:37:49 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-11 16:02:22 | 显示全部楼层
本帖最后由 虚心求学 于 2011-10-11 16:02 编辑 ( ~: y. [" ^+ U: n! I8 N

2 D  g' T( c; `+ A北京华尔思网络实验室www.wallslab.net思科授权培训中心考试中心,CCIE集训营火热招募中。
12# 2011-10-11 16:02:22 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-12 09:00:24 | 显示全部楼层
thanks for sharing
13# 2011-10-12 09:00:24 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-13 10:37:09 | 显示全部楼层
现在唯一缺少的是需求。苍天那。大哥们救救小弟于水火吧。
14# 2011-10-13 10:37:09 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2011-10-13 13:40:39 | 显示全部楼层
需求如下:
& a8 y' u5 F" S7 c6 L" ~
4 F9 V# L" f$ b& F) ~+ g1 c5 Sections
+ w8 @3 W# x. b1. Layer2 Tech (approx 9 questions )
2 |' h' c& t1 R6 \$ D7 O2. Layer3 Tech (approx 10 Questions )# _! E6 ?. ]) P
3. Multicast ( only 2 questions )
* {% o# [6 B# r0 l0 `: b4. Advanced Services ( approx 9 questions )
! w" ^  `( I- F) J3 F4 i0 R  i5. Optimize the network ( only 2 questions )
8 [' U2 L: G! J9 {0 {% ^- N( O. K! E2 O6 K. W

* Q; `+ ^4 |6 w4 S1 u' ]0 [# ^0 l( s

. F% i( t2 {7 f/ QSection 1: L2SPANNING-TREE:( c# B. T9 ?3 s" Y3 n

6 T$ A5 J9 i5 @8 p8 y" f. q4 X, D8 ~* ^, c
1.1 Configure 2 spanning-tree domains.
4 y, W  V8 P6 U3 H* E% {VLANs for backbones will be in instance 1 and, all other VLANs will be in& z- h/ \( e- r
instance 2.) [3 Q& ^2 Z# m% N) b
Any other VLAN will be in the default spanning-tree instance.
# z1 S% B" F0 \( _# \1 D) g0 H2 `9 p0 ^Sw1 must be the root for instance 1 with sw2 being the backup8 V8 R9 g7 U( R5 e
Sw2 must be the root for instance 2 with sw1 being the backup.
( @, S  a3 k, i9 i/ T- }Ensure port fa0/20 is forwarding rather than blocking for MST 1 on
; j# J8 U4 g; w2 z' x  eswitch 3. You must do this without any configuration on sW3 / SW4.' J/ _: l7 Q9 C/ o' G8 `
. \( y: D6 I' |8 `6 ^' D
1.2 Configure Additional Spanning-Tree
3 l7 N1 x: Y! _- @  ^+ ~; _Use one command to enable portfast
6 W4 B, x; Z) G4 O0 F0 \9 ?8 _Ensure all access-ports go into err-disable if receiving any BPDU's6 c: g! J2 h' q6 n
(This does not apply to BB router ports)# R' M$ f2 I1 x8 a2 h
Ensure backbone ports can't influence the STP topology ever( [% n, L% y$ F" k% G; d
Configure Spanning-tree timers such that if no bpdu's was received within xy seconds, that the network reconverges& A1 n2 ^$ q; b7 r% K
7 O! a" n9 x/ [' X& ]& _! G. J
$ w2 i, H2 T3 Y# q5 {" ^
1.3 CONFIGURE ETHERCHANNEL:: h1 E! P3 h% S; v
Configure industry standard Etherchannel betwen SW1 & SW2. R7 w7 ?- B. X4 l' h8 l: U
Configure proprietary Etherchanel between SW3 & SW4+ v$ C: g# b; r2 C+ ?
SW1 & SW3 should actively negotiate and SW4 & SW2 should only establish en Etherchannel when requested so$ i$ L* L" h. G9 o- @7 y2 ~+ ?
. I* J5 t/ f/ A0 E1 f* p  s' K
; V3 Q* [/ O) M& r
1.4 VLAN TRUNKING:% c& J1 f- g  l+ n9 ], X2 [- f- z
Configure all inter-switch links to use an industry standard
; H1 d6 W; t! U4 Q( ]# [Set the VTP Domain to "CCIERoutingAndSwitching"
7 Z" n+ N; T0 g6 J1 uUses VTP version 1. SW1 should be server, and rest Clients% d( [' d. M9 f4 O# S+ C2 o
% F9 W6 c$ l" K, I
1.5 RSPAN
) @# c- {' O( e9 {8 yConfigure port mirroring for VLANS 17 and 59 on SW1 as the source. Traffic should8 _7 w  x; F6 R  F" @4 W
be sent to SW2 fa0/9.- c$ ~& f- h8 G
) l) R2 t: b( e7 A( X

5 Q6 ]/ T  x' ]; Y% A+ r
8 F# T) E5 U" S, E( p- }4 r& T( @4 Z! p: w& d  x( e  K; _

7 H/ t) Q4 k. K' h4 N
$ ?' l) V( I3 B/ T/ _/ O9 qSection 2: IP Routing4 e7 ~1 O3 ]5 b' }* c% W

$ y9 e+ H0 ]6 B& I& m2.1 Configure OSPF Area0, 142, 512 ?* [. s/ S- M  o
Use the Rack # for the process ID.  e- I$ [; A0 q" U
Configure the Router ID to match Loopback 0* f& @" Q2 ~* m* w3 [
Configure Area 0 between on the Ethernet segment shared by all switches.
9 P* }5 ~: ~0 z0 s' ]8 v5 I0 USW1 should control all routing, and SW2 should be the backup. (Use largest value)6 P. m- f* L8 ^# q$ A+ h

. s; _! x/ p% s1 Q  BConfigure OSPF AREA 142 between SW1-R1-R4-R2-SW4
8 ^' Y/ e2 [( Q2 aConfigure OSPF AREA 51 between SW2-R5-R3
2 }$ i" C  A9 [! Z2 [6 q# J  ^6 _  d! g( N* c3 C8 s3 Q
Configure Area 51 so that no type 7 LSAs are present.
' ~0 _: G' h& c* a' @; S* I' C! k/ k7 m

$ z: B; r3 V/ O% ]7 [5 C; ~2.3 Configure EIGRP 100
5 F8 g0 v2 L2 n& FConfigure EIGRP 100 on SW2.; k# t( x0 n# s3 b0 t: T
SW2 should not be queried for any routes.9 C/ g1 x. X& Y- N( w# D& \

. g( |% v" Y- }Redistribute EIGRP 100 into OSPF. The EIGRP routes should not be present in% x" a( }: W( U' j8 q
OSPF Area 51. SW2 should generate a default route.
' d) r) n; ^/ a) o* L/ X* E: G' G, \1 f4 |( V8 L% C% W

, g) o( l3 d* F  [; m2.4 Configure RIP! J/ r) k3 u6 {) |
Configure R3 with RIPv2
# s/ {) }5 Q# z3 f5 Q( e5 B- W' K2 Q- M: L4 k8 G) C
Redistribute RIP into OSPF. Only x.x5.0, x.x7.0, x.x.13.0, x.x.15.0/24 should be
( a: `' u) G1 U3 c& y; s2 Eredistributed. Use only line ACL for this task.' Z& n# J. W6 a5 j

$ A3 F3 J2 b% J' P) ZMatch the screen shot :
/ ~& D2 Q& _3 t6 L1 i* Q3 [Screenshot indicated Routes x.x.5.0 & x.x.7.0 should appears as N1 routes , and the remainder should be N2 router.
  T8 w+ ^" r7 r0 O' P: o- x! k! i
8 V& F. ]- W; v: `
4 I* g6 g9 X6 E! Y
6 K) W- C! F& k9 \4 V7 }( `2.5 BGP
8 {1 x3 s1 p9 q' N% ~Peer R2 with BB3. Configure AS-Path so it shows as 254 108 104! B' i- u/ x3 v! X" L7 \
Peer R3 with BB1. Configure AS-Path so it shows as 254 109 103
/ y. Q+ [) O5 w8 B# U7 }& H2 p3 c& b' e) z5 v, i  I) s: R
Create full mesh peering between R4,R2,R1,R5,R3,SW2 using minimum commands
1 f9 d0 f/ E5 c$ v. wOnly SW2 needs one iBGP Peering, H( g* V  e/ P: C

0 i; n* H7 B* m$ I9 Z. M
. N6 r! T0 E/ Y# A7 F
+ Q) A, q2 K! B: m# R% H' s" T***Variation--Some reports say that AS 254 253 must be overwritten to 254 108 1072 x/ f6 {4 O3 W- |$ R! I* O* c; O
***Variation--Some reports say that R2/R3 peer with BB1.
3 x) S/ i6 a- N0 F
" [1 J0 c; {6 t$$$ mine was to configure the community such is reflects 254 108 104 $$$  u) S7 V! j' Q3 p$ h# \
$$$ mine was to configure the community such is reflects 254 109 103 $$$& A% g4 u+ l: k
9 n6 Z$ J" t/ M; p2 ]
***WARNING--Traffic Manipulation may be based on BGP Community.
, h/ N( B3 K3 v: g: k. D2 c& k" N# Q
9 ~2 L9 Q+ V* ?3 d5 A2.6 IPV6 ? OSPF
9 k7 y3 e0 l# t% B& aUse the Rack # for the process ID.
& K6 _1 R  b/ p% {7 P* dConfigure the Router ID to match Loopback 0
) W( K0 o! O, S) b# R2 Y* lConfigure Area 0 between on the Ethernet segment shared by all switches.# ?' G3 @; m7 b2 |# G  o) z* R
SW1 should control all routing, and SW2 should be the backup. (Use largest value)
! U$ f$ p+ y0 E" l& _* Q# N+ [6 J- p& }" C- ^+ \/ e0 K
Configure OSPF AREA 142 between SW1-R1-R4-R2-SW4
/ G/ u# C9 l0 A2 c! BConfigure OSPF AREA 51 between SW2-R5-R32 u; U5 w; t% T3 ~
Configure the most secure form of authentication for IPv6% c( S( N) v7 ^  W. ]! O

9 e' D9 u0 s5 A  }! S+ k" |- h' {& D2.7 IPv6 Filtering' Q  e5 S# b7 h- M  Y7 x; w% z4 m
Add a Loopback100 to SW2, give it Global IPv6 Address and redistribute into OSPFv3
8 U0 K. r9 S% b. sConfigure OSPF filtering to allow SW2 Loopback 100 in Area 0 to go into Area 142, but not Area 51.
" B3 T, m! F. y% u  c* q2 c9 A' T1 o; `. r
*** Variation **1 X: Z; t1 @2 v2 ~% j1 L. V
Configure OSPF filtering to allow SW2 Loopback 100 in Area 0 to go into Area 51, but not Area 142.- D  ^: j" S$ E% y
2 s' [8 L% w3 h6 A
+ g6 d( ^+ W$ _: o( d# R
Section 3 Multicast:
2 E( b+ h8 f! z6 N/ M0 l+ I3.1 IPV4 MULTICAST
. t8 q) {& r. a* OEnable PIM-SM R1,R2,R4,SW1 - SW4. Use a non-cisco proprietary based method to send RP" e! ^+ P8 ~- Y4 d
information. Configure R1 and R2 Loopbacks to act as RPs both RPs, with R1 as the preferred RP.9 |  K$ @& \' Z) Q# {

" P3 {: t# @6 q3.2 Configure R4 Lo0 to join 225.1.1.1 (Source) and ping from SW2 SW2 receiver --- i remember slightly different....might be starting to forget this.$ N5 h: V) r: ?' k
** You need to ping from R4 the multicast group 225.1.1.1. The interface towards BB2 will be joining the multicast group 225.1.1.1. Ensure that you resolve any SPF issues if needed.
8 w5 \# `$ [( q& N
/ j6 {3 }4 Q+ vSection 4 Advanced Services:
7 d& D5 l$ s- w" e0 P! Z* v: a  V4.1 OER/PFR
6 x6 C- C5 l: B8 n& m; BYou are required to implement OER on the network. R4 will be the master controller and R1 & R2 will be the Border routers.Use a key of "CISCO". Ensure that the OER sessions is established from the Loopback interfaces.3 M) N9 s1 S" n$ d

! Z; r; h2 ~/ q# X4.2 OER Optimization! {4 f* K* b: ?4 f

" Z7 x; y+ S- zYou need to optimize the OER implementation such that when packets with a DSCP of 41 passes the network, it is routed out to R1 exit interface, and when a DSCP of 31 passes, it is routed out to R2 exit interface.
/ U( G* N- X' a% B( DYou are allowed to create 1 prefix-list for NET yy.yy.100.0/24 should the solution require this. (might be missing a word or 2 further more)
( ^0 |, I5 t! r9 i$ H+ M2 `
  x4 l' w8 d; {# ]0 M4.3 NETFLOW$ ~' k0 A# G# g( v8 d( i+ i
Configure Netflow on R5 for IPV6 netflow (on track - can't remember exact specifics at this stage )6 L4 g) i9 ]  G& t0 F0 w! O
Send to 100.100.100.1003 ?2 p; q) ]' `5 j
aggregate flow cache+ p) A% U8 D$ t/ Q6 m2 y

0 E. |4 d* y* C4 ~) h5 f4.4 QoS - LAN (6 PTR). k) G6 C  v# }2 v) ?
3560 assign COS1 for all untagged traffic.& W! f% A* p$ F
On SW1 fa0/15, assign Queue1 for COS1 and Queue 2 for COS5.
2 E) n7 c. ?" F* t1 oQueue 1 drop threshold were to be set. ( question is right on track - can't remember exact wording as well )4 O4 H" s% I! ^% x7 ~1 x

1 _4 v6 U& u8 [% h4.5 QOS - CBWFQ
- Y4 x0 g! K" b% \% p4 iThe IT administrator requires that you implement QOS for Voice that is soon to come onto the network. (i sorta remember that the voice waas implemented between R5 and R3......(missing some info here)
6 I8 H9 j/ H0 {, w! w* b' U; J+ d) H% Z" r
4.6 WCCP; ]8 {! W* r% z: E. p8 P& H
2 W3 B5 U) }- l: H" x. d' i
The IT department is wanting to implement a web-caching solution. This should be implemented on R2.(can't remember correct device to implement on). Your task is to use service number 61 & 62. There is 3 interfaces taking part in this. Traffic from a certain port is not allowed to have any wccp configuration on it.......(missing some further info)' }7 D- Y2 C* S

0 N* x' C' D4 D( L
  I- J5 d9 U, b+ [  u( J* ~! M3 f& I4.7 NAT
- t' {1 {$ W) K% V* z8 DYou are required to implement NAT. You need to match the output in the screenshots provided.
. O! g6 W1 i1 @7 y- K; E' P3 e5 S) ^6 [. ]; g: z7 V
Screenshot :
5 q* O$ j( A- {1 ~: n/ u& H" W" Iscreenshot 1 indicates NAT is to be implemented on R4, with nat translations showing SW1 is pinging SW4
3 k6 L5 N8 H! |% H8 Oscreenshot 2 indicates SW1 pinging SW4 with a new source not yet created on the SW.Thus create new loopback and ping SW4 with ip yy.yy.200.4
" b2 J  v/ k& C) K8 S9 n$ iScreenshot 3 indicates SW4 pinging SW1 with a new source also as per above, but pinging SW1 with ip yy.yy.100.1
' D' f3 k2 n. t* g, B1 Y# a: Y% n/ ?7 L
Notes: you are allowed to add 1 static route on a maximum of 4 devices., ~0 x9 r, g9 [2 ~$ M0 f  X* W2 ]  v3 Z

; H- P0 f  X2 s: W+ u  E- S* {+ F& X4.8 DHCP (Rough Guess)
, ?) }+ V) i, K9 P! T( ]2 eThe junior network administrator has started implementing a DHCP server on R4.Your task is to complete the DHCP configuration. At some point in the future, a printer will be added with mac address 1234.1234.1234. Ensure that the printer always get the ip yy.yy.100.45
6 U4 B# H/ h5 o+ U; ~) ]# o# n! c: F0 z% E
4.9 DHCP Security, DAI (Rough Guess)  y+ t, r- J: I! O) K* m) u/ ]
The IT department is worried about DHCP security and invalid arp /spoofed packets. You are required to implement a dynamic solution that will counter against any invalid spoofed dhcp requests and arp packets( r+ m7 {4 ~) B6 `+ k1 y
. c# E# w5 K: a
4.9 NTP
0 a* N) A1 S2 Y+ kcan't remember any ntp questions - at this moment
0 R% [1 f% E% Y. ?! K, w
* w* r9 {; N  a: c
- K# t' x6 M; F( }Section 5. Optimize the Network- v& F( z/ f) c& E+ ?; i& G) a

: ^$ M% T% E% O; a" u- g5.1 Implement SNMP5 e6 o4 Y% c7 W- }
Implement SNMP to an NMS system. Use the community string of CiscoWorks4 R4 n9 \8 D- I: m) N
The NMS system is located at yy.yy.44.100, and requires the bgp trap to
5 g" `! `% ~0 g; B) Q) Lbe sent.! s2 [7 g9 B% _: n1 F3 n' I
) H4 F3 n! ?' w3 B4 m: j, y3 H( `
5.2 Configure an EEM applet name ?conf_change? (without the quotes)9 I4 I' c, T  L2 n* t* z+ U& Y2 q
The EEM applet needs to write the date and time to a file saved in flash.9 Y; E# q8 S3 H$ C8 |' J3 k1 n
The EEM applet needs to activate every time someone makes changes to the' J& S4 [, }/ G- i) C, a
running config. Also, a syslog message has to be generated with the string 1 |/ j4 z& e4 M" J
  ]1 f! ?# y1 ^  F# v
不知道是真是假,不能确定。最好找有培训的人对比一下。
15# 2011-10-13 13:40:39 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-2-2 14:21 , Processed in 0.071896 second(s), 14 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表