Chapter 11. Small-Office Internet Connection

<feature><title>Terms You’ll Need to Understand:</title> <objective>

Security Device Manager (SDM)

</objective>
<objective>

DHCP

</objective>
<objective>

NAT

</objective>
<objective>

VLAN1

</objective>
<objective>

Access port

</objective>
<objective>

Default gateway

</objective>
<objective>

Default route

</objective>
</feature>
<feature><title>Concepts and Techniques You’ll Need to Master:</title> <objective>

Using the Cisco SDM Express interface for initial router configuration

</objective>
<objective>

IP Subnetting

</objective>
<objective>

Using the Cisco SDM interface to configure NAT

</objective>
<objective>

Using the Cisco SDM interface to configure DHCP

</objective>
<objective>

Using the SDM interface to configure a default route

</objective>
<objective>

Testing and troubleshooting LAN and WAN connectivity

</objective>
</feature>

Introduction

This chapter walks you through one of the tasks expected of a CCENT: Connecting a small office to the Internet. In our example, we will be using a Cisco 2821 router and a Catalyst 2960 switch, and our Internet connection will be an ADSL modem with an Ethernet interface we can connect the router to.

We will learn a few new things, but most of what you will see here are applied concepts that previous chapters have covered.

To set the stage for this exercise, assume that your head office has shipped a brand new router and switch to you. You have access to some guidance from your boss at the head office, a PC to work with, and all the cables and software you need. (I could make a joke here about this scenario not being very realistic, but that would be gratuitous.)

All right—let’s get started.

Basic Configuration Using the Cisco Router and Security Device Manager (SDM)

You have unpacked the router and switch and set them on your desk, ready to be plugged in.

New Cisco gear has a graphical user interface (GUI) that simplifies some of the more basic configuration tasks and provides useful dashboard views of the current status of the device. The software runs on the built-in web server on new devices and requires Internet Explorer and Java. You will also need to turn off pop-up blockers.

Your boss has sent you some useful information: This new router comes with a factory configuration that allows you to use the SDM right out of the box—it’s perfect for our scenario. When you use SDM for the first time on a router with factory-default settings, it starts with SDM Express, which is a quick-start GUI. We’ll use SDM Express to get to the full SDM. The email from your boss says to do the following to use the factory-configured SDM Express interface:

  1. Connect a crossover cable from interface Gigabit 0/0 to your PC’s network interface card (NIC).

  2. Statically set your PC’s IP address to 10.10.10.2 and the mask to 255.255.255.248.

  3. Point your web browser to http://10.10.10.1.

Figure 11.1 shows the results of this three-step operation.

SDM Express Login screen.

Figure 11.1. SDM Express Login screen.

Your instructions say to use the username of cisco and the password cisco. Those are the defaults included from the factory to allow you to use the SDM interface. When you enter those, you are taken to the next screen, as shown in Figure 11.2.

Choosing HTTP or HTTPS.

Figure 11.2. Choosing HTTP or HTTPS.

Choose HTTP for now. If the next screen warns about the website’s security certificate, click Continue to This Website. The next window (see Figure 11.3) is another login prompt; enter cisco and cisco again. Don’t worry, we’ll be changing these pretty soon!

Logging in to SDM Express.

Figure 11.3. Logging in to SDM Express.

Note

You really will need to disable any pop-up blockers, or the Java interface will not work. Along the same lines, whenever you get a security warning from the SDM router, it’s safe to allow access when your brand-new router is sitting on your desk, connected by a crossover cable. You may want to be more cautious when connecting to a router that is remote or that may have been compromised. For our purposes here, this kind of security is not a concern—yet.

You will probably get a couple security messages; it’s OK to allow access and run applications as long as you are in this lab context. Figure 11.4 shows yet another login screen. Use the same password again. Notice that this one is giving you level_15 access; that’s the same as Privileged EXEC.

Privileged EXEC level access to SDM Express.

Figure 11.4. Privileged EXEC level access to SDM Express.

Tip

You might find it confusing or even irritating that SDM prompts you for passwords so often. Unfortunately, it’s a function of the Java interface. There is a way around it, though: If you have a CCO login account, you can download and install a local copy of the Cisco ASDM Launcher, which replaces the Java interface and stops the duplicate login screens. It’s not strictly necessary, but it is useful.

After you press Enter, the SDM Express interface loads the router config, checks a couple things, and then presents you with the screen shown in Figure 11.5.

The SDM Express Wizard welcome screen.

Figure 11.5. The SDM Express Wizard welcome screen.

SDM Express is the name for a stripped-down SDM interface that asks you to configure the bare essentials to get your router working, addressed, using DHCP, and connected to the Internet —which is exactly what we want to do here. It also allows you to set up a router firewall, if your IOS version has the capability. That’s a little beyond what we want to do here, but I will say that in the real world you should never connect a router directly to the Internet unless it has a properly configured firewall protecting it!

Setting Hostname, Domain, and Login Credentials

The first screen as shown in Figure 11.6 asks for the basics of the router hostname, the domain name, and new usernames and passwords. The hostname we’ll use is Branch_2821, the domain name will be ExamCram2.net, and we’ll use the username of admin and the password ciscocisco. (The SDM Express security requirements mandate a minimum six-character password.) We’ll use the same password for the enable secret as well, just to save confusion.

Supplying hostname, domain name, and user credentials.

Figure 11.6. Supplying hostname, domain name, and user credentials.

Clicking Next brings us to a screen that asks how we want to configure this router (see Figure 11.7). We’ll choose SDM Express and do it ourselves; the other choices are well beyond our scope but refer to methods of automated configuration in highly managed networks.

Choosing SDM Express as the configuration method.

Figure 11.7. Choosing SDM Express as the configuration method.

Configuring IP Addressing Using SDM Express

The next step is interesting. In it, we are going to change the IP address of the interface that we are actually connected to. That, of course, will break our connection, because we have to also change the address of the PC to match. It’s a bit of a cliffhanger—“Did I do it right?” Don’t panic. We always have the console cable.

Your boss has told you that this branch office LAN will use the last subnet created from 192.168.100.0/28. Because this is a new router, the zero subnets are available. The first IP address in this subnet will be assigned to the router.

Note

This router, a Cisco 2821, has two Gigabit Ethernet interfaces. Gi0/0 is factory configured with the IP address and mask that SDM uses. This will become our LAN interface. Gi0/1 will become our WAN (Internet) interface, but we will have the ADSL modem assign it a dynamic IP address using DHCP.

You didn’t think you were going to get away without subnetting, did you? Try and figure this out without cheating by reading ahead.

OK, for all you cheaters, here’s the solution:

192.168.100.0/28 uses an increment of 16 in the fourth octet. That means we will make 16 subnets from this Class C address, each of which has 14 host IPs available. (We get to keep all 16 subnets because the zero subnets are available.)

The first subnet is 192.168.100.0/28; the last one is 192.168.100.240/28. We can’t use the first and last IPs (.240 and .255) because they are reserved for the NetID and Broadcast ID. So, the first host ID, which we will give to our router, is 192.168.100.241/28. Notice that in the SDM interface shown in Figure 11.8, you can either type in the mask in decimal or just select the number of mask bits with the arrows.

IP address and mask setting for interface Gi0/0.

Figure 11.8. IP address and mask setting for interface Gi0/0.

Configuring the DHCP Server Using SDM Express

The next screen deals with setting up this router to be a DHCP server. Remember that DHCP assigns IP addresses, subnet masks, default gateway, and several other options (for example, DNS server IPs) to hosts on the LAN. This is often a role assigned to a server on the LAN, but because our little branch office doesn’t have a server, we’ll take advantage of Cisco’s built-in DHCP service.

To configure the DHCP server, first click the check box that says Enable DHCP Server on the LAN Interface. (In the previous screen, we set Gi0/0 as the LAN interface by not choosing the LAN IP to be on some other interface.) We now have to specify what addresses the DHCP server should hand out by giving it a starting and ending range.

We need to remember that we must stay within the boundaries of our LAN subnet—but notice that SDM has already figured that out for us. By giving an IP address and mask to the LAN interface, SDM calculated our subnet IPs and starts with that whole range as its default. No cheating required!

Often with DHCP we want to exclude certain addresses—such as the router itself, and maybe servers or printers that are already statically configured. In our case, we don’t have a server to worry about, but our switch will need an IP for management; we will give it 192.168.100.242/28. After taking the router’s Gi0/0 and the switch into account, that means we must start the range of DHCP addresses (called a scope) at 192.168.100.243; we can let it run all the way to the end of the subnet, to the last available IP of 192.168.100.254.

The ISP will advise us of the correct DNS server IP addresses. For the time being, we’ll use 4.2.2.2 in the first entry. Figure 11.9 shows the result.

Configuring the DHCP server.

Figure 11.9. Configuring the DHCP server.

Setting Up the Wan Interface in SDM Express

The next screen, shown in Figure 11.10, asks us to choose our WAN interface. You’ll notice that this router has discovered and listed two interfaces: GigabitEthernet0/1 and Serial0/0/0. The serial interface will be used at a later date for the planned VoIP implementation; the boss has asked us to leave it unconfigured for now. We have selected GigabitEthernet0/1 as our WAN interface; highlight it and click Add Connection.

Choosing the WAN interface.

Figure 11.10. Choosing the WAN interface.

The window that comes up asks us to choose how our WAN interface will get its IP address; our choices are either Static IP Address or Dynamic IP Address. Static IP Address means we have to know what the IP and mask should be and set them manually (the ISP tells us this info). Dynamic IP Address means that we want the interface to get its IP automatically from the ADSL modem. We’ll choose Dynamic IP Address here; in the real world we might well choose Static IP Address if we wanted to access this router remotely or if there were servers in the office that we wanted to reach from the Internet. Usually we would need to specify in the ISP contract that we wanted one or more static IPs, and it might cost a little extra. Figure 11.11 shows the dialog box in action.

Choosing the WAN interface addressing method.

Figure 11.11. Choosing the WAN interface addressing method.

Configuring NAT Using SDM Express

Network Address Translation (NAT) is a vital function for Internet-connected routers. The SDM Express NAT interface allows you to configure static NAT entries, but not NAT Overload (PAT). Because our exercise needs PAT and not a static setup, we’ll leave NAT disabled in the SDM for now. You can go back later and either use the command-line interface (CLI) or the full SDM interface (that is, not SDM Express) to configure it. Figure 11.12 shows the NAT screen with the Enable NAT box deselected.

Disabling static NAT in SDM Express.

Figure 11.12. Disabling static NAT in SDM Express.

Firewall Option

SDM Express gives you the option to configure a firewall on the router (see Figure 11.13). SDM Express automatically creates a basic firewall that assumes one inside and one outside interface. Customizations can be made either from the full SDM version or preferably from the CLI.

Enabling automatic firewall configuration in SDM Express.

Figure 11.13. Enabling automatic firewall configuration in SDM Express.

Firewall configuration is well beyond our scope, but we do want to emphasize the importance of a firewall associated with an Internet-connected router. If your IOS feature set does not support firewall functions, you will not be able to configure one on your router at all, and you should instead have an external firewall such as a Cisco Adaptive Security Appliance (ASA) or a device from another reputable vendor. We’ll point out the configurations that SDM Express added without delving into their meaning.

For now, we’ll let SDM Express do its thing by selecting Yes, I Want to Protect My Network with a Firewall, as shown in Figure 11.13.

Security Configuration Checklist

SDM Express can automatically prepare configurations for you that follow some of the best practices recommendations for securing a router. Many of the terms seen in Figure 11.14 will be familiar from Chapter 9, “Basic Network Security,” but some will be unfamiliar. We will leave the settings at their defaults (shown), but be aware that these settings will restrict how you can access the router (for example, requiring the use of SSH and strong passwords).

Enabling automatic security configuration in SDM Express.

Figure 11.14. Enabling automatic security configuration in SDM Express.

SDM Express Configuration Summary

The screen in Figure 11.15 summarizes what we have told SDM Express to do. Here you can review your decisions, and you can click Back if you want to change anything.

Cisco SDM Express Summary.

Figure 11.15. Cisco SDM Express Summary.

Reconnecting After SDM Express Applies Changes

One of the scarier moments is when SDM reboots the router with its new config and you can’t connect to it anymore. You need to reconfigure your PC’s NIC to connect using the new settings; the screen shown in Figure 11.16 is popped up when you click Finished in the previous screen. It’s probably a good idea to save those instructions to a file by leaving the check box selected.

SDM Express Configuration Summary—Reconnection Instructions.

Figure 11.16. SDM Express Configuration Summary—Reconnection Instructions.

Because of the combination of settings we have chosen in SDM Express, the message shown in Figure 11.17 pops up. We will need to allow DHCP traffic, or else the Internet interface will not be able to get an IP address—the firewall basically prevents itself from doing so!

Firewall configuration query for DHCP.

Figure 11.17. Firewall configuration query for DHCP.

Figure 11.18 shows our “last warning” before the SDM configuration is applied and we lose connectivity. Clicking OK closes the SDM and Internet Explorer windows, and as the IP address of the web interfaces changes, connectivity to the router is (temporarily) lost.

Configuration commit and disconnect warning.

Figure 11.18. Configuration commit and disconnect warning.

Reconnecting to the SDM Interface

When you have reconfigured your PC’s NIC as instructed by SDM, go to the address https://192.168.100.241 (this is the address in our exercise—obviously it could be different in your lab or reality!) We have specified the use of HTTPs, which is supported as a security option by SDM (as shown in Figure 11.16), but we could use HTTP instead.

Figure 11.19 shows the SDM home page after you have logged in (using the new username and password we specified) and accepted the same security warnings we saw before. Remember to disable pop-up blockers, or at least allow pop-ups from the new address of the router.

Home page of the full SDM interface.

Figure 11.19. Home page of the full SDM interface.

We still need to set up Overload NAT and a default route; we can use the SDM interface to do this (SDM Express does not have this advanced capability). In Figure 11.20, we have clicked first on the Configure button at the top of the page; then when the page changed, we clicked NAT in the column on the left. We will configure Basic NAT because we do not need to specify servers and applications that must be reachable. Clicking the Launch the Selected Task button starts the Basic NAT Wizard.

Configure Basic NAT in full SDM interface.

Figure 11.20. Configure Basic NAT in full SDM interface.

The Basic NAT Wizard (see Figure 11.21) walks you through the configuration of Overload NAT on the router.

SDM Basic NAT Wizard start screen.

Figure 11.21. SDM Basic NAT Wizard start screen.

In Figure 11.22 we have selected the GigabitEthernet0/1 interface as our Internet interface (because it is) and selected the network that will be NATed to that interface.

Setting up Overload NAT in SDM.

Figure 11.22. Setting up Overload NAT in SDM.

Figure 11.23 shows us the Finish screen of the Basic NAT Wizard and the settings we have selected.

Basic NAT Wizard finish screen.

Figure 11.23. Basic NAT Wizard finish screen.

Figure 11.24 shows the updated SDM NAT page after our changes.

Updated SDM NAT page.

Figure 11.24. Updated SDM NAT page.

Configuring a Default Route in SDM

Our connection is almost ready. One thing left to do is to define a default route out to the Internet. Using the SDM interface, click Routing in the column on the left. The page shown in Figure 11.25 is displayed. There are no routes listed.

The SDM Routing page.

Figure 11.25. The SDM Routing page.

Clicking Add near the top pops up the route configuration dialog box. In Figure 11.26, we have chosen to create a default route by specifying the network 0.0.0.0, the mask 0.0.0.0, and selecting the Make This as the Default Route check box. We also specified GigabitEthernet0/1 as the next-hop interface because this is our Internet interface. If we were using a static IP from our ISP, we would specify the IP instead. I chose to check the Permanent Route box so that the route would stay in the route table even if the next hop is unavailable.

Enabling the default route in SDM.

Figure 11.26. Enabling the default route in SDM.

Figure 11.27 shows the Routing page after our update. The default route is shown.

The SDM Routing page with default route shown.

Figure 11.27. The SDM Routing page with default route shown.

Testing Connectivity Using the SDM Interface

The SDM interface includes some very useful tools to check your connectivity. From the SDM home page, click the Monitor button near the top. Then click Interface Status on the left.

Near the top of the main pane in the screen is a list of interfaces. Click the Internet interface (in our case, GigabitEthernet0/1) to highlight it. Then, click the Test Connection button at the top right. Figure 11.28 shows the page that comes up when you do so.

The SDM Connectivity and Troubleshooting page.

Figure 11.28. The SDM Connectivity and Troubleshooting page.

You have the option of letting SDM choose a host to ping, or you can specify one. Clicking Start at the bottom of the page starts a series of tests, and lists what the outcome was, as shown in Figure 11.29.

Output from a successful test.

Figure 11.29. Output from a successful test.

You can click the Details button to see the specifics of what was tested.

Let’s take a quick look at the DHCP configuration page in SDM to see the result of what we did in SDM Express. From the SDM home page, click Additional Tasks in the left (Tasks) pane. In the middle pane, click the plus sign to expand DHCP. Next, click DHCP Pools in the expanded list. Figure 11.30 shows the resulting view.

The DHCP Pools configuration page.

Figure 11.30. The DHCP Pools configuration page.

We can see that the pool named sdm-pool1 is associated with Interface GigabitEthernet0/0, and the details of the pool correspond to what we entered into SDM Express earlier.

That is pretty much all we need to do with the router. Now let’s turn our attention to the switch.

Basic Switch Configuration Using the CLI

Our switch is a new Catalyst 2960, with 24 10/100 Ethernet ports and two 10/100/1000 Ethernet ports. We will configure our switch from the CLI. We need to give the switch a management IP address and a default gateway; we also want to apply passwords and restrict remote access to Secure Shell (SSH). We will leave all interfaces in VLAN1 for now; more advanced configurations will be made later.

Plug in your console cable and make sure your terminal application is configured properly as follows:

  • 9600 baud

  • 8 data bits

  • 1 stop bit

  • No parity

  • Flow control = Off

Because this is a new switch, we will be prompted to enter the Initial Configuration dialog; we can bypass this and go straight to the command line. By default, there is no password to enable the switch.

Securing the Switch

We are going to configure some basic security on the switch. Our first tasks are the following:

  1. Set the hostname to Branch_2960:

    Switch>enable
    Switch#config t
    Switch(config)#hostname Branch_2960
    Branch_2960(config)#
    
  2. Configure a console password of ciscocisco:

    Branch_2960(config)#line con 0
    Branch_2960(config-line)#password ciscocisco
    Branch_2960(config-line)#login
    Branch_2960(config-line)#
  3. Configure a VTY line password of ciscocisco on the first five VTY lines.

  4. Restrict access to the VTY lines to SSH only.

    To complete tasks 3 and 4, we need to go back to the Global Config prompt. SSH requires a hostname (we already set one), a domain name, and the generation of an RSA keypair. We will also create a username and password for local authentication. Then we will go back to the VTY lines and require a password to log in, configure the switch to use the username and password we gave it, and further restrict the VTY lines to SSH only.

    Branch_2960(config-line)#exit
    Branch_2960(config)#ip domain-name ExamCram2.net
    Branch_2960(config)#crypto key generate rsa
    Branch_2960(config)#username admin password ciscocisco
    Branch_2960(config)#line vty 0 4
    Branch_2960(config-line)#login
    Branch_2960(config-line)#login local
    Branch_2960(config-line)#transport input ssh
    Branch_2960(config-line)#exit
    Branch_2960(config)#
  5. Set an encrypted Privileged EXEC password of ciscosecret:

    Branch_2960(config)#enable secret ciscosecret
  6. Encrypt console and VTY line passwords:

    Branch_2960(config)#service password-encryption

Configuring a Management IP and Default Gateway

Setting the management IP on a switch involves configuring a VLAN interface. A Layer 2 switch such as the 2960 will support one VLAN interface at a time; the default is to use interface VLAN1.

Note

Many students seem to have trouble grasping the difference between a VLAN and VLAN interface. A VLAN divides a switch, at Layer 2, into separate broadcast domains. Switch ports are assigned to VLANs. A VLAN interface is a virtual (software) interface that will accept an IP address and mask, and it is the only place on a Layer 2 switch you can assign an IP. VLAN1 is the default ethernet VLAN; interface VLAN1 is the default VLAN interface and is usually the one used for managing the switch remotely.

To set the management IP on interface VLAN1, the commands are

Branch_2960(config)#interface vlan1
Branch_2960(config-if)#ip address192.168.100.242 255.255.255.240
Branch_2960(config-if)#no shut
Branch_2960(config-if)#exit
Branch_2960(config)#

Setting the switch’s default gateway allows the switch to send packets destined for any subnet that is not on its VLAN1 subnet to our router, which can then route the packet wherever it needs to go. A single command will do this:

Branch_2960(config)#ip default-gateway 192.168.100.241

That completes the switch configuration, At this point, to test whether it is all working, you can perform the classic troubleshooting methodology:

  1. Plug in a PC to the switch; make sure the PC is set to use DHCP.

  2. Check that link lights are lit on the switchport and PC NIC.

    If this step fails, check your cables and connections.

  3. Check that PC obtains an IP address and mask in the expected subnet from DHCP.

    If this step fails, try the command ipconfig /renew from the command prompt on the PC. If it still will not get an IP address, make sure that the connection to the router is working and verify that the DHCP server on the router is active. You may also want to try disabling and reenabling the PC NIC.

  4. On the PC, ping its own IP address.

    If this step fails, there is a problem with the PC’s NIC. Try replacing it, or try a different PC.

  5. On the PC, ping the router’s IP address.

    If this step fails, check that the router’s interface is up/up and that the IP address is correct.

  6. On the PC, ping an Internet IP address.

    If this step fails, check the default route. Ensure that the Internet interface is up/up and that the Internet connection is working properly.

That is all we really need to do to set up and test a small office Internet connection. There are, of course, many more advanced configurations that might be required, depending on the circumstances.

Exam Prep Questions

1.

Which element does not need to be configured to support SSH connections to a router or switch?

Exam Prep Questions
  1. At the VTY lines, enter transport input ssh

Exam Prep Questions
  1. A username and password for local authentication

Exam Prep Questions
  1. A domain name

Exam Prep Questions
  1. A hostname

Exam Prep Questions
  1. An RSA key

2.

On your new Catalyst 2960 switch, what configuration is required to put all switch ports into VLAN 1?

Exam Prep Questions
  1. Switch(config)#switchport VLAN 1 default

Exam Prep Questions
  1. Switch(config-if)#switchport VLAN 1 default

Exam Prep Questions
  1. Switch(config)#switchport access vlan 1

Exam Prep Questions
  1. No configuration is required.

3.

Why would a Catalyst 2960 switch need an IP address?

Exam Prep Questions
  1. To represent connected networks to the internal route table

Exam Prep Questions
  1. To protect switch ports with SSH

Exam Prep Questions
  1. To allow remote management of the switch

Exam Prep Questions
  1. To activate inter-VLAN routing

4.

You have configured your branch office switch with an IP address and verified that it can ping the router it is connected to. Later that day, you are back at head office and cannot ping, Telnet, or SSH to the switch back at the branch, although you can ping the servers at the branch that are connected to the switch. What could be the problem?

Exam Prep Questions
  1. The firewall ports for the switch must be opened.

Exam Prep Questions
  1. The WAN link to the branch is down.

Exam Prep Questions
  1. The command ip default-gateway must be configured on the branch switch.

Exam Prep Questions
  1. The router must be reloaded.

5.

What is likely the problem if you get no reply to a ping to 127.0.0.1 on your PC?

Exam Prep Questions
  1. Your router is not connected to the Internet.

Exam Prep Questions
  1. That address is reserved as unpingable.

Exam Prep Questions
  1. The switch is down.

Exam Prep Questions
  1. Your PC has a problem with its TCP/IP protocol software.

6.

Examine the figure that follows. Users are complaining that they cannot access resources on the LAN, nor can they access the Internet. What could be the problem?

Exam Prep Questions

7.

Examine the figure that follows. Users are not able to access the Internet, but are able to ping the default gateway and use LAN resources. What could be the problem?

Exam Prep Questions

Answers to Exam Prep Questions

1.

Answer A is correct. You can add this command to allow only SSH (instead of Telnet and SSH), but it is not needed to make SSH work. Answers B, C, D, and E are required.

2.

Answer D is correct. All switchports on a new switch are in VLAN 1 by default. Answers A and B are invalid syntax; answer C is correct syntax but at the wrong configuration prompt (this command is entered at the config-if prompt); also, answer C misses the key point that all switch interfaces are in VLAN 1 by default.

3.

Answer C is correct; the IP address is what we use to Telnet/SSH to or from the switch. The IP is also needed for SNMP. Answer A is wrong because the 2960 is not capable of routing and therefore has no route table. Answer B is wrong because switch ports are not protected by SSH; remote management traffic to the VTY lines is encrypted by SSH. Answer D is wrong because the 2960 is not capable of inter-VLAN routing; we need an external router to do this.

4.

Answer C is correct; without the ip default-gateway command, the switch does not know where to send traffic from a different network. Answer A is wrong; if you can ping hosts on the branch LAN, the firewall is probably not the problem. Answer B is wrong; if you can ping hosts in the branch over the WAN, the WAN cannot be down. Answer D is wrong; the router is apparently working just fine.

5.

Answer D is correct; if you get no answer from the loopback (localhost) IP, the problem is almost certainly with the TCP/IP software. Answer A is wrong because this is not an Internet IP, so whether the Internet router is working correctly is irrelevant. Answer B is wrong; there is no such classification as “reserved as unpingable” although it sounds official. Answer C is wrong; this test does not involve the switch at all.

6.

Answer D is correct. The figure shows the SDM DHCP Pools configuration page, with no pools configured. This means that no DHCP addresses will be assigned to hosts, preventing them from accessing resources on the LAN or Internet. Answer A may well be correct, but it is not related to the issue at hand. Answer B could cause the same behavior for some clients, but the figure does not support the answer. Answer C is wrong; we are looking at the SDM interface, and in any case, this would not cause the user issues stated.

7.

Answer B is correct; the SDM is showing the Gi0/1 is Administratively Down. Enabling it will almost certainly solve the reported problem. Answer A is wrong. There are several unconfigured interfaces listed, but that does not affect the functionality of the others; we’re just not using them. Answer C is wrong. If the clients can ping the router, the LAN interface is working; in addition, SDM lists it as Up. Answer D is wrong; the figure gives no indication that this unlikely possibility is at fault.

 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.186.202