Sie sind auf Seite 1von 15

UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA

ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Unidad 1: Tarea 1 – Conocer las Diferentes Tecnologías


WAN

Oscar Arturo Gomez Gualteros


Código: 80140235
Grupo: 2150521_6
Presentado a: Ing. Efraín Alejandro Pérez
Universidad Nacional Abierta y a Distancia – UNAD

CEADJAG
Gestión de Redes de Acceso de Telecomunicaciones
Acceso a la WAN (MOD4 - CISCO) 2150521_6
Bogotá, Octubre de 2018
1
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

3.6.1.2 Packet Tracer - Skills Integration Challenge

Packet Tracer – Skills Integration Challenge (Instructor Version)


Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.

Topology

2
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

S0/0/0 209.165.201.1 255.255.255.252 N/A


ISP-1
S0/1/0 209.165.201.9 255.255.255.252 N/A
S0/0/0 209.165.201.17 255.255.255.252 N/A
ISP-2
S0/1/1 209.165.201.13 255.255.255.252 N/A
S0/0/0 209.165.201.21 255.255.255.252 N/A
ISP-3 S0/1/0 209.165.201.10 255.255.255.252 N/A
S0/1/1 209.165.201.14 255.255.255.252 N/A
S0/0/0 209.165.201.2 255.255.255.252 N/A
REMOTE G0/0 192.168.20.1 255.255.255.0 N/A
Tunnel 10 10.1.1.1 255.255.255.252 N/A
S0/0/0 209.165.201.18 255.255.255.252 N/A
HQ G0/0 192.168.30.1 255.255.255.0 N/A
Tunnel 10 10.1.1.2 255.255.255.252 N/A
S0/0/0 209.165.201.22 255.255.255.252 N/A
BRANCH
G0/0 192.168.10.1 255.255.255.0 N/A
PC1 NIC DHCP 192.168.10.1
PC2 NIC 192.168.20.10 255.255.255.0 192.168.20.1
PC3 NIC DHCP 192.168.30.1
DNS Server NIC 192.168.30.250 255.255.255.0 192.168.30.1

Background / Scenario
In this skills integration challenge, the XYZ Corporation uses a combination of
eBGP, PPP, and GRE WAN connections. Other technologies include DHCP, default
routing, OSPF for IPv4, and SSH configurations.

Requirements
Note: The user EXEC password is cisco and the privileged EXEC
password is class. Interface Addressing

 Configure interface addressing as needed on appropriate devices.


o Use the topology table to implement addressing on routers REMOTE, HQ, and BRANCH.
o Configure PC1 and PC3 to use DHCP.

SSH
 Configure HQ to use SSH for remote access.

3
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

o Set the modulus to 2048. The domain name is CISCO.com.


o The username is admin and the password is secureaccess.
o Only SSH should be allowed on the VTY lines.
o Modify the SSH defaults: version 2; 60-second timeout; two retries.

PPP
 Configure the WAN link from BRANCH to the ISP-3 router using PPP
encapsulation and CHAP authentication.
o Create a user ISP-3 with the password of cisco.
 Configure the WAN link from HQ to the ISP-2 router using PPP encapsulation and CHAP
authentication.
o Create a user ISP-2 with the
password of cisco. DHCP
 On BRANCH, configure a DHCP pool for the BRANCH LAN using the following requirements:
o Exclude the first 5 IP addresses in the range.
o The case-sensitive pool name is LAN.
o Include the DNS server attached to the HQ LAN as part of the DHCP configuration.
 Configure PC1 to use DHCP.
 On HQ, configure a DHCP pool for the HQ LAN using the following requirements:
o Exclude the first 10 IP addresses in the range.
o The case-sensitive pool name is LAN.
o Include the DNS server attached to the HQ LAN as part of the DHCP configuration.
 Configure PC3 to use DHCP.

Default Routing
 Configure REMOTE with a default route to the ISP-1 router. Use the Next-Hop IP as an
argument.

eBGP Routing
 Configure BRANCH with eBGP routing.
o Configure BRANCH to peer with ISP-3.
o Add BRANCH’s internal network to BGP
 Configure HQ with eBGP routing.
o Configure HQ to peer with ISP-2.
o Add HQ’s internal network to BGP.

GRE Tunneling
 Configure REMOTE with a tunnel interface to send IP traffic over GRE to HQ.
o Configure Tunnel 10 with appropriate addressing information.
o Configure the tunnel source with the local exit interface.
o Configure the tunnel destination with the appropriate endpoint IP address.
 Configure HQ with a tunnel interface to send IP traffic over GRE to REMOTE.

4
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

o Configure Tunnel 10 with appropriate addressing information.


o Configure the tunnel source with the local exit interface.
Configure the tunnel destination with the appropriate endpoint IP address.

OSPF Routing
 Because the REMOTE LAN should have connectivity to the HQ LAN, configure OSPF
across the GRE tunnel.
o Configure OSPF process 100 on the REMOTE router.
o REMOTE should advertise the LAN network via OSPF.
o REMOTE should be configured to form an adjacency with HQ over the GRE tunnel.
o Disable OSPF updates on appropriate interfaces.
 Because the HQ LAN should have connectivity to the REMOTE LAN, configure OSPF
across the GRE tunnel.
o Configure OSPF process 100 on the HQ router.
o HQ should advertise the LAN network via OSPF.
o HQ should be configured to form an adjacency with REMOTE over the GRE tunnel.
o Disable OSPF updates on appropriate interfaces.

Connectivity
 Verify full connectivity from PC2 to the DNS Server.
 Verify full connectivity from PC1 to the DNS Server.

Script

Branch

Enable
Config t
username ISP-3
password cisco
interface g0/0
ip add 192.168.10.1 255.255.255.0
nos
hut
dow
n
int
erf
ace
s0/
0/0
ip add 209.165.201.22 255.255.255.252
encapsulation ppp
ppp authentication chap
no shutdown

5
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

ip dhcp excluded-address 192.168.10.1


192.168.10.5 ip dhcp pool LAN
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server
192.168.30.25
0 router bgp
65010
neighbor 209.165.201.21 remote-as 65535
network 192.168.10.0 mas
255.255.255.0 end

6
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

HQ

Enable
Config t
interface Tunnel10

ip address 10.1.1.2 255.255.255.252


tunnel mode gre ip
tunnel destination 209.165.201.2
tunnel source s0/0/0
no shutdown
interface GigabitEthernet0/0
ip address 192.168.30.1 255.255.255.0
no
shutdown
interfac
e
Serial0/
0/0
ip address 209.165.201.18 255.255.255.252
encapsulation ppp
ppp
authenticat
ion chap no
shutdown
ip domain-name CISCO.com
username admin password
secureaccess username
ISP-2 password cisco
crypto key generate rsa
2048
ip ssh version 2
ip ssh
authentication-
retries 2 ip ssh
time-out 60
line vty 0 4
transport input ssh
ip dhcp excluded-address 192.168.30.1
192.168.30.10 ip dhcp pool LAN
network 192.168.30.0 255.255.255.0
default-router 192.168.30.1
dns-server
192.168.30.25
0 router bgp
65020
neighbor 209.165.201.17 remote-as 65535

7
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

network 192.168.30.0 mask


255.255.255.0 router ospf
100
network 192.168.30.0 0.0.0.255 area 0
network 10.1.1.0 0.0.0.3 area 0
passive-
interface
g0/0 end

8
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Remote

Enable
Config t
interface s0/0/0
ip add 209.165.201.2 255.255.255.0
no
shutdo
wn
interf
ace
tunnel
10
ip address 10.1.1.1 255.255.255.252
tunnel mode gre ip
tunnel destination 209.165.201.18
tunnel source s0/0/0
no shutdown
interface g0/0
ip address 192.168.20.1 255.255.255.0
no shutdown
ip route 0.0.0.0 0.0.0.0 209.165.201.1
router ospf 100
network 192.168.20.0 0.0.0.255 area 0
network 10.1.1.0 0.0.0.3 area 0
passive-
interface
g0/0
end

9
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

10
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Activity Results

11
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

12
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

13
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Conclusiones

1. Se comprende claramente los conceptos de las tecnologías de acceso WAN


realizando configuraciones DHCP, PPP, Conexiones de sucursales de servicios
en VPN implementando el túnel GRE y el análisis en la calidad del servicio (QoS).

2. A través de las simulaciones logramos entender cómo podemos estructurar y


modelar sistemas y responder a ciertas interrogantes del comportamiento de un
sistema real.

3. Las simulaciones desarrolladas en esta actividad nos permitieron implementar y


evidenciar procedimientos llevados gracias a los conocimientos previos y a la
investigación realizada.

4. El uso de estas herramientas nos permiten como futuros profesionales y


diseñadores de red tener una percepción más acertada a cerca de las topologías ,
tecnologías, equipos y configuraciones que se adapten mejor a la aplicación de un
diseño determinado.

14
UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA
ACCESO A LA WAN (MOD4 - CISCO) CÓDIGO 2150521_6

Referencias

CISCO SYSTEM. (2018). Capítulo 1. Conceptos de la WAN https://static-course-


assets.s3.amazonaws.com/ConnectNet6/es/index.html#1.0.1.1

CISCO SYSTEM. (2018). Capítulo 2. Conexión punto a punto. Recuperado


de https://static-course-
assets.s3.amazonaws.com/ConnectNet6/es/index.html#2.0.1.1

CISCO SYSTEM. (2018). Capítulo 3. Conexiones de sucursal. Recuperado


de https://static-course-
assets.s3.amazonaws.com/ConnectNet6/es/index.html#3.0.1.1

Hallberg, B. (2003). Conexiones entre WAN. Fundamentos de redes (pp. 79 –90).


McGraw-Hill Interamericana. Recuperado
de http://bibliotecavirtual.unad.edu.co:2077/lib/unadsp/reader.action?ppg=104&docID
=10433903&tm=1498778916673

UNAD (2014). Configuración de Switches y Routers [OVA]. Recuperado


de: https://1drv.ms/u/s!AmIJYei-NT1IhgL9QChD1m9EuGqC

15

Das könnte Ihnen auch gefallen