Homework Assignment 2 Solution 1. Using the mac address B8:CA:3A:BF:3B:32 construct the link-local address with the MAC-to-EUI64 conversion process. Afterwards construct the IPv6 header (just the next header, source, and destination addresses) and the ICMPv6 Neighbor Solicitation (NS) header message format (type, code, target address). Then construct the IPv6 header and Neighbor Advertisement (NA) message header (type,code, flags, and target address) as if the tentative address is duplicated on another node.
Convert B8:CA:3A:BF:3B:32 to binary 10111000 11001010 00111010 10111111 00111011 00110010 Split the address and insert 0xFFFE 10111000 11001010 00111010 11111111 11111110 10111111 00111011 00110010 Flip the U/L bit (7 th bit first byte) 10111010 11001010 00111010 11111111 11111110 10111111 00111011 00110010 EUI64 Interface ID BACA:3AFF:FEBF:3B32 Adding the link-local prefix 0xFE80::/10 FE80:: BACA:3AFF:FEBF:3B32 = the tentative Interface ID address Build the IPv6 header and the Node Solicitation Message (Part of the ICMPv6 Messages) 2
Version = 6 Source Address Flow Label 32 Bits 8 8 8 8 Traffic Class Next Header Hop Limit Payload Length Destination Address
IPv6 Packet Header
Source address = unspecified address 00000000 ::/128 (page 73 and page 54 and in notes) Destination address = solicited-node multicast address The solicited-node multicast address = FF02:0:0:0:0:1:FF00::/104 prepended to the last 24 bits of the Interface ID (page 57 and page 73 and notes) Destination address = FF02:0:0:0:0:1:FFBF:3B32 Next Header for ICMPv6 = 58 (page 63) Next construct the Neighbor Solicitation Message 3
Type Target Address Checksum 32 Bits 8 8 8 8 Code Reserved Options Neighbor Solicitation Message Format
Type = 135 and code = 0 (page 67) Target Address = FE80:: BACA:3AFF:FEBF:3B32 (page 73) If the target address matches one of the assigned addresses of another device. The node responds with a Neighbor Advertisement (NA) Version = 6 Source Address Flow Label 32 Bits 8 8 8 8 Traffic Class Next Header Hop Limit Payload Length Destination Address
IPv6 Packet Header
4
Source Address = FE80:: BACA:3AFF:FEBF:3B32 (page 68) Destination Address = FE80:: BACA:3AFF:FEBF:3B32 (page 74) Next Header = 58 (page 63) The Neighbor Advertisement Message Format has the follow information Type Target Address Checksum 32 Bits 8 8 8 8 Code Reserved Options Neighbor Advertisement Message Format O S R
Type = 136 and code = 0 (page 68) Target Address = FE80:: BACA:3AFF:FEBF:3B32 (page 73) S = 1 Solicited Flag (page 69 and internet)
2. Examine the drawing below, figure 1, apply Spanning Tree Protocol to the network to eliminate any potential bridge loops. Determine the root bridge, root port, designated port, and blocked ports for each switch as appropriate.
5
Bridge ID 12 Bridge ID 10 Bridge ID 8 Bridge ID 2 Bridge ID 1 Bridge ID 17 Bridge ID 4 1 Gb/s 100 Mb/s 100 Mb/s 1 Gb/s 100 Mb/s 1Gb/s 1 Gb/s 1 Gb/s 100 Mb/s 100 Mb/s 1 Gb/s 1 Gb/s 100 Mb/s Spanning Tree Figure 1 Root Bridge D D R B B R D D D R B R R D R B D 2 < 4 4 < 8 10 < 12
3. Examine the drawing below, figure 2, apply Spanning Tree Protocol again to the network after the failure of Bridge ID 1 to show the change in the topology. Determine the root bridge, root port, designated port, and blocked ports for each switch as appropriate.
6
Bridge ID 12 Bridge ID 10 Bridge ID 8 Bridge ID 2 Bridge ID 1 Fails Bridge ID 17 Bridge ID 4 1 Gb/s 100 Mb/s 100 Mb/s 1 Gb/s 100 Mb/s 1Gb/s 1 Gb/s 1 Gb/s 100 Mb/s 100 Mb/s 1 Gb/s 1 Gb/s 100 Mb/s Spanning Tree Figure 2 R D D D D R D B B R D R R D B
4. Based on the figure below configure the switch ports and vlan trunking to allow the communication between the hosts as described in the listed requirements. 7
Vlan Switch Configuration problem Router 1/ Switch gi1/10 gi0/49 Router information Interface vlan250 ip address 145.115.250.1 255.255.255.0 Interface vlan599 ip address 145.115.220.6465 255.255.255.192 Interface vlan180 ip address 145.115.180.1 255.255.255.0 interface vlan750 ip address 145.115.254.1 255.255.255.0 Switch 1 gi0/49 gi1/16 Switch 2 gi0/49 Switch 3 gi2/10
Configuration Requirements Switch 1: Hosts on interfaces gi0/1 and gi0/2 in network 145.115.250.0 -> vlan 250 Hosts on interfaces gi0/3 and gi0/4 in network 145.115.180.0 -> vlan 180 Hosts on interfaces gi0/9 and gi0/10 in network 145.115.254.0 -> vlan 750 Management interface on switch: interface vlan599 -> vlan 599 Ip address 145.115.220.65 68 255.255.255.192 Ip default-gateway 145.115.220.64 65 Switch 1 commands Vtp domain bensarah Vtp mode off (transparent) Vlan 180,250,599,750 8
Interface gi0/49 Switchport trunk encapsulation dot1q Switchport trunk native vlan 1000 (this command is optional see notes on vlan trunking) (optional: switchport trunk allowed vlan 180, 250,599,750-- by default Cisco switches add the vlans that are on the router uplink end of the trunk and in the domain to the switch end of the trunk) Switchport mode trunk Interface gi0/1 Switchport access vlan 250 Spanning-tree portfast (optional) Interface gi0/2 Switchport access vlan 250 Spanning-tree portfast (optional) Interface gi0/3 Switchport access vlan 180 Spanning-tree portfast (optional) Interface gi0/4 Switchport access vlan 180 Spanning-tree portfast (optional) Interface gi0/9 Switchport access vlan 750 Spanning-tree portfast (optional) Interface gi0/10 Switchport access vlan 750 Spanning-tree portfast (optional) 9
Switch 2: Hosts on interfaces gi0/5 and gi0/6 in network 145.115.250.0 -> vlan 250 Hosts on interfaces gi0/7 and gi0/8 in network 145.115.180.0 -> vlan 180 Hosts on interfaces gi0/9 and gi0/10 in network 145.115.254.0 -> vlan 750 Management interface on switch: interface vlan599 -> vlan 599 Ip address 145.115.220.66 255.255.255.192 Ip default-gateway 145.115.220.64 65 Switch 2 commands Vtp domain bensarah Vtp mode off (transparent) Vlan 180,250,599,750 Interface gi0/49 Switchport trunk encapsulation dot1q Switchport trunk native vlan 1000 (optional: switchport trunk allowed vlan 180, 250,599,750) Switchport mode trunk Interface gi0/5 Switchport access vlan 250 Spanning-tree portfast (optional) Interface gi0/6 Switchport access vlan 250 Spanning-tree portfast (optional) Interface gi0/7 Switchport access vlan 180 Spanning-tree portfast (optional) 10
Router/switch configuration Vtp domain bensarah* Vtp mode off (transparent)* Vlan 180,250,599,750* *global commands and only need to be entered one time
Interface gi1/10 switchport Switchport trunk encapsulation dot1q Switchport trunk native vlan 1000 (this command is optional see notes on vlan trunking) switchport trunk allowed vlan 180, 250,599,750 (not optional on this end of the trunk) Switchport mode trunk Interface gi1/16 switchport 12
Switchport trunk encapsulation dot1q Switchport trunk native vlan 1000 (this command is optional see notes on vlan trunking) switchport trunk allowed vlan 180, 250,599,750 (not optional on this end of the trunk) Switchport mode trunk Interface gi2/10 switchport Switchport trunk encapsulation dot1q Switchport trunk native vlan 1000 (this command is optional see notes on vlan trunking) switchport trunk allowed vlan 180, 250,599 (not optional on this end of the trunk) Switchport mode trunk
5. Examine the drawing below. On routers 2 and 4 configure static routes to each individual network that is not directly connected. When you have completed that configuration use route summarization to simplify the static route commands on routers 2 and 4. On routers 1 and 5 the E1 interfaces are 1 Gigabit/s Ethernet interfaces and the E2 interfaces are 100 Mb/s Ethernet interfaces. Configure static route configurations on router 1 and router 5 that will use the E2 interfaces only if the E1 interface link fails. You may use summary routes to simplify the configuration. 13
Static Route Problem Router 1 150.25.133.1/24 Router 2 Router 3 Router 4 195.100.10.49/28 *10.4.6.2/27 Router 5 E1 150.25.140.1/24 E2 150.25.150.1/24 E1 150.25.140.2/24 E2 150.25.150.2/24 150.25.200.2/24 150.25.130.1/24 150.25.130.2/24 195.100.10.50/28 195.100.10.17/28 195.100.10.18/28 195.100.10.33/28 150.25.10.1/24 150.25.15.1/24 * mistakenly left from text problem
Router 2 Ip route 150.25.133.0 255.255.255.0 150.25.130.1 Ip route 150.25.140.0 255.255.255.0 150.25.130.1 Ip route 150.25.200.0 255.255.255.0 150.25.130.1 Ip route 150.25.150.0 255.255.255.0 150.25.130.1 Ip route 195.100.10.32 255.255.255.240 195.100.10.18 Ip route 150.25.10.0 255.255.255.0 195.100.10.50 Ip route 150.25.15.0 255.255.255.0 195.100.10.50 Router 4 Ip route 195.100.10.48 255.255.255.240 195.100.10.17 Ip route 150.25.130.0 255.255.255.0 195.100.10.17 Ip route 150.25.133.0 255.255.255.0 195.100.10.17 Ip route 150.25.140.0 255.255.255.0 195.100.10.17 14
Ip route 150.25.200.0 255.255.255.0 195.100.10.17 Ip route 150.25.150.0 255.255.255.0 195.100.10.17 Ip route 150.25.10.0 255.255.255.0 195.100.10.17 Ip route 150.25.15.0 255.255.255.0 195.100.10.17 Router 2 Route Summarization Ip route 150.25.128.0 255.255.128.0 150.25.130.1 Ip route 195.100.10.32 255.255.255.240 195.100.10.18 Ip route 150.25.0.0 255.255.128.0 195.100.10.50
Router 4 Route Summarization Ip route 150.25.0.0 255.255.0.0 195.100.10.17 Ip route 195.100.10.48 255.255.255.240 195.100.10.17 Router 2 Show ip route S 150.25.0.0 255.255.128.0[1/0] via 195.100.10.50 S 150.25.128.0 255.255.128.0[1/0] via 150.25.130.1 C 150.25.130.0 255.255.255.0 directly connected serial 1 S 195.100.10.32 255.255.255.240[1/0]via 195.100.10.18 C 195.100.10.48 255.255.255.240 directly connected eth 0 C 195.100.10.16 255.255.255.240 directly connected serial 0
Router 1 Route Summarization Ip route 195.100.10.0 255.255.255.0 150.25.130.2 Ip route 150.25.0.0 255.255.128.0 150.25.130.2 15
Ip route 150.25.200.0 255.255.255.0 150.25.140.2 Ip route 150.25.200.0 255.255.255.0 150.25.150.2 10 Router 5 Route Summarization Ip route 195.100.10.0 255.255.255.0 150.25.140.1 Ip route 195.100.10.0 255.255.255.0 150.25.150.1 10 Ip route 150.25.0.0 255.255.0.0 150.25.140.1 Ip route 150.25.0.0 255.255.0.0 150.25.150.1 10
CCNA: 3 in 1- Beginner's Guide+ Tips on Taking the Exam+ Simple and Effective Strategies to Learn About CCNA (Cisco Certified Network Associate) Routing And Switching Certification
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Computer Networking: The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering