You are on page 1of 13

CCNPv7 TSHOOT

Skills Assessment
Base Topology

© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 1 of 13

Inc. This document is Cisco Public Information.CCNPv7 TSHOOT Skills Assessment Overlay Topology All contents are Copyright © 1992–2010 Cisco Systems. Page 2 of 13 . All rights reserved.

Frame Relay R3 G0/0 PC-C NIC 100Base-T VLAN Definition Table VLAN # Name Description VLAN Members 99 MANAGEMENT Management VLAN ALS1.1.2 R3 S0/0/1.1 WAN link. DLS2 999 PARKING_LOT Unused Switch Ports ALS1.1Q ALS1 F0/18 PC-B NIC 100Base-T ALS1 F0/18 R2 G0/0 100Base-T DLS1 F0/3 DLS2 F0/3 EtherChannel Po10.99. Frame Relay R1 S0/0/0.1. DLS1. DLS1.100. DLS2 120 OFFICE Office VLAN ALS1. DLS2 NATIVE VLAN 666 N/A N/A ALS1. All rights reserved. 802. DLS1. DLS2 PARKING_LOT VLAN 999 N/A N/A ALS1. DLS2 O-PEER VLAN 300 10. Frame Relay R2 S0/0/1. R2 200 VOICE Voice VLAN ALS1. Frame Relay R2 S0/0/1. 802. DLS2 All contents are Copyright © 1992–2010 Cisco Systems.1Q DLS1 F0/4 DLS2 F0/4 EtherChannel Po10. DLS1. 802.CCNPv7 TSHOOT Skills Assessment Device Interfaces and Links Table From Device Interface To Device Interface Layer 1 and 2 Features and Protocols Used ALS1 F0/1 DLS1 F0/1 EtherChannel Po1.1Q ALS1 F0/3 DLS2 F0/1 EtherChannel Po2. DLS1.0/24 2001:DB8:CAFE:110::/64 N/A OFFICE VLAN 120 10. DLS2 Subnet Table Description IPv4 Subnet IPv6 Prefix Devices/Descriptions 10.120.1Q ALS1 F0/2 DLS1 F0/2 EtherChannel Po1. DLS2 100 SERVERS Internal Servers ALS1. DLS2 666 NATIVE IEEE 802. PC-B.0/24 2001:DB8:CAFE:100::/64 SRV1 GUEST VLAN 110 10. DLS1. DLS1.30.1Q DLS1 F0/5 R1 G0/1 100 Mb/s.200.2 R2 S0/0/0. DLS1.0/24 2001:DB8:CAFE:300::/64 ALS1. DLS1.1Q Trunk VLAN ALS1.1 R2 S0/0/0.0/24 2001:DB8:CAFE:120::/64 PC-B VOICE VLAN 200 10.2 WAN link.1 WAN link.0/24 2001:DB8:CAFE:200::/64 ALS1. 802. DLS2 VLANs MANAGEMENT VLAN 99 SERVERS VLAN 100 10. DLS2 300 O-PEER DLS1-DLS2 OSPF Peering ALS1. DLS2. DLS2 F0/5 is a routed L3 port (logical) R1 S0/0/0.2 WAN link. DLS1. DLS1.1. DLS1 F0/5 is a routed L3 port (logical) DLS1 F0/6 SRV1 NIC 100Base-T DLS2 F0/5 R3 G0/1 100 Mb/s.1Q ALS1 F0/4 DLS2 F0/2 EtherChannel Po2. SRV1 110 GUEST Guest VLAN ALS1.1 R3 S0/0/1.1. Inc.1. 802. 802. DLS1. Page 3 of 13 . DLS2.1.110. This document is Cisco Public Information.0/24 2001:DB8:CAFE:99::/64 ALS1. DLS1.

1 209.1.110.165.2.1. VRF VPN_A Page 4 of 13 .1/30 2001:DB8:CAFE:20::D1/64 Routed Port to R1 DLS1 Loopback 0 10.225/30 2001:DB8:FEED:10::1/126 R1 S0/0/0.90.1.120.252/24 2001:DB8:CAFE:99::D1/64 SVI DLS1 VLAN 100 10.2.1.253/24 2001:DB8:CAFE:99::D2/64 SVI DLS2 VLAN 100 10.252/24 2001:DB8:CAFE:300::D1/64 SVI DLS1 F0/5 10.2.222/30 2001:DB8:FEED:14::2/126 R2 S0/0/1.2 209.1.251/24 2001:DB8:CAFE:99::A1/64 SVI ALS1 VLAN 110 10.1.200.200.251/24 2001:DB8:CAFE:120::A1/64 SVI ALS1 VLAN 200 10.120.12/30 2001:DB8:CAFE:212::/64 DLS2 and R3 GE link R2-R1 via S0/0/0.1.1.200.1.165.165.100.1.165.99.2.1.200.110.2/31 2001:DB8:CAFE:90::2/126 R2 Loopback 0 2.6-10.1/32 2001:DB8:CAFE:201::1/128 iBGP Peer R1 Tunnel 0 N/A ABCD::1/16 GRE to R3: LAN Failover R2 G0/0 DHCPv4 in range 10.1.228/30 2001:DB8:CAFE:6::/126 P2P back-to-back Frame Relay link R2-R3 via S0/0/1.30.1.30.2 209.230/126 2001:DB8:CAFE:6::2/126 R2 S0/0/1.1.1.224/30 2001:DB8:FEED:10::/126 P2P back-to-back Frame Relay link R2-R1 via S0/0/0.252/24 2001:DB8:CAFE:200::D1/64 SVI DLS1 VLAN 300 10.100.1.99.165.120.120.1.2 10.200.165.1.90.2.252/24 2001:DB8:CAFE:100::D1/64 SVI DLS1 VLAN 110 10.2/31 2001:DB8:CAFE:90::/126 P2P back-to-back Frame Relay link ALS1-R2 10.200.253/24 2001:DB8:CAFE:100::D2/64 SVI DLS2 VLAN 110 10.251/24 2001:DB8:CAFE:110::A1/64 SVI ALS1 VLAN 120 10.120.200.2 10.1.250 SLAAC in 2001:DB8:CAFE:120::/64 R2 S0/0/0.2/30 2001:DB8:CAFE:20::1/64 R1 S0/0/0.200.1.1. Inc.1.253/24 2001:DB8:CAFE:110::D2/64 SVI DLS2 VLAN 120 10.200.120.30.0/30 2001:DB8:CAFE:20::/64 DLS1 and R1 GE link DLS2-R3 10.226 2001:DB8:FEED:10::2/126 R2 S0/0/0.1.253/24 2001:DB8:CAFE:120::D2/64 SVI DLS2 VLAN 200 10.99.2.1. All rights reserved.1.253/24 2001:DB8:CAFE:300::D2/64 SVI DLS2 F0/5 10.1.211.2.1 209.251/24 2001:DB8:CAFE:200::A1/64 SVI ALS1 VLAN 300 10.13/30 2001:DB8:CAFE:212::D2/64 Routed Port to R3 R1 G0/1 10.1.1.2/32 2001:DB8:FEED:222::2/128 All contents are Copyright © 1992–2010 Cisco Systems.200.251/24 2001:DB8:CAFE:300::A1/64 SVI DLS1 VLAN 99 10.2 209.229/30 2001:DB8:CAFE:6::1/126 R1 Loopback 0 192.1/32 2001:DB8:CAFE:2110::D1/128 Anchor DLS1 Tunnel 0 N/A FC00::D1/7 GRE to R2: R1 RIPngFree DLS2 VLAN 99 10.220/30 2001:DB8:FEED:14::/126 P2P back-to-back Frame Relay link R2-R3 via S0/0/1.252/24 2001:DB8:CAFE:120::D1/64 SVI DLS1 VLAN 200 10.1.CCNPv7 TSHOOT Skills Assessment Description IPv4 Subnet IPv6 Prefix Devices/Descriptions DLS1-R1 10.200.1 209.253/24 2001:DB8:CAFE:200::D2/64 SVI DLS2 VLAN 300 10.252/24 2001:DB8:CAFE:110::D1/64 SVI DLS1 VLAN 120 10.1 209.165. This document is Cisco Public Information.168.1 209.165.0/64 2001:DB8:CAFE:120::/64 Temporary ISP link Uplinks and ISP Links IP Address Table Device Name Interface IPv4 Address/Prefix IPv6 Address/Prefix Additional Information ALS1 VLAN 99 10.110.

2.22/8 2001:DB8:EFAC::2/48 Internet (VPN_A Path) R2 Loopback 5 22.200.6-10.90. PortFast (spanning-tree portfast default globally).1.100.22/8 2001:DB8:EFAC::2/48 Internet (Global) R2 Loopback 4 22. port security on ALS1 (max ten sticky MAC addresses).3. SSH IPv6 access list on ALS1 vty ports 0-4 Trunk port security on switches switchport mode trunk.129/25 from DHCP Pool Simulatedv4LAN 2001:DB8:CAFE:801::1/64 Collocated Office Simulated LAN R3 Tunnel 0 N/A ABCD::3/16 GRE to R1: LAN Failover SRV1 NIC 10.20.1.250 In 2001:DB8:CAFE:120:ABCD::/80 Addresses via DHCPv4/6 server DLS1 or DLS2 PC-C NIC In range 10.126 In 2001:DB8:CAFE:800:ABCD::/80 Addresses via DHCP relay to DHCPv4/6 server DLS2 Troubleshooting and Maintenance Tools Table Configured Feature Devices Target Server Target Tool or Application System message logging All SRV1 Syslog server Configuration archive All SRV1 TFTP server SNMPv2c traps All SRV1 SNMP Monitor NTPv4 All R2 NTP server. All rights reserved.1/25 2001:DB8:CAFE:800::1/64 Collocated Office LAN R3 G0/1 10.1/32 2001:DB8:CAFE:203::1/128 iBGP Peer R3 Loopback 1 10.22. stratum 3 NetFlow Top-Talkers R1 G0/1 ingress flow.80. 300 allowed on the trunks VTPv3 security vtp password cisco hidden on the switches OSPFv2 MD5 authentication for DLS1 and DLS2 adjacency on VLAN 300 ip ospf authentication message-digest ip ospf message-digest-key 1 md5 cisco OSPFv3 SHA authentication for DLS1 and DLS2 adjacency on VLAN 300 ipv6 ospf authentication ipsec spi 500 sha1 1234567890123456789012345678901234567890 All contents are Copyright © 1992–2010 Cisco Systems. Page 5 of 13 .1.20/32 2001:DB8:CAFE:2020::2/128 EIGRP & RIP R2 Loopback 3 22.1/24 2001:DB8:CAFE:100::1/64 Static addresses PC-B NIC In range 10.22. only VLANs 99.14/30 2001:DB8:CAFE:212::3/64 R3 S0/0/1.22.1.2/32 2001:DB8:FEED:222::2/128 VRF VPN_B R2 Loopback 2 20. This document is Cisco Public Information.80. password encryption Login authentication AAA local database authentication.3/31 2001:DB8:CAFE:90::3/126 R3 Loopback 0 192. only prescribed VLANs allowed on trunk Access port security on switches switchport mode access. Inc. 110.1.120.1.CCNPv7 TSHOOT Skills Assessment R2 Loopback 1 2. BPDU Guard (spanning-tree bpduguard enable on access ports) Proxy ARP Disabled on SVIs no ip proxy-arp VLAN security Unused ports placed in PARKING_LOT VLAN 999.80. unused NATIVE VLAN 666.4-10.1.2.1.168. R3 G0/1 ingress flow Local Local on the router Security Features Table Security Feature Configured Implementation Method or Commands Password security Enable secret cisco.1.22.120.2 10. 200.1 209. 100. 120.22.80.165.2. switchport nonegotiate.22/8 2001:DB8:EFAC::2/48 Internet (VPN_B Path) R2 Tunnel 0 N/A FC00:2/7 GRE to DLS1: R1 RIPngFree R3 G0/0 10.20.22. username/password is cisco/cisco Secure remote management Telnet disabled on all devices.221/30 2001:DB8:FEED:14::3/126 R3 S0/0/1.

This lab uses Cisco ISR G2 routers running Cisco IOS 15. respectively. In Part 2. Part 3: Copy the Skills Assessment error file from the TFTP server into flash for each device. you build the physical network. This exam combines the process of course setup with the actual troubleshooting process.0(2) or comparable with Fast Ethernet interfaces) • SRV1 (PC with static IP address): Windows 7 with RADIUS.CCNPv7 TSHOOT Skills Assessment Objectives Part 1: Build the physical network topology. In Part 1. In Part 3.0(2) IP Services and LAN Base images. which must be completed sequentially. The exam is divided into five parts. and WireShark software • PC-B (DHCP client): Windows 7 with SSH client and WireShark software • PC-C (DHCP client): Windows 7 with SSH client and WireShark software • Serial and Ethernet cables. and Cisco Catalyst 3560 and 2960 switches running Cisco IOS 15. Inc. Note: Refer to the Base Topology and Overlay Topology diagrams and accompanying tables at the beginning of this document when building the network or troubleshooting issues. you copy the error files from the TFTP server to flash for the respective devices and in Part 4 you erase the base configs and load the error configs. and syslog servers. Part 2: Load the functioning base device config file from flash to the running config for each device and test network connectivity.4(3) images with IP Base and Security packages enabled. plus an SSH client. All rights reserved. SNMP monitor. TFTP. as shown in the topology All contents are Copyright © 1992–2010 Cisco Systems. you load functioning config files on all devices and verify access to the TFTP server. This document is Cisco Public Information. Exam Overview This Skills Assessment is the final practical exam for the course CCNPv7 TSHOOT. All necessary data is provided to methodically troubleshoot the network issues. In addition to correcting configurations and restoring basic connectivity.4 or comparable) • 2 multilayer switches and 1 access layer switch (Cisco IOS Release 15. Part 5: Troubleshoot the errors introduced. respectively. Page 6 of 13 . network protocols such as SSH and NTP must also be verified. the commands available and output produced might vary from what is shown in this lab. Required Resources • 3 routers (Cisco IOS Release 15. Depending on the router or switch model and Cisco IOS Software version. The 3560 and 2960 switches are configured with the SDM templates dual-ipv4-andipv6 routing and lanbase-routing. You troubleshoot and resolve the errors in Part 5. Part 4: Erase the startup config and copy the Skills Assessment error file from flash to the running config for each device.

Step 6: Copy the Skills Assessment device configuration file from flash to the running config. Use the show flash command to verify the presence of this directory.150-2.dat tshoot c2960-lanbasek9-mz. The format of these files is SA-xxx-BASE-Cfg. Inc. All rights reserved.CCNPv7 TSHOOT Skills Assessment Part 1: Build the Physical Network Connect all devices as shown in the Base Topology and Overlay Topology. You can also verify the contents of the directory using the cd and dir commands. Step 5: When the device restarts. You must use the interfaces specified in the Device Interfaces and Links table at the beginning of the Skills Assessment.bin multiple-fs info private-config.txt running-config Destination filename [running-config]? Enter Note: Although it is possible to copy the file to the startup config and reload the device.text config. If the directory and files are not present. Page 7 of 13 .txt Step 2: Erase the startup config from NVRAM. the RSA keys for SSH cannot be generated from the startup config. do not enter the initial configuration dialog. Step 3: Delete the VLAN database from flash (switches only).txt. For example: Switch# copy flash:/tshoot/SA-ALS1-BASE-Cfg. The base configuration files should be present in flash under the tshoot directory for a given device. ALS1# show flash Directory of flash:/ 9 3 5 6 7 8 10 -rwx drwx -rwx -rwx -rwx -rwx -rwx 916 512 11792247 7192 106 1906 7199 Feb Sep Feb Sep Feb Sep Sep 28 22 28 26 28 26 26 1993 2014 1993 2014 1993 2014 2014 16:04:03 10:40:59 16:24:48 10:53:31 18:13:09 10:53:31 10:53:31 -08:00 -07:00 -08:00 -07:00 -08:00 -07:00 -07:00 vlan. All contents are Copyright © 1992–2010 Cisco Systems. This document is Cisco Public Information. Step 1: Verify the existence and location of the Skills Assessment base configuration files. where xxx is the name of the device. Part 2: Load the Skills Assessment Base Device Configuration Files from Flash Use the following procedure to copy the functional base Skills Assessment configuration (non-error) file from flash to the running config for each device and test network connectivity. contact your administrator. Step 4: Reload the device.text 27998208 bytes total (16070656 bytes free) ALS1# cd tshoot ALS1# dir Directory of flash:/tshoot/ 9 -rwx <output omitted> 7979 Sep 22 2014 11:26:14 -07:00 SA-ALS1-BASE-Cfg. but terminate autoinstall if prompted. but do not save the system configuration if prompted.SE6.

Step 9: Set the time on the NTP server R2.1. Inc. Note: Although it is not considered security best practice. Configure PC-B and PC-C as DHCP clients. Part 3: Copy the Skills Assessment Error Files from the TFTP Server Step 1: Verify connectivity with the TFTP server SRV1.1. a. use the enable password cisco. Set the correct time on the NTP server R2 using the clock set command. For example: *** Switch ALS1 Skills Assessment BASE Config *** If you still cannot access SRV1 from a particular device. b. Even if you see an Autosave message indicating that the running configuration has been saved to NVRAM. the exec-timeout for the console line is set to 0 (no time out) to facilitate performance of this Skills Assessment. Note: If the pings are not successful. DLS2. From each device (ALS1. Step 10: Configure the PCs. e.CCNPv7 TSHOOT Skills Assessment Step 7: Copy the running config to the startup config. You must be able to access the TFTP server on SRV1 from each network device to copy the error files.100. Test connectivity from each PC. c. and R3) ping SRV1 at 10.txt. Page 8 of 13 . R2. Release and renew the DHCP leases on PC-B and PC-C. d. contact your administrator. Note: If the device is rebooted at this point. R1. The format of these files is SA-xxx-Error-Cfg.254. This document is Cisco Public Information. Start the syslog server and TFTP server on SRV1. verify physical network cabling and connections and verify that the Skills Assessment base config file is loaded as the running config in each device. Step 4: Release and renew the DHCP leases on PC-B and PC-C. Step 2: Verify the TFTP server configuration. which indicates the file currently loaded.1/24 and the default gateway 10. Configure SRV1 with the static IP address 10. Step 8: Repeat steps 2 through 7 for all other devices in the network. copy the running config to the startup config manually. All rights reserved. Troubleshoot if necessary. Copy the appropriate Skills Assessment error file from the TFTP server into the flash:/tshoot directory for each device. You can exit from the user EXEC mode prompt to see the MOTD login banner. Step 3: Copy the TFTP server Skills Assessment error file to flash. All contents are Copyright © 1992–2010 Cisco Systems.1.100. DLS1. where xxx is the name of the device. To access privileged EXEC mode.100. Verify that the TFTP server on SRV1 is running and that the error files are present in the default TFTP directory.1. you can log in remotely with the username cisco and the password cisco. Verify that R2 has received DHCPv4 and SLAAC addresses.

1 192. Part 5: Troubleshoot the Errors Introduced The Skills Assessment error files introduce various problems.1. Step 1: Erase the startup config. to test reachability from a Cisco device to any destination: tclsh foreach address { 192. Use connectivity testing tools such as ping. SSH.168. OSPFv2. traceroute. securing switched networks. and local AAA.3. Step 5: Copy the Skills Assessment error file from flash to the running config. and CDP to determine the extent of connectivity loss. This document is Cisco Public Information. tracert (PC). SLAAC. HSRP with object tracking.1 } { ping $address } tclsh foreach address { 2001:db8:feed:10::2 2001:db8:cafe:203::1 } { ping $address } Network Connectivity Test Table Command From Device/Interface/IP To Device/Interface/IP All contents are Copyright © 1992–2010 Cisco Systems. EtherChannel. redistribution. Step 3: On the switches. configure the SDM template: dual-ipv4-and-ipv6 routing on 3560 switches and lanbase-routing on 2960 switches. VTPv3. Step 6: Copy the running config to the startup config. route authentication. All rights reserved. follow the procedure similar to what is described in Part 2. DHCPv4. VLANs. Named EIGRP. Be sure to ping from each PC to enough network device interfaces. An abbreviated version is provided below. to determine an appropriate troubleshooting strategy. RIPv2. OSPFv3 for IPv6 with and without address families.168. Note: You can use the Ping Test table in Step 3 as a starting point. NTP. Step 1: Perform connectivity tests. Or you can use your own version of the Tcl scripts below (adding addresses from the IP Address Table above and starting in Privileged EXEC mode).CCNPv7 TSHOOT Skills Assessment Part 4: Load the Skills Assessment Error Files from Flash to the Running Config For each device.dat (switches only). Hint: Two configuration errors are introduced in each device for a total of 12 errors. Use the following table to record the results of the connectivity tests. RIPng. Inc. and from the network devices to enough network device interfaces. Step 4: Issue the reload command and respond as indicated in Part 2. VLAN trunks. route filtering. MP-BGP. DHCPv6. Step 2: Delete vlan. Result Page 9 of 13 . including issues related to MST.

All rights reserved. copy the running config to the startup config. resolve. and the solution to the problem. after issuing corrective commands. Page 10 of 13 . the affected devices. Tip: If connecting from one device to another via SSH. Using the tools available. This document is Cisco Public Information. Problem Resolution and Verification Table Device Problem or Error Discovered Corrective Action (commands used) Verification Commands (more than one command can be used) ALS1 ALS1 DLS1 DLS1 DLS2 DLS2 R1 R1 R2 R2 R3 R3 All contents are Copyright © 1992–2010 Cisco Systems. including the commands used. such as show and debug commands. Inc. Use the Problem Resolution and Verification table to document the problem discovered. issue the terminal monitor command so that console and debug messages generated on the remote device can be viewed on the local console. and verify the issues discovered.CCNPv7 TSHOOT Skills Assessment Step 2: Document. correct it. and document the corrective action taken. discover each problem. Note: For each device.

Page 11 of 13 . Perform pings according to the Ping Test table below. Inc. With all devices connected and all problems resolved. you should be able to ping from any device in the network to any other device.CCNPv7 TSHOOT Skills Assessment Notes __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ Step 3: Demonstrate basic network connectivity after correcting errors. All rights reserved. If not. Note: All pings in the table must be successful. Ping Test Table From Device/Interface/IP PC-B PC-B PC-B PC-B PC-B PC-B PC-B PC-B PC-B PC-B PC-B To Device/Interface/IP PC-C HSRP default gateway SRV1 ALS1 MANAGEMENT DLS1 MANAGEMENT DLS2 MANAGEMENT R1 F0/1 R2 Lo1 R2 Lo2 R2 Lo3 R3 G0/0 PC-C PC-C PC-C PC-C PC-C PC-C PC-C PC-C R3 default gateway SRV1 ALS1 MANAGEMENT DLS1 MANAGEMENT DLS2 MANAGEMENT R1 G0/1 R2 Lo0 R3 G0/1 ALS1 MANAGEMENT VLAN 99 ALS1 MANAGEMENT VLAN 99 ALS1 MANAGEMENT VLAN 99 ALS1 MANAGEMENT VLAN 99 ALS1 MANAGEMENT VLAN 99 DLS1 MANAGEMENT DLS2 MANAGEMENT R1 G0/1 R2 Lo1 R3 G0/1 Successful (Y/N) Notes __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ All contents are Copyright © 1992–2010 Cisco Systems. there are issues that need to be resolved. This document is Cisco Public Information.

Redundancy Test Table From Device/Interface/IP PC-B PC-B PC-B PC-B PC-B PC-B PC-B PC-B PC-B To Device/Interface/IP HSRP default gateway PC-C SRV1 ALS1 MANAGEMENT DLS1 MANAGEMENT DLS2 MANAGEMENT R1 S0/0/1. If not. Check each network device to verify that it has synchronized with the NTP server R2. there are issues that need to be resolved. Pings from PC-B to each of the other PCs and network devices must be successful. b. c. Renew and release the PC-B IP address. Ping from PC-B to all other devices in the network. If not.0/24. connect to each network device using SSH (from an SSH client such as PuTTY) to verify remote management capability. there are issues that need to be resolved. PC-B should be able to obtain an IP address on subnet 10.1. All rights reserved. there are issues that need to be resolved. If not.1 R2 Lo1 R3 S0/0/1.CCNPv7 TSHOOT Skills Assessment Step 4: Demonstrate SSH connectivity. From PC-B. Remote Access Test Table From Device PC-B PC-B PC-B PC-B PC-B PC-B To Device/Interface/IP ALS1 MANAGEMENT DLS1 MANAGEMENT DLS2 MANAGEMENT R1 G0/1 R2 S0/0/0. Note: Connecting to each device via SSH must be successful. Note: Each device must synchronize with the NTP server R2. Page 12 of 13 .1 Result All contents are Copyright © 1992–2010 Cisco Systems.1 R3 G0/1 SSH (Y/N) Step 5: Demonstrate NTP functionality. Shut down DLS2 port F0/5.120. If not. Inc. This document is Cisco Public Information. NTP Synchronization Table Device ALS1 DLS1 DLS2 R1 R2 R3 NTP Status Synched (Y/N) Step 6: Demonstrate network redundancy for PC-B after correcting errors. there are issues that need to be resolved. a.

CCNPv7 TSHOOT Skills Assessment Notes __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ __________________________________________________________________________________________ All contents are Copyright © 1992–2010 Cisco Systems. Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 13 .