8.2.4.12 Packet Tracer - Troubleshooting Enterprise Networks 1

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to all in this video we are going to see the packet tracer activity troubleshooting enterprise networks one before coming to this activity friends if you like to get my future uploading video info directly into our Gmail considered subscribe well coming to our activity Huracan see or a dressing-table we will go through the background this activity uses a variety of technologies you have encountered during your CCNA studies including VLANs STP routing inter VLAN routing DHCP na T PPP and frame relay your task is to review the requirements isolate and resolve any issues and then document the steps you took to verify the requirements coming to the requirements VLANs and Texas yes to is the spanning tree root for VLAN 1 10 and 20 as 3 is the spanning tree root for VLAN 30 and 88 we will verify and go one by one first of all we will go to that switch s2 and we will verify at a spanning tree coming two years to CLI show spanning tree and to here we can see the details here we can see vlan1 here we can see we lent 10 and here we can see VLAN 20 once we observe this show output here we can see this s2 is an Oda spanning tree root for VLAN 1 10 and 20 we will document that coming to our spreadsheet here the device is s2 and here the problem is this which is not the road bridge for variance 1 10 and 20 for TV land's 1 comma 10 comma 20 until here solution e so we had to give the command spanning tree VLAN be able to give those V dance also root primary coming to the switch s to enable password class configure terminal here we are going to give a spanning tree VLAN we are going to specify those valence of hora root primary that is 1 comma 10 comma 20 root primary now we will verify the configuration so spanning tree here we can see vlan1 and Teddy see this a bridge is the route coming to VLAN 10 here we can see this bridge is a route coming to VLAN 20 here we can see this bridge is the route now we will come to s 3 s 3 is the spanning tree root for a VLAN 30 and the 88 we will verify that coming to yes 3 CLI enable password is class show spanning tree now we have to verify we learnt 30 here we can see that this bridge is the root yes it's correct and coming to VLAN 88 here we can see this bridge is the root pin so this is 3 is the spanning tree root 4 wheel and 30 and TVland 88 next these are the jungle links connecting to the switches are in a to VLAN 99 here we can see 3 switches s 1 s 2 and s 3 we will verify these links here where we can see it's faster on 0 / 1 0 / 2 0 stars through en 0 / 4 so these are the ports connected each other first of all we will verify in this switch s1 here itself we can see a native VLAN mismatch discovered on faster turn 0 / 4 even 0 / 3 0 / 2 it starts a trainee will check the show command passwords class show running config and we will check those interfaces here we can see a G interface fastethernet 0/1 till 0 / 4 here we can see here did not configure this native VLAN now we will come to years to show running config here is those interfaces here we can see they configured it is a Trang native VLAN 99 yes it's correct so this tree is configured correctly now we will come to yes 3 show running config and to here we can see that is which fortunately with a 99 yes in this s3 also configured correctly can so here we have seen this suchi s1 we have to configure on a TV land 99 for the interfaces a faster turns 0 / 1 - 0 / for coming to the documentation part your the device is so yes 1 and the problem identified is a native VLAN mismatch and here the solution is we have to go to those interfaces so interface has a range we can go faster thermit 0 / 1 till 4 then we have to give that command switch a port chunkin' a - VLAN 99 coming to the configuration on this switch s1 configure terminal interface or range faster turnit 0/1 till four here we are going to give a support that trunk native VLAN 99 next is our true is responsible for inter VLAN routing and serves as the DHCP server for VLANs 10 20 and 30 before coming to the router r3 in a retro Singh table here we can see the details of r3 here we can see the sub interfaces Gigabit Ethernet 0 star 0 10 0 or 20 0 30 0 88 and it's a details now we will come to the router r3 password is class show running config and we will check the details here we can see sub interface details encapsulation dot1q IP address 1.20 yes it's correct these informations are correct now we will go to a DHCP configuration here we can see that here we can see poles created for villains we lanten VLAN 20 VLAN 30 also we can see each VLAN excluded a truss here the first 10 actress is excluded so these informations are correct here we can see this router are true is responsible for inter VLAN routing and here we can see the suture s3 which is connecting to this router r3 here we can see the interface that is gigabit apparent 0 / 1 so this interface should be the mode should be trunk we will verify that now now we will come to the suti s3 enable password is class here we are going to give the show command the show running config and we are going to verify the interface a gigabit the turn 0 / 1 here we can see that support the trunk in a two-wheeler 99 which afford to more the access here we can see this approach mode is access should be Shang mode we have to change this mode from access to trunk by giving the command switch Oporto mode trunk after reconfiguring this is reporter mode from access to track these pcs that is pc-1 pc2 pc 3 from these VLANs are going to get the IP Edge's from our DHCP server that is our three-rotor Henson here we identified the problem on the device s3 we will document that here the device is a s3 and the problem is the PCs do not pull a DHCP address until we give you such a poor term or the trunk for that we have to go to the interface Gigabit Ethernet 0 / 1 then we have to give a support motor trunk coming to the implementation on the suit is through e configure terminal we have to go to the interface Gigabit Ethernet 0 / 1 and here we have to give a support so cheap Rotom mode as trunk now we will verify the IP address of each pcs here first of all we will come to PC 1 desktop IP configuration here we can see it got IP address from the DHCP server default gateway coming to PC 2 here we can see the details coming to PC 3 here we can see the details next is our routing each router is configured with the eigrp and the uses a s22 r2 is configured with the default router pointing to the ISP and to redistributes the default route here we can see that details here is the router r2 and so we can see this device this router r2 is connected to this is P here so they all be configured a defaulter root the pointing to this is P anyway we will verify these informations first of all you will come to the router r2 enable password is class here we are going to give a command show running config and we will verify the details here we can see router AIG RP 20 to redistribute static also we can see the network's here it's our two coming to let trusting table here we can see the network details so these informations are correct also here we can see the default route IP route right gigabit the turn 0/0 here we can see that oh here we can see the interface it's big of a deterrent 0/1 but in our configuration here we can see they given gigabit at our 0/0 so here the default route is pointing to the incorrect interface so this interface should be gig up the torrent 0/1 hence so here we identify the problem on the device r2 we will document that coming to our documentation table here we can see the device is art our to the problem is default route is pointing to the incorrect interface well so here is a solution we have to remove that IP route command 0 0 0 space 0.0.0.0 and the interface g 0/0 hurry how to give the command copy here Korea to you the interface G zeros last one now we will come to the implementation on the router are to configure terminal here we are to remove but no IP route 0.0 0.0 space 0.0 0.0 and the interface to Gigabit Ethernet 0 star 0 and 2 here we have to give control a no we are going to remove here and two here the Gigabit Ethernet 0 / 1 now we will verify the routing on our one password is class show running config here we can see the details or router AI GRP 22 and here we can see the networks we can check in our addressing table here we can see to directly connect our networks on this device r1 so it's correct now we will come to the router r3 show running config Hanteo to verify draw string theory can see that router aig RP 22 and here we can see the network's details coming for assessing table here we can see the router artery and its details so all the informations are correct next decent Nattie's configure on r2 and no untranslated at trusts are permitted to cross the internet coming to the router r2 and we will verify the net show running config and here we can see the details IP net inside source list nat interface gigabit or 0/1 overlord it's correct and here we can see the access list annette here we can see it's created here IP access list and here in that and it's permit so these networks this informations are correct now we how to check outside and inside and that before that coming to topology here we can see the interface the gigabit authority row / 1 be how to give IP nat outside and other interfaces that is gigabit authority rows now 0 serial 0 / 0 / 0 + 2 serial 0 / 0 / 1 I pin at inside we will check the con figuration details here we can see that gigabit aterna to 0/0 here we can see that interface in our topology this should be IP nat inside but here we can see the given IP NAT outside so we have to correct it we also we will check the other interfaces so here we can see interface Gigabit Ethernet 0/1 here we can see IEP NAT inside so this should be IP not outside and coming to a serial 0/0 star 0 IP NAT inside is correct in the face serial co-star 0/1 IP net inside it's correct hence the hero we identified a problem on the device r2 we will document that for the device again r2 here the problem is a TFTP server cannot ping ping the outside host so here we have to give a character outside and inside a notch first of all we have to go to the interface g0 star 0 and we have to remove a no IP not outside and here we how to give IP nat inside sorry also we have to go to the interface Gigabit Ethernet 0 / 1 and here we have to give IP net outside now coming to the configuration or the router r2 configure terminal first of all we will go to the interface a gigabyte or 0/0 and we will remove and no IP net outside and here we will give an IP not inside also we will go to the interface a Gigabit Ethernet 0 / 1 & 2 here we will give an IP net outside now we will check the configuration show running config here we can see interface gigabit the power 0 / 0 IP NAT inside and here we can see G 0 / 1 I P net outside next is one technologies the serial link between r1 and r2 uses of frame relay here we can see that in our topology serious eurostar 0/0 on r1 and the serial co-star 0/0 on r2 uses a frame relay we will verify that first of all we will verify on r1 CLI enable password is class a show running config and we will go to the interface serial 0 / 0 / 0 here we can see that here we are going to configure frame relay here we cannot see that frame relay is configured so we have to configure on this device r1 also we will let check on the router r2 password is class show running config and we will verify serial co-star 0/0 here we can see that here also we have to set the encapsulation frame relay now we will document this identify the problem here the device is r1 the problem is r1 and r2 are not forming Addison C so here we have to go to the interface cereals Eurostar co-stars in row and to be how to set the encapsulation as frame relay same thing on r2 also here is that coming the configuration on our one first configure terminal and we will go to the interface serials Eurostar 0/0 and here we are going to give a encapsulation as frame relay now we will go to our to configure terminal we will go to the interface the serial 0 / 0 / 0 and here we are going to set encapsulation frame reeling next is the serial link between R 2 and R 3 uses hdl-c encapsulation coming to a topology here we can see serial 0 so R 0 / 1 or the device R 2 and the serial 0 / 0 / 1 on R 3 uses hdl-c encapsulation we will verify that first of all we will verify on our to enable password is class show running config and we will verify the interface serial 0 / 0 / 1 so here we cannot see any encapsulation that means by default its hdl-c we can verify that using show interface serial 0 / 0 / 1 and here we can see encapsulation hdl-c now we will come to our 3 enable password is class so show running config coming to the interface so serial 0 / 0 / 1 yes it's a CBL see we will verify using show interfaces serial 0 / 0 / 1 and here we can see that it's correct next is the serial link between R 1 and R 3 uses PPP with ch AP authentication so coming to an apology here we can see serial zero slash zero slash zero on our tree and seriously Rosalind 0/1 on our one uses point-to-point protocol we will verify that first of all we will let check on the router art three show running config and two here we have to check the interface serial 0 / 0 / 0 here we can see that encapsulation PPP and we can see authentication CH ap so here we have to check the username and password here we can see username r1 and the password Cisco CC in a it's correct here we can see the username r1 now we will come to our one and we will check the interface so serial 0 / 0 / 1 here we can see that encapsulation PPP authentication CH ap it's correct and to be how to check the username and password here we can see that username CCNA here we can see this a username they set incorrectly and here we can see the password Cisco CCNA here we have to give a username as our three now we will document it identify the problem on this router r1 coming to our spreadsheet here the problem identified on the device r1 and here the username is incorrect so we have to configure that a username r3 password 0 cisco CCNA coming to the configuration or the router r1 configure terminal here we are going to give a username as our three and the password Cisco CCNA coming to the connectivity a devices should be configured according to the addressing table every device should be able to ping a very adroit device right so we will check the connectivity now we will try to ping from this PC one two other pieces so coming to PC one test hope command prompt first of all we will get to the IP address of a PC too so here we can see that ping to one ninety two dot one sixty eight dot twenty dot eleven here we can see we are getting the replay now we'll try to ping to this PC through e that is thirty dot 11:30 a.m. now we will try to ping to this a TFTP server so we will get the IP address of TFTP server here we can see that i will copy researchers ping to TFTP server here we can see we are getting the replay and now we will try to ping to this outside host pink to not nine two two one six five - not 1.2 ten here we can see we are getting the replay well that's all and this packet place our activity a troubleshooting enterprise and it works one here we can see our completion status or sixty out of sixty friends if you have any doubt in this packet is our activity please comment below also if you like my video give a thump and sure to our friends and don't forget to subscribe the channel so that you will get latest uploading video info directly into our gmail thank you
Info
Channel: Tech Acad
Views: 19,000
Rating: undefined out of 5
Keywords: Enterprise Networks
Id: -xbeKz9Qua8
Channel Id: undefined
Length: 30min 21sec (1821 seconds)
Published: Sat Apr 21 2018
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.