web analytics
  • RSS

  • Polls

    What Cisco Cert Are You Currently Studying?

    View Results

    Loading ... Loading ...
  • Search on CiscoBibles

  • Popular Posts

  • Recent Comments

  • Archives

  • CCNP BSCI(642-901) Lab – ISIS EIGRP Redistribution

    By admin | April 14, 2009

    The Pass4sure company recently completed merging with Lynaic. The two companies have been using separate routing protocols on their corporate networks, and an immediate solution is required for the two companied to begin sharing data. A boundary router, Amadiya, has been established to perform mutual redistribution of route information between the two networks. Configure route redistribution from EIGRP into IS-IS and from IS-IS into EIGRP on the boundary route per the following requirements:

    1. Seed metric for EIGRP must have the following characteristics:

    Bandwidth=512 Kbps

    2. Delay=100 Read the rest of this entry »

    Topics: 642-901 Exam, CCNP | 4 Comments »

    CCNP BSCI(642-901) Lab – IPv6 OSPF Virtual Link

    By admin | April 14, 2009

    Acme is a small export company that has an existing enterprise network that is runing IPV6 OSPFv3. Currently OSPF is configured on all routers.However, P4S-R4’s loopback address (FEC0:4:4) cannot be seen in P4S-R1’s IPv6 routin table.You are tasked with identifying the cause of this fault and implementing the needed corrective actions that uses OSPF features and does no change the current area assignments. You will know that you have corrected the fault when P4S-R4’s loopback address (FEC0:4:4) can ping from P4S-R1 to P4S-R4 loopback address.

    Special Note: To gain the maximum number of points you must remove all incorrect or unneeded configuration statements related to this issue. Read the rest of this entry »

    Topics: 642-901 Exam, CCNP | 1 Comment »

    CCNP BSCI(642-901) Lab – EIGRP Stub

    By admin | April 14, 2009

    By increasing the first distant office, JS manufactures has extended their business. They antecedently configured the remote office router (P4S-R3) from which they can reach all Corporate subnets. In order to raise network stableness and lower the memory usage and broadband utilization to P4S-R3, JS manufactures makes use of route summarization together with the EIGRP Stub Routing feature. Another network engineer is responsible for the implementing of this solution. However, in the process of configuring EIGRP stub routing connectivity with the remote network devices off of P4S-R3 has been missing.

    Presently JS has configured EIGRP on all routers in the network P4S-R2, P4S-R3, and P4S-R4. Your duty is to find and solve the connectivity failure problem with the remote office router P4S-R3. You should then configure route summarization only to the distant office router P4S-R3 to complete the task after the problem has been solved.

    The success of pings from P4S-R2 to the P4S-R3 LAN interface proves that the fault has been corrected and the he P4S-R3 IP routing table only contains 2 10.0.0.0 subnets. Read the rest of this entry »

    Topics: 642-901 Exam, CCNP | No Comments »

    Spanning-Tree Protocol (STP) – II

    By admin | April 13, 2009

    STP States

    To participate in STP, each port of a switch must progress through several states. A port begins in a Disabled state moving through several passive states and finally into an active state if allowed to forward traffic. The STP port states are: Disabled, Blocking, Listening, Learning, and Forwarding.

    . Ports that are administratively shut down by the network administrator or by the system due to a fault condition are in the Disabled state. This state is special and is not part of the normal STP progression for a port.

    . After a port initializes, it begins in the Blocking state so that no bridging loops can form. In the Blocking state, a port cannot receive or transmit Read the rest of this entry »

    Topics: CCNA, CCNA Articles, CCNA R&S | No Comments »

    Spanning-Tree Protocol (STP) – I

    By admin | April 13, 2009

    A Layer 2 switch, which functions as a transparent bridge, offers no additional links for redundancy purposes. To add redundancy, a second switch must be added. Now two switches offer the transparent bridging function in parallel. LAN designs with redundant links introduce the possibility that frames might loop around the network forever. These looping frames would cause network performance problems. For example, when the switches receive an unknown unicast, both will flood the frame out all their available ports, including the ports that link to the other switch, resulting in what is known as a bridging loop, as the frame is forwarded around and around between two switches. This occurs because parallel switches are unaware of each other. The Spanning Tree Protocol (STP), which allows the redundant LAN links to be used while preventing frames from looping around the LAN indefinitely through those redundant links, was developed to overcome the possibility of bridging loops. It enables switches to become aware of each other so that they can negotiate a loop-free path through the network. Loops are discovered before they are opened for use, and redundant links are shut down to prevent the loops from forming. STP is communicated between all connected

    Read the rest of this entry »

    Topics: CCNA, CCNA Articles, CCNA R&S | No Comments »

    Manage Cisco IOS

    By admin | April 13, 2009

    Configuring Cisco IOS

    Configuration mode is one of the modes for the Cisco CLI. It is similar to user mode and privileged mode. User mode allows commands that are not disruptive to be issued, with some information being displayed to the user. Privileged mode supports a superset of commands compared to user mode. However, none of the commands in user or privileged mode changes the configuration of the router. Configuration mode is another mode in which configuration commands are typed.

    Commands typed in configuration mode update the active configuration file. These changes to the configuration occur immediately each time you press the Enter key at the end of a command. Configuration mode itself contains a multitude of subcommand modes. The type of command Read the rest of this entry »

    Topics: CCNA, CCNA Articles, CCNA R&S | No Comments »

    Cisco IOS Overview

    By admin | April 13, 2009

    Cisco routers run the Cisco Internetworking Operating System (IOS) with a command-line interface (CLI). The IOS also runs on some Cisco switch models, and it uses CLI. However, in some cases, the IOS CLI on a switch is slightly different than on a router. Furthermore, the IOS on the 1900 series switches is slightly different than on some other Cisco IOS-based switches.

    Cisco IOS Software Command-Line Interface

    The majority of Cisco routers run Cisco IOS Software with the command-line interface (CLI). The CLI is used to interface with the device and send commands to the device. This is achieved through the use of a terminal, a terminal emulator, or a Telnet connection. Some routing cards, such as the Multilayer Switch Feature Card (MSFC) daughter card for the Catalyst 6000 series LAN switches, also run Cisco IOS Software. Understanding the Cisco IOS Software CLI is as fundamental to supporting routers. Read the rest of this entry »

    Topics: CCNA, CCNA Articles, CCNA R&S | No Comments »

    Wireless Networks

    By admin | April 13, 2009

    Conventional Ethernet networks require cables connected computers via hubs and switches. This has the effect of restricting the computer’s mobility and requires that even portable computers be physically connected to a hub or switch to access the network. An alternative to cabled networking is wireless networking. The first wireless network was developed at the University of Hawaii in 1971 to link computers on four islands without using telephone wires. Wireless networking entered the realm of personal computing in the 1980s, with the advent to networking computers. However, it was only in the early 1990s that wireless networks started to gain momentum when CPU processing power became sufficient to manage data transmitted and received over wireless connections.

    Wireless networks use network cards, called Wireless Network Adapters, that rely radio signals or infrared (IR) signals to transmit and receive data via a Wireless Access Point (WAP). The WAP uses has an RJ-45 port that can be attached to attach to a 10BASE-T or 10/100BASE-T Ethernet

    Read the rest of this entry »

    Topics: CCNA, CCNA Articles, CCNA R&S | No Comments »

    Bridging and Swtiching

    By admin | April 13, 2009

    Bridging is used to connect two network segments. This alleviates congestion problems on a single Ethernet segment and extends allowed cabling distances because the segments on each side of the bridge conformed to the same distance limitation as a single segment. This bridge is called “transparent bridging” because the end-point devices do not need to know that the bridge exists.

    Transparent bridges forward frames only when necessary and, thus, reduces network overhead. To accomplish this, transparent bridges learning MAC addresses by examining the source MAC address of each frame received by the bridge; decides when to forward a frame or when to filter a frame, based on the destination MAC address; and creates a loop-free environment with other bridges by using the Spanning Tree Protocol.

    Generally, broadcasts and multicast frames are forwarded by the bridge in networks that use bridges. In addition, transparent bridges perform Read the rest of this entry »

    Topics: CCNA, CCNA Articles, CCNA R&S | No Comments »