Junos On ESXi

Hello All,

I recently started learning Jun OS. The best way to learn is by practice, practise and practise.

In this post I will show how to set up JunOS on ESXI for labbing. In my other post I will provide with the different labs am doing on this topology.

Once you have ESXi 5.5 up and running download the junos-vsrx-12.1X46-D20.5-domestic.ova or firefly-perimeter-junos-vsrx-12.1X47-D10.4-domestic.ova.

Note that you will need to use your login to download. Juniper allows a user to create a new account and then you can download the firefly perimeter software.

In my setup I am deploying junos-vsrx-12.1X46-D20.5-domestic.ova.

Once the download is complete you need to open your vSphere Client and connect to your ESXi server. Once connected select the Deploy OVF Template option from the file menu.

Featured image

Select the source of the OVA file you downloaded from your local machine.

Featured image

The next screen should be similar to the one below after the source has been selected.

Featured image

Featured image

Read and accept the end user license

Featured image

The next screen will display the name for the virtual machine. You can change this if you would like

Featured image

I am providing the name as Jun-OS-1 as I will be deploying 8 of these and 2 Cisco CSR 1000v for labbing.

Now you need to select the datastore

Featured image

Next you will be offered the select the disk format. The default option of Thick Provision Lazy Zeroed is fine but for better performance you can select Thick Provision Eager Zeroed. To read more on the options go here.

Featured image

The next screen will ask you for the mappings for the Gigabit Ethernet interfaces that are defined in the OVF file. Just select the default here for now and we’ll come back to them after our machine is installed as we need to make a couple other changes anyways that can’t be done here.

Featured image

The next screen will be a summary screen so just click finish and then VMWare will start importing the OVA file.

Featured image

Featured image

Featured image

Featured image

Featured image

It may take a few minutes to import depending on the connection speed between your vSphere client and the ESXi server.

Once your machine uploaded you can then edit the settings.

Two things we want to do here. First is that we want to alter the Network Adapter settings if needed and add a serial port so that we can use the virtual serial on the JunOS. This functionality (network based serial port) requires the Enterprise version of ESXi 5.1. I would recommend that you use the demo version which gives you 59 days unless you have to reinstall the demo

Featured image

Add the serial port

Featured image

Select “Connect via Network”

Featured image

Now here is where you want to select “Server” and then enter the IP address of the ESXi server along with the TCP port you want to assign to this machine. Also check “Connect at power on”.

Featured image

Featured image

You will need to alter the default security settings for the ESXi server to allow TCP port 9011 or whatever port you selected to allow you to telnet to the JunOS serial port. To alter the security settings go to the ESXi’s configuration and then select “Security Profile”

Featured image

Featured image

Here you will need to allow TCP port 9011 or if you are in a lab environment just select “VM serial port connected over network” which will open up all TCP high ports. Now telnet to the IP address of the ESXi machine and port number you entered for the serial port and you should see the router booting.

Featured image

I will be deploying 8 devices so I will clone them.

To clone the machine go to the server configuration tab and then select the datastore where you installed the JunOS onto and then right click on it. From there select “Browse Datastore…”

Featured image

From here go under the directory for the JunOS-1 and copy the contents of the directory. From there click on the root of the datastore and then select the folder icon to add a new directory

Featured image

Enter the directory name and then paste the contents into the new directory. After it has been pasted in, right click on the “Jun-OS-1.vmx” file and select “Add to Inventory”. Change the default name if you would like and select the “Resource Pool” and finally finish.

Featured image

You should now see the second JunOS in your ESXi server’s inventory. From there we’ll edit the settings to change the TCP port number for the virtual serial port.

Featured image

In my next post I will show you the Logical topology I am building and then I will show you how to configure it for both ipv4 and ipv6 from scratch.

Stay Tuned!!!!!!!!

SWITCHING TOPOLOGY USING CISCO VIOS – Using Vmware WorkStation

In my previous post, I described how to connect 4 switches using ESXi.

As you are aware that Vios-L2 image only takes 384 Mb of Ram ( I have assigned 512 MB) we can build the same topology using Vmware Workstation.

However using Vmware Workstation there can be maximum of 19 Adapters only.

Featured image

In Order to meet the above requirement, we need 13 cables.

We need to go to Vmware Workstation — Edit — Virtual Network Editor.

The very important step here is that we need to add the network making sure we UNSELECT ( Connect a host virtual adapter to this network) and also UNSELECT ( Use Local DHCP Service) and hit apply.

You need to repeat the procedure for number of cables you need in your topology. I did this for 13 times.Featured image

Featured image

Below are the screen shots of my network adapter settings from the 4 switches :

Featured image

Featured image

Featured image

Once you do the above settings and start the switches

Featured image

Featured image

Featured image

Featured image

Below is the network Diagram for the same.

Featured image

Hope this helps!!!!!

Cable Connection’s on ESXI – Switching Topology using Cisco Vios

Today, I will show you how to make cable connection between the switches using ESXi.

I could not find a proper document and hence I thought I will write this article so that this might help the other engineers  using ESXi to build the virtual topologies more effectively.

I am using Vios-L2 image for this demo. Please do not ask me for this image and I am not going to SHARE this.

I am currenlty labbing from the Narbik Workbook.  Please visit http://www.micronicstraining.com/ for their Workbook material.

Featured image

I am going to show you how you can make the above topology virtually. The CCIE R n S version 5 is Vitual and hence I thought of implementing the same.

Looking at the above diagram, we see that we would need 4 x Virtual-Switches and 13 cables to interconnect them.

Let’s get Started

First we will create cable connection so that we can connect between the switches.

In order to do that, select ESXi host and then go to Configuration tab and then click Add Networking as shown below.

Featured image

Featured image

Once you click Add Networking, follow the below procedure as shown below.

Featured image

Select Virtual Machine and click NEXT

Featured image

Make sure you un-select the VMNIC-0 as we just need a cable type connection so that we can connect two switches.

Featured image

Once you un-select, hit Next.

Featured image

Give a meaning Full Name to the Network Label and Select Vlan-ID (4095) and hit Next.Featured image

Now Click FINISH.

If you look under the configuration tab, you will see that the network connection is created and there is no adapters connected to it.

Featured image

Using the above procedure, I have created 13 such connections.

I have connected 4 switches as per the below diagram.

Featured image

If we examine the Network adapter settings for Sw-1, you should set it like below.

Featured image

SW-2 Network Adapter settings :

Featured image

SW-3 Network Adapter settings :

Featured image

SW-4 Network Adapter settings :

Featured image

Please note that the network adapters on these switches starts from G0/0 onwards.

Network Adapter 1 indicates its G0/0,

Network Adapter 2 indicates its G0/1,

Network Adapter 3 indicates its G0/2,

Network Adapter 4 indicates its G0/3,

Network Adapter 5 indicates its G1/0,

Network Adapter 6 indicates its G1/1,

Network Adapter 7 indicates its G1/2,

Network Adapter 8 indicates its G1/3,

Network Adapter 9 indicates its G2/0,

Network Adapter 10 indicates its G2/1.

As per my Understanding Cisco Vios images supports upto 10 Network Adapters. I might be wrong.

Let me start the switches and see what show CDP neighbor tells us 🙂

On SW-1 :

Featured image

On SW-2

Featured image

On SW-3

Featured image

On SW-4

Featured image

I will write another post in future with all the labs I do successfully on Vios-L2.

If you are using Vmware WorkStation then you can only make 19 connections and that is the maximum it supports.

I believe ESXi supports 120 connections which is more than enough for us to do the labs.

Avaya’s Ether Channel

Ether channel is a technology that lets you bundle multiple physical links into a single logical link.

We’ll take a look at how it works and what the advantages of ether channel are.

I have two switches and two computers connected to the switches.mlt-1aThe computers are connected with 1000 Mbit interfaces while the link between the switches is only 100 Mbit.

If one of the computers would send traffic that exceeds 100 Mbit of bandwidth we’ll have congestion and traffic will be dropped.

There are two solutions to this problem:

Replace the link in between the switches with something faster, 1000Mbit or maybe even 10 gigabit if you feel like.

In the below diagram you can see that I have added 3x 1000 MB links.

mlt-1b

The problem with this setup is that we have a loop so spanning tree would block 2 out of 3 links.

This is where we will use Ether Channel to bundle multiple physical links and make them appear as a single Logical Link.

Below diagram show that 3 are bundled them using MLT ( Ether channel) resulting in one logical link with speed of 3000 MB.

mlt-1

There are 3 ways of configuring ether channel.

  • LACP which is Industry Standard protocol i.e. supported on all vendor switches.
  • PAGP – Port Aggregation Protocol (Cisco proprietary)
  • Multi-Link Trunking (MLT)-(Avaya (Nortel) proprietary protocol).

MLT (MultiLink Trunk) a proprietary bonding protocol to bond two or more physical links into a single virtual link between two switches.

DMLT (Distributed MultiLink Trunk) a proprietary bonding protocol to bond two or more physical links into a single virtual link across multiple cards or switches (in a stack configuration) between two switches.

An MLT/DMLT is Avaya’s proprietary equivalent to Cisco’s EtherChannel feature. An Avaya MLT or DMLT configuration can interoperate with Cisco’s EtherChannel configuration.

 

Deep Dive into MLT

  • MultiLink Trunking (MLT) is a point-to-point connection that aggregates multiple ports so that they logically act like a single port with the aggregated bandwidth.
  • Grouping multiple ports into a logical link provides higher aggregate throughput on a switch-to-switch or switch-to-server application.
  • MultiLink Trunking provides media and module redundancy.

MLT Types

Regular MLT

  • MLT ports are configured on the same switch or module/blade

DMLT

  • MLT ports are configured on the same box or switch but on a different unit or blade in a stack.

MLT is a method for utilizing multiple physical connections between a given pair of switches, or between a switch and a server with multiple network interface cards (NICs), as a single logical link.

For instance, MLT can make four separate 100 MB links appear as a single 400 MB trunk. Should one of the links fail, the aggregate bandwidth is reduced to 300 MB, but the trunk itself remains up and continues to forward traffic as long as at least one physical connection is available.

Upper-layer protocols view the entire MLT bundle as a single logical interface. For example, if the Routing Information Protocol (RIP) learns a new route on one of the ports in the trunk, the next hop interface is the trunk itself. The actual port chosen for forwarding is transparent to Internet Protocol (IP) and RIP. This learning rule also applies to a media access control (MAC) address learned on a port in the trunk; the MAC address is identified in the forwarding database as being learned on the MLT.

When the time comes to forward a packet on a trunk, MLT chooses the physical port by performing a calculation on the addresses in the packet. Since many applications require that packets in a given session arrive in sequence, MLT consistently uses the same path for any given source/destination addresses pair. MLT does not keep track of sessions, however; it simply applies the same path selection algorithm to each packet, and the same addresses always yield the same path. For bridged traffic, the algorithm uses the MAC addresses. For routed IP or IPX traffic, the network layer addresses are used.

How Does MLT Work?

Forwarding Algorithm

The MLT forwarding algorithms are intended to provide load sharing while ensuring that packets do not get re-ordered and therefore do not arrive at the destination out of sequence. The algorithm ensures that packets with the same source and destination utilize the same path of the MLT.

Layer 2 Forwarding

When a data-frame is to be forwarded at Layer 2 (L2), the port to be used in the MLT group is determined by a combination of the source and destination MAC addresses of the data-frame. The six least significant bits of the source and destination MAC addresses are passed through an XOR calculation. The result of the XOR is divided by the number of active links in the MLT. The remainder of the division operation is used to determine the port number to be used to forward the Ethernet frame, where each port in the MLT is numbered in sequence starting at 0.

Layer 3 Forwarding

For Layer 3 (L3) forwarding, the source and destination IP/IPX addresses are used. All traffic for a session uses the same path in any given direction, assuring in-sequence delivery. However, multiple outbound sessions to the same server from different sources are distributed among the links. The algorithm for Layer 3 forwarding is the same as Layer 2 except the least significant bits of the Layer 3 source and destination address are used

Forwarding Algorithm

Frame Forwarding

L2 forwarding:

  • Uses source and destination MAC addresses

L3 forwarding:

Uses source and destination IP/IPX addresses

Address based path selection ensures in-sequence packet delivery

 

MLT provides the following benefits:

  • Bandwidth may be deployed in finer increments.
  • Aggregate trunk speeds up to 8 Gigabits (16 Gigabit aggregate full duplex)
  • Port and module redundancy
  • Little or no convergence time when adding or removing links.
  • Protocol traffic (STP, RIP, Open Shortest Path First (OSPF), etc.) is per trunk rather than per link, reducing overhead

 

MLT Protocol

The assignment of switch ports to an MLT is manually configured on the two Switches at each end of an MLT. When the switch at either end of an MLT transmits a Spanning Tree BPDU on the MLT, it is required to transmit identical copies of the BPDU on each link that is assigned to the MLT.

The transmission of BPDUs on each link permits the switches to confirm that the MLT is properly connected between the two switches; e.g. all links of the MLT are connected between the same two switches. The Port Identifier parameter of Configuration BPDU’s is set to the Port Identifier of the highest priority port that is configured to belong to the MLT on the Designated Bridge (Port Identifier with the lowest numerical value), even if it is determined that the port is not operational.

The switches at each end of an MLT rely upon media dependent mechanisms, such as Auto-negotiation and Far End Fault detection and indication, to detect problems that might occur on one of the links of an MLT. When a link is found to be bad, the switches at each end of the MLT remove it from the MLT

Limitations

All ports in an MLT must be of the same:

  • Media type (copper or fiber)
  • Same speed
  • Duplex settings.
  • All ports in an MLT must be in the same spanning tree group, unless they are tagged; then they can belong to multiple STGs.
  • VLANs membership and tagging if applicable

MLT and Spanning Tree

Ports within a MLT behave as follows:

  • All ports in the MLT must belong to the same Spanning Tree Group (STG) (if Spanning Tree is enabled).
  • Identical Bridge Protocol Data Units (BPDUs) are sent out each port.
  • The MLT Port ID is the ID of the lowest numbered port.
  • If identical BPDUs are received on all ports, the MLT mode is forwarding.
  • If no BPDU is received on a port or if BPDU tagging and port tagging do not match, the individual port is taken offline.
  • Path cost is inversely proportional to the active MLT bandwidth (by default or configured by user).

 

Configuration :

 Configuration of an MLT is very very simple. Its just a 5 step procedure.

  1. Mlt 1 disable ———————— —–à By default it is disabled.
  2. Mlt 1 name Trunk-server————–à“ Description of this Trunk”
  3. MLt 1 learning enable/disable——–à ( Spanning Tree Enable or Disable)
  4. Mlt 1 member 1,2 ————————à( port numbers in that bundle)
  5. Mlt 1 enable——————————–à Enabling the trunk.

Note**: If you want the trunk links to be tagged then you need to configure the ports which are in the trunk to be tagged. This can be achieved via the below command.

Vlan ports 1,2 tagging tagAll

ON IST/SMLT ports we disable Spanning tree. I will write a separate article on IST/SMLT later.

Sample configuration and output from my Switch:

5k-Core1#show running-config module mlt
! Embedded ASCII Configuration Generator Script
! Model = Ethernet Routing Switch 5530-24TFD
! Software version = v6.3.3.040
!
! Displaying only parameters different to default
!================================================
enable
configure terminal
!
! *** MLT (Phase 1) ***
!
mlt 1 name “MLT-4-IST” enable member 23-24
!
! *** MLT (Phase 2) ***
!
mlt spanning-tree 1 stp 1 learning disable

5k-Core1#show mlt ?
Parameters:
LINE                       List of Trunk Groups
shutdown-ports-on-disable  Display disabled trunk loop prevention status
spanning-tree              Display multi-link trunk spanning-tree settings
utilization                Display multi-link trunk utilization.
<cr>

5k-Core1#show mlt 1
Id Name             Members                Bpdu   Mode           Status  Type
— —————- ———————- —— ————– ——- ——
1  MLT-4-IST        23-24                  All    Basic          Enabled Trunk

5k-Core1#show mlt utilization 1

Trunk   Traffic Type   Port   Last 5 Minutes  Last 30 Minutes   Last Hour
—–   ————   —-   ————–  —————   ———
1     Rx and Tx        23       0.0%             0.0%             0.0%
1     Rx               23       0.0%             0.0%             0.0%
1     Tx               23       0.0%             0.0%             0.0%
1     Rx and Tx        24       0.0%             0.0%             0.0%
1     Rx               24       0.0%             0.0%             0.0%
1     Tx               24       0.0%             0.0%             0.0%

5k-Core1#show mlt spanning-tree 1
STP Group    STP Learning
———    ————
1            Disabled

Understanding INE Logical Topology and configuration.

We will be doing the base configuration for INE Topology for CCIE RnS. If you haven’t purchase INE workbooks, go for it. Its really worth .

Below is the logical topology. Image

 

I am using the Web IOU for configuring it. I have connected to all the devices, did bring up all the ports and configured hostnames only.

We will draw the diagram based on the outputs.

Note : This also helps a lot in real time customer’s network as most of the customer’s do not have the network diagram updated.

We will execute the command show cdp neighbors on all devices and will draw the diagram.

Rack1SW1#show cdp nei
Capability Codes: R – Router, T – Trans Bridge, B – Source Route Bridge
S – Switch, H – Host, I – IGMP, r – Repeater, P – Phone,
D – Remote, C – CVTA, M – Two-port Mac Relay

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID
Rack1SW4         Eth 4/0           137              R S   Linux Uni Eth 2/0
Rack1SW4         Eth 4/1           137              R S   Linux Uni Eth 2/1
Rack1SW4         Eth 4/2           137              R S   Linux Uni Eth 2/2
Rack1SW2         Eth 2/0           137              R S   Linux Uni Eth 2/0
Rack1SW2         Eth 2/1           137              R S   Linux Uni Eth 2/1
Rack1SW2         Eth 2/2           137              R S   Linux Uni Eth 2/2
Rack1SW3         Eth 3/0           137              R S   Linux Uni Eth 2/0
Rack1SW3         Eth 3/1           137              R S   Linux Uni Eth 2/1
Rack1SW3         Eth 3/2           137              R S   Linux Uni Eth 2/2
Rack1R1          Eth 0/1           171               R    Linux Uni Eth 0/0
Rack1R3          Eth 0/3           173               R    Linux Uni Eth 0/0
Rack1R5          Eth 1/1           177               R    Linux Uni Eth 0/0

The above output is execute on Switch 1. The Device ID shows the host-name of the neighboring device. Local Interface refers to the port on the device where the command was executed. In this example it is switch 1. Port ID refers to the neighboring device port.

Looking at the first 3 line, it says Switch1 is connected to Switch 4 via ethernet 4/0,e4/1,e4/2.

||SW-1||–e4/0————-e2/0–||Sw4||

||SW-1||–e4/1————-e2/1–||Sw4||

||SW-1||–e4/2————-e2/2–||Sw4||

Similarly,

||SW-1||–e2/0————-e2/0–||Sw2||

||SW-1||–e2/1————-e2/1–||Sw2||

||SW-1||–e2/2————-e2/2–||Sw2||

and

||SW-1||–e3/0————-e2/0–||Sw3||

||SW-1||–e3/1————-e2/1–||Sw3||

||SW-1||–e3/2————-e2/2–||Sw3||

So in Total we have 9 links from SW1 to other switches respectively. These 9 links would be configured as Trunk because we want the many vlans to be travel across these links.

We also have 3 links connecting to Routers R1,R3 and R5 via e0/1,e0/3 and e0/5 to their e0/0 ports.

||SW-1||–e0/1————-e0/0–||R1||

||SW-1||–e0/3————-e0/0–||R3||

||SW-1||–e0/5————-e0/0–||R5||

Similarly you can draw the complete the diagram following the above. I have pasted the outputs from SW2,SW3 and SW4 respectively.

Rack1SW2#show cdp nei
Capability Codes: R – Router, T – Trans Bridge, B – Source Route Bridge
S – Switch, H – Host, I – IGMP, r – Repeater, P – Phone,
D – Remote, C – CVTA, M – Two-port Mac Relay

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID
BB2              Eth 0/0           167               R    Linux Uni Eth 0/0
Rack1SW4         Eth 4/0           165              R S   Linux Uni Eth 3/0
Rack1SW4         Eth 4/1           165              R S   Linux Uni Eth 3/1
Rack1SW4         Eth 4/2           165              R S   Linux Uni Eth 3/2
Rack1SW3         Eth 3/2           165              R S   Linux Uni Eth 3/2
Rack1SW3         Eth 3/1           165              R S   Linux Uni Eth 3/1
Rack1SW3         Eth 3/0           165              R S   Linux Uni Eth 3/0
Rack1SW1         Eth 2/1           165              R S   Linux Uni Eth 2/1
Rack1SW1         Eth 2/2           165              R S   Linux Uni Eth 2/2
Rack1SW1         Eth 2/0           165              R S   Linux Uni Eth 2/0
Rack1R2          Eth 0/2           158               R    Linux Uni Eth 0/0
Rack1R4          Eth 1/0           140               R    Linux Uni Eth 0/0
Rack1R6          Eth 1/2           132               R    Linux Uni Eth 0/0

Rack1SW3#show cdp nei
Capability Codes: R – Router, T – Trans Bridge, B – Source Route Bridge
S – Switch, H – Host, I – IGMP, r – Repeater, P – Phone,
D – Remote, C – CVTA, M – Two-port Mac Relay

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID
BB3              Eth 0/0           131               R    Linux Uni Eth 0/0
Rack1SW4         Eth 4/0           150              R S   Linux Uni Eth 4/0
Rack1SW4         Eth 4/1           150              R S   Linux Uni Eth 4/1
Rack1SW4         Eth 4/2           150              R S   Linux Uni Eth 4/2
Rack1SW2         Eth 3/2           150              R S   Linux Uni Eth 3/2
Rack1SW2         Eth 3/1           150              R S   Linux Uni Eth 3/1
Rack1SW2         Eth 3/0           150              R S   Linux Uni Eth 3/0
Rack1SW1         Eth 2/2           150              R S   Linux Uni Eth 3/2
Rack1SW1         Eth 2/1           150              R S   Linux Uni Eth 3/1
Rack1SW1         Eth 2/0           150              R S   Linux Uni Eth 3/0
Rack1R5          Eth 1/1           148               R    Linux Uni Eth 0/1

Rack1SW4#show cdp nei
Capability Codes: R – Router, T – Trans Bridge, B – Source Route Bridge
S – Switch, H – Host, I – IGMP, r – Repeater, P – Phone,
D – Remote, C – CVTA, M – Two-port Mac Relay

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID
Rack1SW2         Eth 3/1           144              R S   Linux Uni Eth 4/1
Rack1SW2         Eth 3/2           144              R S   Linux Uni Eth 4/2
Rack1SW2         Eth 3/0           144              R S   Linux Uni Eth 4/0
Rack1SW3         Eth 4/0           144              R S   Linux Uni Eth 4/0
Rack1SW3         Eth 4/1           144              R S   Linux Uni Eth 4/1
Rack1SW3         Eth 4/2           144              R S   Linux Uni Eth 4/2
Rack1SW1         Eth 2/2           144              R S   Linux Uni Eth 4/2
Rack1SW1         Eth 2/1           144              R S   Linux Uni Eth 4/1
Rack1SW1         Eth 2/0           144              R S   Linux Uni Eth 4/0
Rack1R4          Eth 1/0           176               R    Linux Uni Eth 0/1

The resulting diagram would be referred as Physical Diagram. See Below :I made this diagram using GNS3.Image

Comparing it with the logical diagram we see that  R1 E0/0 should be part of VLAN 146. So port E0/1 on SW1 should be an access port and member of VLAN 146. Traffic comming on port E0/1 on SW1 would be tagged as VLAN 146.

On SW1 we also have R5 0/0 connected to port E0/5. As per logical Diagram this should be in VLAN 5.

Port 0/3 on SW1 is a Routed Port. Hence we need to issue no switchport command under the interface and assign an IP address.

 

we see that R1 e0/0, R4 e0/1 and R6 e0/0  are part of VLAN 146.

So looking at the physical connections we just made, we see that on SW1 port e0/1 should be part of VLAN 146, SW4 E1/0 and SW2 e1/2 should be access ports belonging to VLAN 146.

There’s is a Catch!!! Watch closely…In the logical Diagram R6 E0/0 has 2 sub interface and these sub interfaces are in 2 different VLANS 🙂

That’s a Router ON a Staick Concept!!.

Its Simple :

On R6 :

int e0/0

no shutdown

exit

int e0/0.146 =====>Sub Interface number can be anything. We just give 146 here which is matching our Vlan number.

encapsulation dot1q 146

ip add 155.1.146.1 255.255.255.0

no shut

exit

int e0/0.67

encapsulation dot1q 67

ip add 155.1.67.6 255.255.255.0

no shut

exit

Sw1 E1/2 connects to R6 E0/0. Earlier we configured E1/2 as member of VLAN 146. Now we see that from the same interface we are receiving tagged packets i.e vlan 146 and Vlan 67. Hence this port should be TRUNK port.

On All Switches, we have ports E2/0-2, E3/0-2,E4/0-2 connecting to other switches. As a result we will be configuring these ports as Trunk Ports.

ON ALL Switches :

conf t

int range E2/0-2, E3/0-2,E4/0-2

Shutdown

exit

conf t

int range E2/0-2, E3/0-2,E4/0-2

Switchport trunk encap dot1q  ————-> Using Dot1q encapsulation as ISL does not work on IOU.

switchport mode trunk ——> Hard Coding to be as  Trunk ports.

exit

and on SW1

int e1/2

Switchport trunk encap dot1q

switchport mode trunk

exit

conf t

int range E2/0-2, E3/0-2,E4/0-2

No Shutdown

exit

Total VLANS used in this network topology : VLan 5,7,8,9,10,22,43,58,67,79,146
We will configure all these vlans on all the Switches.

On ALL SWITCHES:

en

conf t

Vlan 5,7,8,9,10,22,43,58,67,79,146

exit

Vlan Port configuration :SO

Some output Omitted

SW1#sh run int e1/1

interface Ethernet1/1
switchport access vlan 58
switchport mode access
duplex auto
spanning-tree portfast
end

Rack1SW1#sh run int e0/1

interface Ethernet0/1
switchport access vlan 146
switchport mode access
duplex auto
spanning-tree portfast
end

Rack1SW2#sh run int e0/0
!
interface Ethernet0/0
switchport access vlan 22
switchport mode access
duplex auto
spanning-tree portfast
end

Rack1SW2#sh run int e0/2

!
interface Ethernet0/2
switchport access vlan 22
switchport mode access
duplex auto
spanning-tree portfast
end

Rack1SW2#sh run int e1/0

!
interface Ethernet1/0
switchport access vlan 43
switchport mode access
duplex auto
spanning-tree portfast
end

Rack1SW3#sh run int e0/0

!
interface Ethernet0/0
switchport access vlan 43
switchport mode access
duplex auto
spanning-tree portfast
end

Rack1SW4#sh run int e1/0

!
interface Ethernet1/0
switchport access vlan 146
switchport mode access
duplex auto
spanning-tree portfast
end

So far we did

  • Draw the diagram with the help of Show CDP neighbor command
  • Configured Trunks
  • Created VLANs and assigned ports to the VLans.

Now its time to assign IP address to the Devices and ping Directly connected interfaces to confirm  if our Layer 1 and Layer 2 is UP and Running.

Its really important to have the complete understanding of the network Topology.  INE has many labs on individual technology and all of them are based on this Network Diagram. They Use 6 Routers and 4 Switches.

You will notice that INE is using 155.x.y.z network in their topology.

X represents the RACK Number. In this case it is 1.

Y represents the numbering(Connection) between the devices. For ex: Link connects between R2 and R3 then Y would be 23.

It connection between R1,R4 and R6 then Y=146 etc.

Z represents the Router(Device) Number.

R1–1

R2–2

R3–3

R4–4

R5 — 5

R6 — 6

SW1 – 7

SW2 – 8

SW3 – 9

SW4 — 10

 

Now If you look at the above numbering you will find it very easy understanding the IP address used in the network. If connection between R6 and SW1 then the Ip subnet would be 155.1.67.z ( On R6 z=6 and on SW1 z=7).

So looking at the Logical Topology we need to configure the below IP address on the Devices. All the IP address subnet mask is /24.

On R1

Ethernet0/0—>155.1.146.1/24
Serial1/0—>155.1.0.1/24
Serial1/0.1–>155.1.0.1/24
Serial1/1—>155.1.13.1/24
Loopback0–>150.1.1.1/24

on R2

Ethernet0/0–>192.10.1.2/24
Serial1/0–>155.1.0.2/24
Serial1/0.1–>155.1.0.2/24
Serial1/1–>155.1.23.2/24
Loopback0–>150.1.2.2/24

R3

Ethernet0/0–>155.1.37.3
Serial1/0–>  155.1.0.3
Serial1/0.1–>155.1.0.3
Serial1/2–>  155.1.13.3
Serial1/3–>  155.1.23.3
Loopback0–>  150.1.3.3

R4

Ethernet0/0–>204.12.1.4
Ethernet0/1–>155.1.146.4
Serial1/0–>  155.1.0.4
Serial1/0.1–>155.1.0.4
Serial1/1–>  155.1.45.4
Loopback0–>  150.1.4.4

R5

Ethernet0/0–>155.1.58.5
Ethernet0/1–>155.1.5.5
Serial1/0–>  155.1.0.5
Serial1/1–>  155.1.45.5
Loopback0–>  150.1.5.5

R6
Ethernet0/0.67–>155.1.67.6
Ethernet0/0.146–>155.1.146.6
Serial1/0–>  54.1.1.6
Loopback0–>  150.1.6.6
SW1
Ethernet0/3–>155.1.37.7
Loopback0–>  150.1.7.7
Vlan7–>      155.1.7.7
Vlan67–>     155.1.67.7
Vlan79–>     155.1.79.7

SW2
Interface–>  IP-Address
Ethernet4/0–>155.1.108.8
Loopback0–>  150.1.8.8
Vlan8–>      155.1.8.8
Vlan58–>     155.1.58.8

SW3
Loopback0–>  150.1.9.9
Vlan9–>      155.1.9.9
Vlan79–>     155.1.79.9

SW4
Ethernet3/0–>155.1.108.10
Loopback0–>  150.1.10.10
Vlan10–>     155.1.10.10

Verification :

Rack1SW1#show mac address-table
Mac Address Table
——————————————-

Vlan    Mac Address       Type        Ports
—-    ———–       ——–    —–
58    aabb.cc00.0500    DYNAMIC     Et1/1
58    aabb.cc80.0800    DYNAMIC     Et2/0
146    aabb.cc00.0100    DYNAMIC     Et0/1
146    aabb.cc00.0410    DYNAMIC     Et4/0
146    aabb.cc00.0600    DYNAMIC     Et2/0
5    aabb.cc00.0510    DYNAMIC     Et3/0
8    aabb.cc80.0800    DYNAMIC     Et2/0
9    aabb.cc80.0900    DYNAMIC     Et3/0
10    aabb.cc80.0a00    DYNAMIC     Et4/0
22    aabb.cc00.0200    DYNAMIC     Et2/0
22    aabb.cc00.0c00    DYNAMIC     Et2/0
43    aabb.cc00.0400    DYNAMIC     Et2/0
43    aabb.cc00.0d00    DYNAMIC     Et3/0
67    aabb.cc00.0600    DYNAMIC     Et2/0
79    aabb.cc80.0900    DYNAMIC     Et3/0
Total Mac Addresses for this criterion: 15

 

Rack1SW2#show mac address-table
Mac Address Table
——————————————-

Vlan    Mac Address       Type        Ports
—-    ———–       ——–    —–
22    aabb.cc00.0200    DYNAMIC     Et0/2
22    aabb.cc00.0c00    DYNAMIC     Et0/0
43    aabb.cc00.0400    DYNAMIC     Et1/0
43    aabb.cc00.0d00    DYNAMIC     Et2/0
1    aabb.cc00.0600    DYNAMIC     Et1/2
5    aabb.cc00.0510    DYNAMIC     Et2/0
7    aabb.cc80.0700    DYNAMIC     Et2/0
9    aabb.cc80.0900    DYNAMIC     Et2/0
10    aabb.cc80.0a00    DYNAMIC     Et2/0
58    aabb.cc00.0500    DYNAMIC     Et2/0
67    aabb.cc00.0600    DYNAMIC     Et1/2
67    aabb.cc80.0700    DYNAMIC     Et2/0
79    aabb.cc80.0700    DYNAMIC     Et2/0
79    aabb.cc80.0900    DYNAMIC     Et2/0
146    aabb.cc00.0100    DYNAMIC     Et2/0
146    aabb.cc00.0410    DYNAMIC     Et2/0
146    aabb.cc00.0600    DYNAMIC     Et1/2
Total Mac Addresses for this criterion: 17
Rack1SW2#

 

Rack1SW3#show mac address-table
Mac Address Table
——————————————-

Vlan    Mac Address       Type        Ports
—-    ———–       ——–    —–
5    aabb.cc00.0510    DYNAMIC     Et1/1
43    aabb.cc00.0400    DYNAMIC     Et2/0
43    aabb.cc00.0d00    DYNAMIC     Et0/0
7    aabb.cc80.0700    DYNAMIC     Et2/0
8    aabb.cc80.0800    DYNAMIC     Et2/0
10    aabb.cc80.0a00    DYNAMIC     Et2/0
22    aabb.cc00.0200    DYNAMIC     Et2/0
22    aabb.cc00.0c00    DYNAMIC     Et2/0
58    aabb.cc00.0500    DYNAMIC     Et2/0
58    aabb.cc80.0800    DYNAMIC     Et2/0
67    aabb.cc00.0600    DYNAMIC     Et2/0
67    aabb.cc80.0700    DYNAMIC     Et2/0
79    aabb.cc80.0700    DYNAMIC     Et2/0
146    aabb.cc00.0100    DYNAMIC     Et2/0
146    aabb.cc00.0410    DYNAMIC     Et2/0
146    aabb.cc00.0600    DYNAMIC     Et2/0
Total Mac Addresses for this criterion: 16

Rack1SW4#show mac address-table
Mac Address Table
——————————————-

Vlan    Mac Address       Type        Ports
—-    ———–       ——–    —–
146    aabb.cc00.0100    DYNAMIC     Et2/0
146    aabb.cc00.0410    DYNAMIC     Et1/0
146    aabb.cc00.0600    DYNAMIC     Et2/0
5    aabb.cc00.0510    DYNAMIC     Et2/0
7    aabb.cc80.0700    DYNAMIC     Et2/0
8    aabb.cc80.0800    DYNAMIC     Et2/0
9    aabb.cc80.0900    DYNAMIC     Et2/0
22    aabb.cc00.0200    DYNAMIC     Et2/0
22    aabb.cc00.0c00    DYNAMIC     Et2/0
43    aabb.cc00.0400    DYNAMIC     Et2/0
43    aabb.cc00.0d00    DYNAMIC     Et2/0
58    aabb.cc00.0500    DYNAMIC     Et2/0
58    aabb.cc80.0800    DYNAMIC     Et2/0
67    aabb.cc00.0600    DYNAMIC     Et2/0
67    aabb.cc80.0700    DYNAMIC     Et2/0
79    aabb.cc80.0700    DYNAMIC     Et2/0
79    aabb.cc80.0900    DYNAMIC     Et2/0
Total Mac Addresses for this criterion: 17

Rack1R1#ping 255.255.255.255 repeat 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 155.1.146.6, 3 ms
Reply to request 0 from 155.1.0.5, 116 ms
Reply to request 0 from 155.1.13.3, 7 ms
Reply to request 0 from 155.1.146.4, 5 ms
Reply to request 1 from 155.1.146.4, 2 ms
Reply to request 1 from 155.1.0.5, 39 ms
Reply to request 1 from 155.1.13.3, 6 ms
Reply to request 1 from 155.1.146.6, 2 ms

Rack1R2#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 192.10.1.254, 6 ms
Reply to request 0 from 155.1.0.5, 99 ms
Reply to request 0 from 155.1.23.3, 11 ms
Reply to request 1 from 192.10.1.254, 2 ms
Reply to request 1 from 155.1.0.5, 17 ms
Reply to request 1 from 155.1.23.3, 11 ms

Rack1R3#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 155.1.37.7, 1 ms
Reply to request 0 from 155.1.0.5, 40 ms
Reply to request 0 from 155.1.23.2, 6 ms
Reply to request 0 from 155.1.13.1, 6 ms
Reply to request 1 from 155.1.37.7, 1 ms
Reply to request 1 from 155.1.0.5, 57 ms
Reply to request 1 from 155.1.23.2, 17 ms
Reply to request 1 from 155.1.13.1, 16 ms

Rack1R4#
Rack1R4#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 204.12.1.254, 5 ms
Reply to request 0 from 155.1.0.5, 54 ms
Reply to request 0 from 155.1.146.6, 10 ms
Reply to request 0 from 155.1.146.1, 6 ms
Reply to request 0 from 155.1.45.5, 6 ms
Reply to request 1 from 155.1.146.1, 3 ms
Reply to request 1 from 155.1.0.5, 79 ms
Reply to request 1 from 155.1.45.5, 11 ms
Reply to request 1 from 204.12.1.254, 6 ms
Reply to request 1 from 155.1.146.6, 6 ms

Rack1R5#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 155.1.58.8, 4 ms
Reply to request 0 from 155.1.0.1, 191 ms
Reply to request 0 from 155.1.0.4, 85 ms
Reply to request 0 from 155.1.45.4, 8 ms
Reply to request 1 from 155.1.58.8, 1 ms
Reply to request 1 from 155.1.0.1, 215 ms
Reply to request 1 from 155.1.0.4, 126 ms
Reply to request 1 from 155.1.45.4, 6 ms

Rack1R6#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 155.1.67.7, 2 ms
Reply to request 0 from 54.1.2.254, 88 ms
Reply to request 0 from 54.1.1.254, 88 ms
Reply to request 0 from 54.1.3.254, 88 ms
Reply to request 0 from 155.1.146.4, 2 ms
Reply to request 0 from 155.1.146.1, 2 ms
Reply to request 1 from 155.1.67.7, 3 ms
Reply to request 1 from 54.1.2.254, 104 ms
Reply to request 1 from 54.1.1.254, 104 ms
Reply to request 1 from 54.1.3.254, 104 ms
Reply to request 1 from 155.1.146.4, 4 ms
Reply to request 1 from 155.1.146.1, 3 ms
Rack1R6#

Rack1SW1#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 155.1.37.3, 5 ms
Reply to request 0 from 155.1.79.9, 6 ms
Reply to request 0 from 155.1.67.6, 5 ms
Reply to request 1 from 155.1.37.3, 6 ms
Reply to request 1 from 155.1.67.6, 6 ms
Reply to request 1 from 155.1.79.9, 6 ms

Rack1SW2#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 155.1.108.10, 8 ms
Reply to request 0 from 155.1.58.5, 8 ms
Reply to request 1 from 155.1.108.10, 2 ms
Reply to request 1 from 155.1.58.5, 2 ms

Rack1SW3#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 155.1.79.7, 3 ms
Reply to request 1 from 155.1.79.7, 20 ms

Rack1SW4#ping 255.255.255.255 re 2
Type escape sequence to abort.
Sending 2, 100-byte ICMP Echos to 255.255.255.255, timeout is 2 seconds:

Reply to request 0 from 155.1.108.8, 1 ms
Reply to request 1 from 155.1.108.8, 2 ms

Hope this Helps 🙂