List of files in the download package:Dotnetfx1.1chs.exe ..... ......... Microsoft. Net Framework 1.1 Simplified Chinese versionAdberdr812_zh_cn.exe ....... Adobe Acrobat Reader 8.12 Simplified Chinese versionCcnp_netsim7.02.exe ..... ......... Boson NetSim for CCNP 7.02 English version (note: The latest is version 7.06, but cannot be cracked)Boson NetSim for CCNP 7.06.RAR ...... This is the latest version
CCNP rs Routing switching Direction corresponding Certificate Cisco Certified Senior Network Engineer-CCNP (Cisco Certified Networks Professional) Certification Prerequisites effective CCNA Routing and authentication or any valid CCIE authentication Suitable for people interested in the network industry and have CCNA basic knowledge of the crowd; intends to obtain CCNP
Recently, I searched for the Cisco simulator on the Internet and found that many netsim 7.0 for ccnp attack patches and replacement files are available for download. Therefore, I cannot download them urgently.
The result is:1. download the latest version of boson: 7.06 and 7.02 is hard to find;2. Replace the file with 7.02.3. Although the patch is declared to be used only in version 7.02, the application of the patch in version 7.02 is not normal af
OSPF comprehensive experiment (1)
This experiment mainly describes multiple methods of working on OSPF interfaces.
Lab:
The topology used is the ccnp Standard Edition ,:
Certificate -------------------------------------------------------------------------------------------------------------------------------------
1. Full-Network Access
Since frame relay is fully enabled and fully connected by default in ccnp
[Experimental environment] veryhuo.com
C3640-IK9O3S-M Version 12.4 (10) veryhuo.com
[Tutorial Objective] Lie's Fire Network
The tunnel technology is used to expand the frame relay switch simulated by the router to make up for the insufficient frame relay interface caused by limited router interfaces. Lie-fire-network
[Experiment topology]
Liehuo.net
Veryhuo.com
[Experiment description] liehuo.net
In the experimental environment, because frame relay switches are expensive, we use routers to sim
, check whether the loose 4.4.4.4 to R4 is normal on R1.
R1 # clear IP route *
R1 # Show IP Route
......
1.0.0.0/32 is subnetted, 1 subnets
C 1.1.1.1 is directly connected, loopback0
4.0.0.0/32 is subnetted, 1 subnets
O E2 4.4.4.4 [110/20] via 10.1.13.3, 00:00:01, fastethernet0/0
[110/20] via 10.1.12.2, 00:00:01, fastethernet0/1
10.0.0.0/24 is subnetted, 4 subnets
C 10.1.13.0 is directly connected, fastethernet0/0
C 10.1.12.0 is directly connected, fastethernet0/1
O E2 10.1.24.0 [110/20] via 10.
CCNP Study Notes 4-route part-route control◆ Passive-interface-can be used in rip ospf. In rip, there are two network commands in the Process of ospf, which only receive and not send packets. In the process of ospf, there are two network commands: 1, advertise the route of the network address segment. The mask length is determined by the interface configuration, not the network. For example, network 10.0.0.1 0.0.255 declares the route of 10.0.0.1-254,
1.1.123.3R3:router RIPNo autoNET 1.0.0.0Nei 1.1.123.1-The most secure way to validate is to verify that the R3 can accept R1 routes, and R1 does not accept R3 routesR1:Key Chani TestKey 1Key-string Ciscoint f0/0IP RIP auten mode MD5IP RIP authen key-chain testSho IP roR3:Ken Chani TestKey 2Key-string CiscoSho IP roRIP MD5 Verification principle: Key-id from the top to the next match, if the other side of the key file and their own does not match, it key-id+1 until the same password, if the othe
a DBD messageRa/|\----------I'll start exhange carry your own Routerid------------->RBExchange State-------------here is a summary of my LSDB------------------>Loading State requests each other for what they needLSR----------The routing-------------required for RA >Lsack---------------------------------->Full state then run SPF to generate the routing tableDBD message, how to realize oneself confirm oneself?The DBD field includes 3-bitWhether Init is the initial more if there is a follow-up mes
The same principle as HSRP, two physical devices virtual one IP and MacDifferences from HSRP:1, roleHSRP Active/standbyVRRP Master/backup2, virtual addressHSRP cannot be a virtual network address that already existsVRRP can be a virtual network already exists address3,Hello packet intervalHSRP master ready to send hello; address 224.0.0.2; interval 3s timeout 10sVRRP only Master sends helloInterval 1s timeout 3sMulticast address 224.0.0.184, shootout modeHSRP Manual OpenVRRP is turned on by defa
previously assigned by him does not retract, but instead forwards the data by another AVF (that is, instead of the device responsible for 2 virtual Mac forwarding data)Differentiate between AVG and AVF. AVG uses priority control. AVF using weighting value controlwhen the AVF's uplink interface is down , use track to find also set the weigh value for forwarding invalidation and the weight value for forwarding recoveryTrack 1 int E0/1 Line-protocolint E0/1GLBP 1 Weighting track 1 decrement 20GLBP
each link)4,blok the rest of the mouthRoot Bridge election:Based on bridge ID (preferably small)
Bride Priority 2byte
MAC Address 5byte
Cisco Bridge ID
Bridge Priority 4bit Range 0-15 default =8
Extend SystemID 12bit differentiate VLAN
48bit MAC
The above structure priority is variable but the VLAN number can not be changed, so the whole is increased by 4,096 times times 2~12=4096, because bride the default = 8, all of the def
a full mesh of IBGP peers in each system.
Peer R1 and R2 using loopback address, not their directly connected interfaces.
Advertise all loopback interfaces to the BGP process, except on R2, where the only loopback advertised should is LOOPBAC K 2.
On R2, create a static summary route for the rest of it loopback interfaces nad advertise this static route in BGP.
R4 should send a summary route to ITA representing all the R4 loopback interfaces.
R4 should prefer the path to ITA networks
authenticationMD5 Certification principles:1. Sending the minimum key ID keys2. The number that carries the key ID3. The receiver first looks for the same key ID, if any, matches only once, determines whether it succeedsIf there is no key ID, only one hop down is found, and if it matches, the authentication succeeds; if it does not match, the authentication failsRIP v2 Support Auto-summarizationRip issued default route (5 kinds)1. Method one. Default-information originate---------------recommen
Lab question: R2 is connected to R3 R5 as a fast Ethernet cable, and the others are strings. Frame relay is a full-connection mesh structure by default, that is, the PVC between all connected routes has been connected, and all
Disable the reverse ARP functions of R5 and R8 to manually configure the map from R5 to R8.
The topology used in this experiment is the ccnp standard topology, as shown below:
Certificate -------------------------------------
Yeslab October July 12, instructor Chen ccna + ccnp real machine rack Practical Course
Ccna is an entry-level course in the network industry. In order to give students a good understanding of the network, yeslab provides the real Equipment Rack. The students build the topology and complete the configuration to create a real network for the students, in short, as long as the students want to learn, yeslab is not stingy
The
CCNP comprehensive experiment-
The top labs are as follows:
650) this. width = 650; "alt =" "border =" 0 "src =" http://img1.51cto.com/attachment/201104/185551130.jpg "/>Lab requirements: 1: R3, R4 for NAT, R3 E0/1 for export, and R4 E0/0 for export. 2: R3, R4, R5, R7, R8 do OSPF, R3, R4, R5, R7 do frame-relay, R7 do FR switch. . 8.8.8 reaches 1.1.1.1 and is converted from R3 to public IP address 3.3.3.3. 8.8.8.9 when 1.1.1.1 is reached, it is switch
CCNP Study Notes 2-routing part-VPNReview the dynamic protocol: rip vpn ospf encapsulation UDP 520 IP 88 IP 89 update address 224.0.0.9 224.0.0.10 224.0.0.5/6 use passive to implement intercommunication between the two ends of unicast neighbor and the output interface to implement unicast NBMA point to multicast unicast key complete neighbor update methods, timing 30 seconds 15% offset, trigger incremental update, trigger timing 30 minutes trigger AD
The following coupon (valid until December 31, 2016) can only be used for my course, course address: http://edu.51cto.com/course/course_id-4434.htmlHow to use coupon Volume: http://edu.51cto.com/help.htmlIf you use a coupon, please note in the blog message with the coupon, thank you!16v5x-mjx3-jtd8-hm7s26v5x-mgx6-6e9m-nvw836v5x-m2xu-3brm-h1s946v5x-m3xy-yg9h-hjat56v5x-mdxr-hvju-fvuk66v5x-mhxu-fhe2-fmec76V5X-M5XU-BJ2J-K3R686v5x-mvxm-tkad-bc7k96v5x-msxt-8gp7-dct4Ten6v5x-mwxh-bbfu-31mu6v5x-m8xt-1c3j
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.