TSHOOT

TSHOOT

Exam’s Structure:
+ About 10 Multichoice questions
+ 2 Drag and Drop Questions
+ 16 lab-sim Questions with the same network topology (16 troubleshooting tickets or you can call it one “big” question). Each lab-sim is called a ticket and you can solve them in any order you like.
Topics of the lab-sims:
1 -IPv6
2 -OSPF
3- OSPFv3
4 -Frame Relay
5 – GRE
6 – EtherChannel
7 -RIPng
8 -EIGRP
9 -Redistribution
10 -NTP
11 -NAT
12 -BGP
13 -HSRP
14-STP
15-DHCP
The problems are rather simple. For example wrong IP assignment, disable or enable a command, authentication…
In each tickets you will have to answers three types of questions:
+ Which device causes problem
+ Which technology is used
+ How to fix it
When you press Done to finish each case, you can’t go back.

IPv4 Layer 3 Topology

IPv4Layer3Topology_networktut.com.jpg
IPv6 Layer 3 Topology
IPv6Layer3Topology_networktut.com.jpg
Layer 2-3 Topology
Layer2_3_Topology.jpg
Luckily we have a link to download this lab (open it with Packet Tracer v.5.3+)  
Below is the screenshot of this file
TSHOOT_Topology_Packet_Tracer.jpg

Question 1
FCAPS
Fault Management ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ F
Configuration Management ‐‐‐‐‐‐‐ C
Accounting Management ‐‐‐‐‐‐‐‐‐‐ A
Question 2
FCAPS–model defined by the International Organization for Standardization (ISO).
ITIL– framework for it prof
TNM–network management model is the Telecommunications Standardization Sector’s (ITU-T)
Cisco lifecycle–model is often referred to as the PPDIOO model
Question 3
EEM ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ CLI based for Management and Monitoring
SDM ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ provide a GUI for Administration
FTP ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Used for Backup and restore
-----------------------------------------------------------------------------------------------------------------------------------
1)FCAPS is a network maintenance model defined by ISO. What does it stand for?
A – Action Management
B – Fault Management
C – Configuration Management
D – Protocol Management
E – Security Management

Answer: B C E (Fault, Configuration & Security Management) Notice that A stands for Accounting, not Action.

2) Which alerts will be seen on the console when running the command: logging console warnings.
A – warnings only
B – warnings, notifications, error, debugging, informational
C – warnings, errors, critical, alerts, emergencies
D – notifications, warnings, errors
E – warnings, errors, critical, alerts

Answer: C  (warning, critical, alert, emergencies)
Explanation
The Message Logging is divided into 8 levels as listed below
LevelKeywordDescription
0emergenciesSystem is unusable
1alertsImmediate action is needed
2criticalCritical conditions exist
3errorsError conditions exist
4warningsWarning conditions exist
5notificationNormal, but significant, conditions exist
6informationalInformational messages
7debuggingDebugging messages
The highest level is level 0 (emergencies). The lowest level is level 7. If you specify a level with the “logging console level” command, that level and all the higher levels will be displayed. For example, by using the “logging console warnings” command, all the logging of emergencies, alerts, critical, errors, warnings will be displayed.
In this question, E is also correct but it is less information -> C is the best answer.
3) You have 2 commands used for ftp:
ip ftp username xxxxxx
ip ftp password yyyyyy
Which two commands will be used when switching from ftp to http?
Answer:
ip http client username xxxxxx
ip http client password yyyyyy
4) Which two of the following options are categories of Network Maintenance tasks?
A – Firefighting
B – Interrupt-driven
C – Policy-based
D – Structured
E – Foundational


Answer: B D
5) The following commands are issued on a Cisco router:
Router(config)#access-list 199 permit tcp host 10.1.1.1 host 172.16.1.1
Router(config)#access-list 199 permit tcp host 172.16.1.1 host 10.1.1.1
Router#debug ip packet 199
What would be the output shown on the console?
A – All IP packets passing through the router
B – Only IP packets with the source address of 10.1.1.1
C – All IP packets from 10.1.1.1 to 172.16.1.1
D – All IP packets between 10.1.1.1 to 172.16.1.1


Answer: D
Only communication between host 10.1.1.1 and host 172.16.1.1
6) You have two NTP servers 10.1.1.1 & 10.1.1.2 and want to configure a router to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which command will you use?
Answer:
ntp server 10.1.1.1
ntp server 10.1.1.2 prefer
(notice the answer with the word “prefer”)
7) The interface is up and protocol is up. What level of logging is enabled when you get these messages?
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
%LINKDOWN‐3‐SERIAL:
A -alerts
B – errors
C – critical
D – notifications

Answer: D

8) Two Cisco routers are connected to each other and are enabled CDP. Serial line is up,protocol is also up but cdp neighbor not working. What layer of the OSI model does the problem most likely exist?
Answer:
Data link layer.
-------------------------------------------------------------------------------------------------------------------------------
Ticket 1 – OSPF Authentication

1.Client is unable to ping R1’s serial interface from the client.
Problem was disable authentification on R1, check where authentication is not given under router ospf of R1. (use ipv4 Layer 3)
Configuration on R1 was:
interface Serial0/0/0/0.12 point-to-point
ip address 10.1.1.1 255.255.255.252
ip nat inside
ip ospf message-digest-key 1 md5 TSHOOT
!
router ospf 1
log-adjacency-changes
network 10.1.1.0 0.0.0.3 area 12
default-information originate always
Configuration on R2 was:
interface Serial0/0/0/0.12 point-to-point
ip address 10.1.1.2 255.255.255.252
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 TSHOOT
!
router ospf 1
log-adjacency-changes
network 10.1.1.0 0.0.0.3 area 12
Answer: on R1 need command in router mode
area 12 authentication message-digest
Ans1) R1
Ans2) OSPF
Ans3) ip ospf authentication message-digest command must be given on s0/0/0/0.12
-------------------------------------------------------------------------------------------------------------------------------
Ticket 2 – HSRP Track
HSRP was configured on DSW1 & DSW2. DSW1 is configured to be active but it does not become active.
Configuration on DSW1:
track 1 ip route 10.1.21.128 255.255.0.0 metric threshold
threshold metric up 1 down 2
!
track 10 ip route 10.2.21.128 255.255.255.0 metric threshold
threshold metric up 63 down 64
!
interface Vlan10
ip address 10.2.1.1 255.255.255.0
standby 10 ip 10.2.1.254
standby 10 priority 200
standby 10 preempt
standby 10 track 1 decrement 60

Answer: (use IPv4 Layer 3 Topology)
On dsw 1 interface vlan 10 mode run:
no standby 10 track 1 decrement 60
standby 10 track 10 decrement 60
(ip for track command not exact for real exam)
Ans1) DSW1
Ans2) HSRP
Ans3) delete the command with track 1 and enter the command with track 10 (standby 10 track 10 decrement 60).
---------------------------------------------------------------------------------------------------------------------------------
Ticket 3 – BGP Neighbor
Problem: Client 1 is able to ping 209.65.200.226 but can’t ping the Web Server 209.65.200.241.
Configuration on R1:
router bgp 65001
no synchronization
bgp log-neighbor-changes
network 209.65.200.224 mask 255.255.255.252
neighbor 209.56.200.226 remote-as 65002
no auto-summary
check bgp neighborship. **** show ip bgp sum****
The neighbor’s address in the neighbor command is wrong under router BGP. (use ipv4 Layer 3)
Answer: need change on router mode on R1 neighbor 209.65.200.226
Ans1) R1
Ans2) BGP
Ans3) delete the wrong neighbor statement and enter the correct neighbor address in the neighbor command (change “neighbor 209.56.200.226 remote-as 65002″ to “neighbor 209.65.200.226 remote-as 65002″)
---------------------------------------------------------------------------------------------------------------------------------
Ticket 4 – NAT ACL

Client 1 & 2 are not able to ping the web server 209.65.200.241, but all the routers & DSW1,2 can ping the server.
NAT problem. (use ipv4 Layer 3)
problem on R1 Nat acl
Configuration on R1
ip nat inside source list nat_pool interface s0/0/0/1 overload
ip access-list standard nat_pool
permit 10.1.0.0
!
interface serial0/0/0/1
ip address 209.65.200.224 255.255.255.252
ip nat outside
!
interface Serial0/0/0/0.12
ip address 10.1.1.1 255.255.255.252
ip nat inside
ip ospf message-digest-key 1 md5 TSHOOT
ip ospf authentication message-digest
Answer:add to acl 1 permit ip 10.2.1.0 0.0.0.255
Ans1) R1
Ans2) NAT
Ans3) Add the command permit 10.2.0.0 in the nat_pool access-list
------------------------------------------------------------------------------------------------------------------------
Ticket 5 – R1 ACL
Client is not able to ping the server. Except for R1, no one else can ping the server. (use ipv4 Layer 3)
Problem:on R1 acl blocking ip
Configuration on R1
router bgp 65001
no synchronization
bgp log-neighbor-changes
network 209.65.200.224 mask 255.255.255.252
neighbor 209.65.200.226 remote-as 65002
no auto-summary
!
access-list 30 permit host 209.65.200.241
access-list 30 deny 10.1.0.0 0.0.255.255
access-list 30 deny 10.2.0.0 0.0.255.255
!
interface Serial0/0/0/1
ip address 209.65.200.224 255.255.255.252
ip nat outside
ip access-group 30 in
Answer: add permit 209.65.200.224 0.0.0.3 command to R1′s ACL
Ans1) R1
Ans2) IP Access list
Ans3) Add permit 209.65.200.224 0.0.0.3 to R1′s ACL
--------------------------------------------------------------------------------------------------------------------------------
Ticket 6 – VLAN filter
Client 1 is getting the correct IP address from DHCP but Client 1 is not able to ping the server. Unable to ping DSW1 or the FTP Server(Use L2 Diagram).
Vlan Access map is applied on DSW1 blocking the ip address of client 10.2.1.3
Configuration on DSW1
vlan access-map test1 10
drop
match ip address 10
!
vlan filter test1 vlan-list 10
!
ip access-list standard 10
permit 10.2.0.0 0.0.255.255
!
interface VLAN10
ip address 10.2.1.1 255.255.255.0
Ans1) DSW1
Ans2) Vlan access map
Ans3)Remove vlan filter test1 from DSW1
---------------------------------------------------------------------------------------------------------------------------------
Ticket 7 – Port Security
Client 1 is getting a 169.x.x.x IP address & is unable to ping Client 2 as well as DSW1. The command ‘sh interfaces fa1/0/1′ will show following message in the first line
‘enFastEthernet1/0/1 is down, line protocol is down (err-disabled)’
On ASW1 port-security mac 0000.0000.0001, interface in err-disable state
Configuration of ASW1
interface fa1/0/1
switchport mode access
switchport port-security
switchport port-security mac-address 0000.0000.0001
Answer:on asw1 delele portsecurity & do on interfaces shutdown, no shutdown
Ans1)ASW1
Ans2)Port security
Ans3)issue “no switchport port-security mac-address 0000.0000.0001 command followed by shutdown & no shutdown commands on port fa1/0/1 on ASW1
---------------------------------------------------------------------------------------------------------------------------------

Ticket 8 – Switchport VLAN 10


Client 1 & 2 are getting 169.x.x.x ip addresses and can’t ping DSW1 or FTP Server but they are able to ping each other.
Situation: in port channel configuration of ASW1 vlan 10 is not allowed. (Use L2 Diagram)
Configuration of ASW1
interface FastEthernet1/0/1
switchport mode access
switchport access vlan 1
!
interface FastEthernet1/0/2
switchport mode access
switchport access vlan 1
On ASW1, on interfaces fa0/1, fa0/2 switchport access vlan 1
Answer: on ASW1 change switchport access vlan 1 to switchport access vlan 10
Ans1)ASW1
Ans2)Vlan
Ans3)give command: interface range fa1/0/1-/2 & switchport access vlan 10
------------------------------------------------------------------------------------------------------------------------------

Ticket 9 – Switchport trunk


Client 1 is getting 169.x.x.x ip address.
Client 1 & 2 can ping each other but they are unable to ping DSW1 or FTP Server  (Use L2/3 Diagram)
Configuration of ASW1
interface PortChannel13
switchport mode trunk
switchport trunk allowed vlan 1-9
!
interface PortChannel23
switchport mode trunk
switchport trunk allowed vlan 1-9
!
interface FastEthernet1/0/1
switchport mode access
switchport access vlan 10
!
interface FastEthernet1/0/2
switchport mode access
switchport access vlan 10
Answer: on port channel 13, 23 disables all vlans and give switchport trunk allowed vlan 10,200
Ans1)ASW1
Ans2)Switch to switch connectivity
Ans3)int range portchannel13,portchannel23
switchport trunk allowed vlan none
switchport trunk allowed vlan 10,200
----------------------------------------------------------------------------------------------------------------------------

Ticket 10 – EIGRP AS


Client 1 is not able to ping the Webserver
DSW1 can ping fa0/1 of R4 but can’t ping s0/0/0/0.34
Check ip eigrp neighbors from DSW1 you will not see R4 as neighbor.(use ipv4 Layer 3)
‘Show ip route’ on DSW1 you will not see any 10.x.x.x network route.
On DSW1 & DWS2 the EIGRP AS number is 10 (router eigrp 10) but on R4 it is 1 (router eigrp 1)
Answer: change router AS on R4 from 1 to 10
Ans1) R4
Ans2) EIGRP
Ans3) Change EIGRP AS number from 1 to 10
----------------------------------------------------------------------------------------------

Ticket 11 – EIGRP to OSPF


Client 1 is not able to ping the Webserver
DSW1 can ping fa0/1 of R4. However clients and DSW1 can’t ping R4′s S0/0/0/0.34 interface (10.1.1.10)
On R4 in router eigrp:
router eigrp 10
network 10.1.4.5 0.0.0.0
no auto-summary
redistribute ospf 1 metric 100 10 255 1 1500 route-map EIGRP_to_OSPF
!
router ospf 1
network 10.1.1.8 0.0.0.0 area 34
redistribute eigrp 10 subnets
!
route-map EIGRP->OSPF
match ip address 1
Answer:change in router eigrp router-map name
Ans1) R4
Ans2) Route redistribution
Ans3) Change the name of the route-map under the router EIGRP or router OSPF process from ‘EIGRP_to_OSPF’ to ‘EIGRP->OSPF’.
----------------------------------------------------------------------------------------------

Ticket 12 – IPv6 OSPF


DSW1 & R4 can’t ping R2′s loopback interface or s0/0/0/0.12 IPv6 address.
R2 is not an OSPFv3 neighbor on R3
Situation: ipv6 ospf was not enabled on R2’s serial interface connecting to R3. (use ipv6 Layer 3)
Configuration of R2
ipv6 router ospf 6
router-id 2.2.2.2
!
interface s0/0/0/0.23
ipv6 address 2026::1:1/122
Configuration of R3
ipv6 router ospf 6
router-id 3.3.3.3
!
interface s0/0/0/0.23
ipv6 address 2026::1:2/122
ipv6 ospf 6 area 0
Answer:
In interface configuration mode of s0/0/0/0.23 on R2:
ipv6 ospf 6 area 12
Ans1) R2
Ans2) OSPFv3
Ans3) on the serial interface of R2, enter the command ipv6 ospf 6 area 0 (notice that it is “area 0″, not “area 12″)


YOUR TSHOOT EXPERIENCE



The TSHOOT 642-832 exam has been used to replace the old ISCW & ONT exams so this article is devoted for candidates who took this exam sharing their experience.