Saturday, January 2, 2010

Networking Lab Series: LAB 1 PART 1

Many of my friends have asked me to mentor them or do customized training for them, well, even when I want, I can't have the time on regular basis. So, I have decided to post some exercises here so they can go step by step. (I should warn that this is not for beginners).


Having that clear, this is the topology:


  • Even when the naming convention being used is more targeted to MPLS the configuration is a non-MPLS configuration which eventually will be transformed into an MPLS topology. FOR NOW, you may use the following definitions to understand their role. (AGAIN: These are not necessary the actual definitions for the devices):
    • CE: This is the Customer Edge device, meaning, the customer router.
    • PE: This is the Provider Edge device, meaning, the provider equipment that will be giving access to the services to the customers. For example, if your company ask for a T1 to the Internet, the providers device giving the service to your router will be the PE. This also represent the last extension of your carrier infrastructure between your infrastructure and your service provider infrastructure.
    • P: This represent the provider transport infrastructure. The infrastructure that does carries traffic from one side to the other inside your provider.
    • ASBR: This represent your provider connection to the Tier 1 or the transport carriers (Autonomous System Border Router). In a real service provider this will actually represent several redundant routers connecting to the international carriers. This also represent the last extension of the provider between the customers and the international carriers.
  • The routing protocols being used between the CEs and the PEs are not the ones that you will see between a customer and a service provider. The selection of these for the lab are intended to expose the student to multiple routing protocols and caveats that may arise from these.
  • XX represent the number resulting from appending the two router numbers involved in the connection, with the lower number first. For example, a connection between R1 and R2 will have a XX=12, and a connection between R6 and R8 will have a XX=68. 
  • Y represent the number of the router involved in the connection. For example, all the connections in R8 will have a Y=8. A connection between R3 and R4 will have an IP address of in R3 and in R4. 
  • The topology represent two carriers or service providers, each defined by its own Autonomous System Number (AS234 and AS567) 
  • AS234 uses OSPF Area 0 for its internal IGP with process id 1 
  • AS567 uses IS-IS Area 2 for its internal IGP in Level2 
  • The point-to-point links of AS234 are using 150.1.xx.y/24 for their addressing 
  • The point-to-point links of AS567 are using 150.2.xx.y/24 for their addressing 
  • Loopback addresses for routers inside the carriers will have the IP Address 150.y.y.y/32 
  • Loopback addresses for CE router will have the IP Address y.y.y.y/32 
  • CE1 uses RIPv2 as its IGP 
  • CE2 uses EIGRP with AS200 as its IGP
Task 0: Setup Topology and IGP
  • Configure your physical and logical topology to match diagram. (GNS3 or dynamips are good tools for this lab)
  • PE1 loopback should be able to ping ASBR1 loopback
  • PE2 loopback should be able to ping ASBR2 loopback

Task 1: Routing CE to PE
  • Configure routing between CE1 and PE1 using RIPv2 as its IGP
  • Configure distribution such that CE1 and ASBR1 will be able to ping each other loopback interface
  • Configure routing between CE2 and PE2 using EIGRP AS200
  • Configure distribution such that CE2 and ASBR2 will be able to ping each other loopcak interface

Task 2: BGP Peering

  • Configure BGP between ASBR1 and ASBR2
  • Configure redistribution such that all Loopback routes learned by each ASBR are redistributed in its local IGP
    • Make sure that only Loopback routes are exchanged between the two carreirs
  • You should have reachability from CE1 loopback to CE2 loopback
Before continuing with the next part make sure you have everything working until this point.


  1. i really like how you explain it step by step as a student like me take stime to grasp the point. i really like how your writing style helps understand instantly. please keep updating

  2. """Welcome to We Buy Houses Fort Lauderdale, the Official Cash Home Buyer of Fort Lauderdale, Florida, and surrounding areas.

    We provide home sellers with a cash option to purchase their property quickly—with NO Repairs, and NO Fees or Commissions. Simply go to our website or call us at (754) 200-2005 to get a no-obligation cash home offer sent to you. It’s free and confidential.

    Avoiding foreclosure? Facing divorce? Moving? Upside down in your mortgage? Liens? It doesn’t matter whether you live in it, you’re renting it out, it’s vacant, or not even habitable. We help owners who have inherited an unwanted property, own a vacant house, are behind on payments, owe liens, downsized, and can’t sell… even if the house needs repairs that you can’t pay for… and yes, even if the house is fire damaged or has bad rental tenants. Basically, if you have a property and need to sell it… we’d like to make you a fair cash offer and close on it when you’re ready to sell.

    Just contact us today to get started!"""

  3. While you discuss about the hardware analysis it is also vital that you simply mention the very fact that even the software of the relies thereon so as to be installed within the pc system. Hardware development

  4. Such A Nice Post, Keep Up The Fantastic Work. Be sure to check below:
    custom logo design services

  5. I am very happy after visiting your website with very useful information. I am from one of the digital marketing agency... To visit my agency click on link Visitdigitalguru

  6. Very nicely explained by the author, Thanks
    Stock broker

  7. Thanks for sharing informative content…Find best digital marketing company to know more and Contact us on given no.…

  8. Thanks for sharing informative content…Find best digital marketing company to know more and Contact us on given no.…

  9. Thanks for sharing information with us…satisfied after visiting your blog…. Learn the latest trends & their practical application by experts with us…you can contact us click on
    Visit ISMT India

  10. Kuchi Jewels is a project of Gem & Gems which is a leading exporter since 2005 to onwards in all over the world. Our company has experienced, educated and motivated staff. Our main goal is to meet the international standard B2C and B2B export target with competitive prices and high quality products. mom necklace wholesale uk , lockets canada ,

  11. You guys are using best networking technology, I have an essay written on my cheap essay writing website if you want some more information turnout to it.

  12. This technology is amazing if you are looking for content writing service contact Prime Writing

  13. This blog about Networking is well written and amazing , as the technology is upgrading we all have to be well informed about web3 as well so for that you have to contact Web3 marketing agency any time