Friday 26 May 2017

Remote site network design considerations

There are number of considerations which are very important for remote site network designs. Below are important questions for green field network design for a new remote site.

1.       Number of users onsite :-- Require to select a LAN switch.
2.       NIC capacity of user’s machines: - 100Mbps/1Gig   -- Require to select a LAN switch.
3.       Number of servers(DHCP,DNS, PXE etc..) :- `
4.       Surveillance devices(CCTV etc..) :- POE requirement
5.       Voice requirement :- POE Requirement
6.       Wireless users and network types ( Guest, Corporate etc.) and number of AP require
7.       Number of wireless controller
8.       Internet setup :- Local or centralized
9.       Security device requirement ( Firewall etc.)
10.   WAN connectivity ( MPlS) requirement and bandwidth requirement.


Tacacs Port on firewall

If you have firewall in between your client(network device switch,rotuer etc. ) and Tacacs server then you need open TCP 49 port on the firewall.

Data center - DD questionnaire


Few questions are listed below which are important for the Data center DD.

  1. WAN links and its bandwidth and current utilization
  2. Number of server ports - 1gig/10gig
  3. Number of servers:- physical and virtual
  4. Number of server chassis:-
  5. Number of vlans and related SVIs:-
  6. Intranet and internet traffic flow
  7. Number of load balancers - internal & external
  8. DMZ network details
  9. Number of firewalls
  10. Throughput of current firewalls and link utlization report
  11. Firewall zone and related services.
  12. Routing protocol used in exisitng DC.
  13. Security devices like IPS,IDS.
  14. Voice setup.
  15. Different environment details like test,production, SAP etc.
  16. VPN sites and setup.
  17. IP address details
  18. applications with specific qos reqirement

Sunday 21 May 2017

What is DAI( dynamic arp inspection)?

DAI validated the ARP packets in a network. DAI only perform the inspection or checking only on untrusted ports and will not perform inspection on trusted ports. when switch receives a ARP packet on a trusted interface, then it forwards the packet without any inspection or checks. 

DAI only allow the ARP only if source is in DHCP snooping table or static binding.

In other words, ARP is only allowed from untrusted port when there is valid entry of source in DHCP snooping table or static binding.

It prevents Man in middle attacks.

Configuration:-

ip arp inspection vlan 1

int fa0/1
ip arp inspection untrust 

Verification:-

show ip dhcp snooping binding 
show ip arp inspection interfaces

Below error is displayed when a arp packet is recived on untrusted port and source is not present in DHCP snooping table.


%SW_DAI-4-DHCP_SNOOPING_DENY

What is the reserved mac address for outer unknown unicast destnation in fabricpath?

010F.FFC1.01C0 is the reserved mac address for unknown unicast traffic.

Fabricpath ECMP hashing functions

Cisco FabricPath switches support ECMP forwarding for known unicast frames. If the destination switch ID can be reached through more than one output interface with equal cost, the forwarding engine uses a hash function to pick one of the interfaces. Below are the hashing methods:-

1.  Source parameters (layer-3, layer-4, or mixed).
2.  Destination parameters (layer-3, layer-4, or mixed). 

3.  Both the source and the destination parameters (layer-3, layer-4, or mixed).

%STP-2-L2GW_BACKBONE_BLOCK

A superior BPDU was received on a Cisco FabricPath edge port.

Advantage of Fabricpath


Below are fabricpath advantages:-

1. MAC address scalability with conversational learning 
2. loop mitigation with TTL in the frame field 
3. Spanning Tree Protocol independence
4. Remove Suboptimal path.
5. All uplink are in forwarding state.
6. Equal cost multipathing

What is ip directed-broadcast?

Network Broadcast generated by a host which is not the part of the destination broadcast network. 


For example, host with ip 10.1.1.10/24 is generating traffic for 192.168.1.255/24. The intermediate routers are forwrding the packet as they do for unicast packet. It can lead to smurf(DoS) attacks and hence it is suggested to dsiable it. It is disabled from 12.x IOS version.


Destination ip never be 255.255.255.255 but a network broacast IP for example in 10.1.1.0/24 subnet, traffic for IP 10.1.1.255.

Configuration:-

Int Fa0/0
ip directed-broadcast


Disable directed broadcast:-

Int fa0/0
no ip directed-broadcast

Which IETF standard is the most efficient messaging protocol used in an IoT network?

CoAP is the IETF standard and most efficient messaging protocol used in an IoT network

Cisco ONE Enterprise cloud suite product portfolio



1. Cisco UCS Director 
2. Cisco Prime Service Catalog 
3. Cisco Virtual Application Container Services 
4. Cisco Intecloud Fabric for Business

Saturday 20 May 2017

Benefits of VXLANs over VLANs

Benifits of Vxlan over Vlan:-

1. VXLAN uses a 24-bit VNID to overcome the 4094 vlan scale limitation.
2. It provides a solution to extent layer 2 segments over a shared layer 3 routed network.
3. It provides better utilization of available network paths in the underlay infrastructure.
4. ECMP

What is ZigBee?

Zigbee protocol is best suited for wireless communication in an IoT deployment where sensors only have a power generating element (and do not have a battery).

What are cisco UCS director servce request execution states?


Below are the execution states:-

1. Scheduled
2. Running
3. Blocked
4. Completed
5. Failed

What is Report metadata?

It is a cisco UCS Director feature that enables us to view the REST API URL for every report display in cisco UCS Director.

VPC Peer Switch Benefits

Which three options are benefits of the vPC peers switch feature? (Choose 3) 
1. It eliminates the recommendation to pin the STP root to the vPC primary switch. 
2. It allows a pair of the vPC peer devices to appear as a single STP root in the Layer 2. 
3. It simplifies STP configuration by configuration both vPCs with the same STP priority.

What is Fabric Evacuation in UCS?


Feature which gracefully disable all the traffic through a fabric interconnect during upgrade.

What is VTP bombing?


It occurs when a server with a higher revision number and a wrong VTP database is inserted into the VTP domain. This situation may occur when a new switch is plugged into a stable VTP domain. The incorrect database is propagated to the domain and the earlier state database is overwritten.

best practice for connecting converged network adapters to the fabric

 Below are the best practice for connecting converged network adapters to the fabric.

1. Separate FCoE VLANS must be used for FCOE in SAN-A and SAN-B.
2. Cisco UF links must be configured as spanning-tree edge ports.
3. If MSTP is enabled, a separate MST instance must be used for FCOE vlans.

What is glean throttling in Cisco NX-OS ?

When forwarding an incoming IP Packet in a line card, if the address resolution request for the next hop us not resolved, the line card forwards the packets to the supervisor. The supervisor resolves the MAC address for the next hop and programs the hardware. this process is known as Glean throttling.

What is Ceilometer?


Ceilometer is a component of the Telemetry project. Its data can be used to provide customer billing, resource tracking, and alarming capabilities across all OpenStack core components.

why an upstream switch should allow storage appliance port traffic?

Appliance port traffic must be allowed on uptream switches in case of below scenario:-

1. If storage must be accessed outside of the UCS domain.
2. If storage and servers are located in different subnets.
3. If storage is configured in Active/Passive mode and both fabric interconnects require  communication to the same controller.

Shadow consumer EPG

Shadow consumer EPG is the consumer interface of an L4-L7 device places

ACI broder leaf - Important points

1. Any ACI leaf can be a border leaf. There is no limitation in the number of leaf switches that can be used as border leaves.
2. The border leaf can also be used to connect to compute, IP storage, and service appliances.
3. The border leaves are dedicated leaf switches that support only Layer 2 and Layer 3 out in an ACI fabric.

BGP peering supports in ACI


ACI supports the following connections for BGP peering:

1. eBGP peering over OSPF
2. iBGP peering over direct connection
3. eBGP peering over direct connection
4. iBGP peering over static route

External Layer 3 Outside connections types in ACI

Below are the connection types for Layer 3 connection in ACI:-

1. Layer 3 Routed Interface
2. Sub-interface with 802.1Q tagging
3. Switched Virtual Interface (SVI)

External Layer 3 Outside connection options in ACI.

ACI supports the following External Layer 3 Outside connection options:

1. Static Routing (supported for IPv4 and IPv6)
2. OSPFv2 for normal and NSSA areas (IPv4)
3. OSPFv3 for normal and NSSA areas (IPv6)
4. iBGP (IPv4 and IPv6)
5. eBGP (IPv4 and IPv6)
6. EIGRP (IPv4 and IPv6)

Important points about L3Outs in an ACI Fabric.

1. ACI fabric runs MP-BGP 
2. Security import subnets control the forwarding of packets into and out o L3Out connections(data planE. 
3. Route control subnets control the exchange of routing information(Prefixes) into and out of the fibric (control place)

Friday 19 May 2017

OTV failure isolation functions

Below functions are provided by OTV to achieve failure isolation.


1. ARP optimization
2. Unknown unicast traffic suppression
3. Spanning tree isolation 

Private VLAN port mode In nexus 9K


In nexus 9K, Private VLANs supports below port modes as follows:

1. Promiscuous.
2. Promiscuous trunk.
3. Isolated host.
4. Isolated host trunk.
5. Community host.

Informaiton exchanged in VXLAN during MP BGP neighborship


After VTEP devices are established BGP neighbor adjacencies with other VTEPs or with internal BGP route reflector, below three pieces of information are exchanged through BGP.

1. Layer 3 VNI
2. Router MAC address

3. VTEP address

How to get 80 Gbps of bandwidth available to UCS Servers.


Use any of the below UCS below configuration :-

1. Install 2208 IOMs, VIC1280 CNAs, fabric Extenders, and create eight vNICs mapped to each fabric.


2. Install 2204 IOMs, VIC1240 CNAs, and create four vNICs mapped to each fabric.

Configuration failed for node sys/lsnode- due to Invalid Path Configuration,Invalid VLAN Configuration

Configuration failed for node 102 sys/lsnode-<ip> due to Invalid Path Configuration,Invalid VLAN Configuration.

Above error can be due to below reasons:-


1. The "Invalid Path Configuration" fault is raised when there isn't a Physical Domain associated to an EPG using static paths.

2.  The encap VLAN configured is not within the allowed range of VLANs as specified by the associated domain.

3. Cisco Bug: CSCva72039

RSTP port types


1. Backup port :- It acts as a backup for the path provided by a designated port towards the leaves of the spanning tree.

2. Disabled port :- It has no role within the operation of the spanning tree.

3. Root Port:- It provides the best path ( lowest cost) when the device forwards packets to the root bridge:-

4. Root Port:- It offers a backup path towards the root bridge to the path provided by the current root port.

5. Designated port :- IT connects to the device that has the lowest path cost when forwarding packets from that LAN to the root bridge.

IP Source Gaurd

In IP source gaurd,  only on protected ports DHCP traffic is allowed and will block all the rest of the traffic. Whenever switch receives any packet, it allows only if the source is in the DHCP snopping table or static binding.

IP source is a port based feature which automatically creates implicit port access control list(PACL).

Important point:-

1. In case of port-channel, IP source gaurd must be enabled on port-channel rather than on member interfaces.
2. IP source gaurd in not supported on trunk ports.
3. Only supported on layer2 ports.
4. Mac filtering is not supported
5. PVLAn is not supported
6. Only applied to hardware and cannot verify the packets processed by software.

Configuration:-

Router(config-if)# ip verify source vlan dhcp-snooping

Static binding:-

Router(config)# ip source binding mac-address vlan vlan-id ip-address interface interface-name

Verification:-
show ip verify source interface fa0/1

Cisco Prime Service Catalog Definitions.


1. Initiator :- Person who places the order for a service. You are the initiator of orders you place for yourself and orders you place for others.

2. Delivery Plan :- The work flow process established by service catalog administrator to complete a service order after it has pased through the authorization and/or review stages 

3. Service manager :- A service catalog module that is used by the service trams to find an manage their service catalog tasks. 

4. Performer :- An individual or user or queue assigned to complete the task.

5. Customer :- Person receiving a service. you can be the customer of services you order for yourself and for services that others order for you.

Thursday 18 May 2017

ARP types

1. ARP:- It Maps the IP(network layer) address to mac layer address to enable IP packets to be sent across the network

2. Gratuitous ARP:- It sends a request with an identical source IP address and a destination IP address to detect duplicate IP address.

3. Proxy ARP :- It Enable a device that is physically located on one network and appear to be logically part of a different network connected to the same device.

4. Reverse ARP :- It request IP( Network layer) address for the MAC address. Often used by disklesss workstation because this type if devices has no way to store IP address to use when they boot.

Cisco UCS Director Orchestrator Concepts

1. Workflow :- A series of tasks arranged to automate a complex operation. It can contain at least one task, or any number of tasks as needed 

2. Task :- An automatic unit of work in Cisco UCS director orchestrator. It is a single action or operation with inputs and outputs 

3. Approval:- A Gate tasks that requires the intervention of Cisco UCS director user to allow a workflow to run to completion. This user is typically an Administrator who has go/no-go authority over the workflow process 

4. Service request :- Created every time you execute a workflow in Cisco UCS Director. It is process under the control of Cisco UCS director.

ACI Terminologies


1.  Bridge Domain :- Layer 2 forwarding Boundary  
2.  EPG:- Logical Grouping of objects that require similar policy
3. Application profile :- Logical container for grouping EPGs
4. Contracts:- Defines the communication between EPGs
5. Context:- Unique Layer 3 forwarfing and application policy domain 
6. Tenants :- Logical Container for application polices :- 

ITD perquisites and important information

A. Below are the prerequisites for Intelligent Traffic Director (ITD):-

1. Enhanced Layer 2 Package license.

2. Policy Based routing
3. IP SLA

B. Below feature must be enabled to configure ITD:-

1.   feature itd 
·     2.   feature pbr
·     3.   feature sla sender
·     4.   feature sla responder
   Note :- ITD is not supported for IPV6.

 C. ITD replaces below two options:- 
 1. Policy-based routing.
 2. WCCP

D. ITD vs. WCCP
1. Require less TCAM entries.
2. Weighted load distribution

E. ITD is only supported in below platforms:-
1.  NEXUS 9000
2.  NEXUS 7000
3.  NEXUS 6000
4.  NEXUS 5000


On a cluster with three APICs, on which APIC can you see actual device package logs?

Device package logs can only be seen on APIC1.

NFS appliance port failover and network uplink failure on Cisco UCS



Appliance port:-
Failover cannot be configured in the UCS side for appliance ports.

Network Uplink failure:-

Appliance ports are shut down if the uplink that is pinned to it goes down.

For which two multicast distribution modes is RP configuration required?


Below two  multicast distribution modes require RP configuration.

1. BIDIR 
2. ASM

Cisco Virtual Application Cloud Segmentation (VACS) Services products

Below are the products of VACS:-

1. Cisco UCS Director.
2. Cisco Nexus 1000V Switch
3. Cisco Virtual Security Gateway (VSG)
4. Cisco Prim Network Services Controller (NSC)
5. Cisco Cloud Services Router (CSR) 1000V
6. Cisco Adaptive Security Virtual Appliance (ASAv)
7. Open-source High-Availability Proxy (HAProxy)

Which standard REST API methods allow you to manage object?


POST :- To create/update objects
GET :- To read objects
DELETE :- To delete objects.

How to resolve the enhanced zoning lock problem?



Step 1:- show zone status vsan command to determine the lock holder.

Step 2:Use the no zone commit vsan command on the switch that holds the lock if you are the holder of the lock.

Step 3 :- Use the no zone commit vsan <vsan id> force command on the switch that holds the lock to release the lock if another user holds the lock.

Step 4:- If problems persist, use the clear zone lock command to remove the lock from the switch. This should only be done on the switch that holds the lock.


NOTE :- Cisco document is the source of above information.
 

What is the Programming language used at the core of OpenStack?

Python is used as programming language in Openstack.

Can WS-C3850-12XS-S support both 1 gig and 10 gig ?

Yes, Cisco switch WS-C3850-12XS-S can support both 1 Gig an 10 Gig.

You configured a new appliance port, but the port has a pinning failure. Which option is a possible cause ?

Appliance VLANs are missing duplicate global VLANs.

When a VLAN is created for an appliance port in the Appliances section of LAN tab, make sure to create the same VLAN in the LAN Cloud tab.

Monday 15 May 2017

Distribute list in out direction - OSPF





R1:-

interface Loopback0
 ip address 1.1.1.1 255.255.255.255

 interface FastEthernet0/0
Description “Connected to R5”
 ip address 15.15.15.1 255.255.255.0
no shut

interface FastEthernet0/1
Description “Connected to R3”
 ip address 13.13.13.1 255.255.255.0
no shut

interface FastEthernet1/0
Description “Connected to R2”
 ip address 12.12.12.1 255.255.255.0
no shut

router eigrp 1
 network 15.15.15.1 0.0.0.0
 redistribute ospf 1 metric 1 1 1 1 1

router ospf 1
 router-id 1.1.1.1
 log-adjacency-changes
 redistribute eigrp 1 subnets
 network 12.12.12.1 0.0.0.0 area 0
 network 13.13.13.1 0.0.0.0 area 0
 distribute-list Block_5.5.5.5/32 out   \\ Distribute list in out direction can be used to filter external routes. This Distribution list is preventing 5.5.5.5/32

ip access-list standard Block_5.5.5.5/32
 deny   5.5.5.5
 permit any

R2:-

nterface Loopback0
 ip address 2.2.2.2 255.255.255.255

interface Loopback1
 ip address 20.1.1.2 255.255.255.0
 ip ospf network point-to-point

interface Loopback2
 ip address 20.1.2.2 255.255.255.0
 ip ospf network point-to-point

interface FastEthernet1/0
Description “Connected to R1”
 ip address 12.12.12.2 255.255.255.0
no shut

router ospf 1
 router-id 2.2.2.2
 log-adjacency-changes
 network 12.12.12.2 0.0.0.0 area 0
 network 20.1.1.2 0.0.0.0 area 0
 network 20.1.2.2 0.0.0.0 area 0


R3:-

interface Loopback0
 ip address 3.3.3.3 255.255.255.255

interface FastEthernet0/1
Description “Connected to R1”
 ip address 13.13.13.3 255.255.255.0
no shut

interface FastEthernet1/0
Description “Connected to R4”
 ip address 34.34.34.3 255.255.255.0
 no shut

router ospf 1
 router-id 3.3.3.3
 log-adjacency-changes
 network 13.13.13.3 0.0.0.0 area 0
 network 34.34.34.3 0.0.0.0 area 1


R4:-


interface Loopback0
 ip address 4.4.4.4 255.255.255.255

interface FastEthernet0/0
Description “Connected to R6”
 ip address 46.46.46.4 255.255.255.0
no shut

interface FastEthernet1/0
Description “Connected to R3”
 ip address 34.34.34.4 255.255.255.0

router ospf 1
 router-id 4.4.4.4
 log-adjacency-changes
 network 34.34.34.4 0.0.0.0 area 1
 network 46.46.46.4 0.0.0.0 area 1


R5:-

interface Loopback0
 ip address 5.5.5.5 255.255.255.255


interface Loopback1
 ip address 55.55.55.55 255.255.255.255
!
interface FastEthernet0/0
Description “Connected to R1”
 ip address 15.15.15.5 255.255.255.0

router eigrp 1
 network 5.5.5.5 0.0.0.0
network 55.55.55.55 0.0.0.0
 network 15.15.15.5 0.0.0.0


Verification:-


R1:-

R1#sh ip ospf neighbor

Neighbor ID     Pri   State           Dead Time   Address         Interface
3.3.3.3           1   FULL/BDR        00:00:37    13.13.13.3      FastEthernet0/1
2.2.2.2           1   FULL/BDR        00:00:31    12.12.12.2      FastEthernet1/0

R1#sh ip eigrp neighbors
EIGRP-IPv4 Neighbors for AS(1)
H   Address                 Interface       Hold Uptime   SRTT   RTO  Q  Seq
                                            (sec)         (ms)       Cnt Num
0   15.15.15.5              Fa0/0             10 00:06:10  111   666  0  7
R1#

R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route, H - NHRP
       + - replicated route, % - next hop override

Gateway of last resort is not set

      1.0.0.0/32 is subnetted, 1 subnets
C        1.1.1.1 is directly connected, Loopback0
      5.0.0.0/32 is subnetted, 1 subnets
D        5.5.5.5 [90/156160] via 15.15.15.5, 00:06:13, FastEthernet0/0
      6.0.0.0/32 is subnetted, 1 subnets
O IA     6.6.6.6 [110/4] via 13.13.13.3, 20:53:56, FastEthernet0/1
      12.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        12.12.12.0/24 is directly connected, FastEthernet1/0
L        12.12.12.1/32 is directly connected, FastEthernet1/0
      13.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        13.13.13.0/24 is directly connected, FastEthernet0/1
L        13.13.13.1/32 is directly connected, FastEthernet0/1
      15.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        15.15.15.0/24 is directly connected, FastEthernet0/0
L        15.15.15.1/32 is directly connected, FastEthernet0/0
      20.0.0.0/24 is subnetted, 2 subnets
O        20.1.1.0 [110/2] via 12.12.12.2, 22:24:01, FastEthernet1/0
O        20.1.2.0 [110/2] via 12.12.12.2, 22:22:42, FastEthernet1/0
      34.0.0.0/24 is subnetted, 1 subnets
O IA     34.34.34.0 [110/2] via 13.13.13.3, 21:05:58, FastEthernet0/1
      46.0.0.0/24 is subnetted, 1 subnets
O IA     46.46.46.0 [110/3] via 13.13.13.3, 20:53:56, FastEthernet0/1
R1#

R2:-

R2# sh ip ospf neighbor

Neighbor ID     Pri   State           Dead Time   Address         Interface
1.1.1.1           1   FULL/DR         00:00:31    12.12.12.1      FastEthernet1/0

R2#sh ip route  \\ No 5.5.5.5/32 route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route, H - NHRP
       + - replicated route, % - next hop override

Gateway of last resort is not set

      2.0.0.0/32 is subnetted, 1 subnets
C        2.2.2.2 is directly connected, Loopback0
      6.0.0.0/32 is subnetted, 1 subnets
O IA     6.6.6.6 [110/5] via 12.12.12.1, 20:53:25, FastEthernet1/0
      12.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        12.12.12.0/24 is directly connected, FastEthernet1/0
L        12.12.12.2/32 is directly connected, FastEthernet1/0
      13.0.0.0/24 is subnetted, 1 subnets
O        13.13.13.0 [110/2] via 12.12.12.1, 22:22:12, FastEthernet1/0
      15.0.0.0/24 is subnetted, 1 subnets
O E2     15.15.15.0 [110/20] via 12.12.12.1, 17:02:59, FastEthernet1/0
      20.0.0.0/8 is variably subnetted, 4 subnets, 2 masks
C        20.1.1.0/24 is directly connected, Loopback1
L        20.1.1.2/32 is directly connected, Loopback1
C        20.1.2.0/24 is directly connected, Loopback2
L        20.1.2.2/32 is directly connected, Loopback2
      34.0.0.0/24 is subnetted, 1 subnets
O IA     34.34.34.0 [110/3] via 12.12.12.1, 21:05:27, FastEthernet1/0
      46.0.0.0/24 is subnetted, 1 subnets
O IA     46.46.46.0 [110/4] via 12.12.12.1, 20:53:25, FastEthernet1/0
R2#


R3:-

R3#sh ip ospf neighbor

Neighbor ID     Pri   State           Dead Time   Address         Interface
1.1.1.1           1   FULL/DR         00:00:38    13.13.13.1      FastEthernet0/1
4.4.4.4           1   FULL/BDR        00:00:39    34.34.34.4      FastEthernet1/0

R3#sh ip route    \\ No 5.5.5.5/32 route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route, H - NHRP
       + - replicated route, % - next hop override

Gateway of last resort is not set

      3.0.0.0/32 is subnetted, 1 subnets
C        3.3.3.3 is directly connected, Loopback0
      6.0.0.0/32 is subnetted, 1 subnets
O        6.6.6.6 [110/3] via 34.34.34.4, 20:55:35, FastEthernet1/0
      12.0.0.0/24 is subnetted, 1 subnets
O        12.12.12.0 [110/2] via 13.13.13.1, 22:47:58, FastEthernet0/1
      13.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        13.13.13.0/24 is directly connected, FastEthernet0/1
L        13.13.13.3/32 is directly connected, FastEthernet0/1
      15.0.0.0/24 is subnetted, 1 subnets
O E2     15.15.15.0 [110/20] via 13.13.13.1, 17:04:58, FastEthernet0/1
      20.0.0.0/24 is subnetted, 2 subnets
O        20.1.1.0 [110/3] via 13.13.13.1, 22:25:39, FastEthernet0/1
O        20.1.2.0 [110/3] via 13.13.13.1, 22:24:20, FastEthernet0/1
      34.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        34.34.34.0/24 is directly connected, FastEthernet1/0
L        34.34.34.3/32 is directly connected, FastEthernet1/0
      46.0.0.0/24 is subnetted, 1 subnets
O        46.46.46.0 [110/2] via 34.34.34.4, 20:55:35, FastEthernet1/0

R4:-

R4#sh ip ospf neighbor

Neighbor ID     Pri   State           Dead Time   Address         Interface
3.3.3.3           1   FULL/DR         00:00:32    34.34.34.3      FastEthernet1/0
6.6.6.6           1   FULL/DR         00:00:35    46.46.46.6      FastEthernet0/0
R4#sh ip rou
R4#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route, H - NHRP
       + - replicated route, % - next hop override

Gateway of last resort is not set

      4.0.0.0/32 is subnetted, 1 subnets
C        4.4.4.4 is directly connected, Loopback0
      6.0.0.0/32 is subnetted, 1 subnets
O        6.6.6.6 [110/2] via 46.46.46.6, 00:07:07, FastEthernet0/0
      12.0.0.0/24 is subnetted, 1 subnets
O IA     12.12.12.0 [110/3] via 34.34.34.3, 00:07:07, FastEthernet1/0
      13.0.0.0/24 is subnetted, 1 subnets
O IA     13.13.13.0 [110/2] via 34.34.34.3, 00:07:07, FastEthernet1/0
      15.0.0.0/24 is subnetted, 1 subnets
O E2     15.15.15.0 [110/20] via 34.34.34.3, 00:07:07, FastEthernet1/0
      20.0.0.0/24 is subnetted, 2 subnets
O IA     20.1.1.0 [110/4] via 34.34.34.3, 00:07:07, FastEthernet1/0
O IA     20.1.2.0 [110/4] via 34.34.34.3, 00:07:07, FastEthernet1/0
      34.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        34.34.34.0/24 is directly connected, FastEthernet1/0
L        34.34.34.4/32 is directly connected, FastEthernet1/0
      46.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        46.46.46.0/24 is directly connected, FastEthernet0/0
L        46.46.46.4/32 is directly connected, FastEthernet0/0
R4#

R5:-

R5#sh ip eigrp neighbors
EIGRP-IPv4 Neighbors for AS(1)
H   Address                 Interface       Hold Uptime   SRTT   RTO  Q  Seq
                                            (sec)         (ms)       Cnt Num
0   15.15.15.1              Fa0/0             12 00:12:16  481  2886  0  7
R5#sh ip rou
R5#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route, H - NHRP
       + - replicated route, % - next hop override

Gateway of last resort is not set

      5.0.0.0/32 is subnetted, 1 subnets
C        5.5.5.5 is directly connected, Loopback0
      6.0.0.0/32 is subnetted, 1 subnets
D EX     6.6.6.6 [170/2560002816] via 15.15.15.1, 00:12:17, FastEthernet0/0
      12.0.0.0/24 is subnetted, 1 subnets
D EX     12.12.12.0 [170/2560002816] via 15.15.15.1, 00:12:17, FastEthernet0/0
      13.0.0.0/24 is subnetted, 1 subnets
D EX     13.13.13.0 [170/2560002816] via 15.15.15.1, 00:12:17, FastEthernet0/0
      15.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C        15.15.15.0/24 is directly connected, FastEthernet0/0
L        15.15.15.5/32 is directly connected, FastEthernet0/0
      20.0.0.0/24 is subnetted, 2 subnets
D EX     20.1.1.0 [170/2560002816] via 15.15.15.1, 00:12:17, FastEthernet0/0
D EX     20.1.2.0 [170/2560002816] via 15.15.15.1, 00:12:17, FastEthernet0/0
      34.0.0.0/24 is subnetted, 1 subnets
D EX     34.34.34.0 [170/2560002816] via 15.15.15.1, 00:12:17, FastEthernet0/0
      46.0.0.0/24 is subnetted, 1 subnets

D EX     46.46.46.0 [170/2560002816] via 15.15.15.1, 00:12:17, FastEthernet0/]