Hi Jeff;

            Thanks for the reply. I have viewed your videos and it was very
nice as it was more related to the practical sessions. Please find my
queries inline


1. In HSRP configuration , preempt is configured for secondary router also.
Is it required ?

In a 2 switch setup, preempt is never needed on the secondary switch for
what we need to worry about.  It would only come into play if we were doing
tracking, which is too deep for the wireless lab in my opinion.


If we are configuring preempt in both switches will it be considered as
over configuration. I am confused as in Lab1 solutions preempt is
configured on both switches.




2. While configuring DHCP we split down the DHCP pool and configured in
both switches. Is it required to split the DHCP pool or we can configure
the complete pool in both switches. Since the HSRP is configured it will
always take it from the active router ?

It is not required to split the DHCP pool between the switches.  But if you
have the same range on both, you increase your chance of duplicate IPs.
 The switches do a check prior to handing out an IP, but it's not
fool-proof.

Any switch that receives the DHCP request should respond.  So a broadcasted
request would be received and responded to by both switches.  A directed
broadcast (maybe coming from a client through a WLC), would only be
received by the switch that it was sent to.


For example i have a subnet 10.10.12.0/24. and the virtual ip is
10.10.12.1. In the WLC i have configured the primary DHCP server as
10.10.12.1. In this case only the active router will respond correct and
the standby router will not respond. Please correct me if i am  wrong. If
my assumption is correct then we can replicate the same pool to both
switches correct.


Why i am saying is if we are splitting the DHCP pool then each pool will
serve only 128 IP's at a time. So if Cisco expecting  all 254 IP's then we
are wrong. isnt it.






3. In QOS section, dscp is configured in the trunk links as well. Is it a
typing error?

It doesn't explicitly say what to trust for any given port.  It just says
to trust layer2/3 markings where appropriate.  On switch to switch links,
you could trust either CoS or DSCP.  I prefer DSCP myself if given the
option.  If you trust CoS, be careful about native VLANs.  You will lose
all QoS markings on a native VLAN when you trust CoS (since it doesn't have
an 802.1q tag).


I am confused.

Could you please give me a hint the question pattern  in the following cases

1. Where we should use DSCP completely.

2. Where we should use CoS completely

3. Based on which question we should use the combination of CoS and DSCP.






4. In QOS section the access list for marking is general. its for any any
with ports. Is it fine or we need to be specific with the source and
destination.

It comes down to how the requirements are worded.  It didn't actually say
voice traffic from the voice subnet in the MO.  Just generic voice traffic
and no subnets or VLANs were mentioned.  So in this instance, we can't
really call out IP ranges in our ACLs.  But one change that I would make is
in the RTP ACL.  It currently reads this.

permit udp any any range 16384 32767
permit udp any range 16384 32767 any

I would change it to this.

permit udp any range 16384 32767 any range 16384 32767

You generally should try to be as specific as you can.  If they mentions
specific subnets/hosts, I would absolutely include those in my ACLs.



Got it.


5. In Autonomous section why we have configured the other groups. We need
only rad_group correct ?

Those other groups get added automatically if you use the GUI to add in the
RADIUS server.  The only group needed for the solution was the rad_group
one that you mentioned.



does it required

aaa group server radius rad_eap
 server 10.10.110.100 auth-port 1812 acct-port 1813
!

aaa authentication login eap_methods group rad_eap


aaa authentication login mac_methods local does it required

aaa authorization exec default local does it required



aaa accounting network acct_methods start-stop group rad_acct
     does
it required


ip radius source-interface BVI1
radius-server local
  no authentication leap
  no authentication mac
  nas 10.10.110.100 key 7 08285C4B1109000506
  user crane nthash 7
06202D721C1B2D49523130532E537D7A01791567034B54475658040D0877712C52

!
radius-server attribute 32 include-in-access-req format %h  does it required


radius-server host 10.10.110.100 auth-port 1812 acct-port 1813 key 7
000D03031C4B0E141B   Confused with this command as we already mentioned the
radius server in rad_eap and radius server local.

radius-server vsa send accounting  does it required





On Tue, Mar 4, 2014 at 11:28 PM, Jeff Rensink <[email protected]> wrote:

> 1. In HSRP configuration , preempt is configured for secondary router
> also. Is it required ?
>
> In a 2 switch setup, preempt is never needed on the secondary switch for
> what we need to worry about.  It would only come into play if we were doing
> tracking, which is too deep for the wireless lab in my opinion.
>
> 2. While configuring DHCP we split down the DHCP pool and configured in
> both switches. Is it required to split the DHCP pool or we can configure
> the complete pool in both switches. Since the HSRP is configured it will
> always take it from the active router ?
>
> It is not required to split the DHCP pool between the switches.  But if
> you have the same range on both, you increase your chance of duplicate IPs.
>  The switches do a check prior to handing out an IP, but it's not
> fool-proof.
>
> Any switch that receives the DHCP request should respond.  So a
> broadcasted request would be received and responded to by both switches.  A
> directed broadcast (maybe coming from a client through a WLC), would only
> be received by the switch that it was sent to.
>
>
> 3. In QOS section, dscp is configured in the trunk links as well. Is it a
> typing error?
>
> It doesn't explicitly say what to trust for any given port.  It just says
> to trust layer2/3 markings where appropriate.  On switch to switch links,
> you could trust either CoS or DSCP.  I prefer DSCP myself if given the
> option.  If you trust CoS, be careful about native VLANs.  You will lose
> all QoS markings on a native VLAN when you trust CoS (since it doesn't have
> an 802.1q tag).
>
> 4. In QOS section the access list for marking is general. its for any any
> with ports. Is it fine or we need to be specific with the source and
> destination.
>
> It comes down to how the requirements are worded.  It didn't actually say
> voice traffic from the voice subnet in the MO.  Just generic voice traffic
> and no subnets or VLANs were mentioned.  So in this instance, we can't
> really call out IP ranges in our ACLs.  But one change that I would make is
> in the RTP ACL.  It currently reads this.
>
> permit udp any any range 16384 32767
> permit udp any range 16384 32767 any
>
> I would change it to this.
>
> permit udp any range 16384 32767 any range 16384 32767
>
> You generally should try to be as specific as you can.  If they mentions
> specific subnets/hosts, I would absolutely include those in my ACLs.
>
> 5. In Autonomous section why we have configured the other groups. We need
> only rad_group correct ?
>
> Those other groups get added automatically if you use the GUI to add in
> the RADIUS server.  The only group needed for the solution was the
> rad_group one that you mentioned.
>
> Regards,
>
>
>
> Jeff Rensink : Sr Instructor : iPexpert <http://www.ipexpert.com/>
>
> CCIE # 24834 :: Wireless / R&S
>
> :: World-Class Cisco Certification Training
>
> Direct: +1.810.326.1444
>
> :: Free Videos <http://www.youtube.com/ipexpertinc>
>
> :: Free Training / Product Offerings <http://www.facebook.com/ipexpert>
>
> :: CCIE Blog <http://blog.ipexpert.com/>
> :: Twitter <http://www.twitter.com/ipexpert>
>
>
> On Tue, Mar 4, 2014 at 11:31 AM, Sreejith Kuruppu <[email protected]>wrote:
>
>> Hi Team;
>>
>>                   I have some doubts while going through Lab1. Could you
>> please help in clearing those.
>>
>> 1. In HSRP configuration , preempt is configured for secondary router
>> also. Is it required ?
>>
>> 2. While configuring DHCP we split down the DHCP pool and configured in
>> both switches. Is it required to split the DHCP pool or we can configure
>> the complete pool in both switches. Since the HSRP is configured it will
>> always take it from the active router ?
>>
>>
>> 3. In QOS section, dscp is configured in the trunk links as well. Is it a
>> typing error?
>>
>> 4. In QOS section the access list for marking is general. its for any any
>> with ports. Is it fine or we need to be specific with the source and
>> destination.
>>
>> 5. In Autonomous section why we have configured the other groups. We need
>> only rad_group correct ?
>>
>>
>> Thanks & Regards
>> Sreejith R
>>
>> _______________________________________________
>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::
>>
>> iPexpert on YouTube: www.youtube.com/ipexpertinc
>>
>
>
_______________________________________________
Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos ::

iPexpert on YouTube: www.youtube.com/ipexpertinc

Reply via email to