Ip6fd - V3.1 - LG 10 02 23
Ip6fd - V3.1 - LG 10 02 23
IPv6 Fundamentals,
Design, and Deployment
Lab Guide
Activity Objective
In this activity, you will enable basic IPv6 connectivity on PCs that are running Windows 10, and Linux,
and on a Cisco IOS router. After completing this activity, you will be able to meet the following
objectives:
Configure IPv4 addressing and routing on a PC.
Configure IPv6 addressing and routing on a router.
Configure static IPv6 addressing and routing on a PC that uses the Windows 10 operating
system.
Configure static IPv6 addressing and routing on a PC that uses the Linux operating system.
The lab environment is set up so that IPv4 is already configured on router R1. Configure Windows 10
on PC1 for IPv4 so that you can use Telnet to connect to the router.
R1 WAN access router for PC1; used as a default gateway for IPv4 and IPv6
traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the
Windows 10 operating system and the network.
PC2 End user with applications that require both IPv4 and IPv6 support by the
Linux operating system and the network.
Command Description
Command Description
netsh interface ip set address Configures the IPv4 address, mask, and default
int_name static ip_addr net_mask gateway to the interface named int_name.
def_gw 1
netsh interface ipv6 add address Adds an IPv6 address to an interface on
int_name ipv6_address Microsoft Windows 10.
netsh interface ipv6 add route Adds a route for a specified prefix.
route int_name next-hop
netsh interface ipv6 show interface Displays Windows 10 interfaces.
[intf]
ping Enters the ping command from Windows 10.
Note You can get detailed help if you type a question mark at the end of the netsh commands; for
example, netsh interface ipv6 add address ?.
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information. Log this
information in the table.
Pod-Access Information
Parameter Value
Username on router R1 —
Password on router R1 —
Note Router R1 is preconfigured to allow access without any credentials. Any Telnet session or console
access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type lab-2-1 and type Y to confirm.
To confirm, do a show ip interface brief and you should see that there is now
an address on interface GigabitEthernet1.
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 (Win10-1) and log in by using the username and password as
specified in the Job Aids section. Right-click on the Network icon in the lower-
right corner and select Open Network and Sharing Center.
Step 2 Click on Change adapter settings on the left side of the window.
Note The steps show a common end user approach to complete this task. An alternative method is to
execute the netsh int ip set address LAB static 192.168.1.2 255.255.255.0 192.168.1.1 1 CLI
command in the Windows 10 command-prompt window.
.
Ping the IPv4 address of R1. The ping should be successful.
C:\Users\Admin>ping 192.168.1.1
Note You can connect directly to the console port of the router by clicking the router icon, or you can use
Telnet and connect from your remote desktop session. In either case, you do not need any account
(username and password) to have full access to enable mode.
Activity Procedure
Complete the following steps:
Step 1 On R1, verify the IPv4 interfaces. Your output should match the lab topology.
Step 2 Verify the IPv4 routing table.
Step 3 Verify the IPv6 status of the interfaces and routing table. Nothing should be
assigned at this point.
Step 4 Enable IPv6 unicast routing in global configuration mode.
Step 5 Enable IPv6 on the GigabitEthernet1 interface.
Step 6 Disable neighbor discovery router advertisements on the GigabitEthernet1
interface.
Step 7 Configure an IPv6 address on the GigabitEthernet1 interface. Use the address
that is listed in the Job Aids section.
Activity Verification
You have completed this task when you attain this result:
On R1, again verify the IPv6 status of the interfaces and routing table. You will see both the
network (/64) and the host (/128) addresses that are assigned to the GigabitEthernet1 interface.
R1#show ipv6 interface brief
GigabitEthernet1 [up/up]
FE80::217:59FF:FE03:19B8
2001:DB9:1:1::1
GigabitEthernet2 [administratively down/down]
unassigned
GigabitEthernet3 [administratively down/down]
unassigned
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 and open a command-prompt window. Verify the list of
interfaces.
Step 2 Add a static IPv6 address to the LAB interface. Obtain the address from the Job
Aids section.
Use the netsh interface ipv6 add address “LAB” 2001:db9:1:1::f
Step 3 Add a static default IPv6 route to point to router R1.
Use the netsh interface ipv6 add route ::/0 “LAB” 2001:db9:1:1::1
Activity Procedure
Complete the following steps:
Step 1 Connect to Ubuntu PC and log in by using the username and password that are
specified in the Job Aids section.
Step 2 Open a Terminal window.
Activity Objective
In this activity, you will configure router advertisements and adjust parameters that are associated with
neighbor discovery. After completing this activity, you will be able to meet these objectives:
Configure a router to send router advertisements.
Renumber a local network.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1 Access router for PC1; used as a default gateway for IPv4 and IPv6 traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Command Description
Windows PC Commands
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information. Log this
information in the table.
Pod-Access Information
Parameter Value
Username on router R1 —
Password on router R1 —
Note Router R1 is preconfigured to allow access without any credentials. Any Telnet session or console
access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type lab-2-2 and type Y to confirm.
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 and log in by using the credentials that are listed in the Job Aids
section. Verify the statically configured IPv6 address.
Step 2 Open the command prompt and remove the static IPv6 address from your PC
(use the LAB interface index and the static prefix).
Step 3 On the GigabitEthernet 1 interface, configure router advertisements by using the
prefix that is assigned to the LAN (refer to the Job Aids section). Because infinite
lifetimes are not desired, use 5 minutes (300 seconds) for the lifetimes (both
preferred and valid).
Step 4 Also set the advertisement interval to 30 seconds.
Step 5 On R1, enable the debugging of IPv6 neighbor discovery events.
Step 6 Stop suppressing the router advertisements, which were disabled in the initial
configuration.
Activity Verification
You have completed this task when you attain these results:
On R1, observe the debugging output after enabling router advertisements.
04:10:47: ICMPv6-ND: Request to send RA for FE80::217:59FF:FE26:3FE0
04:10:47: ICMPv6-ND: Sending RA from FE80::217:59FF:FE26:3FE0 to FF02::1 on
FastEthernet0/0
04:10:47: ICMPv6-ND: MTU = 1500
04:10:47: ICMPv6-ND: prefix = 2001:DB9:1:1::/64 onlink autoconfig
04:10:47: ICMPv6-ND: 300/300 (valid/preferred)
On PC1, verify that an IPv6 address was automatically assigned to the PC with the prefix that
you configured. Note that the previously configured static and link-local addresses are still
present and valid.
Note If you want to turn off the temporary address type (the default behavior), apply the netsh interface
ipv6 set privacy state=disabled command before a new IPv6 address is assigned to your PC.
(Disable and re-enable the interface.)
Activity Procedure
Complete the following steps:
Step 1 On R1, replace address of the GigabitEthernet 1 interface by using the new
global prefix that is assigned to your pod: 2001:db9:1:1001::1/64.
Step 2 Configure router advertisements by using the new /64 prefix that is identified for
your pod. Use 5 minutes (300 seconds) for both preferred and valid lifetimes.
Step 3 Modify the neighbor advertisements for the original prefix that is advertised, by
setting the preferred lifetime to zero.
Activity Verification
You have completed this task when you attain these results:
Verify that PC1 now deprecates the use of the former prefix and prefers the new one.
On R1, verify connectivity to PC1 by using the new autoconfigured address of PC1.
R1#ping ipv6 2001:db9:1:1001:<use workstation suffix>
On R1, turn off debugging using the command: u all ( undebug all )
Activity Objective
In this activity, you will configure a DHCPv6 server to delegate a prefix to a DHCPv6 client. After
completing this activity, you will be able to meet these objectives:
Configure the prefix delegation server and client.
Configure a non-prefix delegation DHCPv6 server.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1 Access router in Site 1; used as the default gateway for IPv4 and IPv6 traffic.
R2 Access router in Site 2; used as the default gateway for IPv4 and IPv6 traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
PC2 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Command Description
ipv6 dhcp client pd name Enables DHCP for the IPv6 client process and
enables a request for prefix delegation through a
specified interface.
ipv6 dhcp pool name Configures DHCP for IPv6 server configuration-
information pool and enters DHCP for IPv6 pool
configuration mode.
ipv6 dhcp server name Enables DHCP for IPv6 service on an interface.
ipv6 local pool name prefix prefix- Configures a local IPv6 prefix pool.
length hex-string
ipv6 nd other-config-flag Sets the “other stateful configuration” flag in IPv6
router advertisements and indicates to the
attached hosts how they can obtain
autoconfiguration information other than
addresses (dns-server information).
show ipv6 dhcp binding Displays automatic client bindings from DHCP for
the IPv6 server binding table.
show ipv6 dhcp pool Displays DHCP for IPv6 configuration pool
information.
show ipv6 interface Displays the usability status of interfaces that are
configured for IPv6.
Windows PC Commands
Command Description
netsh interface ipv6 renew Renews the configuration of one or all interfaces.
[intfName]
netsh interface ipv6 show interface Displays a list of interfaces or details for a
[ifix] specific interface.
Pod-Access Information
Parameter Value
Username on router R1 —
Password on router R1 —
Username on router R2 —
Password on router R2 —
Note Routers R1 and R2 are preconfigured to allow access without any credentials. Any Telnet session
or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type Lab-3-1 and type Y to confirm.
Activity Procedure
Complete the following steps:
Step 1 On R1, configure a local IPv6 prefix pool.
Step 2 Create a DHCPv6 pool named GlobalDHCP for the prefix delegation server by
using the parameters that are listed in the table.
Parameter Value
Step 6 In a typical deployment, the DHCPv6 client router will, upon receiving a prefix,
configure local interfaces with new addresses and possibly send router
advertisements to clients that are downstream so that they can configure IPv6
addresses.
Activity Verification
You have completed this task when you attain these results:
On R2, review the prefix delegation client interface status. The GigabitEthernet 1
interface has taken the network address from the DHCPv6 server-supplied prefix.
On R1, review the DCHPv6 prefix delegation status. Now that the client has made a prefix
request, the delegated prefix should be listed.
Note If the Windows 10 machine had a DHCPv6 client, the router advertisement would instruct the PC to
solicit for other configuration information from a DHCPv6 server (not a DHCPv6 prefix delegation
server).
Note Static routes have been preconfigured to enable the reachability between the two sites.
Verify the path from PC1 to PC2. Use the dynamically assigned address.
Note The Windows 10 client does not have a DHCPv6 client. Therefore, your PC will not actually make
any requests to your router.
Activity Procedure
Complete the following steps:
Step 1 On R2, configure a DHCPv6 server pool named SITE2 by using the parameters
that are listed in the table.
Parameter Value
Activity Objective
In this activity, you will enable HSRP for IPv6 on the Cisco IOS routers R1 and R4. After completing this
activity, you will be able to meet the following objectives:
Configure IPv6 first hop redundancy using Hot Standby Routing Protocol.
Configure R1 such that it will be the active router using priority.
Configure R4 such that it will become the active router in the event of a link failure on R1.
Configure HSRP IPv6 to use the burnt-in-address (mac) of the current Active Router.
PC3
PC2
A3v6 (R2) R1
A2v6 (R4)
Static Addressing
PC1 Linux
The lab environment is set up so that IPv4 is already configured on router R1. Configure Windows 10
on PC1 for IPv4 so that you can use Telnet to connect to the router.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
PC1 End user with applications that require IPv6 first hop redundancy for the
gateway 2001:DB9:1:1::1 through either R1 or R4 (preferring R1).
Command List
The table describes the commands that are used in this activity.
Command Description
Command Description
netsh interface ip set address Configures the IPv4 address, mask, and default
int_name static ip_addr net_mask gateway to the interface named int_name.
def_gw 1
netsh interface ipv6 add address Adds an IPv6 address to an interface on
int_name ipv6_address Microsoft Windows 10.
netsh interface ipv6 add route Adds a route for a specified prefix.
route int_name next-hop
netsh interface ipv6 show interface Displays Windows 10 interfaces.
[intf]
ping Enters the ping command from Windows 10.
Note You can get detailed help if you type a question mark at the end of the netsh commands; for
example, netsh interface ipv6 add address ?.
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information. Log this
information in the table.
Pod-Access Information
Parameter Value
Note Router R1 and R4 is preconfigured to allow access without any credentials. Any Telnet session or
console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
R4 GigabitEthernet2 2001:db9:1:1::14/64
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1), Router 3 (R3), Router 4 (R4) and Router 5 (R5) and
get to privileged mode.
Step 2 Type HSRP and type Y to confirm. The illustration below shows this process on
R1 (you will need to execute the same command on all the routers outline in Step
1).
To confirm, do a show ipv6 interface brief and you should see that there is now
an ipv6 address on interface GigabitEthernet1 that is 2001:DB9:1:1::11/64.
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 and open a command-prompt window. Verify the list of
interfaces.
Step 2 Test reachability to both R1 and R6 using there ipv6 addresses.
Use the ping 2001:1:1::11 and ping 2001:1:1::14 command.
Step 4 Make note of the Physical Addresses for the two tested IPv6 addresses. Also
note that the prospective gateway address 2001:db9:1:1::1 is Unreachable.
Step 8 Make note that R1 is the Active Router in this scenario, and it is using the “virtual
MAC” address of 0050.56a0.7370 matching the physical MAC address of this
interface.
Step 9 We will now repeat the “show standby” command on R4.
Step 11 Next, using netsh we will verify that the correct MAC address is being learned.
Use the netsh interface ipv6 show neighbor command.
Step 2 Verify that you see a message like the following which indicates that the device
has transitioned from the Active state to the Init (due to the loss of
communication to R4):
Step 3 Next open console to R4 and validate that this device is indeed the Active
Forwarder now by observing the Syslog Console Messages and by using the
show standby command.
Activity Objective
In this activity, you will configure, operate, and monitor an OSPF routing environment. You will
configure the protocol and examine detailed information about how it works. After completing this
activity, you will be able to meet these objectives:
Configure OSPF.
Summarize route announcements.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1 Access router in the Central Site; used as the default gateway for IPv4 and
IPv6 traffic.
R2 Access router in the Remote Site; used as the default gateway for IPv4 and
IPv6 traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
PC2 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Command List
The table describes the commands that are used in this activity.
Command Description
clear ipv6 ospf Clears the OSPF state, based on the OSPF
routing process ID.
ipv6 ospf process-id area area-id Enables OSPF for IPv6 on an interface.
show ipv6 interface [brief] Displays the brief usability status of interfaces
that are configured for IPv6.
show ipv6 route Displays the current contents of the IPv6 routing
table.
Windows PC Commands
Command Description
Pod-Access Information
Parameter Value
Username on router R1 —
Password on router R1 —
Username on router R2 —
Password on router R2 —
Note Routers R1 and R2 are preconfigured to allow access without any credentials. Any Telnet session
or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type lab-4-1 and type Y to confirm.
Activity Procedure
Complete the following step:
Step 1 Configure OSPF on routers R1 and R2 by using the parameters that are listed in
the table. Enable OSPFv3 for IPv6 using the legacy ipv6 router ospf 1 and
ipv6 ospf 1 area x commands.
OSPF Parameters
Parameter R1 R2
Process ID 1 1
Area 0 GigabitEthernet1 —
Loopback 1
Loopback 2
Activity Verification
You have completed this task when you attain these results:
On R1, review the OSPF process details. The output should show router R1 as an “area border
router” because two areas are configured.
OSPF neighbors also exchange LSAs and other information whenever the state of the network
topology changes. Trigger the re-establishment of OSPF neighbor relationships.
R1#debug ipv6 ospf flood
R1#clear ipv6 ospf process
You can also watch the OSPF adjancies form by running the debug ipv6 ospf adj command.
Once you are done looking at the process, disable all debugging by using the undebug all
command.
Activity Procedure
Complete the following step:
Step 1 Configure summarization of the address space of Area 0 for other areas. Create
a summary 2001:db9:1::/48 in Area 0 on R1.
Activity Verification
You have completed this task when you attain these results:
Review the contents of the IPv6 routing table on R2 to determine whether only the summary is
advertised by Area 0 (R1).
Note In OSPFv3, the router uses the 32-bit IPv4 address to select the router ID for an OSPF process. If
an IPv4 address exists when OSPFv3 is enabled on an interface, then that IPv4 address is used
for the router ID. If more than one IPv4 address is available, a router ID is chosen using the same
rules as for OSPF version 2.
Activity Procedure
Complete the following steps:
Step 1 Remove router rip and ipv6 route ospf on R1 and R2.
Step 2 On interface Loopback 1 of router R1, add the address of 192.168.11.1/24 and
on router R2 add 192.168.22.2/24.
Step 3 Configure router ospfv3 1 on R1 and R2. Enable the process on all the
interfaces as detailed in the following table:
Parameter R1 R2
Process ID 1 1
Area 0 GigabitEthernet1 —
Loopback 1
Verify that PC1 can still ping PC1 for both IPv4 and IPv6.
Activity Objective
In this activity, you will reconfigure the lab environment for EIGRP and examine the operation of the
protocol. After completing this activity, you will be able to meet these objectives:
Configure EIGRP for IPv6 routing.
Configure EIGRP for IPv6 summarization.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1 Access router in the Central Site; used as the default gateway for IPv4 and
IPv6 traffic.
R2 Access router in the Remote Site; used as the default gateway for IPv4 and
IPv6 traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
PC2 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Command List
The table describes the commands that are used in this activity.
Command Description
ipv6 summary-address eigrp AS Summarizes IPv6 EIGRP updates that are sent
prefix out of an interface.
show ipv6 route Displays the current contents of the IPv6 routing
table.
Windows PC Commands
Command Description
Pod-Access Information
Parameter Value
Username on router R1 —
Password on router R1 —
Username on router R2 —
Password on router R2 —
Note Routers R1 and R2 are preconfigured to allow access without any credentials. Any Telnet session
or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type lab-4-3 and type Y to confirm.
Activity Procedure
Complete the following steps:
Step 1 Configure EIGRP for IPv6 on routers R1 and R2 by using the parameters that are
listed in the table.
EIGRP Parameters
Parameter R1 R2
EIGRP AS 1 1
Examine the EIGRP topology table. You should see all routes: local and remote, including those
that you might not see in the routing table because static and connected routes take
precedence (two LANs, four loopbacks, and the point-to-point link).
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 101
Review the IPv6 routing table for EIGRP routes on both routers. You should see three EIGRP
routes (the remote LAN and two loopbacks) on each router.
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 102
On PC1, test the reachability of PC2 (use IPv6 address 2001:db9:2:1::f).
Review the path between PC1 and PC2 (use IPv6 address 2001:db9:2:1::f). Use the -d option to
speed up the response of the traceroute. That disables the reverse DNS lookup from address to
name.
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 103
Task 2: Configuring EIGRP for IPv6 Summarization
In this task, you will optimize IPv6 EIGRP to send only a summary from the Central Site to the Remote
Site and vice versa.
Activity Procedure
Complete the following steps:
Step 1 On R1, create an EIGRP summary 2001:db9:1::/48 on interface GigabitEthernet2
to propagate only one summary route instead of three more-specific routes.
Step 2 On R2, create an EIGRP summary 2001:db9:2::/48 on interface GigabitEthernet2
to propagate only one summary route instead of three more-specific routes.
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 104
Activity Verification
You have completed this task when you attain this result:
Review the IPv6 routing table for EIGRP routes on both routers. You should see only one
EIGRP-learned remote route—the summary—on each router. You will also see an EIGRP route
for the local summary; this route points to the Null interface, to drop packets for unavailable,
more-specific prefixes.
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 105
Task 3: Configuring Named EIGRP for IPv6 and
IPv4
In this task, you will enable the Named version of EIGRP and configure it to support both IPv4 and
IPv6.
Activity Procedure
Complete the following steps:
Step 1 On R1 and R2, remove router rip for IPv4 and EIGRP for IPv6.
Step 2 On R1 add the following IPv4 addresses to the loopback interfaces:
Loopback 1 192.168.11.1/32
Loopback 2 192.168.12.1/32
Loopback 1 192.168.21.1/32
Loopback 2 192.168.22.1/32
Step 4 Enable the named version of EIGRP on R1 and R2 using the following
parameters:
EIGRP Parameters
Parameter R1 R2
IPv4 EIGRP AS 4 4
IPv6 EIGRP AS 6 6
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 106
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 107
Note There is no configuration done at the interface level for IPv6, it is automatic with Topology base
(default) to include all interface with IPv6 addressing applied.
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 108
Activity Verification
You have completed this task when you attain this result:
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 109
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 110
Discovery Lab 6 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 111
Discovery Lab 7: Routing with
BGP and MP-BGP
Complete this lab activity to practice what you learned in the related module.
Activity Objective
In this activity, you will configure iBGP and eBGP for IPv6. BGP is used for inter-AS route propagation
throughout the Internet and within large enterprise and ISP networks. iBGP is used between different
parts of the same AS, and eBGP is used between AS networks. After completing this activity, you will
be able to meet these objectives:
Configure iBGP for IPv6.
Configure eBGP for IPv6.
Configure IPv6 prefix filtering in BGP.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 112
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1 Access router in the Central Site; used as the default gateway for IPv4 and IPv6 traffic.
R2 Access router in the Remote Site; used as the default gateway for IPv4 and IPv6 traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the operating
system and the network.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 113
Device Device Role in the Laboratory
Name
PC2 End user with applications that require both IPv4 and IPv6 support by its operating
system and the network.
Command List
The table describes the commands that are used in this activity.
Command Description
neighbor IP activate Enables IPv6 exchange with the peer, when used
in the IPv6 address family.
neighbor IP prefix-list PFL {in | Applies a prefix list for inbound or outbound
out} filtering of BGP updates.
no bgp default ipv4-unicast Disables the IPv4 unicast address family on all
neighbors.
route-map name {permit | deny} seq Defines the conditions for redistributing routes
match condition [condition]* from one routing protocol into another and
[match condition [condition]*] enables policy routing or filtering routes.
route-map name {permit | deny} seq Sets the origin code within BGP updates.
set origin {egp | igp |
incomplete}
router bgp Configures the BGP routing process.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 114
Command Description
show bgp ipv6 Displays entries in the IPv6 BGP routing table.
show ipv6 interface Displays the usability status of interfaces that are
configured for IPv6.
show ipv6 route Displays the current content of the IPv6 routing
table.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 115
Windows PC Commands
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information.
Log this information in the table.
Pod-Access Information
Parameter Value
Username on router R1 —
Password on router R1 —
Username on router R2 —
Password on router R2 —
Username on ISP —
Password on ISP —
Note Routers R1, R2, and ISP are preconfigured to allow access without any credentials. Any Telnet
session or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 116
Pod Addressing
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 117
Task 0: Reset the Router for this Lab
In this task, you will reset the router(s) for the beginning of this lab. The process is using a configure
restore option within IOS. There are command aliases already configured as the baseline of the routers
and they reference configurations found in flash.
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type lab-4-4 and type Y to confirm.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 118
Task 1: Configure IBGP for IPv6
In this task, you will enable BGP to exchange IPv6 routing information between two sites that belong to
AS 65001. The two routers R1 and R2 have been preconfigured with loopback addresses, which are
exchanged by using OSPFv3. These two loopbacks will be used to establish an iBGP session between
the two routers.
Activity Procedure
Complete the following step:
Step 1 Configure iBGP between R1 and R2 by using the parameters that are listed in
the table.
IBGP Parameters
Parameter R1 R2
AS 65001 65001
IPv4 Propagation No No
(enabled by default)
IPv6 Propagation Yes Yes
(disabled by default)
Source Address Loopback 1 Loopback 1
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 119
Activity Verification
You have completed this task when you attain these results:
On R1, review the status of iBGP sessions. A number in the State/PfxRcd column indicates an
established BGP session (in this case the word wrapping has the 4 on the next line).
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 120
Review the contents of the BGP table for IPv6 on R1.
Review the content of the IPv6 routing table on R1. Look for the availability of the remote LAN.
Make the same review on R2.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 121
Optionally, you might want to monitor the process of BGP session setup and update exchange.
Enable the debugging of BGP events for the IPv6 address family and clear the BGP sessions.
BGP routing information is not exchanged for a stable network; only routing updates are sent.
On your router, turn on debugging (capture the console output as needed) and start BGP
debugging.
R1#debug bgp ipv6 unicast
Note Cisco IOS Software might crash if you turn on debugging and clear the IBGP process on the same
router. For that reason, use R2 to clear the IBGP process, and then observe debug output on R1.
Clear the iBGP process on R2 (the following is an example output, yours may look different).
R2#clear bgp ipv6 unicast *
R1#
03:13:19: BGP: 2001:DB9:2:100::1 remote close, state CLOSEWAIT
03:13:19: BGP: 2001:DB9:2:100::1 -reset the session
03:13:19: BGP(1): no valid path for 2001:DB9:2:1::/64
03:13:19: BGP(1): no valid path for 2001:DB9:2:100::/64
03:13:19: BGP(1): no valid path for 2001:DB9:2:200::/64
03:13:19: BGPNSF state: 2001:DB9:2:100::1 went from nsf_not_active to
nsf_not_active
03:13:19: BGP: 2001:DB9:2:100::1 went from Established to Idle
03:13:19: %BGP-5-ADJCHANGE: neighbor 2001:DB9:2:100::1 Down Peer closed the
session
03:13:19: BGP: 2001:DB9:2:100::1 closing
03:13:19: BGP(1): nettable_walker 2001:DB9:2:1::/64 no best path
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 122
03:13:19: BGP(1): nettable_walker 2001:DB9:2:100::/64 no best path
03:13:19: BGP(1): nettable_walker 2001:DB9:2:200::/64 no best path
03:13:20: BGP: 2001:DB9:2:100::1 passive open to 2001:DB9:1:100::1
03:13:20: BGP: 2001:DB9:2:100::1 went from Idle to Connect
03:13:20: BGP: 2001:DB9:2:100::1 rcv message type 1, length (excl. header) 26
03:13:20: BGP: 2001:DB9:2:100::1 rcv OPEN, version 4, holdtime 180 seconds
03:13:20: BGP: 2001:DB9:2:100::1 went from Connect to OpenSent
03:13:20: BGP: 2001:DB9:2:100::1 sending OPEN, version 4, my as: 65001, holdtime
180 seconds
03:13:20: BGP: 2001:DB9:2:100::1 rcv OPEN w/ OPTION parameter len: 16
03:13:20: BGP: 2001:DB9:2:100::1 rcvd OPEN w/ optional parameter type 2
(Capability) len 6
03:13:20: BGP: 2001:DB9:2:100::1 OPEN has CAPABILITY code: 1, length 4
03:13:20: BGP: 2001:DB9:2:100::1 OPEN has MP_EXT CAP for afi/safi: 2/1
03:13:20: BGP: 2001:DB9:2:100::1 rcvd OPEN w/ optional parameter type 2
(Capability) len 2
03:13:20: BGP: 2001:DB9:2:100::1 OPEN has CAPABILITY code: 128, length 0
03:13:20: BGP: 2001:DB9:2:100::1 OPEN has ROUTE-REFRESH capability(old) for all
address-families
03:13:20: BGP: 2001:DB9:2:100::1 rcvd OPEN w/ optional parameter type 2
(Capability) len 2
03:13:20: BGP: 2001:DB9:2:100::1 OPEN has CAPABILITY code: 2, length 0
03:13:20: BGP: 2001:DB9:2:100::1 OPEN has ROUTE-REFRESH capability(new) for all
address-families
03:13:20: BGP: 2001:DB9:2:100::1 rcvd OPEN w/ remote AS 65001
03:13:20: BGP: 2001:DB9:2:100::1 went from OpenSent to OpenConfirm
03:13:20: BGP: 2001:DB9:2:100::1 send message type 1, length (incl. header) 45
03:13:20: BGP: 2001:DB9:2:100::1 went from OpenConfirm to Established
03:13:20: %BGP-5-ADJCHANGE: neighbor 2001:DB9:2:100::1 Up
03:13:20: BGP(1): 2001:DB9:2:100::1 send UPDATE (format) 2001:DB9:1:200::/64, next
2001:DB9:1:100::1, metric 0, path Local
03:13:20: BGP(1): 2001:DB9:2:100::1 send UPDATE (prepend, chgflags: 0x0)
2001:DB9:1:100::/64, next 2001:DB9:1:100::1, metric 0, path Local
03:13:20: BGP(1): 2001:DB9:2:100::1 send UPDATE (prepend, chgflags: 0x0)
2001:DB9:1:A::/64, next 2001:DB9:1:100::1, metric 0, path Local
03:13:20: BGP(1): 2001:DB9:2:100::1 send UPDATE (prepend, chgflags: 0x0)
2001:DB9:1:1::/64, next 2001:DB9:1:100::1, metric 0, path Local
03:13:46: BGP(1): 2001:DB9:2:100::1 rcvd 2001:DB9:2:200::/64
03:13:46: BGP(1): 2001:DB9:2:100::1 rcvd 2001:DB9:2:100::/64
03:13:46: BGP(1): 2001:DB9:2:100::1 rcvd 2001:DB9:2:1::/64
03:13:46: BGP(1): 2001:DB9:2:100::1 rcvd 2001:DB9:1:A::/64
R1#undebug all
All possible debugging has been turned off
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 123
Review the path between PC1 and PC2 (use IPv6 address 2001:db9:2:1::f).
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 124
Task 2: Configure EBGP for IPv6
In this task, you will configure eBGP for IPv6 towards router ISP.
Activity Procedure
Complete the following step:
Step 1 On R1, configure an eBGP for IPv6 with router ISP. Use the BGP parameters
that are listed in the table. Router ISP has been preconfigured.
EBGP Parameters
Parameter R1 ISP
AS 65001 64512
IPv4 Propagation No No
(enabled by default)
IPv6 Propagation Yes Yes
(disabled by default)
Source Address GigabitEthernet3 GigabitEthernet2
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 125
Activity Verification
You have completed this task when you attain these results:
On R1, review the status of the BGP sessions. You should now have two functional sessions,
each receiving a few updates.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 126
Determine what prefixes are being sent to the ISP.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 127
Review the routing table on R1. Look for the presence of the route for accessing Server at
2001:db9:10:1::f. Also make sure that the routes point to a valid next-hop interface and not to
Null.
Review the path between PC1 and Server (use IPv6 address 2001:db9:10:1::f).
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 128
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 129
Task 3: Configure IPv6 Prefix Filtering in BGP
In this task, you will configure prefix filtering of incoming eBGP updates from router ISP.
Activity Procedure
Complete the following steps:
Step 1 On R1, create an IPv6 prefix list named PFL that denies IPv6 prefixes
2001:db9:14::/48, 2001:db9:15::/48, 2001:db9:16::/48, and 2001:db9:17::/48.
All other updates should be permitted.
Step 2 Apply the prefix list PFL to incoming EBGP updates from router ISP.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 130
Activity Verification
You have completed this task when you attain these results:
On R1, review the routes that are received from router ISP. You should still see the prefixes that
are denied by the prefix list because you have not yet triggered the resending of updates.
Clear the EBGP session with router ISP by sending a route refresh (that is, inbound soft
clearing).
Recheck the routes that are received from router ISP. The prefixes that are denied by the prefix
list should not be seen anymore.
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 131
Discovery Lab 7 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 132
Discovery Lab 8:
Troubleshooting Tickets 1 – 9
Complete this lab activity to practice what you learned in the related module.
Activity Objective
In this activity, you will enable HSRP for IPv6 on the Cisco IOS routers R1 and R4. After completing this
activity, you will be able to meet the following objectives:
Correct all proscribed faults provided by the Senior Engineering Team.
Troubleshoot, remediate, and validate Issues in the Administrative Office (TS1).
Troubleshoot, remediate, and validate Issues in the Administrative Office associated to shifting
over to Stateful DHCPv6 (TS2).
Troubleshoot, remediate, and validate Issues in the BVHS Datacenter regarding issues with
reachability to external networks (TS3).
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 133
Visual Objective
The figure illustrates what you will accomplish in this activity.
PC3
PC2
A3v6 (R2) R1
A2v6 (R4)
Static Addressing
PC1 Linux
The lab environment is set up so that IPv4 is already configured on router R1. Configure Windows 10
on PC1 for IPv4 so that you can use Telnet to connect to the router.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1-R5, R7
PC1-PC2
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 134
Command List
The table describes the commands that are used in this activity.
Command Description
Command Description
netsh interface ip set address Configures the IPv4 address, mask, and default
int_name static ip_addr net_mask gateway to the interface named int_name.
def_gw 1
netsh interface ipv6 add address Adds an IPv6 address to an interface on
int_name ipv6_address Microsoft Windows 10.
netsh interface ipv6 add route Adds a route for a specified prefix.
route int_name next-hop
netsh interface ipv6 show interface Displays Windows 10 interfaces.
[intf]
ping Enters the ping command from Windows 10.
Note You can get detailed help if you type a question mark at the end of the netsh commands; for
example, netsh interface ipv6 add address ?.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 135
Linux PC Commands
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information. Log this
information in the table.
Pod-Access Information
Parameter Value
Note Router R1-R5 and R7 are preconfigured to allow access without any credentials. Any Telnet
session or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
R1 GigabitEthernet1
R4 GigabitEthernet2
PC1 LAB
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 136
Task 0: Reset the Router for this Lab
In this task, you will reset the router(s) for the beginning of this lab. The process is using a configure
restore option within IOS. There are command aliases already configured as the baseline of the routers
and they reference configurations found in flash.
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1), Router 2 (R2), Router 3 (R3), Router 4 (R4), Router 5
(R5), Router 7 (R6) and get to privileged mode.
Step 2 Type TS1-3 and type Y to confirm. The illustration below shows this process on
R1 (you will need to execute the same command on all the routers outlined in
Step 1).
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 137
Trouble Ticket #1:
PC2 Cannot Reach 2001:db9:7:7::7
In this trouble ticket, you will confirm that your PC has the necessary IPv6 configuration information to
establish connectivity to a server located in MOB-1 (simulated by a loopback address).
Activity Procedure
Complete the following steps:
Step 1 Connect to PC2 and open a command-prompt window. Verify that the PC indeed
cannot reach the ip address 2001:db9:7:7::7.
Step 2 Seeing that the IPv6 address is not reachable we have verified that the ticket is
correct (the “server” is not reachable). The next step will be to verify what IPv6
addresses the device is configured to use to communicate to R2. By using the
ipconfig /all command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 138
Step 3 This gives us a lot of localized information regarding the operation of this
workstation now and previous. But the key data relates to the fact that the device
is using a statically assigned ipv6 address of 2001:db9:2:1::1 and the gateway
of last resort is 2001:db9:2:1::1. It is also noteworthy that this PC has at some
time in the past been configured to use ISATAP tunnels (possibly as part of
previous IPv6 transition mechanisms. Now it is best practice to test reachability
to the default gateway of 2001:db9:2:1::1.
Use the ping 2001:db9:2:1::1 command.
This ping should work provided R2 (the next hop device) is correctly configured
at the interface level.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 139
Step 4 The ping works. Now we will engage in what should be another revealing
diagnostic test by attempting to do a trace route to the destination IPv6 address
of 2001:db9:7:7::7
Use the tracert 2001:db9:7:7::7 command.
Step 7 We can clearly see that R2 has no record of how to reach this prefix so it stands
to reason that the ping will fail once PC2 sends traffic to R2. Looking at the
topology it is very clear that this prefix should be learned on R2 as an OSPF
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 140
prefix. To see if this happening we will look at the OSPF database for this
specific prefix.
Use the show ipv6 ospf database command.
Step 8 Note that we do not see any mention of an advertising router of 0.0.0.7 (R7) in
this output it is also worth noting that we also do not see any reference to 0.0.0.3
(R3). This is because there is a virtual link running between R1 and R3 to correct
the issue that Area 4 is not physically connected to Area 0. This means that
Routes from R3 and R7 should be “re-originated” by R1 (0.0.0.1) in the OSPF
database. We can see this by looking at the entries for the segments between R3
and R5 (2001:DB9:3535::/64 - Area 0) and R4 and R5 ( 2001:DB9:4545::/64 -
Area 2). All of these prefixes exist as Inter-Area Links State Prefixes inside Area
4 where R2 is located. This is normal and to be expected, however not seeing
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 141
prefixes in the database for 2001:DB9:5757::0/64 or for 2001:DB9:7:7::0/64 is
surprising. To investigate what is happening we will turn out attention to R7
(where 2001:DB9:7:7::/64 is being originated.
Step 9 Open a session to R7 and test to see if the IPv6 address 2001:db9:7:7::7 is
present.
Step 10 We see that the IPv6 address does exist on R7. Remember the Senior
Engineering team is using this loopback 7 IPv6 address to simulate a DNS server
that will be installed in Medical Office Building One once the transition is
complete. Now we want to see if this interface is participating in OSPF, we will
accomplish this by using the show ipv6 ospf interface brief command.
Step 11 We see clearly that Looback7 is being advertised into Area 3 as expected.
However, we also can clearly see that there are no OSPF Neighbors being
formed. We would expect to see a neighbor out of G1 toward R5. This seems to
be the nature of the issue we are experiencing. With no neighbors we will not
advertise any routes from R7 toward any other OSPF speakers in the topology.
We can confirm this using the show ipv6 ospf database command once more.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 142
Step 12 Observe that there are no Links being advertised as Type 1 LSAs as we have
discussed. Now we will want to see why we are not forming an adjacency with
R5. We can do that by using a debug ipv6 ospf hello detail.
Step 13 We can see that we are RECEIVING Hello messages from R5 (0.0.0.5) which is
expected but we also see that the Stub/Transit Area Option Bit is mismatched.
Meaning that some variation of Area 3 Stub has been applied. We need to see
what the current OSPF Stub Flag mode on the GigabitEthernet 1.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 143
Step 14 Note that this router (R7) has one area configured (Area 3) and it is configured as
Stub.
Step 15 If the Stub Flag between devices is mismatched then an adjacency cannot form,
to correct this we need to alter the configuration. Options would include removing
the configuration from this device or adding a matching stub flag on R5. Because
we are here on R7 already I will remove the Area 3 stub command from the
routing process.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 144
Step 16 Immediately after removing the configuration, we see the Neighbor Adjacency
form. Now I want to verify that routes are being learned. We will do this by
checking the ipv6 ospf database inter-area prefix 2001:db9:2:1::0/64 this is the
specific network being used by PC2 to reach 2001:db9:7:7::7/64.
Step 17 With this we need to return to PC2 and check for reachability.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 145
Step 18 The ping works to 2001:db9:7:7::7, to see the transit path we will run the tracert
command as well.
This Remediates this Ticket.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 146
Trouble Ticket #2:
PC2 Not Receiving DHCPv6 Address from R2
In this trouble ticket, you will identify why PC2 does not receive an IPv6 ip address from R2 which is
configured as the DHCPv6 Server.
Activity Procedure
Complete the following steps:
Step 1 Connect to PC2 open the “Open Network and Sharing Center”.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 147
Step 4 Navigate to the “Internet Protocol Version 6 (TCP/IPv6)” and select Properties.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 148
Step 5 Select the “Obtain an IPv6 address automatically” and “Obtain DNS server
address automatically” radio buttons. Click on OK.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 149
Step 6 Open a command shell and execute the command ipconfig /renew6.
Step 7 We see that the host does not get an IPv6 address, furthermore it looks like the
device is stuck. To test this, we will execute a control-c operations and see what
the host returns.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 150
Step 8 In the output we see that we are getting an ipv6 address that corresponds to a
link local address in the range of fe80:: which is a link local address. Additionally,
we are not learning any information other than the link local address of Router
R2’s link local address applied to GigabitEthernet1 on that device. Next, we will
test to see if we have reachability to the test address of 2001:DB9:7:7::7.
Step 9 We see that the pings fail. To determine what is going on we need to investigate
what is happening on R2 in this scenario. R2 should be configured to issue an
IPv6 address using DHCPv6 on interface GigabitEthernet1. To see if this
interface is configured to provide IPv6 addresses to hosts connected on this
segment we will use the command show ipv6 interface GigabitEthernet1. If
configured correctly we should see that the inte
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 151
Step 10 Notice that the last line says, “Hosts use DHCP to obtain routable addresses”.
This seems to indicate that the interface is configured for dhcpv6 support,
however the configuration may not be correct or complete. To validate the
configuration, we will execute a show run interface GigabitEthernet1
command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 152
Step 11 Note in the yellow highlighted section we see the engineer has disable auto
configuration on the interface using the no-autoconfig keyword. Second, we can
see that the engineer has applied the managed-config-flag which states that
stateful DHCPv6 should be used. However, we do not see the application of the
DHCPv6 Pool on this interface. So, this is obviously a problem.
Step 12 To identify the name of the DHCPv6 Pool that should be applied on
GigabitEthernet1 we will use the command show run | sec dhcp.
Step 13 We can see the name of the IPv6 DHCP pool is STATEFUL-DHCPv6. This
information will need to be applied to the interface. We will do this via the ipv6
dhcp server STATEFUL-DHCPv6 command.
Step 14 Now we will want to use the command debug ipv6 dhcp detail command so
that we can track what is happening when reinitiate the dhcp request from PC2.
Step 15 We will return to PC2 and we will execute the ipconfig /renew6 command once
more.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 153
Step 16 Note that the host obtains an IPv6 Address in the correct network
2001:DB9:2:1::/64. Additionally we get the DNS suffix of nterone.local.
Step 17 Next, we will look at R2 to see if the debug has resulted in any output.
Step 18 Lastly, we will check the ipv6 dhcp binding database, using the show ipv6 dhcp
binding database command to check if any IPv6 addresses that have been
issued by R2.
We see the same address appears in the database. An additional check would
be to look at the pool itself using the show ipv6 dhcp pool command.
Step 19 Return to PC2 and test reachability to the address 2001:db9:7:7::7 address that
is assigned for testing.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 154
Step 20 We can see that the pings are successful now. This concludes the remediation of
this ticket.
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 open the “Open Network and Sharing Center”.
Step 2 Select Change adapter settings for the “LAB” interface to Obtain IPv6 Address
and DNS address automatically.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 155
Step 3 Disable and Enable the LAB interface.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 156
Step 4 Now open a console connection and exec the ipconfig command to validate that
an IPv6 address was assigned.
Step 5 Note that both a link local and a GUA IPv6 address has been assigned, and we
see a Default Gateway address of FE80::1. Now we will test reachability to that
IPv6 Link Local address by using the ping fe80::1 command.
Step 6 We see that the ping is failing. To validate MAC address used to resolve this
IPv6 address. We will use the netsh interface ipv6 show neighbor command.
Step 7 The output shows that the address FE80::1 is Unreachable, it also shows the
MAC address of that IPv6 address as 00-05-73-a0-00-01. Any MAC address in
the 00:05:73:a0:0X:XX is associated with Cisco HSRP for IPv6 protocol. So
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 157
based on this we should see that HSRP should be configured on R1
(GigabitEthernet1) and R4 (GigiabitEthernet4).
Step 8 Access the console of R1 and verify that HSRP is running and configured
properly by using the show standby command.
Step 9 We see that HSRP for IPv6 is configured, the show command tells us that R1 is
the Active Router meaning it should be hosting the IPv6 address of FE80::1, and
that it is using the virtual mac address of 0005.73a0.0001 as the virtual MAC
address.
Step 10 To validate that this IPv6 address is in service on R1 GigabitEthernet1 we will
use the show ipv6 interface GigabitEthernet1 command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 158
Step 11 Can R1 reach the test address of 2001:db9:7:7::7 sourcing traffic from
GigabitEthernet1? We will test this by using the ping 2001:db9:7:7::7 source
GigabitEthernet 1 command R1.
Step 12 We clearly see that the destination address is reachable from R1 to R3 to R5 and
ultimately to R7 which tells us that there is nothing wrong in the data path. This
leads the support team to believe that there may be a problem with the HSRP
configuration. After whiteboarding the problem, the decision is made to force R4
to become the active router by shutting down GigabitEthernet1 on R1.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 159
Step 13 After waiting a few seconds R4 should become the active router as evidenced by
its console output.
Step 14 Now we will repeat the ping test from PC1 to 2001:db9:7:7::7.
Step 15 The ping now works. To test further it is decided to validate neighbors once more
to see what the L2 information associated with the Router is now after the switch
to R4 as the Active Router. This is done with the netsh interface ipv6 show
neighbor command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 160
Step 16 Note that the FE80::1 entry is Reachable, the Physical Address (MAC) in service
is not the HSRP IPv6 virtual MAC of 00-05-73-a0-00-01 used by R1. This is
interesting and seems to indicate that the is a discrepancy in the configuration of
HSRP between R1 and R4. To investigate this further we will look at the
configuration on R4. Since it is working it seems safe to assume that its
configuration is correct. We will simply use the show run interface
GigabitEthernet2 command on R4.
Step 17 Now we will repeat the command on R1 however we will need to change it to
GigabitEthernet2.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 161
Step 18 A side-by-side comparison shows that R1 has not been outfitted with the
command standby use-bia command. This command instructs the router that is
hosting the virtual IPv6 address (the active router) to use its local interface
physical burned in address. We will in the spirit of troubleshooting apply the
same configuration to R1 and no shut its GigabitEthernet1 interface and test
again once it is elected as the Active HSRP Router.
Step 19 Now we will return to PC1 and test again by pinging 2001:db9:7:7::7.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 162
Step 20 Now we want to repeat the netsh interface ipv6 show neighbor command to
see if the Virtual MAC address has changed.
Step 21 Note that the address has change and it is now the physical address of R1 rather
than the virtual address that was being used before.
Step 22 As an additional test we will validate reachability to the IPv6 address
2001:db9:2:1::1 which resides on R2.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 163
Task 0: Reset the Router for Tickets 4 – 6
In this task, you will reset the router(s) for the beginning of this lab. The process is using a configure
restore option within IOS. There are command aliases already configured as the baseline of the routers
and they reference configurations found in flash.
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1), Router 2 (R2), Router 3 (R3), Router 4 (R4), Router 5
(R5), Router 7 (R6) and get to privileged mode.
Step 2 Type TS4-6 and type Y to confirm. The illustration below shows this process on
R1 (you will need to execute the same command on all the routers outlined in
Step 1).
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 164
Trouble Ticket #4:
PC1 Cannot Reach 2001:db9:7:7::7
In this trouble ticket, you will confirm that your PC1 has the necessary IPv6 configuration information to
establish connectivity to a server located in MOB-1 (simulated by a loopback address).
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 and open a command-prompt window. Verify that the PC indeed
cannot reach the ip address 2001:db9:7:7::7.
Step 2 Seeing that the IPv6 address is not reachable we have verified that the ticket is
correct (the “server” is not reachable). The next step will be to verify what IPv6
addresses the device is configured to use to communicate to R1. By using the
ipconfig /all command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 165
Step 3 This gives us a lot of localized information regarding the operation of this
workstation now and previous. But the key data relates to the fact that the device
is using autoconfig and has an assigned ipv6 address of
2001:db9:1:1:xxxx:xxxx:xxxx:xxxx and the gateway of last resort is fe80::1.
Now it is best practice to test reachability to the default gateway of fe80::1.
Use the ping fe80::1 command.
This ping should work provided R1 and R4 (the next hop devices running HSRP)
are correctly configured at the interface level.
Step 4 The ping works, now we want to test with a tracert to 2001:db9:7:7::7.
Step 5 The results indicate that the destination is unreachable, and that traffic is being
sent to 2001:db9:1:1::11 which is the GUA IPv6 address assigned to R1s
GigabitEthernet1. We will want to test to be sure this address is reachable as
well using ping 2001:db9:1:1::11.
Step 6 That ping works so the next logical step would be to move to the console of R1
and see if the testing prefix 2001:db9:7:7::7 is reachable. Which we can
reasonably assume will not be the case. However, testing would be prudent.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 166
Step 7 As expected, the prefix is not reachable, now we need to verify what R1 is
learning via OSPFv3 from its peer R3. The expectation is, given that R3 is the
Area Border Router between Area1 and Area 0 that all prefixes originating in
area 3 (R7) should be advertised to R1 from this ABR. We will validate this
assumption using the show ipv6 route ospf command.
This is a lot of output so we will target specifics. The link between R5 and R7 will
be 2001:db9:5757::/64, the link between R5 and R4 will be 2001:db9:4545::/64.
We will filter the previous command using this information so see if we are
learning routes from Area2 and Area 3 as a further test.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 167
Step 8 This clearly illustrates that we are learning no prefixes associated with Area 3
(where the destination prefix 2001:db9:7:7::7 is being originated), we used the
same test filter for Area 2 as a further litmus test R5 to see if the issue was facing
Area 0 or facing just Area 3.
Step 9 We will need to move to R7 and validate the configuration of OSPF there.
Step 10 Immediately we see there is indeed an OSPFv3 configuration error. We see that
we have a duplicate OSPFv3 Router-ID. Give that the message says that we are
detecting a duplicate ID on GigabitEthernet1, that means R5 is running the
router-id 0.0.0.5 and the assumption is that we are running the same on R7. We
can validate this by using the show ipv6 protocol command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 168
Step 12 Immediately we can see the neighbor adjacency with R5 form.
Step 13 To validate we will navigate back to PC1 and repeat the ping to 2001:db9:7:7::7.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 169
Trouble Ticket #5:
PC2 Cannot Reach 2001:db9:7:7::7
In this trouble ticket, you will confirm that your PC2 has the necessary IPv6 configuration information to
establish connectivity to a server located in MOB-1 (simulated by a loopback address).
Activity Procedure
Complete the following steps:
Step 1 Connect to PC2 and open a command-prompt window. Verify that the PC indeed
cannot reach the ip address 2001:db9:7:7::7.
Step 2 Seeing that the IPv6 address is not reachable we have verified that the ticket is
correct (the “server” is not reachable). The next step will be to verify what IPv6
addresses the device is configured to use to communicate to R2. By using the
ipconfig /all command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 170
Step 3 This gives us a lot of localized information regarding the operation of this
workstation now and previous. But the key data relates to the fact that the device
is using autoconfig and has an assigned ipv6 address of
2001:db9:2:1:xxxx:xxxx:xxxx:xxxx and the gateway of last resort is fe80::2.
Now it is best practice to test reachability to the default gateway of fe80::2.
Use the ping fe80::2 command.
This ping should work provided R2 (the next hop device) is correctly configured
at the interface level.
Step 4 The ping works, now we want to test with a tracert to 2001:db9:7:7::7.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 171
Step 5 The results indicate that the destination is unreachable, and that traffic is being
sent to 2001:db9:2:1::1 which is the GUA IPv6 address assigned to R2s
GigabitEthernet1. We will want to test to be sure this address is reachable as
well using ping 2001:db9:2:1::1.
Step 6 That ping works so the next logical step would be to move to the console of R2
and see if the testing prefix 2001:db9:7:7::7 is reachable. Which we can
reasonably assume will not be the case. However, testing would be prudent.
Step 7 As expected, the prefix is not reachable, now we need to verify what R2 is
learning via OSPFv3 from its peer R1. The expectation is, given that R2 is the
Area Border Router between Area 4 and Area 1 that all prefixes originating in all
other areas should be advertised to R2 from this ABR (R1). We will validate this
assumption using the show ipv6 route ospf command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 172
Step 8 We see that R2 is learning no OSPF prefixes. This begs two questions:
1. Does R2 have a Peering Relationship with R1?
2. Is R1 acting as an Area Border Router?
First, we will address question 1, by executing the show ipv6 ospf neighbor
command.
We see that we have a neighbor, but is that neighbor acting as a ABR? We will
used the command show ipv6 ospf border-routers.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 173
Step 10 There is no configuration on R1 for any variation of virtual-link. Now we need to
look at the configuration on R3 which does have a physical connection to Area 0.
Again, we will use the show run | sec router ospfv3 command.
Step 12 Notice that R1 has formed a peering relationship with R3 via Virtual-Link (VL1)
Interface. Now we will see if R1 is now acting as a border-router by repeating the
show ipv6 ospf border-router command on R2.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 174
Step 13 We see now that we have R1 (0.0.0.1) appearing as an Area Border Router and
R5 (0.0.0.5) appearing as Autonomous System Boundary Router (meaning
redistribution is taking place on that device).
Step 14 We will return to PC2 and retest to see if 2001:db9:7:7::7 is reachable.
Step 15 This remediates this ticket and establishes the desired reachability.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 175
Trouble Ticket #6:
PC1 Cannot Reach External Networks
In this trouble ticket, you will confirm that your PC1 has the necessary IPv6 configuration information to
establish connectivity to an external network running on R5. The Senior Engineering team has
designated the ipv6 test address for this lab as 2001:db9:99:99:99::99 (simulated by a loopback
address on R5).
Note The Senior Engineering Team has mandated that you cannot remove any configuration during the
remediation of this ticket.
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 and open a command-prompt window. Verify that the PC indeed
cannot reach the ip address 2001:db9:99:99:99::99.
Step 2 Seeing that the IPv6 address is not reachable we have verified that the ticket is
correct (the “server” is not reachable). The next step will be to verify what IPv6
addresses the device is configured to use to communicate to R. By using the
ipconfig /all command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 176
Step 3 This gives us a lot of localized information regarding the operation of this
workstation now and previous. But the key data relates to the fact that the device
is using autoconfig and has an assigned ipv6 address of
2001:db9:1:1:xxxx:xxxx:xxxx:xxxx and the gateway of last resort is fe80::1.
Now it is best practice to test reachability to the default gateway of fe80::1.
Use the ping fe80::1 command.
This ping should work provided R1 (the current Active Router) is correctly
configured at the interface level.
Step 4 As an alternate, to rule out issues between PC1 and the Core Network resources
we will do an additional ping to the IPv6 address 2001:db9:7:7::7 that we have
used in other labs. This will rule out much of the infrastructure in the network
core.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 177
Step 5 The ping to 2001:db9:7:7::7 hosted on R7 works as expected. Now we will
perform a traceroute to see the path the traffic will take to that same destination.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 178
Step 8 The show command indicates that none of the loopback addresses are being
advertised in OSPFv3. That means we need to figure out how to get Loopback
99 to be advertised. First, we will simply apply the correct ospfv3 configuration to
this loopback.
Step 9 Now that this has been done, we will want to ensure that this interface is running
OSPFv3 by redoing the show ipv6 ospf interface brief command.
Step 10 The interface is now participating in OSPFv3 and we will need to see if we have
reachability from PC1 again.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 179
Task 0: Reset the Router for Tickets 7 – 9
In this task, you will reset the router(s) for the beginning of this lab. The process is using a configure
restore option within IOS. There are command aliases already configured as the baseline of the routers
and they reference configurations found in flash.
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1), Router 2 (R2), Router 3 (R3), Router 4 (R4), Router 5
(R5), Router 7 (R6) and get to privileged mode.
Step 2 Type TS7-9 and type Y to confirm. The illustration below shows this process on
R1 (you will need to execute the same command on all the routers outlined in
Step 1).
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 180
Trouble Ticket #7:
PC1 Cannot Reach 2001:db9:7:7::7
In this trouble ticket, you will confirm that your PC2 has the necessary IPv6 configuration information to
establish connectivity to a server located in MOB-1 (simulated by a loopback address).
Activity Procedure
Complete the following steps:
Step 1 Connect to PC2 and open a command-prompt window. Verify that the PC indeed
cannot reach the ip address 2001:db9:7:7::7.
Step 2 Seeing that the IPv6 address is not reachable we have verified that the ticket is
correct (the “server” is not reachable). The next step will be to verify what IPv6
addresses the device is configured to use to communicate to R2. By using the
ipconfig /all command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 181
Step 3 This gives us a lot of localized information regarding the operation of this
workstation now and previous. But the key data relates to the fact that the device
is using autoconfig and has an assigned ipv6 address of
2001:db9:2:1:xxxx:xxxx:xxxx:xxxx and the gateway of last resort is fe80::2.
Now it is best practice to test reachability to the default gateway of fe80::2.
Use the ping fe80::2 command.
This ping should work provided R2 (the next hop device) is correctly configured
at the interface level.
Step 4 The ping works, now we will need to move to the console of R2 and verify if it has
reachability to the prefix 2001:db9:7:7::7. It is a safe assumption that R2 will not
have that route in its routing table.
Step 5 As expected, this device is not learning the prefix 2001:db9:7:7::7 from its
upstream BGP peer. This could be for many reasons to include a failed TCP
connection with R3 which houses the next Autonomous system (200). To see if
this connection is working, we will using the show bgp ipv6 unicast summary
command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 182
Step 6 We see that we have a peering relationship with R3 (2001:db9:1313::3) but we
are learning no prefixes from this neighbor at all. We should be expecting to learn
the prefix 2001:db9:7:7:: from R3. We will need to open a console connection to
R3 and verify whether or not it is learning this prefix or not. We will do this using
the show bgp ipv6 unicast summary command.
Step 7 We can see that the TCP Session for BGP Peering between R3 and R7 is in the
Idle state. We obviously want to see this peering up and operational. To see what
is happening we will navigate to the console of R7 and check the configuration
status there. First, we will use the show bgp ipv6 unicast summary command
here.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 183
Step 8 We see that this device is not able to run BGP because it does not have a router-
id. The device will dynamically choose a router-id from one an interface that has
an IPv4 Address. However, there are no interfaces with IPv4 addresses. This will
require us to either apply an IPv4 address or manually assign a unique router-id
to the BGP process. To remedy this issue, we will choose to set the router-id
manually. We will use the address 192.168.7.1.
Step 9 Note almost immediately the peering with R3 (2001:db9:3535::3) comes up. Now
from this device we will want to see if we are advertising 2001:db9:7:7::7 to R3.
We can do this by using the show bgp ipv6 unicast neighbor
2001:db9:3535::3 advertised-routes command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 184
Step 10 We see now that we are advertising the 2001:DB9:7:7::7/128 prefix to our
neighbor located at 2001:db9:3535::3. I will return to PC2 and validate that the
address in now reachable.
Step 11 We can see that the prefix is now reachable and have demonstrated that the
ticket is now remediated.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 185
Trouble Ticket #8:
PC1 Cannot Reach 2001:db9:3:3::3
In this trouble ticket, you will confirm that your PC1 has the necessary IPv6 configuration information to
establish connectivity to a server located in Labor and Delivery (simulated by a loopback address).
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 and open a command-prompt window. Verify that the PC indeed
cannot reach the ip address 2001:db9:3:3::3.
Step 2 Seeing that the IPv6 address is not reachable we have verified that the ticket is
correct (the “server” is not reachable). The next step will be to verify what IPv6
addresses the device is configured to use to communicate to R1. By using the
ipconfig /all command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 186
Step 3 This gives us a lot of localized information regarding the operation of this
workstation now and previous. But the key data relates to the fact that the device
is using autoconfig and has an assigned ipv6 address of
2001:db9:1:1:xxxx:xxxx:xxxx:xxxx and the gateway of last resort is fe80::1.
Now it is best practice to test reachability to the default gateway of fe80::1.
Use the ping fe80::1 command.
This ping should work provided R1 (the next hop device) is correctly configured
at the interface level.
Step 4 The ping works, now we will need to move to the console of R1 and verify if it has
reachability to the prefix 2001:db9:3:3::3. It is a safe assumption that R1 will not
have that route in its routing table.
Step 5 As expected, this device is not learning the prefix 2001:db9:3:3::3 from its
upstream BGP peer. This could be for many reasons to include a failed TCP
connection with R3 which houses the next Autonomous system (200). To see if
this connection is working, we will be using the show bgp ipv6 unicast
summary command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 187
Step 6 We see that we have a peering relationship with R3 (2001:db9:1313::3) and we
are learning 1 prefix from this neighbor. We can identify the learned prefix by
using the show bgp ipv6 unicast command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 188
Step 8 We can see that R3 is not advertising the prefix. Next, we will look to see if the
prefix appears in the BGP Database by using the command show bgp ipv6
unicast command.
Step 9 Note that the prefix does not appear in the BGP IPv6 unicast routing table on R3.
Which is odd due to the fact that this prefix is being originated on R3 in the form
of a loopback address. We can look to see what loopback interface is originating
this prefix using the show ipv6 route connected command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 189
Step 10 We can see the address and mask is 2001:DB9:3:3::3/128 which means the
interface is configured, but now we will need to see how the prefix is being
injected into BGP. The easiest way to do this will be to use the show run | sec
router bgp command.
Step 11 We see that the network command is being used to inject the prefix into BGP,
however, closer examination will reveal that the command though using the
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 190
correct mask of /128 is not specifying the complete network and host
designation. For this to work we will need to modify the network statement to
match the correct format using the network 2001:db9:3:3::3/128 command,
however we will want to remove the previous command syntax first using the no
network 2001:db9:3:3::/128 command.
Step 12 Now we will look to see if the route appears in the routing table using the show
bgp ipv6 unicast command.
Step 13 The prefix is now present, as a final check we will look to see if it is being
advertised to R1 now using the show bgp ipv6 unicast neighbor
2001:db9:1313::1 advertise-routes command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 191
Step 14 The route is now being advertised. The next logical step will be to go back to
PC1 and see if reachability has been restored.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 192
Trouble Ticket #9:
PC1 Cannot Reach 2001:db9:199:199:199::199
In this trouble ticket, you will confirm that your PC1 has the necessary IPv6 configuration information to
establish connectivity to a server located in Labor and Delivery (simulated by a loopback address
assigned on R5).
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 and open a command-prompt window. Verify that the PC indeed
cannot reach the ip address 2001:db9:199:199:199::199.
Step 2 Seeing that the IPv6 address is not reachable we have verified that the ticket is
correct (the “server” is not reachable). The next step will be to verify what IPv6
addresses the device is configured to use to communicate to R1. By using the
ipconfig /all command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 193
Step 3 This gives us a lot of localized information regarding the operation of this
workstation now and previous. But the key data relates to the fact that the device
is using autoconfig and has an assigned ipv6 address of
2001:db9:1:1:xxxx:xxxx:xxxx:xxxx and the gateway of last resort is fe80::1.
Now it is best practice to test reachability to the default gateway of fe80::1.
Use the ping fe80::1 command.
This ping should work provided R1 (the next hop device) is correctly configured
at the interface level.
Step 4 The ping works, now we will need to move to the console of R1 and verify if it has
reachability to the prefix 2001:db9:199:199:199::199. It is a safe assumption that
R1 will not have that route in its routing table.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 194
Step 6 We see that we have a peering relationship with R3 (2001:db9:1313::3) and we
are learning 2 prefixes from this neighbor. We can identify the learned prefix by
using the show bgp ipv6 unicast command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 195
Step 8 We can see that R3 is learning the prefix and as such it cannot advertising the
prefix to R1. Next we will look to see if the prefix appears in the BGP Database
on R5 by using the command show bgp ipv6 unicast.
Step 9 Note that the prefix does not appear in the BGP IPv6 unicast routing table on R5.
Which is odd since this prefix is being originated on R4 in the form of a loopback
address. We can look to see what loopback interface is originating this prefix
using the show ipv6 route connected command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 196
Step 10 We can see the address and mask is 2001:DB9:199:199:199::199/64 which
means the interface is configured, but now we will need to see how the prefix is
being injected into BGP. The easiest way to do this will be to use the show run |
sec router bgp command.
Step 11 We see that the network command is not being used to inject the prefix into BGP,
instead we see that we are using a route-map in concert with redistribute
connected to originate the prefix. For this to work we will need to look at the
route-map that is being used. To accomplish this, we will use the show route-
map command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 197
Step 12 The route-map calls an IPv6 Prefix-list with the name TST-SERVER. We will
need to look at this prefix-list. I want to see if the prefix-list is being “hit” as part of
the match operation of the route-map and at the same time I want to see the
value used in the prefix-list. We will do this using the show ipv6 prefix-list detail
command.
Step 13 In the provide output of the show command we can see in the green square that
the prefix-list is deployed (inside our route-map), in the red square we can see
that the prefix-list is not matching any traffic, in the yellow square we can see
why (the network mask /96 does not match the /64 mask used by the loopback
interface). To fix this we can change the ipv6 prefix-list to match the correct mask
using on loopback 199.
Step 14 With this change we will now want to see if the prefix-list is getting “hits” by using
the show ipv6 prefix-list detail command.
Step 15 Now we see that the prefix-list is matching traffic. Let’s look to see if the prefix
appears in the IPv6 BGP table. We will use the show bgp ipv6 unicast
command.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 198
Step 16 We see the prefix now appears. The next check will be to see if it is being
advertised to R3 using the show bgp ipv6 unicast neighbor 2001:db9:3535::3
advertised-routes command.
Step 17 The route is being advertised, now we will return to PC1 and see if the issue has
been corrected.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 199
Step 18 This ticket has been remediated.
Discovery Lab 8 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 200
Discovery Lab 9:
Multicasting
Complete this lab activity to practice what you learned in the related module.
Activity Objective
In this activity, you will learn the important differences between multicast in IPv6 and IPv4. Static RP
assignment will still be common—and supported—but the large IPv6 multicast address space enables
other solutions. Bootstrap Router allows the RP address to be advertised throughout the domain. Both
types of multicast, as well as shared tree configurations and source-tree configurations, are
demonstrated in this lab. After completing this activity, you will be able to meet these objectives:
Configure multicast by using static RPs.
Configure source-tree multicast.
Configure Bootstrap Router to advertise RPs.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 201
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1 Access router in Site 1; used as the default gateway for IPv4 and IPv6 traffic.
R2 Access router in Site 2; used as the default gateway for IPv4 and IPv6 traffic.
R3 Access router in Site 3; used as the default gateway for IPv4 and IPv6 traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 202
Device Name Device Role in the Laboratory
PC2 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
PC3 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Command List
The table describes the commands that are used in this activity.
Command Description
ipv6 pim spt-threshold infinity Configures when a PIM leaf router joins the SPT
for the specified groups.
ipv6 pim bsr candidate rp address Configures the router to be the RP candidate.
ipv6 pim bsr candidate bsr address Configures the router to be the BSR candidate.
show ipv6 mld groups Displays the multicast groups that are directly
connected to the router and that were learned
through MLD.
show ipv6 pim group-map Displays an IPv6 multicast group mapping table.
show ipv6 pim topology Displays PIM topology table information for a
specific group or all groups.
show ipv6 pim tunnel Displays information about the PIM register
encapsulation and de-encapsulation tunnels on
an interface.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 203
Windows PC Commands
Command Description
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 204
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information.
Log this information in the table.
Pod-Access Information
Parameter Value
Username on router R1 —
Password on router R1 —
Username on router R2 —
Password on router R2 —
Username on router R3 —
Password on router R3 —
Note Routers R1, R2, and R3 are preconfigured to allow access without any credentials. Any Telnet
session or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 205
Device Interface IPv4 Address and Mask IPv6 Address and Mask
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 206
Task 0: Reset the Router for this Lab
In this task, you will reset the router(s) for the beginning of this lab. The process is using a configure
restore option within IOS. There are command aliases already configured as the baseline of the routers
and they reference configurations found in flash.
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type lab-5-1 and type Y to confirm.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 207
Task 1: Configure Multicast by Using Static RPs
This task will use static RP multicast, in which the RP is manually configured on all designated routers
in the environment. In this case, you will use only the shared tree.
Activity Procedure
Complete the following steps:
Step 1 Enable IPv6 multicast routing on routers R1, R2, and R3.
Step 2 Configure all routers to remain on the shared tree and to route multicast traffic.
Note The Cisco router must be enabled to route IPv6 traffic for unicast traffic in general; the router must
be explicitly configured to route multicast traffic. In addition, by default, the Cisco PIM
implementation allows the last-hop designated router (the router with attached listeners) to move
immediately to the source tree, after locating the source via the RP.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 208
Step 4 Cisco routers construct a PIM tunnel immediately upon configuration of the RP.
Review the PIM tunnel state on each router.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 209
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 210
Step 5 Also review the PIM topology and the multicast routing table on R1. The topology
should be empty because there are no senders or receivers.
Step 6 On PC1, open a command prompt and start a continuous ping to the multicast
address ff15::15. Use the ping -t ff15::15 command, which will simulate a stream
source at the multicast address ff15::15.
Note Videos cannot be multicast in this type of lab because of infrastructure constraints. A simple IPv6
ping will successfully replace the need for video streams. At the moment, there is no receiver, so
the multicast echo requests will go unanswered.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 211
Step 7 Review the PIM topology on R1 again.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 212
Step 8 On PC2, start the VLC media player and prepare to receive the desired stream.
Step 9 In the VLC media player, choose Media > Open Network Stream. In the dialog
box, choose UDP/RTP Multicast, and enter the multicast address ff15::15.
Click OK. PC2 will issue an MLD join to start receiving the stream.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 213
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 214
Step 10 You may not receive replies to your multicast ping, but that’s ok.
Step 11 Review the PIM topology on R1 again.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 215
Step 12 Also review the PIM topology on R2.
Step 13 On router R2, display the multicast addresses for which the router has received
MLD joins, or receivers, signaling an interest in a particular multicast stream.
Step 14 Start another VLC player on PC3 and connect to the same UDP/RTP Multicast
address (ff15::15).
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 216
Activity Verification
You have completed this task when you attain this result:
If you recheck the PIM topology on router R1, you should see two interfaces that are associated
with receivers.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 217
Display the multicast routing table on R1.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 218
Task 2: Configure Source-Tree Multicast
Multicast traffic can travel on the shared tree (sourced at the designated RP), or the last-hop
designated router can obtain the stream directly from the first-hop designated router (near the sender)
via a PIM join. When the stream is initially received via the shared tree, and when the designated router
learns the source router location, the designated router can build a source tree directly to that source.
Activity Procedure
Complete the following steps:
Step 1 During the initial PIM configuration, you set a parameter that caused the Cisco
router to use only the shared tree—never try to build a source tree. Remove that
statement on all routers.
Step 2 Clear the current PIM topology. After a short interruption, both streams should
continue to run. If not, reopen the streams in the VLC viewers on PC2 and PC3.
Activity Verification
You have completed this task when you attain this result:
On router R1, wait for a moment for the multicast topology to converge, and then examine the
PIM topology.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 219
Note Notice that a source tree is now built for the stream. The listed source tree carries the tag SPT.
The original shared-tree topology is also still in the PIM table.
Activity Procedure
Complete the following steps:
Step 1 On PC1, stop the multicast source by using the <Ctrl>+<C> key combination in
the command prompt with the continuous ping.
Step 2 On PC2 and PC3, stop the receivers by closing the VLC application.
Step 3 On all routers, remove the existing static RP and put back the router restriction to
always stay on the shared multicast tree (never building the source tree).
Step 4 On all routers, verify that the PIM topology is empty by clearing it.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 220
Step 5 On R1, configure the router to be the RP candidate by using the ipv6 pim bsr
candidate rp command. Link the process to the Loopback 1 address.
Step 6 On R1, configure the router to also be the BSR candidate by using the ipv6 pim
bsr candidate bsr command. Also linked to its Loopback 1 interface.
Step 7 On PC1, start a continuous ping that uses the ff7e:140:2001:db9:1:1:: address.
Step 8 On PC2 and PC3, use the VLC media player to receive the previous multicast
group.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 221
Activity Verification
You have completed this task when you attain these results:
On R1, verify the multicast topology.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 222
On R2 and R3, view the view the PIM topology and you should see that the RP is R1’s loopback
interface, but if you look at the configuration for the RP address, there shouldn’t be any
configuration for it.
Discovery Lab 9 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 223
Discovery Lab 10:
Configure NAT64 Services
Complete this lab activity to practice what you learned in the related module.
Activity Objective
In this activity, you will configure a central router to perform NAT64 using static mappings. After
completing this activity, you will be able to meet these objectives:
Configure a router to perform NAT64 Translations.
Describe Static NAT64 Operations and communication flows.
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 224
Visual Objective
The figure illustrates what you will accomplish in this activity.
Need to change
from R6 to R5 for
both lab 10 & 11
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R3 NAT64 Translator
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 225
Command List
The table describes the commands that are used in this activity.
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information. Log this
information in the table.
Pod-Access Information
Parameter Value
Note Router R1, R3 and R5 are preconfigured to allow access without any credentials. Any Telnet
session or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 226
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
R1 GigabitEthernet 3 192.168.13.1/24
R3 GigabitEthernet 2 192.168.13.3/24
GigabitEthernet 3 2001:DB8:3535:3535::3/64
R6 GigabitEthernet 2 2001:DB8:3535:3535::5/64
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type Baseline and type Y to confirm.
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 227
Task 1: Configure R1 as an IPv4 Only Router
In this task, you will configure router R1 with a single IPv4 address on interface GigabitEthernet 3.
Activity Procedure
Complete the following steps:
Step 1 On the GigabitEthernet 3 interface, configure an IPv4 address of 192.168.13.1/24
and “no shut” the interface.
Activity Verification
You have completed this task when you attain these results:
On R1, observe the console output.
As a final verification type show ip interface brief | exc assigned and press enter:
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 228
Task 2: Configure R3 for both IPv4 and IPv6
In this task, you will reconfigure router R3 with a single ipv4 address on GigabitEthernet 2 and a single
ipv6 address on GigabitEthernet 4.
Activity Procedure
Complete the following steps:
Step 1 On R3, apply the IPv4 address 192.168.13.3/24 on GigabitEthernet 2 and no
shut the interface.
Activity Verification
You have completed this task when you attain these results:
To verify the applied configuration for IPv4 use the show ip interface brief | exc assigned
command:
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 229
To verify the applied configuration for IPv4 use the show ipv6 interface brief | exc assigned
command:
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 230
Task 3: Configure R6 as an IPv6 Only Router
In this task, you will configure router R6 with a single IPv6 address on interface GigabitEthernet 1.
Activity Procedure
Complete the following steps:
Step 1 On the GigabitEthernet 2 interface, configure an IPv6 address of
2001:DB8:3535:3535::6/64 and “no shut” the interface.
Activity Verification
You have completed this task when you attain these results:
On R5, observe the console output.
As an additional verification type show ipv6 interface brief and press enter:
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 231
Note that the interface is UP/UP.
Verify the static ipv6 default route using the show ipv6 route static command.
Our final verification will involve executing a ping between the IPv6 enabled interfaces
connection R3 and R5. Run a ping test from R6 toward the ipv6 address assigned to R3
(2001:DB8:3535:3535::3).
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 232
Task 4: Configure Static NAT64 on R3
In this task, you will configure router R6 with a single IPv6 address on interface GigabitEthernet 1.
Activity Procedure
Complete the following steps:
Step 1 Before we apply the NAT64 configuration on R3 we will want to test reachability.
So we will ping the IPv4 address on R1 (192.168.13.1) and the IPv6 address on
R6 (2001:DBA:3535:3535::6). If your pings are successful move to step 2. If the
pings fail, you will need to validate your configurations on R1 and R6.
Step 2 Given the pings are successful in step 1, it is now safe to configure NAT64 on
both GigabitEthernet 2 and GigabitEthernet 3 on R3.
Step 3 Now we can configure the translation rules for this process. We will need to
create a “fake address” for testing. This address will pretend to be a destination
address that R1 can reach. We will use the address 192.168.13.5 in this lab for
testing. We will also need to allocate an IPv6 prefix that will be used by the
NAT64 translation process. IANA has allocated a reserved prefix of 64:FF9B::/96
for this purpose, but we can define our own. In this instance we will use 3001::/96
for simplicity.
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 233
Note The translation rule tells R3 that whenever it receives an IPv4 packet with a destination address of
192.168.13.5 that it must translate and forward that packet to 2001:DB8:3535:3535::5.
Activity Verification
You have completed this task when you attain these results:
On R1, enable ip icmp debugging.
Now that we see that the ping has worked, we want to look closer at the debug output. We can
see that R1 thinks that the packet it received was coming from 192.168.13.5 (the fake address).
Now we will look at the debug from R5. Here we see that R3 thinks that it is talking with
3001::C0A:D01. The first part of this address is the 3001::/96 prefix we configured on R3.
The last part is the IPv4 address of R1 in hexadecimal format.
— C0 = 192
— A8 = 168
— D = 13
— 1=1
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 234
We can further validate that his process works in the reverse direction by initiating a ping from
R5 destined to the NAT64 derived address:
Furthermore, we can display the Network Address Translation 64 mappings on R3 by using the
show nat64 mappings static command:
To display the NAT64 packet count statistics use the show nat64 statistics command.
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 235
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 236
Remaining output not provided.
To see the NAT64 Translations use the show nat64 translations command.
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 237
Discovery Lab 10 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 238
Discovery Lab 11: Configure
NAT64 Dynamic Serivces
Complete this lab activity to practice what you learned in the related module.
Activity Objective
In this activity, you will configure a central router to perform NAT64 using dynamic mappings. After
completing this activity, you will be able to meet these objectives:
Configure a router to perform dynamic NAT64 Translations.
Describe the difference between Static and Dynamic NAT64 Operations and communication
flows.
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 239
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R3 NAT64 Translator
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 240
Command List
The table describes the commands that are used in this activity.
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information. Log this
information in the table.
Pod-Access Information
Parameter Value
Note Router R1, R3 and R5 are preconfigured to allow access without any credentials. Any Telnet
session or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 241
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
R1 GigabitEthernet 3 192.168.13.1/24
R3 GigabitEthernet 2 192.168.13.3/24
GigabitEthernet 3 2001:DB8:3535:3535::3/64
R5 GigabitEthernet 2 2001:DB8:3535:3535::5/64
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 242
Task 0: Reset the Router for this Lab
In this task, you will reset the router(s) for the beginning of this lab. The process is using a configure
restore option within IOS. There are command aliases already configured as the baseline of the routers
and they reference configurations found in flash.
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type NAT64-Lab-2 and type Y to confirm.
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 243
Task 1: Configure a Static Route on R1
In this task, you will configure a static route on router R1 for network 27.1.1.0/24 directed toward the
next hop of 192.168.13.3.
Activity Procedure
Complete the following steps:
Step 1 On R1 Configure a static route for 27.1.1.1/24 using the destination
192.168.13.3.
Activity Verification
You have completed this task when you attain these results:
On R1, validate the default router by typing show ip route static.
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 244
Task 2: Configure Dynamic NAT64 on R3
In this task, you will configure dynamic NAT64 translation on R3 using a NAT64 pool.
Activity Procedure
Complete the following steps:
Step 1 On R3 remove the previous static NAT64 rule. By using the command no nat64
v6v4 static 2001:DB8:3535:3535::6 192.168.13.6.
Step 2 On R3, create an IPv6 ACL that matches the source IPv6 network used on the
link toward R5 (2001:DB8:3535:3535::/64) for any destination.
Step 3 On R3, create a nat64 ipv4 address pool named pool1 ranging from 27.1.1.10 to
27.1.1.11.
Step 4 Create a NAT64 Translation rule that allows a v6 to V4 translation from traffic
that is permitted by the IPv6 ACL and destined to the
Step 5 Now we will specify the stateful prefix range of 3001::/96 as we did before.
Note The translation rule tells R3 that whenever it receives an IPv4 packet with a destination address
matching the pool specified that it must translate and forward that packet to the network
2001:DB8:3535:3535::/64.
Activity Verification
You have completed this task when you attain these results:
On R1, enable ip icmp debugging.
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 245
On R5, enable ipv6 icmp debugging.
From R5’s console ping the NAT64 translated IPv6 address 3001::C0A8:D01. Note that the ping
was initiated from the IPv6 side of the network and that we get replies.
Looking at the results of the debug we can see that the Src of the echo reply is the correct
address in IPv6 format.
Now we will look on R3 to see the translation that took place. We can see that the address
192.168.13.1 was mapped to address 27.1.1.10 in this example. Using this information, we will
ping that address from the console of R1.
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 246
From R1 ping the address we found in the NAT64 Translation table on R3
Furthermore, we can display the Network Address Translation 64 mappings on R3 by using the
show nat64 mappings dynamic command:
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 247
Discovery
Discovery Lab 11 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 248
Discovery Lab 12:
Configure DNS64 Services
This Lab is still a work in progress. Need to insert.
Discovery Lab 12 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 249
Discovery Lab 13:
Configure Advanced ACLs
Complete this lab activity to practice what you learned in the related module.
Activity Objective
In this activity, you will configure various types of ACLs, to achieve the desired filtering objectives.
After completing this activity, you will be able to meet these objectives:
Create and apply a standard ACL (matching on source and destination addresses only).
Create and apply an extended ACL (matching on addresses, ports, and other packet
information).
Create and apply a reflexive ACL (matching on outgoing packets and creating dynamic inbound
rules).
Create and apply an extended ACL (matching on IPv6 extension headers).
Create and apply an ACL to control inbound IPv6 access to a router.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 250
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1 Access router in the Central Site; used as the default gateway for IPv4 and
IPv6 traffic.
R2 Access router in the Remote Site; used as the default gateway for IPv4 and
IPv6 traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 251
Device Name Device Role in the Laboratory
PC2 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Command List
The table describes the commands that are used in this activity.
Command Description
clear ipv6 access-list [ACL-ID] Resets the IPv6 access-list match counters.
ipv6 access-list ACL-ID filter- Creates an IPv6 ACL on Cisco IOS devices.
rules
ipv6 traffic-filter ACL-ID [in | Applies an IPv6 ACL to an interface.
out]
line vty 0 4 Selects inbound vty connections (such as an
interface on which to apply access restrictions).
Windows PC Commands
Command Description
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 252
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information. Log this
information in this table.
Pod-Access Information
Parameter Value
Note Routers R1 and R2 are preconfigured to allow access without any credentials. Any Telnet session
or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Device Interface IPv4 Address and Mask IPv6 Address and Mask
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 253
Device Interface IPv4 Address and Mask IPv6 Address and Mask
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type lab-7-1 and type Y to confirm.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 254
Task 1: Configure a Standard ACL for IPv6 (Layer 3
Address Filtering)
Traffic through the router can be controlled by using a standard ACL, which filters traffic only according
to IP source and destination addresses—no other packet parameters are examined. In this task, you
will explicitly permit traffic between some endpoints while denying all other traffic.
Activity Procedure
Complete the following steps:
Step 1 Check the reachability of R1 interfaces from PC1. Ping the following addresses
(all addresses should be reachable):
GigabitEthernet 1 (2001:db9:1:1::1)
Loopback 1 (2001:db9:1:100::1)
Loopback 2 (2001:db9:1:200::1)
GigabitEthernet 2 (2001:db9:1:a::1)
Step 2 On R1, create a IPv6 ACL that is named LANin and that allows access only to
Loopback 1 and Loopback 2 from PC1.
Note Depending on version of code, the implicit deny all at the end of the access list will still allow for
neighbor solicitation and neighbor advertisements to function. In our version of the lab, it does not.
Step 3 Apply the new LANin IPv6 ACL in the inbound direction on interface
GigabitEthernet 1.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 255
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 256
Activity Verification
You have completed this task when you attain these results:
On PC1, repeat the ping tests to all interfaces of R1:
GigabitEthernet 1 (2001:db9:1:1::1)
Loopback 1 (2001:db9:1:100::1)
Loopback 2 (2001:db9:1:200::1)
GigabitEthernet 2 (2001:db9:1:a::1)
This time, only pings to interfaces Loopback 1 and Loopback 2 should succeed.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 257
On R1, review the ACL statistics.
Note An explicit deny at the end of the ACL is needed to collect the statistics of denied packets.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 258
Task 2: Configure an Extended ACL for IPv6 (Layer
3 and Layer 4 Filtering)
An extended ACL allows for deeper inspection of packets at the interface on which the ACL is applied.
In this task, you will inspect Layer 4 (TCP/UDP ports and ICMP messages) as well as Layer 3 (IPv6
addresses and protocol numbers) attributes.
Activity Procedure
Complete the following steps:
Step 1 Test connectivity from PC1 to the Loopback 1 interface on R1 for two TCP
services:
Use IPv6 Telnet to connect to router R1. Password is cisco.
Use a web browser to connect to the SDM on R1.
Use the https://[2001:db9:1:100::1] URL.
Note IPv6 addresses that are used in URLs should be enclosed in brackets.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 259
Step 2 On R1, create a new IPv6 ACL that is named LANin2 and that implements the
following policy:
Allow Telnet access from PC1 to the Loopback 1 address of router R1.
Permit all neighbor-solicitation ICMP messages (nd-ns).
Permit all neighbor-advertisement ICMP messages (nd-na).
Explicitly deny all other traffic. (Use sequence number 1000 for this entry.)
Note ICMP neighbor solicitation and advertisement messages are required for resolving link-layer
addresses on a LAN. An implicit deny statement at the end of an ACL permits neighbor discovery
messages by default. An explicit deny statement at the end of an ACL requires these messages to
be permitted.
Step 3 Replace the previous inbound IPv6 ACL on the GigabitEthernet 1 interface with
the new LANin2 ACL.
Activity Verification
You have completed this task when you attain these results:
Retest connectivity from PC1 to the Loopback 1 interface on R1 for the two TCP services:
— Use IPv6 Telnet to connect to R1. The connection should still be successful.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 260
— Use a web browser to connect to the SDM on R1. Use URL https://[2001:db9:1:100::1].
SDM connectivity should no longer work because it is not specifically permitted. You may
alternatively use the Telnet application to try to connect to port 443.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 261
Note An explicit deny at the end of the new ACL allows you to also see the statistics about denied
packets.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 262
Task 3: Configure an Extended ACL for IPv6
(Extension Header Matching)
IPv6 extension header fields are visible to Cisco extended ACLs, and traffic can be filtered based on
header field values. In this task, you will filter traffic that uses the routing extension header.
Activity Procedure
Complete the following step:
Step 1 On R1, add the following entries to the existing IPv6 ACL that is used inbound on
the GigabitEthernet 1 interface. Add the entries before the explicit deny
statement at the end.
Deny IPv6 packets with the routing extension header.
Permit ICMP packets from the prefix off of GigabitEthernet 1 interface on R1.
Activity Verification
You have completed this task when you attain these results:
Start the Wireshark application on PC1. Find the application icon on the desktop.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 263
Send a ping from PC1to the GigabitEthernet 1 interface of R1. The ping should be successful.
You should also see four ICMP echo requests and four ICMP echo replies in the Wireshark
capture window, as shown in the previous figure.
Send another ping from PC1 to the GigabitEthernet 1 interface of R1, this time using the -R
option, which adds the routing header to the IPv6 packets. The ping should be unsuccessful.
You should also see four new ICMP echo requests and four ICMP unreachable replies in the
Wireshark capture window, as shown in the following figure.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 264
Note If you select one of the echo requests just before an unreachable reply, you should see that the
IPv6 packet has a routing header that should be denied by your ACL, hence the unreachable reply.
Choose Capture > Stop. Close the Wireshark capture window and close the Wireshark
application.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 265
Task 4: Control Inbound IPv6 Access to a Router
Telnet access to the router itself can be controlled for IPv6 like it can be for IPv4, using an access class
on a range of vty lines. In this task, you will create an ACL to control inbound Telnet access to router
R2.
Activity Procedure
Complete the following steps:
Step 1 On R1, add a sequence 50 to permit the prefix from GigabitEthrenet1 to reach
R2 GigabitEthernet2 address via telnet.
Step 2 Connect via Telnet from PC1to the GigabitEthernet 2 interface of R2. This Telnet
session should succeed.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 266
Step 3 Connect via Telnet from PC2 to the GigabitEthernet 1 interface of R2. This Telnet
session should succeed.
Step 4 On R2, create an IPv6 ACL that is named VTY and that allows only remote
administration from R1 GigabitEthernet 1 prefix (2001:db9:1:1::/64) remotely
access any interface address of router R2.
Step 5 Apply the VTY IPv6 ACL as an access class to the 0–4 range of vty.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 267
Activity Verification
You have completed this task when you attain these results:
Connect again via Telnet from PC1 to the GigabitEthernet 2 interface of R2. This Telnet session
should succeed.
Connect again via Telnet from PC2 to the GigabitEthernet 1 interface of R2. This Telnet session
should fail.
Discovery Lab 13 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 268
Discovery Lab 14:
Implementing IPsec and IKE
Complete this lab activity to practice what you learned in the related module.
Activity Objective
In this activity, you will use cryptography (IPsec) to secure communication between two sites.
After completing this activity, you will be able to meet this objective:
Secure communications between routers by using IPsec.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 269
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1 Access router in the Central Site; used as the default gateway for IPv4 and
IPv6 traffic.
R2 Access router in the Remote Site; used as the default gateway for IPv4 and
IPv6 traffic.
PC1 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 270
Device Name Device Role in the Laboratory
PC2 End user with applications that require both IPv4 and IPv6 support by the
operating system and the network.
Command List
The table describes the commands that are used in this activity.
Command Description
encryption [des | 3des | aes [128 | Specifies the encryption algorithm within an IKE
192 | 256]] policy.
interface tunnel inft Static VTI that uses IPv6 for payload and
tunnel mode ipsec ipv6 transport.
mode {transport | tunnel} Selects the IPsec mode within a transform set;
tunnel mode is the default.
show crypto isakmp sa Lists IKE sessions and their main parameters.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 271
Command Description
tunnel protection ipsec profile Selects an IPsec profile to use for protecting the
profile VTI.
tunnel source {intf | address} Specifies the source address for tunnel packets.
Windows PC Commands
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information.
Log this information in this table.
Pod-Access Information
Parameter Value
Username on router R1 —
Password on router R1 —
Username on router R2 —
Password on router R2 —
Note Routers R1 and R2 are preconfigured to allow access without any credentials. Any Telnet session
or console access will automatically give you access to the privileged mode.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 272
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab exercise.
Pod Addressing
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 273
Task 0: Reset the Router for this Lab
In this task, you will reset the router(s) for the beginning of this lab. The process is using a configure
restore option within IOS. There are command aliases already configured as the baseline of the routers
and they reference configurations found in flash.
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1) and get to privileged mode.
Step 2 Type lab-7-2 and type Y to confirm.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 274
Task 1: Configure IPsec
In this task, you will configure an IPsec tunnel to protect traffic between a pair of remote sites across an
untrusted transport network.
Activity Procedure
Complete the following steps:
Step 1 Configure an IKE policy on R1 and R2. Use the parameters that are listed in the
table.
Parameter Value
Hash SHA256
Diffie-Hellman Group 5
Lifetime 1 hr
Step 2 Define a pre-shared key, named tOpSeCrEt, to authenticate IKE peers on the
GigabitEthernet2 addresses (that is, 2001:db9:1:a::1 on R2 and 2001:db9:1:a::2
on R1). Make sure that you use the same key on both routers.
Step 3 Configure an IPsec transform set named TS. Use the parameters that are listed
in the table.
Parameter Value
Mode Tunnel
Lifetime 1 hr
Step 4 Configure an IPsec profile named IP. Use the TS IPsec transform set.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 275
Note With the preshared key, the example shows a specific host with a /128, but it could have been the
prefix with a /64 or all possible neighbors with a /0.
Step 5 Configure a static VTI. Use the parameters that are listed in the table.
Parameter R1 R2
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 276
Parameter R1 R2
Step 6 Create an IPv6 RIP routing process that is named RIP1 on both routers.
Step 7 Enable IPv6 RIP on the following interfaces:
GigabitEthernet1
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 277
Loopback 1
Loopback 2
IPsec tunnel
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 278
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 279
Activity Verification
You have completed this task when you attain these results:
IPv6 RIP should trigger the establishment of the IKE session and IPsec SAs. Verify the status of
IKE on either router. You should see an IKE session in the QM_IDLE state that indicates that
the session has reached the Quick Mode phase and is currently idle.
Verify the status of IPsec SAs on either router. The encryption and decryption statistics should
be non-zero, indicating that packets are being sent and received through the IPsec SAs.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 280
Review the routing table on R1. You should see three routes from R2 that are reachable
through the tunnel interface.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 281
Review the IPv6 path between PC1 and PC2.
Discovery Lab 14 | © 2025 Cisco Systems, Inc. IP6FD Lab Guide 282
Discovery Lab 15:
Troubleshooting Tickets 10-12
Complete this lab activity to practice what you learned in the related module.
Activity Objective
In this activity, you will enable HSRP for IPv6 on the Cisco IOS routers R1 and R4. After
completing this activity, you will be able to meet the following objectives:
Correct all proscribed faults provided by the Senior Engineering Team
Troubleshoot, remediate, and validate Issues in the Administrative Office (TS1)
Troubleshoot, remediate, and validate Issues in the Administrative Office associated to
shifting over to Stateful DHCPv6 (TS2)
Troubleshoot, remediate, and validate Issues in the BVHS Datacenter regarding issues
with reachability to external networks (TS3)
PC3
PC2
A3v6 (R2) R1
A2v6 (R4)
Static Addressing
PC1 Linux
The lab environment is set up so that IPv4 is already configured on router R1. Configure
Windows 10 on PC1 for IPv4 so that you can use Telnet to connect to the router.
Required Resources
The table lists the resources and equipment that are required to complete this activity.
R1-R5, R7
PC1-PC2
Command Description
Command Description
netsh interface ip set address Configures the IPv4 address, mask, and default
int_name static ip_addr net_mask gateway to the interface named int_name.
def_gw 1
netsh interface ipv6 add address Adds an IPv6 address to an interface on
int_name ipv6_address Microsoft Windows 10.
netsh interface ipv6 add route Adds a route for a specified prefix.
route int_name next-hop
netsh interface ipv6 show interface Displays Windows 10 interfaces.
[intf]
ping Enters the ping command from Windows 10.
Note You can get detailed help if you type a question mark at the end of the netsh commands;
for example, netsh interface ipv6 add address ?.
Command Description
Job Aids
These job aids are available to help you complete the lab activity:
The instructor will provide you with your pod number and other pod-access information.
Log this information in the table.
Pod-Access Information
Parameter Value
Note Router R1-R5 and R7 are preconfigured to allow access without any credentials. Any
Telnet session or console access will automatically give you access to privileged mode.
The table illustrates the IPv4 and IPv6 addressing scheme that is used in this lab
exercise.
Pod Addressing
Devic Interface IPv4 Address and Mask IPv6 Address and Mask
e
R1 GigabitEthernet1
R4 GigabitEthernet2
PC1 LAB
Activity Procedure
Complete the following steps:
Step 1 Connect to Router 1 (R1), Router 2 (R2), Router 3 (R3), Router 4 (R4),
Router 5 (R5), Router 7 (R6) and get to privileged mode.
Step 2 Type TS10-12 and type Y to confirm. The illustration below shows this
process on R1 (you will need to execute the same command on all the
routers outlined in Step 1).
Additional Information: Further testing before this trouble ticket was handed to you mention
that additional prefixes that cannot be reached include 2001:db9:7:7::7 and
2001:db9:199:199:199::199. This represents all of the external prefixes being advertised via
BGP in this lab environment.
Activity Procedure
Complete the following steps:
Step 1 Connect to PC1 and open a command-prompt window. Verify that the PC
indeed cannot reach the ip address 2001:db9:3:3::3, 2001:db9:7:7::7
and 2001:db9:199:199:199::199.
Step 2 Seeing that the IPv6 addresses specified are not reachable we have
verified that the ticket is correct (the “external servers” are not reachable).
The next step will be to verify what IPv6 addresses the device is
configured to use to communicate to R1. By using the ipconfig /all
command.
Step 4 The ping works. Now we will engage in what should be another revealing
diagnostic test by attempting to do a trace route to the destination IPv6
address of 2001:db9:7:7::7
Use the tracert 2001:db9:3:3::3 command.
Step 7 We can clearly see that R1 has reachability to this prefix. This brings a lot
of things into question. First we will need to see how the route is being
learned from the prospective of R1. We will accomplish this using the
show ipv6 route 2001:db9:3:3::3 command.
Step 9 Note that all the bgp routes are “valid” denoted by the “*” and “best”
denoted by the “>”. Plus, we have reachability to the prefix we tested. So,
this represents an odd situation. After some conversation the
determination is made to specify the source of the ping using the network
2001:db9:1:1::/64. We can do this via the source GigabitEthernet1
keyword and see if the results are the same.
Step 10 This changes things in the scheme of troubleshooting. Note that the
results of the ping seem to indicate that the router is sending data to R3
the next hop neighbor device connected to GigabitEthernet2. The change
was created by specifying the source ipv6 source address. To test to see
what R1 is actually doing with the packets in question I want to debug
ipv6 icmp traffic, and I will test using the ping 2001:db9:3:3::3
command.
Step 12 R1 is sending both echo request packets to 2001:DB9:3:3::3 but note that
no echo replies are coming back from that device. At this point we need
to see what is happening on R3. We will go to the console of that device
Step 13 The ping is failing but we see additional information regarding the results
of the ping that we saw on R1. Note we see the “.” which denotes an
“ICMP timeout” which is the same as what we saw on R1, but we also
see an “H” which denotes “host unreachable”. Host unreachable means
we may have a routing issue. To validate this, we will use the show bgp
ipv6 2001:db9:1:1::1 command and look at the results.
Step 14 This output indicates that the prefix 2001:db9:1:1::1/64 which resides on
R1 GigabitEthernet1 is being learned via a “static” entry on R3. Note that
the output shows the backup from “ospf”. We can see the update in the
OSPF database that shows the Inter Area Prefix Link State
Advertisement coming from R3 (0.0.0.3) via the show ipv6 ospf
database inter-area prefix 2001:db9:1:1::1/64 command.
Step 16 This is breaking out configuration. Since the static route is a valid route
that is installed in the local routing table, BGP can use it as part of the
valid and best computation in BGP. However, this static route is not
configurationally valid and is stopping our pings from working. To correct
this issue, we will remove the static route and allow the OSPF update to
replace it.
Step 17 Now that the static route is removed we will check to see what was
installed in the routing table by using the show ipv6 route
2001:db9:1:1::/64 command.
Step 19 The ping works from R3, now we will validate reachability from PC1.
Step 20 A final test would be to ping the other prefixes 2001:db9:7:7::7 and
2001:db9:199:199:199::199.
Activity Procedure
Complete the following steps:
Step 1 Connect to the console of R7 and initiate a test ping to FF07::7 to see if
the issue still exists.
Step 2 Clearly the problem exists. There are many places that we can start
testing but my plan is to first validate the simulated host that wants to
listen to the multicast address FF07::7 on R2. The team said that
interface Loopback 900 to simulate the multicast listener by running the
command show run interface loopback 900.
Step 4 We see that for the entire multicast range FF00::/8 R2 is configured to
use R5 2001::5 as the RP, and we see that the configuration was done
statically. As another validation I want to make sure the address of
2001::5 is reachable from R2.
Step 5 The address is reachable. Now we want to see if there is an entry in the
multicast routing table for FF07::7. The expectation is that we will see a
“star” comma “G” entry. This will look like this (*,FF07::7) and can be seen
using the command show ipv6 mroute FF07::7.
Step 8 According to the output R5 has no idea of the identity of the RP much
less that it is the RP. We can correct this by applying the static rp
configuration using the ipv6 pim rp-address 2001::5 command.
Step 10 Now we see that the (*,G) entry for FF07::7 exists. As a final test we will
try to ping from R7 one more time.
Additional Information: The Senior Engineering Team has specified that you are not allowed
to remove any configuration during the remediation of this trouble Ticket.
Activity Procedure
Complete the following steps:
Step 1 Connect to PC2 and open a command-prompt window. Verify that the PC
indeed cannot reach the ip address 2001:db9:199:199:199::199.
Step 2 Seeing that the IPv6 addresses specified are not reachable we have
verified that the ticket is correct (the “external server” located at
2001:db9:199:199:199::199 are not reachable). The next step will be to
verify what IPv6 addresses the device is configured to use to
communicate to R2. By using the ipconfig /all command.
Step 7 We can clearly see that R2 lacks reachability to this prefix. The next step
will be to see what routes R2 is learning from R1 via BGP. We will
accomplish this using the show bgp ipv6 unicast command.
Step 10 To initiate a new update process, we will clear the bgp ipv6 neighbor
relationship to R3. We will do this using the clear bgp ipv6 unicast *.
Step 12 Now we will check to see if the route is being learned using the show
bgp ipv6 unicast command once more.