iChallenges logo

We are happy to announce that following the success of the iContests test blog, we have launched a more permanent (albeit beta) site called iChallenges.

The concept is still the same but now we have added more features like challenges instead of just contests and also the possibility to earn points and badges as you you complete challenges and take part in contests.

So head over to iChallenges now and start climbing the ranks.

Advertisements

Thanks to everyone that participated in Contest #3. Here are the solutions to both questions:

Question 1: eBGP peering with Loopback interfaces

There are actually three possible solutions to this:

  1. Use the neighbor x.x.x.x ebgp-multihop 2 command
  2. Use the neighbor x.x.x.x disable-connected-check command
  3. Use the neighbor x.x.x.x ttl-security hops 2 command

Many people think that it takes two hops to get from the loopback interface of one router to the loopback interface of a directly connected router but this is not true: it actually takes just one hop. You can refer to this article that attempts to clear up this misunderstanding.

Read the rest of this entry »

Let’s up the stakes for this contest by giving two questions instead of one unlike what we have done for previous contests. This contest will focus on the workings of the Border Gateway Protocol (BGP). The first question deals with how to tweak the default behavior of BGP to suit our needs. The second question presents a troubleshooting scenario which involves BGP.

Read the rest of this entry »

Contest #2 network

Thanks to everyone who participated in Contest #2 and to those who shared the link. Here is the solution:

Read the rest of this entry »

Using the network diagram below and the output from the show commands on the routers, identify and resolve why a host on the 192.168.20.0/24 subnet cannot reach a host with IP address 172.16.0.100. Contest #2 network Read the rest of this entry »

Thanks to everyone that participated and shared the link in some way. Contest #1 is now closed and here is the solution: Read the rest of this entry »

In the network diagram below, there are no routes configured on the routers, yet there should be connectivity among all the routers; therefore, NAT is configured on R1. Zone-based policy firewall (ZBF) is also enabled on R1. TCP, UDP and ICMP traffic should be inspected from the inside to the outside. ICMP from R3 to R2 is the only traffic that should be inspected from the outside to the inside. All other traffic should be dropped.

Contest#1
There are a couple of configuration errors on R1, can you spot them and fix the config? The winner gets 1,500 Naira airtime to any Nigerian phone number. Please read contest rules here. Read the rest of this entry »