CCNA 4 Routing and Switching – Connecting Networks – Practice Skills Assessment – Packet Tracer
CCNA Routing and Switching
Connecting Networks
Practice Skills Assessment – Packet Tracer
A few things to keep in mind while completing this activity:
- Do not use the browser Back button or close or reload any exam windows during the exam.
- Do not close Packet Tracer when you are done. It will close automatically.
- Click the Submit Assessment button in the browser window to submit your work.
Introduction
In this practice skills assessment, you will configure the Small Business network with NTP, SNMP, EIGRP, PPP CHAP, Frame Relay, dynamic NAT, static NAT, PAT and a GRE tunnel.
Some values that are required to complete the configurations may not have been given to you. In that case, create the values that you need to complete the requirements.
For the sake of time, many repetitive, but important, configuration tasks have been omitted from this assessment. Many of these tasks, especially those related to security, are essential elements of a network configuration. The intent of this activity is not to diminish the importance of full device configurations.
You will practice and be assessed on the following skills:
- Configuration of NTP
- Configuration of SNMP and Syslog
- Configuration of interface addressing and basic settings
- Configuration of HDLC
- Configuration of Frame Relay
- Configuration of PPP
- Configuration of CHAP
- Configuration of a GRE tunnel
- Configuration of static and dynamic routing
- Configuration of dynamic NAT
- Configuration of static NAT
- Configuration of PAT
You are required to configure the devices as follows:
Office-1:
- Configure HDLC.
- Configure EIGRP.
- Configure passive interfaces.
R2:
- Configure PPP and CHAP authentication on the appropriate interface.
- Configure EIGRP.
- Configure static NAT for outside access to an internal server.
- Configure dynamic NAT.
- Configure PAT.
R3:
- Enable time stamps for use with NTP and SNMP logging.
- Configure the router to use NTP services.
- Configure logging to the IT Monitor Server.
- Configure PPP and CHAP authentication on the appropriate interface.
- Configure Frame Relay.
- Configure a GRE tunnel.
- Configure EIGRP.
- Configure passive interfaces.
Office-2-Branch:
- Configure Frame Relay.
- Configure a GRE tunnel.
- Configure EIGRP.
- Configure passive Interfaces.
Tables
In some cases, specific interface addresses have been provided to you. You must use them in your configurations. In other cases, when a network is specified instead of a specific address, you can use any address in the network.
You do not configure LAN addresses in this activity. The addresses of the LAN interfaces are provided in this table for reference purposes only.
Device |
Interface |
IP Address or Network |
Default Gateway |
Office-1 |
G0/1 |
192.168.1.1/24 |
N/A |
S0/0/0 |
192.168.0.0/30 |
N/A |
|
R2 |
G0/0 |
172.16.0.1/30 |
N/A |
S0/0/0 |
192.168.0.0/30 |
N/A |
|
S0/0/1 |
10.10.0.0/30 |
N/A |
|
S0/1/0 |
203.0.113.1/28 |
N/A |
|
R3 |
G0/1 |
10.10.1.1/24 |
N/A |
S0/0/0 |
10.10.2.1/30 |
N/A |
|
S0/0/1 |
10.10.0.0/30 |
N/A |
|
T0 |
10.10.10.1/30 |
N/A |
|
Office-2-Branch |
G0/0 |
10.10.3.1/24 |
N/A |
S0/0/0 |
10.10.2.2/30 |
N/A |
|
T0 |
10.10.10.2/30 |
N/A |
|
Partner Server |
NIC |
172.16.0.2/30 |
172.16.0.1 |
IT Monitor Server |
NIC |
10.10.1.2/24 |
10.10.1.1 |
Office-1 PC |
NIC |
192.168.1.5/24 |
192.168.1.1 |
R3 Host |
NIC |
10.10.1.5/24 |
10.10.1.1 |
Office-2 Branch PC |
NIC |
10.10.3.5/24 |
10.10.3.1 |
Instructions
All configurations must be performed through a direct terminal connection to the device console from an available host.
Step 1: Configure NTP, SNMP, and Syslog settings on R3.
a. Configure NTP.
- Configure R3 to use IT Monitor Server as its NTP server.
- Use a key value of 15.
b. Configure SNMP.
- Use an SNMP community string of CiscoPTSA.
- Allow the SNMP management station only read only rights.
c. Configure Syslog.
- Configure R3 to use time stamps when logging. The timestamps should include milliseconds.
- Configure Syslog to send log entries to the IT Monitor Server.
- Set the message trapping for Syslog to the debugging level.
Step 2: Configure Frame Relay between R3 and Office-2-Branch.
Configure Frame Relay on the interfaces connecting R3 and Office-2-Branchusing the information from the Addressing Table. You must use the exact addresses specified in the addressing table for the configuration.
Step 3: Configure a GRE Tunnel between R3 and Office-2-Branch.
- Configure a GRE tunnel using Tunnel interface 0 on R3 to Office-2-Branch using information from the addressing table.
- Configure a GRE tunnel using Tunnel interface 0 on Office-2-Branchto R3 using information from the addressing table.
- You must use the exact addresses specified in the addressing table for this configuration.
Step 4: Configure DCE interfaces.
Configure the DCE interfaces of R2 with a clock rate of 128000.
Step 5: Configure PPP and CHAP between R2 and R3.
- Configure interface addressing according to information provided in the Addressing Table. You can use any address in the network specified in the Addressing Table for this configuration.
- Authenticate the PPP connection with CHAP on both ends of the link.
- Use the password of PTSAchap.
Step 6: Configure HDLC on Office-1 and R2.
It has been decided to remove an earlier PPP configuration from the link between Office-1 and R2.
- Configure this link with HDLC.
- Configure interface addressing according to information provided in the Addressing Table. You can use any address in the network specified in the Addressing Table.
Step 7: Configure NAT on R2.
All hosts should use translated addresses to access destinations outside of the Small Business network.
a. Configure static NAT.
- Configure static NAT for the IP address of the Partner Server.
- Use the last host address in the interface S0/1/0 subnet.
b. Configure dynamic NAT.
- Configure dynamic NAT for all host IP addresses on the LAN network connected to Office-1.
- Use DYNAMIC as the name for the pool.
- Use the third through tenth IP addresses that are available on the R2 S0/1/0 subnet.
- Configure ACL 1 to allow all host IP addresses in Office-1 LAN network to use this group of addresses.
- Your ACL should have one statement.
c. Configure PAT.
- Configure PAT to enable the hosts attached to the R3 and Office-2-Branch LANs to access the Internet.
- Use the interface keyword in the NAT statement.
- Use ACL 2 to allow all host addresses on both LAN networks to use the overload address.
- Your ACL should have two statements.
- Configure all interfaces on R2 as appropriate.
Step 8: Configure static and dynamic routing.
a. Configure dynamic routing.
- Configure EIGRP for all networks connected to Office-1, R2,R3, and Office-2-Branch.
- Use ASN 1.
- Use the precise inverse masks for all networks.
- Disable automatic summarization on all routers.
- Disable EIGRP updates from being sent on the appropriate interfaces. You must do this for each individual interface. Donot use the default keyword with the command.
b. Configure a redistribute a default route.
- Create a directly attached default route to the Internet on R2.
- Configure EIGRP to redistribute the default route to the other routers.
Comments
Mark
Do you have the .PKA file for CCNA 4 Routing and Switching – Connecting Networks – Practice Skills Assessment – Packet Tracer?
Mihaela
R3:
int tunnel 0
ip add 10.10.10.1 255.255.255.252
tunnel source g0/1
tunnel destination 10.10.3.1
Roffice2br
int tunnel 0
ip add 10.10.10.2 255.255.255.252
tunnel source g0/0
tunnel destination 10.10.1.1
Where is wrong?
Alex
tunnel mode gre ip
jeancloude
Hi all, here’s my configuration. with 70%
R3
ntp server 10.10.1.2 key 15
snmp-server community CiscoPTSA RO
logging trap debugging
logging 10.10.1.2
service timestamps log datetime msec
router eigrp 1
passive-interface GigabitEthernet0/1
network 10.10.0.0 0.0.0.3
network 10.10.2.0 0.0.0.3
network 10.10.1.0 0.0.0.255
no auto-summary
interface Tunnel0
no shutdown
ip address 10.10.10.1 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.10.2.2
int s0/0/0
no shut
encapsulation frame-relay
ip add 10.10.2.1 255.255.255.252
ppp- chap
username R2 password PTSAchap
username R3 password PTSAchap
int s0/0/1
no shut
encapsulation ppp
ppp authentication chap
ip add 10.10.0.2 255.255.255.252
——————————–
R3-Branch
router eigrp 1
passive-interface GigabitEthernet0/0
no auto-summary
network 10.10.2.0 0.0.0.3
network 10.10.10.0 0.0.0.3
network 10.10.3.0 0.0.0.255
interface Tunnel0
no shutdown
ip add 10.10.10.2 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.10.2.1
int s0/0/0
ip add 10.10.2.2 255.255.255.252
encapsulation frame-relay
no shut
————————————
R2
router eigrp 1
passive-interface GigabitEthernet0/0
no auto-summary
network 192.168.0.0 0.0.0.3
network 172.16.0.0 0.0.0.3
network 10.10.0.0 0.0.0.3
redistribute static
ppp – chap
username R3 password PTSAchap
username R2 password PTSAchap
int s0/0/1
no shut
clock rate 128000
ip add 10.10.0.1 255.255.255.252
encapsulation ppp
ppp authentication chap
int s0/0/0
no shut
clock rate 128000
ip add 192.168.0.2 255.255.255.252
encapsulation hdlc
ip route 0.0.0.0 0.0.0.0 s0/1/0
ip route 0.0.0.0 0.0.0.0 s0/0/1
ip nat inside source static 172.16.0.2 203.0.113.14
int g0/0
ip nat inside
int s0/1/0
ip nat outside
———————————–
R1
router eigrp 1
passive-interface GigabitEthernet0/1
no auto-summary
network 192.168.0.0 0.0.0.3
network 192.168.1.0 0.0.0.255
int s0/0/0
no shut
ip add 192.168.0.1 255.255.255.252
encapsulation hdlc
Rashed
anyone have the full config? thanks
Andy
Do you have the exact commands for these? I really need some help 🙂
CCNA 4 Student
For 70%
————————–
R3
ntp server 10.10.1.2 key 15
snmp-server community CiscoPTSA RO
logging trap debugging
logging 10.10.1.2
service timestamps log datetime msec
router eigrp 1
passive-interface GigabitEthernet0/1
network 10.10.0.0 0.0.0.3
network 10.10.2.0 0.0.0.3
network 10.10.1.0 0.0.0.255
no auto-summary
interface Tunnel0
no shutdown
ip address 10.10.10.1 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.10.2.2
int s0/0/0
no shut
encapsulation frame-relay
ip add 10.10.2.1 255.255.255.252
ppp- chap
username R2 password PTSAchap
username R3 password PTSAchap
int s0/0/1
no shut
encapsulation ppp
ppp authentication chap
ip add 10.10.0.2 255.255.255.252
——————————–
R3-Branch
router eigrp 1
passive-interface GigabitEthernet0/0
no auto-summary
network 10.10.2.0 0.0.0.3
network 10.10.10.0 0.0.0.3
network 10.10.3.0 0.0.0.255
interface Tunnel0
no shutdown
ip add 10.10.10.2 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.10.2.1
int s0/0/0
ip add 10.10.2.2 255.255.255.252
encapsulation frame-relay
no shut
————————————
R2
router eigrp 1
passive-interface GigabitEthernet0/0
no auto-summary
network 192.168.0.0 0.0.0.3
network 172.16.0.0 0.0.0.3
network 10.10.0.0 0.0.0.3
redistribute static
ppp – chap
username R3 password PTSAchap
username R2 password PTSAchap
int s0/0/1
no shut
clock rate 128000
ip add 10.10.0.1 255.255.255.252
encapsulation ppp
ppp authentication chap
int s0/0/0
no shut
clock rate 128000
ip add 192.168.0.2 255.255.255.252
encapsulation hdlc
ip route 0.0.0.0 0.0.0.0 s0/1/0
ip route 0.0.0.0 0.0.0.0 s0/0/1
ip nat inside source static 172.16.0.2 203.0.113.14
int g0/0
ip nat inside
int s0/1/0
ip nat outside
———————————–
R1
router eigrp 1
passive-interface GigabitEthernet0/1
no auto-summary
network 192.168.0.0 0.0.0.3
network 192.168.1.0 0.0.0.255
int s0/0/0
no shut
ip add 192.168.0.1 255.255.255.252
encapsulation hdlc
student
ccna 4 student, all you need to do is 7.b and 7.c steps
Student
7.b
R2 –
Interface serial 0/1/0
ip nat inside
interface Serial0/0/0
ip nat outside
ip nat pool DYNAMIC 203.0.113.3 203.0.113.10 netmask 255.255.255.240
ip nat inside source list 1 pool DYNAMIC
ip nat inside source list ACL1 pool NAT_POOL
ip access-list standard ACL1
permit 192.168.1.0 0.0.0.255
7.c
R2 –
Interface s0/0/1
Ip nat inside
Interface s0/1/0
Ip nat outside
ip nat inside source list ACL2 interface Serial0/1/0 overload
ip access-list standard ACL2
permit 10.10.1.0 0.0.0.255
permit 10.10.3.0 0.0.0.255
Telefoojay1808
Anyone have the config for ScaN practice skills exam for ospf and eigrp for module 4 v5
student
7.b
R2 –
Interface serial 0/0/0
ip nat inside
interface Serial0/1/0
ip nat outside
ip nat pool DYNAMIC 203.0.113.3 203.0.113.10 netmask 255.255.255.240
ip nat inside source source list 1 pool DYNAMIC
access-list 1 permit 192.168.1.0 0.0.0.255
7.c
R2 –
Interface s0/0/1
Ip nat inside
Interface s0/1/0
Ip nat outside
ip nat inside source list 2 interface Serial0/1/0 overload
access-list 2 permit 10.10.1.0 0.0.0.255
access-list 2 permit 10.10.3.0 0.0.0.255
anonymous
please give the answer in comment. I m in the exam hall.
mohamad
where is the answers
student
————————–
R3
ntp
server 10.10.1.2 key 15
snmp-server community CiscoPTSA RO
logging trap debugging
logging 10.10.1.2
service timestamps log datetime msec
router
eigrp 1
passive-interface GigabitEthernet0/1
network 10.10.0.0 0.0.0.3
network 10.10.2.0 0.0.0.3
network 10.10.1.0 0.0.0.255
no auto-summary
interface
Tunnel0
no shutdown
ip address 10.10.10.1 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.10.2.2
int
s0/0/0
no shut
encapsulation frame-relay
ip add 10.10.2.1 255.255.255.252
ppp- chap
username
R2 password PTSAchap
username R3 password PTSAchap
int
s0/0/1
no shut
encapsulation ppp
ppp authentication chap
ip add 10.10.0.2 255.255.255.252
int g0/1
no shut
ip add 10.10.1.1 255.255.255.0
——————————–
Office-2-Branch
router
eigrp 1
passive-interface GigabitEthernet0/0
no auto-summary
network 10.10.2.0 0.0.0.3
network 10.10.10.0 0.0.0.3
network 10.10.3.0 0.0.0.255
interface
Tunnel0
no shutdown
ip add 10.10.10.2 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.10.2.1
int
s0/0/0
ip add 10.10.2.2 255.255.255.252
encapsulation frame-relay
no shut
int g0/0
ip address 10.10.3.1 255.255.255.0
no shut
————————————
R2
router
eigrp 1
passive-interface GigabitEthernet0/0
no auto-summary
network 192.168.0.0 0.0.0.3
network 172.16.0.0 0.0.0.3
network 10.10.0.0 0.0.0.3
redistribute static
ppp –
chap
username
R3 password PTSAchap
username R2 password PTSAchap
int
s0/0/1
no shut
clock rate 128000
ip add 10.10.0.1 255.255.255.252
encapsulation ppp
ppp authentication chap
int
s0/0/0
no shut
clock rate 128000
ip add 192.168.0.2 255.255.255.252
encapsulation hdlc
ip route
0.0.0.0 0.0.0.0 s0/1/0
ip route 0.0.0.0 0.0.0.0 s0/0/1
ip nat
inside source static 172.16.0.2 203.0.113.14
int g0/0
ip nat inside
ip address 172.16.0.1 255.255.255.252
no shutdown
int
s0/1/0
ip address 203.0.113.1 255.255.255.240
clock
rate 128000
no shutdown
ip nat outside
———————————–
Office-1
router
eigrp 1
passive-interface GigabitEthernet0/1
no auto-summary
network 192.168.0.0 0.0.0.3
network 192.168.1.0 0.0.0.255
int s0/0/0
no shut
ip add 192.168.0.1 255.255.255.252
encapsulation hdlc
7.b
R2 –
Interface serial 0/0/0
ip nat inside
interface Serial0/1/0
ip nat outside
ip nat pool DYNAMIC 203.0.113.3 203.0.113.10 netmask
255.255.255.240
ip nat inside source ACL1 pool DYNAMIC
ip access-list standard ACL1
permit 192.168.1.0
0.0.0.255
7.c
R2 –
Interface s0/0/1
Ip nat inside
Interface s0/1/0
Ip nat outside
ip nat inside source list ACL2
interface Serial0/1/0 overload
ip access-list standard ACL2
permit 10.10.1.0 0.0.0.255
permit 10.10.3.0 0.0.0.255
7.b [ another ]
R2 –
Interface serial 0/0/0
ip nat inside
interface Serial0/1/0
ip nat outside
ip nat pool DYNAMIC 203.0.113.3 203.0.113.10 netmask
255.255.255.240
ip nat inside source source list 1 pool DYNAMIC
access-list
1 permit 192.168.1.0 0.0.0.255
7.c [ another ]
R2 –
Interface s0/0/1
Ip nat inside
Interface s0/1/0
Ip nat outside
ip nat inside source list 2
interface Serial0/1/0 overload
access-list 2 permit 10.10.1.0 0.0.0.255
access-list 2 permit 10.10.3.0 0.0.0.255
newbie
Here is 100%
R3
ntp server 10.10.1.2 key 15
snmp-server community CiscoPTSA RO
logging trap debugging
logging 10.10.1.2
service timestamps log datetime msec
router eigrp 1
passive-interface GigabitEthernet0/1
network 10.10.0.0 0.0.0.3
network 10.10.2.0 0.0.0.3
network 10.10.1.0 0.0.0.255
no auto-summary
interface Tunnel0
no shutdown
ip address 10.10.10.1 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.10.2.2
int s0/0/0
no shut
encapsulation frame-relay
ip add 10.10.2.1 255.255.255.252
username R2 password PTSAchap
int s0/0/1
no shut
encapsulation ppp
ppp authentication chap
ip add 10.10.0.2 255.255.255.252
R3-Branch
router eigrp 1
passive-interface GigabitEthernet0/0
no auto-summary
network 10.10.2.0 0.0.0.3
network 10.10.10.0 0.0.0.3
network 10.10.3.0 0.0.0.255
interface Tunnel0
no shutdown
ip add 10.10.10.2 255.255.255.252
tunnel source s0/0/0
tunnel destination 10.10.2.1
int s0/0/0
ip add 10.10.2.2 255.255.255.252
encapsulation frame-relay
no shut
R2
router eigrp 1
passive-interface GigabitEthernet0/0
no auto-summary
network 192.168.0.0 0.0.0.3
network 172.16.0.0 0.0.0.3
network 10.10.0.0 0.0.0.3
redistribute static
username R3 password PTSAchap
int s0/0/1
no shut
clock rate 128000
ip add 10.10.0.1 255.255.255.252
encapsulation ppp
ppp authentication chap
ip nat inside
ip nat pool DYNAMIC 203.0.113.3 203.0.113.10 netmask 255.255.255.240
ip nat inside source list 1 pool DYNAMIC
ip nat inside source list 2 interface Serial0/1/0 overload
ip access-list standard 2
permit 10.10.1.0 0.0.0.255
permit 10.10.3.0 0.0.0.255
ip access-list standard 1
permit 192.168.1.0 0.0.0.255
int s0/0/0
no shut
clock rate 128000
ip add 192.168.0.2 255.255.255.252
encapsulation hdlc
ip nat inside
ip route 0.0.0.0 0.0.0.0 s0/1/0
ip nat inside source static 172.16.0.2 203.0.113.14
int g0/0
ip nat inside
int s0/1/0
ip nat outside
router eigrp 1
passive-interface GigabitEthernet0/1
no auto-summary
network 192.168.0.0 0.0.0.3
network 192.168.1.0 0.0.0.255
int s0/0/0
no shut
ip add 192.168.0.1 255.255.255.252
encapsulation hdlc
R1
router eigrp 1
passive-interface GigabitEthernet0/1
no auto-summary
network 192.168.0.0 0.0.0.3
network 192.168.1.0 0.0.0.255
int s0/0/0
no shut
ip add 192.168.0.1 255.255.255.252
encapsulation hdlc
peter
thanks…a lot.. 🙂
Tom
I got 100% because of your code. Thanks so much!
Everyone has to be careful with the router’s names. In my case some names were different. You gave the equivalences below:
R3 // Office-2
R3-Branch // Office-2-Branch
R2 // HQ
R1 // Office-1
Nate Brad Frasier
Good config
Emerald_Asurza
Is correct, but you just forgot to add a route to eigrp routing in R3:
eigrp router 1
network 10.10.10.0 0.0.0.3
Now yes, 100% insured
BBorisov
100%
>>>>> WEST <<<<>>>> R2 <<<<>>>> R3 <<<<>>>> East-Branch1 <<<<<
Building configuration…
Current configuration : 998 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname East-Branch1
!
!
!
!
!
!
!
!
!
!
!
!
license udi pid CISCO1941/K9 sn FTX15243JQ2
!
!
!
!
!
spanning-tree mode pvst
!
!
!
!
interface Tunnel0
ip address 10.10.10.2 255.255.255.252
tunnel source Serial0/0/0
tunnel destination 10.10.2.1
tunnel mode gre ip
!
!
interface GigabitEthernet0/0
ip address 10.10.3.1 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 10.10.2.2 255.255.255.252
encapsulation frame-relay
frame-relay map ip 10.10.10.1 202 broadcast
!
interface Serial0/0/1
no ip address
shutdown
!
interface Vlan1
no ip address
shutdown
!
router eigrp 1
network 10.10.2.0 0.0.0.3
network 10.10.10.0 0.0.0.3
network 10.10.3.0 0.0.0.255
auto-summary
!
ip classless
!
!
!
!
!
!
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
!
!
end
Maxime
May be? You have a Hand on skill examen ccna4
student
Anyone with an idea of RSE pt CCNA 4 pls help
SpiralOut
Student – The RSE PT CCNA 4 is the same as the RSE for Semester 2 and Semester 3
Thomas
The problem I’m having with the practice skills assessment is conceptual. I’m not having any trouble giving it the commands it wants for a full score.
1. Why are we advertising the Frame-Relay network when we have configured a GRE tunnel? Traffic will not be encapsulated unless EIGRP routes through the Tunnel interface. Its actually quite stupid the configuration that the skills assessment requires. The requirements for routing on the R3 and R3-Branch routers are to advertise both the tunnel and the frame-relay network on R3 Branch but only the frame-relay interface is advertised on R3. So no adjacency is even formed through the tunnel. You have a tunnel that will never be used to encapsulate traffic with the exception of traffic actually addressed to the tunnel endpoint interfaces themselves. And sure, GRE is pointless without IPsec encryption but we’ll need to eventually route through a tunnel.
2. So yeah, we need to form the adjacency through the tunnel to get encapsulated traffic. If we create 2 adjacencies through the tunnel and the frame-relay network, the ip route table prefers the unencapsulated frame-relay route for routing. What we really need is just 1 adjacency and only through the tunnel interface. If we attempt to do so, it works fine UNTIL we use the “redistribute static” command on R2 to redistribute the default route. This causes the tunnel interface on R3-Branch to become disabled as such:
%LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to up
%DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 10.10.10.1 (Tunnel0) is up: new adjacency
%ADJ-5-PARENT: Midchain parent maintenance for IP midchain out of 0 65E900C0 – looped chain attempting to stack
%TUN-5-RECURDOWN: 0 temporarily disabled due to recursive routing
%LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel0, changed state to down
%DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 10.10.10.1 (Tunnel0) is down: interface down
So I don’t really understand what is causing recursive routing here. Is this a packet tracer glitch? Several google searches give me nothing that applies to this scenario.