• Home
  • Exams
    Microsoft
    AI-102 (Designing and Implementing) AI-900 (AI Fundamentals) AZ-104 (Administrator) AZ-140 (Configuring and Operating) AZ-204 (Developing Solutions) AZ-305 (Designing Infrastructure Solutions) AZ-400 (DevOps Solutions) AZ-500 (Security Technologies) AZ-700 (Designing and Implementing)
    All Microsoft Exams
    Amazon
    CLF-C01 (Cloud Practitioner) DBS-C01 (Database - Specialty) DVA-C01 (Developer Associate) SCS-C01 (Security - Specialty) SAA-C02 (Solutions Architect Associate) SAA-C03 (Solutions Architect Associate) SAP-C01 (Solutions Architect Professional) SOA-C02 (Certified SysOps Administrator Associate) DOP-C01 (DevOps Engineer Professional)
    All Amazon Exams
    Cisco
    200-201 (CBROPS) 200-301 (CCNA) 200-901 (DEVASC) 300-410 (ENARSI) 300-415 (ENSDWI) 300-420 (ENSLD) 300-425 (ENWLSD) 300-430 (ENWLSI) 300-715 (SISE) 350-401 (ENCOR) 350-501 (SPCOR) 350-601 (DCCOR) 350-701 (SCOR) 350-801 (CLCOR) 400-007 (CCDE)
    All Cisco Exams
    CompTIA
    220-1101 (A+ Core 1) 220-1102 (A+ Core 2) CAS-004 (Advanced Security Practitioner) CS0-002 (CySA+) CV0-003 (Cloud+) FC0-U61 (IT Fundamentals) N10-008 (Network+) PK0-004 (Project+) PT0-002 (PenTest+) SK0-005 (Server+) SY0-601 (Security+) XK0-004 (Linux+)
    All CompTIA Exams
    Google
    Associate Cloud Engineer Cloud Digital Leader Professional Cloud Architect Professional Cloud Security Engineer Professional Data Engineer
    All Google Exams
    Huawei
    H11-851 (HCNA-VC) H12-211 (HCIA Routing&Switching) H12-221 (HCNP-RS-IERN) H12-224 (HCNP-RS Fast Track) H12-711 (HCNA-Security-CBSN) H13-612 (HCNA-Storage-BSSN) H13-629 (HCIE-Storage)
    All Huawei Exams
    Python
    Python Programming (PCAP)
    All Python Exams
    Juniper
    JN0-104 (JNCIA-Junos) JN0-251 (JNCIA-MistAI)
    All Juniper Exams
    Fortinet
    NSE4_FGT-7.0 (FortiOS 7.0) NSE4_FGT-7.2 (FortiOS 7.2) NSE5_FAZ-7.0 (FortiAnalyzer 7.0) NSE5_FCT-7.0 (FortiClient EMS 7.0) NSE5_FMG-7.0 (FortiManager 7.0) NSE7_EFW-7.0 (Enterprise Firewall 7.0) NSE7_SDW-7.0 (SD-WAN 7.0 ) NSE8_812 (Written Exam)
    All Fortinet Exams
  • LabsNew
    CCNA 200-301
    Introduction IOS Operating System IPv4 Address Configure Serial and Loopback Interfaces IPv6 Address Configuration, Verification, and Troubleshooting IPv6 Address Autoconfiguration and EUI-64 Understanding ARP and Proxy ARP Configuring Standard VLANs Configuring VTP Clients and Servers Configuring VTP Transparent Mode Securing VTP Domains Switch Access Port Security Advanced Switch Access Port Security Advanced Static Switch Access Port Security Disabling Auto-negotiation of Trunking Configuring Dynamic Trunking Configuring Default Gateways Cisco Discovery Protocol (CDP) Configuring LLDP on Cisco Devices Configuring Errdisable Recovery Configuring Inter-VLAN Routing with Router on a Stick (RoaS) Inter-VLAN Routing Using Switched Virtual Interfaces (SVI) Configuring Static Routing via Ethernet Interfaces Configuring Static Routing via IP addresses Configuring and Naming Static Routes Configuring Default Static Routes Configuring IPv6 Static Routes Configuring IPv6 Default Routes Configuring IP Floating Static Routes Configuring RIP Version 2 RIPv2 Network Summarization Configuration
  • ToolboxNew
    IPv4 Subnet Calculator
    IPv4 Wildcard Mask Calculator
    HTML Encoder and Decoder
    URL Encoder and Decoder
    Random Password Generator
  • Net Sec ToolsNew
    Cisco Packet Tracer
    GNS3
    EVE-NG
    Wireshark
    Postman
    Nmap
    Curl
    Nessus
    Burp Suite
  • Sign Up
  • Login

  • Logo

    Labs

    • Lab 1: Introduction to CISCO 200-301 Labs
    • Lab 2: Cisco IOS Operating System
    • Lab 3: IPv4 Address Configuration, Verification, and Troubleshooting on Cisco Routers
    • Lab 4: IPv6 Address Configuration, Verification, and Troubleshooting on Cisco Routers
    • Lab 5: IPv6 Address Autoconfiguration and EUI-64 Addressing on Cisco Routers
    • Lab 6: Understanding ARP and Proxy ARP on Cisco Routers
    • Lab 7: Configuring Standard VLANs on Catalyst Switches
    • Lab 8: Configuring VTP Clients and Servers on Cisco Catalyst Switches
    • Lab 9: Configuring VTP Transparent Mode on Cisco Catalyst Switches
    • Lab 10: Securing VTP Domains on Cisco Catalyst Switches
    • Lab 11: Configuring Switch Access Port Security on Cisco Catalyst Switches
    • Lab 12: Configuring Advanced Switch Access Port Security on Cisco Catalyst Switches
    • Lab 13: Configuring Advanced Static Switch Access Port Security on Cisco Catalyst Switches
    • Lab 14: Disabling Auto-negotiation of Trunking on Cisco Catalyst Switches
    • Lab 15: Configuring Dynamic Trunking on Cisco Switchports
    • Lab 16: Configuring Default Gateways for Cisco Routers and Switches
    • Lab 17: Understanding Cisco Discovery Protocol (CDP)
    • Lab 18: Configuring LLDP on Cisco Devices
    • Lab 19: Configuring Errdisable Recovery on Cisco Switches
    • Lab 20: Configuring Inter-VLAN Routing with Router on a Stick (RoaS)
    • Lab 21: Configuring Inter-VLAN Routing Using Switched Virtual Interfaces (SVI)
    • Lab 22: Configuring Static Routing via Ethernet Interfaces on Cisco Routers
    • Lab 23: Configuring Static Routing via IP addresses
    • Lab 24: Configuring and Naming Static Routes on Cisco Routers
    • Lab 25: Configuring Default Static Routes on Cisco Routers
    • Lab 26: Configuring IPv6 Static Routes on Cisco Routers
    • Lab 27: Configuring IPv6 Default Routes on Cisco Routers
    • Lab 28: Configuring IP Floating Static Routes on Cisco Routers
    • Lab 29: Configuring RIP Version 2 on Cisco Routers
    • Lab 30: RIPv2 Network Summarization Configuration on Cisco Routers

    Configuring IP Floating Static Routes on Cisco Routers

    Objective

    The objective of this lab exercise is to learn how to implement IP floating static route functionality on a Cisco router.

    Purpose

    Configuring a floating static route allows your Cisco router to have a backup route to a destination in case the primary route fails. This knowledge is essential for Cisco engineers and is part of the Cisco CCNA exam.

    Lab Topology

    Use the following topology to complete this lab exercise:

    Image 1

    Note: Both R2 and R3 connect to the Internet, so R1 has two exit options to the Internet.


    Task 1: Configure Hostnames

    Objective: Set hostnames on R1, R2, and R3 as illustrated in the topology.

    Configuration:

    R1#configure terminal
    R1(config)#hostname R1
    R1(config)#end
    
    R2#configure terminal
    R2(config)#hostname R2
    R2(config)#end
    
    R3#configure terminal
    R3(config)#hostname R3
    R3(config)#end

    Task 2: Configure IP Addresses

    Objective: Configure the IP addresses on the Gig0/0 and Gig0/1 interfaces of R1, R2, and R3 as illustrated in the topology.
    Note: R1 will always have the .1 IP in each of its Gig interfaces. R2 and R3 will have the .1 IP on the Gig0/1 interface.

    Configuration:

    R1#configure terminal
    R1(config)#interface gigabitEthernet0/0
    R1(config-if)#no shutdown
    R1(config-if)#ip address 192.168.10.1 255.255.255.252
    R1(config-if)#exit
    R1(config)#interface gigabitEthernet0/1
    R1(config-if)#no shutdown
    R1(config-if)#ip address 192.168.20.1 255.255.255.252
    R1(config-if)#end
    
    R2#configure terminal
    R2(config)#interface gigabitEthernet0/0
    R2(config-if)#no shutdown
    R2(config-if)#ip address 192.168.10.2 255.255.255.252
    R2(config-if)#exit
    R2(config)#interface gigabitEthernet0/1
    R2(config-if)#no shutdown
    R2(config-if)#ip address 192.168.30.1 255.255.255.252
    R2(config-if)#end
    
    R3#configure terminal
    R3(config)#interface gigabitEthernet0/0
    R3(config-if)#no shutdown
    R3(config-if)#ip address 192.168.20.2 255.255.255.252
    R3(config-if)#exit
    R3(config)#interface gigabitEthernet0/1
    R3(config-if)#no shutdown
    R3(config-if)#ip address 192.168.40.1 255.255.255.252
    R3(config-if)#end

    Task 3: Configure Default Static Routes

    Objective: Configure two default static routes on R1. The first one (primary) will go to R2 with an administrative distance of 1. The secondary one will go to R3 with an administrative distance of 254. This ensures all traffic to unknown destinations is sent via R2.

    Configuration:

    R1#configure terminal
    R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.10.2
    R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.20.2 254
    R1(config)#end

    Task 4: Test Floating Static Route

    Objective: Shut down the interface Gig0/0 of R1 and use show commands to observe how the secondary route activates.

    R1#sh ip route
    Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
           D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
           N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
           E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
           i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
           * - candidate default, U - per-user static route, o - ODR
           P - periodic downloaded static route
    
    Gateway of last resort is 192.168.10.2 to network 0.0.0.0
    
         192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks
    C       192.168.10.0/30 is directly connected, GigabitEthernet0/0
    L       192.168.10.1/32 is directly connected, GigabitEthernet0/0
         192.168.20.0/24 is variably subnetted, 2 subnets, 2 masks
    C       192.168.20.0/30 is directly connected, GigabitEthernet0/1
    L       192.168.20.1/32 is directly connected, GigabitEthernet0/1
    S*   0.0.0.0/0 [1/0] via 192.168.10.2
    
    R1#conf t
    Enter configuration commands, one per line.  End with CNTL/Z.
    R1(config)#interface gigabitEthernet0/0
    R1(config-if)#shutdown
    R1(config-if)#end
    
    R1#show ip route
    Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
           D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
           N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
           E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
           i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
           * - candidate default, U - per-user static route, o - ODR
           P - periodic downloaded static route
    
    Gateway of last resort is 192.168.20.2 to network 0.0.0.0
    
         192.168.20.0/24 is variably subnetted, 2 subnets, 2 masks
    C       192.168.20.0/30 is directly connected, GigabitEthernet0/1
    L       192.168.20.1/32 is directly connected, GigabitEthernet0/1
    S*   0.0.0.0/0 [254/0] via 192.168.20.2
    
    R1#show ip interface brief
    Interface              IP-Address      OK? Method Status                Protocol
    GigabitEthernet0/0     192.168.10.1    YES manual administratively down down
    GigabitEthernet0/1     192.168.20.1    YES manual up                    up
    GigabitEthernet0/2     unassigned      YES unset  administratively down down
    Vlan1                  unassigned      YES unset  administratively down down

    Task 5: Restore Primary Route

    Objective: Bring the interface Gig0/0 of R1 up again and verify how it re-establishes the primary route due to the lower administrative distance.

    Configuration:

    R1#configure terminal
    R1(config)#interface gigabitEthernet0/0
    R1(config-if)#no shutdown
    R1(config-if)#end
    
    R1#show ip route
    Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
           D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
           N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
           E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
           i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
           * - candidate default, U - per-user static route, o - ODR
           P - periodic downloaded static route
    
    Gateway of last resort is 192.168.10.2 to network 0.0.0.0
    
         192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks
    C       192.168.10.0/30 is directly connected, GigabitEthernet0/0
    L       192.168.10.1/32 is directly connected, GigabitEthernet0/0
         192.168.20.0/24 is variably subnetted, 2 subnets, 2 masks
    C       192.168.20.0/30 is directly connected, GigabitEthernet0/1
    L       192.168.20.1/32 is directly connected, GigabitEthernet0/1
    S*   0.0.0.0/0 [1/0] via 192.168.10.2
    
    R1#show ip interface brief
    Interface              IP-Address      OK? Method Status                Protocol
    GigabitEthernet0/0     192.168.10.1    YES manual up                    up
    GigabitEthernet0/1     192.168.20.1    YES manual up                    up
    GigabitEthernet0/2     unassigned      YES unset  administratively down down
    Vlan1                  unassigned      YES unset  administratively down down

    Cisco Packet Tracer file:
    Load and open the .pkt Lab file in Cisco Packet Tracer from here: Configuring_IP_Floating_Static_Routes.pkt

    © 2025 WinITExam.com
    Terms | Privacy | Refund | Contact