Network Lab PDF
Network Lab PDF
Lab 1: Cabling
Objectives
To become familiar with the different types of cables used in the lab.
Components
Part 1: Cabling
Choosing the cables necessary to make a successful LAN or WAN connection requires
consideration of the different media types. There are many different Physical layer
implementations that support multiple media types.
The RJ-45 connector is the male component crimped on the end of the cable. When viewed
from the front, the pins are numbered from 8 to 1. When viewed from above with the
opening gate facing you, the pins are numbered 1 through 8, from left to right. This
orientation is important to remember when identifying a cable.
Types of Interfaces
Typically, when connecting different types of devices, use a straight-through cable and
when connecting the same type of device, use a crossover cable.
Straight-through UTP Cables
A straight-through cable has connectors on each end that are terminated the same in
1
accordance with either the T568A or T568B standards.
Identifying the cable standard used allows you to determine if you have the right cable for
the job. More importantly, it is a common practice to use the same color codes throughout
the LAN for consistency in documentation.
For two devices to communicate through a cable that is directly connected between the
two, the transmit terminal of one device needs to be connected to the receive terminal of
the other device.
The cable must be terminated so the transmit pin, Tx, taking the signal from device A at
one end, is wired to the receive pin, Rx, on device B. Similarly, device B's Tx pin must be
connected to device A's Rx pin. If the Tx pin on a device is numbered 1, and the Rx pin is
numbered 2, the cable connects pin 1 at one end with pin 2 at the other end. These "crossed
over" pin connections give this type of cable its name, crossover.
To achieve this type of connection with a UTP cable, one end must be terminated as
EIA/TIA T568A pinout, and the other end terminated with T568B pinout.
2
• Router to router Ethernet port connection
• Computer to computer
• Computer to a router Ethernet port
Question 1: What are the layers in OSI Reference Models? Describe each layer
briefly.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
Question 2: What are the responsibilities of Data Link Layer?
_________________________________________________________________________
_________________________________________________________________________
Question 3: What are the responsibilities of Network Layer?
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
Part B: Procedure:
How to prepare a UTP cable
Prepare your workspace. Take the roll of UTP cable and cut the cable to length using the
cutting blade on the crimping tool.
Step 2
Splice the end by using the splicing blades to expose the unshielded twisted pairs.
Step 3
Take each twisted pair and make four wire strands, each going out from the center of the
wire.
Step 4
4
Now take the individual twisted wire pairs and untwist them down to individual wires in
the following order: Striped Orange, Orange, Striped Green, Blue, Striped Blue, Green,
Striped Brown, and Brown.
Step 5
Next, grasp the wires with your thumb and index finger of your non-
dominant hand. Take each wire and snug them securely side by side.
Step 6
Using the cutting blade of the crimping tool, cut the ends off of the
wires to make each wire the same height.
Step 7
Still grasping the wires, insert the RJ-45 jack on the wires with the clip
facing away from you.
Step 8
5
Insert the jack into the crimper and press down tightly on the tool to seal
the wires in place.
Step 9
Once the first head is made, repeat steps two through eight. When
untwisting the wires down to sing strands, use the following order:
Striped Green, Green, Striped Orange, Blue, Striped Blue, Orange,
Striped Brown, Brown.
Step 10
Assignment
Problem 1: Draw the wire-map for a “cross over Cat5e UTP cable:
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
6
Appendix
7
Lab. 2: PC Network TCP/IP Configuration
Part A: Pre-lab
Objective
This does not provide enough possibilities for every Internet device to have its own
permanent number. Subnet routing is one of the methods currently in practice to allow LANs to
use the same IP address as other networks elsewhere, though both are connected to the
Internet.
A Subnet (short for subnetwork) is a division of the network that is identified by a subnet
mask. A subnet mask is an IP address that is used to tell how many bits in an Octet(s)
identify the subnet and how many bits provide room for host addresses. For example, the
Subnet Mask 255. 255. 255.0 tells that the first 24 bits represent the subnet, while the rest
8 bits identify the hosts in the subnet.
This lab is a non-destructive lab and can be done on any machine without concern of
changing the system configuration. It should be performed in a classroom (or other LAN
environment) that connects to the Internet so that the computer that you use has an IP
address.
8
Packet Internet Groper (ping) command is used to provide a basic test of whether a
particular host is operating properly and is reachable on the network from the testing host.
It provides estimates of round trip time and packet loss rate between hosts.
The traceroute (tracert) traces all the routers that a network layer packet has to pass
through to get to a destination.
Pre Lab Question
Read thoroughly and prepare the experiment sheet.
You should try using Packet Tracer at home before the lab session.
You must bring a printed copy of this experiment with you to the lab.
1. What do you mean by NIC?
_______________________________________________________________
___________________________________________________________
2. What are MAC addresses?
______________________________________________________________
______________________________________________________________
3. What are IP addresses?
_____________________________________________________________
_____________________________________________________________
4. What are gateways?
_____________________________________________________________
____________________________________________________________
Part B: Procedure:
A workstation connected to the internet is required.
Experiment
1. Verify the connectivity of your workstation to the internet.
2. Open the Command Prompt of the operating system using either of the
following methods:
Click on Start > All Programs > Accessories > Command Prompt or
Click on Start > Run, enter cmd (short for command)
and click on ok. A Command Prompt screen should open.
3. Gather TCP/IP configuration information:
Type ipconfig (short for IP configuration) and press Enter.
The screen will show the IP address, subnet mask, and default gateway for your computer’s
connection.
Notice the values in the Command Prompt. The IP address and the default gateway
should be in the same network or subnet, otherwise this host would not be able to
communicate outside the network. In Fig. 3, the subnet mask tells us that the first three
octets of the IP address and the default gateway must be the same in order to be in the
same network.
9
4. Check more detailed TCP/IP configuration information:
Type ipconfig /all and press Enter. What are the DNS and DHCP server addresses? What
are their functions? What is the MAC of the network interface card?
5. Ping the IP address of another computer. Note that for the ping and tracert commands to
work the PC firewalls have to be disabled. Why do you think this is so?
Ask the IP address of the workstation that is being used by another group of students.
Then type ping, space, and the IP address that you received, then press Enter. Notice the
outputs.
6. Ping the IP address of the gateway router from the details that have been observed in the
output of step 4 above. If the ping is successful, it means that there is a physical
connectivity to the router on the local network and probably the rest of the world.
7. Ping the Loopback IP address of your computer. Type the following command: ping
127.0.0.1.
The IP address 127.0.0.1 is reserved for loopback testing. If the ping is
successful, then TCP/IP is properly installed and functioning on this
computer.
8. You can also ping using names like websites. Ping the IP address of the cisco website.
Type ping, space and www.cisco.com, then press Enter. Notice the outputs. A DNS server will
resolve the name to an IP address and the ping will be successful only in the existence of
the DNS server.
9. Ping www.zuj.edu.jo and observe the results. Is there a difference in time
between the results shown by pinging www.cisco.com and www.zuj.edu.jo If so
why and if not why?
10. Trace the route to the Cisco website. Type tracert www.cisco.com and press enter. In a
successful output, you will see listings of all routers the tracert requests had to pass 10
through to get to the destination.
11. Type tracert www.zuj.edu.jo and press enter. The output should take less time than that of
step 9.
Assignment:
What is the difference between ipconfig and ipconfig /all?
______________________________________________________
______________________________________________________
______________________________________________________
__
Write the steps how to connect two PCs with each other by using
packet tracer
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________
Apply these steps by using the packet tracer:
______________________________________________________
______________________________________________________
______________________________________________________
__
What are the advantages of connecting two PCs?
______________________________________________________
______________________________________________________
______________________________________________________
__
Part A: Pre-lab
11
Obje ctives
Part 1: Determine IPv4 Address Subnetting
Part 2: Calculate IPv4 Address Subnetting
Int roducti on
The ability to work with IPv4 subnets and determine network and host
information based on a given IP address and subnet mask is critical to
understanding how IPv4 networks operate. The first part is designed to
reinforce how to compute network IP address information from a given IP
address and subnet mask. When given an IP address and subnet mask, you will
be able to determine other information about the subnet.
Network address of this subnet Broadcast address of this subnet Range of host addresses
of this subnet Number of subnets created
Number of hosts per subnet
The following example shows a sample problem along with the solution for solving this
problem:
Given:
12
Host IP Address: 172.16.77.120
Original Subnet Mask 255.255.0.0
New Subnet Mask: 255.255.240.0
Find:
The original subnet mask was 255.255.0.0 or /16. The new subnet mask is
255.255.240.0 or /20. The resulting difference is 4 bits. Because 4 bits were
borrowed, we can determine that 16 subnets were created because 24 = 16.
The new mask of 255.255.240.0 or /20 leaves 12 bits for hosts. With 12
bits left for hosts, we use the following formula: 212 = 4,096 2 = 4,094
hosts per subnet.
Binary ANDing will help you determine the subnet for this problem, which results in the
network 172.16.64.0.
Finally, you need to determine the first host, last host, and broadcast address for each
subnet. One method to determine the host range is to use binary math for the host portion
of the address. In our example, the last 12 bits of the address is the host portion. The first
host would have all significant bits set to zero and the least significant bit set to 1. The last
host would have all significant bits set to 1 and the least significant bit set to 0. In this
example, the host portion of the address resides in the 3rd and 4th octets.
Description 1st Octet 2nd Octet 3rd Octet 4th Octet Description
Step 1: Fill out the tables below with appropriate answers given the IPv4 address,
original
subnet m a s k, a nd n e w subnet ma s k.
a. Problem 1:
Given:
Find:
b. Problem 2:
Given:
Host IP Address: 10.101.99.228
Original Subnet Mask 255.0.0.0
New Subnet Mask: 255.255.128.0
Find:
Given:
Find:
d. Problem 4:
Given:
Find:
Find:
Assignment
Given:
Find:
Number of Subnet Bits
Number of Subnets Created
Number of Host Bits per Subnet
Number of Hosts per Subnet
Network Address of this Subnet
IPv4 Address of First Host on this Subnet
IPv4 Address of Last Host on this Subnet
IPv4 Broadcast Address on this Subnet
16
Lab. 4 Packet Tracer
Part A: Pre-lab
Objectives
1. To become familiar with the switches and routers used in the lab.
2. To become familiar with the network simulator Packet Tracer.
3. To use the packet tracer to simulate a simple network.
Introduction:
Routers are computers and include many of the same hardware and software components
found in a typical PC, such as CPU, RAM, ROM, and an operating system.
The main purpose of a router is to connect multiple networks and forward packets from
one network to the next. This means that a router typically has multiple interfaces. Each
interface is a member or host on a different IP network.
The router has a routing table, which is a list of networks known by the router. The routing
table includes network addresses for its own interfaces, which are the directly connected
networks, as well as network addresses for remote networks. A remote network is a
network that can only be reached by forwarding the packet to another router.
Remote networks are added to the routing table in two ways: either by the network
administrator manually configuring static routes or by implementing a dynamic routing
protocol. Static routes do not have as much overhead as dynamic routing protocols;
however, static routes can require more maintenance if the topology is constantly changing or
is unstable.
Dynamic routing protocols automatically adjust to changes without any intervention from
the network administrator. Dynamic routing protocols require more CPU processing and also
use a certain amount of link capacity for routing updates and messages. In many cases, a
routing table will contain both static and dynamic routes.
Routers make their primary forwarding decision at Layer 3, the Network layer. However,
router interfaces participate in Layers 1, 2, and 3. Layer 3 IP packets are encapsulated into a
Layer 2 data link frame and encoded into bits at Layer 1. Router interfaces participate in
17
Layer 2 processes associated with their encapsulation. For example, an Ethernet interface on
a router participates in the ARP process like other hosts on that LAN.
The CPU executes operating system instructions, such as system initialization, routing
functions, and switching functions.
RAM
RAM stores the instructions and data needed to be executed by the CPU. RAM is used to
store these components:
Operating System: The Cisco IOS (Internetwork Operating System) is copied into RAM during
bootup.
Running Configuration File: This is the configuration file that stores the configuration
commands that the router IOS is currently using. With few exceptions, all commands
configured on the router are stored in the running configuration file, known as running-
config.
IP Routing Table: This file stores information about directly connected and remote
networks. It is used to determine the best path to forward the packet.
ARP Cache: This cache contains the IPv4 address to MAC address mappings, similar to the
ARP cache on a PC. The ARP cache is used on routers that have LAN interfaces such as
Ethernet interfaces.
Packet Buffer: Packets are temporarily stored in a buffer when received on an interface or
before they exit an interface.
RAM is volatile memory and loses its content when the router is powered down or
restarted. However, the router also contains permanent storage areas, such as ROM,
flash and NVRAM.
ROM uses firmware, which is software that is embedded inside the integrated circuit.
18
Firmware includes the software that does not normally need to be modified or upgraded,
such as the bootup instructions. Many of these features, including ROM monitor software,
will be discussed in a later course. ROM does not lose its contents when the router loses
power or is restarted.
Flash memory is nonvolatile computer memory that can be electrically stored and erased.
Flash is used as permanent storage for the operating system, Cisco IOS. In most models of
Cisco routers, the IOS is permanently stored in flash memory and copied into RAM during
the bootup process, where it is then executed by the CPU. Some older models of Cisco
routers run the IOS directly from flash. Flash consists of SIMMs or PCMCIA cards, which can
be upgraded to increase the amount of flash memory.
Flash memory does not lose its contents when the router loses power or is restarted. NVRAM
NVRAM (Nonvolatile RAM) does not lose its information when power is turned off. This is
in contrast to the most common forms of RAM, such as DRAM, that requires continual
power to maintain its information. NVRAM is used by the Cisco IOS as permanent storage
for the startup configuration file (startup-config). All configuration changes are stored in
the running-config file in RAM, and with few exceptions, are implemented immediately by
the IOS. To save those changes in case the router is restarted or loses power, the running-
config must be copied to NVRAM, where it is stored as the startup-config file. NVRAM
retains its contents even when the router reloads or is powered off.
ROM, RAM, NVRAM, and flash are discussed in the following section which introduces the
IOS and the bootup process. They are also discussed in more detail in a later course relative
to managing the IOS.
It is more important for a networking professional to understand the function of the main
internal components of a router than the exact location of those components inside a
specific router. The internal physical architecture will differ from model to model.
Router Interfaces
Management ports
Routers have physical connectors that are used to manage the router. These connectors are
known as management ports. Unlike Ethernet and serial interfaces, management ports are not
used for packet forwarding. The most common management port is the console port. The
console port is used to connect a terminal, or most often a PC running terminal emulator
19
software, to configure the router without the need for network access to that router. The
console port must be used during initial configuration of the router.
Another management port is the auxiliary port. Not all routers have auxiliary ports. At
times the auxiliary port can be used in ways similar to a console port. It can also be used
to attach a modem.
1. Network Interfaces
The term interface refers to a physical connector on the router whose main purpose is to
receive and forward packets. Routers have multiple interfaces that are used to connect to
multiple networks. Typically, the interfaces connect to various types of networks, which
means that different types of media and connectors are required. Often a router will need
to have different types of interfaces. For example, a router usually has FastEthernet interfaces
for connections to different LANs and various types of WAN interfaces to connect a variety
of serial links including T1, DSL and ISDN.
Like interfaces on a PC, the ports and interfaces on a router are located on the outside
of the router.
Their external location allows for convenient attachment to the appropriate network
cables and connectors.
Pre Lab Question
Read thoroughly and prepare the experiment sheet.
Review the sections in Lab1 regarding the types of cables used.
You should try using Packet Tracer at home before the lab session.
You must bring a printed copy of this experiment with you to the lab.
Part B: Procedure:
20
Packet Tracer
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various
protocols used in networking, in either Real Time or Simulation mode. This includes layer
2 protocols such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and
layer 4 protocols such as TCP and UDP. Routing protocols can also be traced.
Adding a Hub
21
Adding a Switch
2950-24 switch. Add the switch by moving the plus sign "+"
22
Configuring IP Addresses and Subnet Masks on the Hosts
Choose the Config tab. It is here that you can change the name of PC0. It is also here
where you would enter a Gateway IP Address, also known as the default gateway. We will
discuss this later, but this would be the IP address of the local router. If you want, you can
enter the IP Address 192.168.1.1.
Click on FastEthernet. Although we have not yet discussed IP Addresses, add the IP Address
to 192.168.1.10. Click once in the Subnet Mask field to enter the default Subnet Mask. You
Also, notice this is where you can change the Bandwidth (speed) and
Duplex of the Ethernet NIC (Network Interface Card). The default is Auto
(autonegotiation), which means the NIC will negotiate with the hub or
switch. The bandwidth and/or duplex can be manually set by removing
the check from the Auto box and choosing the specific option.
Bandwidth – Auto
23
If the host is connected to a hub or switch port which can do 100 Mbps, then the Ethernet
NIC on the host will choose 100 Mbps (Fast Ethernet). Otherwise, if the hub or switch port
can only do 10 Mbps, then the Ethernet NIC on the host will choose 10 Mbps (Ethernet).
Duplex – Auto
Hub: If the host is connected to a hub, then the Ethernet NIC on the host will choose Half
Duplex.
Switch: If the host is connected to a switch, and the switch port is configured as Full
Duplex (or Autonegotiation), then the Ethernet NIC on the host will choose Full Duplex. If
the switch port is configured as Half Duplex, then the Ethernet NIC on the host will choose
Half Duplex. (Full Duplex is a much more efficient option.) The information is automatically
saved when entered
Repeat these steps for the other hosts. Use the information below for IP
Addresses and Subnet Masks.
Host IP Address Subnet Mask
PC0 192.68.1.10 255.255.255.0
PC1 192.68.1.11 255.255.255.0
PC2 192.68.1.12 255.255.255.0
PC3 192.68.1.13 255.255.255.0
Verify the information: To verify the information that you entered, move the Select tool
(arrow) over each host.
Deleting a Device or Link: To delete a device or link, choose the Delete tool and click on
the item you wish to delete.
To connect like-devices, like a Hub and a Switch, we will use a Cross-over cable. Click
once the Cross-over Cable from the Connections options.
24
Move cursor to the Connections Switch0.
Click once on Switch0 and choose FastEthernet0/3 (actual port does not matter).
The link light for switch port FastEthernet0/3 will begin as amber and eventually change to
green as the Spanning Tree Protocol transitions the port to forwarding.
Network Simulation
In this part, we are going to use the simulator to simulate traffic between
hosts. For this scenario, delete the switch and host PC3, then connect
host PC2 to the hub.
Task 1: Observe the flow of data from PC0 to PC1 by creating network traffic.
a. Switch to Simulation Mode by selecting the tab that is partially hidden
behind the Real Time tab in the bottom right-hand corner. The tab has
the icon of a stopwatch on it.
NOTE: When Simulation Mode is chosen, a Simulation Panel will appear on the right side of
the screen. This panel can be moved by moving the cursor at the top of the panel until it
changes and then double-clicking on it. The panel can be restored to the original location
by double-clicking on the Title bar. If the panel is closed, click on the Event List button.
b. Click on Edit Filters, and then select All/None to deselect every filter. Then
choose ARP and ICMP and click in the workspace to close the Edit Filters window.
25
c. Select a Simple PDU by clicking the closed envelope in the
Common Tools Bar on the right. Move to PC0 and click to establish the
source. Move to PC1 and click to establish the destination.
Notice that two envelopes are now positioned beside PC0. This is referred
to as a data traffic scenario. One envelope is an ICMP packet, while the
other is an ARP packet. The Event List in the Simulation Panel will identify
exactly which envelope represents ICMP and which represents an ARP.
A scenario may be deleted by clicking on the Delete button in the Scenario panel. Multiple
scenarios can be created by clicking on the New button in the Scenario panel. The scenarios
can then be toggled between without deleting.
Select Auto Capture / Play from the Simulation Panel Play Controls.
Below the Auto Capture / Play button is a horizontal bar, with a vertical button that
controls the speed of the simulation. Dragging the button to the right will speed up the
simulation, while dragging is to the left will slow down the simulation.
Notice that the ARP envelope is no longer present. This has reset the simulation but has
not cleared any configuration changes or MAC / ARP table entries.
Notice that the ICMP envelope moved forward one device and stopped. The Capture /
Forward button will allow you to move the simulation one step at a time.
f. Choose the Power Cycle Devices button on the bottom left, above the device icons.
g. Choose Yes
Notice that both the ICMP and ARP envelopes are now present. The Power
Cycle Devices will clear any configuration changes not saved and clear
the MAC / ARP tables.
a. Choose the Auto Capture / Play button and allow the simulation to run
completely.
27
b. Click on PC-0 and select the Desktop tab.
c. Select the Command Prompt and type the command arp -a.
d. Notice that the MAC address for PC2 is in the ARP
table (to view the MAC address of PC2, click on PC2 and select the
Config tab).
e. To examine the ARP tables for PC1 and PC2in another way, click on the Inspect Tool.
Then click on PC1 and the ARP table will appear in a new window.
Note that PC2 does not have an entry in the ARP table yet. Close the ARP
Table window. f.Click on PC2 to view the ARP table. Then close the
The Physical mode is used to add modules to a device, such as a WAN Interface Card
(WIC).
The Config mode is used for basic configuration. Commands are entered in a simple GUI
format, with actual equivalent IOS commands shown in the lower part of the window. The
CLI mode allows for advanced configuration of the device. This mode requires the user to
enter the actual IOS commands just as they would on a live device.
e) In the Physical mode, click on the router power switch to turn the device off.
f) Select the WIC-2T module and drag it to Slot 0 on the router. Then drag a WIC
Cover to Slot1.
h) Click on the Network Component Box and select Connections. Then select a
Copper Straight-through connection to connect the router to the hub.
NOTE: The Smart Connection can be used to automatically select the appropriate cable
type. However, the user will have no choice as to which interface the connection is
assigned to; it will take the first available appropriate interface.
i) Click on the hub and choose Port 3. Then click on the router and
choose interface FastEthernet 0/0.
30
key. Note the equivalent IOS command
is entered in the lower portion of the
window.
d) Click on interface FastEthernet 0/0 and assign the IP address 192.168.1.1, then press the
TAB key. Enter the subnet mask 255.255.255.0.
e) Click the Port Status to On to enable the port (no shutdown).
Task 5: Create a copy of the existing router complete with WIC modules already in
place
a) Make sure that the existing router is selected (it will be grayed out).
b) In the Main Tool Bar click on the Copy tool.
c) Click on the Paste tool and the copied device will appear in the work area.
f) Click on the CISCO_1 router and connect to the Serial 0/0/0 interface.
g) Click on the new router (copy CISCO_1) and connect to the Serial 0/0/0 interface.
b) Select a Simple PDUand click on PC-A as the source, then click on Cisco_2 as
the destination. The ping should be successful.
4. Explain why router have different type interfaces such as “Ethernet &
Serial”
__________________________________________________________
__________________________________________________________
Lab 5 :Packet Tracer
Working with the Application Layer: DHCP, DNS,
and HTTP
Part A: Pre-lab
Objective: Setup DNS, HTTP and DHCP server in Cisco Packet tracer
Introduction:
When you deploy Dynamic Host Configuration Protocol (DHCP) servers on your network, you can
automatically provide client computers and other TCP/IP-based network devices with valid IP
addresses. You can also provide the additional configuration parameters these clients and devices
need, called DHCP options, that allow them to connect to other network resources, such as DNS
servers, and routers.
Domain Name System (DNS) is the name resolution protocol for TCP/IP networks, such as the
Internet. Client computers query a DNS server to resolve memorable, alphanumeric DNS names to
the IP addresses that computers use to communicate with each other.
Short for Hyper Text Transfer Protocol, the underlying protocol used by the World Wide Web.
HTTP defines how messages are formatted and transmitted, and what actions Web servers and
browsers should take in response to various commands. For example, when you enter a URL in
your browser, this actually sends an HTTP command to the Web server directing it to fetch and
transmit the requested Web page.
34
Part B: Procedure:
Instructions:
35
DHCP:
Set the Service to Off
DNS:
Entering the www.tsrb.edu Domain Name
o Enter for the Domain Name www.tsrb.edu
o Enter for IP Address 172.16.0.20
o Click Add
Entering the www.internal.com Domain Name
o Enter for the Domain Name www.internal.com
o Enter for IP Address 172.16.0.30
o Click Add
4. Configuring the www.tsrb.edu Web Server
Add a
server.
Global
Settings:
Change the Display Name to “Web Server: www.tsrb.edu”
Set the Gateway to 172.16.0.1
FastEthernet:
Set the IP address to 172.16.0.20
Set the Subnet Mask to 255.255.0.0
DHCP:
Set the Service to Off
DNS:
Set the Service to Off
HTTP
Change the sentence, “<hr>Welcome to Packet Tracer 5.0, the best thing since.....
Packet Tracer 4.0.” to “<hr> Welcome to Tsrb's public web page!” You may add other
information as well.
5. Configuring the www.internal.com Web Server
Add a
server.
Global
Settings:
Change the Display Name to “Web Server: www.internal.com”
Set the Gateway to 172.16.0.1
FastEthernet:
Set the IP address to 172.16.0.30
Set the Subnet Mask to 255.255.0.0
DHCP:
Set the Service to Off
DNS:
Set the Service to Off
HTTP
Change the sentence, “<hr>Welcome to Packet Tracer 5.0, the best thing since.....
Packet Tracer 4.0.” to “<hr> This is the corporate internal network!” You may add other
information as well.
6. Configure Two Client Computers using DHCP
Add two client computers.
Global Settings:
Change the Display Names to “Dynamic 1” and to “Dynamic 2” respectively
36
Set the Gateway/DNS to DHCP
FastEthernet:
Set the IP Configuration to DHCP
9. Verify connectivity
Ping (ICMP)
o From a client computer use the Desktop Command prompt to ping the other client
computers and the servers.
o Example: From the Dynamic 1 client, C> ping 172.16.0.20
o The first one or two pings may fail, but you should receive a reply on the later pings.
This is due to the ping timing out while the ARP process takes place (later).
Web Browser (HTTP)
o On the client computers use the Desktop Web Browser, enter the URLs of the Web
Servers www.tsrb.edu and www.internal.com.
o You should see the web pages that you created on these servers.
38
Lab 6: Basic Switch Configuration
Part A: Pre-lab
Introduction
Addressing Table
Learning Objectives
Upon completion of this lab, you will be able to:
Cable a network according to the topology diagram
Clear an existing configuration on a switch
Examine and verify the default configuration
Create a basic switch configuration, including a name and an IP address
Configure passwords to ensure that access to the CLI is secured
Configure switch port speed and duplex properties for an interface
Configure basic switch port security
Manage the MAC address table
Assign static MAC addresses
Add and move hosts on a switch
39
1. How many types of modes are used in data transferring through networks?
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
2. How a Switch is different from a Hub?
Part B: Procedure:
Scenario
In this lab, you will examine and configure a standalone LAN switch. Although a switch
performs basic functions in its default out-of-the-box condition, there are a number of
parameters that a network administrator should modify to ensure a secure and optimized LAN.
This lab introduces you to the basics of switch configuration.
40
mode, as well as the configure command through which access to the remaining
command modes are gained. Enter privileged EXEC mode by entering the enable
command.
Switch>enable Switch#
Notice that the prompt changed in the configuration to reflect privileged EXEC mode.
Step 2: Examine the current switch configuration.
Examine the current running configuration file.
Switch#show running-config
How many Fast Ethernet interfaces does the switch have?
What is the range of
values shown for the vty lines? Examine the current contents
Switch#show startup-config
startup-config is not present
Why does the switch give this response?
Examine the characteristics of the virtual interface VLAN1:
Switch#show interface vlan
Is there an IP address set on the switch?
What is the MAC address of this virtual switch interface?
Is this interface up?
Now view the IP properties of the interface:
Switch#dir flash:c2960-lanbase-mz.122-25.SEE3
Switch#configure terminal
Enter configuration commands, one per line. End
with CNTL/Z.
Switch(config)#hostname S1
S1(config)#exit S1#
To save the contents of the running configuration file to non-volatile RAM (NVRAM),
issue the the command copy running-config startup-config.
Switch#copy running-config startup-config
Destination filename [startup-config]? (enter) Building configuration...
[OK]
Note: This command is easier to enter by using the copy run start
abbreviation. Now display the contents of NVRAM using the show
startup-config command.
S1#show startup-config
Using 1170 out of 65536 bytes
!
version 12.2 no service pad
service timestamps
debug uptime service
timestamps log uptime
no service password-
encryption
!
hostname S1
!
<output omitted>
The current configuration has been written to NVRAM.
PC2:
Step 2: Determine the MAC addresses that the switch has learned.
Display the MAC addresses using the show mac-address-table command in privileged EXEC mode.
S1#show mac-address-table
How many dynamic addresses are there?
How many MAC addresses are there in total?
Do the dynamic MAC addresses match the host MAC addresses?
Step 3: List the show mac-address-table options.
S1#show mac-address-table ?
How many options are available for the show mac-address-table
command?
Show only the MAC addresses from the table that were learned
dynamically.
S1#show mac-address-table address <PC1 MAC here>
How many dynamic addresses are there?
Step 4: Clear the MAC address table.
To remove the existing MAC addresses, use the clear mac-address-table command from
privileged EXEC mode.
S1#clear mac-address-table dynamic
Step 5: Verify the results.
Verify that the MAC address table was cleared.
S1#show mac-address-table
If S1 has not yet relearned the MAC address for PC1, ping the VLAN 99 IP address of the
switch from PC1 and then repeat Step 6.
Step 7: Set up a static MAC address.
To specify which ports a host can connect to, one option is to create a static mapping of the
host MAC address to a port.
Set up a static MAC address on Fast Ethernet interface 0/18 using the address that was
recorded for PC1 in Step 1 of this task. The MAC address 00e0.2917.1884 is used as an
example only. You must use the MAC address of your PC1, which is different than the one
given here as an example.
S1(config)#mac-address-table static 00e0.2917.1884 interface
fastethernet 0/18 vlan 99
Step 8: Verify the results.
Verify the MAC address table entries.
S1#show mac-address-table
How many total MAC addresses are there?
How many static addresses are there?
Step 10: Remove the static MAC entry.
To complete the next task, it will be necessary to remove the static MAC address table entry.
Enter configuration mode and remove the command by putting a no in front of the command
string.
Note: The MAC address 00e0.2917.1884 is used in the example only. Use the MAC
address for your PC1.
S1(config)#no mac-address-table static 00e0.2917.1884 interface
fastethernet 0/18 vlan 99
Step 10: Verify the results.
Verify that the static MAC address has been cleared.
S1#show mac-address-table
How many total static MAC addresses are there?
Task 5 Configuring Port Security
Step 1: Configure a second host.
A second host is needed for this task. Set the IP address of PC2 to 172.17.99.32, with a subnet mask of
255.255.255.0 and a default gateway of 172.17.99.11. Do not connect this PC to the switch yet.
PC1
PC2
Step 4: Determine which MAC addresses that the switch has learned.
46
Display the learned MAC addresses using the show mac-address-table command in
privileged EXEC mode.
S1#show mac-address-table
How many dynamic addresses are there?
Do the MAC addresses match
the host MAC addresses?
Are there statements listed that directly reflect the security implementation of the running configuration?
Step 9: Modify the port security settings on a port.
On interface Fast Ethernet 0/18, change the port security maximum MAC address count to 1
and to shut down if a violation occurs.
S1(config-if)#switchport port-security maximum 1
S1(config-if)#switchport port-security violation shutdown
Assignment
Part A: Pre-lab 49
Objective: Learn how to configure and manage VLAN for the Cisco Switch.
Introduction
Addressing Table
Device
Default Gateway Subnet Mask IP Address Interface
(Hostnam
e)
N/A 255.255.255.0 172.17.99.11 VLAN 99 S1
N/A 255.255.255.0 172.17.99.12 VLAN 99 S2
N/A 255.255.255.0 172.17.99.13 VLAN 99 S3
172.17.10.1 255.255.255.0 172.17.10.21 NIC PC1
172.17.20.1 255.255.255.0 172.17.20.22 NIC PC2
172.17.30.1 255.255.255.0 172.17.30.23 NIC PC3
172.17.10.1 255.255.255.0 172.17.10.24 NIC PC4
172.17.20.1 255.255.255.0 172.17.20.25 NIC PC5
172.17.30.1 255.255.255.0 172.17.30.26 NIC PC6
1. What Is vlan?
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
2. What Is Difference Between Vlan Access And Trunk Mode?
-------------------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------------
Part B: Procedure:
Step 2: Clear any existing configurations on the switches, and initialize all ports in the
shutdown state.
If necessary, refer to Lab 2.5.1, Appendix 1, for the procedure to clear switch configurations.
It is a good practice to disable any unused ports on the switches by putting them in shutdown.
Disable all ports on the switches:
Switch#config term
switch(config)#interface range fa0/1-24
Switch(config-if-range)#shutdown
Switch(config-if-range)#interface range gi0/1-2
Switch(config-if-range)#shutdown
51
Task 2: Perform Basic Switch Configurations
Step 1: Configure the switches according to the following guidelines.
Configure the switch hostname.
Disable DNS lookup.
Configure an EXEC mode password of class.
Configure a password of cisco for console connections.
Configure a password of cisco for vty connections.
Note: The show vlan name vlan-name displays the same output.
You can also view VLAN assignment information using the show interfaces interface switchport
command.
Step 6: Assign the management VLAN.
A management VLAN is any VLAN that you configure to access the management capabilities
of a switch. VLAN 1 serves as the management VLAN if you did not specifically define another
VLAN. You assign the management VLAN an IP address and subnet mask. A switch can be
managed via HTTP, Telnet, SSH, or SNMP. Because the out-of-the-box configuration of a
Cisco switch has VLAN 1 as the default VLAN, VLAN 1 is a bad choice as the management
VLAN. You do not want an arbitrary user who is connecting to a switch to default to the
management VLAN. Recall that you configured the management VLAN as VLAN 99 earlier in
this lab.
From interface configuration mode, use the ip address command to assign the management
IP address to the switches.
53
S1(config)#interface vlan 99
S1(config-if)#ip address 255.255.255
172.17.99.11 .0
S1(config-if)#no shutdown
S2(config)#interface vlan 99
S2(config-if)#ip address 255.255.255
172.17.99.12 .0
S2(config-if)#no shutdown
S3(config)#interface vlan 99
S3(config-if)#ip address 255.255.255
172.17.99.13 .0
S3(config-if)#no shutdown
Assigning a management address allows IP communication between the switches, and
also allows any host connected to a port assigned to VLAN 99 to connect to the switches.
Because VLAN 99 is configured as the management VLAN, any ports assigned to this
VLAN are considered management ports and should be secured to control which devices
can connect to these ports.
Step 7: Configure trunking and the native VLAN for the trunking ports on all switches.
Trunks are connections between the switches that allow the switches to exchange
information for all VLANS. By default, a trunk port belongs to all VLANs, as opposed to an
access port, which can only belong to a single VLAN. If the switch supports both ISL and
802.1Q VLAN encapsulation, the trunks must specify which method is being used.
Because the 2960 switch only supports 802.1Q trunking, it is not specified in this lab.
A native VLAN is assigned to an 802.1Q trunk port. In the topology, the native VLAN is VLAN
99. An 802.1Q trunk port supports traffic coming from many VLANs (tagged traffic) as well as
traffic that does not come from a VLAN (untagged traffic). The 802.1Q trunk port places
untagged traffic on the native VLAN. Untagged traffic is generated by a computer attached to
a switch port that is configured with the native VLAN. One of the IEEE 802.1Q specifications for
Native VLANs is to maintain backward compatibility with untagged traffic common to legacy
LAN scenarios. For the purposes of this lab, a native VLAN serves as a common identifier on
opposing ends of a trunk link. It is a best practice to use a VLAN other than VLAN 1 as the
native VLAN.
Use the interface range command in global configuration mode to simplify configuring trunking.
S1(config)#interface range fa0/1-5
S1(config-if-range)#switchport mode trunk
S1(config-if-range)#switchport trunk vla 9
native n 9
S1(config-if-range)#no shutdown
S1(config-if-range)#end
S2(config)# interface range fa0/1-5
S2(config-if-range)#switchport mode trunk
S2(config-if-range)#switchport trunk vla 9
native n 9
S2(config-if-range)#no shutdown
S2(config-if-range)#end
S3(config)# interface range fa0/1-5
S3(config-if-range)#switchport mode trunk
S3(config-if-range)#switchport trunk vla 9
native n 9
S3(config-if-range)#no shutdown
S3(config-if-range)#end
Verify that the trunks have been configured with the show interface trunk command.
S1#show interface trunk
Assignment
1. Configure Packet Tracer Terminal to establish a console session with a Cisco IOS
Router/Switch.
2. Configure Cisco router global configuration settings.
3. Configure Cisco router password access.
4. Configure Cisco router interfaces.
5. Save the router configuration file.
Introduction:
Part B: Procedure:
58
Task 1:
Device Interface IP Address Subnet Mask Def. Gateway
Fa0/0 192.168.1.1 255.255.255.0 N/A
R1
S0/0/0 192.168.2.1 255.255.255.0 N/A
Fa0/0 192.168.3.1 255.255.255.0 N/A
R2
S0/0/0 192.168.2.2 255.255.255.0 N/A
PC1 N/A 192.168.1.10 255.255.255.0 192.168.1.1
PC2 N/A 192.168.3.10 255.255.255.0 192.168.3.1
Cable the Network
Cable a network that is similar to the one in the Topology Diagram. The output used in this lab is
from 1841 routers. You can use any current router in your lab as long as it has the required
interfaces as shown in the topology. Be sure to use the appropriate type of Ethernet cable to
connect from host to switch, switch to router, and host to router. Be sure to connect the serial DCE
cable to router R1 and the serial DTE cable to router R2.
Answer the following questions:
What type of cable is used to connect the Ethernet interface on a host PC to the
Ethernet interface on a switch? ________________________
What type of cable is used to connect the Ethernet interface on a switch to the Ethernet interface
on a router? __________________________
What type of cable is used to connect the Ethernet interface on a router to the Ethernet interface
on a host PC? _________________________
Task 2: Perform Basic Configuration of Router R1.
Step 1: Establish a HyperTerminal session to router R1. Step 2: Enter privileged EXEC
mode.
Router>enable Router#
Step 3: Enter global configuration mode.
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
_______________________________________________________________________________
What would happen if you disabled DNS lookup in a production environment?
_______________________________________________________________________________
Step 6: Configure the EXEC mode password.
Configure the EXEC mode password using the enable secret password
command. Use class for the password.
R1(config)#enable secret class
R1(config)#
Why is it not necessary to use the enable password password
command?
_____________________________________________________________
the questions above, troubleshoot the configurations to find the error using the
If your answer to all three steps is yes, then you should be able to successfully
ping from R2 to R1 and from R2 to R3.
Assignment
Step 1: Attempt to ping from the host connected to R1 to the host connected to R2.
______________________________________________________________________
Task 1:What is missing from the network that is preventing communication between these
devices?
_______________________________________________________________________________
_______________________________________________________________________________
Task 2: Documentation
On each router, capture the following command output to a text (.txt) file and save for future
reference.
show running-config
63
show ip route
show ip interface brief
Appendix
64
Lab.9: Configuring Static Routes
Part A: Pre-lab
Objective:
Part 1: Set Up the Topology and Initialize Devices
Part 2: Configure Basic Device Settings and Verify Connectivity
Part 3: Configure Static Routes
Configure a recursive static route.
Configure a directly connected static route.
Configure and remove static routes.
Part 4: Configure and Verify a Default Route
Introduction
Setup a network similar to the one in the diagram. Any router that meets the interface
requirements may be used. Possible routers include 800, 1600, 1700, 2500, 2600 and 2900
routers, or a combination. Refer to the chart at the end of the lab to correctly identify the interface
identifiers to be used based on the equipment in the lab. The configuration output used in this lab
is produced from 2900 series routers.
Any other router used may produce slightly different output. The following steps are intended to be
executed on each router unless specifically instructed otherwise.
Start a HyperTerminal session as performed in the Establishing a HyperTerminal session lab.
Note: Go to the erase and reload instructions at the end of this lab. Perform those steps on all
routers in this lab assignment before continuing.
65
Pre Lab Question
Read thoroughly and prepare the experiment sheet.
You should try using Packet Tracer at home before the lab session.
You must bring a printed copy of this experiment with you to the lab.
1. What Is Routing?
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
2. What Is the difference between Static and Dynamic routing?
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
3. What Is ARP?
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
Part B: Procedure:
Note: In these exercises we will ignore password settings and simply proceed with the interface
configuration
a. Enter the global configuration mode and configure the hostname as shown in the chart.
b. Configure interfaces and IP host tables.
Router1
Sub- Task 1: Setting Hostname
In this exercise you will set the hostname for the router. This changes the router prompt. The
default hostname is router.
Step 1: Enter the privileged mode and then the global configuration mode.
Router>enable or en Router#configure
terminal or conf t
66
This changes the prompt to “GAD#”.
Step 3: Set the IP address and the mask for the serial interface. Type in the following command:
GAD(config-if)#ip address 192.168.15.1 255.255.255.0
Assigning IP address and mask to the serial interface of router 1.
Step 4: Set the clock rate for Serial interface. Type in the following command:
GAD(config-if)#clock rate 56000
This command sets the clock rate for a router with a DCE cable to 56K
Important: You configure the clock rate command ONLY on the DCE interface of the router, and ONLY if
you have no other device (CSU/DSU) providing the clocking.
Clock Rate: The clock rate is just a physical setting for the serial port to be able to handle different type of
load and has nothing to do with actually setting up the speed. This command simply sets the Serial interface
clock rate in BPS (bits per second). It is only applicable on a serial interface.
Step 6: Exit the router serial configuration mode. Type in the following command:
GAD(config-if)#exit
Step 7: Enter the router Ethernet interface configuration mode. Type in the following command:
GAD(config)#interface fast 0/0
This mode is entered by already being in global configuration mode (see the diagram above) and then entering
interface mode for fast Ethernet.
Step 8: Set the IP address and the mask for the Ethernet interface. Type in the following
command:
GAD(config-if)#ip address 192.168.14.1 255.255.255.0
Assigning IP address and mask to the fast Ethernet interface of GAD.
Step 10: Exit the router Ethernet configuration mode. Type in the following command:
GAD(config-if)#exit
This changes the prompt to ‘GAD(config#)’
67
Step 11: Configure the interfaces, and hostname on the Router 2
On the Router2, enter the global configuration mode and configure the hostname as shown in the chart.
Finally, configure the interfaces on each router.
Router>enable Router#config
t Router2(config)#host BHM
BHM(config)#interface serial 0/0
BHM(config-if)#ip address 192.168.15.2 255.255.255.0
BHM(config-if)#exit
BHM(config)#interface fast 0/0
BHM(config-if)#ip address 192.168.16.1 255.255.255.0
BHM(config-if)#exit
Task 2: Configure the workstations
Configure the workstations with the proper IP address, subnet mask, and default gateway.
a. The configuration for the host connected to the GAD Router is:
IP Address 192.168.14.2
IP subnet mask 255.255.255.0
Default gateway 192.168.14.1
b. The configuration for the host connected to the BHM Router is:
IP Address 192.168.16.2
IP subnet mask 255.255.255.0
Default gateway 192.168.16.1
Task 3: Testing Connectivity/configuring Static Routes
From the workstation attached to the GAD router, ping the workstation attached to the BHM router.
C:\>ping 192.168.16.2
Pinging 192.168.16.2 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 192.168.16.2:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
Approximate round trip times in milli-seconds: Minimum
= 0ms, Maximum = 0ms, Average = 0ms
Q1.Was the ping successful?
Q2.Why did the ping fail?
Q3. Check the interfaces on both routers with the command show ip interface brief. Q4.
Are all the necessary interfaces up?
a. Using the command show ip route, view the IP routing table for GAD.
GAD#show ip route
68
output eliminated
Gateway of last resort is not set
C 192.168.14.0/24 is directly connected, FastEthernet0 C
192.168.15.0/24 is directly connected, Serial0
b. Use the command show ip route, view the IP routing table for BHM.
BHM#show ip route
1. How can this situation be changed so that the hosts can ping each other?
Add static routes to each router or run a routing protocol.
2. In global configuration mode, add a static route on GAD (Router1) to network
192.168.16.0 and on BHM (Router2) to network 192.168.14.0.
GAD#show ip route
output eliminated
Gateway of last resort is not set
C 192.168.14.0/24 is directly connected, FastEthernet0 C
192.168.15.0/24 is directly connected, Serial0
S 192.168.16.0/24 [1/0] via 192.168.15.2
b. Using the command show ip route, view the IP routing table for BHM.
BHM>show ip route
Output eliminated.
Gateway of last resort is not set
S 192.168.14.0/24 [1/0] via 192.168.15.1
C 192.168.15.0/24 is directly connected, Serial0
C 192.168.16.0/24 is directly connected, FastEthernet0
Q5. Can a host on subnet 192.168.16.0 see a host on network 192.168.14.0?
a. Check connectivity between the workstations using ping. From the workstation attached to the GAD
router, ping the workstation attached to the BHM router.
C:\>ping 192.168.16.2
Pinging 192.168.16.2 with 32 bytes of data:
Reply from 192.168.16.2: bytes=32 time=20ms TTL=254
Reply from 192.168.16.2: bytes=32 time=20ms TTL=254
Reply from 192.168.16.2: bytes=32 time=20ms TTL=254
69
Reply from 192.168.16.2: bytes=32 time=20ms TTL=254
Ping statistics for 192.168.16.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate
round trip times in milli-seconds:
Minimum = 20ms, Maximum = 20ms, Average = 20ms
b. If the ping was not successful, check routing table to make sure static routes are entered correctly.
Upon completion of the previous steps, logoff by typing exit. Turn the router off.
Assignment:
In this activity, the basic device configuration is done; all router interfaces and PC’s
are configured with the address delivered in the below addressing table, you should
use static routes to ensure the full connectivity between all devices in the network.
Use the following instructions:
1. Configure Router 1&Router2 static routes use exit interface.
2. Configure Router 0 static routes use next hop ip address.
3. Configure ISP static routes use next hop ip address; note that this route should be
summarized.
. Configure Router 1 last resort as serial 2/0 and router 0 as 60.0.0.2.
70
Lab .10: Configuring Dynamic Routes
Part A: Pre-lab
RIP
Introduction:
Routing Information Protocol (RIP) is a dynamic routing protocol which uses hop count as a
routing metric to find the best path between the source and the destination network. It is a distance
vector routing protocol which has Administrative distance (AD) value 120 and works on the
application layer of OSI model. RIP uses port number 520.
Hop Count:
Hop count is the number of routers occurring in between the source and destination network. The
path with the lowest hop count is considered as the best route to reach a network and therefore
placed in the routing table. RIP prevents routing loops by limiting the number of hopes allowed in a
path from source and destination. The maximum hop count allowed for RIP is 15 and hop count of
16 is considered as network unreachable.
2. What is the difference between RIP and Distance vetor routing protocol?
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
Part B: Procedure:
1. Develop a Topology shown in figure given below.
3. Configure all Routers
4. Implement RIP protocols in Router to configure Network.
71
Router0 configuration.....
started! Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname router0
router0(config)#int lo0
72
%SYS‐5‐CONFIG_I: Configured from console by console router0#wr
Building configuration...
[OK]
router0#
router0#
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
router0>
router0>en
router0#con
fig t
Enter configuration commands, one per line. End with CNTL/Z.
router0(config)#router rip
router0(config‐router)#net 10.0.0.0
router0(config‐router)# router0(config‐
router)#end
%SYS‐5‐CONFIG_I: Configured from console by
console router0#show ip route
Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐ mobile, B ‐
BGP D ‐ EIGRP, EX ‐ EIGRP external, O ‐ OSPF, IA ‐ OSPF inter
area
N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA external type
2 E1 ‐ OSPF external type 1, E2 ‐ OSPF external type 2, E ‐ EGP
i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area
* ‐ candidate default, U ‐ per‐user static route, o ‐
ODR P ‐ periodic downloaded static route
Router1 Configuration.....
Router>enable Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int lo0
%LINK‐5‐CHANGED: Interface Loopback0, changed state to up
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state to up
Router(config‐if)#ip address 10.1.2.1 255.255.255.0
Router(config‐if)#no
shut Router(config‐
if)#int f0/1 73
Router(config‐if)#ip address 10.1.23.1
255.255.255.0 Router(config‐if)#no shut
Router>
Router>en
Router#con t
Router2 Configuration.....
74
started! Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int lo0
Router#wr
Building configuration...
[OK]
Router# Router# Router#
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
Router>
Router>
Router>en
Router#show ip route
Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐ mobile, B ‐
BGP D ‐ EIGRP, EX ‐ EIGRP external, O ‐ OSPF, IA ‐ OSPF inter
area
N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA external type
2 E1 ‐ OSPF external type 1, E2 ‐ OSPF external type 2, E ‐ EGP
i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area
* ‐ candidate default, U ‐ per‐user static route, o ‐
ODR P ‐ periodic downloaded static route
75
connected, FastEthernet0/1 Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router rip
Router(config‐router)#net 10.0.0.0
Router(config‐router)#end
%SYS‐5‐CONFIG_I: Configured from console by
console Router#
Router# Router#show ip route
Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐ mobile, B ‐
BGP D ‐ EIGRP, EX ‐ EIGRP external, O ‐ OSPF, IA ‐ OSPF inter
area
N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA external type
2 E1 ‐ OSPF external type 1, E2 ‐ OSPF external type 2, E ‐ EGP
i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area
* ‐ candidate default, U ‐ per‐user static route, o ‐ ODR P ‐ periodic downloaded static route
Router3 Configuration.......
Continue with configuration dialog? [yes/no]: no
started! Router>
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int lo0
Router(config‐router)#end
%SYS‐5‐CONFIG_I: Configured from console by console Router#show ip route
Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐ mobile, B ‐
BGP D ‐ EIGRP, EX ‐ EIGRP external, O ‐ OSPF, IA ‐ OSPF inter
area
N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA external type
2 E1 ‐ OSPF external type 1, E2 ‐ OSPF external type 2, E ‐ EGP
i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area
* ‐ candidate default, U ‐ per‐user static route, o ‐
ODR P ‐ periodic downloaded static route