2 - LA1 - Task1 (1) - Merged
2 - LA1 - Task1 (1) - Merged
Task 1
A. Design the following network structure in Cisco packet tracer. Use the IP addresses given
in the diagram.
You may refer to the following tutorial for demo (reference only):
https://www.youtube.com/watch?v=rZw_b0wpQ00
B. Design the following email configuration network structure in Cisco packet tracer.
P.T.O
Submission should include the following:
1. The steps followed for configuring the Server (compact writing). Set the email domain as
vit.ac.in.
2. Screenshots of the following:
• a user named Alice on one PC sends an email to Bob in the other PC.
• Bob reading the email, sent to him by Alice.
• The final network setup.
NOTES:
Connection between routers: Use serial Port, Serial DTE cable
Use Copper Straight-Through cable for Connection between switch and router, switch and
terminals
Use Copper crossover cable for Connection between router and server
Packet
Hop
Ping command
Email server
P.T.O
Packet Tracer – Creating a Cyber World
Addressing Table
Objectives
Part 1: Configure the FTP Server
Part 2: Configure the Web Server
Part 3: Configure the Email Server
Part 4: Configure the DNS Server
Part 5: Configure the NTP Server
Part 6: Configure the AAA Server
Background / Scenario
In this activity, you will configure basic server components. The IP addressing configuration is already
complete. You will use the Services tab on multiple servers to deploy FTP, Web, Email, DNS, NTP, and AAA
services.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Creating a Cyber World
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Creating a Cyber World
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Creating a Cyber World
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
21BCE3759
LA-1 TASK-1&2
COURSE-ISAA LAB
TASK-1
PC configuration
1) From End devices Choose pc drag and drop it.
2) Goto to IP configuration, then put the IPv4 address as 192.168.1.2 and
afte that put the default gateway as 192.168.1.1 (Switch IP)
PC to Switch connection.
1) Connect PC to switch with via copper straight through wire in Fast
ethernet port in order.
Switch to Router
1) Connect Switch to Router via Copper straight through wire in Fast
ethernet port in order.
Router to Router
1) Connect Router to another Router via Serial DTE in the Serial Port.
Router Interface Configuration
1) Put the IP address of Switch in Fast ethernet 0.
Router Routing Configuration
1) Type the network IP address that it wants to communicate.
2) Type Mask 255.255.255.0
3) Type the IP address of Next router in Next Hop.
PC configuration
3) From End devices Choose pc drag and drop it.
4) Goto to IP configuration, then put the IPv4 address as 192.168.1.2 and
afte that put the default gateway as 192.168.1.1 (Switch IP)
PC to Switch connection.
2) Connect PC to switch with via copper straight through wire in Fast
ethernet port in order.
Switch to Router
2) Connect Switch to Router via Copper straight through wire in Fast
ethernet port in order.
Router Interface Configuration
1) Put the IP address of Switch in Fast ethernet 0.
2) Put the IP address of Server in Fast ethernet 1.
Server Configuration
1) Put the IP address of the Server and default gateway (the path in which
packet will travel.
2) In Services of the Server go to email and write the domain name as
vit.ac.in and then setup the User with username and password.
Why does the Email service require both SMTP and POP3 to be
activated?
Ans: Because SMTP handles the delivery while POP3 takes cares of
email retrieval.
Part-5 Configure the NTP Server
d. On the left, click the 2nd FTP packet available to select it. Then scroll down
to the bottom of the window
displayed on the right. Do this again for the 3rd FTP packet.
Result:
TASK 3
Part 1: Download the Client Files to Mike’s PC
Step 1: Access the FTP server from Mike’s PC.
a. Click the Gotham Healthcare Branch site and then click the PC Mike.
b. Click the Desktop tab and then click Web Browser.
c. Enter the URL http://www.cisco.corp and click Go.
d. Click the link to download the most current files.
What protocol was used to access this webpage on the backup file server?
http protocol was used to access this webpage on the backup file
server.
This page contains hashes for the most recent files placed on the FTP server.
FileName | NWclients.txt | Hash| dd88482282785192d4a4ad4f8e32b3b6
FileName | SWclients.txt | Hash| c202036c9210959e7b587b08f080c378
FileName | NEclients.txt | Hash| 6c8fb699ac2ced0b5c9ea40aab9f8caf
FileName | SEclients.txt | Hash| 48d7eceee217e83cd685b537a3066b2f
FileName | Sclients.txt | Hash| abad7f7606e324f252bfebd6c09810e2
FileName | Nclients.txt | Hash| 65f586602d9476b7b561b5d98b2ea23b
FileName | income.txt | Hash|
1b319bc7ba0adc63f2af2cafdc59f5279d46dd33
g. After downloading all the files, enter the command quit at the ftp> prompt.
h. At the PC> prompt, enter the command dir and verify the client files are now on Mike’s PC.
SEclients.txt
1b319bc7ba0adc63f2af2cafdc59f5279d46dd33
How is using HMAC more secure than general hashing?
Using HMAC is more secure than general hashing because it
involves a secret key, provides resistance against collision attacks,
and allows for message integrity verification.