CN Complete File
CN Complete File
To nurture young minds in a learning environment of high academic value and imbibe spiritual
and ethical values with technological and management competence.
Diversification
The Engineering, Technology and Management disciplines have diverse fields of studies with
different attributes. The aim is to create a synergy of the above attributes by encouraging
analytical thinking.
Entrepreneurship
The Institute strives to develop potential Engineers and Managers by enhancing their skills and
research capabilities so that they become successful entrepreneurs and responsible citizens.
MAHARAJA AGRASEN INSTITUTE OF TECHNOLOGY
PEO1 Our graduates will succeed in their career pursuits by applying their technical
skills for higher degrees.
PEO2 Our graduates will be able to devise innovative solutions for real-world problems
by applying Information Technology principles.
PEO3 Our graduates will exhibit high standards of professionalism, demonstrate strong
interpersonal and collaborative abilities with adherence to professional ethics.
PEO4 Our graduates will be able to use research opportunities, and thrive as successful
entrepreneurs.
MAHARAJA AGRASEN INSTITUTE OF TECHNOLOGY
Course Outcomes (CO) to Programme Specific Outcomes (PSO) mapping (scale 1: low, 2: Medium, 3:
High)
Tracer
Theory:
EXPERIMENT – 2
Aim: To understand the operation of TELNET by accessing the router in server room from a
PC in IT office.
Requirements
– 2 Nos
– 1 No
– 1 Nos
-5 LAN cable
Procedure
ROUTER CLI:
Router#config
Configuring from terminal, memory, or network [terminal]?
Router(config)#line vty 0 4
Router(config-line)#password sai123
Router(config-line)#login local
Router(config-line)#exit
Router(config)#username sai privilege 4 password sai123
Router(config)#exit
OUTPUT:
PINGING FROM PC0 TO SERVER USING TELENET:
C:\>ping 192.168.0.1
Pinging 192.168.0.1 with 32 bytes of data:
Reply from 192.168.0.1: bytes=32 time=1ms TTL=255
Reply from 192.168.0.1: bytes=32 time<1ms TTL=255
Reply from 192.168.0.1: bytes=32 time<1ms TTL=255
Reply from 192.168.0.1: bytes=32 time<1ms TTL=255
Ping statistics for 192.168.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms
C:\>telnet 192.168.0.1
Trying 192.168.0.1 ...Open
User Access Verification
Username: sai
Password: <type the password---sai123(invisible)>
Router#show ip route(now router can be accessed from pc0)
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
192.168.0.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.0.0/24 is directly connected, GigabitEthernet0/0
L 192.168.0.1/32 is directly connected, GigabitEthernet0/0
Router#
Result:
Thus, verified the operation of TELNET and accessed the router from Pcs.
VIVA QUESTIONS
Is Telnet secure?
Because it was developed before the mainstream adaptation of the internet, Telnet on its
own does not employ any form of encryption, making it outdated in terms of modern security. It
has largely been overlapped by Secure Shell (SSH) protocol, at least on the public internet, but
for instances where Telnet is still in use, there are a few methods for securing your
communications
EXPERIMENT – 3
Aim: Implementation of IP Addressing Scheme and Subnetting in Small Networks using Cisco
Packet Tracer
Theory:
Understanding IP Addressing:
IP Address Basics:
IP Addressing Scheme:
● In our scenario, we select a private IPv4 address range to build our small network:
192.168.0.0/24.
● Private IP address ranges are reserved for internal network use and are not routable on the
public internet.
Allocating IP Addresses:
● We allocate specific IP addresses to network devices like routers, switches, and PCs.
● For example, the router is assigned 192.168.0.1, and switches follow with consecutive
addresses.
Subnetting:
What is Subnetting?
● Subnetting is the process of dividing a larger IP network into smaller, more manageable
sub-networks or subnets.
● It helps optimize IP address allocation, enhances network security, and reduces broadcast
traffic.
Implementing Subnetting:
● We implement subnetting within our network by dividing our 192.168.0.0/24 range into
four smaller subnets.
● Each subnet is assigned a unique subnet mask based on its size.
Subnet Examples:
● Cisco Packet Tracer is a network simulation tool that allows us to create virtual network
environments.
● It enables us to configure routers, switches, and end-user devices, providing a practical
learning platform.
Device Configuration:
● Within Packet Tracer, we configure devices with their assigned IP addresses, subnet
masks, and default gateways.
● We ensure that each device has a unique IP address within its subnet.
Subnetting in Cisco Packet Tracer can be done using the built-in tools and commands available
in Cisco devices. Here are the basic steps of how to subnet in Cisco Packet Tracer:
interface <interface_type><interface_number>
ip address <ip_address> <subnet_mask>
Example:
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
5. Subnetting:
- To perform subnetting, you can use the ip subnet-zero command to enable subnetting on the
router (though this is not necessary in modern networks).
- You can then create additional subnets by configuring other interfaces with different IP
addresses and subnet masks.
6. Save Configuration:
- After making changes, save the router's configuration by typing end and then write memory
or simply wr.
8. Verify Configuration:
- You can verify your subnetting configuration by using commands like show ip interface brief
and show running-config.
Conclusion:
In conclusion, mastering IP addressing and subnetting is pivotal for effective network
management. Using Cisco Packet Tracer, we've demonstrated the practical implementation of
these concepts in a small network environment. This knowledge is essential for network
professionals to design and manage networks efficiently and securely.
EXPERIMENT – 4
Theory:
How to configure a simple static routing in packet tracer using a simple topology with two
routers
Steps:
Step 1:First Create a topology like this,you will get a red light first this is configured topology
In Router 1
In Router 2
Interface Fastethernet 0/0
Step 3 : Assign ip address for both Pc's with appropriate ip and subnetmask and default gateway
By default Routers Know only directed connected networks here Router 1 know only 10.0.0.0
and 20.0.0.0 it doesn't know the 30.0.0.0 like this R2 doesn't know about 10.0.0.0.So We are
going to add Static route to this both router
R1(config)#ip route Destination Network| Destination N/W Subnet Mask |Next Hop Address
In Router R1,Just give this command, In this case Destination is 30.0.0.0 and its subnet mask is
255.0.0.0 next hop address is 20.0.0.2
In Router R2
Now both routers know all networks, check by ping ip address of host
Step 5: Double click PC move to desktop then command prompt give the command ping
30.0.0.10 in PC 0 you will get reply from 30.0.0.10 like this
EXPERIMENT NO. 5
AIM : Configure DHCP Server in the Network using packet tracer software.
Theory:
STEPS :
1. Launch Packet Tracer: Open the Packet Tracer software on your computer.
2. Create the Network Topology: Set up the network topology by adding the necessary
devices such as routers, switches, and PCs. Connect them appropriately using Ethernet
cables.
3. Configure IP addresses: Assign IP addresses to each device in the network manually or
using a static IP address assignment. Add and Configure DHCP Server: Select a router or
a dedicated server device in the network where you want to configure the DHCP server.
Right-click on the device and select "Config" to enter the device's configuration mode.
4. Access Global Configuration Mode: In the device configuration mode, enter the global
configuration mode by typing the command "enable" and then "configure terminal" to
access the router's or server's global configuration settings.
5. Enable DHCP Service: Type the command "service dhcp" to enable the DHCP service
on the device.
6. Configure DHCP Pool: Define a DHCP pool by typing the command "ip dhcp pool
[pool name]" and press Enter. Replace [pool name] with a name of your choice for the
pool.
7. Set IP Address Range: Specify the range of IP addresses that the DHCP server can
assign to devices in the network. Use the command "network [network address] [subnet
mask]" to define the network address and subnet mask for the pool. For example,
"network 192.168.1.0 255.255.255.0".
8. Configure Default Gateway: Set the default gateway for the devices in the network by
using the command "default-router [gateway IP address]". Specify the IP address of the
default gateway or router that provides access to other networks.
9. Set DNS Server: Specify the DNS (Domain Name System) server address that will be
provided to the devices by using the command "dns-server [DNS server IP address]".
Enter the IP address of the DNS server that devices should use for name resolution.
10. Set Lease Duration: Define the lease duration for IP addresses assigned by the DHCP
server using the command "lease [duration]". Specify the desired duration in hours, days,
or other time units. For example, "lease 24".
11. Exit Configuration Mode: Once you have completed the DHCP server configuration,
exit the device configuration mode by typing the command "exit" until you return to the
user mode.
12. Save Configuration: Save the configuration changes by typing the command "copy
running-config startup-config" to ensure that the configuration is persistent even after
restarting the network simulation.
13. Test DHCP Configuration: Start the simulation in Packet Tracer and verify that the
DHCP server is functioning correctly by checking if the devices connected to the network
are assigned IP addresses automatically.
EXPERIMENT – 6
Aim : To implement the DNS, Email Services in the Network using Cisco Packet
Tracer.
Theory:
Steps :
1. Build the network topology:
2. Configure IP addresses on the PCs, DNS Server and the Mail Server.
Mail Server IP address: 192.168.1.2/24
PC0 IP address: 192.168.1.3/24
PC1 IP address: 192.168.1.4/24
DNS server IP address: 192.168.1.5/24
3. Now configure mail clients on the PCs and mail service on the generic server.
4. Configure the mail clients
Click on PC0. Go to its Desktop tab, and click on Email. Configure the email client by
filling in the user, server and login information. Be sure to Save.
5. Configure the email server.
6. To do this, click on the server, then click the Services tab, and pick the email server from
the menu.
7. Provide the Domain name of the server then click on Set to set it. In this example, We‘ve
used the name ‗mail.com‘.
8. Proceed and add users and provide their passwords. We have two email clients(users)
with usernames ‗client1‘ and ‗client2‘ with a common password ‗adminkim‗
9. After entering a username and password, click on Add(+) to add the user to the server.
You can optionally remove a user by clicking on Remove (-). You can change a user‘s
password by clicking on change password.
10. We set a domain name for the email server. For that reason, we should have a DNS
server that will resolve this domain name (plus other domain names if there were) to an
IP address.
AIM: To implement the dynamic routing protocols: RIP, IGRP using cisco packet
tracer.
Requirements
Windows pc – 2 Nos
CISCO Packet Tracer Software (Student Version)
8 port switch – 2 No
Router – 2 Nos
Cat-5 LAN cable
Procedure
Open the CISCO Packet tracer software
Drag and drop 5 pcs using End Device Icons on the left corner
Select 8 port switch from switch icon list in the left bottom corner
Select Routers and Give the IP address for serial ports of router and apply clock rate as
per the table.
Make the connections using Straight through Ethernet cables
Ping between PCs and observe the transfer of data packets in real and simulation mode.
Theory:
Input Details for RIP
OUTPUT:
C:\>ping 192.168.2.2
Pinging 192.168.2.2 with 32 bytes of data:
Reply from 192.168.2.2: bytes=32 time=11ms TTL=126 Reply from
192.168.2.2: bytes=32 time=12ms TTL=126
Result:
Thus, understand the concept and operation of RIP and pinged from PC in are networks
to PC to another network.
Experiment: 8
AIM : To construct multiple router networks and understand the operation of
EIGRP Protocol
Requirements
– 4 Nos
– 2 No
– 3 Nos
-5 LAN cable
Procedure
8 port switch from switch icon list in the left bottom corner
Router 0 Router 1
fa 0/0 IP Address: 192.168.10.1 fa 0/0 IP Address : 192.168.30.1
Serial 0/0/0 : 192.168.20.1 @ 6400 clock rate Serial 0/0/0 : 192.168.20.2
ROUTER0 CLI:
Router(config)#router eigrp 10
Router(config-router)#network 192.168.10.0 255.255.255.0
Router(config-router)#network 192.168.20.0 255.255.255.0
Router(config-router)#exit
ROUTER1 CLI:
Router(config)#router eigrp 10
Router(config-router)#network 192.168.20.0 255.255.255.0
%DUAL-5-NBRCHANGE: IP-EIGRP 10: Neighbor 192.168.20.1 (Serial0/1/0) is up: new
adjacency
Router(config-router)#network 192.168.30.0 255.255.255.0
Router(config-router)#exit
OUTPUT:
ROUTER0:
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 192.168.10.0/24 is directly connected, FastEthernet0/0
C 192.168.20.0/24 is directly connected, Serial0/3/0
D 192.168.30.0/24 [90/20514560] via 192.168.20.2, 00:04:51, Serial0/3/0
ROUTER1:
D 192.168.10.0/24 [90/20514560] via 192.168.20.1, 00:05:35, Serial0/1/0
C 192.168.20.0/24 is directly connected, Serial0/1/0
C 192.168.30.0/24 is directly connected, FastEthernet0/0
Result:
Thus, understand the concept and operation of EIGRP and obtained the routing table
and observe transfer data packets in real and simulation time.
VIVA QUESTIONS
AIM: To implement the Network Address Resolution (NAT) using Cisco Packet
Tracer.
Theory:
In the figure above, PCA with an IP address of 172.31.1.2 wants to reach the webserver, but
because PCA‘s address is not routable, it cannot access the webserver directly.
Instead, the NAT-enabled router translates the PC‘s private address of 172.31.1.2 to a public
address of 200.100.100.2, which is routable over the internet.
From the server‘s perspective, it sees this address as the source address. Suppose the server
wants to send data to the PC, it will use the same source address as its destination address.
When the data reaches the NAT-enabled router, the public address is then translated back to its
original private address, and the data is forwarded back to the PC.
Types of NAT
They are:
Static NAT
Static NAT creates a one-to-one mapping between private and public addresses.
Static NAT is usually configured by a network administrator, and this configuration remains
constant.
In the figure above, PCA and PCB wants to reach PCC, which is a remote network.
But because both are configured with private addresses, they can not access PCC directly.
To access PCC, a NAT-enabled router is configured with static NAT, that maps their private
addresses to public addresses using one-to-one relationship, thus allowing them to communicate
with PCC.
Therefore, static NAT is useful for a device that needs a dedicated address, such as a web server.
But, it requires an equal number of public addresses for users using them simulataneously.
Dynamic NAT
Similar to static NAT, the dynamic NAT gives a one-to-one mapping between private and public
addresses. But, the mapping is done dynamically.
Dynamic NAT makes a pool of public addresses and assigns them to private addresses on a first-
come-first-served (FCFS) basis to determine which private addresses ought to be translated.
In the figure above, an organization is assigned to four different public addresses, but the
organization can have more than four internal devices that require access to the internet.
To resolve this problem, the network administrator decides to configure dynamic NAT to allow
these devices to access the internet.
If all the internal devices have been assigned to all the available global addresses, then the device
requesting for a public address will have to wait until one is made available.
Dynamic NAT is more commonly used by organizations, to connect their devices to the internet.
If their network is large, it requires a huge set of registered public addresses. Thus, it completely
defeats NAT‘s goal.
Dynamic NAT reduces this problem to some degree. However, if a large percentage of internal
hosts need access to the internet then, we must use Port Address Translation, also called NAT
overload.
To understand how PAT works, it is important to recall how the host uses the Transmission
Control Protocol (TCP), User Datagram Protocol (UDP) and port numbers to transmit data.
To learn more about TCP and UDP, it is highly recommeded to go over this article before
continuing to read.
With these protocols, PAT can map multiple private addresses to one or more public addresses
by ensuring that devices use different TCP and UDP port numbers for each session.
NAT configuration
In the first half of this article, we learned briefly about NAT and the different types of NAT.
In the second part, we will cover how to implement static NAT, dynamic NAT, and PAT on a
Cisco router.
Static NAT
They are:
1. Creating a mapping between the private internal address and public global address using
the ip nat inside source static [private-address] [public-address] global configuration
command.
2. After the mapping is made, the interfaces taking part in the NAT translation are
configured as either inside or outside with respect to NAT.
The router interface associated within the LAN is assigned the inside interface using the ip nat
inside interface mode command.
Similarly, the router interface associated with the internet is assigned the outside interface using
the ip nat inside interface mode command.
In the figure above, the Gigabit 0/0 (g0/0) interface is the inside interface because it is connected
to the LAN. In contrast, the S0/0/0 interface is configured as the outside interface because it is
connected to the internet.
To configure a static NAT between the private address 172.31.1.2 and public
address 200.100.100.2:
Dynamic NAT
Dynamic NAT still requires that both the inside and the outside interfaces be configured.
For allocation, it uses an access control list (ACL) to specify which private addresses are subject
to translation and a NAT pool of registered IP addresses.
1. Create an ACL using the access-list 1 permit address wildcard mask command.
2. Create a NAT pool using the ip nat pool [name] [first-address] [last-address] [netmask]
[subnet mask] global configuration command.
This pool will contain the public addresses for the translation. Because, ISP assigns the public
addresses contiguous to the organizations.
The first address is the least in the given address range. And, the last address is the highest
address of that range.
The netmask identifies the network to which of these addresses belong to, using the ip nat inside
source list [access-list] [number] pool [name] command to bind the ACL and the NAT Pool
created.
In this case, the ACL number is 1, and the NAT POOL is LAN.
NOTE: Different ACL numbers and pool names can be created and used, but ACL 1 and pool
name LAN will be used throughout this tutorial for simplicity.
1. Use the ip nat inside interface command to enable the inside interface for NAT
translation
2. Use the ip nat outside interface command to enable the outside interface for NAT
translation.
● Create an access list that will specify the private addresses that are allowed to be
translated using the access-list 1 permit 172.31.1.0 0.0.0.255.
● Creates a pool that will contain the public addresses to be utilized for translation using
the ip nat pool LAN 200.100.100.1 200.100.100.1 netmask 255.255.255.0.
● Bind the access list and the pool together using the ip inside source list 1 pool LAN. This
allows for the dynamic translation of the private addresses and the public addresses in a
NAT pool named LAN.
● Enter the interface serial 0/0/0/ command and identify it as an outside interface using
the ip nat outside command.
● Enter the interface gigabitethernet g0/0 command and identify it as the inside interface
using the ip nat inside command.
PAT with multiple addresses
If an organization is to be assigned more than one public address by an Internet Service Provider
(ISP), then configuring PAT looks exactly like a dynamic NAT, except that the ip nat inside
source list--- pool command in step 3, with an overload keyword added at the end.
To configure PAT for the network topology above, the following steps are applied:
1. Create an ace list that will specify which private addresses are allowed to be translated
using the access-list 1 permit 172.31.1.0 0.0.0.255
2. ip nat pool LAN 200.100.100.1 200.100.100.1 [netmask] 255.255.255.0 creates a pool
that contains the public addresses to be used for translation.
3. Bind the access list and the pool together using the ip inside source list 1 pool LAN
overload. This allows for the dynamic mapping of the private addresses and the public
address in the NAT pool named LAN. The overload keyword used here is the only
configuration difference between PAT and dynamic NAT.
4. Enter the interface serial 0/0/0/ to identify the interface as the outside interface using
the ip nat outside command.
5. Enter gigabitethernet g0/0 using the interface gigabitethernet g0/0 command and identify
it as the inside interface relative to NAT with the ip nat inside command.
Steps to configure PAT with a single address
If an organization is assigned a single public address by an ISP. Then, PAT can be configured
with a little changes when compared to PAT with multiple addresses.
In this situation, a NAT pool is not created, but an outside interface used for the translation is
used in place of the NAT pool as mentioned in step 3 above.
An organization is assigned one public address 200.100.100.1, and it wants to allow its internal
hosts in the private network 172.31.1.0 - 255.255.255.0 to reach the internet using PAT.
To configure PAT for the topology above, the following steps will be applied:
1. Create an ace list that will specify which private addresses are allowed to be translated,
using the access-list 1 permit 172.31.1.0 0.0.0.255 command.
2. Bind the access list and the outside interface together using the ip inside source list 1
interface s0/0/0 overload.
3. Enter the interface serial 0/0/0/ command to identify it as an outside interface relative to
NAT using the: ip nat outside command.
4. Enter the interface gigabitethernet g0/0 command and identify it as an inside interface
relative to NAT using the ip nat inside command.
The figure above shows the configuration of PAT using one public address on a Cisco router.
EXPERIMENT – 10
Theory:
FEATURE:
● Available for UNIX and Windows.
● Capture live packet data from a network interface.
● Display packets with very detailed protocol information.
● Open and Save packet data captured.
● Import and Export packet data from and to a lot of other capture programs.
● Filter packets on many criteria.
● Search for packets on many criteria.
● Colorize packet display based on filters.
● Create various statistics.
CAPTURING PACKETS
After downloading and installing Wireshark, you can launch it and click the name of an interface
under Interface List to start capturing packets on that interface. Wireshark, formerly known as
Ethereal, is an amazing Network Monitoring tool. It helps you to capture the data packets being
sent/received by your network interface and analyze it.
For example, if you want to capture traffic on the wireless network, click your wireless interface.
You can configure advanced features by clicking Capture Options, but this isn‘t necessary for
now.
Before capturing packets, configure Wireshark to interface with an 802.11 client device;
otherwise, you‘ll get an alert ―No capture interface selected!‖ when starting a packet capture. To
select an interface, click the Capture menu, choose Options, and select the appropriate interface.
To start the packet capturing process, click the Capture menu and choose Start. Wireshark will
continue capturing and displaying packets until the capture buffer fills up. The buffer is 1 Mbytes
by default. This size is generally good enough, but to change it click the Capture menu, choose
Options, and adjust the Buffer size value accordingly. When you‘re done capturing packets, click
the Capture menu and choose Stop.
Alternatively, you can set the capture run length (in packets or minutes), and the capture will
automatically stop when that length has been met. You‘ll be prompted to save the capture for
later viewing.
The packet capture will display the details of each packet as they were transmitted over the
wireless LAN. Figure 2 is a screenshot of a sample packet capture window. The top panel of the
window identifies each packet‘s source and destination nodes, protocol implemented, and
information about each packet. You can select a specific packet to display more details. The
middle panel displays information about this packet, and you can choose a specific field of the
packet and the contents of that field are displayed in hex and ASCII format in the bottom panel.
As a result, you‘re able to analyze the flow and view each field (including data field payloads) of
all packets.
I. SOURCE IP FILTER
A source filter can be applied to restrict the packet view in wireshark to only those packets that
have source IP as mentioned in the filter. The filter applied in the example below is: ip.src ==
192.168.1.1
Wireshark can provide a statistical breakdown of the contents of a packet capture. The protocol
hierarchy shows a dissection per OSI layer of the displayed data. Click on Statistics>Protocol
Hierarchy. After processing the capture file you‘ll be presented with a chart outlining the
protocol statistics.
Protocol Statistics
Graph Analysis
Aim: To construct a Wireless LAN and make the PC‘s communicate wirelessly
Requirements
• Windows pc – 2 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Cat-5 LAN cable
Theory:
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 2 Laptop pcs using End Device Icons on the left corner
• Select Access point and server from wireless devices
• Select laptop-> physical-> OFF laptop-> remove LAN Module & replace WPC 300N
Wireless module -> ON Laptop
• Observe the wireless connections between access point and laptops
• Give IP address of the PCs as per table, ping between PCs and observe the transfer of
data packets in real and simulation mode.
Result:
Thus, constructed a WLAN and made the Laptops communicate wirelessly.
EXPERMENT 12
Requirements
• Windows pc – 2 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Router – 1 Nos
• Cat-5 LAN cable
Theory:
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 1 pc and 1 laptop using End Device Icons on the left corner.
• Select 8 port switch from switch icon list in the left bottom corner
• Select Routers and Give the IP address for serial ports of router
• Type CLI‘s for the router
• Make and verify the SSH operation by pinging in the command prompt of PC
• Ping between PCs and observe the transfer of data packets in real and simulation mode
ROUTER CLI:
Router#config
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with
CNTL/Z. Router(config)#line vty 0 4
Router(config-line)#password sai123
Router(config-line)#login
local Router(config-line)#exit
Router(config)#username saimukhesh privilege 4 password sai123
Router(config)#hostname r1
r1(config)#ip domain-name cisco
r1(config)#line vty 0 4
r1(config-line)#transport input
ssh r1(config-line)#exit
r1(config)#crypto key generate
rsa
The name for the keys will be: r1.cisco
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may
take a few minutes.
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
0r1(config)#
*Mar 1 0:3:53.842: %SSH-5-ENABLED: SSH 1.99 has been enabled
r1(config)#
OUTPUT:
PINGING FROM PC1 TO SERVER USING SSH:
Packet Tracer PC Command Line 1.0 C:\>ping
192.168.1.1
Result: Thus, verified the operation of SSH and accessed the router from a remote Pcs.