CP7112-Network Design lab manual download
CP7112-Network Design lab manual download
EX.NO: 1.1
CASE STUDY 1
Aim:
Objective
The main objective is to set up a Local Area Network, concepts involved in this network are IP
addressing and the Address Resolution Protocol (ARP). The required equipments are
192.168.1.1, 192.168.1.2, 192.168.1.3, Host A Host B Host C, Switch/HUB, three PC`s equipped
with at least oneNIC, one HUB or Switch and the necessary cables. Once the physical LAN is set
up the hosts need to be configured using the ifconfig command. To verify communication among
the machines the ping command is used. Next, to manipulate the routing tables at the hosts to
understand how machines know where to send packets. Since the ifconfig command places a
default route into the routing tables this route must be deleted. to´blindfoldˇ the machine. The
ping command is used again to show that communication is no longer available. To re-establish
communication the routes are put back into the routing table one host at a time. Communication
is once again verified using the ping command.
REQUIREMENTS:
PROCEDURES:
PC-1 IP ADDRESS:
PC-2 IP ADDRESS:
PC-3 IP ADDRESS:
PING PC 1 - PC 2 :
ping command is a Network Utility Command. ping tools use Internet Control Message Protocol
(ICMP). ping used to verify the connection between source PC to Destination PC.
c:>ping 192.168.1.3
PING PC 1 - PC 3
c:>ping 192.168.1.3
RESULT:
Thus the Experiment is configured successfully.
DATE:
EX.NO: 1.2
CASE STUDY 1
Aim:
Objective
The main objective is to extend routing connection by using multiple routers. The concepts
include IP addressing and basic network routing principles. Connect two LANs topology. During
router configuration attention is paid to the types of interfaces as additional issues are involved
with set-up. For example, the serial interfaces require clocking mechanisms to be set correctly.
Once the interfaces are working the ping command is used to check for communication between
LANs. The failure of communication illustrates the need for routes to be established inside the
routing infrastructure. Static routes are used to show how packets can be transported through any
reasonable route. It is run trace route on two different configurations to demonstrate the
implementation of different routes.
REQUIREMENTS:
PROCEDURES:
NETWORK TOPOLOGY:
ROUTER R1 CONFIGURATION
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config)#interface Serial0/0/0
Router(config-if)#ip address 192.168.3.1 255.255.255.0
Router(config-if)#
ROUTER R2 CONFIGURATION
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config-if)#ip address 192.168.2.1 255.255.255.0
Router(config)#interface Serial0/0/0
Router(config-if)#ip address 192.168.3.2 255.255.255.0
Router(config-if)#
PC CONFIGURATION:
PC-1>ipconfig
FastEthernet0 Connection:(default port)
Link-local IPv6 Address.........: FE80::2E0:8FFF:FEBC:1B4C
IP Address......................: 192.168.1.2
Subnet Mask.....................: 255.255.255.0
Default Gateway.................: 192.168.1.1
PC-2>ipconfig
FastEthernet0 Connection:(default port)
Link-local IPv6 Address.........: FE80::260:2FFF:FE61:B37C
IP Address......................: 192.168.1.3
Subnet Mask.....................: 255.255.255.0
Default Gateway.................: 192.168.1.1
PC-3>ipconfig
FastEthernet0 Connection:(default port)
Link-local IPv6 Address.........: FE80::250:FFF:FE6D:ED85
IP Address......................: 192.168.2.2
Subnet Mask.....................: 255.255.255.0
Default Gateway.................: 192.168.2.1
PC-4>ipconfig
FastEthernet0 Connection:(default port)
Link-local IPv6 Address.........: FE80::201:64FF:FE76:7A08
IP Address......................: 192.168.2.3
Subnet Mask.....................: 255.255.255.0
Default Gateway.................: 192.168.2.1
R2 ROUTER
INPUT PROTOCOL DATA UNIT (PDU):
OUTPUT PROTOCOL DATA UNIT (PDU):
OUT PUT:
c :>ping 192.168.2.2
c:>ping 192.168.1.3
RESULT:
CASE STUDY 1
Aim:
Objective
Original TCP versus the above modified one: To compare the performance between the
operation of TCP with congestion control and the operation of TCP as implemented. The main
objective is for students to examine how TCP responds to a congested network. The concepts
involved in the lab include network congestion and the host responsibilities for communicating
over a network. This lab requires three PC’s connected to a switch. One PC is designated as the
target host and the other two PC’s will transfer a file from the target host using FTP. A load is
placed on the network to simulate congestion and the file is transferred, first by the host using the
normal TCP and then by the host using the modified version. This procedure is performed
multiple times to determine average statistics. The students are then asked to summarize the
results and draw
REQUIREMENTS:
File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file
from one host to another.
PROCEDURE:
# chkconfig vsftpd on
FTPSERVERCONFIGURATION:
Edit the ftp server configuration file.
# vi /etc/vsftpd/vsftpd.conf
Make some changes and add some lines to your vsftpd.conf configuration file
local_root=public_html
use_localtime=YES
Add the user names to chroot_list file
# vi /etc.vsftpd.chroot_list
On the Setseboolean
# setsebool -P allow_ftpd_anon_write on
TEXT MODE :
Go to XP PC-1
Open the command prompt windows
Type the following command
C:/>ftp 192.168.1.5
Enter the Linux user_name and password to login the linux machine
RESULT:
Thus the experiment was executed successfully.
DATE:
EX.NO: 2
CASE STUDY 2
Aim:
Objective:
This case study addresses the issue of integrating Routing Information Protocol
(RIP) networks with Open Shortest Path First (OSPF) networks. Most OSPF
networks also use RIP to communicate with hosts or to communicate with portions
of the inter-network that do not use OSPF. This case study should provide
examples of how to complete the following phases in redistributing information
between RIP and OSPF networks, including the following topics:
REQUIREMENTS:
PROCEDURES:
A RIP network illustrates a RIP network. Four sites are connected with serial
lines. The RIP network uses a Class C address. Each site has a contiguous set of
network numbers
ROUTER R4 NETWORK CONFIGURATION:
interface FastEthernet0/0
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 192.168.2.2 255.255.255.0
!
interface Serial0/0/1
ip address 192.168.4.2 255.255.255.0
!
router rip
network 192.168.2.0
network 192.168.3.0
network 192.168.4.0
Most OSPF networks also use RIP to communicate with hosts or to communicate
with portions of the inter-network that do not use OSPF. Cisco supports both the
RIP and OSPF protocols and provides a way to exchange routing information
between RIP and OSPF networks.
router ospf 1
log-adjacency-changes
redistribute rip subnets
network 192.168.5.0 0.0.0.255 area 0
!
router rip
redistribute ospf 1 metric 10
network 192.168.4.0
router ospf 1
log-adjacency-changes
redistribute rip subnets
network 192.168.1.0 0.0.0.255 area 0
!
router rip
redistribute ospf 1 metric 10
network 192.168.2.0
ROUTING TABLE:
For a Cisco router, the IOS command show ip route displays the routes in the
routing table. There are several types of routes that can appear in the routing table:
Directly-Connected Routes:
When the router powers up, the configured interfaces are enabled. As they become
operational, the router stores the directly attached local network addresses as
connected routes in the routing table. For Cisco routers, these routes are identified
in the routing table with the prefix C. These routes are automatically updated
whenever the interface is reconfigured or shutdown.
Static Routes:
Default Route:
The default route is a type of static route which specifies a gateway to use when
the routing table does not contain a path to use to reach the destination network. It
is common for default routes to point to the next router in the path to the Internet
Service Provider. If a subnet has only one router, then that router is automatically
the default gateway, because all network traffic to and from that local network has
no option but to travel through that router.
RIP:
OSPF:
RESULT:
CASE STUDY 3
Aim:
Objective:
This case study should describe the use of DDR to connect a worldwide network
that consists of a central site located in Mumbai and remote sites located in
Chennai, Bangalore, and Hyderabad. The following scenarios should be
considered:
• Having the Central Site Dial Out
Describe the central and remote site configurations for three setups: a central site
with one interface per remote site, a single interface for multiple remote sites, and
multiple interfaces for multiple remote sites. Include examples of the usage of
rotary groups and access lists.
• Having the Central and Remote Sites Dial In and Dial Out
Describe the central and remote site configurations for three setups: central site
with one interface per remote site, a single interface for multiple remote sites, and
multiple interfaces for multiple remote sites. Also describes the usage of Point-to-
Point Protocol (PPP) encapsulation and the Challenge Handshake Authentication
Protocol (CHAP).
• Having Remote Sites Dial Out
A common configuration is one in which the remote sites place calls to the central
site but the central site does not dial out. In a “star” topology, it is possible for all
of the remote routers to have their serial interfaces on the same subnet as the
central site serial interface.
• Using DDR as a Backup to Leased Lines
Describes the use of DDR as a backup method to leased lines and provides
examples of how to use floating static routes on single and shared interfaces.
• Using Leased Lines and Dial Backup
Describes the use of Data Terminal Ready (DTR) dialing and V.25bis dialing with
leased lines.
REQUIREMENTS:
NETWORK TOPOLOGY:
ROUTERS ISDN PARAMETERS:
CHENNAI#sh running-config
Building configuration...
!
Version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname CHENNAI
!
ip subnet-zero
!
interface Serial0
no ip address
no ip directed-broadcast
bandwidth 1544
shutdown
!
interface Serial1
no ip address
no ip directed-broadcast
bandwidth 1544
shutdown
!
interface Ethernet0
no ip address
no ip directed-broadcast
bandwidth 10000
shutdown
!
interface Bri0
ip address 192.168.0.1 255.255.255.0
no ip directed-broadcast
dialer-group 1
isdn switch-type basic-ni
isdn spid1 32177820010100
dialer map ip 192.168.0.2 name MUMBAI broadcast 7782001
encapsulation ppp
ppp authentication chap
!
ip classless
no ip http server
!
!
dialer-list 1 protocol ip permit
!
isdn switch-type basic-ni
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
MUMBAI ROUTER RUNNING CONFIGURATION:
MUMBAI#sh running-config
Building configuration...
!
Version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname MUMBAI
!
ip subnet-zero
!
interface Ethernet0
no ip address
no ip directed-broadcast
bandwidth 10000
shutdown
!
interface Bri0
ip address 192.168.0.2 255.255.255.0
no ip directed-broadcast
dialer-group 1
isdn switch-type basic-ni
isdn spid1 32177820020100
dialer map ip 192.168.0.1 name CHENNAI broadcast 7782002
encapsulation ppp
ppp authentication chap
!
ip classless
no ip http server
!
dialer-list 1 protocol ip permit
!
isdn switch-type basic-ni
line con 0
transport input none
line aux 0
line vty 0 4
!
no scheduler allocate
end
RESULT:
CASE STUDY 4
Aim:
To analyze the network security for improving the security of the network.
Objective:
This case study should provide the specific actions you can take to improve the
security of your network. Before going into specifics, however, you should
understand the following basic concepts that are essential to any security system:
This case study refers to attackers or intruders. Consider who might want to
circumvent your security measures and identify their motivations. Determine what
they might want to do and the damage that they could cause to your network.
Security measures can never make it impossible for a user to perform unauthorized
tasks with a computer system. They can only make it harder. The goal is to make
sure the network security controls are beyond the attacker’s ability or motivation.
Every security system has underlying assumptions. For example, you might
assume that your network is not tapped, or that attackers know less than you do,
that they are using standard software, or that a locked room is safe. Be sure to
examine and justify your assumptions. Any hidden assumption is a potential
security hole.
Control your secrets
Most security is based on secrets. Passwords and encryption keys, for example, are
secrets. Too often, though, the secrets are not really all that secret. The most
important part of keeping secrets is knowing the areas you need to protect. What
knowledge would enable someone to circumvent your system? You should
jealously guard that knowledge and assume that everything else is known to your
adversaries. The more secrets you have, the harder it will be to keep all of them.
Security systems should be designed so that only a limited number of secrets need
to be kept.
Every security system has vulnerabilities. You should understand your system’s
weak points and know how they could be exploited. You should also know the
areas that present the largest danger and prevent access to them immediately.
Understanding the weak points is the first step toward turning them into secure
areas.
You should create appropriate barriers inside your system so that if intruders
access one part of the system, they do not automatically have access to the rest of
the system. The security of a system is only as good as the weakest security level
of any single host in the system.
REQUIREMENTS:
PROCEDURE:
Console Connectivity
R1 ROUTER CONFIGURATION :
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
service password-encryption
!
hostname R1
!
enable password 7 0822455D0A16
!
spanning-tree mode pvst
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Vlan1
no ip address
shutdown
!
ip classless
!
line con 0
exec-timeout 30 0
password 7 0822455D0A16
login
!
line aux 0
!
line vty 0 4
password 7 0822455D0A16
login
!
End
PC-1 IP ADDRESS :
line con 0
exec-timeout 30 0
Console Login
Creating Remote Telnet Access on your Router with basic level security :
NETWORK TOPOLOGY:
BASICTYPE7ENCRYPTION
R1(config-line)#passwordcisco
R1(config-line)#login
R1ROUTERTELNETCONFIGURATION:
!
version12.4
noservicetimestampslogdatetimemsec
noservicetimestampsdebugdatetimemsec
servicepassword-encryption
!
hostnameR1
!
enablepassword70822455D0A16
!
spanning-treemodepvst
!
interfaceFastEthernet0/0
ipaddress192.168.1.1255.255.255.0
duplexauto
speedauto
!
interfaceFastEthernet0/1
noipaddress
duplexauto
speedauto
shutdown
!interfaceVlan1
noipaddress
shutdown!ipclassless!linecon0
exec-timeout300
password70822455D0A16
login
!
lineaux0
!
linevty04
password70822455D0A16
login
!
end
Enable Router User Privilege Mode password for Remote Telnet Access :
R1(config)#enable password cisco
This is basic level Type 7 encryption. hackers can Easily find out This Encrypted
Password.
Creating MD5
Accounting:
The last "A" is for accounting. It provides a way of collecting security information
that you can use for billing, auditing, and reporting. You can use accounting to see
what users do once they are authenticated and authorized. For example, with
accounting, you could get a log of when users logged in and when they logged out.
Enabling AAA
Router(config)# aaa new-model
R1(config)#username cisco secret cisco1234
Explanation :
This command Stop the Dictionary attacks from the Hackers.
Time period in seconds -120 seconds
attempts -Set max number of fail attempts - 5 times
within Watch period for fail attempts - 60 seconds
More Details Click here
DENY 192.168.1.2:
NETWORK TOPOLOGY:
R1 ROUTER CONFIGURATION :
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname R1
!
spanning-tree mode pvst
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
ip access-group Block-192.168.1.2 in
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 172.16.13.1 255.255.0.0
duplex auto
speed auto
!
interface Vlan1
no ip address
shutdown
!
ip classless
!
ip access-list standard Block-192.168.1.2
deny host 192.168.1.2
permit any
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
end
PING BETWEEN 192.168.1.2 TO 172.16.13.2 :
R1(config)#ip access-list standard Block-192.168.1.2
R1(config-std-nacl)#deny host 192.168.1.2
deny host 192.168.1.2
permit any
CASE STUDY 5
Aim:
Objective:
In this case study, the firewall router allows incoming new connections to one or
more communication servers or hosts. Having a designated router act as a firewall
is desirable because it clearly identifies the router’s purpose as the external
gateway and avoids encumbering other routers with this task. In the event that the
internal network needs to isolate itself, the firewall router provides the point of
isolation so that the rest of the internal network structure is not affected.
Connections to the hosts are restricted to incoming file transfer protocol (FTP)
requests and email services. The incoming Telnet, or modem connections to the
communication server are screened by the communication server running
TACACS username authentication.
REQUIREMENTS:
PROCEDURE:
Lab Objective:
any one try to telnet the router must be authenticated through AAA server First and
in case AAA server is down , router will use his local user accounts database.
configuration at the router:
--------setting telnet ------------
Router(config)#enable secret 1234
Router(config)#line vty 0 4
Router(config-line)#login
Router(config-line)#exit
Router(config)#username telnet password 1234
AAA commands
----------enable AAA on the router------------
Router(config)#aaa new-model
-------Method 2 ----------
using local router user accounts.
tell the router what is the IP address for Tacas+ server and key (password) to
connect to:
Router(config)#tacacs-server host 192.168.1.3 key 1234
NETWORK TOPOLOGY:
NETWORK TOPOLOGY:
TELNET CLIENT IP ADDRESS :
TACACS SERVER IP :
TACACS+ SERVER CONFIGURATION :
RESULT:
CASE STUDY 6
Aim:
Objective:
Access lists define the actual traffic that will be permitted or denied, whereas an
access group applies an access list definition to an interface. Access lists can be
used to deny connections that are known to be a security risk and then permit all
other connections, or to permit those connections that are considered acceptable
and deny all the rest. For firewall implementation, the latter is the more secure
method. In this case study, incoming email and news are permitted for a few hosts,
but FTP, Telnet, and rlogin services are permitted only to hosts on the firewall
subnet. IP extended access lists (range 100 to 199) and transmission control
protocol (TCP) or user datagram protocol (UDP) port numbers are used to filter
traffic. When a connection is to be established for email, Telnet, FTP, and so forth,
the connection will attempt to open a service on a specified port number. An access
list is invoked after a routing decision has been made but before the packet is sent
out on an interface. The best place to define an access list is on a preferred host
using your favorite text editor. You can create a file that contains the access-list
commands, place the file (marked readable) in the default TFTP directory and then
network load the file onto the router.
REQUIREMENTS:
One of the most common methods of traffic filtering is the use of access control
lists (ACLs). ACLs can be used to manage and filter traffic that enters a network,
as well as traffic that exits a network.
An ACL ranges in size from one statement that allows or denies traffic from one
source, to hundreds of statements that allow or deny packets from multiple sources.
The primary use of ACLs is to identify the types of packets to accept or deny.
The additional load on the router to check all packets means less time to
actually forward packets
Poorly designed ACLs place an even greater load on the router and might
disrupt network usage.
Improperly placed ACLs block traffic that should be allowed and permit
traffic that should be blocked.
1. Standard ACLs
The Standard ACL is the simplest of the three types. When creating a standard IP
ACL, the ACLs filter based on the source IP address of a packet. Standard ACLs
permit or deny based on the entire protocol, such as IP. So, if a host device is
denied by a standard ACL, all services from that host are denied. This type of ACL
is useful for allowing all services from a specific user, or LAN, access through a
router while denying other IP addresses access. Standard ACLs are identified by
the number assigned to them. For access lists permitting or denying IP traffic, the
identification number can range from 1 to 99 and from 1300 to 1999.
2. Extended ACLs
Extended ACLs filter not only on the source IP address but also on the destination
IP address, protocol, and port numbers. Extended ACLs are used more than
Standard ACLs because they are more specific and provide greater control. The
range of numbers for Extended ACLs is from 100 to 199 and from 2000 to 2699.
3. Named ACLs
Named ACLs (NACLs) are either Standard or Extended format that are referenced
by a descriptive name rather than a number. When configuring named ACLs, the
router IOS uses a NACL subcommand mode.
is the basic level of Access control List configuration technique. it permit and deny
the remote hosts to on your network.
NETWORK TOPOLOGY:
STANDARD ACCESS LIST
PC-2 IP ADDRESS:
PC-3 IP ADDRESS:
PC-4 IP ADDRESS:
PC-5 IP ADDRESS :
ROUTER R1 FAST ETHERNET INTERFACE 0/0 AND INTERFACE 0/1 IP
ADDRESS:
DATE: RESULT:
EX.NO: 6
Thus the standard access list has been configured successfully.
CASE STUDY 6
Aim:
Objective:
Extended ACLs filter not only on the source IP address but also on the destination
IP address, protocol, and port numbers. Extended ACLs are used more than
Standard ACLs because they are more specific and provide greater control. The
range of numbers for Extended ACLs is from 100 to 199 and from 2000 to 2699
REQUIREMENTS:
PROCEDURE:
1. Connect the Serial 0/0/0 interface of Router 1 to the Serial 0/0/0 interface of
Router 2 using a serial cable.
2. Connect the Fa0/0 interface of Router 1 to the Fa0/1 port of Switch 1 using
straight-through cable.
3. Connect a console cable to each PC to perform configurations on the routers
and switch.
4. Connect Host 1 to the Fa0/3 port of Switch 1 using a straight-through cable.
5. Connect Host 2 to the Fa0/2 port of Switch 1 using a straight-through cable.
6. Connect a crossover cable between Host 3 and the Fa0/0 interface of Router
NETWORK TOPOLOGY:
Perform basic configuration on Router 1
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname R1
!
spanning-tree mode pvst
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
ip access-group 101 in
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 192.168.15.1 255.255.255.0
ip access-group 101 in
!
interface Serial0/0/1
no ip address
shutdown
!
interface Vlan1
no ip address
shutdown
!
router rip
network 192.168.1.0
network 192.168.15.0
!
ip classless
!
access-list 101 permit ip host 192.168.5.10 host 192.168.15.1
access-list 101 permit ip host 192.168.5.10 host 192.168.1.1
access-list 101 deny ip any host 192.168.15.1
access-list 101 deny ip any host 192.168.1.1
access-list 101 permit ip any any
access-list 101 deny ip any any
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
end
NETWORK TOPOLOGY:
R1 ROUTER CONFIGURATION:
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname Router
!
spanning-tree mode pvst
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 172.16.13.1 255.255.0.0
ip access-group 100 out
duplex auto
speed auto
!
interface Vlan1
no ip address
shutdown
!
ip classless
!
!
access-list 100 permit tcp any host 172.16.13.2 eq www
access-list 100 deny icmp any host 172.16.13.2 unreachable
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
end
PERMIT HTTP:
EXTENDED ACCESS LIST 100
NETWORK TOPOLOGY:
R1 ROUTER CONFIGURATION :
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname R1
!
enable secret 5 $1$mERr$IAMOTn9O8Oi71F2D6cQKs/
!
aaa new-model
!
aaa authentication login TT local
!
username telnet password 0 telnet
!
spanning-tree mode pvst
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 10.10.10.1 255.0.0.0
ip access-group 101 in
!
interface Serial0/0/1
no ip address
shutdown
!
interface Vlan1
no ip address
shutdown
!
router rip
network 10.0.0.0
network 192.168.1.0
!
ip classless
!
access-list 101 deny tcp host 172.16.13.1 host 192.168.1.1 eq telnet
access-list 101 permit tcp host 10.10.10.2 host 192.168.1.1 eq telnet
!
line con 0
!
line aux 0
!
line vty 0 4
login authentication TT
!
end
R2 ROUTER CONFIGURATION:
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname Router
!
spanning-tree mode pvst
!
interface FastEthernet0/0
ip address 172.16.13.1 255.255.0.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 10.10.10.2 255.0.0.0
!
interface Serial0/0/1
no ip address
shutdown
!
interface Vlan1
no ip address
shutdown
!
router rip
network 10.0.0.0
network 172.16.0.0
!
ip classless
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
end
PERMIT FTP:
NETWORK TOPOLOGY:
R1 ROUTER CONFIGURATION:
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname Router
!
spanning-tree mode pvst
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 172.16.13.1 255.255.0.0
ip access-group 100 out
duplex auto
speed auto
!
interface Vlan1
no ip address
shutdown
!
ip classless
!
access-list 100 permit tcp any host 172.16.13.2 eq www
access-list 100 deny icmp any host 172.16.13.2 unreachable
access-list 100 permit tcp any host 172.16.13.2 eq ftp
access-list 100 permit tcp any host 172.16.13.2 range 20 ftp
access-list 100 permit tcp any host 172.16.13.2 eq 20
access-list 100 permit tcp any host 172.16.13.2 gt 1023
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
end
NETWORK TOPOLOGY:
NETWORK TOPOLOGY:
R1 ROUTER CONFIGURATION:
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname Router
!
spanning-tree mode pvst
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
ip access-group 101 in
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 172.16.13.1 255.255.0.0
duplex auto
speed auto
!
interface Vlan1
no ip address
shutdown
!
router rip
network 192.168.1.0
network 192.168.2.0
!
ip classless
!
!
access-list 101 deny tcp 192.168.1.0 0.0.0.255 host 172.16.13.4 eq smtp
!
line con 0
!
line aux 0
!
line vty 0 4
login
!
end
SEND A EMAIL [email protected] TO [email protected] :
SEND A EMAIL [email protected] TO [email protected] :
DENY EMAIL SERVICE FROM 192.168.1.0 NETWORK :
access list 101 deny tcp 192.168.1.0 0.0.0.255 host 172.16.13.4 eq SMTP
RESULT:
CASE STUDY 7
Aim:
Objective:
Consider a Fire wall communication server with single inbound modem. Configure
the modem to ensure security for LAN
REQUIREMENTS:
PROCEDURE:
A firewall is a layer of security between your home network and the Internet.
Since a router or modem is the main connection from a home network to the
Internet, a firewall is often packaged with those devices. Every home network
should have a firewall to protect its privacy. firewalls are a combination of
hardware and software The hardware part gives firewalls excellent performance,
while the software part allows firewalls to be tailored to your specific needs.
Firewall Rules:
Firewall rules block or allow specific traffic passing through from one side of the
router to the other. Inbound rules (WAN to LAN) restrict access by outsiders to
private resources, selectively allowing only specific outside users to access specific
resources. Outbound rules (LAN to WAN) determine what outside resources local
users can have access to. A firewall has two default rules, one for inbound traffic
and one for outbound. The default rules of the modem router are:
1. Inbound
2. Outbound
INBOUND RULES:
Block all access from outside except responses to requests from the LAN side
OUTBOUND RULES:
Allow all access from the LAN side to the outside.
NETWORK TOPOLOGY:
SERVER IP ADDRESS:
SERVER>ipconfig
FastEthernet0 Connection :( default port)
Link-local IPv6 Address.........: FE80 :: 201:63FF:FEB1:4829
IP Address......................: 172.16.0.1
Subnet Mask.....................: 255.255.0.0
Default Gateway.................: 0.0.0.0
PC-1 IP ADDRESS :
PC>ipconfig
FastEthernet0 Connection :( default port)
Link-local IPv6 Address.........: FE80:: 201:C9FF:FE64:518E
IP Address......................: 172.16.0.2
Subnet Mask.....................: 255.255.0.0
Default Gateway.................: 0.0.0.0
PC-2 IP ADDRESS :
PC>ipconfig
FastEthernet0 Connection :( default port)
Link-local IPv6 Address.........: FE80:: 201:C9FF:FE64:518E
IP Address......................: 172.16.0.2
Subnet Mask.....................: 255.255.0.0
Default Gateway.................: 0.0.0.0
PC-3 IP ADDRESS :
PC>ipconfig
FastEthernet0 Connection :( default port)
Link-local IPv6 Address.........: FE80:: 290:21FF:FEBC:CDA5
IP Address......................: 172.16.0.4
Subnet Mask.....................: 255.255.0.0
Default Gateway.................: 0.0.0.0
GRAPHICAL VIEW:
SERVER IP ADDRESS:
PC-1 IP ADDRESS:
PC-2 IP ADDRESS:
PC-3 IP ADDRESS:
We use Firewall Inbound Rules. Block all access from outside except responses to
requests from the LAN side
Note:
ICMP:
ping command is a Network Utility Command. ping tools use Internet Control
Message Protocol (ICMP). ping used to verify the connection between source PC
to Destination PC.
RESULT:
CASE STUDY 8
Aim:
Objective:
The case study should provide the benefits and considerations involved in
integrating Enhanced IGRP into the following types of internetworks:
REQUIREMENTS:
NETWORK TOPOLOGY
EIGRP
What is EIGRP?
Features of EIGRP:
EIGRP Tables:
EIGRP routing Protocol maintains Three tables for best routing or path selection to
destination Network.
1. Neighbor Table
2. Topology Table
3. Routing Table
Disadvantages of EIGRP:
Works only on Cisco Routers
Configuring EIGRP
Router(config)# router eigrp <as no>
Router(config-router)# network <Network ID>
Configuring EIGRP :
Router(config)# router eigrp <as no>
Router(config-router)# network <Network ID>
PING 192.168.1.3
PING 192.168.3.2
PING 192.168.2.3
NEIGHBORS ROUTING TABLES:
RESULT: