laborotory workbook 2016/17€¦ · web viewby the end of this course, students will be able to...

290
Page 1 of 290

Upload: others

Post on 28-Feb-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

CCE 1030Computer Networking

Laboratory Workbook

Autumn/Winter term – Sept start (24 week module)

2019/20

Student Name:…………………………….

Student ID:………………………..

Usama ArusiFaculty of Science and Technology

Page 1 of 210

Page 2: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Disclaimer

This laboratory workbook is designed to provide practical exercises for CCE1030 Computer Networks. Every effort has been made to make this laboratory workbook as complete and as true and accurate as possible, but no warranty or fitness is implied.

The author has based its content on material provided by Cisco Cert Guide, and shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this laboratory workbook.

The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.

Page 2 of 210

Page 3: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

ContentsDisclaimer..................................................................................................................................2Introduction..............................................................................................................................14Lab 1: My First Packet Tracer Lab..........................................................................................16

Introduction..........................................................................................................................16Lab Objectives.....................................................................................................................16Important Terminology........................................................................................................16Task 1: Viewing Help and Tutorials....................................................................................17Task 2: Creating a First Network.........................................................................................18Task 3: Sending Simple Test Messages in Realtime Mode.................................................19Task 4: Establishing a Web Server Connection Using the PC’s Web Browser...................20Task 5: Capturing Events and Viewing Animations in Simulation Mode...........................21Task 6: Looking Inside Packets in Simulation Mode..........................................................22Task 7: Viewing Device Tables and Resetting the Network...............................................23Task 8: Reviewing Your New Skills....................................................................................24

Lab 2: Investigating the TCP/IP and OSI Models in Action (Packet Tracer)..........................25Objectives.............................................................................................................................25Background..........................................................................................................................25Task 1:     Examine HTTP Web Traffic...............................................................................25

Step 1:     Switch from Realtime to Simulation mode......................................................25Step 2:     Generate web (HTTP) traffic...........................................................................26Step 3:     Explore the contents of the HTTP packet........................................................26

Task 2: Display Elements of the TCP/IP Protocol Suite......................................................28Step 1: View Additional Events.......................................................................................28Challenge..........................................................................................................................29

Lab 3: Examining Packets (Packet Tracer)..............................................................................30Learning Objectives.............................................................................................................30Background..........................................................................................................................31Task 1: Complete the Topology...........................................................................................31Task 2: Add Simple PDUs in Realtime Mode.....................................................................31Task 3: Analyse PDUs in Simulation Mode (Packet Tracing)............................................31Task 4: Experiment with the Model of the Standard Lab Setup..........................................32Reflection.............................................................................................................................32

Lab 4: Analysing the Application and Transport Layers (Packet Tracer)...............................34Learning Objectives.............................................................................................................34Background..........................................................................................................................35Task 1: Repair and Test the Topology.................................................................................35Task 2: Explore How DNS, UDP, HTTP, and TCP Work Together...................................36Reflection.............................................................................................................................36

Lab 5: Connecting to a Cisco Device via Console (Hardware)...............................................38Lab Prerequisites..................................................................................................................38Learning Objectives.............................................................................................................38Background..........................................................................................................................38Lab Instruction.....................................................................................................................39

Lab 6: Topology Orientation and Building a Small Network (Packet Tracer)........................41Learning Objectives.............................................................................................................41Background..........................................................................................................................41Scenario................................................................................................................................42Section 1...............................................................................................................................42

Page 3 of 210

Page 4: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 1: Create a Peer-to-Peer Network................................................................................42Task 2: Identify the Cables used in a Network....................................................................42Task 3: Cable the Peer-to-peer Network..............................................................................42

Step 1: Connect two workstations....................................................................................42Step 2: Apply a Layer 3 address to the workstations.......................................................42Step 3: Verify connectivity..............................................................................................43

Section 2...............................................................................................................................45Task 4: Connect Your Workstations to the Switch..............................................................45

Step 1: Connect workstation to a switch..........................................................................45Step 2: Repeat this process for each workstation on your network.................................45Step 3: Verify connectivity..............................................................................................45

Task 5: Reflection................................................................................................................46Lab 7: Topology Orientation and Building a Small Network (Hardware Equipment)............47

Learning Objectives.............................................................................................................47Background..........................................................................................................................47Scenario................................................................................................................................48Task 1: Create a Peer-to-Peer Network................................................................................48

Step 1: Obtain equipment and resources for the lab........................................................48Task 2: Identify the Cables used in a Network....................................................................48Task 3: Cable the Peer-to-peer Network..............................................................................48

Step 1: Connect two workstations....................................................................................48Step 2: Apply a Layer 3 address to the workstations.......................................................48Step 3: Verify connectivity..............................................................................................50

Task 4: Connect Your Workstations to the Classroom Lab Switch.....................................51Step 1: Connect workstation to switch.............................................................................51Step 2: Repeat this process for each workstation on your network.................................52Step 3: Verify connectivity..............................................................................................52Step 4: Share a document between PCs...........................................................................52

Task 5: Reflection................................................................................................................52Lab 8: Configure Initial Router Settings (Packet Tracer)........................................................54

Objectives.............................................................................................................................54Background..........................................................................................................................54Task 1: Verify the Default Router Configuration................................................................54

Step 1: Establish a console connection to R1...................................................................54Step 2: Enter privileged mode and examine the current configuration............................54

Task 2: Configure and Verify the Initial Router Configuration...........................................55Step 1: Configure the initial settings on R1.....................................................................55Step 2: Verify the initial settings on R1...........................................................................56

Task 3: Save the Running Configuration File......................................................................57Step 1: Save the configuration file to NVRAM...............................................................57

Lab 9: Configure Initial Router Settings (Hardware Equipment)............................................58Objectives.............................................................................................................................58Background..........................................................................................................................58Equipment............................................................................................................................58Task 1: Connect to the Router & Verify the Default Router Configuration........................58

Step 1: Establish a console connection to router..............................................................58Step 2: Enter privileged mode and examine the current configuration............................58

Task 2: Configure and Verify the Initial Router Configuration...........................................59Step 1: Configure the initial settings on R1.....................................................................59Step 2: Verify the initial settings on R1...........................................................................60

Page 4 of 210

Page 5: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 10: Cabling a Network and Basic Router Configuration (Packet Tracer)........................61Topology Diagram..............................................................................................................61Addressing Table................................................................................................................61Learning Objectives.............................................................................................................61Scenario................................................................................................................................61Task 1: Cable the Ethernet Links of the Network................................................................62

Step 1: Connect the R1 Router to the S1 Switch.............................................................62Step 2: Connect PC1 to the S1 Switch.............................................................................62Step 3: Connect PC2 to the R2 Router.............................................................................62

Task 2: Cable the Serial Link between R1 and R2 Routers.................................................63Task 3: Establish a connection to the R1 Router.................................................................63Task 4: Understand Command Line Basics.........................................................................63

Step 1: Enter privileged EXEC mode..............................................................................63Step 2: Enter an incorrect command and observe the router response............................63Step 3: Correct the previous command............................................................................64Step 4: Return to privileged EXEC mode with the exit command..................................64Step 5: Examine the commands that are available for privileged EXEC mode...............64Step 6: View output..........................................................................................................65Step 7: Exit privileged EXEC mode with the exit command...........................................65Step 8: Press the Enter key to enter user EXEC mode.....................................................65Step 9: Type an abbreviated IOS command.....................................................................65Step 10: Press the Tab key after an abbreviated command to use auto-complete...........66Step 11: Enter IOS commands in the correct mode.........................................................66

Task 5: Perform Basic Configuration of Router R1.............................................................66Step 1: Establish a HyperTerminal session to router R1..................................................66Step 2: Enter privileged EXEC mode..............................................................................66Step 3: Enter global configuration mode.........................................................................66Step 4: Configure the router name as R1.........................................................................67Step 5: Disable DNS lookup with the no ip domain-lookup command...........................67Step 6: Configure an EXEC mode password...................................................................67Step 7: Remove the enable password...............................................................................67Step 8: Configure a message-of-the-day banner using the banner motd command.........68Step 9: Configure the console password on the router.....................................................68Step 10: Configure the password for the virtual terminal lines.......................................68Step 11: Configure the FastEthernet 0/0 interface with the IP address 192.168.1.1/24.. 68Step 12: Use the description command to provide a description for this interface..........69Step 13: Configure the Serial0/0/0 interface with the IP address 192.168.2.1/24...........69Step 14: Use the description command to provide a description for this interface..........69Step 15: Use the end command to return to privileged EXEC mode...............................69

Task 6: Perform Basic Configuration of Router R2.............................................................70Step 1: For R2, repeat Steps 1 through 10 from Task 5...................................................70Step 2: Configure the Serial 0/0/0 interface with the IP address 192.168.2.2/24............70Step 3: Use the description command to provide a description for this interface............70Step 4: Configure the FastEthernet 0/0 interface with the IP address 192.168.3.1/24.. . .70Step 5: Use the description command to provide a description for this interface............70Step 6: Use the end command to return to privileged EXEC mode.................................70

Task 7: Configure IP Addressing on the Host PCs..............................................................71Step 1: Configure the host PC1........................................................................................71Step 2: Configure the host PC2........................................................................................71

Task 8: Examine Router show Commands..........................................................................71

Page 5 of 210

Page 6: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 1: Examine the show running-config command......................................................71Step 2: Examine the show startup-config command........................................................72Step 3: Examine the show interfaces command...............................................................74Step 4: Examine the show version command..................................................................74Step 5: Examine the show ip interface brief command....................................................75

Task 9: Using ping...............................................................................................................76Step 1: Use the ping command to test connectivity between the R1 router and PC1......76Step 2: Repeat the ping from R1 to PC1..........................................................................76Step 3: Send an extended ping from R1 to PC1...............................................................76Step 4: Send a ping from PC1 to R1................................................................................77Step 5: Send an extended ping from PC1 to R1...............................................................77

Task 10: Using Traceroute...................................................................................................77Step 1: Use the traceroute command at the R1 privileged EXEC prompt to discover the path that a packet will take from the R1 router to PC1....................................................78Step 2: Use the tracert command at the Windows command prompt to discover the path that a packet will take from the R1 router to PC1............................................................78

Lab 11: Cabling a Network and Basic Router Configuration (Hardware Equipment)............79Topology Diagram..............................................................................................................79Addressing Table................................................................................................................79Learning Objectives.............................................................................................................79Scenario................................................................................................................................79Task 1: Cable the Ethernet Links of the Network................................................................80

Step 1: Connect the R1 Router to the S1 Switch.............................................................80Step 2: Connect PC1 to the S1 Switch.............................................................................80Step 3: Connect PC2 to the R2 Router.............................................................................80

Task 2: Cable the Serial Link between R1 and R2 Routers.................................................80Step 1: Create a null serial cable to connect the R1 router to the R2 router....................81Step 2: Connect the DCE end of the null serial cable to the Serial 0/0/0 interface of the R1 router, and the DTE end of the null serial cable to the Serial 0/0/0 interface of the R2 router................................................................................................................................81

Task 3: Establish a Console connection to R1 Router.........................................................81Step 1: Examine the router and locate the RJ-45 connector labeled Console..................82Step 2: Examine PC1 and locate a 9-pin male connector serial port...............................82Step 3: Locate the console cable......................................................................................82Step 4: Connect the console cable to the router and PC..................................................82Step 5: Test router connection..........................................................................................82

Task 4: Erase and Reload the Routers..................................................................................82Step 1: Using the HyperTerminal session established in Task 3, enter privileged EXEC mode on R1......................................................................................................................82Step 2: Erase the configuration........................................................................................82Step 3: Reload the configuration......................................................................................83Step 4: Establish a HyperTerminal Session to R2...........................................................83

Task 5: Perform Basic Configuration of Router R1.............................................................83Step 1: Establish a HyperTerminal session to router R1..................................................83Step 2: Enter privileged EXEC mode..............................................................................83Step 3: Enter global configuration mode.........................................................................83Step 4: Configure the router name as R1.........................................................................83Step 5: Disable DNS lookup with the no ip domain-lookup command...........................84Step 6: Configure an EXEC mode password...................................................................84Step 7: Remove the enable password...............................................................................84

Page 6 of 210

Page 7: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 8: Configure a message-of-the-day banner using the banner motd command.........84Step 9: Configure the console password on the router.....................................................85Step 10: Configure the password for the virtual terminal lines.......................................85Step 11: Configure the FastEthernet 0/0 interface with the IP address 192.168.1.1/24.. 85Step 12: Use the description command to provide a description for this interface..........85Step 13: Configure the Serial0/0/0 interface with the IP address 192.168.2.1/24...........85Step 14: Use the description command to provide a description for this interface..........86Step 15: Use the end command to return to privileged EXEC mode...............................86

Task 6: Perform Basic Configuration of Router R2.............................................................86Step 1: For R2, repeat Steps 1 through 10 from Task 6...................................................86Step 2: Configure the Serial 0/0/0 interface with the IP address 192.168.2.2/24............86Step 3: Use the description command to provide a description for this interface............87Step 4: Configure the FastEthernet 0/0 interface with the IP address 192.168.3.1/24.. . .87Step 5: Use the description command to provide a description for this interface............87Step 6: Use the end command to return to privileged EXEC mode.................................87

Task 7: Configure IP Addressing on the Host PCs..............................................................87Step 1: Configure the host PC1........................................................................................87Step 2: Configure the host PC2........................................................................................87

Task 8: Examine Router Show Commands.........................................................................87Step 1: Examine the show running-config command......................................................88Step 2: Examine the show startup-config command........................................................88Step 3: Examine the show interfaces command...............................................................88Step 4: Examine the show version command..................................................................89Step 5: Examine the show ip interface brief command....................................................89

Task 9: Using ping...............................................................................................................89Step 1: Use the ping command to test connectivity between the R1 router and PC1......89Step 2: Repeat the ping from R1 to PC1..........................................................................90Step 3: Send an extended ping from R1 to PC1...............................................................90Step 4: Send a ping from PC1 to R1................................................................................90Step 5: Send an extended ping from PC1 to R1...............................................................90

Task 10: Using Traceroute...................................................................................................91Step 1: Use the traceroute command at the R1 privileged EXEC prompt to discover the path that a packet will take from the R1 router to PC1....................................................91Step 2: Use the tracert command at the Windows command prompt to discover the path that a packet will take from the R1 router to PC1............................................................91

Task 11: Create a start.txt File.............................................................................................91Step 1: View the running configuration of the router using the show running-config command..........................................................................................................................92Step 2: Copy the command output...................................................................................92Step 3: Paste output in Notepad.......................................................................................92Step 4: Edit commands.....................................................................................................92Step 5: Save the open file in Notepad to start.txt.............................................................93

Task 12: Load the start.txt File onto R1 Router...................................................................93Step 1: Erase the current startup configuration of R1......................................................93Step 2: When the prompt returns, issue the reload command..........................................93Step 3: Enter global configuration mode.........................................................................94Step 4: Copy the commands.............................................................................................94Step 5: From the HyperTerminal Edit menu, choose Paste to Host.................................94Step 6: Verify the running configuration.........................................................................94

Lab 12: IPv4 Address Subnetting (part 1)................................................................................95

Page 7 of 210

Page 8: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Learning Objectives.............................................................................................................95Background..........................................................................................................................95Scenario................................................................................................................................95Task 1: For a given IP address, Determine Network Information.......................................95

Step 1: Translate Host IP address and network mask into binary notation......................95Step 2: Determine the network address............................................................................95Step 3: Determine the broadcast address for the network address...................................96

Task 2: Challenge.................................................................................................................97Lab 13: IPv4 Address Subnetting (part 2)................................................................................99

Learning Objectives.............................................................................................................99Background..........................................................................................................................99Scenario..............................................................................................................................100Task 1: For a Given IP Address and Subnet Mask, Determine Subnet Information.........100

Step 1: Translate host IP address and subnet mask into binary notation.......................100Step 2: Determine the network (or subnet) where this host address belongs.................100Step 3: Determine which bits in the address contain network information and which contain host information................................................................................................101Step 4: Determine the bit ranges for subnets and hosts.................................................101Step 5: Determine the range of host addresses available on this subnet and the broadcast address on this subnet.....................................................................................................102Step 6: Determine the number of subnets......................................................................103Step 7: Determine the number usable hosts per subnet..................................................103Step 8: Final Answers....................................................................................................104

Task 2: Challenge...............................................................................................................104Lab 14: Troubleshooting a Small Network (Packet Tracer)..................................................107

Learning Objectives...........................................................................................................107Scenario..............................................................................................................................107Task 1: Examine the Logical LAN Topology....................................................................107Task 2: Cable the Routers..................................................................................................109Task 3: Configure the Host Computers..............................................................................109

Step 1: Configure host computers..................................................................................109Task 4: Load the Router with the Supplied Scripts............................................................109Task 5: Identify Connectivity Problems............................................................................110

Step 1: Use the ping command to test network connectivity.........................................110Task 6: Troubleshoot Network Connections......................................................................110

Step 1: Begin troubleshooting at the host connected to the BRANCH router...............110Step 2: Examine the router to find possible configuration errors..................................110Step 3: Use the necessary commands to correct the router configuration.....................111Step 4: View a summary of the status information........................................................111Step 5: Verify the logical configuration.........................................................................111

Lab 15: Configuring and Testing the Lab Network (Packet Tracer).....................................112Topology Diagram................................................................................................................112

Learning Objectives...........................................................................................................112 Build, test, and configure the entire lab network...........................................................112 Integrate skills from throughout the course...................................................................112 Analyse the events involved in requesting a web page (DNS, ARP, HTTP, TCP, IP, Ethernet, HDLC)....................................................................................................................112 Analyse the events involved in tracing the route to the web server (DNS, UDP, ARP, ICMP, IP, Ethernet, HDLC)...................................................................................................112

Background........................................................................................................................113

Page 8 of 210

Page 9: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 1: Plan........................................................................................................................113Task 2: Build and Configure the Network.........................................................................114Task 3: Test and Analyse...................................................................................................115Task 4: Reflection - Putting it All Together.......................................................................116

Lab 16: Subnetting (Packet Tracer).......................................................................................117Learning Objectives...........................................................................................................117Scenario..............................................................................................................................118Task 1: Examine the Network Requirements.....................................................................118Task 2: Design an IP Addressing Scheme.........................................................................118

Step 1: Subnet the 192.168.9.0 network into the appropriate number of subnets..........118Step 2: Assign the subnets to the network shown in the Topology Diagram................119

Task 3: Assign IP Addresses to the Network Devices.......................................................120Step 1: Assign addresses to the HQ router.....................................................................120Step 2: Assign addresses to the BRANCH1 router........................................................120Step 3: Assign addresses to the BRANCH2 router........................................................120Step 4: Assign addresses to the host PCs.......................................................................120

Task 4: Test the Network Design.......................................................................................121Task 5: Reflection..............................................................................................................121

Lab 17: VLSM Variable-Length Subnet Mask......................................................................122What is VLSM...................................................................................................................123The Box Method................................................................................................................123VLSM Addressing Part 1...................................................................................................126

Problem 1 (Example).....................................................................................................126Problem 2 (Example).........................................................................................................127Problem 3...........................................................................................................................128Problem 4...........................................................................................................................129Problem 5...........................................................................................................................130Problem 6...........................................................................................................................131Problem 7...........................................................................................................................132Problem 8...........................................................................................................................133

VLSM Addressing Part 2.......................................................................................................135Problem 9 (Example).........................................................................................................135Problem 10 (Example).......................................................................................................136Problem 11.........................................................................................................................136Problem 12.........................................................................................................................137Problem 13.........................................................................................................................137Problem 14.........................................................................................................................138Problem 15.........................................................................................................................139Problem 16.........................................................................................................................139

Lab 18: Basic VLSM Calculation and Addressing Design....................................................143Learning Objectives...........................................................................................................143Scenario..............................................................................................................................144Task 1: Examine the Network Requirements.....................................................................144Task 2: Design an IP Addressing Scheme.........................................................................145

Step 1: Determine the subnet information for the largest network segment or segments.........................................................................................................................................145Step 2: Assign subnets to HQ LANs..............................................................................145Step 3: Determine the subnet information for the next largest network segment or segments.........................................................................................................................145Step 4: Assign subnet to BRANCH1 LANs..................................................................146

Page 9 of 210

Page 10: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 5: Determine the subnet information for the next largest network segment or segments.........................................................................................................................146Step 6: Assign subnets to BRANCH2 LANs.................................................................146Step 7: Determine the subnet information for the links between the routers.................147Step 8: Assign subnets to links.......................................................................................147

Task 3: Assign IP Addresses to the Network Devices.......................................................148Step 1: Assign addresses to the HQ router.....................................................................148Step 2: Assign addresses to the Branch1 router.............................................................148Step 3: Assign addresses to the Branch2 router.............................................................149

Lab 19: Basic Static Route Configuration (Hardware Equipment).......................................150Learning Objectives...........................................................................................................150Scenario..............................................................................................................................151Task 1: Cable, Erase, and Reload the Routers...................................................................151

Step 1: Cable a network that is similar to the one in the Topology Diagram................151Step 2: Clear the configuration on each router...............................................................151

Task 2: Perform Basic Router Configuration.....................................................................151Step 1: Use global configuration commands.................................................................152Step 2: Configure the console and virtual terminal line passwords on each of the routers.........................................................................................................................................152Step 3: Add the logging command to the console and virtual terminal lines................152Step 4: Add the exec-timeout command to the console and virtual terminal lines........153

Task 3: Interpreting Debug Output....................................................................................154Step 1: On R1 from privileged EXEC mode, enter the debug ip routing command......154Step 2: Enter interface configuration mode for R1’s LAN interface.............................154Step 3: Enter the command necessary to install the route in the routing table..............155Step 4: Enter the command to verify that the new route is now in the routing table.....156Step 5: Enter interface configuration mode for R1’s WAN interface connected to R2.156Step 6: Enter the clock rate command on R1.................................................................156Step 7: Enter the command necessary to ensure that the interface is fully configured..157Step 8:.............................................................................................................................157Step 9: Enter the command necessary to ensure that the interface is fully configured..158Step 10: Enter the command to verify that the new route is now in the routing table for R1 and R2.......................................................................................................................159Step 11: Turn off debugging on both routers using either no debug ip routing or simply, undebug all.....................................................................................................................159

Task 4: Finish Configuring Router Interfaces....................................................................160Step 1: Configure Remaining R2 Interfaces..................................................................160Step 2: Configure R3 Interfaces.....................................................................................160

Task 5: Configure IP Addressing on the Host PCs............................................................160Step 1: Configure the host PC1......................................................................................160Step 2: Configure the host PC2......................................................................................160Step 3: Configure the host PC3......................................................................................160

Task 6: Test and Verify the Configurations.......................................................................161Step 1: Test connectivity................................................................................................161Step 2: Use the ping command to test connectivity between directly connected routers.........................................................................................................................................161Step 3: Use ping to check connectivity between devices that are not directly connected.........................................................................................................................................162

Task 7: Gather Information................................................................................................162Step 1: Check status of interfaces..................................................................................162

Page 10 of 210

Page 11: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 2: View the routing table information for all three routers....................................163Task 8: Configure a Static Route Using a Next-Hop Address...........................................164

Step 1: To configure static routes with a next-hop specified, use the following syntax:........................................................................................................................................164Step 2: View the routing table to verify the new static route entry................................165Step 3: Use ping to check connectivity between the host PC3 and the host PC2..........165Step 4: On the R2 router, configure a static route to reach the 192.168.2.0 network....166Step 5: View the routing table to verify the new static route entry................................166Step 6: Use ping to check connectivity between the host PC3 and the host PC2..........166

Task 9: Configure a Static Route Using an Exit Interface.................................................166Step 1: On the R3 router, configure a static route..........................................................167Step 2: View the routing table to verify the new static route entry................................167Step 3: On the R2 router, configure a static route..........................................................168Step 4: View the routing table to verify the new static route entry................................168Step 5: Use ping to check connectivity between the host PC2 and PC1........................169

Task 10: Configure a Default Static Route........................................................................169Step 1: Configure the R1 router with a default route.....................................................169Step 2: View the routing table to verify the new static route entry................................170Step 3: Use ping to check connectivity between the host PC2 and PC1........................170

Task 11: Configure a Summary Static Route.....................................................................170Step 1: Configure the summary static route on the R3 router........................................171Step 2: Verify that the summary route is installed in the routing table..........................171Step 3: Remove static routes on R3...............................................................................172Step 4: Verify that the routes are no longer in the routing table....................................172Step 5: Use ping to check connectivity between the host PC3 and PC1........................172

Task 12: Summary, Reflection, and Documentation.........................................................173Task 13: Clean Up..............................................................................................................174

Lab 20: Basic RIP Configuration (Packet Tracer).................................................................175Learning Objectives...........................................................................................................175Scenarios............................................................................................................................175Scenario A: Running RIPv1 on Classful Networks...........................................................176Task 1: Prepare the Network..............................................................................................176

Step 1: Cable a network that is similar to the one in the Topology Diagram................176Step 2: Clear any existing configurations on the routers...............................................176

Task 2: Perform Basic Router Configurations...................................................................177Task 3: Configure and Activate Serial and Ethernet Addresses........................................177

Step 1: Configure interfaces on R1, R2, and R3............................................................177Step 2: Verify IP addressing and interfaces...................................................................177Step 3: Configure Ethernet interfaces of PC1, PC2, and PC3.......................................177Step 4: Test the PC configuration by pinging the default gateway from the PC...........177

Task 4: Configure RIP.......................................................................................................178Step 1: Enable dynamic routing.....................................................................................178Step 2: Enter classful network addresses.......................................................................178Step 3: Configure RIP on the R2 router using the router rip and network commands.. 179Step 4: Configure RIP on the R3 router using the router rip and network commands.. 179

Task 5: Verify RIP Routing...............................................................................................179Step 1: Use the show ip route command to verify that each router has all of the networks in the topology entered in the routing table...................................................................179Step 2: Use the show ip protocols command to view information about the routing processes........................................................................................................................181

Page 11 of 210

Page 12: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 3: Use the debug ip rip command to view the RIP messages being sent and received..........................................................................................................................182Step 4: Discontinue the debug output with the undebug all command..........................182

Scenario B: Running RIPv1 with Subnets and Between Classful Networks.....................183Task 1: Make Changes between Scenario A and Scenario B............................................183

Step 1: Change the IP addressing on the interfaces as shown in the Topology Diagram and the Addressing Table...............................................................................................183Step 2: Verify that routers are active..............................................................................184Step 3: Remove the RIP configurations from each router.............................................184

Task 2: Configure RIP.......................................................................................................185Step 1: Configure RIP routing on R1 as shown below..................................................185Step 2: Configure R1 to stop sending updates out the FastEthernet0/0 interface..........185Step 3: Configure RIP routing on R2 as shown below..................................................185Step 4: Configure RIP routing on R3 as shown below..................................................186

Task 3: Verify RIP Routing...............................................................................................186Step 1: Use the show ip route command to verify that each router has all of the networks in the topology in the routing table................................................................................186Step 2: Verify that all necessary interfaces are active....................................................187Step 3: View the RIP messages being sent and received...............................................188Step 4: Discontinue the debug output with the undebug all command..........................188

Scenario C: Running RIPv1 on a Stub Network................................................................190Background........................................................................................................................190Task 1: Make Changes between Scenario B and Scenario C.............................................191

Step 1: Remove network 192.168.4.0 from the RIP configuration for R2....................191Step 2: Completely remove RIP routing from R3..........................................................191

Task 2: Configure the Static Route on R3 for the 172.30.0.0/16 network.........................191Task 3: Configure a Default Static Route on R2................................................................192

Step 1: Configure R2 to send default traffic to R3.........................................................192Step 2: Configure R2 to send default static route information to R1.............................192

Task 4: Verify RIP Routing...............................................................................................192Step 1: Use the show ip route command to view the routing table on R2 and R1.........192Step 2: View the RIP updates that are sent and received on R1 with the debug ip rip command........................................................................................................................193Step 3: Discontinue the debug output with the undebug all command..........................193Step 4: Use the show ip route command to view the routing table on R3.....................193

Task 5: Document the Router Configurations...................................................................193Lab 21 - Configuring VLANs and Trunking (Hardware Equipment)...................................195

Task 1: Build the Network and Configure Basic Device Settings.....................................196Step 1: Cable the network as shown in the topology.....................................................196Step 2: Initialize and reload the switches as necessary..................................................196Step 3: Configure basic settings for each switch...........................................................196Step 4: Configure PC hosts............................................................................................197Step 5: Test connectivity................................................................................................197

Task 2: Create VLANs and Assign Switch Ports...............................................................197Step 1: Create VLANs on the switches..........................................................................197Step 2: Assign VLANs to the correct switch interfaces.................................................199

Task 3: Maintain VLAN Port Assignments and the VLAN Database...............................201Step 1: Assign a VLAN to multiple interfaces...............................................................201Step 2: Remove a VLAN assignment from an interface................................................201

Step 3: Remove a VLAN ID from the VLAN database.....................................................201

Page 12 of 210

Page 13: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 4: Configure an 802.1Q Trunk Between the Switches..............................................203Step 1: Use DTP to initiate trunking on F0/1.................................................................203Step 2: Manually configure trunk interface F0/1...........................................................205

Task 5: Delete the VLAN Database...................................................................................206Step 1: Determine if the VLAN database exists............................................................206Step 2: Delete the VLAN database................................................................................206Task 6: Reflection..........................................................................................................207

Page 13 of 210

Page 14: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Introduction

The main aim of this laboratory workbook is to keep a record of your laboratory experiments associated with CCE1030 Computer Networking. These experiments are designed to consolidate concepts covered in lectures, to give practical insight into computer networking and to prepare you in experimental techniques, analysis and design of networks.

This workbook contains a number of experiments covering topics taken in lectures and you are expected to complete all tasks. You are expected to record within this workbook all experiments performed in the laboratory. The laboratory tutor is to sign off each experiment completed by you which will serve as evidence of your laboratory work and attendance. Admittance to lab tests will be subject to lab session attendance.

Within these laboratory experiments, you will be introduced to networking tools like Packet Tracer and real equipment like routers and switches which by the end of the course you are expected to become proficient in their use to enable you to progress to the following year of your study programme.

As part of your learning process, you will practice using Packet Tracer simulation tool, it is a networking learning tool that supports a wide range of physical and logical simulations. It also provides visualization tools to help you understand the internal workings of a network.

The pre-made Packet Tracer activities consist of network simulations, activities, and challenges that provide a broad range of learning experiences. These tools will help you develop an understanding of how data flows in a network.

The completion of the various tasks within the experiments in this laboratory workbook carry weight according to their relative standing within the module material. These will be marked using the Student Observable Behaviour (SOB) framework. SOBs are classified into 3 categories; Threshold, Typical and Excellent. It is imperative that you manage to complete all Threshold tasks within the workbook (numbering 40), in order to pass the SOBs. However, you are advised to complete successfully all Threshold and Typical SOBs as well as aim to finish the Excellent.

In this course, you will learn both the practical and conceptual skills that build the foundation for understanding basic networking. You will be expected to experiment using not just simulation tools like Packet Tracer but also to replicate those experiments on real equipment which will be available for you in the laboratory. You will at the end of each experiment make a reflective comparison between your results in both Packet Tracer and real equipment. You will do the following:

•Be introduced to the two major models used to plan and implement networks: OSI and TCP/IP

•Gain an understanding of the "layered" approach to networks

Page 14 of 210

Page 15: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

•Examine the OSI and TCP/IP layers in detail to understand their functions and services

•Become familiar with the various network devices and network addressing schemes

•Discover the types of media used to carry data across the network

•Configure and troubleshoot basic operations of a small switched network

•Configure and verify static routing and default routing

•Configure and troubleshoot basic operations of routers in a small routed network

•Configure and troubleshoot basic operations of routing protocols in a small routed network

By the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. They will also be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1.

Page 15 of 210

Page 16: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 1: My First Packet Tracer Lab

Introduction

Welcome to Packet Tracer. Research has shown that users who master a few basic tasks when first starting to use Packet Tracer get much more out of the software. This lab is designed to familiarize a user with Packet Tracer's features. This activity should take approximately 30 minutes to complete. Use these directions to go through the lab yourself, or view the animated tutorial version of the lab.

Lab Objectives

Viewing Help and Tutorials Creating Your First Network Sending Simple Test Messages in Realtime Mode Establishing a Web Server Connection Using the PC’s Web Browser Capturing Events and Viewing Animation in Simulation Mode Looking Inside Packets in Simulation Mode Viewing Device Tables and Resetting the Network Reviewing Your New Skills

Important Terminology

1. ICMP ping: command consisting of an echo request message from one device to another, and the returning echo reply.

2. IP address: 32-bit address assigned to devices as identification in the network.3. Ethernet: one of the most common LAN standards for hardware, communication and

cabling.4. Fast Ethernet Interface: 100 Mbps Ethernet port. In Packet Tracer, a GUI may be used

to configure such interfaces.5. OSI model: 7-layer framework for looking at network protocols and devices,

consisting of the application, presentation, session, transport, network, data link, and physical layers.

6. PDU: protocol data unit, a grouping of data appropriate to a given layer in the OSI model.

7. Packets: OSI Layer 3 protocol data units. Represented by envelopes in Packet Tracer Simulation Mode.

8. Device Tables: includes ARP, switching, and routing tables. They contain information regarding the devices and protocols in the network.

9. ARP Table: Address Resolution Protocol (ARP) table, stores pairings of IP Addresses and Ethernet MAC addresses.

Page 16 of 210

Page 17: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

10. Scenario: one topology with a set of PDUs placed in the network to be sent at specific times. Using different scenarios, experiment with different combinations of packets using the same base topology.

Task 1: Viewing Help and Tutorials

1. Launch Packet Tracer.2. Open the help content by clicking Help > Contents on the Menu bar. You can also

click the question mark on the Main toolbar. Another option is the F1 shortcut key.3. The menu will always be visible on the left side of the window while browsing

through the help files. Skim through the help sections to get an idea of the functionality of Cisco Packet Tracer.

4. The What's New section under Introduction provides an overview of features that have been added to Packet Tracer.

5. Pay close attention to the Interface Overview section under Getting Started to familiarize yourself quickly to the Packet Tracer interface.

6. Browse the Tutorials section as well.7. Open the Interface Overview tutorial to learn the basics of the Packet Tracer graphical

user interface. Note: Some browsers may prevent the tutorial from playing. Configure your browser to allow active content to enable the viewing of the tutorial.

8. When the first caption appears, as shown below, click the Pause button in the playback controls.

9. Click the Forward button to skip to the next caption. Then click Pause again. Click the Back button to view the previous caption.

10. Continue viewing the tutorial by pressing the Play button. Parts of the tutorial can also be skipped by dragging the slider to the right. If needed, click the Rewind button to restart the tutorial.

11. Click Exit to close the tutorial window. Close the help content as well.

Congratulations on learning more about resources that will help you get the most out of Packet Tracer.

Page 17 of 210

Page 18: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Creating a First Network

1. Start creating a network by first selecting the End Devices. Add a Generic PC and a Generic Server to the workspace.

2. Under Connections, select the Copper Straight-through cable (solid black line) and connect the devices with it. The red lights on the link indicate that the connection is not working. Now, use the Delete tool to remove the Copper Straight-through cable, and use a Copper Cross-over cable (dashed line) instead. The lights should turn green at this point. If the mouse pointer is held over either device, the link status will be shown as “Up.” The network should look similar to this:

3. Click on the PC. While paying attention to the link lights, turn the power on, off, and on again. Follow the same steps for the server. The link lights turn red when the device is off. This means that the link is down or is not working. The link lights turn green when the device is turned back on.

4. Try all three ways to learn about the devices. First, mouse over the devices to see basic configuration information about them. Second, click on each device with the Select tool to show the device configuration window, which provides several ways to configure the device. Third, use the Inspect tool to view the tables the network device will build as it learns about the network around it. In this example, open the ARP table. Since the devices have not been configured yet, the ARP tables are empty. Always remember to close the windows after viewing them or they will clutter the workspace.

5. Open the PC configuration window and change the settings using the Config tab. Change the display name to Client and set the DNS server to 192.168.0.105. Under Interface, click FastEthernet and set the IP address as 192.168.0.110. Packet Tracer automatically calculates other parameters. Make sure that the Port Status box is checked. For future reference, note that other Ethernet interface settings, such as bandwidth, duplex, MAC address, and subnet mask can be modified using this window.

6. Go to the Desktop Tab and click on IP Configuration. Notice that the IP address, subnet mask and DNS server can be changed here as well.

7. Open the Server configuration window and go to the Config tab. Change the display name to Web Server. Click FastEthernet and set the IP address as 192.168.0.105.

Page 18 of 210

Page 19: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Make sure that the Port Status is also on. Click DNS and set the domain name as www.firstlab.com. Set the IP address as 192.168.0.105 and click Add. Finally, check to make sure that the service for DNS is on.

8. Reposition the network devices by dragging them to a new location. Add a network description by using the “i” button on the upper right corner. Then add some text labels within the Logical Workspace by using the Place Note tool.

9. Load a background grid using the Set Tiled Background button.10. Save your work using the File > Save As option and create a meaningful filename.

Task 3: Sending Simple Test Messages in Realtime Mode

1. Start by opening the file saved in the last section.2. Notice that the file opens in Realtime Mode. Use the Add Simple PDU tool to send a

simple one-time ping message, called an echo request, to the server. The server responds with an echo reply because all devices have properly configured IP address settings.

3. Scroll up and down the User Created Packet Window to see the different capabilities of this ping message, including an indication that the ping was successful.

4. Toggle the PDU List Window to see a larger display of this message. One or more of these messages can be saved as a scenario. Scenario 0 is displayed when starting. Label this first scenario with an “i” note. Different scenarios allow the use of the same topology for experiments with different groupings of user created packets.

5. Click New to create a new scenario. New scenarios will initially be blank.6. Add two packets using the Simple PDU tool, a PDU from the PC to the Server and a

different PDU from the Server to the PC. Then add an “i” note describing the scenario, to complete Scenario 1. An example is shown below:

Page 19 of 210

Threshold SOB 01

Page 20: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

7. Several scenarios can be saved with a single network. Alternate between Scenario 0 and 1.

8. Now, remove Scenario 0 using the Delete button.9. Scenario 1 is now visible. Go to the last column in the User Created Packet Window

and double-click (delete) to remove a PDU.10. Delete the whole scenario. Notice that the scenario list went back to the default

Scenario 0.

Task 4: Establishing a Web Server Connection Using the PC’s Web Browser

1. Open the file saved from the previous section.2. Click on the PC to view the configuration window.3. Select the Desktop tab, and then click Web Browser. Type in www.firstlab.com as the

URL and click the Go button. The Packet Tracer welcome page, shown below, appears, indicating that the web connection has been successfully established.

4. Clear the URL, type www and click Go. Since the address entered is not complete, a “Host Name Unresolved” message appears.

5. Type 192.168.0.105 as the URL entry and click on Go. Notice that the Packet Tracer welcome page appears again. This is because the Server IP address can also be used to establish a web connection.

6. Close the window and try the same steps in Simulation Mode. In this mode, the user controls time, so the network can be viewed running at a slower pace, allowing observation of the paths packets take and inspection of packets in detail (packet tracing!).

7. Select the PC again and go to the Web Browser in the Desktop tab. Type www.firstlab.com as the URL again and click Go. The welcome page should not appear right away.

8. Switch to the main interface of Packet Tracer without closing the PC configuration window. Notice that a DNS packet is added to the event list.

9. Click Auto Capture/Play or repeatedly click the Capture/Forward button until the HTTP packet appears on the PC. Go back to the PC configuration window. The Packet Tracer welcome page is now shown.

10. Close the PC configuration window.

Page 20 of 210

Threshold SOB 02

Page 21: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 5: Capturing Events and Viewing Animations in Simulation Mode

1. Open the previously saved file.2. In Realtime Mode, send a simple PDU from the PC to the Server.3. Delete the PDU by using the method learned in the previous section.4. Switch to Simulation Mode.5. Click Edit Filters and click All/None to uncheck all fields. Then click ICMP to only

view ICMP packets in the animation.6. Add a simple PDU from the PC to the Server. Notice that the newly created PDU is

added to the User Created PDU List. This packet has been captured as the first event in the event list and a new packet icon (envelope) appears in the workspace. The eye icon to the left of the event list indicates that this packet is currently displayed.

7. Click the Capture/Forward button once. This simulates a network sniffing program, capturing the next event that occurs on the network. Note that after clicking Capture/Forward, the packet in the workspace moves from one device to another (this is the ICMP echo request message from the PC to the Server). Another event is added in the event list – this reflects the change in the workspace. The first time through an animation, the meaning of the Capture/Forward is capture; after resetting the simulation, the meaning is forward.

8. Adjust the speed of the animation by dragging the Play Speed slider to the right making it go faster. Dragging the speed slider in the opposite direction (to the left) will slow down the animation.

9. Click the Capture/Forward button a second time. This captures the next network event (this is the echo reply from the Server to the PC, shown as successful with a green check mark on the envelope).

10. Click Capture/Forward button again. The Server has already sent an echo reply to the PC therefore, there are no more ICMP events left to capture.

Page 21 of 210

Threshold SOB 03

Page 22: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 6: Looking Inside Packets in Simulation Mode

1. Continuing from the last activity, click Reset Simulation. This clears the entries in the event list except for the original packet.

2. Select the packet envelope on the workspace to show the PDU Information window like the one shown in the screenshot below. This window contains the OSI Model tab, which shows how the packet is processed at each layer of the OSI model by the current device. Close this window, noting that this packet is indicated in the event list by the eye icon. The whole row in the event list is also highlighted. Clicking on the colour square in the Info column is equivalent to clicking directly on the packet envelope (try it!).

3. Use the Next Layer and Previous Layer buttons to see details of the packet processing at the relevant OSI layers. Note that only the Out Layers can be viewed in the case of this original echo request message.

4. Click on the Outbound PDU Details tab. This tab shows exactly what makes up the PDU headers. It is organized into header type and the individual fields in each header.

5. Close the PDU Information window. Click on Capture/Forward button once.6. Click on the packet in the workspace again to open the PDU Information window.

Notice that this time, information regarding both the In Layers and Out Layers can be viewed.

7. Click on the Inbound PDU Details tab. This shows the details of the inbound echo request packet from the PC to the Server. The Outbound PDU Details tab, shows similar information, but for the echo reply packet from the Server to the PC.

8. Click on Reset Simulation again. Now click on Auto Capture/Play. The echo request and echo reply are automatically captured. Click on the Back Button to rewind the

Page 22 of 210

Threshold SOB 04

Page 23: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

animation one step at a time. Now click on the Capture/Forward button to forward the packet through the animation. Note the change in the event list and the workspace. Remember that at any time, a PDU Information Window can be opened by clicking directly on the envelope on the workspace, or by clicking the Info column in the Event List.

9. Click on the Back Button twice to rewind the animation. Now click Auto Capture/Play and the packet animation will automatically occur.

Task 7: Viewing Device Tables and Resetting the Network

1. Open the file saved from the previous section.2. Open the ARP Tables for both devices by clicking them with the Inspect tool. The

ARP tables always appear on the same spot. Reposition them to make them both visible. You can also resize the tables for better viewing.

3. In Realtime Mode, send a simple PDU from the PC to the Server. Notice that the ARP tables are filled in automatically, as shown here:

4. Delete the PDU using the method covered in the previous sections. Notice that the entries in the ARP tables are NOT cleared. ARP entries for both devices have already been learned. Deleting the user created PDUs does not reset events what has already occurred in the network.

5. Click Power Cycle Devices. ARP tables are cleared because the Power Cycle Devices button turns the devices off and back on again therefore, losing temporary information like the ARP table entries.

6. Go to Simulation Mode. In the event list filters, make sure that ICMP and ARP are checked so that you can view ICMP and ARP packets in the animation.

7. Create a new simple PDU from the Server to the PC.8. Notice that since the devices were power cycled earlier, the ARP tables are empty.

ARP request packets need to be issued before the ICMP ping packets, so that the devices in the network can learn about each other. Click on Auto Capture/Play to watch the animation.

Page 23 of 210

Page 24: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

9. Click Reset Simulation. Notice that even though the event list is cleared (except for the user created PDU), the ARP tables remain full. Click Auto Capture/Play. This time, since the ARP tables are full, there are no new ARP packets issued.

10. Click Power Cycle Devices. Doing so will empty the tables. Notice that new ARP request packets appear automatically in the event list.

Task 8: Reviewing Your New Skills

Single-clicking on the Delete button removes the entire scenario including all the PDUs associated with it.

Double-clicking on (delete) in the far right column in the PDU List window deletes individual PDUs.

The Reset Simulation button clears all entries in the Event List, except for User Created PDUs, and allows the animation to restart. This, however, does not reset the device tables.

The Power Cycle Devices button turns all of the devices in the network off and on so the tables that the devices built are lost along with configurations and other information not saved.

Saving work periodically prevents lost configurations and state changes in the network.

Congratulations on being ready to build and analyse many different networks in Packet Tracer! Be aware that there are many other features that were not covered in this lab. To learn more, please view the other available tutorials and review the help files. Have Fun!

Page 24 of 210

Typical SOB 05

Page 25: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 2: Investigating the TCP/IP and OSI Models in Action (Packet Tracer)

Objectives

Part 1: Examine HTTP Web TrafficPart 2: Display Elements of the TCP/IP Protocol Suite

Background

This simulation activity is intended to provide a foundation for understanding the TCP/IP protocol suite and the relationship to the OSI model. Simulation mode allows you to view the data contents being sent across the network at each layer.

As data moves through the network, it is broken down into smaller pieces and identified so that the pieces can be put back together when they arrive at the destination. Each piece is assigned a specific name (protocol data unit [PDU]) and associated with a specific layer of the TCP/IP and OSI models. Packet Tracer simulation mode enables you to view each of the layers and the associated PDU. The following steps lead the user through the process of requesting a web page from a web server by using the web browser application available on a client PC.

Even though much of the information displayed will be discussed in more detail later, this is an opportunity to explore the functionality of Packet Tracer and be able to visualize the encapsulation process.

Task 1:     Examine HTTP Web Traffic

In Part 1 of this activity, you will use Packet Tracer (PT) Simulation mode to generate web traffic and examine HTTP.

Step 1:     Switch from Realtime to Simulation mode.

In the lower right corner of the Packet Tracer interface are tabs to toggle between Realtime and Simulation mode. PT always starts in Realtime mode, in which

Page 25 of 210

Page 26: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

networking protocols operate with realistic timings. However, a powerful feature of Packet Tracer allows the user to “stop time” by switching to Simulation mode. In Simulation mode, packets are displayed as animated envelopes, time is event driven, and the user can step through networking events.

a.    Click the Simulation mode icon to switch from Realtime mode to Simulation mode.

b.    Select HTTP from the Event List Filters.

1) HTTP may already be the only visible event. Click Edit Filters to display the available visible events. Toggle the Show All/None check box and notice how the check boxes switch from unchecked to checked or checked to unchecked, depending on the current state.

2) Click the Show All/None check box until all boxes are cleared and then select HTTP. Click anywhere outside of the Edit Filters box to hide it. The Visible Events should now only display HTTP

Step 2:     Generate web (HTTP) traffic.

Currently the Simulation Panel is empty. There are six columns listed across the top of the Event List within the Simulation Panel. As traffic is generated and stepped through, events appear in the list. The Info column is used to inspect the contents of a particular event.

Note: The Web Server and Web Client are displayed in the left pane. The panels can be adjusted in size by hovering next to the scroll bar and dragging left or right when the double-headed arrow appears.

a. Click Web Client in the far left pane.b. Click the Desktop tab and click the Web Browser icon to open it.c. In the URL field, enter www.osi.local and click Go.

Because time in Simulation mode is event-driven, you must use the Capture/Forward button to display network events.

d. Click Capture/Forward four times. There should be four events in the Event List.

Look at the Web Client web browser page. Did anything change? __________________________________________________________________________________________________________________________________________

Step 3:     Explore the contents of the HTTP packet.

a.   Click the first coloured square box under the Event List > Info column. It may be necessary to expand the Simulation Panel or use the scrollbar directly below the Event List.

The PDU Information at Device: Web Client window displays. In this window, there are only two tabs (OSI Model and Outbound PDU Details) because this is the start of the transmission. As more events are examined, there will be three tabs displayed, adding a tab for Inbound PDU Details. When an event is the last event in the stream of traffic, only the OSI Model and Inbound PDU Details tabs are displayed.

Page 26 of 210

Page 27: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

b.   Ensure that the OSI Model tab is selected. Under the Out Layers column, ensure that the Layer 7 box is highlighted.

What is the text displayed next to the Layer 7 label? _____________________

What information is listed in the numbered steps directly below the In Layers and Out Layers boxes?__________________________________________________________________________________________________________________________________________

c.  Click Next Layer. Layer 4 should be highlighted. What is the Dest Port value? ___________________

d.  Click Next Layer. Layer 3 should be highlighted. What is the Dest. IP value? ____________________ 

e.  Click Next Layer. What information is displayed at this layer? __________________________________________________________________________________________________________________________________________

f.    Click the Outbound PDU Details tab.

Information listed under the PDU Details is reflective of the layers within the TCP/IP model.

Note: The information listed under the Ethernet II section provides even more detailed information than is listed under Layer 2 on the OSI Model tab. The Outbound PDU Details provides more descriptive and detailed information. The values under DEST MAC and SRC MAC within the Ethernet II section of the PDU Details appear on the OSI Model tab under Layer 2, but are not identified as such.

What is the common information listed under the IP section of PDU Details as compared to the information listed under the OSI Model tab? With which layer is it associated?_______________________________________________________________________________________________________________________________________________________________________________________________________________

What is the common information listed under the TCP section of PDU Details, as compared to the information listed under the OSI Model tab, and with which layer is it associated?_______________________________________________________________________________________________________________________________________________________________________________________________________________

What is the Host listed under the HTTP section of the PDU Details? ___________________________

What layer would this information be associated with under the OSI Model tab? __________________

g.   Click the next coloured square box under the Event List > Info column. Only Layer 1 is active (not greyed out). The device is moving the frame from the buffer and placing it on to the network.

h.   Advance to the next HTTP Info box within the Event List and click the coloured square box. This window contains both In Layers and Out Layers. Notice the direction of the arrow directly under the In Layers column; it is pointing upward,

Page 27 of 210

Page 28: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

indicating the direction the information is travelling. Scroll through these layers making note of the items previously viewed. At the top of the column the arrow points to the right. This denotes that the server is now sending the information back to the client.

Comparing the information displayed in the In Layers column with that of the Out Layers column, what are the major differences?____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

i.    Click the Outbound PDU Details tab. Scroll down to the HTTP section.

What is the first line in the HTTP message that displays?_____________________________________________________________________

j.    Click the last coloured square box under the Info column. How many tabs are displayed with this event and why?_____________________________________________________________________

Task 2: Display Elements of the TCP/IP Protocol Suite

In Part 2 of this activity, you will use the Packet Tracer Simulation mode to view and examine some of the other protocols comprising of the TCP/IP suite.

Step 1: View Additional Events

a.    Close any open PDU information windows.

b.    In the Event List Filters > Visible Events section, click Show All.

What additional Event Types are displayed? __________________________________________________________________________________________________________________________________________

These extra entries play various roles within the TCP/IP suite. If the Address Resolution Protocol (ARP) is listed, it searches MAC addresses. DNS is responsible for converting a name (for example, www.osi.local) to an IP address. The additional TCP events are responsible for connecting, agreeing on communication parameters, and disconnecting the communications sessions between the devices. Currently there are over 35 possible protocols (event types) available for capture within Packet Tracer.

c.   Click the first DNS event in the Info column. Explore the OSI Model and PDU Detail tabs and note the encapsulation process. As you look at the OSI Model tab with Layer 7 highlighted, a description of what is occurring is listed directly below the In Layers and Out Layers (“1. The DNS client sends a DNS query to the DNS

Page 28 of 210

Threshold SOB 06

Page 29: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

server.”). This is very useful information to help understand what is occurring during the communication process.

d.   Click the Outbound PDU Details tab. What information is listed in the NAME: in the DNS QUERY section?

__________________________________________________________________________________________________________________________________________

e.   Click the last DNS Info coloured square box in the event list. Which device is displayed? ___________

What is the value listed next to ADDRESS: in the DNS ANSWER section of the Inbound PDU Details? _____________________________________________________________________

f.    Find the first HTTP event in the list and click the coloured square box of the TCP event immediately following this event. Highlight Layer 4 in the OSI Model tab. In the numbered list directly below the In Layers and Out Layers, what is the information displayed under items 4 and 5? _______________________________________________________________________________________________________________________________________________________________________________________________________________

TCP manages the connecting and disconnecting of the communications channel along with other responsibilities. This particular event shows that the communication channel has been ESTABLISHED.

g.   Click the last TCP event. Highlight Layer 4 in the OSI Model tab. Examine the steps listed directly below In Layers and Out Layers. What is the purpose of this event, based on the information provided in the last item in the list (should be item 4)?

__________________________________________________________________________________________________________________________________________

Challenge

This simulation provided an example of a web session between a client and a server on a local area network (LAN). The client makes requests to specific services running on the server. The server must be set up to listen on specific ports for a client request. (Hint: Look at Layer 4 in the OSI Model tab for port information.)

Based on the information that was inspected during the Packet Tracer capture, what port number is the Web Server listening on for the web request? __________________

What port is the Web Server listening on for a DNS request? ______________________

Page 29 of 210

Threshold SOB 07

Page 30: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 3: Examining Packets (Packet Tracer)

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1-ISPFa0/0 192.168.254.253 255.255.255.0 N/AS0/0/0 10.10.10.6 255.255.255.252 N/A

R2-Central

Fa0/0 172.16.255.254 255.255.0.0 N/AS0/0/0 10.10.10.5 255.255.255.252 N/A

S1-Central

VLAN 1 172.16.254.1 255.255.0.0 172.16.255.254

PC 1A NIC 172.16.1.1 255.255.0.0 172.16.255.254PC 1B NIC 172.16.1.2 255.255.0.0 172.16.255.254Eagle Server NIC 192.168.254.254 255.255.255.0 192.168.254.253

Page 30 of 210

Excellent SOB 08

Page 31: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Learning Objectives

Complete the Topology Add Simple PDUs in Realtime Mode Analyse PDUs in Simulation Mode Experiment with the model of the standard lab setup

Background

In this activity you will continue learning how to build and analyse this standard lab topology. If you have not done so already, you are encouraged to examine the Help files available from the Help Pull-down menu at the top of the Packet Tracer GUI. This activity will provide an opportunity to explore the standard lab setup using Packet Tracer simulator. Packet Tracer has two file formats it can create: .pkt files (network simulation model files) and .pka files (activity files for practice). When you create your own networks in Packet Tracer, or modify existing files from your instructor or your peers, you will often use the .pkt file format. When you launched this activity from the curriculum, these instructions appeared. They are the result of the .pka, Packet Tracer activity file format. At the bottom of these instructions are two buttons: Check Results (which gives you feedback on how much of the activity you have completed) and Reset Activity (which starts the activity over, if you want to clear your work or gain more practice).

Task 1: Complete the Topology.

Add a PC to the workspace. Configure it the following parameters: IP Address 172.16.1.2, Subnet Mask 255.255.0.0, Default Gateway 172.16.255.254, DNS Server 192.168.254.254, Display Name "1B" (do not include the quotation marks). Connect PC 1B to the Fa0/2 port of the S1-Central Switch and check your work with the Check Results button to see that the topology is complete.

Task 2: Add Simple PDUs in Realtime Mode.

Using the Add Simple PDU, send a test message: one between PC 1B and Eagle Server. Note that this packet will appear in the event list as something that was "detected" or "sniffed" on the network, and in the lower right as a user created PDU that can be manipulated for testing purposes.

Page 31 of 210

Threshold SOB 09

Page 32: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 3: Analyse PDUs in Simulation Mode (Packet Tracing).

Switch to simulation mode. Use the Capture / Forward button to move the packet through the network by clicking 8 times. Click on the packet envelope, or on the coloured square in the Info column of the Event List, to examine the packet at each step in its journey.

What is the packet type that was sent? ___________

How many steps does it take to send and receive the packet? _____________

Task 4: Experiment with the Model of the Standard Lab Setup.

The standard lab setup will consist of two routers, one switch, one server, and two PCs. Each of these devices are pre-configured. Try creating different combinations of test packets and analysing their journey through the network.

Reflection

Using the exercise above reflect on the communication process in a network where a simple PDU travels through the network from source to destination. What are the various steps (in detail) to completing this process successfully? (Keeping in mind that there are layers on the In and Out sides in each device).

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 32 of 210

Page 33: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 33 of 210

Page 34: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Page 34 of 210

Typical SOB 10

Page 35: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 4: Analysing the Application and Transport Layers (Packet Tracer)

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1-ISPFa0/0 192.168.254.253 255.255.255.0 N/A

S0/0/0 10.10.10.6 255.255.255.252 N/A

R2-CentralFa0/0 172.16.255.254 255.255.0.0 N/A

S0/0/0 10.10.10.5 255.255.255.252 N/A

S1-Central VLAN 1 172.16.254.1 255.255.0.0 172.16.255.254

PC 1A NIC 172.16.1.1 255.255.0.0 172.16.255.254PC 1B NIC 172.16.1.2 255.255.0.0 172.16.255.254Eagle Server NIC 192.168.254.254 255.255.255.0 192.168.254.253

Learning Objectives

Configure Hosts and Services Connect and configure hosts and services on the model of the lab network Explore How DNS, UDP, HTTP, and UDP Work Together

Page 35 of 210

Page 36: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Use simulation mode to visualize the operation of DNS, UDP, HTTP, and TCP on the model of the lab network.

Background

Throughout the course you will be using a standard lab setup created from actual PCs, servers, routers, and switches to learn networking concepts. At the end of each chapter, you will build increasingly larger parts of this topology in Packet Tracer, and analyze increasingly more complex protocol interactions.

Task 1: Repair and Test the Topology.

The server has been replaced. It must be powered on and connect it to R1-ISP router via Fa0/0 interface using cross-over cable. Then configure it with the following settings: IP Address 192.168.254.254, Subnet Mask 255.255.255.0, Default Gateway 192.168.254.253, DNS enabled, with the association of Eagle-Server.example.com with the server's IP address, HTTP enabled.

PC 1A has lost its IP address information. Configure it with the following settings: IP Address 172.16.1.1, Subnet Mask 255.255.0.0, Default Gateway 172.16.255.254, and DNS Server 192.168.254.254. Connect PC 1A to the Fa0/1 port of the S1-Central switch using a straight-through cable.

Verify your work using feedback from the Check Results button and the Assessment Items tab. Test connectivity, in realtime, by using ADD SIMPLE PDU to test connectivity between PC 1A and the Eagle Server.

Note that when you add a simple PDU, it appears in the PDU List Window as part of "Scenario 0". The first time you issue this one-shot ping message, it will show as Failed--this is because of the ARP process which will be explained later. Double clicking the "Fire" button in the PDU List Window, send this single test ping a second time. This time it will be successful. In Packet Tracer, the term "scenario" means a specific configuration of one or more test packets. You can create different test packet scenarios by using the New button--for example Scenario 0 might have one test packet from PC 1A to Eagle Server; Scenario 1 might have test packets between PC 1B and the routers; and so on. You can remove all test packets in a particular scenario by using the Delete button. For example, if you use the Delete button for Scenario 0 the test packet you just created between PC 1A and Eagle Server will be removed--please do this prior to the next task.

Page 36 of 210

Threshold SOB 11

Page 37: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Explore How DNS, UDP, HTTP, and TCP Work Together

Switch from Realtime to Simulation Mode. Make sure Event Filter is set to display DNS, UDP, HTTP, TCP, and ICMP. Open a web browser from the desktop of 1A. Type in the URL eagle-server.example.com, press Enter, and then use the Capture / Forward button in the Event List to capture the interaction of DNS, UDP, HTTP and TCP.You can examine the packet in two ways: by clicking on the packet envelope as it is displayed in the animation, or by clicking on the Info column for that packet instance as it is listed in the Event List. Play this animation and examine the Packet contents (PDU Information Window, Inbound PDU Details, Outbound PDU Details) for each event in the event list, especially when the packets are at PC 1A or at the Eagle Server. If you receive a "Buffer Full" message, click the View Previous Events button. While the processing of the packets at the switch and the routers may not make sense to you yet, you should be able to see how DNS, UDP, HTTP, and TCP work together by studying tracing the packets and using the PDU Information window to look "inside" them.

Reflection

Make a diagram of the sequence of protocol events involved in requesting a web page using a URL? Where might things go wrong? Compare and contrast DNS and HTTP, and UDP and TCP.

________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 37 of 210

Page 38: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 38 of 210

Typical SOB 12

Page 39: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 5: Connecting to a Cisco Device via Console (Hardware)

Lab Prerequisites

In order to complete this lab you will need a real Cisco Router or Switch.

Prior to attempting this lab you must have a terminal emulator application installed such as HyperTerminal or Putty.

Learning Objectives

To complete this lab you will perform the following objectives:

Connect your PC to your Cisco Router using the blue Cisco Console Cable. Execute putty and connect to your Cisco Router or Switch using Serial COM1 or your

respective COM port at the speed of 9600bps. Power on your Cisco device and verify your console session by watching the device

boot up on the terminal emulator.

Background

So you take a brand new Cisco Router or switch out of the box and the very first thing you must do prior to installing it is to put a basic configuration on it. In order to configure the basics on a Cisco device you must first Console into the device.

If you ever take a brand new Cisco device out of the box you’ll see that it comes with a blue flat cable that has a DB9 serial connector on one end and a network RJ45 connector on the other. Don’t be fooled, this is not a “next generation” Ethernet cable or some token ring cable but rather a Cisco Console Cable.

You use this cable to connect to He Cisco device via Serial Port so you can configure the device using command line.

Because Cisco devices do not have graphics cards or the ability to use a mouse and keyboard, you must connect to the device using another computer that provides that functionality so you can configure the device via Console CLI.

In order to connect to a Cisco device via Console you’ll need to use a Terminal Emulator application.

Applications that you commonly use to perform this task can be Windows HyperTerminal which is included with Windows XP however Windows Vista and newer requires you to manually download/install this application. An extremely popular terminal emulator is Putty which is completely free to download.

Page 39 of 210

Page 40: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab Instruction

While most terminal emulation software differs in available features and/or protocols, all terminal emulators achieve the same goal. In this walk through, Putty will be used, which is freely available (See Lab Summary) to connect to a Cisco device and establish a console session to the Cisco Command Line Interface.

Step 1: Connect your Cisco console cable or terminal adapter to a Serial port on your computer.

Step 2: Connect the RJ45 end of the console cable to the “Console” port on your Cisco router.

Step 3: When first running the Putty executable you will be presented with the Putty Configuration Window as shown below;

Step 4: After the Putty configuration window appears, move the bullet from SSH to Serial;

Note: COM1 is the default communications port for Putty Serial communications; you may need to change your COM port to match the port which your console cable is connected to.

Page 40 of 210

Page 41: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 5: Once you’ve verified the COM port and Speed click “Open” and a new window will appear. This window will be the terminal window. Once the COM# – Putty terminal window has appeared, power on your Cisco Device. After the device has booted; assuming that the NVRAM is clear, you will be prompted with a Setup Configuration Dialog:

After you are presented with the Setup Configuration Dialog type “n” for no and press enter. You will then be prompted to press Return to Get Started!, after pressing Enter you will be at the routers user mode command line interface which looks like the following;

After you have reached this point you have completed the objectives of this lab.

Page 41 of 210

Threshold SOB 13

Page 42: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 6: Topology Orientation and Building a Small Network (Packet Tracer)

Topology DiagramPeer to Peer Network

Switched Network

Learning Objectives

Upon completion of this lab, you will be able to:• Correctly identify cables for use in the network.• Physically cable a peer-to-peer and switched network.• Verify basic connectivity on each network.

Background

Many network problems can be fixed at the Physical layer of a network. For this reason, it is important to have a clear understanding of which cables to use for your network connections.

At the Physical layer (Layer 1) of the OSI model, end devices must be connected by media (cables). The type of media required depends on the type of device being connected. In the basic portion of this lab, straight–through or patch—cables will be used to connect workstations and switches.

In addition, two or more devices communicate through an address. The Network layer (Layer 3) requires a unique address (also known as a logical address or IP Addresses), which allows the data to reach the appropriate destination device.

Page 42 of 210

Page 43: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Addressing for this lab will be applied to the workstations and will be used to enable communication between the devices.

Scenario

This lab exercise is divided into two sections, the first section starts with the simplest form of networking (peer-to-peer network) where two workstations are directly connected.

The second section will require the addition of a switch to the network in section 1.

Section 1

Task 1: Create a Peer-to-Peer Network.

As in the first diagram, use packet tracer simulator to create the following networks. For the first network use two workstations for a peer-to-peer network.

Task 2: Identify the Cables used in a Network.

Before the devices can be cabled, you will need to identify the types of media you will be using. The cables used in this lab are crossover and straight-through.

Use a crossover cable to connect two workstations to each other through their NIC’s Ethernet port. This is an Ethernet cable. When you look at the plug you will notice that the orange and green wires are in opposite positions on each end of the cable.

Use a straight-through cable to connect the router’s Ethernet port to a switch port or a workstation to a switch port. This is also an Ethernet cable. When you look at the plug you will notice that both ends of the cable are exactly the same in each pin position.

Task 3: Cable the Peer-to-peer Network.

Step 1: Connect two workstations.Using the correct Ethernet cable, connect two workstations together. Connect one end of the cable to the FastEthernet port on PC0 and the other end of the cable to the FastEthernet port on PC1.

Which cable did you use? ______________________________________________________

Step 2: Apply a Layer 3 address to the workstations.To complete this task, you will need to follow the step-by-step instructions below.

Page 43 of 210

Page 44: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

1. Click on PC0, choose the Desktop tab at the top, and then the IP Configuration option at the top left of the window. The IP Configuration window should appear as can be seen below.

2. In the IP address box, enter the IP address 192.168.1.2 for PC0. (Enter the IP address 192.168.1.3 for PC1.)

3. Press the tab key and the Subnet mask is automatically entered. The subnet address should be 255.255.255.0. If this address is not automatically entered, enter this address manually.

4. Close the window.

Step 3: Verify connectivity.

1. Click on PC0, click on Desktop tab, then click Command Prompt.

Page 44 of 210

Page 45: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

The DOS command (cmd.exe) window will appear. You can enter DOS commands using this window. For the purposes of this lab, basic network commands will be entered to allow you to test your computer connections.

The ping command is a computer network tool used to test whether a host (workstation, router, server, etc.) is reachable across an IP network.

2. Use the ping command to verify that PC0 can reach PC1 and PC1 can reach PC0. From the PC0 DOS command prompt, type ping 192.168.1.3. From the PC1 DOS command prompt, type ping 192.168.1.2.

What is the output of the ping command?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

If the ping command displays an error message or doesn’t receive a reply from the other workstation, troubleshoot as necessary. Possible areas to troubleshoot include:

Verifying the correct IP addresses on both workstations Ensuring that the correct type of cable is used between the workstations

What is the output of the ping command if you unplug the network cable and ping the other workstation?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 45 of 210

Threshold SOB 14

Page 46: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Section 2

Task 4: Connect Your Workstations to the Switch.

Step 1: Connect workstation to a switch.

Add a 2960 switch to your Logical Workplace and then using the correct cable, connect one end of the cable to the FastEthernat port (make sure you delete the cable connection between the two PCs first) on PC0 and the other end to FastEthernet 0/1 port on the switch.

Step 2: Repeat this process for each workstation on your network.

Which cable did you use? ______________________________________________________

Step 3: Verify connectivity.

Verify network connectivity by using the ping command to reach the other workstations attached to the switch.What is the output of the ping command?____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

What is the output of the ping command if you ping an address that is not connected to this network?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 46 of 210

Typical SOB 15

Page 47: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 5: Reflection

What could prevent a ping from being sent between the workstations when they are directly connected?_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

What could prevent the ping from being sent to the workstations when they are connected through the switch?_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 47 of 210

Excellent SOB 16

Page 48: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 7: Topology Orientation and Building a Small Network (Hardware Equipment)

Topology DiagramPeer to Peer Network

Switched Network

Learning Objectives

Upon completion of this lab, you will be able to:• Correctly identify cables for use in the network.• Physically cable a peer-to-peer and switched network.• Verify basic connectivity on each network.

Background

Many network problems can be fixed at the Physical layer of a network. For this reason, it is important to have a clear understanding of which cables to use for your network connections.

At the Physical layer (Layer 1) of the OSI model, end devices must be connected by media (cables). The type of media required depends on the type of device being connected. In the basic portion of this lab, straight–through or patch—cables will be used to connect workstations and switches.

In addition, two or more devices communicate through an address. The Network layer (Layer 3) requires a unique address (also known as a logical address or IP Addresses), which allows the data to reach the appropriate destination device.

Addressing for this lab will be applied to the workstations and will be used to enable communication between the devices.

Page 48 of 210

Page 49: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Scenario

For the duration of this lab you will work in pairs. You will be using real hardware equipment.

This lab starts with the simplest form of networking (peer-to-peer) and ends with the lab connecting through a switch.

Task 1: Create a Peer-to-Peer Network.

Step 1: Obtain equipment and resources for the lab.

Equipment needed:2 workstations2 straight through (patch) cables1 crossover cable1 switch

Task 2: Identify the Cables used in a Network.

Before the devices can be cabled, you will need to identify the types of media you will be using. The cables used in this lab are crossover and straight-through.

Use a crossover cable to connect two workstations to each other through their NIC’s Ethernet port. This is an Ethernet cable. When you look at the plug you will notice that the orange and green wires are in opposite positions on each end of the cable.

Use a straight-through cable to connect the router’s Ethernet port to a switch port or a workstation to a switch port. This is also an Ethernet cable. When you look at the plug you will notice that both ends of the cable are exactly the same in each pin position.

Task 3: Cable the Peer-to-peer Network.

Step 1: Connect two workstations.

Using the correct Ethernet cable, connect two workstations together. Connect one end of the cable to the NIC port on PC1 and the other end of the cable to PC2.

Which cable did you use? ______________________________________________________

Step 2: Apply a Layer 3 address to the workstations.

To complete this task, you will need to follow the step-by-step instructions below.

Page 49 of 210

Page 50: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Note: These steps must be completed on each workstation. The instructions are for Windows XP—steps may differ slightly if you are using a different operating system.

1. On your computer, click Start, right-click My Network Places, and then click Properties. The Network Connections window should appear, with icons showing the different network connections.

2. Right-click the Local Area Connection and click Properties.3. Select the Internet Protocol (TCP/IP) item and then click the Properties button.

4. On the General tab of the Internet Protocol (TCP/IP) Properties window, select the Use the following IP address option.

5. In the IP address box, enter the IP address 192.168.1.2 for PC1. (Enter the IP address 192.168.1.3 for PC2.)

6. Press the tab key and the Subnet mask is automatically entered. The subnet address should be 255.255.255.0. If this address is not automatically entered, enter this address manually.

7. Click OK.

Page 50 of 210

Page 51: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

8. Close the Local Area Connection Properties window.

Step 3: Verify connectivity.

1. On your computer, click Start, and then click Run.

2. Type cmd in the Open box and then click OK.

The DOS command (cmd.exe) window will appear. You can enter DOS commands using this window. For the purposes of this lab, basic network commands will be entered to allow you to test your computer connections.

The ping command is a computer network tool used to test whether a host (workstation, router, server, etc.) is reachable across an IP network.

Page 51 of 210

Page 52: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

3. Use the ping command to verify that PC1 can reach PC2 and PC2 can reach PC1. From the PC1 DOS command prompt, type ping 192.168.1.3. From the PC2 DOS command prompt, type ping 192.168.1.2.

What is the output of the ping command?____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

If the ping command displays an error message or doesn’t receive a reply from the other workstation, troubleshoot as necessary. Possible areas to troubleshoot include:

Verifying the correct IP addresses on both workstations Ensuring that the correct type of cable is used between the workstations

What is the output of the ping command if you unplug the network cable and ping the other workstation?____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Task 4: Connect Your Workstations to the Classroom Lab Switch.

Step 1: Connect workstation to switch.

Using the correct cable, connect one end of the cable to the NIC port on the workstation and the other end to a port on the switch.

Page 52 of 210

Threshold SOB 17

Page 53: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 2: Repeat this process for each workstation on your network.

Which cable did you use? ______________________________________________________

Step 3: Verify connectivity.

Verify network connectivity by using the ping command to reach the other workstations attached to the switch.What is the output of the ping command?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

What is the output of the ping command if you ping an address that is not connected to this network?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 4: Share a document between PCs.

1. On your desktop, create a new folder and name it test.2. Right-click the folder and click File sharing. Note: A hand will be placed under the

icon.3. Place a file in the folder.4. On the desktop, double-click My Network Places and then Computers Near Me.5. Double-click the workstation icon. The test folder should appear. You will be able to

access this folder across the network. Once you are able to see it and work with the file, you have access through all 7 layers of the OSI model.

Task 5: Reflection

What could prevent a ping from being sent between the workstations when they are directly connected?_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 53 of 210

Typical SOB 18

Page 54: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

What could prevent the ping from being sent to the workstations when they are connected through the switch?_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 54 of 210

Excellent SOB 19

Page 55: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 8: Configure Initial Router Settings (Packet Tracer)

Objectives

Part 1: Verify the Default Router Configuration

Part 2: Configure and Verify the Initial Router Configuration

Part 3: Save the Running Configuration File

Background

For this lab, you will need to download the .pka file in the labs folder in week 10 from Moodle.

In this activity, you will perform basic router configurations. You will secure access to the CLI and console port using encrypted and plain text passwords. You will also configure messages for users logging into the router. These banners also warn unauthorized users that access is prohibited. Finally, you will verify and save your running configuration.

Task 1: Verify the Default Router Configuration

Step 1: Establish a console connection to R1.

a. Choose a Console cable from the available connections.b. Click PCA and select RS 232.c. Click R1 and select Console.d. Click PCA > Desktop tab > Terminal.e. Click OK and press ENTER. You are now able to configureR1.

Step 2: Enter privileged mode and examine the current configuration.

You can access all the router commands from privileged EXEC mode. However, because many of the privileged commands configure operating parameters, privileged access should be password-protected to prevent unauthorized use.

a. Enter privileged EXEC mode by entering the enable command.Router> enableRouter#Notice that the prompt changed in the configuration to reflect privileged EXEC mode.

b. Enter the show running-config command:Router# show running-config

c. Answer the following questions:What is the router’s hostname? _________________________

Page 55 of 210

Page 56: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

How many Fast Ethernet interfaces does the Router have? ______________How many Gigabit Ethernet interfaces does the Router have? ______________How many Serial interfaces does the router have? ______________What is the range of values shown for the vty lines? ______________

d. Display the current contents of NVRAM.Router# show startup-configstartup-config is not presentWhy does the router respond with the startup-config is not present message?____________________________________________________________________________________________________________________________________

Task 2: Configure and Verify the Initial Router Configuration

To configure parameters on a router, you may be required to move between various configuration modes. Notice how the prompt changes as you navigate through the router.

Step 1: Configure the initial settings on R1.

a. R1 as the hostname.Enter privileged EXEC modeRouter>enableRouter#Enter global configuration modeRouter#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)#Configure the router name as R1Router(config)#hostname R1 R1(config)#

b. Use the following passwords:a. Console: letmein

R1(config)#line console 0 R1(config-line)#password letmein R1(config-line)#login R1(config-line)#exit R1(config)#

b. Privileged EXEC, unencrypted: ciscoR1(config)#enable password ciscoR1(config)#

c. Privileged EXEC, encrypted: itsasecret

Page 56 of 210

Threshold SOB 20

Page 57: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R1(config)#enable secret itsasecretR1(config)#

c. Encrypt all plain text passwords.R1(config)# service password-encryptionR1(config)#

d. Message of the day text: Unauthorized access is strictly prohibited.R1(config)#banner motd &Enter TEXT message. End with the character '&'.AUTHORIZED ACCESS IS STRICKTLY PROHIBITED&R1(config)#

Step 2: Verify the initial settings on R1.

Note: If you cannot remember the commands, look up previous labs.

a. Verify the initial settings by viewing the configuration for R1. What command do you use? ___________________________________________________________

b. Exit the current console session until you see the following message:R1 con0 is now availablePress RETURN to get started.

c. Press ENTER; you should see the following message:AUTHORIZED ACCESS IS STRICKTLY PROHIBITED.User Access VerificationPassword:

Why should every router have a message-of-the-day (MOTD) banner?_____________________________________________________________________

If you are not prompted for a password, what console line command did you forget to configure? ___________________________________

d. Enter the passwords necessary to return to privileged EXEC mode.Why would the enable secret password allow access to the privileged EXEC mode and the enable password no longer be valid?__________________________________________________________________________________________________________________________________________

If you configure any more passwords on the router, are they displayed in the configuration file as plain text or in encrypted form? Explain.

_______________________________________________________________________________________________________________________________________________________________________________________________________________

Page 57 of 210

Page 58: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 3: Save the Running Configuration File

Step 1: Save the configuration file to NVRAM.

a. You have configured the initial settings for R1. Now back up the running configuration file to NVRAM to ensure that the changes made are not lost if the system is rebooted or loses power.What command did you enter to save the configuration to NVRAM?_____________________________________________________________________What is the shortest, unambiguous version of this command?_____________________________________________________________________Which command displays the contents of the NVRAM?_____________________________________________________________________

Page 58 of 210

Threshold SOB 21

Threshold SOB 22

Page 59: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 9: Configure Initial Router Settings (Hardware Equipment)

Objectives

Part 1: Verify the Default Router Configuration

Part 2: Configure and Verify the Initial Router Configuration

Part 3: Save the Running Configuration File

Background

For this lab, you will need to work in pairs.

In this activity, you will perform basic router configurations. You will secure access to the CLI and console port using encrypted and plain text passwords. You will also configure messages for users logging into the router. These banners also warn unauthorized users that access is prohibited. Finally, you will verify and save your running configuration.

Equipment

1 router 2 PCs Console cable Straight cable

Task 1: Connect to the Router & Verify the Default Router Configuration

Step 1: Establish a console connection to router.

a. Connect a PC to the router via a Console cable.b. From your PC open a hyper terminal connection (see lab 5).

Step 2: Enter privileged mode and examine the current configuration.

You can access all the router commands from privileged EXEC mode. However, because many of the privileged commands configure operating parameters, privileged access should be password-protected to prevent unauthorized use.

a. Enter privileged EXEC mode by entering the enable command.Router> enableRouter#Notice that the prompt changed in the configuration to reflect privileged EXEC mode.

Page 59 of 210

Page 60: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

b. Enter the show running-config command:Router# show running-config

c. Answer the following questions:What is the router’s hostname? _______________How many Fast Ethernet interfaces does the Router have? ______________How many Gigabit Ethernet interfaces does the Router have? ______________How many Serial interfaces does the router have? ______________What is the range of values shown for the vty lines? ______________

Task 2: Configure and Verify the Initial Router Configuration

To configure parameters on a router, you may be required to move between various configuration modes. Notice how the prompt changes as you navigate through the router.

Step 1: Configure the initial settings on R1.

a. R1 as the hostname.Enter privileged EXEC modeRouter>enableRouter#Enter global configuration modeRouter#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)#Configure the router name as R1Router(config)#hostname R1 R1(config)#

b. Use the following passwords:a. Console: letmein

R1(config)#line console 0 R1(config-line)#password letmein R1(config-line)#login R1(config-line)#exit R1(config)#

b. Privileged EXEC, unencrypted: ciscoR1(config)#enable password ciscoR1(config)#

c. Privileged EXEC, encrypted: itsasecretR1(config)#enable secret itsasecretR1(config)#

Page 60 of 210

Typical SOB 23

Page 61: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

c. Encrypt all plain text passwords.R1(config)# service password-encryptionR1(config)#

d. Message of the day text: Unauthorized access is strictly prohibited.R1(config)#banner motd &Enter TEXT message. End with the character '&'.AUTHORIZED ACCESS IS STRICKTLY PROHIBITED&R1(config)#

Step 2: Verify the initial settings on R1.

a. Verify the initial settings by viewing the configuration for R1. What command do you use? ___________________________________________________________

b. Exit the current console session until you see the following message:R1 con0 is now availablePress RETURN to get started.

c. Press ENTER; you should see the following message:Unauthorized access is strictly prohibited.User Access VerificationPassword:

Why should every router have a message-of-the-day (MOTD) banner?_____________________________________________________________________

If you are not prompted for a password, what console line command did you forget to configure? ___________________________________

d. Enter the passwords necessary to return to privileged EXEC mode.Why would the enable secret password allow access to the privileged EXEC mode and the enable password no longer be valid?__________________________________________________________________________________________________________________________________________

If you configure any more passwords on the router, are they displayed in the configuration file as plain text or in encrypted form? Explain.

____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 61 of 210

Typical SOB 24

Page 62: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 10: Cabling a Network and Basic Router Configuration (Packet Tracer)

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1Fa0/0 192.168.1.1 255.255.255.0 N/A

S0/0/0 192.168.2.1 255.255.255.0 N/A

R2Fa0/0 192.168.3.1 255.255.255.0 N/A

S0/0/0 192.168.2.2 255.255.255.0 N/A

PC1 N/A 192.168.1.10 255.255.255.0 192.168.1.1

PC2 N/A 192.168.3.10 255.255.255.0 192.168.3.1

Learning Objectives

Upon completion of this lab, you will be able to: Cable devices and establish console connections. Erase and reload the routers. Perform basic IOS command line interface operations. Perform basic router configuration. Verify and test configurations using show commands, ping and traceroute. Create a startup configuration file. Reload a startup configuration file.

Scenario

In this lab activity, you will review previously learned skills including cabling devices, establishing a console connection, and basic IOS command line interface operation and configuration commands. You will also learn to save configuration files and capture your configurations to a text file. The skills presented in this lab are essential to completing the rest of the labs in this course. You will be using Packet Tracer tool.

Show your work by answering questions where allocated.

Page 62 of 210

Page 63: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 1: Cable the Ethernet Links of the Network.

Cable the Ethernet links for a network that is similar to the one in the Topology Diagram. The output used in this lab is from Cisco 1841 routers. But you can use any current router in your lab as long as it has the required interfaces as shown in the topology. A simple way to identify the available interfaces on a router is by entering the show ip interface brief command.

Which of the devices in the Topology Diagram require an Ethernet cable between them? ___________________________________________________________________________

Step 1: Connect the R1 Router to the S1 Switch.

Use a straight-through Ethernet cable to connect the FastEthernet 0/0 interface of the R1 router to the FastEthernet 0/1 interface on the S1 switch.

What colour is the link status light next to the FastEthernet 0/0 interface on R1? __________

What colour is the link status light next to the FastEthernet 0/1 interface on S1? ___________

Step 2: Connect PC1 to the S1 Switch.

Use a straight-through Ethernet cable to connect the network interface card (NIC) of PC1 to the FastEthernet 0/2 Interface of the S1 switch.

What colour is the link status light next to the NIC interface on PC1? ___________________

What colour is the link status light next to the FastEthernet 0/2 interface on S1? ___________

If the link status lights are not green, wait a few moments for the link between the two devices to become established. If the lights do not turn green after a few moments, check that you are using a straight-through Ethernet cable and that the power is on for the S1 switch and PC1.

Step 3: Connect PC2 to the R2 Router.

Use a crossover Ethernet cable to connect the FastEthernet 0/0 interface of the R2 router to the NIC of PC2. Because there is no switch between PC2 and the R2 router, a crossover cable is required for a direct link between the PC and the router.

What color is the link status light next to the NIC interface on PC2? __________________

What color is the link status light next to the FastEthernet 0/0 interface on R2? _________

Page 63 of 210

Threshold SOB 25

Page 64: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Cable the Serial Link between R1 and R2 Routers.

In a real-world WAN connection, the customer premises equipment (CPE), which is often a router, is the data terminal equipment (DTE). This equipment is connected to the service provider through a data circuit-terminating equipment (DCE) device, which is commonly a modem or channel service unit (CSU)/ data service unit (DSU). This device is used to convert the data from the DTE into a form acceptable to the WAN service provider.

Before you are able to connect the serial cables to the routers you would have to first provide the routers with the correct ports. Click on a router and in the physical tab power off the device, then choose the High-Speed WAN Interface Card from the left options. Drag the port plate to the allocated slot and power the device back on. Locate a DCE serial cable (with clock symbol) in your connections panel and connect R1 serial 0/0/0 port to R2 serial 0/0/0 port.

Task 3: Establish a connection to the R1 Router.

The console port is a management port used to provide out-of-band access to a router. It is used to set up the initial configuration of a router and to monitor it.

1. Click on the router and then click the CLI tab. Once the terminal window is open choose NO for the configuration dialog option and press RETURN.

2. Then press the Enter key again to start.

Task 4: Understand Command Line Basics.

Step 1: Enter privileged EXEC mode.

Router>enableRouter#

Step 2: Enter an incorrect command and observe the router response.

Router#comfigure terminal ^% Invalid input detected at '^' marker.

Router#

Command line errors occur primarily from typing mistakes. If a command keyword is incorrectly typed, the user interface uses the caret symbol (^) to identify and isolate the error.

Page 64 of 210

Threshold SOB 26

Page 65: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

The ^ appears at or near the point in the command string where an incorrect command, keyword, or argument was entered.

Step 3: Correct the previous command.

If a command is entered incorrectly, and the Enter key is pressed, the Up Arrow key on the keyboard can be pressed to repeat the last command. Use the Right Arrow and Left Arrow keys to move the cursor to the location where the mistake was made. Then make the correction. If something needs to be deleted, use the Backspace key. Use the directional keys and the Backspace key to correct the command to configure terminal, and then press Enter.

Router#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)#

Step 4: Return to privileged EXEC mode with the exit command.

Router(config)#exit%SYS-5-CONFIG_I: Configured from console by consoleRouter#

Step 5: Examine the commands that are available for privileged EXEC mode.

A question mark, ?, can be entered at the prompt to display a list of available commands.

Router#?Exec commands: <1-99> Session number to resume clear Reset functions clock Manage the system clock configure Enter configuration mode connect Open a terminal connection copy Copy from one file to another debug Debugging functions (see also 'undebug') delete Delete a file dir List files on a filesystem disable Turn off privileged commands disconnect Disconnect an existing network connection enable Turn on privileged commands erase Erase a filesystem exit Exit from the EXEC logout Exit from the EXEC no Disable debugging informations ping Send echo messages reload Halt and perform a cold restart resume Resume an active network connection

Page 65 of 210

Page 66: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

setup Run the SETUP command facility show Show running system information --More--

Notice the --More-- at the bottom of the command output. The --More-- prompt indicates that there are multiple screens of output. When a --More-- prompt appears, press the Spacebar to view the next available screen. To display only the next line, press the Enter key. Press any other key to return to the prompt.

Step 6: View output.

View the rest of the command output by pressing the Spacebar. The remainder of the output will appear where the --More-- prompt appeared previously.

telnet Open a telnet connection traceroute Trace route to destination undebug Disable debugging functions (see also 'debug') vlan Configure VLAN parameters write Write running configuration to memory, network, or terminal

Step 7: Exit privileged EXEC mode with the exit command.

Router#exit

The following output should be displayed:

Router con0 is now available

Press RETURN to get started.

Step 8: Press the Enter key to enter user EXEC mode.

The Router> prompt should be visible.

Step 9: Type an abbreviated IOS command.

IOS commands can be abbreviated, as long as enough characters are typed for the IOS to recognize the unique command.

Enter only the character e at the command prompt and observe the results.

Router>e% Ambiguous command: "e"Router>

Enter en at the command prompt and observe the results.

Router>enRouter#

Page 66 of 210

Page 67: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

The abbreviated command en contains enough characters for the IOS to distinguish the enable command from the exit command.

Step 10: Press the Tab key after an abbreviated command to use auto-complete.

Typing an abbreviated command, such as conf, followed by the Tab key completes a partial command name. This functionality of the IOS is called auto-complete. Type the abbreviated command conf, press the Tab key, and observe the results.

Router#confRouter#configure

This auto-complete feature can be used as long as enough characters are typed for the IOS to recognize the unique command.

Step 11: Enter IOS commands in the correct mode.

IOS commands must be entered in the correct mode. For example, configuration changes cannot be made while in privileged EXEC mode. Attempt to enter the command hostname R1 at the privileged EXEC prompt and observe the results.

Router#hostname R1 ^% Invalid input detected at '^' marker.

Router#

Task 5: Perform Basic Configuration of Router R1.

Step 1: Establish a HyperTerminal session to router R1.

Step 2: Enter privileged EXEC mode.

Router>enableRouter#

Step 3: Enter global configuration mode.

Router#configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)#

Page 67 of 210

Typical SOB 27

Page 68: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 4: Configure the router name as R1.

Enter the command hostname R1 at the prompt.

Router(config)#hostname R1 R1(config)#

Step 5: Disable DNS lookup with the no ip domain-lookup command.

R1(config)#no ip domain-lookupR1(config)#

Why would you want to disable DNS lookup in a lab environment?______________________________________________________________________________________________________________________________________________________

What would happen if you disabled DNS lookup in a production environment?______________________________________________________________________________________________________________________________________________________

Step 6: Configure an EXEC mode password.

Configure an EXEC mode password using the enable secret password command. Use class for the password.

R1(config)#enable secret classR1(config)#

The enable secret command is used to provide an additional layer of security over the enable password command. The enable secret command provides better security by storing the enable secret password using a non-reversible cryptographic function. The added layer of security encryption provides is useful in environments where the password crosses the network or is stored on a TFTP server. When both the enable password and enable secret passwords are configured, the router expects the password as defined in the enable secret command. In this case, the router ignores the password defined in the enable password command.

What is the difference between enable secret and enable password commands?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 7: Remove the enable password.

Because the enable secret is configured, the enable password is no longer necessary. IOS commands can be removed from the configuration using the no form of the command.

R1(config)#no enable password

Page 68 of 210

Page 69: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R1(config)#

Step 8: Configure a message-of-the-day banner using the banner motd command.

R1(config)#banner motd &Enter TEXT message. End with the character '&'.******************************** !!!AUTHORIZED ACCESS ONLY!!!********************************&R1(config)#

When does this banner display? ______________________________________________________________________________________________________________________________________________________

Why should every router have a message-of-the-day banner? ______________________________________________________________________________________________________________________________________________________

Step 9: Configure the console password on the router.

Use cisco as the password. When you are finished, exit from line configuration mode.R1(config)#line console 0 R1(config-line)#password cisco R1(config-line)#login R1(config-line)#exit R1(config)#

Step 10: Configure the password for the virtual terminal lines.

Use cisco as the password. When you are finished, exit from line configuration mode.R1(config)#line vty 0 4 R1(config-line)#password cisco R1(config-line)#login R1(config-line)#exit R1(config)#

Step 11: Configure the FastEthernet 0/0 interface with the IP address 192.168.1.1/24.

R1(config)#interface fastethernet 0/0R1(config-if)#ip address 192.168.1.1 255.255.255.0R1(config-if)#no shutdown

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

Page 69 of 210

Page 70: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to upR1(config-if)#

Step 12: Use the description command to provide a description for this interface.

R1(config-if)#description R1 LAN R1(config-if)#

Step 13: Configure the Serial0/0/0 interface with the IP address 192.168.2.1/24.

Set the clock rate to 64000.

Note: Because the routers in the labs will not be connected to a live leased line, one of the routers will need to provide the clocking for the circuit. This is normally provided to each of the routers by the service provider. To provide this clocking signal in the lab, one of the routers will need to act as the DCE on the connection. This function is achieved by applying the clock rate 64000 command on the serial 0/0/0 interface, where the DCE end of the null modem cable has been connected. The purpose of the clock rate command is discussed further in Chapter 2, “Static Routes.”

R1(config-if)#interface serial 0/0/0R1(config-if)#ip address 192.168.2.1 255.255.255.0R1(config-if)#clock rate 64000R1(config-if)#no shutdownR1(config-if)#

When will the interface be active?___________________________________________________________________________

Step 14: Use the description command to provide a description for this interface.

R1(config-if)#description Link to R2R1(config-if)#

Step 15: Use the end command to return to privileged EXEC mode.

R1(config-if)#endR1#

Page 70 of 210

Threshold SOB 28

Page 71: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 6: Perform Basic Configuration of Router R2.

Step 1: For R2, repeat Steps 1 through 10 from Task 5.

Step 2: Configure the Serial 0/0/0 interface with the IP address 192.168.2.2/24.

R2(config)#interface serial 0/0/0R2(config-if)#ip address 192.168.2.2 255.255.255.0R2(config-if)#no shutdown

%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to upR2(config-if)#

Step 3: Use the description command to provide a description for this interface.

R1(config-if)#description Link to R1R1(config-if)#

Step 4: Configure the FastEthernet 0/0 interface with the IP address 192.168.3.1/24.

R2(config-if)#interface fastethernet 0/0R2(config-if)#ip address 192.168.3.1 255.255.255.0R2(config-if)#no shutdown

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to upR2(config-if)#

Step 5: Use the description command to provide a description for this interface.

R1(config-if)#description R2 LANR1(config-if)#

Step 6: Use the end command to return to privileged EXEC mode.

R2(config-if)#endR2#

Page 71 of 210

Typical SOB 29

Page 72: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 7: Configure IP Addressing on the Host PCs.

Step 1: Configure the host PC1.

Configure the host PC1 that is attached to R1 with an IP address of 192.168.1.10/24 and a default gateway of 192.168.1.1.

Step 2: Configure the host PC2.

Configure the host PC2 that is attached to R2 with an IP address of 192.168.3.10/24 and a default gateway of 192.168.3.1.

Task 8: Examine Router show Commands.

There are many show commands that can be used to examine the operation of the router. In both privileged EXEC and user EXEC modes, the command show ? provides a list of available show commands. The list is considerably longer in privileged EXEC mode than it is in user EXEC mode.

Step 1: Examine the show running-config command.

The show running-config command is used to display the contents of the currently running configuration file. From privileged EXEC mode on the R1 router, examine the output of the show running-config command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

R1#show running-config!version 12.3!hostname R1!!enable secret 5 $1$AFDd$0HCi0iYHkEWR4cegQdTQu/!no ip domain-lookup!interface FastEthernet0/0 description R1 LAN mac-address 0007.eca7.1511 ip address 192.168.1.1 255.255.255.0

Page 72 of 210

Threshold SOB 30

Page 73: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

duplex auto speed auto!interface FastEthernet0/1 mac-address 0001.42dd.a220 no ip address duplex auto speed auto shutdown!interface Serial0/0/0 description Link to R2 ip address 192.168.2.1 255.255.255.0 clock rate 64000!interface Serial0/0/1 no ip address shutdown!interface Vlan1 no ip address shutdown!ip classless!!!!line con 0 password ciscoline vty 0 4 password cisco login!end

Step 2: Examine the show startup-config command.

The show startup-config command displays the startup configuration file contained in NVRAM. From privileged EXEC mode on the R1 router, examine the output of the show startup-config command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

R1#show startup-config Using 583 bytes

Page 73 of 210

Page 74: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

!version 12.3!hostname R1!!no ip domain-lookup!interface FastEthernet0/0 description R1 LAN mac-address 0007.eca7.1511 ip address 192.168.1.1 255.255.255.0 duplex auto speed auto!interface FastEthernet0/1 mac-address 0001.42dd.a220 no ip address duplex auto speed auto shutdown!interface Serial0/0/0 description Link to R2 ip address 192.168.2.1 255.255.255.0 clock rate 64000!interface Serial0/0/1 no ip address shutdown!interface Vlan1 no ip address shutdown!ip classless!!!!line con 0 password ciscoline vty 0 4 password cisco

Page 74 of 210

Page 75: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

login!end

Step 3: Examine the show interfaces command.

The show interfaces command displays statistics for all interfaces configured on the router. A specific interface can be added to the end of this command to display the statistics for only that interface. From privileged EXEC mode on the R1 router, examine the output of the show interfaces fastEthernet0/0 command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

R1# show interfaces fastEthernet 0/0FastEthernet0/0 is up, line protocol is up (connected) Hardware is Lance, address is 0007.eca7.1511 (bia 0002.1625.1bea) Description: R1 LAN Internet address is 192.168.1.1/24 MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, rely 255/255, load 1/255 Encapsulation ARPA, loopback not set ARP type: ARPA, ARP Timeout 04:00:00, Last input 00:00:08, output 00:00:05, output hang never Last clearing of "show interface" counters never Queueing strategy: fifo Output queue :0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 input packets with dribble condition detected 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped outR1#

Step 4: Examine the show version command.

The show version command displays information about the currently loaded software version along with hardware and device information. From privileged EXEC mode on the R1 router, examine the output of the show version command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

R1#show version

Page 75 of 210

Page 76: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Cisco IOS Software, 1841 Software (C1841-IPBASE-M), Version 12.3(14)T7, RELEASE SOFTWARE (fc2)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2006 by Cisco Systems, Inc.Compiled Mon 15-May-06 14:54 by pt_team

ROM: System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)

System returned to ROM by power-onSystem image file is "flash:c1841-ipbase-mz.123-14.T7.bin"

This product contains cryptographic features and is subject to UnitedStates and local country laws governing import, export, transfer anduse. Delivery of Cisco cryptographic products does not implythird-party authority to import, export, distribute or use encryption.Importers, exporters, distributors and users are responsible forcompliance with U.S. and local country laws. By using this product youagree to comply with applicable laws and regulations. If you are unableto comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email [email protected].

Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.Processor board ID FTX0947Z18EM860 processor: part number 0, mask 492 FastEthernet/IEEE 802.3 interface(s)2 Low-speed serial(sync/async) network interface(s)191K bytes of NVRAM.31360K bytes of ATA CompactFlash (Read/Write)

Configuration register is 0x2102

R1#

Step 5: Examine the show ip interface brief command.

The show ip interface brief command displays a summary of the usability status information for each interface. From privileged EXEC mode on the R1 router, examine the output of the show ip interface brief command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

Page 76 of 210

Page 77: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R1#show ip interface briefInterface IP-Address OK? Method Status Protocol FastEthernet0/0 192.168.1.1 YES manual up up FastEthernet0/1 unassigned YES manual administratively down down Serial0/0/0 192.168.2.1 YES manual up up Serial0/0/1 unassigned YES manual administratively down down Vlan1 unassigned YES manual administratively down downR1#

Task 9: Using ping.

The ping command is a useful tool for troubleshooting Layers 1 though 3 of the OSI model and diagnosing basic network connectivity. This operation can be performed at either the user or privileged EXEC modes. Using ping sends an Internet Control Message Protocol (ICMP) packet to the specified device and then waits for a reply. Pings can be sent from a router or a host PC.

Step 1: Use the ping command to test connectivity between the R1 router and PC1.

What is the command used? _________________________________________________Where all attempts successful? _______________________________________________If not which were not and why? ______________________________________________ ________________________________________________________________________________________________________________________________________________

Step 2: Repeat the ping from R1 to PC1.

Were all attempts successful? ________________________________________________If yes why? ______________________________________________________________

Step 3: Send an extended ping from R1 to PC1.

To accomplish this, type ping at the privileged EXEC prompt and press Enter. Fill out the rest of the prompts as shown:

R1#ping

Page 77 of 210

Threshold SOB 31

Page 78: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Protocol [ip]: Target IP address: 192.168.1.10Repeat count [5]: 10Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: Sweep range of sizes [n]: Type escape sequence to abort.Sending 10, 100-byte ICMP Echos to 192.168.1.10, timeout is 2 seconds:!!!!!!!!!!Success rate is 100 percent (10/10), round-trip min/avg/max = 53/77/94 ms

R1#

Step 4: Send a ping from PC1 to R1.

From Windows go to Start > Programs > Accessories > Command Prompt. In the Command Prompt window that opens, ping R1 by issuing the following command:

Was ping response successful? __________________________________________________

Step 5: Send an extended ping from PC1 to R1.

To accomplish this, enter the following command at the Windows command prompt:

C:\>ping 192.168.1.1 –n 10

There should be 10 successful responses from the command.

Task 10: Using Traceroute.

The traceroute command is an excellent utility for troubleshooting the path that a packet takes through an internetwork of routers. It can help to isolate problem links and routers along the way. The traceroute command uses ICMP packets and the error message generated by routers when the packet exceeds its Time-To-Live (TTL). This operation can be performed at either the user or privileged EXEC modes. The Windows version of this command is tracert.

Page 78 of 210

Threshold SOB 32

Page 79: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 1: Use the traceroute command at the R1 privileged EXEC prompt to discover the path that a packet will take from the R1 router to PC1.

R1#traceroute 192.168.1.10Type escape sequence to abort.Tracing the route to 192.168.1.10

1 192.168.1.10 103 msec 81 msec 70 msec R1#

Step 2: Use the tracert command at the Windows command prompt to discover the path that a packet will take from the R1 router to PC1.

C:\>tracert 192.168.1.1

Tracing route to 192.168.1.1 over a maximum of 30 hops:

1 71 ms 70 ms 73 ms 192.168.1.1

Trace complete.C:\>

Page 79 of 210

Threshold SOB 33

Page 80: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 11: Cabling a Network and Basic Router Configuration (Hardware Equipment)

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1Fa0/0 192.168.1.1 255.255.255.0 N/A

S0/0/0 192.168.2.1 255.255.255.0 N/A

R2Fa0/0 192.168.3.1 255.255.255.0 N/A

S0/0/0 192.168.2.2 255.255.255.0 N/A

PC1 N/A 192.168.1.10 255.255.255.0 192.168.1.1

PC2 N/A 192.168.3.10 255.255.255.0 192.168.3.1

Learning Objectives

Upon completion of this lab, you will be able to: Cable devices and establish console connections. Erase and reload the routers. Perform basic IOS command line interface operations. Perform basic router configuration. Verify and test configurations using show commands, ping and traceroute. Create a startup configuration file. Reload a startup configuration file. Install a terminal emulation program.

Scenario

In this lab activity, you will review previously learned skills including cabling devices, establishing a console connection, and basic IOS command line interface operation and configuration commands. You will also learn to save configuration files and capture your configurations to a text file. The skills presented in this lab are essential to completing the rest of the labs in this course.

For this lab exercise you will have to work in pairs. You will be using real hardware equipment. Show your work by answering questions where allocated.

Page 80 of 210

Page 81: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 1: Cable the Ethernet Links of the Network.

Cable the Ethernet links for a network that is similar to the one in the Topology Diagram. The output used in this lab is from Cisco 1841 routers. But you can use any current router in your lab as long as it has the required interfaces as shown in the topology. A simple way to identify the available interfaces on a router is by entering the show ip interface brief command.

Which of the devices in the Topology Diagram require an Ethernet cable between them?

___________________________________________________________________________

Step 1: Connect the R1 Router to the S1 Switch.

Use a straight-through Ethernet cable to connect the FastEthernet 0/0 interface of the R1 router to the FastEthernet 0/1 interface on the S1 switch.

Step 2: Connect PC1 to the S1 Switch.

Use a straight-through Ethernet cable to connect the network interface card (NIC) of PC1 to the FastEthernet 0/2 Interface of the S1 switch.

Step 3: Connect PC2 to the R2 Router.

Use a crossover Ethernet cable to connect the FastEthernet 0/0 interface of the R2 router to the NIC of PC2. Because there is no switch between PC2 and the R2 router, a crossover cable is required for a direct link between the PC and the router.

Task 2: Cable the Serial Link between R1 and R2 Routers.

In a real-world WAN connection, the customer premises equipment (CPE), which is often a router, is the data terminal equipment (DTE). This equipment is connected to the service provider through a data circuit-terminating equipment (DCE) device, which is commonly a modem or channel service unit (CSU)/ data service unit (DSU). This device is used to convert the data from the DTE into a form acceptable to the WAN service provider.

Unlike the cables in the academy lab setup, the serial cables in the real world are not connected back to back. In a real-world situation, one router might be in New York, while another router might be in Sydney, Australia. An administrator located in Sydney would have to connect to the router in New York through the WAN cloud in order to troubleshoot the New York router.

Page 81 of 210

Threshold SOB 34

Page 82: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

In the academy labs, devices that make up the WAN cloud are simulated by the connection between the back-to-back DTE-DCE cables. The connection from one router serial interface to another router serial interface simulates the whole circuit cloud.

Step 1: Create a null serial cable to connect the R1 router to the R2 router.

In the academy labs, the WAN connection between routers uses one DCE cable and one DTE cable. The DCE-DTE connection between routers is referred to as a null serial cable. The labs will use one V.35 DCE cable and one V.35 DTE cable to simulate the WAN connection. The V.35 DCE connector is usually a female V.35 (34-pin) connector. The DTE cable has a male V.35 connector. The cables are also labeled as DCE or DTE on the router end of the cable.

The DTE and DCE V.35 cables must be joined together. Holding one of the V.35 ends in each hand, examine the pins and sockets as well as the threaded connectors. Note that there is only one proper way for the cables to fit together. Align the pins on the male cable with the sockets on the female cable and gently couple them. Very little effort should be required to accomplish this. When they are joined, turn the thumbscrews clockwise and secure the connectors.

Step 2: Connect the DCE end of the null serial cable to the Serial 0/0/0 interface of the R1 router, and the DTE end of the null serial cable to the Serial 0/0/0 interface of the R2 router.

Review the information provided below before making these connections.Before making the connection to one of the routers, examine the connector on the router and the cable. Note that the connectors are tapered to help prevent improper connection. Holding the connector in one hand, orient the cable and router connecters so that the tapers match. Now push the cable connector partially into the router connector. It probably will not go in all the way because the threaded connectors need to be tightened in order for the cable to be inserted completely. While holding the cable in one hand and gently pushing the cable toward the router, turn one of the thumb screws clockwise, 3 or 4 rounds, to start the screws. Now turn the other thumbscrew clockwise, 3 or 4 rounds, to get it started. At this point the cable should be attached sufficiently to free both hands to advance each thumbscrew at the same rate until the cable is fully inserted. Do not over-tighten these connectors.

Task 3: Establish a Console connection to R1 Router.

The console port is a management port used to provide out-of-band access to a router. It is used to set up the initial configuration of a router and to monitor it.

Page 82 of 210

Threshold SOB 35

Page 83: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

A rollover cable and an RJ-45 to DB-9 adapter are used to connect a PC to the console port. As you know from your previous studies, terminal emulation software is used to configure the router over the console connection. The Cisco Networking Academy Program recommends using Tera Term. However, you can also use HyperTerminal, which is part of the Windows operating system, or you can use Putty.

Step 1: Examine the router and locate the RJ-45 connector labeled Console.

Step 2: Examine PC1 and locate a 9-pin male connector serial port.

It may—or may not—be labeled as COM1 or COM2.

Step 3: Locate the console cable.

Some console cables have an RJ-45 to DB-9 adapter built into one end. Others do not. Locate either a console cable with a built-in adapter or a console cable with a separate RJ-45 to DB-9 adapter attached to one end.

Step 4: Connect the console cable to the router and PC.

First, connect the console cable to the router console port, an RJ-45 connector. Next, connect the DB-9 end of the console cable to the serial port of PC1.

Step 5: Test router connection.

1. Open your terminal emulation software (HyperTerminal, Tera Term, or other software specified by your instructor).

2. Once the terminal window is open, press the Enter key. There should be a response from the router. If there is, then the connection has been successfully completed. If there is no connection, troubleshoot as necessary. For example, verify that the router has power. Check the connection to the serial port on the PC and the console port on the router.

Was connection successful? _________________

Task 4: Erase and Reload the Routers.

Step 1: Using the HyperTerminal session established in Task 3, enter privileged EXEC mode on R1.

Write down the command to enter Privileged EXEC mode.________________________________________________________________________

Page 83 of 210

Threshold SOB 36

Page 84: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 2: Erase the configuration.

To clear the configuration, issue the erase startup-config command. Confirm the objective when prompted, and answer no if asked to save changes. The result should look something like this:

Router#erase startup-configErasing the nvram filesystem will remove all files! Continue? [confirm][OK]Erase of nvram: completeRouter#

Step 3: Reload the configuration.

When the prompt returns, issue the reload command. Confirm the objective when prompted. After the router finishes the boot process, choose not to use the AutoInstall facility, as shown:

Would you like to enter the initial configuration dialog? [yes/no]: noWould you like to terminate autoinstall? [yes]: Press Enter to accept default.Press RETURN to get started!

Step 4: Establish a HyperTerminal Session to R2.

Repeat Steps 1 through 3 to remove any startup configuration file that may be present.

Task 5: Perform Basic Configuration of Router R1.

Step 1: Establish a HyperTerminal session to router R1.

Step 2: Enter privileged EXEC mode.

Write down the command to enter Privileged EXEC mode.________________________________________________________________________

Step 3: Enter global configuration mode.

Write down the command to enter global configuration mode.________________________________________________________________________

Page 84 of 210

Threshold SOB 37

Page 85: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 4: Configure the router name as R1.

Enter the command hostname R1 at the prompt.

Router(config)#hostname R1 R1(config)#

Step 5: Disable DNS lookup with the no ip domain-lookup command.

R1(config)#no ip domain-lookupR1(config)#

Why would you want to disable DNS lookup in a lab environment?

______________________________________________________________________________________________________________________________________________________

What would happen if you disabled DNS lookup in a production environment?

______________________________________________________________________________________________________________________________________________________

Step 6: Configure an EXEC mode password.

Configure an EXEC mode password using the enable secret password command. Use class for the password.

R1(config)#enable secret classR1(config)#

The enable secret command is used to provide an additional layer of security over the enable password command. The enable secret command provides better security by storing the enable secret password using a non-reversible cryptographic function. The added layer of security encryption provided is useful in environments where the password crosses the network or is stored on a TFTP server. When both the enable password and enable secret passwords are configured, the router expects the password as defined in the enable secret command. In this case, the router ignores the password defined in the enable password command.

Step 7: Remove the enable password.

Because the enable secret is configured, the enable password is no longer necessary. IOS commands can be removed from the configuration using the no form of the command.

R1(config)#no enable passwordR1(config)#

Page 85 of 210

Page 86: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 8: Configure a message-of-the-day banner using the banner motd command.

R1(config)#banner motd &Enter TEXT message. End with the character '&'.******************************** !!!AUTHORIZED ACCESS ONLY!!!********************************&R1(config)#

When does this banner display? ______________________________________________________________________________________________________________________________________________________

Why should every router have a message-of-the-day banner? ______________________________________________________________________________________________________________________________________________________

Step 9: Configure the console password on the router.

Use cisco as the password. When you are finished, exit from line configuration mode.R1(config)#line console 0 R1(config-line)#password cisco R1(config-line)#login R1(config-line)#exit R1(config)#

Step 10: Configure the password for the virtual terminal lines.

Use cisco as the password. When you are finished, exit from line configuration mode.R1(config)#line vty 0 4 R1(config-line)#password cisco R1(config-line)#login R1(config-line)#exit R1(config)#

Step 11: Configure the FastEthernet 0/0 interface with the IP address 192.168.1.1/24.

Which mode is the command entered from? ____________________________________

Write the full sequence of commands to configure the interface above.____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 86 of 210

Page 87: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 12: Use the description command to provide a description for this interface.

R1(config-if)#description R1 LAN R1(config-if)#

Step 13: Configure the Serial0/0/0 interface with the IP address 192.168.2.1/24.

Set the clock rate to 64000.

Note: Because the routers in the labs will not be connected to a live leased line, one of the routers will need to provide the clocking for the circuit. This is normally provided to each of the routers by the service provider. To provide this clocking signal in the lab, one of the routers will need to act as the DCE on the connection. This function is achieved by applying the clock rate 64000 command on the serial 0/0/0 interface, where the DCE end of the null modem cable has been connected. The purpose of the clock rate command is discussed further in Chapter 2, “Static Routes.”

R1(config-if)#interface serial 0/0/0R1(config-if)#ip address 192.168.2.1 255.255.255.0R1(config-if)#clock rate 64000R1(config-if)#no shutdownR1(config-if)#

Note: The interface will not be activated until the serial interface on R2 is configured and activated.

Step 14: Use the description command to provide a description for this interface.

R1(config-if)#description Link to R2R1(config-if)#

Step 15: Use the end command to return to privileged EXEC mode.

R1(config-if)#endR1#

Page 87 of 210

Typical SOB 38

Page 88: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 6: Perform Basic Configuration of Router R2.

Step 1: For R2, repeat Steps 1 through 10 from Task 6.

Step 2: Configure the Serial 0/0/0 interface with the IP address 192.168.2.2/24.

Write commands used.________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 3: Use the description command to provide a description for this interface.

R1(config-if)#description Link to R1R1(config-if)#

Step 4: Configure the FastEthernet 0/0 interface with the IP address 192.168.3.1/24.

Write commands used.________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 5: Use the description command to provide a description for this interface.

R1(config-if)#description R2 LANR1(config-if)#

Step 6: Use the end command to return to privileged EXEC mode.

R2(config-if)#endR2#

Task 7: Configure IP Addressing on the Host PCs.

Step 1: Configure the host PC1.

Configure the host PC1 that is attached to R1 with an IP address of 192.168.1.10/24 and a default gateway of 192.168.1.1.

Page 88 of 210

Typical SOB 39

Page 89: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 2: Configure the host PC2.

Configure the host PC2 that is attached to R2 with an IP address of 192.168.3.10/24 and a default gateway of 192.168.3.1.

Task 8: Examine Router Show Commands.

There are many show commands that can be used to examine the operation of the router. In both privileged EXEC and user EXEC modes, the command show ? provides a list of available show commands. The list is considerably longer in privileged EXEC mode than it is in user EXEC mode.

Step 1: Examine the show running-config command.

The show running-config command is used to display the contents of the currently running configuration file. From privileged EXEC mode on the R1 router, examine the output of the show running-config command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

What information is displayed when you enter show running-config command?_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 2: Examine the show startup-config command.

The show startup-config command displays the startup configuration file contained in NVRAM. From privileged EXEC mode on the R1 router, examine the output of the show startup-config command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

What are the differences between the outputs of show startup-config and show running config? Why?

_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 3: Examine the show interfaces command.

The show interfaces command displays statistics for all interfaces configured on the router. A specific interface can be added to the end of this command to display the statistics for only that interface. From privileged EXEC mode on the R1 router, examine the output of the show

Page 89 of 210

Page 90: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

interfaces fastEthernet0/0 command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

How many interfaces show as up? _________________

List all up interfaces and enter their IP addresses

____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 4: Examine the show version command.

The show version command displays information about the currently loaded software version along with hardware and device information. From privileged EXEC mode on the R1 router, examine the output of the show version command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

What version is used on the router? ______________________________________

Step 5: Examine the show ip interface brief command.

The show ip interface brief command displays a summary of the usability status information for each interface. From privileged EXEC mode on the R1 router, examine the output of the show ip interface brief command. If the –-More-- prompt appears, press the Spacebar to view the remainder of the command output.

R1#show ip interface briefInterface IP-Address OK? Method Status Protocol FastEthernet0/0 192.168.1.1 YES manual up up FastEthernet0/1 unassigned YES manual administratively down down Serial0/0/0 192.168.2.1 YES manual up up Serial0/0/1 unassigned YES manual administratively down down Vlan1 unassigned YES manual administratively down downR1#

Page 90 of 210

Typical SOB 40

Page 91: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 9: Using ping.

The ping command is a useful tool for troubleshooting Layers 1 through 3 of the OSI model and diagnosing basic network connectivity. This operation can be performed at either the user or privileged EXEC modes. Using ping sends an Internet Control Message Protocol (ICMP) packet to the specified device and then waits for a reply. Pings can be sent from a router or a host PC.

Step 1: Use the ping command to test connectivity between the R1 router and PC1.

R1#ping 192.168.1.10

What was the response?

_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 2: Repeat the ping from R1 to PC1.

R1#ping 192.168.1.10

Were all pings successful? _____________________________________________________

Step 3: Send an extended ping from R1 to PC1.

To accomplish this, type ping at the privileged EXEC prompt and press Enter. Fill out the rest of the prompts as shown:

R1#pingProtocol [ip]: Target IP address: 192.168.1.10Repeat count [5]: 10Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: Sweep range of sizes [n]: Type escape sequence to abort.Sending 10, 100-byte ICMP Echos to 192.168.1.10, timeout is 2 seconds:!!!!!!!!!!Success rate is 100 percent (10/10), round-trip min/avg/max = 53/77/94 ms

R1#

Page 91 of 210

Page 92: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 4: Send a ping from PC1 to R1.

From Windows go to Start > Programs > Accessories > Command Prompt. In the Command Prompt window that opens, ping R1 by issuing the following command:

C:\> ping 192.168.1.1

The ping should respond with successful results.

Step 5: Send an extended ping from PC1 to R1.

To accomplish this, enter the following command at the Windows command prompt:

C:\>ping 192.168.1.1 –n 10

There should be 10 successful responses from the command

Task 10: Using Traceroute.

The traceroute command is an excellent utility for troubleshooting the path that a packet takes through an internetwork of routers. It can help to isolate problem links and routers along the way. The traceroute command uses ICMP packets and the error message generated by routers when the packet exceeds its Time-To-Live (TTL). This operation can be performed at either the user or privileged EXEC modes. The Windows version of this command is tracert.

Step 1: Use the traceroute command at the R1 privileged EXEC prompt to discover the path that a packet will take from the R1 router to PC1.

R1#traceroute 192.168.1.10Type escape sequence to abort.Tracing the route to 192.168.1.10

1 192.168.1.10 103 msec 81 msec 70 msec R1#

Step 2: Use the tracert command at the Windows command prompt to discover the path that a packet will take from the R1 router to PC1.

C:\>tracert 192.168.1.1

Tracing route to 192.168.1.1 over a maximum of 30 hops:

1 71 ms 70 ms 73 ms 192.168.1.1

Page 92 of 210

Page 93: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Trace complete.

C:\>

Task 11: Create a start.txt File.

Router configurations can be captured to a text (.txt) file and saved for later use. The configuration can be copied back to the router so that the commands do not have to be entered one at a time.

Step 1: View the running configuration of the router using the show running-config command.

R1#show running-config

Step 2: Copy the command output.

Select the command output. From the HyperTerminal Edit menu, choose the copy command.

Step 3: Paste output in Notepad.

Open Notepad. Notepad is typically found on the Start menu under Programs > Accessories. From the Notepad Edit menu, click Paste.

Step 4: Edit commands.

Some commands will have to be edited or added before the startup script can be applied to a router. Some of these changes are:

Adding a no shutdown command to FastEthernet and serial interfaces that are being used.

Replacing the encrypted text in the enable secret command with the appropriate password.

Removing the mac-address command from the interfaces.Removing the ip classless command.Removing unused interfaces.

Edit the text in the Notepad file as shown below:

hostname R1!

Page 93 of 210

Typical SOB 41

Page 94: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

!enable secret class!no ip domain-lookup!interface FastEthernet0/0 description R1 LAN ip address 192.168.1.1 255.255.255.0 no shutdown duplex auto speed auto!interface Serial0/0/0 description Link to R2 ip address 192.168.2.1 255.255.255.0 clock rate 64000 no shutdown!!!!line con 0 password ciscoline vty 0 4 password cisco login!End

Step 5: Save the open file in Notepad to start.txt.

Task 12: Load the start.txt File onto R1 Router.

Step 1: Erase the current startup configuration of R1.

Confirm the objective when prompted, and answer no if asked to save changes. The result should look something like this:

R1#erase startup-configErasing the nvram filesystem will remove all files! Continue? [confirm]

Page 94 of 210

Threshold SOB 42

Page 95: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

[OK]Erase of nvram: completeRouter#

Step 2: When the prompt returns, issue the reload command.

Confirm the objective when prompted. After the router finishes the boot process, choose not to use the AutoInstall facility, as shown:

Would you like to enter the initial configuration dialog? [yes/no]: noWould you like to terminate autoinstall? [yes]: Press Enter to accept default.Press RETURN to get started!

Step 3: Enter global configuration mode.

Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z.Router(config)#

Step 4: Copy the commands.

In the start.txt file that was created in Notepad, select all the lines, and then choose Edit > Copy.

Step 5: From the HyperTerminal Edit menu, choose Paste to Host.

Step 6: Verify the running configuration.

After all of the pasted commands have been applied, use the show running-config command to verify that the running configuration appears as expected.

Page 95 of 210

Threshold SOB 43

Page 96: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 12: IPv4 Address Subnetting (part 1)

Learning Objectives

Upon completion of this activity, you will be able to determine network information for a given IP address and network mask.

Background

This activity is designed to teach how to compute network IP address information from a given IP address.

Scenario

When given an IP address and network mask, you will be able to determine other information about the IP address such as:

Network address Network broadcast address Total number of host bits Number of hosts

Task 1: For a given IP address, Determine Network Information.

Given:Host IP Address 172.200.114.250Network Mask 255.255.0.0 (/16)

Find:Network AddressNetwork Broadcast AddressTotal Number of Host BitsNumber of Hosts

Step 1: Translate Host IP address and network mask into binary notation.

Convert the host IP address and network mask to binary:

172 200 114 250IP Address 10101100 11001000 01110010 11111010Network Mask 11111111 11111111 00000000 00000000

255 255 0 0

Page 96 of 210

Page 97: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 2: Determine the network address.

1. Draw a line under the mask.2. Perform a bit-wise AND operation on the IP address and the subnet mask.

Note: 1 AND 1 results in a 1; 0 AND anything results in a 0.

3. Express the result in dotted decimal notation.4. The result is the network address for this host IP address, which is 172.200.0.0.

172 200 114 250IP Address 10101100 11001000 01110010 11111010Subnet Mask 11111111 11111111 00000000 00000000Network Add 10101100 11001000 00000000 00000000

172 200 0 0

Step 3: Determine the broadcast address for the network address

The network mask separates the network portion of the address from the host portion. The network address has all 0s in the host portion of the address and the broadcast address has all 1s in the host portion of the address.

172 200 0 0Network Add. 10101100 11001000 00000000 00000000Mask 11111111 11111111 00000000 00000000Broadcast. 10101100 11001000 11111111 11111111

172 200 255 255

By counting the number of host bits, we can determine the total number of usable hosts for this network.

Host bits: 16

Total number of hosts:

216 = 65,536

65,536 – 2 = 65,534 (addresses that cannot use the all 0s address, network address, or the all 1s address, broadcast address.)

Add this information to the table:

Host IP Address 172.200.114.250Network Mask 255.255.0.0 (/16)Network AddressNetwork Broadcast

Page 97 of 210

Page 98: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

AddressTotal Number of Host BitsNumber of Hosts

Task 2: Challenge

For all problems:

Create a Subnetting Worksheet to show and record all work for each problem.

Problem 1Host IP Address 172.30.1.33Network Mask 255.255.0.0Network AddressNetwork Broadcast AddressTotal Number of Host BitsNumber of Hosts

Problem 2Host IP Address 192.30.1.33Network Mask 255.255.255.0Network AddressNetwork Broadcast AddressTotal Number of Host BitsNumber of Hosts

Problem 3Host IP Address 192.168.10.234Network Mask 255.255.255.0Network AddressNetwork Broadcast AddressTotal Number of Host BitsNumber of Hosts

Problem 4Host IP Address 172.17.99.71Network Mask 255.255.0.0Network AddressNetwork Broadcast AddressTotal Number of Host BitsNumber of Hosts

Page 98 of 210

Page 99: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Problem 5Host IP Address 172.168.3.219Network Mask 255.255.0.0Network AddressNetwork Broadcast AddressTotal Number of Host BitsNumber of Hosts

Problem 6Host IP Address 192.168.3.219Network Mask 255.255.255.0Network AddressNetwork Broadcast AddressTotal Number of Host BitsNumber of Hosts

Page 99 of 210

Threshold SOB 44

Page 100: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 13: IPv4 Address Subnetting (part 2)

Learning Objectives

Upon completion of this activity, you will be able to determine subnet information for a given IP address and subnetwork mask.

Background

Borrowing Bits

How many bits must be borrowed to create a certain number of subnets or a certain number of hosts per subnet?

Using this chart, it is easy to determine the number of bits that must be borrowed.

Things to remember:

Subtract 2 for the usable number of hosts per subnet, one for the subnet address and one for the broadcast address of the subnet.

210 29 28 27 26 25 24 23 22 21 20

1,024 512 256 128 64 32 16 8 4 2 1Number of bits borrowed:

10 9 8 7 6 5 4 3 2 1 11,024 512 256 128 64 32 16 8 4 2 1

Hosts or Subnets

Possible Subnet Mask Values

Because subnet masks must be contiguous 1’s followed by contiguous 0’s, the converted dotted decimal notation can contain one of a certain number of values:

Dec. Binary255 11111111254 11111110252 11111100248 11111000240 11110000224 11100000192 11000000128 100000000 00000000

Page 100 of 210

Page 101: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Scenario

When given an IP address, network mask, and subnetwork mask, you will be able to determine other information about the IP address such as:

The subnet address of this subnet The broadcast address of this subnet The range of host addresses for this subnet The maximum number of subnets for this subnet mask The number of hosts for each subnet The number of subnet bits The number of this subnet

Task 1: For a Given IP Address and Subnet Mask, Determine Subnet Information.

Given:

Host IP Address 172.200.114.250Network Mask 255.255.0.0 (/16)Subnet Mask 255.255.255.192 (/26)

Find:

Number of Subnet BitsNumber of SubnetsNumber of Host Bits per SubnetNumber of Usable Hosts per SubnetSubnet Address for this IP AddressIP Address of First Host on this SubnetIP Address of Last Host on this SubnetBroadcast Address for this Subnet

Step 1: Translate host IP address and subnet mask into binary notation.

172 200 114 250IP Address 10101100 11001000 01110010 11111010

11111111 11111111 11111111 11000000Subnet Mask 255 255 255 192

Step 2: Determine the network (or subnet) where this host address belongs.

1. Draw a line under the mask.2. Perform a bit-wise AND operation on the IP Address and the Subnet Mask.

Page 101 of 210

Page 102: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Note: 1 AND 1 results in a 1’ 0 AND anything results in a 0.

3. Express the result in dotted decimal notation.4. The result is the Subnet Address of this Subnet, which is 172.25.114.192

172 200 114 250IP Address 10101100 11001000 01110010 11111010Subnet Mask 11111111 11111111 11111111 11000000Subnet Add. 10101100 11001000 01110010 11000000

172 200 114 192

Add this information to the table:

Subnet Address for this IP Address 172.200.114.192

Step 3: Determine which bits in the address contain network information and which contain host information.

1. Draw the Major Divide (M.D.) as a wavy line where the 1s in the major network mask end (also the mask if there was no subnetting). In our example, the major network mask is 255.255.0.0, or the first 16 left-most bits.

2. Draw the Subnet Divide (S.D.) as a straight line where the 1s in the given subnet mask end. The network information ends where the 1s in the mask end.

M.D S.DIP Address 10101100 11001000 01110010 11111010Subnet Mask 11111111 11111111 11111111 11000000Subnet Add. 10101100 11001000 01110010 11000000 ← 10 bits →

3. The result is the Number of Subnet Bits, which can be determined by simply counting the number of bits between the M.D. and S.D., which in this case is 10 bits.

Step 4: Determine the bit ranges for subnets and hosts.

1. Label the subnet counting range between the M.D. and the S.D. This range contains the bits that are being incremented to create the subnet numbers or addresses.

2. Label the host counting range between the S.D. and the last bits at the end on the right. This range contains the bits that are being incremented to create the host numbers or addresses.

Page 102 of 210

Page 103: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

M.D S.DIP Address 10101100 11001000 01110010 11111010Subnet Mask 11111111 11111111 11111111 11000000Subnet Add. 10101100 11001000 01110010 11000000 ← Subnet → ← Host → counting counting range range

Step 5: Determine the range of host addresses available on this subnet and the broadcast address on this subnet.

1. Copy down all of the network/subnet bits of the network address (that is, all bits before the S.D.).

2. In the host portion (to the right of the S.D.), make the host bits all 0s except for the right-most bit (or least significant bit), which you make a 1. This gives us the first host IP address on this subnet, which is the first part of the result for Range of Host Addresses for This Subnet, which in the example is 172.200.114.193.

3. Next, in the host portion (to the right of the S.D.), make the host bits all 1s except for the rightmost bit (or least significant bit), which you make a 0. This gives us the last host IP address on this subnet, which is the last part of the result for Range of Host Addresses for This Subnet, which in the example is 172.200.114.254.

4. In the host portion (to the right of the S.D.), make the host bits all 1s. This gives us the broadcast IP address on this subnet. This is the result for Broadcast Address of This Subnet, which in the example is 172.25.114.255.

M.D S.DIP Address 10101100 11001000 01110010 11111010Subnet Mask 11111111 11111111 11111111 11000000

Subnet Add. 10101100 11001000 01110010 11000000

← Subnet → ← Host → counting counting range rangeFirst Host 10101100 11001000 01110010 11000001

172 200 114 193Last Host 10101100 11001000 01110010 11111110

172 200 114 254Broadcast 10101100 11001000 01110010 11111111

172 200 114 255

Let’s add some of this information to our table:

Page 103 of 210

Page 104: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Host IP Address 172.200.114.250Major Network Mask 255.255.0.0 (/16)Major (Base) Network Address 172.200.0.0Major Network Broadcast Address 172.25.255.255

Total Number of Host Bits 16 bits or 216 or 65,536 total hosts

Number of Hosts 65,536 – 2 = 65,534 usable hostsSubnet Mask 255.255.255.192 (/26)Number of Subnet BitsNumber of SubnetsNumber of Host Bits per SubnetNumber of Usable Hosts per SubnetSubnet Address for this IP AddressIP Address of First Host on this SubnetIP Address of Last Host on this SubnetBroadcast Address for this Subnet

Step 6: Determine the number of subnets.

The number of subnets is determined by how many bits are in the subnet counting range (in this example, 10 bits).

Use the formula 2n, where n is the number of bits in the subnet counting range.

210 = 1024

Number of Subnet Bits 10 bitsNumber of Subnets(all 0s used, all 1s not used) 210 = 1024 subnets

Step 7: Determine the number usable hosts per subnet.

The number of hosts per subnet is determined by the number of host bits (in this example, 6 bits) minus 2 (1 for the subnet address and 1 for the broadcast address of the subnet).

26 – 2 = 64 – 2 = 62 hosts per subnetNumber of Host Bits per Subnet 6 bitsNumber of Usable Hosts per Subnet

26 – 2 = 64 – 2 = 62 hosts per subnet

Page 104 of 210

Page 105: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 8: Final Answers

Host IP Address 172.200.114.250Subnet Mask 255.255.255.192 (/26)Number of Subnet Bits 26 bitsNumber of Subnets 210 = 1024 subnetsNumber of Host Bits per Subnet 6 bitsNumber of Usable Hosts per Subnet 26 – 2 = 64 – 2 = 62 hosts per subnetSubnet Address for this IP Address 172.200.114.192IP Address of First Host on this Subnet 172.200.114.193

IP Address of Last Host on this Subnet 172.200.114.254

Broadcast Address for this Subnet 172.200.114.255

Task 2: Challenge.

For all problems:Create a Subnetting Worksheet to show and record all work for each problem.

Problem 1

Host IP Address 172.30.1.33Subnet Mask 255.255.255.0Number of Subnet BitsNumber of SubnetsNumber of Host Bits per SubnetNumber of Usable Hosts per SubnetSubnet Address for this IP AddressIP Address of First Host on this SubnetIP Address of Last Host on this SubnetBroadcast Address for this Subnet

Problem 2

Host IP Address 172.30.1.33Subnet Mask 255.255.255.252Number of Subnet BitsNumber of SubnetsNumber of Host Bits per SubnetNumber of Usable Hosts per SubnetSubnet Address for this IP AddressIP Address of First Host on this SubnetIP Address of Last Host on this SubnetBroadcast Address for this Subnet

Page 105 of 210

Page 106: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Problem 3

Host IP Address 192.192.10.234Subnet Mask 255.255.255.0Number of Subnet BitsNumber of SubnetsNumber of Host Bits per SubnetNumber of Usable Hosts per SubnetSubnet Address for this IP AddressIP Address of First Host on this SubnetIP Address of Last Host on this SubnetBroadcast Address for this Subnet

Problem 4

Host IP Address 172.17.99.71Subnet Mask 255.255.0.0Number of Subnet BitsNumber of SubnetsNumber of Host Bits per SubnetNumber of Usable Hosts per SubnetSubnet Address for this IP AddressIP Address of First Host on this SubnetIP Address of Last Host on this SubnetBroadcast Address for this Subnet

Problem 5

Host IP Address 192.168.3.219Subnet Mask 255.255.255.0Number of Subnet BitsNumber of SubnetsNumber of Host Bits per SubnetNumber of Usable Hosts per SubnetSubnet Address for this IP AddressIP Address of First Host on this SubnetIP Address of Last Host on this SubnetBroadcast Address for this Subnet

Page 106 of 210

Page 107: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Problem 6

Host IP Address 192.168.3.219Subnet Mask 255.255.255.252Number of Subnet BitsNumber of SubnetsNumber of Host Bits per SubnetNumber of Usable Hosts per SubnetSubnet Address for this IP AddressIP Address of First Host on this SubnetIP Address of Last Host on this SubnetBroadcast Address for this Subnet

Page 107 of 210

Threshold SOB 45

Page 108: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 14: Troubleshooting a Small Network (Packet Tracer)

Topology Diagram

Learning Objectives

Upon completion of this lab, you will be able to: • Verify that a paper design meets stated network requirements • Cable a network according to the topology diagram • Erase the startup configuration and reload a router to the default state • Load the routers with supplied scripts • Discover where communication is not possible • Gather information about the misconfigured portion of the network along with any other errors • Analyze information to determine why communication is not possible • Propose solutions to network errors • Implement solutions to network errors

Scenario

In this lab, you are given a completed configuration for a small routed network. The configuration contains design and configuration errors that conflict with stated requirements and prevent end-to-end communication. You will examine the given design and identify and correct any design errors. You will then cable the network, configure the hosts, and load configurations onto the router. Finally, you will troubleshoot the connectivity problems to determine where the errors are occurring and correct them using the appropriate commands. When all errors have been corrected, each host should be able to communicate with all other configured network elements and with the other host.

Task 1: Examine the Logical LAN Topology

The IP address block of 172.16.30.0 /23 is subnetted to meet the following requirements:

Subnet Number of Hosts Subnet A 174

Page 108 of 210

Page 109: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Subnet B 60 Additional requirements and specifications:

The 0 subnet is used. The smallest possible number of subnets that satisfy the requirements for hosts should

be used, keeping the largest possible block in reserve for future use. Assign the first usable subnet to Subnet A. Host computers use the first IP address in the subnet. The network router uses the last

network host address.

Based on these requirements, the following topology has been provided to you:

Subnet A

Specification Value

IP mask (decimal) 255.255.255.0

IP address 172.16.30.0

First IP host address 172.16.30.1

Last IP host address 172.16.30.254

Subnet BSpecification Value IP mask (decimal) 255.255.255.128 IP address 172.16.31.0 First IP host address 172.16.31.1 Last IP host address 172.16.31.126

Examine each of the values in the tables above and verify that this topology meets all requirements and specifications. Are any of the given values incorrect? __________________________________

If yes, correct the values in the table above and write the corrected values below: ______________________________________________________________________________________________________________________________________________________

Create a configuration table similar to the one below using your corrected values:

Device IP address Mask Gateway Host1 172.16.30.1 255.255.255.0 172.16.30.254 Router1–Fa0/0 172.16.30.254 255.255.255.0 N/A Host2 172.16.31.1 255.255.255.128 172.16.31.126 Router1–Fa0/1 172.16.31.126 255.255.255.128 N/A

Page 109 of 210

Page 110: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Cable the Routers

Cable a network that is similar to the one in the topology diagram.

Task 3: Configure the Host Computers

Step 1: Configure host computers.

Configure the static IP address, subnet mask, and gateway for each host computer based on the configuration table created in Task 1. After configuring each host computer, display and verify the host network settings with the ipconfig /all command.

Task 4: Load the Router with the Supplied Scripts

enable ! config term ! hostname Router1 ! enable secret class ! no ip domain-lookup ! interface FastEthernet0/0 description connection to host1 ip address 172.16.30.1 255.255.255.0 duplex auto speed auto ! interface FastEthernet0/1 description connection to switch1 ip address 192.16.31.1 255.255.255.192 duplex auto speed auto ! ! line con 0 password cisco

Page 110 of 210

Threshold SOB 46

Page 111: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

login line vty 0 login line vty 1 4 password cisco login ! End

Task 5: Identify Connectivity Problems

Step 1: Use the ping command to test network connectivity.

Use the following table to test the connectivity of each network device.

From To IP Address Ping Results Host1 NIC IP address 172.16.30.1 Host1 Router1, Fa0/0 172.16.30.254 Host1 Router1, Fa0/1 172.16.31.126 Host1 Host2 172.16.31.1 Host2 NIC IP address 172.16.30.1 Host2 Router1, Fa0/1 172.16.31.126 Host2 Router1, Fa0/0 172.16.30.254 Host2 Host1 172.16.30.1

Task 6: Troubleshoot Network Connections

Step 1: Begin troubleshooting at the host connected to the BRANCH router.

From host PC1, is it possible to ping PC2? _________ From host PC1, is it possible to ping the router fa0/1 interface? _________ From host PC1, is it possible to ping the default gateway? _________ From host PC1, is it possible to ping itself? _________ Where is the most logical place to begin troubleshooting the PC1 connection problems? ______________________________________________________________________________________________________________________________________________________

Step 2: Examine the router to find possible configuration errors.

Begin by viewing the summary of status information for each interface on the router.

Page 111 of 210

Typical SOB 47

Page 112: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Are there any problems with the status of the interfaces? ______________________________________________________________________________________________________________________________________________________

If there are problems with the status of the interfaces, record any commands that are necessary to correct the configuration errors. ______________________________________________________________________________________________________________________________________________________

Step 3: Use the necessary commands to correct the router configuration.

Step 4: View a summary of the status information.

If any changes were made to the configuration in the previous step, view the summary of the status information for the router interfaces.

Does the information in the interface status summary indicate any configuration errors on Router1? _________

If the answer is yes, troubleshoot the interface status of the interfaces.

Has connectivity been restored? ________

Step 5: Verify the logical configuration.

Examine the full status of Fa 0/0 and 0/1. Is the IP addresses and subnet mask information in the interface status consistent with the configuration table? ________

If there are differences between the configuration table and the router interface configuration, record any commands that are necessary to correct the router configuration. ______________________________________________________________________________________________________________________________________________________

Has connectivity been restored? ________

Why is it useful for a host to ping its own address? ______________________________________________________________________________________________________________________________________________________

Page 112 of 210

Threshold SOB 48

Page 113: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Page 113 of 210

Page 114: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 15: Configuring and Testing the Lab Network (Packet Tracer)

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1-ISPFa0/0 N/A

S0/0/0 N/A

R2-CentralFa0/0 N/A

S0/0/0 N/APC 1A NICPC 1B NICEagle Server NIC

Learning Objectives

Build, test, and configure the entire lab network Integrate skills from throughout the course Analyse the events involved in requesting a web page (DNS, ARP, HTTP, TCP, IP,

Ethernet, HDLC)

Page 114 of 210

Page 115: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Analyse the events involved in tracing the route to the web server (DNS, UDP, ARP, ICMP, IP, Ethernet, HDLC)

Background

For this lab use packet tracer.Throughout the course, you have been developing network planning, building, configuring, and testing skills. You have also developed conceptual understandings of networking protocols and device algorithms. Here is an opportunity to test yourself: see if you can complete the entire challenge (approximately 100 configurable components, though some are quite easy) in under 30 minutes.

Task 1: Plan.

Use the standard Exploration lab topology as you plan your IP addressing scheme:

Two 1841 routers with WIC-2T interface cards, installed in the right hand slot (one named R1-ISP, which has the serial DCE WAN connection to R2-Central, and the Fa0/0 LAN connection to Eagle_Server) and one named R2-Central (which has the serial DCE WAN connection to R1-ISP and the Fa0/0 LAN connection to S1-Central)

One 2960TT Switch (S1-Central) Two PCs named 1A and 1B A server named Eagle_Server.

Note that both the Display names AND host names for all devices must be configured exactly, and in general all strings (names, passwords, banners) should be typed exactly as specified in these instructions, for the grading to work properly.

You have been given an IP address block of 192.168.3.0 /24. You must provide for existing networks as well as future growth.

Subnet assignments are:

1st subnet, existing student LAN, up to 28 hosts (Fa0/0 on R2-Central, connected to Fa0/24 on S1-Central)

2nd subnet, future student LAN, up to 28 hosts (not yet implemented) 3rd subnet, existing ISP LAN, up to 14 hosts (Fa0/0 on R1-ISP) 4th subnet, future ISP LAN, up to 7 hosts (not yet implemented) 5th subnet, existing WAN, point-to-point link (S0/0/0 on R1-ISP and S0/0/0 on R2-

Central)

IP address assignments are:

For the server, configure the second highest usable IP address on the ISP LAN subnet.

Page 115 of 210

Page 116: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

For R1-ISP's Fa0/0 interface, configure the highest usable IP address on the ISP LAN subnet.

For R1-ISP's S0/0/0 interface, configure the highest usable address on the existing WAN subnet.

For R2-Central's S0/0/0 interface, use the lowest usable address on the existing WAN subnet.

For R2-Central's Fa0/0 interface, use the highest usable address on the existing student LAN subnet and connect it to the Fa0/24 interface on S1-Central.

For hosts 1A and 1B, use the first 2 IP addresses (two lowest usable addresses) on the existing student LAN subnet and connect them to the Fa0/1 and Fa0/2 interfaces on S1-Central.

For the switch management interface, use the second highest usable address on the student subnet.

Task 2: Build and Configure the Network.

Build the network, taking care to make connections as specified. Configure both routers, the switch, the server, and the two PCs.

Configure the routers using the CLI to practice your skills. The router configuration must include "housekeeping" (display name, hostname, passwords, banner), interfaces (Fast Ethernet and Serial), and routing (static route on R1-ISP, default route on R2-Central). The following login passwords should all be set to "cisco" (no quotes): enable password (not secret), console, and Telnet. The banners should say **This is lab router R1-ISP. Authorized access only.** and **This is lab router R2-Central. Authorized access only.**

What are the commands used for router “housekeeping”_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Write the command used for static route on R1-ISP___________________________________________________________________________

Write the command used for the default route on R2-Central

Page 116 of 210

Threshold SOB 49

Page 117: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

___________________________________________________________________________

What are the commands needed to configure the login passwords?

Enable password:___________________________________________________________Console:__________________________________________________________________Telnet:___________________________________________________________________

The interfaces should be configured as specified in the IP addressing section above; use a clock rate of 64000 on the R1-ISP S0/0/0 interface. The static route on R1-ISP should point to the existing Student LAN subnet via R2-Central's serial interface IP address; the static route on R2-Central should be a default static route which points via R1-ISP's serial interface IP address.

Enter the command used for the clock rate on R1-ISP S0/0/0 interface___________________________________________________________________________

On the switch, configure the display name, hostname, banner (**This is lab switch S1-Central. Authorized access only.**), login passwords for access (enable, console, and Telnet passwords all set to "cisco"), and management interface (int vlan1).

For Hosts 1A and 1B, in addition to IP configuration, configure them to use DNS services. For the server, enable DNS services, use the domain name eagle-server.example.com, and enable HTTP services.

Task 3: Test and Analyse.

It is a good practice to test connectivity through ping and Telnet, and to examine routing tables. In simulation mode, request a web page while making the following protocols visible in the event list: DNS, HTTP, Telnet, TCP, UDP, ICMP, ARP. Examine the packets as they are processed by the devices to study protocol behaviour, especially how IP is involved in everything. Also note the algorithms used by hosts, switches, and routers.

Explain the entire process__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 117 of 210

Threshold SOB 50

Page 118: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Issue a traceroute to the server from one of the PCs. Examine how trace is built up of ICMP echo requests. Again explain the entire process______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Task 4: Reflection - Putting it All Together.

Relate the processes observed in Task 3 to the TCP/IP Protocol. _________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 118 of 210

Threshold SOB 51

Page 119: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 16: Subnetting (Packet Tracer)

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

HQ

Fa0/1 N/A

S0/0/0 N/A

S0/0/1 N/A

BRANCH1

Fa0/0 N/A

Fa0/1 N/A

S0/0/0 N/A

BRANCH2

Fa0/0 N/A

Fa0/1 N/A

S0/0/1 N/A

PC1 NIC

PC2 NIC

PC3 NIC

PC4 NIC

PC5 NIC

Page 119 of 210

Typical SOB 52

Page 120: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Learning Objectives

Upon completion of this lab, you will be able to: Determine the number of subnets needed. Determine the number of hosts needed. Design an appropriate addressing scheme. Assign addresses and subnet mask pairs to device interfaces and hosts. Examine the use of the available network address space. Determine how static routing could be applied to the network.

Scenario

In this lab, you have been given the network address 192.168.9.0/24 to subnet and provide the IP addressing for the network shown in the Topology Diagram. The network has the following addressing requirements:

The BRANCH1 LAN 1 will require 10 host IP addresses. The BRANCH1 LAN 2 will require 10 host IP addresses. The BRANCH2 LAN 1 will require 10 host IP addresses. The BRANCH2 LAN 2 will require 10 host IP addresses. The HQ LAN will require 20 host IP addresses. The link from HQ to BRANCH1 will require an IP address for each end of the link. The link from HQ to BRANCH2 will require an IP address for each end of the link.

(Note: Remember that the interfaces of network devices are also host IP addresses and are included in the above addressing requirements.)

Task 1: Examine the Network Requirements.

Examine the network requirements and answer the questions below. Keep in mind that IP addresses will be needed for each of the LAN interfaces.

How many subnets are needed? __________

What is the maximum number of IP addresses that are needed for a single subnet? __________

How many IP addresses are needed for each of the branch LANs? __________

What is the total number of IP addresses that are needed? __________

Page 120 of 210

Typical SOB 53

Page 121: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Design an IP Addressing Scheme.

Step 1: Subnet the 192.168.9.0 network into the appropriate number of subnets.

What will the subnet mask be for the subnetworks? __________________________

How many usable host IP addresses are there per subnet? __________

Fill in the following chart with the subnet information.

Subnet Number

Subnet AddressFirst UsableHost Address

Last UsableHost Address

Broadcast Address

01234567

Step 2: Assign the subnets to the network shown in the Topology Diagram.

When assigning the subnets, keep in mind that routing will need to occur to allow information to be sent throughout the network. The subnets will be assigned to the networks to allow for route summarization on each of the routers.

1. Assign first subnet (lowest subnet) to the LAN connected to the Fa0/1 interface of BRANCH2. What is the subnet address? ____________________

2. Assign second subnet to LAN connected to the Fa0/0 interface of BRANCH2. What is the subnet address? ____________________

3. Assign third subnet to LAN connected to the Fa0/0 interface of BRANCH1. What is the subnet address? ____________________

4. Assign fourth subnet to LAN connected to the Fa0/1 interface of BRANCH1. What is the subnet address? ____________________

5. Assign fifth subnet to the WAN link from HQ to BRANCH1. What is the subnet address? ____________________

6. Assign sixth subnet to the WAN link from HQ to BRANCH2. ____________________

Page 121 of 210

Page 122: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

7. Assign seventh subnet to LAN connected to the Fa0/1 interface of HQ. What is the subnet address? ____________________

Note: The highest subnet will not be required in this topology.

Task 3: Assign IP Addresses to the Network Devices

Assign the appropriate addresses to the device interfaces. Document the addresses to be used in the Addressing Table provided under the Topology Diagram.

Step 1: Assign addresses to the HQ router.

1. Assign the first valid host address in the HQ LAN subnet to the LAN interface.2. Assign the first valid host address in link from HQ to BRANCH1 subnet to the S0/0/0

interface.3. Assign the first valid host address in link from HQ to BRANCH2 subnet to the S0/0/1

interface.

Step 2: Assign addresses to the BRANCH1 router.

1. Assign the first valid host address in the BRANCH1 LAN 1 subnet to the Fa0/0 LAN interface.

2. Assign the first valid host address in the BRANCH1 LAN 2 subnet to the Fa0/1 LAN interface.

3. Assign the last valid host address in link from HQ to BRANCH1 subnet to the WAN interface.

Step 3: Assign addresses to the BRANCH2 router.

1. Assign the first valid host address in the BRANCH2 LAN 1 subnet to the Fa0/0 LAN interface.

2. Assign the first valid host address in the BRANCH2 LAN 2 subnet to the Fa0/1 LAN interface.

3. Assign the last valid host address in link from HQ to BRANCH2 subnet to the WAN interface.

Step 4: Assign addresses to the host PCs.

1. Assign the last valid host address in the HQ LAN subnet to PC1.2. Assign the last valid host address in the BRANCH1 LAN 1 subnet to PC2.3. Assign the last valid host address in the BRANCH1 LAN 2 subnet to PC3.4. Assign the last valid host address in the BRANCH2 LAN 1 subnet to PC4.

Page 122 of 210

Typical SOB 54

Page 123: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

5. Assign the last valid host address in the BRANCH2 LAN 2 subnet to PC5.

Task 4: Test the Network Design.

Apply your addressing scheme. Check to see that all devices on directly connected networks can ping each other.

Task 5: Reflection

How many IP address in the 192.168.9.0 network are unused or unusable in this design? __________

What would the command be to add a default static route on the WAN interface of the BRANCH1 router? __________________________________________________________________________

Can both of the BRANCH1 LANs be summarized into one route on the HQ router? _________What would be the command used to add this summary route to the routing table?__________________________________________________________________________

Can both of the BRANCH2 LANs be summarized into one route on the HQ router? __________

What would be the command used to add this summary route to the routing table?

__________________________________________________________________________

Can the HQ LAN and both of the BRANCH1 LANs be summarized into one route on the BRANCH2 router? This summarized route should also include the link between the HQ and BRANCH1 routers.__________

What would be the command used to add this summary route to the routing table?

__________________________________________________________________________

Page 123 of 210

Typical SOB 55

Page 124: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Page 124 of 210

Excellent SOB 56

Page 125: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 17: VLSM Variable-Length Subnet Mask

IP Address Classes

Class A 1 – 127 (Network 127 is reserved for loopback and internal testing) Leading bit pattern 0 00000000.00000000.00000000.00000000

Network . Host . Host . Host

Class B 128 – 191 Leading bit pattern 10 10000000.00000000.00000000.00000000Network . Network . Host . Host

Class C 192 – 223 Leading bit pattern 110 11000000.00000000.00000000.00000000Network . Network . Network . Host

Class D 224 – 239 (Reserved for multicast)

Class E 240 – 255 (Reserved for experimental, used for research)

Private Address Space

Class A 10.0.0.0 to 10.255.255.255

Class B 172.16.0.0 to 172.31.255.255

Class C 192.168.0.0 to 192.168.255.255

Default Subnet Masks

Class A 255.0.0.0

Class B 255.255.0.0

Class C 255.255.255.0

Page 125 of 210

Page 126: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

What is VLSM

Variable Length Subnet Masks allow you a much tighter control over your addressing scheme. If you use a class C address with a default subnet mask you end up with one subnet containing 256 addresses. By using VLSM you can adjust the number of subnets and number of addresses depending on the specific needs of your network. The same rules apply to a class A orB addresses.

VLSM is supported by Cisco, OSPF, Dual IS-IS, BGP-4, and EIGRP. You need to configure your router for Variable Length Subnet Masking by setting up one of these protocols. Then configure the subnet masks of the various interfaces in the IP address interface sub-command. To use supernet you must also configure IP classless routes.

The Box Method

The box method is the simplest way to visualize the breakdown of a range of addresses into smaller different sized subnets.

Start with a square. The whole square is a single 0

subnet comprised of 256 addresses

/24

255.255.255.0

256 Hosts

1 Subnet 255

Page 126 of 210

Page 127: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Split the box in half and you get two 0 128Subnets with 128 addresses

/25 255.255.255.128 128 Hosts 2 Subnets 127 255

Divide the box into quarters and you get 0 128four subnets with 64 addresses

63 191 64 192

/26 255.255.255.192 62 Hosts 4 Subnets 127 255

Split each individual square and you get 0 32 128 160eight subnets with 32 addresses

31 63 159 191

64 96 192 224

Page 127 of 210

Page 128: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

/27 255.255.255.224 32 Hosts 8 Subnets 95 127 223 255

Split the boxes in half again and you get 0 32 128 160sixteen subnets with sixteen addresses

15 47 143 175 16 48 144 176

31 63 159 191 64 96 192 224

/28 79 111 207 239 255.255.255.240 80 112 208 240 16 Hosts

16 Subnets 95 127 223 255

The next split gives you thirty two subnets 0 8 32 40 128 136 160 168

with eight addresses 7 15 39 47 135 143 167 175 16 24 48 56 144 152 176 184

23 31 55 63 151 159 183 191

64 72 96 104 192 200 224 232

71 79 103 111 199 207 231 239 /29 80 88 112 120 208 216 240 248 255.255.255.248 8 Hosts 32 Subnets 87 95 119 127 215 223 247 255

Page 128 of 210

Page 129: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

The last split gives sixty four subnets with 0 8 32 40 128 136 160 168

four addresses each, you can use these 3 11 35 43 131 139 163 171

squares in any combination to fit your 4 12 36 44 132 140 164 172

addressing needs 7 15 39 47 135 143 167 175 16 24 48 56 144 152 176 184

19 27 51 59 147 155 179 187 20 28 52 60 148 156 180 188

23 31 55 63 151 159 183 191 64 72 96 104 192 200 224 232

67 75 99 107 195 203 227 235

/30 68 76 100 108 196 204 228 236

255.255.255.252 71 79 103 111 199 207 231 239

4 Hosts 80 88 112 120 208 216 240 248

64 Subnets 83 91 115 123 211 219 243 251 84 92 116 124 212 220 244 252

87 95 119 127 215 223 247 255

VLSM Addressing Part 1

Problem 1 (Example)

Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and subnet mask in the boxes below, colour or shade the sub-subnets used in the box. This business will be using the class C address 220.10.10.0.Remember to start with your largest groups first.

Page 129 of 210

Page 130: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Colour in the squares used with different shades to highlight each subnet.

0

63

128

255

64

95

96

127

Problem 2 (Example)

Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and subnet mask in the boxes below, colour or shade the sub-subnets used in the box. This company will be using the class C address 192.168.16.0.Remember to start with your largest groups first.

Colour in the squares used with different shades to highlight each sub-subnet.

Page 130 of 210

Page 131: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

0

127

128

191192

223

224

227

232

239

228

321240

255

Problem 3

Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and subnet mask in the boxes below, colour or shade the sub-subnets used in the box. This company will be using the class C address 190.10.10.0.Remember to start with your largest groups first.

Colour in the squares used with different shades to highlight each sub-subnet.

Page 131 of 210

Page 132: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

0

63

128

255

64

95

96

9

104

111

100

10112

127

Problem 4

Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and subnet mask in the boxes below, colour or shade the sub-subnets used in the box. This company will be using the class C address 220.108.38.0.Remember to start with your largest groups first.

Colour in the squares used with different shades to highlight each sub-subnet.

Page 132 of 210

Page 133: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

0 8 32 40 128 136 160 168

3 11 35 43 131 139 163 171 4 12 36 44 132 140 164 172

7 15 39 47 135 143 167 175

16 24 48 56 144 152 176 184

19 27 51 59 147 155 179 187 20 28 52 60 148 156 180 188

23 31 55 63 151 159 183 191 64 72 96 104 192 200 224 232

67 75 99 107 195 203 227 235 68 76 100 108 196 204 228 236

71 79 103 111 199 207 231 239

80 88 112 120 208 216 240 248

83 91 115 123 211 219 243 251

84 92 116 124 212 220 244 252

87 95 119 127 215 223 247 255

Problem 5

Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and subnet mask in the boxes below, colour or shade the sub-subnets used in the box. This company will be using the class C address192.168.10.0. Remember to start with your largest groups first.

Page 133 of 210

Page 134: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Colour in the squares used with different shades to highlight each sub-subnet.

0 8 32 40 128 136 160 168

3 11 35 43 131 139 163 171 4 12 36 44 132 140 164 172

7 15 39 47 135 143 167 175

16 24 48 56 144 152 176 184

19 27 51 59 147 155 179 187 20 28 52 60 148 156 180 188

23 31 55 63 151 159 183 191 64 72 96 104 192 200 224 232

67 75 99 107 195 203 227 235 68 76 100 108 196 204 228 236

71 79 103 111 199 207 231 239

80 88 112 120 208 216 240 248

83 91 115 123 211 219 243 251

84 92 116 124 212 220 244 252

87 95 119 127 215 223 247 255

Problem 6

Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and subnet mask in the boxes below, colour or shade the sub-subnets used in the box. This company will be using the class C address 222.10.150.0. Remember to start with your largest groups first.

Page 134 of 210

Page 135: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Draw the necessary lines and colour in the used squares with different shades to highlight each sub-subnet.

0 32 128 160

31 63 159 191 64 96 192 224

95 127 223 255

Problem 7

Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and subnet mask in the boxes below, colour or shade the sub-subnets used in the box. This company will be using the class C address 200.150.70.0.Remember to start with your largest groups first.

Page 135 of 210

Page 136: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Draw the necessary lines and colour in the used squares with different shades to highlight each sub-subnet.

0 128

63 191 64 192

127 255

Problem 8

Using the network diagram and information given create an addressing scheme which utilizes variable-length subnet masks. Show the subnet address and subnet mask in the boxes below, colour or shade the sub-subnets used in the box. This company will be using the class C address 192.168.24.0.Remember to start with your largest groups first.

Page 136 of 210

Page 137: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Draw the necessary lines and colour in the used squares with different shades to highlight each sub-subnet.

0

255

Page 137 of 210

Page 138: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

VLSM Addressing Part 2

Problem 9 (Example)

You are developing a school network with the class C address 192.168.2.0/24. There will be three computer labs with 30 computers each that need to be on different sub-subnets. Forty eight classrooms with one computer each that will comprise a single sub-subnet. The administrative office and guidance office contain a total of seven computers which will need to be grouped together. Plan for four more mini labs with six computers to each sub-subnetwork. Divide the network using variable length subnet masks. Complete the information required below. Remember to work from largest to smallest.

Subnet

Subnet Address Subnet Mask (/X)

First Usable Host Last Usable Host Broadcast Address

1 192.168.2.0 /26 192.168.2.1 192.168.2.62 192.168.2.632 192.168.2.64 /27 192.168.2.65 192.168.2.94 192.168.2.953 192.168.2.96 /27 192.168.2.97 192.168.2.126 192.168.2.1274 192.168.2.128 /27 192.168.2.129 192.168.2.158 192.168.2.1595 192.168.2.160 /28 192.168.2.161 192.168.2.174 192.168.2.1756 192.168.2.176 /29 192.168.2.177 192.168.2.182 192.168.2.1837 192.168.2.184 /29 192.168.2.185 192.168.2.190 192.168.2.1918 192.168.2.192 /29 192.168.2.193 192.168.2.198 192.168.2.1999 192.168.2.200 /29 192.168.2.201 192.168.2.206 192.168.2.20710

Page 138 of 210

Page 139: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Problem 10 (Example)

You are setting up a small business network with the class C address 220.55.80.0/24. The marketing division will need 12 computers. Research and development needs 27 computers. The reception area will need two computers. Management requires 19 computers. Divide the network using variable length subnet masks. Complete the information required below. Remember to work from largest to smallest.

Subnet

Subnet Address Subnet Mask (/X)

First Usable Host Last Usable Host Broadcast Address

1 220.55.80.0 /27 220.55.80.1 220.55.80.30 220.55.80.312 220.55.80.32 /27 220.55.80.33 220.55.80.62 220.55.80.633 220.55.80.64 /28 220.55.80.65 220.55.80.78 220.55.80.794 220.55.80.80 /30 220.55.80.81 220.55.80.82 220.55.80.835

Problem 11

You are setting up a medium sized network with the class C address 222.37.34.0/24. Marketing needs 29 computers. Research and development needs 110 computers. Bookkeeping will use 12 computers. The reception area will need three computers. Management requires 60 computers. Divide the network using variable length subnet masks. Complete the information required below. Remember to work from largest to smallest.

Subnet

Subnet Address Subnet Mask (/X)

First Usable Host Last Usable Host Broadcast Address

1234

Page 139 of 210

Page 140: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

5678

Problem 12

A shipping company needs to set up its network across several locations. The Denver office needs six computers. The Waco office needs 22 computers. The Fargo office will need five computers. The WAN links between all three locations need to be included in the solution. Using the IP address 192.168.10.0/24 divide the network using VLSM. Complete the information required below. Remember to work from largest to smallest.

Subnet

Subnet Address Subnet Mask (/X)

First Usable Host Last Usable Host Broadcast Address

12345678

Problem 13

A new school is being built in the local school district. It will have three computer labs with 28 computers each. There will be 58 classrooms with 2 computers each that need to be on one sub-subnet. The office staff and administrators will need 7 computers. The guidance and

Page 140 of 210

Page 141: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

attendance office will have 5 computers. Setup the remaining addressing into one sub-subnet for future expansion. The school has been given the address 223.145.75.0/24. Complete the information required below. Remember to work from largest to smallest.

Subnet

Subnet Address Subnet Mask (/X)

First Usable Host Last Usable Host Broadcast Address

12345678

Problem 14

A local college is setting up a campus wide network. The technology wing will be on its own network address of 192.168.250.0/24. The office wing will include 15 computers. There are 2 labs of 20 computers each, 2 labs of 30 computers each and one lab of 35 computers. Complete the information required below. Remember to work from largest to smallest.

Subnet

Subnet Address Subnet Mask (/X)

First Usable Host Last Usable Host Broadcast Address

12

Page 141 of 210

Threshold SOB 57

Page 142: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

345678

Problem 15

You are setting up a network for a company in four locations. Location A has 8 computers. Location B has 122 computers. Location C has 4 computers. Location D has 55 computers. There is a WAN connection between all four locations. Complete the information required below using the class C address 192.168.10.0.Remember to work from largest to smallest.

Subnet

Subnet Address Subnet Mask (/X)

First Usable Host Last Usable Host Broadcast Address

12345678

Page 142 of 210

Page 143: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Problem 16

A college dormitory is being remoulded. A new network is being installed. There are 50 dorm rooms with two drops each that will be on one sub-subnet. The offices will have 5 drops. The reception desk will have three drops. A small study hall will include 30 drops. Using the IP address 192.168.12.0/24 complete the information required below using VLSM. Work from largest to smallest.

Subnet

Subnet Address Subnet Mask (/X)

First Usable Host Last Usable Host Broadcast Address

12345678

Page 143 of 210

Typical SOB 58

Page 144: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Class A Addressing Guide# of Bits

BorrowedSubnetMask

Total # ofSubnets

Usable # ofSubnets

Total # ofHosts

Usable # ofHosts

2 255.192.0.0 4 2 4,194,304 4,194,3023 255.224.0.0 8 6 2,097,152 2,097,1504 255.240.0.0 16 14 1,048,576 1,048,5745 255.248.0.0 32 30 524,288 524,2866 255.252.0.0 64 62 262,144 262,1427 255.254.0.0 128 126 131,072 131,0708 255.255.0.0 256 254 65,536 65,5349 255.255.128.0 512 510 32,768 32,76610 255.255.192.0 1,024 1,022 16,384 16,38211 255.255.224.0 2,048 2,046 8,192 8,19012 255.255.240.0 4,096 4,094 4,096 4,09413 255.255.248.0 8,192 8,190 2,048 2,04614 255.255.252.0 16,384 16,382 1,024 1,02215 255.255.254.0 32,768 32,766 512 51016 255.255.255.0 65,536 65,534 256 25417 255.255.255.128 131,072 131,070 128 12618 255.255.255.192 262,144 262,142 64 6219 255.255.255.224 524,288 524,286 32 3020 255.255.255.240 1,048,576 1,048,574 16 1421 255.255.255.248 2,097,152 2,097,150 8 622 255.255.255.252 4,194,304 4,194,302 4 2

Class B Addressing Guide# of Bits

BorrowedSubnetMask

Total # ofSubnets

Usable # ofSubnets

Total # ofHosts

Usable # ofHosts

2 255.255.192.0 4 2 16,384 16,3823 255.255.224.0 8 6 8,192 8,1904 255.255.240.0 16 14 4,096 4,0945 255.255.248.0 32 30 2,048 2,0466 255.255.252.0 64 62 1,024 1,0227 255.255.254.0 128 126 512 5108 255.255.255.0 256 254 256 2549 255.255.255.128 512 510 128 12610 255.255.255.192 1,024 1,022 64 6211 255.255.255.224 2,048 2,046 32 3012 255.255.255.240 4,096 4,094 16 1413 255.255.255.248 8,192 8,190 8 614 255.255.255.252 16,384 16,382 4 2

Class C Addressing Guide# of Bits

BorrowedSubnetMask

Total # ofSubnets

Usable # ofSubnets

Total # ofHosts

Usable # ofHosts

2 255.255.255.192 4 2 64 623 255.255.255.224 8 6 32 304 255.255.255.240 16 14 16 145 255.255.255.248 32 30 8 66 255.255.255.252 64 62 4 2

VLSM Chart 24-30 Bits144

Page 145: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

/24255.255.255.0

256 Hosts

/25255.255.255.128

128 Hosts

/26

255.255.255.19

/27255.255.255.224

32 Hosts

/28255.255.255.240

16 Hosts

/29255.255.255.248

8 Hosts

/30255.255.255.252

4 Hosts

0-127

0-127

0-63

0-31

0-150-7

0-34-7

8-158-11

12-15

16-3116-23

16-1920-23

24-3124-2728-31

32-63

32-4732-39

32-3536-39

40-4740-4344-47

48-6348-55 48-51

52-55

56-6356-5960-63

64-127

64-95

64-7964-71 64-67

68-71

72-79 72-7576-79

80-9580-87

80-8384-87

88-95 88-9192-95

96-127

96-11196-103

96-99100-103

104-111104-107108-111

112-127112-119 112-115

116-119

120-127 120-123124-127

128-255

128-191

128-159

128-143128-135

128-131132-135

136-143 136-139140-143

144-159144-151

144-147148-151

152-159152-155156-159

160-191

160-17516-167

160-163164-167

168-175168-171172-175

176-191176-183

176-179180-183

184-191184-187188-191

192-255

192-223

192-207192-199

192-195196-199

200-207 200-203204-207

208-223208-215

208-211212-215

216-223 216-219220-223

224-255

224-239224-231

224-227228-231

232-239232-235236-239

240-255240-247

240-243244-247248-251

145

Page 146: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

248-255252-255

Lab 18: Basic VLSM Calculation and Addressing Design

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

HQ Fa0/0 N/AFa0/1 N/AS0/0/0 N/AS0/0/1 N/A

Branch 1

Fa0/0 N/AFa0/1 N/AS0/0/0 N/AS0/0/1 N/A

Branch 2

Fa0/0 N/AFa0/1 N/AS0/0/0 N/AS0/0/1 N/A

Learning Objectives

Upon completion of this activity, you will be able to:

Determine the number of subnets needed. Determine the number of hosts needed for each subnet. Design an appropriate addressing scheme using VLSM.

146

Page 147: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Assign addresses and subnet mask pairs to device interfaces. Examine the use of the available network address space.

Scenario

In this activity, you have been given the network address 192.168.1.0/24 to subnet and provide the IP addressing for the network shown in the Topology Diagram. VLSM will be used so that the addressing requirements can be met using the 192.168.1.0/24 network. The network has the following addressing requirements:

The HQ LAN1 will require 50 host IP addresses. The HQ LAN2 will require 50 host IP addresses. The Branch1 LAN1 will require 20 host IP addresses. The Branch1 LAN2 will require 20 host IP addresses The Branch2 LAN1 will require 12 host IP addresses. The Branch2 LAN2 will require 12 host IP addresses. The link from HQ to Branch1 will require an IP address for each end of the link. The link from HQ to Branch2 will require an IP address for each end of the link. The link Branch1 to Branch2 will require an IP address for each end of the link.

(Note: Remember that the interfaces of network devices are also host IP addresses and are included in the above addressing requirements.)

Task 1: Examine the Network Requirements.

Examine the network requirements and answer the questions below. Keep in mind that IP addresses will be needed for each of the LAN interfaces.

1. How many subnets are needed? _______2. What is the maximum number of IP addresses that are needed for a single subnet?

_______3. How many IP addresses are needed for each of the BranchBranch1 LANs? _______4. How many IP addresses are needed for each of the BranchBranch2 LANs? _______5. How many IP addresses are needed for each of the WAN links between routers?

_______6. What is the total number of IP addresses that are needed? _______7. What is the total number of IP addresses that are available in the 192.168.1.0/24

network? _________8. Can the network addressing requirements be met using the 192.168.1.0/24 network?

_______

147

Typical SOB 59

Page 148: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Design an IP Addressing Scheme

Step 1: Determine the subnet information for the largest network segment or segments.

In this case, the two HQ LANs are the largest subnets.

1. How many IP addresses are needed for each LAN? _______2. What is the smallest size subnet that can be used to meet this requirement? _______3. What is the maximum number of IP addresses that can be assigned in this size subnet?

________

Step 2: Assign subnets to HQ LANs.

Start at the beginning of the 192.168.1.0/24 network.

1. Assign the first available subnet to HQ LAN1.2. Fill in the chart below with the appropriate information.

HQ LAN1 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

3. Assign the next available subnet to HQ LAN2.4. Fill in the chart below with the appropriate information.

HQ LAN2 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

Step 3: Determine the subnet information for the next largest network segment or segments.

In this case, the two Branch1 LANs are the next largest subnets.

148

Threshold SOB 60

Page 149: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

1. How many IP addresses are needed for each LAN? _______2. What is the smallest size subnet that can be used to meet this requirement? _______3. What is the maximum number of IP addresses that can be assigned in this size subnet?

_______

Step 4: Assign subnet to BRANCH1 LANs.

Start with the IP address following the HQ LAN subnets.

1. Assign the next subnet to Branch1 LAN1.2. Fill in the chart below with the appropriate information.

Branch1 LAN1 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

3. Assign the next available subnet to Branch1 LAN2.4. Fill in the chart below with the appropriate information.

Branch1 LAN2 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

Step 5: Determine the subnet information for the next largest network segment or segments.

In this case, the two Branch 2 LANs are the next largest subnets.

1. How many IP addresses are needed for each LAN? _______2. What is the smallest size subnet that can be used to meet this requirement? _______3. What is the maximum number of IP addresses that can be assigned in this size subnet?

________

Step 6: Assign subnets to BRANCH2 LANs.

Start with the IP address following the Branch1 LAN subnets.149

Threshold SOB 61

Page 150: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

1. Assign the next subnet to the Branch2 LAN1. Fill in the chart below with the appropriate information.

Branch2 LAN1 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

2. Assign the next available subnet to Branch2 LAN2.3. Fill in the chart below with the appropriate information.

Branch2 LAN2 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

Step 7: Determine the subnet information for the links between the routers.

1. How many IP addresses are needed for each link? _______2. What is the smallest size subnet that can be used to meet this requirement? _______3. What is the maximum number of IP addresses that can be assigned in this size subnet?

_________

Step 8: Assign subnets to links.

Start with the IP address following the Branch2 LAN subnets.

1. Assign the next available subnet to the link between the HQ and Branch1 routers.2. Fill in the chart below with the appropriate information.

Link between HQ and Branch1 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

150

Threshold SOB 62

Page 151: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

3. Assign the next available subnet to the link between the HQ and Branch2 routers.4. Fill in the chart below with the appropriate information.

Link between HQ and Branch2 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

5. Assign the next available subnet to the link between the Branch1 and Branch2 routers.6. Fill in the chart below with the appropriate information.

Link between Branch1 and Branch2 Subnet

Network Address

Decimal Subnet Mask

CIDR Subnet Mask

First Usable IP Address

Last Usable IP Address

Broadcast Address

Task 3: Assign IP Addresses to the Network Devices

Assign the appropriate addresses to the device interfaces. Document the addresses to be used in the Addressing Table provided under the Topology Diagram.

Step 1: Assign addresses to the HQ router.

1. Assign the first valid host address in the HQ LAN 1 subnet to the Fa0/0 LAN interface.

2. Assign the first valid host address in the HQ LAN 2 subnet to the Fao/1 LAN interface.

3. Assign the first valid host address in the link between HQ and Branch1 subnet to the S0/0/0 interface.

4. Assign the first valid host address in the link between HQ and Branch2 subnet to the S0/0/1 interface.

151

Threshold SOB 63

Page 152: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 2: Assign addresses to the Branch1 router.

1. Assign the first valid host address in the Branch1 LAN1 subnet to the Fa0/0 LAN interface.

2. Assign the first valid host address in the Branch1 LAN2 subnet to the Fa0/1 LAN interface.

3. Assign the last valid host address on the link between Branch1 and HQ subnet to the S0/0/0 interface

4. Assign the first valid host address on the link between Branch1 and Branch2 subnet to the S0/0/1 interface.

Step 3: Assign addresses to the Branch2 router.

1. Assign the first valid host address in the Branch2 LAN1 subnet to the Fa0/0 LAN interface.

2. Assign the first valid host address in the Branch 2 LAN 2 subnet to the Fa0/1 LAN interface.

3. Assign the last valid host address on the link between HQ and Branch2 subnet to the S0/0/1 interface

4. Assign the last valid host address on the link between Branch1 and Branch2 subnet to the S0/0/0 interface.

152

Typical SOB 64

Page 153: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 19: Basic Static Route Configuration (Hardware Equipment)

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1Fa0/0 172.16.3.1 255.255.255.0 N/AS0/0/0 172.16.2.1 255.255.255.0 N/A

R2Fa0/0 172.16.1.1 255.255.255.0 N/AS0/0/0 172.16.2.2 255.255.255.0 N/AS0/0/1 192.168.1.2 255.255.255.0 N/A

R3FA0/0 192.168.2.1 255.255.255.0 N/AS0/0/1 192.168.1.1 255.255.255.0 N/A

PC1 NIC 172.16.3.10 255.255.255.0 172.16.3.1PC2 NIC 172.16.1.10 255.255.255.0 172.16.1.1PC3 NIC 192.168.2.10 255.255.255.0 192.168.2.1

Learning Objectives

Upon completion of this lab, you will be able to: Cable a network according to the Topology Diagram. Erase the startup configuration and reload a router to the default state. Perform basic configuration tasks on a router. Interpret debug ip routing output.

153

Page 154: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Configure and activate Serial and Ethernet interfaces. Test connectivity. Gather information to discover causes for lack of connectivity between devices. Configure a static route using an intermediate address. Configure a static route using an exit interface. Compare a static route with intermediate address to a static route with exit interface. Configure a default static route. Configure a summary static route. Document the network implementation.

Scenario

For this lab exercise you will have to work in threes. You will be using real hardware equipment. Show your work by answering questions where allocated.

In this lab activity, you will create a network that is similar to the one shown in the Topology Diagram. Begin by cabling the network as shown in the Topology Diagram. You will then perform the initial router configurations required for connectivity. Use the IP addresses that are provided in the Addressing Table to apply an addressing scheme to the network devices. After completing the basic configuration, test connectivity between the devices on the network. First test the connections between directly connected devices, and then test connectivity between devices that are not directly connected. Static routes must be configured on the routers for end-to-end communication to take place between the network hosts. You will configure the static routes that are needed to allow communication between the hosts. View the routing table after each static route is added to observe how the routing table has changed.

Task 1: Cable, Erase, and Reload the Routers.

Step 1: Cable a network that is similar to the one in the Topology Diagram.

Step 2: Clear the configuration on each router.

Clear the configuration on each of the routers using the erase startup-config command and then reload the routers. Answer no if asked to save changes.

154

Typical SOB 65

Page 155: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Perform Basic Router Configuration.

Note: If you have difficulty with any of the commands in this task, see Lab 10: Cabling a Network and Basic Router Configuration.

Step 1: Use global configuration commands.

On the routers, enter global configuration mode and configure the basic global configuration commands including:

hostname no ip domain-lookup enable secret (use “cisco” for password)

Step 2: Configure the console and virtual terminal line passwords on each of the routers.

Password (class) login

Step 3: Add the logging command to the console and virtual terminal lines.

This command is very helpful in both lab and production environments and uses the following syntax:

Router(config-line)#logging synchronous

To synchronize unsolicited messages and debug output with solicited Cisco IOS software output and prompts for a specific console port line, auxiliary port line, or virtual terminal line, we can use the logging synchronous line configuration command. In other words, the logging synchronous command prevents IOS messages delivered to the console or Telnet lines from interrupting your keyboard input. For example, you may have already experienced something similar to the following example:

Note: Do not configure R1 interfaces yet.

R1(config)#interface fastethernet 0/0R1(config-if)#ip address 172.16.3.1 255.255.255.0R1(config-if)#no shutdownR1(config-if)#descri*Mar 1 01:16:08.212: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state

to up*Mar 1 01:16:09.214: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to upptionR1(config-if)#

155

Page 156: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

The IOS sends unsolicited messages to the console when you activate an interface with the no shutdown command. However, the next command you enter (in this case, description) is interrupted by these messages. The logging synchronous command solves this problem by copying the command entered up to that point down to the next router prompt.

R1(config)#interface fastethernet 0/0R1(config-if)#ip address 172.16.3.1 255.255.255.0R1(config-if)#no shutdownR1(config-if)#description*Mar 1 01:28:04.242: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state

to up*Mar 1 01:28:05.243: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to upR1(config-if)#description <-- Keyboard input copied after message

R1 is shown here as an example. Add logging synchronous to the console and virtual terminal lines on all routers.

R1(config)#line console 0R1(config-line)#logging synchronousR1(config-line)#line vty 0 4R1(config-line)#logging synchronous

Step 4: Add the exec-timeout command to the console and virtual terminal lines.

To set the interval that the EXEC command interpreter waits until user input is detected, we can use the exec-timeout line configuration command. If no input is detected during the interval, the EXEC facility resumes the current connection. If no connections exist, the EXEC facility returns the terminal to the idle state and disconnects the incoming session. This command allows you to control the amount of time a console or virtual terminal line can be idle before the session is terminated. The syntax follows:

Router(config-line)#exec-timeout minutes [seconds]Syntax description:

minutes—Integer that specifies the number of minutes. seconds—(Optional) Additional time intervals in seconds.

In a lab environment, you can specify “no timeout” by entering the exec-timeout 0 0 command. This command is very helpful because the default timeout for lines is 10 minutes. However, for security purposes, you would not normally set lines to “no timeout” in a production environment.

156

Page 157: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R1 is shown here as an example.

Add exec-timeout 0 0 to console and virtual terminal lines on all routers.

R1(config)#line console 0R1(config-line)#exec-timeout 0 0R1(config-line)#line vty 0 4R1(config-line)#exec-timeout 0 0

Task 3: Interpreting Debug Output.

Note: If you already configured IP addressing on R1, please remove all interface commands now before proceeding. R1, R2 and R3 should be configured through the end of Task 2 without any interface configurations.

Step 1: On R1 from privileged EXEC mode, enter the debug ip routing command.

R1#debug ip routingIP routing debugging is on

The debug ip routing command shows when routes are added, modified, and deleted from the routing table. For example, every time you successfully configure and activate an interface, Cisco IOS adds a route to the routing table. We can verify this by observing output from the debug ip routing command.

Step 2: Enter interface configuration mode for R1’s LAN interface.

R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R1(config)#interface fastethernet 0/0

Configure the IP address as specified in the Topology Diagram.

R1(config-if)#ip address 172.16.3.1 255.255.255.0is_up: 0 state: 6 sub state: 1 line: 1 has_route: False

As soon as you press the Enter key, Cisco IOS debug output informs you that there is now a route, but its state is False. In other words, the route has not yet been added to the routing

157

Typical SOB 66

Page 158: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

table. Why did this occur and what steps should be taken to ensure that the route is entered into the routing table?______________________________________________________________________________________________________________________________________________________

Step 3: Enter the command necessary to install the route in the routing table.

After you enter the correct command, you should see debug output. Your output may be slightly different from the example below.

is_up: 1 state: 4 sub state: 1 line: 1 has_route: FalseRT: add 172.16.3.0/24 via 0.0.0.0, connected metric [0/0]RT: NET-RED 172.16.3.0/24RT: NET-RED queued, Queue size 1RT: interface FastEthernet0/0 added to routing table%LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to upis_up: 1 state: 4 sub state: 1 line: 1 has_route: True%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to upis_up: 1 state: 4 sub state: 1 line: 1 has_route: Trueis_up: 1 state: 4 sub state: 1 line: 1 has_route: True

The new network you configured on the LAN interface is now added to the routing table, as shown in the highlighted output.

If you do not see the route added to the routing table, the interface did not come up. Use the following systematic process to troubleshoot your connection:

1. Check your physical connections to the LAN interface. Is the correct interface attached? ________ Your router may have more than one LAN interface. Did you connect the correct LAN interface? ________An interface will not come up unless it detects a carrier detect signal at the Physical layer from another device. Is the interface connected to another device such as a hub, switch, or PC? ________

2. Check link lights. Are all link lights blinking? ________3. Check the cabling. Are the correct cables connected to the devices? ________4. Has the interface been activated or enabled? ________

If you can answer yes to all the proceeding questions, the interface should come up.

158

Page 159: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 4: Enter the command to verify that the new route is now in the routing table.

Your output should look similar to the following output. There should now be one route in the table for R1. What command did you use?

R1#______________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

172.16.0.0/24 is subnetted, 1 subnets

C 172.16.3.0 is directly connected, FastEthernet0/0

Step 5: Enter interface configuration mode for R1’s WAN interface connected to R2.

R1#configure terminalEnter configuration commands, one per line. End with CNTL/Z.R1(config)#interface Serial 0/0/0

Configure the IP address as specified in the Topology Diagram.

R1(config-if)#ip address 172.16.2.1 255.255.255.0is_up: 0 state: 0 sub state: 1 line: 0 has_route: False

As soon as you press the Enter key, Cisco IOS debug output informs you that there is now a route, but its state is False. Because R1 is the DCE side of our lab environment, we must specify how fast the bits will be clocked between R1 and R2.

159

Excellent SOB 67

Page 160: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 6: Enter the clock rate command on R1.

You can specify any valid clocking speed. Use the ? to find the valid rates. Here, we used 64000 bps.

R1(config-if)#clock rate 64000is_up: 0 state: 0 sub state: 1 line: 0 has_route: False

Some IOS versions display the output shown above every 30 seconds. Why is the state of the route still False? What step must you now take to make sure that the interface is fully configured?___________________________________________________________________________

Step 7: Enter the command necessary to ensure that the interface is fully configured.

R1(config-if)#_____________________________

After you enter the correct command, you should see debug output similar to the following example:

is_up: 0 state: 0 sub state: 1 line: 0 has_route: False%LINK-3-UPDOWN: Interface Serial0/0/0, changed state to down

Unlike configuring the LAN interface, fully configuring the WAN interface does not always guarantee that the route will be entered in the routing table, even if your cable connections are correct. The other side of the WAN link must also be configured.

Step 8:

If possible, establish a separate terminal session by consoling into R2 from another workstation. Doing this allows you to observe the debug output on R1 when you make changes on R2. You can also turn on debug ip routing on R2.

R2#debug ip routingIP routing debugging is on

Enter interface configuration mode for R2’s WAN interface connected to R1.

160

Typical SOB 68

Page 161: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R2#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

R2(config)#interface serial 0/0/0

Configure the IP address as specified in the Topology Diagram.

R2(config-if)#ip address 172.16.2.2 255.255.255.0is_up: 0 state: 6 sub state: 1 line: 0

Step 9: Enter the command necessary to ensure that the interface is fully configured.

R2(config-if)#_____________________________

After you enter the correct command, you should see debug output similar to the following example:

is_up: 0 state: 4 sub state: 1 line: 0%LINK-3-UPDOWN: Interface Serial0/0/0, changed state to upis_up: 1 state: 4 sub state: 1 line: 0RT: add 172.16.2.0/24 via 0.0.0.0, connected metric [0/0]RT: interface Serial0/0/0 added to routing tableis_up: 1 state: 4 sub state: 1 line: 0%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to

upis_up: 1 state: 4 sub state: 1 line: 0

The new network that you configured on the WAN interface is now added to the routing table, as shown in the highlighted output.

If you do not see the route added to the routing table, the interface did not come up. Use the following systematic process to troubleshoot your connection:

1. Check your physical connections between the two WAN interfaces for R1 and R2. Is the correct interface attached? ________ Your router has more than one WAN interface. Did you connect the correct WAN interface? ________An interface will not come up unless it detects a link beat at the Physical layer from another device. Is the interface connected to the other router’s interface? ________

2. Check link lights. Are all link lights blinking? ________

161

Page 162: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

3. Check the cabling. R1 must have the DCE side of the cable attached and R2 must have the DTE side of the cable attached. Are the correct cables connected to the routers? ________

4. Has the interface been activated or enabled? ________

If you can answer yes to all the proceeding questions, the interface should come up.

Step 10: Enter the command to verify that the new route is now in the routing table for R1 and R2.

Your output should look similar to the following output. There should now be two routes in the routing table for R1 and one route in the table for R2. What command did you use?

R1#_________________________________Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP

D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2

ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

172.16.0.0/24 is subnetted, 2 subnetsC 172.16.2.0 is directly connected, Serial0/0/0C 172.16.3.0 is directly connected, FastEthernet0/0R2#_________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

172.16.0.0/24 is subnetted, 1 subnetsC 172.16.2.0 is directly connected, Serial0/0/0

162

Page 163: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 11: Turn off debugging on both routers using either no debug ip routing or simply, undebug all.

R1(config-if)#endR1#no debug ip routingIP routing debugging is off

Task 4: Finish Configuring Router Interfaces

Step 1: Configure Remaining R2 Interfaces

Finish configuring the remaining interfaces on R2 according to the Topology Diagram and Addressing Table.

Step 2: Configure R3 Interfaces

Console into R3 and configure the necessary interfaces according to the Topology Diagram and Addressing Table.

Task 5: Configure IP Addressing on the Host PCs.

Step 1: Configure the host PC1.

Configure the host PC1 with an IP address of 172.16.3.10/24 and a default gateway of 172.16.3.1.

Step 2: Configure the host PC2.

Configure the host PC2 with an IP address of 172.16.1.10/24 and a default gateway of 172.16.1.1.

Step 3: Configure the host PC3.

Configure the host PC3 with an IP address of 192.168.2.10/24 and a default gateway of 192.168.2.1.

163

Typical SOB 69

Page 164: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 6: Test and Verify the Configurations.

Step 1: Test connectivity.

Test connectivity by pinging from each host to the default gateway that has been configured for that host.

From the host PC1, is it possible to ping the default gateway? ________From the host PC2, is it possible to ping the default gateway? ________From the host PC3, is it possible to ping the default gateway? ________

If the answer is no for any of these questions, troubleshoot the configurations to find the error using the following systematic process:

1. Check the cabling. Are the PCs physically connected to the correct router? ________(Connection could be through a switch or directly)Are link lights blinking on all relevant ports? ________

2. Check the PC configurations. Do they match the Topology Diagram? ________3. Check the router interfaces using the show ip interface brief command.

Are all relevant interfaces up and up? ________

If your answer to all three steps is yes, you should be able to successfully ping the default gateway.

Step 2: Use the ping command to test connectivity between directly connected routers.

From the router R2, is it possible to ping R1 at 172.16.2.1? ________From the router R2, is it possible to ping R3 at 192.168.1.1? ________

If the answer is no for any of these questions, troubleshoot the configurations to find the error using the following systematic process:

1. Check the cabling. Are the routers physically connected? ________Are link lights blinking on all relevant ports? ________

164

Typical SOB 70

Page 165: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

2. Check the router configurations. Do they match the Topology Diagram? ________Did you configure the clock rate command on the DCE side of the link? ________

3. Has the interface been activated or enabled? ________4. Check the router interfaces using the show ip interface brief command.

Are the interfaces up and up? ________

If your answer to all three steps is yes, you should be able to successfully ping from R2 to R1 and from R2 to R3.

Step 3: Use ping to check connectivity between devices that are not directly connected.

From the host PC3, is it possible to ping the host PC1? ________From the host PC3, is it possible to ping the host PC2? ________From the host PC2, is it possible to ping the host PC1? ________From the router R1, is it possible to ping router R3? ________These pings should all fail. Why?____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Task 7: Gather Information.

Step 1: Check status of interfaces.

Check the status of the interfaces on each router with the command show ip interface brief. The following output is for R2.

R2#show ip interface briefInterface IP-Address OK? Method Status ProtocolFastEthernet0/0 172.16.1.1 YES manual up upFastEthernet0/1 unassigned YE Sunset administratively downdownSerial0/0/0 172.16.2.2 YES manual up upSerial0/0/1 192.168.1.2 YES manual up upVlan1 unassigned YES manual administratively down down

165

Typical SOB 71

Page 166: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Are all of the relevant interfaces on each router activated (that is, in the up and up state)? _________How many interfaces are activated on R1 and R3? __________Why are there three activated interfaces on R2? _______________________________________________________________________________________________________________

Step 2: View the routing table information for all three routers.

R1#________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

172.16.0.0/24 is subnetted, 2 subnetsC 172.16.2.0 is directly connected, Serial0/0/0C 172.16.3.0 is directly connected, FastEthernet0/0

What networks are present in the Topology Diagram but not in the routing table for R1? ___________________________________________________________________________

R2#_________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR

Gateway of last resort is not set

172.16.0.0/24 is subnetted, 2 subnetsC 172.16.1.0 is directly connected, FastEthernet0/0C 172.16.2.0 is directly connected, Serial0/0/0C 192.168.1.0/24 is directly connected, Serial0/0/1

What networks are present in the Topology Diagram but not in the routing table for R2? ___________________________________________________________________________

166

Page 167: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R3#_________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR

Gateway of last resort is not set

C 192.168.1.0/24 is directly connected, Serial0/0/1C 192.168.2.0/24 is directly connected, FastEthernet0/0

What networks are present in the Topology Diagram but not in the routing table for R3? ___________________________________________________________________________

Why are all the networks not in the routing tables for each of the routers?______________________________________________________________________________________________________________________________________________________

What can be added to the network so that devices that are not directly connected can ping each other? ___________________________________________________________________________

Task 8: Configure a Static Route Using a Next-Hop Address.

Step 1: To configure static routes with a next-hop specified, use the following syntax:

Router(config)# ip route network-address subnet-mask ip-address network-address:—Destination network address of the remote network to be

added to the routing table. subnet-mask—Subnet mask of the remote network to be added to the routing

table. The subnet mask can be modified to summarize a group of networks. ip-address—Commonly referred to as the next-hop router’s IP address.

On the R3 router, configure a static route to the 172.16.1.0 network using the Serial 0/0/1 interface of R2 as the next-hop address.

167

Excellent SOB 72

Page 168: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R3(config)#ip route 172.16.1.0 255.255.255.0 192.168.1.2R3(config)#

Step 2: View the routing table to verify the new static route entry.

Notice that the route is coded with an S, which means that the route is a static route.

R3#_________________________________

Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR

Gateway of last resort is not set

172.16.0.0/24 is subnetted, 1 subnetsS 172.16.1.0 [1/0] via 192.168.1.2C 192.168.1.0/24 is directly connected, Serial0/0/1C 192.168.2.0/24 is directly connected, FastEthernet0/0R3#

With this route entered in the routing table, any packet that matches the first 24 left-most bits of 172.16.1.0/24 will be forwarded to the next-hop router at 192.168.1.2. What interface will R3 use to forward packets to the 172.16.1.0/24 network? ____________

Assume that the following packets have arrived at R3 with the indicated destination addresses. Will R3 discard the packet or forward the packet? If R3 forwards the packet, with what interface will R3 send the packet?

Packet Destination IP Discard or Forward? Interface1 172.16.2.1 _________ _________2 172.16.1.10 _________ _________3 192.168.1.2 _________ _________4 172.16.3.10 _________ _________5 192.16.2.10 _________ _________

Although R3 will forward packets to destinations for which there is a route, this does not mean that a packet will arrive safely at the final destination.

168

Page 169: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 3: Use ping to check connectivity between the host PC3 and the host PC2.

From the host PC3, is it possible to ping the host PC2? ________These pings should fail. The pings will arrive at PC2 if you have configured and verified all devices through Task 7, “Gather Information.” PC2 will send a ping reply back to PC3. However, the ping reply will be discarded at R2 because the R2 does not have a return route to the 192.168.2.0 network in the routing table.

Step 4: On the R2 router, configure a static route to reach the 192.168.2.0 network.

What is the next-hop address to which R2 would send a packet destined for the 192.168.2.0/24 network?

R2(config)#ip route 192.168.2.0 255.255.255.0 ________________R2(config)#

Step 5: View the routing table to verify the new static route entry.

Notice that the route is coded with an S, which means the route is a static route.

R2#_________________________________

Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR

Gateway of last resort is not set

172.16.0.0/24 is subnetted, 2 subnetsC 172.16.1.0 is directly connected, FastEthernet0/0C 172.16.2.0 is directly connected, Serial0/0/0C 192.168.1.0/24 is directly connected, Serial0/0/1S 192.168.2.0/24 [1/0] via 192.168.1.1R2#

Step 6: Use ping to check connectivity between the host PC3 and the host PC2.

From the host PC3, is it possible to ping the host PC2? ________This ping should be successful.

169

Page 170: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 9: Configure a Static Route Using an Exit Interface.

To configure static routes with an exit interface specified, use the following syntax:

Router(config)# ip route network-address subnet-mask exit-interface

network-address—Destination network address of the remote network to be added to the routing table.

subnet-mask—Subnet mask of the remote network to be added to the routing table. The subnet mask can be modified to summarize a group of networks.

exit-interface—Outgoing interface that would be used in forwarding packets to the destination network.

Step 1: On the R3 router, configure a static route.

On the R3 router, configure a static route to the 172.16.2.0 network using the Serial 0/0/1 interface of the R3 router as the exit interface.

R3(config)# ip route 172.16.2.0 255.255.255.0 Serial0/0/1R3(config)#

Step 2: View the routing table to verify the new static route entry.

R3#________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR

Gateway of last resort is not set

172.16.0.0/24 is subnetted, 2 subnetsS 172.16.1.0 [1/0] via 192.168.1.2S 172.16.2.0 is directly connected, Serial0/0/1C 192.168.1.0/24 is directly connected, Serial0/0/1C 192.168.2.0/24 is directly connected, FastEthernet0/0R3#

Use the show running-config command to verify the static routes that are currently configured on R3.

R3#show running-config

170

Page 171: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Building configuration...

<output omitted>!hostname R3!interface FastEthernet0/0ip address 192.168.2.1 255.255.255.0!interface Serial0/0/0 no ip address shutdown!interface Serial0/0/1 ip address 192.168.1.1 255.255.255.0!ip route 172.16.1.0 255.255.255.0 192.168.1.2ip route 172.16.2.0 255.255.255.0 Serial0/0/1!end

How would you remove either of these routes from the configuration?___________________________________________________________________________

Step 3: On the R2 router, configure a static route.

On the R2 router, configure a static route to the 172.16.3.0 network using the Serial 0/0/0 interface of the R2 router as the exit interface.

R2(config)# ip route 172.16.3.0 255.255.255.0 Serial0/0/0R2(config)#

Step 4: View the routing table to verify the new static route entry.

R2#_________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR

Gateway of last resort is not set171

Page 172: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

172.16.0.0/24 is subnetted, 3 subnetsC 172.16.1.0 is directly connected, FastEthernet0/0C 172.16.2.0 is directly connected, Serial0/0/0S 172.16.3.0 is directly connected, Serial0/0/0C 192.168.1.0/24 is directly connected, Serial0/0/1S 192.168.2.0/24 [1/0] via 192.168.1.1R2#

At this point, R2 has a complete routing table with valid routes to all five networks shown in the Topology Diagram. Does this mean that R2 can receive ping replies from all destinations shown in the Topology Diagram? ________Why or why not?______________________________________________________________________________________________________________________________________________________

Step 5: Use ping to check connectivity between the host PC2 and PC1.

This ping should fail because the R1 router does not have a return route to the 172.16.1.0 network in the routing table.

Task 10: Configure a Default Static Route.

In the previous steps, you configured the router for specific destination routes. But could you do this for every route on the Internet? No. The router and you would be overwhelmed. To minimize the size of the routing tables, add a default static route. A router uses the default static route when there is not a better, more specific route to a destination.

Instead of filling the routing table of R1 with static routes, we could assume that R1 is a stub router. This means that R2 is the default gateway for R1. If R1 has packets to route that do not belong to any of R1 directly connected networks, R1 should send the packet to R2. However, we must explicitly configure R1 with a default route before it will send packets with unknown destinations to R2. Otherwise, R1 discards packets with unknown destinations.

To configure a default static route, use the following syntax:

Router(config)#ip route 0.0.0.0 0.0.0.0 { ip-address | interface }

Step 1: Configure the R1 router with a default route.

Configure the R1 router with a default route using the interface option on Serial 0/0/0 of R1 as the next-hop interface.

172

Page 173: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R1(config)#ip route 0.0.0.0 0.0.0.0 172.16.2.2R1(config)#

Step 2: View the routing table to verify the new static route entry.

R1#________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default U - per-user static route, o - ODR

Gateway of last resort is 172.16.2.2 to network 0.0.0.0

172.16.0.0/24 is subnetted, 2 subnets

C 172.16.2.0 is directly connected, Serial0/0/0C 172.16.3.0 is directly connected, FastEthernet0/0S* 0.0.0.0/0 [1/0] via 172.16.2.2R1#

Note that the R1 router now has a default route, the gateway of last resort, and will send all unknown traffic out Serial 0/0/0, which is connected to R2.

Step 3: Use ping to check connectivity between the host PC2 and PC1.

From the host PC2, is it possible to ping PC1? ________This ping should be successful this time because the R1 router can return the packet using the default route.From the host PC3, is it possible to ping the host PC1? ________Is there a route to the 172.16.3.0 network in the routing table on the R3 router? ________

Task 11: Configure a Summary Static Route.

We could configure another static route on R3 for the 172.16.3.0 network. However, we already have two static routes to 172.16.2.0/24 and 172.16.1.0/24. Because these networks are so close together, we can summarize them into one route. Again, doing this helps reduce the size of routing tables, which makes the route lookup process more efficient.

173

Threshold SOB 73

Page 174: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Looking at the three networks at the binary level, we can a common boundary at the 22 nd bit from the left.172.16.1.0 10101100.00010000.00000001.00000000172.16.2.0 10101100.00010000.00000010.00000000172.16.3.0 10101100.00010000.00000011.00000000

The prefix portion will include 172.16.0.0, because this would be the prefix if we turned off all the bits to the right of the 22nd bit.

Prefix 172.16.0.0

To mask the first 22 left-most bits, we use a mask with 22 bits turned on from left to right:

Bit Mask 11111111.11111111.11111100.00000000

This mask, in dotted-decimal format, is...

Mask 255.255.252.0

Step 1: Configure the summary static route on the R3 router.

The network to be used in the summary route is 172.16.0.0/22. R3(config)#ip route 172.16.0.0 255.255.252.0 192.168.1.2

Step 2: Verify that the summary route is installed in the routing table.

R3#________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

172.16.0.0/16 is variably subnetted, 3 subnets, 2 masksS 172.16.0.0/22 [1/0] via 192.168.1.2S 172.16.1.0/24 [1/0] via 192.168.1.2S 172.16.2.0/24 is directly connected, Serial0/0/1C 192.168.1.0/24 is directly connected, Serial0/0/1C 192.168.2.0/24 is directly connected, FastEthernet0/0

174

Page 175: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Configuring a summary route on R3 did not remove the static routes configured earlier because these routes are more specific routes. They both use /24 mask, whereas the new summary will be using a /22 mask. To reduce the size of the routing table, we can now remove the more specific /24 routes.

Step 3: Remove static routes on R3.

Remove the two static routes that are currently configured on R3 by using the no form of the command.

R3(config)#no ip route 172.16.1.0 255.255.255.0 192.168.1.2 R3(config)#no ip route 172.16.2.0 255.255.255.0 Serial0/0/1

Step 4: Verify that the routes are no longer in the routing table.

R3#_________________________________Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

172.16.0.0/22 is subnetted, 1 subnetsS 172.16.0.0 [1/0] via 192.168.1.2C 192.168.1.0/24 is directly connected, Serial0/0/1C 192.168.2.0/24 is directly connected, FastEthernet0/0

R3 now only has one route to any host belonging to networks 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24. Traffic destined for these networks will be sent to R2 at 192.168.1.2.

Step 5: Use ping to check connectivity between the host PC3 and PC1.

From the host PC3, is it possible to ping the host PC1? ________This ping should be successful this time because there is a route to the 172.16.3.0 network on the R3 router, and the R1 router can return the packet using the default route.

175

Page 176: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 12: Summary, Reflection, and Documentation

With the completion of this lab, you have: Configured your first network with a combination of static and default routing to

provide full connectivity to all networks Observed how a route is installed in the routing table when you correctly configure

and activate the interface Learned how to statically configure routes to destinations that are not directly

connected Learned how to configure a default route that is used to forward packets to unknown

destinations Learned how to summarize a group of networks into one static route to reduce the size

of a routing tableAlong the way, you have also probably encountered some problems either in your physical lab setup or in your configurations. Hopefully, you have learned to systematically troubleshoot such problems. At this point, record any comments or notes that may help you in future labs.____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Finally, you should document your network implementation. On each router, capture the following command output to a text (.txt) file and save for future reference.

show running-config show ip route show ip interface brief

176

Threshold SOB 74

Page 177: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 13: Clean Up

Erase the configurations and reload the routers. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.

177

Excellent SOB 75

Page 178: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 20: Basic RIP Configuration (Packet Tracer)

Topology Diagram

Learning Objectives

Upon completion of this lab, you will be able to:

Cable a network according to the Topology Diagram. Erase the startup configuration and reload a router to the default state. Perform basic configuration tasks on a router. Configure and activate interfaces. Configure RIP routing on all routers. Verify RIP routing using show and debug commands. Reconfigure the network to make it contiguous. Observe automatic summarization at boundary router. Gather information about RIP processing using the debug ip rip command. Configure a static default route. Propagate default routes to RIP neighbours. Document the RIP configuration.

Scenarios

Scenario A: Running RIPv1 on Classful Networks Scenario B: Running RIPv1 with Subnets and Between Classful Networks Scenario C: Running RIPv1 on a Stub Network.

178

Page 179: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Scenario A: Running RIPv1 on Classful Networks

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1 Fa0/0 192.168.1.1 255.255.255.0 N/AS0/0/0 192.168.2.1 255.255.255.0 N/A

R2Fa0/0 192.168.3.1 255.255.255.0 N/AS0/0/0 192.168.2.2 255.255.255.0 N/AS0/0/1 192.168.4.2 255.255.255.0 N/A

R3 Fa0/0 192.168.5.1 255.255.255.0 N/AS0/0/1 192.168.4.1 255.255.255.0 N/A

PC1 NIC 192.168.1.10 255.255.255.0 192.168.1.1PC2 NIC 192.168.3.10 255.255.255.0 192.168.3.1PC3 NIC 192.168.5.10 255.255.255.0 192.168.5.1

179

Page 180: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 1: Prepare the Network.

Step 1: Cable a network that is similar to the one in the Topology Diagram.

Step 2: Clear any existing configurations on the routers.

Task 2: Perform Basic Router Configurations.

Perform basic configuration of the R1, R2, and R3 routers according to the following guidelines:

1. Configure the router hostname.2. Disable DNS lookup.3. Configure an EXEC mode password.4. Configure a message-of-the-day banner.5. Configure a password for console connections.6. Configure a password for VTY connections.

Task 3: Configure and Activate Serial and Ethernet Addresses.

Step 1: Configure interfaces on R1, R2, and R3.

Configure the interfaces on the R1, R2, and R3 routers with the IP addresses from the table under the Topology Diagram.

Step 2: Verify IP addressing and interfaces.

Use the show ip interface brief command to verify that the IP addressing is correct and that the interfaces are active.

Are all router interfaces active? _________

Are you able to get a successful reply between all routers interfaces? _________

180

Typical SOB 76

Typical SOB 77

Page 181: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

If not troubleshoot the problem before you proceed.

Step 3: Configure Ethernet interfaces of PC1, PC2, and PC3.

Configure the Ethernet interfaces of PC1, PC2, and PC3 with the IP addresses and default gateways from the table under the Topology Diagram.

Step 4: Test the PC configuration by pinging the default gateway from the PC.

Is network connection successful? __________

Task 4: Configure RIP.

Step 1: Enable dynamic routing.

To enable a dynamic routing protocol, enter global configuration mode and use the router command.

Enter router ? at the global configuration prompt to a see a list of available routing protocols on your router.

To enable RIP, enter the command router rip in global configuration mode.

R1(config)#router ripR1(config-router)#

Step 2: Enter classful network addresses.

Once you are in routing configuration mode, enter the classful network address for each directly connected network, using the network command.

R1(config-router)#network 192.168.1.0R1(config-router)#network 192.168.2.0R1(config-router)#

The network command:

Enables RIP on all interfaces that belong to this network. These interfaces will now both send and receive RIP updates.

Advertises this network in RIP routing updates sent to other routers every 30 seconds.

181

Typical SOB 78

Page 182: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

When you are finished with the RIP configuration, return to privileged EXEC mode.

R1(config-router)#end%SYS-5-CONFIG_I: Configured from console by consoleR1#

Step 3: Configure RIP on the R2 router using the router rip and network commands.

R2(config)#router ripR2(config-router)#network 192.168.2.0R2(config-router)#network 192.168.3.0R2(config-router)#network 192.168.4.0R2(config-router)#end%SYS-5-CONFIG_I: Configured from console by consoleR2#

When you are finished with the RIP configuration, return to privileged EXEC mode.

Step 4: Configure RIP on the R3 router using the router rip and network commands.

R3(config)#router ripR3(config-router)#network 192.168.4.0R3(config-router)#network 192.168.5.0R3(config-router)#end%SYS-5-CONFIG_I: Configured from console by consoleR3#

When you are finished with the RIP configuration, return to privileged EXEC mode.

Task 5: Verify RIP Routing.

Step 1: Use the show ip route command to verify that each router has all of the networks in the topology entered in the routing table.

Routes learned through RIP are coded with an R in the routing table. If the tables are not converged as shown here, troubleshoot your configuration.

182

Excellent SOB 79

Page 183: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Did you verify that the configured interfaces are active? ___________

Did you configure RIP correctly? ___________

Return to Task 3 and Task 4 to review the steps necessary to achieve convergence.

R1#show ip routeCodes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

C 192.168.1.0/24 is directly connected, FastEthernet0/0C 192.168.2.0/24 is directly connected, Serial0/0/0R 192.168.3.0/24 [120/1] via 192.168.2.2, 00:00:04, Serial0/0/0R 192.168.4.0/24 [120/1] via 192.168.2.2, 00:00:04, Serial0/0/0R 192.168.5.0/24 [120/2] via 192.168.2.2, 00:00:04, Serial0/0/0R1#

R2#show ip route

<Output omitted>

R 192.168.1.0/24 [120/1] via 192.168.2.1, 00:00:22, Serial0/0/0C 192.168.2.0/24 is directly connected, Serial0/0/0C 192.168.3.0/24 is directly connected, FastEthernet0/0C 192.168.4.0/24 is directly connected, Serial0/0/1R 192.168.5.0/24 [120/1] via 192.168.4.1, 00:00:23, Serial0/0/1R2#

R3#show ip route

<Output omitted>

R 192.168.1.0/24 [120/2] via 192.168.4.2, 00:00:18, Serial0/0/1R 192.168.2.0/24 [120/1] via 192.168.4.2, 00:00:18, Serial0/0/1R 192.168.3.0/24 [120/1] via 192.168.4.2, 00:00:18, Serial0/0/1

183

Page 184: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

C 192.168.4.0/24 is directly connected, Serial0/0/1C 192.168.5.0/24 is directly connected, FastEthernet0/0R3#

Step 2: Use the show ip protocols command to view information about the routing processes.

The show ip protocols command can be used to view information about the routing processes that are occurring on the router. This output can be used to verify most RIP parameters to confirm that:

RIP routing is configured The correct interfaces send and receive RIP updates The router advertises the correct networks RIP neighbors are sending updates

R1#show ip protocols Routing Protocol is "rip"Sending updates every 30 seconds, next due in 16 secondsInvalid after 180 seconds, hold down 180, flushed after 240Outgoing update filter list for all interfaces is not setIncoming update filter list for all interfaces is not setRedistributing: ripDefault version control: send version 1, receive any version

Interface Send Recv Triggered RIP Key-chainFastEthernet0/0 1 2 1 Serial0/0/0 1 2 1

Automatic network summarization is in effectMaximum path: 4Routing for Networks:

192.168.1.0192.168.2.0

Passive Interface(s):Routing Information Sources:

Gateway Distance Last Update192.168.2.2 120

Distance: (default is 120)R1#

184

Page 185: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R1 is indeed configured with RIP. R1 is sending and receiving RIP updates on FastEthernet0/0 and Serial0/0/0. R1 is advertising networks 192.168.1.0 and 192.168.2.0. R1 has one routing information source. R2 is sending R1 updates.

Step 3: Use the debug ip rip command to view the RIP messages being sent and received.

Rip updates are sent every 30 seconds so you may have to wait for debug information to be displayed.

R1#debug ip ripR1#RIP: received v1 update from 192.168.2.2 on Serial0/0/0 192.168.3.0 in 1 hops 192.168.4.0 in 1 hops 192.168.5.0 in 2 hopsRIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (192.168.1.1)RIP: build update entries network 192.168.2.0 metric 1 network 192.168.3.0 metric 2 network 192.168.4.0 metric 2 network 192.168.5.0 metric 3RIP: sending v1 update to 255.255.255.255 via Serial0/0/0 (192.168.2.1)RIP: build update entries network 192.168.1.0 metric 1

The debug output shows that R1 receives an update from R2. Notice how this update includes all the networks that R1 does not already have in its routing table. Because the FastEthernet0/0 interface belongs to the 192.168.1.0 network configured under RIP, R1 builds an update to send out that interface. The update includes all networks known to R1 except the network of the interface. Finally, R1 builds an update to send to R2. Because of split horizon, R1 only includes the 192.168.1.0 network in the update.

Step 4: Discontinue the debug output with the undebug all command.

R1#undebug allAll possible debugging has been turned off

185

Excellent SOB 80

Page 186: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Scenario B: Running RIPv1 with Subnets and Between Classful Networks

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

R1Fa0/0 172.30.1.1 255.255.255.0 N/AS0/0/0 172.30.2.1 255.255.255.0 N/A

R2Fa0/0 172.30.3.1 255.255.255.0 N/AS0/0/0 172.30.2.2 255.255.255.0 N/AS0/0/1 192.168.4.9 255.255.255.252 N/A

R3Fa0/0 192.168.5.1 255.255.255.0 N/AS0/0/1 192.168.4.10 255.255.255.252 N/A

PC1 NIC 172.30.1.10 255.255.255.0 172.30.1.1PC2 NIC 172.30.3.10 255.255.255.0 172.30.3.1PC3 NIC 192.168.5.10 255.255.255.0 192.168.5.1

Task 1: Make Changes between Scenario A and Scenario B

Step 1: Change the IP addressing on the interfaces as shown in the Topology Diagram and the Addressing Table.

Sometimes when changing the IP address on a serial interface, you may need to reset that interface by using the shutdown command, waiting for the LINK-5-CHANGED message,

186

Page 187: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

and then using the no shutdown command. This process will force the IOS to starting using the new IP address.

R1(config)#int s0/0/0

R1(config-if)#ip add 172.30.2.1 255.255.255.0R1(config-if)#shutdown

%LINK-5-CHANGED: Interface Serial0/0/0, changed state to administratively down%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to downR1(config-if)#no shutdown

%LINK-5-CHANGED: Interface Serial0/0/0, changed state to upR1(config-if)#%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up

Step 2: Verify that routers are active.

After reconfiguring all the interfaces on all three routers, verify that all necessary interfaces are active with the show ip interface brief command.

Did you verify that the configured interfaces are active? ___________

Step 3: Remove the RIP configurations from each router.

Although you can remove the old network commands with the no version of the command, it is more efficient to simply remove RIP and start over. Remove the RIP configurations from each router with the no router rip global configuration command. This will remove all the RIP configuration commands including the network commands.

R1(config)#no router rip

R2(config)#no router rip

R3(config)#no router rip

Why is it necessary to remove rip configuration at this stage?

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

187

Page 188: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Configure RIP

Step 1: Configure RIP routing on R1 as shown below.

R1(config)#router ripR1(config-router)#network 172.30.0.0

Notice that only a single network statement is needed for R1. This statement includes both interfaces on different subnets of the 172.30.0.0 major network.

Step 2: Configure R1 to stop sending updates out the FastEthernet0/0 interface.

The passive-interface fastethernet 0/0 command is used to disable sending RIPv1 updates out that interface. When you are finished with the RIP configuration, return to privileged EXEC mode.

R1(config-router)#passive-interface fastethernet 0/0R1(config-router)#end%SYS-5-CONFIG_I: Configured from console by consoleR1#

Why is it necessary to stop R1 from sending updates out of Fa0/0?_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Step 3: Configure RIP routing on R2 as shown below.

R2(config)#router rip R2(config-router)#network 172.30.0.0

188

Typical SOB 81

Excellent SOB 82

Page 189: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R2(config-router)#network 192.168.4.0R2(config-router)#passive-interface fastethernet 0/0R2(config-router)#end%SYS-5-CONFIG_I: Configured from console by consoleR2#

Again notice that only a single network statement is needed for the two subnets of 172.30.0.0. This statement includes both interfaces, on different subnets, of the 172.30.0.0 major network. The network for the WAN link between R2 and R3 is also configured.

When you are finished with the RIP configuration, return to privileged EXEC mode.

Step 4: Configure RIP routing on R3 as shown below.

R3(config)#router rip R3(config-router)#network 192.168.4.0R3(config-router)#network 192.168.5.0R3(config-router)#passive-interface fastethernet 0/0R3(config-router)#end%SYS-5-CONFIG_I: Configured from console by consoleR3#

When you are finished with the RIP configuration, return to privileged EXEC mode.

Task 3: Verify RIP Routing

Step 1: Use the show ip route command to verify that each router has all of the networks in the topology in the routing table.

R1#show ip route

<Output omitted>

172.30.0.0/24 is subnetted, 3 subnetsC 172.30.1.0 is directly connected, FastEthernet0/0C 172.30.2.0 is directly connected, Serial0/0/0R 172.30.3.0 [120/1] via 172.30.2.2, 00:00:22, Serial0/0/0R 192.168.4.0/24 [120/1] via 172.30.2.2, 00:00:22, Serial0/0/0

189

Typical SOB 83

Page 190: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

R 192.168.5.0/24 [120/2] via 172.30.2.2, 00:00:22, Serial0/0/0R1#Note: RIPv1 is a classful routing protocol. Classful routing protocols do not send the subnet mask with network in routing updates. For example, 172.30.1.0 is sent by R2 to R1 without any subnet mask information.

R2#show ip route

<Output omitted>

172.30.0.0/24 is subnetted, 3 subnetsR 172.30.1.0 [120/1] via 172.30.2.1, 00:00:04, Serial0/0/0C 172.30.2.0 is directly connected, Serial0/0/0C 172.30.3.0 is directly connected, FastEthernet0/0 192.168.4.0/30 is subnetted, 1 subnetsC 192.168.4.8 is directly connected, Serial0/0/1R 192.168.5.0/24 [120/1] via 192.168.4.10, 00:00:19, Serial0/0/1R2#

R3#show ip route

<Output omitted>

R 172.30.0.0/16 [120/1] via 192.168.4.9, 00:00:22, Serial0/0/1 192.168.4.0/30 is subnetted, 1 subnetsC 192.168.4.8 is directly connected, Serial0/0/1C 192.168.5.0/24 is directly connected, FastEthernet0/0

Step 2: Verify that all necessary interfaces are active.

If one or more routing tables does not have a converged routing table, first make sure that all necessary interfaces are active with show ip interface brief.

Then use show ip protocols to verify the RIP configuration. Notice in the output from this command that the FastEthernet0/0 interface is no longer listed under Interface but is now listed under a new section of the output: Passive Interface(s).

R1#show ip protocolsRouting Protocol is "rip" Sending updates every 30 seconds, next due in 20 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Outgoing update filter list for all interfaces is not set

190

Page 191: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Incoming update filter list for all interfaces is not set Redistributing: rip Default version control: send version 2, receive version 2

Interface Send Recv Triggered RIP Key-chainSerial0/1/0 2 2

Automatic network summarization is in effect Maximum path: 4 Routing for Networks: 172.30.0.0 209.165.200.0Passive Interface(s):

FastEthernet0/0 Routing Information Sources: Gateway Distance Last Update 209.165.200.229 120 00:00:15 Distance: (default is 120)

Step 3: View the RIP messages being sent and received.

To view the RIP messages being sent and received use the debug ip rip command. Why are there no messages being sent from Fa0/0?

______________________________________________________________________________________________________________________________________________________

R1#debug ip ripR1#RIP: sending v1 update to 255.255.255.255 via Serial0/0/0 (172.30.2.1)RIP: build update entries network 172.30.1.0 metric 1RIP: received v1 update from 172.30.2.2 on Serial0/0/0 172.30.3.0 in 1 hops

Step 4: Discontinue the debug output with the undebug all command.

R1#undebug allAll possible debugging has been turned off

191

Typical SOB 84

Page 192: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

192

Excellent SOB 85

Page 193: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Scenario C: Running RIPv1 on a Stub Network

Topology Diagram

Background

In this scenario we will modify Scenario B to only run RIP between R1 and R2. Scenario C is a typical configuration for most companies connecting a stub network to a central headquarters router or an ISP. Typically, a company runs a dynamic routing protocol (RIPv1 in our case) within the local network but finds it unnecessary to run a dynamic routing protocol between the company’s gateway router and the ISP. For example, colleges with multiple campuses often run a dynamic routing protocol between campuses but use default routing to the ISP for access to the Internet. In some cases, remote campuses may even use default routing to the main campus, choosing to use dynamic routing only locally.

To keep our example simple, for Scenario C, we left the addressing intact from Scenario B. Let’s assume that R3 is the ISP for our Company XYZ, which consists of the R1 and R2 routers using the 172.30.0.0/16 major network, subnetted with a /24 mask. Company XYZ is a stub network, meaning that there is only one way in and one way out of the 172.30.0.0/16 network—in via R2 (the gateway router) and out via R3 (the ISP). It doesn’t make sense for R2 to send R3 RIP updates for the 172.30.0.0 network every 30 seconds, because R3 has no other way to get to 172.30.0.0 except through R2. It makes more sense for R3 to have a static route configured for the 172.30.0.0/16 network pointing to R2.

How about traffic from Company XYZ toward the Internet? It makes no sense for R3 to send over 120,000 summarized Internet routes to R2. All R2 needs to know is that if a packet is not destined for a host on the 172.30.0.0 network, then it should send the packet to the ISP, R3. This is the same for all other Company XYZ routers (only R1 in our case). They should

193

Page 194: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

send all traffic not destined for the 172.30.0.0 network to R2. R2 would then forward the traffic to R3.

Task 1: Make Changes between Scenario B and Scenario C.

Step 1: Remove network 192.168.4.0 from the RIP configuration for R2.

Why should you remove network 192.168.4.0 from the RIP configuration for R2?____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

R2(config)#router ripR2(config-router)#no network 192.168.4.0

Step 2: Completely remove RIP routing from R3.

R3(config)#no router rip

Task 2: Configure the Static Route on R3 for the 172.30.0.0/16 network.

Why do you need to configure Static Route on R3?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

R3(config)#ip route 172.30.0.0 255.255.252.0 serial0/0/1

194

Typical SOB 86

Excellent SOB 87

Page 195: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 3: Configure a Default Static Route on R2.

Step 1: Configure R2 to send default traffic to R3.

Configure a default static route on R2 that will send all default traffic—packets with destination IP addresses that do not match a specific route in the routing table—to R3.

R2(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0/1

Step 2: Configure R2 to send default static route information to R1.

The default-information originate command is used to configure R2 to include the default static route with its RIP updates. Configure this command on R2 so that the default static route information is sent to R1.

R2(config)#router rip R2(config-router)#default-information originate R2(config-router)#

Note: Sometimes it is necessary to clear the RIP routing process before the default-information originate command will work. First, try the command clear ip route * on both R1 and R2. This command will cause the routers to immediately flush routes in the routing table and request updates from each other. Sometimes this does not work with RIP. If the default route information is still not sent to R1, save the configuration on R1 and R2 and then reload both routers. Doing this will reset the hardware and both routers will restart the RIP routing process.

Task 4: Verify RIP Routing.

Step 1: Use the show ip route command to view the routing table on R2 and R1.

R2#show ip route

Notice that R2 now has a static route tagged as a candidate default.

R1#show ip route

195

Typical SOB 88

Page 196: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Notice that R1 now has a RIP route tagged as a candidate default route. The route is the “quad-zero” default route sent by R2. R1 will now send default traffic to the Gateway of last resort at 172.30.2.2, which is the IP address of R2.

Step 2: View the RIP updates that are sent and received on R1 with the debug ip rip command.

R1#debug ip ripRIP protocol debugging is onR1#RIP: sending v1 update to 255.255.255.255 via Serial0/0/0 (172.30.2.1)RIP: build update entries network 172.30.1.0 metric 1RIP: received v1 update from 172.30.2.2 on Serial0/0/0 0.0.0.0 in 1 hops 172.30.3.0 in 1 hops

Notice that R1 is receiving the default route from R2.

Step 3: Discontinue the debug output with the undebug all command.

R1#undebug all

Step 4: Use the show ip route command to view the routing table on R3.

R3#show ip route

Notice that RIP is not being used on R3. The only route that is not directly connected is the static route.

Task 5: Document the Router Configurations

On each router, capture the following command output to a text file and save for future reference:

Running configuration Routing table Interface summarization Output from show ip protocols

196

Typical SOB 89

Page 197: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

197

Excellent SOB 90

Page 198: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Lab 21 - Configuring VLANs and Trunking (Hardware Equipment)

Topology

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

S1 VLAN 1 192.168.1.11 255.255.255.0 N/AS2 VLAN 1 192.168.1.12 255.255.255.0 N/APC-A NIC 192.168.10.3 255.255.255.0 192.168.10.1PC-B NIC 192.168.10.4 255.255.255.0 192.168.10.1PC-C NIC 192.168.20.3 255.255.255.0 192.168.20.1

Objectives

Part 1: Build the Network and Configure Basic Device Settings

Part 2: Create VLANs and Assign Switch Ports

Part 3: Maintain VLAN Port Assignments and the VLAN Database

198

Page 199: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Part 4: Configure an 802.1Q Trunk between the Switches

Part 5: Delete the VLAN Database

Background / Scenario

Modern switches use virtual local-area networks (VLANs) to improve network performance by separating large Layer 2 broadcast domains into smaller ones. VLANs can also be used as a security measure by controlling which hosts can communicate. In general, VLANs make it easier to design a network to support the goals of an organization.

VLAN trunks are used to span VLANs across multiple devices. Trunks allow the traffic from multiple VLANS to travel over a single link, while keeping the VLAN identification and segmentation intact.

In this lab, you will create VLANs on both switches in the topology, assign VLANs to switch access ports, verify that VLANs are working as expected, and then create a VLAN trunk between the two switches to allow hosts in the same VLAN to communicate through the trunk, regardless of which switch the host is actually attached to.

Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs.

Note: Ensure that the switches have been erased and have no startup configurations. If you are unsure contact your instructor.

Required Resources

2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)

3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)

Console cables to configure the Cisco IOS devices via the console ports Ethernet cables as shown in the topology

Task 1: Build the Network and Configure Basic Device Settings

Step 1: Cable the network as shown in the topology.

Attach the devices as shown in the topology diagram, and cable as necessary.

199

Page 200: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 2: Initialize and reload the switches as necessary.

Step 3: Configure basic settings for each switch.

a. Disable DNS lookup.b. Configure device name as shown in the topology.c. Assign class as the privileged EXEC password.d. Assign cisco as the console and vty passwords and enable login for console and vty

lines.e. Configure logging synchronous for the console line.f. Configure a MOTD banner to warn users that unauthorized access is prohibited.g. Configure the IP address listed in the Addressing Table for VLAN 1 on both switches.h. Administratively deactivate all unused ports on the switch.i. Copy the running configuration to the startup configuration.

Step 4: Configure PC hosts.

Refer to the Addressing Table for PC host address information.

Step 5: Test connectivity.

Verify that the PC hosts can ping one another.

Note: It may be necessary to disable the PCs firewall to ping between PCs. Can PC-A ping

PC-B?

Can PC-A ping PC-C? Can PC-A ping S1? Can PC-B ping

PC-C? Can PC-B ping S2? Can PC-C ping

S2? Can S1 ping S2?

If you answered no to any of the above questions, why were the pings unsuccessful?

______________________________________________________________________________________________________________________________________________________

200

Typical SOB 91

Page 201: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Task 2: Create VLANs and Assign Switch Ports

In Task 2, you will create student, faculty, and management VLANs on both switches. You will then assign the VLANs to the appropriate interface. The show vlan command is used to verify your configuration settings.

Step 1: Create VLANs on the switches.

a. Create the VLANs on S1.S1(config)# vlan 10S1(config-vlan)# name Student S1(config-vlan)# vlan 20 S1(config-vlan)# name Faculty S1(config-vlan)# vlan 99 S1(config-vlan)# name Management S1(config-vlan)# end

b. Create the same VLANs on S2.c. Issue the show vlan command to view the list of VLANs on S1.

S1# show vlan

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------

default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 Fa0/21, Fa0/22, Fa0/23, Fa0/24 Gi0/1, Gi0/2

10 Student active20 Faculty active99 Management active

1002 fddi-default act/unsup1003 token-ring-default act/unsup1004 fddinet-default act/unsup1005 trnet-default act/unsup

VLAN

Type SAID MTU Parent RingNo BridgeNo Stp BrdgModeTrans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------1 enet 100001 1500 - - - - - 0 010 enet 100010 1500 - - - - - 0 020 enet 100020 1500 - - - - - 0 099 enet 100099 1500 - - - - - 0 0

VLAN

Type SAID MTU Parent RingNo BridgeNo Stp BrdgModeTrans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------201

Page 202: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

1002 fddi 101002 1500 - - - - - 0 01003 tr 101003 1500 - - - - - 0 01004 fdnet 101004 1500 - - - ieee - 0 01005 trnet 101005 1500 - - - ibm - 0 0

Remote SPAN VLANs------------------------------------------------------------------------------

Primary Secondary Type Ports------- --------- ----------------- ------------------------------------------

What is the default VLAN?

What ports are assigned to the default VLAN?_______________________________

Step 2: Assign VLANs to the correct switch interfaces.

a. Assign VLANs to the interfaces on S1.1) Assign PC-A to the Student VLAN.

S1(config)# interface f0/6S1(config-if)# switchport mode accessS1(config-if)# switchport access vlan 10

2) Move the switch IP address VLAN 99.S1(config)# interface vlan 1 S1(config-if)# no ip address S1(config-if)# interface vlan 99S1(config-if)# ip address 192.168.1.11 255.255.255.0S1(config-if)# end

b. Issue the show vlan brief command and verify that the VLANs are assigned to the correct interfaces.S1# show vlan brief

VLAN Name Status Ports

---- -------------------------------- --------- -------------------------------

default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/7, Fa0/8, Fa0/9 Fa0/10, Fa0/11, Fa0/12, Fa0/13 Fa0/14, Fa0/15, Fa0/16, Fa0/17 Fa0/18, Fa0/19, Fa0/20, Fa0/21 Fa0/22, Fa0/23, Fa0/24, Gi0/1 Gi0/2

202

Excellent SOB 92

Page 203: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

10 Student active Fa0/6

20 Faculty active

99 Management active

1002 fddi-default act/unsup

1003 token-ring-default act/unsup

1004 fddinet-default act/unsup

1005 trnet-default act/unsup

c. Issue the show ip interfaces brief command.

What is the status of VLAN 99? Why?__________________________________________________________________________________________________________________________________________

d. Use the Topology to assign VLANs to the appropriate ports on S2.e. Remove the IP address for VLAN 1 on S2.f. Configure an IP address for VLAN 99 on S2 according to the Addressing Table.g. Use the show vlan brief command to verify that the VLANs are assigned to the

correct interfaces.

S2# show vlan brief

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/12, Fa0/13 Fa0/14, Fa0/15, Fa0/16, Fa0/17 Fa0/19, Fa0/20, Fa0/21, Fa0/22

Fa0/23, Fa0/24, Gi0/1, Gi0/210 Student active Fa0/1120 Faculty active Fa0/18

99 Management active

1002 fddi-default act/unsup

1003 token-ring-default act/unsup

1004 fddinet-default act/unsup

203

Typical SOB 93

Page 204: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

1005 trnet-default act/unsup

Is PC-A able to ping PC-B? Why?______________________________________________________________________________________________________________________________________________________

Is S1 able to ping S2? Why?

______________________________________________________________________________________________________________________________________________________

Task 3: Maintain VLAN Port Assignments and the VLAN Database

In Task 3, you will change VLAN assignments to ports and remove VLANs from the VLAN database.

Step 1: Assign a VLAN to multiple interfaces.

a. On S1, assign interfaces F0/11 – 24 to VLAN 10.S1(config)# interface range f0/11-24 S1(config-if-range)# switchport mode access S1(config-if-range)# switchport access vlan 10 S1(config-if-range)# end

b. Issue the show vlan brief command to verify VLAN assignments.c. Reassign F0/11 and F0/21 to VLAN 20.d. Verify that VLAN assignments are correct

Step 2: Remove a VLAN assignment from an interface.

a. Use the no switchport access vlan command to remove the VLAN 10 assignment to F0/24.S1(config)# interface f0/24S1(config-if)# no switchport access vlanS1(config-if)# end

b. Verify that the VLAN change was made. Which VLAN is F0/24 is now associated with?_____________________________________________________________________

204

Typical SOB 94

Page 205: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Step 3: Remove a VLAN ID from the VLAN database.

a. Add VLAN 30 to interface F0/24 without issuing the VLAN command.S1(config)# interface f0/24S1(config-if)# switchport access vlan 30% Access VLAN does not exist. Creating vlan 30

Note: Current switch technology no longer requires that the vlan command be issued to add a VLAN to the database. By assigning an unknown VLAN to a port, the VLAN adds to the VLAN database.

b. Verify that the new VLAN is displayed in the VLAN table.S1# show vlan brief

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Gi0/1, Gi0/2active Fa0/12, Fa0/13, Fa0/14, Fa0/15 Fa0/16, Fa0/17, Fa0/18, Fa0/19 Fa0/20, Fa0/22, Fa0/23

20 Faculty active Fa0/11, Fa0/2130 VLAN0030 active Fa0/2499 Management active1002 fddi-default act/unsup1003 token-ring-default act/unsup1004 fddinet-default act/unsup1005 trnet-default act/unsup

What is the default name of VLAN 30?__________________________________________________________________________________________________________________________________________

c. Use the no vlan 30 command to remove VLAN 30 from the VLAN database.S1(config)# no vlan 30S1(config)# end

d. Issue the show vlan brief command. F0/24 was assigned to VLAN 30.After deleting VLAN 30, what VLAN is port F0/24 assigned to? What happens to the

205

Typical SOB 95

Page 206: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

traffic destined to the host attached to F0/24?__________________________________________________________________________________________________________________________________________

S1# show vlan brief

e. Issue the no switchport access vlan command on interface F0/24.f. Issue the show vlan brief command to determine the VLAN assignment for F0/24.

To which VLAN is F0/24 assigned?_____________________________________________________________________

Note: Before removing a VLAN from the database, it is recommended that you reassign all the ports assigned to that VLAN.

Why should you reassign a port to another VLAN before removing the VLAN from the VLAN database?_______________________________________________________________________________________________________________________________________________________________________________________________________________

Task 4: Configure an 802.1Q Trunk Between the Switches

In Task 4, you will configure interface F0/1 to use the Dynamic Trunking Protocol (DTP) to allow it to negotiate the trunk mode. After this has been accomplished and verified, you will disable DTP on interface F0/1 and manually configure it as a trunk.

Step 1: Use DTP to initiate trunking on F0/1.

The default DTP mode of a 2960 switch port is dynamic auto. This allows the interface to convert the link to a trunk if the neighbouring interface is set to trunk or dynamic desirable mode.

a. Set F0/1 on S1 to negotiate trunk mode.S1(config)# interface f0/1S1(config-if)# switchport mode dynamic desirable

b. Issue the show vlan brief command on S1 and S2.Interface F0/1 is no longer assigned to VLAN 1. Trunked interfaces are not listed in the VLAN table.S1# show vlan brief

206

Excellent SOB 96

Page 207: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

VLAN Name Status Ports---- -------------------------------- --------- -------------------------------default active Fa0/2, Fa0/3, Fa0/4, Fa0/5 Fa0/7, Fa0/8, Fa0/9, Fa0/10 Fa0/24, Gi0/1, Gi0/2Student active Fa0/6, Fa0/12, Fa0/13, Fa0/14 Fa0/15, Fa0/16, Fa0/17, Fa0/18 Fa0/19, Fa0/20, Fa0/22, Fa0/23

20 Faculty active Fa0/11, Fa0/2199 Management active1002 fddi-default act/unsup1003 token-ring-default act/unsup1004 fddinet-default act/unsup1005 trnet-default act/unsup

c. Issue the show interfaces trunk command to view trunked interfaces. Notice that the mode on S1 is set to desirable, and the mode on S2 is set to auto.

S1# show interfaces trunk

Port Fa0/1

Mode desirable Encapsulation 802.1q

Status trunking

Native vlan 1

Port Fa0/1

Vlans allowed 1-4094

on trunk

Port Vlans allowed and active in management domain Fa0/1 1,10,20,99

Port Vlans in spanning tree forwarding state and not pruned Fa0/11,10,20,99

S2# show interfaces trunk

Port Mode Encapsulation Status Native vlanFa0/1

Port

auto

Vlans

802.1q

allowed on trunk

trunking 1

Fa0/1 1-4094

Port Vlans allowed and active in management domain Fa0/1 1,10,20,99

207

Page 208: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Port Vlans in spanning tree forwarding state and not pruned Fa0/1 1,10,20,99

Note: By default, all VLANs are allowed on a trunk. The switchport trunk command allows you to control what VLANs have access to the trunk. For this lab, keep the default settings which allows all VLANs to traverse F0/1.

d. Verify that VLAN traffic is traveling over trunk interface F0/1.

Can S1 ping S2?___________ Can PC-A ping PC-B?___________ Can PC-A ping PC-C?___________ Can PC-B ping PC-C?___________ Can PC-A ping S1?____________ Can PC-B ping S2?___________ Can PC-C ping S2?___________

If you answered no to any of the above questions, explain below.__________________________________________________________________________________________________________________________________________

Step 2: Manually configure trunk interface F0/1.

The switchport mode trunk command is used to manually configure a port as a trunk. This command should be issued on both ends of the link.

a. Change the switchport mode on interface F0/1 to force trunking. Make sure to do this on both switches.

S1(config)# interface f0/1

S1(config-if)# switchport mode trunk

b. Issue the show interfaces trunk command to view the trunk mode. Notice that the mode changed from desirable to on.

S2# show interfaces trunk

Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 99

Port Vlans allowed on trunk

Fa0/1 1-4094

Port Vlans allowed and active in management domain Fa0/1 1,10,20,99

Port Vlans in spanning tree forwarding state and not pruned Fa0/1 1,10,20,99Why might you want to manually configure an interface to trunk mode instead of using DTP?

208

Excellent SOB 97

Page 209: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Task 5: Delete the VLAN Database

In Task 5, you will delete the VLAN Database from the switch. It is necessary to do this when initializing a switch back to its default settings.

Step 1: Determine if the VLAN database exists.

Issue the show flash command to determine if a vlan.dat file exists in flash.S1# show flash

Directory of flash:/

2 -rwx 1285 Mar 1 199300:01:24 +00:00 config.text3 -rwx 43032 Mar 1 199300:01:24 +00:00 multiple-fs4 -rwx 5 Mar 1 199300:01:24 +00:00 private-config.text5 -rwx 11607161 Mar 1 199302:37:06 +00:00 c2960-lanbasek9-mz.150-2.SE.bin6 -rwx 736 Mar 1 199300:19:41 +00:00 vlan.dat

32514048 bytes total (20858880 bytes free)

Note: If there is a vlan.dat file located in flash, then the VLAN database does not contain its default settings.

Step 2: Delete the VLAN database.

a. Issue the delete vlan.dat command to delete the vlan.dat file from flash and reset the VLAN database back to its default settings. You will be prompted twice to confirm that you want to delete the vlan.dat file. Press Enter both times.

S1# delete vlan.dat

Delete filename [vlan.dat]? Delete flash:/vlan.dat? [confirm] S1#

b. Issue the show flash command to verify that the vlan.dat file has been deleted.

S1# show flash209

Excellent SOB 98

Page 210: Laborotory workbook 2016/17€¦ · Web viewBy the end of this course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement

Directory of flash:/

2 -rwx 1285 Mar 1 199300:01:24 +00:00 config.text3 -rwx 43032 Mar 1 199300:01:24 +00:00 multiple-fs4 -rwx 5 Mar 1 199300:01:24 +00:00 private-config.text5 -rwx 11607161 Mar 1 199302:37:06 +00:00 c2960-lanbasek9-mz.150-2.SE.bin

32514048 bytes total (20859904 bytes free)

To initialize a switch back to its default settings, what other commands are needed?______________________________________________________________________________________________________________________________________________________

Task 6: Reflection

1. What is needed to allow hosts on VLAN 10 to communicate to hosts on VLAN 20?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

2. What are some primary benefits that an organization can receive through effective use of VLANs?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

210

Excellent SOB 99

Excellent SOB 100