Data Communication & Computer Networking-lab-Manual
Data Communication & Computer Networking-lab-Manual
For
Data Communication & Computer Network
BY Gashaw Alemu
S.No Experiment
1. Study of Network Devices in Detail.
2. Study of network IP.
3. Connect the computers in Local Area Network.
Study of basic network command and Network configuration
4. commands.
5. Performing an Initial Switch Configuration
6. Performing an Initial Router Configuration
7. Configuring and Troubleshooting a Switched Network
8. Connecting a Switch
9. Configuring WEP on a Wireless Router
10. Using the Cisco IOS Show Commands
11. Examining WAN Connections
12. Interpreting Ping and Traceroute Output
1|Page
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
18. Observing Static and Dynamic Routing
19. Configuring Ethernet and Serial Interfaces
20. Configuring a Default Route
21. Configuring Static and Default Routes
22. Configuring RIP
23. Planning Network-based Firewalls
24. Configuring a Cisco Router as a DHCP Server
Experiment - 2
Aim: Study of following Network Devices in Detail
• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and making
them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model.
The device is a form of multiport repeater. Repeater hubs also participate in collision detection,
forwarding a jam signal to all ports if it detects a collision.
3. Switch: A network switch or switching hub is a computer networking device that connects
network segments. The term commonly refers to a network bridge that processes and routes data
at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the
network layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.
4. Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2) of the OSI model. In Ethernet networks, the term bridge formally means a device that behaves
according to the IEEE 802.1D standard. A bridge and switch are very much alike; a switch being
a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge
2|Page
.Bridges can analyze incoming data packets to determine if the bridge is able to send the given
packet to another segment of the network.
5. Router: A router is an electronic device that interconnects two or more computer networks,
and selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same network,
or if the data packet must be transferred from one network to another. Where multiple routers are
used in a large collection of interconnected networks, the routers exchange information about target
system addresses, so that each router can build up a table showing the preferred paths between any
two systems on the interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing with
another network that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching devices,
rate converters, fault isolators, or signal translators as necessary to provide system
interoperability. It also requires the establishment of mutually acceptable administrative
procedures between both networks.
• A protocol translation/mapping gateway interconnects networks with different network
protocol technologies by performing the required protocol conversions.
3|Page
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experiment - 3
Aim: Study of network IP
• Classification of IP address
• Sub netting
• Super netting
• Classification of IP address
As show in figure we teach how the ip addresses are classified and when they are used.
Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.
• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet address.
• Super netting
Why we develop super netting and How to calculate supernet mask and how to identify supernet
address.
Experiment-4
Aim: Connect the computers in Local Area Network.
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you connect
to the Internet by using a modem, right-click the connection that you want under Dial-up /
other network available.
6. Click Properties.
7. Click the Advanced tab.
4|Page
8. Under Internet Connection Sharing, select the Allow other network users to connect
through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection
whenever a computer on my network attempts to access the Internet check box if you
want to permit your computer to automatically connect to the Internet.
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address
192.168.0. 1. Your computer may lose connectivity with other computers on your network. If these
other computers have static IP addresses, it is a good idea to set them to obtain their IP addresses
automatically. Are you sure you want to enable Internet Connection Sharing?
The network adapter that is connected to the LAN is configured with a static IP address of
192.168.0. 1 and a subnet mask of 255.255.255.0
To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP
configuration, and then configure the client computer. To confirm the LAN adapter IP
configuration, follow these steps:
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
254. For example, you can assign the following static IP address, subnet mask, and default gateway:
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
5|Page
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experiment-5
Aim: Study of basic network command and Network configuration commands.
All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to
flash memory or permanent memory.
ping: ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to
see if a machine is alive. If there is no response, you know something is wrong.
Traceroute:
6|Page
Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop' from
router to router takes.
nslookup:
pathping:
A better version of tracert that gives you statics about packet lost and latency.
7|Page
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Getting Help
In any command mode, you can get a list of available commands by entering a question mark (?).
Router>?
To obtain a list of commands that begin with a particular character sequence, type in those haracters
followed immediately by the question mark (?).
Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument. Include
a space before the question mark.
Router#configure ?
memory Configure from NV memory network Configure from a TFTP network host terminal
Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters to make
the command unique from other commands. For example, you can abbreviate the show
command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes to memory
because if you do not they will be lost if there is a system reload or power outage. There are two
types of configuration files: the running (current operating) configuration and the startup
configuration.
Use the following privileged mode commands to work with configuration files.
8|Page
Experiment-6
Objectives
Perform an initial configuration of a Cisco Catalyst 2960 switch.
Background / Preparation
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
• Host name
• Console password
• vty password
• Privileged EXEC mode password
• Privileged EXEC mode secret
• IP address on VLAN1 interface
• Default gateway
Note: Not all commands are graded by Packet Tracer.
Switch>enable
Switch#configure terminal
9|Page
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Switch(config)#hostname CustomerSwitch
b. From line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login CustomerSwitch(config-
line)#exit
CustomerSwitch(config)#line vty 0 15
b. From line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login CustomerSwitch(config-
line)#exit
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown CustomerSwitch(config-
if)#exit
10 | P a g e
CustomerSwitch(config)#ip default-gateway 192.168.1.1
b. Click the Check Results button at the bottom of this instruction window to check your work.
CustomerSwitch(config)#end
CustomerSwitch#ping 209.165.201.10
CustomerSwitch#
Reflection
a. What is the significance of assigning the IP address to the VLAN1 interface instead of any of the Fast Ethernet
interfaces?
b. What command is necessary to enforce password authentication on the console and vty lines?
c. How many gigabit ports are available on the Cisco Catalyst 2960 switch that you used in the activity?
11 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experiment-7
Objectives
• Configure the router host name.
• Configure passwords.
• Configure banner messages.
• Verify the router configuration.
Background / Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a router, including host
name, passwords, a message-of-the-day (MOTD) banner, and other basic settings.
Note: Some of the steps are not graded by Packet Tracer.
Router>enable
Router#configure terminal
Router(config)#hostname CustomerRouter
12 | P a g e
Set an encrypted privileged password to cisco123 using the secret command.
CustomerRouter(config)#line console 0
Set the password to cisco123, require that the password be entered at login, and then exit line configuration mode.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#
Step 4: Configure the vty password to allow Telnet access to the router.
a. In global configuration mode, switch to line configuration mode to specify the vty
lines.
CustomerRouter(config)#line vty 0 4
Set the password to cisco123, require that the password be entered at login, exit line configuration mode, and then
exit the configuration session.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#
Step 5: Configure password encryption, a MOTD banner, and turn off domain server lookup.
a. Currently, the line passwords and the enable password are shown in clear text when you show the
running configuration. Verify this now by entering the show running-config command.
To avoid the security risk of someone looking over your shoulder and reading the passwords, encrypt
all clear text passwords.
CustomerRouter(config)#service password-encryption
Use the show running-config command again to verify that the passwords are encrypted.
To provide a warning when someone attempts to log in to the router, configure a MOTD banner.
Test the banner and passwords. Log out of the router by typing the exit command twice. The banner displays before
the prompt for a password. Enter the password to log back into the router.
13 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
You may have noticed that when you enter a command incorrectly at the user or privileged EXEC prompt, the
router pauses while trying to locate an IP address for the mistyped word you entered. For example, this output
shows what happens when the enable command is mistyped.
CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS lookups from the router
CLI.
CustomerRouter(config)#no ip domain-lookup
CustomerRouter(config)#end
CustomerRouter#copy run start
Reflection
Which Cisco IOS CLI commands did you use most?
How can you make the customer router passwords more secure?
14 | P a g e
Experiment-8
Objectives
• Establish console connection to the switch.
• Configure the host name and VLAN1.
• Use the help feature to configure the clock.
• Configure passwords and console/Telnet access.
• Configure login banners.
• Configure the router.
• Solve duplex and speed mismatch problems.
• Configure port security.
• Secure unused ports.
• Manage the switch configuration file.
Background / Preparation
In this Packet Tracer Skills Integration Challenge activity, you will configure basic switch
management, including general maintenance commands, passwords, and port security. This activity
provides you an opportunity to review previously acquired skills.
Addressing Table
Device Interface IP Address Subnet Mask
15 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
R1 Fa0/0 172.17.99.1 255.255.255.0
i. S1(config)#interface vlan 1
ii. S1(config-if)#ip address 172.17.99.11 255.255.255.0
iii. S1(config-if)#no shutdown
d. Configure the default gateway for S1 and then test connectivity. S1 should be able to ping R1. e.
Check results.
Your completion percentage should be 31%. If not, click Check Results to see which required components are
not yet completed. Also, make sure that interface VLAN 1 is active.
16 | P a g e
a. Use the encrypted form of the privileged EXEC mode password and set the password to class.
b. Configure the passwords for console and Telnet. Set both the console and vty password to cisco
and require users to log in.
c. View the current configuration on S1. Notice that the line passwords are shown in clear text. Enter
the command to encrypt these passwords.
d. Check results.
Your completion percentage should be 42%. If not, click Check Results to see which required components are
not yet completed.
• Set the console and vty password to cisco and require users to log in.
• Encrypt the console and vty passwords.
• Configure the message-of-the-day as Authorized Access Only. (Do not include the
period.) c. Check results.
Your completion percentage should be 65%. If not, click Check Results to see which required components are
not yet completed.
17 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Your completion percentage should be 73%. If not, click Check Results to see which required components are
not yet completed.
Step 8: Configure port security.
a. Use the following policy to establish port security on the port used by PC1:
S1#________________________________
c. Force S1 to learn the MAC address for PC1. Send a ping from PC1 to S1. Then verify that S1 added
the MAC address for PC1 to the running configuration.
!
interface FastEthernet0/18
<output omitted>
switchport port-security mac-address sticky 0060.3EE6.1659 <output
omitted>
!
d. Test port security. Remove the FastEthernet connection between S1 and PC1. Connect PC2 to Fa0/18.
Wait for the link lights to turn green. If necessary, send a ping from PC2 to S1 to cause the port to shut
down. Port security should show the following results: (the Last Source Address may be different)
18 | P a g e
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1
Total MAC Addresses :1
Configured MAC Addresses : 1
Sticky MAC Addresses :0
Last Source Address:Vlan : 00D0.BAD6.5193:99 Security
Violation Count : 1
e. Viewing the Fa0/18 interface shows that line protocol is down (err-disabled), which also indicates a
security violation.
f. Reconnect PC1 and re-enable the port. To re-enable the port, disconnect PC2 from Fa0/18 and
reconnect PC1. Interface Fa0/18 must be manually reenabled with the no shutdown command before
returning to the active state.
g. Check results.
Your completion percentage should be 77%. If not, click Check Results to see which required components are
not yet completed.
19 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experiment-9
Connecting a Switch
Objectives
• Connect a switch to the network.
• Verify the configuration on the switch.
Background / Preparation
In this activity, you will verify the configuration on the customer Cisco Catalyst 2960 switch. The switch is
already configured with all the basic necessary information for connecting to the LAN at the customer site. The
switch is currently not connected to the network. You will connect the switch to the customer workstation, the
customer server, and customer router. You will verify that the switch has been connected and configured
successfully by pinging the LAN interface of the customer router.
20 | P a g e
Topology Diagram
Reflection
a. What is the significance of the enable secret command compared to the enable password?
b. If you want to remove the requirement to enter a password to access the console, what
commands do you issue from your starting point in privileged EXEC mode?
21 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experiment-10
Objectives
Configure WEP security between a workstation and a Linksys wireless router.
Background / Preparation
You have been asked to go back to a business customer and install a new Linksys wireless router for the
customer office. The company has some new personnel who will be using wireless computers to save money
on adding additional wired connections to the building. The business is concerned about the security of the
network because they have financial and highly classified data being transmitted over the network. Your job is
to configure the security on the router to protect the data.
In this activity, you will configure WEP security on both a Linksys wireless router and a workstation.
22 | P a g e
Topology Diagram
Reflection
a. What is the purpose of using WEP on a wireless network?
b. What is the significance of the key that you used to secure WEP?
23 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experiment-11
Objectives
Use the Cisco IOS show commands.
Background / Preparation
The Cisco IOS show commands are used extensively when working with Cisco equipment. In this activity, you
will use the show commands on a router that is located at an ISP.
Note: This activity begins by showing 100% completion, because the purpose is only to explore the Cisco IOS
show commands. This activity is not graded.
24 | P a g e
Topology Diagram
Reflection
a. Why do you need to be in privileged EXEC mode to explore the Cisco IOS show commands
that were used in this activity?
• 209.165.201.0
• 209.165.201.1
• 209.165.201.10
Which interface is up and running?
• Serial0/1/0
• FastEthernet0/1
• FastEthernet0/0
• VLAN1
25 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experiment-12
Objective
The show commands are very powerful commands for troubleshooting and
monitoring networks. They give a static image of the network at a given time. The
use of a variety of show commands will give a clear picture of how the networking is
communicating and transferring data.
Background / Preparation
The physical topology of the network has been designed using Frame Relay. To test the
network connectivity, use a variety of show commands.
a. Click on Branch1 and use various show commands to view the connectivity to
the network.
b. Use the show running-configuration command to view the router configuration.
c. Use the show ip interface brief command to view the status of the interfaces.
d. Use the various show frame-relay map, show frame-relay pvc, and show
frame-relay lmi commands to see the status of the Frame-relay circuit.
e. Click on Branch 2 and use various show commands to view the connectivity to
the network.
f. Use the show running-configuration command to view the router configuration.
g. Use the show ip interface brief command to view the status of the interfaces.
26 | P a g e
h. Use the various show frame-relay map, show frame-relay pvc, and show
frame-relay lmi commands to see the status of the Frame-relay circuit.
Step 2: Examine the configuration of Main.
a. Click on Main and use a variety of show commands to view the connectivity to
the network.
b. Use the show running-configuration command to view the router configuration.
c. Use the show ip interface brief command to view the status of the interfaces.
d. To view the status of the frame-relay configurations use the show frame-relay
lmi, show framerelay map, and show frame-relay pvc commands.
Reflection
b. What beneficial information can be obtained from the various show commands?
_____________________________________________________________
_________________
_____________________________________________________________
_________________ ____
27 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experirment-13
Objectives
• Distinguish the difference between successful and unsuccessful ping attempts.
• Distinguish the difference between successful and unsuccessful traceroute
attempts.
Background / Preparation
In this activity, you will test end-to-end connectivity using ping and traceroute. At the
end of this activity, you will be able to distinguish the difference between successful and
unsuccessful ping and traceroute attempts.
Note: Before beginning this activity, make sure that the network is converged. To
converge the network quickly, switch between Simulation mode and Realtime mode
until all the link lights turn green.
Step 1: Test connectivity using ping from a host computer and a router.
Click N-Host, click the Desktop tab, and then click Command Prompt. From the
Command Prompt window, ping the Cisco server at www.cisco.com.
Packet Tracer PC
Command Line 1.0
28 | P a g e
PC>ping
www.cisco.com
PC>
From the output, you can see that N-Host was able to obtain an IP address for the Cisco
server. The IP address was obtained using (DNS). Also notice that the first ping failed. This
failure is most likely due to lack of ARP convergence between the source and destination. If
you repeat the ping, you will notice that all pings succeed.
From the Command Prompt window on N-Host, ping E-Host at 192.168.4.10. The pings fail.
If you do not want to wait for all four unsuccessful ping attempts, press Ctrl+C to abort the
command, as shown below.
PC>ping 192.168.4.10
Control-C
^C
PC>
Click the N-Branch router, and then click the CLI tab. Press Enter to get the router prompt.
From the router prompt, ping the Cisco server at www.cisco.com.
N-Branch>ping www.cisco.com
Translating "www.cisco.com"...domain
server (64.100.1.242) Type escape
sequence to abort.
Sending 5, 100-byte ICMP Echos to 64.100.1.185, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 210/211/213 ms
N-Branch>
29 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
As you can see, the ping output on a router is different from a PC host. Notice that the N-
Branch router resolved the domain name to the same IP address that N-Host used to send its
pings. Also notice that the first ping fails, which is indicated by a period (.), and that the next
four pings succeed, as shown with an exclamation point (!).
From the CLI tab on N-Branch, ping E-Host at 192.168.4.10. Again, the pings fail. To not
wait for all the failures, press Ctrl+C.
N-Branch>ping 192.168.4.10
N-Branch>
Step 2: Test connectivity using traceroute from a host computer and a router.
a. Click N-Host, click the Desktop tab, and then click Command Prompt. From
the Command Prompt window, trace the route to the Cisco server at
www.cisco.com.
PC>tracert www.cisco.com
1 92 ms 77 ms 86 ms 192.168.1.1
2 91 ms 164 ms 84 ms 64.100.1.101 3
135 ms 168 ms 151 ms 64.100.1.6
4 185 ms 261 ms 161 ms 64.100.1.34
5 257 ms 280 ms 224 ms 64.100.1.62
6 310 ms 375 ms 298 ms 64.100.1.185
Trace complete.
PC>
The above output shows that you can successfully trace a route all the way to the Cisco
server at 64.100.1.185. Each hop in the path is a router responding three times to trace
messages from N-Host. The trace continues until the destination for the trace (64.100.1.185)
responds three times.
From the Command Prompt window on N-Host, trace a route to E-Host at 192.168.4.10. The
trace fails, but notice that the tracert command traces up to 30 hops. If you do not want to
wait for all 30 attempts to time out, press Ctrl+C.
PC>tracert 192.168.4.10
1 103 ms 45 ms 91 ms 192.168.1.1
2 56 ms 110 ms 125 ms 64.100.1.101
3 174 ms 195 ms 134 ms 64.100.1.6
4 246 ms 183 ms 179 ms 64.100.1.34
5 217 ms 285 ms 226 ms 64.100.1.62
30 | P a g e
6 246 ms 276 ms 245 ms 64.100.1.154 7 * * *
Request timed out.
8 * * * Request timed out.
9 * * * Request timed out.
10
Control-C
^C
PC>
As you can see, traceroute output on a router is very similar to the output on a
PC host. The only difference is that on a PC host, the IP address is listed after
the three millisecond outputs.
From the CLI tab on N-Branch, trace the route to E-Host at 192.168.4.10. The trace fails at
the same IP address as it failed when tracing from N-Host. Again, you can use Ctrl+C to
abort the command.
N-
Branch>tracero
ute 192.168.4.10
Type escape
sequence to
abort.
Tracing the route to 192.168.4.10
1 64.100.1.101 41
msec 19 msec 32
msec 2 64.100.1.6
33 msec 92 msec 117
msec
31 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
3 64.100.1.34 98 msec 102 msec 102 msec
4 64.100.1.62 166 msec 172 msec 156 msec
5 64.100.1.154 157 msec 223 msec 240 msec
6 * * *
7 * * *
8 * * *
9
N-Branch>
Experirment-14
Objective
Background / Preparation
VLANs can be added to a network for security purposes and traffic control. Devices
on separate VLANs are unable to communicate unless a router has been configured
32 | P a g e
to help with this communication. Observe how packet filtering and route
summarization traverse the network using simulation mode.
Step 3: Test connectivity between the network devices using Simulation mode
Reflection
c. Why can’t PC0 communicate with PC1 but PC1 can communicate with PC0’s
default gateway?
34 | P a g e
Experirment-15
Placing ACLs
Objectives
• Verify network connectivity
• Examine the Access Control Lists (ACLs) that are configured on the routers
• Determine the appropriate interface to apply the ACLs
• Examine the affects of the ACL
Background / Preparation
This activity demonstrates how the flow of network traffic is affected by applying an
ACL to permit or deny traffic in the network. The network administrator has decided
35 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
that all external web traffic goes only to the Web server. Also, in order to protect the
data o their employees, the HR server is only accessible to HR employees.
Therefore, ACLs will need to be implemented on the network. Another network
technician has already configured the necessary ACLs on both the Gateway and
Distribution2 routers. However, the ACLs have not been applied to an interface. You
have been asked to apply the ACLs and verify that the appropriate traffic is
permitted or denied.
a. Verify that all of the PCs can communicate with each other and with the servers.
b. Verify that the Internet Host can access the Web server (192.168.0.3), Sales
server (192.168.10.2) and HR server (192.168.40.2) using the browser.
Step 2: Examine the Access Control Lists that are configured on the routers
a. Access the Distribution1 router. Use the following commands to view the ACL
that has been configured on the Distribution1 router:
• show running-config
• show access-lists 1
b. Access the Gateway router. Use the following commands to view the ACL that
has been configured on the Gateway router:
• show running-config
• show access-lists 100
a. After examining the ACLs determine on which interface the ACLs should be
applied
b. The ACL must be applied to an interface or subinterface before it will affect the
network traffic
c. The extended ACL should be placed closest to the source and the standard ACL
should be closest to the destination.
d. Remember that only one ACL per port, per protocol, per direction is allowed.
e. Apply the ACL to the appropriate interface or subinterface.
a. Internet Host should be able to ping any device in the network, except HR1 or
HR server.
b. Internet Host should be able to access Web server (192.168.0.3) using the
browser.
c. Internet Host should not be able to access either the HR server (192.168.40.1) or
Sales server (192.168.10.2) using the browser.
36 | P a g e
d. HR2 should be able to access HR server (192.168.40.1) using ping or the
browser.
e. RandD2 should not be able to access HR server (192.168.40.1) using ping or the
browser.
Reflection
Experirment-16
Objectives
• Determine the cable types to use to connect all devices to the switch.
• Add appropriate modules to switches and routers.
• Connect the devices to the switch using the appropriate cable types.
Background / Preparation
The results of a site survey for an ISP customer indicate that the customer needs to
upgrade the LAN to include a new standalone switch. The network has an existing
router (Router0) and a Linksys 300N router. It is necessary to determine which
interfaces are needed on the new switch to provide connectivity to the router, the
Linksys device, and the customer PCs. The customer wants to use copper cabling.
Note: Links created with the switch may take a minute to change from amber to green.
Switch between Simulation mode and Realtime mode to speed up this process.
37 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Step 1: Determine the required connectivity options.
a. Click Router0. Using the information in the Physical Device View window on
the Physical tab, determine what type of interface is available on the router to
connect to the new switch.
Hint: Place the mouse pointer on the interface to display the interface type.
Click on the interface type to display a description of the interface.
Which interface is available on the router to connect to the new switch? What type of cable
is required?
_______________________________________________________________
_
Click the Linksys 300N. Using the picture on the Physical tab, determine what type of cable
is necessary to connect to the new switch.
Which interface is available on the Linksys 300N to connect to the new switch? What type of
cable is required?
_______________________________________________________________
_
Step 2: Configure the new switch with the required options.
a. Click Switch0.
On the Physical tab, explore each switch module available under the Modules option.
Choose the appropriate interfaces to connect to Router0 and the Linksys 300N router.
Choose the appropriate interfaces to connect to the existing PCs.
Power down the switch using the power button in the Physical Device View window on the
Physical tab.
Choose the appropriate modules for the switch. Add the four necessary interfaces to the
switch.
Power up the switch using the power button shown in the Physical Device View window on
the Physical tab.
Click the Config tab. Select each interface and ensure that the On box is checked.
38 | P a g e
b. Verify connectivity. A green light appears on each end of the links if the
cabling is correct.
c. Click the Check Results button at the bottom of this instruction window to
check your work.
Experirment-17
Objectives
• Subnet an address space based on the host requirements.
• Assign host addresses to devices.
• Configure devices with IP addressing.
• Verify the addressing configuration.
Background / Preparation
In this activity, you will subnet the private address space 192.168.1.0/24 to provide
enough host addresses for the two LANs attached to the router. You will then assign
valid host addresses to the appropriate devices and interfaces. Finally, you will test
connectivity to verify your IP address implementation.
40 | P a g e
d. Notice in the Equivalent IOS Commands window that your actions produced
actual commands. You can scroll through the command window. In the next
chapter, you will learn how to enter these commands directly into the router
instead of using the Config tab.
For a better view of the commands, you can increase the size of the window.
To resize the window, place your mouse pointer over the bottom border of the
window. When the cursor turns into a doubleheaded arrow, click and drag.
Check results. On the Assessment Items tab, your configurations for Customer Router should
have green checkmarks. If not, read the provided feedback for a hint on how to correct the
problem.
Step 4: Verify the addressing configuration.
a. Test connectivity between HostA, HostB, ISP Workstation, and ISP Server.
You can use the Add Simple PDU tool to create pings between the devices.
You can also click HostA or HostB, then the Desktop tab, and then Command
Prompt. Use the ping command to test connectivity to other devices. To obtain
the IP address of another device, place your mouse pointer over the device.
b. Check results. On the Connectivity Tests tab, the status of each test should be
successful.
Reflection
a. How many subnets are still available for future expansion?
b. What would be the two subnet addresses if the host requirement was 80 hosts
per LAN?
c. Challenge: Create your own Packet Tracer network using the same topology,
but implement an addressing scheme based on 80 hosts per LAN. Have another
student or your instructor check your work.
41 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experirment-18
Objectives
Examine NAT processes as traffic traverses a NAT border router.
Background / Preparation
In this activity, you will use Packet Tracer Simulation mode to examine the contents of
the IP header as traffic crosses the NAT border router.
Step 2: Send an HTTP request from an inside host to an outside web server.
Click Customer PC. Click the Desktop tab and then Web Browser. In the URL
field, type the web address for the ISP server (www.ispserver.com). Make sure
that you are in Simulation mode, and then click Go.
In the event list, notice that Customer PC queues a DNS request and sends out an ARP
request. You can view the contents of the ARP request by either clicking on the packet in the
topology or clicking on the packet color under Info in the Event List window.
In the PDU Information at Device: Customer PC window, which IP address is Customer PC
attempting to find a MAC address for? ______________________
In the Event List window, click Capture/Forward twice. Which device answers the ARP
request from Customer PC? Which MAC address is placed inside the ARP reply?
42 | P a g e
In the Event List window, click Capture/Forward twice. Customer PC accepts the ARP
replay and then builds another packet. What is the protocol for this new packet? If you click
Outbound PDU Details for this packet, you can see the details of the protocol. _________
In the Event List window, click Capture/Forward twice. Click the packet at the
www.customerserver.com server. Then click the Outbound PDU Details tab. Scroll down to
the bottom to see the Application Layer data. What is the IP address for the ISP server?
_______________________________________________________________
_
In the Event List window, click Capture/Forward twice. Customer PC now formulates
another ARP request. Why?
_______________________________________________________________
_
In the Event List window, click Capture/Forward 10 times until Customer PC formulates an
HTTP request packet. Customer PC finally has enough information to request a web page
from the ISP server.
In the Event List window, click Capture/Forward three times. Click the packet at Customer
Router to examine the contents. Customer Router is a NAT border router. What is the inside
local address and the inside global address for Customer PC?
_______________________________________________________________
_
In the Event List window, click Capture/Forward seven times until the HTTP reply reaches
Customer Router. Examine the contents of the HTTP reply and notice that the inside local
and global addresses have changed again as the packet is forwarded on to Customer PC.
Step 3: Send an HTTP request from an outside host to an inside web server.
Customer Server provides web services to the public (outside addresses) through the
domain name www.customerserver.com. Follow a process similar to Step 2 to observe
an HTTP request on ISP Workstation.
a. Click ISP Workstation. Click the Desktop tab, and then Web Browser. In the
URL field, type the Customer Server web address (www.customerserver.com).
Make sure that you are in Simulation mode, and then click Go.
b. You can either click Auto Capture/Play or Capture/Forward to step through
each stage of the process. The same ARP and DNS processes occur before the
ISP Workstation can formulate an HTTP request.
c. When the HTTP request arrives at Customer Router, check the packet contents.
What is the inside local address? What is the inside global address?
_______________________________________________________________
_
43 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experirment-19
Objective
Observe the network behavior using static and default routing only and compare it to the
behavior of dynamic routing.
Background / Preparation
In this exercise, you will observe what the adaptability of dynamic routing compared to
static and default routing. The Ticket Sales Office network is currently configured using
static and default routing.
44 | P a g e
Perform a trace from PC0 again to the Edge1 FastEthernet 0/0 address.
What happens this time?
___________________________________________________________________
_____
__________
a. Configure EIGRP (AS 10) on the BR2 and ISP2 routers. Be sure to include all
directly connected networks and turn off auto-summary.
b. Do a third trace from PC0 to the Edge1 FastEthernet 0/0 interface. (It should be
successful again.) c. Did the path change? If so, how?
___________________________________________________
Reflection
________________________________________________________________
_________________
45 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Experiment-20
Objectives
• Configure a LAN Ethernet interface.
• Configure a WAN serial interface.
• Verify the interface configurations.
Background / Preparation
In this activity, you will configure the LAN Ethernet interface and the WAN serial
interface on the Customer Cisco 1841 router.
46 | P a g e
CustomerRouter(config-if)#description Connected to CustomerSwitch
CustomerRouter(config-if)#no shutdown
CustomerRouter(config-if)#end
Use the show ip route command to verify your configuration. This is a partial example of
the output.
CustomerRouter#show ip route
<output omitted>
CustomerRouter#show run
...
47 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
!
interface FastEthernet0/0
description
Connected to
CustomerSwitch ip
address
192.168.1.1
255.255.255.0
duplex auto speed
auto
!
interface FastEthernet0/1
n
o
i
p
a
d
d
r
e
s
s
d
u
p
l
e
x
a
u
t
o
s
p
e
e
d
a
u
t
o
s
h
u
t
d
o
w
n
!
interface Serial0/1/0
48 | P a g e
description
Connected to ISP ip
address
209.165.200.225
255.255.255.224
!
Use the ping command to verify connectivity to the WAN interface on the ISP router.
This is a partial example of the output.
CustomerRouter#ping 209.165.200.226
Use the ping command to verify connectivity to the customer switch. This is a partial
example of the output.
CustomerRouter#ping 192.168.1.1
b. Click the Check Results button at the bottom of this instruction window to
check your work.
Reflection
a. When you ping the LAN IP address of the ISP router, what happens and
why?
• CustomerRouter#
• CustomerRouter> CustomerRouter(config)#
• CustomerRouter(config-if)#
49 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
c. You configured the Fast Ethernet 0/0 interface with the no
shutdown command and verified the configuration. However,
when you rebooted the router, the interface was shutdown. You
reconfigured the Fast Ethernet 0/0 interface and verified that the
configuration works. Explain what most likely happened.
50 | P a g e
Experiment-21
Objectives
Configure a default route on a router.
Background / Preparation
In this activity, you will configure a default route on the Cisco 1841 Customer router.
The default route configuration uses the WAN IP address on the Cisco 1841 ISP router.
This is the next-hop router from the Cisco 1841 Customer router.
Step 1: Verify reachability from CustomerRouter to the LAN IP address on the ISP
router.
a. Use terminal emulation software on the Customer PC to connect to the
customer Cisco 1841 router. Use cisco123 for the console password.
b. Use the ping command to verify if the LAN IP address 209.165.201.1 on
the ISP router is reachable from the CustomerRouter
CustomerRouter>ping 209.165.201.1
51 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
c. Configure a default route using the ISP WAN IP address as the next hop IP
address.
CustomerRouter(config)#ip route 0.0.0.0 0.0.0.0 209.165.200.226
CustomerRouter(config)#end
CustomerRout
er#show ip
route Codes:
C - connected,
S - static,...
b. Use the ping command to verify connectivity to the LAN IP address on the ISP
router
CustomerRouter#ping 209.165.201.1
b. Click the Check Results button at the bottom of this instruction window to check
your work.
Reflection
You can now access the entire ISP network. Write down some issues and considerations
to discuss with your classmates about this configuration. Here are two questions to
begin with:
52 | P a g e
• Is this type of access to the ISP LAN likely to happen in the real world?
• Why has the student activity been configured to allow this type of access?
Experirment-22
Objectives
• Configure static routes on each router to allow communication between all
clients.
• Test connectivity to ensure that each device can fully communicate with all
other devices.
Background / Preparation
This topology represents a small WAN. Each device in this network has been configured
with IP addresses; however, no routing has been configured. The company management
wants to use static routes to connect the multiple networks.
Step 1: Test connectivity between the PCs and the default gateway.
To determine if there is connectivity from each PC to its configured gateway, first use a
simple ping test.
a. Click BOpc and go to Desktop > Command Prompt.
b. From the command prompt, type the ipconfig command. Note the IP address
for BOpc and the default gateway address. The default gateway address is the
IP address for the Fast Ethernet interface on BranchOffice.
53 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
c. Ping 192.168.1.1, the default gateway address for the BranchOffice LAN, from
the command prompt on BOpc. This ping should be successful.
d. Click PNpc and go to Desktop > Command Prompt.
e. From the command prompt, type the ipconfig command. Note the IP address
for PNpc and the default gateway address. The default gateway address is the
IP address for the Fast Ethernet interface on PartnerNet.
f. Ping 192.168.3.1, the default gateway address for the PartnerNet LAN, from
the command prompt on PNpc. This ping should be successful.
g. Repeat steps a, b, and c for MOpc and its respective default gateway, the Fast
Ethernet interface on MainOffice. Each of these ping tests should be successful.
g. Does each router know how to route to all networks in the topology? After
comparing the routing tables, close the window for each routing table by
clicking the x in the upper right corner of each window.
54 | P a g e
Step 4: Configure default routes on the BranchOffice and PartnerNet routers.
To configure static routes for each router, first determine which routes need to be added
for each device. For the BranchOffice and the PartnerNet routers, a single default route
allows these devices to route traffic for all networks not directly connected. To
configure a default route, you must identify the IP address of the next hop router, which
in this case is the MainOffice router.
a. From the Common toolbar, click the Select tool.
b. Move the cursor over the red serial link between the BranchOffice router
and the MainOffice router. Notice that the interface of the next hop is S3/0.
c. Move the cursor over the MainOffice router and note that the IP address
for Serial 3/0 is 10.10.10.1.
d. Move the cursor over the red serial link between the PartnerNet router and
the MainOffice router. Notice that the interface of the next hop is S2/0.
e. Move the cursor over the MainOffice router and note that the IP address
for Serial 2/0 is 10.10.10.5.
f. Configure the static routes on both the BranchOffice and PartnerNet
routers using the CLI. Click the BranchOffice router, and click the CLI
tab.
g. At the BranchOffice> prompt, type enable to enter privileged EXEC
mode.
h. At the BranchOffice# prompt, type configure terminal.
55 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
ip route 192.168.1.0
255.255.255.0
10.10.10.2 ip route
192.168.3.0
255.255.255.0
10.10.10.6
56 | P a g e
Experiment-23
Configuring RIP
Topology Diagram
Objectives
• Configure routers using basic interface configuration commands.
• Enable RIP.
• Verify the RIP configuration.
Background / Preparation
A simple routed network has been set up to assist in reviewing RIP routing behavior. In
this activity, you will configure RIP across the network and set up end devices to
communicate on the network.
57 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
e. Configure RIP to advertise the networks for the configured interfaces.
f. Configure the end devices.
i. Server0 uses the first usable IP address in network 10.0.0.0 /8. Specify
the appropriate default gateway and subnet mask.
ii. Printer0 uses the second usable IP address in network 10.0.0.0 /8.
Specify the appropriate default gateway and subnet mask.
58 | P a g e
a. At the command prompt for each router, issue the commands show ip
protocols and show ip route to verify RIP routing is fully converged. The
show ip protocols command displays the networks the router is advertising and
the addresses of other RIP routing neighbors. The show ip route command
output displays all routes know to the local router including the RIP routes
which are indicated by an “R”.
b. Every device should now be able to successfully ping any other device in this
activity.
c. Click the Check Results button at the bottom of this instruction window to
check your work.
Experiment-24
Objectives
Place firewalls in appropriate locations to satisfy security requirements.
Background / Preparation
You are a technician who provides network support for a medium-sized business. The
business has grown and includes a research and development department working on a
new, very confidential project. The livelihood of the project depends on protecting the
data used by the research and development team.
59 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
Your job is to install firewalls to help protect the network, based on specific
requirements. The Packet Tracer topology that you will use includes two preconfigured
firewalls. In the two scenarios presented, you will replace the existing routers with the
firewalls. The firewalls need to be configured with the appropriate IP address
configurations, and the firewalls should be tested to ensure that they are installed and
configured correctly.
Firewa
ll_1#s
how
run
Buildi
ng
config
uratio
n...
hostname Firewall_1
!
interface
FastEthernet
0/0 ip
address
192.168.1.1
60 | P a g e
255.255.255.
0
i
p
n
a
t
i
n
s
i
d
e
d
u
p
l
e
x
a
u
t
o
s
p
e
e
d
a
u
t
o
!
interface FastEthernet0/1
ip address
209.165.200.225
255.255.255.224 ip
access-group 100 in
ip nat outside duplex
auto speed auto
!
i
n
t
e
r
f
a
c
e
V
l
a
61 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
n
1
n
o
i
p
a
d
d
r
e
s
s
s
h
u
t
d
o
w
n
!
ip nat inside source list 1 interface
FastEthernet0/0 overload ip classless
ip route 192.168.2.0
255.255.255.0
192.168.1.2 ip route
192.168.3.0
255.255.255.0
192.168.1.3
!
access-list 1 permit
192.168.0.0 0.0.255.255
access-list 100 deny ip any
host 209.165.200.225 <output
omitted>
!
end
b. From PC_B, ping 209.165.200.225 to verify that the internal computer can access
the Internet.
PC>ping 209.165.200.225
62 | P a g e
Packets: Sent = 4, Received = 4, Lost = 0
(0% loss), Approximate round trip times in
milli-seconds:
Minimum = 95ms, Maximum = 107ms, Average = 101ms
c. From privileged EXEC mode on Firewall_1, save the running configuration to the
startup configuration using the copy run start command.
Firewa
ll_2#s
how
run
Buildi
ng
config
uratio
n...
...
!
interface
FastEthernet
0/0 ip
address
192.168.3.1
63 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
255.255.255.
0
i
p
n
a
t
i
n
s
i
d
e
d
u
p
l
e
x
a
u
t
o
s
p
e
e
d
a
u
t
o
!
interface
FastEthernet
0/1 ip
address
192.168.1.3
255.255.255.
0 ip access-
group 100 in
ip nat outside
duplex auto
speed auto
!
access-list 1 permit
192.168.3.0 0.0.0.255
access-list 100 permit ip
host 192.168.2.10 any
access-list 100 permit ip
host 192.168.1.1 any
<output omitted>
!
64 | P a g e
end
b. From the command prompt on PC_B, use the ping command to verify that the
computers on Subnet B cannot access the computers on Subnet C.
PC>ping 192.168.3.10
c. From the command prompt on PC_C, use the ping command to verify that the
computers on Subnet C can access the server on Subnet B.
PC>ping 192.168.2.10
d. From the command prompt on PC_C, use the ping command to verify that the
computers on Subnet C can access the Internet.
PC>ping 209.165.200.225
65 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
e. From privileged EXEC mode on Firewall_2, save the running configuration to the
startup configuration using the copy run start command.
f. Click the Check Results button at the bottom of this instruction window to check
your work.
Reflection
a. Why would you install a firewall on the internal network?
b. How does a router that is configured to use NAT help protect computer systems on
the inside of the NAT router?
66 | P a g e
Experiment-25
Objectives
Configure the customer Cisco 1841 ISR as a DHCP server.
Background / Preparation
In this activity, you will continue to configure the Cisco 1841 ISR router for the
customer network by configuring the DHCP service. The customer has several
workstations that need to be automatically configured with IP addresses on the local
subnet and appropriate DHCP options to allow access to the Internet.
The DHCP pool will use the 192.168.1.0/24 network but the first 49 addresses are
excluded. The default gateway and DNS server also need to be configured as
192.168.1.1 and 192.168.1.10.
For this activity, both the user and privileged EXEC passwords are cisco.
Note: Packet Tracer does not currently support the domain name and lease period
options. These options are not used in this activity.
67 | P a g e
Arba Minch University Faculty of Computing and Software Engineering
gashaw.alemu2@gmail.com
d. Create a DHCP pool called pool1.
CustomerRouter(dhcp-config)#dns-server 192.168.1.10
CustomerRouter(dhcp-config)#default-router 192.168.1.1
CustomerRouter(dhcp-config)#exit
CustomerRouter(config)#ip dhcp excluded-address
Reflection
a. What is the purpose of DHCP on the customer network?
c. What other DHCP options can be defined on the Cisco 1841 ISR
router that are not configured in this activity?
68 | P a g e