CN Lab 7-10
CN Lab 7-10
CN Lab 7-10
3. Introduction:
Packet Tracer is a protocol simulator developed at Cisco Systems. Packet Tracer (PT) is a
powerful and dynamic tool that displays the various protocols used in networking, in either
Real Time or Simulation mode. This includes layer 2 protocols such as Ethernet and PPP,
layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols such as TCP and UDP.
Routing protocols can also be traced. Packet Tracer is a supplement to and not a
replacement for experience with real equipment. Students are encouraged to compare the
results obtained from Packet Tracer network models with the behavior of real equipment.
TASK: Design a simple network using Packet Tracer by configuring router from config
tab
This exercise emphasizes on the need of getting knowledge of simulation environment of the
networking area. You are required to create a simple network topology connecting a router to 2
PCs through a switch and ensure the connectivity.
Step 1 From your Cisco Packet Tracer Window, go to Routers section and select a generic 2621XM
Router.
Step 3 Now, in order to connect the devices, select the copper straight-through cable from the
“Connections” section and connect the devices as shown below:
Step 4 Assign IP addresses along with their gateways to the 2 PCs by double clicking the PCs to
open their dialog boxes. In this case, we have assigned 192.168.1.2 and 192.168.1.3 respectively.
Step 6 After done with the configuration, you will see that all the lights are green now showing
that network is ready to be operated.
Finally, you can see that the packet transmission is successful as shown by the message
window:
If you want to take help you can type first few characters of command and then enter ?
This command will backup running-config file in RAM into NVRAM with the file name of startup-
config.
Following commands can also be used to create backup in NVRAM.
R1#write
R1#write memory
This command will copy backup file (startup-config) from NVRAM into RAM
Step 4
Assign IP addresses along with their gateways to the 2 PCs by double clicking the PCs to open
their dialog boxes. In this case, we have assigned 192.168.1.2 and 192.168.2.2 respectively.
Note: The ips’ assigned to both the PCs’ must belong to two different networks in this case.
Step 6
Assign the IPs to Fastethernet Interfaces Fa 0/0 and Fa 0/1. The IPs should be same as assigned to
default gateways of PCs respectively. Also activate the interfaces.
Step 7
Verify the interfaces through verification commands.
Step 8
After done with the configuration, you will see that all the lights are green now showing that
network is ready to be operated.
Step 9
Checking Connectivity
Method 1: After successfully creating the topology, you can check the connectivity of the
network by changing the mode from real mode to simulation mode and then selecting a packet
from the right bar of the PT window and sending it from one PC to another. You will see an
animated packet transmitted from source PC to Destination PC. Finally, you will see that the
packet transmission is successful as shown by the message window.
Method 2: Ping using command prompt window of one PC to another.
Method 3: Do the same as Method 1 but in Real Time mode.
2. Equipment Required:
A working computer having Cisco packet tracer installed.
3. Introduction:
WAN:
A wide area network (WAN) is a telecommunications network or computer network that extends over
a large geographical distance. Wide area networks often are established with leased telecommunication
circuits.
Business, education and government entities use wide area networks to relay data among staff, students,
clients, buyers, and suppliers from various geographical locations. In essence, this mode of
telecommunication allows a business to effectively carry out its daily function regardless of location.
The Internet may be considered a WAN.
Imagine that you are the primary network engineer for an enterprise TCP/IP internetwork. Your
company is building a new building at a site 100 miles away from your corporate headquarters. You
will of course install a LAN throughout the new building, but you also need to connect that new remote
LAN to the rest of the existing enterprise TCP/IP network.
To connect the new building’s LAN to the rest of the existing corporate network, you need some kind
of a WAN. At a minimum, that WAN needs to be able to send data from the remote LAN back to the
rest of the existing network and vice versa. Leased line WANs do exactly that, forwarding data between
two routers.
From a basic point of view, a leased line WAN works a lot like an Ethernet crossover cable connecting
two routers, but with few distance limitations. Each router can send at any time (full-duplex) over the
leased line, for tens, hundreds, or even thousands of miles.
To connect LANs together using a WAN, the internetwork uses a router connected to each LAN, with
a WAN link between the routers. First, the enterprise’s network engineer would order some kind of
WAN link. A router at each site connects to both the WAN link and the LAN. Note that crooked line
between the routers is the common way to represent a leased line when the drawing does not need to
show any of the physical details of the line.
Telnet:
Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers,
routers or switches. Through Telnet, an administrator or another user can access someone else's
computer, router or switch remotely. On the Web, HTTP and FTP protocols allow you to request
specific files from remote computers, but not to actually be logged on as a user of that computer,
router or switch. With Telnet, you log on as a regular user with whatever privileges you may have
been granted to the specific application and data on that computer, router or switch. Telnet uses
VTY lines on Cisco IOS. Telnet is less secure and not encrypted.
SSH:
Secure Shell (SSH), is a protocol for securely getting access to a remote router. It is widely used by
network administrators to control routers remotely. SSH commands are encrypted and secure in several
ways. Both ends of the client/server connection are authenticated using a digital certificate, and
passwords are protected by being encrypted.
4. Procedure:
TASK: Enable Telnet and SSH on Cisco Router
To enable telnet on Cisco router, simply do it with “line vty” command. First of download the CISCO
packet racer Lab for slate. The Lab is configured with DHCP server (but you should check all IPs) and
all clients get IP address from DHCP Server on Router.
If you need more information about Telnet commands and options, from the config-linemode type
“?“, the question mark will display all telnet commands.
1. Open the router R1 console line and create domain and user name.
2. If you don, just follow and generate the encryption keys for securing the ssh session.
The configuration is the same as telnet, just the transport input ssh command change the line
to Secure Shell. Configuration has completed, next you must test ssh from a client PC.
Hope you understand the configuration of enable Telnet and SSH on Cisco router and
switches. Now you should be able to simply enable Telnet and SSH on your routers and
switches.
Step 2 Then pick up DCE Serial Cable and connect the two routers via serial interfaces.
Note: If Serial Interface not already installed in the routers, we have to manually place WIC-2T
module in the routers using Physical Mode.
Step 3 Open Command Prompt Window on one of remote PCs, and type the command telnet Router
IP. You will be asked vty password. After entering the vty password you will be proceeded to router’s
user mode in the same command prompt window.