Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
256 views62 pages

Workbook and Lab Manual

The document provides information on IP addressing concepts including: - Binary to decimal and decimal to binary conversions of IP addresses. - Classes of IP addresses (A, B, C, D, E) and their ranges and subnet masks. - Private and public IP address ranges. - Subnetting techniques including borrowing bits from subnet masks to create subnets and host addresses. - An example is given to split a Class C network into 14 subnets using subnet mask 255.255.255.240.

Uploaded by

Madavan Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
256 views62 pages

Workbook and Lab Manual

The document provides information on IP addressing concepts including: - Binary to decimal and decimal to binary conversions of IP addresses. - Classes of IP addresses (A, B, C, D, E) and their ranges and subnet masks. - Private and public IP address ranges. - Subnetting techniques including borrowing bits from subnet masks to create subnets and host addresses. - An example is given to split a Class C network into 14 subnets using subnet mask 255.255.255.240.

Uploaded by

Madavan Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 62

Workbook and Lab manual

CCNA
Workbook – IP Addressing
IP Addressing and sub netting workbook

Binary to decimal

27 26 25 24 23 22 21 20 Value
0 0 0 0 0 0 0 1 1
0 0 0 0 0 0 1 1 3
0 0 0 0 0 1 1 1 7
0 0 0 0 1 1 1 1 15
0 0 0 1 1 1 1 1 31
0 0 1 1 1 1 1 1 63
0 1 1 1 1 1 1 1 127
1 1 1 1 1 1 1 1 255
1 1 1 1 1 1 1 0 254
1 1 1 1 1 1 0 0 252
1 1 1 1 1 0 0 0 248
1 1 1 1 0 0 0 0 240
1 1 1 0 0 0 0 0 224
1 1 0 0 0 0 0 0 192
1 0 0 0 0 0 0 0 128

Workout

27 26 25 24 23 22 21 20 Value
1 0 0 0 0 0 0 1
1 0 1 0 1 0 1 1
0 0 1 0 0 1 1 0
1 0 0 0 1 1 0 1
0 1 0 1 1 1 1 0
0 0 1 0 1 1 0 1
0 1 1 1 1 0 1 1
1 0 1 1 1 1 0 1
1 1 0 1 1 1 1 0
1 1 1 0 1 1 0 0
1 0 1 1 1 0 1 0
1 1 1 1 0 0 0 0
1 0 1 0 0 0 1 0
1 1 0 0 0 1 0 0
1 0 0 0 0 0 0 1
Decimal to binary

27 26 25 24 23 22 21 20 Decimal value
0 0 0 0 0 0 0 1 1
0 0 0 0 0 0 1 0 2
0 0 0 0 0 1 0 0 4
0 0 0 0 1 0 0 0 8
0 0 0 1 0 0 0 0 16
0 0 1 0 0 0 0 0 32
0 1 0 0 0 0 0 0 64
1 0 0 0 0 0 0 0 128
1 1 0 0 0 0 0 0 192
1 1 1 0 0 0 0 0 224
1 1 1 1 0 0 0 0 240
1 1 1 1 1 0 0 0 248
1 1 1 1 1 1 0 0 252
1 1 1 1 1 1 1 0 254
1 1 1 1 1 1 1 1 255
1 0 0 0 0 0 0 0 128

Workout

27 26 25 24 23 22 21 20 Decimal value
101
205
194
186
165
232
164
28
82
134
123
208
152
174
155
118
IP Address Classes

Class A 1 – 127 (Network 127 is reserved for loopback and internal testing)
Leading bit pattern 0 00000000.00000000.00000000.00000000
Class B 128 – 191 Leading bit pattern 10 10000000.00000000.00000000.00000000
Class C 192 – 223 Leading bit pattern 110 11000000.00000000.00000000.00000000
Class D 224 – 239 (Reserved for multicast)
Class E 240 – 255 (Reserved for experimental, used for research)

Private Address Space

Class A 10.0.0.0 to 10.255.255.255


Class B 172.16.0.0 to 172.31.255.255
Class C 192.168.0.0 to 192.168.255.255

Default Subnet Masks

Class A 255.0.0.0 Network . Host . Host . Host


Class B 255.255.0.0 Network . Network . Host . Host
Class C 255.255.255.0 Network . Network . Network . Host

Summarization of IP address classes

Range Network ID Host ID Subnet Mask


Class A 0 - 127 W.0.0.0 0.X.Y.Z 255.0.0.0
Class B 128 - 191 W.X.0.0 0.0.Y.Z 255.255.0.0
Class C 192 - 223 W.X.Y.0 0.0.0.Z 255.255.255.0
Class D 224 - 239 Multicast purpose  
Class E 240 - 255 Research purpose  

Role of subnet mask in IP address

The subnet mask is used to separate the network part and host part from the IP address
using AND gate logic

Identification of network and host part with subnet mask


Example: 1

IP address 192.168.10.1
Class Class C
Network portion 192.168.10.0
Host portion 0.0.0.1
Subnet mask 255.255.255.0

Workout

IP address 102.18.180.101
Class  
Network portion  
Host portion  
Subnet mask  

IP address 152.112.120.123
Class  
Network portion  
Host portion  
Subnet mask  

IP address 12.18.10.11
Class  
Network
portion  
Host portion  
Subnet mask  

IP address 202.11.10.12
Class  
Network
portion  
Host portion  
Subnet mask  

Private IP address range

Range Subnet mask CIDR notation


Class A 10.0.0.0 to 10.255.255.255 255.0.0.0 /8
Class B 172.16.0.0 to 172.31.255.255 255.240.0.0 /12
Class C 192.168.0.0 to 192.168.255.255 255.255.0.0 /16

Example of Private IP address

An example of private IP address like192.168.10.1, 10.15.12.1, 172.25.25.25..etc, which


are mostly used inside the organization.

Public IP address

IP addresses other than the private IP address are called public IP address. ISP(Internet Service
Provider) mostly use this public IP address.

Example of Public IP Address

An example of a public IP address like 30.40.50.20, 180.60.25.23, 201.2.5.45, etc.,

Subnetting

I. Network and required number of subnet is given


II. Network and required number of host is given
III. Network with CIDR notation
IV. IP address with CIDR notation

Note:
1 If requirement is the number of subnet borrow bits ( i.e n value) from default subnet mask
from left hand side to right hand side
2 If requirement is the number of host borrow bits ( i.e n value) from default subnet mask
from right hand side to left hand side
3 CIDR notation value indicates the number of bits is in a high state in a subnet mask value

Example 1

A network administrator requires to divide a subnet of 192.10.10.0 into an 14 usable subnets for
the organization.

Solution:

Given values:

Number of needed usable subnets 14


Network address 192.10.10.10
Default subnet mask 255.255.255.0
Address class Class C

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 = 14
2n = 14 + 2
2n = 16 (because 24 = 16)

So n value is 4

Number of bits required for host is 4 bits

255.255.255.XXXX XXXX
255.255.255.1111 0000 = 255.255.255.240

Custom subnet mask 255.255.255.240

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX

1st network 192.168.10.0000 | XXXX = 192.168.0.0 – invalid subnet


2nd network 192.168.10.0001 | XXXX = 192.168.0.16
3rd network 192.168.10.0010 | XXXX = 192.168.0.32
4th network 192.168.10.0011 | XXXX = 192.168.0.48
5th network 192.168.10.0100 | XXXX = 192.168.0.64
.
.
.
.
.
15th network 192.168.10.1110 | XXXX = 192.168.0.224
Last network 192.168.10.1111 | XXXX = 192.168.0.240 – invalid subnet

So the valid subnet is


1st subnet – 192.168.0.16
2nd subnet – 192.168.0.32
3rd subnet – 192.168.0.48
.
.
14th subnet – 192.168.0.224

Step 3: Find the valid host in each subnet


1st Subnet - 192.168.0.16
Binary notation - 192.168.0.0001 | XXXX
Possible combination in host address

192.168.0.0001 | XXXX
192.168.0.0001 | 0000 – 192.168.0.16 – Invalid address
192.168.0.0001 | 0001 – 192.168.0.17 – 1st IP address
192.168.0.0001 | 0010 – 192.168.0.18 – 2nd IP address
192.168.0.0001 | 0011 – 192.168.0.19 – 3rd IP address
.
.
192.168.0.0001 | 1110 – 192.168.0.30 – Last IP address
192.168.0.0001 | 1111 – 192.168.0.31 – Invalid address (broadcast address)

So valid IP address for subnet 192.168.0.16 is 192.168.0.17 - 192.168.0.30


Broadcast address is 192.168.0.31

Similarly for

2nd subnet 192.168.0.32


1st IP address 192.168.0.33
Last IP address 192.168.0.46
Broadcast IP address 192.168.0.47
Subnet mask 255.255.255.240

3rd subnet 192.168.0.48


1st IP address 192.168.0.49
Last IP address 192.168.0.62
Broadcast IP address 192.168.0.63
Subnet mask 255.255.255.240

Last subnet 192.168.0.242


1st IP address 192.168.0.243
Last IP address 192.168.0.238
Broadcast IP address 192.168.0.239
Subnet mask 255.255.255.240

Sub netting – workout

Workout : 1
A network administrator requires to divide a subnet of 192.10.10.0 into 2 usable subnets for the
organization

Solution:

Given values:

Number of needed usable subnets


Network address
Default subnet mask
Address class

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 =
2n = + 2
2n = (because 2 = )

So n value is ____

Number of bits required for host are ____ bits

255.255.255.XXXX XXXX

Custom Subnet Mask _________________

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX

1st network ________________ = ______________ – invalid subnet


2nd network ________________ = ______________
3rd network ________________ = ______________
4th network ________________ = ______________
5th network ________________ = ______________
.
.
.
___ network ________________ = ______________
Last network ________________ = ______________ – invalid subnet

So the valid subnet is


1st subnet – ________________
2nd subnet – ________________
3rd subnet – ________________
.
.
__ subnet – ________________

Step 3: Find the valid host in each subnet

1st subnet - ________________


Binary notation - ________________
Possible combination in host address ________________
________________ – ________________ – invalid address
________________ – ________________ – 1st IP address
________________ – ________________ – 2nd IP address
________________ – ________________ – 3rd IP address
.
.
________________ – ________________ – Last IP address
________________ – ________________ – Invalid address (broadcast address)

So valid IP address for subnet ________________ is ________________


________________
Broadcast address is ________________
Similarly for

2nd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

3rd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Last subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Workout: 2

A network administrator requires to divide a subnet of 192.10.10.0 into an 4 usable subnets for
the organisation.

Solution:

Given values:

Number of needed usable subnets


Network address
Default subnet mask
Address class

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 =
2n = + 2
2n = (because 2 = )

So n value is ____
Number of bits required for host are ____ bits.

255.255.255.XXXX XXXX

Custom subnet mask _________________

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX

1st network ________________ = ______________ – invalid subnet


2nd network ________________ = ______________
3rd network ________________ = ______________
4th network ________________ = ______________
5th network ________________ = ______________
.
.
___ network ________________ = ______________
Last network ________________ = ______________ – invalid subnet
So the valid subnet is
1st subnet – ________________
2nd subnet – ________________
3rd subnet – ________________
.
.
__ subnet – ________________
Step 3: Find the valid host in each subnet

1st subnet - ________________


Binary notation - ________________
Possible combination in host address ________________

________________ – ________________ – invalid address


________________ – ________________ – 1st IP address
________________ – ________________ – 2nd IP address
________________ – ________________ – 3rd IP address
.
.
________________ – ________________ – last IP address
________________ – ________________ – invalid address (broadcast address)

So valid IP address for subnet ________________ is ________________


________________
Broadcast address is ________________
Similarly for

2nd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

3rd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Last subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Workout : 3

A network administrator requires to divide an subnet of 192.10.10.0 into an 20 usable subnet for
the organisation.

Solution:

Given values:

Number of needed usable subnets


Network address
Default subnet mask
Address class

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 =
2n = + 2
2n = (because 2 = )

So n value is ____

Number of bits required for host is ____ bits

255.255.255.XXXX XXXX

Custom subnet mask _________________

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX

1st network ________________ = ______________ – invalid subnet


2nd network ________________ = ______________
3rd network ________________ = ______________
4th network ________________ = ______________
5th network ________________ = ______________
.
.
.
___ network ________________ = ______________
Last network ________________ = ______________ – invalid subnet
So the valid subnet is
1st subnet – ________________
2nd subnet – ________________
3rd subnet – ________________
.
.
__ subnet – ________________
Step 3: Find the valid host in each subnet

1st subnet - ________________


Binary notation - ________________
Possible combination in host address ________________
________________ – ________________ – Invalid address
________________ – ________________ – 1st IP address
________________ – ________________ – 2nd IP address
________________ – ________________ – 3rd IP address
.
________________ – ________________ – Last IP address
________________ – ________________ – Invalid address (broadcast address)

So valid IP address for subnet ________________ is ________________


________________
Broadcast address is ________________

Similarly for

2nd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

3rd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask
Last subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Workout : 4

A network administrator requires to divide a subnet of 132.0.0.0 into a 1000 usable subnet for the
organisation.

Solution:

Given Values:
Number of needed usable subnets
Network address
Default subnet mask
Address class

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 =
2n = + 2
2n = (because 2 = )

So n value is ____
Number of bits required for host are ____ bits.
255.255.255.XXXX XXXX

Custom subnet mask _________________

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX

1st network ________________ = ______________ – invalid subnet


2nd network ________________ = ______________
3rd network ________________ = ______________
4th network ________________ = ______________
5th network ________________ = ______________
.
___ network ________________ = ______________
Last network ________________ = ______________ – invalid subnet
So the valid subnet is
1st subnet – ________________
2nd subnet – ________________
3rd subnet – ________________
.
.
__ subnet – ________________

Step 3: Find the valid host in each subnet

1st subnet - ________________


Binary notation - ________________
Possible combination in host address ________________

________________ – ________________ – invalid address


________________ – ________________ – 1st IP address
________________ – ________________ – 2nd IP address
________________ – ________________ – 3rd IP address
.
________________ – ________________ – last IP address
________________ – ________________ – invalid address (Broadcast Address)

So valid IP address for subnet ________________ is ________________


________________
Broadcast address is ________________
Similarly for

2nd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

3rd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask
Last subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Workout : 5

A network administrator requires a number of 30 valid hosts in a subnet 192.10.10.0 for the
organisation.

Solution:

Given values:

Number of needed usable hosts


Network address
Default subnet mask
Address class

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 =
2n = + 2
2n = (because 2 = )

So n value is ____

Number of bits required for host are ____ bits.

255.255.255.XXXX XXXX

Custom subnet mask _________________

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX
1st network ________________ = ______________ – invalid subnet
2nd network ________________ = ______________
3rd network ________________ = ______________
4th network ________________ = ______________
5th network ________________ = ______________
.
___ network ________________ = ______________
Last network ________________ = ______________ – invalid subnet
So the valid subnet is
1st subnet – ________________
2nd subnet – ________________
3rd subnet – ________________
.
.
__ subnet – ________________
Step 3: Find the valid host in each subnet

1st subnet - ________________


Binary notation - ________________
Possible combination in host address ________________

________________ – ________________ – invalid address


________________ – ________________ – 1st IP address
________________ – ________________ – 2nd IP address
________________ – ________________ – 3rd IP address
.
.
.
________________ – ________________ – last IP address
________________ – ________________ – invalid address (broadcast address)

So valid IP address for subnet ________________ is ________________


________________
Broadcast address is ________________
Similarly for

2nd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

3rd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Last subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask
Workout : 6

A network administrator requires a number of 1500 valid hosts in a subnet 152.10.0.0 for the
organization.

Solution:

Given values:

Number of needed usable hosts


Network address
Default subnet mask
Address class

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 =
2n = + 2
2n = (because 2 = )

So n value is ____

Number of bits required for host are ____ bits

255.255.255.XXXX XXXX

Custom subnet mask _________________

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX

1st network ________________ = ______________ – invalid subnet


2nd network ________________ = ______________
3rd network ________________ = ______________
4th network ________________ = ______________
5th network ________________ = ______________
.
.
___ network ________________ = ______________
Last network ________________ = ______________ – invalid subnet
So the valid subnet is
1st subnet – ________________
2nd subnet – ________________
3rd subnet – ________________
.
.
__ subnet – ________________
Step 3: Find the valid host in each subnet

1st subnet - ________________


Binary notation - ________________
Possible combination in host address ________________

________________ – ________________ – invalid address


________________ – ________________ – 1st IP address
________________ – ________________ – 2nd IP address
________________ – ________________ – 3rd IP address
.
.
________________ – ________________ – Last IP address
________________ – ________________ – Invalid address (broadcast address)

So valid IP address for subnet ________________ is ________________


________________
Broadcast address is ________________
Similarly for

2nd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

3rd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask
Last subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Workout : 7

A network administrator requires a number of 1500 valid subnet in a subnet 182.10.0.0 for the
organization.

Solution:

Given values:

Number of needed usable hosts


Network address
Default subnet mask
Address class

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 =
2n = + 2
2n = (because 2 = )
So n value is ____

Number of bits required for host are ____ bits.

255.255.255.XXXX XXXX

Custom subnet mask _________________

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX

1st network ________________ = ______________ – invalid subnet


2nd network _______________ = ______________
3rd network ________________ = ______________
4th network ________________ = ______________
5th network ________________ = ______________
.
___ network ________________ = ______________
Last network ________________ = ______________ – invalid subnet
So the valid subnet is
1st subnet – ________________
2nd subnet – ________________
3rd subnet – ________________
.
.
__ subnet – ________________
Step 3: Find the valid host in each subnet

1st subnet - ________________


Binary notation - ________________
Possible combination in host address ________________

________________ – ________________ – invalid address


________________ – ________________ – 1st IP address
________________ – ________________ – 2nd IP address
________________ – ________________ – 3rd IP address
.
________________ – ________________ – Last IP address
________________ – ________________ – Invalid address (broadcast address)

So valid IP address for subnet ________________ is ________________


________________
Broadcast address is ________________

Similarly for

2nd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

3rd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Last subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Workout : 8

A network administrator requires a number of 2000 valid hosts in a subnet 172.0.0.0 for the
organization.

Solution:

Given values:

Number of needed usable hosts


Network address
Default subnet mask
Address class

Step 1: To find the custom subnet mask

2n – 2 = company requirement
2n – 2 =
2n = + 2
2n = (because 2 = )

So n value is ____

Number of bits required for host are ____ bits

255.255.255.XXXX XXXX

Custom subnet mask _________________

Step 2: To find the valid network ID

192.10.10.XXXX | XXXX

1st network ________________ = ______________ – invalid subnet


2nd network _______________ = ______________
3rd network ________________ = ______________
4th network ________________ = ______________
5th network ________________ = ______________
.
.
___ network ________________ = ______________
Last network ________________ = ______________ – invalid subnet
So the valid subnet is
1st subnet – ________________
2nd subnet – ________________
3rd subnet – ________________
.
.
__ subnet – ________________
Step 3: Find the valid host in each subnet

1st subnet - ________________


Binary notation - ________________
Possible combination in host address ________________

________________ – ________________ – invalid address


________________ – ________________ – 1st IP address
________________ – ________________ – 2nd IP address
________________ – ________________ – 3rd IP address
.
.
________________ – ________________ – last IP address
________________ – ________________ – invalid address (broadcast address)

So valid IP address for subnet ________________ is ________________


________________
Broadcast address is ________________
Similarly for

2nd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

3rd subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask

Last subnet
1st IP address
Last IP address
Broadcast IP address
Subnet mask
Lab manual - CCNA
Lab completion Report

Name of the student : __________________________

Lab Date Student Sign Faculty Sign

Topology 1
     
Topology 2
     
Topology 3
     
Topology 4
     
Topology 5
     
Topology 6
     
Topology 7
     
Topology 8
     
Topology 9
     
Topology 10
     
Topology 11
     
Topology 12
     
Topology 13
     
Topology 14
     
Topology 15
     
Topology 16
     
Topology 17
     

Table of Content

Topology Description Page Number

Lab Topology 1 Basic command line interface configuration  

Lab Topology 2 Advance command line interface configuration  

Lab Topology 3 Static and Default Routing  

Lab Topology 4 RIP and IGRP Routing Protocol  

Lab Topology 5 RIP Routing Protocol – II  

Lab Topology 6 RIP Routing Protocol – III  

Lab Topology 7 EIGRP  

Lab Topology 8 OSPF Routing Protocol - I  

Lab Topology 9 OSPF Routing Protocol - II  


Lab Topology 10 OSPF Routing Protocol - III  

Lab Topology 11 OSPF Routing Protocol - IV  

Lab Topology 12 Booting Process  

Lab Topology 13 Switching  

Lab Topology 14 NAT  

Lab Topology 15 Access Control List  

Lab Topology 16 PPP  

Lab Topology 17 Frame-Relay  

Lab Topology 1
Basic command line interface configuration

Topology Diagram

Configure the below concept in the topology mentioned above.

1. Setting a hostname

2. Setting a banner

3. Setting history buffer


4. Setting a clock time zone

5. Setting a enable password

6. Setting a console password

7. Setting a telnet password

8. Setting a auxiliary password

9. Setting a secret password

10. Encrypting a password

11. Setting a description to an interface.


12. Configuring IP address to an interface

13. Setting clock rate and bandwidth to serial interface

14. Verifying and checking your configuration.

15. Understanding editing and help feature

Lab Topology 2
Advance command line interface configuration

Topology Diagram

Configure the below concept in the topology mentioned above.

1. Resolving hostname using DNS

2. Resolving hostname using IP host command


3. Setting HTTP and HTTPS

4. Configuration of SSH

5. Configuration of DHCP

6. Configuration of CDP

Lab Topology 3
Static and Default Routing

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Configuration of interface
 Configuring the static routing
 Understanding the routing logic by debugging
 Monitoring the routing table changes
 Configuring the default routing
 Understanding the Extended PING command
 Disabling the IP routing on the router

Command used in the lab exercises

IP route <Network ID> <Subnet Mask> <Gateway>


IP route <Network ID> <Subnet Mask> <Inteface>
IP default-gateway
Show interface
Show IP interface
Show IP interface brief
Show protocols
Show IP Route
Show ARP
Clear ARP
Debug IP Routing
Debug IP Packet
Debug ARP
Debug IP ICMP
Undebug all
Ping
Extended Ping

Configure the below concept in the topology mentioned above.

1. Configuration of interface

2. Configuring the static routing

3. Understanding the routing logic by debugging

4. Monitoring the routing table changes


5. Configuring the default routing

6. Understanding the Extended PING command

7. Disabling the IP routing on the router

Lab Topology 4
RIP and IGRP Routing Protocol
Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Configuration of RIP routing protocol


 Configuration of IGRP routing protocol
 Understanding the concept like,
 Update Interval
 Invalid timer
 Hold down timer
 Flush timer
 Split-horizon
 Route poison
 Poison reverse
 Administrative distance
 Passive interface

Command used in the lab exercises

Router RIP
Router IGRP <ASN>
Network <Network ID>
Passive Interface
Show IP route RIP
Show IP route <Network>
Show IP Protocols
Show IP Interface
Debug IP RIP
Debug IP RIP events
Debug IP Routing
Debug IP IGRP Transactions
Configure the below concept in the topology mentioned above.

1. Configuration of RIP routing protocol

2. Configuration of IGRP routing protocol


Lab Topology 5
RIP Routing Protocol - II

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 RIP protocol route manipulation


 Debugging RIP
 Equal cost load balancing
 Configuration of preferred routes

Command used in the lab exercises

Auto-summary
IP address <IP address> secondary
No IP Split-Horizon
Passive Interface
Neighbor
Show IP Protocols
Debug IP RIP

Configure the below concept in the topology mentioned above


1. Configuration of RIP Protocol

2. Assigning a secondary IP address to an interface

3. Disabling the split-horizon


4. Configuration of Passive interface

5. Enabling RIP to send unicast instead of broadcast

6. Configuration of preferred routes

Lab Topology 6
RIP Routing Protocol - III

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Automatic network summarization.


 Understanding the discontinuous network problem
 Difference between Classful and Classless routing protocol
behavior
 Issue in RIP version 1 and Version 2
 Redistribution of routes between RIP and IGRP protocols
 Redistribution of routes between different AS of IGRP protocols

Command used in the lab exercises

IP Unnumbered Ethernet 0
Auto-summary
IP rip receive version
Redistribute IGRP <AS> metric <metric value>
Redistribute RIP metric <bandwidth> <delay> <reliability> <load> <MTU>
Debug IP RIP
Debug IP IGRP transactions
Show IP route
Show IP Protocols

Configure the below concept in the topology mentioned above.

1. Configuration of RIP version 1

2. Configuration of Loop back interface.

3. Configuration of RIP version 2.


4. Configuring redistribution of routes between RIP and IGRP.

5. Configuration of IGRP in autonomous systems 100 and 200.

6. Mutual redistribution of routes between IGRP 100 and IGRP 200.

Lab Topology 7
EIGRP

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Configuring of EIGRP.
 Understanding the DUAL concepts like,
 Administrative distance
 Feasible distance
 Successor
 Feasible Successor
 Feasibility condition

Command used in the lab exercises

Router eigrp <ASN>


Network <Network ID>
Metric weights
Delay
Show IP route
Show IP eigrp topology
Show IP eigrp neighbors
Debug eigrp fsm

Configure the below concept in the topology mentioned above.


1. Configuration of EIGRP

2. Configuration of delay on all the interfaces


3. Verifying and debugging the DUAL concepts

Lab Topology 8
OSPF Routing Protocol - I

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Behavior of OSPF in a point-to-point network


 Understanding the importance of Hello protocol
 Understanding the neighbor states

Command used in the lab exercises

Router ospf <process id>


Network <network address> <wildcard mask> area <area-id>
IP ospf hello-interval
Interface loopback
Show IP ospf
Debug IP ospf adj
Debug IP ospf hello

Configure the below concept in the topology mentioned above.

1. Configure of OSPF

2. Debugging the hello protocol


3. Debugging the adjacency formation

4. Verification of ospf database

Lab Topology 9
OSPF Routing Protocol - II

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,


 Implementation of OSPF in a broadcast multi-access network.
 Behavior of OSPF in a broadcast multi-access network.
 Designated router, Backup designated router & DRother router.

Command used in the lab exercises


Router ospf <process id>
Network <network address> <wildcard mask> area <area-id>
IP ospf priority <value>
Show IP route ospf
Show IP ospf interface Ethernet 0
Show IP ospf neighbors
Debug IP ospf

Configure the below concept in the topology mentioned above.


1. Configuration of priority value

2. Promotion of the BDR as DR

3. Configuration of dead and wait interval


4. Election of BDR – priority value

5. Election of BDR – router-id

Lab Topology 10
OSPF Routing Protocol - III

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Behavior of OSPF in a Non Broadcast multi access network like


Frame-relay.
Command used in the lab exercises
Router ospf <process id>
Network <network address> <wildcard mask> area <area-id>
IP ospf priority <value>
IP ospf network point-to-point
IP ospf network broadcast
Encapsulation frame-relay
Frame-relay switching
Frame-relay intf-type dce
Frame-relay route
Show IP route ospf
Show IP ospf interface Ethernet 0
Show IP ospf neighbors

Configure the below concept in the topology mentioned above.

1. Configuration of OSPF

2. Configuration of Frame-relay switch

3. Configuration of adjacency formation by neighbor command

4. Configuration of adjacency by defining the network type as broadcast


5. Configuration of adjacency by defining the network type as point-to-point

6. Configuration of OSPF

7. Configuration of Frame-relay switch

Lab Topology 11
OSPF Routing Protocol - IV

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Behavior of OSPF in multiple areas.


 Redistribution between OSPF and RIP.
 Configuration of virtual link.
 Importance of Area Border Router.
 Importance of Autonomous system boundary router.

Command used in the lab exercises

Router ospf <process id>


Network <network address> <wildcard mask> area <area-id>
Area <area-id> virtual link <router-id of neighbor>
Redistribute rip
Show IP route ospf
Show IP ospf interface Ethernet 0
Show IP ospf neighbors

Configure the below concept in the topology mentioned above.

1. Configuration of OSPF in multiple areas

2. Configuration of virtual link


3. Configuration of redistribution between OSPF and RIP

4. Verification of the role of the router as ASBR

Lab Topology 12
Booting Process

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Understanding the booting of Cisco router


 Recovering password using register
 Backing up the Cisco IOS using TFTP server
 Verifying flash memory
 Restoring or upgrading the Cisco router IOS
 Erasing the configuration.

Command used in the lab exercises

Show version
Copy running-config startup-config
Copy startup-config running-config
Copy startup-config tftp
Copy tftp startup-config
Configuration-register

Configure the below concept in the topology mentioned above.

1. Backing up the Cisco IOS using TFTP server

2. Recovering password using register

3. Verifying flash memory


4. Restoring or upgrading the Cisco router IOS

5. Erasing the configuration.

Lab Topology 13
Switching

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Understanding the basic configuration of switching.


 Understanding the concepts of VLANs
 Understanding the concepts of VTP

Command used in the lab exercises

Vlan database
Vlan <number> name <name of the vlan>
Vlan membership static <vlan number>
Trunk on
Encapsualation ISL <vlan number>
Show Vlan
Show mac-address-table

Configure the below concept in the topology mentioned above.

1. Basic configuration on switch


2. Configuration of Static VLANs

3. Configuration of VLAN

4. Assigning Switch Ports to VLANs

5. Configuring Trunk Ports

6. Configuration of VLAN Trunking Protocol


7. Configuration of VTP Modes

8. Configuration of routing between VLANs

9. Configuration of switching security

10. Configuration the Voice VLAN


11. Configuration IP Phone Voice Traffic

Lab Topology 14
NAT

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Understanding the concepts of static NAT


 Understanding the concepts of dynamic NAT
 Understanding the concepts of PAT
 Understanding the concepts of VPN

Command used in the lab exercises

IP nat inside source static <inside local> <inside global>


IP nat pool <name> <start IP address> <end IP address>
Access-list <ACL number> permit <local addresses to be converted> <wildcard mask>
IP nat inside source list <ACL number> pool <name>
Show IP nat transalation
Debug IP nat

Configure the below concept in the topology mentioned above.

1. Configuration and verification of Static NAT

2. Configuration and verification of Dynamic NAT


3. Configuration and verification of PAT

4. Configuration and verification of VPN

Lab Topology 15
Access Control List

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,


 Understanding the configuration standard access lists.
 Understanding the configuration extended access lists.
 Understanding the configuration named access lists.
 Understanding the configuration time based access lists.
 Understanding the configuration switch port access lists.

Command used in the lab exercises

Access-list <acl number> <permit/deny> <source address> <source wildcard mask>


IP access-group <access-list number> <in/out>
Show access-lists
Show IP interface

Configure the below concept in the topology mentioned above.

1. Configuration of standard access lists.


2. Configuration of extended access lists.

3. Configuration of named access lists.

4. Configuration of time based access lists.


5. Configuration of switch port access lists

Lab Topology 16
PPP

Topology Diagram

Objectives:

This lab topology is used to understand the following concepts,

 Configuration of PPP.
 Configurations of authentication using CHAP.
 Configurations of authentication using PAP.

Command used in the lab exercises

Encapsulation ppp
PPP authentication pap
PPP authentication chap
Username <name> password <password>
PPP pap sent-username <hostname> password <password>
Show interface serial 0
Debug ppp authentication

Configure the below concept in the topology mentioned above.

1. Configuration of PPP.

2. Configurations of authentication using CHAP.


3. Configuration of authentication using PAP.

Lab Topology 17
Frame Relay

Topology Diagram

Objectives:
This lab topology is used to understand the following concepts,

 Configuration of a router as frame-relay switch.


 Configuration of a frame relay network
 Local management interface protocol issues
 Inverse ARP protocol issues.

Command used in the lab exercises

Encapsulation frame-relay
Frame-relay switching
Frame-relay intf-type dce
Frame-relay map ip <IP address> <DLCI number> broadcast
Frame-relay route <input DLCI number> interface <output interface> <output DLCI number>
Clear frame-relay map
No frame-relay inverse-arp
Show frame-relay pvc
Show frame-relay route
Show frame-relay lmi
Debug ip packet

Configure the below concept in the topology mentioned above.

1. Configurations of the router as a frame-relay switch.

2. Changing the encapsulation type to frame-relay.

3. Creation of PVCs by defining DLCI numbrs.


4. Disabling inverse ARP

5. Configuring the static frame relay mapping

You might also like