Networking Lab Reportss
Networking Lab Reportss
ASSIGNMENT: NETWORKING
CONFIGRATION LAB REPORT
NAME ID
Topology
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
PC0 NIC 192.168.5.1 255.255.255.0 192.168.5.11
PC1 NIC 192.168.5.2 255.255.255.0 192.168.5.11
PC2 NIC 192.168.5.3 255.255.255.0 192.168.5.11
PC3 NIC 192.168.5.4 255.255.255.0 192.168.5.11
S0 - - - -
S1 - - - -
2. Objectives
Upon completion of this lab, you will be able to:
• Cable a network according to the topology diagram
• Clear an existing configuration on a switch
• Examine and verify the default configuration
• Create a basic switch configuration, including a name and an IP address
• Configure passwords to ensure that access to the CLI is secured
Configure port security on individual FastEthernet ports.
3.Introduction.
Switches are used to connect multiple devices together on the same network. In a
properly designed network, LAN switches are responsible for directing and
controlling the data flow at the access layer to networked resources. Access layer
switches operate at the access layer, where client network devices connect directly
to the network and IT departments want uncomplicated network access for the
users. It is one of the most vulnerable areas of the network because it is so exposed
to the user. Switches need to be configured to be resilient to attacks of all types
while they are protecting user data and allowing high-speed connections. Port
security is one of the security features that Cisco-managed switches provide. you
will examine and configure a standalone LAN switch. Although a switch performs
basic functions in its default out-of-the-box condition, there are a number of
parameters that a network administrator should modify to ensure a secure and
optimized LAN. This lab introduces you to the basics of switch configuration.
4.Devices
Cable,
Erase,
Switch
PC
S1#exit
Password:
Password:
S1>enable
Password:
Password:
S1#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK
s1#config t
Enter configuration commands, one per line. End with CNTL/Z.
s1(config)#interface fastEthernet 0/1
s1(config-if)#
s1(config-if)#switchport mode access
s1(config-if)#switchport port-security
s1(config-if)#
s1(config-if)#switchport port-security ?
aging Port-security aging commands
mac-address Secure mac address
maximum Max secure addresses
violation Security violation mode
<cr>
s1(config-if)#switchport port-security maximum ?
<1-132> Maximum addresses
s1(config-if)#switchport port-security mac-address ?
H.H.H 48 bit mac address
sticky Configure dynamic secure addresses as sticky
s1(config-if)#switchport port-security mac-address sticky
s1(config-if)#switchport port-security mac-address 00E0.A353.53D8
s1(config-if)#switchport port-security vio
s1(config-if)#switchport port-security violation ?
protect Security violation protect mode
restrict Security violation restrict mode
shutdown Security violation shutdown mode
s1(config-if)#switchport port-security violation restrict
s1(config-if)#exit
C:\>ping 192.168.5.4
C:\>
7.Conclusion
The main reason to use port security in a switch is to stop or prevent
unauthorized users to access the LAN. The network engineer can use port
security to restrict usage of a specific port, by defining a maximum
number of MAC addresses, by statically defining an address, or by
applying different violation actions over the interface. To stop
unauthorized telnet or SSH access to a management interface the switch
must be secured with passwords at the command line, with the VTY
console command
And then finally we configured RIPv2 routing on all the three routers and
then verified the routes via ‘show ip route and then pinging to each device
in the network.
Lab2.
1.Title:vlan and vlan trunking
Topology
Addressing table
Addressing Table
Device Interface Ip Address Subnet mask Default
Getway
PC0 NIC 192.168.5.2 255.255.255.0 192.168.5.1
PC1 NIC 192.168.5.130 255.255.255.0 192.168.5.129
PC2 NIC 192.168.5.4 255.255.255.0 192.168.5.1
PC3 NIC 192.168.5.132 255.255.255.0 192.168.5.129
S0 - - - -
S1 - - - -
2.objectives
Cable a network according to the topology diagram
• Erase the startup configuration and reload a switch to the default state
• Perform basic configuration tasks on a switch
• Create VLANs
• Assign switch ports to a VLAN
• Verify VLAN configuration
• Enable trucking on inter-switch connections
• Verify trunk configuration
• Save the VLAN configuration
3.Introductions
Modern switches use virtual local-area networks (VLANs) to improve network
performance by separating large Layer 2 broadcast domains into smaller ones.
VLANs can also be used as a security measure by controlling which hosts can
communicate. In general, VLANs make it easier to design a network to support the
goals of an organization. VLAN trunks are used to span VLANs across multiple
devices. Trunks allow the traffic from multiple VLANS to travel over a single link,
while keeping the VLAN identification and segmentation intact. In this lab, you
will create VLANs on both switches in the topology, assign VLANs to switch
access ports, verify that VLANs are working as expected, and then create a VLAN
trunk between the two switches to allow hosts in the same VLAN to communicate
through the trunk, regardless of which switch the host is actually attached to.
4. Devices
Cable,
Erase,
Switch
PC
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
--More—
Step 2: Assign VLANs to the correct switch interfaces.
Switch1(config)#interface fastEthernet 0/2
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchp
Switch1(config-if)#switchport access vlan 10
Switch1(config-if)#interface fastEthernet 0/3
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 20
Switch1(config-if)#interface fastEthernet 0/1
Switch1(config-if)#switchport mode trunk
Switch(config-if)#
Switch1(config-if)#no shut
Switch1(config-if)#no shutdown
Switch1(config-if)#exit
Use the Topology to assign VLANs to the appropriate ports on S2.
Switch2>
Switch2>ena
Switch2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch2(config)#interface fastEthernet 0/2
Switch2(config-if)#switchport mode access
Switch2(config-if)#switc
Switch2(config-if)#switchport access vlan 10
Switch2(config-if)#interface fastEthernet 0/3
Switch2(config-if)#switchport mode access
Switch2(config-if)#switchport access vlan 20
Switch2(config-if)#
Switch2(config-if)#interface fastEthernet 0/1
Switch2(config-if)#
Switch2(config-if)#switchport mode trunk
Switch2(config-if)#no shutdown
Switch2(config-if)#exit
C:\>
Pc1
Packet Tracer PC Command Line 1.0
C:\>ping 192.168.5.132
C:\>
7.conclusion
In the context of VLANs, the term trunk denotes a network link carrying multiple
VLANs, which are identified by labels (or tags) inserted into their packets. Such
trunks must run between tagged ports of VLAN-aware devices, so they are often
switch-to-switch or switch-to-router links rather than links to hosts.
Lab 4.
1.Title:Basic routing principle
Topology
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Fa0/0 192.168.5.1 255.255.255.192 N/A
Fa0/1 192.168.5.65 255.255.255.192 N/A
Fa1/0 192.168.5.129 255.255.255.192 N/A
Fa1/1 192.168.5.193 255.255.255.192 N/A
PC0 NIC 192.168.5.2 255.255.255.192 192.168.5.1
PC1 NIC 192.168.5.66 255.255.255.192 192.168.5.65
PC2 NIC 192.168.5.130 255.255.255.192 192.168.5.129
PC3 NIC 192.168.5.194 255.255.255.192 192.168.5.193
2.Objectives
Cable a network according to the Topology Diagram
Erase the startup configuration and reload a router to the default state
Perform basic configuration tasks on a router
Configure and activate Ethernet interfaces
Test and verify configurations
3.Introduction
In this lab activity, you will create a network that is similar to the one shown in the
Topology Diagram. Begin by cabling the network as shown in the Topology
Diagram. You will then perform the initial router configurations required for
connectivity Use the IP addresses that are provided in the Topology Diagram to
apply an addressing scheme to the network devices.When the network
configuration is complete, examine the routing tables to verify that the network is
operating properly.This lab is Cabling a Network and Basic Router Configuration
and assumes you are proficient in basic cabling and configuration file
management.
4. Devices
Cables,
Erase,
Switches
PCs
Routers
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 192.168.5.1 255.255.255.192
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface FastEthernet0/1
Router(config-if)#ip address 192.168.5.65 255.255.255.192
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface FastEthernet0/1
Router(config-if)#ip address 192.168.5.65 255.255.255.192
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Ethernet1/1
Router(config-if)#ip address 192.168.5.193 255.255.255.192
Router(config-if)#no shutdown
Router(config-if)#
C:\>ping 192.168.5.66
C:\>
C:\>ping 192.168.5.194
7.Conclusions:
This lab introduced some applications and uses of Cisco routers that go beyond the
everyday routing of packets and connecting of networks. Some of the tools listed
in this lab do not relate specifically to Cisco routers but instead point out the fact
that networking is more than just routers and networks. Support systems that many
functions of the Internet rely on also need to be troubleshot at times. You should
now be familiar with some of the more readily used and available tools. Hopefully,
some ideas have been generated in your mind for other uses for Cisco routers that
are not mentioned here. In addition to presenting the most readily used and
available troubleshooting tools, this lab also introduced some simple tools
Lab 5:
Title: Configure Legacy Inter-VLAN Routing
Topology
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R1 Gig0/0/0 192.168.5.1 255.255.255.128 N/A
Gig0/0/1 192.168.5.129 255.255.255.128 N/A
2.objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Configure Switches with VLANs and Accessing
Part 3: Verify Accessing, VLANs, Routing, and Connectivity
3.introductions
4. Devices
Cables,
Erase,
Switch
PCs
Router
7.Conclusions:
As we learned that each VLAN is usually working on its subnet. Therefore for
traffic between VLAN inter-VLAN routing is required. The Legacy Inter-VLAN
routing is the first solution for traffic between different VLAN. It relies on routers
with multiple physical interfaces. All interface had to be connected to a separate
network and configured with a separate subnet. The legacy inter-VLAN routing
connects different physical router interfaces to different physical ports on the
switch. The switch ports connected to the router must be placed in access mode.
Each physical interface of the router is assigned to a different VLAN and the router
interface then accepts the traffic from the VLAN related with the switch interface it
is connected to. Then the router sends the traffic to other VLANs connected to the
other interfaces.
Lab 6:
Topology
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/0 192.168.5.1 255.255.255.128 N/A
2.objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Create VLANs and Assign Switch Ports
Part 3: Configure Inter-VLAN Routing on the Router
Part 4: Verify Inter-VLAN Routing is working
3.introductions
Modern switches use virtual local-area networks (VLANs) to provide segmentation
services traditionally provided by routers in LAN configurations. VLANs address
scalability, security, and network management. In general, VLANs make it easier
to design a network to support the goals of an organization. VLAN trunks are used
to span VLANs across multiple devices. Trunks allow the traffic from multiple
VLANS to travel over a single link, while keeping the VLAN identification and
segmentation intact. A particular kind of inter-VLAN routing, called “Router-On-
A-Stick”, uses a trunk from the router to the switch to enable all VLANs to pass to
the router.In this lab, you will create VLANs on switches in the topology, assign
VLANs to switch access ports, verify that VLANs are working as expected, create
VLAN trunks between S1 and R1, and configure Inter-VLAN routing on R1 to
allow hosts in different VLANs to communicate, regardless of which subnet the
host resides.
4. Devices
Cables,
Erase,
Switch
PCs
Router
S1(config)# vlan 10
S1(config-vlan)# name student
S1(config-vlan)# vlan 20
S1(config-vlan)# name staff
S1(config-vlan)# exit
S1(config)# interface Fa0/2
S1(config-if)# switchport mode access
S1(config-if)# switchport access vlan 10
S1(config-if)# interface Fa0/3
S1(config-if)# switchport mode access
S1(config-if)# switchport access vlan 20
S1(config-if)# interface Fa0/1
S1(config-if)# switchport mode trunk
Switch1#sh vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/4, Fa0/5, Fa0/6, Fa0/7
Fa0/8, Fa0/9, Fa0/10, Fa0/11
Fa0/12, Fa0/13, Fa0/14, Fa0/15
Fa0/16, Fa0/17, Fa0/18, Fa0/19
Fa0/20, Fa0/21, Fa0/22, Fa0/23
Fa0/24, Gig0/1, Gig0/2
10 student active Fa0/2
20 staff active Fa0/3
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
--More--
C:\
7.Conclusions:
Lab7:
1.Title:static route configuration
Topology:
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/0 192.168.5.1 255.255.255.224 N/A
Gig0/0/1 192.168.5.33 255.255.255.224 N/A
Se0/1/0 192.168.5.129 255.255.255.224 N/A
R1 Gig0/0/0 192.168.5.65 255.255.255.224 N/A
Gig0/0/1 192.168.5.97 255.255.255.224 N/A
Se0/1/0 192.168.5.130 255.255.255.224 N/A
2.objectives
In this lab activity, you will create a network that is similar to the one shown in the
Topology Diagram. Begin by cabling the network as shown in the Topology
Diagram. You will then perform the initial router configurations required for
connectivity. Use the IP addresses that are provided in the Addressing Table to
apply an addressing scheme to the network devices. After completing the basic
configuration, test connectivity between the devices on the network. First test the
connections between directly connected devices, and then test connectivity
between devices that are not directly connected. Static routes must be configured
on the routers for end-to-end communication to take place between the network
hosts. You will configure the static routes that are needed to allow communication
between the hosts. View the routing table after each static route is added to observe
how the routing table has changed.
4.Devices
Cables,
Erase,
Switches
PCs
Routers
Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 192.168.5.65 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 192.168.5.97 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip address 192.168.5.130 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#ip route 192.168.5.0 255.255.255.224 192.168.5.129
Router(config)#ip route 192.168.5.32 255.255.255.224 192.168.5.129
Router(config)#
Check connectivity
Pc0 to pc1……yes
Pc1 to pc2……yes
Pc2 to pc3……yes
C:\>ping 192.168.5.98
C:\>
7.Conclusions:
When you compare static routing with other types of the path, it offers your proper
security because in static routing, only the network administrator may change the
routing table, and it also reduces the routing traffic load when used in the stub
network link.
Static routing have:
Static routing can be used to define an exit point from a router when no other
routes are available or necessary. This is called a default route.
Static routing can be used for small networks that require only one or two
routes. This is often more efficient since a link is not being wasted by
exchanging dynamic routing information.
Static routing is often used as a complement to dynamic routing to provide a
failsafe backup if a dynamic route is unavailable.
Static routing is often used to help transfer routing information from one
routing protocol to another (routing redistribution).
Lab 8:
1.Title: Dynamic route configuration
Topology:
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/0 192.168.5.1 255.255.255.224 N/A
Gig0/0/1 192.168.5.33 255.255.255.224 N/A
Se0/1/0 192.168.5.129 255.255.255.224 N/A
2.objectives
Cable a network according to the Topology Diagram.
Erase the startup configuration and reload a router to the default state.
Perform basic configuration tasks on a router.
Configure and activate Serial and Ethernet interfaces.
Test connectivity.
3.Introduction
Dynamic routing protocols have evolved over several years to meet the
demands of changing network requirements. Although many organizations
have migrated to more recent routing protocols such as Enhanced Interior
Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF),
many of the earlier routing protocols, such as Routing Information
Protocol (RIP), are still in use today.
4.Devices
Cables,
Erase,
Switches
PCs
Routers
Router(config)#router rip
Router(config-router)#network 192.168.5.0
Router(config-router)#network 192.168.5.32
Router(config-router)#network 192.168.5.128
Router(config-router)#end
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 192.168.5.65 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 192.168.5.97 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip address 192.168.5.130 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config-router)#router rip
Router(config-router)#network 192.168.5.64
Router(config-router)#network 192.168.5.96
Router(config-router)#network 192.168.5.128
Router(config-router)#end
Check connectivity
Pc0 to pc1……yes
Pc1 to pc2……yes
Pc2 to pc3……yes
Pc0: Pinging 192.168.5.69 with 32 bytes of data:
C:\>ping 192.168.5.99
C:\>
7.Conclusions:
Lab 9:
1.Title:both Dynamic and Static route configurations
Topology
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/1 192.168.5.1 255.255.255.224 N/A
Gig0/0/0 192.168.5.33 255.255.255.224 N/A
Se0/1/0 192.168.5.129 255.255.255.224 N/A
2.Objectives
3.introduction
Static routing and dynamic routing are two methods used to determine how to send
a packet toward its destination.
4.Devices
Cables,
Erase,
Switches
PCs
Routers
5. Methods and producers
x^2=5
x=3,subnetbit.
Host bit=8-3=>5.
No host=2^5=32.
No of subnet=2^3=>8.
192.168.5.0/27
192.168.5.32/27
192.168.5.64/27
192.168.5.96/27
192.168.5.128/27
Check connectivity
Pc0 to pc1……yes
Pc1 to pc2……yes
Pc2 to pc3……yes
Pc0: Packet Tracer PC Command Line 1.0
C:\>ping 192.168.5.70
C:\>ping 192.168.5.100
C:\>
7.Conclusion
In brief, routing is the process of sending data from the source to the destination.
Here, data is sent through the most optimal path from the sending device to the
receiving device. There are two types of routing: static and dynamic routing. The
main difference between static and dynamic routing is that, in static routing, the
administrator manually enters the routes in the routing table, while in dynamic
routing, the routes are found automatically according to the changes in the
network.
Lab10:
1.Title: Basic OSPF Configuration Lab
Topology:
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/0 192.168.5.1 255.255.255.224 N/A
Se0/1/1 192.168.5.33 255.255.255.224 N/A
Se0/1/0 192.168.5.129 255.255.255.224 N/A
Cables,
Erase,
Switches
PCs
Routers
Router2(config-if)#exit
Router2(config)#interface Serial0/1/1
Router2(config-if)#ip address 192.168.5.66 255.255.255.224
Router2(config-if)#no shutdown
Router(config)#router ospf 2
Router(config-router)#network 192.168.5.32 0.0.0.255 area 0
Router(config-router)#network 192.168.5.64 0.0.0.255 area 0
Router(config-router)#
C:\>
7.Conclusion
OSPF is a Link State Routing Protocol
• Quick and simple to get started – But has a myriad of options and features
to cover almost all types of network topology – ISPs keep their OSPF
design SIMPLE
Lab11:
1.Title: Basic EIGRP Configuration Lab
Topology:
2.Objectives
• Cable a network according to the Topology Diagram.
•Erase the startup configuration and reload a router to the default state.
•Perform basic configuration tasks on a router.
•Configure and activate interfaces.
• Configure EIGRP routing on all routers.
• Verify EIGRP routing using show commands.
3.introduction
EIGRP routers will start sending hello packets to other routers just like
OSPF does, if you send hello packets and you receive them you will
become neighbors. EIGRP neighbors will exchange routing information
which will be saved in the topology table. The best path from the topology
table will be copied in the routing table.
4.Devices
Cables,
Erase,
Switches
PCs
Routers
5. Methods and producers
x^2=5
x=3,subnetbit.
Host bit=8-3=>5.
No host=2^5=32.
No of subnet=2^3=>8.
192.168.5.0/27
192.168.5.32/27
192.168.5.64/27
192.168.5.96/27
192.168.5.128/27
Part 1:Build the Network
Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as
necessary.
part 2: Configure and Activate Serial and Ethernet Addresses.
1: Configure the interfaces on the R0, R1, and R2 routers.
Configure the interfaces on the R1, R2, and R3 routers with the IP addresses from t
he table under the Topology Diagram.
2: Verify IP addressing and interfaces.
Use the show ip interface brief command to verify that the IP addressing is correct
and that the interfaces are active.
3: Configure Ethernet interfaces of PC0, PC1, and PC2.
Configure the Ethernet interfaces of PC0, PC1, and PC2 with the IP addresses and
default gateways from the table under the Topology Diagram.
4: Configure EIGRP on the R1 Router.
Router0(config)#router eigrp 10
Router0(config-router)#network 192.168.5.96 255.255.255.224
Router0(config-router)#network 192.168.5.0 255.255.255.224
Router0(config-router)#exit
Router0(config)#end
Router0(config)#router eigrp 10
Router0(config-router)#network 192.168.5.96 255.255.255.224
C:\>ping 192.168.5.71
C:\>