Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
14 views47 pages

Networking Lab Reportss

The document is a lab report from Wolkite University focusing on networking configuration, specifically switch configuration and port security. It includes objectives, methods, and results of experiments conducted on basic switch configuration, VLANs, and routing principles. The report emphasizes the importance of securing network access and optimizing configurations for efficient data flow.

Uploaded by

abrehamamesw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views47 pages

Networking Lab Reportss

The document is a lab report from Wolkite University focusing on networking configuration, specifically switch configuration and port security. It includes objectives, methods, and results of experiments conducted on basic switch configuration, VLANs, and routing principles. The report emphasizes the importance of securing network access and optimizing configurations for efficient data flow.

Uploaded by

abrehamamesw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 47

WOLKITE UNIVERSITY

COLLEGE OF COMPUTING AND INFORMATICS

INFORMATION SYSTEMS DEPARTMENT

ASSIGNMENT: NETWORKING
CONFIGRATION LAB REPORT

NAME ID

GETU ABRHA NSR/0678/12


Lab 1.
 1. Title: Basic Switch Configuration and port security.

Topology

Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
PC0 NIC 192.168.5.1 255.255.255.0 192.168.5.11
PC1 NIC 192.168.5.2 255.255.255.0 192.168.5.11
PC2 NIC 192.168.5.3 255.255.255.0 192.168.5.11
PC3 NIC 192.168.5.4 255.255.255.0 192.168.5.11
S0 - - - -
S1 - - - -

 2. Objectives
Upon completion of this lab, you will be able to:
• Cable a network according to the topology diagram
• Clear an existing configuration on a switch
• Examine and verify the default configuration
• Create a basic switch configuration, including a name and an IP address
• Configure passwords to ensure that access to the CLI is secured
 Configure port security on individual FastEthernet ports.
 3.Introduction.
Switches are used to connect multiple devices together on the same network. In a
properly designed network, LAN switches are responsible for directing and
controlling the data flow at the access layer to networked resources. Access layer
switches operate at the access layer, where client network devices connect directly
to the network and IT departments want uncomplicated network access for the
users. It is one of the most vulnerable areas of the network because it is so exposed
to the user. Switches need to be configured to be resilient to attacks of all types
while they are protecting user data and allowing high-speed connections. Port
security is one of the security features that Cisco-managed switches provide. you
will examine and configure a standalone LAN switch. Although a switch performs
basic functions in its default out-of-the-box condition, there are a number of
parameters that a network administrator should modify to ensure a secure and
optimized LAN. This lab introduces you to the basics of switch configuration.

 4.Devices

 Cable,
 Erase,
 Switch
 PC

 5.Methode and Procedure


Task 1: Cable, Erase, and Reload the Switch
Step 1: Cable a network.
Cable a network that is similar to the one in the topology diagram. Create a
console connection to the switchs.
Step 2: Clear the configuration on the switch. Clear the configuration on the switch
using the procedure in Appendix .

Task 2: Verify the Default Switch Configuration


Step 1: Enter privileged mode
You can access all the switch commands in privileged mode. However, because
many of the privileged commands configure operating parameters, privileged
access should be password-protected to prevent unauthorized use.
Switch>enable
Switch#
Task 3: Create a Basic Switch Configuration
Step 1: Assign a name to the switch.
S1#configure terminal
S1(config)#hostname S1
S1(config)#exit

Step 2: Set the access passwords.


S1(config)#line console 0
S1(config-line)#password 0678
S1(config-line)#login
S1(config-line)#line vty 0 15
S1(config-line)#password 123
S1(config-line)#login
S1(config-line)#exit

Step 3. Set the command mode passwords.


Set the enable secret password to class.This password protects access to privileged
mode.
S1(config)#enable secret getu
S1(config)#exit
s1#
%SYS-5-CONFIG_I: Configured from console by console

S1#exit

S1 con0 is now available

Press RETURN to get started.


getu config

User Access Verification

Password:
Password:

S1>enable
Password:
Password:
S1#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK
s1#config t
Enter configuration commands, one per line. End with CNTL/Z.
s1(config)#interface fastEthernet 0/1
s1(config-if)#
s1(config-if)#switchport mode access
s1(config-if)#switchport port-security
s1(config-if)#
s1(config-if)#switchport port-security ?
aging Port-security aging commands
mac-address Secure mac address
maximum Max secure addresses
violation Security violation mode
<cr>
s1(config-if)#switchport port-security maximum ?
<1-132> Maximum addresses
s1(config-if)#switchport port-security mac-address ?
H.H.H 48 bit mac address
sticky Configure dynamic secure addresses as sticky
s1(config-if)#switchport port-security mac-address sticky
s1(config-if)#switchport port-security mac-address 00E0.A353.53D8
s1(config-if)#switchport port-security vio
s1(config-if)#switchport port-security violation ?
protect Security violation protect mode
restrict Security violation restrict mode
shutdown Security violation shutdown mode
s1(config-if)#switchport port-security violation restrict
s1(config-if)#exit

 6.Result and Discusion


All PCs were ping each athere
Packet Tracer PC Command Line 1.0
C:\>ping 192.168.5.3

Pinging 192.168.5.3 with 32 bytes of data:

Reply from 192.168.5.3: bytes=32 time=12ms TTL=128


Reply from 192.168.5.3: bytes=32 time<1ms TTL=128
Reply from 192.168.5.3: bytes=32 time<1ms TTL=128
Reply from 192.168.5.3: bytes=32 time<1ms TTL=128

Ping statistics for 192.168.5.3:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 12ms, Average = 3ms

C:\>ping 192.168.5.4

Pinging 192.168.5.4 with 32 bytes of data:

Reply from 192.168.5.4: bytes=32 time=1ms TTL=128


Reply from 192.168.5.4: bytes=32 time<1ms TTL=128
Reply from 192.168.5.4: bytes=32 time<1ms TTL=128
Reply from 192.168.5.4: bytes=32 time<1ms TTL=128

Ping statistics for 192.168.5.4:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms

C:\>

 7.Conclusion
The main reason to use port security in a switch is to stop or prevent
unauthorized users to access the LAN. The network engineer can use port
security to restrict usage of a specific port, by defining a maximum
number of MAC addresses, by statically defining an address, or by
applying different violation actions over the interface. To stop
unauthorized telnet or SSH access to a management interface the switch
must be secured with passwords at the command line, with the VTY
console command
And then finally we configured RIPv2 routing on all the three routers and
then verified the routes via ‘show ip route and then pinging to each device
in the network.

Lab2.
1.Title:vlan and vlan trunking
Topology

Addressing table
Addressing Table
Device Interface Ip Address Subnet mask Default
Getway
PC0 NIC 192.168.5.2 255.255.255.0 192.168.5.1
PC1 NIC 192.168.5.130 255.255.255.0 192.168.5.129
PC2 NIC 192.168.5.4 255.255.255.0 192.168.5.1
PC3 NIC 192.168.5.132 255.255.255.0 192.168.5.129
S0 - - - -
S1 - - - -

2.objectives
Cable a network according to the topology diagram
• Erase the startup configuration and reload a switch to the default state
• Perform basic configuration tasks on a switch
• Create VLANs
• Assign switch ports to a VLAN
• Verify VLAN configuration
• Enable trucking on inter-switch connections
• Verify trunk configuration
• Save the VLAN configuration
3.Introductions
Modern switches use virtual local-area networks (VLANs) to improve network
performance by separating large Layer 2 broadcast domains into smaller ones.
VLANs can also be used as a security measure by controlling which hosts can
communicate. In general, VLANs make it easier to design a network to support the
goals of an organization. VLAN trunks are used to span VLANs across multiple
devices. Trunks allow the traffic from multiple VLANS to travel over a single link,
while keeping the VLAN identification and segmentation intact. In this lab, you
will create VLANs on both switches in the topology, assign VLANs to switch
access ports, verify that VLANs are working as expected, and then create a VLAN
trunk between the two switches to allow hosts in the same VLAN to communicate
through the trunk, regardless of which switch the host is actually attached to.

4. Devices

 Cable,
 Erase,
 Switch
 PC

5.Method and procuders


x^2=2
x=1,subnetbit.
Host bit=8-1=>7.
No host=2^7=128.
No of subnet=2^1=>2.
192.168.5.0/25
192.168.5.128/25

Part 1: Build the Network and Configure Basic Device Settings


Step 1: Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.

Step 2: Initialize and reload the switches as necessary.


Part 2: Create VLANs and Assign Switch Ports In Part 2, you will create student,
staff VLANs on both switches. You will then assign the VLANs to the appropriate
interface. The show vlan command is used to verify your configuration settings.
Step 1: Create VLANs on the switches.
Create VLANs on the switches. a. Create the VLANs on S1.
S1(config)# vlan 10
S1(config-vlan)# name Student
S1(config-vlan)# vlan 20
S1(config-vlan)# name staff S1(config-vlan)#
S1(config-vlan)# end

b. Create the same VLANs on S2.


c. Issue the show vlan command to view the list of VLANs on S1.
S1# show vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/4, Fa0/5, Fa0/6, Fa0/7
Fa0/8, Fa0/9, Fa0/10, Fa0/11
Fa0/12, Fa0/13, Fa0/14, Fa0/15
Fa0/16, Fa0/17, Fa0/18, Fa0/19
Fa0/20, Fa0/21, Fa0/22, Fa0/23
Fa0/24, Gig0/1, Gig0/2
10 student active Fa0/2
20 staff active Fa0/3
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active

VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
--More—
Step 2: Assign VLANs to the correct switch interfaces.
Switch1(config)#interface fastEthernet 0/2
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchp
Switch1(config-if)#switchport access vlan 10
Switch1(config-if)#interface fastEthernet 0/3
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 20
Switch1(config-if)#interface fastEthernet 0/1
Switch1(config-if)#switchport mode trunk

Switch(config-if)#

Switch1(config-if)#no shut
Switch1(config-if)#no shutdown
Switch1(config-if)#exit
Use the Topology to assign VLANs to the appropriate ports on S2.
Switch2>
Switch2>ena
Switch2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch2(config)#interface fastEthernet 0/2
Switch2(config-if)#switchport mode access
Switch2(config-if)#switc
Switch2(config-if)#switchport access vlan 10
Switch2(config-if)#interface fastEthernet 0/3
Switch2(config-if)#switchport mode access
Switch2(config-if)#switchport access vlan 20
Switch2(config-if)#
Switch2(config-if)#interface fastEthernet 0/1
Switch2(config-if)#
Switch2(config-if)#switchport mode trunk
Switch2(config-if)#no shutdown
Switch2(config-if)#exit

 6.Result and Discusion


Pc0 ping to pc 2…….yes
Pc0 ping to pc1……no
Pc1 ping to pc3…..yes
Pc2 ping to pc3 …..no

Pc0. Packet Tracer PC Command Line 1.0


C:\>ping 192.168.5.4

Pinging 192.168.5.4 with 32 bytes of data:

Reply from 192.168.5.4: bytes=32 time=128ms TTL=128


Reply from 192.168.5.4: bytes=32 time=9ms TTL=128
Reply from 192.168.5.4: bytes=32 time<1ms TTL=128
Reply from 192.168.5.4: bytes=32 time<1ms TTL=128

Ping statistics for 192.168.5.4:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 128ms, Average = 34ms

C:\>
Pc1
Packet Tracer PC Command Line 1.0
C:\>ping 192.168.5.132

Pinging 192.168.5.132 with 32 bytes of data:

Reply from 192.168.5.132: bytes=32 time=1ms TTL=128


Reply from 192.168.5.132: bytes=32 time<1ms TTL=128
Reply from 192.168.5.132: bytes=32 time<1ms TTL=128
Reply from 192.168.5.132: bytes=32 time=3ms TTL=128

Ping statistics for 192.168.5.132:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 3ms, Average = 1ms

C:\>

7.conclusion
In the context of VLANs, the term trunk denotes a network link carrying multiple
VLANs, which are identified by labels (or tags) inserted into their packets. Such
trunks must run between tagged ports of VLAN-aware devices, so they are often
switch-to-switch or switch-to-router links rather than links to hosts.

Lab 4.
1.Title:Basic routing principle

Topology
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Fa0/0 192.168.5.1 255.255.255.192 N/A
Fa0/1 192.168.5.65 255.255.255.192 N/A
Fa1/0 192.168.5.129 255.255.255.192 N/A
Fa1/1 192.168.5.193 255.255.255.192 N/A
PC0 NIC 192.168.5.2 255.255.255.192 192.168.5.1
PC1 NIC 192.168.5.66 255.255.255.192 192.168.5.65
PC2 NIC 192.168.5.130 255.255.255.192 192.168.5.129
PC3 NIC 192.168.5.194 255.255.255.192 192.168.5.193

2.Objectives
 Cable a network according to the Topology Diagram
 Erase the startup configuration and reload a router to the default state
 Perform basic configuration tasks on a router
 Configure and activate Ethernet interfaces
 Test and verify configurations

3.Introduction
In this lab activity, you will create a network that is similar to the one shown in the
Topology Diagram. Begin by cabling the network as shown in the Topology
Diagram. You will then perform the initial router configurations required for
connectivity Use the IP addresses that are provided in the Topology Diagram to
apply an addressing scheme to the network devices.When the network
configuration is complete, examine the routing tables to verify that the network is
operating properly.This lab is Cabling a Network and Basic Router Configuration
and assumes you are proficient in basic cabling and configuration file
management.

4. Devices

 Cables,
 Erase,
 Switches
 PCs
 Routers

5. Methods and producers


x^2=4
x=2,subnetbit.
Host bit=8-2=>6.
No host=2^6=64.
No of subnet=2^2=>4.
192.168.5.0/26
192.168.5.64/26
192.168.5.128/26
192.168.5.192/26

Task 1 Cable the Network.


Cable a network that is similar to the one in the Topology Diagram. The output
used in this lab is from 2811 routers. You can use any current router in your lab as
long as it has the required interfaces as shown in the topology. Be sure to use the
appropriate type of Ethernet cable to connect from host to switch, switch to router.
Step 1: Establish a terminal session to router R0
Cabling a Network and Basic Router Configuration for review of terminal
emulation and connecting to a router.
Step 2:Enter privileged EXEC mode.
Router>enable
Router#
Step 3:Enter global configuration mode
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
Step 10:Configure the FastEthernet0/0 interface.

Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 192.168.5.1 255.255.255.192
Router(config-if)#no shutdown
Router(config-if)#

Router(config-if)#exit
Router(config)#interface FastEthernet0/1
Router(config-if)#ip address 192.168.5.65 255.255.255.192
Router(config-if)#no shutdown
Router(config-if)#

Router(config-if)#exit
Router(config)#interface FastEthernet0/1
Router(config-if)#ip address 192.168.5.65 255.255.255.192
Router(config-if)#no shutdown
Router(config-if)#

Router(config-if)#exit

Router(config)#interface Ethernet1/1
Router(config-if)#ip address 192.168.5.193 255.255.255.192
Router(config-if)#no shutdown
Router(config-if)#

 6.Result and Discusion

Pc0 ping to pc1……yes


Pc1 ping to pc2…..yes
Pc2 ping to pc3…..yes
Pc1 ping to pc3…..yes
Pc0 ping to pc3….yes

Pc0: Packet Tracer PC Command Line 1.0


C:\>ping 192.168.5.130

Pinging 192.168.5.130 with 32 bytes of data:


Request timed out.
Reply from 192.168.5.130: bytes=32 time=4ms TTL=127
Reply from 192.168.5.130: bytes=32 time=1ms TTL=127
Reply from 192.168.5.130: bytes=32 time<1ms TTL=127

Ping statistics for 192.168.5.130:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 4ms, Average = 1ms

C:\>ping 192.168.5.66

Pinging 192.168.5.66 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.66: bytes=32 time<1ms TTL=127
Reply from 192.168.5.66: bytes=32 time=3ms TTL=127
Reply from 192.168.5.66: bytes=32 time<1ms TTL=127

Ping statistics for 192.168.5.66:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 3ms, Average = 1ms

C:\>
C:\>ping 192.168.5.194

Pinging 192.168.5.194 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.194: bytes=32 time=1ms TTL=127
Reply from 192.168.5.194: bytes=32 time<1ms TTL=127
Reply from 192.168.5.194: bytes=32 time<1ms TTL=127

Ping statistics for 192.168.5.194:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms

7.Conclusions:
This lab introduced some applications and uses of Cisco routers that go beyond the
everyday routing of packets and connecting of networks. Some of the tools listed
in this lab do not relate specifically to Cisco routers but instead point out the fact
that networking is more than just routers and networks. Support systems that many
functions of the Internet rely on also need to be troubleshot at times. You should
now be familiar with some of the more readily used and available tools. Hopefully,
some ideas have been generated in your mind for other uses for Cisco routers that
are not mentioned here. In addition to presenting the most readily used and
available troubleshooting tools, this lab also introduced some simple tools

Lab 5:
Title: Configure Legacy Inter-VLAN Routing

Topology

Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R1 Gig0/0/0 192.168.5.1 255.255.255.128 N/A
Gig0/0/1 192.168.5.129 255.255.255.128 N/A

PC2 NIC 192.168.5.10 255.255.255.128 192.168.5.1


PC3 NIC 192.168.5.130 255.255.255.128 192.168.5.129
S1

2.objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Configure Switches with VLANs and Accessing
Part 3: Verify Accessing, VLANs, Routing, and Connectivity

3.introductions

Legacy inter-VLAN routing is seldom used in today’s networks; however, it is


helpful to configure and understand this type of routing before moving on to
router-on-a-stick (trunk-based) inter-VLAN routing or configuring Layer-3
switching. Also, you may encounter per-interface inter-VLAN routing in
organizations with very small networks. One of the benefits of legacy inter-VLAN
routing is ease of configuration. In this lab, you will set up one router with one
switches attached via the router Gigabit Ethernet interfaces. Two separate VLANs
will be configured on the switches, and you will set up routing between the
VLANs.
Note: This lab provides minimal assistance with the actual commands necessary to
configure the router and switches. The required switch VLAN configuration
commands are provided in Appendix A of this lab.

4. Devices

 Cables,
 Erase,
 Switch
 PCs
 Router

5. Methods and producers


x^2=2
x=1,subnetbit.
Host bit=8-1=>7.
No host=2^7=128.
No of subnet=2^1=>2.
192.168.5.0/25
192.168.5.128/25

Part 1: Build the Network


Step 1: Cable the network as shown in the topology.
Step2: Configure PC hosts.
Refer to the Addressing Table for PC host address information.

Step 3: Initialize and reload the router and switches.


Part 2: Configure Switches with VLANs and Accessing
Step 1: Configure VLANs on S1.
 On S1, create VLAN 10. Assign staff as the VLAN name.
 Create VLAN 20. Assign student as the VLAN name
 Assign ports F0/1 and F0/3 to VLAN 10 and configure both F0/1 and F0/3
as access ports.
 Assign ports F0/2 and F0/4 to VLAN 20 and configure both F0/2 and F0/4
as access ports

Step 2:enter ip address on router interface


Router(config)#interface Gig0/0/0
Router(config-if)#ip address 192.168.5.1 255.255.255.128
Router(config)#interface Gig0/0/1
Router(config-if)#ip address 192.168.5.129 255.255.255.128
Router(config-if)#exit

6.Result and Discusion

Pc2 ping to pc3……yes

Pc2: Packet Tracer PC Command Line 1.0


C:\>ping 192.168.5.130

Pinging 192.168.5.130 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.130: bytes=32 time=1ms TTL=127
Reply from 192.168.5.130: bytes=32 time=13ms TTL=127
Reply from 192.168.5.130: bytes=32 time<1ms TTL=127

Ping statistics for 192.168.5.130:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 13ms, Average = 4ms
C:\>

7.Conclusions:
As we learned that each VLAN is usually working on its subnet. Therefore for
traffic between VLAN inter-VLAN routing is required. The Legacy Inter-VLAN
routing is the first solution for traffic between different VLAN. It relies on routers
with multiple physical interfaces. All interface had to be connected to a separate
network and configured with a separate subnet. The legacy inter-VLAN routing
connects different physical router interfaces to different physical ports on the
switch. The switch ports connected to the router must be placed in access mode.

Each physical interface of the router is assigned to a different VLAN and the router
interface then accepts the traffic from the VLAN related with the switch interface it
is connected to. Then the router sends the traffic to other VLANs connected to the
other interfaces.

Lab 6:

1.Title: Configure Router-On-A-Stick

Topology
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/0 192.168.5.1 255.255.255.128 N/A

PC0 NIC 192.168.5.11 255.255.255.128 192.168.5.1


PC1 NIC 192.168.5.135 255.255.255.128 192.168.5.129
S0

2.objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Create VLANs and Assign Switch Ports
Part 3: Configure Inter-VLAN Routing on the Router
Part 4: Verify Inter-VLAN Routing is working

3.introductions
Modern switches use virtual local-area networks (VLANs) to provide segmentation
services traditionally provided by routers in LAN configurations. VLANs address
scalability, security, and network management. In general, VLANs make it easier
to design a network to support the goals of an organization. VLAN trunks are used
to span VLANs across multiple devices. Trunks allow the traffic from multiple
VLANS to travel over a single link, while keeping the VLAN identification and
segmentation intact. A particular kind of inter-VLAN routing, called “Router-On-
A-Stick”, uses a trunk from the router to the switch to enable all VLANs to pass to
the router.In this lab, you will create VLANs on switches in the topology, assign
VLANs to switch access ports, verify that VLANs are working as expected, create
VLAN trunks between S1 and R1, and configure Inter-VLAN routing on R1 to
allow hosts in different VLANs to communicate, regardless of which subnet the
host resides.

4. Devices
 Cables,
 Erase,
 Switch
 PCs
 Router

5. Methods and producers


x^2=2
x=1,subnetbit.
Host bit=8-1=>7.
No host=2^7=128.
No of subnet=2^1=>2.
192.168.5.0/25
192.168.5.128/25

Part 1:Build the Network


Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.
Step 2:Configure PC hosts.
Refer to the Addressing Table for PC host address information.
Part 2:Create VLANs and Assign Switch Ports
Step 1:Create VLANs on switch.
1. Create and name the required VLANs on switch from the table above .

S1(config)# vlan 10
S1(config-vlan)# name student
S1(config-vlan)# vlan 20
S1(config-vlan)# name staff
S1(config-vlan)# exit
S1(config)# interface Fa0/2
S1(config-if)# switchport mode access
S1(config-if)# switchport access vlan 10
S1(config-if)# interface Fa0/3
S1(config-if)# switchport mode access
S1(config-if)# switchport access vlan 20
S1(config-if)# interface Fa0/1
S1(config-if)# switchport mode trunk
Switch1#sh vlan
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/4, Fa0/5, Fa0/6, Fa0/7
Fa0/8, Fa0/9, Fa0/10, Fa0/11
Fa0/12, Fa0/13, Fa0/14, Fa0/15
Fa0/16, Fa0/17, Fa0/18, Fa0/19
Fa0/20, Fa0/21, Fa0/22, Fa0/23
Fa0/24, Gig0/1, Gig0/2
10 student active Fa0/2
20 staff active Fa0/3
1002 fddi-default active
1003 token-ring-default active
1004 fddinet-default active
1005 trnet-default active

VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
--More--

6.Result and Discusion

Pc0 ping to pc1….yes


Pco: Packet Tracer PC Command Line 1.0
C:\>ping 192.168.5.135

Pinging 192.168.5.135 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.135: bytes=32 time=3ms TTL=127
Reply from 192.168.5.135: bytes=32 time=3ms TTL=127
Reply from 192.168.5.135: bytes=32 time<1ms TTL=127

Ping statistics for 192.168.5.135:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 3ms, Average = 2ms

C:\
7.Conclusions:

Router on a stick is a network configuration used to allow the routing of traffic


between different VLANs.
Almost all enterprise networks use VLANs which stands for Virtual Local Area
Network. Each VLAN is a separate subnet and in order to route IP packets in and
out of those VLANs – or more accurately, the subnets that sit on each of those
VLANs – some router needs to have an IP address in each subnet and have a
connected route for each of those subnets. The hosts inside each subnet can then use
the router IP addresses as their default gateways, respectively.

Lab7:
1.Title:static route configuration

Topology:

Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/0 192.168.5.1 255.255.255.224 N/A
Gig0/0/1 192.168.5.33 255.255.255.224 N/A
Se0/1/0 192.168.5.129 255.255.255.224 N/A
R1 Gig0/0/0 192.168.5.65 255.255.255.224 N/A
Gig0/0/1 192.168.5.97 255.255.255.224 N/A
Se0/1/0 192.168.5.130 255.255.255.224 N/A

PC0 NIC 192.168.5.7 255.255.255.224 192.168.5.1

Pc1 NIC 192.168.5.36 255.255.255.224 192.168.5.33

Pc2 NIC 192.168.5.67 255.255.255.224 192.168.5.65

Pc3 NIC 192.168.5.98 255.255.255.224 192.168.5.97

2.objectives

 Cable a network according to the Topology Diagram.


 Erase the startup configuration and reload a router to the default state.
 Perform basic configuration tasks on a router.
 Configure and activate Serial and Ethernet interfaces.
 Test connectivity.

Describe the function of the


routing table
 Describe how a routing
table can contain and use
static route
Describe the function of the
routing table
 Describe how a routing
table can contain and use
static route
Describe the function of the
routing table
 Describe how a routing
table can contain and use
static route
Describe the function of the
routing table
 Describe how a routing
table can contain and use
static route
Describe the function of the
routing table
 Describe how a routing
table can contain and use
static
Routers can learn of remote
networks via static or
dynamic routing. This
activity focuses on how
remote networks are added
to the routing table using
static routes. This is one of
two ways that a
remote network can be
added to the routing table.
Static routes are configured
by the network
administrator and include
the network address and
subnet mask of the remote
network, along with the
IP address of the next-hop
router or the exit interface
of the local route
Routers can learn of remote
networks via static or
dynamic routing. This
activity focuses on how
remote networks are added
to the routing table using
static routes. This is one of
two ways that a
remote network can be
added to the routing table.
Static routes are configured
by the network
administrator and include
the network address and
subnet mask of the remote
network, along with the
IP address of the next-hop
router or the exit interface
of the local route
3.introductions

In this lab activity, you will create a network that is similar to the one shown in the
Topology Diagram. Begin by cabling the network as shown in the Topology
Diagram. You will then perform the initial router configurations required for
connectivity. Use the IP addresses that are provided in the Addressing Table to
apply an addressing scheme to the network devices. After completing the basic
configuration, test connectivity between the devices on the network. First test the
connections between directly connected devices, and then test connectivity
between devices that are not directly connected. Static routes must be configured
on the routers for end-to-end communication to take place between the network
hosts. You will configure the static routes that are needed to allow communication
between the hosts. View the routing table after each static route is added to observe
how the routing table has changed.

4.Devices

 Cables,
 Erase,
 Switches
 PCs
 Routers

5. Methods and producers


x^2=5
x=3,subnetbit.
Host bit=8-3=>5.
No host=2^5=32.
No of subnet=2^3=>8.
192.168.5.0/27
192.168.5.32/27
192.168.5.64/27
192.168.5.96/27
192.168.5.128/27

Part 1:Build the Network


Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.
Step 2:Configure PC hosts.
Refer to the Addressing Table for PC host address information.
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 192.168.5.1 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 192.168.5.33 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip address 192.168.5.129 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#ip route 192.168.5.64 255.255.255.224 192.168.5.130
Router(config)#
Router(config)#ip route 192.168.5.96 255.255.255.224 192.168.5.130
Router(config)#

Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 192.168.5.65 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 192.168.5.97 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip address 192.168.5.130 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#ip route 192.168.5.0 255.255.255.224 192.168.5.129
Router(config)#ip route 192.168.5.32 255.255.255.224 192.168.5.129
Router(config)#

6.Result and Discusion

Check connectivity
Pc0 to pc1……yes
Pc1 to pc2……yes
Pc2 to pc3……yes

Pc0: Packet Tracer PC Command Line 1.0


C:\>ping 192.168.5.67

Pinging 192.168.5.67 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.67: bytes=32 time=11ms TTL=126
Reply from 192.168.5.67: bytes=32 time=9ms TTL=126
Reply from 192.168.5.67: bytes=32 time=2ms TTL=126

Ping statistics for 192.168.5.67:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 2ms, Maximum = 11ms, Average = 7ms

C:\>ping 192.168.5.98

Pinging 192.168.5.98 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.98: bytes=32 time=1ms TTL=126
Reply from 192.168.5.98: bytes=32 time=15ms TTL=126
Reply from 192.168.5.98: bytes=32 time=16ms TTL=126

Ping statistics for 192.168.5.98:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 16ms, Average = 10ms

C:\>

7.Conclusions:
When you compare static routing with other types of the path, it offers your proper
security because in static routing, only the network administrator may change the
routing table, and it also reduces the routing traffic load when used in the stub
network link.
Static routing have:

 Static routing can be used to define an exit point from a router when no other
routes are available or necessary. This is called a default route.
 Static routing can be used for small networks that require only one or two
routes. This is often more efficient since a link is not being wasted by
exchanging dynamic routing information.
 Static routing is often used as a complement to dynamic routing to provide a
failsafe backup if a dynamic route is unavailable.
 Static routing is often used to help transfer routing information from one
routing protocol to another (routing redistribution).

Lab 8:
1.Title: Dynamic route configuration

Topology:

Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/0 192.168.5.1 255.255.255.224 N/A
Gig0/0/1 192.168.5.33 255.255.255.224 N/A
Se0/1/0 192.168.5.129 255.255.255.224 N/A

R1 Gig0/0/0 192.168.5.65 255.255.255.224 N/A


Gig0/0/1 192.168.5.97 255.255.255.224 N/A
Se0/1/0 192.168.5.130 255.255.255.224 N/A

PC0 NIC 192.168.5.13 255.255.255.224 192.168.5.1

Pc1 NIC 192.168.5.37 255.255.255.224 192.168.5.33

Pc2 NIC 192.168.5.69 255.255.255.224 192.168.5.65

Pc3 NIC 192.168.5.99 255.255.255.224 192.168.5.97

2.objectives
 Cable a network according to the Topology Diagram.
 Erase the startup configuration and reload a router to the default state.
 Perform basic configuration tasks on a router.
 Configure and activate Serial and Ethernet interfaces.
 Test connectivity.

3.Introduction
Dynamic routing protocols have evolved over several years to meet the
demands of changing network requirements. Although many organizations
have migrated to more recent routing protocols such as Enhanced Interior
Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF),
many of the earlier routing protocols, such as Routing Information
Protocol (RIP), are still in use today.

4.Devices

 Cables,
 Erase,
 Switches
 PCs
 Routers

5. Methods and producers


x^2=5
x=3,subnetbit.
Host bit=8-3=>5.
No host=2^5=32.
No of subnet=2^3=>8.
192.168.5.0/27
192.168.5.32/27
192.168.5.64/27
192.168.5.96/27
192.168.5.128/27

Part 1:Build the Network


Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.
Step 2:Configure PC hosts.
Refer to the Addressing Table for PC host address information
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 192.168.5.1 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 192.168.5.33 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip address 192.168.5.129 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit

Router(config)#router rip
Router(config-router)#network 192.168.5.0
Router(config-router)#network 192.168.5.32
Router(config-router)#network 192.168.5.128
Router(config-router)#end

Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 192.168.5.65 255.255.255.224
Router(config-if)#no shutdown

Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 192.168.5.97 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip address 192.168.5.130 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit

Router(config-router)#router rip
Router(config-router)#network 192.168.5.64
Router(config-router)#network 192.168.5.96
Router(config-router)#network 192.168.5.128
Router(config-router)#end

6.Result and Discusion

Check connectivity
Pc0 to pc1……yes
Pc1 to pc2……yes
Pc2 to pc3……yes
Pc0: Pinging 192.168.5.69 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.69: bytes=32 time=2ms TTL=126
Reply from 192.168.5.69: bytes=32 time=5ms TTL=126
Reply from 192.168.5.69: bytes=32 time=11ms TTL=126

Ping statistics for 192.168.5.69:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 2ms, Maximum = 11ms, Average = 6ms

C:\>ping 192.168.5.99

Pinging 192.168.5.99 with 32 bytes of data:


Request timed out.
Reply from 192.168.5.99: bytes=32 time=13ms TTL=126
Reply from 192.168.5.99: bytes=32 time=12ms TTL=126
Reply from 192.168.5.99: bytes=32 time=12ms TTL=126

Ping statistics for 192.168.5.99:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 12ms, Maximum = 13ms, Average = 12ms

C:\>

7.Conclusions:

Conclusion : In Lab 8, we executed, and learnt about Routing Information


Protocol, i.e. RIP version 2.Activity was a packet tracer activity in which
we configured two routers and then tested the configuration through
pinging across the network to each & every device and viewed all the
routing tables of R0 and R1. was a hands experience in which, we
configured basic settings for all the two routes, and PC’s IP Address. Then
we verified the connections through pinging.

Lab 9:
1.Title:both Dynamic and Static route configurations

Topology
Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/1 192.168.5.1 255.255.255.224 N/A
Gig0/0/0 192.168.5.33 255.255.255.224 N/A
Se0/1/0 192.168.5.129 255.255.255.224 N/A

R1 Gig0/0/1 192.168.5.65 255.255.255.224 N/A


Gig0/0/0 192.168.5.97 255.255.255.224 N/A
Se0/1/0 192.168.5.130 255.255.255.224 N/A

PC0 NIC 192.168.5.14 255.255.255.224 192.168.5.1

Pc1 NIC 192.168.5.40 255.255.255.224 192.168.5.33

Pc2 NIC 192.168.5.70 255.255.255.224 192.168.5.65

Pc3 NIC 192.168.5.100 255.255.255.224 192.168.5.97

2.Objectives

 Cable a network according to the Topology Diagram.


 Erase the startup configuration and reload a router to the default state.
 Perform basic configuration tasks on a router.
 Configure and activate Serial and Ethernet interfaces.
 Test connectivity.

3.introduction
Static routing and dynamic routing are two methods used to determine how to send
a packet toward its destination.

Static routes are configured in advance of any network communication. Dynamic


routing, on the other hand, requires routers to exchange information with other
routers to learn about paths through the network. Static and dynamic routing are
used where appropriate, and some networks use both.

4.Devices

 Cables,
 Erase,
 Switches
 PCs
 Routers
5. Methods and producers
x^2=5
x=3,subnetbit.
Host bit=8-3=>5.
No host=2^5=32.
No of subnet=2^3=>8.
192.168.5.0/27
192.168.5.32/27
192.168.5.64/27
192.168.5.96/27
192.168.5.128/27

Part 1:Build the Network


Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as
necessary.
Step 2:Configure PC hosts Refer to the Addressing Table for PC host
address information
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 192.168.5.1 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 192.168.5.33 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip address 192.168.5.129 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#ip route 192.168.5.64 255.255.255.224 192.168.5.130
Router(config)#ip route 192.168.5.96 255.255.255.224 192.168.5.130
Router(config)#router rip
Router(config-router)#network 192.168.5.0
Router(config-router)#network 192.168.5.32
Router(config-router)#network 192.168.5.128
Router(config-router)#end
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0/0
Router(config-if)#ip address 192.168.5.97 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0/1
Router(config-if)#ip address 192.168.5.65 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial0/1/0
Router(config-if)#ip address 192.168.5.130 255.255.255.224
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#ip route 192.168.5.0 255.255.255.224 192.168.5.129
Router(config)#ip route 192.168.5.32 255.255.255.224 192.168.5.129
Router(config-router)#router rip
Router(config-router)#network 192.168.5.64
Router(config-router)#network 192.168.5.96
Router(config-router)#network 192.168.5.128
Router(config-router)#end

6.Result and Discusion

Check connectivity
Pc0 to pc1……yes
Pc1 to pc2……yes
Pc2 to pc3……yes
Pc0: Packet Tracer PC Command Line 1.0
C:\>ping 192.168.5.70

Pinging 192.168.5.70 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.70: bytes=32 time=11ms TTL=126
Reply from 192.168.5.70: bytes=32 time=12ms TTL=126
Reply from 192.168.5.70: bytes=32 time=13ms TTL=126

Ping statistics for 192.168.5.70:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 11ms, Maximum = 13ms, Average = 12ms

C:\>ping 192.168.5.100

Pinging 192.168.5.100 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.100: bytes=32 time=12ms TTL=126
Reply from 192.168.5.100: bytes=32 time=13ms TTL=126
Reply from 192.168.5.100: bytes=32 time=4ms TTL=126

Ping statistics for 192.168.5.100:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 4ms, Maximum = 13ms, Average = 9ms

C:\>

7.Conclusion
In brief, routing is the process of sending data from the source to the destination.
Here, data is sent through the most optimal path from the sending device to the
receiving device. There are two types of routing: static and dynamic routing. The
main difference between static and dynamic routing is that, in static routing, the
administrator manually enters the routes in the routing table, while in dynamic
routing, the routes are found automatically according to the changes in the
network.

Lab10:
1.Title: Basic OSPF Configuration Lab

Topology:

Addressing Table
Device Interface Ip Address Subnet mask Default Get
way
R0 Gig0/0/0 192.168.5.1 255.255.255.224 N/A
Se0/1/1 192.168.5.33 255.255.255.224 N/A
Se0/1/0 192.168.5.129 255.255.255.224 N/A

R1 Gig0/0/0 192.168.5.97 255.255.255.224 N/A


Se0/1/1 192.168.5.67 255.255.255.224 N/A
Se0/1/0 192.168.5.130 255.255.255.224 N/A

R2 Se0/1/1 192.168.5.34 255.255.255.224 N/A


Se0/1/0 192.168.5.65 255.255.255.224 N/A

Pc0 NIC 192.168.5.23 255.255.255.224 192.168.5.1

Pc1 NIC 192.168.5.104 255.255.255.224 192.168.5.97


2.objectives

Cable the network as shown in the topology.


Configure basic IP addressing for routers and PCs.
Configure OSPF routing.
Configure PC hosts.
Verify connectivity between hosts and routers.
3.Introduction
The router is a critical component in any network. It controls the movement
of data into and out of the network and between devices within the network.
It is particularly important to protect network routers because the failure of
a routing device could make sections of the
network, or the entire network, inaccessible. Controlling access
to routers and enabling reporting on routers is critical to network security
and should be part of a comprehensive security policy
4.Devices

 Cables,
 Erase,
 Switches
 PCs
 Routers

5. Methods and producers


x^2=5
x=3,subnetbit.
Host bit=8-3=>5.
No host=2^5=32.
No of subnet=2^3=>8.
192.168.5.0/27
192.168.5.32/27
192.168.5.64/27
192.168.5.96/27
192.168.5.128/27
Part 1:Build the Network
Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as
necessary.
Step 2: Configure Ethernet interfaces of PC0, PC1 Configure the Ethernet
interfaces of PC0, PC1 with the IP addresses and default gateways from the
table under the Topology Diagram.
Step 3:Configure basic settings for each router.
Router0(config)#interface GigabitEthernet0/0/0
Router0(config-if)#ip address 192.168.5.1 255.255.255.224
Router0(config-if)#no shutdown
Route0(config-if)#exit
Router0(config)#interface Serial0/1/1
Router0(config-if)#ip address 192.168.5.33 255.255.255.224
Router0(config-if)#no shutdown
Router0(config-if)#exit
Router0(config)#interface Serial0/1/0
Router0(config-if)#ip address 192.168.5.129 255.255.255.224
Router(config-if)#no shutdown
Router1(config)#interface Serial0/1/1
Router1(config-if)#ip address 192.168.5.34 255.255.255.224
Router1(config-if)#no shutdown
Router1(config-if)#exit
Router1(config)#interface Serial0/1/0
Router1(config-if)#ip address 192.168.5.65 255.255.255.224
Router1(config-if)#no shutdown
Router2(config)#interface Serial0/1/0
Router2(config-if)#ip address 192.168.5.130 255.255.255.224
Router2(config-if)#no shutdown

Router2(config-if)#exit
Router2(config)#interface Serial0/1/1
Router2(config-if)#ip address 192.168.5.66 255.255.255.224
Router2(config-if)#no shutdown

Step 4:Configure OSPF routing on the routers.


Router0(config)#router ospf 1
Router0(config-router)#network 192.168.5.0 0.0.0.255 Area 0
Router0(config-router)#network 192.168.5.32 0.0.0.255 Area 0
Router0(config-router)#network 192.168.5.128 0.0.0.255 Area 0
Router0(config-router)#end
Router1(config)#router ospf 3
Router1(config-router)#network 192.168.5.128 0.0.0.255 area 0
Router1(config-router)#network 192.168.5.96 0.0.0.255 area 0
Router1(config-router)#network 192.168.5.64 0.0.0.255 area 0
Router1(config-router)#end

Router(config)#router ospf 2
Router(config-router)#network 192.168.5.32 0.0.0.255 area 0
Router(config-router)#network 192.168.5.64 0.0.0.255 area 0
Router(config-router)#

6.Result and Discusion


Pc0 ping to pc1….yes
Packet Tracer PC Command Line 1.0
C:\>ping 192.168.5.104

Pinging 192.168.5.104 with 32 bytes of data:

Reply from 192.168.5.104: bytes=32 time=1ms TTL=126


Reply from 192.168.5.104: bytes=32 time=11ms TTL=126
Reply from 192.168.5.104: bytes=32 time=12ms TTL=126
Reply from 192.168.5.104: bytes=32 time=13ms TTL=126

Ping statistics for 192.168.5.104:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 13ms, Average = 9ms

C:\>

7.Conclusion
OSPF is a Link State Routing Protocol
• Quick and simple to get started – But has a myriad of options and features
to cover almost all types of network topology – ISPs keep their OSPF
design SIMPLE
Lab11:
1.Title: Basic EIGRP Configuration Lab
Topology:

2.Objectives
• Cable a network according to the Topology Diagram.
•Erase the startup configuration and reload a router to the default state.
•Perform basic configuration tasks on a router.
•Configure and activate interfaces.
• Configure EIGRP routing on all routers.
• Verify EIGRP routing using show commands.
3.introduction
EIGRP routers will start sending hello packets to other routers just like
OSPF does, if you send hello packets and you receive them you will
become neighbors. EIGRP neighbors will exchange routing information
which will be saved in the topology table. The best path from the topology
table will be copied in the routing table.
4.Devices

 Cables,
 Erase,
 Switches
 PCs
 Routers
5. Methods and producers
x^2=5
x=3,subnetbit.
Host bit=8-3=>5.
No host=2^5=32.
No of subnet=2^3=>8.
192.168.5.0/27
192.168.5.32/27
192.168.5.64/27
192.168.5.96/27
192.168.5.128/27
Part 1:Build the Network
Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as
necessary.
part 2: Configure and Activate Serial and Ethernet Addresses.
1: Configure the interfaces on the R0, R1, and R2 routers.
Configure the interfaces on the R1, R2, and R3 routers with the IP addresses from t
he table under the Topology Diagram.
2: Verify IP addressing and interfaces.
Use the show ip interface brief command to verify that the IP addressing is correct
and that the interfaces are active.
3: Configure Ethernet interfaces of PC0, PC1, and PC2.
Configure the Ethernet interfaces of PC0, PC1, and PC2 with the IP addresses and
default gateways from the table under the Topology Diagram.
4: Configure EIGRP on the R1 Router.
Router0(config)#router eigrp 10
Router0(config-router)#network 192.168.5.96 255.255.255.224
Router0(config-router)#network 192.168.5.0 255.255.255.224
Router0(config-router)#exit
Router0(config)#end
Router0(config)#router eigrp 10
Router0(config-router)#network 192.168.5.96 255.255.255.224

Router0(config-router)#network 192.168.5.32 255.255.255.224


Router0(config-router)#network 192.168.5.128 255.255.255.224
Router0(config-router)#exit
Router(config)#router eigrp 10
Router(config-router)#network 192.168.5.128 255.255.255.224
Router(config-router)#
Router(config-router)#network 192.168.5.64 255.255.255.224
Router(config-router)#exit
6.Result and Discusion
All pcs are ping each other
Packet Tracer PC Command Line 1.0
C:\>ping 192.168.5.41

Pinging 192.168.5.41 with 32 bytes of data:

Reply from 192.168.5.41: bytes=32 time=10ms TTL=126


Reply from 192.168.5.41: bytes=32 time=15ms TTL=126
Reply from 192.168.5.41: bytes=32 time=4ms TTL=126
Reply from 192.168.5.41: bytes=32 time=11ms TTL=126

Ping statistics for 192.168.5.41:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 4ms, Maximum = 15ms, Average = 10ms

C:\>ping 192.168.5.71

Pinging 192.168.5.71 with 32 bytes of data:

Request timed out.


Reply from 192.168.5.71: bytes=32 time=2ms TTL=125
Reply from 192.168.5.71: bytes=32 time=2ms TTL=125
Reply from 192.168.5.71: bytes=32 time=11ms TTL=125

Ping statistics for 192.168.5.71:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 2ms, Maximum = 11ms, Average = 5ms

C:\>

You might also like