KEMBAR78
Network Security Report | PDF | Router (Computing) | Computer Network
0% found this document useful (0 votes)
169 views33 pages

Network Security Report

this report provides information on network security and the projects done using Cisco packet tracer

Uploaded by

voxono5581
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
169 views33 pages

Network Security Report

this report provides information on network security and the projects done using Cisco packet tracer

Uploaded by

voxono5581
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 33

EAST WEST INSTITUTE OF TECHNOLOGY

EWIT-SRI RAVIKIRAN CENTRE OF


EXCELLENCE PROGRAM
NETWORK SECURITY

Department of Electronics & Communication Engineering


(NAAC Accredited)
2023-2024

REPORT ON: NETWORK SECURITY


MENTOR: Mr Srinivas

SEMESTER:6TH SEM
SUBMITTED BY:
Abhiram S A(1EW21EC002)
Shreya H J (1EW21EC120)
Suravi R (1EW21EC130)
Nagan Gowda ( 1EW21EC084)
INTRODUCTION OF NETWORK SECURITY
Network Security is the practice of protecting systems, networks, and
programs from digital attacks. These Networkattacks are usually aimed
at accessing, changing, or destroying sensitive information; extorting
money from users via ransomware; or interrupting normal business
processes.

WHY THE NETWORK SECURITY IS IMPORTANT?


Networksecurity is important because it protects organizational assets and services
from malicious attacks and safeguards all types of data, including but not limited to
sensitive data, protected health information (PHI), and personally identifiable
information (PII) from theft and loss.
Why is Networksecurity Important? Networksecurity is essential for protecting our
digital assets, including sensitive personal and financial information, intellectual
property, and critical infrastructure. Networkattacks can have serious
consequences, including financial loss, reputational damage, and even physical
harm.
Network security is how individuals and organisations reduce the risk of Network.
Network security's core function is to protect the devices we all use
(smartphones, laptops, tablets and computers), and the services we access - both
online and at work - from theft or damage.
Here are eight reasons why Network security is important:
 To Protect Your Data.
 To Defend Against Reputation Damage.
 To Prevent Business Disruptions.
 To Protect Your Employees.
 To Stay Compliant Regulations.
 To Safeguard Your Intellectual Property.
 To Prevent Identity Theft.
 To Protect Your Finances.
Networksecurity is important because it protects all categories of data from theft
and damage. This includes sensitive data, personally identifiable information (PII),
protected health information (PHI), personal information, intellectual property,
data, and governmental and industry information systems.
Job flexibility and highly transferable skills. These skills allow you to move
anywhere in the world and apply to any industry sector. Multiple career options
that are not just technical. Business, medical, law, and intelligence all need workers
skilled in Networksecurity.
Networksecurity is important because it protects organizational assets and services
from malicious attacks and safeguards all types of data, including but not limited to
sensitive data, protected health information (PHI), and personally identifiable
information (PII) from theft and loss.
Network security is the practice of defending computers, servers, mobile devices,
electronic systems, networks, and data from malicious attacks. It's also known as
information technology security or electronic information security.
The consequences of data breaches or other incidents can be huge, so being able to
step in and shield people and organisations from these is hugely rewarding. As
such, it's no surprise that Network security professionals report some of the highest
levels of job satisfaction in any IT role. programs teach you how to protect
computer operating systems, networks. You'll learn how to monitor systems and
mitigate threats when they happen. This is an oversimplification of IT security
degrees' curricula.
Bob Thomas
Bob Thomas, the father of Networksecurity, was a pioneer in the Networksecurity
industry. His contributions to the industry have helped to prevent Network-attacks
and protect businesses and individuals from potential threats
In today's digital age, Networksecurity is critical. It encompasses the strategies and
measures put in place to safeguard not only our computers and networks but also
the invaluable data they house. This all-encompassing shield defends against
unauthorized access and threats lurking in the vast digital landscape.
Networksecurity professionals make a significant contribution to the well-being of
the organizations in which they work. These professionals are knowledgeable,
people-oriented and understand the importance of securing information and
technological systems in the workplace.
Network security refers to every aspect of protecting an organization and its
employees and assets against Network threats. As Networkattacks become more
common and sophisticated and corporate networks grow more complex, a variety
of Network security solutions are required to mitigate corporate Network risk.
The three goals of Networksecurity —
1. Confidentiality
2. Integrity
3. Availability
These are essential to any comprehensive Networksecurity strategy. They ensure
data is protected from threats, accurate, and accessible to authorized users.
Networkcrime is becoming big business and Network risk a focus of organizations
and governments globally. Monetary and reputational risks are high if
organizations don't have an appropriate Networksecurity plan. Networksecurity and
data breaches continue to be on the rise and impact organizations of all sizes and
sectors.
Conclusion: The three goals of Networksecurity — Confidentiality, Integrity, and
Availability — form the cornerstone of any robust Networksecurity strategy. They
work in harmony to protect data from threats, ensure its accuracy, and make it
accessible to those who need it.
PROJECT : N MAP[ZEN MAP]
Zen map is the graphical user interface (GUI) for Nmap, designed to make network
scanning more accessible and user-friendly. To use Zen map effectively, you need
to consider the following components and follow a specific procedure:
Objective:
1. Zen map Installation:
- Ensure that Nmap is installed on your system because Zen map relies on it. You
can download both from the [Nmap website ](https://nmap.org/download.html).
2. Network Information:
- Know the IP addresses or ranges of the networks you want to scan.
3. Permissions:
- Ensure you have the necessary permissions to scan the network or system, as
unauthorized scanning can be illegal and unethical.
Procedure:
1. Install Zen map:
- Download and install Zen map from the official Nmap website or your system’s
package manager.
2. Launch Zen map:
- Open Zen map from your applications menu or by running zen map from the
command line.
3. Enter Scan Details:
- Target: Input the IP address or range of IPs you want to scan in the “Target”
field.
- Profile: Choose or create a scan profile from the dropdown menu. Profiles
determine the type of scan and options used, such as Quick Scan, Intense Scan, etc.
4. Customize Scan Options:
- If needed, modify the scan options in the “Command” field. You can add Nmap
options manually or use the predefined profiles.
5. Start the Scan:
- Click the “Scan” button to begin scanning. Zen map will execute the scan and
display progress.
6. View Results:- Review the scan results in the “Nmap Output” tab. Results
include information about open ports, detected services, and other details.
7. Save and Export Results:
- Save your scan results for future reference by using the “Save” or “Export”
options.
8. Analyze and Interpret Data:
- Review the data to identify potential security issues or configuration problems.
Utilize the results for further security assessments or network management tasks.
By following this procedure, you can leverage Zen map to perform effective
network scans and analyze network security.
PROJECT: JCRYPT TOOL

J Crypt is a Java-based library used for cryptographic operations. It provides various


cryptographic functions, including encryption, decryption, hashing, and key generation. Here's
an overview of the objectives, components, and steps involved in using JCrypt:

Objectives:
1. Perform Cryptographic Operation: Utilize JCrypt for tasks such as encrypting and decrypting
data, generating cryptographic keys, and creating hash functions.
2. Secure Data: Ensure data confidentiality and integrity using encryption and hashing
algorithms.
3. Integrate with Java Applications:Use J Crypt within Java applications to enhance security
features.
Components Needed:
1. Java Development Kit (JDK): The JDK is required to compile and run Java applications
using J Crypt.
2. J Crypt Library: The J Crypt library itself, which provides the cryptographic functionalities.
3. Cryptographic Algorithms: Knowledge of the specific algorithms supported by J Crypt (e.g.,
AES, RSA, SHA-256).
4. Development Environment: An IDE or text editor to write and test Java code.

Steps to Use J Crypt:


1. Set Up the Development Environment:
- Install the JDK if not already installed.
- Download the J Crypt library and include it in your project's class path.
2. Import J Crypt Library:
- Add the necessary import statements to your Java code to use J Crypt's cryptographic
functions.
Java
3. Initialize J Crypt:
- Set up the J Crypt object or class for the specific cryptographic operation you intend to
perform (e.g., encryption, decryption).
4. Perform Cryptographic Operations:
-Encryption/Decryption: Use the library's methods to encrypt or decrypt data.
Java
J Crypt jcrypt = new J Crypt();
String encryptedData = jcrypt.encrypt("your plaintext data", "your encryption key");
String decryptedData = jcrypt.decrypt(encryptedData, "your decryption key");
- Hashing: Generate hashes for data integrity checks.
java
String hash = jcrypt.hash("your data to hash");
5. Handle Keys and Configuration:
- Generate or manage cryptographic keys as needed.
- Ensure that keys and configurations are handled securely.
6. Test and Validate:
- Test your implementation to ensure that cryptographic operations are working correctly and
securely.
7. Integrate and Deploy:
- Integrate the J Crypt functionalities into your Java application.
- Deploy the application and ensure that it adheres to security best practices.
If you're referring to a different "J Crypt" or need specific details, please provide more context.

ENCRYPTION :
DECRYPTION :
PROJECT: ROOT KIT (MALWARE BYTE)
Objectives:
1. Gain Unauthorized Access: The primary goal is to obtain and maintain
privileged access to a system without the user’s knowledge.
2. Hide Presence: Ensure that the rootkit remains undetected by users and security
software.
3. Maintain Control: Allow the attacker to perform various actions, such as data
exfiltration, monitoring, or manipulation.

Components Needed:
1. Exploitation Tools: Software or scripts that exploit vulnerabilities to gain initial
access to the target system.
2. Kernel Modules: Code that integrates with the operating system's kernel to
manipulate system calls or processes.
3. Stealth Techniques: Methods for hiding the rootkit's presence, such as file
hiding or process injection.
4. Command and Control Mechanism: Methods for remote control and
communication with the compromised system.

Steps to Create a Rootkit:


1. Identify Target System: Determine the operating system and its version to tailor
the rootkit for effective operation.
2. Exploit Vulnerabilities: Use known vulnerabilities in the system to gain initial
access. This could be through software exploits, social engineering, or other
methods.
3. Develop Rootkit Components:
- Kernel Module: Create or modify kernel modules to gain higher privileges and
manipulate system functions.
- User-space Component: Develop tools or scripts that interact with the user
space to maintain control.
4. Implement Stealth Techniques:
- File Hiding: Modify file system behaviour to hide rootkit files.
- Process Injection: Inject code into legitimate processes to avoid detection.
- System Call Hooking: Intercept system calls to alter or suppress the reporting
of suspicious activities.
5. Test and Deploy: Ensure the rootkit operate as intended by testing it in a
controlled environment before deploying it in the target system.
6. Maintain Access: Implement mechanisms to ensure persistent access, such as
creating backdoors or utilizing existing vulnerabilities.
Project : Basic Switch Setup

Theory:
In networking, a switch is a device that connects devices within a local area
network (LAN) and uses MAC addresses to forward data to the correct
destination. Unlike hubs, which broadcast data to all devices, switches
intelligently direct data to the intended recipient, improving network efficiency
and security. Switches operate at the data link layer (Layer 2) of the OSI model
and can also operate at the network layer (Layer 3) in more advanced
configurations.
Components Involved:
1. Switch: Central device for directing data traffic efficiently.
2. PCs (Personal Computers): Standard desktop computers connected to the
network.
3. Laptops: Portable computers connected to the network.
4. Ethernet Cables: Used to connect PCs, laptops, and the switch.

Procedure:
Step 1: Setting Up the Workspace
1. Open Cisco Packet Tracer.
2. Create a New Project by clicking on "File" and then "New".
Step 2: Adding Devices
1. Add Switch:
o From the device-type selection box, click on “Switch”.
o Drag a switch onto the workspace (e.g., Switch0).
2. Add PCs:
o Click on the “End Devices” icon.
o Select the “PC” device and drag two PCs onto the workspace.
3. Add Laptops:
o Click on the “End Devices” icon.
o Select the “Laptop” device and drag two laptops onto the workspace.
Step 3: Connecting Devices
1. Select the Connection Tool:
o Click on the “Connections” icon (the lightning bolt).
2. Connect the First PC to the Switch:
o Click on the first PC, select the “FastEthernet0” port.
o Click on the switch, select “FastEthernet0/1”.
3. Connect the Second PC to the Switch:
o Click on the second PC, select the “FastEthernet0” port.
o Click on the switch, select “FastEthernet0/2”.
4. Connect the First Laptop to the Switch:
o Click on the first laptop, select the “FastEthernet0” port.
o Click on the switch, select “FastEthernet0/3”.
5. Connect the Second Laptop to the Switch:
o Click on the second laptop, select the “FastEthernet0” port.
o Click on the switch, select “FastEthernet0/4”.
Step 4: Configuring IP Addresses
1. Assign IP Addresses to PCs and Laptops:
o Click on the first PC, go to the “Desktop” tab, and click on “IP
Configuration”. Assign an IP address (e.g., 192.168.1.2) and subnet
mask (e.g., 255.255.255.0).
o Repeat the process for the second PC (e.g., 192.168.1.3) and both
laptops (e.g., 192.168.1.4 and 192.168.1.5).
Step 5: Testing the Network
1. Test Connectivity:
o Click on the first PC, go to the “Desktop” tab, and open the
“Command Prompt”.
o Type ping 192.168.1.3 to test the connection to the second PC.
o Similarly, ping the IP addresses of the laptops (192.168.1.4 and
192.168.1.5) to ensure they are reachable.
o Repeat this process from each device to confirm full connectivity
across the network.
Project : Basic Hub Setup

In computer networking, a hub is a basic networking device that connects


multiple Ethernet devices, making them act as a single network segment. When a
hub receives a packet of data from one device, it broadcasts the packet to all other
devices on the network. Hubs operate at the physical layer (Layer 1) of the OSI
model and are typically used in small, simple networks due to their limited
functionality compared to switches.
Components Involved:
1. Hub: Acts as a central connection point for the network.
2. PCs (Personal Computers): Standard desktop computers that connect to the
network.
3. Laptops: Portable computers that connect to the network.
4. Ethernet Cables: Used to connect PCs, laptops, and the hub.

Procedure:
Step 1: Setting Up the Workspace
1. Open Cisco Packet Tracer.
2. Create a New Project by clicking on "File" and then "New".
Step 2: Adding Devices
1. Add Hub:
o From the device-type selection box, click on “Hub”.
o Drag the hub onto the workspace.
2. Add PCs:
o Click on the “End Devices” icon.
o Select the “PC” device and drag two PCs onto the workspace.
3. Add Laptops:
o Click on the “End Devices” icon.
o Select the “Laptop” device and drag two laptops onto the workspace.
Step 3: Connecting Devices
1. Select the Connection Tool:
o Click on the “Connections” icon (the lightning bolt).
2. Connect the First PC to the Hub:
o Click on the first PC, select the “FastEthernet0” port.
o Click on the hub, select “Port 0”.
3. Connect the Second PC to the Hub:
o Click on the second PC, select the “FastEthernet0” port.
o Click on the hub, select “Port 1”.
4. Connect the First Laptop to the Hub:
o Click on the first laptop, select the “FastEthernet0” port.
o Click on the hub, select “Port 2”.
5. Connect the Second Laptop to the Hub:
o Click on the second laptop, select the “FastEthernet0” port.
o Click on the hub, select “Port 3”.
Step 4: Configuring IP Addresses
1. Assign IP Addresses to PCs and Laptops:
o Click on the first PC, go to the “Desktop” tab, and click on “IP
Configuration”. Assign an IP address (e.g., 192.168.1.2) and subnet mask (e.g.,
255.255.255.0).
o Repeat the process for the second PC (e.g., 192.168.1.3) and both laptops
(e.g., 192.168.1.4 and 192.168.1.5).
Step 5: Testing the Network
1. Test Connectivity:
o Click on the first PC, go to the “Desktop” tab, and open the “Command
Prompt”.
o Type ping 192.168.1.3 to test the connection to the second PC.
o Similarly, ping the IP addresses of the laptops (192.168.1.4 and 192.168.1.5)
to ensure they are reachable.

Project : Basic Router Setup

Theory
In computer networking, a router is a device that forwards data packets between
computer networks. Routers perform the traffic directing functions on the
Internet. A data packet is typically forwarded from one router to another router
through the networks that constitute an internetwork until it reaches its
destination node. Routers operate at the network layer (Layer 3) of the OSI model
and use IP addresses to determine the best path for forwarding packets.
Components Involved:
1. Router: Directs traffic within a network and between different networks.
2. PCs (Personal Computers): Standard desktop computers that connect to the
network.
3. Switch: Connects multiple devices within the same network.
4. Ethernet Cables: Used to connect PCs, switches, and routers.

Procedure
Step 1: Setting Up the Workspace
1. Open Cisco Packet Tracer.
2. Create a New Project by clicking on "File" and then "New".
Step 2: Adding Devices
1. Add Router:
o From the device-type selection box, click on “Router”.
o Drag the router onto the workspace.
2. Add Switch:
o Click on the “Switches” icon.
o Select a switch and drag it onto the workspace.
3. Add PCs:
o Click on the “End Devices” icon.
o Select the “PC” device and drag two PCs onto the workspace.
Step 3: Connecting Devices
1. Select the Connection Tool:
o Click on the “Connections” icon (the lightning bolt).
2. Connect the Router to the Switch:
o Click on the router, select the “GigabitEthernet0/0” port.
o Click on the switch, select any port (e.g., “FastEthernet0/1”).
3. Connect the PCs to the Switch:
o Click on the first PC, select the “FastEthernet0” port.
o Click on the switch, select an available port (e.g., “FastEthernet0/2”).
o Repeat for the second PC, connecting it to another port on the switch
(e.g., “FastEthernet0/3”).
Step 4: Configuring IP Addresses
1. Assign IP Addresses to PCs:
o Click on the first PC, go to the “Desktop” tab, and click on “IP
Configuration”. Assign an IP address (e.g., 192.168.1.2) and subnet
mask (e.g., 255.255.255.0).
o Repeat the process for the second PC (e.g., 192.168.1.3).
2. Configure the Router:
o Click on the router, go to the “CLI” tab.
o Enter the following commands to configure the IP address for the
router’s interface:
arduino
Copy code
Router> enable
Router# configure terminal
Router(config)# interface GigabitEthernet0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# exit
Router# write memory
Step 5: Testing the Network
1. Test Connectivity:
o Click on the first PC, go to the “Desktop” tab, and open the
“Command Prompt”.
o Type ping 192.168.1.1 to test the connection to the router.
Project: Basic HTTP Server and DNS Server Setup
Objective:
1. Set up a network with a DNS server, an HTTP server, and a client PC.
2. Configure IP addressing and DNS services.
3. Ensure that the client PC can resolve the HTTP server’s hostname and access
the web
Components Needed:
 2 Router
 2 Switch
 1 DNS Server (with DNS service configured)
 1 HTTP Server (Web Server)
 3 PC
 Appropriate cables (Ethernet)
Steps:
1. Launch Cisco Packet Tracer: Open Cisco Packet Tracer on your computer.
2. Add Devices:
o Drag and drop 1 Router onto the workspace.
o Drag and drop 1 Switch onto the workspace.
o Drag and drop 1 DNS Server onto the workspace.
o Drag and drop 1 HTTP Server onto the workspace.
o Drag and drop 1 PC onto the workspace.
o Use the Connections tool to add Ethernet cables as needed.
3. Basic Setup of Router and Switch:
o Click on the router to open its configuration window.
o Go to the CLI tab to start configuring the router.
Router Configuration:
Router> enable
Router# configure terminal
Router(config)# hostname Router
Router(config)# interface gig0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# end
Router# write

4. Configure DNS Server:


o Click on the DNS Server to open its configuration window.
o Go to the Desktop tab and select IP Configuration. Configure the
DNS server with the following IP settings:
 IP Address: 192.168.1.2
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1
o Go to the Services tab, select DNS to configure DNS settings.
 Domain Name: example.local
 Add a Record:
 Type: A
 Name: webserver
 Address: 192.168.1.3
5. Configure HTTP Server:
o Click on the HTTP Server to open its configuration window.
o Go to the Desktop tab and select IP Configuration. Configure the
HTTP server with the following IP settings:
 IP Address: 192.168.1.3
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1
o Go to the Services tab, select HTTP and ensure the HTTP service is
running. You can also add a simple web page by configuring the web
server settings.

6. Configure PC:
o Click on the PC to open its configuration window.
o Go to the Desktop tab and select IP Configuration. Configure the PC
with the following IP settings:
 IP Address: 192.168.1.4
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1
 DNS Server: 192.168.1.2
7. Testing DNS and HTTP Services:
o On the PC, open the Command Prompt from the Desktop tab.
o Test DNS resolution by typing ping webserver.example.local. This
should resolve to the IP address 192.168.1.3.
o Open a web browser on the PC and type
http://webserver.example.local in the address bar. You should see the
web page hosted by the HTTP Server.
Project: Basic Firewall Configuration

Objective:
1. Set up a network with a firewall, a web server, and a client PC.
2. Configure basic firewall rules to allow or deny traffic.
3. Ensure that the client PC can access the web server based on firewall rules.
Components Needed:
 1 Switch
 1 Web Server
 3 PC
 Appropriate cables (Ethernet)
Steps:
1. Launch Cisco Packet Tracer: Open Cisco Packet Tracer on your computer.
2. Add Devices:
o Drag and drop 1 Router onto the workspace (this will act as the
firewall).
o Drag and drop 1 Switch onto the workspace.
o Drag and drop 1 Web Server onto the workspace.
o Drag and drop 1 PC onto the workspace.
o Use the Connections tool to add Ethernet cables as needed.
3. Basic Setup of Router and Switch:
o Click on the router to open its configuration window.
o Go to the CLI tab to start configuring the router.
Router Configuration:
Router> enable
Router# configure terminal
Router(config)# hostname Router
Router(config)# interface gig0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# interface gig0/1
Router(config-if)# ip address 192.168.2.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# end
Router# write

4. Configure Web Server:


o Click on the Web Server to open its configuration window.
o Go to the Desktop tab and select IP Configuration. Configure the
web server with the following IP settings:
 IP Address: 192.168.2.2
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.2.1
o Go to the Services tab, select HTTP and ensure the HTTP service is
running. You can add a simple web page to test connectivity.

5. Configure PC:
o Click on the PC to open its configuration window.
o Go to the Desktop tab and select IP Configuration. Configure the PC
with the following IP settings:
 IP Address: 192.168.1.2
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1
 DNS Server: Leave blank or use the router's IP if DNS is
needed.

Project: Basic Wireless Router Setup


Objective:
1. Set up a network with a wireless router.
2. Connect one client PC via Ethernet and another via Wi-Fi.
3. Configure basic IP addressing and wireless settings.
4. Ensure that both PCs can communicate with each other.
Components Needed:
 1 Wireless Router
 1 Web server
 1 ISP Router
 1 Wired PC
 2 Laptops
 Appropriate cables (Ethernet)
Steps:
1. Launch Cisco Packet Tracer: Open Cisco Packet Tracer on your computer.
2. Add Devices:
o Drag and drop 1 Wireless Router onto the workspace.
o Drag and drop 1 Switch onto the workspace.
o Drag and drop 1 Wired PC onto the workspace.
o Drag and drop 1 Wireless PC onto the workspace.
o Use the Connections tool to add Ethernet cables as needed.
3. Basic Setup of Wireless Router:
o Click on the wireless router to open its configuration window.
o Go to the Config tab and select Wireless to configure the wireless
settings.
Wireless Configuration:
o SSID: Set a name for your wireless network, e.g., HomeNetwork.
o Security Mode: Choose WPA2 (for security).
o Password: Set a password for your Wi-Fi, e.g., password123.
o Go to the Config tab and select FastEthernet0 to configure the wired
interface.

Wired Interface Configuration:


o IP Address: 192.168.1.1
o Subnet Mask: 255.255.255.0
o Click On to enable the interface.

4. Configure Wired PC:


o Click on the Wired PC to open its configuration window.
o Go to the Desktop tab and select IP Configuration. Configure the PC
with the following IP settings:
 IP Address: 192.168.1.2
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1

5. Configure Wireless PC:


o Click on the Wireless PC to open its configuration window.
o Go to the Desktop tab and select PC Wireless. Ensure the wireless
network adapter is turned on.
o Scan for available networks and connect to the HomeNetwork SSID.
o Enter the password password123 when prompted.
Assign IP Address Automatically:
o Go to IP Configuration and ensure the wireless PC is set to obtain an
IP address automatically (using DHCP).
6. Test Connectivity:
o On the Wired PC, open the Command Prompt from the Desktop tab.
o Test connectivity by typing ping 192.168.1.1 to check if it can reach
the router.
o Test connectivity to the Wireless PC by typing ping 192.168.1.3
(assuming it received an IP address of 192.168.1.3).
o On the Wireless PC, open the Command Prompt from the Desktop
tab.
PROJECT-E MAIL SERVER

Objective
Aim of setting up an email server in Cisco Packet Tracer is to simulate and
understand the functionality of email communication within a network.

Components Required:
1. *Router*: To route traffic between different networks.
2. *Switch*: To connect multiple devices within the same network.
3. *PCs*: For clients to send and receive emails.
4. *Email Server*: A server that will handle email services. In Packet Tracer, you
typically use a server device and configure it to act as an email server.
5. *Server Configuration*: Use the following protocols for email services:
- *SMTP (Simple Mail Transfer Protocol)*: For sending emails.
- *POP3 (Post Office Protocol version 3)* or *IMAP (Internet Message Access
Protocol)*: For receiving emails.

Steps to Configure:

1. *Network Design*:
- Place the router, switch, email server, and PCs in the Packet Tracer workspace.
- Connect the devices with appropriate cables (usually copper straight-through
cables for PCs and switches).
2. *Configure IP Addressing*:
- Assign IP addresses to all devices. Ensure that the IP addresses are in the same
subnet for devices in the same network.
- For PCs, configure IP address, subnet mask, default gateway, and DNS server.

3. *Configure the Email Server*:


- Click on the server and go to the *Config* tab.
- Under the *Email* section, configure the email server settings:
- *SMTP Server*: Set up the SMTP service with a relevant domain and port
(usually port 25).
- *POP3/IMAP Server*: Set up the POP3 or IMAP service with relevant
settings (usually port 110 for POP3 or port 143 for IMAP).
- Create email accounts for testing purposes.
4. *Configure the Router*:
- Ensure that the router has an IP address on the interface connected to the
switch.
- Configure routing if you have multiple networks to ensure proper traffic flow.

5. *Configure PCs*:
- Go to the *Desktop* tab on each PC, select *Email*, and enter the server's IP
address.
- Configure the email client with the server settings:
- *Incoming Mail Server*: The IP address of the email server.
- *Outgoing Mail Server*: The IP address of the email server.
- *Username and Password*: Use the credentials you set up on the email server.

6. *Testing*:
- Send a test email from one PC to another to ensure that the email server is
functioning correctly.
- Verify that the email can be sent and received as expected.

7. *Troubleshooting*:
- Ensure all devices are properly connected and powered.
- Verify IP configurations and connectivity (use ping commands to test
connections).
- Check server settings and logs for any errors.
PROJECT-FTP SERVER

Objective:
Configure an FTP server to enable file transfer between devices.

Components required:
- Cisco Packet Tracer software
- FTP server device (e.g., a router or server)
- Client device (e.g., a PC)
- Network cables

Steps:
1. Setup the network topology: Create a simple network with the FTP server device
and client device connected.
2. Configure the FTP server:
- Enable the FTP server on the device.
- Set the FTP username and password.
3. Configure the client:
- Install an FTP client software (e.g., FileZilla).
- Enter the FTP server's IP address, username, and password.
4. Connect to the FTP server: Establish a connection from the client to the FTP
server.
5. Transfer files: Upload or download files between the client and FTP server.
PROJECT: BASIC SMART HOME USING CISCO PACKET
TRACER

 Step 1: Install and Open Cisco Packet Tracer


Ensure you have the latest version of Cisco Packet Tracer installed.

 Step 2: Create a New Project


1. Open Cisco Packet Tracer.
2. Create a new project by clicking "File" > "New".

 Step 3: Add a Home Gateway


1. From the device list, select "Network Devices" > "Wireless Devices".
2. Drag and drop a "Home Gateway" (IoT Gateway) to the workspace.

 Step 4: Add IoT Devices


1. Go to "End Devices" > "Home".
2. Drag and drop the following devices into the workspace:
- Fan
- Door
- Garage Door
- Window
- Light

 Step 5: Connect Devices to the Home Gateway


1. Use the "Connections" tool to connect the IoT devices to the Home Gateway
wirelessly.
2. For each device, ensure they are configured to connect to the Home Gateway's
wireless network.

 Step 6: Configure the Home Gateway


1. Click on the Home Gateway to open its configuration window.
2. Set up the SSID as "HomeNetwork" and the password as "password123".
3. Connect the Home Gateway to the internet using a modem or router.

 Step 7: Configure IP Addresses for IoT Devices


1. Click on each IoT device to open its configuration window.
2. Connect each device to the Home Gateway's wireless network (SSID:
HomeNetwork, Password: password123).
3. Assign static IP addresses to each device as follows:
- Fan: 192.168.0.2
- Door: 192.168.0.3
- Garage Door: 192.168.0.4
- Window: 192.168.0.5
- Light: 192.168.0.6

 Step 8: Set Up Rules and Automation


1. On the Home Gateway, go to the "IoT" tab and create a user account.
2. Use the control dashboard to set up rules and automation:
- Fan: Configure to turn on/off based on temperature or manually.
- Door: Configure to lock/unlock based on user input or sensors.
- Garage Door: Configure to open/close based on user input or proximity sensors.
- Window: Configure to open/close based on environmental conditions or user
input.
- Light: Configure to turn on/off based on time of day, motion sensors, or
manually.

 Step 9: Program Automation Scripts (Optional)


1. Use the IoT programming interface in Cisco Packet Tracer to create scripts.
2. Example scripts:
- Light Automation: Turn on lights when motion is detected and it's after sunset.
- Security Automation: Lock doors and close windows when the security mode is
activated.
- Garage Door Automation:Open garage door when a specific car is detected.

 Step 10: Test the Setup


1. Simulate different scenarios to test the smart home security system.
2. Check the responsiveness and functionality of each device.
3. Ensure that all rules and automation scripts work as intended.
 Detailed Configuration for Each Device
1. Home Gateway
- SSID: HomeNetwork
- Password: password123
- DHCP Server: Enabled (IP range: 192.168.0.2 - 192.168.0.50)
2. Fan
- IP Address: 192.168.0.2
- SSID: HomeNetwork
- Password: password123
3. Door
- IP Address: 192.168.0.3
- SSID: HomeNetwork
- Password: password123
4. Garage Door
- IP Address: 192.168.0.4
- SSID: HomeNetwork
- Password: password123
5. Window
- IP Address: 192.168.0.5
- SSID: HomeNetwork
- Password: password123
6. Light
- IP Address: 192.168.0.6
- SSID: HomeNetwork
- Password: password123

You might also like