KEMBAR78
Lab Practical | PDF | Computer Network | Computer Architecture
0% found this document useful (0 votes)
16 views294 pages

Lab Practical

The document is a comprehensive guide covering various exercises and labs related to networking concepts, including binary and decimal conversions, IP addressing, router configurations, and security protocols. It includes detailed instructions for practical labs on IPv4 and IPv6 network communication, routing protocols, VLAN configurations, and access control lists. The content is structured in a table of contents format, indicating a systematic approach to learning networking skills and concepts.

Uploaded by

rajkarthik412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views294 pages

Lab Practical

The document is a comprehensive guide covering various exercises and labs related to networking concepts, including binary and decimal conversions, IP addressing, router configurations, and security protocols. It includes detailed instructions for practical labs on IPv4 and IPv6 network communication, routing protocols, VLAN configurations, and access control lists. The content is structured in a table of contents format, indicating a systematic approach to learning networking skills and concepts.

Uploaded by

rajkarthik412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 294

Table of Contents

Exercise 1: Binary to Decimal Conversion ............................................................................................. 1


Exercise 2: Decimal to Binary Conversion ............................................................................................. 2
Exercise 3: Address Class Identification ................................................................................................ 3
Exercise 4: Network and Host Identification Based on Class of Address ............................................. 4
Exercise 5: Default Subnet Mask ........................................................................................................... 5
Exercise 6: Network Address ................................................................................................................. 6
Exercise 7: Broadcast Address ............................................................................................................... 7
Exercise 8: CISCO Slash Notation ........................................................................................................... 8
Exercise 9: Binary to Hexa Decimal Conversion .................................................................................... 9
Exercise 10: Hexadecimal to Binary Conversion ................................................................................. 10
Exercise 11: Omission of Zero’s ........................................................................................................... 11
Exercise 12: Replacing Successive Fields of Zero’s With “::”.............................................................. 12
Exercise 13: Custom Subnet Mask (Subnetting).................................................................................. 13
Exercise 14: Variable Length Subnet Mask (VLSM) ............................................................................. 19
Lab 1: Understanding IPv4 Network Communication ......................................................................... 21
Assigning IPv4 Address to computers.............................................................................................. 22
Verify communication between the same and different network computers. ............................. 23
Assigning Default Gateway address to computers ......................................................................... 26
Verify communication between the different network computers. .............................................. 27
Lab 2: Understanding IPv6 Network Communication ......................................................................... 29
Assigning IPv6 Address to computers.............................................................................................. 30
Verify communication between the same and different network computers. ............................. 31
Assigning Default Gateway address to computers ......................................................................... 33
Verify communication between the different network computers. .............................................. 34
Lab 3: Initial Configuration of Router - IPv4 Network ......................................................................... 36
Establish console connectivity ......................................................................................................... 37
Access router via console with an emulation software .................................................................. 37
Get to know Cisco IOS Modes and Show commands...................................................................... 42
Configure Hostname and Interface IP address ................................................................................ 45
Configure Connectivity Passwords .................................................................................................. 46
Configure Privilege Mode / Enable Password ................................................................................. 46
Verify configuration in RAM and NVRAM ....................................................................................... 46
Saving configuration to the router .................................................................................................. 48
Access the router via Telnet............................................................................................................. 50
Lab 4: Initial Configuration of Router – IPv6 Network ........................................................................ 54
Establish console connectivity ......................................................................................................... 55
Access router via console with an emulation software .................................................................. 55
Get to know Cisco IOS Modes and Show commands...................................................................... 55
Configure Hostname and Interface IPv6 address ............................................................................ 58
Configure Connectivity Passwords .................................................................................................. 58
Configure Privilege Mode / Enable Password ................................................................................. 59
Verify configuration in RAM and NVRAM ....................................................................................... 59
Saving configuration to the router .................................................................................................. 61
Access the router via Telnet............................................................................................................. 63
Lab 5: Basic Router Security ................................................................................................................. 64
Access router via Telnet ................................................................................................................... 65
Encrypt all clear text passwords on the router ............................................................................... 65
Configure Warning Banner............................................................................................................... 68
Configure unattended (idle-timeout) session timeout for VTY access........................................... 69
Lab 6: WAN Configuration – Serial Interface (IPv4) ............................................................................ 70
Identify Serial Interface as DCE or DTE ............................................................................................ 71
Configure Serial Interface ................................................................................................................ 72
Verify Serial Interface Configuration ............................................................................................... 74
Troubleshooting Serial Interface ..................................................................................................... 75
Lab 7: WAN Configuration – Ethernet Interface (IPv4) ....................................................................... 76
Configure Ethernet Interface ........................................................................................................... 76
Verify Ethernet Interface Configuration .......................................................................................... 77
Troubleshooting Ethernet Interface ................................................................................................ 78
Lab 8: WAN Configuration – Ethernet Interface (IPv6) ....................................................................... 79
Verify Ethernet Interface existing status ......................................................................................... 80
Configure Ethernet Interface with IPv6 address ............................................................................. 81
Verify IPv6 Address Configuration on Ethernet Interface .............................................................. 81
Troubleshooting Ethernet Interface ................................................................................................ 82
Lab 9: Static Routing on IPv4 Network ................................................................................................ 83
Enabling IPv4 Routing ...................................................................................................................... 84
Verify IPv4 Routing Table ................................................................................................................. 84
Configure Static Routing on IPv4 Network ...................................................................................... 86
Verify Static Routing on IPv4 Network ............................................................................................ 86
Verify communication between the IPv4 networks ....................................................................... 88
Lab 10: Static Routing on IPv4 Network via exit Interface ................................................................. 89
Enabling IPv4 Routing ...................................................................................................................... 90
Verify IPv4 Routing Table ................................................................................................................. 90
Configure Static Routing on IPv4 Network ...................................................................................... 92
Verify Static Routing on IPv4 Network ............................................................................................ 92
Verify communication between the IPv4 networks ....................................................................... 93
Lab 11: Static Routing on IPv6 Network .............................................................................................. 95
Enabling IPv6 Routing ...................................................................................................................... 96
Verify IPv6 Routing Table ................................................................................................................. 96
Configure Static Routing on IPv6 Network ...................................................................................... 97
Verify Static Routing on IPv6 Network ............................................................................................ 98
Verify communication between the IPv6 networks ....................................................................... 99
Lab 12: RIP on IPv4 Network .............................................................................................................. 100
Configure Loopback Interface ........................................................................................................ 101
Verify Loopback Interface .............................................................................................................. 102
Configure RIP Routing on IPv4 network ........................................................................................ 103
Verify RIP Routing on IPv4 network .............................................................................................. 104
Verify communication between the IPv4 networks ..................................................................... 106
Verify RIP protocol default settings ............................................................................................... 107
Verify RIP Update Packets.............................................................................................................. 107
Lab 13: OSPF on IPv4 Network ........................................................................................................... 109
Configure OSPF – Single Area on IPv4 Network ............................................................................ 110
Verify OSPF – Single Area on IPv4 Network .................................................................................. 111
Verify communication between the IPv4 networks ..................................................................... 112
Verify OSPF Neighbour and Database Table ................................................................................. 113
Verify OSPF protocol default settings............................................................................................ 115
Verify OSPF Hello Packets .............................................................................................................. 115
Enable passive interface on OSPF .................................................................................................. 116
Configuring OSPF Cost metric for an interface .............................................................................. 117
Lab 14: OSPF – Multiple Area on IPv4 Network ................................................................................ 120
Configure OSPF Routing with backbone area and multiple connected areas on IPv4 Network . 121
Verify OSPF – Multiple Area on IPv4 Network .............................................................................. 122
Verify communication between the IPv4 networks ..................................................................... 123
Verify OSPF Neighbour and Database Table ................................................................................. 125
Lab 15: OSPF Routing – DR (Designated Router) and BDR (Backup Designated Router) ................ 128
Configure OSPF Routing with backbone area on IPv4 Network ................................................... 129
Verify OSPF Neighbour and Database Table ................................................................................. 130
Lab 16: OSPFv3 on IPv6 Network ....................................................................................................... 132
Configure OSPFv3 on IPv6 Network............................................................................................... 133
Verify OSPFv3 on IPv6 Network..................................................................................................... 134
Verify communication between the IPv6 networks ..................................................................... 135
Verify OSPF Neighbour and Database Table on IPv6 Network ..................................................... 136
Lab 17: Initial Configuration of Switch .............................................................................................. 137
Establish console connectivity ....................................................................................................... 138
Access switch via console with an emulation software ................................................................ 138
Getting familiar with Cisco Switch IOS Modes and show commands .......................................... 139
Configure Hostname and VLAN 1 Interface IP address ................................................................. 143
Configure Connectivity Passwords ................................................................................................ 143
Configure Privilege Mode / Enable Password ............................................................................... 143
Configure Default Gateway and Description on Interface............................................................ 144
Save configuration on the switch .................................................................................................. 144
Access the Switch via Telnet .......................................................................................................... 145
Lab 18: VLAN and Trunking ................................................................................................................ 146
Verify communication between the computers connected to same and different switches ..... 147
Verify Default VLAN information ................................................................................................... 148
Configure and Implement VLAN .................................................................................................... 149
Verify communication between the computers connected to same switch. .............................. 152
Configure Trunking ......................................................................................................................... 153
Verify trunk configuration ............................................................................................................. 153
Verify communication between the computers connected to different switch. ........................ 156
Lab 19: Voice VLAN Configuration ..................................................................................................... 157
Data & Voice vlan Configuration: .................................................................................................. 157
Data & Voice vlan Implementation ............................................................................................... 157
Verifying Data & Voice vlan Configuration.................................................................................... 158
Lab 20: Dynamic Trunking Protocol (DTP) ......................................................................................... 160
Configure DTP Trunking ................................................................................................................. 161
Verify DTP Trunk configuration ..................................................................................................... 161
Verify communication between the computers connected to different switch. ........................ 164
Lab 21: VLAN Trunking Protocol (VTP) .............................................................................................. 165
Configure VTP Domain Name and Password ................................................................................ 166
Verify the working of VTP .............................................................................................................. 167
Lab 22: Router on a Stick (Inter-VLAN Routing) ................................................................................ 170
Verify communication between the computers in Different VLAN ............................................. 171
Configure Sub Interfaces and IP Routing on Router ..................................................................... 172
Verify communication between the computers in Different VLAN ............................................. 173
Lab 23: Routing Between VLANs using Multilayer Switch ................................................................ 174
Configuring VLAN in the Multilayer Switch (Layer 2 VLAN) .......................................................... 174
Implementing Layer 2 VLAN .......................................................................................................... 175
Verifing Layer 2 VLAN..................................................................................................................... 175
Configuring IP Address to Specific VLAN (SVI) .............................................................................. 175
Verifing SVI ..................................................................................................................................... 175
Lab 24: Cisco Discovery Protocol (CDP) ............................................................................................. 177
Enabling CDP................................................................................................................................... 178
Verify CDP information .................................................................................................................. 178
Lab 25: Spanning Tree Protocol (STP) ................................................................................................ 180
Verify STP default behaviour ......................................................................................................... 181
Configuring particular switch to become the Root Bridge ........................................................... 182
Verify STP ....................................................................................................................................... 182
Lab 26: Portfast and BPDU Guard ...................................................................................................... 185
Verify Port State in STP after enabling Portfast ............................................................................ 186
Configuring Postfast and BPDU guard for an Interface................................................................. 188
Verify Port State in STP after enabling Portfast ............................................................................ 188
Configuring Postfast and BPDU guard for a Switch....................................................................... 189
Verify Portfast and BPDU Guard configuration for switch ........................................................... 190
Lab 27: Etherchannel .......................................................................................................................... 191
Configure Etherchannel.................................................................................................................. 192
Verify Etherchannel ........................................................................................................................ 192
Lab 28: Implementing L3 Etherchannel ............................................................................................. 198
Configuring Layer 3 Etherchannel .................................................................................................. 198
Layer 3 Interface configure an IP address on this port-channel Interface ................................... 198
Verifing Layer 3 Interface configure an IP address on this port-channel Interface ..................... 199
Lab 29: Port Security .......................................................................................................................... 201
Configure Port Security .................................................................................................................. 202
Verify Port Security Violation ........................................................................................................ 202
Configure Port Security Recovery .................................................................................................. 203
Lab 30: Standard Access Control List on IPv4 Network (NUMBERED) .............................................. 204
Verify communication between computers / networks before configuring the access list ....... 205
Configure and Implement Standard ACL - Numbered .................................................................. 206
Verify blocked communication between computers / networks specified in ACL ...................... 207
Lab 31: Standard Access Control List on IPv4 Network (NAMED) .................................................... 208
Verify communication between computers / networks before configuring the access list ....... 209
Configure and Implement Standard ACL - Named ........................................................................ 211
Verify blocked communication between computers / networks specified in ACL ...................... 212
Lab 32: Extended Access Control List on IPv4 Network (NUMBERED) ............................................. 214
Verify services and communication between computers / networks before configuring the
Extended Access List ...................................................................................................................... 215
Configure and Implement Extended ACL - Numbered .................................................................. 216
Verify blocked services and communication between computers / networks specified in ACL . 217
Lab 33: Extended Access Control List on IPv4 Network (NAMED) .................................................... 218
Verify services and communication between computers / networks before configuring the
Extended Access List ...................................................................................................................... 219
Configure and Implement Extended ACL - Numbered .................................................................. 220
Verify blocked services and communication between computers / networks specified in ACL . 221
Lab 34: Time Bases ACL Configuration............................................................................................... 222
Configuring Time Based ACL .......................................................................................................... 222
Verifing Time Based ACL ................................................................................................................ 223
Lab 35: Access Control List on IPv6 Network.................................................................................... 224
Verify communication between computers / networks before configuring the access list ....... 225
Configure and Implement Extended ACL - Named........................................................................ 226
Verify blocked communication between computers / networks specified in ACL ...................... 227
Lab 36: Default Routing...................................................................................................................... 228
Configure WAN Interface ............................................................................................................... 229
Configure Default Routing ............................................................................................................. 229
Verify Default Routing.................................................................................................................... 229
Lab 37: Static NAT............................................................................................................................... 231
Configure Static NAT ...................................................................................................................... 232
Verify Static NAT ............................................................................................................................ 232
Verify Static NAT Packets ............................................................................................................... 233
Lab 38: Port Address Translation (PAT) ............................................................................................. 234
Configure PAT ................................................................................................................................. 235
Verify PAT ....................................................................................................................................... 235
Verify PAT Packets.......................................................................................................................... 236
Lab 39: SYSLOG ................................................................................................................................... 237
Configure Logging to Syslog Server ................................................................................................ 238
Configure Logging to Buffer ........................................................................................................... 238
Generate and Verify Syslog Messages ........................................................................................... 238
Lab 40: NTP ......................................................................................................................................... 240
Configure Date and Time - Manual ................................................................................................ 241
Verify Current Date and Time ........................................................................................................ 241
Configure Router as NTP client ...................................................................................................... 241
Verify Date and time via NTP ......................................................................................................... 241
Lab 41: DHCP Server and Client ......................................................................................................... 242
Verify DHCP on client computer .................................................................................................... 243
Verify DHCP Server ......................................................................................................................... 244
Lab 42: Hot Standby Router Protocol (HSRP) .................................................................................... 245
Configure Ethernet Interface, Serial Interface and Default Routing ............................................ 246
Configure HSRP ............................................................................................................................... 246
Verify HSRP ..................................................................................................................................... 247
Verify communication and data path to destination network ..................................................... 247
Understand HSRP behaviour.......................................................................................................... 248
Verify HSRP ..................................................................................................................................... 248
Verify communication and data path to destination network ..................................................... 249
Cisco Security ...................................................................................................................................... 250
Lab 1: Securing Administrative Access .............................................................................................. 250
To enhance router security by encrypting all passwords, configure banners, exec-timeouts on
router .............................................................................................................................................. 250
Access router via Telnet ................................................................................................................. 251
Encrypt all clear text passwords on the router ............................................................................. 251
Verify router's existing configuration ............................................................................................ 251
Encrypt all clear text passwords .................................................................................................... 253
Configure Warning Banner............................................................................................................. 254
Configure a warning message to display prior to login ................................................................ 254
Configure unattended (idle-timeout) session timeout for VTY access......................................... 255
Configure a minimum password length for all router passwords ................................................ 256
Create a new user account using the username command .......................................................... 256
Configure Enhanced Virtual Login Security on Routers ................................................................ 256
Configure the router to log login activity ...................................................................................... 257
Lab 2: Local Database Authentication ............................................................................................... 258
Lab 3: SSH Configuration .................................................................................................................... 260
Configuring SSH to Access Device Remotely ................................................................................. 261
Generate the RSA encryption key pair for the router ................................................................... 261
Verify the SSH configuration .......................................................................................................... 261
Configure SSH timeouts and authentication parameters ............................................................. 261
Verify SSH access to Router ........................................................................................................... 262
Lab 4: Privilege Levels ........................................................................................................................ 263
Configure Various Privilege Levels................................................................................................. 263
Verifing Privilege Levels ................................................................................................................. 264
Lab 5: AAA Authentication (TACACS and RADIUS) ............................................................................ 265
Configure AAA Authentication (TACACS Server) ........................................................................... 266
Verify AAA Authentication............................................................................................................. 266
Lab 6: Securing Boot Image (IOS) and Configuration File ................................................................. 267
Securing IOS Image File and Router Configuration File ................................................................ 267
Lab 7: Generic Routing Encapsulation (GRE) ..................................................................................... 269
Configure Serial Interface .............................................................................................................. 269
Configure Default Routing ............................................................................................................. 270
Configure GRE Tunnel Interface..................................................................................................... 271
Verify GRE Tunnel Configuration ................................................................................................... 271
Configure Routing........................................................................................................................... 272
Verify Routing ................................................................................................................................. 273
Verify communication between the networks ............................................................................. 274
Lab 8: Password Recovery.................................................................................................................. 275
Establish console connectivity ....................................................................................................... 276
Access router via console with an emulation software ................................................................ 276
Enter Rom Monitor Mode and Change Configuration Register Value ......................................... 277
Load saved configuration to the router......................................................................................... 277
Reconfigure Privilege Mode / Enable Password ........................................................................... 277
Reset the Configuration Register Value back to the default: ....................................................... 277
Enable the Ethernet interface: ....................................................................................................... 277
Saving configuration to the router and restart the router ........................................................... 278
Verify login to the router using new password ............................................................................. 278
Lab 9: IOS and Configuration Backup ................................................................................................ 279
Backup of Router Configuration on TFTP Server ........................................................................... 280
Verify backup configuration file on TFTP Server ........................................................................... 280
Backup of Router IOS ..................................................................................................................... 280
Verify backup IOS file on TFTP server ............................................................................................ 281
Backup of Router Configuration on FTP Server ............................................................................. 281
Verify backup configuration file on FTP Server ............................................................................. 282
Backup of Router IOS ..................................................................................................................... 282
Backup of Router Configuration on SCP Server............................................................................. 283
Verify backup configuration file on SCP Server ............................................................................. 284
Backup of Router IOS ..................................................................................................................... 284
Exercise 1: Binary to Decimal Conversion

128 64 32 16 8 4 2 1 ANSWER IN SCRATCH AREA


DECIMAL

1 0 0 1 0 0 1 0

1 1 0 0 0 0 0 0

1 0 1 0 1 0 0 0

0 1 0 0 0 0 0 0

0 0 0 0 1 0 1 0
Exercise 2: Decimal to Binary Conversion

DECIMAL ANSWER IN BINARY SCRATCH AREA

128 64 32 16 8 4 2 1

167

63

17

24

254
Exercise 3: Address Class Identification

ADDRESS CLASS

126.10.1.1

128.10.1.1

162.78.1.10

39.255.255.255

220.1.1.10
Exercise 4: Network and Host Identification Based on Class of
Address

CIRCLE THE NETWORK PORTION CIRCLE THE HOST PORTION


OF BELOW ADDRESSES OF BELOW ADDRESSES

132.12.1.1 161.43.5.6

128.10.1.1 13.1.100.254

176.13.10.10 202.153.32.121

162.78.1.10 100.140.2.230

200.1.1.1 171.24.100.10
Exercise 5: Default Subnet Mask

ADDRESS CLASS

126.10.1.1

128.10.1.1

162.78.1.10

52.255.255.255

220.1.1.10
Exercise 6: Network Address

USING THE IP ADDRESS AND SUBNET MASK SHOWN, WRITE THE NETWORK ADDRESS

IP ADDRESS AND SUBNET MASK NETWORK ADDRESS

121.12.1.1

255.0.0.0

175.13.10.10

255.255.0.0

200.1.10.1

255.255.255.0

119.0.255.20

255.0.0.0

191.168.1.10

255.255.0.0
Exercise 7: Broadcast Address

USING THE IP ADDRESS AND SUBNET MASK SHOWN, WRITE THE BROADCAST ADDRESS

IP ADDRESS AND SUBNET MASK BROADCAST ADDRESS

161.43.5.6

255.255.0.0

13.1.100.254

255.0.0.0

202.153.32.121

255.255.255.0

100.140.2.230

255.0.0.0

171.24.100.10

255.255.0.0
Exercise 8: CISCO Slash Notation

SLASH NOTATION SUBNET MASK

/29

/22

/12

/25

/18
Exercise 9: Binary to Hexa Decimal Conversion

ANSWER IN
HEXADECIMAL

1 1 1 1

1 1 0 1 1 0 1 1

1 0 1 1 1 0 1 1 1 0 1 0

1 0 1 1 1 0 1 0 1 0 1 1 1 0 1 0

1 1 0 0 1 0 1 0 1 1 1 1 1 1 1 0

1 1 1 1 1 0 1 0 1 1 0 0 1 1 1 0

1 1 0 0 0 0 0 1 0 1 0 1 1 1 0 0
Exercise 10: Hexadecimal to Binary Conversion

HEXADECIMAL

2F

4FD

01E8

2001

FE80
Exercise 11: Omission of Zero’s

IPv6 ADDRESS
IPv6 ADDRESS
AFTER OMISSION OF ZERO’S

2001:2222:0000:0000:0000:0000:0000:0001

20DB:C0A8:0101:0000:0000:0000:0000:0042

2000:0000:0000:4DAD:0023:0046:00BB:0101

FF02:0000:0000:0000:0000:0000:0000:0001

0000:0000:0000:0000:0000:0000:0000:0001
Exercise 12: Replacing Successive Fields of Zero’s With “::”

IPv6 ADDRESS
IPv6 ADDRESS AFTER REPLACING SUCCESSIVE FIELDS
OF ZERO’S WITH “::”

2002:1111:04CF:0000:0000:0000:0000:002F

3FFF:0000:0000:0000:0000:005D: 0000:09CE

2001:0000:0000: FACE: B00C:0000:0000:0069

20DB:0000:0000:6666:0000:0000:0000:5228

2001:1111:0000:0000:0000:0000:0000:0001
Exercise 13: Custom Subnet Mask (Subnetting)

PROBLEM : 1

Number of needed subnets 14

Network Address 200.10.10.0

Address class

Default subnet mask

Custom subnet mask

Total number of subnets

Total number of host addresses

Number of usable addresses

Number of bits borrowed from the host


portion
PROBLEM : 2

Number of needed usable hosts 60

Network Address 171.10.0.0

Address class

Default subnet mask

Custom subnet mask

Total number of subnets

Total number of host addresses

Number of usable addresses

Number of bits borrowed from the host


portion
PROBLEM : 3

Network Address 138.25.0.0/26

Address class

Default subnet mask

Custom subnet mask

Total number of subnets

Total number of host addresses

Number of usable addresses

Number of bits borrowed from the host


portion
PROBLEM : 4

Number of needed subnets 2000

Network Address 111.0.0.0

Address class

Default subnet mask

Custom subnet mask

Total number of subnets

Total number of host addresses

Number of usable addresses

Number of bits borrowed from the host


portion
PROBLEM : 5

Number of needed usable hosts 1000

Network Address 165.34.0.0

Address class

Default subnet mask

Custom subnet mask

Total number of subnets

Total number of host addresses

Number of usable addresses

Number of bits borrowed from the host


portion
PROBLEM : 6

Network Address 192.100.1.0/29

Address class

Default subnet mask

Custom subnet mask

Total number of subnets

Total number of host addresses

Number of usable addresses

Number of bits borrowed from the host


portion
Exercise 14: Variable Length Subnet Mask (VLSM)

PROBLEM: 1
The administrator gave the networking team 192.168.1.0/24 to use for addressing the entire network.
After subnetting the address, the team is ready to assign the addresses
PROBLEM: 2
The administrator gave the networking team 192.168.164.0/24 to use for addressing the entire
network. After subnetting the address, the team is ready to assign the addresses. The administrator
plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the
networking team, you must address the network and at the same time conserve unused addresses for
future growth.
Lab 1: Understanding IPv4 Network Communication

OBJECTIVE:
To verify communication between same network and different network computers after assigning
IPv4 Address and Default Gateway.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

TASK:
 Assigning IPv4 address to computers.
 Verify communication between the same and different network computers.
 Assigning Default Gateway address to computers.
 Verify communication between the different network computers.
Assigning IPv4 Address to computers

On Windows 7 or Windows 8.x or Windows 10 Computer


 Open Network and Sharing Center
 Click on Change adapter settings and Click Open.
 Right-click on your local adapter and select Properties.
 In the Local Area Connection Properties window select Internet Protocol Version 4 (TCP/IPv4)
then click the Properties button.
 Now select the radio button Use the following IP address and enter in the IP address and Subnet
mask and click OK.

 Verify above configured ip address by giving below command.


C:\> ipconfig

Windows IP Configuration
Ethernet adapter Ethernet:
Connection-specific DNS Suffix :
IPv4 Address. . . . . . . . . . . . . . : 192.168.201.10
Subnet Mask . . . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . . :

 Repeat the above steps to configure ip address on all windows based computers.
On Linux
 Give below command to configure ip address
bt ~ # ifconfig eth0 192.168.201.10

 To verify the configured ip address by giving below command.


bt ~ # ifconfig
eth0 Link encap:Ethernet HWaddr 00:21:97:73:58:21
inet addr:192.168.201.10 Bcast:192.168.201.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:171979 errors:0 dropped:0 overruns:0 frame:0
TX packets:341932 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:12370727 (11.7 MiB) TX bytes:463457462 (441.9 MiB)
Interrupt:20 Base address:0xe800

lo Link encap:Local Loopback


inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:18 errors:0 dropped:0 overruns:0 frame:0
TX packets:18 errors:0 dropped:0 overruns:0 carrier:0
RX bytes:1796 (1.7 KiB) TX bytes:1796 (1.7 KiB)

 Repeat the above steps to configure ip address on all linux based computers.

Verify communication between the same and different network computers.

From 192.168.201.10 computer (i.e. PC1) ping other computers


ping 192.168.201.20

PING 192.168.201.20 (192.168.201.20) 56(84) bytes of data.


64 bytes from 192.168.201.20: icmp_seq=1 ttl=64 time=24.0 ms
64 bytes from 192.168.201.20: icmp_seq=2 ttl=64 time=24.0 ms
64 bytes from 192.168.201.20: icmp_seq=3 ttl=64 time=24.1 ms
64 bytes from 192.168.201.20: icmp_seq=4 ttl=64 time=24.0 ms

ping 192.168.201.30

PING 192.168.201.30 (192.168.201.30) 56(84) bytes of data.


64 bytes from 192.168.201.30: icmp_seq=1 ttl=64 time=24.0 ms
64 bytes from 192.168.201.30: icmp_seq=2 ttl=64 time=24.0 ms
64 bytes from 192.168.201.30: icmp_seq=3 ttl=64 time=24.1 ms
64 bytes from 192.168.201.30: icmp_seq=4 ttl=64 time=24.0 ms

ping 192.168.202.10

connect: Network is unreachable


From 192.168.202.10 computer (i.e. PC4) ping other computers
ping 192.168.202.20

PING 192.168.202.20 (192.168.202.20) 56(84) bytes of data.


64 bytes from 192.168.202.20: icmp_seq=1 ttl=64 time=24.0 ms
64 bytes from 192.168.202.20: icmp_seq=2 ttl=64 time=24.0 ms
64 bytes from 192.168.202.20: icmp_seq=3 ttl=64 time=24.1 ms
64 bytes from 192.168.202.20: icmp_seq=4 ttl=64 time=24.0 ms

ping 192.168.202.30

PING 192.168.202.30 (192.168.202.30) 56(84) bytes of data.


64 bytes from 192.168.202.30: icmp_seq=1 ttl=64 time=24.0 ms
64 bytes from 192.168.202.30: icmp_seq=2 ttl=64 time=24.0 ms
64 bytes from 192.168.202.30: icmp_seq=3 ttl=64 time=24.1 ms
64 bytes from 192.168.202.30: icmp_seq=4 ttl=64 time=24.0 ms

ping 192.168.201.10

connect: Network is unreachable


From 192.168.201.10 computer (i.e. PC1) trace network communication path to other computers

tracert 192.168.201.20 (Windows) or traceroute 192.168.201.20 (Linux)


traceroute to 192.168.201.20 (192.168.201.20), 30 hops max, 38 byte packets
1 192.168.201.20 (192.168.201.20) 1.456 ms 0.193 ms 0.114 ms

tracert 192.168.201.30 (Windows) or traceroute 192.168.201.30 (Linux)


traceroute to 192.168.201.30 (192.168.201.30), 30 hops max, 38 byte packets
1 192.168.201.30 (192.168.201.30) 1.156 ms 0.193 ms 0.114 ms

From 192.168.202.10 computer (i.e. PC4) trace network communication path to other computers
tracert 192.168.202.20 (Windows) or traceroute 192.168.202.20 (Linux)
traceroute to 192.168.202.20 (192.168.202.20), 30 hops max, 38 byte packets
1 192.168.202.20 (192.168.202.20) 1.456 ms 0.193 ms 0.114 ms

tracert 192.168.202.30 (Windows) or traceroute 192.168.202.30 (Linux)


traceroute to 192.168.202.30 (192.168.202.30), 30 hops max, 38 byte packets
1 192.168.202.30 (192.168.202.30) 1.156 ms 0.193 ms 0.114 ms

Assigning Default Gateway address to computers

On Windows 7 or Windows 8.x or Windows 10 Computer


 Open Network and Sharing Center
 Click on Change adapter settings and Click Open.
 Right-click on your local adapter and select Properties.
 In the Local Area Connection Properties window select Internet Protocol Version 4 (TCP/IPv4)
then click the Properties button.
 Now select the radio button Use the following IP address and enter Default Gateway and click
OK.

 Verify above configured default gateway by giving below command.


C:\> ipconfig

Windows IP Configuration
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . . . . : 192.168.201.10
Subnet Mask . . . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . . : 192.168.201.1

 Repeat the above steps to configure default gateway on all windows based computers.

On Linux
 Give below command to configure default gateway
bt ~ # route add default gw 192.168.201.1

 To verify the configure default gateway by giving below command.

bt ~ # route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.201.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
0.0.0.0 192.168.201.1 0.0.0.0 UG 0 0 0 eth0

 Repeat the above steps to configure default gateway on all linux based computers.

Verify communication between the different network computers.

From 192.168.201.10 computer (i.e. PC1) ping other computers


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=63 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=63 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=63 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=63 time=24.0 ms

ping 192.168.202.20

PING 192.168.202.20 (192.168.202.20) 56(84) bytes of data.


64 bytes from 192.168.202.20: icmp_seq=1 ttl=63 time=24.0 ms
64 bytes from 192.168.202.20: icmp_seq=2 ttl=63 time=24.0 ms
64 bytes from 192.168.202.20: icmp_seq=3 ttl=63 time=24.1 ms
64 bytes from 192.168.202.20: icmp_seq=4 ttl=63 time=24.0 ms

ping 192.168.201.30

PING 192.168.202.30 (192.168.202.30) 56(84) bytes of data.


64 bytes from 192.168.202.30: icmp_seq=1 ttl=63 time=24.0 ms
64 bytes from 192.168.202.30: icmp_seq=2 ttl=63 time=24.0 ms
64 bytes from 192.168.202.30: icmp_seq=3 ttl=63 time=24.1 ms
64 bytes from 192.168.202.30: icmp_seq=4 ttl=63 time=24.0 ms
From 192.168.202.10 computer (i.e. PC4) ping other computers

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=1 ttl=63 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=2 ttl=63 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=3 ttl=63 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=4 ttl=63 time=24.0 ms

ping 192.168.201.20

PING 192.168.201.20 (192.168.201.20) 56(84) bytes of data.


64 bytes from 192.168.201.20: icmp_seq=1 ttl=63 time=24.0 ms
64 bytes from 192.168.201.20: icmp_seq=2 ttl=63 time=24.0 ms
64 bytes from 192.168.201.20: icmp_seq=3 ttl=63 time=24.1 ms
64 bytes from 192.168.201.20: icmp_seq=4 ttl=63 time=24.0 ms

ping 192.168.201.30

PING 192.168.201.30 (192.168.201.30) 56(84) bytes of data.


64 bytes from 192.168.201.30: icmp_seq=1 ttl=63 time=24.0 ms
64 bytes from 192.168.201.30: icmp_seq=2 ttl=63 time=24.0 ms
64 bytes from 192.168.201.30: icmp_seq=3 ttl=63 time=24.1 ms
64 bytes from 192.168.201.30: icmp_seq=4 ttl=63 time=24.0 ms

From 192.168.201.10 computer (i.e. PC1) trace network communication path to other computers

tracert 192.168.202.10 (Windows) or traceroute 192.168.202.10 (Linux)


traceroute to 192.168.202.10 (192.168.202.10), 30 hops max, 38 byte packets
1 192.168.201.1 (192.168.201.1) 1.086 ms 1.124 ms 1.144 ms
2 192.168.202.10 (192.168.202.10) 2.295 ms 2.156 ms 2.209 ms

tracert 192.168.202.20 (Windows) or traceroute 192.168.202.20 (Linux)


traceroute to 192.168.202.20 (192.168.202.20), 30 hops max, 38 byte packets
1 192.168.201.1 (192.168.201.1) 1.086 ms 1.124 ms 1.144 ms
2 192.168.202.20 (192.168.202.20) 2.295 ms 2.156 ms 2.209 ms

From 192.168.202.10 computer (i.e. PC4) trace network communication path to other computers

tracert 192.168.201.10 (Windows) or traceroute 192.168.201.10 (Linux)


traceroute to 192.168.201.10 (192.168.201.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 192.168.201.10 (192.168.201.10) 2.295 ms 2.156 ms 2.209 ms

tracert 192.168.201.20 (Windows) or traceroute 192.168.201.20 (Linux)


traceroute to 192.168.201.20 (192.168.201.20), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 192.168.201.20 (192.168.201.20) 2.295 ms 2.156 ms 2.209 ms
Lab 2: Understanding IPv6 Network Communication

OBJECTIVE:
To verify communication between same network and different network computers after assigning
IPv6 Address and Default Gateway.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

TASK:
 Assigning IPv6 address to computers.
 Verify communication between the same and different network computers.
 Assigning Default Gateway address to computers.
 Verify communication between the different network computers.
Assigning IPv6 Address to computers

On Windows 7 or Windows 8.x or Windows 10 Computer


 Open Network and Sharing Center
 Click on Change adapter settings and Click Open.
 Right-click on your local adapter and select Properties.
 In the Local Area Connection Properties window select Internet Protocol Version 6 (TCP/IPv6)
then click the Properties button.
 Now select the radio button Use the following IPv6 address and enter in the IP address and Subnet
prefix and click OK.

 Verify above configured ip address by giving below command.


C:\> ipconfig

Windows IP Configuration
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . :
IPv6 Address. . . . . . . . . . . . . . . . . : 2001:1111::10
Link-local IPv6 Address . . . . . . . . : fe80::449d:6a9a:2c80:80dc%64
Default Gateway . . . . . . . . . . . . . :

 Repeat the above steps to configure ip address on all windows based computers.
On Linux
 Give below command to configure ip address
bt ~ # ifconfig eth0 inet6 add 2001:1111::10/64

 To verify the configured ipv6 address by giving below command.


bt ~ # ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet6 2001:1111::10 prefixlen 64 scopeid 0x0<global>
ether 44:8a:5b:d4:39:3c txqueuelen 1000 (Ethernet)
RX packets 230 bytes 82110 (80.1 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 121 bytes 19549 (19.0 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536


inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 0 (Local Loopback)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

 Repeat the above steps to configure ip address on all linux based computers.

Verify communication between the same and different network computers.

From 2001:1111::10 computer (i.e. PC1) ping other computers


ping 2001:1111::20 (Windows) or ping6 2001:1111::20 (Linux)

PING 2001:1111::20(2001:1111::20) 56 data bytes


64 bytes from 2001:1111::20: icmp_seq=1 ttl=64 time=0.494 ms
64 bytes from 2001:1111::20: icmp_seq=2 ttl=64 time=0.361 ms
64 bytes from 2001:1111::20: icmp_seq=3 ttl=64 time=0.335 ms
64 bytes from 2001:1111::20: icmp_seq=4 ttl=64 time=0.336 ms

ping 2001:1111::30 (Windows) or ping6 2001:1111::30 (Linux)

PING 2001:1111::30(2001:1111::30) 56 data bytes


64 bytes from 2001:1111::30: icmp_seq=1 ttl=64 time=0.494 ms
64 bytes from 2001:1111::30: icmp_seq=2 ttl=64 time=0.361 ms
64 bytes from 2001:1111::30: icmp_seq=3 ttl=64 time=0.335 ms
64 bytes from 2001:1111::30: icmp_seq=4 ttl=64 time=0.336 ms

ping 2001:2222::10 (Windows) or ping6 2001:2222::10 (Linux)

connect: Network is unreachable


From 2001:2222::10 computer (i.e. PC4) ping other computers
ping 2001:2222::20 (Windows) or ping6 2001:2222::20 (Linux)

PING 2001:2222::20(2001:2222::20) 56 data bytes


64 bytes from 2001:2222::20: icmp_seq=1 ttl=64 time=0.494 ms
64 bytes from 2001:2222::20: icmp_seq=2 ttl=64 time=0.361 ms
64 bytes from 2001:2222::20: icmp_seq=3 ttl=64 time=0.335 ms
64 bytes from 2001:2222::20: icmp_seq=4 ttl=64 time=0.336 ms

ping 2001:2222::30 (Windows) or ping6 2001:2222::30 (Linux)

PING 2001:2222::30(2001:2222::30) 56 data bytes


64 bytes from 2001:2222::30: icmp_seq=1 ttl=64 time=0.494 ms
64 bytes from 2001:2222::30: icmp_seq=2 ttl=64 time=0.361 ms
64 bytes from 2001:2222::30: icmp_seq=3 ttl=64 time=0.335 ms
64 bytes from 2001:2222::30: icmp_seq=4 ttl=64 time=0.336 ms

ping 2001:1111::10 (Windows) or ping6 2001:1111::10 (Linux)

connect: Network is unreachable

From 2001:1111::10 computer (i.e. PC1) trace network communication path to other computers

tracert 2001:1111::20 (Windows) or traceroute6 2001:1111::20 (Linux)


traceroute to 2001:1111::20 (2001:1111::20) from 2001:1111::10, 30 hops max,16 byte
1 2001:1111::20 (2001:1111::20) 3005.56 ms !H 3006.88 ms !H 3005.99

tracert 2001:1111::30 (Windows) or traceroute6 2001:1111::30 (Linux)


traceroute to 2001:1111::30 (2001:1111::30) from 2001:1111::10, 30 hops max,16 byte
1 2001:1111::30 (2001:1111::20) 3005.56 ms !H 3006.88 ms !H 3005.99

From 2001:2222::10 computer (i.e. PC4) trace network communication path to other computers

tracert 2001:2222::20 (Windows) or traceroute6 2001:2222::20 (Linux)


traceroute to 2001:2222::20 (2001:2222::20) from 2001:2222::10, 30 hops max,16 byte
1 2001:2222::20 (2001:2222::20) 3005.56 ms !H 3006.88 ms !H 3005.99

tracert 2001:2222::30 (Windows) or traceroute6 2001:2222::30 (Linux)


traceroute to 2001:2222::30 (2001:2222::30) from 2001:2222::10, 30 hops max,16 byte
1 2001:2222::30 (2001:2222::20) 3005.56 ms !H 3006.88 ms !H 3005.99
Assigning Default Gateway address to computers

On Windows 7 or Windows 8.x or Windows 10 Computer


 Open Network and Sharing Center
 Click on Change adapter settings and Click Open.
 Right-click on your local adapter and select Properties.
 In the Local Area Connection Properties window select Internet Protocol Version 6 (TCP/IPv6)
then click the Properties button.
 Now select the radio button Use the following IPv6 address and enter Default Gateway and click
OK.

 Verify above configured default gateway by giving below command.


C:\> ipconfig

Windows IP Configuration
Ethernet adapter Ethernet:
Connection-specific DNS Suffix . :
IPv6 Address. . . . . . . . . . . . . . . . . : 2001:1111::10
Link-local IPv6 Address . . . . . . . . : fe80::449d:6a9a:2c80:80dc%64
Default Gateway . . . . . . . . . . . . . : 2001:1111::1

 Repeat the above steps to configure default gateway on all windows based computers.
On Linux
 Give below command to configure default gateway
bt ~ # route -6 add default gw 2001:1111::1

 To verify the configure default gateway by giving below command.

bt ~ # route -6
Kernel IPv6 routing table
Destination Next Hop Flag Met Ref Use If
::1/128 :: Un 0 1 0 lo
2001:1111::/64 :: U 256 0 2 eth0
fe80::468a:5bff:fed4:3899/128 :: Un 0 1 0 lo
fe80::/64 :: U 256 0 0 eth0
ff00::/8 :: U 256 0 0 eth0
::/0 2001:1111::1 UG 1 0 0 eth0
bt ~ #

 Repeat the above steps to configure default gateway on all linux based computers.

Verify communication between the different network computers.

From 2001:1111::10 computer (i.e. PC1) ping other computers


ping 2001:2222::10 (Windows) or ping6 2001:2222::10 (Linux)

PING 2001:2222::10(2001:2222::10) 56 data bytes


64 bytes from 2001:2222::10: icmp_seq=1 ttl=63 time=0.494 ms
64 bytes from 2001:2222::10: icmp_seq=2 ttl=63 time=0.361 ms
64 bytes from 2001:2222::10: icmp_seq=3 ttl=63 time=0.335 ms
64 bytes from 2001:2222::10: icmp_seq=4 ttl=63 time=0.336 ms

ping 2001:2222::20 (Windows) or ping6 2001:2222::20 (Linux)

PING 2001:2222::20(2001:2222::20) 56 data bytes


64 bytes from 2001:2222::20: icmp_seq=1 ttl=63 time=0.494 ms
64 bytes from 2001:2222::20: icmp_seq=2 ttl=63 time=0.361 ms
64 bytes from 2001:2222::20: icmp_seq=3 ttl=63 time=0.335 ms
64 bytes from 2001:2222::20: icmp_seq=4 ttl=63 time=0.336 ms

ping 2001:2222::30 (Windows) or ping6 2001:2222::30 (Linux)

PING 2001:2222::30(2001:2222::30) 56 data bytes


64 bytes from 2001:2222::30: icmp_seq=1 ttl=63 time=0.494 ms
64 bytes from 2001:2222::30: icmp_seq=2 ttl=63 time=0.361 ms
64 bytes from 2001:2222::30: icmp_seq=3 ttl=63 time=0.335 ms
64 bytes from 2001:2222::30: icmp_seq=4 ttl=63 time=0.336 ms
From 2001:2222::10 computer (i.e. PC4) ping other computers
ping 2001:1111::10 (Windows) or ping6 2001:1111::10 (Linux)

PING 2001:1111::10(2001:1111::10) 56 data bytes


64 bytes from 2001:1111::10: icmp_seq=1 ttl=63 time=0.494 ms
64 bytes from 2001:1111::10: icmp_seq=2 ttl=63 time=0.361 ms
64 bytes from 2001:1111::10: icmp_seq=3 ttl=63 time=0.335 ms
64 bytes from 2001:1111::10: icmp_seq=4 ttl=63 time=0.336 ms

ping 2001:1111::20 (Windows) or ping6 2001:1111::20 (Linux)

PING 2001:1111::20(2001:1111::20) 56 data bytes


64 bytes from 2001:1111::20: icmp_seq=1 ttl=63 time=0.494 ms
64 bytes from 2001:1111::20: icmp_seq=2 ttl=63 time=0.361 ms
64 bytes from 2001:1111::20: icmp_seq=3 ttl=63 time=0.335 ms
64 bytes from 2001:1111::20: icmp_seq=4 ttl=63 time=0.336 ms

ping 2001:1111::30 (Windows) or ping6 2001:1111::30 (Linux)

PING 2001:1111::30(2001:1111::30) 56 data bytes


64 bytes from 2001:1111::30: icmp_seq=1 ttl=63 time=0.494 ms
64 bytes from 2001:1111::30: icmp_seq=2 ttl=63 time=0.361 ms
64 bytes from 2001:1111::30: icmp_seq=3 ttl=63 time=0.335 ms
64 bytes from 2001:1111::30: icmp_seq=4 ttl=63 time=0.336 ms

From 2001:1111::10 computer (i.e. PC1) trace network communication path to other computers

tracert 2001:2222::10 (Windows) or traceroute6 2001:2222::10 (Linux)


traceroute to 2001:2222::10 (2001:2222::10) from 2001:1111::10, 30 hops max,16 byte
1 2001:1111::1 (2001:1111::1) 1.12 ms 1.012 ms 1.039 ms
2 2001:2222::10 (2001:2222::10) 1.111 ms 0.884 ms 0.861 ms

tracert 2001:2222::20 (Windows) or traceroute6 2001:2222::20 (Linux)


traceroute to 2001:2222::20 (2001:2222::20) from 2001:1111::10, 30 hops max,16 byte
1 2001:1111::1 (2001:1111::1) 1.12 ms 1.012 ms 1.039 ms
2 2001:2222::20 (2001:2222:10) 1.111 ms 0.884 ms 0.861 ms

From 2001:2222::10 computer (i.e. PC4) trace network communication path to other computers

tracert 2001:1111::10 (Windows) or traceroute6 2001:1111::10 (Linux)


traceroute to 2001:1111::10 (2001:1111::10) from 2001:2222::10, 30 hops max,16 byte
1 2001:2222::1 (2001:2222::1) 1.12 ms 1.012 ms 1.039 ms
2 2001:1111::10 (2001:1111::10) 1.111 ms 0.884 ms 0.861 ms

tracert 2001:1111::20 (Windows) or traceroute6 2001:1111::20 (Linux)


traceroute to 2001:1111::20 (2001:1111::20) from 2001:2222::10, 30 hops max,16 byte
1 2001:2222::1 (2001:2222::1) 1.12 ms 1.012 ms 1.039 ms
2 2001:1111::20 (2001:1111:10) 1.111 ms 0.884 ms 0.861 ms
Lab 3: Initial Configuration of Router - IPv4 Network

OBJECTIVE:
To get familiarized with Cisco IOS modes and configure a new Router with basic configuration i.e.
assign IPv4 address on the interfaces and configure passwords etc.

TOPOLOGY:
Setup Console and Ethernet connectivity for the lab as below:

TASK:
 Establish console connectivity
 Access router via console with an emulation software
 Get to know Cisco IOS Modes and Show commands
 Configure Hostname and Interface IP address
 Configure Connectivity Passwords
 Configure Privilege Mode / Enable Password
 Verify configuration in RAM and NVRAM
 Saving configuration to the router
 Access the router via Telnet
Establish console connectivity

Establish console connectivity by connecting Router console port to PC Com Port with console cable
as shown in the picture below:

Access router via console with an emulation software

Configure the following parameters in emulation software for accessing router via console port.

Parameters Console Port Settings

Baud 9600

Data bits 8

Parity None

Stop bits 1
Accessing router via console from Microsoft Windows Computer
 Start a terminal emulator application, such as PUTTY.exe
 Select Serial option and set speed to 9600.
 Click Open

 Once emulation software is ready, Power-ON the Router.

Accessing router via console from Linux Computer


 From the terminal enter the below command
# minicom –s
 Select Serial port Setup and press enter

 It will display default COM Port Settings.


 Specify COM Port where console cable is connected by pressing "a" and use backspace to delete
"1" and add "0".

 Change the Bps Setting to 9600 by pressing "e" and select the alphabet matching to
speed "9600".
 Change the Hardware Flow Control option to No by pressing "F".

 Select Save Setup as dfl option.


 Select "Exit" option.

 Once emulation software is ready, Power-ON the Router.

Get to know Cisco IOS Modes and Show commands

After the Router boots-up completely, (on a new Cisco Router) it enters setup mode as below:

--- System Configuration Dialog ---


Would you like to enter the initial configuration dialog? [yes/no]: no
Would you like to terminate autoinstall? [yes]: yes

If you choose “Yes”, IOS will prompt questions to gather the information to configure the Router, it is
recommended to choose “no”, since we can configure the Router using IOS commands

Router >

To navigate into Privilege mode/Executive Mode from User Mode and Vice-Versa
Router>enable
Router #

Router# disable
Router >
To view router IOS and hardware information
Router # show version
Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 15.1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Tue 24-Mar-15 09:00 by prod_rel_team

ROM: System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)

Router uptime is 56 minutes


System returned to ROM by reload at 08:19:55 UTC Sat Jul 9 2016
System image file is "flash:c2800nm-adventerprisek9-mz.151-4.M10.bin"
Last reload type: Normal Reload

This product contains cryptographic features and is subject to United


States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be for:


http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to


export@cisco.com.

Cisco 2811 (revision 1.0) with 249856K/12288K bytes of memory.


Processor board ID FHK1109F34X
2 FastEthernet interfaces
2 Serial(sync/async) interfaces
1 Virtual Private Network (VPN) Module
DRAM configuration is 64 bits wide with parity enabled.
239K bytes of non-volatile configuration memory.
125440K bytes of ATA CompactFlash (Read/Write)

License Info:
License UDI:
-------------------------------------------------
Device# PID SN
-------------------------------------------------
*0 CISCO2811 FHK1109F34X

Configuration register is 0x2102

Router#
To view router flash Information
Router # show flash
-#- ---length--- -----date/time------ path
1 1 Jan 1 2016 13:54:52 +00:00 redirect.out
2 67926080 Sep 5 2015 14:59:38 +00:00 c2800nm-adventerprisek9-mz.151n

60235776 bytes available (67932160 bytes used)

To view router current configuration (RAM)


Router # show running-config
Current configuration : 1010 bytes
!
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
no aaa new-model!
dot11 syslog
ip source-route!
ip cef
!
no ipv6 cef
!
multilink bundle-name authenticated!
!
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
control-plane
!
mgcp profile default
line con 0
line aux 0
line vty 0 4
login
transport input all
!
scheduler allocate 20000 1000
end

Router#

To view router startup configuration (NVRAM)


Router# show startup-config
startup-config is not present

To navigate into Global Configuration Mode


Router # configure terminal
Router (config) #

Configure Hostname and Interface IP address

To change the Host Name of Router


Router (config) # hostname HYD-1
HYD-1 (config) #
To configure IP address on Ethernet Interface (LAN interface)
HYD-1 (config) # interface Fastethernet 0/0
HYD-1 (config-if) # ip address 192.168.202.1 255.255.255.0
HYD-1 (config-if) # no shutdown
HYD-1 (config-if) # exit
Configure Connectivity Passwords

To configure telnet password


HYD-1 (config) # line vty 0 4
HYD-1 (config-line) # password zoom
HYD-1 (config-line) # login
HYD-1 (config-line) # exit

To configure console password


HYD-1 (config) # line console 0
HYD-1 (config-line) # password ccna
HYD-1 (config-line) # login
HYD-1 (config-line) # exit

To configure auxiliary password


HYD-1 (config) # line aux 0
HYD-1 (config-line) # password cisco
HYD-1 (config-line) # login
HYD-1 (config-line) # exit

Configure Privilege Mode / Enable Password

Configure privilege password


HYD-1 (config) # enable password ccna
HYD-1 (config) # enable secret zoom

Verify configuration in RAM and NVRAM

To View Router Current Configuration (RAM)


HYD-1 # show running-config

Current configuration : 1241 bytes


!
Last configuration change at 08:37:39 UTC Sat Jul 9 2016
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$DMgk$lTC7TUZVwFn5969wEB2mw.
enable password ccna
!
no aaa new-model
!
dot11 syslog
ip source-route
!
ip cef
!
no ipv6 cef
!
multilink bundle-name authenticated
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
no ip http server
no ip http secure-server!
control-plane
!
mgcp profile default
!
!
!
!
!
!
line con 0
password ccna
login
line aux 0
password cisco
login
line vty 0 4
password zoom
login
transport input all
!
scheduler allocate 20000 1000
end

To View Router Startup Configuration (NVRAM)


HYD-1 # show startup-config
startup-config is not present

Saving configuration to the router

To save configuration on router


HYD-1 # write memory
Destination filename [startup-config]?
Building configuration...

[OK]
HYD-1 #

To view router startup configuration (NVRAM)


HYD-1 # show startup-config
Current configuration : 1241 bytes
!
Last configuration change at 08:40:39 UTC Sat Jul 9 2016
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$DMgk$lTC7TUZVwFn5969wEB2mw.
enable password ccna
!
no aaa new-model
!
dot11 syslog
ip source-route
!
ip cef
!
no ipv6 cef
!
multilink bundle-name authenticated
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
!
interface Serial0/0/1
no ip address
shutdown
!
!
ip forward-protocol nd
no ip http server
no ip http secure-server!
control-plane
!
!
mgcp profile default!
!
line con 0
password ccna
login
line aux 0
password cisco
login
line vty 0 4
password zoom
login
transport input all
!
scheduler allocate 20000 1000
end

Access the router via Telnet


 Accessing router via telnet by giving below command on a Windows or Linux computer.
telnet 192.168.202.1
Access router via GUI

HYD-1 (config)# ip http server


HYD-1 (config)# ip http secure-server
HYD-1 (config)# ip http authentication local
HYD-1 (config)# username admin privilege 15 password admin

verification

HYD-1#sh running-config
Building configuration...
Current configuration : 3124 bytes
!
! Last configuration change at 00:04:44 UTC Sat Jan 1 2000
!
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
no logging console
enable secret 5 $1$WpS0$HImO.1GPb85gjNJYwKySR/
enable password ccna
!
no aaa new-model
!
!
dot11 syslog
ip source-route
no ip routing
!
!
no ip cef
!
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
!
voice-card 0
!
!
crypto pki trustpoint TP-self-signed-1843470639
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1843470639
revocation-check none
rsakeypair TP-self-signed-1843470639
!
!
crypto pki certificate chain TP-self-signed-1843470639
certificate self-signed 01
quit
!
!
license udi pid CISCO2811 sn FCZ1244726T
username admin privilege 15 password 0 admin
!
redundancy
interface Loopback1
ip address 8.8.8.8 255.0.0.0
no ip route-cache
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
no ip route-cache
duplex auto
speed auto
ipv6 address 2001:1111::/64
ipv6 address 2001:1111::1/64
interface FastEthernet0/1
no ip address
no ip route-cache
duplex auto
speed auto
ipv6 address 2001:5555::1/64
interface Serial0/0/0
ip address 172.17.0.1 255.255.0.0
no ip route-cache
clock rate 64000
interface Serial0/0/1
ip address 172.16.0.2 255.255.0.0
no ip route-cache
clock rate 64000
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
control-plane

line con 0
password zoom
login
line aux 0
password zoom
login
line vty 0 4
password zoom
login
transport input all
!
scheduler allocate 20000 1000
HYD-1#

Accessing router via GUI CCP


Lab 4: Initial Configuration of Router – IPv6 Network

OBJECTIVE:
To get familiarized with Cisco IOS modes and configure a new Router with basic configuration i.e.
assign IPv6 address on the interfaces and configure passwords etc.

TOPOLOGY:
Setup Console and Ethernet connectivity for the lab as below:

TASK:
 Establish console connectivity
 Access router via console with an emulation software
 Get to know Cisco IOS Modes and Show commands
 Configure Hostname and Interface IP address
 Configure Connectivity Passwords
 Configure Privilege Mode / Enable Password
 Verify configuration in RAM and NVRAM
 Saving configuration to the router
 Access the router via Telnet
Establish console connectivity

Refer page no. 36 for how to establish console connectivity.

Access router via console with an emulation software

Refer page no. 36 for accessing Router via console port.

Get to know Cisco IOS Modes and Show commands

After the Router boots-up completely, (on a new Cisco Router) it enters setup mode as below:

--- System Configuration Dialog ---


Would you like to enter the initial configuration dialog? [yes/no]: no
Would you like to terminate autoinstall? [yes]: yes

If you choose “Yes”, IOS will prompt questions to gather the information to configure the Router, it is
recommended to choose “no”, since we can configure the Router using IOS commands

Router >

To navigate into Privilege mode/Executive Mode from User Mode and Vice-Versa
Router>enable
Router #

Router# disable
Router >

To view router IOS and hardware information


Router # show version
Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 15.1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Tue 24-Mar-15 09:00 by prod_rel_team

ROM: System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)

Router uptime is 56 minutes


System returned to ROM by reload at 08:19:55 UTC Sat Jul 9 2016
System image file is "flash:c2800nm-adventerprisek9-mz.151-4.M10.bin"
Last reload type: Normal Reload
This product contains cryptographic features and is subject to United States and local country laws
governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption. Importers, exporters,
distributors and users are responsible for compliance with U.S. and local country laws. By using this
product you agree to comply with applicable laws and regulations. If you are unable to comply with
U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be fou:


http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to


export@cisco.com.

Cisco 2811 (revision 1.0) with 249856K/12288K bytes of memory.


Processor board ID FHK1109F34X
2 FastEthernet interfaces
2 Serial (sync/async) interfaces
1 Virtual Private Network (VPN) Module
DRAM configuration is 64 bits wide with parity enabled.
239K bytes of non-volatile configuration memory.
125440K bytes of ATA CompactFlash (Read/Write)

License Info:
License UDI:
-------------------------------------------------
Device# PID SN
-------------------------------------------------
*0 CISCO2811 FHK1109F34X

Configuration register is 0x2102

Router#

To view router flash Information


Router # show flash
-#- ---length--- -----date/time------ path
1 1 Jan 1 2016 13:54:52 +00:00 redirect.out
2 67926080 Sep 5 2015 14:59:38 +00:00 c2800nm-adventerprisek9-mz.151n

60235776 bytes available (67932160 bytes used)


To view router current configuration (RAM)
Router # show running-config
Current configuration: 1010 bytes
!
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
no aaa new-model!
dot11 syslog
ip source-route!
ip cef
!
no ipv6 cef
!
multilink bundle-name authenticated!
!
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
control-plane
!
mgcp profile default
line con 0
line aux 0
line vty 0 4
login
transport input all
!
scheduler allocate 20000 1000
end

Router#

To view router startup configuration (NVRAM)


Router# show startup-config
startup-config is not present

To navigate into Global Configuration Mode


Router # configure terminal
Router (config) #

Configure Hostname and Interface IPv6 address

To change the Host Name of Router


Router (config) # hostname HYD-1
HYD-1 (config) #

To configure IPv6 address on Ethernet Interface (LAN interface)


HYD-1 (config) # interface Fastethernet 0/0
HYD-1 (config-if) # ipv6 address 2001:1111::1/64
HYD-1 (config-if) # no shutdown
HYD-1 (config-if) # exit

Configure Connectivity Passwords

To configure telnet password


HYD-1 (config) # line vty 0 4
HYD-1 (config-line) # password zoom
HYD-1 (config-line) # login
HYD-1 (config-line) # exit
To configure console password
HYD-1 (config) # line console 0
HYD-1 (config-line) # password ccna
HYD-1 (config-line) # login
HYD-1 (config-line) # exit

To configure auxiliary password


HYD-1 (config) # line aux 0
HYD-1 (config-line) # password cisco
HYD-1 (config-line) # login
HYD-1 (config-line) # exit

Configure Privilege Mode / Enable Password

Configure privilege password


HYD-1 (config) # enable password ccna
HYD-1 (config) # enable secret zoom

Verify configuration in RAM and NVRAM

To View Router Current Configuration (RAM)


HYD-1 # show running-config

Current configuration : 1241 bytes


!
Last configuration change at 08:37:39 UTC Sat Jul 9 2016
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$DMgk$lTC7TUZVwFn5969wEB2mw.
enable password ccna
!
no aaa new-model
!
dot11 syslog
ip source-route
!
ip cef
!
multilink bundle-name authenticated
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
ip address ipv6 address 2001:1111::1/64
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
ip forward-protocol nd
no ip http server
no ip http secure-server!
control-plane
!
mgcp profile default
!
line con 0
password ccna
login
line aux 0
password cisco
login
line vty 0 4
password zoom
login
transport input all
!
scheduler allocate 20000 1000
end
To View Router Startup Configuration (NVRAM)
HYD-1 # show startup-config
startup-config is not present

Saving configuration to the router

To save configuration on router


HYD-1 # copy running-config startup-config
Destination filename [startup-config]?
Building configuration...

[OK]
HYD-1 #

To view router startup configuration (NVRAM)


HYD-1 # show startup-config
Current configuration: 1241 bytes
!
Last configuration change at 08:40:39 UTC Sat Jul 9 2016
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$DMgk$lTC7TUZVwFn5969wEB2mw.
enable password ccna
!
no aaa new-model
!
dot11 syslog
ip source-route
!
ip cef
!
no ipv6 cef
!
multilink bundle-name authenticated
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
ip address ipv6 address 2001:1111::1/64
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
ip forward-protocol nd
no ip http server
no ip http secure-server!
control-plane
!
mgcp profile default!
!
line con 0
password ccna
login
line aux 0
password cisco
login
line vty 0 4
password zoom
login
transport input all
!
scheduler allocate 20000 1000
end
Access the router via Telnet
 Accessing router via telnet by giving below command on a Windows or Linux computer.
telnet 2001:1111::1

Microsoft Windows [Version 6.2.9200]


(c) 2012 Microsoft Corporation. All rights reserved.
C:\> telnet 2001:1111::1
Trying 2001:1111::1...
Connected to 2001:1111::1.
Escape character is '^]'.

User Access Verification

Password:
HYD-1>enable
Password:
HYD-1#
Lab 5: Basic Router Security

OBJECTIVE:
To enhance router security by encrypting all passwords, configure banners, exec-timeouts on router.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

Pre-requisite: Initial configuration to be done on the router (LAB – 3)

TASKS:
 Access router via Telnet
 Encrypt all clear text passwords on the router.
 Configure Warning Banner
 Configure unattended (idle-timeout) session timeout for VTY access
Access router via Telnet
 Access router via telnet by giving below command on a Windows or Linux computer.
telnet 192.168.202.1

Encrypt all clear text passwords on the router

Verify router's existing configuration


All password is in clear text except enable secret password
HYD-1 # sh running-config
Current configuration : 1241 bytes
!
Last configuration change at 08:37:39 UTC Sat Jul 9 2016
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$DMgk$lTC7TUZVwFn5969wEB2mw.
enable password ccna
!
no aaa new-model
!
dot11 syslog
ip source-route
!
ip cef
!
multilink bundle-name authenticated
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
no ip http server
no ip http secure-server!
control-plane
!
mgcp profile default
!
line con 0
password ccna
login
line aux 0
password cisco
login
line vty 0 4
password zoom
login
transport input all
!
scheduler allocate 20000 1000
end

HYD-1 #
Encrypt all clear text passwords
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # service password-encryption
HYD-1 (config) # end

Verification:

Now previously visible passwords are encrypted

HYD-1 # sh running-config
Building configuration...
Current configuration: 1241 bytes
!
Last configuration change at 08:37:39 UTC Sat Jul 9 2016
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$DMgk$lTC7TUZVwFn5969wEB2mw.
enable password 7 045802150C2E
!
no aaa new-model
!
dot11 syslog
ip source-route
!
ip cef
!
multilink bundle-name authenticated
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
no ip http server
no ip http secure-server!
control-plane
!
mgcp profile default
!
line con 0
password 7 141411050D
login
line aux 0
password 7 030752180500
login
line vty 0 4
password 7 0109090B56
login
transport input all
!
scheduler allocate 20000 1000
end
HYD-1 #

Configure Warning Banner

Configure a warning message to display prior to login.


HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # banner motd $
Enter TEXT message. End with the character '$'.
=======================================================================
UNAUTHORISED ACCESS STRICTLY PROHIBITED AND
PROSECUTED TO THE FULL EXTENT OF THE LAW
=======================================================================$
Verification:
Now open a new telnet session from your computer to the router to verify the banner configured.
i.e. telnet 192.168.202.1

Configure unattended (idle-timeout) session timeout for VTY access


By default unattended session time-out is 10 minutes. We reducing the unattended session timeout
to 1 minute 00 seconds.
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # line vty 0 4
HYD-1 (config-line) # exec-timeout 1 00
HYD-1 (config-line) # end

Verification:
Now open a new telnet session from your computer to the router (get into privilege mode) and leave
the session open without performing any action or modification for 1 minute. Session will be
automatically disconnected after the session time-out has been reached.
Lab 6: WAN Configuration – Serial Interface (IPv4)

OBJECTIVE:
To configure and troubleshoot a Serial Interface.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

TASK:
 Identify Serial Interface as DCE or DTE
 Configure Serial Interface
 Verify Serial Interface Configuration
 Troubleshooting Serial Interface
Identify Serial Interface as DCE or DTE

Example - HYD-1

Identify DCE / DTE interface on HYD-1


HYD-1 # show controllers serial 0/0/0
Interface Serial0/0/0
Hardware is GT96K
DTE V.35
idb at 0x48C78680, driver data structure at 0x48C7FC80
wic_info 0x48C802AC
Physical Port 1, SCC Num 1
!
<output omitted>
!

HYD-1 # show controllers serial 0/0/1


Interface Serial0/0/1
Hardware is GT96K
DCE V.35, no clock
idb at 0x48C82750, driver data structure at 0x48C89F94
wic_info 0x48C8A5C0
Physical Port 0, SCC Num 0
!
<output omitted>
!

Verify Serial Interface existing status


HYD-1 # show interface serial 0/0/0
Serial0/0/0 is administratively down, line protocol is down
Hardware is GT96K Serial
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
!
<output omitted>
!

HYD-1 # show interface serial 0/0/1


Serial0/0/1 is administratively down, line protocol is down
Hardware is GT96K Serial
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
!
<output omitted>
!
Verify HYD-1's existing configuration
HYD-1 # show running-config
Building configuration...
Current configuration : 1210 bytes
hostname HYD-1
!
<output omitted>
!
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
!
interface Serial0/0/1
no ip address
shutdown
!
<output omitted>
!
end

HYD-1 #

Repeat the above commands on CHE and BAN routers.

Configure Serial Interface

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config)# interface serial 0/0
CHE (config-if)# ip address 172.16.0.1 255.255.0.0
CHE (config-if)# no shutdown
CHE (config-if)# clock rate 64000
CHE (config-if)# encapsulation hdlc
CHE (config-if)# exit
CHE (config)#
CHE (config)# interface serial 0/1
CHE (config-if)# ip address 172.18.0.2 255.255.0.0
CHE (config-if)# no shutdown
CHE (config-if)# encapsulation hdlc
CHE (config-if)# exit
CHE (config)# exit

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config)# interface serial 0/0/0
HYD-1 (config-if)# ip address 172.17.0.1 255.255.0.0
HYD-1 (config-if)# no shutdown
HYD-1 (config-if)# clock rate 64000
HYD-1 (config-if)# encapsulation hdlc
HYD-1 (config-if)# exit
HYD-1 (config)#

HYD-1 (config)# interface serial 0/0/1


HYD-1 (config-if)# ip address 172.16.0.2 255.255.0.0
HYD-1 (config-if)# no shutdown
HYD-1 (config-if)# encapsulation hdlc
HYD-1 (config-if)# exit
HYD-1 (config)# exit

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config)# interface serial 0/0
BAN (config-if)# ip address 172.18.0.1 255.255.0.0
BAN (config-if)# no shutdown
BAN (config-if)# clock rate 64000
BAN (config-if)# encapsulation hdlc
BAN (config-if)# exit
BAN (config)#

BAN (config)# interface serial 0/1


BAN (config-if)# ip address 172.17.0.2 255.255.0.0
BAN (config-if)# no shutdown
BAN (config-if)# encapsulation hdlc
BAN (config-if)# exit
BAN (config)# exit
Verify Serial Interface Configuration

CHE – Verification
CHE # show interface serial 0/0
Serial0/0 is up, line protocol is up
Hardware is PowerQUICC Serial
Internet address is 172.16.0.1/16
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
!
<output omitted>
!

CHE# show interface serial 0/1


Serial0/1 is up, line protocol is up
Hardware is PowerQUICC Serial
Internet address is 172.18.0.2/16
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
!
<output omitted>
!

HYD-1 – Verification:

HYD-1 # show interface serial 0/0/0


Serial0/0/0 is up, line protocol is up
Hardware is GT96K Serial
Internet address is 172.17.0.1/16
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
!
<output omitted>

HYD-1 # show interface serial 0/0/1


Serial0/0/1 is up, line protocol is up
Hardware is GT96K Serial
Internet address is 172.16.0.2/16
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
!
<output omitted>
BAN – Verification:

BAN # show interface serial 0/0


Serial0/0 is up, line protocol is up
Hardware is PowerQUICC Serial
Internet address is 172.18.0.1/16
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
!
<output omitted>
!

BAN # show interface serial 0/1


Serial0/1 is up, line protocol is up
Hardware is PowerQUICC Serial
Internet address is 172.17.0.2/16
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
!
<output omitted>
!

Troubleshooting Serial Interface

From the output, the first line indicates the status of the Serial interface. There are 4 possible states:
1. Serial 0/0 is up , line protocol is up
Layer 1 and Layer 2 Connectivity and configuration is fine
2. Serial 0/0 is administratively down, line protocol is down
‘No Shutdown’ has to be given on the local Router’s Serial interface
3. Serial 0/0 is up, line protocol is down
Encapsulation mismatch or clock rate has not been given on the DCE interface or Lease Line
problem
4. Serial 0/0 is down, line protocol is down
Problem with the v.35 cable, CSU/DSU or ‘no shutdown’ has not been given on the remote
Router
Lab 7: WAN Configuration – Ethernet Interface (IPv4)

OBJECTIVE:
To configure and troubleshoot an Ethernet Interface.

TOPOLOGY:
Setup Ethernet Connectivity for the lab as below:

TASK:
 Configure Ethernet Interface
 Verify Ethernet Interface Configuration
 Troubleshooting Ethernet Interface

Configure Ethernet Interface

Configuration Hyd-1 Router


HYD-1(Config)#interface fastethernet 0/1
HYD-1(Config-if)#ip address 172.16.0.1 255.255.0.0
HYD-1(Config-if)#no shutdown
HYD-1(Config-if)#exit
HYD-1(Config)#
Hyd-1(config)#exit
Hyd-1#

Configure Hyd-2 Router

Hyd-2(config)#Inerface fastethernet 0/1


Hyd-2(config-if)#ip address 172.16.0.2 255.255.0.0
Hyd-2(config-if)#no shutdown
Hyd-2(config)#exit
Hyd-2(config)#exit
Hyd-2#

Verify Ethernet Interface Configuration

Verification:

To verify ethernet as wan In Hyd-1 Router


Hyd-1#show interface fastethernet 0/1
FastEthernet0/1 is up, line protocol is up
Hardware is MV96340 Ethernet, address is 0023.04e6.a7c1 (bia 0023.04e6.a7c1)
Internet address is 172.16.0.1/16
Input
--More--

To verify ethernet as wan In Hyd-2 Router

HYD-2#show interfaces fastEthernet 0/1


FastEthernet0/1 is up, line protocol is up
Hardware is MV96340 Ethernet, address is 001e.be4f.7131 (bia 001e.be4f.7131)
Internet address is 172.16.0.2/16
s, 0 collisions, 1 interface resets
--More--
To very all interface at a time
HYD-1#show ip interface brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.202.1 YES NVRAM up up
FastEthernet0/1 172.16.0.1 YES manual up up
Serial0/0/0 unassigned YES manual administratively down down
Serial0/0/1 unassigned YES manual administratively down down
HYD-1#

HYD-2#show ip interface brief


Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.205.1 YES manual up up
FastEthernet0/1 172.16.0.2 YES manual up up
Serial0/0/0 unassigned YES manual administratively down down
Serial0/0/1 unassigned YES manual administratively down down
HYD-2#
Troubleshooting Ethernet Interface

From the output, the first line indicates the status of the Ethernet interface. There are 4 possible
states:
1. Fastethernet 0/0 is up , line protocol is up
Layer 1 and Layer 2 Connectivity and configuration is fine
2. Fastethernet 0/0 is administratively down, line protocol is down
‘No Shutdown’ has to be given on the local Ethernet interface
3. Fastethernet 0/0 is up, line protocol is down
Speed & Duplex Mismatch or ‘No Shutdown’ has not been given on the remote device ethernet
interface.
4. Fastethernet 0/0 is down, line protocol is down
Layer 1 problem - No device attached or faulty cable.
Lab 8: WAN Configuration – Ethernet Interface (IPv6)

OBJECTIVE:
To configure and troubleshoot an Ethernet Interface.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

TASK:
 Verify Ethernet Interface existing status
 Configure Ethernet Interface with IPv6 address
 Verify IPv6 Address Configuration on Ethernet Interface
 Troubleshooting Ethernet Interface
Verify Ethernet Interface existing status
HYD-1 # show interface fastethernet 0/1
FastEthernet0/ is administratively down, line protocol is down
Hardware is MV96340 Ethernet, address is 0017.9460.c209 (bia 0017.9460.c209)
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full-duplex, 100Mb/s, 100BaseTX/FX
!
<output omitted>
!

Verify HYD-1's existing configuration


HYD-1 # show running-config
Building configuration...
Current configuration : 1210 bytes
hostname HYD-1
!
<output omitted>
!
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
ip address ipv6 address 2001:1111::1/64
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
ip address 172.17.0.1 255.255.0.0
!
interface Serial0/0/1
ip address 172.16.0.2 255.255.0.0
!
<output omitted>
!
end

HYD-1 #

Repeat the above commands on HYD-2 router.


Configure Ethernet Interface with IPv6 address

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config)# interface fastethernet 0/1
HYD-1 (config-if)# ipv6 address 2001:5555::1/64
HYD-1 (config-if)# no shutdown
HYD-1 (config-if)# exit
HYD-1 (config)#

HYD-2 – Configuration
HYD-2 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-2 (config)# interface fastethernet 0/1
HYD-2 (config-if)# ipv6 address 2001:5555::2/64
HYD-2 (config-if)# no shutdown
HYD-2 (config-if)# exit
HYD-2 (config)#

Verify IPv6 Address Configuration on Ethernet Interface

HYD-1 – Verification
HYD-1 # show ipv6 interface fastethernet 0/1
FastEthernet0/1 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::21B:D4FF:FE3D:B279
Global unicast address(es):
2001:5555::1, subnet is 2001:5555::/64
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF00:1
FF02::1:FF3D:B279
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds
Default router is FE80::217:94FF:FE60:C209 on FastEthernet0/1
HYD-1#
HYD-2 – Verification
HYD-2 # show ipv6 interface fastethernet 0/1
FastEthernet0/1 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::217:94FF:FE60:C209
Global unicast address(es):
2001:5555::2, subnet is 2001:5555::/64
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF00:2
FF02::1:FF3D:B279
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds
Default router is FE80::21B:D4FF:FE3D:B279 on FastEthernet0/1
HYD-2#

Troubleshooting Ethernet Interface

From the output, the first line indicates the status of the Ethernet interface. There are 4 possible
states:
5. Fastethernet 0/0 is up , line protocol is up
Layer 1 and Layer 2 Connectivity and configuration is fine
6. Fastethernet 0/0 is administratively down, line protocol is down
‘No Shutdown’ has to be given on the local Ethernet interface
7. Fastethernet 0/0 is up, line protocol is down
Speed & Duplex Mismatch or ‘No Shutdown’ has not been given on the remote device ethernet
interface.
8. Fastethernet 0/0 is down, line protocol is down
Layer 1 problem - No device attached or faulty cable.
Lab 9: Static Routing on IPv4 Network

OBJECTIVE:
To configure Static Routing on IPv4 Network for enabling communication between different networks
connected to different routers. To set up static routes on CHE, HYD-1, BAN to connect to each other's
local networks.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

Pre-requisite: WAN Interface configuration to be done on the router

TASK:
 Enabling IPv4 Routing
 Verify IPv4 Routing Table
 Configure Static Routing on IPv4 Network
 Verify Static Routing on IPv4 Network
 Verify communication between the IPv4 networks.
Enabling IPv4 Routing

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip routing
CHE (config) #

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip routing
HYD-1 (config) #

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config) # ip routing
BAN (config) #

Note: Once routing is enabled the directly connected networks are automatically added into the
routing information table. “C" represents directly connected networks. The IPv4 Network is
learnt through the local Interface of the router.

Verify IPv4 Routing Table


CHE – Verification:

CHE # show ip route


Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 172.16.0.0/16 is directly connected, Serial0/0


C 172.18.0.0/16 is directly connected, Serial0/1
C 192.168.201.0/24 is directly connected, FastEthernet0/0
CHE #
HYD-1 – Verification:

HYD-1 # show ip route


Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override

Gateway of last resort is not set

192.168.202.0/24 is variably subnetted, 2 subnets, 2 masks


C 192.168.202.0/24 is directly connected, FastEthernet0/0
L 10.0.0.1/32 is directly connected, FastEthernet0/0
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.16.0.0/16 is directly connected, Serial0/0/1
L 172.16.0.2/32 is directly connected, Serial0/0/1
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.0.0/16 is directly connected, Serial0/0/0
L 172.17.0.1/32 is directly connected, Serial0/0/0
HYD-1 #

BAN – Verification:

BAN # show ip route


Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

C 172.17.0.0/16 is directly connected, Serial0/1


C 172.18.0.0/16 is directly connected, Serial0/0
C 192.168.203.0/24 is directly connected, FastEthernet0/0
BAN #
Configure Static Routing on IPv4 Network

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip route 192.168.202.0 255.255.255.0 172.16.0.2
CHE (config) # ip route 192.168.203.0 255.255.255.0 172.18.0.1
CHE (config) # exit
CHE #

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip route 192.168.201.0 255.255.255.0 172.16.0.1
HYD-1 (config) # ip route 192.168.203.0 255.255.255.0 172.17.0.2
HYD-1 (config) # exit
HYD-1 #

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config) # ip route 192.168.202.0 255.255.255.0 172.17.0.1
BAN (config) # ip route 192.168.201.0 255.255.255.0 172.18.0.2
BAN (config) # exit
BAN #

Verify Static Routing on IPv4 Network


Once Static routing is enabled, the IPv4 Networks defined with the Static routing command are
added into the routing information table. “S” represents Static route.
CHE – Verification:

CHE # show ip route

Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP


D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 172.16.0.0/16 is directly connected, Serial0/0


C 172.18.0.0/16 is directly connected, Serial0/1
S 192.168.202.0/24 [1/0] via 172.16.0.2
C 192.168.201.0/24 is directly connected, FastEthernet0/0
S 192.168.203.0/24 [1/0] via 172.18.0.1
CHE #

HYD-1 – Verification:

HYD-1 # show ip route


Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override

Gateway of last resort is not set

192.168.202.0/24 is variably subnetted, 2 subnets, 2 masks


C 192.168.202.0/24 is directly connected, FastEthernet0/0
L 192.168.202.1/32 is directly connected, FastEthernet0/0
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.16.0.0/16 is directly connected, Serial0/0/1
L 172.16.0.2/32 is directly connected, Serial0/0/1
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.0.0/16 is directly connected, Serial0/0/0
L 172.17.0.1/32 is directly connected, Serial0/0/0
S 192.168.201.0/24 [1/0] via 172.16.0.1
S 192.168.203.0/24 [1/0] via 172.17.0.2
HYD-1 #

BAN – Verification:

BAN # show ip route


Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

C 172.17.0.0/16 is directly connected, Serial0/1


C 172.18.0.0/16 is directly connected, Serial0/0
S 192.168.202.0/24 [1/0] via 172.17.0.1
S 192.168.201.0/24 [1/0] via 172.18.0.2
C 192.168.203.0/24 is directly connected, FastEthernet0/0
BAN #
Verify communication between the IPv4 networks

Verification from a Computer in HYD-1 Network

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Repeat the above ping verification from a computer in CHE and BAN Network.

From a Computer in HYD-1 Network trace communication path to a Computer in CHE Network

tracert 192.168.201.10 (Windows) or traceroute 192.168.201.10 (Linux)


traceroute to 192.168.201.10 (192.168.201.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.16.0.1 (172.16.0.1) 2.295 ms 2.156 ms 2.209 ms
3 192.168.201.10 (192.168.202.10) 3.295 ms 3.156 ms 3.209 ms

From a Computer in HYD-1 Network trace communication path to a Computer in BAN Network

tracert 192.168.203.10 (Windows) or traceroute 192.168.203.10 (Linux)


traceroute to 192.168.203.10 (192.168.203.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.17.0.2 (172.17.0.2) 2.295 ms 2.156 ms 2.209 ms
3 192.168.203.10 (192.168.203.10) 3.295 ms 3.156 ms 3.209 ms

Repeat the above trace communication path from a computer in CHE and BAN Network.
Lab 10: Static Routing on IPv4 Network via exit Interface

OBJECTIVE:

To configure Static Routing on IPv4 Network for enabling communication between different networks
connected to different routers. To set up static routes on CHE, HYD-1, BAN to connect to each other's
local networks.

TOPOLOGY:

Setup Ethernet and Serial connectivity for the lab as below:

Pre-requisite: WAN Interface configuration to be done on the router

TASK:
• Enabling IPv4 Routing
• Verify IPv4 Routing Table
• Configure Static Routing on IPv4 Network
• Verify Static Routing on IPv4 Network
Enabling IPv4 Routing

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip routing
CHE (config) #

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip routing
HYD-1 (config) #

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config) # ip routing
BAN (config) #

Note: Once routing is enabled the directly connected networks are automatically added into the
routing information table. “C" represents directly connected networks. The IPv4 Network is
learnt through the local Interface of the router.

Verify IPv4 Routing Table


CHE – Verification:

CHE # show ip route


Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 172.16.0.0/16 is directly connected, Serial0/0


C 172.18.0.0/16 is directly connected, Serial0/1
C 192.168.201.0/24 is directly connected, FastEthernet0/0
CHE #

HYD-1 – Verification:
HYD-1 # show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override

Gateway of last resort is not set

192.168.202.0/24 is variably subnetted, 2 subnets, 2 masks


C 192.168.202.0/24 is directly connected, FastEthernet0/0
L 10.0.0.1/32 is directly connected, FastEthernet0/0
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.16.0.0/16 is directly connected, Serial0/0/1
L 172.16.0.2/32 is directly connected, Serial0/0/1
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.0.0/16 is directly connected, Serial0/0/0
L 172.17.0.1/32 is directly connected, Serial0/0/0
HYD-1 #

BAN – Verification:

BAN # show ip route


Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

C 172.17.0.0/16 is directly connected, Serial0/1


C 172.18.0.0/16 is directly connected, Serial0/0
C 192.168.203.0/24 is directly connected, FastEthernet0/0
BAN #
Configure Static Routing on IPv4 Network

CHE-Configuration
CHE(config)#ip route 192.168.202.0 255.255.255.0 serial 0/0
CHE(config)#ip route 192.168.203.0 255.255.255.0 serial 0/1

HYD-1-Configuration
HYD-1(config)#ip route 192.168.201.0 255.255.255.0 Serial0/0/1
HYD-1(config )#ip route 192.168.203.0 255.255.255.0 Serial0/0/0

BANG-Configuration
BANG(config)#ip route 192.168.202.0 255.255.255.0 Serial0/1
BANG(config)#ip route 192.168.201.0 255.255.255.0 Serial0/0

Verify Static Routing on IPv4 Network

CHE-Verification
CHE#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 172.16.0.0/16 is directly connected, Serial0/0
C 172.18.0.0/16 is directly connected, Serial0/1
C 192.168.201.0/24 is directly connected, FastEthernet0/0
S 192.168.202.0/24 is directly connected, Serial0/0
S 192.168.203.0/24 is directly connected, Serial0/1

CHE#
Hyd-1-Verification
HYD-1#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 172.16.0.0/16 is directly connected, Serial0/0/1


C 172.17.0.0/16 is directly connected, Serial0/0/0
S 192.168.201.0/24 is directly connected, Serial0/0/1
C 192.168.202.0/24 is directly connected, FastEthernet0/0
S 192.168.203.0/24 is directly connected, Serial0/0/0
HYD-1#

BANG-verification
BANG#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
C 172.17.0.0/16 is directly connected, Serial0/1
C 172.18.0.0/16 is directly connected, Serial0/0
S 192.168.201.0/24 is directly connected, Serial0/0
S 192.168.202.0/24 is directly connected, Serial0/1
C 192.168.203.0/24 is directly connected, FastEthernet0/0
BANG#

Verify communication between the IPv4 networks


Verification from a Computer in HYD-1 Network

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Repeat the above ping verification from a computer in CHE and BAN Network.

From a Computer in HYD-1 Network trace communication path to a Computer in CHE Network

tracert 192.168.201.10 (Windows) or traceroute 192.168.201.10 (Linux)


traceroute to 192.168.201.10 (192.168.201.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.16.0.1 (172.16.0.1) 2.295 ms 2.156 ms 2.209 ms
3 192.168.201.10 (192.168.202.10) 3.295 ms 3.156 ms 3.209 ms
From a Computer in HYD-1 Network trace communication path to Computer in BAN Network

tracert 192.168.203.10 (Windows) or traceroute 192.168.203.10 (Linux)


traceroute to 192.168.203.10 (192.168.203.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.17.0.2 (172.17.0.2) 2.295 ms 2.156 ms 2.209 ms
3 192.168.203.10 (192.168.203.10) 3.295 ms 3.156 ms 3.209 ms

Repeat the above trace communication path from a computer in CHE and BAN Network.
Lab 11: Static Routing on IPv6 Network

OBJECTIVE:
To configure Static Routing on IPv6 Network for enabling communication between different networks
connected to different routers. To set up static routes on HYD-1 and HYD-2 to connect to each other's
local networks.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

Pre-requisite: WAN Interface configuration to be done on the router (LAB – 7)

TASK:
 Enabling IPv6 Routing
 Verify IPv6 Routing Table
 Configure Static Routing on IPv6 Network
 Verify Static Routing on IPv6 Network
 Verify communication between the IPv6 networks.
Enabling IPv6 Routing

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ipv6 unicast-routing
HYD-1 (config) #

HYD-2 – Configuration
HYD-2 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-2 (config) # ipv6 unicast-routing
HYD-2 (config) #

Note: Once routing is enabled the directly connected networks are automatically added into the
routing information table. “C" represents directly connected networks. The IPv6 Network is
learnt through the local Interface of the router.

Verify IPv6 Routing Table

HYD-1 – Verification:

HYD-1# show ipv6 route


IPv6 Routing Table - default - 5 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
B - BGP, HA - Home Agent, MR - Mobile Router, R - RIP
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary
D - EIGRP, EX - EIGRP external, NM - NEMO, ND - Neighbor Discovery
l - LISP
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2

C 2001:1111::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:1111::1/128 [0/0]
via FastEthernet0/0, receive
C 2001:5555::/64 [0/0]
via FastEthernet0/1, directly connected
L 2001:5555::1/128 [0/0]
via FastEthernet0/1, receive
L FF00::/8 [0/0]
via Null0, receive
HYD-1#
HYD-2 – Verification:

HYD-1 # show ipv6 route


IPv6 Routing Table - default - 5 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
B - BGP, HA - Home Agent, MR - Mobile Router, R - RIP
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary
D - EIGRP, EX - EIGRP external, NM - NEMO, ND - Neighbor Discovery
l - LISP
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
C 2001:2222::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:2222::1/128 [0/0]
via FastEthernet0/0, receive
C 2001:5555::/64 [0/0]
via FastEthernet0/1, directly connected
L 2001:5555::2/128 [0/0]
via FastEthernet0/1, receive
L FF00::/8 [0/0]
via Null0, receive
HYD-2#

Configure Static Routing on IPv6 Network

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ipv6 route 2001:2222::/64 2001:5555::2
HYD-1 (config) # exit
HYD-1 (config) #

HYD-2 – Configuration
HYD-2 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-2 (config) # ipv6 route 2001:1111::/64 2001:5555::1
HYD-2 (config) # exit
HYD-2 (config) #
Verify Static Routing on IPv6 Network
Once Static routing is enabled, the IPv6 Networks defined with the Static routing command are
added into the routing information table. “S” represents Static route.

HYD-1 – Verification:

HYD-1 # show ip route


IPv6 Routing Table - default - 6 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
B - BGP, HA - Home Agent, MR - Mobile Router, R - RIP
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary
D - EIGRP, EX - EIGRP external, NM - NEMO, ND - Neighbor Discovery
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
C 2001:1111::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:1111::1/128 [0/0]
via FastEthernet0/0, receive
S 2001:2222::/64 [1/0]
via 2001:5555::2
C 2001:5555::/64 [0/0]
via FastEthernet0/1, directly connected
L 2001:5555::1/128 [0/0]
via FastEthernet0/1, receive
L FF00::/8 [0/0]
via Null0, receive
HYD-1#

HYD-2 – Verification:

HYD-2 # show ipv6 route


IPv6 Routing Table - default - 6 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
B - BGP, HA - Home Agent, MR - Mobile Router, R - RIP
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary
D - EIGRP, EX - EIGRP external, NM - NEMO, ND - Neighbor Discovery
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
S 2001:1111::/64 [1/0]
via 2001:5555::1
C 2001:2222::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:2222::1/128 [0/0]
via FastEthernet0/0, receive
C 2001:5555::/64 [0/0]
via FastEthernet0/1, directly connected
L 2001:5555::2/128 [0/0]
via FastEthernet0/1, receive
L FF00::/8 [0/0]
via Null0, receive
HYD-2#
Verify communication between the IPv6 networks

Verification from a Computer in HYD-1 Network

ping 2001:2222::10 (Windows) or ping6 2001:2222::10 (Linux)

PING 2001:2222::10(2001:2222::10) 56 data bytes


64 bytes from 2001:2222::10: icmp_seq=1 ttl=62 time=0.494 ms
64 bytes from 2001:2222::10: icmp_seq=2 ttl=62 time=0.361 ms
64 bytes from 2001:2222::10: icmp_seq=3 ttl=62 time=0.335 ms
64 bytes from 2001:2222::10: icmp_seq=4 ttl=62 time=0.336 ms

Verification from a Computer in HYD-2 Network

ping 2001:1111::10 (Windows) or ping6 2001:1111::10 (Linux)

PING 2001:1111::10(2001:1111::10) 56 data bytes


64 bytes from 2001:1111::10: icmp_seq=1 ttl=62 time=0.494 ms
64 bytes from 2001:1111::10: icmp_seq=2 ttl=62 time=0.361 ms
64 bytes from 2001:1111::10: icmp_seq=3 ttl=62 time=0.335 ms
64 bytes from 2001:1111::10: icmp_seq=4 ttl=62 time=0.336 ms

From a Computer in HYD-1 Network trace communication path to a Computer in HYD-2 Network

tracert 2001:2222::10 (Windows) or traceroute6 2001:2222::10 (Linux)

traceroute to 2001:2222::10 (2001:2222::10), 30 hops max, 80 byte packets


1 2001:1111::1 (2001:1111::1) 2.825 ms 3.239 ms 3.665 ms
2 2001:5555::2 (2001:5555::2) 9.086 ms 9.393 ms 9.642 ms
3 2001:2222::10 (2001:2222::10) 9.781 ms 10.474 ms 10.720 ms

From a Computer in HYD-2 Network trace communication path to a Computer in HYD-1 Network

tracert 2001:1111::10 (Windows) or traceroute6 2001:1111::10 (Linux)

traceroute to 2001:1111::10 (2001:1111::10), 30 hops max, 80 byte packets


1 2001:2222::1 (2001:2222::1) 1.071 ms 1.152 ms 1.238 ms
2 2001:5555::1 (2001:5555::1) 4.303 ms 4.930 ms 5.419 ms
3 2001:1111::10 (2001:1111::10) 10.832 ms 11.444 ms 11.541 ms
Lab 12: RIP on IPv4 Network

OBJECTIVE:
To configure RIP routing for communicating between different IPv4 networks on different routers.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

Pre-requisite: WAN Interface configuration to be done on the router (LAB – 6)

TASK:
 Configure Loopback Interface
 Verify Loopback Interface
 Configure RIP Routing on IPv4 network
 Verify RIP Routing on IPv4 network
 Verify Communication between the IPv4 networks
 Verify RIP protocol default settings
 Verify RIP Update Packets
 Changing RIP Timers
 Enabling Passive Interface on RIP
 Verify RIP Database
 Disabling RIP Auto Summary
Configure Loopback Interface
Configure Loopback interface according to Lab Topology

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config)# interface Lo 1
CHE (config-if)# ip address 16.1.1.1 255.255.255.0
CHE (config-if)# interface Lo 2
CHE (config-if)# ip address 16.1.2.1 255.255.255.0
CHE (config-if)# interface Lo 3
CHE (config-if)# ip address 16.1.3.1 255.255.255.0
CHE (config-if)# exit

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config)# interface Lo 1
HYD-1 (config-if)# ip address 17.1.1.1 255.255.255.0
HYD-1 (config)# interface Lo 2
HYD-1 (config-if)# ip address 17.1.2.1 255.255.255.0
HYD-1 (config)# interface Lo 3
HYD-1 (config-if)# ip address 17.1.3.1 255.255.255.0
HYD-1 (config-if)# exit

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config)# interface Lo 1
BAN (config-if)# ip address 18.1.1.1 255.255.255.0
BAN (config)# interface Lo 2
BAN (config-if)# ip address 18.1.2.1 255.255.255.0
BAN (config)# interface Lo 3
BAN (config-if)# ip address 18.1.3.1 255.255.255.0
BAN (config-if)# exit
Verify Loopback Interface

CHE – Verification:

CHE # show ip interface brief


Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.201.1 YES NVRAM up up
Serial0/0 172.16.0.1 YES NVRAM up up
Serial0/1 172.18.0.2 YES NVRAM up up
Loopback1 16.1.1.1 YES manual up up
Loopback2 16.1.2.1 YES manual up up
Loopback3 16.1.3.1 YES manual up up

HYD-1 – Verification:

HYD-1# show ip interface brief


Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.202.1 YES NVRAM up up
FastEthernet0/1 unassigned YES NVRAM administratively down down
Serial0/0/0 172.17.0.1 YES manual up up
Serial0/0/1 172.16.0.2 YES manual up up
Loopback1 17.1.1.1 YES manual up up
Loopback2 17.1.2.1 YES manual up up
Loopback3 17.1.3.1 YES manual up up

BAN – Verification:

HYD-1# show ip interface brief


Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.203.1 YES NVRAM up up
Serial0/0 172.18.0.1 YES NVRAM up up
FastEthernet0/1 unassigned YES NVRAM administratively down down
Serial0/1 172.17.0.2 YES NVRAM up up
Loopback1 18.1.1.1 YES manual up up
Loopback2 18.1.2.1 YES manual up up
Loopback3 18.1.3.1 YES manual up up
Configure RIP Routing on IPv4 network

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip routing
CHE (config) # router rip
CHE (config-router) # version 2
CHE (config-router) # network 192.168.201.0
CHE (config-router) # network 172.16.0.0
CHE (config-router) # network 172.18.0.0
CHE (config-router) # network 16.0.0.0
CHE (config-router) # end
CHE #

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip routing
HYD-1 (config) # router rip
HYD-1 (config-router) # version 2
HYD-1 (config-router) # network 192.168.202.0
HYD-1 (config-router) # network 172.16.0.0
HYD-1 (config-router) # network 172.17.0.0
HYD-1 (config-router) # network 17.0.0.0
HYD-1 (config-router) # end
HYD-1 #

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config) # ip routing
BAN (config) # router rip
BAN (config-router) # version 2
BAN (config-router) # network 192.168.203.0
BAN (config-router) # network 172.17.0.0
BAN (config-router) # network 172.18.0.0
BAN (config-router) # network 18.0.0.0
BAN (config-router) # end
BAN #
Verify RIP Routing on IPv4 network
Once RIP routing is enabled, IPv4 Networks learnt via RIP are added into the routing table. “R”
represents RIP route.
CHE – Verification:

CHE # show ip route


Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

R 17.0.0.0/8 [120/1] via 172.16.0.2, 00:00:03, Serial0/0


16.0.0.0/24 is subnetted, 3 subnets
C 16.1.1.0 is directly connected, Loopback1
C 16.1.3.0 is directly connected, Loopback3
C 16.1.2.0 is directly connected, Loopback2
R 18.0.0.0/8 [120/1] via 172.18.0.1, 00:00:24, Serial0/1
R 172.17.0.0/16 [120/1] via 172.16.0.2, 00:00:03, Serial0/0
[120/1] via 172.18.0.1, 00:00:24, Serial0/1
C 172.16.0.0/16 is directly connected, Serial0/0
C 172.18.0.0/16 is directly connected, Serial0/1
C 192.168.201.0/24 is directly connected, FastEthernet0/0
R 192.168.202.0/24 [120/1] via 172.16.0.2, 00:00:03, Serial0/0
R 192.168.203.0/24 [120/1] via 172.18.0.1, 00:00:24, Serial0/1
CHE #

HYD-1 – Verification:

HYD-1 # show ip route


Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

R 16.0.0.0/8 [120/1] via 172.16.0.1, 00:00:01, Serial0/0/1


17.0.0.0/8 is variably subnetted, 6 subnets, 2 masks
C 17.1.1.0/24 is directly connected, Loopback1
L 17.1.1.1/32 is directly connected, Loopback1
C 17.1.2.0/24 is directly connected, Loopback2
L 17.1.2.1/32 is directly connected, Loopback2
C 17.1.3.0/24 is directly connected, Loopback3
L 17.1.3.1/32 is directly connected, Loopback3
R 18.0.0.0/8 [120/1] via 172.17.0.2, 00:00:24, Serial0/0/0
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.16.0.0/16 is directly connected, Serial0/0/1
L 172.16.0.2/32 is directly connected, Serial0/0/1
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.0.0/16 is directly connected, Serial0/0/0
L 172.17.0.1/32 is directly connected, Serial0/0/0
R 172.18.0.0/16 [120/1] via 172.17.0.2, 00:00:24, Serial0/0/0
[120/1] via 172.16.0.1, 00:00:01, Serial0/0/1
R 192.168.201.0/24 [120/1] via 172.16.0.1, 00:00:01, Serial0/0/1
192.168.202.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.202.0/24 is directly connected, FastEthernet0/0
L 192.168.202.1/32 is directly connected, FastEthernet0/0
R 192.168.203.0/24 [120/1] via 172.17.0.2, 00:00:24, Serial0/0/0
HYD-1 #

BAN – Verification:

BAN # show ip route


Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

R 17.0.0.0/8 [120/1] via 172.17.0.1, 00:00:07, Serial0/1


R 16.0.0.0/8 [120/1] via 172.18.0.2, 00:00:11, Serial0/0
18.0.0.0/24 is subnetted, 3 subnets
C 18.1.3.0 is directly connected, Loopback3
C 18.1.2.0 is directly connected, Loopback2
C 18.1.1.0 is directly connected, Loopback1
C 172.17.0.0/16 is directly connected, Serial0/1
R 172.16.0.0/16 [120/1] via 172.17.0.1, 00:00:07, Serial0/1
[120/1] via 172.18.0.2, 00:00:11, Serial0/0
C 172.18.0.0/16 is directly connected, Serial0/0
R 192.168.201.0/24 [120/1] via 172.18.0.2, 00:00:11, Serial0/0
R 192.168.202.0/24 [120/1] via 172.17.0.1, 00:00:07, Serial0/1
C 192.168.203.0/24 is directly connected, FastEthernet0/0
BAN #
Verify communication between the IPv4 networks

Verification from a Computer in HYD-1 Network

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Repeat the above ping verification from a computer in CHE and BAN Network.

From a Computer in HYD-1 Network trace communication path to a Computer in CHE Network

tracert 192.168.201.10 (Windows) or traceroute 192.168.201.10 (Linux)


traceroute to 192.168.201.10 (192.168.201.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.16.0.1 (172.16.0.1) 2.295 ms 2.156 ms 2.209 ms
3 192.168.201.10 (192.168.202.10) 3.295 ms 3.156 ms 3.209 ms

From a Computer in HYD-1 Network trace communication path to a Computer in BAN Network

tracert 192.168.203.10 (Windows) or traceroute 192.168.203.10 (Linux)


traceroute to 192.168.203.10 (192.168.203.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.17.0.2 (172.17.0.2) 2.295 ms 2.156 ms 2.209 ms
3 192.168.203.10 (192.168.203.10) 3.295 ms 3.156 ms 3.209 ms

Repeat the above trace communication path from a computer in CHE and BAN Network.
Verify RIP protocol default settings

Example - HYD-1
HYD-1 # show ip protocols
*** IP Routing is NSF aware ***

Routing Protocol is "rip"


Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Sending updates every 30 seconds, next due in 26 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Redistributing: rip
Default version control: send version 2, receive version 2
Interface Send Recv Triggered RIP Key-chain
FastEthernet0/0 2 2
Serial0/0/0 2 2
Serial0/0/1 2 2
Loopback1 2 2
Loopback2 2 2
Loopback3 2 2
Automatic network summarization is in effect
Maximum path: 4
Routing for Networks:
17.0.0.0
172.16.0.0
172.17.0.0
192.168.202.0
Routing Information Sources:
Gateway Distance Last Update
172.16.0.1 120 00:00:01
172.17.0.2 120 00:00:23
Distance: (default is 120)
HYD-1 #

Verify RIP Update Packets


Verify default behaviour of RIP Update packets by enabling debug commands

Example - HYD-1
HYD-1 # terminal monitor
HYD-1 # debug ip rip

RIP protocol debugging is on


RIP: received v2 update from 172.16.0.1 on Serial0/0/1
172.18.0.0/16 in 1 hops
192.168.201.0/24 in 1 hops
192.168.203.0/24 in 2 hops
RIP: sending v2 update to 224.0.0.9 via FastEthernet0/0 (192.168.202.1)
RIP: build update entries
network 172.16.0.0/16 metric 1
network 172.17.0.0/16 metric 1
network 172.18.0.0./16 metric 2
network 192.168.201.0/24 metric 2
network 192.168.203.0/24 metric 2
RIP: sending v2 update to 224.0.0.9 via Serial0/0/1 (172.16.0.2)
RIP: build update entries
network 192.168.202.0/24 metric 1
network 172.17.0.0/16 metric 1
network 192.168.203.0/24 metric 2
RIP: sending v2 update to 224.0.0.9 via Serial0/0/0 (172.17.0.1)
RIP: build update entries
network 192.168.202.0/24 metric 1
network 172.16.0.0/16 metric 1
network 192.168.201.0/24 metric 2

HYD-1 # undebug all


HYD-1 # terminal no monitor
Lab 13: OSPF on IPv4 Network

OBJECTIVE:
To configure OSPF Routing in a single area.
To understand how OSPF works and fine tune OSPF configuration.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

Pre-requisite: WAN Interface configuration to be done on the router (LAB – 6)

TASK:
 Configure OSPF – Single Area on IPv4 network
 Verify OSPF – Single Area on IPv4 network
 Verify Communication between the IPv4 networks
 Verify OSPF Neighbour and Topology Table
 Verify OSPF protocol default settings
 Verify OSPF Packets on IPv4 network
 Enable Passive Interface on IPv4 network
 Configuring OSPF Cost metric for an interface
Configure OSPF – Single Area on IPv4 Network

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip routing
CHE (config) # router ospf 1
CHE (config-router) # router-id 1.1.1.1
CHE (config-router) # network 192.168.201.0 0.0.0.255 area 0
CHE (config-router) # network 172.16.0.0 0.0.255.255 area 0
CHE (config-router) # network 172.18.0.0 0.0.255.255 area 0
CHE (config-router) # end
CHE #

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip routing
HYD-1 (config) # router ospf 2
HYD-1 (config-router) # router-id 2.2.2.2
HYD-1 (config-router) # network 192.168.202.0 0.255.255.255 area 0
HYD-1 (config-router) # network 172.16.0.0 0.0.255.255 area 0
HYD-1 (config-router) # network 172.17.0.0 0.0.255.255 area 0
HYD-1 (config-router) # end
HYD-1 #

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config) # ip routing
BAN (config) # router ospf 3
BAN (config-router) # router-id 3.3.3.3
BAN (config-router) # network 192.168.203.0 0.0.0.255 area 0
BAN (config-router) # network 172.17.0.0 0.0.255.255 area 0
BAN (config-router) # network 172.18.0.0 0.0.255.255 area 0
BAN (config-router) # end
BAN #
Verify OSPF – Single Area on IPv4 Network
Once OSPF routing is enabled, the IPv4 Networks learned through OSPF are added into the routing
table. “O” represents an OSPF route.

CHE – Verification:

CHE # show ip route

Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP


D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

O 172.17.0.0/16 [110/128] via 172.16.0.2, 00:00:26, Serial0/0


[110/128] via 172.18.0.1, 00:00:26, Serial0/1
C 172.16.0.0/16 is directly connected, Serial0/0
C 172.18.0.0/16 is directly connected, Serial0/1
C 192.168.201.0/24 is directly connected, FastEthernet0/0
O 192.168.202.0/24 [110/64] via 172.16.0.2, 00:00:26, Serial0/0
O 192.168.203.0/24 [110/64] via 172.18.0.1, 00:00:26, Serial0/1
CHE #

HYD-1 – Verification:

HYD-1 # show ip route

Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP


D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override

Gateway of last resort is not set

172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks


C 172.16.0.0/16 is directly connected, Serial0/0/1
L 172.16.0.2/32 is directly connected, Serial0/0/1
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.0.0/16 is directly connected, Serial0/0/0
L 172.17.0.1/32 is directly connected, Serial0/0/0
O 172.18.0.0/16 [110/128] via 172.17.0.2, 00:01:21, Serial0/0/0
[110/128] via 172.16.0.1, 00:03:17, Serial0/0/1
O 192.168.201.0/24 [110/64] via 172.16.0.1, 00:03:17, Serial0/0/1
192.168.202.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.202.0/24 is directly connected, FastEthernet0/0
L 192.168.202.1/32 is directly connected, FastEthernet0/0
O 192.168.203.0/24 [110/64] via 172.17.0.2, 00:01:21, Serial0/0/0
HYD-1 #

BAN – Verification:

BAN # show ip route


Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

C 172.17.0.0/16 is directly connected, Serial0/1


O 172.16.0.0/16 [110/128] via 172.17.0.1, 00:01:40, Serial0/1
[110/128] via 172.18.0.2, 00:01:40, Serial0/0
C 172.18.0.0/16 is directly connected, Serial0/0
O 192.168.201.0/24 [110/64] via 172.18.0.2, 00:01:40, Serial0/0
O 192.168.202.0/24 [110/64] via 172.17.0.1, 00:01:40, Serial0/1
C 192.168.203.0/24 is directly connected, FastEthernet0/0
BAN #

Verify communication between the IPv4 networks

Verification from a Computer in HYD-1 Network

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=4 ttl=62 time=24.0 ms
ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Repeat the above ping verification from a computer in CHE and BAN Network.

From a Computer in HYD-1 Network trace communication path to a Computer in CHE Network

tracert 192.168.201.10 (Windows) or traceroute 192.168.201.10 (Linux)


traceroute to 192.168.201.10 (192.168.201.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.16.0.1 (172.16.0.1) 2.295 ms 2.156 ms 2.209 ms
3 192.168.201.10 (192.168.202.10) 3.295 ms 3.156 ms 3.209 ms

From a Computer in HYD-1 Network trace communication path to a Computer in BAN Network

tracert 192.168.203.10 (Windows) or traceroute 192.168.203.10 (Linux)


traceroute to 192.168.203.10 (192.168.203.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.17.0.2 (172.17.0.2) 2.295 ms 2.156 ms 2.209 ms
3 192.168.203.10 (192.168.203.10) 3.295 ms 3.156 ms 3.209 ms

Repeat the above trace communication path from a computer in CHE and BAN Network.

Verify OSPF Neighbour and Database Table

CHE – Verification:

CHE # show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


2.2.2.2 1 FULL/ - 00:00:33 172.16.0.2 Serial0/0
3.3.3.3 1 FULL/ - 00:00:37 172.18.0.1 Serial0/1
CHE #
CHE # show ip ospf database

OSPF Router with ID (1.1.1.1) (Process ID 1)

Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link count


1.1.1.1 1.1.1.1 56 0x80000005 0x385F 5
2.2.2.2 2.2.2.2 48 0x80000005 0xD3A9 5
3.3.3.3 3.3.3.3 46 0x80000004 0x87B 5
CHE #
HYD-1 – Verification:

HYD-1 # show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


3.3.3.3 0 FULL/ - 00:00:32 172.17.0.2 Serial0/0/0
1.1.1.1 0 FULL/ - 00:00:31 172.16.0.1 Serial0/0/1
HYD-1 #

HYD-1 # show ip ospf database

OSPF Router with ID (2.2.2.2) (Process ID 2)

Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link count


1.1.1.1 1.1.1.1 56 0x80000005 0x385F 5
2.2.2.2 2.2.2.2 48 0x80000005 0xD3A9 5
3.3.3.3 3.3.3.3 46 0x80000004 0x87B 5
HYD-1 #

BAN – Verification:

BAN # show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


1.1.1.1 1 FULL/ - 00:00:39 172.18.0.2 Serial0/0
2.2.2.2 1 FULL/ - 00:00:33 172.17.0.1 Serial0/1
BAN #

BAN # show ip ospf database

OSPF Router with ID (3.3.3.3) (Process ID 3)

Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link count


1.1.1.1 1.1.1.1 56 0x80000005 0x385F 5
2.2.2.2 2.2.2.2 48 0x80000005 0xD3A9 5
3.3.3.3 3.3.3.3 46 0x80000004 0x87B 5
BAN #
Verify OSPF protocol default settings

Example - HYD-1
HYD-1 # show ip protocols
*** IP Routing is NSF aware ***
Routing Protocol is "ospf 2"
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Router ID 2.2.2.2
Number of areas in this router is 1. 1 normal 0 stub 0 nssa
Maximum path: 4
Routing for Networks:
172.16.0.0 0.0.255.255 area 0
172.17.0.0 0.0.255.255 area 0
192.168.202.0 0.0.0.255 area 0
Routing Information Sources:
Gateway Distance Last Update
3.3.3.3 110 00:01:20
1.1.1.1 110 00:03:16
Distance: (default is 110)
HYD-1#

Verify OSPF Hello Packets


Verify default behaviour of OSPF Hello packets by enabling debug commands

Example - HYD-1
HYD-1 # terminal monitor
HYD-1 # debug ip ospf hello
OSPF hello events debugging is on
HYD-1#
*Jul 22 20:00:44.967: OSPF: Rcv hello from 192.168.203.1 area 0 from Serial0/0/0 172.17.0.2
*Jul 22 20:00:44.967: OSPF: End of hello processing
*Jul 22 20:00:46.011: OSPF: Send hello to 224.0.0.5 area 0 on GigabitEthernet0/0 from 10.0.0.1
*Jul 22 20:00:47.959: OSPF: Rcv hello from 192.168.201.1 area 0 from Serial0/0/1 172.16.0.1
*Jul 22 20:00:47.959: OSPF: End of hello processing
*Jul 22 20:00:49.779: OSPF: Send hello to 224.0.0.5 area 0 on Serial0/0/0 from 172.17.0.1
*Jul 22 20:00:51.263: OSPF: Send hello to 224.0.0.5 area 0 on Serial0/0/1 from 172.16.0.2
*Jul 22 20:00:54.967: OSPF: Rcv hello from 192.168.203.1 area 0 from Serial0/0/0 172.17.0.2
*Jul 22 20:00:54.967: OSPF: End of hello processing
*Jul 22 20:00:55.279: OSPF: Send hello to 224.0.0.5 area 0 on GigabitEthernet0/0 from 10.0.0.1
*Jul 22 20:00:57.959: OSPF: Rcv hello from 192.168.201.1 area 0 from Serial0/0/1 172.16.0.1
*Jul 22 20:00:57.959: OSPF: End of hello processing
*Jul 22 20:00:59.011: OSPF: Send hello to 224.0.0.5 area 0 on Serial0/0/0 from 172.17.0.1
*Jul 22 20:01:00.963: OSPF: Send hello to 224.0.0.5 area 0 on Serial0/0/1 from 172.16.0.2
HYD-1 #

HYD-1 # undebug all


HYD-1 # terminal no monitor
Enable passive interface on OSPF
This command disables OSPF Hello packets from being sent on that interface.

Example - HYD-1
HYD-1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # router ospf 2
HYD-1 (config-router) # passive-interface FastEthernet 0/0
HYD-1 (config-router) # end

After enabling above commands, again verify default behaviour of OSPF Hello packets by enabling
debug commands. Now you will not able see the following line in the debug outputs.
OSPF: Send hello to 224.0.0.5 area 0 on FastEthernet 0/0 from 192.168.202.1

This means that you have successfully disabled sending of OSPF Hello packet on selected Interface.

HYD-1 – Verification:

HYD-1 # show ip protocols


*** IP Routing is NSF aware ***

Routing Protocol is "ospf 2"


Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Router ID 2.2.2.2
Number of areas in this router is 1. 1 normal 0 stub 0 nssa
Maximum path: 4
Routing for Networks:
172.16.0.0 0.0.255.255 area 0
172.17.0.0 0.0.255.255 area 0
192.168.202.0 0.0.0.255 area 0
Passive Interface(s):
FastEthernet0/0
Routing Information Sources:
Gateway Distance Last Update
3.3.3.3 110 00:01:20
1.1.1.1 110 00:03:16
Distance: (default is 110)
Configuring OSPF Cost metric for an interface
This command will configure OSPF Cost metric for an interface.

Verification - HYD-1
HYD-1 # show ip ospf interface brief
Interface PID Area IP Address/Mask Cost State Nbrs F/C
Se0/0/0 1 0 172.17.0.1/16 64 P2P 1/1
Se0/0/1 1 0 172.16.0.2/16 64 P2P 1/1
HYD-1 #

Example - HYD-1
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # interface serial 0/0/0
HYD-1 (config-router) # ip ospf cost 100
HYD-1 (config-router) # end
HYD-1 #

Verification - HYD-1
HYD-1 # show ip ospf interface brief
Interface PID Area IP Address/Mask Cost State Nbrs F/C
Se0/0/0 1 0 172.17.0.1/16 100 P2P 1/1
Se0/0/1 1 0 172.16.0.2/16 64 P2P 1/1
HYD-1 #

CHE#show ip ospf interfaces brief


CHE#sh ip ospf interface

FastEthernet0/0 is up, line protocol is up


Internet address is 192.168.201.1/24, Area 0
Process ID 1, Router ID 1.1.1.1, Network Type BROADCAST, Cost: 1
Transmit Delay is 1 sec, State DR, Priority 1
Designated Router (ID) 1.1.1.1, Interface address 192.168.201.1
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:08
Index 1/1, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 0, Adjacent neighbor count is 0
Suppress hello for 0 neighbor(s)
Serial0/0 is up, line protocol is up
Internet address is 172.16.0.1/16, Area 0
Process ID 1, Router ID 1.1.1.1, Network Type POINT-TO-POINT, Cost: 64
Transmit Delay is 1 sec, State POINT-TO-POINT, Priority 0
No designated router on this network
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:05
Index 2/2, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 1 , Adjacent neighbor count is 1
Adjacent with neighbor 2.2.2.2
Suppress hello for 0 neighbor(s)
Serial0/1 is up, line protocol is up
Internet address is 172.18.0.2/16, Area 0
Process ID 1, Router ID 1.1.1.1, Network Type POINT-TO-POINT, Cost: 64
Transmit Delay is 1 sec, State POINT-TO-POINT, Priority 0
No designated router on this network
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:05
Index 3/3, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 1 , Adjacent neighbor count is 1
Adjacent with neighbor 3.3.3.3
Suppress hello for 0 neighbor(s)
CHE#

CHE#show ip ospf interface fasethernet 0/0

FastEthernet0/0 is up, line protocol is up


Internet address is 192.168.201.1/24, Area 0
Process ID 1, Router ID 1.1.1.1, Network Type BROADCAST, Cost: 1
Transmit Delay is 1 sec, State DR, Priority 1
Designated Router (ID) 1.1.1.1, Interface address 192.168.201.1
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:08
Index 1/1, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 0, Adjacent neighbor count is 0
Suppress hello for 0 neighbor(s)
CHE#
CHE#sh ip route ospf
O 172.17.0.0 [110/128] via 172.16.0.2, 00:03:49, Serial0/0
[110/128] via 172.18.0.1, 00:03:49, Serial0/1
O 192.168.202.0 [110/65] via 172.16.0.2, 00:05:11, Serial0/0
O 192.168.203.0 [110/65] via 172.18.0.1, 00:03:49, Serial0/1
DR/BDR Verification
CHE#
CHE#sh ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
192.168.201.2 1 FULL/BDR 00:00:30 192.168.201.2 FastEthernet0/0
192.168.201.3 1 FULL/DR 00:00:32 192.168.201.3 FastEthernet0/0
CHE#
CHE#
Lab 14: OSPF – Multiple Area on IPv4 Network

OBJECTIVE:
To configure OSPF with a backbone area (area 0) and multiple areas connected to the backbone.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

Pre-requisite: WAN Interface configuration to be done on the router (LAB – 6)

TASK:
 Configure OSPF – Multiple Area on IPv4 network
 Verify OSPF – Multiple Area on IPv4 network
 Verify Communication between the IPv4 networks
 Verify OSPF Neighbour and Topology Table
Configure OSPF Routing with backbone area and multiple connected areas on IPv4 Network

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip routing
CHE (config) # router ospf 1
CHE (config-router) # router-id 1.1.1.1
CHE (config-router) # network 192.168.201.0 0.0.0.255 area 1
CHE (config-router) # network 172.16.0.0 0.0.255.255 area 0
CHE (config-router) # network 172.18.0.0 0.0.255.255 area 0
CHE (config-router) # end
CHE #

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip routing
HYD-1 (config) # router ospf 2
HYD-1 (config-router) # router-id 2.2.2.2
HYD-1 (config-router) # network 192.168.202.0 0.255.255.255 area 0
HYD-1 (config-router) # network 172.16.0.0 0.0.255.255 area 0
HYD-1 (config-router) # network 172.17.0.0 0.0.255.255 area 0
HYD-1 (config-router) # end
HYD-1 #

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config) # ip routing
BAN (config) # router ospf 3
BAN (config-router) # router-id 3.3.3.3
BAN (config-router) # network 192.168.203.0 0.0.0.255 area 2
BAN (config-router) # network 172.17.0.0 0.0.255.255 area 0
BAN (config-router) # network 172.18.0.0 0.0.255.255 area 0
BAN (config-router) # end
BAN #
Verify OSPF – Multiple Area on IPv4 Network
Once OSPF routing is enabled, IP networks learned through OSPF are added into the routing table.
“IA” represents OSPF Inter Area route.

CHE – Verification:

CHE # show ip route

Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP


D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

O 172.17.0.0/16 [110/128] via 172.18.0.1, 00:00:50, Serial0/1


[110/128] via 172.16.0.2, 00:00:50, Serial0/0
C 172.16.0.0/16 is directly connected, Serial0/0
C 172.18.0.0/16 is directly connected, Serial0/1
C 192.168.201.0/24 is directly connected, FastEthernet0/0
O 192.168.202.0/24 [110/64] via 172.16.0.2, 00:00:50, Serial0/0
O IA 192.168.203.0/24 [110/64] via 172.18.0.1, 00:00:49, Serial0/1
CHE #

HYD-1 – Verification:

HYD-1 # show ip route

Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP


D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
o - ODR, P - periodic downloaded static route, + - replicated route

Gateway of last resort is not set

172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks


C 172.16.0.0/16 is directly connected, Serial0/0/1
L 172.16.0.2/32 is directly connected, Serial0/0/1
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.0.0/16 is directly connected, Serial0/0/0
L 172.17.0.1/32 is directly connected, Serial0/0/0
O 172.18.0.0/16 [110/128] via 172.17.0.2, 00:02:23, Serial0/0/0
[110/128] via 172.16.0.1, 00:02:23, Serial0/0/1
O IA 192.168.201.0/24 [110/64] via 172.16.0.1, 00:02:23, Serial0/0/1
192.168.202.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.202.0/24 is directly connected, FastEthernet0/0
L 192.168.202.1/32 is directly connected, FastEthernet0/0
O IA 192.168.203.0/24 [110/64] via 172.17.0.2, 00:01:25, Serial0/0/0
HYD-1 #

BAN – Verification:

BAN # show ip route

Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP


D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS
ia - IS-IS inter area, * - candidate default, U - per-user sta
o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

C 172.17.0.0/16 is directly connected, Serial0/1


O 172.16.0.0/16 [110/128] via 172.18.0.2, 00:02:02, Serial0/0
[110/128] via 172.17.0.1, 00:02:02, Serial0/1
C 172.18.0.0/16 is directly connected, Serial0/0
O IA 192.168.201.0/24 [110/64] via 172.18.0.2, 00:02:02, Serial0/0
O 192.168.202.0/24 [110/64] via 172.17.0.1, 00:02:02, Serial0/1
C 192.168.203.0/24 is directly connected, FastEthernet0/0
BAN #

Verify communication between the IPv4 networks

Verification from a Computer in HYD-1 Network

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.201.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=4 ttl=62 time=24.0 ms
ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Repeat the above ping verification from a computer in CHE and BAN Network.

From a Computer in HYD-1 Network trace communication path to a Computer in CHE Network

tracert 192.168.201.10 (Windows) or traceroute 192.168.201.10 (Linux)


traceroute to 192.168.201.10 (192.168.201.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.16.0.1 (172.16.0.1) 2.295 ms 2.156 ms 2.209 ms
3 192.168.201.10 (192.168.202.10) 3.295 ms 3.156 ms 3.209 ms

From a Computer in HYD-1 Network trace communication path to a Computer in BAN Network

tracert 192.168.203.10 (Windows) or traceroute 192.168.203.10 (Linux)


traceroute to 192.168.203.10 (192.168.203.10), 30 hops max, 38 byte packets
1 192.168.202.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 172.17.0.2 (172.17.0.2) 2.295 ms 2.156 ms 2.209 ms
3 192.168.203.10 (192.168.203.10) 3.295 ms 3.156 ms 3.209 ms

Repeat the above trace communication path from a computer in CHE and BAN Network.
Verify OSPF Neighbour and Database Table

CHE – Verification:

CHE # show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


2.2.2.2 1 FULL/ - 00:00:33 172.16.0.2 Serial0/0
3.3.3.3 1 FULL/ - 00:00:37 172.18.0.1 Serial0/1
CHE #
CHE # show ip ospf database

OSPF Router with ID (1.1.1.1) (Process ID 1)

Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link count


1.1.1.1 1.1.1.1 56 0x80000005 0x385F 4
2.2.2.2 2.2.2.2 48 0x80000005 0xD3A9 5
3.3.3.3 3.3.3.3 46 0x80000004 0x87B 4

Summary Net Link States (Area 0)

Link ID ADV Router Age Seq# Checksum


192.168.201.0 1.1.1.1 586 0x80000001 0x655
192.168.203.0 1.1.1.1 586 0x80000001 0x655

Router Link States (Area 1)

Link ID ADV Router Age Seq# Checksum Link count


1.1.1.1 1.1.1.1 596 0x80000001 0x4B98 1

Summary Net Link States (Area 1)

Link ID ADV Router Age Seq# Checksum


192.168.202.0 1.1.1.1 379 0x80000001 0x7312
172.16.0.0 1.1.1.1 364 0x80000004 0x6070
172.17.0.0 1.1.1.1 145 0x80000003 0xD8B7
172.18.0.0 1.1.1.1 116 0x80000004 0x4886
192.168.203.0 1.1.1.1 121 0x80000001 0x23FF
CHE #

HYD-1 – Verification:

HYD-1 # show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


3.3.3.3 0 FULL/ - 00:00:32 172.17.0.2 Serial0/0/0
1.1.1.1 0 FULL/ - 00:00:31 172.16.0.1 Serial0/0/1
HYD-1 #
HYD-1 # show ip ospf database

OSPF Router with ID (2.2.2.2) (Process ID 2)

Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link count


1.1.1.1 1.1.1.1 56 0x80000005 0x385F 4
2.2.2.2 2.2.2.2 48 0x80000005 0xD3A9 5
3.3.3.3 3.3.3.3 46 0x80000004 0x87B 4

Summary Net Link States (Area 0)

Link ID ADV Router Age Seq# Checksum


192.168.201.0 1.1.1.1 586 0x80000001 0x655
192.168.203.0 3.3.3.3 586 0x80000001 0x655

HYD-1 #

BAN – Verification:

BAN # show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


1.1.1.1 1 FULL/ - 00:00:39 172.18.0.2 Serial0/0
2.2.2.2 1 FULL/ - 00:00:33 172.17.0.1 Serial0/1
BAN #

BAN # show ip ospf database

OSPF Router with ID (3.3.3.3) (Process ID 3)

Router Link States (Area 0)

Link ID ADV Router Age Seq# Checksum Link count


1.1.1.1 1.1.1.1 56 0x80000005 0x385F 4
2.2.2.2 2.2.2.2 48 0x80000005 0xD3A9 5
3.3.3.3 3.3.3.3 46 0x80000004 0x87B 4

Summary Net Link States (Area 0)

Link ID ADV Router Age Seq# Checksum


192.168.201.0 1.1.1.1 586 0x80000001 0x655
192.168.203.0 1.1.1.1 586 0x80000001 0x655

Router Link States (Area 2)


Link ID ADV Router Age Seq# Checksum Link count
3.3.3.3 3.3.3.3 596 0x80000001 0x4B98 1

Summary Net Link States (Area 2)

Link ID ADV Router Age Seq# Checksum


192.168.202.0 3.3.3.3 379 0x80000001 0x7312
172.16.0.0 3.3.3.3 364 0x80000004 0x6070
172.17.0.0 3.3.3.3 145 0x80000003 0xD8B7
172.18.0.0 3.3.3.3 116 0x80000004 0x4886
192.168.203.0 3.3.3.3 121 0x80000001 0x23FF

BAN #
Lab 15: OSPF Routing – DR (Designated Router) and BDR (Backup
Designated Router)

OBJECTIVE:

To understand how a DR and BDR are elected when OPSF is configured on routers connected via
Ethernet

TOPOLOGY:

Setup the routers for the lab as below:

Configure OSPF Routing with backbone area on IPv4 Network

TASK:
• Configure OSPF Routing
• Verify OSPF Neighbour relationship (DR / BDR / DROTHER)
• Understand OSPF DR and BDR Election
• Change OSPF Priority to force a particular router to become the DR
Configure OSPF Routing with backbone area on IPv4 Network

Hyd-1 – Configuration

Hyd-1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
Hyd (config) # ip routing
Hyd-1 (config) # router ospf 1
Hyd-1 (config-router) # network 10.0.0.0 0.255.255.255 area 0
Hyd-1 (config-router) # end
Hyd-1 (config) #

Hyd-2 – Configuration

Hyd-2 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
Hyd-2 (config) # ip routing
Hyd-2 (config) # router ospf 2
Hyd-2 (config-router) # network 10.0.0.0 0.255.255.255 area 0
Hyd-2 (config-router) # end
Hyd-2 (config) #

Hyd-4 Configuration

Hyd-4 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
Hyd-4 (config) # ip routing
Hyd-4 (config) # router ospf 3
Hyd-4 (config-router) # network 10.0.0.0 0.255.255.255 area 0
Hyd-4 (config-router) # end
Hyd-4 (config) # exit

Hyd-4#

Hyd-4 – Configuration

Hyd-4 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
Hyd-4 (config) # ip routing
Hyd-4 (config) # router ospf 4
Hyd-4 (config-router) # network 10.0.0.0 0.255.255.255 area 0
Hyd-4 (config-router) # end
Hyd-4 (config) # exit

Hyd#
Verify OSPF Neighbour and Database Table

Hyd-1 – Verification
Hyd-1#show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface

10.0.0.2 1 FULL/DROTHER 00:00:37 10.0.0.2 FastEthernet0/0


10.0.0.3 1 FULL/BDR 00:00:35 10.0.0.3 FastEthernet0/0
10.0.0.4 1 FULL/DR 00:00:33 10.0.0.4 FastEthernet0/0
Hyd-1#

Hyd-2 – Verification
Hyd-2#sh ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


10.0.0.1 1 FULL/DROTHER 00:00:34 10.0.0.1 FastEthernet0/0
10.0.0.3 1 FULL/BDR 00:00:31 10.0.0.3 FastEthernet0/0
10.0.0.4 1 FULL/DR 00:00:39 10.0.0.4 FastEthernet0/0
Hyd-2#

Hyd-3 – Verification

Hyd-4#show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


10.0.0.4 1 FULL/DR 00:00:39 10.0.0.4 FastEthernet0/0
10.0.0.1 1 FULL/DROTHER 00:00:39 10.0.0.1 FastEthernet0/0
10.0.0.2 1 FULL/DROTHER 00:00:39 10.0.0.2 FastEthernet0/0
Hyd-4#

Hyd-4 – Verification

Hyd-4#show ip ospf neighbor

Neighbor ID Pri State Dead Time Address Interface


10.0.0.2 1 FULL/DROTHER 00:00:34 10.0.0.2 FastEthernet0/0
10.0.0.1 1 FULL/DROTHER 00:00:34 10.0.0.1 FastEthernet0/0
10.0.0.3 1 FULL/BDR 00:00:34 10.0.0.3 FastEthernet0/0
Hyd-4#

Understand OSPF DR and BDR Election


If OSPF is enabled on all the routers at the same time, by default, the router with the Highest Router
ID will become DR and the one with the second Highest Router ID will become BDR.
Clear OSPF process by giving the following command on all routers for the new election of DR and
BDR.

Hyd-1 # clear ip ospf process


Reset ALL OSPF processes? [no]: yes
Hyd-1#

Change OSPF Priority to force a particular router to become the DR


By changing the OSPF priority, we can force a router to become the DR. The router with the highest
priority becomes the DR , the router with the second highest priority becomes the BDR.

Hyd-1 – Configuration

R1 (config) # interface Fastethernet 0/0


Hyd-1 (config-if) # ip ospf priority 150
Hyd-1 (config-if) #^Z
Hyd-1 #

Hyd-2 – Configuration

Hyd-2 (config) # interface Fastethernet 0/0


Hyd-2 (config-if) # ip ospf priority 200
Hyd-2 (config-if) #^Z
Hyd-2 #

Hyd-3 – Configuration

Hyd-3 (config) # interface Fastethernet 0/0


Hyd-3 (config-if) # ip ospf priority 100
Hyd-3 (config-if) #^Z

Hyd-4 – Configuration

Hyd-4 (config) # interface Fastethernet 0/0


Hyd-4 (config-if) # ip ospf priority 90
Hyd-4 (config-if) #^Z

Repeat verification commands.


Lab 16: OSPFv3 on IPv6 Network

OBJECTIVE:
To configure OSPFv3 Routing in a single area.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

Pre-requisite: WAN Interface configuration to be done on the router (LAB – 6)

TASK:
 Configure OSPFv3 on IPv6 network
 Verify OSPFv3 on IPv6 network
 Verify communication between the IPv6 networks
 Verify OSPFv3 Neighbor and Topology Table on IPv6 network
Configure OSPFv3 on IPv6 Network

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ipv6 unicast-routing
HYD-1 (config) # ipv6 router ospf 2
HYD-1 (config-rtr) # router-id 11.11.11.11
HYD-1 (config-rtr) # exit
HYD-1 (config) # interface fastethernet 0/0
HYD-1 (config-if) # ipv6 ospf 2 area 0
HYD-1 (config-if) # exit
HYD-1 (config) # interface fastethernet 0/1
HYD-1 (config-if) # ipv6 ospf 2 area 0
HYD-1 (config-if) # end
HYD-1 #

HYD-2 – Configuration
HYD-2 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-2 (config) # ipv6 unicast-routing
HYD-2 (config) # ipv6 router ospf 2
HYD-2 (config-rtr) # router-id 22.22.22.22
HYD-2 (config-rtr) # exit
HYD-2 (config) # interface fastethernet 0/0
HYD-2 (config-if) # ipv6 ospf 2 area 0
HYD-2 (config-if) # exit
HYD-2 (config) # interface fastethernet 0/1
HYD-2 (config-if) # ipv6 ospf 2 area 0
HYD-2 (config-if) # end
HYD-2 #
Verify OSPFv3 on IPv6 Network
Once OSPF routing is enabled, IPv6 Networks learnt via OSPF are added into the routing table. “O”
represents OSPF route.

HYD-1 – Verification:

HYD-1 # show ip route


IPv6 Routing Table - default - 6 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
B - BGP, HA - Home Agent, MR - Mobile Router, R - RIP
D - EIGRP, EX - EIGRP external, NM - NEMO, ND - Neighbor Discovery
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
C 2001:1111::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:1111::1/128 [0/0]
via FastEthernet0/0, receive
O 2001:2222::/64 [110/2]
via FE80::21C:F6FF:FE85:1FA1, FastEthernet0/1
C 2001:5555::/64 [0/0]
via FastEthernet0/1, directly connected
L 2001:5555::1/128 [0/0]
via FastEthernet0/1, receive
L FF00::/8 [0/0]
via Null0, receive
HYD-1 #

HYD-2 – Verification:

HYD-2 # show ipv6 route


IPv6 Routing Table - default - 6 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
B - BGP, HA - Home Agent, MR - Mobile Router, R - RIP
D - EIGRP, EX - EIGRP external, NM - NEMO, ND - Neighbor Discovery
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
O 2001:1111::/64 [110/2]
via FE80::21B:2AFF:FEA4:2FE9, FastEthernet0/1
C 2001:2222::/64 [0/0]
via FastEthernet0/0, directly connected
L 2001:2222::1/128 [0/0]
via FastEthernet0/0, receive
C 2001:5555::/64 [0/0]
via FastEthernet0/1, directly connected
L 2001:5555::2/128 [0/0]
via FastEthernet0/1, receive
L FF00::/8 [0/0]
via Null0, receive
HYD-2#
Verify communication between the IPv6 networks

Verification from a Computer in HYD-1 Network

ping 2001:2222::10 (Windows) or ping6 2001:2222::10 (Linux)

PING 2001:2222::10(2001:2222::10) 56 data bytes


64 bytes from 2001:2222::10: icmp_seq=1 ttl=62 time=0.494 ms
64 bytes from 2001:2222::10: icmp_seq=2 ttl=62 time=0.361 ms
64 bytes from 2001:2222::10: icmp_seq=3 ttl=62 time=0.335 ms
64 bytes from 2001:2222::10: icmp_seq=4 ttl=62 time=0.336 ms

Verification from a Computer in HYD-2 Network

ping 2001:1111::10 (Windows) or ping6 2001:1111::10 (Linux)

PING 2001:1111::10(2001:1111::10) 56 data bytes


64 bytes from 2001:1111::10: icmp_seq=1 ttl=62 time=0.494 ms
64 bytes from 2001:1111::10: icmp_seq=2 ttl=62 time=0.361 ms
64 bytes from 2001:1111::10: icmp_seq=3 ttl=62 time=0.335 ms
64 bytes from 2001:1111::10: icmp_seq=4 ttl=62 time=0.336 ms

From a Computer in HYD-1 Network trace communication path to a Computer in HYD-2 Network

tracert 2001:2222::10 (Windows) or traceroute6 2001:2222::10 (Linux)

traceroute to 2001:2222::10 (2001:2222::10), 30 hops max, 80 byte packets


1 2001:1111::1 (2001:1111::1) 2.825 ms 3.239 ms 3.665 ms
2 2001:5555::2 (2001:5555::2) 9.086 ms 9.393 ms 9.642 ms
3 2001:2222::10 (2001:2222::10) 9.781 ms 10.474 ms 10.720 ms

From a Computer in HYD-2 Network trace communication path to a Computer in HYD-1 Network

tracert 2001:1111::10 (Windows) or traceroute6 2001:1111::10 (Linux)

traceroute to 2001:1111::10 (2001:1111::10), 30 hops max, 80 byte packets


1 2001:2222::1 (2001:2222::1) 1.071 ms 1.152 ms 1.238 ms
2 2001:5555::1 (2001:5555::1) 4.303 ms 4.930 ms 5.419 ms
3 2001:1111::10 (2001:1111::10) 10.832 ms 11.444 ms 11.541 ms
Verify OSPF Neighbour and Database Table on IPv6 Network

HYD-1 – Verification:

HYD-1 # show ipv6 ospf neighbor


Neighbor ID Pri State Dead Time Interface ID Interface
22.22.22.22 1 FULL/DR 00:00:34 4 FastEthernet0/1
HYD-1 #

HYD-1 # show ipv6 ospf database

OSPFv3 Router with ID (11.11.11.11) (Process ID 2)

Router Link States (Area 0)

ADV Router Age Seq# Fragment ID Link count Bits


11.11.11.11 234 0x80000002 0 1 None
22.22.22.22 233 0x80000002 0 1 None

Net Link States (Area 0)

ADV Router Age Seq# Link ID Rtr count


22.22.22.22 233 0x80000001 4 2
HYD-2#

HYD-2 – Verification:

HYD-2 # show ipv6 ospf neighbor


Neighbor ID Pri State Dead Time Interface ID Interface
11.11.11.11 1 FULL/BDR 00:00:34 4 FastEthernet0/1
HYD-2 #

HYD-2 # show ipv6 ospf database

OSPFv3 Router with ID (22.22.22.22) (Process ID 2)

Router Link States (Area 0)

ADV Router Age Seq# Fragment ID Link count Bits


11.11.11.11 234 0x80000002 0 1 None
22.22.22.22 233 0x80000002 0 1 None

Net Link States (Area 0)

ADV Router Age Seq# Link ID Rtr count


22.22.22.22 233 0x80000001 4 2

HYD-2#
Lab 17: Initial Configuration of Switch
OBJECTIVE:
To get familiar with Cisco Switch IOS modes and configure a New Switch with basic configuration i.e.
assigning management IP address to the switch and configure passwords etc.

TOPOLOGY:
Setup console and ethernet connectivity for the lab as below:

TASK:
 Establish console connectivity
 Access switch via console with an emulation software
 Get familiar with Cisco Switch IOS Modes and Show commands
 Configure Hostname and VLAN 1 Interface IP address
 Configure Connectivity Passwords
 Configure Privilege Mode / Enable Password
 Save configuration on the switch
 Access the Switch via Telnet
Establish console connectivity
Establish console connectivity by connecting switch console port to PC Com Port with console cable.

Access switch via console with an emulation software


Configure the following parameters in emulation software for accessing switch via console port.

Parameters Console Port Settings

Baud 9600

Data bits 8

Parity None

Stop bits 1

Accessing switch via console from Microsoft Windows Computer


 Start a terminal emulator application, such as PUTTY.exe
 Select Serial option and set speed to 9600.
 Click Open

 Once emulation software is ready, Power-ON the switch.

Accessing switch via console from Linux Computer


 From the terminal enter the below command
# minicom

 Once emulation software is ready, Power-ON the Switch.


Getting familiar with Cisco Switch IOS Modes and show commands

After the switch boots-up completely, (on a new Cisco Switch) it enters user mode as below:

Switch>

To navigate into Privilege mode/Executive Mode from User Mode


Switch >enable
Switch #

To view switch IOS and hardware information


Switch # show version
Cisco Internetwork Operating System Software
IOS (tm) C2950 Software (C2950-I6Q4L2-M), Version 12.1(22)EA6, RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2005 by cisco Systems, Inc.
Compiled Fri 21-Oct-05 01:59 by yenanh
Image text-base: 0x80010000, data-base: 0x80568000

ROM: Bootstrap program is C2950 boot loader

Switch uptime is 4 minutes


System returned to ROM by power-on
System image file is "flash:/c2950-i6q4l2-mz.121-22.EA6.bin"

cisco WS-C2950-24 (RC32300) processor (revision G0) with 21013K bytes of memory.
Processor board ID FOC0638Z0TB
Last reset from system-reset
Running Standard Image
24 FastEthernet/IEEE 802.3 interface(s)

32K bytes of flash-simulated non-volatile configuration memory.


Base ethernet MAC Address: 00:0A:F4:C5:94:C0
Motherboard assembly number: 73-5781-11
Power supply part number: 34-0965-01
Motherboard serial number: FOC06380AZK
Power supply serial number: DAB06347236
Model revision number: G0
Motherboard revision number: A0
Model number: WS-C2950-24
System serial number: FOC0638Z0TB
Configuration register is 0xF

Switch #
To view switch flash Information
Switch # show flash

Directory of flash:/
1 -rwx 3110758 Mar 01 1993 08:30:59 +00:00 c2950-i6q4l2-mz.121-22.EA6.bin
2 -rwx 564 Mar 01 1993 00:00:28 +00:00 vlan.dat

7741440 bytes total (4628480 bytes free)


Switch #

To view switch current configuration (RAM)


Switch # show running-config
Building configuration...

Current configuration : 1071 bytes


!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch
!
spanning-tree mode pvst
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
<output omitted>
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
ip http server
!
line con 0
line vty 5 15
!
end
Switch #
To view switch startup configuration (NVRAM)
Switch # show startup-config
startup-config is not present

To view detailed interface information (i.e. Vlan, interface status, etc.)


Switch # show interface status

Port Name Status Vlan Duplex Speed Type


Fa0/1 connected 1 a-full a-100 10/100BaseTX
Fa0/2 connected 1 a-full a-100 10/100BaseTX
Fa0/3 connected 1 a-full a-100 10/100BaseTX
Fa0/4 connected 1 a-full a-100 10/100BaseTX
Fa0/5 connected 1 a-full a-100 10/100BaseTX
Fa0/6 notconnect 1 auto auto 10/100BaseTX
Fa0/7 notconnect 1 auto auto 10/100BaseTX
Fa0/8 notconnect 1 auto auto 10/100BaseTX
Fa0/9 notconnect 1 auto auto 10/100BaseTX
Fa0/10 connected 1 a-half a-10 10/100BaseTX
Fa0/11 connected 1 a-half a-10 10/100BaseTX
Fa0/12 connected 1 a-half a-10 10/100BaseTX
Fa0/13 connected 1 a-half a-10 10/100BaseTX
Fa0/14 notconnect 1 auto auto 10/100BaseTX
Fa0/15 notconnect 1 auto auto 10/100BaseTX
Fa0/16 notconnect 1 auto auto 10/100BaseTX
Fa0/17 notconnect 1 auto auto 10/100BaseTX
Fa0/18 notconnect 1 auto auto 10/100BaseTX
Fa0/19 notconnect 1 auto auto 10/100BaseTX
Fa0/20 notconnect 1 auto auto 10/100BaseTX
Fa0/21 notconnect 1 auto auto 10/100BaseTX
Fa0/22 notconnect 1 auto auto 10/100BaseTX
Fa0/23 notconnect 1 auto auto 10/100BaseTX
Fa0/24 notconnect 1 auto auto 10/100BaseTX
Switch #

Switch2960 (config) # ip default-gateway 172.16.10.1


Switch2960 (config-if) # description Finance VLAN

THE MDIX AUTO COMMAND


Switch2960 (config-if) # mdix auto

NOTE: The Auto-MDIX feature is enabled by default on switches running Cisco IOS Release
12.2(18) SE or later. For releases between Cisco IOS Release 12.1(14) EA1 and
12.2(18) SE, the Auto-MDIX feature is disabled by default.
To view Mac Address Table
Switch # show mac-address-table
Mac Address Table
---------------------------------------------------------------
Vlan Mac Address Type Ports
---------------------------------------------------------------
All 000a.f4c5.94c0 STATIC CPU
All 0100.0ccc.cccc STATIC CPU
All 0100.0ccc.cccd STATIC CPU
All 0100.0cdd.dddd STATIC CPU
1 0002.4b60.d100 DYNAMIC Fa0/13
1 0002.fd73.7f20 DYNAMIC Fa0/11
1 0010.7bb3.6f20 DYNAMIC Fa0/12
1 001c.c012.4f54 DYNAMIC Fa0/4
1 0030.9476.f160 DYNAMIC Fa0/10
Total Mac Addresses for this criterion: 5
Switch #

Switch-50#show mac-address-table aging-time


Global Aging Time: 300
Vlan Aging Time
---- ----------
ALL 300

Switch-50#show mac-address-table count


Mac Entries for Vlan 1:
---------------------------
Dynamic Address Count: 20
Static Address Count: 0
Total Mac Addresses : 20

Total Mac Address Space Available: 8170

Switch-50#
Switch-50#show mac-address-table dynamic
Mac Address Table
-------------------------------------------

Vlan Mac Address Type Ports


---- ----------- -------- -----
1 0008.219e.c780 DYNAMIC Fa0/16
1 000d.bc8c.a618 DYNAMIC Fa0/18
1 000f.23d2.2200 DYNAMIC Fa0/23
1 0011.2018.67e0 DYNAMIC Fa0/14

MANAGING THE MAC ADDRESS TABLE


Switch# show mac address-table
Switch# clear mac address-table
Switch# clear mac address-table dynamic

Configure Hostname and VLAN 1 Interface IP address

To change the Host Name of Switch


Switch # configure terminal
Switch (config) # hostname SW1
SW1 (config) #

To configure IP address on Interface VLAN 1


SW1 (config) # interface vlan 1
SW1 (config-if) # ip address 192.168.20.50 255.255.255.0
SW1 (config-if) # no shutdown
SW1 (config-if) #exit

Configure Connectivity Passwords

To configure telnet password


SW1 (config) # line vty 0 15
SW1 (config-line) # password zoom
SW1 (config-line) #login
SW1 (config-line) #exit

To configure console password


SW1 (config) # line console 0
SW1 (config-line) # password zoom
SW1 (config-line) #login
SW1 (config-line) # exit

Configure Privilege Mode / Enable Password

Configure privilege password


SW1 (config) #enable password ccna
SW1 (config) #enable secret zoom
Configure Default Gateway and Description on Interface
Configure speed on interface

SW1 (config)#interface fastethernet 0/1

SW1 (config-if)#speed (10/100/1000)

configure half duplex full duplex and auto

SW1 (config)#interface fastethernet 0/0

SW1 (config-if)#duplex (Full/Half/Auto)

SW1 (config) # ip default-gateway 192.168.20.1

SW1 (config) # interface fastethernet 0/24


SW1 (config-if) # description Link to SW2
SW1 (config-if) # end

Save configuration on the switch

To save configuration on switch


SW1 # copy running-config startup-config
Destination filename [startup-config]?
Building configuration...

[OK]
SW1 #

To view switch startup configuration (NVRAM)


SW1 # show startup-config
Building configuration...
Current configuration : 1230 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname SW1
!
enable secret 5 $1$HYD-1we$Mk0jdo9UpDL1T7kqcKHhk1
enable password ccna
!
ip subnet-zero
!
spanning-tree mode pvst
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
!
<output omitted>
!
interface FastEthernet0/23
!
interface FastEthernet0/24
description Link to SW2
!
interface Vlan1
ip address 192.168.20.50 255.255.255.0
no ip route-cache
!
ip default-gateway 192.168.20.1
ip http server
!
line con 0
password zoom
login
line vty 0 4
password zoom
login
line vty 5 15
password zoom
login
!
!
end

Access the Switch via Telnet


 Access switch via telnet by giving the following command on a Windows or Linux computer.
telnet 192.168.20.50
Lab 18: VLAN and Trunking

OBJECTIVE:
To configure VLANs and trunking in a switched network.

TOPOLOGY:
Setup Switch and Computer connectivity for the lab as below:

TASK:
 Verify communication between the computers connected to same as well as a different switch.
 Verify Default VLAN information
 Configure and Implement VLANs
 Verify communication between the computers connected to same switch.
 Configure Trunking
 Verify communication between the computers connected to different switches.
Verify communication between the computers connected to same and different switches

From 192.168.20.1 computer (i.e. PC1) ping computers on the same switch
ping 192.168.20.2

PING 192.168.20.2 (192.168.20.2) 56(84) bytes of data.


64 bytes from 192.168.20.2: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.2: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.2: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.2: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.20.3

PING 192.168.20.3 (192.168.20.3) 56(84) bytes of data.


64 bytes from 192.168.20.3: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.3: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.3: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.3: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.20.5

PING 192.168.20.5 (192.168.20.5) 56(84) bytes of data.


64 bytes from 192.168.20.5: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.5: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.5: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.5: icmp_seq=4 ttl=62 time=24.0 ms

From 192.168.20.1 computer (i.e. PC1) ping computers on the other switch

ping 192.168.20.12

PING 192.168.20.12 (192.168.20.12) 56(84) bytes of data.


64 bytes from 192.168.20.12: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.12: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.12: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.12: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.20.13

PING 192.168.20.13 (192.168.20.13) 56(84) bytes of data.


64 bytes from 192.168.20.13: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.13: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.13: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.13: icmp_seq=4 ttl=62 time=24.0 ms
ping 192.168.20.15

PING 192.168.20.15 (192.168.20.15) 56(84) bytes of data.


64 bytes from 192.168.20.15: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.15: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.15: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.15: icmp_seq=4 ttl=62 time=24.0 ms

Verify Default VLAN information

To view existing VLAN and port assigned to VLAN


SW1 – Verification:

SW1 # show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9,
Fa0/10, Fa0/11, Fa0/12, Fa0/13, Fa0/14, Fa0/15, Fa0/16, Fa0/17,
Fa0/18, Fa0/19, Fa0/20, Fa0/21, Fa0/22, Fa0/23,Fa0/24
1002 fddi-default act/unsup
1003 trcrf-default act/unsup
1004 fddinet-default act/unsup
1005 trbrf-default act/unsup
SW1 #

SW2 – Verification:

SW2 # show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9,
Fa0/10, Fa0/11, Fa0/12, Fa0/13, Fa0/14, Fa0/15, Fa0/16, Fa0/17,
Fa0/18, Fa0/19, Fa0/20, Fa0/21, Fa0/22, Fa0/23,Fa0/24
1002 fddi-default act/unsup
1003 trcrf-default act/unsup
1004 fddinet-default act/unsup
1005 trbrf-default act/unsup
SW2 #
Configure and Implement VLAN

SW1 – Configuration
SW1 #configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config) # vlan 10
SW1 (config-vlan) # name SALES
SW1 (config-vlan) #exit
SW1 (config) # vlan 20
SW1 (config-vlan) # name MKTG
SW1 (config-vlan) #exit
SW1 (config) #

SW1 (config) # interface range fastethernet 0/1 -2


SW1 (config-if-range) # switchport mode access
SW1 (config-if-range) # switchport access vlan 10
SW1 (config-if-range) # exit
SW1(config) #
SW1 (config) # interface range fastethernet 0/5 -6
SW1 (config-if-range) # switchport mode access
SW1 (config-if-range) # switchport access vlan 20
SW1 (config-if-range) # exit

SW2 – Configuration
SW2 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW2 (config) # vlan 10
SW2 (config-vlan) # name SALES
SW2 (config-vlan) #exit
SW2 (config) # vlan 20
SW2 (config-vlan) # name MKTG
SW2 (config-vlan) #exit
SW2 (config) #

SW2 (config) # interface range fastethernet 0/1 -2


SW2 (config-if-range) # switchport mode access
SW2 (config-if-range) # switchport access vlan 10
SW2 (config-if-range) # exit
SW2(config) #
SW2 (config) # interface range fastethernet 0/5 -6
SW2 (config-if-range) # switchport mode access
SW2 (config-if-range) # switchport access vlan 20
SW2 (config-if-range) # exit
To view existing VLAN and port assigned to VLAN
SW1 – Verification:

SW1 # show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/3, Fa0/4, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12, Fa0/13,
Fa0/14, Fa0/15, Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/20, Fa0/21,
Fa0/22, Fa0/23, Fa0/24
10 SALES active Fa0/1, Fa0/2
20 MKTG active Fa0/5, Fa0/6
1002 fddi-default act/unsup
1003 trcrf-default act/unsup
1004 fddinet-default act/unsup
1005 trbrf-default act/unsup
SW1 #

SW1 # show interface fastethernet 0/1 switchport


Name: Fa0/1
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 10 (SALES)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none

SW1 #
SW2 – Verification:

SW2 # show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/3, Fa0/4, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12, Fa0/13,
Fa0/14, Fa0/15, Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/20, Fa0/21,
Fa0/22, Fa0/23, Fa0/24
10 SALES active Fa0/1, Fa0/2
20 MKTG active Fa0/5, Fa0/6
1002 fddi-default act/unsup
1003 trcrf-default act/unsup
1004 fddinet-default act/unsup
1005 trbrf-default act/unsup
SW2 #

SW2 # show interface fastethernet 0/1 switchport


Name: Fa0/5
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 20 (MKTG)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none

SW2 #
Verify communication between the computers connected to same switch.

From 192.168.20.1 computer (i.e. PC1)


ping 192.168.20.2

PING 192.168.20.2 (192.168.20.2) 56(84) bytes of data.


64 bytes from 192.168.20.2: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.2: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.2: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.2: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.20.3

PING 192.168.20.3 (192.168.20.3) 56(84) bytes of data.


From 192.168.20.1 icmp_seq=1 Destination Host Unreachable
From 192.168.20.1 icmp_seq=2 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable

ping 192.168.20.5

PING 192.168.20.5 (192.168.20.5) 56(84) bytes of data.


From 192.168.20.1 icmp_seq=1 Destination Host Unreachable
From 192.168.20.1 icmp_seq=2 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable

From 192.168.20.6 computer (i.e. PC6)


ping 192.168.20.2

PING 192.168.20.2 (192.168.20.2) 56(84) bytes of data.


From 192.168.20.6 icmp_seq=1 Destination Host Unreachable
From 192.168.20.6 icmp_seq=2 Destination Host Unreachable
From 192.168.20.6 icmp_seq=3 Destination Host Unreachable
From 192.168.20.6 icmp_seq=3 Destination Host Unreachable

ping 192.168.20.5

PING 192.168.20.5 (192.168.20.5) 56(84) bytes of data.


64 bytes from 192.168.20.5: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.5: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.5: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.5: icmp_seq=4 ttl=62 time=24.0 ms
Configure Trunking

SW1 – Configuration
SW1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config)# interface fastethernet 0/24
SW1 (config-if)# switchport mode trunk
SW1 (config-if)# switchport trunk allowed vlan all
SW1 (config-if)# ^Z
SW1 #

SW2 – Configuration
SW2 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW2 (config)# interface fastethernet 0/24
SW2 (config-if)# switchport mode trunk
SW2 (config-if)# switchport trunk allowed vlan all
SW2 (config-if)# ^Z
SW2 #

Verify trunk configuration

SW1 – Verification:

SW1 # show interface trunk

Port Mode Encapsulation Status Native vlan


Fa0/24 on 802.1q trunking 1

Port Vlans allowed on trunk


Fa0/24 1-4094

Port Vlans allowed and active in management domain


Fa0/24 1,10,20

Port Vlans in spanning tree forwarding state and not pruned


Fa0/24 none

SW1 #
SW1 # show interface fastethernet 0/24 switchport
Name: Fa0/24
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none

SW1 #

SW2 – Verification:

SW2 # show interface trunk

Port Mode Encapsulation Status Native vlan


Fa0/24 on 802.1q trunking 1

Port Vlans allowed on trunk


Fa0/24 1-4094

Port Vlans allowed and active in management domain


Fa0/24 1,10,20

Port Vlans in spanning tree forwarding state and not pruned


Fa0/24 none
SW2 #
SW2 # show interface fastethernet 0/24 switchport
Name: Fa0/24
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none

SW2 #
Verify communication between the computers connected to different switch.

From 192.168.20.1 computer (i.e. PC1)


ping 192.168.20.12

PING 192.168.20.12 (192.168.20.12) 56(84) bytes of data.


64 bytes from 192.168.20.12: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.12: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.12: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.12: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.20.13

PING 192.168.20.13 (192.168.20.13) 56(84) bytes of data.


From 192.168.20.1 icmp_seq=1 Destination Host Unreachable
From 192.168.20.1 icmp_seq=2 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable

ping 192.168.20.15

PING 192.168.20.15 (192.168.20.15) 56(84) bytes of data.


From 192.168.20.1 icmp_seq=1 Destination Host Unreachable
From 192.168.20.1 icmp_seq=2 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable

Switch# show vlan id 2


Switch# show vlan name marketing
SETTING THE VLAN ENCAPSULATION TYPE
Switch3650 (config-if) # switchport mode trunk
Switch3650 (config-if) # switchport trunk encapsulation isl / dot1q
Lab 19: Voice VLAN Configuration

OBJECTIVE:

Creation and implementation of voice vlan

TOPOLOGY:

TASK:
 Verify communication between the computers connected to same as well as a different switch.
 Verify Default VLAN information
 Configure and Implement VLANs
 Verify communication between the computers connected to same switch.
 Configure Trunking
 Verify communication between the computers connected to different switches.

Data & Voice vlan Configuration:


voice and data vlan creation
SW1(config)#vlan 100
SW1(config-vlan)#name data
SW1(config-vlan)#exit
SW1(config)#vlan 101
SW1(config-vlan)#name voice
SW1(config-vlan)#exit

Data & Voice vlan Implementation

SW1(config)#interface fastethernet 0/1


SW1(config-if)#switchport mode access
SW1(config-if)#switchport access vlan 100
SW1(config-if)#switchport voice vlan 101
SW1(config-if)#exit
sw-1(config)#exit
Sw-1#

Verifying Data & Voice vlan Configuration


Verification:

SW-1#show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12, Fa0/13, Fa0/14
Fa0/15, Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
100 DATA active Fa0/1
101 Voice active Fa0/1
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
SW-1#

SW-1#show interfaces fastEthernet 0/1 switchport


Name: Fa0/1
Switchport: Enabled
Administrative Mode: static access
Operational Mode: down (suspended member of bundle Po3)
Administrative Trunking Encapsulation: dot1q
Negotiation of Trunking: Off
Access Mode VLAN: 100 (DATA)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: 101 (Voice)
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none
SW-1#

SW-1#show running-config
Building configuration...
Current configuration : 1374 bytes
!
interface FastEthernet0/1
switchport mode access
switchport access vlan 100
switchport voice vlan 101
interface FastEthernet0/2
interface FastEthernet0/3
--More--
Lab 20: Dynamic Trunking Protocol (DTP)

OBJECTIVE:
To configure Dynamic trunking protocol in a switched network.

TOPOLOGY:
Setup Switch and Computer connectivity for the lab as below:

Pre-requisite: VLAN and Trunking configuration to be done on the Switch (LAB – 20)

TASK:
 Configure Dynamic Trunking Protocol (DTP)
 Verify communication between the computers connected to different switches.
Configure DTP Trunking

SW1 – Configuration
SW1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config)# interface fastethernet 0/24
SW1 (config-if)# switchport mode dynamic desirable
SW1 (config-if)# end
SW1 #

SW2 – Configuration
SW2 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW2 (config)# interface fastethernet 0/24
SW2 (config-if)# switchport mode dynamic auto
SW2 (config-if)# end
SW2 #

Verify DTP Trunk configuration

SW1 – Verification:

SW1 # show interface trunk

Port Mode Encapsulation Status Native vlan


Fa0/24 desirable 802.1q trunking 1

Port Vlans allowed on trunk


Fa0/24 1-4094

Port Vlans allowed and active in management domain


Fa0/24 1,10,20

Port Vlans in spanning tree forwarding state and not pruned


Fa0/24 none

SW1 #
SW1 # show interface fastethernet 0/24 switchport
Name: Fa0/24
Switchport: Enabled
Administrative Mode: dynamic desirable
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none

SW1 #

SW2 – Verification:

SW2 # show interface trunk

Port Mode Encapsulation Status Native vlan


Fa0/24 Auto 802.1q trunking 1

Port Vlans allowed on trunk


Fa0/24 1-4094

Port Vlans allowed and active in management domain


Fa0/24 1,10,20

Port Vlans in spanning tree forwarding state and not pruned


Fa0/24 none
SW2 #
SW2 # show interface fastethernet 0/24 switchport
Name: Fa0/24
Switchport: Enabled
Administrative Mode: dynamic auto
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none

SW2 #
Verify communication between the computers connected to different switch.

From 192.168.20.1 computer (i.e. PC1)


ping 192.168.20.12

PING 192.168.20.12 (192.168.20.12) 56(84) bytes of data.


64 bytes from 192.168.20.12: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.20.12: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.20.12: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.20.12: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.20.13

PING 192.168.20.13 (192.168.20.13) 56(84) bytes of data.


From 192.168.20.1 icmp_seq=1 Destination Host Unreachable
From 192.168.20.1 icmp_seq=2 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable

ping 192.168.20.15

PING 192.168.20.15 (192.168.20.15) 56(84) bytes of data.


From 192.168.20.1 icmp_seq=1 Destination Host Unreachable
From 192.168.20.1 icmp_seq=2 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable
From 192.168.20.1 icmp_seq=3 Destination Host Unreachable
Lab 21: VLAN Trunking Protocol (VTP)

OBJECTIVE:
To implement VTP domain name and password on switches across the network.

TOPOLOGY:
Setup Switch connectivity for the lab as below:

Pre-requisite: VLAN and Trunking configuration to be done on the Switch (LAB – 20)

TASK:
 Configure VTP domain name and password
 Verify the working of VTP
Configure VTP Domain Name and Password

SW1 – VTP Server Configuration

SW1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config) # vtp domain ZOOM
Changing VTP domain name from null to ZOOM
SW1 (config) # vtp password CCNA
Setting device VLAN database password to CCNA
SW1 (config) # ^Z
SW1 #

SW2 – VTP Client Configuration

SW2 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW2 (config) # vtp domain ZOOM
Changing VTP domain name from null to ZOOM
SW2 (config) # vtp password CCNA
Setting device VLAN database password to CCNA
SW2 (config) # vtp mode client
Setting device to VTP CLIENT mode.
SW2 (config) # ^Z
SW2 #

SW1 – Verification:
SW1 # show vtp status
VTP Version : 2
Configuration Revision : 0
Maximum VLANs supported locally : 64
Number of existing VLANs : 5
VTP Operating Mode : Server
VTP Domain Name : ZOOM
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x4C 0x9A 0xF5 0x6A 0x05 0xBA 0x83 0xE3
Configuration last modified by 192.168.20.50 at 3-1-93 02:26:12
SW1#

SW1 # show vtp password


VTP Password: CCNA
SW1#
SW2 – Verification:
SW2 # show vtp status
VTP Version : 2
Configuration Revision : 0
Maximum VLANs supported locally : 64
Number of existing VLANs : 5
VTP Operating Mode : Client
VTP Domain Name : ZOOM
VTP Pruning Mode : Disabled
VTP V2 Mode : Disabled
VTP Traps Generation : Disabled
MD5 digest : 0x4C 0x9A 0xF5 0x6A 0x05 0xBA 0x83 0xE3
Configuration last modified by 192.168.20.50 at 3-1-93 02:26:12
Local updater ID is 192.168.20.50 on interface Vl1 (lowest numbered VLAN interface found)
SW1#

SW2 # show vtp password


VTP Password: CCNA
SW2#

Verify the working of VTP

Create VLANs on Server Switch i.e. SW1 and verify that these VLANs are automatically available on
Client Switch i.e. SW2.

SW1 – Configuration
SW1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config) # vlan 10
SW1 (config-vlan) # name SALES
SW1 (config-vlan) #exit
SW1 (config) # vlan 20
SW1 (config-vlan) # name MKTG
SW1 (config-vlan) #exit
SW1 (config) #
SW1 – Verification:

SW1 # show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/3, Fa0/4, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12, Fa0/13,
Fa0/14, Fa0/15, Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/20, Fa0/21,
Fa0/22, Fa0/23, Fa0/24
10 SALES active
20 MKTG active
1002 fddi-default act/unsup
1003 trcrf-default act/unsup
1004 fddinet-default act/unsup
1005 trbrf-default act/unsup
SW1 #

SW2 – Verification:

SW2 # show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/3, Fa0/4, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12, Fa0/13,
Fa0/14, Fa0/15, Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/20, Fa0/21,
Fa0/22, Fa0/23, Fa0/24
10 SALES active
20 MKTG active
1002 fddi-default act/unsup
1003 trcrf-default act/unsup
1004 fddinet-default act/unsup
1005 trbrf-default act/unsup
SW2 #

Try to create VLANs on Client Switch i.e. SW2

SW2 – Verification:

SW2 (config) # vlan 100


VTP VLAN configuration not allowed when device is in CLIENT mode.

VLAN TRUNKING PROTOCOL (VTP)


Switch (config) # vtp version <number>

Switch 2960# vtp primary-server


Switch 2960# vtp primary-server vlan
Switch 2960# vtp primary-server mst
Switch 2960# vtp primary-server force
Switch 2960# vtp primary
Switch 2960# vtp pruning
Lab 22: Router on a Stick (Inter-VLAN Routing)

OBJECTIVE:
To configure inter-vlan routing for communication between VLANs, by configuring sub interfaces on a
router.

TOPOLOGY:
Setup connectivity for the lab as below:

Pre-requisite: VLAN configuration to be done on the switch (LAB – 20)

TASK:
 Verify communication between the computers in Different VLAN
 Configure Sub Interfaces and IP Routing on Router
 Verify communication between the computers in Different VLAN
Verify communication between the computers in Different VLAN

From 192.168.110.1 computer (i.e. PC1)


ping 192.168.110.2

PING 192.168.110.2 (192.168.110.2) 56(84) bytes of data.


64 bytes from 192.168.110.2: icmp_seq=1 ttl=64 time=24.0 ms
64 bytes from 192.168.110.2: icmp_seq=2 ttl=64 time=24.0 ms
64 bytes from 192.168.110.2: icmp_seq=3 ttl=64 time=24.1 ms
64 bytes from 192.168.110.2: icmp_seq=4 ttl=64 time=24.0 ms

ping 192.168.120.2

PING 192.168.120.2 (192.168.120.2) 56(84) bytes of data.


From 192.168.120.2 icmp_seq=1 Destination Host Unreachable
From 192.168.120.2 icmp_seq=2 Destination Host Unreachable
From 192.168.120.2 icmp_seq=3 Destination Host Unreachable
From 192.168.120.2 icmp_seq=3 Destination Host Unreachable

From 192.168.120.1 computer (i.e. PC5)


ping 192.168.110.2

PING 192.168.110.2 (192.168.110.2) 56(84) bytes of data.


From 192.168.110.2 icmp_seq=1 Destination Host Unreachable
From 192.168.110.2 icmp_seq=2 Destination Host Unreachable
From 192.168.110.2 icmp_seq=3 Destination Host Unreachable
From 192.168.110.2 icmp_seq=3 Destination Host Unreachable

ping 192.168.120.2

PING 192.168.120.2 (192.168.120.2) 56(84) bytes of data.


64 bytes from 192.168.120.2: icmp_seq=1 ttl=64 time=24.0 ms
64 bytes from 192.168.120.2: icmp_seq=2 ttl=64 time=24.0 ms
64 bytes from 192.168.120.2: icmp_seq=3 ttl=64 time=24.1 ms
64 bytes from 192.168.120.2: icmp_seq=4 ttl=64 time=24.0 ms
Configure Sub Interfaces and IP Routing on Router

ROUTER – Configuration

ROUTER (config) # interface FastEthernet 0/0


ROUTER (config-if) # no shutdown
ROUTER (config-if) # exit
ROUTER (config) # interface FastEthernet 0/0.1
ROUTER (config-subif) # encapsulation dot1q 10
ROUTER (config-subif) # ip address 192.168.110.254 255.255.255.0
ROUTER (config-subif) # exit
ROUTER (config) # interface FastEthernet 0/0.2
ROUTER (config-subif) # encapsulation dot1q 20
ROUTER (config-subif) # ip address 192.168.120.254 255.255.255.0
ROUTER (config-subif) # exit
ROUTER (config) # ip routing
ROUTER (config) #

ROUTER – Verification
ROUTER # show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override

Gateway of last resort is not set

192.168.110.0/24 is variably subnetted, 2 subnets, 2 masks


C 192.168.110.0/24 is directly connected, FastEthernet0/0.1
L 192.168.110.254/32 is directly connected, GigabitEthernet0/0.1
192.168.120.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.120.0/24 is directly connected, FastEthernet0/0.2
L 192.168.120.254/32 is directly connected, GigabitEthernet0/0.2
Router #
Verify communication between the computers in Different VLAN

From 192.168.110.1 computer (i.e. PC1)


ping 192.168.110.2

PING 192.168.110.2 (192.168.110.2) 56(84) bytes of data.


64 bytes from 192.168.110.2: icmp_seq=1 ttl=64 time=24.0 ms
64 bytes from 192.168.110.2: icmp_seq=2 ttl=64 time=24.0 ms
64 bytes from 192.168.110.2: icmp_seq=3 ttl=64 time=24.1 ms
64 bytes from 192.168.110.2: icmp_seq=4 ttl=64 time=24.0 ms

ping 192.168.120.2

PING 192.168.120.2 (192.168.120.2) 56(84) bytes of data.


64 bytes from 192.168.120.2: icmp_seq=1 ttl=63 time=24.0 ms
64 bytes from 192.168.120.2: icmp_seq=2 ttl=63 time=24.0 ms
64 bytes from 192.168.120.2: icmp_seq=3 ttl=63 time=24.1 ms
64 bytes from 192.168.120.2: icmp_seq=4 ttl=63 time=24.0 ms

From 192.168.120.1 computer (i.e. PC5)


ping 192.168.110.2

PING 192.168.110.2 (192.168.110.2) 56(84) bytes of data.


64 bytes from 192.168.110.2: icmp_seq=1 ttl=63 time=24.0 ms
64 bytes from 192.168.110.2: icmp_seq=2 ttl=63 time=24.0 ms
64 bytes from 192.168.110.2: icmp_seq=3 ttl=63 time=24.1 ms
64 bytes from 192.168.110.2: icmp_seq=4 ttl=63 time=24.0 ms

ping 192.168.120.2

PING 192.168.120.2 (192.168.120.2) 56(84) bytes of data.


64 bytes from 192.168.120.2: icmp_seq=1 ttl=64 time=24.0 ms
64 bytes from 192.168.120.2: icmp_seq=2 ttl=64 time=24.0 ms
64 bytes from 192.168.120.2: icmp_seq=3 ttl=64 time=24.1 ms
64 bytes from 192.168.120.2: icmp_seq=4 ttl=64 time=24.0 ms
Lab 23: Routing Between VLANs using Multilayer Switch

OBJECTIVE:

To enable communication between different vlans with the help of Multi Layer SW-1.

TOPOLOGY:

TASK:
 Verify communication between the computers in Different VLAN
 Configure Swtich Virtual Interface and IP Routing on Router
 Verify communication between the computers in Different VLAN

Configuring VLAN in the Multilayer Switch (Layer 2 VLAN)

Configuration:
Vlan creation
SW-1(config)#vlan 10
SW-1(config-vlan)#name sales
SW-1(config-vlan)#exit
SW-1(config)#
SW-1(config)#vlan 20
SW-1(config-vlan)#name IT
SW-1(config-vlan)#exit
SW-1(config t)#
Implementing Layer 2 VLAN

vlan implementation
SW-1(Config)#interface fastethernet 0/1
SW-1(config-if) #switchport mode access
SW-1(config-if)#switchport access vlan 10
SW-1(config-if)#exit
SW-1(config)#
SW-1(config)#interface fastethernet 0/3
SW-1(config-if)#switchport mode access
SW-1(config-if)#switchport access vlan 20
SW-1(config)#exit

Verifing Layer 2 VLAN

Verification
SW-1#show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/2, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9
Fa0/10, Fa0/11, Fa0/12, Fa0/13, Fa0/14, Fa0/15
Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/20, Fa0/21
Fa0/22, Fa0/23, Fa0/24
10 SALES active Fa0/1
20 IT active Fa0/3

SW-1(config)# Exit
SW-1#

Configuring IP Address to Specific VLAN (SVI)

Assigning ip add to specific vlan


SW-1(config)#interface vlan 10
SW-1(config-if)#ip address 192.168.110.254 255.255.255.0
SW-1(config-if)#exit
SW-1(config)#exit
SW-1#
SW-1(config)#interface vlan 20
SW-1(config-if)#ip address 192.168.120.254 255.255.255.0
SW-1(config-if)#exit
SW-1(config)#exit
SW-1#

Verifing SVI

Verification
SW-1#show running-config
Building configuration...
hostname SW-1
interface FastEthernet0/1
SW-1port access vlan 10
SW-1port mode access
!
interface FastEthernet0/2
!
interface FastEthernet0/3
SW-1port access vlan 20
SW-1port mode access
!
interface FastEthernet0/4

interface Vlan1
ip address 192.168.20.50 255.255.255.0
no ip route-cache
!
interface Vlan10
ip address 192.168.110.254 255.255.255.0
no ip route-cache
interface Vlan20
ip address 192.168.120.254 255.255.255.0
no ip route-cache
SW-1

Routing table
SW-1#show ip route
C 192.168.120.0/24 is directly connected, Vlan20
C 192.168.110.0/24 is directly connected, Vlan10
C 192.168.20.0/24 is directly connected, Vlan1
SW-1#
Lab 24: Cisco Discovery Protocol (CDP)

OBJECTIVE:
To enable CDP on routers and switches across the network for layer 2 troubleshooting.

TOPOLOGY:
Setup Switch connectivity for the lab as below:

TASK:
 Enable CDP
 Verify CDP information
Enabling CDP

SW1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)# cdp run
SW1 #

Verify CDP information

SW1 – Verification:

SW1 # show cdp neighbor


Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone

Device ID Local Intrfce Holdtme Capability Platform Port ID


SW2 Fas 0/24 127 SI WS-C2950-2 Fas 0/24
HYD-1 Fas 0/19 145 RSI Cisco 2821 Gig 0/0
BAN Fas 0/13 124 RSI Cisco 2611 Fas 0/0
CHE Fas 0/14 142 R 2610 Eth 0/0
SW1 #

SW1 # show cdp neighbor detail


-----------------------------------------------------------------------------------------------------------------------------------
Device ID: SW2
Entry address(es):
IP address: 192.168.20.51
Platform: cisco WS-C2950-24, Capabilities: Switch IGMP
Interface: FastEthernet0/24, Port ID (outgoing port): FastEthernet0/24
Holdtime : 167 sec

Version :
Cisco Internetwork Operating System Software
IOS (tm) C2950 Software (C2950-I6Q4L2-M), Version 12.1(13)EA1, RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2003 by cisco Systems, Inc.
Compiled Tue 04-Mar-03 02:14 by yenanh

advertisement version: 2
Protocol Hello: OUI=0x00000C, Protocol ID=0x0112; payload len=27,
value=00000000FFFFFFFF010221FF000000000000000D28F06840FF0000
VTP Management Domain: 'zoom'
Duplex: full
Management address(es):
-----------------------------------------------------------------------------------------------------------------------------------
Device ID: HYD-1
Entry address(es):
IP address: 192.168.202.1
Platform: Cisco 2821, Capabilities: Router Switch IGMP
Interface: FastEthernet0/19, Port ID (outgoing port): GigabitEthernet0/0
Holdtime : 126 sec

Version :
Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 15.1(3)T2, RELEASE
SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2011 by Cisco Systems, Inc.
Compiled Wed 10-Aug-11 05:17 by prod_rel_team

advertisement version: 2
VTP Management Domain: ''
Duplex: full
Management address(es):

-----------------------------------------------------------------------------------------------------------------------------------
Device ID: BAN
Entry address(es):
IP address: 192.168.203.1
Platform: Cisco 2611XM, Capabilities: Router Switch IGMP
Interface: FastEthernet0/13, Port ID (outgoing port): FastEthernet0/0
Holdtime : 165 sec

Version :
Cisco IOS Software, C2600 Software (C2600-ADVENTERPRISEK9-M), Version 12.4(19), RELEASE
SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2008 by Cisco Systems, Inc.
Compiled Fri 29-Feb-08 19:23 by prod_rel_team

advertisement version: 2
VTP Management Domain: ''
Duplex: full
Management address(es):

-----------------------------------------------------------------------------------------------------------------------------------
Device ID: CHE
Entry address(es):
IP address: 192.168.201.1
Platform: cisco 2610, Capabilities: Router
Interface: FastEthernet0/14, Port ID (outgoing port): Ethernet0/0
Holdtime : 122 sec

Version :
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-IS-M), Version 12.1(4), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2000 by cisco Systems, Inc.
Compiled Wed 30-Aug-00 14:11 by cmong

advertisement version: 2
Duplex: half
Management address(es):
Lab 25: Spanning Tree Protocol (STP)

OBJECTIVE:
To understand the default behaviour of STP and how a root bridge election takes place.

TOPOLOGY:
Setup Switch connectivity for the lab as below:

TASK:
 Verify STP behaviour
 Change Priority to force a particular switch to become the Root Bridge
 Verify STP
Verify STP default behaviour

SW1 – Verification:
SW1 # show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8577.2040
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)


Address 000d.28f0.6840
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg LIS 19 128.11 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Root FWD 19 128.23 P2p
Fa0/24 Altn BLK 19 128.24 P2p
SW1 #

SW2 – Verification:
SW2 # show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8577.2040
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)


Address 000c.8577.2040
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Desg FWD 19 128.23 P2p
Fa0/24 Desg FWD 19 128.24 P2p
SW2 #
Configuring particular switch to become the Root Bridge
We can configure a switch to become the Root Bridge by giving root primary command which sets
best bridge priority to become the root bridge. The switch with the lowest priority becomes the Root
Bridge with all ports in forwarding state.

SW1 – Configuration
SW1 (config) # spanning-tree vlan 1 root primary
SW1 (config) # end
SW1 #

SW2 – Configuration
SW2 (config) # spanning-tree vlan 1 root secondary
SW2 (config) # end
SW2 #

Verify STP

SW1 – Verification:
SW1 # show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 4097
Address 000d.28f0.6840
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 4096 (priority 4096 sys-id-ext 1)


Address 000d.28f0.6840
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg LIS 19 128.11 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Desg FWD 19 128.23 P2p
Fa0/24 Desg FWD 19 128.24 P2p

SW1 #
SW2 – Verification:
SW2 # show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 4097
Address 000d.28f0.6840
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 28673 (priority 28672 sys-id-ext 1)


Address 000c.8577.2040
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Root FWD 19 128.23 P2p
Fa0/24 Altn BLK 19 128.24 P2p

SW2 #

CHANGING THE SPANNING-TREE MODE


Switch (config) # spanning-tree mode pvst
Switch (config) # spanning-tree mode mst
Switch (config) # spanning-tree mode rapid-pvst

CONFIGURING THE ROOT SWITCH


Switch (config) # spanning-tree vlan 5 root {primary | secondary}

CONFIGURING PORT PRIORITY


Switch (config) # interface gigabit Ethernet 0/1
Switch (config-if) # spanningtree portpriority 64
Switch (config-if) # spanningtree vlan 5 port-priority 64

CONFIGURING THE PATH COST


Switch (config) # interface gigabit etherne t 0/1
Switch (config-if) # spannin g-tree cost 100000
Switch (config-if) # spannin g-tree vlan 5 cost 1500000

CONFIGURING THE SWITCH PRIORITY OF A VLAN


Switch(config)# spanning-tree vlan 5 priority 12288

CONFIGURING STP TIMERS


Switch(config)# spanning-tree vlan 5 hello-time 4
Switch(config)# spanning-tree vlan 5 forward-time 20
Switch(config)# spanning-tree vlan 5 max-age 25

VERIFYING STP
Switch# show spanning-tree Displays STP information
Switch# show spanning-tree active Displays STP information on active interfaces only
Switch# show spanning-tree bridge Displays status and configuration of this bridge
Switch# show spanning-tree detail Displays a detailed summary of interface information
Switch# show spanning-tree interface gigabitethernet 1/0/1

Displays STP information for interface gigabitethernet 1/0/1


Switch# show spanning-tree summary Displays a summary of port states
Switch# show spanning-tree summary totals Displays the total lines of the STP section
Switch# show spanning-tree vlan 5 Displays STP information for VLAN 5
Lab 26: Portfast and BPDU Guard

OBJECTIVE:
To understand the states of port in STP and difference after configuring Portfast and BPDU Guard.

TOPOLOGY:
Setup Switch connectivity for the lab as below:

TASK:
 Verify states of port in STP
 Configuring Postfast and BPDU guard for an Interface
 Verify states of port in STP
 Configuring Postfast and BPDU guard for a Switch
 Verify Portfast and BPDU Guard configuration for a switch

Note: PortFast is recommended only for those ports which are directly connected to PCs
Verify Port State in STP after enabling Portfast

SW1 – Configuration

SW1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config) # interface fastethernet 0/11
SW1 (config-if) # shutdown
SW1 (config-if) # no shutdown
SW1 (config-if) # end
SW1 #

SW1 – Verification:
Now quickly give show spanning-tree multiple times to view pstates.

SW1 # show spanning-tree


VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8577.2040
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)


Address 000d.28f0.6840
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg BLK 19 128.11 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Root FWD 19 128.23 P2p
Fa0/24 Altn BLK 19 128.24 P2p
SW1 #

SW1 # show spanning-tree


VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8577.2040
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Address 000d.28f0.6840
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg LIS 19 128.11 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Root FWD 19 128.23 P2p
Fa0/24 Altn BLK 19 128.24 P2p
SW1 #

SW1 # show spanning-tree


VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8577.2040
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)


Address 000d.28f0.6840
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg LRN 19 128.11 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Root FWD 19 128.23 P2p
Fa0/24 Altn BLK 19 128.24 P2p
SW1 #

SW1 # show spanning-tree


VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8577.2040
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)


Address 000d.28f0.6840
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg FWD 19 128.11 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Root FWD 19 128.23 P2p
Fa0/24 Altn BLK 19 128.24 P2p
SW1 #

Configuring Postfast and BPDU guard for an Interface

SW1 – Configuration

SW1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config) # interface fastethernet 0/11
SW1 (config-if) # spanning-tree portfast
%Warning: portfast should only be enabled on ports connected to a single
host. Connecting hubs, concentrators, switches, bridges, etc... to this
interface when portfast is enabled, can cause temporary bridging loops.
Use with CAUTION

%Portfast has been configured on FastEthernet0/1 but will only


have effect when the interface is in a non-trunking mode.

SW1 (config-if) # spanning-tree bpduguard enable


SW1 (config-if) # end
SW1 #

Verify Port State in STP after enabling Portfast

SW1 – Configuration

SW1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config) # interface fastethernet 0/11
SW1 (config-if) # shutdown
SW1 (config-if) # no shutdown
SW1 (config-if) # end
SW1 #
SW1 – Verification:
Now quickly give show spanning-tree multiple times to notice that Fa0/11 is placed into FWD state
immediately.

SW1 # show spanning-tree


VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8577.2040
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)


Address 000d.28f0.6840
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg FWD 19 128.11 P2p
Fa0/13 Desg FWD 19 128.13 P2p
Fa0/19 Desg FWD 19 128.19 P2p
Fa0/23 Root FWD 19 128.23 P2p
Fa0/24 Altn BLK 19 128.24 P2p
SW1 #

Configuring Postfast and BPDU guard for a Switch

SW1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.

SW1 (config) # spanning-tree portfast default


%Warning: this command enables portfast by default on all interfaces. You
should now disable portfast explicitly on switched ports leading to hubs,
switches and bridges as they may create temporary bridging loops.

SW1 (config) # spanning-tree portfast bpduguard default


SW1 (config) # end
SW1 #
Verify Portfast and BPDU Guard configuration for switch

SW1 – Verification:

SW 1 # show spanning-tree summary


Switch is in pvst mode
Root bridge for: VLAN0001, VLAN0010, VLAN0020
EtherChannel misconfig guard is enabled
Extended system ID is enabled
Portfast Default is enabled
PortFast BPDU Guard Default is enabled
Portfast BPDU Filter Default is disabled
Loopguard Default is disabled
UplinkFast is disabled
BackboneFast is disabled
Pathcost method used is short

Name Blocking Listening Learning Forwarding STP Active


---------------------- ------------- ------------ ------------ ----------------- ----------------
VLAN0001 0 0 0 8 8
VLAN0010 0 0 0 3 3
VLAN0020 0 0 0 3 3
---------------------- ------------- ------------ ------------ ----------------- ----------------
3 vlans 0 0 0 14 14

SW1 #
Lab 27: Etherchannel

OBJECTIVE:
To configure Etherchannel for link aggregation

TOPOLOGY:
Setup Switch connectivity for the lab as below:

TASK:
 Configure Etherchannel
 Verify Etherchannel
Configure Etherchannel

SW1 – Etherchannel Configuration

SW1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config) # interface range fa 0/23 -24
SW1 (config-if-range) # channel-group 1 mode on
Creating a port-channel interface Port-channel 1
SW1 (config-if-range) # end
SW1 #

SW2 – Etherchannel Configuration

SW2 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW2 (config) # interface range fa 0/23 -24
SW2 (config-if-range) # channel-group 1 mode on
Creating a port-channel interface Port-channel 1
SW2 (config-if-range) # end
SW2 #

Verify Etherchannel

SW1 – Verification:
SW1 # show etherchannel 1 summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - LayeBAN S - LayeHYD-1
U - in use f - failed to allocate aggregator

M - not in use, minimum links not met


u - unsuitable for bundling
w - waiting to be aggregated
d - default port

Number of channel-groups in use: 1


Number of aggregators: 1

Group Port-channel Protocol Ports


---------+------------------------+--------------+----------------------------------------------
1 Po1(SU) - Fa0/23(P) Fa0/24(P)

SW1 #
SW1 # show interface port-channel 1
Port-channel1 is up, line protocol is up (connected)
Hardware is EtherChannel, address is 000f.8f16.3c17 (bia 000f.8f16.3c17)
MTU 1500 bytes, BW 200000 Kbit, DLY 1000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Full-duplex, 100Mb/s, media type is unknown media type
input flow-control is off, output flow-control is off
Members in this channel: Fa0/23 Fa0/24
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:49, output 00:00:01, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
247 packets input, 18093 bytes, 0 no buffer
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 input packets with dribble condition detected
222 packets output, 15835 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 PAUSE output
0 output buffer failures, 0 output buffers swapped out

SW1 # show etherchannel port-channel


Channel-group listing:
-----------------------------
Group: 1
----------
Port-channels in the group:
------------------------------------

Port-channel: Po1
------------------------
Age of the Port-channel = 0d:00h:10m:05s
Logical slot/port = 1/0 Number of ports = 2
GC = 0x00000000 HotStandBy port = null
Port state = Port-channel Ag-Inuse
Protocol = -

Ports in the Port-channel:

Index Load Port EC state No of bits


------+------+------+------------------+-----------
0 00 Fa0/23 On/FEC 0
0 00 Fa0/24 On/FEC 0

Time since last port bundled: 0d:00h:20m:05s Fa0/24


SW1 # show interface status

Port Name Status Vlan Duplex Speed Type


Fa0/1 notconnect 1 auto auto 10/100BaseTX
Fa0/2 notconnect 1 auto auto 10/100BaseTX
!
<output omitted>
!
Fa0/21 notconnect 1 auto auto 10/100BaseTX
Fa0/22 notconnect 1 auto auto 10/100BaseTX
Fa0/23 connected 1 a-full a-100 10/100BaseTX
Fa0/24 connected 1 a-full a-100 10/100BaseTX
Po1 connected 1 a-full a-100

SW1 # show spanning-tree

VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 000c.8577.2040
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)


Address 000d.28f0.6840
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg FWD 19 128.11 P2p
Fa0/19 Desg FWD 19 128.13 P2p
Fa0/20 Desg FWD 19 128.19 P2p
Fa0/21 Root FWD 19 128.23 P2p
Fa0/22 Altn BLK 19 128.24 P2p
Po1 Desg FWD 12 128.65 P2p

SW1 #
SW2 – Verification:
SW2 # show etherchannel 1 summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - LayeBAN S - LayeHYD-1
U - in use f - failed to allocate aggregator

M - not in use, minimum links not met


u - unsuitable for bundling
w - waiting to be aggregated
d - default port

Number of channel-groups in use: 1


Number of aggregators: 1

Group Port-channel Protocol Ports


---------+------------------------+--------------+----------------------------------------------
1 Po1(SU) - Fa0/23(P) Fa0/24(P)

SW2 #

SW2 # show interface port-channel 1


Port-channel1 is up, line protocol is up (connected)
Hardware is EtherChannel, address is 000f.8f16.3c17 (bia 000f.8f16.3c17)
MTU 1500 bytes, BW 200000 Kbit, DLY 1000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Full-duplex, 100Mb/s, media type is unknown media type
input flow-control is off, output flow-control is off
Members in this channel: Fa0/23 Fa0/24
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:49, output 00:00:01, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
247 packets input, 18093 bytes, 0 no buffer
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 input packets with dribble condition detected
222 packets output, 15835 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 PAUSE output
0 output buffer failures, 0 output buffers swapped out
SW2 # show etherchannel port-channel
Channel-group listing:
-----------------------------
Group: 1
----------
Port-channels in the group:
------------------------------------

Port-channel: Po1
------------------------
Age of the Port-channel = 0d:00h:10m:05s
Logical slot/port = 1/0 Number of ports = 2
GC = 0x00000000 HotStandBy port = null
Port state = Port-channel Ag-Inuse
Protocol = -

Ports in the Port-channel:

Index Load Port EC state No of bits


------+------+------+------------------+-----------
0 00 Fa0/23 On/FEC 0
0 00 Fa0/24 On/FEC 0

Time since last port bundled: 0d:00h:20m:05s Fa0/24

SW2 # show interface status

Port Name Status Vlan Duplex Speed Type


Fa0/1 notconnect 1 auto auto 10/100BaseTX
Fa0/2 notconnect 1 auto auto 10/100BaseTX
!
<output omitted>
!
Fa0/21 notconnect 1 auto auto 10/100BaseTX
Fa0/22 notconnect 1 auto auto 10/100BaseTX
Fa0/23 connected 1 a-full a-100 10/100BaseTX
Fa0/24 connected 1 a-full a-100 10/100BaseTX
Po1 connected 1 a-full a-100
SW2 # show spanning-tree

VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 4097
Address 000d.28f0.6840
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 28673 (priority 28672 sys-id-ext 1)


Address 000c.8577.2040
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface Role Sts Cost Prio.Nbr Type


---------------- ---- --- --------- -------- --------------------------------
Fa0/7 Desg FWD 19 128.7 P2p
Fa0/11 Desg FWD 19 128.11 P2p
Fa0/19 Desg FWD 19 128.13 P2p
Fa0/20 Desg FWD 19 128.19 P2p
Fa0/21 Root FWD 19 128.23 P2p
Fa0/22 Altn BLK 19 128.24 P2p
Po1 Desg FWD 12 128.65 P2p
Lab 28: Implementing L3 Etherchannel

OBJECTIVE:

Implementing L3 Etherchannel to Enhance the bandwidth

TOPOLOGY:

TASK:
 Configure L3 Etherchannel
 Verify L3 Etherchannel

Configuring Layer 3 Etherchannel

Configuration:

SW-1 configuration
SW-1(config)#interface range fastethernet 0/23 -24
SW-1(config-if-range)#no switchport
SW-1(config-if-range)#channel-group 1 mode on
SW-1(config-if-range)#exit
SW-1(config)#exit
SW-1#

Layer 3 Interface configure an IP address on this port-channel Interface

SW-1(config)#interface port-channel 1
SW-1(config-if) #ip address 172.16.0.1 255.255.0.0
SW-1(config-if)#exit
SW-1(config)#exit
SW-1#
SW-2 configuration
SW-2(config)#interface range fastethernet 0/23 -24
SW-2(config-if-range)#no switchport
SW-2(config-if-range)#channel-group 1 mode on
SW-2(config-if-range)#exit
SW-2(config)#exit
SW-2#

Layer 3 Interface configure an IP address on this port-channel Interface

SW-2(config)#interface port-channel 1
SW-2(config-if) #ip address 172.16.0.2 255.255.0.0
SW-2(config-if)#exit
SW-2(config)#exit
SW-2#

Verifing Layer 3 Interface configure an IP address on this port-channel Interface

Verification:

SW-1#show interfaces port-channel 1


Port-channel 1 is up, line protocol is up (connected)
Hardware is EtherChannel, address is 0001.646e.2c82 (bia 0001.646e.2c82)
Internet address is 172.16.0.1/16
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
SW-1#
SW-1#show etherchannel port-channel
Group: 1
Port-channels in the group:
Port-channel: Po1
Age of the Port-channel = 00d:00h:06m:03s
Logical slot/port = 2/1 Number of ports = 2
GC = 0x00000000 HotStandBy port = null
Port state = Port-channel
Protocol = PAGP
Port Security = Disabled
Ports in the Port-channel:
Index Load Port EC state No of bits
------+------+------+------------------+-----------
0 00 Fa0/23 On 0
0 00 Fa0/24 On 0
Time since last port bundled: 00d:00h:06m:03s Fa0/24
SW-1#
SW-1#show etherchannel
Channel-group listing:
Group: 1
Group state = L3
Ports: 2 Maxports = 8
Port-channels: 1 Max Port-channels = 1
Protocol: -
SW-1#
SW-1#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
P - periodic downloaded static route
Gateway of last resort is not set
C 172.16.0.0/16 is directly connected, Port-channel 1
SW-1#
Repeat the same verification commands in SW-2.
Lab 29: Port Security

OBJECTIVE:
To implement Port Security on switches across the network.

TOPOLOGY:
Setup Switch connectivity for the lab as below:

TASK:
 Configure Port Security
 Verify Port Security violation
 Configure Port Security Recovery
Configure Port Security

SW1 (config)# interface fastethernet 0/2


SW1 (config-if)# switchport mode access
SW1 (config-if)# switchport port-security maximum 1
SW1 (config-if)# switchport port-security mac-address 0013.20B7.1232
SW1 (config-if)# switchport port-security violation shutdown
SW1 (config-if)# switchport port-security
SW1 (config-if)# ^Z
SW1 #

Verify Port Security Violation


Connect another computer (with different mac-address) to switch port no. 2 and verify the output.

SW1 – Verification:

SW1 # show interface status

Port Name Status Vlan Duplex Speed Type


Fa0/1 connected 1 a-full a-100 10/100BaseTX
Fa0/2 err-disabled 1 auto auto 10/100BaseTX
Fa0/3 connected 1 a-full a-100 10/100BaseTX
!
<output omitted>
!
Fa0/24 connected 1 a-full a-100 10/100BaseTX
SW1#

SW1 # show port-security


Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)
----------------------------------------------------------------------------------------------------------------------
Fa0/2 1 1 1 Shutdown
----------------------------------------------------------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 1024
SW1 #
Configure Port Security Recovery

SW1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
SW1 (config)# errdisable recovery cause psecure-violation
SW1 (config)# errdisable recovery interval 30
SW1 (config)# exit

SW1 # show errdisable recovery

ErrDisable Reason Timer Status


------------------------ --------------
udld Disabled
bpduguard Disabled
security-violatio Disabled
channel-misconfig Disabled
vmps Disabled
pagp-flap Disabled
dtp-flap Disabled
link-flap Disabled
psecure-violation Enabled
gbic-invalid Disabled
dhcp-rate-limit Disabled
unicast-flood Disabled
loopback Disabled

Timer interval: 30 seconds

Interfaces that will be enabled at the next timeout:


Interface Errdisable reason Time left(sec)
------------- ------------------------ --------------------
Fa0/2 psecure-violation 15

SW1 #

Repeat the above steps by reconfiguring violation command (restrict and protect) and verify the
output.
SW1 (config-if)# switchport port-security violation restrict
OR
SW1 (config-if)# switchport port-security violation protect
Lab 30: Standard Access Control List on IPv4 Network (NUMBERED)

OBJECTIVE:
To configure and implement access-list on HYD-1 such that 192.168.201.10 should not communicate
with 192.168.202.0 network

TOPOLOGY:
Configure Ethernet and Serial IP addresses for the lab as below:

Pre-requisite: WAN Interface and Routing configuration to be done on the router (LAB – 3 and 4)

TASK:
 Verify communication between computers / networks before configuring the access list
 Configure and implement Standard ACL - Numbered
 Verify blocked communication between computers / networks specified in ACL
Verify communication between computers / networks before configuring the access list

From 192.168.201.10 Computer in CHE Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

From 192.168.202.20 computer in CHE Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms
Configure and Implement Standard ACL - Numbered

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # access-list 10 deny 192.168.201.10 0.0.0.0
HYD-1 (config) # access-list 10 permit any
HYD-1 (config) #

HYD-1 (config) # interface FastEthernet 0/0


HYD-1 (config-if) # ip access-group 1 out
HYD-1 (config-if) # end
HYD-1 #

HYD-1 – Verification:

HYD-1 # show ip access-lists


Standard IP access list 10
10 deny 192.168.201.10
20 permit any
HYD-1#

HYD-1 # show ip interface FastEthernet 0/0


FastEthernet0/0 is up, line protocol is up
Internet address is 192.168.202.1/24
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is 10
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
!
<output omitted>
!
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
HYD-1#
Verify blocked communication between computers / networks specified in ACL

From 192.168.201.10 computer in CHE Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


From 192.168.202.1 icmp_seq=1 Packet filtered
From 192.168.202.1 icmp_seq=2 Packet filtered
From 192.168.202.1 icmp_seq=3 Packet filtered
From 192.168.202.1 icmp_seq=4 Packet filtered
From 192.168.202.1 icmp_seq=5 Packet filtered

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

From 192.168.201.20 computer in CHE Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms
Lab 31: Standard Access Control List on IPv4 Network (NAMED)

OBJECTIVE:
To configure and implement access-list on HYD-1 such that 192.168.203.10 should only communicate
with 192.168.202.0 network. (Configure ACL with minimum statements)

TOPOLOGY:
Configure Ethernet and Serial IP addresses for the lab as below:

Pre-requisite: WAN Interface and Routing configuration to be done on the router (LAB – 3 and 4)

TASK:
 Verify communication between computers / networks before configuring the access list
 Configure and implement Standard ACL - Named
 Verify blocked communication between computers / networks specified in ACL
Verify communication between computers / networks before configuring the access list

From 192.168.201.10 Computer in CHE Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

From 192.168.202.20 computer in CHE Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms
From 192.168.203.10 Computer in BAN Network
ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.201.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.201.10: icmp_seq=29 ttl=62 time=24.2 ms

From 192.168.203.20 computer in BAN Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.201.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.201.10: icmp_seq=29 ttl=62 time=24.2 ms
Configure and Implement Standard ACL - Named

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip access-list standard zoom
HYD-1 (config-std-nacl) # permit 192.168.203.10 0.0.0.0
HYD-1 (config-std-nacl) # exit
HYD-1 (config) #

HYD-1 (config) # interface fastethernet 0/0


HYD-1 (config-if) # ip access-group zoom out
HYD-1 (config-if) # end
HYD-1 #

HYD-1 – Verification:

HYD-1 # show ip access-lists


Standard IP access list zoom
10 permit 192.168.203.10

HYD-1#

HYD-1 # show ip interface FastEthernet 0/0


FastEthernet0/0 is up, line protocol is up
Internet address is 192.168.202.1/24
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is zoom
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
!
<output omitted>
!
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
HYD-1#
Verify blocked communication between computers / networks specified in ACL

From 192.168.201.10 Computer in CHE Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


From 192.168.202.1 icmp_seq=1 Packet filtered
From 192.168.202.1 icmp_seq=2 Packet filtered
From 192.168.202.1 icmp_seq=3 Packet filtered
From 192.168.202.1 icmp_seq=4 Packet filtered
From 192.168.202.1 icmp_seq=5 Packet filtered

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

From 192.168.202.20 computer in CHE Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


From 192.168.202.1 icmp_seq=1 Packet filtered
From 192.168.202.1 icmp_seq=2 Packet filtered
From 192.168.202.1 icmp_seq=3 Packet filtered
From 192.168.202.1 icmp_seq=4 Packet filtered
From 192.168.202.1 icmp_seq=5 Packet filtered

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms
From 192.168.203.10 Computer in BAN Network
ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


64 bytes from 192.168.202.10: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 192.168.202.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.202.10: icmp_seq=4 ttl=62 time=24.0 ms

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.201.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.201.10: icmp_seq=29 ttl=62 time=24.2 ms

From 192.168.203.20 computer in BAN Network


ping 192.168.202.10

PING 192.168.202.10 (192.168.202.10) 56(84) bytes of data.


From 192.168.202.1 icmp_seq=1 Packet filtered
From 192.168.202.1 icmp_seq=2 Packet filtered
From 192.168.202.1 icmp_seq=3 Packet filtered
From 192.168.202.1 icmp_seq=4 Packet filtered
From 192.168.202.1 icmp_seq=5 Packet filtered

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.201.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.201.10: icmp_seq=29 ttl=62 time=24.2 ms
Lab 32: Extended Access Control List on IPv4 Network (NUMBERED)

OBJECTIVE:
Deny HYD-1 Network (i.e. 192.168.202.0/24) from accessing HTTP server (i.e. 192.168.203.10) in BAN
Network and also deny ping to CHE Network (i.e. 192.168.201.0/24)

TOPOLOGY:
Configure Ethernet and Serial IP addresses for the lab as below:

Pre-requisite: WAN Interface and Routing configuration to be done on the router (LAB – 3 and 4)

TASK:
 Verify services and communication between computers / networks before configuring the
extended access list.
 Configure and implement Extended ACL - Numbered
 Verify blocked services and communication between computers / networks specified in ACL
Verify services and communication between computers / networks before configuring the
Extended Access List

From 192.168.202.10 Computer in HYD-1 Network


ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=1 ttl=62 time=24.2 ms
64 bytes from 192.168.201.10: icmp_seq=2 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=4 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=5 ttl=62 time=24.1 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Try to access HTTP Server via browser (i.e. http://192.168.203.10)


You should able to see Test web page, indicates http service is allowed.

Repeat the above verification from 192.168.202.20 Computer in HYD-1 Network and verify
the outputs
Configure and Implement Extended ACL - Numbered

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # access-list 101 deny tcp 192.168.202.0 0.255.255.255 192.168.203.10 0.0.0.0 eq www
HYD-1 (config) # access-list 101 deny icmp 192.168.202.0 0.255.255.255 192.168.201.0 0.0.0.255 echo
HYD-1 (config) # access-list 101 permit ip any

HYD-1 (config) # interface FastEthernet 0/0


HYD-1 (config-if) # ip access-group 101 in
HYD-1 (config-if) # exit

HYD-1 – Verification:

HYD-1 # show ip access-lists


Extended IP access list 101
10 deny tcp 192.168.202.0 0.255.255.255 host 192.168.203.10 eq www (5 matches)
20 deny icmp 192.168.202.0 0.255.255.255 192.168.201.0 0.0.0.255 echo (10 matches)
30 permit ip any (87 matches)
HYD-1#

HYD-1 # show ip interface FastEthernet 0/0


FastEthernet0/0 is up, line protocol is up
Internet address is 192.168.202.1/24
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Multicast reserved groups joined: 224.0.0.5 224.0.0.6
Outgoing access list is not set
Inbound access list is 101
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
!
<output omitted>
!
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
HYD-1#
Verify blocked services and communication between computers / networks specified in ACL

From 192.168.202.10 Computer in HYD-1 Network


ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


From 192.168.202.1 icmp_seq=1 Packet filtered
From 192.168.202.1 icmp_seq=2 Packet filtered
From 192.168.202.1 icmp_seq=3 Packet filtered
From 192.168.202.1 icmp_seq=4 Packet filtered
From 192.168.202.1 icmp_seq=5 Packet filtered

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Try to access HTTP Server via browser (i.e. http://192.168.203.10)


You should not able to see Test web page, indicates http service is blocked.

Repeat the above verification from 192.168.202.20 Computer in HYD-1 Network and verify
the outputs
Lab 33: Extended Access Control List on IPv4 Network (NAMED)

OBJECTIVE:
Allow PC from HYD-1 Network (i.e. 192.168.202.10/24) to access FTP server (i.e. 192.168.201.10) in
CHE Network. Allow HYD-1 Network (i.e. 192.168.202.0/24) to all Telnet All Network. (Configure ACL
with minimum statements)

TOPOLOGY:
Configure Ethernet and Serial IP addresses for the lab as below:

Pre-requisite: WAN Interface and Routing configuration to be done on the router

TASK:
 Verify services and communication between computers / networks before configuring the
extended access list.
 Configure and implement Extended ACL - Numbered
 Verify blocked services and communication between computers / networks specified in ACL
Verify services and communication between computers / networks before configuring the
Extended Access List

From 192.168.202.10 Computer in HYD-1 Network


ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=1 ttl=62 time=24.2 ms
64 bytes from 192.168.201.10: icmp_seq=2 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=4 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=5 ttl=62 time=24.1 ms

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Try to access FTP Server via browser (i.e. ftp://192.168.203.10)


You should able to see files on ftp server, indicates ftp service is allowed.

Repeat the above verification from 192.168.202.20 Computer in HYD-1 Network and verify
the outputs
Configure and Implement Extended ACL - Numbered

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip access-list extended cisco
HYD-1(config-ext-nacl) # permit tcp 192.168.202.10 0.0.0.0 192.168.201.10 0.0.0.0 eq ftp
HYD-1(config-ext-nacl) # permit tcp 192.168.202.0 0.0.0.255 any eq telnet
HYD-1(config-ext-nacl) # exit
HYD-1 (config) #

HYD-1 (config) # interface FastEthernet 0/0


HYD-1 (config-if) # ip access-group cisco in
HYD-1 (config-if) # exit

HYD-1 – Verification:

HYD-1 – Verification:

HYD-1 # show ip access-lists


Extended IP access list cisco
10 permit tcp host 192.168.202.10 0.255.255.255 host 192.168.203.10 eq ftp (2 matches)
20 permit tcp host 192.168.202.0 0.0.0.255 any eq telnet (1 matches)

HYD-1#

HYD-1 # show ip interface FastEthernet 0/0


FastEthernet0/0 is up, line protocol is up
Internet address is 192.168.202.1/24
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Multicast reserved groups joined: 224.0.0.5 224.0.0.6
Outgoing access list is not set
Inbound access list is cisco
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
!
<output omitted>
!
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
HYD-1#
Verify blocked services and communication between computers / networks specified in ACL

From 192.168.202.10 Computer in HYD-1 Network


ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


From 192.168.202.1 icmp_seq=1 Packet filtered
From 192.168.202.1 icmp_seq=2 Packet filtered
From 192.168.202.1 icmp_seq=3 Packet filtered
From 192.168.202.1 icmp_seq=4 Packet filtered
From 192.168.202.1 icmp_seq=5 Packet filtered

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


From 192.168.202.1 icmp_seq=1 Packet filtered
From 192.168.202.1 icmp_seq=2 Packet filtered
From 192.168.202.1 icmp_seq=3 Packet filtered
From 192.168.202.1 icmp_seq=4 Packet filtered
From 192.168.202.1 icmp_seq=5 Packet filtered

Try to access FTP Server via browser (i.e. ftp://192.168.203.10)


You should able to see files on ftp server, indicates ftp service is allowed.

Repeat the above verification from 192.168.202.20 Computer in HYD-1 Network and verify
the outputs

Time bases acl configuration

Req LAN users should not access internet in working hours in a weekday
CHE(config)#time-range WORK-HOURS
#periodic weekdays 09:00 to 17:00
CHE(config)#ip access-list extended NO_GOOGLE
#deny tcp 192.168.201.0 0.0.0.255 any eq 80 time-range WORK-HOURS
#permit ip any any

Verification

CHE#show time-range
time-range entry: WORK-HOURS (active)
periodic weekdays 9:00 to 17:00
used in: IP ACL entry

CHE#
Lab 34: Time Bases ACL Configuration

OBJECTIVE:

LAN users should not access internet in working hours in a weekday (9:00 to 18:00)

TOPOLOGY:
Configure Ethernet and Serial IP addresses for the lab as below:

Pre-requisite: WAN Interface and Routing configuration to be done on the router

TASK:
 Verify services and communication between computers / networks before configuring the
extended access list
 Configure and implement Extended ACL – Numbered Verify blocked services and
communication between computers / networks specified in ACL
 Configure the time range and add in ex acl

Configuring Time Based ACL

CHE Router Configuration:


Access the router by using Telnet
CHE#Config t
CHE(config#
CHE(config)#time-range myhours
CHE(config#periodic weekdays 09:00 to 18:0
CHE(config)#Exit
CHE#
Creation:
CHE(config)#ip access-list extended no_net
CHE(config-nacl)#deny tcp 192.168.201.0 0.0.0.255 any eq 80 time-range WORK-HOURS
CHE(config-nacl) #permit ip any any

Implementation:
CHE(config)#interface fastethernet 0/0
CHE(config-if)#ip access-group no_net in
CHE(config-if)#exit
CHE(config)#exit
CHE#

Verifing Time Based ACL

Verification:
CHE#show clock
13:21:14.638 UTC Thu Jan 23 2020
CHE#
CHE#show time-range
time-range entry: myhours (active)
periodic weekdays 9:00 to 18:00
used in: IP ACL entry
CHE#
CHE#show ip access-lists
Extended IP access list no_net
deny tcp 192.168.201.0 0.0.0.255 any eq www time-range myhours (active) (6 matches)
permit ip any any (1524 matches)
CHE#
Lab 35: Access Control List on IPv6 Network

OBJECTIVE:
Deny HYD-1 Network - PC (i.e. 2001:1111::10/64) from accessing HTTP server (i.e. 2001:2222::10/64)
in HYD-2 Network.

TOPOLOGY:
Configure Ethernet IP addresses for the lab as below:

Pre-requisite: WAN Interface and Routing configuration to be done on the router (LAB – 3 and 4)

TASK:
 Verify communication between computers / networks before configuring the access list
 Configure and implement IPv6 ACL
 Verify blocked communication between computers / networks specified in ACL
Verify communication between computers / networks before configuring the access list

From 2001:1111::10 Computer in HYD-1 Network


ping 2001:2222::10 (Windows) or ping6 2001:2222::10 (Linux)

PING 2001:2222::10(2001:2222::10) 56 data bytes


64 bytes from 2001:2222::10: icmp_seq=1 ttl=62 time=0.494 ms
64 bytes from 2001:2222::10: icmp_seq=2 ttl=62 time=0.361 ms
64 bytes from 2001:2222::10: icmp_seq=3 ttl=62 time=0.335 ms
64 bytes from 2001:2222::10: icmp_seq=4 ttl=62 time=0.336 ms

Try to access HTTP Server via browser (i.e. http://2001:2222::10)


You should able to see Test web page, indicates http service is allowed.

From 2001:1111::20 Computer in HYD-1 Network


ping 2001:2222::10 (Windows) or ping6 2001:2222::10 (Linux)

PING 2001:2222::10(2001:2222::10) 56 data bytes


64 bytes from 2001:2222::10: icmp_seq=1 ttl=62 time=0.494 ms
64 bytes from 2001:2222::10: icmp_seq=2 ttl=62 time=0.361 ms
64 bytes from 2001:2222::10: icmp_seq=3 ttl=62 time=0.335 ms
64 bytes from 2001:2222::10: icmp_seq=4 ttl=62 time=0.336 ms

Try to access HTTP Server via browser (i.e. http://2001:2222::10)


You should able to see Test web page, indicates http service is allowed.
Configure and Implement Extended ACL - Named

HYD-1 – Configuration

HYD-1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ipv6 access-list cisco
HYD-1 (config-ipv6-acl) # deny tcp 2001:1111::10/64 2001:2222::10/64 eq 80
HYD-1 (config-ipv6-acl) # permit ipv6 any any
HYD-1(config-ipv6-acl) # exit
HYD-1 (config) #

HYD-1 (config) # interface FastEthernet 0/0


HYD-1 (config-if) # ipv6 traffic-filter cisco in
HYD-1 (config-if) # exit
HYD-1 (config)#

HYD-1 – Verification:

HYD-1 # show ipv6 access-list


IPv6 access list cisco
deny tcp 2001:1111::/64 2001:2222::/64 eq www sequence 10
permit ipv6 any any (22 matches) sequence 20

HYD-1#
Verify blocked communication between computers / networks specified in ACL

From 2001:1111::10 Computer in HYD-1 Network


ping 2001:2222::10 (Windows) or ping6 2001:2222::10 (Linux)

From 2001:1111::1 icmp_seq=1 Packet filtered


From 2001:1111::1 icmp_seq=2 Packet filtered
From 2001:1111::1 icmp_seq=3 Packet filtered
From 2001:1111::1 icmp_seq=4 Packet filtered
From 2001:1111::1 icmp_seq=5 Packet filtered

Try to access HTTP Server via browser (i.e. http://2001:2222::10)


You should not able to see Test web page, indicates http service is blocked.

From 2001:1111::20 Computer in HYD-1 Network


ping 2001:2222::10 (Windows) or ping6 2001:2222::10 (Linux)

PING 2001:2222::10(2001:2222::10) 56 data bytes


64 bytes from 2001:2222::10: icmp_seq=1 ttl=62 time=0.494 ms
64 bytes from 2001:2222::10: icmp_seq=2 ttl=62 time=0.361 ms
64 bytes from 2001:2222::10: icmp_seq=3 ttl=62 time=0.335 ms
64 bytes from 2001:2222::10: icmp_seq=4 ttl=62 time=0.336 ms

Try to access HTTP Server via browser (i.e. http://2001:2222::10)


You should able to see Test web page, indicates http service is allowed.
Lab 36: Default Routing

OBJECTIVE:
To configure default routing for accessing Internet.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

TASK:
 Configure WAN Interface
 Configure Default Routing
 Verify Default Routing
 Verify communication from LAN to the Internet
Configure WAN Interface
Configure WAN Interface IP address according to topology diagram (i.e. IP addresses provided by ISP)

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config)# interface serial 0/0
CHE (config-if)# ip address 202.1.0.18 255.255.255.248
CHE (config-if)# no shutdown
CHE (config-if)# encapsulation ppp
CHE (config-if)# exit
CHE (config)#

Configure Default Routing

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip route 0.0.0.0 0.0.0.0 Serial0/0
CHE (config) # exit
CHE (config) #

Verify Default Routing


Once Default routing is configured IP Network defined through the default routing command is
added into the routing information table. “*” represents Default route.
CHE – Verification:

CHE # show ip route

Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP


D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 202.1.0.16/29 is directly connected, Serial0/0


C 192.168.201.0/24 is directly connected, FastEthernet0/0
S* 0.0.0.0/0 [1/0] via Serial0/0
CHE #
Verify communication from LAN to the Internet.

Verification from PC1

ping 8.8.8.8

PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.


64 bytes from 8.8.8.8: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 8.8.8.8: icmp_seq=4 ttl=62 time=24.0 ms
Lab 37: Static NAT

OBJECTIVE:
To configure Static NAT for Hosting Pubic Servers on the Internet.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

Pre-requisite: Default routing configuration to be done on the router (LAB – 31)

TASK:
 Configure Static NAT
 Verify Static NAT
 Verify Static NAT Packets
 Verify communication from Internet to Server
Configure Static NAT

CHE (config) # interface serial 0/0


CHE (config-if) # ip nat outside
CHE (config-if) # exit
CHE (config) # interface FastEthernet 0/0
CHE (config-if) # ip nat inside
CHE (config-if) # exit
CHE (config)# ip nat inside source static 192.168.201.10 202.1.0.19

Verify Static NAT

CHE – Verification

CHE # show ip nat translation


Pro Inside global Inside local Outside local Outside global
--- 202.1.0.19 192.168.201.10 --- ---
CHE #

CHE # show ip nat statistics


Total active translations: 1 (1 static, 0 dynamic; 0 extended)
Outside interfaces:
Serial0/0
Inside interfaces:
FastEthernet0/0
Hits: 0 Misses: 0
Expired translations: 0
Dynamic mappings:
CHE#
Verify Static NAT Packets
Verify Static NAT Packets by enabling debug commands

CHE # debug ip nat


IP NAT debugging is on
CHE # terminal monitor
CHE #
00:16:38: NAT*: s=192.168.201.10->202.1.0.19, d=8.8.8.8 [22575]
00:16:38: NAT*: s=8.8.8.8, d=202.1.0.19->192.168.201.10 [4074]
00:16:39: NAT*: s=192.168.201.10->202.1.0.19, d=8.8.8.8 [22576]
00:16:39: NAT*: s=8.8.8.8, d=202.1.0.19->192.168.201.10 [4075]
00:16:40: NAT*: s=192.168.201.10->202.1.0.19, d=8.8.8.8 [22577]
00:16:40: NAT*: s=8.8.8.8, d=202.1.0.19->192.168.201.10 [4076]
00:16:41: NAT*: s=192.168.201.10->202.1.0.19, d=8.8.8.8 [22578]
00:16:41: NAT*: s=8.8.8.8, d=202.1.0.19->192.168.201.10 [4077]
CHE #

Verification from Outside PC (Internet PC) to LAN (Server)

ping 202.1.0.19

PING 202.1.0.19 (202.1.0.19) 56(84) bytes of data.


64 bytes from 202.1.0.19: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 202.1.0.19: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 202.1.0.19: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 202.1.0.19: icmp_seq=4 ttl=62 time=24.0 ms
Lab 38: Port Address Translation (PAT)

OBJECTIVE:
To configure PAT for LAN computers to access the Internet using a single Public IP Address.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

Pre-requisite: Default routing configuration to be done on the router (LAB – 31)

TASK:
 Configure PAT
 Verify PAT
 Verify PAT Packets
 Verify communication from LAN to the Internet
Configure PAT

CHE (config) # interface serial 0/0


CHE (config-if) # ip nat outside
CHE (config-if) # exit
CHE (config) # interface FastEthernet 0/0
CHE (config-if) # ip nat inside
CHE (config-if) # exit
CHE (config) # access-list 10 permit 192.168.201.0 0.0.0.255
CHE (config) # ip nat inside source list 10 interface serial 0/0 overload

Verify PAT

CHE – Verification

CHE # show ip nat translation


Pro Inside global Inside local Outside local Outside global

icmp 202.1.0.18:34071 192.168.201.10:34071 202.2.0.17:34071 202.2.0.17:34071


tcp 202.1.0.18:49237 192.168.201.10:49237 202.2.0.17:80 202.2.0.17:80
CHE #

CHE # show ip nat statistics


Total active translations: 10 (0 static, 1 dynamic; 0 extended)
Outside interfaces:
Serial0/0
Inside interfaces:
FastEthernet0/0
Hits: 20 Misses: 0
Expired translations: 0
Dynamic mappings:
— Inside Source --
[Id: 3] access-list 10 interface Serial0/0

CHE#
Verify PAT Packets
Verify PAT Packets by enabling debug commands

CHE # debug ip nat


IP NAT debugging is on
CHE # terminal monitor
CHE #
00:16:38: NAT*: s=192.168.201.10->202.1.0.19, d=8.8.8.8 [22575]
00:16:38: NAT*: s=8.8.8.8, d=202.1.0.19->192.168.201.10 [4074]
00:16:39: NAT*: s=192.168.201.10->202.1.0.19, d=8.8.8.8 [22576]
00:16:39: NAT*: s=8.8.8.8, d=202.1.0.19->192.168.201.10 [4075]
00:16:40: NAT*: s=192.168.201.10->202.1.0.19, d=8.8.8.8 [22577]
00:16:40: NAT*: s=8.8.8.8, d=202.1.0.19->192.168.201.10 [4076]
00:16:41: NAT*: s=192.168.201.10->202.1.0.19, d=8.8.8.8 [22578]
00:16:41: NAT*: s=8.8.8.8, d=202.1.0.19->192.168.201.10 [4077]
CHE #

Verify communication from LAN to the Internet.

Verification from PC1

ping 8.8.8.8

PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.


64 bytes from 8.8.8.8: icmp_seq=1 ttl=62 time=24.0 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=62 time=24.0 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=62 time=24.1 ms
64 bytes from 8.8.8.8: icmp_seq=4 ttl=62 time=24.0 ms
Lab 39: SYSLOG

OBJECTIVE:
To configure Logging on router and sending logs to a syslog server.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

Pre-requisite: 192.168.202.10 computer should have Syslog server software installed and running.

TASK:
 Configure logging to Syslog Server
 Configure logging to Buffer
 Generate and Verify Syslog Messages
Configure Logging to Syslog Server

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # logging on
HYD-1 (config) # logging host 192.168.202.10
HYD-1 (config) # logging trap 7
HYD-1 (config) # service timestamps log datetime msec
HYD-1 (config) # exit
HYD-1 #

Configure Logging to Buffer

HYD-1 – Configuration
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # logging on
HYD-1 (config) # logging buffered 7
HYD-1 (config) # exit
HYD-1 #

Generate and Verify Syslog Messages

HYD-1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # interface serial 0/0/0
HYD-1 (config-if) # shutdown
HYD-1 (config-if) # no shutdown
HYD-1 (config-if) # end
HYD-1 #

HYD-1 – Verification:
HYD-1 # show logging
Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 0 flushes, 0 overruns)

No Active Message Discriminator.


No Inactive Message Discriminator.
Console logging: disabled
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
Buffer logging: level debugging, 7 messages logged, xml disabled,
filtering disabled
Exception Logging: size (4096 bytes)
Count and timestamp logging messages: disabled
Persistent logging: disabled
No active filter modules.
Trap logging: level informational, 45 message lines logged
Logging to 192.168.202.10 (udp port 514, audit disabled, link up),
9 message lines logged,
0 message lines rate-limited,
0 message lines dropped-by-MD,
xml disabled, sequence number disabled
filtering disabled

Log Buffer (4096 bytes):

*Jul 28 11:51:26.447: %SYS-5-CONFIG_I: Configured from console by console


*Jul 28 11:52:11.563: %LINK-5-CHANGED: Interface Serial0/0/0, changed state to administratively
down
*Jul 28 11:52:11.567: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed
state to dn
*Jul 28 11:52:28.639: %SYS-5-CONFIG_I: Configured from console by console
*Jul 28 11:52:29.487: %LINK-3-UPDOWN: Interface Serial0/0/0, changed state to up
CHE #

Verification on Syslog Server (PC):


Start Syslog software to view the syslog’s messages as below:
Lab 40: NTP

OBJECTIVE:
To configure router as NTP Client, for time synchronization with NTP server.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

TASK:
 Configure Date and Time – Manual
 Verify Current Date and Time
 Configure Router as NTP client
 Verify Date and time via NTP
Configure Date and Time - Manual

CHE – Configuration
CHE # clock set 13:36:30 10 Jan 2001

Verify Current Date and Time

CHE – Verification:
CHE # show clock
13:36:32.055 UTC Wed Jan 10 2001

Configure Router as NTP client

CHE – Configuration

CHE # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ntp server 8.8.8.8
CHE (config) # exit
CHE #

Verify Date and time via NTP

CHE – Verification:

CHE # show clock


13:39:21.604 UTC Tue Aug 16 2016

CHE # show ntp status


Clock is synchronized, stratum 4, reference is 8.8.8.8
nominal freq is 249.5901 Hz, actual freq is 249.5901 Hz, precision is 2**18
reference time is DB5D96BC.5E7B415C (13:42:20.369 UTC Tue Aug 16 2016)
clock offset is 1.4590 msec, root delay is 32.53 msec
root dispersion is 3878.63 msec, peer dispersion is 3876.77 msec

CHE # show ntp associations

address ref clock st when poll reach delay offset disp


*~8.8.8.8 127.127.1.1 3 17 64 7 32.5 1.46 3876.8

* master (synced), # master (unsynced), + selected, - candidate, ~ configured


CHE #
Lab 41: DHCP Server and Client

OBJECTIVE:
To configure a Router as a DHCP Server for assigning IP addresses, DNS, gateway, etc. to client
computers.
To configure an interface of Router as a DHCP Client for getting IP addresses from ISP.

TOPOLOGY:
Setup the router for the lab as below:

TASK:
 Configure Router as DHCP Server
 Verify DHCP on client computer
 Verify DHCP Server
 Configure an interface of a Router as DHCP Client
 Verify DHCP Client
Configure Router as DHCP Server

CHE – Configuration

CHE # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip dhcp pool zoom
CHE (dhcp-config) # network 192.168.201.0 255.0.0.0
CHE (dhcp-config) # default-router 192.168.201.1
CHE (dhcp-config) # dns-server 8.8.8.8
CHE (dhcp-config) # lease 1 1 1
CHE (dhcp-config) # exit
CHE (config) # ip dhcp excluded-address 192.168.201.1 192.168.201.50
CHE (config)# exit

Verify DHCP on client computer


On Windows Computer, Select Obtain IP Address Automatically in Network Properties and verify the
dhcp ip address by giving ipconfig command on command prompt.

On Linux Computer give below commands


# dhclient
Internet Systems Consortium DHCP Client V3.0.6
Copyright 2004-2007 Internet Systems Consortium.
Sending on LPF/eth0/00:1b:b9:9a:16:8d
Sending on Socket/fallback
DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 8
DHCPOFFER from 192.168.201.5
DHCPREQUEST on eth0 to 255.255.255.255 port 67
DHCPACK from 192.168.201.5
bound to 192.168.201.5 -- renewal in 40650 seconds.

# ifconfig
eth0 Link encap:Ethernet HWaddr 00:1B:B9:9A:16:8D
inet addr:192.168.201.5 Bcast:92.168.201.255 Mask:255.0.0.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:9263 errors:0 dropped:0 overruns:0 frame:0
Verify DHCP Server
CHE – Verification:

CHE # show ip dhcp binding


Bindings from all pools not associated with VRF:
IP address Client-ID/ Lease expiration Type
Hardware address/
User name
192.168.202.5 001c.c06c.91f3 Aug 27 2016 02:21 PM Automatic
192.168.202.10 001b.b99a.168d Aug 27 2016 02:25 PM Automatic
CHE #
Lab 42: Hot Standby Router Protocol (HSRP)

OBJECTIVE:
To set up an always available gateway by configuring HSRP
To set up a virtual default gateway with IP 192.168.201.254 for setting up HSRP

TOPOLOGY:
Setup Serial and Ethernet connectivity for the lab as below:

TASK:
 Configure Ethernet Interface, Serial Interface and Default Routing
 Configure HSRP
 Verify HSRP
 Verify communication and data path to destination network
Configure Ethernet Interface, Serial Interface and Default Routing

R1 – Configuration
R1 (config) # interface fastethernet 0/0
R1 (config-if) # ip address 192.168.201.100 255.255.255.0
R1 (config-if) # exit
R1 (config) # interface serial 0/0
R1 (config-if) # ip address 202.1.0.18 255.255.255.248
R1 (config-if) # no shutdown
R1 (config-if) # encapsulation ppp
R1 (config-if) # exit
R1 (config) # ip route 0.0.0.0 0.0.0.0 Serial0/0
R1 (config) # exit

R2 – Configuration
R2 (config) # interface fastethernet 0/0
R2 (config-if) # ip address 192.168.201.100 255.255.255.0
R2 (config-if) # exit
R2 (config) # interface serial 0/0
R2 (config-if) # ip address 202.2.0.18 255.255.255.248
R2 (config-if) # no shutdown
R2 (config-if) # encapsulation ppp
R2 (config-if) # exit
R2 (config) # ip route 0.0.0.0 0.0.0.0 Serial0/1
R2 (config) # exit

Configure HSRP

R1 – Configuration

R1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1 (config) # int FastEthernet 0/0
R1 (config-if) # standby 10 ip 192.168.201.254
R1 (config-if) # standby 10 priority 200
R1 (config-if) # end
R1 #

R2 – Configuration

R1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R2 (config) # int FastEthernet 0/0
R2 (config-if) # standby 10 ip 192.168.201.254
R2 (config-if) # standby 10 priority 150
R2 (config-if) # end
R2 #
Verify HSRP

R1 – Verification
R1 # show standby
FastEthernet0/0 - Group 10
State is Active
2 state changes, last state change 00:03:21
Virtual IP address is 192.168.201.254
Active virtual MAC address is 0000.0c07.ac0a
Local virtual MAC address is 0000.0c07.ac0a (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.792 secs
Preemption disabled
Active router is local
Standby router is 192.168.201.200, priority 150 (expires in 7.848 sec)
Priority 200 (configured 200)
IP redundancy name is "hsrp-Fa0/0-10" (default)
R1#

R2 – Verification
R2 # show standby
FastEthernet0/0 - Group 10
State is Standby
1 state change, last state change 00:01:09
Virtual IP address is 192.168.201.254
Active virtual MAC address is 0000.0c07.ac0a
Local virtual MAC address is 0000.0c07.ac0a (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.860 secs
Preemption disabled
Active router is 192.168.201.100, priority 200 (expires in 8.802 sec)
Standby router is local
Priority 150 (configured 150)
IP redundancy name is "hsrp-Fa0/0-10" (default)
R2 #

Verify communication and data path to destination network


Verification from a Computer in Network

ping 8.8.8.8

PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.


64 bytes from 8.8.8.8: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 8.8.8.8: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 8.8.8.8: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 8.8.8.8: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 8.8.8.8: icmp_seq=29 ttl=62 time=24.2 ms
From a Computer in Network trace communication path to destination network

tracert 8.8.8.8 (Windows) or traceroute 8.8.8.8 (Linux)


traceroute to 8.8.8.8 (192.168.203.10), 30 hops max, 38 byte packets
1 192.168.201.100 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 8.8.8.8 (8.8.8.8) 2.295 ms 2.156 ms 2.209 ms

Understand HSRP behaviour


Currently data is flowing via R1 router, if R1 router goes down data will start flowing through R2 router.
You can verify the behaviour by shutting down R1 Router Ethernet Interface (LAN Interface) or remove
the Ethernet cable from R1 Router and check the behaviour.

Verify HSRP
R1 – Verification
R1 # show standby
FastEthernet0/0 - Group 10
State is Standby
2 state changes, last state change 00:03:21
Virtual IP address is 192.168.201.250
Active virtual MAC address is 0000.0c07.ac0a
Local virtual MAC address is 0000.0c07.ac0a (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.792 secs
Preemption disabled
Active router is 192.168.201.200, priority 150 (expires in 8.802 sec)
Standby router is local
Priority 200 (configured 200)
IP redundancy name is "hsrp-Fa0/0-10" (default)
R1#

R2 – Verification
R2 # show standby
FastEthernet0/0 - Group 10
State is Active
1 state change, last state change 00:01:09
Virtual IP address is 192.168.201.250
Active virtual MAC address is 0000.0c07.ac0a
Local virtual MAC address is 0000.0c07.ac0a (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.860 secs
Preemption disabled
Active router is local
Standby router is 192.168.201.100, priority 200 (expires in 7.848 sec)
Priority 150 (configured 150)
IP redundancy name is "hsrp-Fa0/0-10" (default)
R2 #
Verify communication and data path to destination network
Verification from a Computer in Network

ping 8.8.8.8

PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.


64 bytes from 8.8.8.8: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 8.8.8.8: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 8.8.8.8: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 8.8.8.8: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 8.8.8.8: icmp_seq=29 ttl=62 time=24.2 ms

From a Computer in Network trace communication path to destination network

tracert 8.8.8.8 (Windows) or traceroute 8.8.8.8 (Linux)


traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 38 byte packets
1 192.168.201.200 (192.168.201.200) 1.086 ms 1.124 ms 1.144 ms
2 8.8.8.8 (8.8.8.8) 2.295 ms 2.156 ms 2.209 ms
Cisco Security

Lab 1: Securing Administrative Access

OBJECTIVE:
To enhance router security by encrypting all passwords, configure banners, exec-timeouts on router.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

Pre-requisite: Initial configuration to be done on the router

To enhance router security by encrypting all passwords, configure banners, exec-timeouts


on router
TASKS:
 Access router via Telnet
 Encrypt all clear text passwords on the router.
 Configure Warning Banner
 Configure unattended (idle-timeout) session timeout for VTY access
Access router via Telnet
 Access router via telnet by giving below command on a Windows or Linux computer.
telnet 192.168.202.1

Encrypt all clear text passwords on the router

Verify router's existing configuration

All password is in clear text except enable secret password


HYD-1 # sh running-config
Current configuration : 1241 bytes
!
Last configuration change at 08:37:39 UTC Sat Jul 9 2016
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$DMgk$lTC7TUZVwFn5969wEB2mw.
enable password ccna
!
no aaa new-model
!
dot11 syslog
ip source-route
!
ip cef
!
multilink bundle-name authenticated
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
no ip http server
no ip http secure-server!
control-plane
!
mgcp profile default
!
line con 0
password ccna
login
line aux 0
password cisco
login
line vty 0 4
password zoom
login
transport input all
!
scheduler allocate 20000 1000
end
HYD-1 #
Encrypt all clear text passwords

HYD-1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # service password-encryption
HYD-1 (config) # end

Verification:

Now previously visible passwords are encrypted

HYD-1 # sh running-config
Building configuration...
Current configuration: 1241 bytes
!
Last configuration change at 08:37:39 UTC Sat Jul 9 2016
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname HYD-1
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$DMgk$lTC7TUZVwFn5969wEB2mw.
enable password 7 045802150C2E
!
no aaa new-model
!
dot11 syslog
ip source-route
!
ip cef
!
multilink bundle-name authenticated
crypto pki token default removal timeout 0
!
license udi pid CISCO2811 sn FHK1109F34X
!
redundancy
!
interface FastEthernet0/0
ip address 192.168.202.1 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
no fair-queue
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
no ip http server
no ip http secure-server!
control-plane
!
mgcp profile default
!
line con 0
password 7 141411050D
login
line aux 0
password 7 030752180500
login
line vty 0 4
password 7 0109090B56
login
transport input all
!
scheduler allocate 20000 1000
end
HYD-1 #

Configure Warning Banner


Configure a warning message to display prior to login
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # banner motd $
Enter TEXT message. End with the character '$'.
=======================================================================
UNAUTHORISED ACCESS STRICTLY PROHIBITED AND
PROSECUTED TO THE FULL EXTENT OF THE LAW
=======================================================================$
Verification:
Now open a new telnet session from your computer to the router to verify the banner configured.
i.e. telnet 192.168.202.1

Configure unattended (idle-timeout) session timeout for VTY access


By default unattended session time-out is 10 minutes. We reducing the unattended session timeout
to 1 minute 00 seconds.
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # line vty 0 4
HYD-1 (config-line) # exec-timeout 1 00
HYD-1 (config-line) # end

Verification:
Now open a new telnet session from your computer to the router (get into privilege mode) and leave
the session open without performing any action or modification for 1 minute. Session will be
automatically disconnected after the session time-out has been reached.
Configure a minimum password length for all router passwords

HYD-1(config)#security passwords min-length 6

Configure the enable secret password.

HYD-1(config)#enable secret zoom


% Password too short - must be at least 6 characters. Password configuration failed
HYD-1 (config)#

Configure enable secret password min-length 6 character

HYD-1(config)#enable secret zoom123

Now you can see login warning banner on HYD-1

Configure to Enhanced Security Username and Password on Routers

Create a new user account using the username command

HYD-1(config)#username zoom password zoom123

Show Commands
HYD-1#sh running-config

Test the new account by logging from virtual terminal line.

HYD-1(config)# line vty 0 4


HYD-1(config-line)#login local
HYD-1(config-line)#end
HYD-1#exit

Verification

Telnet the Router and give username and password to login.

Configure Enhanced Virtual Login Security on Routers

Configure the router to watch for login attacks.

HYD-1#show login
No login delay has been applied.
No Quiet-Mode access list has been configured.
Router NOT enabled to watch for login Attacks

HYD-1(config)#login block-for 60 attempts 2 within 30


HYD-1#show login
A default login delay of 1 seconds is applied.
No Quiet-Mode access list has been configured.
Router enabled to watch for login Attacks.
If more than 2 login failures occur in 30 seconds or less, logins will be disabled for 60 seconds.
Router presently in Normal-Mode.
Current Watch Window
Time remaining: 4 seconds.
Login failures for current window: 0.
Total login failures: 0.
HYD-1#

Configure the router to log login activity

HYD-1(config)#login on-success log


HYD-1(config)#login on-failure log every 2
HYD-1(config)#exit
HYD-1#

Verification

Telnet the Router and give the wrong password till you are disconnected Telnet the Router and give
the correct password.

Verification Commands

HYD-1#show login failures


Total failed logins: 3
Detailed information about last 50 failures
Username SourceIPAddr lPort Count TimeStamp zoom 10.0.0.5 23 2 01:17:34 UTC Fri Mar 1 2012
asdf 10.0.0.5 23 1 01:17:36 UTC Fri Mar 1 2012
CHE#show login
A default login delay of 1 seconds is applied.
No Quiet-Mode access list has been configured.
Every 2 failed login is logged.
Router enabled to watch for login Attacks.
If more than 2 login failures occur in 30 seconds or less, logins will be disabled for 60 seconds.
Router presently in Quiet-Mode.
Will remain in Quiet-Mode for 34 seconds.
Denying logins from all sources.
Lab 2: Local Database Authentication

OBJECTIVE:

Local user creation inside the router and its authenticated by its self (Router)

TOPOLOGY:

TASK:

 Access Router by using telnet


 Create the user by using following commands
Configuration:

Hyd-1(config)#username useHYD-1 password zoom_123


Hyd-1(config)#exit
Hyd-1#

Hyd-1(config)#line vty 0 4
Hyd-1(config-line)#login local
Hyd-(config-line)#exit
Hyd-1(config)#exit
Hyd-1#

Verification:

Hys-1#show running-config
Now try to access router by telnet it should ask username and password
Lab 3: SSH Configuration

OBJECTIVE:

Configure the SSH Server on Router

TOPOLOGY:

TASK:

 Access the router by using Console


 Create the username and password
 Enable the encryption key by using following commands
Configuring SSH to Access Device Remotely

Configuration:

Configure a domain name.

HYD-1(config)#ip domain-name zoom.com

User for login from the SSH client

HYD-1(config)#username zoom password zoom_123

Configure the vty lines.

HYD-1(config)#line vty 0 4
HYD-1(config-line)#login local
HYD-1(config-line)#transport input ssh
HYD-1(config-line)#exit

Generate the RSA encryption key pair for the router

HYD-1(config)#crypto key generate rsa


The name for the keys will be: HYD-1.zoom.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.
How many bits in the modulus [512]:
% Generating 512 bit RSA keys, keys will be non-exportable...[OK]
HYD-1(config)#

Verify the SSH configuration

HYD-1#show ip ssh

SSH Enabled - version 1.5


Authentication timeout: 120 secs; Authentication retries: 3
HYD-1#

Configure SSH timeouts and authentication parameters

HYD-1(config)#ip ssh time-out 90


HYD-1(config)#ip ssh authentication-retries 2
HYD-1#show ip ssh
SSH Enabled - version 1.5
Authentication timeout: 90 secs; Authentication retries: 2
HYD-1#
Verify SSH connectivity to HYD-1 from PC (Putty/Linux Computer).

Verify SSH access to Router

Now open a new telnet session from your computer to the router, you will not able to access router
via telnet.
Verify SSH access to HYD-1 from computer by giving below command:
ssh -l zoom 192.168.202.1
Lab 4: Privilege Levels

OBJECTIVE

To configure privilege to various users

TOPOLOGY

Verification:

Configure Various Privilege Levels

1) Access the router by using telnet or console


2) Configure users with various privilege by using following commands

Configuration:

step1
configure user with privilege 15
Hyd-1(config)#username admin privilege 15 password admin
Hyd-1(config)#line vty 0 4
Hyd-1(config-line)#login local
Hyd-1(config)#exit
Hyd-1#
verification
Try to access the router as user admin password admin
you will get full access.
Step2:
configure username and password with privilege 5
Hyd-1(config)#username user1 privilege 5 password zoom_123
Hyd-1(config)#exit
Hyd-1#

Step3:
Assign the commands to privilege level 5
Hyd-1(config)#privilege exec level 5 show ip route
Hyd-1(config)#privilege exec level 5 show ip interface brief
Hyd-1(config)#exit
Hyd-1#

Verifing Privilege Levels

Verification:

Access the router as user1 and try to check


Telnet 192.168.202.1
username: user1
Password zoom_123
Hyd-1#show ip route
Hyd-1#show ip int br
Try to execute some other commands
Hyd-1#show running-config
You will get an error.
Lab 5: AAA Authentication (TACACS and RADIUS)

OBJECTIVE:
To enhance router security by authentication and enabling ssh access on router.

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

Pre-requisite: 192.168.202.10 computer should have TACACS Server software installed and running.

TASK:
 Configure External Authentication
 Verify External Authentication
 Configure AAA Authentication (TACACS Server)
 Verify AAA Authentication
Configure AAA Authentication (TACACS Server)

Example - HYD-1
HYD-1 # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # aaa new-model
HYD-1 (config) # tacacs-server host 192.168.202.10
HYD-1 (config) # tacacs-server key cisco
HYD-1 (config) # aaa authentication login default group tacacs local

Verify AAA Authentication

Create New User on TACACS Server. Try to login using newly created user by opening a new telnet
session from your computer to the router.
i.e. telnet 192.168.202.1

Microsoft Windows [Version 6.2.9200]


(c) 2012 Microsoft Corporation. All rights reserved.
C:\> telnet 192.168.202.1
Trying 192.168.202.1...
Connected to 192.168.202.1.
Escape character is '^]'.

User Access Verification

Username : user1
Password : *****
HYD-1>enable
Password:
HYD-1#
Lab 6: Securing Boot Image (IOS) and Configuration File

OBJECTIVE:

Securing boot image and configuration file

TOPOLOGY:

Securing IOS Image File and Router Configuration File

TASK:

 Access the router by using Console


 Secure the files by using following command
Configuration:

Hyd-1(config)#secure boot-image

%IOS_RESILIENCE-5-IMAGE_RESIL_ACTIVE: Successfully secured running image


Hyd-1(config)#secure boot-config

%IOS_RESILIENCE-5-CONFIG_RESIL_ACTIVE: Successfully secured config archive [flash:.runcfg-


19930301-000135.ar]

Verification:

Hy-1#show secure boot set

IOS resilience router id FTX1111W0QT

IOS image resilience version 12.4 activated at 00:01:01 UTC Mon Mar 1 1993

Secure archive flash:/c2800nm-advipservicesk9-mz.124-15.T1.bin type is image (elf) []


file size is 50938004 bytes, run size is 50938004 bytes

Runnable image, entry point 0x8000F000, run from ram

IOS configuration resilience version 12.4 activated at 00:01:35 UTC Mon Mar 1 1993

Secure archive flash:/.runcfg-19930301-000135.ar type is config


configuration archive size 651 bytes

HYd-1#
Lab 7: Generic Routing Encapsulation (GRE)

OBJECTIVE:
To set up a GRE VPN to enable communication between different networks.

TOPOLOGY:
Setup Ethernet and Serial connectivity for the lab as below:

TASK:
 Configure Serial Interface
 Configure Default Routing
 Configure GRE Tunnel Interface
 Verify GRE Tunnel Configuration
 Configure Routing
 Verify Routing
 Verify communication between the networks
Configure Serial Interface
CHE – Configuration
CHE (config) # interface serial 0/0
CHE (config-if) # ip address 202.1.0.18 255.255.255.248
CHE (config-if) # no shutdown
CHE (config-if) # encapsulation ppp
CHE (config-if) # exit
CHE (config) #

BAN – Configuration
BAN (config) # interface serial 0/1
BAN (config-if) # ip address 202.2.0.18 255.255.255.248
BAN (config-if) # no shutdown
BAN (config-if) # encapsulation ppp
BAN (config-if) # exit
BAN (config) #

Configure Default Routing

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip route 0.0.0.0 0.0.0.0 Serial0/0
CHE (config) # exit
CHE #

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config) # ip route 0.0.0.0 0.0.0.0 Serial0/1
BAN (config) # exit
BAN #
Configure GRE Tunnel Interface

CHE – Configuration
CHE (config) # int tunnel 0
CHE (config-if) # ip add 1.1.1.1 255.255.255.0
CHE (config-if) # tunnel mode gre ip
CHE (config-if) # tunnel source serial 0/0
CHE (config-if) # tunnel destination 202.2.0.18
CHE (config-if) # end
CHE #

BAN – Configuration
BAN (config) # int tunnel 0
BAN (config-if)# ip add 1.1.1.2 255.255.255.0
BAN (config-if) # tunnel mode gre ip
BAN (config-if)# tunnel source serial 0/1
BAN (config-if)# tunnel destination 202.1.0.18
BAN (config-if)# end
BAN #

Verify GRE Tunnel Configuration

CHE – Verification

CHE # show ip interface brief tunnel 0


Interface IP-Address OK? Method Status Protocol
Tunnel0 1.1.1.1 YES manual up up
CHE #

CHE # sh int tunnel 0


Tunnel0 is up, line protocol is up
Hardware is Tunnel
Internet address is 1.1.1.1/24
MTU 1514 bytes, BW 9 Kbit, DLY 500000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation TUNNEL, loopback not set
Keepalive set (10 sec)
Tunnel source 202.1.0.18 (Serial0/0), destination 202.2.0.18
Tunnel protocol/transport GRE/IP, key disabled, sequencing disabled
Checksumming of packets disabled, fast tunneling enabled
!
<output omitted>
!
CHE#
BAN – Verification
BAN # show ip interface brief tunnel 0
Interface IP-Address OK? Method Status Protocol
Tunnel0 1.1.1.1 YES manual up up
BAN #

BAN # sh int tunnel 0


Tunnel0 is up, line protocol is up
Hardware is Tunnel
Internet address is 1.1.1.2/24
MTU 1514 bytes, BW 9 Kbit, DLY 500000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation TUNNEL, loopback not set
Keepalive set (10 sec)
Tunnel source 202.2.0.18 (Serial0/1), destination 202.1.0.18
Tunnel protocol/transport GRE/IP, key disabled, sequencing disabled
Checksumming of packets disabled, fast tunneling enabled
!
<output omitted>
!
BAN #

Configure Routing

CHE – Configuration
CHE # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CHE (config) # ip route 192.168.203.0 255.255.255.0 tunnel 0
CHE (config) #

BAN – Configuration
BAN # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
BAN (config) # ip routing
CHE (config) # ip route 192.168.201.0 255.255.255.0 tunnel 0
BAN (config) #
Verify Routing

CHE – Verification:

CHE # show ip route


Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 172.16.0.0/16 is directly connected, Serial0/0


C 192.168.201.0/24 is directly connected, FastEthernet0/0
S 192.168.203.0/24 [1/0] directly connected, Tunnel0
S* 0.0.0.0/0 [1/0] via Serial0/0

CHE #

BAN – Verification:

BAN # show ip route


Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 172.16.0.0/16 is directly connected, Serial0/1


C 192.168.203.0/24 is directly connected, FastEthernet0/0
S 192.168.201.0/24 [1/0] directly connected, Tunnel0
S* 0.0.0.0/0 [1/0] via Serial0/1

BAN #
Verify communication between the networks

Verification from a Computer in CHE Network by pinging a computer in the BAN network

ping 192.168.203.10

PING 192.168.203.10 (192.168.203.10) 56(84) bytes of data.


64 bytes from 192.168.203.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.203.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.203.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.203.10: icmp_seq=29 ttl=62 time=24.2 ms

Verification from a Computer in BAN Network by pinging a computer in the CHE network

ping 192.168.201.10

PING 192.168.201.10 (192.168.201.10) 56(84) bytes of data.


64 bytes from 192.168.201.10: icmp_seq=25 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=26 ttl=62 time=24.1 ms
64 bytes from 192.168.201.10: icmp_seq=27 ttl=62 time=24.3 ms
64 bytes from 192.168.201.10: icmp_seq=28 ttl=62 time=24.2 ms
64 bytes from 192.168.201.10: icmp_seq=29 ttl=62 time=24.2 ms

From a Computer in CHE Network trace communication path to a Computer in BAN Network

tracert 192.168.203.10 (Windows) or traceroute 192.168.203.10 (Linux)


traceroute to 192.168.203.10 (192.168.203.10), 30 hops max, 38 byte packets
1 192.168.201.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 1.1.1.1 (1.1.1.1) 2.295 ms 2.156 ms 2.209 ms
3 192.168.203.10 (192.168.203.10) 3.295 ms 3.156 ms 3.209 ms

From a Computer in BAN Network trace communication path to a Computer in CHE Network

tracert 192.168.201.10 (Windows) or traceroute 192.168.201.10 (Linux)


traceroute to 192.168.201.10 (192.168.201.10), 30 hops max, 38 byte packets
1 192.168.203.1 (192.168.202.1) 1.086 ms 1.124 ms 1.144 ms
2 1.1.1.2 (1.1.1.2) 2.295 ms 2.156 ms 2.209 ms
3 192.168.201.10 (192.168.202.10) 3.295 ms 3.156 ms 3.209 ms
Lab 8: Password Recovery

OBJECTIVE:
To get access to a router’s privileged mode in case the enable password is forgotten.
To reset the Privilege / Enable mode password of Cisco Router.

TOPOLOGY:
Setup Console and Ethernet connectivity for the lab as below:

TASK:
 Establish console connectivity
 Access router via console with an emulation software
 Enter Rom Monitor Mode and Change Register Value
 Load saved configuration to the router (i.e. NVRAM to RAM)
 Reconfigure Privilege Mode / Enable Password
 Reset the Configuration Register Value back to the default:
 Enable the Ethernet interface:
 Save configuration to the router and restart the router
 Verify login to the router using new password
Establish console connectivity
Establish console connectivity by connecting router console port to PC Com Port with console cable.

Access router via console with an emulation software


Configure the following parameters in emulation software for accessing switch via console port.

Parameters Console Port Settings

Baud 9600

Data bits 8

Parity None

Stop bits 1

Accessing router via console from Microsoft Windows Computer


 Start a terminal emulator application, such as PUTTY.exe
 Select Serial option and set speed to 9600.
 Click Open

 Once emulation software is ready, Power-ON the switch.

Accessing router via console from Linux Computer


 From the terminal enter the below command
# minicom
Enter Rom Monitor Mode and Change Configuration Register Value

Once emulation software is ready, Press “Ctrl + Break” within 60 sec after POWER-ON. Router will
Enter Rom monitor mode.

rommon 1>

Configure Register Value 0x2142 to skip executing the startup configuration from nvram during
bootup.

rommon 1 > confreg 0x2142


rommon 2 > reset

After the Router boots-up completely, it enters setup mode as below:


System Configuration Dialog
Would you like to enter the initial configuration dialog? [Yes/no]: no
Would you like to terminate autoinstall? [yes]: yes

If you choose “Yes”, IOS will prompt questions to gather the information to configure the Router, it is
recommended to choose “no”, since we can configure the Router using IOS commands

Router >enable

Load saved configuration to the router

Router # copy startup-config running-config


Destination filename [running-config]?
HYD-1 #

Reconfigure Privilege Mode / Enable Password


Since we are already in the privilege mode, we can setup a new privilege password.
HYD-1 # configure terminal
HYD-1 (config) # enable secret cisco
HYD-1 (config) # exit

Reset the Configuration Register Value back to the default:


HYD-1 (config)# config-register 0x2102

Enable the Ethernet interface:


HYD-1 (config)# interface FastEthernet0/0
HYD-1 (config-if)# no shutdown
HYD-1 (config-if)# ^Z

Similarly apply the “no shutdown” command on all required interface


Saving configuration to the router and restart the router
To save configuration on router
HYD-1 # copy running-config startup-config
Destination filename [startup-config]?
Building configuration...

[OK]
HYD-1 #

HYD-1 # reload

Verify login to the router using new password


 Access router via telnet and Enter privilege mode using new password.
telnet 192.168.202.1
Lab 9: IOS and Configuration Backup

OBJECTIVE:
To take backup of the IOS and the Router Configuration

TOPOLOGY:
Setup Ethernet connectivity for the lab as below:

Pre-requisite: 192.168.202.10 computer should have TFTP, FTP and SCP server software installed
and running.

TASK:
 Create a backup of Router Configuration on TFTP Server
 Verify Configuration file on TFTP server
 Create a Backup of Router IOS on TFTP Server
 Verify IOS file on TFTP server
 Create a backup of Router Configuration on FTP Server
 Verify Configuration file on FTP server
 Create a Backup of Router IOS on FTP Server
 Verify IOS file on FTP server
Backup of Router Configuration on TFTP Server

HYD-1 # copy startup-config tftp


Address or name of remote host []? 192.168.202.10
Destination filename [HYD-confg]? HYD-TFTP
!!
1514 bytes copied in 0.344 secs (4401 bytes/sec)
HYD-1 #

Verify backup configuration file on TFTP Server


Verify the Configuration file on TFTP server, default path is C:\Program Files\TFTPd32

Backup of Router IOS


HYD-1 # show flash
System flash directory:
File Length Name/status
1 63139972 Aug 01 2016 14:13:20 c2800nm-adventerprisek9-mz.151-1.T.bin
856064 bytes available (63156224 bytes used)

HYD-1 #

HYD-1 # copy flash tftp


Source filename []? C2800NM-ADVENTERPRISEK9-MZ.151-1.T.BIN
Address or name of remote host []? 192.168.202.10
Destination filename [C2800NM-ADVENTERPRISEK9-MZ.151-1.T.BIN]?
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
63139972 bytes copied in 264.584 secs (238639 bytes/sec)
HYD-1 #
Verify backup IOS file on TFTP server
Verify the IOS file on TFTP server, default path is C:\Program Files\TFTPd32

Backup of Router Configuration on FTP Server

HYD-1 # configure terminal


Enter configuration commands, one per line. End with CNTL/Z.
HYD-1 (config) # ip ftp username cisco
HYD-1 (config) # ip ftp password ccna
HYD-1 (config) # end

HYD-1 # copy startup-config ftp:


Address or name of remote host []? 192.168.202.10
Destination filename [HYD-confg]? HYD-FTP

Writing HYD-FTP !!
1557 bytes copied in 0.476 secs (3271 bytes/sec)
HYD-1 #
Verify backup configuration file on FTP Server
Verify the Configuration file on FTP server.

Backup of Router IOS


HYD-1 # show flash
System flash directory:
File Length Name/status
1 63139972 Aug 01 2016 14:13:20 c2800nm-adventerprisek9-mz.151-1.T.bin
856064 bytes available (63156224 bytes used)

HYD-1 #

HYD-1 # copy flash ftp:


Source filename []? C2800NM-ADVENTERPRISEK9-MZ.151-1.T.BIN
Address or name of remote host []? 192.168.202.10
Destination filename [C2800NM-ADVENTERPRISEK9-MZ.151-1.T.BIN]?
Writing C2800NM-ADVENTERPRISEK9-MZ.151-1.T.BIN !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
63139972 bytes copied in 264.584 secs (238639 bytes/sec)
HYD-1 #
Verify backup IOS file on FTP server
Verify the IOS file on FTP server.

Backup of Router Configuration on SCP Server

HYD-1 # copy startup-config scp:


Address or name of remote host []? 192.168.202.10
Destination username [HYD-1]? cisco
Destination filename [HYD-confg]? HYD-SCP

Writing HYD-SCP
Password: ccna
!!
1557 bytes copied in 0.476 secs (3271 bytes/sec)
HYD-1 #
Verify backup configuration file on SCP Server
Verify the Configuration file on SCP server, default path is C:\SFTP_Root.

Backup of Router IOS


HYD-1 # show flash
System flash directory:
File Length Name/status
1 63139972 Aug 01 2016 14:13:20 c2800nm-adventerprisek9-mz.151-1.T.bin
856064 bytes available (63156224 bytes used)

HYD-1 #

HYD-1 # copy flash scp:


Source filename []? C2800NM-ADVENTERPRISEK9-MZ.151-1.T.BIN
Address or name of remote host []? 192.168.202.10
Destination username [HYD-1]? cisco
Destination filename [C2800NM-ADVENTERPRISEK9-MZ.151-1.T.BIN]?

Writing C2800NM-ADVENTERPRISEK9-MZ.151-1.T.BIN
Password: ccna
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
63139972 bytes copied in 264.584 secs (238639 bytes/sec)
HYD-1 #
Verify backup IOS file on FTP server
Verify the IOS on SCP server, default path is C:\SFTP_Root.

You might also like