You are on page 1of 58

Asad Malik LAB FILE 2018-CE-123

- -

LAB # 1
1. TOPOLOGY:-

2. PC’S CONFIGURATION:-
Asad Malik LAB FILE 2018-CE-123

3. PING COMMAND:-

4. PDU REAL-TIME:-
Asad Malik LAB FILE 2018-CE-123

LAB#02
CONFIGURING DEVICE
Objective: Configuring and Securing an Intermediate device (Router)

•TRAVERSING EXEC MODES

• Enter Privileged EXEC mode

• Enter Global Configuration mode

• SET HOSTNAME

• SET CONSOLE PASSWORD

VERIFICATION:

• SET PRIVILEGE LEVEL PASSWORD


Asad Malik LAB FILE 2018-CE-123

VERIFICATION:

•SET Encrypted password (more Priority)

VERIFICATION:

•Check Running Configuration


Asad Malik LAB FILE 2018-CE-123

•HOW TO SET USER AUTHENTICATION

VERIFICATION:

•SET ENCRYPT PASSWORDS

•Before Encrypting passwords run show running-config command


Asad Malik LAB FILE 2018-CE-123

•Encrypting passwords

•SET BANNER

VERIFICATION:
Asad Malik LAB FILE 2018-CE-123

•SET SAVE/COPY RAM CONFIGURATION TO NVRAM

•SET CLOCK

Exercise Questions:
1) On Cisco routers, where is the running configuration loaded from?
The running configuration is stored from RAM. To display the
current running configuration, enter the show running-config command.
2) What does the flash memory on a router store?
Flash memory content is retained by the router on power-down or reload.
RAM is short for Random-Access Memory. RAM on a Cisco router
stores operational information such as routing tables and the running
configuration file. RAM contents are lost when the router is powered down
or reloaded.
3) When you are logged into a router, which prompts indicate that you
are in privileged mode?
Privileged mode can be identified by the # prompt following
the router name.

TASK:
st
Class 1st Octet 1 Network/H Default Subnet Number of Hosts per
Decimal Octet ost ID Mask Networks Network
Range High (N=Networ (Usable
Orde k, H=Host) Addresses)
r Bits

A 1 – 126 * 0 N.H.H.H 255.0.0.0 126 (27 – 2) 16,777,214


(224 – 2)
Asad Malik LAB FILE 2018-CE-123

B 128 – 191 10 N.N.H.H 255.255.0.0 16,382 65,534


(214 – 2) (216 – 2)

C 192 – 223 110 N.N.N.H 255.255.255.0 2,097,150 254 (28 – 2)


(221 – 2)

D 224 – 239 1110 Reserved for Multicasting

E 240 – 254 11110 Experimental; used for research

Note: Class A address 127 cannot be used and is reserved for loopback and diagnostic functions.

Step 2: Basic IP addressing


Use the IP address chart and your knowledge of IP address classes to answer the following
questions:

1. What is the decimal and binary range of the first octet of all possible Class B IP addresses?

Decimal: From: 128-191 Binary: From:

To: 10000000To: 10111111

2. Which octet(s) represent the network portion of a Class C IP address?


Ans: Starting 3 Octets

3. Which octet(s) represent the host portion of a Class A IP address?


Ans: Ending 3 Octets

4. What is the maximum number of useable hosts with a Class C network address?
Ans: 254

5. How many Class B networks are there? Ans: 16,382

6. How many hosts can each Class B network have? Ans: 65,534

7. How many octets are there in an IP address? Ans: 4 How many bits per octet?

Step 3: Determine the host and network portions of the IP address


With the following IP host addresses, indicate the following:

• Class of each address

• Network address or ID
• Host portion
Asad Malik LAB FILE 2018-CE-123

• Broadcast address for this network


• Default subnet mask
The host portion will be all zeros for the network ID. Enter just the octets that make up the host. Thehost
portion will be all ones for a broadcast. The network portion of the address will be all ones forthe subnet
mask. Fill in the following table:

Host IP Address Address Network Host Network Broadcast Default


Class Address Address Address Subnet
Mask

216.14.55.137
C 216.14.55.0 216.14.55.1 216.14.55.255 255.255.255.0

123.1.1.15
A 123.0.0.0 123.0.0.1 123.1.1.255 255.0.0.0

150.127.221.244
B 150.127.0.0 150.127.0.1 150.127.221.255 255.255.0.0

194.125.35.199
C 194.125.35.0 194.125.35.1 194.125.35.255 255.255.255.0

175.12.239.244
B 175.12.0.0 175.12.0.1 175.12.239.255 255.255.0.0

Step 4: Given an IP address of 142.226.0.15, answer the following


questions:
What is the binary equivalent of the second octet?

Ans: 1100010

What is the class of the address?

Ans: Class B

What is the network address of this IP address?

Ans: 142.226

Is this a valid IP host address (Y/N)?

Ans: NO
Why or why not?

Ans: Valid IP Hosts are 142.226.0.0, 142.226.0.64 , 142.226.0.128 , 142.226.0.192

Step 5: Determine which IP host addresses are valid for commercial networks

For the following IP host addresses, determine which are valid for
commercial networks and indicate why or why not. Valid means itcould be
assigned to any of the following:
• Workstation
• Server
• Printer
ASAD MALIK 2018-CE-123 LAB FILE

• Router interface
• Any other
compatible
device Fill in
the
following
table:

IP Host Address Valid Why or Why Not


Address?
(Yes/No)

150.100.255.255 NO Last Octet is wrong

175.100.255.18 YES Correct Octets

195.234.253.0 NO Last Octet is wrong

100.0.0.23 YES Correct Octets

188.258.221.176 NO Last Octet is wrong

127.34.25.189 NO Last Octet is wrong

224.156.217.73 NO Last Octet is wrong

Exercise Questions:

• Determine the correct class of the following IP

addresses:Address Class?

• 191.107.2.10 B

• 172.16.16.15 B

• 200.200.5.2 C

• 3.3.57.0 A

• 131.107.2.89 B

• Which address class (es) will allow you to have more than 1000 hosts per network?
Ans: B
• Which address class (es) will allow only 254 hosts per network?
Ans: C

Page | 10
ASAD MALIK 2018-CE-123 LAB FILE

Lab 4
Configuring router and enabling IPv6

Ce105
Ce105
Ce105
Ce105

Configuring link local address and global unicast


Ce105
Ce105
Ce105
Ce105

Ce098 (config-if)#

Verifying if IPv6 is up
Ce0105>sh

Using ipv6config command

Page | 11
ASAD MALIK 2018-CE-123 LAB FILE

Configuring static IPv6

Ce105
Ce105
Ce105
Ce105
Ce105
Ce105
Ce105

Entering IPv6 IP

Checking IPv6 table

Page | 12
ASAD MALIK 2018-CE-123 LAB FILE

Making new network

Configuring routers

CE105
CE105

CE105
CE105
Assigning IPs to PCs

Exercise Questions:
As a CCNA candidate, you must have a firm understanding of the IPv6 address structure.
Refer to IPv6 address, could you tell me how many bits are included in each filed?

Page | 13
ASAD MALIK 2018-CE-123 LAB FILE

Format of IPv6 address is X:X:X:X:X:X:X:X where X is 16-bit hexadecimal field. For example:
110A:0192:190F:0000:0000:082C:875A:132c
In practical IPv6 application, a technology encapsulates IPv6 packets inside IPv4 packets,
this technology is called what?
Tunneling
Internet Protocol version 6 (IPv6) is the next-generation Internet Protocol version
designated as the successor to IPv4 because IPv4 address space is being exhausted. Which
one of the following descriptions about IPv6 is correct?
A – Addresses are not hierarchical and are assigned at random.
B – Broadcasts have been eliminated and replaced with multicasts.
C – There are 2.7 billion available addresses.
D – An interface can only be configured with one IPv6 address.
B – Broadcasts have been eliminated and replaced with multicasts.

Page | 14
ASAD MALIK 2018-CE-123 LAB FILE

LAB NO 5
EXERCISE QUESTION
Step 1: Examine multiplexing as all of the traffic crosses the network.

Step 2: Examine HTTP traffic as the clients communicate with the server.

Http Client sent

Page | 15
ASAD MALIK 2018-CE-123 LAB FILE

Http Client receive

Page | 16
ASAD MALIK 2018-CE-123 LAB FILE

Step 3: Examine FTP traffic as the clients communicate with the server.

FTP and TCP

FTP sends

FTP receives

inbound

Outbound

Page | 17
ASAD MALIK 2018-CE-123 LAB FILE

Second time PDU receive by FTP Client

Page | 18
ASAD MALIK 2018-CE-123 LAB FILE

Inbound FTP

Step 4: Examine DNS traffic as the clients communicate with the server.

DNS Client Sends

Page | 19
ASAD MALIK 2018-CE-123 LAB FILE

DNS Client receives

Page | 20
ASAD MALIK 2018-CE-123 LAB FILE

Step 5: Examine email traffic as the clients communicate with the server.

Email Client receive

Email client send

Page | 21
ASAD MALIK 2018-CE-123 LAB FILE

Email client receive 2nd tym

Page | 22
ASAD MALIK 2018-CE-123 LAB FILE

There is a second PDU of a different color that HTTP Client has prepared to send to MultiServer. This
is the beginning of the email communication. Click this second PDU envelope and select Outbound
PDU Details.

Page | 23
ASAD MALIK 2018-CE-123 LAB FILE

Step 6: Examine the use of port numbers from the server.

Page | 24
ASAD MALIK 2018-CE-123 LAB FILE

Page | 25
ASAD MALIK 2018-CE-123 LAB FILE

LAB 6
Standard and Extended ACL

TOPOLOGY 1

Page | 26
ASAD MALIK 2018-CE-123 LAB FILE

TOPOLOGY 2

Page | 27
ASAD MALIK 2018-CE-123 LAB FILE

Exercise Questions:
Question: What is WildCard Mask?
Answer: A wildcard mask allows or denies all the traffic from a network IP address. The wildcard
mask tells the router which bits in the IP address need to match the access list and which do not. A
wildcard mask is a sequence of numbers that streamlines packet routing inside a proprietary network's
subnets. It is also referred to as an inverse mask.
Question: How to permit or deny specific Host in ACL?
Answer: The command syntax format of a standard ACL is access-list access-list-number
{permit|deny} {host|source source-wildcard|any}. Standard ACLs compare the source address of the
IP packets to the addresses configured in the ACL in order to control traffic.
Question: In which direction we can apply an access list?
Answer: Standard Access-list is generally applied close to destination (but not always). In standard
access-list, whole network or sub-network is denied. Standard access-list uses the range 1-99 and
extended range 1300-1999. Standard access-list is implemented using source IP address only.

Page | 28
ASAD MALIK 2018-CE-123 LAB FILE

LAB # 7
EXERCISE 1:

Topology:

Router0 config:

Router config
Ce105 (config)#int fa0/0
Ce105 (config-if) #ip address 10.0.0.1 255.0.0.0
% 10.0.0.0 overlaps with Seriall/0
Ce105 (config-if)#no shutdown
Ce105 (config-if)#int sl/o
Ce105 (config-if) #ip address 11.0.0.1 255.0.0.0
%11.0.0.0 overlaps with FastEthernet0/0
Ce105 (config-if)#clock rate 6400

Router1 config:

Ce105 (config)#int sl/o


Ce105 (config-if)#ip address 11.0.0.2 255.0.0.0
Ce105 (config-if)#no shutdown
Ce105 (config-if)#int fa0/0
Ce105 (config-if) #ip address 12.0.0.1 255.0.0.0
Ce105 (config-if)#no shutdown
Ce105 (config-if)#exit
Router0 (Static Route Config):

Ce105 (config)#ip route 12.0.0.0 255.0.0.0 11.0.0.2 150


Router1 (Static Route Config):

Ce105 (config)#ip route 10.0.0.0 255.0.0.0 11.0.0.1 150

Page | 29
ASAD MALIK 2018-CE-123 LAB FILE

PC0 config:

PC1 config:

PC2 config:

PC3 config:

Page | 30
ASAD MALIK 2018-CE-123 LAB FILE

Output:

EXERCISE 2:

Checking Routing Table:

Page | 31
ASAD MALIK 2018-CE-123 LAB FILE

LAB#08
Static Routes

Routers Configurations

Page | 32
ASAD MALIK 2018-CE-123 LAB FILE

Exercise Questions
Q: What are static routes used for?
A: Static routes are most often used to connect to a specific network or to provide a Gateway
of Last Resort for a stub network. They can also be used to: Reduce the number
of routes advertised by summarizing several contiguous networks as one static route. Create a
backup route in case a primary route link fails.
Q: How do static routes work?
A: Static routing is a form of routing that occurs when a router uses a manually-configured
routing entry, rather than information from dynamic routing traffic. ... Unlike dynamic
routing, static routes are fixed and do not change if the network is changed or reconfigured.
Q: What is static route metric?
A: A static route does not have a metric unless it is being redistributed into a dynamic routing
protocol and in that case the assignment of metric is dependent on the
particular routing protocol (OSPF does it differently from EIGRP which does it differently
from RIP).

ROUTER 1:

Page | 33
ASAD MALIK 2018-CE-123 LAB FILE

Page | 34
ASAD MALIK 2018-CE-123 LAB FILE

Exercise Questions:

• What percent of bandwidth and processor resources does Eigrp use?


EIGRP version 1 introduced a feature that prevents any single EIGRP process from using more
than fifty percent of the configured bandwidth on any link during periods of network convergence.
Each AS or protocol (for instance, IP, IPX, or Appletalk) serviced by EIGRP is a separate
process. You can use the ip bandwidth-percent eigrp interface configuration command in order
to properly configure the bandwidth percentage on each WAN interface. Refer to the EIGRP
White Paper for more information on how this feature works.

• What are the metrics used in Eigrp?


EIGRP updates contain five metrics: minimum bandwidth, delay, load, reliability, and maximum
transmission unit (MTU). Of these five metrics, by default, only minimum bandwidth and delay
are used to compute best path. Unlike most metrics, minimum bandwidth is set to the minimum
bandwidth of the entire path, and it does not reflect how many hops or low bandwidth links are in
the path.

• What is reported distance in Eigrp

In EIGRP, a local router calculates the metric for each route, but also considers
the next-hop router’s metric for that same destination subnet. These metric
have their own names:

Page | 35
ASAD MALIK 2018-CE-123 LAB FILE

LAB NO 9
EIGRP (Enhanced Interior Gateway Routing Protocol)

Page | 36
ASAD MALIK 2018-CE-123 LAB FILE

Routers Configuration

Page | 37
ASAD MALIK 2018-CE-123 LAB FILE

Q.  What percent of bandwidth and processor resources does EIGRP use?

A)  EIGRP version 1 introduced a feature that prevents any single EIGRP process from using more


than fifty percent of the configured bandwidth on any link during periods of network convergence.

Q. What are the metrics used in Eigrp?


A) EIGRP updates contain five metrics: minimum bandwidth, delay, load, reliability, and maximum
transmission unit (MTU). Of these five metrics, by default, only minimum bandwidth and delay
are used to compute best path

Q. What is reported distance in Eigrp?


A) In EIGRP, a local router calculates the metric for each route, but also considers the next-hop
router's metric for that same destination subnet. These metric have their own
names: Reported (advertised) distance (RD or AD) – the metric advertised by the neighboring router
for a specific route.

Page | 38
ASAD MALIK 2018-CE-123 LAB FILE

Lab 10
Configure Open Shortest Path First (OSPF)

Q. What is the administrative distance of Open Shortest Path First (< OSPF >) routing
protocol?
A) A router receives a route to a certain network from both Open Shortest Path First (OSPF)
(default administrative distance - 110) and Interior Gateway Routing Protocol (IGRP)

Page | 39
ASAD MALIK 2018-CE-123 LAB FILE

(default administrative distance - 100), the router chooses IGRP because IGRP is more


reliable.

Q. How do I enable OSPF?


A) To enable OSPF on a Cisco router and advertise interfaces, the following tasks
are required:
• Use the command router ospf process ID to start OSPF.
• Use the network command to enable the interfaces.
• Identify area assignments.
• (Optional) Assign the router ID.

Q. What is DR and BDR in OSPF?


A) Within OSPF, the role of the Designated Router (DR) and a Backup Designated
Router (BDR) is to act as a central point for exchanging of OSPF information
between multiple routers on the same, multi access broadcast network segment

Page | 40
ASAD MALIK 2018-CE-123 LAB FILE

LAB#12
Wireless LAN
Objective: To create Wireless LAN using wireless access point and laptops in
packet tracer

Router Configuration

Wireless Connection through Password and pdu is transferring

Page | 41
ASAD MALIK 2018-CE-123 LAB FILE

Now, let us use Access point to connect to PCs wirelessly

Page | 42
ASAD MALIK 2018-CE-123 LAB FILE

Exercise Task

Page | 43
ASAD MALIK 2018-CE-123 LAB FILE

Exercise Questions:
Q: Which multiplexing is used in wireless LAN?
A: In orthogonal frequency division multiplexing, digital data is encoded on multiple carrier
frequencies. It is also used in digital television and audio broadcasting in addition to Wireless
LANs.

Q: What is WLAN computer network?


A: A wireless LAN (WLAN) is a wireless computer network that links two or more devices
using wireless communication to form a local area network (LAN) within a limited area such
as a home, school, computer laboratory, campus, or office building.

Q: Which multiple access technique is used in WIFI?


A: Space division multiple access or spatial division multiple access is a technique which is
MIMO (multiple-input multiple-output) architecture and used mostly in wireless and satellite
communication.

Page | 44
ASAD MALIK 2018-CE-123 LAB FILE

LAB#13
Wireless LAN

Router Configuration

Wireless Connection through Password and pdu is transferring

Page | 45
ASAD MALIK 2018-CE-123 LAB FILE

Now, let us use Access point to connect to PCs wirelessly

Page | 46
ASAD MALIK 2018-CE-123 LAB FILE

Exercise Task

Page | 47
ASAD MALIK 2018-CE-123 LAB FILE

Exercise Questions:
Q: Which multiplexing is used in wireless LAN?
A: In orthogonal frequency division multiplexing, digital data is encoded on multiple carrier
frequencies. It is also used in digital television and audio broadcasting in addition to Wireless
LANs.
Q: What is WLAN computer network?
A: A wireless LAN (WLAN) is a wireless computer network that links two or more devices
using wireless communication to form a local area network (LAN) within a limited area such
as a home, school, computer laboratory, campus, or office building.
Q: Which multiple access technique is used in WIFI?
A: Space division multiple access or spatial division multiple access is a technique which is
MIMO (multiple-input multiple-output) architecture and used mostly in wireless and satellite
communication.

Page | 48
ASAD MALIK 2018-CE-123 LAB FILE

LAB#14
DHCP Server
Objective: To simulate the wired & wireless router configuration having DHCP server

When you create a home network, you can choose between a wired connection and a
wireless network. Most wired connections will use Ethernet cables to connect your
computer to a router or directly to your modem; you may also be able to use your
home's phone-line system with the right hardware. To set up a wireless network,
you'll need a wireless router and compatible wireless devices that can access it. This
comparison will help you understand the advantages of both wireless and wired
networking devices, so you can set up the best home network for yourself.
1. Wired connection speeds: Wired connections can achieve extremely fast
speeds, which work well if you have a fast broadband or fiber-optic Internet
connection, making wired options superior to wireless when it comes to speed.
These speeds are almost always theoretical maximum speeds, so you will probably
see a lower speed in actual performance, depending on the actual conditions.

Wired Options:
1. Ethernet: These connections for home routers and computers typically
support transmissions up to 100 megabits per second (Mbps).

2. Phone-line: A phone-line connection between your network router and


computer can allow for varying speeds from 1 Mbps to 128 Mbps, depending
on the hardware you have available.

3. Power-line networking: This option, which uses the existing power outlets and
electrical wiring to transmit network signals, can be a cheap solution although it
only supports speeds up to 14 Mbps.

1. Wireless connection speeds: Wireless networks are also typically rated with
theoretical maximum speeds, so these numbers may not reflect actual performance. In

Page | 49
ASAD MALIK 2018-CE-123 LAB FILE

general, you'll get slower performance from a wireless connection than from a wired connection.
Wireless routers, laptops and other devices typically use one of the following signal standards.

Wireless Options:
• 802.11a: Also known as "Wireless-A," this wireless standard can transfer at speeds up to 54
Mbps.

• 802.11b: Wireless-B networks are slower, only transferring at 11 Mbps.

• 802.11g: Wireless-G is backwards-compatible with wireless-B although an older device will


obviously operate at the slower of the two speeds. Wireless-G devices can transfer at up to
54 Mbps.

• 802.11n: Wireless-N promises transfer rates of up to 600 Mbps although actual reported
performance is much lower, depending on other conditions and what type of hardware
you're using.

1. Installation: A wired connection is rather simple to set up. All you need is a
connecting cable from your computer to your router or modem. You may need to change
some settings to get your computer to recognize the connection. Wireless networks take a
bit more work to set up, and you'll need to place the router in a location where your
computers will receive a clear signal. You'll also need to set up security settings and a
network passkey, which you'll need for every single computer on the network. Depending
on your wireless router and the operating system software running on each computer, you
may have to install additional software or change the network settings to get the computers
to recognize the connection.

2. Compatibility: Wired connections only require that your computer and network
devices be compatible with a technology like Ethernet or HomePNA. Ethernet is the most
widely used wired connection for desktops and laptop computers, requiring an actual
Ethernet port. If you don't have the appropriate port, you might be able to install an
Ethernet adapter card that adds the port to your computer. Wireless networks, in
comparison, need no connection ports. Instead, you'll need wireless capability that uses a
signal compatible with your wireless router's signal. This means that many different Wi-Fi
devices can use the network as long as they use the right signal. If your computer doesn't
have built-in wireless, you can add that capability by installing a wireless- network adapter
through a USB port.

3. Security: Wireless networks do pose some security risks because they are usually
being broadcast in public spaces. Wireless signal encryption offers some protection, but
wireless is still not as secure as Ethernet and other wired connections that are not
broadcast.

Place all the internetworking devices in topology area

Page | 50
ASAD MALIK 2018-CE-123 LAB FILE

Connected with All the connection types

Configure the server

Page | 51
ASAD MALIK 2018-CE-123 LAB FILE

Assign ip statically to the server

Go to each client And selecting the DHCP

Page | 52
ASAD MALIK 2018-CE-123 LAB FILE

Configuring the laptop

Switch off the laptop power button and after adding Linksys WPC300N switch On again

Open the Access Point

Page | 53
ASAD MALIK 2018-CE-123 LAB FILE

On Config Tab selecting port number 1, then selecting WEP (Key/ Passcode) for Securing
the wireless LAN

Now connect the laptop to the access point by selecting pc wireless option

Page | 54
ASAD MALIK 2018-CE-123 LAB FILE

Go into connect menu, selecting connect button also give WAP KEY.

To Verify the DHCP ip is assign to the laptop

Page | 55
ASAD MALIK 2018-CE-123 LAB FILE

Now check the network Ping the internetworking devices

Page | 56
ASAD MALIK 2018-CE-123 LAB FILE

SOLUTION:

MY TOPOLOGY:

Page | 57
ASAD MALIK 2018-CE-123 LAB FILE

Exercise Questions:

• What Information can a DHCP server provides to a host?

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that


automatically provides an Internet Protocol (IP) host with its IP address and other
related configuration information such as the subnet mask and default gateway.

• What is the purpose of the relay agent?

DHCP relay agent is any TCP/IP host which is used to forward request and replies
between DHCP server and client when the server is present on the different
network. Relay agents receive DHCP messages and then generate a new DHCP message
to send out on another INTERFACE.

• What is the DHCPNAK message?

DHCP negative acknowledgment message (DHCPNAK): A message sent by a DHCP server


to a client to indicate that the IP address that the client requested is not correct for the local IP network
served by the DHCP server.

Page | 58

You might also like