Professional Documents
Culture Documents
- -
LAB # 1
1. TOPOLOGY:-
2. PC’S CONFIGURATION:-
Asad Malik LAB FILE 2018-CE-123
3. PING COMMAND:-
4. PDU REAL-TIME:-
Asad Malik LAB FILE 2018-CE-123
LAB#02
CONFIGURING DEVICE
Objective: Configuring and Securing an Intermediate device (Router)
• SET HOSTNAME
VERIFICATION:
VERIFICATION:
VERIFICATION:
VERIFICATION:
•Encrypting passwords
•SET BANNER
VERIFICATION:
Asad Malik LAB FILE 2018-CE-123
•SET CLOCK
Exercise Questions:
1) On Cisco routers, where is the running configuration loaded from?
The running configuration is stored from RAM. To display the
current running configuration, enter the show running-config command.
2) What does the flash memory on a router store?
Flash memory content is retained by the router on power-down or reload.
RAM is short for Random-Access Memory. RAM on a Cisco router
stores operational information such as routing tables and the running
configuration file. RAM contents are lost when the router is powered down
or reloaded.
3) When you are logged into a router, which prompts indicate that you
are in privileged mode?
Privileged mode can be identified by the # prompt following
the router name.
TASK:
st
Class 1st Octet 1 Network/H Default Subnet Number of Hosts per
Decimal Octet ost ID Mask Networks Network
Range High (N=Networ (Usable
Orde k, H=Host) Addresses)
r Bits
Note: Class A address 127 cannot be used and is reserved for loopback and diagnostic functions.
1. What is the decimal and binary range of the first octet of all possible Class B IP addresses?
4. What is the maximum number of useable hosts with a Class C network address?
Ans: 254
6. How many hosts can each Class B network have? Ans: 65,534
7. How many octets are there in an IP address? Ans: 4 How many bits per octet?
• Network address or ID
• Host portion
Asad Malik LAB FILE 2018-CE-123
216.14.55.137
C 216.14.55.0 216.14.55.1 216.14.55.255 255.255.255.0
123.1.1.15
A 123.0.0.0 123.0.0.1 123.1.1.255 255.0.0.0
150.127.221.244
B 150.127.0.0 150.127.0.1 150.127.221.255 255.255.0.0
194.125.35.199
C 194.125.35.0 194.125.35.1 194.125.35.255 255.255.255.0
175.12.239.244
B 175.12.0.0 175.12.0.1 175.12.239.255 255.255.0.0
Ans: 1100010
Ans: Class B
Ans: 142.226
Ans: NO
Why or why not?
Step 5: Determine which IP host addresses are valid for commercial networks
For the following IP host addresses, determine which are valid for
commercial networks and indicate why or why not. Valid means itcould be
assigned to any of the following:
• Workstation
• Server
• Printer
ASAD MALIK 2018-CE-123 LAB FILE
• Router interface
• Any other
compatible
device Fill in
the
following
table:
Exercise Questions:
addresses:Address Class?
• 191.107.2.10 B
• 172.16.16.15 B
• 200.200.5.2 C
• 3.3.57.0 A
• 131.107.2.89 B
• Which address class (es) will allow you to have more than 1000 hosts per network?
Ans: B
• Which address class (es) will allow only 254 hosts per network?
Ans: C
Page | 10
ASAD MALIK 2018-CE-123 LAB FILE
Lab 4
Configuring router and enabling IPv6
Ce105
Ce105
Ce105
Ce105
Ce098 (config-if)#
Verifying if IPv6 is up
Ce0105>sh
Page | 11
ASAD MALIK 2018-CE-123 LAB FILE
Ce105
Ce105
Ce105
Ce105
Ce105
Ce105
Ce105
Entering IPv6 IP
Page | 12
ASAD MALIK 2018-CE-123 LAB FILE
Configuring routers
CE105
CE105
CE105
CE105
Assigning IPs to PCs
Exercise Questions:
As a CCNA candidate, you must have a firm understanding of the IPv6 address structure.
Refer to IPv6 address, could you tell me how many bits are included in each filed?
Page | 13
ASAD MALIK 2018-CE-123 LAB FILE
Format of IPv6 address is X:X:X:X:X:X:X:X where X is 16-bit hexadecimal field. For example:
110A:0192:190F:0000:0000:082C:875A:132c
In practical IPv6 application, a technology encapsulates IPv6 packets inside IPv4 packets,
this technology is called what?
Tunneling
Internet Protocol version 6 (IPv6) is the next-generation Internet Protocol version
designated as the successor to IPv4 because IPv4 address space is being exhausted. Which
one of the following descriptions about IPv6 is correct?
A – Addresses are not hierarchical and are assigned at random.
B – Broadcasts have been eliminated and replaced with multicasts.
C – There are 2.7 billion available addresses.
D – An interface can only be configured with one IPv6 address.
B – Broadcasts have been eliminated and replaced with multicasts.
Page | 14
ASAD MALIK 2018-CE-123 LAB FILE
LAB NO 5
EXERCISE QUESTION
Step 1: Examine multiplexing as all of the traffic crosses the network.
Step 2: Examine HTTP traffic as the clients communicate with the server.
Page | 15
ASAD MALIK 2018-CE-123 LAB FILE
Page | 16
ASAD MALIK 2018-CE-123 LAB FILE
Step 3: Examine FTP traffic as the clients communicate with the server.
FTP sends
FTP receives
inbound
Outbound
Page | 17
ASAD MALIK 2018-CE-123 LAB FILE
Page | 18
ASAD MALIK 2018-CE-123 LAB FILE
Inbound FTP
Step 4: Examine DNS traffic as the clients communicate with the server.
Page | 19
ASAD MALIK 2018-CE-123 LAB FILE
Page | 20
ASAD MALIK 2018-CE-123 LAB FILE
Step 5: Examine email traffic as the clients communicate with the server.
Page | 21
ASAD MALIK 2018-CE-123 LAB FILE
Page | 22
ASAD MALIK 2018-CE-123 LAB FILE
There is a second PDU of a different color that HTTP Client has prepared to send to MultiServer. This
is the beginning of the email communication. Click this second PDU envelope and select Outbound
PDU Details.
Page | 23
ASAD MALIK 2018-CE-123 LAB FILE
Page | 24
ASAD MALIK 2018-CE-123 LAB FILE
Page | 25
ASAD MALIK 2018-CE-123 LAB FILE
LAB 6
Standard and Extended ACL
TOPOLOGY 1
Page | 26
ASAD MALIK 2018-CE-123 LAB FILE
TOPOLOGY 2
Page | 27
ASAD MALIK 2018-CE-123 LAB FILE
Exercise Questions:
Question: What is WildCard Mask?
Answer: A wildcard mask allows or denies all the traffic from a network IP address. The wildcard
mask tells the router which bits in the IP address need to match the access list and which do not. A
wildcard mask is a sequence of numbers that streamlines packet routing inside a proprietary network's
subnets. It is also referred to as an inverse mask.
Question: How to permit or deny specific Host in ACL?
Answer: The command syntax format of a standard ACL is access-list access-list-number
{permit|deny} {host|source source-wildcard|any}. Standard ACLs compare the source address of the
IP packets to the addresses configured in the ACL in order to control traffic.
Question: In which direction we can apply an access list?
Answer: Standard Access-list is generally applied close to destination (but not always). In standard
access-list, whole network or sub-network is denied. Standard access-list uses the range 1-99 and
extended range 1300-1999. Standard access-list is implemented using source IP address only.
Page | 28
ASAD MALIK 2018-CE-123 LAB FILE
LAB # 7
EXERCISE 1:
Topology:
Router0 config:
Router config
Ce105 (config)#int fa0/0
Ce105 (config-if) #ip address 10.0.0.1 255.0.0.0
% 10.0.0.0 overlaps with Seriall/0
Ce105 (config-if)#no shutdown
Ce105 (config-if)#int sl/o
Ce105 (config-if) #ip address 11.0.0.1 255.0.0.0
%11.0.0.0 overlaps with FastEthernet0/0
Ce105 (config-if)#clock rate 6400
Router1 config:
Page | 29
ASAD MALIK 2018-CE-123 LAB FILE
PC0 config:
PC1 config:
PC2 config:
PC3 config:
Page | 30
ASAD MALIK 2018-CE-123 LAB FILE
Output:
EXERCISE 2:
Page | 31
ASAD MALIK 2018-CE-123 LAB FILE
LAB#08
Static Routes
Routers Configurations
Page | 32
ASAD MALIK 2018-CE-123 LAB FILE
Exercise Questions
Q: What are static routes used for?
A: Static routes are most often used to connect to a specific network or to provide a Gateway
of Last Resort for a stub network. They can also be used to: Reduce the number
of routes advertised by summarizing several contiguous networks as one static route. Create a
backup route in case a primary route link fails.
Q: How do static routes work?
A: Static routing is a form of routing that occurs when a router uses a manually-configured
routing entry, rather than information from dynamic routing traffic. ... Unlike dynamic
routing, static routes are fixed and do not change if the network is changed or reconfigured.
Q: What is static route metric?
A: A static route does not have a metric unless it is being redistributed into a dynamic routing
protocol and in that case the assignment of metric is dependent on the
particular routing protocol (OSPF does it differently from EIGRP which does it differently
from RIP).
ROUTER 1:
Page | 33
ASAD MALIK 2018-CE-123 LAB FILE
Page | 34
ASAD MALIK 2018-CE-123 LAB FILE
Exercise Questions:
In EIGRP, a local router calculates the metric for each route, but also considers
the next-hop router’s metric for that same destination subnet. These metric
have their own names:
Page | 35
ASAD MALIK 2018-CE-123 LAB FILE
LAB NO 9
EIGRP (Enhanced Interior Gateway Routing Protocol)
Page | 36
ASAD MALIK 2018-CE-123 LAB FILE
Routers Configuration
Page | 37
ASAD MALIK 2018-CE-123 LAB FILE
Q. What percent of bandwidth and processor resources does EIGRP use?
Page | 38
ASAD MALIK 2018-CE-123 LAB FILE
Lab 10
Configure Open Shortest Path First (OSPF)
Q. What is the administrative distance of Open Shortest Path First (< OSPF >) routing
protocol?
A) A router receives a route to a certain network from both Open Shortest Path First (OSPF)
(default administrative distance - 110) and Interior Gateway Routing Protocol (IGRP)
Page | 39
ASAD MALIK 2018-CE-123 LAB FILE
Page | 40
ASAD MALIK 2018-CE-123 LAB FILE
LAB#12
Wireless LAN
Objective: To create Wireless LAN using wireless access point and laptops in
packet tracer
Router Configuration
Page | 41
ASAD MALIK 2018-CE-123 LAB FILE
Page | 42
ASAD MALIK 2018-CE-123 LAB FILE
Exercise Task
Page | 43
ASAD MALIK 2018-CE-123 LAB FILE
Exercise Questions:
Q: Which multiplexing is used in wireless LAN?
A: In orthogonal frequency division multiplexing, digital data is encoded on multiple carrier
frequencies. It is also used in digital television and audio broadcasting in addition to Wireless
LANs.
Page | 44
ASAD MALIK 2018-CE-123 LAB FILE
LAB#13
Wireless LAN
Router Configuration
Page | 45
ASAD MALIK 2018-CE-123 LAB FILE
Page | 46
ASAD MALIK 2018-CE-123 LAB FILE
Exercise Task
Page | 47
ASAD MALIK 2018-CE-123 LAB FILE
Exercise Questions:
Q: Which multiplexing is used in wireless LAN?
A: In orthogonal frequency division multiplexing, digital data is encoded on multiple carrier
frequencies. It is also used in digital television and audio broadcasting in addition to Wireless
LANs.
Q: What is WLAN computer network?
A: A wireless LAN (WLAN) is a wireless computer network that links two or more devices
using wireless communication to form a local area network (LAN) within a limited area such
as a home, school, computer laboratory, campus, or office building.
Q: Which multiple access technique is used in WIFI?
A: Space division multiple access or spatial division multiple access is a technique which is
MIMO (multiple-input multiple-output) architecture and used mostly in wireless and satellite
communication.
Page | 48
ASAD MALIK 2018-CE-123 LAB FILE
LAB#14
DHCP Server
Objective: To simulate the wired & wireless router configuration having DHCP server
When you create a home network, you can choose between a wired connection and a
wireless network. Most wired connections will use Ethernet cables to connect your
computer to a router or directly to your modem; you may also be able to use your
home's phone-line system with the right hardware. To set up a wireless network,
you'll need a wireless router and compatible wireless devices that can access it. This
comparison will help you understand the advantages of both wireless and wired
networking devices, so you can set up the best home network for yourself.
1. Wired connection speeds: Wired connections can achieve extremely fast
speeds, which work well if you have a fast broadband or fiber-optic Internet
connection, making wired options superior to wireless when it comes to speed.
These speeds are almost always theoretical maximum speeds, so you will probably
see a lower speed in actual performance, depending on the actual conditions.
Wired Options:
1. Ethernet: These connections for home routers and computers typically
support transmissions up to 100 megabits per second (Mbps).
3. Power-line networking: This option, which uses the existing power outlets and
electrical wiring to transmit network signals, can be a cheap solution although it
only supports speeds up to 14 Mbps.
1. Wireless connection speeds: Wireless networks are also typically rated with
theoretical maximum speeds, so these numbers may not reflect actual performance. In
Page | 49
ASAD MALIK 2018-CE-123 LAB FILE
general, you'll get slower performance from a wireless connection than from a wired connection.
Wireless routers, laptops and other devices typically use one of the following signal standards.
Wireless Options:
• 802.11a: Also known as "Wireless-A," this wireless standard can transfer at speeds up to 54
Mbps.
• 802.11n: Wireless-N promises transfer rates of up to 600 Mbps although actual reported
performance is much lower, depending on other conditions and what type of hardware
you're using.
1. Installation: A wired connection is rather simple to set up. All you need is a
connecting cable from your computer to your router or modem. You may need to change
some settings to get your computer to recognize the connection. Wireless networks take a
bit more work to set up, and you'll need to place the router in a location where your
computers will receive a clear signal. You'll also need to set up security settings and a
network passkey, which you'll need for every single computer on the network. Depending
on your wireless router and the operating system software running on each computer, you
may have to install additional software or change the network settings to get the computers
to recognize the connection.
2. Compatibility: Wired connections only require that your computer and network
devices be compatible with a technology like Ethernet or HomePNA. Ethernet is the most
widely used wired connection for desktops and laptop computers, requiring an actual
Ethernet port. If you don't have the appropriate port, you might be able to install an
Ethernet adapter card that adds the port to your computer. Wireless networks, in
comparison, need no connection ports. Instead, you'll need wireless capability that uses a
signal compatible with your wireless router's signal. This means that many different Wi-Fi
devices can use the network as long as they use the right signal. If your computer doesn't
have built-in wireless, you can add that capability by installing a wireless- network adapter
through a USB port.
3. Security: Wireless networks do pose some security risks because they are usually
being broadcast in public spaces. Wireless signal encryption offers some protection, but
wireless is still not as secure as Ethernet and other wired connections that are not
broadcast.
Page | 50
ASAD MALIK 2018-CE-123 LAB FILE
Page | 51
ASAD MALIK 2018-CE-123 LAB FILE
Page | 52
ASAD MALIK 2018-CE-123 LAB FILE
Switch off the laptop power button and after adding Linksys WPC300N switch On again
Page | 53
ASAD MALIK 2018-CE-123 LAB FILE
On Config Tab selecting port number 1, then selecting WEP (Key/ Passcode) for Securing
the wireless LAN
Now connect the laptop to the access point by selecting pc wireless option
Page | 54
ASAD MALIK 2018-CE-123 LAB FILE
Go into connect menu, selecting connect button also give WAP KEY.
Page | 55
ASAD MALIK 2018-CE-123 LAB FILE
Page | 56
ASAD MALIK 2018-CE-123 LAB FILE
SOLUTION:
MY TOPOLOGY:
Page | 57
ASAD MALIK 2018-CE-123 LAB FILE
Exercise Questions:
DHCP relay agent is any TCP/IP host which is used to forward request and replies
between DHCP server and client when the server is present on the different
network. Relay agents receive DHCP messages and then generate a new DHCP message
to send out on another INTERFACE.
Page | 58