You are on page 1of 13

NET201: Networking with Lab 2

Configuring Per-Interface Inter-VLAN Routing


Laboratory Exercise # 3

GRADE

Group No. : ____ Signature

Leader : SURNAME, First Name Middle Initial. ___________________


Members :
SURNAME, First Name Middle Initial. ___________________
SURNAME, First Name Middle Initial. ___________________

Date Performed : Day Month Year


Date Submitted : Day Month Year

Engr. Ricrey E. Marquez, CpE, MSCS


(Lab Instructor)
OBJECTIVES AND MATERIALS

Objectives:

After this laboratory, students should be able to:

1. build the network and configure basic device settings,


2. create VLANs and assign switch ports,
3. configure switches with VLANs and trunking, and
4. verify trunking, VLANs, routing, and connectivity

Materials:

QUANTITY PART DESCRIPTION


NUMBER
Working Personal Computer (PC)
1 - with Installed Cisco Packet Tracer
Software

Scenario:

Legacy inter-VLAN routing is seldom used in today’s networks; however, it


is helpful to configure and understand this type of routing before moving on to
router-on-a-stick (trunk-based) inter-VLAN routing or configuring Layer-3
switching. Also, you may encounter per-interface inter-VLAN routing in
organizations with very small networks. One of the benefits of legacy inter-VLAN
routing is ease of configuration.
In this lab, you will set up one router with two switches attached via the
router Gigabit Ethernet interfaces.
Two separate VLANs will be configured on the switches, and you will set
up routing between the VLANs.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated
Services Routers (ISRs) with Cisco IOS, Release 15.2(4)M3(universalk9 image).
The switches used are Cisco Catalyst 2960s with Cisco IOS, Release 15.0(2)
(lanbasek9 image).
PROCEDURES

Task 1. Build the Network and Configure Basic Device Settings.


1. Cable the network topology as shown in Figure 3.1 using Packet Tracer network
simulator software.
2. Initialize and reload the router and switch. Note: If configuration files were
previously saved on the router or switch, initialize and reload these devices back
to their default configurations (Reminders: Capture all the outputs since they
part of your data results).
3. Configure basic settings for CORE_RTR.
3.1. Console into CORE_RTR and enter global configuration mode.
3.2. Execute the basic configuration of the router such as:
a. Configure the host name (“CORE_RTR”) as shown in the topology,
b. Disable IP domain lookup,
c. Enable password encryption,
d. Provide enable password (“core”)
e. Include message of the day banner (“Unauthorized access is
strictly prohibited!”)
f. Provide a password for console 0 and virtual terminal type 0 to 4 during
login (“corertr”)
3.3. Configure IP addressing on G0/0 and G0/1 and enable both interfaces
(Refer to Table 3.1)
3.4. Copy the running configuration to the startup configuration.
4. Configure PC hosts (Refer to the addressing table (Table 3.1) for PC host
address information)
5. Issue a show ip interface brief command to verify the status of router
interfaces.

Task 2. Configure Switches with VLANs and Trunking


In task 2, you will configure the switches with VLANs and trunking.
1. Configure VLANs on ACCESS_SW1.
a) Enter global configuration mode and configure the switch host name
(“ACCESS_SW1”).
b) On ACCESS_SW1, create VLAN 10. Assign STUDENTS as the VLAN name.
c) Create VLAN 20. Assign FACULTY as the VLAN name.
d) Configure F0/1 as a trunk port.
e) Assign ports F0/5 and F0/6 to VLAN 10 and configure both F0/5 and F0/6 as
access ports.
f) Assign an IP address to VLAN 10 and enable it (refer to the addressing table
in Table 3.1)
g) Configure the default gateway according to the addressing table presented in
Table 3.1.
h) Enable password encryption,
i) Provide enable password (“sw1”)
j) Include message of the day banner (“Unauthorized access is strictly
prohibited!”), and
k) Provide a password for console 0 and virtual terminal type 0 to 4 during login
(“access”)
l) Copy the running configuration to the startup configuration.

2. Issue a show ip interface brief command to verify the status of the


switch interfaces.
3. Issue a show vlan brief command to verify the status of the switch VLANs.
4. Issue a show interfaces trunk command to verify the summary of switch
trunking protocols.

5. Configure VLANs on ACCESS_SW2.


a) Enter global configuration mode and configure the switch host name
(“ACCESS_SW2”).
b) On ACCESS_SW2, create VLAN 10. Assign STUDENTS as the VLAN name.
c) Create VLAN 20. Assign FACULTY as the VLAN name.
d) Configure F0/1 as a trunk port.
e) Assign ports F0/11 and F0/18 to VLAN 20 and configure both F0/11 and
F0/18 as access ports.
f) Assign an IP address to VLAN 10 and enable it (refer to the addressing table
in Table 3.1)
g) Configure the default gateway according to the addressing table presented in
Table 3.1.
h) Enable password encryption,
i) Provide enable password (“sw2”)
j) Include message of the day banner (“Unauthorized access is strictly
prohibited!”), and
k) Provide a password for console 0 and virtual terminal type 0 to 15 during
login (“access”)
l) Copy the running configuration to the startup configuration.

6. Issue a show ip interface brief command to verify the status of the


switch interfaces.
7. Issue a show vlan brief command to verify the status of the switch VLANs.
8. Issue a show interfaces trunk command to verify the summary of switch
trunking protocols.

Task 3. Verify Trunking, VLANs, Routing, and Connectivity


1. Enter the global configuration of the router to verify the routing table using show
ip route command.
What routes are listed on CORE_RTR?
________________________________________________________________
________________________________________________________________
________________________________________________________________

2. On both switches, issue the show interface trunk command. Is the F0/1 port on
both switches set to trunk (yes/no)? ______

3. Issue a show vlan brief command on both switches. Verify that VLANs 10
and 20 are active and that the proper ports on the switches are in the correct
VLANs.
Why is F0/1 not listed in any of the active VLANs?
________________________________________________________________
________________________________________________________________
4. Ping from PC-1 in VLAN 10 to PC-2 in VLAN 20. If Inter-VLAN routing is
functioning correctly, the pings between the 192.168.10.0 network and the
192.168.20.0 should be successful.

Note: It may be necessary to disable the PC firewall to ping between PCs.

5. Verify connectivity between devices. You should be able to ping between all
devices. Troubleshoot if you are not successful.

6. Save your Packet Tracer file as NET201 Lab 3 – Group#


NETWORK TOPOLOGY DIAGRAM

Figure 3.1. Per-interface Inter-VLAN environment network diagram


DATA RESULTS

Table 3.1. Summary of network device interface IP addresses


SUBNET DEFAULT
NETWORK DEVICE INTERFACE IP ADDRESS
ADDRESS GATEWAY
G0/0 192.168.20.1 255.255.255.0 NA
CORE_RTR
G0/1 192.168.10.1 255.255.255.0 NA
ACCESS_SW1 VLAN 10 192.168.10.11 255.255.255.0 192.168.10.1
ACCESS_SW2 VLAN 10 192.168.10.12 255.255.255.0 192.168.10.1
PC1 NIC 192.168.10.3 255.255.255.0 192.168.10.1
PC2 NIC 192.168.20.3 255.255.255.0 192.168.20.1

Task 1. Set Up the Topology and Initialize Devices (CLI commands, results, or
answers to some question)

Task 2. Configure Basic Device Settings and Verify Connectivity (CLI


commands, results, or answers to some question)

Task 3. Configure Basic Device Settings and Verify Connectivity (CLI


commands, results, or answers to some question)
DATA ANALYSIS / OBSERVATIONS

NOTE: Discussion must be based on the data gathered from data results or
observation supported by review of literature with proper reference or author in-
text citation in APA format. Do not copy-paste instead paraphrase it. Data
analysis must be minimum of 2 pages.
QUESTIONS AND ANSWERS

Questions:

1. What is an advantage and disadvantage of using legacy per-interface


Inter-VLAN routing?
2. Describe the difference of per-interface Inter-VLAN routing over trunk-
based Inter-VLAN routing. Which is better? Support your claims by
providing comparison and explanation.
3. What are different types of switch VLANs? Describe each type and site
an example where this VLANs used in networking.
4. Identify the different switchport mode in Cisco switch and discuss
each. Also, provide a CLI command to accomplish each mode.

Answers:
CONCLUSION

NOTE: Discussion must be based on the lab objectives supported by review of


literature with proper reference or author in-text citation in APA format. Do not
copy-paste instead paraphrase it. Discuss the implication of findings per
objective (per paragraph). Conclusion must be minimum of 2 pages.
REFERENCES

NOTE: Sample APA format for reference cited only!

Books:

Andreasen, N. C. (2001). Brave new brain: Conquering mental illness in the era
of the genome. Oxford, England: Oxford University Press.

Copstead, L., & Banasik, J. (2005). Pathophysiology (3rd ed.). Philadelphia, PA:
Saunders.

Electronic Books:

Atkin, M. (Reporter). (2008, November 13). Bermagui forest disputed turf. The
Hack Half Hour. Retrieved from http://www.abc.net.au/triplej/hack/notes/

Cooper, D. (2009, March 31). Native ant may stop toad in its tracks. ABC
Science. Retrieved August 15, 2017 from http://www.abc.net.au/science/articles/
2009/03/31/2530686.htm?site=science&topic=latest

Print Journals:

Potente, S., Anderson, C., & Karim, M. (2011). Environmental sun protection and
supportive policies and practices: An audit of outdoor recreational settings in
NSW coastal towns. Health Promotion Journal of Australia, 22, 97-101.

Electronic Journals:

Jackson, D., Firtko, A., & Edenborough, M. (2007). Personal resilience as a


strategy for surviving and thriving in the face of workplace adversity: A literature
review. Journal of Advanced Nursing, 60(1), 1-9. doi:10.1111/j.1365-
2648.2007.04412.x

You might also like