You are on page 1of 143

LEARNING MODULE

Prepared by:

MR. RUEL B. PAPIO

Professor

INTRODUCTION

Networks are everywhere—or so it seems. You can hardly do anything with data that
does not involve a network. Like the human networks that we are all part of, computer
networks let us share information and resources. In business, the reliance on networks
is even more pervasive than in homes or schools. Networks help individuals and

1
businesses alike save money, but they also help create income. Without a doubt,
networking within the home will catch on over the next few years as it has in business.
Soon, nearly all individuals in even moderately developed nations will have networked
components throughout their homes. Those that don’t will be netologically
disadvantaged because they will not be able to learn or to function at the same level as
those who are networked.

In this chapter, you’ll begin by relating networks to situations and concepts you already
know. Once you have a basic understanding of what networks are and what they can
do, it helps if you can actually begin working with them. In fact, it is so helpful to learn
the ropes of networking through hands-on guided practice that that’s what is planned for
you here. You will play the role of an employee in a fictional company, and you’ll have to
learn on the job. The more you become the person, the more you will learn about the
need for and operation of computer networks.

TABLE OF CONTENTS

Module Title Page

1 NETWORK POWER CYCLE DEVICES 4

2 STATIC IP/SUBNET ADDRESSING 48

2
3 CROSSOVER AND STRAIGHT-THROUGH CABLE 58

4 BUILDING DHCP SERVER 70

5 SWITCH TO SWITCH AND ROUTERS 80

6 WIRELESS ROUTER CONFIGURATIONS 98

7 BUILDING DNS AND WEB SERVER 127

8 BUILDING EMAIL AND FTP SERVER 139

Module 1: NETWORK POWER CYCLE DEVICES

A. Introduction:

Network standards improve the interoperability of different network-enabled devices and


provide backward compatibility between product revisions and differing vendors. Official
bodies that publish regulated standards are the International Telecommunication Union
(ITU), the American National Standards Institute (ANSI), and the Institute of Electrical
and Electronics Engineers (IEEE).

3
It would be impossible to build networks and connect network-enabled devices reliably
without network standards.

B. Objectives:

At the end of this module, the student should be able to:

1. be able to describe the common networking;


2. devices and their functionality;
3. including: Repeaters Hubs Switches Bridges Routers;

C. Learning Content:

● The active device and functionality

D. Pre-test:

1. What is a router? Write the internet function of the router in the network?
2. What do you think are the steps of configuration of a router?

E. Learning Activities:

Most basic of networks require devices to provide connectivity


and functionality. Understanding how these networking devices operate and
identifying the functions they perform are essential skills for any network
administrator and requirements for a Network+ candidate.

This module introduces commonly used networking devices, and, although


it is true that you are not likely to encounter all of the devices mentioned in
This module on the exam, you can be assured of working with at least some
of them.

Repeater

Physical View

4
Logical View

A repeater is a two-port device that repeats network signals. Repeaters are used when
network devices are some distance from each other. The repeater doesn't modify or
interpret data packets before it resends them, and it doesn't amplify the signal. Instead,
it regenerates the data packet at the original strength, bit by bit.

Bridge
Physical View

Logical View

A bridge divides a network into network segments and can filter and forward data
packets between these segments. Bridges use the network device's MAC address to
decide the data package's destination. Typically, a bridge is used to improve network
performance by reducing unnecessary network traffic on network segments.

Hub
Physical View

5
Logical View

A hub acts as a multiport repeater on a network. Hubs are used to connect more than
one device and structure the layout of a network. For example, you can cascade hubs
to create network branches or as an endpoint to create a star layout with multiple user
type devices. Hubs contain multiple ports that act as an input/output Ethernet
connection between the hub and a network device. A hub can operate at only one
speed, which is the speed of the slowest network device on the network. It doesn't
interpret or filter data packets and sends copies of each data packet to all attached
devices.

Types of hubs

● Fast Ethernet: This hub is used for 100-Mbps networks and comes as Class I
and Class II type hubs. The primary difference between the two is the amount of
delay in data transmission. A Class I hub introduces a signal delay of up to 140-
bit times. A Class II hub has a delay of up to 96-bit times. The delay allows for
the transcoding of data between different base types. Only two Class II hubs can
be used in a hub-based network. Class II hubs increase the likelihood of packet
collisions because of their higher speeds.
● Dual speed: With a traditional hub network, the speed of the network was
governed by the slowest network device attached. For example, if you had 10-
Mbps and 100-Mbps devices connected to a network, the speed of the whole
network was only 10 Mbps. Dual-speed hubs solve the problem by acting as a
bridge between the two different-speed devices.

Hubs are used for small ad-hoc networks of a few devices, but they're rarely used at an
enterprise level.

6
Switch
Physical View

Logical View

A switch combines the functionality of a bridge and a hub. It segments networks and
can interpret and filter packet data to send it directly to an attached network device.
Switches use the network device's MAC address to decide the data package's
destination. A switch operates in full-duplex mode, which means it can send and receive
data to and from network devices at the same time.

Router
Physical view

Logical View

Routers link networks with different ranged addresses together. They can interpret and
filter data packets, and then forward them to the correct network. Routers use the
network device's IP address information to route the data package to its destination.
Most routers can now detect issues with data traffic that flows to any attached network
and route or reroute it around the issue. A router is also called a gateway. When you
configure network devices, you'll usually configure it with a default gateway IP address.

7
Interconnectivity

Routers in an interconnected network maintain a routing table that lists the preferred
route between each of the networks. The router acts as the start of authority for all the
network devices on its network. Routing information is shared between routers by using
a routing protocol like the Border Gateway Protocol (BGP).

Types

The majority of routers use the BGP to share routing information. The type of
information shared depends on the usage of the router and the functions they use.

There are several distinct classifications or types of routers available to service different
network needs.

● Access routers: Typically used in a home or small satellite offices, these


routers tend to be low-cost devices with a simple routing need.
● Distribution routers: These routers compile traffic routing data from multiple
routers. Distribution routers come with more significant memory and processing
power. This type of router is designed to hold vast quantities of routing
information. It's often used to manage and control the quality of service across a
WAN.
● Edge routers: An edge router operates at the boundary between your network
and other networks, for example, your local network and the internet. They act as
gateways to filter traffic and route it internally or forward it based on the packet
header. An edge router often comes with access control or firewalls to improve
the security. It might also handle DHCP and DNS services.
● Core routers: Sometimes called enterprise routers, these routers are designed
for higher bandwidths. They're used to connect different buildings or geographic
locations together. Core routers tend to have fewer features than edge routers
because their primary focus is on minimizing packet loss and preventing
congestion. They tend to do packet forwarding to edge routers.

Wireless router
Physical View

8
Logical View

This network device provides all the routing capabilities of a regular access router, but it
also offers wireless access point functions. A wireless router or wireless access point is
designed to provide a non-wired connection to your network. Any provision to access
the internet or other networks is handled by an edge router associated with your
network. A wireless router lets you build a different type of network called a wireless
local area network.

A wireless router shouldn't be confused with a wireless modem. A wireless modem is


what you receive from your ISP for your home or office and is the device that converts
the signal from the ISP into one that's usable on a computer network. Wireless modems
are typically combined with routers to allow you to create a private home or office
network.

Cisco Packet Tracer Power Cycle Network Device

Cisco Routers

Cisco Switch

Cisco Connections

Cisco End Device

Cisco Wireless Device

9
Configuring PCs, Laptops, Tablet PCs, and PDAs

You can configure the global settings and interface settings on the PC, laptop, tablet
PC, and PDA end devices with the Config tab. Additionally, the Desktop tab provides
tools to configure IP settings, configure dial-up settings, use a terminal window, open a
host command line interface, open a web browser, configure Linksys wireless settings,
establish a VPN connection, generate PDUs, and issue SNMP requests.

Global Settings
In the global settings, you can change the Display Name of the end device. You may set
the end device to either automatically obtain IPv4 or IPv6 configurations with DHCP or
manually set the Gateway and DNS Server with Static. For IPv6, Auto Config will
automatically configure the Gateway and DNS Server IP addresses.

10
Algorithm Settings
In the Algorithm Settings, you can override the global Algorithm Settings by removing
the checkmark from Global Settings and then setting your own values for the Maximum
Number of Connections, Maximum Number of Opened Sessions, and Maximum
Retransmission Timeout in Milliseconds.

Interface Configuration
PCs and laptops support Ethernet (copper or fiber), modem, and wireless interfaces. On
the tablet PC and PDA, only the wireless interface is supported. In general, you can set
the interface Port Status, Bandwidth, Duplex, MAC Address, SSID, IP Address, Subnet
Mask, Link Local Address, and IPv6 Address. These options vary slightly for each
interface type.

IP Configuration Utility

11
On the Desktop tab, click the IP Configuration icon to bring up the configuration utility. If
the end device is connected to a DHCP configured router or server, you can use DHCP
to automatically obtain the IP configuration by clicking on the DHCP button. Otherwise,
you may use the Static button to manually set the IP configuration.

Modem Dial-up Utility


On the Desktop tab, click the Dial-up icon to bring up the Dial-up utility. Before you can
access the dial-up utility, the end device must have the modem interface installed. As a
result, only the PC and laptop devices are supported. You can establish a modem
connection by connecting a PC or laptop to a cloud that is connected to a router. The
cloud acts like a phone company between the PC or laptop and the router. Several
conditions must be met before the connection can be successful:

● The router has a modem, and you have established user name
authentication on the router (using the Cisco IOS global configuration mode
command username WORD password LINE).

12
● The modem ports on the cloud have valid phone numbers.
● You entered the correct user name, password, and number to dial on the
modem utility of the PC or laptop.

If all the requirements are met, click the Dial button to make the call. The status line (as
well as link lights) will tell you if the connection is successful. Note that you still must
configure all relevant IP settings manually if you want to ping between the router and
the PC or laptop. Use the Disconnect button to terminate the connection at any time.

Terminal Utility
If the end device is connected to a router or a switch by a console connection (using the
RS 232 port on the PC), use the Terminal application to gain access to the Command
Line Interface (CLI) of the device. In the Desktop tab, click the Terminal icon to bring up
this utility. Choose the appropriate port configuration parameters for the console
session, and then click on the OK button. The Terminal window appears with the CLI of
the device.

13
Command Prompt Utility

14
On the Desktop tab, click the Command Prompt button to bring up the command line
utility. At the prompt, you can issue the following commands:

● ?
● arp
● delete
● dir
● ftp
● help
● ipconfig
● netstat
● nslookup
● ping
● snmpget
● snmpgetbulk
● snmpset
● ssh
● telnet
● tracert

15
Web Browser Utility
On the Desktop tab, click the Web Browser button to bring up the web browser. The
web browser allows you to access a web server or the Linksys Web Configuration
interface. If the end device is directly or indirectly connected to a server with HTTP
service enabled, you can type in the IP address of the server to access the website on
the server. If the end device is connected to a properly configured DNS server, covered
in another help topic, you can type in the domain name of the server. If the end device
is connected to a Linksys WRT300N wireless router, you can type in the IP address of
the Linksys WRT300N wireless router to access the Linksys Web Configuration. A
prompt will appear asking for user name and password. The default is admin for both
user name and password.

16
PC Wireless Utility
On the Desktop tab, click the PC Wireless button to bring up the wireless client
software. Note that the Linksys-WMP300N wireless hardware module is required for
access so only PCs and laptops are supported. In the Linksys wireless client software,
you can check Link Information to view wireless network status and statistics, Connect
to any available Linksys wireless networks within range, and add/edit/delete Profiles to
connect to wireless routers not broadcasting their SSID.

17
VPN Utility
On the Desktop tab, click the VPN button to bring up the VPN client utility that allows
you to create a VPN connection to a VPN server. To create a VPN connection, enter the
GroupName, Group Key, Host IP (Server IP), Username, Password, and then click
on the Connect button. To disconnect the VPN connection, click on the Disconnect
button.

18
Traffic Generator Utility
The Traffic Generator utility is similar in functionality to the Add Simple PDU and Add
Complex PDU tool in the Common Tools Bar, but with some key differences. First of
all, when you load a save file, packets are not sent automatically by a Traffic Generator.
The Traffic Generator utility must be open to generate traffic, although it can be
minimized. Another key difference is that the Traffic Generator is unable to send
multiple PDUs simultaneously.
Visually, the Traffic Generator is similar to the Add Complex PDU dialog with some
exceptions. Instead of a One Shot parameter, the Traffic Generator has a Single Shot
option. There is no field to enter a time value to send the PDU as the PDU will be sent
the moment you click on the Send button. With the Periodic option, when you click on
the Send button, the Send button will become a Stop button and the dialog will become
gray. The Traffic Generator will then send a PDU at the interval that you entered. If you
want to stop sending PDUs, click on the Stop button or close the utility.

19
PDUs generated by the Traffic Generator are not added to the User Created PDU Window. As
such, if you want to see if the PDUs failed or were successful, you will need to view the PDU's
status in Simulation Mode.

MIB Browser Utility


On the Desktop tab, click the MIB Browser button to issue SNMP requests. This
allows you to retrieve router and switch data or make changes to the devices. To set up
the MIB Browser for SNMP requests, click on the Advanced button and set the
Address, Port, Read Community, and Write Community that is configured on the
router or switch. Then, select the desired SNMP Version and click the OK button. The
next step is to browse through the SNMP MIB tree and select the desired object
instance (OID) for the router or switch. If you want to retrieve data, set Operations to
either Get or Get Bulk and then click on the Go button. The data for the OID will be
shown in the Result Table. If you want to change a writable OID, select Set in the
Operations menu to reveal the SNMP Set dialog. In the SNMP Set dialog, select the
appropriate Data Type for the OID, enter a Value, and then click the OK button. Finally,
click on the Go button in the main MIB Browser dialog to set the OID value.

20
Cisco IP Communicator Utility
On the Desktop tab, click the Cisco IP Communicator button to place or answer a
call. To place a phone call, enter the number of the recipient phone using the keypad
and then click the Dial button. Alternatively, you may click the NewCall button or
Speakerphone button first and then enter the recipient's number. If you accidently enter
an incorrect number, you may click the Cancel button to clear. Once the call has been
placed, a message will indicate that the phone is ringing on the recipient's phone. To
answer a call with the Cisco IP Communicator, click the Answer button. Once the
recipient has answered the call, the status message will indicate that the Cisco IP
Communicator is connected and a green light will show. While the call is still active,
click on the Do, Re, or Mi buttons to send the respective sounds to the recipient. A
message stating that the sound is playing will be displayed in case sound is disabled.
To end the call, click the EndCall button. For the best possible experience while making
calls, be sure that Sound is enabled in Preferences.
If you want configure the Cisco IP Communicator to use a different TFTP server from
the default TFTP server, follow these steps. On the upper right-hand corner of the Cisco
IP Communicator GUI, there are four buttons above the words "Cisco IP Phone." Click
on the first button from the left to open a context menu and then select Preferences.

21
Select the option Use these TFTP Servers: and then enter the IP address of the TFTP
server that you wish to use.

Email Utility
On the Desktop tab, click the Email button to bring up the email client. On the first
launch of the email client, you will need to configure the parameters Your Name, Email
Address, Incoming Mail Server, Outgoing Mail Server, User Name, and Password
in order to send and receive email. Once the email client has been configured, you may
Compose, Receive, view, and Delete emails. If you need to change configuration, click
on the Configure Mail button to open the email configuration dialog.

22
PPPoE Dialer Utility
On the Desktop tab, click the PPPoE Dialer button to bring up the PPPoE Dialer utility.
This utility allows you to establish a point-to-point connection to a PPPoE server. To
establish a PPPoE connection, enter the User Name and Password and then click on
the Connect button. To disconnect the PPPoE connection, click on the Disconnect
button.

23
Text Editor Utility
On the Desktop tab, click the Text Editor icon to bring up the text editor. You can
create New text files, Open existing text files, and Save text files through the File menu
in the text editor. There are no formatting choices available in the text editor.

24
Configuring Servers

The Config tab offers three general levels of configuration: global, services, and
interface. To configure at the global level, click the GLOBAL button to expand the
Settings button (if it has not already been expanded). To configure services, click the
SERVICES button to expand the list of services, and then choose the service. To
configure an interface, click the INTERFACE button to expand the interface, and then
choose the interface. Additionally, the Desktop tab provides tools to configure IP
settings, open a host command line interface, and generate PDUs.

25
Global Settings
In the global settings, you can change the Display Name of the server. You may set the
server to either automatically obtain IPv4 or IPv6 configurations by selecting the DHCP
button or manually set the Gateway and DNS Server using the Static button. For IPv6,
Auto Config will automatically configure the Gateway and DNS Server IP addresses
and Static allows the data to be manually supplied.

Algorithm Settings
In the Algorithm Settings, you can override the global Algorithm Settings by removing
the checkmark from Global Settings and then setting your own values for the
Maximum Number of Connections, Maximum Number of Opened Sessions, and
Maximum Retransmission Timeout in Milliseconds.

HTTP Service Configuration

26
In the HTTP service configuration, you can edit the included HTML pages such as
index.html, helloworld.html, and image.html using the following supported HTML
tags:

● a
● address
● b
● big
● blockquote
● body
● br
● center
● cite
● code
● dd
● dfn
● div
● dl
● dt
● em
● font
● h1
● h2
● h3

● h4
● h5
● h6
● head
● hr
● html
● i
● img
● kbd
● meta
● li
● nobr
● ol
● p
● pre
● qt
● s

27
● samp
● small
● span
● strong
● sub
● sup
● table
● tbody
● td
● tfoot
● th
● thead
● title
● tr
● tt
● u
● ul
● var

Additionally, you can also add or remove HTML files from the server. When a PC
accesses an HTML page on the server using the Web Browser, the HTML page will
load in the Web Browser.

28
DHCP Service Configuration
In the DHCP service configuration, you can set up a DHCP server with many different
IP address pools. To add a DHCP pool, enter the Pool Name, Default Gateway, DNS
Server address, Starting IP address to lease, Subnet Mask, and the Maximum
number of Users, then click Add. If you want to make changes to an existing DHCP
pool, select the pool from the list and edit the fields you want to make changes to, and
then click Save. If you want to remove a DHCP IP address pool from the server, select
the pool from the list and click Remove.

The default DHCP pool serverPool cannot be modified or edited.

TFTP Service Configuration


In the TFTP service configuration, there are no parameters to set. The TFTP service
contains a selection of IOS images that can be used to flash routers and switches. If
you want to remove an IOS image from the server, select the IOS image from the list
and click Remove.

29
DNS Service Configuration
In the DNS service configuration, you can set up a DNS server to translate domain
names with different types of resource records, which are basic data elements in the
Domain Name System. Packet Tracer currently supports four different types of resource
records: Address (A), Canonical Name (CNAME), SOA (Start of Authority), and NS
(Name Server). An Address (A) record is the most common type of resource record
where its core functionality is to map a hostname to an IPv4 address. A CNAME record
is used to specify that a domain name is an alias of another, canonical domain name.
An SOA record is used to specify authoritative information about a DNS zone, including
the primary name server, the email of the domain administrator, and several timers
relating to refreshing the zone. An NS record is used to delegate a DNS zone to use a
given authoritative name server.
To add a resource record, enter the Name of the resource record, select a Type of
resource record, and then enter all required fields pertaining to the resource record such
as Address for A Record, Host Name for CNAME, or Server Name for NS Record and
then click Add. To modify an existing resource record, select the resource record from

30
the list, edit the fields you want to change, and then click Save when you are done. If
you want to remove a resource record, just select the resource record from the list and
click Remove.

When you click on the DNS Cache button, you can view all of the queries cached by the
DNS server. The cached queries will be retained on the DNS server for a period of time
(TTL) set on the record stored on the SOA DNS server.

31
SYSLOG Service Configuration
In the SYSLOG service configuration, there are no parameters to set. The SYSLOG
service logs messages from routers and switches in the network. For each entry, the
Time, HostName, and the actual Message are logged in the server.

32
AAA Service Configuration
In the AAA service configuration, you can set up the server to be a RADIUS or
TACACS server. To add a RADIUS or TACACS server, enter the Client Name, Client
IP, Secret key, select either Radius or Tacacs as the Type of AAA server, and then
click on the + button. To remove a AAA server, select the AAA server entry in the list
and click on the - button. In addition to configuring the AAA server, you also need to add
authorized users. To add authorized users, enter the UserName and Password for the
user and click on the + button. If you want to remove a user, select the user from the list
and click on the - button.

33
NTP Service Configuration
In the NTP service configuration, you can set up the server to be an NTP server so that
the date and time on the configured routers and switches are synchronized. By default,
the date and time on the server is synchronized with your local machine. If you wish,
you can manually set the time and date by selecting the date on the calendar display
and incrementing or decrementing the time display. You can also set up
Authentication by clicking on Enable and then entering a Key and Password.

34
Email Service Configuration
In the Email service configuration, you can set up the server to use the SMTP and/or
POP3 protocol(s). To configure an email server, first enter a Domain Name and then
click the Set button. Next, enter a User name and Password then click the Add button
to create an email account. To change a password on an email account, select the
desired email account from the list and click Change Password button. A dialog will
appear allowing you to enter the new password. To delete an email account, select the
desired email account from the list and click the Delete button.

35
FTP Service Configuration
In the FTP service configuration, you can add and remove FTP accounts, modify FTP
account permissions, and remove files from the FTP service. To add an FTP account,
enter a UserName and Password. Then, select which permissions you would like the
user to have such as Write, Read, Delete, Rename, and List. Finally, click the Add
button to create the FTP account. To remove an FTP account, select the desired FTP
account from the list and click on the Delete button. If you want to remove files from the
FTP service, select the desired file from the file list and click on the Remove button.

36
Interface Configuration
Servers can support two interfaces. You can choose from Ethernet (copper or fiber),
modem, or wireless interfaces. In general, you can set the Port Status, Bandwidth,
Duplex, MAC Address, IP Address, Subnet Mask, Link Local Address, and IPv6
Address. These options vary slightly for each interface type.

IP Configuration Utility
On the Desktop tab, click the IP Configuration icon to bring up the configuration utility.
If the end device is connected to a DHCP configured router or server, you can use
DHCP to automatically obtain the IP configuration by clicking on the DHCP button.
Otherwise, you may use the Static button to manually set the IP configuration.

Command Prompt Utility


On the Desktop tab, click the Command Prompt button to bring up the command line
utility. At the command prompt, you can issue the following commands:

37
● ?
● arp
● delete
● dir
● ftp
● help
● ipconfig
● ipv6config
● netstat
● nslookup
● ping
● snmpget
● snmpgetbulk
● snmpset
● ssh
● telnet
● tracert

Traffic Generator Utility


The Traffic Generator utility is similar in functionality to the Add Simple PDU and Add
Complex PDU tool in the Common Tools Bar, but with some key differences. The
Traffic Generator utility is explained in detail in Configuring PCs, Laptops, Tablet PCs,
and PDAs.

Text Editor Utility


On the Desktop tab, click the Text Editor icon to bring up the text editor. You can
create New text files, Open existing text files, and Save text files through the File menu
in the text editor. There are no formatting choices available in the text editor.

Web Browser Utility


On the Desktop tab, click the Web Browser button to bring up the web browser. The
web browser allows you to access a web server or the Linksys Web Configuration
interface. If the end device is directly or indirectly connected to a server with HTTP
service enabled, you can type in the IP address of the server to access the website on
the server. If the end device is connected to a properly configured DNS server, covered
in another help topic, you can type in the domain name of the server. If the end device
is connected to a Linksys WRT300N wireless router, you can type in the IP address of
the Linksys WRT300N wireless router to access the Linksys Web Configuration. A
prompt will appear asking for user name and password. The default is admin for both
user name and password.

38
PPPoE Dialer Utility
On the Desktop tab, click the PPPoE Dialer button to bring up the PPPoE Dialer utility.
This utility allows you to establish a point-to-point connection to a PPPoE server. To
establish a PPPoE connection, enter the User Name and Password and then click on
the Connect button. To disconnect the PPPoE connection, click on the Disconnect
button.

VPN Utility
On the Desktop tab, click the VPN button to bring up the VPN client utility that allows
you to create a VPN connection to a VPN server. To create a VPN connection, enter the
GroupName, Group Key, Host IP (Server IP), Username, Password, and then click
on the Connect button. To disconnect the VPN connection, click on the Disconnect
button.

Connections / Links

Packet Tracer supports a wide range of network connections. Each cable type can only
be connected to certain interface types.

Cable Type Description


Console connections can be made between PCs and routers or
Console switches. Certain conditions must be met for the console session
from the PC to work: the speed on both sides of the connection
must be the same, the data bits must be 7 for both or 8 for both, the
parity must be the same, the stop bits must be 1 or 2 (but they do
not have to be the same), and the flow control can be anything for
either side.
This cable type is the standard Ethernet media for connecting
Copper between devices that operate at different OSI layers (such as hub
Straight-through to router, switch to PC, and router to hub). It can be connected to
the following port types: 10 Mbps Copper (Ethernet), 100 Mbps
Copper (Fast Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).
This cable type is the Ethernet media for connecting between
Copper devices that operate at the same OSI layer (such as hub to hub, PC
Cross-over to PC, PC to printer). It can be connected to the following port
types: 10 Mbps Copper (Ethernet), 100 Mbps Copper (Fast
Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).

39
Fiber media is used to make connections between fiber ports (100
Fiber Mbps or 1000 Mbps).
Phone line connections can only be made between devices with
Phone modem ports. The standard application for modem connections is
an end device (such as a PC) dialing into a network cloud.
Coaxial media is used to make connections between coaxial ports
Coaxial such as a cable modem connected to a Packet Tracer Cloud.

Serial connections, often used for WAN links, must be connected


Serial between serial ports. Note that you must enable clocking on the
DCE and DTE DCE side to bring up the line protocol. The DTE clocking is optional.
You can tell which end of the connection is the DCE side by the
small “clock” icon next to the port. If you choose the Serial DCE
connection type and then connect two devices, the first device will
be the DCE side and the second device will be automatically set to
the DTE side. The reverse is true if you choose the Serial DTE
connection type.
The 8-port asynchronous cable provides the high-density connector
Octal on one end and eight RJ-45 plugs on the other.

Devices and Modules


Packet Tracer supports a wide array of modules for networking devices. To change a module in
any device, you must first turn off the power for that device. There is a power switch available
on the Physical page of any device that can change modules. If the module slot is filled you must
drag the existing module out of the device and over to the modules list and then release it. If you
are not in the correct place the module will return to the slot. After removing the original module
select and drag the new module from the list of modules to directly over the open slot. When the
module appears in the open slot, turn the power back on. Note, when you turn off switches or
routers and then turn them back on, they will load their startup configuration files. If you do not
save the running configuration, it will be lost.

When the network contains routers or switches, develop a habit of saving their running
configurations to the startup configuration before you press their power buttons (or the Power
Cycle Devices button).

Physical Configuration and Module List


When you click on a device in the workspace, you are first presented with the Physical Device
View of the selected device. You will see an interactive photo on the main panel and a list of

40
compatible modules on the left. You can interact with the device by pressing its power button,
adding a module by dragging it from the list into a compatible bay, or removing a module by
dragging it from the bay back to the list. You can also zoom in and out of the photo with the
zoom controls. The pages in this section show all of the Packet Tracer devices and their
supported modules. On these pages, you can click on the thumbnail image of each device or
module to view a larger image.

Configuring Other Devices

The configuration options for all other devices are relatively simple. In general, you can
change their display names in their global settings sub-panel and make changes to
basic settings on each interface.

Bridges

41
A bridge is basically a simplified two-port switch. It does not have VLAN or trunking
functions. The available settings for its two Ethernet ports are Port Status, Bandwidth,
and Duplex.

Repeaters
A repeater is a simple two-port device that regenerates the signal it receives on one port
and forwards it out the other port. Its port settings cannot be modified.

Hubs
A hub is a multiport repeater that regenerates the signal it receives on one port and
forwards it out all other ports except the incoming port. Its port settings cannot be
modified.

Access Points
An access point is modeled as a repeater with one wireless port and one Ethernet port.
In the settings for the wireless port, you can toggle the Port Status, set the SSID,
Channel, and Authentication. You may set the authentication to WEP, WPA-PSK, or
WPA2-PSK. For WEP, you need to set the Key to a 10-digit hexadecimal value. For
WPA-PSK and WPA2-PSK, the PassPhrase needs to be 8-63 ASCII characters long
and the Encryption Type can be set to AES or TKIP. The available settings for an
access point's Ethernet port are Port Status, Bandwidth, and Duplex.

Wireless End Device


The wireless end device has the same configuration options as a wireless PC excluding
the Desktop tab utilities. However, the Wireless End Device has a GUI tab which
includes an IP Config and Traffic Generator utility that works equivalently to the PC's
Desktop variant. The Wireless End Device also has an HTML tab that allows you to
manually edit the GUI tab using HTML and it also allows you to optionally lock the
HTML with a password.

Wired End Device


The wired end device features the same configuration options as the wireless end
device except that it has a FastEthernet interface.

Basic and common CLI command of Cisco router and switch using packet tracer.

CLI - Command Line Interface


--- System Configuration Dialog ---

42
Continue with configuration dialog? [yes/no]: no

> - user only and read only access mode in the router and switch information.
# - full admin access to the router and switch.
>enable
#show version
#show running-config
#show VLAN
press q - to quit the current task.

Other CLI command will be available on the other module to practice and learn all CLI
commands on router and switch.

Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.

F. Assessment
Multiple choice: 5 points each. Answer in google form link here: bit.ly/3nmfh0A

1. You are the new IT admin, and you need to find the network configuration. What
should you use?
a. ipconfig
b. netchange
c. cmd
d. newnet

2. Data is converted into light and transferred at high speeds.


a. Fibre Optic Cable
b. modem
c. hub
d. router

3. A device used in a wired network that connects multiple computers and devices to
share data.
a. hub
b. router

43
c. modem
d. Server

4. What is the primary purpose of a hub?


a. A hub allows one Ethernet network device to send data packets to a specific
Ethernet device.
b. A hub allows the connection of multiple Ethernet devices to make them act as
a single network segment.
c. A hub allows multiple Ethernet network devices access to the internet.
d. A hub is an endpoint to access the web server.

5. What is the principal difference between hub routing and switch routing?
a. Hub routing sends all packets to all connected devices. Switch routing sends
packets to specific devices.
b. Hub routing sends packets to specific locations. Switch routing is only used to
route traffic between switches.
c. Hub routing sends all packets to all connected devices. Switch routing is only
used to route traffic between switches.
d. Hub is a type of switching mechanism of a packets to router.

G. Reference

https://managementmania.com/en/active-networking-hardware
https://blog.netwrix.com/2019/01/08/network-devices-explained/
https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-
gateways/

44
Module 2 - STATIC IP/Subnet Addressing

A. Introduction:
In essence it forms the Internet. It uses a logical addressing system and performs
routing, which is the forwarding of packets from a source.

B. Objectives:

At the end of this module, the student should be able to:


1. create and configure ipv4 addresses:
2. understand and resolve IP addressing crises;
3. use IP unnumbered;

C. Learning Content:
● Presenting the IPv4

D. Pre-test:
1. What is the purpose of IPv4?
2. What is IPv4 and how does it work?

E. Learning Activities:

IPv4

Internet Protocol version 4 was released in 1983 and is the standard for all packet-
switch-based networks in use today. IPv4 uses a 32-bit address space that gives an
upper limit of 4,294,967,296 (4.3 billion) unique logical IP addresses. A large number of
these available IP addresses are reserved for a specific purpose, for example, private
networks, local hosts, internet relays, documentation, and subnets.

Structure of an IPv4 address

The structure of an IPv4 address is four decimal numbers in the range of 0 to 255, each
separated with a dot. It's also known as the dotted-decimal format (octet). An example
of an IP address is 192.168.0.1.

Parts of an IPv4 address

There are two parts to an IP address, the network and the host. Let's use the address
192.168.0.1 as an example.

45
The network part of an IP address covers the first set of decimal numbers. In the
example, that's 192.168.0. This number is unique to the network and specifies the class
of the network. There are a number of network classes available, described next.

The host part of the IP address covers the next set of decimal numbers. In the example,
that's 1. This number represents the device and has to be unique within the network to
avoid address conflicts. Each device on a network segment must have a unique
address.

IPv4 address classes

The Internet Protocol's local address space is split into five logical classes or ranges of
IP addresses, each represented by a letter of the alphabet.

Class Start End Number IP Total IP Subnet Mask


Address Address of Addres Address
Network s per available
s network

A 0.0.0.0 127.255.2 128 16,777,2 2,147,483,6 255.0.0.0


55.255 16 48

B 128.0.0.0 191.255.2 16,384 65,536 1,073,741,8 255.255.0.0


55.255 24

C 192.0.0.0 223.255.2 2,097,15 256 536,870,912 255.255.255.0


55.255 2

D 224.0.0.0 239.255.2 - - 268,435,456 -


55.255

E 240.0.0.0 255.255.2 - - 268,435,456 -


55.255

For classes A, B, and C, the start and end IP addresses are reserved and shouldn't be
used. Class D is reserved for multicast traffic only. Class E is reserved and can't be
used on public networks, like the internet.

In the previous table, the last column is marked as a subnet mask. The subnet mask
uses the same format of the IP address. But its purpose is to identify valid IP addresses
in an IP range.

For example, assume you have an IP address range that starts at 192.168.0.1, and you
have a subnet of 255.255.255.0.You'll apply the subnet mask in the following way. For
each address segment value specified as 255 in the mask, the corresponding address
segment is static. When you want to pick an IP address, you have to pick an address
that matches 192.168.0. Where the segment has a value of 0, you're allowed to use any

46
value between 0 to 255. A subnet mask of 255.255.255.0 gives an IP address range of
192.168.0.0 to 192.168.0.255, which are valid values to select.

Experiment - 2

Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.

Aim: Study of network IP

• Classification of IP address

• Subnetting

Apparatus (Software): Cisco Packet Tracer

Procedure: Following is required to be study under this practical. • Classification of IP


address

As show in figure we teach how the ip addresses are classified and when they are used.

Aim: Connect the computers in Local Area Network.

Procedure: On the host computer

On the host computer, follow these steps to share the Internet connection:

1. Log on to the host computer as Administrator or as Owner.

2. Click Start, and then click Control Panel. 3. Click Network and Internet Connections.
4. Click Network Connections. 5. Right-click the connection that you use to connect to
the Internet. For example, if you

connect to the Internet by using a modem, right-click the connection that you want
under Dial-up

/ other network available.

47
6. Click Properties. 7. Click the Advanced tab.

8. Under Internet Connection Sharing, select the Allow other network users to connect

through this computer's Internet connection check box.

9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection

whenever a computer on my network attempts to access the Internet check box if you

want to permit your computer to automatically connect to the Internet.

10. Click OK. You receive the following message:

When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address

192.168.0. 1. Your computer may lose connectivity with other computers on your
network. If

these other computers have static IP addresses, it is a good idea to set them to obtain
their IP

addresses automatically. Are you sure you want to enable Internet Connection Sharing?

11. Click Yes. The connection to the Internet is shared to other computers on the local
area network (LAN).

The network adapter that is connected to the LAN is configured with a static IP address
of

192.168.0. 1 and a subnet mask of 255.255.255.0

On the client computer

To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IP

configuration, and then configure the client computer. To confirm the LAN adapter IP

configuration, follow these steps:

1. Log on to the client computer as Administrator or as Owner.

48
2. Click Start, and then click Control Panel.

3. Click Network and Internet Connections.

4. Click Network Connections.

5. Right-click Local Area Connection and then click Properties.

6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list, and then click Properties.

7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.

Note: You can also assign a unique static IP address in the range of 192.168.0.2 to

254. For example, you can assign the following static IP address, subnet mask, and
default gateway:

8. IP Address 192.168.31.202

9. Subnet mask 255.255.255.0

10. Default gateway 192.168.31.1

11. In the Local Area Connection Properties dialog box, click OK. 12. Quit Control
Panel.

Aim: Study of basic network command and Network configuration commands.

Apparatus (Software): Command Prompt And Packet Tracer.

Procedure: To do this EXPERIMENT- follows these steps:

In this EXPERIMENT- students have to understand basic networking commands e.g


ping, tracert etc.

All commands related to Network configuration which includes how to switch to privilege
mode

49
and normal mode and how to configure router interface and how to save this
configuration to flash memory or permanent memory.

This commands includes

• Configuring the Router commands

• General Commands to configure network

• Privileged Mode commands of a router • Router Processes & Statistics

• IP Commands

• Other IP Commands e.g. show ip route etc.

ping:

ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you

get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a
machine

is alive. If there is no response, you know something is wrong.

50
Traceroute: Tracert is a command which can show you the path a packet of information
takes from your computer to one you specify. It will list all the routers it passes through
until it reaches its destination, or fails to and is discarded. In addition to this, it will tell
you how long each 'hop' from router to router takes.

nslookup: Displays information from Domain Name System (DNS) name servers.
NOTE :If you write the command as above it shows as default your pc's server name
firstly.

pathping: A better version of tracert that gives you statics about packet lost and
latency.

51
Let's draw in your short coupon bond draw and write and give further details IP address
and Subnet Address and Gateway in every computer when connecting the two
computers in 1 switch give example using straight-through and cross-over. Please label
it either straight-through or cross-over.

It will give me a clue if you have knowledge or idea of the logical topology of straight-
through or cross-over. Send me a selfie photo of your finished drawing product send to
my fb accounts and email tatayphinks@gmail.com.

F. Assessment:

Multiple choice: 5 points each. Answer in google form link here: bit.ly/3lteybp

1. What is the native protocol of the Internet, which is required for Internet connectivity?

A. Transmission Control Protocol/Internet Protocol (TCP/IP)


B. User Datagram Protocol (UDP)
C. Dynamic Host Configuration Protocol (DHCP)
D. Internet Protocol version 6 (IPv6)

2. Which network service provides automatic assignment of IP addresses to clients that


have been configured to do so?

A. Dynamic Host Configuration Protocol (DHCP)


B. Transmission Control Protocol (TCP)
C. User Datagram Protocol (UDP)
D. Classless inter-domain routing (CIDR)

52
3. What term refers to addresses that organizations use for nodes requiring IP
connectivity within enterprise networks, but do not require external connections to the
global Internet?

A. Private addresses
B. Public address
C. Dynamic Host Configuration Protocol (DHCP) addresses
D. Dynamic addresses

4. What is the primary purpose of a Domain Name System (DNS) server?

A. Translating names into numeric IP addresses


B. Providing automatic assignment of IP addresses and other (TCP/IP) config.
C. Encrypting traffic between clients on different network subnets
D. Serving as a default gateway for computers on a local network

5. What term refers specifically to an IP address that has been manually configured on
a device by a network technician?

A. A static address
B. A dynamic address
C. A public address
D. A network address

G. Reference:

https://bluecatnetworks.com/glossary/what-is-ipv4/

https://docs.oracle.com/cd/E19683-01/806-4075/ipref-1/index.html

https://computernetworking747640215.wordpress.com/2019/11/12/switch-port-security/

MODULE 3: Crossover and Straight-through cable

A. Introduction:

53
The most common form of network cable is called “unshielded twisted pair” (UTP). This
cable format is used for the Ethernet wiring standards, which are managed by the
Institute of Electrical and Electronics Engineers (IEEE). These wiring standards are
referred to by the code 802.3. The Ethernet standards are open to anyone to read and
they include specifications of cable configurations and the types of connectors used to
plug cables into devices. What we conventionally know as a network cable is an 802.3
specified cable for Ethernet networks.

B. Objectives:

1. Network creation, maintenance, and administration is a very satisfying career


path;
2. Technical field and you will encounter a lot of academic and theoretical
information on the topic;
3. Becoming more proficient in cable networking theory and practice you will
contribute more to the economy and help the world thrive;
4. Your starting point is knowing how to crimp a connector onto the end of a
network cable;

C. Learning Content:

● A simulation software named Cisco Packet Tracer for students that will do the
virtual learning.
● Practice the straight through and crossover connections in packet tracer.

D. Pre-test:

1. What is the difference between a straight through and crossover cable?


2. Do I need a straight through or crossover cable?

E. Learning Activities:

Straight through, crossover, and rollover cable differences

The distinction between a straight through, crossover, and rollover cable comes down to
the way that the connectors on each end are wired. A UTP cable contains eight wires.
Each individual wire is covered in a colored wire plastic coating and the entire bundle is
encased in an outer shell.

In the twisted pair configuration, the eight wires within the cable are split up into four
pairs. The two wires in a pair are twisted around each other. This treatment protects
both wires from interference. The pairing is easy to spot because one of the two is
encased in a coating of solid color while the other is white with a spiral stripe in the
pair’s color. This pair’s colors are:

● Green
● Orange
● Blue

54
● Brown

Cable connectors

The conventional name for the connectors on the ends of Ethernet cables is RJ-45. This
is not the proper name however, as the RJ-45 is a discontinued format of telephone
wire connector. The proper name for these connectors, according to the 802.3 wiring
standards is “8P8C“, which stands for “eight positions, eight connectors.” However,
don’t make a fuss if you hear a network technician call the connector an RJ-45. This is
the way everyone names these plugs and if you make a big thing about it, you’ll be
sitting by yourself in the break room at lunchtime.

There is a standard sequence for those colored wires in an 8P8C connector. It is not
entirely logical. The order is as follows:

● Pin 1: Orange stripe


● Pin 2: Orange solid
● Pin 3: Green stripe
● Pin 4: Blue solid
● Pin 5: Blue stripe
● Pin 6: Green solid
● Pin 7: Brown stripe
● Pin 8: Brown solid

It doesn’t really make sense that all of the pairs go into the connector next to each other
except for the green pair and there is no real reason why the blue stripe/solid order is
reversed. However, this is the wiring standard and you have to follow it because the
socket the connector plugs into is wired internally to accept the signals carried by the
color-coded wires in this specific order.

The connector layout listed above is specified in the standard EIA-568B.This was
defined by the Electronic Industries Alliance, hence the “EIA.” The standard is now
managed by the Telecommunications Industry Association, so the pinout is also
referred to as TIA-568B. The American National Standards Institute also recognizes the
standard and so you will see it called ANSI-568B. The layout of the connector in the
EIA-568B standard is illustrated below.

55
The main wiring standard for Ethernet cable connectors is actually EIA-568A – the EIA-
568B layout was made available as an acceptable alternative. However, the B version
has been implemented within the industry as the main standard. The EIA-568A
standard has a slightly different layout:

● Pin 1: Green stripe


● Pin 2: Green solid
● Pin 3: Orange stripe
● Pin 4: Blue solid
● Pin 5: Blue stripe
● Pin 6: Orange solid
● Pin 7: Brown stripe
● Pin 8: Brown solid

An illustration of the EIA-568A pinout is shown below.

It doesn’t matter which of these standards you use just as long as you are consistent
when crimping connectors onto both ends of a cable.

Cable wire purposes

56
Why does an Ethernet cable have eight wires in it? Does it matter which color goes
where in a connector? The answers to these two questions are surprising.

First of all, the UTP cable that is always used for Ethernet networks doesn’t need to
contain eight wires. However, this is the convention. The blue pair and the brown pair
don’t do anything.

The wires within the colored jackets are all identical. If you strip the casing of the blue-
striped wire, it looks exactly the same as the orange solid wire when that is stripped.
The fact that there are two different sets of guidelines for wiring an RJ-45 could lead to
chaos. However, it really doesn’t matter which order you put the wires in, just as long as
you put the same color in pin 1 in the connectors at either end and the same color in pin
2 and so on.

DTEs and DCEs

The socket that the RJ-45 fits into is soldered onto a network card. Every piece of
equipment that can connect to a cabled network has to have a network card, which is
also known as a network interface controller, or NIC. There are actually two types of
devices that connect to a network: DTEs and DCEs. DTE stands for “data terminal
equipment.” This refers to your computer. A DCE is “data circuit -terminating
equipment.” This means any network device, such as a modem, a router, or a switch.

The distinction between DTEs and DCEs is important when you want to work out
whether to use a straight through cable, or a crossover cable.

Connector pin purposes

The important factor to remember when wiring RJ-45 plugs is the function of each pin.
The following list shows the purpose of each connector within the 8P8C plug that fits
into the DTE:

● Pin 1: Transmit positive signal


● Pin 2: Transmit negative signal
● Pin 3: Receive positive signal
● Pin 4: Nothing
● Pin 5: Nothing
● Pin 6: Receive negative signal
● Pin 7: Nothing
● Pin 8: Nothing

The connections within the socket on either side have to correspond with each other.
There is no point in a DTE transmitting data down pins 1 and 2 if the DCE on the other
end also regards those pins as connections it should send data over. So the sockets on
a DCE are wired in reverse. Here is the pin purpose as far as a DCE is concerned:

57
● Pin 1: Receive positive signal
● Pin 2: Receive negative signal
● Pin 3: Transmit positive signal
● Pin 4: Nothing
● Pin 5: Nothing
● Pin 6: Transmit negative signal
● Pin 7: Nothing
● Pin 8: Nothing

So a DTE transmits on pins 1 and 2 and receives on pins 3 and 6. A DCE transmits on
pins 3 and 6 and receives on pins 1 and 2.

Straight-through cable

A straight-through cable is often called a wired patch cable or an Ethernet cable. The
cable that comes in the box with your router is a straight through cable – it is the most
common format for network cables. The straight through cable is configured as
described above. It doesn’t matter whether the cable you buy follows EIA-568A or EIA-
568B because in both cases, the same color wire connects to the same pin at either
end. This is the cable you use to connect a DTE to a DCE. There is no wrong end. The
connectors on both ends are exactly the same and the socket on your computer that the
cable plugs into is exactly the same (externally) as the plug on your router or modem
that takes the cable connector.

Crossover cables

A crossover cable does exactly as its name suggests, it crosses over the wire from pin 1
at one end to pin 3 at the other connector. The wire that is crimped to pin 2 at one end
is attached to pin 6 at the other end and the pins 3 and 6 wires go to pins 1 and 2
respectively in the other connector. The crossover cable follows both EIA-568A and
EIA-568B. It is A at one end and B at the other. So those conflicting standards did end
up being useful.

To pass your CCNA exams, you just need to know that the pin that the striped orange
wire connects to on the left of the diagram takes the striped green wire on the right of
the diagram. The pin that takes the solid green wire on the left, takes the solid orange
wire on the right. You could also write down orange left and green right and you would
still get full marks.

Straight through or crossover

If you want a cable to connect your computer and printer together, you need a
crossover cable. If you have several computers and one printer, you need to buy a
switch. All of the computers will connect to the switch with a straight through cable and
your printer would also connect to the switch with a straight through cable.

58
Remember, two types of devices that connect to networks. When you connect two
devices of different types together, you use a straight through cable. When you connect
two devices of the same type together, you use a crossover cable. All cables are
straight through if you insert a network device between two devices of the same kind.
When you need to buy a network cable, define the devices that you want to plug each
end of the cable into by the DTE/DCE categories. This list should clarify the
configuration of cable that you need.

● DTE to DCE: straight through cable


● DTE to DTE: crossover cable
● DCE to DTE: straight through cable
● DCE to DCE: crossover cable

The cable used for both the straight through and crossover formats is exactly the same.
The difference between straight through and crossover cable is that in the crossover
configuration the color-covered wires that stick out from the frayed ends of the cable are
wired into the plug differently at one end.

There is no DTE end or DCE end in network cables. You can’t plug them in the wrong
way. If the same colored wires connect to the same pins in the connectors at both ends,
you can plug either end into your computer and the other end into your router. It doesn’t
matter. If the wiring sequence is different between the two ends, it doesn’t matter which
end you plug into your computer and which goes to your printer.

MDI and MDI-X

There is one more complication to take into account when you are buying network
cables. If your device implements MDI and MDI-X, you don’t need to worry about
crossover cables. MDI is the Medium Dependent Interface standard and it operates
inside the socket of a NIC. It can detect which wire transmissions arrive on rather than
doggedly listening on pins 3 and 6. MDI-X stands for Medium Dependent Interface –

59
Crossover. So, if your computer, printer, switch, router or modem has MDI printed on
the box, you only need to buy a straight through cable.

Rollover cable

These days, you shouldn’t have to worry about rollover cables. They simply reverse the
pin order of each wire in a cable. The wire that connects to pin 1 at one end goes to pin
8 at the other end, the wire that goes to pin 2 and the first end goes to pin 7 at the other
end. In the middle of the connector pins 4 and 5 are reversed. This format is used for
RS-232 connectors that attach to serial ports on computers, printers, or monitors. Serial
ports are old news and you shouldn’t need to worry about buying a rollover cable.

Cable casing colors

You may see network wired cables that are gray, while others are yellow, some are
blue, and then there are white ones. Why? Most cable networking professionals will tell
you that the cable jacket color has no meaning; it is just a question of aesthetics. They
are partially right. The contents of the cable are exactly the same no matter what the
plastic jacket color is. However, cable manufacturers don’t just produce different colored
cable jackets for the fun of it.

There is an industry standard to which these colors are meaningful. Whether you
choose to follow that convention is up to you – most sites don’t pay attention to the
standard. The Building Industry Consulting Service International (BICSI) propagates
standards for integrating IT services in structures. Among the standards that it promotes
is EIA-568, which you have already read about. Another standard is the Administration
Standard for the Telecommunications Infrastructure of Commercial Buildings, also

60
known as ANSI/TIA/EIA-606-B (PDF). This is where those cable colors originate. The
meanings of cable colors are as follows:

● Orange: Demarcation point


● Green: Network connection
● Purple: Common equipment
● Red: Key system
● White: First level backbone
● Gray: Intra-building backbone (MC-IC or IC-HC)
● Brown: Inter-building backbone (IC-HC)
● Blue: Horizontal
● Yellow: Other

Here is an image of the color coding section of the EIA-606-B standards document
where these colors are defined.

Experiment-3

Aim: Study of different types of Network cables and Practically implement the cross-
wired cable and straight through cable using crimping tool.

Apparatus (Components): RJ-45 connector, Crimping Tool, Twisted pair Cable


Procedure: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be
very careful at this point, as to not nick or cut into the wires, which are inside. Doing so
could alter the characteristics of your cable, or even worse render it useless. Check the
wires, one more time for nicks or cuts. If there are any, just whack the whole end off,
and start over.

61
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other
hand. You do not want the wires to become untwisted down inside the jacket. Category
5 cable must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be
'out of spec'. At this point, you obviously have ALOT more than 1/2 of an inch of un-
twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-
made cable, with one of the ends whacked off, you only have one end to install - the
crossed over end. Below are two diagrams, which show how you need to arrange the
cables for each type of cable end. Decide at this point which end you are making and
examine the associated picture below. Diagram shows you how to prepare Cross wired
connection

62
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.

Requirements:

F. Assessment:

Multiple choice: 5 points each. Answer in google form link here: bit.ly/2Xc2J0Y

1. Referring to networking cables, what does UTP stand for?


a. Unshielded Twisted Pair
b. UltraNet Twin Parity
c. User Technology Protocol
d. Uncoupled Transient Protected
2. UTP cables have what type of connector?
a. BNC
b. RJ45
c. RCA
d. 1/8 phono
3. What type of cable should be used to connect a computer to a switch?
a. Straight-through
b. Crossover
c. Patch
d. HDMI
4. Crossover cables are used to connect
a. a pc to a pc

63
b. a switch to a router
c. a pc to a router
d. a pc to a modem
5. straight-through cables are used to connect
a. a pc to a switch
b. a switch to a switch
c. a router to a router
d. a modem to a modem

G. Reference:

https://computernetworking747640215.wordpress.com/2018/07/05/vlan-configuration-
on-a-cisco-switch-in-packet-tracer/

https://www.comparitech.com/net-admin/difference-between-straight-through-crossover-
rollover-cables/#Crossover_cables

https://www.computercablestore.com/straight-through-crossover-and-rollover-wiring

MODULE 4: Building DHCP Server

A. Introduction:

Guide to configure a DHCP server both on a router and on a generic server in Cisco
Packet Tracer. In both cases, configuration is simple as long as you have a basic
knowledge of IP addressing.

64
B. Objectives:

1. Build the network topology;


2. On the router, configure default gateway for our LAN;
3. Configure DHCP server on the Router;
4. enable DHCP every PC should be able to obtain an IP address;

C. Learning Content:

● Dynamic Host Configuration Protocol

D. Pre-test:

1. What is DHCP and how it works?


2. What are the 4 steps of DHCP?
3. Should DHCP be on or off?

E. Learning Activities:

How to configure DHCP server in Packet Tracer.

This tutorial will guide you on how to configure a DHCP server both on a router and on a
generic server in Cisco Packet Tracer. In both cases, configuration is simple as long as
you have a basic knowledge of IP addressing. On to it then!

Let’s apply to your simulation software using the Cisco Packet Tracer.

Vlog and save it then email to tatayphinks@gmail.com.

Configuring DHCP server on a single Router.

1. Build the network topology:

65
2. On the router, configure interface fa0/0 to act as the default gateway for our LAN.

Router>enable

Router#config terminal

Router(config)#int fa0/0

Router(config-if)#ip add 192.168.1.1 255.255.255.0

Router(config-if)#no shutdown

Router(config-if)#exit

3. Configure DHCP server on the Router. In the server we will define a DHCP pool of
IP addresses to be assigned to hosts, a Default gateway for the LAN and a DNS
Server.

Router(config)#

Router(config)#ip dhcp pool MY_LAN

66
Router(dhcp-config)#network 192.168.1.0 255.255.255.0

Router(dhcp-config)#default-router 192.168.1.1

Router(dhcp-config)#dns-server 192.168.1.10

We can add ip dhcp excluded-address command to our configuration so as to configure


the router to exclude addresses 192.168.1.1 through 192.168.1.10 when assigning
addresses to clients. The ip dhcp excluded-address command may be used to reserve
addresses that are statically assigned to key hosts.

So add the above command under the global configuration mode.

Router(config)#ip dhcp excluded-address 192.168.1.1 192.168.1.10

4. Now go to every PC and on their IP configuration tabs, enable DHCP. Every PC


should be able to obtain an IP address, default gateway and DNS server, as defined in
step 2.

For example, to enable DHCP on PC1:

Click PC1->Desktop->IP configuration. Then enable DHCP:

67
Do this for the other PCs.

You can test the configuration by pinging PC2 from PC1. Ping should succeed.

Now let’s do the same thing using a Generic server in place of a router:

Configuring DHCP service on a generic server in Packet Tracer.

1. Build the network topology in packet tracer

2. Configure static IP address on the server (192.168.1.2/24).

3. Now configure DHCP service on the generic server.

To do this, click on the server, then click on Services tab. You will pick DHCP on the
menu. Then proceed to define the DHCP network parameters as follows:

Pool name: MY_LAN

Default Gateway: 192.168.1.1

DNS Server: 192.168.1.2

Start IP Address: 192.168.1.0

68
Subnet Mask: 255.255.255.0

Maximum Number of users: 256

Click on add then Save.The DHCP entry is included in the list.

Here are the configurations on the server:

Once you’ve configured everything, turn ON the DHCP service.

4. Finally, enable DHCP configuration on each PC. The three PCs should get
automatically configured.

As an example, here is the DHCP configuration on PC1:

69
Addendum: You can define a DHCP server on one broadcast domain to serve hosts in
a different broadcast domain. If you want to do this, then you should consider using ip
helper-address command. To learn more about this, you can read my article on IP
helper address configuration.

Now configuring a Cisco Router as a DHCP Server passthrough to another Cisco


Router

Let’s apply to your simulation software using the Cisco Packet Tracer.

Vlog and save it then email to tatayphinks@gmail.com.

Topology Diagram

Objectives

● Configure the customer Cisco 1841 ISR as a DHCP server

70
Background / Preparation

In this activity, you will continue to configure the Cisco 1841 ISR router for the customer
network by configuring the DHCP service. The customer has several workstations that
need to be automatically configured with IP addresses on the local subnet and
appropriate DHCP options to allow access to the Internet.

The DHCP pool will use the 192.168.1.0/24 network but the first 49 addresses are
excluded. The default gateway and DNS server also need to be configured as
192.168.1.1 and 192.168.1.10.

For this activity, both the user and privileged EXEC passwords are cisco.

Note: Packet Tracer does not currently support the domain name and lease period
options. These options are not used in this activity.

Step 1: Configure the DHCP service.

a. From the customer workstation, use a console cable and terminal emulation
software to connect to the console of the customer Cisco1841 ISR. \

b. Log in to the console of the Cisco 1841 ISR and enter global configuration
mode.

c. Before creating a DHCP pool, configure the addresses that are excluded. The
range is from 192.168.1.1 to 192.168.1.49.

CustomerRouter(config)#ip dhcp excluded-address 192.168.1.1


192.168.1.49

d. Create a DHCP pool called pool1.

CustomerRouter(config)#ip dhcp pool pool1

e. Define the network address range for the DHCP pool.

CustomerRouter(dhcp-config)#network 192.168.1.0 255.255.255.0

f. Define the DNS server as 192.168.1.10.

CustomerRouter(dhcp-config)#dns-server 192.168.1.10

g. Define the default gateway as 192.168.1.1.

CustomerRouter(dhcp-config)#default-router 192.168.1.1

h. Add an exclusion range of 192.168.1.1 to 192.168.1.49 to the DHCP

CustomerRouter(dhcp-config)#exit

71
CustomerRouter(config)#ip dhcp excluded-address 192.168.1.1
192.168.1.49

i. Exit the terminal.

Step 2: Verify the DHCP configuration.

a. From the customer workstation, open the Command Prompt window.

b. Type ipconfig /release to release the current IP address.

c. Type ipconfig /renew to request a new IP address on the local network.

d. Verify that the IP address has been correctly assigned by pinging the LAN IP
address of the Cisco 1841 ISR.

e. Click the Check Results button at the bottom of this instruction window to
check your work.

Reflection

a. What is the purpose of DHCP on the customer network?

b. What IP address is assigned to the workstation after its IP address is


renewed?

c. What other DHCP options can be defined on the Cisco 1841 ISR router that
are not configured in this activity?

Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.

F. Assessment:

Multiple choice: 5 points each. Answer in google form link here: bit.ly/3niPsyn

1. dhcp stands for

A. direct host cost protocol


B. dynamic host configuration protocol
C. digital host configuration protocol

2. Static IP Address

72
A. Host servers and printers that need particular addresses
B. are preferred for a large network
C. has automatic assignment

3. Dynamic addresses

A. preferred method of assignment for a large network


B. can be time consuming and error prone
C. the IP address always stays the same

4. When a DHCP server is configured, which IP addresses should never be assignable


to hosts?

A. IP address leased to the LAN


B. IP address used by the interfaces
C. manually assigned address to the clients

5. Which tasks does the Dynamic Host Configuration Protocol perform?

A. Configure IP address parameters from DHCP server to a host.


B. Assign and renew IP address from the default pool.
C. Perform host discovery using a DHCPDISCOVER message.

G. Reference:

https://www.microsoftpressstore.com/articles/article.aspx?p=2224361
https://www.cisco.com/c/en/us/support/docs/smb/unified-communications/cisco-small-
business-voice-gateways-and-atas/smb2894-view-dynamic-host-configuration-protocol-
dhcp-server-informa.html#:~:text=Objective,act%20as%20a%20DHCP%20server.
https://www.coursehero.com/file/22671172/ET0718-Chapter07v11-DHCP/
https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/
https://computernetworking747640215.wordpress.com/2018/07/05/how-to-configure-
dhcp-server-in-packet-tracer/

73
MODULE 5: Switch to Switch and routers

A. Introduction:

Telnet is an application layer protocol that allows a network administrator to access


and manage remote devices . A user on a client machine can use a software (also
known as a Telnet client) to access a command-line interface of another, remote
machine that is running a Telnet server program.

A network administrator can access the device by telnetting to the IP address or


hostname of a remote device. The network administrator will then be presented with a
virtual terminal that can interact with the remote host.

B. Objectives:

1. connects multiple devices to create a network;


2. a router connects multiple switches, and their respective networks, to form an
even larger network;
3. These networks may be in a single location or across multiple locations;

C. Learning Content:

● Introducing the Cisco Switch and Cisco Routers

D. Pre-test:

1. What is the difference of switch and router?


2. What is the primary purpose of router?

E. Learning Activities:

Now assume you’re the network admin. We’ll begin with:

Configuring Telnet on a switch and a router in Packet Tracer

We'll have an overview of the Telnet then see how to configure it on a switch and a
router in Packet Tracer. So precisely, we’ll look at:

1. An overview of Telnet
2. Configuring Telnet on a switch in Packet Tracer
3. Configuring Telnet on a router in Packet Tracer

74
Telnet configuration on a switch

1. Create the network topology below in Packet Tracer.

Assign the laptop a static IP address of 10.0.0.10.

The topology above consists of an ADMIN laptop and a remote switch. We’ll configure
Telnet on the switch so that as the admin,you’ll be able to access and manage the
switch remotely.

2. Configure enable password or enable secret password on the switch. If you fail to
do this,you won’t get past the executive mode of the switch even after you establish a
telnet connection to the switch.

Switch>enable

Switch#config terminal

Switch(config)#enable password admin

3.Configure a VLAN interface on the switch

We assign an IP address to the VLAN interface of the switch so that we can Telnet the
switch from the laptop using this address.

Switch(config)#int VLAN 1

Switch(config-if)#ip address 10.0.0.20 255.0.0.0

Switch(config-if)#no shut

75
Switch(config-if)#exit

4.Configure a Telnet password for remote access.

This password is configured on VTY lines. VTY means Virtual Terminal. Before you can
manage the switch remotely via Telnet, you’ll have to provide this password.

Switch(config)#line vty 0 15

Switch(config-line)#password cisco

Switch(config-line)#login

Telnet access to the switch is allowed through VTY lines. We can establish up to 16
telnet connections to to the switch at the same time. Tha’ts what ‘0 15‘ means.

Next,

5. Test Telnet connectivity.

Go to command prompt of the laptop and type telnet 10.0.0.20

Hope you remember that 10.0.0.20 is the VLAN address of the switch through which we
can access it remotely.

76
6. Now provide the Telnet password that you set in step 3. Mine is cisco. Notice that
password characters won’t show up(no echo) on the screen as you type them, but
just type, then hit ENTER.

After you’re authenticated, you will see the the CLI of the remote switch appear.

Experiment 4

Let’s apply to your simulation software using the Cisco Packet Tracer.

How to configure VLAN and interVLAN Routing in Packet Tracer

A step by step guide of configuring VLAN and interVLAN routing on a Cisco switch.
But just before get into configurations , let’s have a brief overview of what’s a VLAN.

What is a VLAN?

A Virtual LAN (VLAN) is simply a logical LAN, just as its name suggests. VLANs have
similar characteristics with those of physical LANs, only that with VLANs, you can
logically group hosts even if they are physically located on separate LAN segments.

We treat each VLAN as a separate subnet or broadcast domain. For this reason, to
move packets from one VLAN to another, we have to use a router or a layer 3 switch.

VLANs are configured on switches by placing some interfaces into one broadcast
domain and some interfaces into another. For this tutorial, we’ll configure 2 VLANs on
a switch. We’ll then proceed and configure a router to enable communication between
the two VLANs.

So then,

1. In Cisco Packet Tracer, create the network topology as shown below:

77
2. Create 2 VLANs on the switch: VLAN 10 and VLAN 20. You can give them custom
names.

Switch#config terminal

Switch(config)#vlan 10

Switch(config-vlan)#name SALES

Switch(config-vlan)#vlan 20

Switch(config-vlan)#name IT

3. Assign switch ports to the VLANs. Remember each VLAN is viewed as separate
broadcast domain.

And just before you configure, have in mind that switch ports could be either access or
trunk.

● An access port is assigned to a single VLAN . These ports are configured for
switch ports that connect to devices with a normal network card, for example a
PC in a network.

78
● A trunk port on the other hand is a port that can be connected to another switch
or router. This port can carry traffic of multiple VLANs.

So in our case, we’ll configure switch interfaces fa 0/1 through fa 0/4 as access ports to
connect to our PCs. Here, interfaces fa 0/1 and fa 0/2 are assigned to VLAN 10 while
interfaces fa 0/3 and fa 0/4 are assigned to VLAN 20.

Switch Interface fa0/5 will be configured as trunk port, as it will be used to carry traffic
between the two VLANs via the router.

Switch>enable

Switch#config terminal

Switch(config)#int fa0/1

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 10

Switch(config-if)#int fa0/2

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 10

Switch(config-if)#int fa0/3

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 20

Switch(config-if)#int fa0/4

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 20

Worth noting: We could have configured all the above interfaces as access ports using
interface range command as shown below:

Switch(config-if)#int range fa0/1-4

Switch(config-if-range)#switchport mode access

79
In the above commands, we have specified an interface range and then proceeded to
configure all the ports specified as access ports.

Interface fa0/5 is configured as trunk and will be used to for inter-VLAN communication.

Switch(config)#int fa 0/5

Switch(config-if)#switchport mode trunk

The next thing is to:

4 . Assign static IP addresses to the four PCs which are located in the separate VLANs.
PC1 and PC2 fall in VLAN 10 while PC3 and PC4 fall in VLAN 20.

PC1 IP address 192.168.1.10 Subnet mask 255.255.255.0 Default gateway


192.168.1.1

PC2: IP address 192.168.1.20 Subnet mask 255.255.255.0 Default gateway


192.168.1.1

PC3: IP address 192.168.2.10 Subnet mask 255.255.255.0 Default gateway


192.168.2.1

PC4: IP address 192.168.2.20 Subnet mask 255.255.255.0 Default gateway


192.168.2.1

And now it’s very clear that we treat a VLAN just like a physical LAN when assigning IP
addresses.

At this point let’s try to test connectivity within VLANs and between VLANs

To test communication between hosts in the same VLAN:

Ping PC2 from PC1 both in VLAN 10. Ping test should be successful.

To test connectivity between hosts in different VLANs:

Ping PC3 in VLAN 20 from PC1 in VLAN 10. Ping here will definitely fail. Why?
Because inter-VLAN routing is not yet enabled. Hope you can see how we’ve used
VLANs to place the hosts into two logical networks which can be viewed as separate
broadcast domains.

80
Now, in order to allow the hosts in the two VLANs to communicate, we need to do
something extra. And you can guess what. We’ll configure the router to permit inter-
VLAN communication. Let’s do that right away.

5. Configure inter-VLAN routing on the router

We’ll configure the router so that it will enable communication between the two vlans via
a single physical interface. How is this made possible? We’ll divide the single physical
interface on the router into logical interfaces (sub interfaces). Each sub-interface will
then serve as a default gateway for each of the VLANs. This scenario is called router
on a stick (R.O.A.S) and will allow the VLANs to communicate through the single
physical interface.

Wort noting: We can’t assign an IP address to the router’s physical interface that we
have subdivided into logical sub-interfaces. We’ll instead assign IP addresses to the
sub interfaces.

So let’s do router configurations:

Router>enable

Router#config terminal

Router(config)#int fa0/0

Router(config-if)#no shutdown

Router(config-if)#int fa0/0.10

Router(config-subif)#encapsulation dot1q 10

Router(config-subif)#ip add 192.168.1.1 255.255.255.0

Router(config-subif)#

Router(config-subif)#int fa0/0.20

Router(config-subif)#encapsulation dot1q 20

Router(config-subif)#ip add 192.168.2.1 255.255.255.0

81
As you can notice from above, the routers physical interface fa0/0 was subdivided into
two sub-interfaces( fa0/0.10 and fa0/0.20) , which are then configured as trunk
interfaces and given IP addresses.

Finally,

6. Test inter-VLAN connectivity.

Here we’ll test connectivity between computers in different VLANs . Don’t forget that its
the router that enables inter-VLAN routing.

Ping PC3 in VLAN 20 from PC1 in VLAN 10. If everything is well configured, then ping
should work perfectly.

And that’s all!

Example: Try to open PC 1 or PC 3 to ping 192.168.1.1 and 192.168.2.1 and see the
results if reply or time-out results.

Experiment 5

Let’s apply to your simulation software using the Cisco Packet Tracer.

Vlog and save it then email to tatayphinks@gmail.com.

How to configure Switch Port Security in Packet Tracer

Hello and welcome! In this tutorial, we’ll have an overview of switch port security then
configure it in Packet Tracer.

Overview

Switch port Security is a network security feature that associates specific MAC
addresses of devices(such as PCs) with specific interfaces on a switch. This will enable
you to restrict access to a given switch interface so that only the authorized devices can
use it. If an unauthorized device is connected to the same port, you can define the
action that the switch will take, such as discarding the traffic, sending an alert, or
shutting down the port.

Now let’s configure port security in Packet Tracer.

1. Build the network topology:

82
PC1 connects to fa0/1 and PC2 to fa0/2 of the switch

2. Now configure switch port security on switch interfaces.

We’ll configure port security interfaces on fa0/1 and fa0/2. To do this, we’ll:

● Configure the port as an access port


● Enable port security
● Define which MAC addresses are allowed to send frames through this interface.

Here are the commands:

Switch(config)#int fa0/1

Switch(config-if)#switchport mode access

Switch(config-if)#switchport port-security

Switch(config-if)#switchport port-security mac-address sticky

83
The sticky keyword instructs the switch to dynamically learn the MAC address of the
currently connected host.

You can add these two optional commands.

● defining the action that the switch will take when a frame from an unathorized
device is received. This is done using the switchport port-security violation
{protect | restrict | shutdown}interface command. All three options discard the
traffic from the unauthorized device.
● defining the maximum number of MAC addresses that can be received on the
port using the switchport port-security maximum NUMBER interface submode
command

Let’s add the above 2 commands to our configuration:

Switch(config-if)#switchport port-security violation shutdown

Switch(config-if)#switchport port-security maximum 1

We’re are done with port security configuration for fa0/1

Moving on…

In a similar way to switch interface fa0/1, configure switch port security for fa0/2
connected to PC2:

Switch(config)#interface fa0/2

Switch(config-if)#switchport mode access

Switch(config-if)#switchport port-security

Switch(config-if)#switchport port-security mac-address sticky

Switch(config-if)#switchport port-security violation shutdown

84
Switch(config-if)#switchport port-security maximum 1

That’s all for port-security configuration on fa0/2

A shorthand method for configuration:The port security configurations for both fa0/1 and
fa0/2 could be done more faster with the help of interface range command as shown
below:

Switch(config-if-range)#interface range fa0/1-2

Switch(config-if)#switchport mode access

Switch(config-if)#switchport port-security

Switch(config-if)#switchport port-security mac-address sticky

Switch(config-if)#switchport port-security violation shutdown

Switch(config-if)#switchport port-security maximum 1

Here, we define a range of interfaces on which we want to configure port security, then
proceed to configure port-security for all the interfaces specified at a go instead of one
interface at a time.

The interface range command can save you tons of work in doing individual
configurations if you were configuring port security for many switch interfaces, say, 24
ports on a switch.

Next,

4. We’ll verify port security configurations on interfaces fa0/1 and fa0/2

To verify if the switch has learnt the MAC address of PC1, you can use the command:

show port-security interface fa0/1

85
Verify that the switch has learnt the MAC address of PC1.

You may also use the command: show port-security address

Try also pinging PC2 from PC1. Ping should be successful here since switch port
security is not violated.

The case of Port Security Violation

Now connect a different PC to fa0/1 in place of PC1. See the effect of doing this:

86
Notice that fa0/1 shuts down upon connecting the new PC, as indicated by the red LED.

This is because the switch had already associated fa0/1 with the MAC address of PC1
and the maximum number of MAC addresses that we defined for this port is 1. So
attaching the new PC to fa0/1 violates the port security rules that we set and as a result,
the interface shuts down.

You can verify this further by using the command we used before: show port-security
interface fa0/1

87
Verify from above that port status is now Secure-shutdown upon violation of port
security.

Further, a ping from the New PC to PC2 will definitely fail because the switch cannot
forward a frame via an interface that is shut down.

How to Reset an interface that has been shut down due to Violation of Port
Security:

One of the options on the table is to manually restart the shutdown interface(fa0/1 in our
case here). Unplug the cable from unauthorized PC(new PC) and plug it back to
authorized PC(PC1)

Then run following commands on switch and test connectivity from the authorized PC
(PC1):

Switch(config)#interface fa0/1

Switch(config-if)#shutdown

Switch(config-if)#no shutdown

Now the interface fa0/1 should change status to up.

88
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.

F. Assessment:

Multiple choice: 5 points each. Answer in google form link here: bit.ly/3E8iVAO

1. What is a network device that cross-connects clients, servers and network devices?

a. Switch
b. Modem
c. router
d. Playstation

2. A central network device connecting nodes.

a. Motor Hub
b. TV Cable Repeater
c. Electrical Switch
d. Router

3. Name a device that repeats, almost like an echo?

a. hub
b. gateway

89
c. switch
d. Router

4.Which cable connects the following? Switch to Router, Switch to workstation, hub to
workstation.

a. Straight-through
b. Rollover
c. Crossover
d. Standard

5. A switch in a datagram network uses a

a. destination address
b. sender address
c. routing table
d. header

G. Reference:

https://www.itprc.com/configure-a-router-with-packet-tracer/

https://www.packettracernetwork.com/labs/lab1-basicswitchsetup.html

https://www.ccna6rs.com/19-4-4-packet-tracer-build-a-switch-and-router-network-
answers/

MODULE 6: Wireless router Configurations

A. Introduction:

Configuring a wireless network in Packet Tracer using a wireless router. We’ll go


through wireless LAN configuration, wireless security and configuring the wireless router

90
for internet connectivity. Briefly, here are the configurations we’ll perform on the wireless
router:

B. Objectives:

Wireless LAN administration;


Wireless LAN network setup;
Securing a wireless network with WPA and WEP security features;
Setting up internet connectivity on the wireless router;

C. Learning Content:

● Cisco Packet Tracer Cisco Lynksys Wireless router

D. Pre-test:

1. Write the procedure and method to securing cisco lynksys Wireless router.
2. What are the two security features of Wireless router?

E. Learning Activities:

Wireless Links
You can establish wireless links between access points and end devices (PCs, servers,
and printers). To establish a link, simply remove the existing module on an end device,
insert a wireless module, and turn on the device. The device will automatically try to
associate itself with an access point. Typically, this means it will associate (physically)
with the nearest access point. See the Wireless Devices page under the Physical
Workspace section for more information regarding distances. However, if two or more
access points are in the same closet, the distance from any access point to any end
device is essentially the same. In this case, an end device will associate with the access
point that was created first. Recall that the logical topology does not reflect physical
distances, and everything that is created in the Logical Workspace is initially placed in
the same wiring closet in the Physical Workspace. The process for establishing wireless
links between Linksys routers and end devices with Linksys network modules is similar,
but described elsewhere.

Link Status
When you connect two devices, you will typically see link lights on both ends of the
connection. Some connections do not have link lights.

Link Light Status Meaning

Bright green The physical link is up. However, this is not indicative of the line

91
protocol status on the link.

Blinking green There is link activity.


Red The physical link is down. It is not detecting any signals.
Amber The port is in a blocking state due to STP. This appears only on
switches.
Black This is used by console connections only. Black color indicates the
console cable is connected to the correct port.
Configuring Linksys WRT300N

The Config tab offers two general levels of configuration: global and interface. To configure at
the global level, click the GLOBAL button to expand the Settings button (if it has not already
been expanded). To configure an interface, click the INTERFACE button to expand the list of
interfaces, and then choose the interface.

92
Global Settings
In the global settings, you can change the Display Name of the Linksys WRT300N.

Algorithm Settings
In the Algorithm Settings, you can override the global Algorithm Settings by unchecking
Global Settings and then set your own values for the Half-Open Session Multiplier,
Maximum Number of Connections, and Maximum Number of Opened Sessions.

Internet Interface Configuration


In the Internet settings, you can set the Internet port to automatically obtain IP configurations
with DHCP, manually set IP configurations with the Static setting, or configure PPPoE
authentication.

93
LAN Interface Configuration
In the LAN settings, you can set the IP Address and Subnet Mask of the LAN interface.

94
Wireless Interface Configuration
In the Wireless settings, you can set the SSID, Channel, and Authentication. You may set the
authentication to WEP, WPA-PSK, WPA2-PSK, WPA, or WPA2. For WEP, you need to set
the Key to a 10-digit hexadecimal value. For WPA-PSK and WPA2-PSK, the PassPhrase needs
to be 8-63 ASCII characters long and the Encryption Type can be set to AES or TKIP. For
WPA and WPA2, you need to enter the IP Address and Shared Secret of the RADIUS server
and then select AES or TKIP for the encryption type.

95
Linksys WRT300N: GUI

The GUI tab offers the same configurations and settings as the Config tab with some
additional features for access restrictions, port forwarding, DMZ access, administration,
as well as router and network status. Make sure you click on the Save Settings button
at the bottom to apply the new settings to the Linksys WRT300N before going to any
other tab.

Setup Configuration
In the Setup tab under the Basic Setup sub-tab, you can set the Internet Connection
Type to either automatically obtain IP configurations with Automatic Configuration -
DHCP, manually set IP configurations with Static IP , or PPPoE. You can also set the
LAN IP configurations and DHCP server settings under the Network Setup section.

96
Wireless Configuration
On the Wireless tab under the Basic Wireless Settings sub-tab, the only settings you
can change are the Network Name (SSID) and the Standard Channel.
Under the Wireless Security sub-tab, you can set the Security Mode to Disabled,
WEP, WPA Personal, WPA Enterprise, WPA2 Personal, or WPA2 Enterprise.
Depending on the security mode that you select, you will need to enter a WEP key,
passphrase and encryption type for WPA/WPA2 Personal, or the RADIUS server IP
address, shared secret, and encryption type for WPA/WPA2 Enterprise.
Under the Wireless MAC Filter sub-tab, you can setup a wireless MAC address filter
list to permit or prevent wireless clients from accessing the wireless network. To setup
the wireless MAC filter, set the wireless MAC filter to Enabled and then select whether
you want the MAC filter to prevent the listed clients from accessing the wireless network
or to permit only the listed clients from being able to access the wireless network.
Afterwards, begin entering the MAC addresses of the clients that you want to include in
the MAC filter and then click the Save Settings button.

97
Security Configuration
On the Security tab, there are no additional viewable sub-tabs and there are no
parameters that you can edit.

98
Access Restrictions Configuration
On the Access Restrictions tab under the Internet Access Policy sub-tab, you can
apply various access restrictions policies on the connected hosts. To add a policy to the
router, first select a policy you would like to edit from the Access Policy drop-down
menu and then Enter a Policy Name for the policy. Then, set the Status to Enabled.
Next, click on the Edit List button and enter the host IP addresses you would like to
apply the policy on in the List of PCs dialog that shows up. After editing the list, click on
Save Settings and Close inside the dialog. Back in the Linksys GUI, select Deny to
restrict all applications or select Allow for specific application access restriction. If you
select Allow, you can choose up to three applications to block. To block an application,
select the application from the Applications list and click on the >> button to add it to
the Blocked List. To unblock an application, select the application from the Blocked
List and click on the << button. If you want to remove a policy, select the policy from the
Access Policy drop-down menu and click Delete This Entry.

99
Applications & Gaming Configuration
In the Applications & Gaming tab under the Single Port Forwarding sub-tab, you can
forward packets destined to specific ports to an IP Address. To forward a port, select
the appropriate application under the Application Name drop-down menu, enter the IP
Address under the To IP Address column to which you want the packets to be
forwarded, and then click on the box under the Enabled column. To forward a custom
port, enter an application name and then enter the appropriate Externet Port, Internet
Port, and Protocol. The Externet Port is the port to which the Linksys router will listen
from the WAN side. The Internet Port is the port on your local server to which the
Linksys router will forward packets.
Under the DMZ sub-tab, you can set a specific host to have DMZ access. To do so,
click on Enabled to enable the DMZ feature and then enter the IP address of the host
you want to have DMZ access.

100
Administration Management
In the Administration tab under the Management sub-tab, you can change the default
password to access the router through the Linksys Web Configuration using the Web
Browser and toggle Remote Management. In addition to this, if you are logged in
using the Linksys Web Configuration, you can Backup and Restore Configurations.
Under the Factory Defaults sub-tab, the only available feature is Restore Factory
Defaults. This will reset the configuration back to default settings.
Under the Firmware Upgrade sub-tab, you can upgrade the firmware of the Linksys
WRT300N. To upgrade the firmware, click on Browse, select a valid firmware image
from the dialog that shows up, and then click OK. Once you have selected a firmware,
click on the Start to Upgrade button to upgrade the firmware.

101
Status
On the Status tab under the Router sub-tab, you can view Router Information and
Internet Connection configurations. You can Release and Renew the IP address of
the Internet port.
Under the Local Network sub-tab, you can view the Local Network and DHCP Server
configuration. You can view the DHCP Client Table as well.
Under the Wireless Network sub-tab, you can view the various wireless configurations
on the router.

102
In our network set up, we have two laptops and a PC which should connect to a LAN
provided by one wireless router.The PC is is used by the network Admin and connects
to the LAN via an Ethernet port of wireless router.The laptops should connect to the
same LAN by wireless means, and for this reason we’ll install wireless adapters on
them. Still, we’ll need to connect the LAN to the internet via an ISP router.

Let’s now do all that step by step.

Wireless LAN configuration

First get into Cisco Packet Tracer and in the physical mode, pick a wireless router and
two laptops,a PC, a generic server and a 2800-series router(or just any other router
other than wireless).

Now connect the PC to the Ethernet 1 of the wireless router.

103
For the laptops, replace the already-installed wired LAN module with a wireless adapter
module (WMP 300N) .

Make sure that you first power off each laptop before you make any replacement then
restore the power back after replacement. That’s easy to do!

Once you have the wireless modules in place, you’ll see the wireless connections come
up between the laptops and the wireless router as shown below.

Next, we’re going to do some settings on the wireless router to create a LAN then
connect it to the internet.

To do any configuration on the wireless router, we’ll use its GUI(Graphical User
Interface) which we can access either by:

● Clicking the Wireless Router icon then GUI tab, or


● Using a browser in a PC or laptop in the LAN.

Let’s use the PC to access the router GUI.

We’ll access the router from the PC or the laptops using the router’s LAN interface.The
LAN interface is simply the default gateway of the LAN.

104
So now, on the ADMIN PC browser, type the IP address of the LAN interface of the
wireless router.(192.168.0.1 by default ), then hit Go.

A login prompt appears. Provide the username (admin) and password (admin) to be
allowed into the GUI of the router.You can always change these settings later.

You should now be in the GUI of the router, whichever approach you chose to access
it. Just examine it closely for a moment. On it, you can see several tabs like Setup,
Wireless, Security, Access Restrictions, Application & Gaming, Administration and WRT
300N status.

For this tutorial we’ll focus on setup, wireless and administration tabs. Notice that once
you click on one major tab, other ‘sub-tabs’ will appear.

Wireless Router Administration

We’ll begin with Administration in the GUI. Here we’ll simply change the router’s
username and password.

On the browser of Admin PC, type the IP address of the LAN interface of the wireless
router(192.168.0.1, by default). Hit Go to access the GUI of the router. Provide the
default username(admin) and password(admin). Click OK. You’re now on the GUI of
the router. See it on the figure below.

105
Click on the Administration tab and set a new password for administrative access. Scroll
down and Save settings. You will be prompted for a username and the new password
you just set.Type them and click OK. Wait a bit. A new screen appears confirming
settings are successful. You can click on continue to continue with configurations.

106
To test for the new password entered, close the browser of Admin PC and try to to
access the GUI again using the browser. You’ll now provide the new password you’ve
just set.

The admin username and password are important, as only a network admin(or a user
with admin rights) is able to log into the router and manage its settings.

Let’s now move on to another setup.

LAN Setup and Internet Setup

To configure addresses for the LAN and internet connectivity, we’ll use Setup tab.

Network Setup

Network setup means LAN setup. Already, we have a PC and three laptops in the
LAN.We’ll assign the them IP addresses either statically or dynamically (using a DHCP
pool set up in the wireless router).

The default LAN network address given here is 192.168.0.0 with a subnet mask of
255.255.255.0 .The first address in this network (192.168.0.1 by default) has been
assigned to the LAN interface of the router. It has just been named IP address.
Obviously, all the PCs in the LAN will use the LAN interface as their default interface(to
communicate to hosts in outside networks).

Now, in the router’s network settings, you may choose to enable DHCP to dynamically
assign IP addresses to the PCs. On the other hand, if you choose to disable DHCP,
then obviously, you’ll have to configure static IP addresses on the PCs.

When you choose to enable DHCP, set the start address for the LAN pool, maximum
hosts to be allowed in your LAN and the DNS server for the LAN. The PCs will receive
addresses automatically from the pool.

Now, going the DHCP way:

● Ensure DHCP is checked.


● Leave the IP address as 192.168.0.1 (This is the default LAN gateway address).
● Set a start address of 192.168.0.50 and set maximum users to 100 (or any
number of users you want)
● You can leave the DNS server entry as it is (0.0.0.0) or specify the address of a
DNS server of your choice.
● Scroll down and Save settings.

107
See the set up window below.

Moving on, let’s enable DHCP on each PC for dynamic configuration. Go to the IP
configuration tab for each PC and enable DHCP. Each PC should automatically obtain
an IP address from the router.

As an example, here is the IP configuration for Laptop1:

108
Now let’s test our wireless LAN.

Ping PC2 from PC1. Ping should succeed.

Try also to ping the LAN interface of the router from one of the PCs ,say, PC1 . It should
be successful.

That was pretty easy! Let’s now move on and add wireless security for the wireless LAN
access.

Adding security for wireless LAN access

The LAN network we have just setup has no wireless security features enabled. If this a
was a production network, this would mean an obvious security threat since this makes
the network accessible to unauthorized users. So let’s implement some level of wireless
security to our LAN.

Access the GUI of wireless router (either by clicking on Router icon or from Admin PC
browser), then click on Wireless tab. Under the Basic Wireless Settings sub tab,
change the default wireless SSID to any name of your choice. I have named mine
‘myLAN‘. After this, don’t forget to Save settings.

109
The acronym SSID stands for Service Set Identifier, and its the name of your wireless
network(wireless LAN).

Still, in the Wireless tab, under the Wireless security sub tab, change security mode to
WPA personal , then set passphrase field to a password of your choice. Scroll down
and Save settings

110
The LAN network is now secured for wireless access. To test whether its really
protected, click Laptop1->Desktop->Wireless.

A new window appears that shows the now secured wireless network. Click connect.
You can now see the name of the wireless network( myWIFI , in my case) and its signal
strength. Site features listed include WPA1 PSK security feature.

Again, click connect, then provide the security pre-shared key for the WiFi that you set,
then connect. Laptop 1 is now connected to the WiFi network. You can see at the
bottom right of the screen that the wireless network adapter on the laptop is
active.Repeat this process for the Laptop2.

111
Now, you can change the wireless security mode to any other from the available
options. You may choose WEP security feature for our wireless network, for example.
For WEP, provide a 40-bit (10 hexadecimal digits e.g. A123B456C789) or 64 -bit key(16
hex characters). WEP and WPA configurations look almost alike.

That’s all for wireless security configuration.

Lastly, let’s see how to set up internet configurations on the wireless Router so that the
PC and laptops in the LAN can access the internet. So move on to the next section.

Internet Setup

For this part, we’ll configure the internet interface on the router so as to connect our
LAN to the internet. Note that for different routers (from different vendors), the internet
interface may be named differently; in some routers, for example, the interface may
have the name ‘WAN interface‘, suitably because its the interface that allows devices in
our LAN to access the internet.

Here, we’ll connect the internet interface to an ISP router which then connects to an
internet server (example.com, as an example).

So now, access the Internet Setup tab on the GUI of the wireless router (either by
clicking on its icon or from admin PC browser). Actually, in a real life router
configuration, you’ll use a PC browser. In this case you should remember the username
name and the new password you set.

112
To Set internet connectivity , we’ll need to set a static IP address on the interface or set
interface as a DHCP client so that it will be assigned an address dynamically by the ISP
router. Alternatively, you may use PPPoE to provide WAN connectivity to the internet.

Now, if you choose to configure a static IP address for the internet interface, you can
specify also the default gateway and a DNS server of your choice.

And, if you’d rather like to have the internet interface address configured by DHCP,
you’ll then set the internet interface as a DHCP client. A DHCP server will be
configured on another device, such as the ISP router (in our topology here!).

Otherwise, if you choose PPPoE for internet connectivity, then set up the username and
password for PPPoE authentication. The internet interface will then become a PPPoE
client and will negotiate for connection with a PPPoE server running on an ISP device
so as to achieve internet connectivity.Usually the username and password will be
provided by your ISP.

For now, we’ll set the internet interface to act as a DHCP client (with the DHCP server
configured on the ISP router)

So then :

First configure IP addresses and a DHCP server on ISP router.

ISP_ROUTER(config)#int fa0/0

113
ISP_ROUTER(config-if)#ip add 155.21.21.1 255.255.0.0

ISP_ROUTER(config-if)#no shut

ISP_ROUTER(config-if)#

ISP_ROUTER(config-if)#int fa0/1

ISP_ROUTER(config-if)#ip add 200.0.0.1 255.255.255.0

ISP_ROUTER(config-if)#no shut

ISP_ROUTER(config-if)#exit

ISP_ROUTER(config)#ip dhcp pool mypool

ISP_ROUTER(dhcp-config)#net 155.21.0.0 255.255.0.0

ISP_ROUTER(dhcp-config)#default-router 155.21.21.1

ISP_ROUTER(dhcp-config)#dns-server 0.0.0.0

Now make the internet interface a DHCP client by enabling DHCP on it.

114
To verify DHCP configuration,click on the wireless router icon, then go to Config tab.
Pick DHCP. The interface is now configured with an IP address from the pool set in the
ISP router.

Next,we have to configure static or dynamic routes in the ISP router for the devices in
the wireless LAN to gain access the internet server:

Here is a static route:

ISP_ROUTER(config)#ip route 192.168.0.0

255.255.255.0 fa0/0

Lastly, assign an IP address to the internet server (if you hadn’t done so), then try to
reach the server from a host in the LAN.

For example, you can ping the server from Laptop1. Ping should succeed.

I also strongly believe that if you’ve gotten everything presented in here,then you have
more than a foundation to create your own wireless network using a wireless router, e.g,
home WiFi.

Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.

F. Assessment:

Multiple choice: 5 points each. Answer in google form link here: bit.ly/3A0as0o

1. Which protocol is used by ping to test connectivity between network hosts?


a. ARP
b. ICMP
c. TCP
d. DHCP

2. What is the problem if a computer automatically configures an IP address in the


169.254.x.x address range?
a. The DHCP server is unreachable.
b. The DNS server is unreachable.
c. The computer is configured with an incorrect default gateway.
d. The computer NIC is disabled.

115
3. A user reports that the corporate web server cannot be accessed. A technician
verifies that the web server can be accessed by its IP address. What are two possible
causes of the problem?
a. The web server is misconfigured.
b. The DNS server address is misconfigured on the workstation.
c. The network connection is down.
d. The default gateway address is misconfigured on the workstation.

4. A technician wishes to update the NIC driver for a computer. What is the best location
for finding new drivers for the NIC?
Windows Update
a. the website for the manufacturer of the NIC
b. the installation media that came with the NIC
c. the website for Microsoft
d. the installation media for Windows

5. A new computer workstation has been installed in a small office. The user of the
workstation can print a document using a network printer on the LAN, but cannot access
the Internet. What is a possible cause of the problem?
a. The DHCP server IP address is misconfigured.
b. The TCP/IP stack is not functional.
c. The gateway IP address is misconfigured.
d. The workstation is configured with a static IP address.

G. Reference:

https://www.computernetworkingnotes.com/ccna-study-guide/how-to-configure-wireless-
network-in-packet-tracer.html

https://courses.cs.ut.ee/MTAT.08.004/2016_spring/uploads/Main/Configuring
%20Wireless%20LAN%20access.pdf

https://www.ccna6rs.com/13-1-10-packet-tracer-configure-a-wireless-network-answers/

116
MODULE 7: Building DNS and Web Server

A. Introduction:

A Domain Name System (DNS) server resolves host names into IP addresses.
Although we can access a network host using its IP address, DNS makes it easier by
allowing us use domain names which are easier to remember. For example its much
easier to access google website by typing http://www.google.com as compared to typing
http://208.117.229.214. In either case, you’ll access google website, but using domain
name is obviously easier.

Now, before any host can use a DNS service, we must configure a DNS server first.
For example, when you type the URL http://www.google.com in your browser, the host
will query the DNS server for the IP address of http://www.google.com. The DNS server
will resolve http://www.google.com into an IP address then answer back the host with
the IP address.

B. Objectives:

1. The Domain Name System (DNS) is an important part of the internet;


2. providing a way to map names (a website you're seeking) to numbers (the
address for the website);
3. Configure DNS Server;
4. Configure Webserver
5. Configure DNS Client;

117
C. Learning Content:

● The Domain Name System and Web Service.

D. Pre-test:

1. What is DNS Server?


2. What is Web Server?

E. Learning Activities:

Now let’s configure a DNS server in Packet Tracer.

1.Build the network topology.

2.Configure static IP addresses on the PCs and the server.

Server

IP address: 192.168.1.2 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.1


DNS Server: 192.168.1.2

118
PC0

IP add: 192.168.1.3 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.1 DNS


server: 192.168.1.2

119
PC1

IP address: 192.168.1.4 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.1


DNS Server: 192.168.1.2

3.Configure DNS service on the generic server.

To do this, click on the server, then Click on Services tab. Click on DNS server from the
menu. First turn ON the DNS service, then define names of the hosts and their
corresponding IP addresses.

For example, to specify the DNS entry for PC0: In the name and address fields, type:

Name: PC0 Address: 192.168.1.3

Click on add then save. Repeat this for the PC1 and the server.

Once you’re done, your DNS entries will look like this:

120
Finally,

4. Test domain name – IP resolution.

Ping the hosts from one another using their names instead of their IP addresses. If the
DNS service is turned on and all IP configurations are okay, then ping should work.

For example, ping PC1 from PC0. Ping should be successful.

121
Experiment 6

Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.

Let’s apply to your simulation software using the Cisco Packet Tracer.

Vlog and save it then email to tatayphinks@gmail.com.

Examining Network Address Translation (NAT)

Topology Diagram

122
Aim:

Examine NAT processes as traffic traverses a NAT border router.

Background / Preparation

In this activity, you will use Packet Tracer Simulation mode to examine the contents of
the IP header as traffic crosses the NAT border router.

Step 1: Prepare the network for Simulation mode.

Verify that the network is ready to send and receive traffic. All the link lights should be
green. If some link lights are still amber, you can switch between Simulation and
Realtime mode several times to force the lights to turn green faster. Switch to
Simulation mode before going to the next step.

Step 2: Send an HTTP request from an inside host to an outside web server.

Click Customer PC. Click the Desktop tab and then Web Browser. In the URL field, type
the web

address for the ISP server (www.ispserver.com). Make sure that you are in Simulation
mode, and then

click Go.

In the event list, notice that Customer PC queues a DNS request and sends out an ARP
request. You can view the contents of the ARP request by either clicking on the packet
in the topology or clicking on the packet color under Info in the Event List window.

In the event list, notice that Customer PC queues a DNS request and sends out an ARP
request. You can view the contents of the ARP request by either clicking on the packet
in the topology or clicking on the packet color under Info in the Event List window.

123
In the PDU Information at Device: Customer PC window, which IP address is Customer
PC attempting to find a MAC address for? ______________________

In the Event List window, click Capture/Forward twice. Which device answers the ARP
request from Customer PC? Which MAC address is placed inside the ARP reply?
________________________________________________________________

In the Event List window, click Capture/Forward twice. Customer PC accepts the ARP
replay and then builds another packet. What is the protocol for this new packet? If you
click Outbound PDU Details for this packet, you can see the details of the protocol.
_________

In the Event List window, click Capture/Forward twice. Click the packet at the
www.customerserver.com server. Then click the Outbound PDU Details tab. Scroll
down to the bottom to see the Application Layer data. What is the IP address for the ISP
server?

________________________________________________________________

In the Event List window, click Capture/Forward twice. Customer PC now formulates
another ARP request. Why?

________________________________________________________________

In the Event List window, click Capture/Forward seven times until the HTTP reply
reaches Customer Router. Examine the contents of the HTTP reply and notice that the
inside local and global addresses have changed again as the packet is forwarded on to
Customer PC.

Step 3: Send an HTTP request from an outside host to an inside web server.

Customer Server provides web services to the public (outside addresses) through the
domain name www.customerserver.com.

Follow a process similar to Step 2 to observe an HTTP request on ISP Workstation.

a. Click ISP Workstation. Click the Desktop tab, and then Web Browser. In the URL
field, type the Customer Server web address (www.customerserver.com). Make
sure that you are in Simulation mode, and then click Go.
b. You can either click Auto Capture/Play or Capture/Forward to step through each
stage of the process. The same ARP and DNS processes occur before the ISP
Workstation can formulate an HTTP request. c. When the HTTP request arrives
at Customer Router, check the packet contents. What is the inside local
address? What is the inside global address?
________________________________________________________________

Experiment-7

124
Configuring a Default Route

Topology Diagram

Aim:

● Configure a default route on a router.

Background / Preparation

In this activity, you will configure a default route on the Cisco 1841 Customer router.
The default route configuration uses the WAN IP address on the Cisco 1841 ISP router.
This is the next-hop router from the Cisco 1841 Customer router.

Step 1:

Verify reachability from CustomerRouter to the LAN IP address on the ISP router.

a. Use terminal emulation software on the Customer PC to connect to the customer


Cisco 1841 router. Use cisco123 for the console password.
b. Use the ping command to verify if the LAN IP address 209.165.201.1 on the ISP
router is reachable from the CustomerRouter

CustomerRouter>ping 209.165.201.1

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 209.165.201.1, timeout is 2 seconds:

.....

Success rate is 0 percent (0/5)

Step 2:

Configure the default route.

125
a. Enter privileged EXEC mode using the password cisco. The CustomerRouter#
prompt indicates that you are in privileged EXEC mode.
b. Enter global configuration mode. The CustomerRouter(config)# prompt indicates
that you are in global configuration mode.
c. Configure a default route using the ISP WAN IP address as the next hop IP
address.

CustomerRouter(config)#ip route 0.0.0.0 0.0.0.0 209.165.200.226


CustomerRouter(config)#end

Step 3:

Verify the default route configuration.

a. Use the show ip route command to verify the configuration of the default route.
This is a partial example of the output.

CustomerRouter#show ip route

Codes: C - connected, S - static,...

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 209.165.201.1, timeout is 2


seconds: !!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 22/25/34 ms

Step 4: Save the configuration.

a. From privileged EXEC mode, save the running configuration to the


startup configuration.

i. CustomerRouter#copy run start

b. Click the Check Results button at the bottom of this instruction window
to check your work.

Reflection

You can now access the entire ISP network. Write down some issues and
considerations to discuss with your classmates about this configuration. Here are two
questions to begin with:

1. Is this type of access to the ISP LAN likely to happen in the real world?
2. Why has the student activity been configured to allow this type of access?

F. Assessment:

126
Multiple choice: 5 points each. Answer in google form link here: bit.ly/38VIAOV

1. A DNS client is also called as:

a. DNS updater
b. None of the mentioned
c. DNS resolver
d. DNS handler

2. How many domains are there in https://www.networkwalks.com?

a. 1
b. 4
c. 3
d. 2

3. Allows clients to access text, images and videos through browser.


a. hypervisor server
b. database
c. application
d. web server

4. These manage databases, allowing users to access and edit them (think, amazon or
netflix)
a. web server
b. hypervisor server
c. application
d. database

5. Manages HTTP and HTTPS requests to display the website on your client device
a. application
b. database
c. hypervisor server
d. web server

G. Reference:

https://www.slideshare.net/AbdulBasit58/packet-tracer-tutorial-2

https://www.packettracernetwork.com/labs/lab1-basicswitchsetup.html

https://www.cisco.com/c/en/us/td/docs/security/security_management/cs-mars/4-
3/user/guide/local_controller/cfgrtrsw.html

127
MODULE 8: Building Email and FTP Server

A. Introduction:

An email server, such as Gmail stores and sends email messages to email clients on
request. We often send and receive emails on our mobile devices or computers. Have
you ever imagined how this happens? Well, whenever you compose and send an email
to another person, the message you send first goes to a mail server. It’s the mail
server which then sends the email when it is requested from the email client(e.g Gmail
App) of the recipient’s device.

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer
of computer files between a client and server on a computer network.

FTP employs a client-server architecture whereby the client machine has an FTP
client installed and establishes a connection to an FTP server running on a remote
machine. After the connection has been established and the user is successfully
authenticated, the data transfer phase can begin.

128
Worth noting: Although FTP does support user authentication, all data is sent in clear
text, including usernames and passwords. For secure transmission that protects the
username and password, and encrypts the content, FTP is often secured with SSL/TLS
(FTPS) or replaced with SSH File Transfer Protocol (SFTP).

B. Objectives:

● To build an Email Server;


● To Build an FTP server;

C. Learning Content:

● The Email and FTP Server

D. Pre-test:

1. What is the purpose of Email Server?


2. What is the difference between FTPS and SFTP?

E. Learning Activities:

Let's configure a mail server in Packet Tracer. And have in mind that although our main
focus is configuring an email server, we’ll still need services of a DNS server at one
point.

1. Build the network topology:

2.Configure IP addresses on the PCs, DNS Server and the Mail Server.

129
Mail Server IP address: 192.168.1.2/24

PC0 IP address: 192.168.1.3/24

PC1 IP address: 192.168.1.4/24

DNS server IP address: 192.168.1.5/24

3. Now configure mail clients on the PCs and mail service on the generic server.

Mail Clients:

Click on PC0. Go to its Desktop tab, and click on Email. Configure the email client by
filling in the user, server and login information. Be sure to Save.

PC0:

Configure mail client on PC1 in a similar way we did for PC1.

130
PC1:

Next, we’ll configure the email server.

To do this, click on the server, then click Services tab, pick email server from the menu.

Provide the Domain name of the server then click on Set to set it. In this example I’ve
used the name ‘mail.com’ .

Proceed and add users and provide their passwords. I have two email clients(users)
with usernames ‘client1‘ and ‘client2‘ with a common password ‘adminkim‘

After entering a username and password, click on Add(+) to add the user to the server.
You can optionally remove a user by clicking on Remove (-). You can change a user’s
password by clicking on change password.

131
Try to relate this process to what happens when you register an email account with a
mail service provider(mail server) like Gmail. The processes appear to agree, isn’t it?

Now, notice that we set a domain name for the email server. For that reason, we should
have a DNS server that will resolve this domain name (plus other domain names if there
were) to an IP address.

So let’s configure a DNS server.

Click DNS server, click Services tab, then pick DNS. Turn the service ON. Set name-
address pairs and add them to the server. You can view the DNS entry below:

132
4. Lastly test the email service. Go to PC0 email client, compose an email and send its
to PC1 email address (client2@mail.com).

Try to see whether the email from PC0 is received on PC1. On the email client of PC1,
click on Receive.

133
If everything is well set up, the email from PC0 will be well received on PC1.

Configure an FTP server in Packet Tracer

Let’s now do FTP configuration in Packet Tracer:

1.Build the network topology.

2. Configure static IP addresses on the Laptop and the server.

Laptop: IP address: 192.168.1.1 Subnet Mask: 255.255.255.0

Server: IP address: 192.168.1.2 Subnet Mask: 255.255.255.0

134
3. Now try using an FTP client built in the Laptop to send files to an FTP server configured in
the Server.

From the Laptop’s command prompt, FTP the server using the server IP address by typing:

ftp 192.168.1.2

Provide the username(cisco) and password(cisco) [which are the defaults] for ftp login.

You are now in the FTP prompt .

PC0 has an FTP client which can be used to read, write, delete and rename files present in the
FTP server.

The FTP server can be used to read and write configuration files as well as IOS images.
Additionally, the FTP server also supports file operations such rename, delete and listing
directory.

With that in mind, we can do something extra. So let’s do this:

4. Create a file in the Laptop then upload it to the server using FTP.

To do this, open the Text Editor in the Laptop, create a file and give it your name of choice.

Type any text in the editor then save your file. e.g. myFile.txt.

5. Now upload the file from the Laptop to the server using FTP. (An FTP connection has to be
started first. But this is what we’ve done in step 3)

So to do an FTP upload, we’ll type:

put MyFile.txt

135
6. Once file upload is successful, go to the Server FTP directory to verify if the file sent has
been received . To do this, go to Server-> Services->FTP. Here look for MyFile.txt sent from
the laptop.

Something extra: To check other FTP commands supported by the FTP client running on the
Laptop(or PC), you can use a question mark (?) on the Laptop’s command prompt as shown
below:

You can see the put command that we used to upload our file to the FTP server. Other
commands listed include:

136
get-used to get(download) a file from the server.

For example: get MyFile.txt

delete– to delete a file in the FTP directory with the server

For example: delete MyFile.txt

Rename– used to Rename a file

cd – used to change directory.

For example, we can open an HTTP directory in the server by typing: cd /http. This will change
the current directory from FTP directory to HTTP directory

Once the http directory is open, you can upload a file to the HTTP server. You’re now uploading
a file to an HTTP folder(directory) using FTP.

For example: put MyFile.txt

To see this working, let’s open an HTTP directory and upload(put) a file to it using FTP:

You can now check up in the HTTP directory in the server and verify that the file uploaded
from the Laptop(MyFile.txt) is well received:

137
Notice that we are uploading files to an HTTP Server directory using File Transfer Protocol.
(FTP). This is what actually happens when you use an FTP client such as FileZilla client to
upload files to a website. In our case here, we are using an FTP client built-in the Laptop.

This may interest you: The first FTP client applications were command-line programs developed
before operating systems had graphical user interfaces, and are still shipped with most Windows
and Linux operating systems. (Actually this is what we have been using this far). Many FTP
clients(e.g. FileZilla) and automation utilities have since been developed for desktops, servers,
mobile devices, and hardware. FTP has also been incorporated into productivity applications,
such as HTML editors.

Well done for reading this topic up to this point! You now have more than a foundation
regarding working with FTP to upload, download, delete, rename…files.

If you’re okay so far, then let’s do something even more interesting…

We’ll create an html file in our Laptop, upload it to HTTP server directory using FTP, then try
to access the file from the Laptop’s browser.

So psych up and let’s move on!

138
On the Laptop, open the text editor, then type some markup(html) and save the file with the
extension .html. See all this below:

Save your file as an html file like this:

Now upload the file( File2.html) to the HTTP server using FTP. This is easy. We’ve already
done it previously!

If you’re already in the HTTP directory, you just need to type: put File2.html. If no, first ftp the
server(ftp 192.168.1.2), provide the login username(cisco) and password(cisco); change the
current directory to HTTP(cd /http) , and finally upload the html file onto the HTTP
directory(put File2.html)

139
Moving on…

Check whether the html file uploaded has been received in the HTTP directory:

Go to Server->Services-> HTTP. Then look up for the file in the File Manager.

Now edit index.html file in the HTTP directory so as to include a link to File2 that we’ve just
uploaded. This will make File2 accessible from the Laptop’s browser. To do this, locate

140
index.html then click edit. Proceed to edit it as shown below. Then save and accept overwrite.

Finally, try to access the newly uploaded file from the Laptop’s browser.

So go to the Laptop’s browser and access the server using the server’s IP address. By doing this,
the browser is making an http request to the server. The server will respond to the Laptop with
the index.html file containing a link to File2 which we’ve uploaded from the Laptop using FTP.

141
Click File2 link to view the contents of the file in the browser.

Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.

F. Assessment:

Multiple choice: 5 points each. Answer in google form link here: bit.ly/3z0aEeA

1. What port does a sever listen to for FTP requests?


a. 21
b. 20
c. 6000
d. 6001

2. From what port does FTP server send data and information?
a. 20
b. 21
c. 6000
d. 6001

3. What does FTP stand for?


a. File Transfer Protocol

142
b. Fixed Transfer Protocol
c. Field Translation Protocol
d. Frame Transfer Protocol

4. Generally, when you receive an email, it will appear in your _________.


a. Message pane
b. Calendar
c. Inbox
d. Compose pane

5. What does ‘E-Mail’ stand for?


a. Everywhere mail
b. Electronic mail
c. Electric mail
d. Eagle mail

G. Reference:

https://computernetworking747640215.wordpress.com/2018/07/05/configuring-a-mail-
server-in-packet-tracer/

https://www.slideshare.net/sotheakonpov/how-to-create-mail-server-in-cisco-packet-
tracer

https://computernetworking747640215.wordpress.com/2019/11/22/how-to-configure-an-
ftp-server-in-packet-tracer/

143

You might also like