Professional Documents
Culture Documents
Prepared by:
Professor
INTRODUCTION
Networks are everywhere—or so it seems. You can hardly do anything with data that
does not involve a network. Like the human networks that we are all part of, computer
networks let us share information and resources. In business, the reliance on networks
is even more pervasive than in homes or schools. Networks help individuals and
1
businesses alike save money, but they also help create income. Without a doubt,
networking within the home will catch on over the next few years as it has in business.
Soon, nearly all individuals in even moderately developed nations will have networked
components throughout their homes. Those that don’t will be netologically
disadvantaged because they will not be able to learn or to function at the same level as
those who are networked.
In this chapter, you’ll begin by relating networks to situations and concepts you already
know. Once you have a basic understanding of what networks are and what they can
do, it helps if you can actually begin working with them. In fact, it is so helpful to learn
the ropes of networking through hands-on guided practice that that’s what is planned for
you here. You will play the role of an employee in a fictional company, and you’ll have to
learn on the job. The more you become the person, the more you will learn about the
need for and operation of computer networks.
TABLE OF CONTENTS
2
3 CROSSOVER AND STRAIGHT-THROUGH CABLE 58
A. Introduction:
3
It would be impossible to build networks and connect network-enabled devices reliably
without network standards.
B. Objectives:
C. Learning Content:
D. Pre-test:
1. What is a router? Write the internet function of the router in the network?
2. What do you think are the steps of configuration of a router?
E. Learning Activities:
Repeater
Physical View
4
Logical View
A repeater is a two-port device that repeats network signals. Repeaters are used when
network devices are some distance from each other. The repeater doesn't modify or
interpret data packets before it resends them, and it doesn't amplify the signal. Instead,
it regenerates the data packet at the original strength, bit by bit.
Bridge
Physical View
Logical View
A bridge divides a network into network segments and can filter and forward data
packets between these segments. Bridges use the network device's MAC address to
decide the data package's destination. Typically, a bridge is used to improve network
performance by reducing unnecessary network traffic on network segments.
Hub
Physical View
5
Logical View
A hub acts as a multiport repeater on a network. Hubs are used to connect more than
one device and structure the layout of a network. For example, you can cascade hubs
to create network branches or as an endpoint to create a star layout with multiple user
type devices. Hubs contain multiple ports that act as an input/output Ethernet
connection between the hub and a network device. A hub can operate at only one
speed, which is the speed of the slowest network device on the network. It doesn't
interpret or filter data packets and sends copies of each data packet to all attached
devices.
Types of hubs
● Fast Ethernet: This hub is used for 100-Mbps networks and comes as Class I
and Class II type hubs. The primary difference between the two is the amount of
delay in data transmission. A Class I hub introduces a signal delay of up to 140-
bit times. A Class II hub has a delay of up to 96-bit times. The delay allows for
the transcoding of data between different base types. Only two Class II hubs can
be used in a hub-based network. Class II hubs increase the likelihood of packet
collisions because of their higher speeds.
● Dual speed: With a traditional hub network, the speed of the network was
governed by the slowest network device attached. For example, if you had 10-
Mbps and 100-Mbps devices connected to a network, the speed of the whole
network was only 10 Mbps. Dual-speed hubs solve the problem by acting as a
bridge between the two different-speed devices.
Hubs are used for small ad-hoc networks of a few devices, but they're rarely used at an
enterprise level.
6
Switch
Physical View
Logical View
A switch combines the functionality of a bridge and a hub. It segments networks and
can interpret and filter packet data to send it directly to an attached network device.
Switches use the network device's MAC address to decide the data package's
destination. A switch operates in full-duplex mode, which means it can send and receive
data to and from network devices at the same time.
Router
Physical view
Logical View
Routers link networks with different ranged addresses together. They can interpret and
filter data packets, and then forward them to the correct network. Routers use the
network device's IP address information to route the data package to its destination.
Most routers can now detect issues with data traffic that flows to any attached network
and route or reroute it around the issue. A router is also called a gateway. When you
configure network devices, you'll usually configure it with a default gateway IP address.
7
Interconnectivity
Routers in an interconnected network maintain a routing table that lists the preferred
route between each of the networks. The router acts as the start of authority for all the
network devices on its network. Routing information is shared between routers by using
a routing protocol like the Border Gateway Protocol (BGP).
Types
The majority of routers use the BGP to share routing information. The type of
information shared depends on the usage of the router and the functions they use.
There are several distinct classifications or types of routers available to service different
network needs.
Wireless router
Physical View
8
Logical View
This network device provides all the routing capabilities of a regular access router, but it
also offers wireless access point functions. A wireless router or wireless access point is
designed to provide a non-wired connection to your network. Any provision to access
the internet or other networks is handled by an edge router associated with your
network. A wireless router lets you build a different type of network called a wireless
local area network.
Cisco Routers
Cisco Switch
Cisco Connections
9
Configuring PCs, Laptops, Tablet PCs, and PDAs
You can configure the global settings and interface settings on the PC, laptop, tablet
PC, and PDA end devices with the Config tab. Additionally, the Desktop tab provides
tools to configure IP settings, configure dial-up settings, use a terminal window, open a
host command line interface, open a web browser, configure Linksys wireless settings,
establish a VPN connection, generate PDUs, and issue SNMP requests.
Global Settings
In the global settings, you can change the Display Name of the end device. You may set
the end device to either automatically obtain IPv4 or IPv6 configurations with DHCP or
manually set the Gateway and DNS Server with Static. For IPv6, Auto Config will
automatically configure the Gateway and DNS Server IP addresses.
10
Algorithm Settings
In the Algorithm Settings, you can override the global Algorithm Settings by removing
the checkmark from Global Settings and then setting your own values for the Maximum
Number of Connections, Maximum Number of Opened Sessions, and Maximum
Retransmission Timeout in Milliseconds.
Interface Configuration
PCs and laptops support Ethernet (copper or fiber), modem, and wireless interfaces. On
the tablet PC and PDA, only the wireless interface is supported. In general, you can set
the interface Port Status, Bandwidth, Duplex, MAC Address, SSID, IP Address, Subnet
Mask, Link Local Address, and IPv6 Address. These options vary slightly for each
interface type.
IP Configuration Utility
11
On the Desktop tab, click the IP Configuration icon to bring up the configuration utility. If
the end device is connected to a DHCP configured router or server, you can use DHCP
to automatically obtain the IP configuration by clicking on the DHCP button. Otherwise,
you may use the Static button to manually set the IP configuration.
● The router has a modem, and you have established user name
authentication on the router (using the Cisco IOS global configuration mode
command username WORD password LINE).
12
● The modem ports on the cloud have valid phone numbers.
● You entered the correct user name, password, and number to dial on the
modem utility of the PC or laptop.
If all the requirements are met, click the Dial button to make the call. The status line (as
well as link lights) will tell you if the connection is successful. Note that you still must
configure all relevant IP settings manually if you want to ping between the router and
the PC or laptop. Use the Disconnect button to terminate the connection at any time.
Terminal Utility
If the end device is connected to a router or a switch by a console connection (using the
RS 232 port on the PC), use the Terminal application to gain access to the Command
Line Interface (CLI) of the device. In the Desktop tab, click the Terminal icon to bring up
this utility. Choose the appropriate port configuration parameters for the console
session, and then click on the OK button. The Terminal window appears with the CLI of
the device.
13
Command Prompt Utility
14
On the Desktop tab, click the Command Prompt button to bring up the command line
utility. At the prompt, you can issue the following commands:
● ?
● arp
● delete
● dir
● ftp
● help
● ipconfig
● netstat
● nslookup
● ping
● snmpget
● snmpgetbulk
● snmpset
● ssh
● telnet
● tracert
15
Web Browser Utility
On the Desktop tab, click the Web Browser button to bring up the web browser. The
web browser allows you to access a web server or the Linksys Web Configuration
interface. If the end device is directly or indirectly connected to a server with HTTP
service enabled, you can type in the IP address of the server to access the website on
the server. If the end device is connected to a properly configured DNS server, covered
in another help topic, you can type in the domain name of the server. If the end device
is connected to a Linksys WRT300N wireless router, you can type in the IP address of
the Linksys WRT300N wireless router to access the Linksys Web Configuration. A
prompt will appear asking for user name and password. The default is admin for both
user name and password.
16
PC Wireless Utility
On the Desktop tab, click the PC Wireless button to bring up the wireless client
software. Note that the Linksys-WMP300N wireless hardware module is required for
access so only PCs and laptops are supported. In the Linksys wireless client software,
you can check Link Information to view wireless network status and statistics, Connect
to any available Linksys wireless networks within range, and add/edit/delete Profiles to
connect to wireless routers not broadcasting their SSID.
17
VPN Utility
On the Desktop tab, click the VPN button to bring up the VPN client utility that allows
you to create a VPN connection to a VPN server. To create a VPN connection, enter the
GroupName, Group Key, Host IP (Server IP), Username, Password, and then click
on the Connect button. To disconnect the VPN connection, click on the Disconnect
button.
18
Traffic Generator Utility
The Traffic Generator utility is similar in functionality to the Add Simple PDU and Add
Complex PDU tool in the Common Tools Bar, but with some key differences. First of
all, when you load a save file, packets are not sent automatically by a Traffic Generator.
The Traffic Generator utility must be open to generate traffic, although it can be
minimized. Another key difference is that the Traffic Generator is unable to send
multiple PDUs simultaneously.
Visually, the Traffic Generator is similar to the Add Complex PDU dialog with some
exceptions. Instead of a One Shot parameter, the Traffic Generator has a Single Shot
option. There is no field to enter a time value to send the PDU as the PDU will be sent
the moment you click on the Send button. With the Periodic option, when you click on
the Send button, the Send button will become a Stop button and the dialog will become
gray. The Traffic Generator will then send a PDU at the interval that you entered. If you
want to stop sending PDUs, click on the Stop button or close the utility.
19
PDUs generated by the Traffic Generator are not added to the User Created PDU Window. As
such, if you want to see if the PDUs failed or were successful, you will need to view the PDU's
status in Simulation Mode.
20
Cisco IP Communicator Utility
On the Desktop tab, click the Cisco IP Communicator button to place or answer a
call. To place a phone call, enter the number of the recipient phone using the keypad
and then click the Dial button. Alternatively, you may click the NewCall button or
Speakerphone button first and then enter the recipient's number. If you accidently enter
an incorrect number, you may click the Cancel button to clear. Once the call has been
placed, a message will indicate that the phone is ringing on the recipient's phone. To
answer a call with the Cisco IP Communicator, click the Answer button. Once the
recipient has answered the call, the status message will indicate that the Cisco IP
Communicator is connected and a green light will show. While the call is still active,
click on the Do, Re, or Mi buttons to send the respective sounds to the recipient. A
message stating that the sound is playing will be displayed in case sound is disabled.
To end the call, click the EndCall button. For the best possible experience while making
calls, be sure that Sound is enabled in Preferences.
If you want configure the Cisco IP Communicator to use a different TFTP server from
the default TFTP server, follow these steps. On the upper right-hand corner of the Cisco
IP Communicator GUI, there are four buttons above the words "Cisco IP Phone." Click
on the first button from the left to open a context menu and then select Preferences.
21
Select the option Use these TFTP Servers: and then enter the IP address of the TFTP
server that you wish to use.
Email Utility
On the Desktop tab, click the Email button to bring up the email client. On the first
launch of the email client, you will need to configure the parameters Your Name, Email
Address, Incoming Mail Server, Outgoing Mail Server, User Name, and Password
in order to send and receive email. Once the email client has been configured, you may
Compose, Receive, view, and Delete emails. If you need to change configuration, click
on the Configure Mail button to open the email configuration dialog.
22
PPPoE Dialer Utility
On the Desktop tab, click the PPPoE Dialer button to bring up the PPPoE Dialer utility.
This utility allows you to establish a point-to-point connection to a PPPoE server. To
establish a PPPoE connection, enter the User Name and Password and then click on
the Connect button. To disconnect the PPPoE connection, click on the Disconnect
button.
23
Text Editor Utility
On the Desktop tab, click the Text Editor icon to bring up the text editor. You can
create New text files, Open existing text files, and Save text files through the File menu
in the text editor. There are no formatting choices available in the text editor.
24
Configuring Servers
The Config tab offers three general levels of configuration: global, services, and
interface. To configure at the global level, click the GLOBAL button to expand the
Settings button (if it has not already been expanded). To configure services, click the
SERVICES button to expand the list of services, and then choose the service. To
configure an interface, click the INTERFACE button to expand the interface, and then
choose the interface. Additionally, the Desktop tab provides tools to configure IP
settings, open a host command line interface, and generate PDUs.
25
Global Settings
In the global settings, you can change the Display Name of the server. You may set the
server to either automatically obtain IPv4 or IPv6 configurations by selecting the DHCP
button or manually set the Gateway and DNS Server using the Static button. For IPv6,
Auto Config will automatically configure the Gateway and DNS Server IP addresses
and Static allows the data to be manually supplied.
Algorithm Settings
In the Algorithm Settings, you can override the global Algorithm Settings by removing
the checkmark from Global Settings and then setting your own values for the
Maximum Number of Connections, Maximum Number of Opened Sessions, and
Maximum Retransmission Timeout in Milliseconds.
26
In the HTTP service configuration, you can edit the included HTML pages such as
index.html, helloworld.html, and image.html using the following supported HTML
tags:
● a
● address
● b
● big
● blockquote
● body
● br
● center
● cite
● code
● dd
● dfn
● div
● dl
● dt
● em
● font
● h1
● h2
● h3
● h4
● h5
● h6
● head
● hr
● html
● i
● img
● kbd
● meta
● li
● nobr
● ol
● p
● pre
● qt
● s
27
● samp
● small
● span
● strong
● sub
● sup
● table
● tbody
● td
● tfoot
● th
● thead
● title
● tr
● tt
● u
● ul
● var
Additionally, you can also add or remove HTML files from the server. When a PC
accesses an HTML page on the server using the Web Browser, the HTML page will
load in the Web Browser.
28
DHCP Service Configuration
In the DHCP service configuration, you can set up a DHCP server with many different
IP address pools. To add a DHCP pool, enter the Pool Name, Default Gateway, DNS
Server address, Starting IP address to lease, Subnet Mask, and the Maximum
number of Users, then click Add. If you want to make changes to an existing DHCP
pool, select the pool from the list and edit the fields you want to make changes to, and
then click Save. If you want to remove a DHCP IP address pool from the server, select
the pool from the list and click Remove.
29
DNS Service Configuration
In the DNS service configuration, you can set up a DNS server to translate domain
names with different types of resource records, which are basic data elements in the
Domain Name System. Packet Tracer currently supports four different types of resource
records: Address (A), Canonical Name (CNAME), SOA (Start of Authority), and NS
(Name Server). An Address (A) record is the most common type of resource record
where its core functionality is to map a hostname to an IPv4 address. A CNAME record
is used to specify that a domain name is an alias of another, canonical domain name.
An SOA record is used to specify authoritative information about a DNS zone, including
the primary name server, the email of the domain administrator, and several timers
relating to refreshing the zone. An NS record is used to delegate a DNS zone to use a
given authoritative name server.
To add a resource record, enter the Name of the resource record, select a Type of
resource record, and then enter all required fields pertaining to the resource record such
as Address for A Record, Host Name for CNAME, or Server Name for NS Record and
then click Add. To modify an existing resource record, select the resource record from
30
the list, edit the fields you want to change, and then click Save when you are done. If
you want to remove a resource record, just select the resource record from the list and
click Remove.
When you click on the DNS Cache button, you can view all of the queries cached by the
DNS server. The cached queries will be retained on the DNS server for a period of time
(TTL) set on the record stored on the SOA DNS server.
31
SYSLOG Service Configuration
In the SYSLOG service configuration, there are no parameters to set. The SYSLOG
service logs messages from routers and switches in the network. For each entry, the
Time, HostName, and the actual Message are logged in the server.
32
AAA Service Configuration
In the AAA service configuration, you can set up the server to be a RADIUS or
TACACS server. To add a RADIUS or TACACS server, enter the Client Name, Client
IP, Secret key, select either Radius or Tacacs as the Type of AAA server, and then
click on the + button. To remove a AAA server, select the AAA server entry in the list
and click on the - button. In addition to configuring the AAA server, you also need to add
authorized users. To add authorized users, enter the UserName and Password for the
user and click on the + button. If you want to remove a user, select the user from the list
and click on the - button.
33
NTP Service Configuration
In the NTP service configuration, you can set up the server to be an NTP server so that
the date and time on the configured routers and switches are synchronized. By default,
the date and time on the server is synchronized with your local machine. If you wish,
you can manually set the time and date by selecting the date on the calendar display
and incrementing or decrementing the time display. You can also set up
Authentication by clicking on Enable and then entering a Key and Password.
34
Email Service Configuration
In the Email service configuration, you can set up the server to use the SMTP and/or
POP3 protocol(s). To configure an email server, first enter a Domain Name and then
click the Set button. Next, enter a User name and Password then click the Add button
to create an email account. To change a password on an email account, select the
desired email account from the list and click Change Password button. A dialog will
appear allowing you to enter the new password. To delete an email account, select the
desired email account from the list and click the Delete button.
35
FTP Service Configuration
In the FTP service configuration, you can add and remove FTP accounts, modify FTP
account permissions, and remove files from the FTP service. To add an FTP account,
enter a UserName and Password. Then, select which permissions you would like the
user to have such as Write, Read, Delete, Rename, and List. Finally, click the Add
button to create the FTP account. To remove an FTP account, select the desired FTP
account from the list and click on the Delete button. If you want to remove files from the
FTP service, select the desired file from the file list and click on the Remove button.
36
Interface Configuration
Servers can support two interfaces. You can choose from Ethernet (copper or fiber),
modem, or wireless interfaces. In general, you can set the Port Status, Bandwidth,
Duplex, MAC Address, IP Address, Subnet Mask, Link Local Address, and IPv6
Address. These options vary slightly for each interface type.
IP Configuration Utility
On the Desktop tab, click the IP Configuration icon to bring up the configuration utility.
If the end device is connected to a DHCP configured router or server, you can use
DHCP to automatically obtain the IP configuration by clicking on the DHCP button.
Otherwise, you may use the Static button to manually set the IP configuration.
37
● ?
● arp
● delete
● dir
● ftp
● help
● ipconfig
● ipv6config
● netstat
● nslookup
● ping
● snmpget
● snmpgetbulk
● snmpset
● ssh
● telnet
● tracert
38
PPPoE Dialer Utility
On the Desktop tab, click the PPPoE Dialer button to bring up the PPPoE Dialer utility.
This utility allows you to establish a point-to-point connection to a PPPoE server. To
establish a PPPoE connection, enter the User Name and Password and then click on
the Connect button. To disconnect the PPPoE connection, click on the Disconnect
button.
VPN Utility
On the Desktop tab, click the VPN button to bring up the VPN client utility that allows
you to create a VPN connection to a VPN server. To create a VPN connection, enter the
GroupName, Group Key, Host IP (Server IP), Username, Password, and then click
on the Connect button. To disconnect the VPN connection, click on the Disconnect
button.
Connections / Links
Packet Tracer supports a wide range of network connections. Each cable type can only
be connected to certain interface types.
39
Fiber media is used to make connections between fiber ports (100
Fiber Mbps or 1000 Mbps).
Phone line connections can only be made between devices with
Phone modem ports. The standard application for modem connections is
an end device (such as a PC) dialing into a network cloud.
Coaxial media is used to make connections between coaxial ports
Coaxial such as a cable modem connected to a Packet Tracer Cloud.
When the network contains routers or switches, develop a habit of saving their running
configurations to the startup configuration before you press their power buttons (or the Power
Cycle Devices button).
40
compatible modules on the left. You can interact with the device by pressing its power button,
adding a module by dragging it from the list into a compatible bay, or removing a module by
dragging it from the bay back to the list. You can also zoom in and out of the photo with the
zoom controls. The pages in this section show all of the Packet Tracer devices and their
supported modules. On these pages, you can click on the thumbnail image of each device or
module to view a larger image.
The configuration options for all other devices are relatively simple. In general, you can
change their display names in their global settings sub-panel and make changes to
basic settings on each interface.
Bridges
41
A bridge is basically a simplified two-port switch. It does not have VLAN or trunking
functions. The available settings for its two Ethernet ports are Port Status, Bandwidth,
and Duplex.
Repeaters
A repeater is a simple two-port device that regenerates the signal it receives on one port
and forwards it out the other port. Its port settings cannot be modified.
Hubs
A hub is a multiport repeater that regenerates the signal it receives on one port and
forwards it out all other ports except the incoming port. Its port settings cannot be
modified.
Access Points
An access point is modeled as a repeater with one wireless port and one Ethernet port.
In the settings for the wireless port, you can toggle the Port Status, set the SSID,
Channel, and Authentication. You may set the authentication to WEP, WPA-PSK, or
WPA2-PSK. For WEP, you need to set the Key to a 10-digit hexadecimal value. For
WPA-PSK and WPA2-PSK, the PassPhrase needs to be 8-63 ASCII characters long
and the Encryption Type can be set to AES or TKIP. The available settings for an
access point's Ethernet port are Port Status, Bandwidth, and Duplex.
Basic and common CLI command of Cisco router and switch using packet tracer.
42
Continue with configuration dialog? [yes/no]: no
> - user only and read only access mode in the router and switch information.
# - full admin access to the router and switch.
>enable
#show version
#show running-config
#show VLAN
press q - to quit the current task.
Other CLI command will be available on the other module to practice and learn all CLI
commands on router and switch.
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.
F. Assessment
Multiple choice: 5 points each. Answer in google form link here: bit.ly/3nmfh0A
1. You are the new IT admin, and you need to find the network configuration. What
should you use?
a. ipconfig
b. netchange
c. cmd
d. newnet
3. A device used in a wired network that connects multiple computers and devices to
share data.
a. hub
b. router
43
c. modem
d. Server
5. What is the principal difference between hub routing and switch routing?
a. Hub routing sends all packets to all connected devices. Switch routing sends
packets to specific devices.
b. Hub routing sends packets to specific locations. Switch routing is only used to
route traffic between switches.
c. Hub routing sends all packets to all connected devices. Switch routing is only
used to route traffic between switches.
d. Hub is a type of switching mechanism of a packets to router.
G. Reference
https://managementmania.com/en/active-networking-hardware
https://blog.netwrix.com/2019/01/08/network-devices-explained/
https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-
gateways/
44
Module 2 - STATIC IP/Subnet Addressing
A. Introduction:
In essence it forms the Internet. It uses a logical addressing system and performs
routing, which is the forwarding of packets from a source.
B. Objectives:
C. Learning Content:
● Presenting the IPv4
D. Pre-test:
1. What is the purpose of IPv4?
2. What is IPv4 and how does it work?
E. Learning Activities:
IPv4
Internet Protocol version 4 was released in 1983 and is the standard for all packet-
switch-based networks in use today. IPv4 uses a 32-bit address space that gives an
upper limit of 4,294,967,296 (4.3 billion) unique logical IP addresses. A large number of
these available IP addresses are reserved for a specific purpose, for example, private
networks, local hosts, internet relays, documentation, and subnets.
The structure of an IPv4 address is four decimal numbers in the range of 0 to 255, each
separated with a dot. It's also known as the dotted-decimal format (octet). An example
of an IP address is 192.168.0.1.
There are two parts to an IP address, the network and the host. Let's use the address
192.168.0.1 as an example.
45
The network part of an IP address covers the first set of decimal numbers. In the
example, that's 192.168.0. This number is unique to the network and specifies the class
of the network. There are a number of network classes available, described next.
The host part of the IP address covers the next set of decimal numbers. In the example,
that's 1. This number represents the device and has to be unique within the network to
avoid address conflicts. Each device on a network segment must have a unique
address.
The Internet Protocol's local address space is split into five logical classes or ranges of
IP addresses, each represented by a letter of the alphabet.
For classes A, B, and C, the start and end IP addresses are reserved and shouldn't be
used. Class D is reserved for multicast traffic only. Class E is reserved and can't be
used on public networks, like the internet.
In the previous table, the last column is marked as a subnet mask. The subnet mask
uses the same format of the IP address. But its purpose is to identify valid IP addresses
in an IP range.
For example, assume you have an IP address range that starts at 192.168.0.1, and you
have a subnet of 255.255.255.0.You'll apply the subnet mask in the following way. For
each address segment value specified as 255 in the mask, the corresponding address
segment is static. When you want to pick an IP address, you have to pick an address
that matches 192.168.0. Where the segment has a value of 0, you're allowed to use any
46
value between 0 to 255. A subnet mask of 255.255.255.0 gives an IP address range of
192.168.0.0 to 192.168.0.255, which are valid values to select.
Experiment - 2
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.
• Classification of IP address
• Subnetting
As show in figure we teach how the ip addresses are classified and when they are used.
On the host computer, follow these steps to share the Internet connection:
2. Click Start, and then click Control Panel. 3. Click Network and Internet Connections.
4. Click Network Connections. 5. Right-click the connection that you use to connect to
the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want
under Dial-up
47
6. Click Properties. 7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to connect
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection
whenever a computer on my network attempts to access the Internet check box if you
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address
192.168.0. 1. Your computer may lose connectivity with other computers on your
network. If
these other computers have static IP addresses, it is a good idea to set them to obtain
their IP
addresses automatically. Are you sure you want to enable Internet Connection Sharing?
11. Click Yes. The connection to the Internet is shared to other computers on the local
area network (LAN).
The network adapter that is connected to the LAN is configured with a static IP address
of
To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IP
configuration, and then configure the client computer. To confirm the LAN adapter IP
48
2. Click Start, and then click Control Panel.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
254. For example, you can assign the following static IP address, subnet mask, and
default gateway:
8. IP Address 192.168.31.202
11. In the Local Area Connection Properties dialog box, click OK. 12. Quit Control
Panel.
All commands related to Network configuration which includes how to switch to privilege
mode
49
and normal mode and how to configure router interface and how to save this
configuration to flash memory or permanent memory.
• IP Commands
ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you
get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a
machine
50
Traceroute: Tracert is a command which can show you the path a packet of information
takes from your computer to one you specify. It will list all the routers it passes through
until it reaches its destination, or fails to and is discarded. In addition to this, it will tell
you how long each 'hop' from router to router takes.
nslookup: Displays information from Domain Name System (DNS) name servers.
NOTE :If you write the command as above it shows as default your pc's server name
firstly.
pathping: A better version of tracert that gives you statics about packet lost and
latency.
51
Let's draw in your short coupon bond draw and write and give further details IP address
and Subnet Address and Gateway in every computer when connecting the two
computers in 1 switch give example using straight-through and cross-over. Please label
it either straight-through or cross-over.
It will give me a clue if you have knowledge or idea of the logical topology of straight-
through or cross-over. Send me a selfie photo of your finished drawing product send to
my fb accounts and email tatayphinks@gmail.com.
F. Assessment:
Multiple choice: 5 points each. Answer in google form link here: bit.ly/3lteybp
1. What is the native protocol of the Internet, which is required for Internet connectivity?
52
3. What term refers to addresses that organizations use for nodes requiring IP
connectivity within enterprise networks, but do not require external connections to the
global Internet?
A. Private addresses
B. Public address
C. Dynamic Host Configuration Protocol (DHCP) addresses
D. Dynamic addresses
5. What term refers specifically to an IP address that has been manually configured on
a device by a network technician?
A. A static address
B. A dynamic address
C. A public address
D. A network address
G. Reference:
https://bluecatnetworks.com/glossary/what-is-ipv4/
https://docs.oracle.com/cd/E19683-01/806-4075/ipref-1/index.html
https://computernetworking747640215.wordpress.com/2019/11/12/switch-port-security/
A. Introduction:
53
The most common form of network cable is called “unshielded twisted pair” (UTP). This
cable format is used for the Ethernet wiring standards, which are managed by the
Institute of Electrical and Electronics Engineers (IEEE). These wiring standards are
referred to by the code 802.3. The Ethernet standards are open to anyone to read and
they include specifications of cable configurations and the types of connectors used to
plug cables into devices. What we conventionally know as a network cable is an 802.3
specified cable for Ethernet networks.
B. Objectives:
C. Learning Content:
● A simulation software named Cisco Packet Tracer for students that will do the
virtual learning.
● Practice the straight through and crossover connections in packet tracer.
D. Pre-test:
E. Learning Activities:
The distinction between a straight through, crossover, and rollover cable comes down to
the way that the connectors on each end are wired. A UTP cable contains eight wires.
Each individual wire is covered in a colored wire plastic coating and the entire bundle is
encased in an outer shell.
In the twisted pair configuration, the eight wires within the cable are split up into four
pairs. The two wires in a pair are twisted around each other. This treatment protects
both wires from interference. The pairing is easy to spot because one of the two is
encased in a coating of solid color while the other is white with a spiral stripe in the
pair’s color. This pair’s colors are:
● Green
● Orange
● Blue
54
● Brown
Cable connectors
The conventional name for the connectors on the ends of Ethernet cables is RJ-45. This
is not the proper name however, as the RJ-45 is a discontinued format of telephone
wire connector. The proper name for these connectors, according to the 802.3 wiring
standards is “8P8C“, which stands for “eight positions, eight connectors.” However,
don’t make a fuss if you hear a network technician call the connector an RJ-45. This is
the way everyone names these plugs and if you make a big thing about it, you’ll be
sitting by yourself in the break room at lunchtime.
There is a standard sequence for those colored wires in an 8P8C connector. It is not
entirely logical. The order is as follows:
It doesn’t really make sense that all of the pairs go into the connector next to each other
except for the green pair and there is no real reason why the blue stripe/solid order is
reversed. However, this is the wiring standard and you have to follow it because the
socket the connector plugs into is wired internally to accept the signals carried by the
color-coded wires in this specific order.
The connector layout listed above is specified in the standard EIA-568B.This was
defined by the Electronic Industries Alliance, hence the “EIA.” The standard is now
managed by the Telecommunications Industry Association, so the pinout is also
referred to as TIA-568B. The American National Standards Institute also recognizes the
standard and so you will see it called ANSI-568B. The layout of the connector in the
EIA-568B standard is illustrated below.
55
The main wiring standard for Ethernet cable connectors is actually EIA-568A – the EIA-
568B layout was made available as an acceptable alternative. However, the B version
has been implemented within the industry as the main standard. The EIA-568A
standard has a slightly different layout:
It doesn’t matter which of these standards you use just as long as you are consistent
when crimping connectors onto both ends of a cable.
56
Why does an Ethernet cable have eight wires in it? Does it matter which color goes
where in a connector? The answers to these two questions are surprising.
First of all, the UTP cable that is always used for Ethernet networks doesn’t need to
contain eight wires. However, this is the convention. The blue pair and the brown pair
don’t do anything.
The wires within the colored jackets are all identical. If you strip the casing of the blue-
striped wire, it looks exactly the same as the orange solid wire when that is stripped.
The fact that there are two different sets of guidelines for wiring an RJ-45 could lead to
chaos. However, it really doesn’t matter which order you put the wires in, just as long as
you put the same color in pin 1 in the connectors at either end and the same color in pin
2 and so on.
The socket that the RJ-45 fits into is soldered onto a network card. Every piece of
equipment that can connect to a cabled network has to have a network card, which is
also known as a network interface controller, or NIC. There are actually two types of
devices that connect to a network: DTEs and DCEs. DTE stands for “data terminal
equipment.” This refers to your computer. A DCE is “data circuit -terminating
equipment.” This means any network device, such as a modem, a router, or a switch.
The distinction between DTEs and DCEs is important when you want to work out
whether to use a straight through cable, or a crossover cable.
The important factor to remember when wiring RJ-45 plugs is the function of each pin.
The following list shows the purpose of each connector within the 8P8C plug that fits
into the DTE:
The connections within the socket on either side have to correspond with each other.
There is no point in a DTE transmitting data down pins 1 and 2 if the DCE on the other
end also regards those pins as connections it should send data over. So the sockets on
a DCE are wired in reverse. Here is the pin purpose as far as a DCE is concerned:
57
● Pin 1: Receive positive signal
● Pin 2: Receive negative signal
● Pin 3: Transmit positive signal
● Pin 4: Nothing
● Pin 5: Nothing
● Pin 6: Transmit negative signal
● Pin 7: Nothing
● Pin 8: Nothing
So a DTE transmits on pins 1 and 2 and receives on pins 3 and 6. A DCE transmits on
pins 3 and 6 and receives on pins 1 and 2.
Straight-through cable
A straight-through cable is often called a wired patch cable or an Ethernet cable. The
cable that comes in the box with your router is a straight through cable – it is the most
common format for network cables. The straight through cable is configured as
described above. It doesn’t matter whether the cable you buy follows EIA-568A or EIA-
568B because in both cases, the same color wire connects to the same pin at either
end. This is the cable you use to connect a DTE to a DCE. There is no wrong end. The
connectors on both ends are exactly the same and the socket on your computer that the
cable plugs into is exactly the same (externally) as the plug on your router or modem
that takes the cable connector.
Crossover cables
A crossover cable does exactly as its name suggests, it crosses over the wire from pin 1
at one end to pin 3 at the other connector. The wire that is crimped to pin 2 at one end
is attached to pin 6 at the other end and the pins 3 and 6 wires go to pins 1 and 2
respectively in the other connector. The crossover cable follows both EIA-568A and
EIA-568B. It is A at one end and B at the other. So those conflicting standards did end
up being useful.
To pass your CCNA exams, you just need to know that the pin that the striped orange
wire connects to on the left of the diagram takes the striped green wire on the right of
the diagram. The pin that takes the solid green wire on the left, takes the solid orange
wire on the right. You could also write down orange left and green right and you would
still get full marks.
If you want a cable to connect your computer and printer together, you need a
crossover cable. If you have several computers and one printer, you need to buy a
switch. All of the computers will connect to the switch with a straight through cable and
your printer would also connect to the switch with a straight through cable.
58
Remember, two types of devices that connect to networks. When you connect two
devices of different types together, you use a straight through cable. When you connect
two devices of the same type together, you use a crossover cable. All cables are
straight through if you insert a network device between two devices of the same kind.
When you need to buy a network cable, define the devices that you want to plug each
end of the cable into by the DTE/DCE categories. This list should clarify the
configuration of cable that you need.
The cable used for both the straight through and crossover formats is exactly the same.
The difference between straight through and crossover cable is that in the crossover
configuration the color-covered wires that stick out from the frayed ends of the cable are
wired into the plug differently at one end.
There is no DTE end or DCE end in network cables. You can’t plug them in the wrong
way. If the same colored wires connect to the same pins in the connectors at both ends,
you can plug either end into your computer and the other end into your router. It doesn’t
matter. If the wiring sequence is different between the two ends, it doesn’t matter which
end you plug into your computer and which goes to your printer.
There is one more complication to take into account when you are buying network
cables. If your device implements MDI and MDI-X, you don’t need to worry about
crossover cables. MDI is the Medium Dependent Interface standard and it operates
inside the socket of a NIC. It can detect which wire transmissions arrive on rather than
doggedly listening on pins 3 and 6. MDI-X stands for Medium Dependent Interface –
59
Crossover. So, if your computer, printer, switch, router or modem has MDI printed on
the box, you only need to buy a straight through cable.
Rollover cable
These days, you shouldn’t have to worry about rollover cables. They simply reverse the
pin order of each wire in a cable. The wire that connects to pin 1 at one end goes to pin
8 at the other end, the wire that goes to pin 2 and the first end goes to pin 7 at the other
end. In the middle of the connector pins 4 and 5 are reversed. This format is used for
RS-232 connectors that attach to serial ports on computers, printers, or monitors. Serial
ports are old news and you shouldn’t need to worry about buying a rollover cable.
You may see network wired cables that are gray, while others are yellow, some are
blue, and then there are white ones. Why? Most cable networking professionals will tell
you that the cable jacket color has no meaning; it is just a question of aesthetics. They
are partially right. The contents of the cable are exactly the same no matter what the
plastic jacket color is. However, cable manufacturers don’t just produce different colored
cable jackets for the fun of it.
There is an industry standard to which these colors are meaningful. Whether you
choose to follow that convention is up to you – most sites don’t pay attention to the
standard. The Building Industry Consulting Service International (BICSI) propagates
standards for integrating IT services in structures. Among the standards that it promotes
is EIA-568, which you have already read about. Another standard is the Administration
Standard for the Telecommunications Infrastructure of Commercial Buildings, also
60
known as ANSI/TIA/EIA-606-B (PDF). This is where those cable colors originate. The
meanings of cable colors are as follows:
Here is an image of the color coding section of the EIA-606-B standards document
where these colors are defined.
Experiment-3
Aim: Study of different types of Network cables and Practically implement the cross-
wired cable and straight through cable using crimping tool.
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be
very careful at this point, as to not nick or cut into the wires, which are inside. Doing so
could alter the characteristics of your cable, or even worse render it useless. Check the
wires, one more time for nicks or cuts. If there are any, just whack the whole end off,
and start over.
61
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other
hand. You do not want the wires to become untwisted down inside the jacket. Category
5 cable must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be
'out of spec'. At this point, you obviously have ALOT more than 1/2 of an inch of un-
twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-
made cable, with one of the ends whacked off, you only have one end to install - the
crossed over end. Below are two diagrams, which show how you need to arrange the
cables for each type of cable end. Decide at this point which end you are making and
examine the associated picture below. Diagram shows you how to prepare Cross wired
connection
62
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.
Requirements:
F. Assessment:
Multiple choice: 5 points each. Answer in google form link here: bit.ly/2Xc2J0Y
63
b. a switch to a router
c. a pc to a router
d. a pc to a modem
5. straight-through cables are used to connect
a. a pc to a switch
b. a switch to a switch
c. a router to a router
d. a modem to a modem
G. Reference:
https://computernetworking747640215.wordpress.com/2018/07/05/vlan-configuration-
on-a-cisco-switch-in-packet-tracer/
https://www.comparitech.com/net-admin/difference-between-straight-through-crossover-
rollover-cables/#Crossover_cables
https://www.computercablestore.com/straight-through-crossover-and-rollover-wiring
A. Introduction:
Guide to configure a DHCP server both on a router and on a generic server in Cisco
Packet Tracer. In both cases, configuration is simple as long as you have a basic
knowledge of IP addressing.
64
B. Objectives:
C. Learning Content:
D. Pre-test:
E. Learning Activities:
This tutorial will guide you on how to configure a DHCP server both on a router and on a
generic server in Cisco Packet Tracer. In both cases, configuration is simple as long as
you have a basic knowledge of IP addressing. On to it then!
Let’s apply to your simulation software using the Cisco Packet Tracer.
65
2. On the router, configure interface fa0/0 to act as the default gateway for our LAN.
Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#no shutdown
Router(config-if)#exit
3. Configure DHCP server on the Router. In the server we will define a DHCP pool of
IP addresses to be assigned to hosts, a Default gateway for the LAN and a DNS
Server.
Router(config)#
66
Router(dhcp-config)#network 192.168.1.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.1.1
Router(dhcp-config)#dns-server 192.168.1.10
67
Do this for the other PCs.
You can test the configuration by pinging PC2 from PC1. Ping should succeed.
Now let’s do the same thing using a Generic server in place of a router:
To do this, click on the server, then click on Services tab. You will pick DHCP on the
menu. Then proceed to define the DHCP network parameters as follows:
68
Subnet Mask: 255.255.255.0
4. Finally, enable DHCP configuration on each PC. The three PCs should get
automatically configured.
69
Addendum: You can define a DHCP server on one broadcast domain to serve hosts in
a different broadcast domain. If you want to do this, then you should consider using ip
helper-address command. To learn more about this, you can read my article on IP
helper address configuration.
Let’s apply to your simulation software using the Cisco Packet Tracer.
Topology Diagram
Objectives
70
Background / Preparation
In this activity, you will continue to configure the Cisco 1841 ISR router for the customer
network by configuring the DHCP service. The customer has several workstations that
need to be automatically configured with IP addresses on the local subnet and
appropriate DHCP options to allow access to the Internet.
The DHCP pool will use the 192.168.1.0/24 network but the first 49 addresses are
excluded. The default gateway and DNS server also need to be configured as
192.168.1.1 and 192.168.1.10.
For this activity, both the user and privileged EXEC passwords are cisco.
Note: Packet Tracer does not currently support the domain name and lease period
options. These options are not used in this activity.
a. From the customer workstation, use a console cable and terminal emulation
software to connect to the console of the customer Cisco1841 ISR. \
b. Log in to the console of the Cisco 1841 ISR and enter global configuration
mode.
c. Before creating a DHCP pool, configure the addresses that are excluded. The
range is from 192.168.1.1 to 192.168.1.49.
CustomerRouter(dhcp-config)#dns-server 192.168.1.10
CustomerRouter(dhcp-config)#default-router 192.168.1.1
CustomerRouter(dhcp-config)#exit
71
CustomerRouter(config)#ip dhcp excluded-address 192.168.1.1
192.168.1.49
d. Verify that the IP address has been correctly assigned by pinging the LAN IP
address of the Cisco 1841 ISR.
e. Click the Check Results button at the bottom of this instruction window to
check your work.
Reflection
c. What other DHCP options can be defined on the Cisco 1841 ISR router that
are not configured in this activity?
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.
F. Assessment:
Multiple choice: 5 points each. Answer in google form link here: bit.ly/3niPsyn
2. Static IP Address
72
A. Host servers and printers that need particular addresses
B. are preferred for a large network
C. has automatic assignment
3. Dynamic addresses
G. Reference:
https://www.microsoftpressstore.com/articles/article.aspx?p=2224361
https://www.cisco.com/c/en/us/support/docs/smb/unified-communications/cisco-small-
business-voice-gateways-and-atas/smb2894-view-dynamic-host-configuration-protocol-
dhcp-server-informa.html#:~:text=Objective,act%20as%20a%20DHCP%20server.
https://www.coursehero.com/file/22671172/ET0718-Chapter07v11-DHCP/
https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/
https://computernetworking747640215.wordpress.com/2018/07/05/how-to-configure-
dhcp-server-in-packet-tracer/
73
MODULE 5: Switch to Switch and routers
A. Introduction:
B. Objectives:
C. Learning Content:
D. Pre-test:
E. Learning Activities:
We'll have an overview of the Telnet then see how to configure it on a switch and a
router in Packet Tracer. So precisely, we’ll look at:
1. An overview of Telnet
2. Configuring Telnet on a switch in Packet Tracer
3. Configuring Telnet on a router in Packet Tracer
74
Telnet configuration on a switch
The topology above consists of an ADMIN laptop and a remote switch. We’ll configure
Telnet on the switch so that as the admin,you’ll be able to access and manage the
switch remotely.
2. Configure enable password or enable secret password on the switch. If you fail to
do this,you won’t get past the executive mode of the switch even after you establish a
telnet connection to the switch.
Switch>enable
Switch#config terminal
We assign an IP address to the VLAN interface of the switch so that we can Telnet the
switch from the laptop using this address.
Switch(config)#int VLAN 1
Switch(config-if)#no shut
75
Switch(config-if)#exit
This password is configured on VTY lines. VTY means Virtual Terminal. Before you can
manage the switch remotely via Telnet, you’ll have to provide this password.
Switch(config)#line vty 0 15
Switch(config-line)#password cisco
Switch(config-line)#login
Telnet access to the switch is allowed through VTY lines. We can establish up to 16
telnet connections to to the switch at the same time. Tha’ts what ‘0 15‘ means.
Next,
Hope you remember that 10.0.0.20 is the VLAN address of the switch through which we
can access it remotely.
76
6. Now provide the Telnet password that you set in step 3. Mine is cisco. Notice that
password characters won’t show up(no echo) on the screen as you type them, but
just type, then hit ENTER.
After you’re authenticated, you will see the the CLI of the remote switch appear.
Experiment 4
Let’s apply to your simulation software using the Cisco Packet Tracer.
A step by step guide of configuring VLAN and interVLAN routing on a Cisco switch.
But just before get into configurations , let’s have a brief overview of what’s a VLAN.
What is a VLAN?
A Virtual LAN (VLAN) is simply a logical LAN, just as its name suggests. VLANs have
similar characteristics with those of physical LANs, only that with VLANs, you can
logically group hosts even if they are physically located on separate LAN segments.
We treat each VLAN as a separate subnet or broadcast domain. For this reason, to
move packets from one VLAN to another, we have to use a router or a layer 3 switch.
VLANs are configured on switches by placing some interfaces into one broadcast
domain and some interfaces into another. For this tutorial, we’ll configure 2 VLANs on
a switch. We’ll then proceed and configure a router to enable communication between
the two VLANs.
So then,
77
2. Create 2 VLANs on the switch: VLAN 10 and VLAN 20. You can give them custom
names.
Switch#config terminal
Switch(config)#vlan 10
Switch(config-vlan)#name SALES
Switch(config-vlan)#vlan 20
Switch(config-vlan)#name IT
3. Assign switch ports to the VLANs. Remember each VLAN is viewed as separate
broadcast domain.
And just before you configure, have in mind that switch ports could be either access or
trunk.
● An access port is assigned to a single VLAN . These ports are configured for
switch ports that connect to devices with a normal network card, for example a
PC in a network.
78
● A trunk port on the other hand is a port that can be connected to another switch
or router. This port can carry traffic of multiple VLANs.
So in our case, we’ll configure switch interfaces fa 0/1 through fa 0/4 as access ports to
connect to our PCs. Here, interfaces fa 0/1 and fa 0/2 are assigned to VLAN 10 while
interfaces fa 0/3 and fa 0/4 are assigned to VLAN 20.
Switch Interface fa0/5 will be configured as trunk port, as it will be used to carry traffic
between the two VLANs via the router.
Switch>enable
Switch#config terminal
Switch(config)#int fa0/1
Switch(config-if)#int fa0/2
Switch(config-if)#int fa0/3
Switch(config-if)#int fa0/4
Worth noting: We could have configured all the above interfaces as access ports using
interface range command as shown below:
79
In the above commands, we have specified an interface range and then proceeded to
configure all the ports specified as access ports.
Interface fa0/5 is configured as trunk and will be used to for inter-VLAN communication.
Switch(config)#int fa 0/5
4 . Assign static IP addresses to the four PCs which are located in the separate VLANs.
PC1 and PC2 fall in VLAN 10 while PC3 and PC4 fall in VLAN 20.
And now it’s very clear that we treat a VLAN just like a physical LAN when assigning IP
addresses.
At this point let’s try to test connectivity within VLANs and between VLANs
Ping PC2 from PC1 both in VLAN 10. Ping test should be successful.
Ping PC3 in VLAN 20 from PC1 in VLAN 10. Ping here will definitely fail. Why?
Because inter-VLAN routing is not yet enabled. Hope you can see how we’ve used
VLANs to place the hosts into two logical networks which can be viewed as separate
broadcast domains.
80
Now, in order to allow the hosts in the two VLANs to communicate, we need to do
something extra. And you can guess what. We’ll configure the router to permit inter-
VLAN communication. Let’s do that right away.
We’ll configure the router so that it will enable communication between the two vlans via
a single physical interface. How is this made possible? We’ll divide the single physical
interface on the router into logical interfaces (sub interfaces). Each sub-interface will
then serve as a default gateway for each of the VLANs. This scenario is called router
on a stick (R.O.A.S) and will allow the VLANs to communicate through the single
physical interface.
Wort noting: We can’t assign an IP address to the router’s physical interface that we
have subdivided into logical sub-interfaces. We’ll instead assign IP addresses to the
sub interfaces.
Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#no shutdown
Router(config-if)#int fa0/0.10
Router(config-subif)#encapsulation dot1q 10
Router(config-subif)#
Router(config-subif)#int fa0/0.20
Router(config-subif)#encapsulation dot1q 20
81
As you can notice from above, the routers physical interface fa0/0 was subdivided into
two sub-interfaces( fa0/0.10 and fa0/0.20) , which are then configured as trunk
interfaces and given IP addresses.
Finally,
Here we’ll test connectivity between computers in different VLANs . Don’t forget that its
the router that enables inter-VLAN routing.
Ping PC3 in VLAN 20 from PC1 in VLAN 10. If everything is well configured, then ping
should work perfectly.
Example: Try to open PC 1 or PC 3 to ping 192.168.1.1 and 192.168.2.1 and see the
results if reply or time-out results.
Experiment 5
Let’s apply to your simulation software using the Cisco Packet Tracer.
Hello and welcome! In this tutorial, we’ll have an overview of switch port security then
configure it in Packet Tracer.
Overview
Switch port Security is a network security feature that associates specific MAC
addresses of devices(such as PCs) with specific interfaces on a switch. This will enable
you to restrict access to a given switch interface so that only the authorized devices can
use it. If an unauthorized device is connected to the same port, you can define the
action that the switch will take, such as discarding the traffic, sending an alert, or
shutting down the port.
82
PC1 connects to fa0/1 and PC2 to fa0/2 of the switch
We’ll configure port security interfaces on fa0/1 and fa0/2. To do this, we’ll:
Switch(config)#int fa0/1
Switch(config-if)#switchport port-security
83
The sticky keyword instructs the switch to dynamically learn the MAC address of the
currently connected host.
● defining the action that the switch will take when a frame from an unathorized
device is received. This is done using the switchport port-security violation
{protect | restrict | shutdown}interface command. All three options discard the
traffic from the unauthorized device.
● defining the maximum number of MAC addresses that can be received on the
port using the switchport port-security maximum NUMBER interface submode
command
Moving on…
In a similar way to switch interface fa0/1, configure switch port security for fa0/2
connected to PC2:
Switch(config)#interface fa0/2
Switch(config-if)#switchport port-security
84
Switch(config-if)#switchport port-security maximum 1
A shorthand method for configuration:The port security configurations for both fa0/1 and
fa0/2 could be done more faster with the help of interface range command as shown
below:
Switch(config-if)#switchport port-security
Here, we define a range of interfaces on which we want to configure port security, then
proceed to configure port-security for all the interfaces specified at a go instead of one
interface at a time.
The interface range command can save you tons of work in doing individual
configurations if you were configuring port security for many switch interfaces, say, 24
ports on a switch.
Next,
To verify if the switch has learnt the MAC address of PC1, you can use the command:
85
Verify that the switch has learnt the MAC address of PC1.
Try also pinging PC2 from PC1. Ping should be successful here since switch port
security is not violated.
Now connect a different PC to fa0/1 in place of PC1. See the effect of doing this:
86
Notice that fa0/1 shuts down upon connecting the new PC, as indicated by the red LED.
This is because the switch had already associated fa0/1 with the MAC address of PC1
and the maximum number of MAC addresses that we defined for this port is 1. So
attaching the new PC to fa0/1 violates the port security rules that we set and as a result,
the interface shuts down.
You can verify this further by using the command we used before: show port-security
interface fa0/1
87
Verify from above that port status is now Secure-shutdown upon violation of port
security.
Further, a ping from the New PC to PC2 will definitely fail because the switch cannot
forward a frame via an interface that is shut down.
How to Reset an interface that has been shut down due to Violation of Port
Security:
One of the options on the table is to manually restart the shutdown interface(fa0/1 in our
case here). Unplug the cable from unauthorized PC(new PC) and plug it back to
authorized PC(PC1)
Then run following commands on switch and test connectivity from the authorized PC
(PC1):
Switch(config)#interface fa0/1
Switch(config-if)#shutdown
Switch(config-if)#no shutdown
88
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.
F. Assessment:
Multiple choice: 5 points each. Answer in google form link here: bit.ly/3E8iVAO
1. What is a network device that cross-connects clients, servers and network devices?
a. Switch
b. Modem
c. router
d. Playstation
a. Motor Hub
b. TV Cable Repeater
c. Electrical Switch
d. Router
a. hub
b. gateway
89
c. switch
d. Router
4.Which cable connects the following? Switch to Router, Switch to workstation, hub to
workstation.
a. Straight-through
b. Rollover
c. Crossover
d. Standard
a. destination address
b. sender address
c. routing table
d. header
G. Reference:
https://www.itprc.com/configure-a-router-with-packet-tracer/
https://www.packettracernetwork.com/labs/lab1-basicswitchsetup.html
https://www.ccna6rs.com/19-4-4-packet-tracer-build-a-switch-and-router-network-
answers/
A. Introduction:
90
for internet connectivity. Briefly, here are the configurations we’ll perform on the wireless
router:
B. Objectives:
C. Learning Content:
D. Pre-test:
1. Write the procedure and method to securing cisco lynksys Wireless router.
2. What are the two security features of Wireless router?
E. Learning Activities:
Wireless Links
You can establish wireless links between access points and end devices (PCs, servers,
and printers). To establish a link, simply remove the existing module on an end device,
insert a wireless module, and turn on the device. The device will automatically try to
associate itself with an access point. Typically, this means it will associate (physically)
with the nearest access point. See the Wireless Devices page under the Physical
Workspace section for more information regarding distances. However, if two or more
access points are in the same closet, the distance from any access point to any end
device is essentially the same. In this case, an end device will associate with the access
point that was created first. Recall that the logical topology does not reflect physical
distances, and everything that is created in the Logical Workspace is initially placed in
the same wiring closet in the Physical Workspace. The process for establishing wireless
links between Linksys routers and end devices with Linksys network modules is similar,
but described elsewhere.
Link Status
When you connect two devices, you will typically see link lights on both ends of the
connection. Some connections do not have link lights.
Bright green The physical link is up. However, this is not indicative of the line
91
protocol status on the link.
The Config tab offers two general levels of configuration: global and interface. To configure at
the global level, click the GLOBAL button to expand the Settings button (if it has not already
been expanded). To configure an interface, click the INTERFACE button to expand the list of
interfaces, and then choose the interface.
92
Global Settings
In the global settings, you can change the Display Name of the Linksys WRT300N.
Algorithm Settings
In the Algorithm Settings, you can override the global Algorithm Settings by unchecking
Global Settings and then set your own values for the Half-Open Session Multiplier,
Maximum Number of Connections, and Maximum Number of Opened Sessions.
93
LAN Interface Configuration
In the LAN settings, you can set the IP Address and Subnet Mask of the LAN interface.
94
Wireless Interface Configuration
In the Wireless settings, you can set the SSID, Channel, and Authentication. You may set the
authentication to WEP, WPA-PSK, WPA2-PSK, WPA, or WPA2. For WEP, you need to set
the Key to a 10-digit hexadecimal value. For WPA-PSK and WPA2-PSK, the PassPhrase needs
to be 8-63 ASCII characters long and the Encryption Type can be set to AES or TKIP. For
WPA and WPA2, you need to enter the IP Address and Shared Secret of the RADIUS server
and then select AES or TKIP for the encryption type.
95
Linksys WRT300N: GUI
The GUI tab offers the same configurations and settings as the Config tab with some
additional features for access restrictions, port forwarding, DMZ access, administration,
as well as router and network status. Make sure you click on the Save Settings button
at the bottom to apply the new settings to the Linksys WRT300N before going to any
other tab.
Setup Configuration
In the Setup tab under the Basic Setup sub-tab, you can set the Internet Connection
Type to either automatically obtain IP configurations with Automatic Configuration -
DHCP, manually set IP configurations with Static IP , or PPPoE. You can also set the
LAN IP configurations and DHCP server settings under the Network Setup section.
96
Wireless Configuration
On the Wireless tab under the Basic Wireless Settings sub-tab, the only settings you
can change are the Network Name (SSID) and the Standard Channel.
Under the Wireless Security sub-tab, you can set the Security Mode to Disabled,
WEP, WPA Personal, WPA Enterprise, WPA2 Personal, or WPA2 Enterprise.
Depending on the security mode that you select, you will need to enter a WEP key,
passphrase and encryption type for WPA/WPA2 Personal, or the RADIUS server IP
address, shared secret, and encryption type for WPA/WPA2 Enterprise.
Under the Wireless MAC Filter sub-tab, you can setup a wireless MAC address filter
list to permit or prevent wireless clients from accessing the wireless network. To setup
the wireless MAC filter, set the wireless MAC filter to Enabled and then select whether
you want the MAC filter to prevent the listed clients from accessing the wireless network
or to permit only the listed clients from being able to access the wireless network.
Afterwards, begin entering the MAC addresses of the clients that you want to include in
the MAC filter and then click the Save Settings button.
97
Security Configuration
On the Security tab, there are no additional viewable sub-tabs and there are no
parameters that you can edit.
98
Access Restrictions Configuration
On the Access Restrictions tab under the Internet Access Policy sub-tab, you can
apply various access restrictions policies on the connected hosts. To add a policy to the
router, first select a policy you would like to edit from the Access Policy drop-down
menu and then Enter a Policy Name for the policy. Then, set the Status to Enabled.
Next, click on the Edit List button and enter the host IP addresses you would like to
apply the policy on in the List of PCs dialog that shows up. After editing the list, click on
Save Settings and Close inside the dialog. Back in the Linksys GUI, select Deny to
restrict all applications or select Allow for specific application access restriction. If you
select Allow, you can choose up to three applications to block. To block an application,
select the application from the Applications list and click on the >> button to add it to
the Blocked List. To unblock an application, select the application from the Blocked
List and click on the << button. If you want to remove a policy, select the policy from the
Access Policy drop-down menu and click Delete This Entry.
99
Applications & Gaming Configuration
In the Applications & Gaming tab under the Single Port Forwarding sub-tab, you can
forward packets destined to specific ports to an IP Address. To forward a port, select
the appropriate application under the Application Name drop-down menu, enter the IP
Address under the To IP Address column to which you want the packets to be
forwarded, and then click on the box under the Enabled column. To forward a custom
port, enter an application name and then enter the appropriate Externet Port, Internet
Port, and Protocol. The Externet Port is the port to which the Linksys router will listen
from the WAN side. The Internet Port is the port on your local server to which the
Linksys router will forward packets.
Under the DMZ sub-tab, you can set a specific host to have DMZ access. To do so,
click on Enabled to enable the DMZ feature and then enter the IP address of the host
you want to have DMZ access.
100
Administration Management
In the Administration tab under the Management sub-tab, you can change the default
password to access the router through the Linksys Web Configuration using the Web
Browser and toggle Remote Management. In addition to this, if you are logged in
using the Linksys Web Configuration, you can Backup and Restore Configurations.
Under the Factory Defaults sub-tab, the only available feature is Restore Factory
Defaults. This will reset the configuration back to default settings.
Under the Firmware Upgrade sub-tab, you can upgrade the firmware of the Linksys
WRT300N. To upgrade the firmware, click on Browse, select a valid firmware image
from the dialog that shows up, and then click OK. Once you have selected a firmware,
click on the Start to Upgrade button to upgrade the firmware.
101
Status
On the Status tab under the Router sub-tab, you can view Router Information and
Internet Connection configurations. You can Release and Renew the IP address of
the Internet port.
Under the Local Network sub-tab, you can view the Local Network and DHCP Server
configuration. You can view the DHCP Client Table as well.
Under the Wireless Network sub-tab, you can view the various wireless configurations
on the router.
102
In our network set up, we have two laptops and a PC which should connect to a LAN
provided by one wireless router.The PC is is used by the network Admin and connects
to the LAN via an Ethernet port of wireless router.The laptops should connect to the
same LAN by wireless means, and for this reason we’ll install wireless adapters on
them. Still, we’ll need to connect the LAN to the internet via an ISP router.
First get into Cisco Packet Tracer and in the physical mode, pick a wireless router and
two laptops,a PC, a generic server and a 2800-series router(or just any other router
other than wireless).
103
For the laptops, replace the already-installed wired LAN module with a wireless adapter
module (WMP 300N) .
Make sure that you first power off each laptop before you make any replacement then
restore the power back after replacement. That’s easy to do!
Once you have the wireless modules in place, you’ll see the wireless connections come
up between the laptops and the wireless router as shown below.
Next, we’re going to do some settings on the wireless router to create a LAN then
connect it to the internet.
To do any configuration on the wireless router, we’ll use its GUI(Graphical User
Interface) which we can access either by:
We’ll access the router from the PC or the laptops using the router’s LAN interface.The
LAN interface is simply the default gateway of the LAN.
104
So now, on the ADMIN PC browser, type the IP address of the LAN interface of the
wireless router.(192.168.0.1 by default ), then hit Go.
A login prompt appears. Provide the username (admin) and password (admin) to be
allowed into the GUI of the router.You can always change these settings later.
You should now be in the GUI of the router, whichever approach you chose to access
it. Just examine it closely for a moment. On it, you can see several tabs like Setup,
Wireless, Security, Access Restrictions, Application & Gaming, Administration and WRT
300N status.
For this tutorial we’ll focus on setup, wireless and administration tabs. Notice that once
you click on one major tab, other ‘sub-tabs’ will appear.
We’ll begin with Administration in the GUI. Here we’ll simply change the router’s
username and password.
On the browser of Admin PC, type the IP address of the LAN interface of the wireless
router(192.168.0.1, by default). Hit Go to access the GUI of the router. Provide the
default username(admin) and password(admin). Click OK. You’re now on the GUI of
the router. See it on the figure below.
105
Click on the Administration tab and set a new password for administrative access. Scroll
down and Save settings. You will be prompted for a username and the new password
you just set.Type them and click OK. Wait a bit. A new screen appears confirming
settings are successful. You can click on continue to continue with configurations.
106
To test for the new password entered, close the browser of Admin PC and try to to
access the GUI again using the browser. You’ll now provide the new password you’ve
just set.
The admin username and password are important, as only a network admin(or a user
with admin rights) is able to log into the router and manage its settings.
To configure addresses for the LAN and internet connectivity, we’ll use Setup tab.
Network Setup
Network setup means LAN setup. Already, we have a PC and three laptops in the
LAN.We’ll assign the them IP addresses either statically or dynamically (using a DHCP
pool set up in the wireless router).
The default LAN network address given here is 192.168.0.0 with a subnet mask of
255.255.255.0 .The first address in this network (192.168.0.1 by default) has been
assigned to the LAN interface of the router. It has just been named IP address.
Obviously, all the PCs in the LAN will use the LAN interface as their default interface(to
communicate to hosts in outside networks).
Now, in the router’s network settings, you may choose to enable DHCP to dynamically
assign IP addresses to the PCs. On the other hand, if you choose to disable DHCP,
then obviously, you’ll have to configure static IP addresses on the PCs.
When you choose to enable DHCP, set the start address for the LAN pool, maximum
hosts to be allowed in your LAN and the DNS server for the LAN. The PCs will receive
addresses automatically from the pool.
107
See the set up window below.
Moving on, let’s enable DHCP on each PC for dynamic configuration. Go to the IP
configuration tab for each PC and enable DHCP. Each PC should automatically obtain
an IP address from the router.
108
Now let’s test our wireless LAN.
Try also to ping the LAN interface of the router from one of the PCs ,say, PC1 . It should
be successful.
That was pretty easy! Let’s now move on and add wireless security for the wireless LAN
access.
The LAN network we have just setup has no wireless security features enabled. If this a
was a production network, this would mean an obvious security threat since this makes
the network accessible to unauthorized users. So let’s implement some level of wireless
security to our LAN.
Access the GUI of wireless router (either by clicking on Router icon or from Admin PC
browser), then click on Wireless tab. Under the Basic Wireless Settings sub tab,
change the default wireless SSID to any name of your choice. I have named mine
‘myLAN‘. After this, don’t forget to Save settings.
109
The acronym SSID stands for Service Set Identifier, and its the name of your wireless
network(wireless LAN).
Still, in the Wireless tab, under the Wireless security sub tab, change security mode to
WPA personal , then set passphrase field to a password of your choice. Scroll down
and Save settings
110
The LAN network is now secured for wireless access. To test whether its really
protected, click Laptop1->Desktop->Wireless.
A new window appears that shows the now secured wireless network. Click connect.
You can now see the name of the wireless network( myWIFI , in my case) and its signal
strength. Site features listed include WPA1 PSK security feature.
Again, click connect, then provide the security pre-shared key for the WiFi that you set,
then connect. Laptop 1 is now connected to the WiFi network. You can see at the
bottom right of the screen that the wireless network adapter on the laptop is
active.Repeat this process for the Laptop2.
111
Now, you can change the wireless security mode to any other from the available
options. You may choose WEP security feature for our wireless network, for example.
For WEP, provide a 40-bit (10 hexadecimal digits e.g. A123B456C789) or 64 -bit key(16
hex characters). WEP and WPA configurations look almost alike.
Lastly, let’s see how to set up internet configurations on the wireless Router so that the
PC and laptops in the LAN can access the internet. So move on to the next section.
Internet Setup
For this part, we’ll configure the internet interface on the router so as to connect our
LAN to the internet. Note that for different routers (from different vendors), the internet
interface may be named differently; in some routers, for example, the interface may
have the name ‘WAN interface‘, suitably because its the interface that allows devices in
our LAN to access the internet.
Here, we’ll connect the internet interface to an ISP router which then connects to an
internet server (example.com, as an example).
So now, access the Internet Setup tab on the GUI of the wireless router (either by
clicking on its icon or from admin PC browser). Actually, in a real life router
configuration, you’ll use a PC browser. In this case you should remember the username
name and the new password you set.
112
To Set internet connectivity , we’ll need to set a static IP address on the interface or set
interface as a DHCP client so that it will be assigned an address dynamically by the ISP
router. Alternatively, you may use PPPoE to provide WAN connectivity to the internet.
Now, if you choose to configure a static IP address for the internet interface, you can
specify also the default gateway and a DNS server of your choice.
And, if you’d rather like to have the internet interface address configured by DHCP,
you’ll then set the internet interface as a DHCP client. A DHCP server will be
configured on another device, such as the ISP router (in our topology here!).
Otherwise, if you choose PPPoE for internet connectivity, then set up the username and
password for PPPoE authentication. The internet interface will then become a PPPoE
client and will negotiate for connection with a PPPoE server running on an ISP device
so as to achieve internet connectivity.Usually the username and password will be
provided by your ISP.
For now, we’ll set the internet interface to act as a DHCP client (with the DHCP server
configured on the ISP router)
So then :
ISP_ROUTER(config)#int fa0/0
113
ISP_ROUTER(config-if)#ip add 155.21.21.1 255.255.0.0
ISP_ROUTER(config-if)#no shut
ISP_ROUTER(config-if)#
ISP_ROUTER(config-if)#int fa0/1
ISP_ROUTER(config-if)#no shut
ISP_ROUTER(config-if)#exit
ISP_ROUTER(dhcp-config)#default-router 155.21.21.1
ISP_ROUTER(dhcp-config)#dns-server 0.0.0.0
Now make the internet interface a DHCP client by enabling DHCP on it.
114
To verify DHCP configuration,click on the wireless router icon, then go to Config tab.
Pick DHCP. The interface is now configured with an IP address from the pool set in the
ISP router.
Next,we have to configure static or dynamic routes in the ISP router for the devices in
the wireless LAN to gain access the internet server:
255.255.255.0 fa0/0
Lastly, assign an IP address to the internet server (if you hadn’t done so), then try to
reach the server from a host in the LAN.
For example, you can ping the server from Laptop1. Ping should succeed.
I also strongly believe that if you’ve gotten everything presented in here,then you have
more than a foundation to create your own wireless network using a wireless router, e.g,
home WiFi.
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.
F. Assessment:
Multiple choice: 5 points each. Answer in google form link here: bit.ly/3A0as0o
115
3. A user reports that the corporate web server cannot be accessed. A technician
verifies that the web server can be accessed by its IP address. What are two possible
causes of the problem?
a. The web server is misconfigured.
b. The DNS server address is misconfigured on the workstation.
c. The network connection is down.
d. The default gateway address is misconfigured on the workstation.
4. A technician wishes to update the NIC driver for a computer. What is the best location
for finding new drivers for the NIC?
Windows Update
a. the website for the manufacturer of the NIC
b. the installation media that came with the NIC
c. the website for Microsoft
d. the installation media for Windows
5. A new computer workstation has been installed in a small office. The user of the
workstation can print a document using a network printer on the LAN, but cannot access
the Internet. What is a possible cause of the problem?
a. The DHCP server IP address is misconfigured.
b. The TCP/IP stack is not functional.
c. The gateway IP address is misconfigured.
d. The workstation is configured with a static IP address.
G. Reference:
https://www.computernetworkingnotes.com/ccna-study-guide/how-to-configure-wireless-
network-in-packet-tracer.html
https://courses.cs.ut.ee/MTAT.08.004/2016_spring/uploads/Main/Configuring
%20Wireless%20LAN%20access.pdf
https://www.ccna6rs.com/13-1-10-packet-tracer-configure-a-wireless-network-answers/
116
MODULE 7: Building DNS and Web Server
A. Introduction:
A Domain Name System (DNS) server resolves host names into IP addresses.
Although we can access a network host using its IP address, DNS makes it easier by
allowing us use domain names which are easier to remember. For example its much
easier to access google website by typing http://www.google.com as compared to typing
http://208.117.229.214. In either case, you’ll access google website, but using domain
name is obviously easier.
Now, before any host can use a DNS service, we must configure a DNS server first.
For example, when you type the URL http://www.google.com in your browser, the host
will query the DNS server for the IP address of http://www.google.com. The DNS server
will resolve http://www.google.com into an IP address then answer back the host with
the IP address.
B. Objectives:
117
C. Learning Content:
D. Pre-test:
E. Learning Activities:
Server
118
PC0
119
PC1
To do this, click on the server, then Click on Services tab. Click on DNS server from the
menu. First turn ON the DNS service, then define names of the hosts and their
corresponding IP addresses.
For example, to specify the DNS entry for PC0: In the name and address fields, type:
Click on add then save. Repeat this for the PC1 and the server.
Once you’re done, your DNS entries will look like this:
120
Finally,
Ping the hosts from one another using their names instead of their IP addresses. If the
DNS service is turned on and all IP configurations are okay, then ping should work.
121
Experiment 6
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.
Let’s apply to your simulation software using the Cisco Packet Tracer.
Topology Diagram
122
Aim:
Background / Preparation
In this activity, you will use Packet Tracer Simulation mode to examine the contents of
the IP header as traffic crosses the NAT border router.
Verify that the network is ready to send and receive traffic. All the link lights should be
green. If some link lights are still amber, you can switch between Simulation and
Realtime mode several times to force the lights to turn green faster. Switch to
Simulation mode before going to the next step.
Step 2: Send an HTTP request from an inside host to an outside web server.
Click Customer PC. Click the Desktop tab and then Web Browser. In the URL field, type
the web
address for the ISP server (www.ispserver.com). Make sure that you are in Simulation
mode, and then
click Go.
In the event list, notice that Customer PC queues a DNS request and sends out an ARP
request. You can view the contents of the ARP request by either clicking on the packet
in the topology or clicking on the packet color under Info in the Event List window.
In the event list, notice that Customer PC queues a DNS request and sends out an ARP
request. You can view the contents of the ARP request by either clicking on the packet
in the topology or clicking on the packet color under Info in the Event List window.
123
In the PDU Information at Device: Customer PC window, which IP address is Customer
PC attempting to find a MAC address for? ______________________
In the Event List window, click Capture/Forward twice. Which device answers the ARP
request from Customer PC? Which MAC address is placed inside the ARP reply?
________________________________________________________________
In the Event List window, click Capture/Forward twice. Customer PC accepts the ARP
replay and then builds another packet. What is the protocol for this new packet? If you
click Outbound PDU Details for this packet, you can see the details of the protocol.
_________
In the Event List window, click Capture/Forward twice. Click the packet at the
www.customerserver.com server. Then click the Outbound PDU Details tab. Scroll
down to the bottom to see the Application Layer data. What is the IP address for the ISP
server?
________________________________________________________________
In the Event List window, click Capture/Forward twice. Customer PC now formulates
another ARP request. Why?
________________________________________________________________
In the Event List window, click Capture/Forward seven times until the HTTP reply
reaches Customer Router. Examine the contents of the HTTP reply and notice that the
inside local and global addresses have changed again as the packet is forwarded on to
Customer PC.
Step 3: Send an HTTP request from an outside host to an inside web server.
Customer Server provides web services to the public (outside addresses) through the
domain name www.customerserver.com.
a. Click ISP Workstation. Click the Desktop tab, and then Web Browser. In the URL
field, type the Customer Server web address (www.customerserver.com). Make
sure that you are in Simulation mode, and then click Go.
b. You can either click Auto Capture/Play or Capture/Forward to step through each
stage of the process. The same ARP and DNS processes occur before the ISP
Workstation can formulate an HTTP request. c. When the HTTP request arrives
at Customer Router, check the packet contents. What is the inside local
address? What is the inside global address?
________________________________________________________________
Experiment-7
124
Configuring a Default Route
Topology Diagram
Aim:
Background / Preparation
In this activity, you will configure a default route on the Cisco 1841 Customer router.
The default route configuration uses the WAN IP address on the Cisco 1841 ISP router.
This is the next-hop router from the Cisco 1841 Customer router.
Step 1:
Verify reachability from CustomerRouter to the LAN IP address on the ISP router.
CustomerRouter>ping 209.165.201.1
.....
Step 2:
125
a. Enter privileged EXEC mode using the password cisco. The CustomerRouter#
prompt indicates that you are in privileged EXEC mode.
b. Enter global configuration mode. The CustomerRouter(config)# prompt indicates
that you are in global configuration mode.
c. Configure a default route using the ISP WAN IP address as the next hop IP
address.
Step 3:
a. Use the show ip route command to verify the configuration of the default route.
This is a partial example of the output.
CustomerRouter#show ip route
b. Click the Check Results button at the bottom of this instruction window
to check your work.
Reflection
You can now access the entire ISP network. Write down some issues and
considerations to discuss with your classmates about this configuration. Here are two
questions to begin with:
1. Is this type of access to the ISP LAN likely to happen in the real world?
2. Why has the student activity been configured to allow this type of access?
F. Assessment:
126
Multiple choice: 5 points each. Answer in google form link here: bit.ly/38VIAOV
a. DNS updater
b. None of the mentioned
c. DNS resolver
d. DNS handler
a. 1
b. 4
c. 3
d. 2
4. These manage databases, allowing users to access and edit them (think, amazon or
netflix)
a. web server
b. hypervisor server
c. application
d. database
5. Manages HTTP and HTTPS requests to display the website on your client device
a. application
b. database
c. hypervisor server
d. web server
G. Reference:
https://www.slideshare.net/AbdulBasit58/packet-tracer-tutorial-2
https://www.packettracernetwork.com/labs/lab1-basicswitchsetup.html
https://www.cisco.com/c/en/us/td/docs/security/security_management/cs-mars/4-
3/user/guide/local_controller/cfgrtrsw.html
127
MODULE 8: Building Email and FTP Server
A. Introduction:
An email server, such as Gmail stores and sends email messages to email clients on
request. We often send and receive emails on our mobile devices or computers. Have
you ever imagined how this happens? Well, whenever you compose and send an email
to another person, the message you send first goes to a mail server. It’s the mail
server which then sends the email when it is requested from the email client(e.g Gmail
App) of the recipient’s device.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer
of computer files between a client and server on a computer network.
FTP employs a client-server architecture whereby the client machine has an FTP
client installed and establishes a connection to an FTP server running on a remote
machine. After the connection has been established and the user is successfully
authenticated, the data transfer phase can begin.
128
Worth noting: Although FTP does support user authentication, all data is sent in clear
text, including usernames and passwords. For secure transmission that protects the
username and password, and encrypts the content, FTP is often secured with SSL/TLS
(FTPS) or replaced with SSH File Transfer Protocol (SFTP).
B. Objectives:
C. Learning Content:
D. Pre-test:
E. Learning Activities:
Let's configure a mail server in Packet Tracer. And have in mind that although our main
focus is configuring an email server, we’ll still need services of a DNS server at one
point.
2.Configure IP addresses on the PCs, DNS Server and the Mail Server.
129
Mail Server IP address: 192.168.1.2/24
3. Now configure mail clients on the PCs and mail service on the generic server.
Mail Clients:
Click on PC0. Go to its Desktop tab, and click on Email. Configure the email client by
filling in the user, server and login information. Be sure to Save.
PC0:
130
PC1:
To do this, click on the server, then click Services tab, pick email server from the menu.
Provide the Domain name of the server then click on Set to set it. In this example I’ve
used the name ‘mail.com’ .
Proceed and add users and provide their passwords. I have two email clients(users)
with usernames ‘client1‘ and ‘client2‘ with a common password ‘adminkim‘
After entering a username and password, click on Add(+) to add the user to the server.
You can optionally remove a user by clicking on Remove (-). You can change a user’s
password by clicking on change password.
131
Try to relate this process to what happens when you register an email account with a
mail service provider(mail server) like Gmail. The processes appear to agree, isn’t it?
Now, notice that we set a domain name for the email server. For that reason, we should
have a DNS server that will resolve this domain name (plus other domain names if there
were) to an IP address.
Click DNS server, click Services tab, then pick DNS. Turn the service ON. Set name-
address pairs and add them to the server. You can view the DNS entry below:
132
4. Lastly test the email service. Go to PC0 email client, compose an email and send its
to PC1 email address (client2@mail.com).
Try to see whether the email from PC0 is received on PC1. On the email client of PC1,
click on Receive.
133
If everything is well set up, the email from PC0 will be well received on PC1.
134
3. Now try using an FTP client built in the Laptop to send files to an FTP server configured in
the Server.
From the Laptop’s command prompt, FTP the server using the server IP address by typing:
ftp 192.168.1.2
Provide the username(cisco) and password(cisco) [which are the defaults] for ftp login.
PC0 has an FTP client which can be used to read, write, delete and rename files present in the
FTP server.
The FTP server can be used to read and write configuration files as well as IOS images.
Additionally, the FTP server also supports file operations such rename, delete and listing
directory.
4. Create a file in the Laptop then upload it to the server using FTP.
To do this, open the Text Editor in the Laptop, create a file and give it your name of choice.
Type any text in the editor then save your file. e.g. myFile.txt.
5. Now upload the file from the Laptop to the server using FTP. (An FTP connection has to be
started first. But this is what we’ve done in step 3)
put MyFile.txt
135
6. Once file upload is successful, go to the Server FTP directory to verify if the file sent has
been received . To do this, go to Server-> Services->FTP. Here look for MyFile.txt sent from
the laptop.
Something extra: To check other FTP commands supported by the FTP client running on the
Laptop(or PC), you can use a question mark (?) on the Laptop’s command prompt as shown
below:
You can see the put command that we used to upload our file to the FTP server. Other
commands listed include:
136
get-used to get(download) a file from the server.
For example, we can open an HTTP directory in the server by typing: cd /http. This will change
the current directory from FTP directory to HTTP directory
Once the http directory is open, you can upload a file to the HTTP server. You’re now uploading
a file to an HTTP folder(directory) using FTP.
To see this working, let’s open an HTTP directory and upload(put) a file to it using FTP:
You can now check up in the HTTP directory in the server and verify that the file uploaded
from the Laptop(MyFile.txt) is well received:
137
Notice that we are uploading files to an HTTP Server directory using File Transfer Protocol.
(FTP). This is what actually happens when you use an FTP client such as FileZilla client to
upload files to a website. In our case here, we are using an FTP client built-in the Laptop.
This may interest you: The first FTP client applications were command-line programs developed
before operating systems had graphical user interfaces, and are still shipped with most Windows
and Linux operating systems. (Actually this is what we have been using this far). Many FTP
clients(e.g. FileZilla) and automation utilities have since been developed for desktops, servers,
mobile devices, and hardware. FTP has also been incorporated into productivity applications,
such as HTML editors.
Well done for reading this topic up to this point! You now have more than a foundation
regarding working with FTP to upload, download, delete, rename…files.
We’ll create an html file in our Laptop, upload it to HTTP server directory using FTP, then try
to access the file from the Laptop’s browser.
138
On the Laptop, open the text editor, then type some markup(html) and save the file with the
extension .html. See all this below:
Now upload the file( File2.html) to the HTTP server using FTP. This is easy. We’ve already
done it previously!
If you’re already in the HTTP directory, you just need to type: put File2.html. If no, first ftp the
server(ftp 192.168.1.2), provide the login username(cisco) and password(cisco); change the
current directory to HTTP(cd /http) , and finally upload the html file onto the HTTP
directory(put File2.html)
139
Moving on…
Check whether the html file uploaded has been received in the HTTP directory:
Go to Server->Services-> HTTP. Then look up for the file in the File Manager.
Now edit index.html file in the HTTP directory so as to include a link to File2 that we’ve just
uploaded. This will make File2 accessible from the Laptop’s browser. To do this, locate
140
index.html then click edit. Proceed to edit it as shown below. Then save and accept overwrite.
Finally, try to access the newly uploaded file from the Laptop’s browser.
So go to the Laptop’s browser and access the server using the server’s IP address. By doing this,
the browser is making an http request to the server. The server will respond to the Laptop with
the index.html file containing a link to File2 which we’ve uploaded from the Laptop using FTP.
141
Click File2 link to view the contents of the file in the browser.
Note: Make a youtube channel to save your videos regarding IT6 Networking 2 for
demo and submission of your video clip when submitting your projects, experiment and
activity. Then send to my tatayphinks fb account and email to tatayphinks@gmail.com.
F. Assessment:
Multiple choice: 5 points each. Answer in google form link here: bit.ly/3z0aEeA
2. From what port does FTP server send data and information?
a. 20
b. 21
c. 6000
d. 6001
142
b. Fixed Transfer Protocol
c. Field Translation Protocol
d. Frame Transfer Protocol
G. Reference:
https://computernetworking747640215.wordpress.com/2018/07/05/configuring-a-mail-
server-in-packet-tracer/
https://www.slideshare.net/sotheakonpov/how-to-create-mail-server-in-cisco-packet-
tracer
https://computernetworking747640215.wordpress.com/2019/11/22/how-to-configure-an-
ftp-server-in-packet-tracer/
143