You are on page 1of 12

Topology:

Part 1:
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway

R1 G0/0 191.0.0.2 255.255.0.0 N/A

R1
G0/1 191.10.0.1 255.255.0.0

R1

R3 G0/0 191.0.0.3 255.255.0.0 N/A

R2
G0/1 191.20.0.1 255.255.0.0

R2

S1 VLAN 2 (CS Dept) 191.2.0.0 255.255.0.0 191.2.0.1


S2 VLAN 3 (HR Dept) 191.3.0.0 255.255.0.0 191.3.0.1
S3 VLAN 4 (Management) 191.4.0.0 255.255.0.0 191.4.0.1
S3 VLAN 6 (Web Server) 191.6.0.0 255.255.0.0 191.6.0.1

Part 3:
Addressing Table:
Description PC-A PC-B PC-C PC-D Webserver
IP Address 191.2.0.2 191.2.0.3 191.4.0.2 191.3.0.2 191.6.0.2
Subnet Mask 255.255.0.0 255.255.0.0 255.255.0.0 255.255.0.0 255.255.0.0
Default Gateway 191.2.0.1 191.2.0.1 191.4.0.1 191.3.0.1 191.6.0.1

Commands:
Part 1:
Configuring Routers:
R1:
#en
#conf t
#config-register 0x2102
#end
#wr
#reload
#en
#conf t
#no ip domain-lookup
#hostname R1
#enable secret ciscopass1
#line console 0
#password ciscopass11
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret Cisco123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd “unauthorized access no allowed….. FA19-BCS-049”
#int g0/1
#ip address 191.10.0.2 255.255.0.0
#no shut
#int g0/0
#ip address 191.0.0.1 255.255.0.0
#no shut

Creating 802.1q trunk:


#en
#conf t
#int g0/1
#int g0/1.2
#encapsulation dot1Q 2
#ip address 191.2.0.1 255.255.0.0
#int g0/1.3
#encapsulation dot1Q 3
#ip address 191.3.0.1 255.255.0.0

R3:
#en
#conf t
#config-register 0x2102
#end
#wr
#reload
#en
#conf t
#no ip domain-lookup
#hostname R3
#enable secret ciscopass1
#line console 0
#password ciscopass11
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret Cisco123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd “unauthorized access no allowed….. FA19-BCS-049”
#int g0/1
#ip address 191.20.0.2 255.255.0.0
#no shut
#int g0/0
#ip address 191.0.0.2 255.255.0.0
#no shut

Creating 802.1q trunk:


#en
#conf t
#int g0/1
#int g0/1.4
#encapsulation dot1Q 4
#ip address 191.4.0.1 255.255.0.0
#int g0/1.6
#encapsulation dot1Q 6
#ip address 191.6.0.1 255.255.0.0

Configuration for Swithes:


S1:
#en
#conf t
#no ip domain-lookup
#hostname S1
#enable secret Cisco1234
#line console 0
#password Cisco1234
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret admin123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd # “unthourized access not allowed …….FA19-BCS-049”
#en
#conf t
#vlan 2
#name cs
#vlan 3
#name hr
#vlan 5
#name null
#vlan 1
#int vlan 2
#int vlan 3
#int vlan 1
#int range f0/6-7
#switchport mode access
#switchport access 2
#int range f0/1-4
#switchport mode access
#switchport access vlan 5
#shutdown
#int range f0/6-16
#switchport mode access
#switchport access vlan 5
#shutdown
#int range f0/19-24
#switchport mode access
#switchport access vlan 5
#shutdown
#int f0/5
#switchport mode trunk
#switchport trunk native vlan 1

Configuring the ethernet channel:


#int range fa0/1-2
#channel-group 1 mode passive
#int port-channel 1
#switchport mode trunk
#switchport trunk native vlan 1

S2:
#en
#conf t
#no ip domain-lookup
#hostname S2
#enable secret Cisco1234
#line console 0
#password Cisco1234
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret admin123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd “unathourized access not allowed……….. FA19-BCS-049”
#en
#conf t
#vlan 2
#name cs
#vlan 3
#name hr
#vlan 5
#name null
#vlan 1
#int vlan 2
#int vlan 3
#int vlan 1
#int f0/10
#switchport mode access
#switchport access vlan 3
#int range f0/1-4
#switchport mode access
#switchport access vlan 5
#shutdown
#int range f0/6-16
#switchport mode access
#switchport access vlan 5
#shutdown
#int range f0/19-24
#switchport mode access
#switchport access vlan 5
#shutdown

Configuring the ethernet channel:


#int range fa0/1-2
#channel-group 1 mode passive
#int port-channel 1
#switchport mode trunk
#switchport trunk native vlan 1

S3:
#en
#conf t
#no ip domain-lookup
#hostname S1
#enable secret Cisco1234
#line console 0
#password Cisco1234
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret admin123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd # “unthourized access not allowed …….FA19-BCS-049”
#en
#conf t
#vlan 4
#name management
#vlan 6
#name webserver
#vlan 5
#name null
#vlan 1
#int vlan 4
#int vlan 6
#int vlan 1
#int f0/18
#switchport mode access
#switchport access vlan 4
#int f0/17
#switchport mode access
#switchport access vlan 6
*now to assign vlan 5
#int range f0/1-4
#switchport mode access
#switchport access vlan 5
#int range f0/6-16
#switchport mode access
#switchport access vlan 5
#int range f0/19-24
#switchport mode access
#switchport access vlan 5
#int f0/5
#switchport mode trunk
#switchport trunk native vlan 1
Part 2:
Configuring ospf routing:
R1:
#en
#conf t
#router ospf 1
#network 191.3.0.0 0.0.255.255 area 0
#network 191.2.0.0 0.0.255.255 area 0
`#network 191.0.0.0 0.0.255.255 area 0
#passive int g0/1

R3:
#en
#conf t
#router ospf 1
#network 191.6.0.0 0.0.255.255 area 0
#network 191.4.0.0 0.0.255.255 area 0
`#network 191.0.0.0 0.0.255.255 area 0
#passive int g0/1

Configuring ACL For Nat on R1:

#ip access-list standard 9


#permit 191.0.0.0 0.255.255.255
#int g0/0
#ip access-group 9 out

You might also like