You are on page 1of 44

MSC CYBER SECURITY & PEN TESTING

CST4500

COMPUTER NETWORKS & INTERNETWORKING

LAB REPORT

MOHAMMED, KASHIM KYARI

31/12/2020

1
Table of Contents
LAB 1 – WIRESHARK ...................................................................................................................................... 4
LAB TASK ................................................................................................................................................... 4
LAB 2A: PACKET TRACER ............................................................................................................................... 5
STEP 1. ....................................................................................................................................................... 5
STEP 2: EXAMINE THE CURRENT SWITCH CONFIGURATION .................................................................... 5
STEP 3 ASSIGN A NAME TO THE SWITCH .................................................................................................. 5
Step 4 Examine the current running configuration .................................................................................. 5
Step 5 Set the access passwords............................................................................................................... 6
Step 6 Set the command mode passwords .............................................................................................. 6
Step 7 Configure the layer 3 access to the switch .................................................................................... 6
Step 8 Verify the management LANs settings .......................................................................................... 7
STEP 9 SAVE THE CONFIGURATION .......................................................................................................... 8
Step 10 Examine the startup configuration file ........................................................................................ 8
LAB 2B ........................................................................................................................................................... 9
TASKS ........................................................................................................................................................ 9
LAB 3 ........................................................................................................................................................... 11
Stage 1: What is a network? ................................................................................................................... 11
Stage 2: Basic Network Administration .................................................................................................. 11
Stage 3: Internetwork Interaction .......................................................................................................... 14
LAB 3 ADDITIONAL ...................................................................................................................................... 15
LAB 4A: Wireshark UDP............................................................................................................................... 18
Lab 4B: Wireshark TCP ................................................................................................................................ 21
LAB 5A: PACKET TRACER - HSRP CONFIGURATION ..................................................................................... 32
PART 1: VERIFY CONNECTIVITY ............................................................................................................... 32
STEP 1: Trace the path to the Web Server from PC-A. ....................................................................... 32
STEP 2: Trace the path to the Web Server from PC-B......................................................................... 33
STEP 3: Observe the network behavior when R3 becomes unavailable ............................................ 34
PART 2: Configure HSRP Active and Standby Routers ............................................................................ 36
STEP 2: Configure HSRP on R3. ........................................................................................................... 36
STEP 3: Verify HSRP Configuration ...................................................................................................... 37
PART 3: Observe HSRP Operation ........................................................................................................... 39
STEP 1: Make the active router become unavailable. ........................................................................ 39

2
STEP 2: Break the link to R1. ............................................................................................................... 39
STEP 3: Restore the link to R1. ............................................................................................................ 40
LAB 5B: Point-to-Point Single-Area OSPFv2 Configuration ......................................................................... 41
Part 1: Configure Router IDs. .................................................................................................................. 41
Part 2: Configure Networks for OSPF Routing. ....................................................................................... 41
Step 1. Configure networks for OSPF routing using network commands and wildcard masks. ......... 41
Step 2. Configure networks for OSPF routing using interface IP addresses and quad-zero masks. ... 42
Step 3. Configure OSPF routing on router interfaces ......................................................................... 42
Part 3. Configure Passive Interfaces ....................................................................................................... 43
Part 4. Verify OSPF Configuration ........................................................................................................... 44

3
LAB 1 – WIRESHARK
LAB TASK
1. UDP, HTTP and TCP
2. As shown in the figure below, the time between HTTP GET and HTTP OK is 0.33 seconds

3. The IP address of gaia.umass.cs.edu is 128.119.245.12 and my computer’s IP address is


172.20.10.4.
4. The HTTP GET message is shown in the figure below.

And the HTTP OK is shown in the figure below

4
LAB 2A: PACKET TRACER
STEP 1.
a. The privilege exec mode was entered on the switch with the command “enable”.

STEP 2: EXAMINE THE CURRENT SWITCH CONFIGURATION


b. The switch has 24 FastEthernet ports (i.e., FastEthernet0/0-24)

c. The range of the VTY line is 0 to 15

d. This is not present.

e. This is displayed because the configuration file was not saved to NVRAM. Currently it is only located
in RAM.

STEP 3 ASSIGN A NAME TO THE SWITCH


a. The name of the switch was configured as ALSwitch, this is shown in the figure below

Step 4 Examine the current running configuration


a. In the running-config, only the hostname is configured. This is shown in the figure below.

b. There are no passwords set on the line.


c. The hostname of the switch, as shown in the configuration, is ALSwitch.

5
Step 5 Set the access passwords
The access passwords were configured as shown in the figure below.

Step 6 Set the command mode passwords


The command mode passwords were enabled, and this is shown in the figure below

Step 7 Configure the layer 3 access to the switch


a. The IP address of the interface vlan 1 was configured.

b. The default gateway of vlan 1 was configured, and this is shown in the figure below

6
Step 8 Verify the management LANs settings
a. The vlan 1 interface configuration is shown in the figure below

b. The bandwidth of the interface is 100mb


c. VLAN 1 is down and Line protocol is down
d. The VLAN 1 interface was enabled using the “no shutdown” command as shown in the figure
below

e. Queuing strategy

7
STEP 9 SAVE THE CONFIGURATION
a. The configuration was saved and is shown in the figure below

Step 10 Examine the startup configuration file

a. The startup-config is shown in the figure below.

b. The passwords and secret are shown


c. Yes, all changes were recorded.

8
LAB 2B
TASKS
The hostname of the switch is configured as S1, and the passwords as cisco. This is shown in the figure
below.

a) Cisco 2960 is very similar to 2950 offering advanced quality of service (QoS), Security features
with few notable differences like Performance, maximum MTU size, no of ACL entries , QoS
policies
b) The following are;
i. Ping

9
ii. Traceroute

10
LAB 3
Stage 1: What is a network?
Steps:

1. Open Packet tracer


2. Two end devices were added
3. The two hosts were connected using the automatic connection option.
4. The FastEthernet configuration tab on the first host was entered.
5. The first host was configured with an IP address of 10.10.10.2 and a subnet mask of 255.0.0.0
6. The above steps were repeated on the second host while using an IP address configuration of
10.10.10.3 250.0.0.0
7. The command prompt of the first host was entered
8. The “ping 10.10.10.3” command was run and the outcome is shown in the figure below

9. The ARP Table was viewed using the “arp -a” command, as shown in the figure below

Stage 2: Basic Network Administration


1. Packet Tracer was opened
2. A host was added
3. The default gateway of the host was configured with 10.0.0.1
4. The FastEthernet Interface configuration of the host was entered
5. The host was configured with IP address of 10.0.0.10 and a subnet mask of 255.255.255.0
6. A 2950-24 Cisco Switch was added to the network

11
7. An 1811 Cisco router was also added to the network
8. The router is then configured using the IOS command line interface
9. The telnet was enabled using the commands in the figure below

10. The command prompt on the host was opened


11. The router was accessed using telnet from the hosts’ command prompt, as shown in the figure
below

12
12. A dhcp pool named “myPool” was created on the router and dhcp service is enabled, as shown
in the figure below

13. Another host was added to the network and connected to the switch
14. DHCP was configured on the newly added host on the network
15. DHCP request was successful
a. IPCONfig

b. telnet 10.0.0.1

c. Ping 10.0.0.10

d. Arp table

13
Stage 3: Internetwork Interaction

1. Show IP route on Lab3

2. Ping 10.1.1.2

3. Traceroute

14
LAB 3 ADDITIONAL
1. USER MODE
2. The ‘?’ shows the list of available commands
3. The SSH command opens a secure shell client
4. Show means show running System Information
5. Version 12.4(15)
6. Configure the following:

Enter privileged exec mode Router> enable


Enter global configuration mode Router# configure terminal:
Stop domain lookup Router# no ip domain-lookup
Hostname Router(config)# hostname routerD
Configure message of the day routerD (config)# banner motd #Hello etc.#
All interfaces (use private IP addresses routerD (config)# int s1/0
with
the subnet mask 255.255.255.0) routerD (config-if)# ip address 192.168.0.1 255.255.255.0
routerD (config-if)# no shut
routerD (config-if)# clockrate 64000
routerD (config-if)# exit
routerD (config)# int fa0/1
routerD (config-if)# ip address 192.168.1.1 255.255.255.0
routerD (config-if)# no shut
routerD (config-if)# exit

Description for each interface routerD (config-if)# description Router LAB-1-s1/0

Console password routerD (config)# line console 0


routerD (config)# login
routerD (config)# password cisco

Enable secret routerD (config)# enable secret class


Passwords for virtual terminals routerD (config)# line vty 0 5
routerD (config)# login
routerD (config)# password class

Routing protocol RIP routerD (config)# router rip


routerD (config-router)# version 2
routerD (config-router)# network 192.168.0.0
routerD (config-router)# network 192.168.1.0

ip host routerD (config)# ip host anyHostname 192.168.0.1

7. Show run –shows what is running on the router before saving


Show start shows what is and saved on the router, however after saving the config available on
the running config to startup config it will then appear on the startup configuration
8. The same configuration is present
9. An additional host was added
10. Host to host connectivity check
i. Ping from PC0 to PC1

15
ii. Traceroute from PC0 to PC1

16
17
LAB 4A: Wireshark UDP
1. The UDP Header contains four (4) fields, as shown in the figure below, namely -
i. Source Port,
ii. Destination Port,
iii. Length,
iv. Checksum

2. Each of the header fields contain 2 bytes. So, the UDP header has a length of 8 bytes. This is
illustrated in the figure below

18
3. The length of the payload for the selected UDP packet is 172 bytes. This is shown in the data
header of the selected packet, or simply subtract 8 bytes from the payload length, as shown in
the figure below.

4. The maximum UPD payload byte number is;


216 − 1 + 𝐻𝑒𝑎𝑑𝑒𝑟𝐵𝑦𝑡𝑒𝑠 , where HeaderBytes = 8 bytes.

i.e., 65535 𝑏𝑦𝑡𝑒𝑠 − 8 𝑏𝑦𝑡𝑒𝑠 = 65527 𝑏𝑦𝑡𝑒𝑠

5. Similarly, the largest possible source port number is 216 − 1 = 65535

6. Ip protocol number for UDP in decimal is 17 as shown in the figure below , and in hexadecimal is
0x11.

19
7. The source port of the packet sent is the same as the destination port of the reply pack and vice
versa. This is shown in the figures below

First Packet

Second Packet

20
Lab 4B: Wireshark TCP
1. What is the IP address and TCP port number used by the client computer (source) that is
transferring the file to gaia.cs.umass.edu?

Answer:

CLIENT COMPUTER (SOURCE)


IP ADDRESS 192.168.1.102
PORT 1161

Client Source IP address and


Source Port

2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP
segments for this connection?

Answer:

SERVER (DESTINATION)
IP ADDRESS 128.119.245.12
PORT 80

Server Source IP address and


Source Port

21
3. What is the IP address and TCP port number used by your client computer (source) to transfer the
file to gaia.cs.umass.edu?

Answer:

CLIENT COMPUTER (SOURCE)


IP ADDRESS 10.0.0.9
PORT 58226

Client Source IP address and


Source Port

4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection
between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the
segment as a SYN segment?

Answer:

The sequence number of the TCP SYN segment is 0 since it is used to imitate the TCP connection between
the client computer and gaia.cs.umass.edu. According to figure below, in the Flags section, the Syn flag is
set to 1 which indicates that this segment is a SYN segment.

22
5. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client
computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK
segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies
the segment as a SYNACK segment?

Answer:

In the figure below, the sequence number of the SYNACK segment from gaia.cs.umass.edu as a reply to
the SYN is 0. The value in the ACK field of the SYNACK segment is 1. The value in the ACK field of the
SYNACK segment is determined by the server gaia.cs.umass.edu.

The server adds 1 to the initial sequence number of SYN segment form the client computer. In this case,
the initial sequence number of SYN segment from the client computer is 0, hence the value of the
Acknowledgement field in the SYNACK segment is 1.

A segment will be classified as a SYNACK segment if both SYN flag and Acknowledgement in the segment
are set to 1.

23
6. What is the sequence number of the TCP segment containing the HTTP POST command? Note that
to find the POST command, you will need to dig into the packet content field at the bottom of the
Wireshark window, looking for a segment with a “POST” within its DATA field.

Answer:

According to above figure, the segment No.4 contains the HTTP POST command, the sequence number
of this segment is 1.

24
7. Consider the TCP segment containing the HTTP POST as the first segment in the TCP connection.
What are the sequence numbers of the first six segments in the TCP connection (including the
segment containing the HTTP POST)? At what time was each segment sent? When was the ACK for
each segment received? Given the difference between when each TCP segment was sent, and when
its acknowledgement was received, what is the RTT value for each of the six segments? What
is the EstimatedRTT value (see Section 3.5.3, page 239 in text) after the receipt of each ACK?
Assume that the value of the EstimatedRTT is equal to the measured RTT for the first
segment, and then is computed using the EstimatedRTT equation on page 239 for all subsequent
segments

Answer:

First six segments

Segment 1. Packet Number 5 with a sequence Number of 566


Segment 2. Packet Number 7 with a sequence Number of 2026
Segment 3. Packet Number 8 with a sequence Number of 3486
Segment 4. Packet Number 10 with a sequence Number of 4946
Segment 5. Packet Number 11 with a sequence Number of 6406
Segment 6. Packet Number 13 with a sequence Number of 7866

Table 1 illustrates the source of the send and receive time of the segments used to calculate the
EstimatedRTT, as shown in Table 2.

25
Table 1 Packet number, Sequence and ACK PDU number

SID Packet Number Sequence Number ACK Number


1 5 566 6
2 7 2026 9
3 8 3486 12
4 10 4946 14
5 11 6406 15
6 13 7866 16

Table 2 illustrates the send and receive time of the chosen segments. The formula used in calculating
the RTT column is 𝑅𝑇𝑇 = 𝑅𝑒𝑐𝑖𝑒𝑣𝑒 𝑡𝑖𝑚𝑒 − 𝑆𝑒𝑛𝑑 𝑇𝑖𝑚𝑒.
Table 2 Segment Timestamp (Sent and Received)

SID Sent time Ack received time RTT (s)


1 0.041737 0.053937 0.497633
2 0.054026 0.077294 0.023268
3 0.054690 0.124085 0.069395
4 0.077405 0.169118 0.091713
5 0.078157 0.217299 0.139142
6 0.124185 0.267802 0.143617

Similarly, the formulae used in calculating the EstimatedRTT is.

𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟖𝟕𝟓 ∗ 𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 + 𝟎. 𝟏𝟐𝟓 ∗ 𝑺𝒂𝒎𝒑𝒍𝒆𝑹𝑻𝑻

➢ The EstimatedRTT for segment 1 (i.e., Packet 5) after receiving ACK is 0.497633

𝒕𝒉𝒆𝒓𝒆𝒇𝒐𝒓𝒆, 𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟒𝟗𝟕𝟔𝟑𝟑 𝒔𝒆𝒄𝒐𝒏𝒅𝒔

➢ The EstimatedRTT for segment 2 (i.e., Packet 7) after receiving ACK is calculated using the above
formula.

𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟖𝟕𝟓 ∗ 𝟎. 𝟒𝟗𝟕𝟔𝟑𝟑 + 𝟎. 𝟏𝟐𝟓 ∗ 𝟎. 𝟎𝟐𝟑𝟐𝟔𝟖


𝒕𝒉𝒆𝒓𝒆𝒇𝒐𝒓𝒆, 𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟎𝟏𝟑𝟎𝟒𝟎 𝒔𝒆𝒄𝒐𝒏𝒅𝒔

➢ The EstimatedRTT for segment 3 (i.e., Packet 8) after receiving ACK is calculated using the above
formula.

𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟖𝟕𝟓 ∗ 𝟎. 𝟎𝟏𝟑𝟎𝟒𝟎 + 𝟎. 𝟏𝟐𝟓 ∗ 𝟎. 𝟎𝟔𝟗𝟑𝟗𝟓


𝒕𝒉𝒆𝒓𝒆𝒇𝒐𝒓𝒆, 𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟎𝟎𝟗𝟒𝟔𝟔 𝒔𝒆𝒄𝒐𝒏𝒅𝒔

26
➢ The EstimatedRTT for segment 4 (i.e., Packet 10) after receiving ACK is calculated using the
above formula.

𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟖𝟕𝟓 ∗ 𝟎. 𝟎𝟎𝟗𝟒𝟔𝟔 + 𝟎. 𝟏𝟐𝟓 ∗ 𝟎. 𝟎𝟗𝟏𝟕𝟏𝟑


𝒕𝒉𝒆𝒓𝒆𝒇𝒐𝒓𝒆, 𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟎𝟏𝟐𝟐𝟐𝟒 𝒔𝒆𝒄𝒐𝒏𝒅𝒔

➢ The EstimatedRTT for segment 5 (i.e., Packet 11) after receiving ACK is.

𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟖𝟕𝟓 ∗ 𝟎. 𝟎𝟏𝟐𝟐𝟐𝟒 + 𝟎. 𝟏𝟐𝟓 ∗ 𝟎. 𝟏𝟑𝟗𝟏𝟒𝟐


𝒕𝒉𝒆𝒓𝒆𝒇𝒐𝒓𝒆, 𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟎𝟏𝟖𝟖𝟖𝟏 𝒔𝒆𝒄𝒐𝒏𝒅𝒔

➢ The EstimatedRTT for segment 6 (i.e., Packet 13) after receiving ACK is.

𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟖𝟕𝟓 ∗ 𝟎. 𝟎𝟏𝟖𝟖𝟖𝟏 + 𝟎. 𝟏𝟐𝟓 ∗ 𝟎. 𝟏𝟒𝟑𝟔𝟏𝟕


𝒕𝒉𝒆𝒓𝒆𝒇𝒐𝒓𝒆, 𝑬𝒔𝒕𝒊𝒎𝒂𝒕𝒆𝒅𝑹𝑻𝑻 = 𝟎. 𝟎𝟐𝟎𝟑𝟐𝟓 𝒔𝒆𝒄𝒐𝒏𝒅𝒔

The table below shows the EstimatedRTT pf all six selected segments.
Table 3 EstimatedRTT table

SID ESTIMATEDRTT (s)


Segment 1. 0. 497633
Segment 2. 0. 013040
Segment 3. 0. 009466
Segment 4. 0. 012224
Segment 5. 0. 018881
Segment 6. 0. 020325

27
8. What is the length of each of the first six TCP segments?

Answer:

From Table 4, the size of the data received in the first six ACKs are shown sequentially. The received data
increases by 1460 bytes until it reaches the sixth packet. This means that the receiver acknowledges
1460 bytes in every packet.
Table 4

Segment Packet Number Length (bytes


1. 4 565
2. 5 1460
3. 7 1460
4. 8 1460
5. 10 1460
6. 11 1460

28
9. What is the minimum amount of available buffer space advertised at the received for the entire
trace? Does the lack of receiver buffer space ever throttle the sender?

Answer:

As shown in the figure below, the first ACK from the server implies that the minimum available buffer
space, as advertised by gaia.cs.umass.edu in the handshake process is 17520 bytes. However, the
window size of the receiver grows until a maximum window of 37960 bytes. Also, the lack of receiver
buffer space does not throttle the sender.

29
10. Are there any retransmitted segments in the trace file? What did you check for (in the trace) in
order to answer this question?

Answer:

There is no retransmitted segments in the trace file since in the time sequence graph (stevens), all
sequence numbers are monotonically increasing.

11. How much data does the receiver typically acknowledge in an ACK? Can you identify cases where
the receiver is ACKing every other received segment (see Table 3.2 on page 247 in the text).

Answer:

The difference between the acknowledged sequence numbers of two consecutive ACKs indicates the
data received by the server between these two ACKs.

The receiver is ACKing every other segment. For example, segment of No. 11 acknowledged data with
1460 bytes.

30
12. What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you
calculated this value.

Answer:

The alice.txt on the hard drive is 155,648 bytes, and the POST time is.
0.026477(𝐹𝑖𝑟𝑠𝑡 𝑇𝐶𝑃 𝑠𝑒𝑔𝑚𝑒𝑛𝑡) ‐ 0.124085 (𝑙𝑎𝑠𝑡 𝐴𝐶𝐾) = 1.307479 𝑠𝑒𝑐𝑜𝑛𝑑
Therefore, the throughput for the TCP connection is computed as.

155,648/1.307479 = 116359.803867 𝑏𝑦𝑡𝑒𝑠/𝑠𝑒𝑐𝑜𝑛𝑑

13. Use the Time-Sequence-Graph(Stevens) plotting tool to view the sequence number versus time plot
of segments being sent from the client to the gaia.cs.umass.edu server. Can you identify where
TCP’s slow start phase begins and ends?

Answer:

The slow start of the TCP seems to begin at about 0.12 seconds and then ends at about 0.19 seconds.
Congestion avoidance takes over at about 0.7 seconds because it cut down the amount being sent.

31
LAB 5A: PACKET TRACER - HSRP CONFIGURATION

PART 1: VERIFY CONNECTIVITY


STEP 1: Trace the path to the Web Server from PC-A.
a. A command prompt was open in PC-A.
b. Using the figure below, the devices on the path from PC-A to the webserver are R1, R2 and
Internet.

32
STEP 2: Trace the path to the Web Server from PC-B.
a. A command prompt was open in PC-B.
b. Using the figure below, the devices on the path from PC-B to the webserver are R3, R2 and
Internet.

33
STEP 3: Observe the network behavior when R3 becomes unavailable
a. The link between S3 and R3 was deleted as shown in the figure below

b. A command prompt was opened on PC-B and a traceroute command was executed to show the
path between PC-B and the Web Server. This is shown in the figure below.

34
c. After removing the link between R3 and S3, PC-B is unable to find a path to the Web server.
d. The copper straight-through connection was selected from the connections tab
e. The GigabitEthernet0/2min interface on S3 was connected to the GigabitEthernet0/0 interface
on R3.
f. As shown in the figure below, the Ping from PC-B to the web server is successful.

35
PART 2: Configure HSRP Active and Standby Routers
a. The interface GigabitEthernet0/1 on R1 was entered using the command line interface.
b. HSRP protocol version was specified as shown in the figure below

c. The IP address of the default virtual gateway was set to 192.168.1.254 on the standby group
number 1. This is shown in the figure below.

d. R1 was selected as an active router using the priority option of the standby command. This is
shown in the figure below.

e. The preempt option of the standby protocol was set on R1, to assume to role of the active
router upon availability. This is shown in the figure below

STEP 2: Configure HSRP on R3.


a. The interface GigabitEthernet0/0 on R3 was entered using the command line interface.
b. HSRP protocol version was specified as standby version 2
c. The IP address of the default virtual gateway was set to 192.168.1.254 on the standby group
number 1. This is shown in the figure below.

36
STEP 3: Verify HSRP Configuration
a. The HSRP configuration is then verified by executing a show standby command on both routers.
The configurations are shown below

Using the above figures, R1 (192.168.1.3) is the active router. The MAC address of the virtual IP
address is the address on the GigabitEthernet0/1 interface of R1. The IP address of the standby
router is 192.168.1.254 and the priority is 150.

b. The figures below are standby summaries of both, R1 and R3, respectively.

37
c. The default gateway address for PC-A, PC-B, S1 and S3 were changed to 192.168.1.254 and as
shown in the figures below.

38
The ping from both PC-A and PC-B to the web server was successful and this is shown in the figures
below.

PART 3: Observe HSRP Operation


STEP 1: Make the active router become unavailable.
The current path is different from the previous path because it now passes through R1 (active router)
instead of R3.

STEP 2: Break the link to R1.


a. The link between R1 and S1 was deleted.

39
b. Initially, the trace timed out because it could not reach the active router but later went through
R3 as shown in the figure below.

STEP 3: Restore the link to R1.


a. S1 and R1 are reconnected using a copper straight-through.
b. A trace command was executed from PC-B to the web server. However, the trace fails at first
but later uses R1 as the first hop. This is shown in the figure below

If the standby preempt was not configured on R1, then PC-B will maintain R3 as the first hop unless
configured otherwise.

40
LAB 5B: Point-to-Point Single-Area OSPFv2 Configuration
Part 1: Configure Router IDs.
a. Start the OSPF routing process on all three routers. Use process ID 10.

b. Use the router-id command to set the OSPF IDs of the three routers as follows

• R1: 1.1.1.1

• R2: 2.2.2.2

• R3: 3.3.3.3

Part 2: Configure Networks for OSPF Routing.

Step 1. Configure networks for OSPF routing using network commands and wildcard masks.

How many statements are required to configure OSPF to route all the networks attached to router R1?

Ans: Three (3)

The LAN attached to router R1 has a /24 mask. What is the equivalent of this mask in dotted decimal
representation?

Ans: 255.255.255.0

Subtract the dotted decimal subnet mask from 255.255.255.255. What is the result?

Ans: 0.0.0.255

What is the dotted decimal equivalent of the /30 subnet mask?

Ans: 255.255.255.252

Subtract the dotted decimal representation of the /30 mask from 255.255.255.252. What is the result?

Ans: 0.0.0.3

41
a. Configure the routing process on R1 with the network statements and wildcard masks that are
required to activate OSPF routing for all the attached networks.

Open configuration window

b. Verify that OSPF has been configured properly by the displaying the running configuration.

Step 2. Configure networks for OSPF routing using interface IP addresses and quad-zero masks.
On router R2, configure OSPF using network commands with the IP addresses of the interfaces and
quad-zero masks. The syntax of the network command is the same as was used above.

Step 3. Configure OSPF routing on router interfaces


On router R3, configure the required interfaces with OSPF.

Which interfaces on R3 should be configured with OSPF?

• G0//0/0

• S0/1/0

• S0/1/1

Configure each interface.

42
Part 3. Configure Passive Interfaces
Which interfaces on R1, R2, and R3 are a LAN interfaces?

Ans: G0/0/0 on all three routers.

Configure the OSPF process on each of the three routers with the passive-interface command.

Open configuration window

Close configuration window

43
Part 4. Verify OSPF Configuration
Use show commands to verify the network and passive interface configuration of the OSPF process on
each router.

44

You might also like