You are on page 1of 29

EDUCATION FOR BRIGHTER FUTURES

Enterprise Networking

V E R S I O N 1 . 0
1 7 . 0 9 . 2 0 2 0

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 1


Preparation on Designing a Network

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 2


Learning outcome
Identify and select installation and
configuration options
Analyse command-line environment
Identify and install both hardware and software
components
Determine connection type and configure with
reference to network architecture and client
requirements
Assign node to specific gateway as required by
network architecture and client requirements
Ensure node software and hardware are
configured as required according to vendor
specifications and client requirements

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 3


Identify and select installation and configuration options
In preparation to design our first network, we will use Packet Tracer Cisco free provided
simulation software.
Packet Tracer has user interface, enables you to create a simple network of networking and IoT
devices, using Simulation mode to verify device connectivity, modifying environmental elements,
and programming the IoT devices.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 4


Identify and select installation and configuration options
Packet Tracer is software created by
Cisco to aid training
Free for Cisco Networking Academy
students (you)
Latest version at:
https://cisco.netacad.com/
Packet Tracer simulates networks: hosts,
servers, routers and switches etc
Introduction in lab

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 5


Identify and select installation and configuration options
In this week LAB we will be initiating our first network design, but before that I will
demonstrate the use of packet tracer in the class and have you all complete a small
task that would be submitted with your weekly lab activities.
The purpose of this task to allow you identifying and selecting the required devices to
configure an enterprise networking as example below.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 6


Analyse command-line environment
User EXEC mode – limited
examination of router
Router>
Privileged EXEC mode – detailed
examination of router, debugging,
testing, file manipulation (router
prompt changes, show run, ping)
Router#
Global Config mode – detailed
examination of router config mode,
Router(config)#
ROM Monitor – useful for password
recovery & new IOS upload session
Setup Mode – available when router
has no startup-config file

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 7


Analyse command-line environment - cont.
Connect router to console port or telnet to router
 router>
 router>enable
 password
 router#
 router#?
Configuring the router
 Terminal (entering the commands directly)
 router# configure terminal
 router(config)#

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 8


Analyse command-line environment - cont.
Load configuration parameters into RAM
• Router#configure terminal
Personalize router identification
• Router#(config)hostname RouterA
Assign access passwords
• RouterA#(config)line console 0
• RouterA#(config-line)password cisco
• RouterA#(config-line)login

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 9


Analyse command-line environment
Set the enable (secret) password:
 router(config)# enable secret “your pswd”
 This MD5 encrypts the password
 The old method was to use the enable password command. But this is not secure
(weak encryption) and is ABSOLUTELY NOT RECOMMENDED. DO NOT USE!
Ensure that all passwords stored on router are (weakly) encrypted rather than clear text:
 router(config)# service password-encryption

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 10


Analyse command-line environment
Administratively enable/disable the interface
 router(config-if)#no shutdown
 router(config-if)#shutdown
Description
 router(config-if)#description ethernet
link to admin building router

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 11


Analyse command-line environment
This also works in configuration mode:
 router(config)#ip a?
 accounting-list accounting-threshold
 accounting-transits address-pool
 alias as-path
 router(config)#int e0/0
 router(config-if)#ip a?
 access-group accounting address

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 12


Analyse command-line environment
To configure interface you should go to interface
configuration prompt
 router(config)# interface ethernet0 (or 0/x)
 router(config-if)#
Save your configuration
 router#copy running-config startup-config
 (or write memory)

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 13


Analyse command-line environment
IOS has a built-in help facility;
 use “?” to get a list of possible configuration
statements
“?” after the prompt lists all possible commands:
 router#?
“<partial command> ?” lists all possible subcommands,
e.g.:
 router#show ?
 router#show ip ?

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 14


Analyse command-line environment
Configure interfaces
 RouterA#(config)interface ethernet 0/0
 RouterA#(config-if)ip address n.n.n.n m.m.m.m
 RouterA#(config-if)no shutdown
Configure routing/routed protocols
Save configuration parameters to NVRAM
 RouterA#copy running-config startup-config
 (or write memory)

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 15


Analyse command-line environment
To delete your router’s configuration

 Router#erase startup-config
OR
 Router#write erase
 Router#reload

 Router will start up again, but in setup


mode, since startup-config file does not
exists

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 16


Identify and install both hardware and software components

Information systems contain both hardware and


software.
Hardware is the part of an information system
you can touch — the physical components of the
technology. Computers, keyboards, disk drives,
iPads, and flash drives are all examples of
information systems hardware.
Software is the set of instructions that tells the
hardware what to do. When programmers create
software programs, what they are really doing is
simply typing out lists of instructions that tell the
hardware what to do.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 17


Identify and install both hardware and software components
Software can come in many forms, including the operating system and application software.
Essentially, computer software controls computer hardware. These two components are complementary
and cannot act independently of one another.

https://techspirited.com/computer-software-hardware-installation

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 18


Determine connection type and configure with reference
to network architecture and client requirements
Some devices on the network may need to be
configured with a static IP which is outside the
DHCP Pool.
An example will be the NAS and Server;
clients will lose connection to these shared
resources if they change IP addresses every
now and then.
For devices and hardware that needs to be
accessed all the time and should not need to
be reconfigured, static ip outside DHCP pool
is the best way to prevent IP conflicts.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 19


Determine connection type and configure with reference to
network architecture and client requirements
Class Activities 10 Minutes!! 
Based on NIT’s network size, what is the size of the
DHCP pool you would recommend and what subnet
mask would you recommend to use?

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 20


Assign node to specific gateway as required by network
architecture and client requirements
After configuring a new or revised
gateway and tested, client
workstations, servers and other
devices need to be set to operate in
the new networking environment.
The nodes to be configured are
divided into two groups, depending
on their function.
Any network node will need to be
configured with an IP address,
subnet mask and gateway address.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 21


Assign node to specific gateway as required by network
architecture and client requirements
This includes printers, wireless access points and network
storage devices. Generally, client workstations are given
dynamic IP addresses, while servers and other devices are
allocated static IP addresses.
If your existing network has been using dynamically
configured IP addressing, then updating the DHCP servers
with the new parameters will cause all dynamic nodes to be
updated at the next reboot if not forced to renew sooner.
Statically allocated IP address nodes will need to be
manually updated to use the new gateway parameters.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 22


Assign node to specific gateway as required by
network architecture and client requirements
In most small business and home network
environments, there tends to be only a single
Internet gateway. This makes the
configuration of nodes reasonably simple.
In larger organisations, a more complex
network structure may require the selection
of the appropriate gateway necessary to deal
with redundancy and fault tolerance
measures.
So long as the intermediate gateways have
been configured correctly, remote access
and management will be possible through
any number of gateways.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 23


Ensure node software and hardware are configured as
required according to vendor specifications and client
requirements
A representative sample of the nodes in the
network can now be fully tested to ensure that
everything is functioning correctly.
You can use the test system put in place during
the gateway configuration and testing. The
remaining nodes of the network should work in
a similar manner to these sample cases.
A minority of nodes may experience lack of full
functionality. These are typically due to
random hardware failures coinciding with
restarts and human error during re-
configurations.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 24


Ensure node software and hardware are configured as
required according to vendor specifications and client
requirements
A report should be prepared for the client to sign-off
against which details the results of testing.
The intent of the report is to back your claim that the
Internet gateway and systems technically provide for
the client’s requirements and are functioning as
specified by the client.
This report would include a summary followed by
details of the test methods used and results that were
obtained. Good documentation here should include
the identification of the problems and the steps taken
to resolve them.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 25


Ensure node software and hardware are configured as
required according to vendor specifications and client
requirements
This documentation can then be included in the
ongoing troubleshooting guidelines for technical and
non-technical staff.

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 26


Session summary
We started by, identifying and select
installation and configuration options
Then, analyse command-line environment
Identify and install both hardware and software
components
Determine connection type and configure with
reference to network architecture and client
requirements
Assign node to specific gateway as required by
network architecture and client requirements
Lastly, ensure node software and hardware are
configured as required according to vendor
specifications and client requirements

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 27


Week two Lab Activities
Preparation on Designing a small
Network using Packet Tracer
Don’t forget to upload your work on
TMS for review and feedback
Let’s do it together 

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 28


Thank you!
Any Questions?

ENTERP RISE NETWOR KING © 2 0 2 0 N AT I O N A L I N S T I T U T E O F T E C H N O LO G Y P T Y. LT D . A L L R I G H T S R E S E R V E D . 29

You might also like