CCNA1-ITN, SLM, Student Lab Manual
CCNA1-ITN, SLM, Student Lab Manual
CCNA1-ITN, SLM, Student Lab Manual
Topology
Objectives
Part 1: Set Up Devices in the Network as Shown in the Topology
Part 2: Initialize the Router and Reload
Part 3: Initialize the Switch and Reload
Background / Scenario
Before starting a CCNA hands-on lab that makes use of either a Cisco router or switch, ensure that the
devices in use have been erased and have no startup configurations present. Otherwise, the results of your
lab may be unpredictable. This lab provides a detail procedure for initializing and reloading a Cisco router and
a Cisco switch.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs.
Required Resources
1 Router (Cisco 1941 with Cisco IOS software, Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Part 1:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 4
Part 2:
Note: You may receive a prompt to save the running configuration prior to reloading the router. Respond
by typing no and press Enter.
System configuration has been modified. Save? [yes/no]: no
Part 3:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 4
Step 2: Determine if there have been any virtual local-area networks (VLANs) created.
Use the show flash command to determine if any VLANs have been created on the switch.
Switch# show flash
Directory of flash:/
2
3
4
5
6
-rwx
-rwx
-rwx
-rwx
-rwx
1919
1632
13336
11607161
616
Mar
Mar
Mar
Mar
Mar
1
1
1
1
1
1993
1993
1993
1993
1993
00:06:33
00:06:33
00:06:33
02:37:06
00:07:13
+00:00
+00:00
+00:00
+00:00
+00:00
private-config.text
config.text
multiple-fs
c2960-lanbasek9-mz.150-2.SE.bin
vlan.dat
You will be prompted to verify the file name. At this point, you can change the file name or just press
Enter if you have entered the name correctly.
b. When you are prompted to delete this file, press Enter to confirm the deletion. (Pressing any other key will
abort the deletion.)
Delete flash:/vlan.dat? [confirm]
Switch#
Note: You may receive a prompt to save the running configuration prior to reloading the switch. Type no
and press Enter.
System configuration has been modified. Save? [yes/no]: no
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 4
Reflection
1. Why is it necessary to erase the startup configuration before reloading the router?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. You find a couple configurations issues after saving the running configuration to the startup configuration, so
you make the necessary changes to fix those issues. If you were to reload the device now, what configuration
would be restored to the device after the reload?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 4
Background / Scenario
The Internet Protocol Version 6 (IPv6) is not enabled by default in Windows XP. Windows XP includes IPv6
implementation, but the IPv6 protocol must be installed. XP does not provide a way to configure IPv6 static
addresses from the Graphical User Interface (GUI), so all IPv6 static address assignments must be done
using the Network Shell (netsh) utility.
In this lab, you will install the IPv6 protocol on a Windows XP PC. You will then assign a static IPv6 address
to the LAN interface.
Required Resources
1 Windows XP PC
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 5
Installing the IPv6 Protocol and Assigning Host Addresses with Windows XP
b. At the prompt, enter a question mark (?) and press Enter to provide the list of available parameters.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 5
Installing the IPv6 Protocol and Assigning Host Addresses with Windows XP
c.
Type interface ? and press Enter to provide the list of interface commands.
Note: You can use the question mark (?) at any level in the netsh utility to list the available options. The
up arrow can be used to scroll through previous netsh commands. The netsh utility also allows you to
abbreviate commands, as long as the abbreviation is unique.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 5
Installing the IPv6 Protocol and Assigning Host Addresses with Windows XP
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 5
Installing the IPv6 Protocol and Assigning Host Addresses with Windows XP
Reflection
1. How would you renew your LAN interface address information from the netsh utility?
Hint: Use the question mark (?) for help in obtaining the parameter sequence.
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 5
Background / Scenario
Draw and label a map of the Internet as you interpret it now. Include your home or school/university location
and its respective cabling, equipment, devices, etc. Some items you may want to include:
Devices or equipment
Media (cabling)
Upon completion, save your work in a hard-copy format, it will be used for future reference at the end of this
chapter. If it is an electronic document, save it to a server location provided by your instructor. Be prepared to
share and explain your work in class.
For an example to get you started, please visit: http://www.kk.org/internet-mapping
Required Resources
Internet access
Paper and pencils or pens (if students are creating a hard copy)
Reflection
1. After reviewing your classmates drawings, were there computer devices that you could have included on your
diagram? If so, which ones and why?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. After reviewing your classmates drawings, how were some of the model designs the same or different?
What modifications would you make to your drawing after reviewing the other drawings?
_______________________________________________________________________________________
_______________________________________________________________________________________
3. In what way could icons on a network drawing provide a streamlined thought process and facilitate your
learning? Explain your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Background / Scenario
Network collaboration tools give people the opportunity to work together efficiently and productively without
the constraints of location or time zone. Collaborative tool types include document sharing, web meetings,
and wikis.
In Part 1, you will identify collaboration tools that you currently use. You will also research some popular
collaborative tools used today. In Part 2, you will work with Google Drive. In Part 3, you will investigate
Conferencing and Web meeting tools and, in Part 4, you will work with wikis.
Required Resources
Device with Internet access
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 17
b. On the Google Accounts web page, if you already have a Google account, you can sign in now;
otherwise, click SIGN UP.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 17
On the Create a new Google Account web page, fill out the form to the right. The name you enter in the
Choose your username field becomes the account name. It is not necessary to supply your mobile
phone or current email address. You must agree to the Google Terms of Service and Privacy Policy
before clicking Next step.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 17
b. Click the CREATE button to display a drop-down menu that allows you to select the type of document to
create. Choose Document.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 17
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 17
Here on the Sharing settings web page, in the Add people text field, you can enter Google email names,
email addresses, or groups with whom to share this document.
d. As soon as you start entering information into the Add people box, the box provides more options. The
Can edit drop-down menu allows you to choose the document privileges (Can edit, Can comment, Can
view) for the people you add. You can also specify how to notify these people of this document (Send a
copy to myself or Paste the item itself into the email). Click Share & save.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 17
All users with share privileges can view this document at the same time. Users with edit privileges can
edit this document while others view it.
g. If the document is being viewed by someone while you are in it, you can see who they are by clicking the
other viewer(s) drop-down menu (in the upper-right corner of the document).
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 17
Any web browser can be used to view or edit pages or create new content.
Edit and auto links are available to edit a page and automatically link pages. Text formatting is similar to
creating an email.
Access control can be set by the topic creator, defining who is permitted to edit content.
In this part of the lab, you will use the Google account that you created in Part 2 and create a wiki page in
Google Sites.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 17
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 17
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 17
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 17
c.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 17
b. Click Save after you make your changes. This takes you out of page edit mode.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 17
b. In the Name your page field, enter a page name. In the example below, the name Routers is used as the
topic for this page.
c.
Click the Web Page drop-down menu and select Announcements. Google uses this term to indicate a
wiki page.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 17
e. Your new wiki page, called Routers, displays and has a New post menu option that allows information to
be added to the page. (Notice that the left sidebar has a new link to allow your site visitors access to this
page.)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 17
c.
As soon as you start entering information into the Add people box, the box provides more options. The
Can edit drop-down menu allows you to choose the document privileges (Can edit, Can comment, Can
view) for the people you add. You can also specify how to notify these people of this document (Send a
copy to myself or Paste the item itself into the email). Click Share & save.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 16 of 17
Wikipedia http://www.wikipedia.org/
Reflection
1. Can you think of other collaboration tools used in the business world today?
_______________________________________________________________________________________
2. What collaboration tools do you see as useful to a network administrator?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 17 of 17
Background / Scenario
Convergence in the context of networking is a term used to describe the process of combining voice, video,
and data communications over a common network infrastructure. Converged networks have existed for some
time, but were only feasible in large enterprise organizations because of the network infrastructure
requirements and complex management required to make them work seamlessly. Technology advances have
made convergence readily available to large, medium, and small businesses, as well as for the home
consumer.
In Part 1, you will describe your current understanding of convergence and any experience you have with it.
In Part 2, you will research which providers have this service, regardless of geographical location, using the
predefined form included in the lab.
In Part 3, you will research which local ISPs in your area offer converged services for end-user consumers,
using the predefined form included in the lab.
In Part 4, you will select the ISP you like best for home use and list the reasons why.
In Part 5, you will find a local company or public institution using convergence technologies in their business,
using the predefined form included in the lab.
Required Resources
Device with Internet access
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
Product Name of
Converged Service
Download Speed
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
Industry
Convergence Technologies
Reflection
1. What are some of the advantages of using convergence technologies?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2. What are some of the disadvantages of using convergence technologies?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Background
Route tracing computer software is a utility that lists the networks data has to traverse from the user's
originating end device to a distant destination network.
This network tool is typically executed at the command line as:
tracert <destination network name or end device address>
(Microsoft Windows systems)
or
traceroute <destination network name or end device address>
(Unix and similar systems)
Route tracing utilities allow a user to determine the path or routes as well as the delay across an IP network.
Several tools exist to perform this function.
The traceroute (or tracert) tool is often used for network troubleshooting. By showing a list of routers
traversed, it allows the user to identify the path taken to reach a particular destination on the network or
across internetworks. Each router represents a point where one network connects to another network and
through which the data packet was forwarded. The number of routers is known as the number of "hops" the
data traveled from source to destination.
The displayed list can help identify data flow problems when trying to access a service such as a website. It
can also be useful when performing tasks such as downloading data. If there are multiple websites (mirrors)
available for the same data file, one can trace each mirror to get a good idea of which mirror would be the
fastest to use.
Two trace routes between the same source and destination conducted some time apart may produce different
results. This is due to the "meshed" nature of the interconnected networks that comprise the Internet and the
Internet Protocols ability to select different pathways over which to send packets.
Command-line-based route tracing tools are usually embedded with the operating system of the end device.
Other tools, such as VisualRoute, are proprietary programs that provide extra information. VisualRoute
uses available online information to graphically display the route.
This lab assumes the installation of VisualRoute. If the computer you are using does not have VisualRoute
installed, you can download the program using the following link:
http://www.visualroute.com/download.html
If you have any trouble downloading or installing VisualRoute, ask your instructor for assistance. Ensure that
you download the Lite Edition.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 11
Scenario
Using an Internet connection, you will use three route tracing utilities to examine the Internet pathway to
destination networks. This activity should be performed on a computer that has Internet access and access to
the command line. First, you will use the Windows embedded tracert utility. Second, you will use a web-based
traceroute tool (http://www.subnetonline.com/pages/network-tools/online-traceroute.php). Finally, you will use
the VisualRoute traceroute program.
Required Resources
1 PC (Windows 7, Vista, or XP with Internet access)
c.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 11
Four pings were sent and a reply was received from each ping. Because each ping was responded to,
there was 0% packet loss. On average, it took 54 ms (54 milliseconds) for the packets to cross the
network. A millisecond is 1/1,000th of a second.
Streaming video and online games are two applications that suffer when there is packet loss, or a slow
network connection. A more accurate determination of an Internet connection speed can be determined
by sending 100 pings, instead of the default 4. Here is how to do that:
f.
Now ping Regional Internet Registry (RIR) websites located in different parts of the world:
For Africa:
C:\> ping www.afrinic.net
For Australia:
C:\> ping www.apnic.net
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 11
For Europe:
C:\> ping www.ripe.net
All these pings were run from a computer located in the U.S. What happens to the average ping time in
milliseconds when data is traveling within the same continent (North America) as compared to data from
North America traveling to different continents?
____________________________________________________________________________________
What is interesting about the pings that were sent to the European website?
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 11
Run tracert for each destination website and save the output in sequentially numbered files.
C:\> tracert www.afrinic.net
C:\> tracert www.lacnic.net
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 11
In the example output shown above, the tracert packets travel from the source PC to the local router
default gateway (hop 1: 192.168.1.1) to the ISPs Point of Presence (POP) router (hop 2: 10.18.20.1).
Every ISP has numerous POP routers. These POP routers are at the edge of the ISPs network and are
the means by which customers connect to the Internet. The packets travel along the Verizon network for
two hops and then jump to a router that belongs to alter.net. This could mean that the packets have
traveled to another ISP. This is significant because sometimes there is packet loss in the transition
between ISPs, or sometimes one ISP is slower than another. How could we determine if alter.net is
another ISP or the same ISP?
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 11
To summarize, Internet traffic starts at a home PC and travels through the home router (hop 1). It then
connects to the ISP and travels through its network (hops 2-7) until it arrives at the remote server (hop 8).
This is a relatively unusual example in which there is only one ISP involved from start to finish. It is typical
to have two or more ISP involved as displayed in the following examples.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 11
What happens at hop 7? Is level3.net the same ISP as hops 2-6, or a different ISP? Use the whois tool to
answer this question.
____________________________________________________________________________________
What happens in hop 10 to the amount of time it takes for a packet to travel between Washington D.C.
and Paris, as compared with the earlier hops 1-9?
____________________________________________________________________________________
____________________________________________________________________________________
What happens in hop 18? Do a whois lookup on 168.209.201.74 using the whois tool. Who owns this
network?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 11
Step 2: List the path to www.cisco.com using the web-based tool on subnetonline.com.
____________________________________________________________________________________
____________________________________________________________________________________
Reflection
Having now viewed traceroute through three different tools (tracert, web interface, and VisualRoute), are
there any insights that using VisualRoute provided that the other two tools did not?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 11
Background / Scenario
Jobs in Information Technology (IT) and computer networking continue to grow. Most employers require some
form of industry standard certification, degree, or other qualifications from their potential employees,
especially those with limited experience. The Cisco CCNA certification is a known and established entry level
networking certification that is respected in the industry. There are additional levels and kinds of Cisco
certifications that one can attain, and each certification may enhance employment opportunities as well as
salary range.
In this lab, you will do some targeted job searching on the web, to find what types of IT and computer
networking jobs are available; what kinds of skills and certifications you will need; and the salary ranges
associated with the various job titles.
Required Resources
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
c.
Now focus your search by adding terms to the keywords field box. Try terms like Cisco CCNA, CCNP,
CCNA Security, CCNA Voice, etc.
d. Now try refining your search by adding in different geographical locations. Did you find jobs in the
locations you entered?
____________________________________________________________________________________
e. Try searching a different website. Go to http://salary.com and click the Job Search menu bar button.
Note: For salary listings outside of the US, use the following link to search for your country:
http://www.payscale.com/rccountries.aspx
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
f.
Now add a search term like Information Technology to the job title field box and click Submit.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
h. Spend some time searching for jobs and looking through the search results. Take note of what skills are
required for different job titles and the range of starting salaries.
Did you find any jobs that you previously did not know existed? If so, what were they?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 6
Background / Scenario
In this activity, you will use the knowledge you have acquired throughout Chapter 1, and the modeling activity
document that you prepared at the beginning of this chapter. You may also refer to the other activities
completed in this chapter, including Packet Tracer activities.
Draw a map of the Internet as you see it now. Use the icons presented in the chapter for media, end devices,
and intermediary devices.
In your revised drawing, you may want to include some of the following:
WANs
LANs
Cloud computing
Save your drawing in hard-copy format. If it is an electronic document, save it to a server location provided by
your instructor. Be prepared to share and explain your revised work in class.
Required Resources
Reflection
1. After completing Chapter 1, are you more aware of the devices, cabling, and physical components of a smallto-medium size network? Explain your answer.
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Background/Scenario
Imagine that you are employed as an engineer for a car manufacturing company. The company is currently
working on a new car model. This model will have selected functions that can be controlled by the driver
giving specific voice commands.
You must design the set of commands used by this voice-activated control system.
The functions of the car that can be controlled by voice commands are:
Lights
Wipers
Radio
Telephone set
Air conditioning
Ignition
Your task is to devise a simple set of spoken commands that will be used to control these systems and
identify how they are going to be executed.
Required Resources
Paper and pencils or pens, or computer
Reflection
1. How can devising a set of voice commands assist in operating a vehicle? How could these same commands
be used on a computer or network operating system?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Objectives
Part 1: Access a Cisco Switch through the Serial Console Port
Background / Scenario
Various models of Cisco routers and switches are used in networks of all types. These devices are managed
using a local console connection or a remote connection. Nearly all Cisco devices have a serial console port
to which you can connect. Some newer models, such as the 1941 Integrated Services Router (ISR) G2 used
in this lab, also have a USB console port.
In this lab, you will learn how to access a Cisco device via a direct local connection to the console port, using
a terminal emulation program, Tera Term. You will also learn how to configure the serial port settings for the
Tera Term console connection. After you have established a console connection with the Cisco device, you
can display or configure device settings. You will only display settings and configure the clock with this lab.
Note: The routers used with CCNA hands-on labs are Cisco 1941 ISRs with Cisco IOS Release 15.2(4)M3
(universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9
image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco
IOS version, the commands available and output produced might vary from what is shown in the labs. Refer
to the Router Interface Summary Table at the end of the lab for the correct interface identifiers.
Note: Make sure that the switch and router have been erased and have no startup configuration. If you are
unsure, contact your instructor.
Required Resources
1 Router (Cisco 1941 with Cisco IOS software, release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
Rollover (DB-9 to RJ-45) console cable to configure the switch or router via the RJ-45 console port
Mini-USB cable to configure the router via the USB console port
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 11
Step 1: Connect a Cisco switch and computer using a rollover console cable.
a. Connect the rollover console cable to the RJ-45 console port of the switch.
b. Connect the other cable end to the serial COM port on the computer.
Note: Serial COM ports are no longer available on most computers today. A USB-to-DB9 adapter can be
used with the rollover console cable for console connection between the computer and a Cisco device.
These USB-to-DB9 adapters can be purchased at any computer electronics store.
Note: If using a USB-to-DB9 adapter to connect to the COM port, you may be required to install a driver
for the adapter provided by the manufacturer on your computer. To determine the COM port used by the
adapter, please see Part 3 Step 4. The correct COM port number is required to connect to the Cisco IOS
device using a terminal emulator in Step 2.
c.
Power up the Cisco switch and computer if these devices are not already on.
Step 2: Configure Tera Term to establish a console session with the switch.
Tera Term is a terminal emulation program. This program allows you to access the terminal output of the
switch. It also allows you to configure the switch.
a. Start Tera Term by clicking the Windows Start button located in the task bar. Locate Tera Term under
All Programs.
Note: If the program is not installed on the system, Tera Term can be downloaded from the following link
by selecting Tera Term:
http://logmett.com/index.php?/download/free-downloads.html
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 11
c.
From the Tera Term Setup menu, choose the Serial port to verify the serial settings. The default
parameters for the console port are 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control. The
Tera Term default settings match the console port settings for communications with the Cisco IOS switch.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 11
b. The clock setting is changed in the privileged EXEC mode. Enter the privileged EXEC mode by typing
enable at the user EXEC mode prompt.
Switch> enable
c.
Configure the clock setting. The question mark (?) provides help and allows you to determine the
expected input for configuring the current time, date, and year. Press Enter to complete the clock
configuration.
Switch# clock set ?
hh:mm:ss
Current Time
Year
d. Enter the show clock command to verify that the clock setting was updated.
Switch# show clock
15:08:07.205 UTC Fri Oct 26 2012
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 11
Power up the Cisco router and computer, if these devices are not already on.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 11
Step 3: (Optional) Enable the COM port for the Windows 7 PC.
If you are using a Microsoft Windows 7 PC, you may need to perform the following steps to enable the COM
port:
a. Click the Windows Start icon to access the Control Panel.
b. Open the Device Manager.
c.
Click the Ports (COM & LPT) tree link to expand it. The Cisco Virtual Comm Port00 icon displays with a
yellow exclamation point attached.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 11
f.
Choose Let me pick from a list of device drivers on my computer and click Next.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 11
h. The device driver is installed successfully. Take note of the port number assigned at the top of the
window. In this sample, COM 6 is used for communication with the router. Click Close.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 11
b. Open Tera Term. Click the Serial radio button and choose Port COM6: Cisco Serial (COM 6). This port
should now be available for communication with the router. Click OK.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 11
Reflection
1. How do you prevent unauthorized personnel from accessing your Cisco device through the console port?
____________________________________________________________________________________
____________________________________________________________________________________
2. What are the advantages and disadvantages of using the serial console connection as compared to the USB
console connection to a Cisco router or switch?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 11
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
S1
VLAN 1
N/A
N/A
N/A
S2
VLAN 1
N/A
N/A
N/A
PC-A
NIC
192.168.1.10
255.255.255.0
N/A
PC-B
NIC
192.168.1.11
255.255.255.0
N/A
Objectives
Part 1: Set Up the Network Topology (Ethernet only)
Configure each switch with hostname, local passwords, and login banner.
Background / Scenario
Networks are constructed of three major components: hosts, switches, and routers. In this lab, you will build a
simple network with two hosts and two switches. You will also configure basic settings including hostname,
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 14
Required Resources
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 14
b. In the Network and Internet section, click the View network status and tasks link.
Note: If the Control Panel displays a list of icons, click the drop-down option next to the View by: and
change this option to display by Category.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 14
In the left pane of the Network and Sharing Center window, click the Change adapter settings link.
d. The Network Connections window displays the available interfaces on the PC. Right-click the Local Area
Connection interface and select Properties.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 14
Note: You can also double-click Internet Protocol Version 4 (TCP/IPv4) to display the Properties
window.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 14
Click the Use the following IP address radio button to manually enter an IP address, subnet mask, and
default gateway.
Note: In the above example, the IP address and subnet mask have been entered for PC-A. The default
gateway has not been entered, because there is no router attached to the network. Refer to the
Addressing Table on page 1 for PC-Bs IP address information.
g. After all the IP information has been entered, click OK. Click OK on the Local Area Connection Properties
window to assign the IP address to the LAN adapter.
h. Repeat the previous steps to enter the IP address information for PC-B.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 14
c.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 14
Switch(config)#
The prompt changed to reflect global configuration mode.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 14
S1#
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 14
Step 10: Display the IOS version and other useful switch information.
Use the show version command to display the IOS version that the switch is running, along with other useful
information. Again, you will need to use the spacebar to advance through the displayed information.
S1# show version
Cisco IOS Software, C2960 Software (C2960-LANBASEK9-M), Version 15.0(2)SE, RELEASE
SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Sat 28-Jul-12 00:29 by prod_rel_team
ROM: Bootstrap program is C2960 boot loader
BOOTLDR: C2960 Boot Loader (C2960-HBOOT-M) Version 12.2(53r)SEY3, RELEASE SOFTWARE
(fc1)
S1 uptime is 1 hour, 38 minutes
System returned to ROM by power-on
System image file is "flash:/c2960-lanbasek9-mz.150-2.SE.bin"
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 14
SW Version
---------15.0(2)SE
SW Image
---------C2960-LANBASEK9-M
Step 11: Display the status of the connected interfaces on the switch.
To check the status of the connected interfaces, use the show ip interface brief command. Press the
spacebar to advance to the end of the list.
S1# show ip interface brief
Interface
Vlan1
FastEthernet0/1
FastEthernet0/2
FastEthernet0/3
IP-Address
unassigned
unassigned
unassigned
unassigned
OK?
YES
YES
YES
YES
Method
unset
unset
unset
unset
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Status
up
up
down
down
Protocol
up
up
down
down
Page 11 of 14
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
down
down
up
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
up
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Step 13: Record the interface status for the following interfaces.
S1
Interface
Status
S2
Protocol
Status
Protocol
F0/1
F0/6
F0/18
VLAN 1
Why are some FastEthernet ports on the switches are up and others are down?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 14
Reflection
What could prevent a ping from being sent between the PCs?
_______________________________________________________________________________________
Note: It may be necessary to disable the PC firewall to ping between PCs.
Step 2: Determine if there have been any virtual local-area networks (VLANs) created.
Use the show flash command to determine if any VLANs have been created on the switch.
Switch# show flash
Directory of flash:/
2
3
4
5
6
-rwx
-rwx
-rwx
-rwx
-rwx
1919
1632
13336
11607161
616
Mar
Mar
Mar
Mar
Mar
1
1
1
1
1
1993
1993
1993
1993
1993
00:06:33
00:06:33
00:06:33
02:37:06
00:07:13
+00:00
+00:00
+00:00
+00:00
+00:00
private-config.text
config.text
multiple-fs
c2960-lanbasek9-mz.150-2.SE.bin
vlan.dat
You will be prompted to verify the file name. At this point, you can change the file name or just press
Enter if you have entered the name correctly.
b. When you are prompted to delete this file, press Enter to confirm the deletion. (Pressing any other key will
abort the deletion.)
Delete flash:/vlan.dat? [confirm]
Switch#
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 14
Note: You may receive a prompt to save the running configuration prior to reloading the switch. Type no
and press Enter.
System configuration has been modified. Save? [yes/no]: no
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 14
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
S1
VLAN 1
192.168.1.2
255.255.255.0
N/A
PC-A
NIC
192.168.1.10
255.255.255.0
N/A
Objectives
Part 1: Configure a Basic Network Device
Configure basic switch settings including hostname, management address, and Telnet access.
Background / Scenario
Cisco switches have a special interface, known as a switch virtual interface (SVI). The SVI can be configured
with an IP address, commonly referred to as the management address that is used for remote access to the
switch to display or configure settings.
In this lab, you will build a simple network using Ethernet LAN cabling and access a Cisco switch using the
console and remote access methods. You will configure basic switch settings and IP addressing, and
demonstrate the use of a management IP address for remote switch management. The topology consists of
one switch and one host using only Ethernet and console ports.
Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other
switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the available
commands and output produced might vary from what is shown in the labs.
Note: Make sure that the switch has been erased and has no startup configuration. If you are unsure, contact
your instructor.
Required Resources
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 8
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 8
Enter global configuration mode to set the SVI IP address to allow remote switch management.
S1# config t
S1#(config)# interface vlan 1
S1(config-if)# ip address 192.168.1.2 255.255.255.0
S1(config-if)# no shut
S1(config-if)# exit
S1(config)#
j.
Restrict console port access. The default configuration is to allow all console connections with no
password needed.
S1(config)# line
S1(config-line)#
S1(config-line)#
S1(config-line)#
S1(config)#
k.
con 0
password cisco
login
exit
Configure the virtual terminal (VTY) line for the switch to allow Telnet access. If you do not configure a
VTY password, you will not be able to Telnet to the switch.
S1(config)# line vty 0 4
S1(config-line)# password cisco
S1(config-line)# login
S1(config-line)# end
S1#
*Mar 1 00:06:11.590: %SYS-5-CONFIG_I: Configured from console by console
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 8
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 8
b. Verify the status of your SVI management interface. Your VLAN 1 interface should be up/up and have an
IP address assigned. Notice that switch port F0/6 is also up because PC-A is connected to it. Because all
switch ports are initially in VLAN 1, by default, you can communicate with the switch using the IP address
you configured for VLAN 1.
S1# show ip interface brief
Interface
Vlan1
FastEthernet0/1
FastEthernet0/2
FastEthernet0/3
FastEthernet0/4
FastEthernet0/5
FastEthernet0/6
IP-Address
192.168.1.2
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
YES
YES
Method
manual
unset
unset
unset
unset
unset
unset
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Status
up
down
down
down
down
down
up
Protocol
up
down
down
down
down
down
up
Page 5 of 8
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 8
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 8
b. After entering the cisco password, you will be at the user EXEC mode prompt. Type enable at the
prompt. Enter the class password to enter privileged EXEC mode and issue a show run command.
Reflection
Why must you use a console connection to initially configure the switch? Why not connect to the switch via
Telnet or SSH?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 8
Tutor me!
Objectives
Configure initial settings on a network device using the Cisco IOS software.
In this activity, you will use and reinforce your knowledge of the Cisco Internetwork Operating System (IOS)
command-line interface (CLI) by explaining it to other students. You will look for different ways to explain the
meaning of individual commands. You will also find the optimal grouping of commands to be used when
configuring a device to minimize the necessary count of mode changes.
Background/Scenario
(Students will work in pairs. Packet Tracer is required to be used with this activity.)
Assume that a new colleague has asked you for an orientation to the Cisco IOS CLI. This colleague has
never worked with Cisco devices before.
You explain the basic CLI commands and structure, because you want your colleague to understand that the
CLI is a simple, yet powerful, command language that can be easily understood and navigated.
Use Packet Tracer and one of the activities available in this chapter as a simple network model (for example,
Lab Activity 2.3.3.5 LAB Configuring a Switch Management Address). Focus on these areas:
While the commands are technical, do they resemble any statements from plain English?
How is the set of commands organized into subgroups or modes? How does an administrator know
which mode he or she is currently using?
What are the individual commands to configure the basic settings of a Cisco device? How would you
explain this command in laymens terms? Use parallels to real life whenever appropriate.
Suggest how to group different commands together according to their modes so that a minimum number of
moves between modes will be needed.
Required Resources
Packet Tracer
Reflection
1. After completing Chapter 2, do you feel as though you have a concrete understanding of what the Cisco IOS
does and how it operates? What were some of the difficulties you encountered when explaining the basic CLI
commands and structure to your colleague? If you were the new colleague, what would be some of the
difficulties that you would have learning the basic CLI commands and structure?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2. Answer the following questions, and discuss your answers with the entire class:
a) While the commands are technical, do they resemble any statements from plain English?
________________________________________________________________________________
________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
Tutor me!
b) How is the set of commands organized into subgroups or modes? How does an administrator know
which mode he or she is currently using?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
c) What are the individual commands to configure the basic settings of a Cisco device? How would you
explain this command in laymens terms? Use parallels to real life whenever appropriate.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
Tutor me!
d) With the help of your colleague, try to suggest how to group different commands together according
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Background/Scenario
You have just purchased a new automobile for your personal use. After driving the car for a week or so, you
find that it is not properly functioning.
After discussing the problem with several of your peers, you decide to take it to a highly recommended
automotive repair facility. It is the only repair facility located in close proximity to you.
When you arrive at the repair facility, you find that all of the mechanics speak another language. You are
having difficulty explaining the automobiles performance problems, but the repairs really need to be done.
You are not sure you can drive it back home to research other options.
You must find a way to work with the repair facility to ensure your automobile is properly repaired.
How will you communicate with the mechanics in this firm? Design a communications model to ensure that
the car is properly repaired.
Reflection
1. What steps did you identify as important to communicating your repair request? Justify your answer.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Gather information about the major networking standards organizations by going on a web surfing
treasure hunt.
Reflect on how the various networking standards organizations enhance our experience of the Internet
and computer networking.
Background / Scenario
Using web search engines like Google, research the non-profit organizations that are responsible for
establishing international standards for the Internet and the development of Internet technologies.
Required Resources
Device with Internet access
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Background / Scenario
Request for Comments (RFCs) were created by Steve Crocker to help record notes on development of
Advanced Research Projects Agency Network (ARPANET) in 1969 and eventually evolved into an official
collection of memorandum that describes topics that are mainly related to the Internet and the TCP/IP
protocol suite. Today the RFCs are managed by the IETF. There are currently over 6,000 RFCs, and the
complete list is available at http://www.ietf.org/download/rfc-index.txt.
In this lab, you will learn how an RFC is published today by IETF. Additionally, you will also identify a few wellknown RFCs that are used in your network. You can also find a few non-technical RFCs that can provide
information or engineering humor.
Required Resources
Device with Internet access
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
Look for Post Office Protocol Version 3 in the list. The associated RFC number is RFC 1939. This
RFC is also an Internet standard, as indicated by the STD number in the Number column.
After an RFC is published and assigned a number, it cannot be changed and the RFC number is never
used again for a newer RFC. For example, in the More Info column, RFC 1939 has made the previous
RFC 1725 obsolete. The information in RFC 1725 has not been modified, but it has been replaced with
the information from RFC 1939. RFC 1939 has been updated by RFC 1957, RFC 2449, and RFC 6186,
as indicated in the More Info column. If you click any of these links, the full text of the RFC displays.
Refer to the Status column and locate the Proposed Standard status. They may be technically sound,
but require further testing and validation.
Refer to the Status column and locate the Informational status. Informational RFCs can be anything
from technical to humorous. For example, RFC 0035 (Network Meeting) provides an insight into the
development of a network protocol in the early days of the Internet.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
The list of results provides links to the full text of the I-Ds and other useful information. The Source
column lists the Working Group with IETF that is responsible for the draft. As an example, 6man is a
Working Group that submitted multiple drafts. To find out more information about this Working Group,
click IETF HOME at the top of the results page.
c.
After arriving at the IETF Homepage, click WG Charters in the left column, listed under Working Groups.
The Active IETF Working Groups page displays. The IETF Working Groups (WG) primary function is to
develop IETF specifications and guidelines. Many of these specifications and guidelines are intended to
become standards or recommendations. By scrolling the page, you see a list of Active Working Groups in
different development areas for technology related to networking. The 6man Working Group can be found
listed in the Internet Area. This working group is responsible for maintenance and advancement of the
IPv6 protocol specifications and addressing architecture.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
Reflection
1. Why are RFCs important for Internet standards and history?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2. What are the advantages of RFCs as a collaborative effort?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 6
Objectives
Part 1: (Optional) Download and Install Wireshark
Part 2: Capture and Analyze Local ICMP Data in Wireshark
Explain why MAC addresses for remote hosts are different than the MAC addresses of local hosts.
Background / Scenario
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting,
analysis, software and protocol development, and education. As data streams travel back and forth over the
network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content
according to the appropriate RFC or other specifications.
Wireshark is a useful tool for anyone working with networks and can be used with most labs in the CCNA
courses for data analysis and troubleshooting. This lab provides instructions for downloading and installing
Wireshark, although it may already be installed. In this lab, you will use Wireshark to capture ICMP data
packet IP addresses and Ethernet frame MAC addresses.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 20
Required Resources
Additional PC(s) on a local-area network (LAN) will be used to reply to ping requests.
Part 1:
Wireshark has become the industry standard packet-sniffer program used by network engineers. This open
source software is available for many different operating systems, including Windows, Mac, and Linux. In Part
1 of this lab, you will download and install the Wireshark software program on your PC.
Note: If Wireshark is already installed on your PC, you can skip Part 1 and go directly to Part 2. If Wireshark
is not installed on your PC, check with your instructor about your academys software download policy.
c.
Choose the software version you need based on your PCs architecture and operating system. For
instance, if you have a 64-bit PC running Windows, choose Windows Installer (64-bit).
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 20
c.
If this is the first time to install Wireshark, or after you have completed the uninstall process, you will
navigate to the Wireshark Setup wizard. Click Next.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 20
e. Keep the default settings on the Choose Components window and click Next.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 20
g. You can change the installation location of Wireshark, but unless you have limited disk space, it is
recommended that you keep the default location.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 20
j.
Wireshark starts installing its files and a separate window displays with the status of the installation. Click
Next when the installation is complete.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 20
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 20
c.
Ask a team member for their PCs IP address and provide your PCs IP address to them. Do not provide
them with your MAC address at this time.
Note: Clicking the first interface icon in the row of icons also opens the Interface List.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 20
On the Wireshark: Capture Interfaces window, click the check box next to the interface connected to your
LAN.
Note: If multiple interfaces are listed and you are unsure which interface to check, click the Details
button, and then click the 802.3 (Ethernet) tab. Verify that the MAC address matches what you noted in
Step 1b. Close the Interface Details window after verifying the correct interface.
d. After you have checked the correct interface, click Start to start the data capture.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 20
e. This information can scroll by very quickly depending on what communication is taking place between
your PC and the LAN. We can apply a filter to make it easier to view and work with the data that is being
captured by Wireshark. For this lab, we are only interested in displaying ICMP (ping) PDUs. Type icmp in
the Filter box at the top of Wireshark and press Enter or click on the Apply button to view only ICMP
(ping) PDUs.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 20
This filter causes all data in the top window to disappear, but you are still capturing the traffic on the
interface. Bring up the command prompt window that you opened earlier and ping the IP address that you
received from your team member. Notice that you start seeing data appear in the top window of
Wireshark again.
Note: If your team members PC does not reply to your pings, this may be because their PC firewall is
blocking these requests. Please see Appendix A: Allowing ICMP Traffic Through a Firewall for information
on how to allow ICMP traffic through the firewall using Windows 7.
g. Stop capturing data by clicking the Stop Capture icon.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 20
a. Click the first ICMP request PDU frames in the top section of Wireshark. Notice that the Source column
has your PCs IP address, and the Destination contains the IP address of the teammates PC you pinged.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 20
Does the Source MAC address match your PCs interface? ______
Does the Destination MAC address in Wireshark match the MAC address that of your team members?
_____
How is the MAC address of the pinged PC obtained by your PC?
___________________________________________________________________________________
Note: In the preceding example of a captured ICMP request, ICMP data is encapsulated inside an IPv4
packet PDU (IPv4 header) which is then encapsulated in an Ethernet II frame PDU (Ethernet II header)
for transmission on the LAN.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 20
c.
A window prompts to save the previously captured data before starting another capture. It is not
necessary to save this data. Click Continue without Saving.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 20
Note: When you ping the URLs listed, notice that the Domain Name Server (DNS) translates the URL to
an IP address. Note the IP address received for each URL.
e. You can stop capturing data by clicking the Stop Capture icon.
Step 2: Examining and analyzing the data from the remote hosts.
a. Review the captured data in Wireshark, examine the IP and MAC addresses of the three locations that
you pinged. List the destination IP and MAC addresses for all three locations in the space provided.
1st Location:
2nd
Location:
3rd Location:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 20
How does this information differ from the local ping information you received in Part 2?
____________________________________________________________________________________
____________________________________________________________________________________
Reflection
Why does Wireshark show the actual MAC address of the local hosts, but not the actual MAC address for the
remote hosts?
_______________________________________________________________________________________
_______________________________________________________________________________________
Step 1: Create a new inbound rule allowing ICMP traffic through the firewall.
a. From the Control Panel, click the System and Security option.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 16 of 20
In the left pane of the Windows Firewall window, click Advanced settings.
d. On the Advanced Security window, choose the Inbound Rules option on the left sidebar and then click
New Rule on the right sidebar.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 17 of 20
f.
In the left pane, click the Protocol and Ports option and using the Protocol type drop-down menu, select
ICMPv4, and then click Next.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 18 of 20
This new rule should allow your team members to receive ping replies from your PC.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 19 of 20
c.
To permanently delete the ICMP rule, click Delete. If you choose this option, you must re-create the rule
again to allow ICMP replies.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 20 of 20
Guaranteed to work!
Objectives
Explain the role of protocols and standards organizations in facilitating interoperability in network
communications.
In this activity, you will demonstrate how network communications can be compared to everyday activities
using established procedures and standards.
Background/Scenario
You have just completed the Chapter 3 content regarding network protocols and standards.
Assuming you resolved the beginning of this chapters modeling activity, how would you compare the
following steps taken to design a communications system to the networking models used for
communications?
Steps to Communicate
Possible Answers
Associated
TCP/IP Model Layer
Required Resources
Blank Steps to Communicate table (above) for students to record their answers based upon their Chapter 3
content knowledge.
Reflection
1. How does your network model in developing an automotive repair communications plan compare to a
network communications interoperability plan?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Guaranteed to work!
Steps to Communicate
Possible Answers
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Associated
TCP/IP Model Layer
Page 2 of 2
Background/Scenario
You and your colleague are attending a networking conference. There are many lectures and
presentations held during this event, and because they overlap, each of you can attend only a limited set
of sessions. Therefore, you decide to split up, each of you attending a separate set of presentations, and
after the event ends, you share the slides and the knowledge each of you gained during the event.
Answer the following questions:
How would you personally organize a conference where multiple sessions are held at the same
time? Would you put all of them into a single conference room, or would you use multiple rooms?
Explain your answer.
Assume that the conference room is properly fitted with audiovisual equipment to display largesize video and amplify the speakers voice. If a person wanted to attend a specific session, does
it matter which seat the person takes, or is it sufficient for the person to sit anywhere as long as it
is in an appropriate conference room?
What are the potential consequences or benefits if the speech from one conference room
somehow leaked into another?
If questions or inquiries arise during a presentation, should an attendee simply shout out a
question, or should there be some process of assuring that attendees are given an opportunity to
ask questions that everyone can hear? What would happen without this process?
Can a session run out of time without going through the entire intended content if an interesting
topic elicits a larger discussion where many attendees have questions? If you did not want this to
happen, what would be the best way to ensure that it does not occur?
Imagine that the session is in a panel format, which allows more free discussion of attendees with
the panelists and among themselves. If a person wants to address another person within the
same room, can it be done directly? If so, how is this possible? How would a panelist invite
another person to join who is not presently in the room?
What benefit, if any, was achieved by the isolation of multiple sessions into separate conference
rooms if, after the event, people could meet and share the information?
Required Resources
Recording capabilities (paper, tablet, etc.) for reflective comments to be shared with the class.
Reflection
1. How would you personally organize a conference where multiple sessions are held at the same time?
Would you put all of them into a single conference room, or would you use multiple rooms? What would
be the reason? Explain your answer.
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Background / Scenario
As a member of the networking support staff, you must be able to identify different networking equipment.
You must also understand the function of equipment in the appropriate part of the network. In this lab, you will
have access to network devices and media. You will identify the type and characteristics of the network
equipment and media.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
ID
Manufacturer
Cisco
Model
1941
Type
Router
Functionality
Router
Physical Characteristics
2 GigabitEthernet Ports
2 EHWIC slots
2 CompactFlash slots
1 ISM slot
2 Console ports: USB, RJ-45
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
ID
Network Media
UTP
Type
Copper
Reflection
After you have identified the network equipment, where would you find more information about the
equipment?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
PC-A
NIC
192.168.10.1
255.255.255.0
N/A
PC-B
NIC
192.168.10.2
255.255.255.0
N/A
Objectives
Part 1: Analyze Ethernet Cabling Standards and Pinouts
Analyze diagrams and tables for the TIA/EIA 568-A standard Ethernet cable.
Analyze diagrams and tables for the TIA/EIA 568-B standard Ethernet cable.
Background / Scenario
In this lab, you will build and terminate an Ethernet crossover cable and test it by connecting two PCs
together and pinging between them. You will first analyze the Telecommunications Industry
Association/Electronic Industries Association (TIA/EIA) 568-A and 568-B standards and how they apply to
Ethernet cables. You will then construct an Ethernet crossover cable and test it. Finally, you will use the cable
you just constructed to connect two PCs together and test it by pinging between them.
Note: With autosensing capabilities available on many devices, such as the Cisco 1941 Integrated Services
Router (ISR) switch, you may see straight-through cables connecting like devices.
Required Resources
One length of cable, either Category 5 or 5e. Cable length should be 0.6 to 0.9m (2 to 3 ft.)
2 RJ-45 connectors
Wire cutter
Wire stripper
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
Step 1: Analyze diagrams and tables for the TIA/EIA 568-A standard Ethernet cable.
The following table and diagrams display the color scheme and pinouts, as well as the function of the four
pairs of wires used for the 568-A standard.
Note: In LAN installations using 100Base-T (100 Mb/s), only two pairs out of the four are used.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
Pin Number
Pair Number
Wire Color
10Base-T Signal
100Base-TX Signal
1000Base-T Signal
White/Green
Transmit
BI_DA+
Green
Transmit
BI_DA-
White/Orange
Receive
BI_DB+
Blue
Not Used
BI_DC+
White/Blue
Not Used
BI_DC-
Orange
Receive
BI_DB-
White/Brown
Not Used
BI_DD+
Brown
Not Used
BI_DD-
The following diagrams display how the wire color and pinouts align with an RJ-45 jack for the 568-A
standard.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
Step 2: Analyze diagrams and tables for the TIA/EIA 568-B standard Ethernet cable.
The following table and diagram display the color scheme and pinouts for the 568-B standard.
568-B 10/100/1000-BaseTX Ethernet
Pin Number
Pair Number
Wire Color
10Base-T Signal
100Base-TX Signal
1000Base-T Signal
White/Orange
Transmit
BI_DA+
Orange
Transmit
BI_DA-
White/Green
Receive
BI_DB+
Blue
Not Used
BI_DC+
White/Blue
Not Used
BI_DC-
Green
Receive
BI_DB-
White/Brown
Not Used
BI_DD+
Brown
Not Used
BI_DD-
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
Hold the four pairs of twisted cables tightly where the jacket was cut away. Reorganize the cable pairs
into the order of the 568-A wiring standard. Refer to the diagrams, if necessary. Take as much care as
possible to maintain the twists in the cable; this provides noise cancellation.
d. Flatten, straighten, and line up the wires using your thumb and forefinger.
e. Ensure that the cable wires are still in the correct order for the 568-A standard. Using your wire cutters,
trim the four pairs in a straight line to within 1.25 to 1.9 cm (1/2 to 3/4 in.).
f.
Place an RJ-45 connector on the end of your cable, with the prong on the underside pointing downward.
Firmly insert the wires into the RJ-45 connector. All wires should be seen at the end of the connector in
their proper positions. If the wires are not extending to the end of the connector, take the cable out,
rearrange the wires as necessary, and reinsert the wires back into the RJ-45 connector.
g. If everything is correct, insert the RJ-45 connector with cable into the crimper. Crimp down hard enough
to force the contacts on the RJ-45 connector through the insulation on the wires, thus completing the
conducting path. See the following diagram for an example.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
Step 2: Connect two PCs together via NICs using your Ethernet crossover cable.
a. Working with a lab partner, set your PC to one of the IP addresses shown in the Addressing Table (see
page 1). For example, if your PC is PC-A, your IP address should be set to 192.168.10.1 with a 24-bit
subnet mask. You partners IP address should be 192.168.10.2. The default gateway address can be left
empty.
b. Using the crossover cable you made, connect the two PCs together via their NICs.
c.
Note: The Windows firewall may have to be temporarily disabled for pings to be successful. If the firewall is
disabled, make sure you re-enable it at the conclusion of this lab.
d. Repeat the process and ping from PC-B to PC-A.
Assuming IP addressing and firewall are not issues, your pings should be successful if the cables were
properly made.
Reflection
1. Which part of making cables did you find the most difficult?
_______________________________________________________________________________________
2. Why do you have to learn how to make a cable if you can easily buy pre-made cables?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 6
Background / Scenario
This lab requires you to determine the availability and status of the network interface cards (NICs) on the PC
that you use. Windows provides a number of ways to view and work with your NICs.
In this lab, you will access the NIC information of your PC and change the status of these cards.
Required Resources
1 PC (Windows 7, Vista, or XP with two NICs, wired and wireless, and a wireless connection)
Note: At the start of this lab, the wired Ethernet NIC in the PC was cabled to one of the integrated switch
ports on a wireless router and the Local Area Connection (wired) was enabled. The wireless NIC was
disabled initially. If the wired and wireless NICs are both enabled the PC will receive two different IP
addresses and the wireless NIC will take precedence.
The Network Connections window displays, which provides the list of NICs available on this PC. Look for
your Local Area Connection and Wireless Network Connection adapters in this window.
Note: Virtual Private Network (VPN) adapters and other types of network connections may also be
displayed in this window.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 12
c.
The Wireless Network Connection Status window displays where you can view information about your
wireless connection.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 12
What is the Service Set Identifier (SSID) for the wireless router of your connection?
________________________________________________________________
What is the speed of your wireless connection? __________________________
d. Click Details to display the Network Connection Details window.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 12
Notice that the information displayed here is the same information that was displayed in the Network
Connection Details window in Step d.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 12
i.
The type of security the connected wireless router has implemented displays. Click the Show characters
check box to display the actual Network security key, instead of the hidden characters, and then click OK.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 12
j.
Close the Wireless Network Properties and the Network Connection Status windows. Select and rightclick the Wireless Network Connection option > Connect/Disconnect. A pop-up window should appear
at the bottom right corner of your desktop that displays your current connections, along with a list of
SSIDs that are in range of the wireless NIC of your PC. If a scrollbar appears on the right side of this
window, you can use it to display additional SSIDs.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 12
k.
To join one of the other wireless network SSIDs listed, click the SSID that you want to join, and then click
Connect.
l.
If you have selected a secure SSID, you are prompted to enter the Security key for the SSID. Type the
security key for that SSID and click OK. You can click the Hide characters check box to prevent people
from seeing what you type in the Security key field.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 12
b. The Local Area Connection Status window will open. This window displays information about your wired
connection to the LAN.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 12
Click Details to view the address information for your LAN connection.
c.
Open a command window prompt and type ipconfig /all. Find your Local Area Connection information
and compare this with the information displayed in the Network Connection Details window.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 12
b. Click the Open Network and Sharing Center link. Note: This is a shortcut way to bring up this window.
c.
In the left pane, click the Change adapter settings link to display the Network Connections window.
d. Select and right-click the Wireless Network Connection, and then click Disable to disable your wireless
NIC.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 12
e. Examine your system tray. The Wireless Network Connection icon should be replaced by the Wired
Network icon, which indicates that you are using your wired NIC for network connectivity.
Note: If both NICs are active, the Wireless Network icon is the one that is displayed.
b. Click the Open Network and Sharing Center link > Change adapter settings and Enable your
Wireless Network Connection. The Wireless Network icon should replace the Wired Network icon in
your system tray.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 12
c.
You can click this icon to return to the Network and Sharing Center window (examine the network
diagram at the top).
You can click the red X to have the PC troubleshoot the problem with the network connection.
Troubleshooting attempts to resolve the network issue for you.
d. If troubleshooting did not enable one of your NICs, then you should do this manually to restore the
network connectivity of your PC.
Note: If a network adapter is enabled and the NIC is unable to establish network connectivity, then the
Network Problem icon appears in the system tray.
If this icon appears, you can troubleshoot this issue just like you did in Step 3c.
Reflection
Why would you activate more than one NIC on a PC?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 12
Linked In!
Objectives
Connect devices using wired and wireless media.
In this activity, you will map your network cabling or technology type ideas to a physical topology.
Because this chapter focuses on the network access layer, you should be able to prepare a basic
physical model. No logical (IP addressing) schemes are required for this activity.
Physical Topology
Background/Scenario
Note: This activity is best completed in groups of 2-3 students.
Your small business is moving to a new location! Your building is brand new and you must come up with
a physical topology so that network port installation can begin.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Linked In!
Your instructor will provide you with a blueprint created for this activity. The area on the blueprint,
indicated by Number 1, is the reception area and the area labeled RR is the restroom area.
All rooms are within Category 6 UTP specifications (328 ft. [100 m]), so you have no concerns about
hard-wiring the building to code. Each room in the diagram must have at least one network connection
available for users/intermediary devices.
With your teammate(s), indicate on the drawing:
Where would you locate your network main distribution facility, while keeping security in mind?
How many intermediary devices would you use and where would you place them?
What kind of cabling you would use (UTP, STP, wireless, fiber optics, etc.) and where would the
ports be placed?
What types of end devices you would use (wired, wireless, laptops, desktops, tablets, etc.)?
Do not go into excessive detail on your design. Just use the content from the chapter to be able to justify
your decisions to the class.
Required Resources
Packet Tracer software
Reflection
1. Where would you locate your network main distribution facility, while keeping security in mind?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2. How many intermediary devices would you use and where would you place them?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
3. What kind of cabling you would use (UTP, STP, wireless, fiber optics, etc.) and where would the ports be
placed?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
4. What types of end devices you would use (wired, wireless, laptops, desktops, tablets, etc.)?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Background/Scenario
Note: This activity can be completed individually in class or outside of class.
Much of our network communication takes the form of email, messaging (text or instant), video contact, and
social media postings.
For this activity, choose one of the following types of network communications:
Audio/video conferencing
Emailing
Online gaming
Now that you have selected a network communication type, record your answers to the following questions:
1. Is there a procedure you must follow to register others and yourself so that you form a
communications account? Why do you think that a procedure is needed?
2. How do you initiate contact with the person or people with whom you wish to communicate?
3. How do you ensure that your conversations are received only by those with whom you wish to
communicate? Be prepared to discuss your answers in class.
Required Resources
Recording capabilities (paper, tablet, etc.) for reflective comments to be shared with the class
Reflection
1. Is there a procedure you must follow to register others and yourself so that you form a communications
account? Why do you think that a procedure is needed?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
N/A
N/A
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Set Up the Topology and Initialize Devices
Background / Scenario
Every device on an Ethernet LAN is identified by a Layer-2 MAC address. This address is burned into the
NIC. This lab will explore and analyze the components that make up a MAC address, and how you can find
this information on various networking devices, such as a router, switch, and PC.
You will cable the equipment as shown in the topology. You will then configure the router and PC to match the
addressing table. You will verify your configurations by testing for network connectivity.
After the devices have been configured and network connectivity has been verified, you will use various
commands to retrieve information from the devices to answer questions about your network equipment.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 8
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 8
00:05:9A:3C:78:00
0005.9A3C.7800
Note: MAC addresses are also called physical addresses, hardware addresses, or Ethernet hardware
addresses.
In Part 3, you will issue commands to display the MAC addresses on a PC, router, and switch, and you will
analyze the properties of each one.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 8
What is the OUI portion of the MAC address for this device?
________________________________________________________________________________
What is the serial number portion of the MAC address for this device?
________________________________________________________________________________
Using the example above, find the name of the vendor that manufactured this NIC.
________________________________________________________________________________
b. From the command prompt on PC-A, issue the ipconfig /all command and identify the OUI portion of the
MAC address for the NIC of PC-A.
________________________________________________________________________________
Identify the serial number portion of the MAC address for the NIC of PC-A.
________________________________________________________________________________
Identify the name of the vendor that manufactured the NIC of PC-A.
________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 8
Address
192.168.1.1
192.168.1.3
Age (min)
0
Hardware Addr
30f7.0da3.1821
c80a.a9fa.de0d
Type
ARPA
ARPA
Interface
GigabitEthernet0/1
GigabitEthernet0/1
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 8
Mac Address
----------0100.0ccc.cccc
0100.0ccc.cccd
Type
-------STATIC
STATIC
Ports
----CPU
CPU
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 8
Did the switch display the MAC address of PC-A? If you answered yes, what port was it on?
____________________________________________________________________________________
Did the switch display the MAC address of R1? If you answered yes, what port was it on?
____________________________________________________________________________________
Reflection
1. Can you have broadcasts at the Layer 2 level? If so, what would the MAC address be?
_______________________________________________________________________________________
2. Why would you need to know the MAC address of a device?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 8
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 8
Objectives
Part 1: Examine the Header Fields in an Ethernet II Frame
Part 2: Use Wireshark to Capture and Analyze Ethernet Frames
Background / Scenario
When upper layer protocols communicate with each other, data flows down the Open Systems
Interconnection (OSI) layers and is encapsulated into a Layer 2 frame. The frame composition is dependent
on the media access type. For example, if the upper layer protocols are TCP and IP and the media access is
Ethernet, then the Layer 2 frame encapsulation will be Ethernet II. This is typical for a LAN environment.
When learning about Layer 2 concepts, it is helpful to analyze frame header information. In the first part of this
lab, you will review the fields contained in an Ethernet II frame. In Part 2, you will use Wireshark to capture
and analyze Ethernet II frame header fields for local and remote traffic.
Required Resources
Preamble
Destination
Address
Source
Address
Frame
Type
Data
FCS
8 Bytes
6 Bytes
6 Bytes
2 Bytes
46 1500 Bytes
4 Bytes
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 7
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 7
Field
Value
Description
Preamble
Destination Address
Broadcast
(ff:ff:ff:ff:ff:ff)
Source Address
Dell_24:2a:60
(5c:26:0a:24:2a:60)
Frame Type
0x0806
Data
ARP
FCS
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 7
c.
On the Wireshark: Capture Interfaces window, select the interface to start traffic capturing by clicking the
appropriate check box, and then click Start. If you are uncertain of what interface to check, click Details
for more information about each interface listed.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 7
Step 4: From the command prompt window, ping the default gateway of your PC.
From the command window, ping the default gateway using the IP address that you recorded in Step 1.
a. In the Packet List pane (top section), click the first frame listed. You should see Echo (ping) request
under the Info heading. This should highlight the line blue.
b. Examine the first line in the Packet Details pane (middle section). This line displays the length of the
frame; 74 bytes in this example.
c.
The second line in the Packet Details pane shows that it is an Ethernet II frame. The source and
destination MAC addresses are also displayed.
What is the MAC address of the PCs NIC? ________________________
What is the default gateways MAC address? ______________________
d. You can click the plus (+) sign at the beginning of the second line to obtain more information about the
Ethernet II frame. Notice that the plus sign changes to a minus (-) sign.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 7
You can click any line in the middle section to highlight that part of the frame (hex and ASCII) in the
Packet Bytes pane (bottom section). Click the Internet Control Message Protocol line in the middle
section and examine what is highlighted in the Packet Bytes pane.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 7
Step 10: Examine the new data in the packet list pane of Wireshark.
In the first echo (ping) request frame, what are the source and destination MAC addresses?
Source: _________________________________
Destination: ______________________________
What are the source and destination IP addresses contained in the data field of the frame?
Source: _________________________________
Destination: ______________________________
Compare these addresses to the addresses you received in Step 7. The only address that changed is the
destination IP address. Why has the destination IP address changed, while the destination MAC address
remained the same?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Reflection
Wireshark does not display the preamble field of a frame header. What does the preamble contain?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 7
Lab Observing ARP with the Windows CLI, IOS CLI, and
Wireshark
Topology
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
S2
VLAN 1
192.168.1.12
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
PC-B
NIC
192.168.1.2
255.255.255.0
192.168.1.1
Objectives
Part 1: Build and Configure the Network
Part 2: Use the Windows ARP Command
Part 3: Use the IOS Show ARP Command
Part 4: Use Wireshark to Examine ARP Exchanges
Background / Scenario
The Address Resolution Protocol (ARP) is used by TCP/IP to map a Layer 3 IP address to a Layer 2 MAC
address. When a frame is placed on the network, it must have a destination MAC address. To dynamically
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
discover the MAC address for the destination device, an ARP request is broadcast on the LAN. The device
that contains the destination IP address responds, and the MAC address is recorded in the ARP cache. Every
device on the LAN keeps its own ARP cache, or small area in RAM that holds ARP results. An ARP cache
timer removes ARP entries that have not been used for a certain period of time.
ARP is an excellent example of performance tradeoff. With no cache, ARP must continually request address
translations each time a frame is placed on the network. This adds latency to the communication and could
congest the LAN. Conversely, unlimited hold times could cause errors with devices that leave the network or
change the Layer 3 address.
A network administrator should be aware of ARP, but may not interact with the protocol on a regular basis.
ARP is a protocol that enables network devices to communicate with the TCP/IP protocol. Without ARP, there
is no efficient method to build the datagram Layer 2 destination address. Also, ARP is a potential security risk.
ARP spoofing, or ARP poisoning, is a technique used by an attacker to inject the wrong MAC address
association in a network. An attacker forges the MAC address of a device, and frames are sent to the wrong
destination. Manually configuring static ARP associations is one way to prevent ARP spoofing. Finally, an
authorized MAC address list may be configured on Cisco devices to restrict network access to only approved
devices.
In this lab, you will use the ARP commands in both Windows and Cisco routers to display the ARP table. You
will also clear the ARP cache and add static ARP entries.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term and Wireshark
installed)
Console cables to configure the Cisco IOS devices via the console ports
Note: The Fast Ethernet interfaces on Cisco 2960 switches are autosensing and an Ethernet straight-through
cable may be used between switches S1 and S2. If using another Cisco switch model, it may be necessary to
use an Ethernet crossover cable.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
-g
-v
inet_addr
-N if_addr
-d
-s
eth_addr
if_addr
Example:
> arp -s 157.55.85.212
> arp -a
00-aa-00-62-c6-09
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
b. Examine the output.
What command would be used to display all entries in the ARP cache? ___________________________
What command would be used to delete all ARP cache entries (flush ARP cache)? _________________
What command would be used to delete the ARP cache entry for 192.168.1.11?
____________________________________________________________________________________
c.
Type
dynamic
static
static
static
static
Note: The ARP table is empty if you use Windows XP (as displayed below).
C:\Documents and Settings\User1> arp -a
No ARP Entries Found.
d. Ping from PC-A to PC-B to dynamically add entries in the ARP cache.
C:\Documents and Settings\User1> ping 192.168.1.2
Interface: 192.168.1.3 --- 0xb
Internet Address
Physical Address
192.168.1.2
00-50-56-be-f6-db
Type
dynamic
What is the physical address for the host with IP address of 192.168.1.2? _________________________
Type
dynamic
dynamic
dynamic
dynamic
static
static
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
224.0.0.252
239.255.255.250
c.
01-00-5e-00-00-fc
01-00-5e-7f-ff-fa
static
static
As an administrator, access the command prompt. Click the Start icon, and in the Search programs and
file box, type cmd. When the cmd icon appears, right-click the icon and select Run as administrator.
Click Yes to allow this program to make changes.
Note: For Windows XP users, it is not necessary to have administrator privileges to modify ARP cache
entries.
d. In the Administrator command prompt window, type arp d *. This command deletes all the ARP cache
entries. Verify that all the ARP cache entries are deleted by typing arp a at the command prompt.
C:\windows\system32> arp d *
C:\windows\system32> arp a
No ARP Entries Found.
e. Wait a few minutes. The Neighbor Discovery protocol starts to populate the ARP cache again.
C:\Users\User1> arp a
Interface: 192.168.1.3 --- 0xb
Internet Address
Physical Address
192.168.1.255
ff-ff-ff-ff-ff-ff
Type
static
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
f.
From PC-A, ping PC-B (192.168.1.2) and the switches (192.168.1.11 and 192.168.1.12) to add the ARP
entries. Verify that the ARP entries have been added to the cache.
C:\Users\User1> arp a
Interface: 192.168.1.3 --- 0xb
Internet Address
Physical Address
192.168.1.2
00-50-56-be-f6-db
192.168.1.11
0c-d9-96-e8-8a-40
192.168.1.12
0c-d9-96-d2-40-40
192.168.1.255
ff-ff-ff-ff-ff-ff
Type
dynamic
dynamic
dynamic
static
Type arp a to verify that the ARP entry for S2 has been removed from the ARP cache.
C:\Users\User1> arp a
Interface: 192.168.1.3 --- 0xb
Internet Address
Physical Address
192.168.1.2
00-50-56-be-f6-db
192.168.1.11
0c-d9-96-e8-8a-40
192.168.1.255
ff-ff-ff-ff-ff-ff
j.
Type
dynamic
dynamic
static
You can add a specific ARP cache entry by typing arp s inet_addr mac_addr. The IP address and
MAC address for S2 will be used in this example. Use the MAC address recorded in step g.
C:\windows\system32> arp s 192.168.1.12 0c-d9-96-d2-40-40
k.
Verify that the ARP entry for S2 has been added to the cache.
Address
192.168.1.1
192.168.1.2
192.168.1.3
Age (min)
0
0
Hardware Addr
d48c.b5ce.a0c1
0050.56be.f6db
0050.56be.768c
Type
ARPA
ARPA
ARPA
Interface
GigabitEthernet0/1
GigabitEthernet0/1
GigabitEthernet0/1
R1#
Notice there is no Age (-) for the first entry, router interface G0/1 (the LAN default gateway). The Age is
the number of minutes (min) that the entry has been in ARP cache and is incremented for the other
entries. The Neighbor Discovery protocol populates the PC-A and PC-B IP and MAC address ARP
entries.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
a. Ping switch S1.
R1# ping 192.168.1.11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.11, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/2/4 ms
b. Verify that an ARP entry for switch S1 has been added to the ARP table of R1.
R1# show ip arp
Protocol
Internet
Internet
Internet
Internet
R1#
Address
192.168.1.1
192.168.1.2
192.168.1.3
192.168.1.11
Age (min)
6
6
0
Hardware Addr
d48c.b5ce.a0c1
0050.56be.f6db
0050.56be.768c
0cd9.96e8.8a40
Type
ARPA
ARPA
ARPA
ARPA
Interface
GigabitEthernet0/1
GigabitEthernet0/1
GigabitEthernet0/1
GigabitEthernet0/1
Hardware Addr
d48c.b5ce.a0c1
0050.56be.f6db
0050.56be.768c
0cd9.96e8.8a40
Type
ARPA
ARPA
ARPA
ARPA
Interface
Vlan1
Vlan1
Vlan1
Vlan1
Address
192.168.1.1
192.168.1.2
192.168.1.3
192.168.1.11
Age (min)
46
8
8
-
b. Verify that the ARP entry for switch S2 has been added to ARP table of S1.
S1# show ip arp
Protocol
Internet
Internet
Internet
Internet
Internet
S1#
Address
192.168.1.1
192.168.1.2
192.168.1.3
192.168.1.11
192.168.1.12
Age (min)
5
11
11
2
Hardware Addr
d48c.b5ce.a0c1
0050.56be.f6db
0050.56be.768c
0cd9.96e8.8a40
0cd9.96d2.4040
Type
ARPA
ARPA
ARPA
ARPA
ARPA
Interface
Vlan1
Vlan1
Vlan1
Vlan1
Vlan1
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
d. Send a ping to the default gateway, using the ping 192.168.1.1 command.
e. Stop the Wireshark capture after pinging to the default gateway is finished.
f.
Examine the Wireshark captures for the ARP exchanges in the packet details pane.
What was the first ARP packet? ___________________________
Fill in the following table with information about your first captured ARP packet.
Field
Value
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
Fill in the following table with information about your second captured ARP packet.
Field
Value
Ping switch S2 (192.168.1.12). The ping should be successful after the first echo request.
Note: If all the pings were successful, S1 should be reloaded to observe network latency with ARP.
C:\Users\User1> ping 192.168.1.12
Request timed out.
Reply from 192.168.1.12: bytes=32 time=2ms TTL=255
Reply from 192.168.1.12: bytes=32 time=2ms TTL=255
Reply from 192.168.1.12: bytes=32 time=2ms TTL=255
Ping statistics for 192.168.1.12:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
Minimum = 1ms, Maximum = 3ms, Average = 2ms
d. Stop the Wireshark capture after the pinging is finished. Use the Wireshark filter to display only ARP and
ICMP outputs. In Wireshark, type arp or icmp in the Filter: entry area.
e. Examine the Wireshark capture. In this example, frame 10 is the first ICMP request sent by PC-A to S1.
Because there is no ARP entry for S1, an ARP request was sent to the management IP address of S1
asking for the MAC address. During the ARP exchanges, the echo request did not receive a reply before
the request was timed out. (frames 8 12)
After the ARP entry for S1 was added to the ARP cache, the last three ICMP exchanges were successful,
as displayed in frames 26, 27 and 30 33.
As displayed in the Wireshark capture, ARP is an excellent example of performance tradeoff. With no
cache, ARP must continually request address translations each time a frame is placed on the network.
This adds latency to the communication and could congest the LAN.
Reflection
1. How and when are static ARP entries removed?
_______________________________________________________________________________________
2. Why do you want to add static ARP entries in the cache?
_______________________________________________________________________________________
3. If ARP requests can cause network latency, why is it a bad idea to have unlimited hold times for ARP entries?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 11
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 11
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
S2
VLAN 1
192.168.1.12
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
PC-B
NIC
192.168.1.2
255.255.255.0
192.168.1.1
Objectives
Part 1: Build and Configure the Network
Use show commands to observe the process of building the switch MAC address table.
Background / Scenario
The purpose of a Layer 2 LAN switch is to deliver Ethernet frames to host devices on the local network. The
switch records host MAC addresses that are visible on the network, and maps those MAC addresses to its
own Ethernet switch ports. This process is called building the MAC address table. When a switch receives a
frame from a PC, it examines the frames source and destination MAC addresses. The source MAC address
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 5
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Note: The Fast Ethernet interfaces on Cisco 2960 switches are autosensing and an Ethernet straight-through
cable may be used between switches S1 and S2. If using another model Cisco switch, it may be necessary to
use an Ethernet crossover cable.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 5
Console into switch S1 and S2 and type the show interface F0/1 command on each switch. On the
second line of command output, what is the hardware addresses (or burned-in address [bia])?
S1 Fast Ethernet 0/1 MAC Address: ______________________________________________________
S2 Fast Ethernet 0/1 MAC Address: ______________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 5
Step 3: Clear the S2 MAC address table and display the MAC address table again.
a. In privileged EXEC mode, type the clear mac address-table dynamic command and press Enter.
S2# clear mac address-table dynamic
b. Quickly type the show mac address-table command again. Does the MAC address table have any
addresses in it for VLAN 1? Are there other MAC addresses listed?
___________________________________________________________________________________
Wait 10 seconds, type the show mac address-table command, and press Enter. Are there new
addresses in the MAC address table? __________________
Step 4: From PC-B, ping the devices on the network and observe the switch MAC address
table.
a. From PC-B, open a command prompt and type arp -a. Not including multicast or broadcast addresses,
how many device IP-to-MAC address pairs have been learned by ARP?
____________________________________________________________________________________
b. From the PC-B command prompt, ping the router/gateway R1, PC-A, S1, and S2. Did all devices have
successful replies? If not, check your cabling and IP configurations.
____________________________________________________________________________________
____________________________________________________________________________________
c.
From a console connection to S2, enter the show mac address-table command. Has the switch added
additional MAC addresses to the MAC address table? If so, which addresses and devices?
____________________________________________________________________________________
____________________________________________________________________________________
From PC-B, open a command prompt and retype arp -a. Does the PC-B ARP cache have additional
entries for all network devices that were sent pings?
____________________________________________________________________________________
Reflection
On Ethernet networks, data is delivered to devices by their MAC addresses. For this to happen, switches and
PCs dynamically build ARP caches and MAC address tables. With only a few computers on the network this
process seems fairly easy. What might be some of the challenges on larger networks?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 5
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 5
Background/Scenario
Note: This activity is best completed in groups of 2-3 students.
Please view the video, The History of Ethernet, located at the following link:
http://www.netevents.tv/video/bob-metcalfe-the-history-of-ethernet
Topics discussed in the video include not only where we have come from in Ethernet development, but
where we are going with Ethernet technology in the future!
1. After viewing the video and comparing its contents to Chapter 10, go to the web and search for
information about Ethernet:
How has Ethernet stayed the same over the past 25 years? What changes are being made
to make it more useful and applicable to todays data transmission methods?
2. Collect three pictures of old, current, and possible future Ethernet physical media and devices.
Focus your search on switches if possible. Share these pictures with the class and discuss:
How have Ethernet physical media and intermediary devices stayed the same?
How do you think the Ethernet will change in the future? What factors could influence these
changes?
Required Resources
Hard- or soft-copy media for recording answers to questions and for in-class sharing.
Reflection
1. How was Ethernet used when it was first developed?
____________________________________________________________________________________
____________________________________________________________________________________
2. How has Ethernet stayed the same over the past 25 years? What changes are being made to make it
more useful and applicable to todays data transmission methods?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Background/Scenario
During the upcoming weekend, you decide to visit a schoolmate who is currently at home sick. You know
his street address but you have never been to his town before. Instead of looking up the address on the
map, you decide to take it easy and to simply ask town residents for directions after you arrive by train.
The citizens you ask for directions are very helpful. However, they all have an interesting habit. Instead of
explaining the entire route to your destination, they all tell you, Take this road and as soon as you arrive
at the nearest crossroad, ask somebody there again. Somewhat bemused at this apparent oddity, you
follow these instructions and finally arrive, crossroad by crossroad, and road by road, at your friends
house.
Answer the following questions:
1. Would it have made a significant difference if you were told about the whole route or a larger part
of the route instead of just being directed to the nearest crossroad?
2. Would it have been more helpful to ask about the specific street address or just about the street
name? What would happen if the person you asked for directions did not know where the
destination street was or directed you through an incorrect road?
3. Assuming that on your way back home, you again choose to ask residents for directions. Would it
be guaranteed that you would be directed via the same route you took to get to your friends
home? Explain your answer.
4. Is it necessary to explain where you depart from when asking directions to an intended
destination?
Reflection
1. Would it have made a significant difference if you were told about the whole route or a larger part of the
route instead of just being directed to the nearest crossroad?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2. Would it have been more helpful to ask about the specific street address or just about the street name?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Objectives
Part 1: Access the Host Routing Table
Part 2: Examine IPv4 Host Routing Table Entries
Part 3: Examine IPv6 Host Routing Table Entries
Background / Scenario
To access a resource on a network, your host will determine the route to the destination host using its routing
table. The host routing table is similar to that of a router, but is specific to the local host and much less
complex. For a packet to reach a local destination, the local host routing table is required. To reach a remote
destination, both the local host routing table and the router routing table are required. The netstat r and
route print commands provide insight into how your local host routes packets to the destination.
In this lab, you will display and examine the information in the host routing table of your PC using the netstat
r and route print commands. You will determine how packets will be routed by your PC depending on the
destination address.
Note: This lab cannot be completed using Netlab. This lab assumes that you have Internet access.
Required Resources
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
The output is divided in five columns: Network Destination, Netmask, Gateway, Interface, and Metric.
The Network Destination column lists the reachable network. The Network Destination is used with
Netmask to match the destination IP address.
The Netmask lists the subnet mask that the host uses to determine the network and host portions of the
IP address.
The Gateway column lists the address that the host uses to send the packets to a remote network
destination. If a destination is directly connected, the gateway is listed as On-link in the output.
The Interface column lists the IP address that is configured on the local network adaptor. This is used to
forward a packet on the network.
The Metric column lists the cost of using a route. It is used to calculate the best route to a destination. A
preferred route has a lower metric number than other routes listed.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
The local default route 0.0.0.0 is used when the packet does not match other specified addresses in the
routing table. The packet will be sent to the gateway from the PC for further processing. In this example,
the packet will be sent to 192.168.1.1 from 192.168.1.11.
The loopback addresses, 127.0.0.0 127.255.255.255, are related to direct connection and provide
services to the local host.
The addresses for the subnet, 192.168.1.0 192.168.1.255, are all related to the host and the local
network. If the final destination of the packet is in the local network, the packet will exit 192.168.1.11
interface.
-
The local route address 192.168.1.0 represents all devices on the 192.168.1.0/24 network.
The network broadcast address 192.168.1.255 is used to send messages to all the hosts on the local
network.
The special multicast class D addresses 224.0.0.0 are reserved for use through either the loopback
interface (127.0.0.1) or the host (192.168.1.11).
The local broadcast address 255.255.255.255 can be used through either the loopback interface
(127.0.0.1) or host (192.168.1.11).
Based on the contents of the IPv4 routing table, if the PC wanted to send a packet to 192.168.1.15, what
would it do and where would it send the packet?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
If the PC wanted to send a packet to a remote host located at 172.16.20.23, what would it do and where
would it send the packet?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
The output of the IPv6 Route Table differs in column headings and format because the IPv6 addresses are
128 bits versus only 32 bits for IPv4 addresses. The IPv6 Route Table section displays four columns:
The If column lists the interface numbers of the IPv6-enabled network interfaces from the Interface List
section of the netstat r command.
The Metric column lists the cost of each route to a destination. The lower cost is the preferred route, and
the metric is used to select between multiple routes with the same prefix.
The Network Destination column lists the address prefix for the route.
The Gateway lists the next-hop IPv6 address to reach the destination. On-link is listed as the next-hop
address if it is directly connected to the host.
In this example, the figure displays the IPv6 Route Table section generated by the netstat r command to
reveal the following network destinations:
::/0: This is the IPv6 equivalent of the local default route. The Gateway column provides the link-local
address of the default router.
::1/128: This is equivalent to the IPv4 loopback address and provides services to the local host.
2001:0:9d38:6ab8:1863:3bca:3f57:fef4/128: This is the global unicast IPv6 address of the local computer.
fe80::/64: This is the local link network route address and represents all computers on the local-link IPv6
network.
ff00::/8: These are special reserved multicast class D addresses equivalent to the IPv4 224.x.x.x
addresses.
The host routing table for IPv6 has similar information as the IPv4 routing table. What is the local default route
for IPv4 and what is it for IPv6?
_______________________________________________________________________________________
What is the loopback address and subnet mask for IPv4? What is the loopback IP address for IPv6?
_______________________________________________________________________________________
How many IPv6 addresses have been assigned to this PC?
_______________________________________________________________________________________
How many broadcast addresses does the IPv6 routing table contain?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
Reflection
1. How is the number of bits for the network indicated for IPv4. How is it done for IPv6?
______________________________________________________________________________________
2. Why is there both IPv4 and IPv6 information in the host routing tables?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 6
Objectives
Part 1: Examine Router External Characteristics
Management ports
LAN interfaces
WAN interfaces
USB ports
Background / Scenario
In this lab, you will examine the outside of the router to become familiar with its characteristics and
components, such as its power switch, management ports, LAN and WAN interfaces, indicator lights, network
expansion slots, memory expansion slots, and USB ports.
You will also identify the internal components and characteristics of the IOS by consoling into the router and
issuing various commands, such as show version and show interfaces, from the CLI.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). Other routers and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs.
Note: Make sure that the routers have been erased and have no startup configurations. If you are unsure,
contact your instructor.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 8
a.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 8
Circle and label the routers LAN interfaces. How many LAN interfaces does the router in the image have
and what is the interface technology type? Are the LAN interfaces the same on your router? If not, how
are they different?
____________________________________________________________________________________
d. Circle and label the routers WAN interfaces. How many WAN interfaces does the router in the image
have and what is the interface technology type? Are the WAN interfaces the same on your router? If not,
how are they different?
____________________________________________________________________________________
e. The Cisco 1941 ISR is a modular platform and comes with module expansion slots for varied network
connectivity requirements. Circle and label the module slots. How many module slots are there? How
many are used? What type of module expansion slots are they? Are the module slots the same on your
router? If not, how are they different?
____________________________________________________________________________________
f.
The Cisco 1941 router comes with CompactFlash memory slots for high speed storage. Circle and label
the CompactFlash memory slots. How many memory slots are there? How many are used? How much
memory can they hold? Are the memory slots the same on your router? If not, how are they different?
____________________________________________________________________________________
g. The Cisco 1941 router comes with USB 2.0 ports. The built-in USB ports support eToken devices and
USB flash memory. The USB eToken device feature provides device authentication and secure
configuration of Cisco routers. The USB flash feature provides optional secondary storage capability and
an additional boot device. Circle and label the USB ports. How many USB ports are there? Are there USB
ports on your router?
____________________________________________________________________________________
h. The Cisco 1941 router also comes with a mini-B USB console port. Circle and label the mini-B USB
console port.
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 8
a. In the top image above, examine the indicator lights on the front panel of the router? The lights are
labeled SYS, ACT, and POE. What do the labels refer to? What do the lights in the image indicate about
the status of the router? These labels would be readable if they were not lit.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
b. In the backplane image above, examine the indicator lights on the router. There are three visible activity
lights, one for each of the connected interfaces and management ports. Examine the interface lights on
your router. How are the lights labeled, and what is their meaning?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 8
Aside from the management ports and network interfaces, what other indicator lights are on the
backplane of the router and what might their purpose be?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 8
----------------------------------------------------------------Technology
Technology-package
Technology-package
Current
Type
Next reboot
-----------------------------------------------------------------ipbase
ipbasek9
Permanent
ipbasek9
security
securityk9
Permanent
securityk9
data
None
None
None
Configuration register is 0x2102
c.
Based on the output of the show version command, answer the following questions about the router. If
you are examining a different model router, include the information about it here.
1) What is the version of the Cisco IOS and what is the system image filename?
________________________________________________________________________________
2) What is the Bootstrap program version in ROM BIOS?
________________________________________________________________________________
3) How long has the router been running without a restart (also known as its uptime)?
________________________________________________________________________________
4) How much dynamic random-access memory (DRAM) memory does the router have?
________________________________________________________________________________
5) What is the routers processor board ID number?
________________________________________________________________________________
6) What network interfaces does the router have?
________________________________________________________________________________
7) How much CompactFlash memory for IOS storage is there?
________________________________________________________________________________
8) How much nonvolatile random-access memory (NVRAM) memory for configuration file storage is
there?
________________________________________________________________________________
9) What is the setting of the configuration register?
________________________________________________________________________________
Step 2: Use the show interface command to examine the network interfaces.
a. Use the show interface gigabitEthernet 0/0 command to see the status of the Gigabit Ethernet 0/0
interface.
Note: After typing part of the command, for example, show interface g, you can use the Tab key on your
keyboard to complete the gigabitEthernet command parameter.
Router# show interface gigabitEthernet 0/0
GigabitEthernet0/0 is administratively down, line protocol is down
Hardware is CN Gigabit Ethernet, address is 442b.031a.b9a0 (bia 442b.031a.b9a0)
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 8
b. Given the output of the show interface gigabitEthernet 0/0 command depicted above, or using the
output from your router, answer the following questions:
What is the hardware type and MAC address of the Gigabit Ethernet interface?
____________________________________________________________________________________
What is the interface media type? Is the interface up or down?
____________________________________________________________________________________
c.
Use the show interfaces serial 0/0/0 command to view the status of the Serial 0/0/0 interface.
Router# show interface serial 0/0/0
Serial0/0/0 is administratively down, line protocol is down
Hardware is WIC MBRD Serial
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
Last input 07:41:21, output never, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1 packets input, 24 bytes, 0 no buffer
Received 1 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 8
d. Given the output command depicted above, answer the following questions:
What is the frame encapsulation type?
___________________________________________________________________________________
What is the hardware type? Is the interface up or down?
___________________________________________________________________________________
Reflection
1. Why might you need to use an EHWIC expansion slot?
_______________________________________________________________________________________
2. Why might you need to upgrade the Flash memory?
_______________________________________________________________________________________
3. What is the purpose of the mini-USB port?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
4. What is the purpose of the ISM/WLAN indicator light on the backplane of the router? What does it refer to?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 8
Addressing Table
Device
R1
Interface
IP Address
Subnet Mask
Default Gateway
G0/0
192.168.0.1
255.255.255.0
N/A
G0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
N/A
N/A
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
PC-B
NIC
192.168.0.3
255.255.255.0
192.168.0.1
Objectives
Part 1: Set Up the Topology and Initialize Devices
Background / Scenario
This is a comprehensive lab to review previously covered IOS commands. In this lab, you will cable the
equipment as shown in the topology diagram. You will then configure the devices to match the addressing
table. After the configurations have been saved, you will verify your configurations by testing for network
connectivity.
After the devices have been configured and network connectivity has been verified, you will use IOS
commands to retrieve information from the devices to answer questions about your network equipment.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 11
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing and an Ethernet straightthrough cable may be used between the router and PC-B. If using another model Cisco router, it may be
necessary to use an Ethernet crossover cable.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 11
d. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as
though they were host names.
e. Assign class as the privileged EXEC encrypted password.
f.
Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
j.
k.
Configure an interface description for each interface indicating which device is connected to it.
l.
Step 1: Retrieve hardware and software information from the network devices.
a. Use the show version command to answer the following questions about the router.
What is the name of the IOS image that the router is running?
____________________________________________________________________________________
How much DRAM memory does the router have?
____________________________________________________________________________________
____________________________________________________________________________________
How much NVRAM memory does the router have?
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 11
Step 4: Display a summary list of the interfaces on the router and switch.
There are several commands that can be used to verify an interface configuration. One of the most useful of
these is the show ip interface brief command. The command output displays a summary list of the
interfaces on the device and provides immediate feedback to the status of each interface.
a. Enter the show ip interface brief command on the router.
R1# show ip interface brief
Interface
Embedded-Service-Engine0/0
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
Serial0/0/1
R1#
IP-Address
unassigned
192.168.0.1
192.168.1.1
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
Method
unset
manual
manual
unset
unset
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Status
Protocol
administratively down down
up
up
up
up
administratively down down
administratively down down
Page 4 of 11
IP-Address
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
Method
manual
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
Status
up
down
down
down
down
up
up
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Protocol
up
down
down
down
down
up
up
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Reflection
1. If the G0/1 interface showed administratively down, what interface configuration command would you use to
turn the interface up?
_______________________________________________________________________________________
2. What would happen if you had incorrectly configured interface G0/1 on the router with an IP address of
192.168.1.2?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 11
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the router type and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
b. Configure the IP address, subnet mask, and default gateway settings on PC-B.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 11
c.
Router(config)#
c.
d. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as
though they were host names.
R1(config)# no ip domain-lookup
e. Assign class as the privileged EXEC encrypted password.
R1(config)# enable secret class
f.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 11
vty 0 4
password cisco
login
exit
Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
R1(config)# banner motd #
Enter TEXT message. End with the character '#'.
Unauthorized access prohibited!
#
R1(config)#
j.
R1#
k.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 11
R1#
l.
R1#
Note: Use the question mark (?) to help determine the correct sequence of the parameters needed to
execute this command.
m. Ping PC-B from a command prompt window on PC-A.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 11
Note: You may receive a prompt to save the running configuration prior to reloading the router. Respond
by typing no and press Enter.
System configuration has been modified. Save? [yes/no]: no
Step 2: Determine if there have been any virtual local-area networks (VLANs) created.
Use the show flash command to determine if any VLANs have been created on the switch.
Switch# show flash
Directory of flash:/
2
3
4
5
6
-rwx
-rwx
-rwx
-rwx
-rwx
1919
1632
13336
11607161
616
Mar
Mar
Mar
Mar
Mar
1
1
1
1
1
1993
1993
1993
1993
1993
00:06:33
00:06:33
00:06:33
02:37:06
00:07:13
+00:00
+00:00
+00:00
+00:00
+00:00
private-config.text
config.text
multiple-fs
c2960-lanbasek9-mz.150-2.SE.bin
vlan.dat
You will be prompted to verify the file name. At this point, you can change the file name or just press
Enter if you have entered the name correctly.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 11
Note: You may receive a prompt to save the running configuration prior to reloading the switch. Type no
and press Enter.
System configuration has been modified. Save? [yes/no]: no
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 11
Background/Scenario
Note: It is suggested that students work in pairs; however, if preferred, students can complete this
activity individually.
Your instructor will provide you with output generated by a routers show ip route command. Use Packet
Tracer to build a topology model using this routing information.
At a minimum, the following should be used in your topology model:
One Cisco Series 1941 Router with one HWIC-4ESW switching port modular card and IOS Version
15.1 or higher
Use the note tool in Packet Tracer to indicate the addresses of the router interfaces and possible
addresses for the end devices you chose for your model.
Label all end devices, ports, and addresses ascertained from the show ip route output/routing table
information in your Packet Tracer file. Save your work in hard or soft copy to share with the class.
Required Resources
Routing Table 1 - You can use the table to assist one another as you read the information provided, and
then construct the model using Packet Tracer.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Reflection
1. What was the hardest part of designing this network model? Explain your answer.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
We Need to Talk
Objectives
Explain how transport layer protocols and services support communications across data networks.
In this activity, you will determine whether high or low data communication delivery methods should be
utilized in a situational context.
Background/Scenario
Note: This activity works best with medium-sized groups of 6 to 8 students per group.
This chapter helps you understand how transport layer protocols and services support network data
communications.
Your instructor will whisper a complex message to the first student in a group. An example of the
message might be Our final exam will be given next Tuesday, February 5th, at 2:00 p.m. in Room 1151.
That student whispers the message to the next student in the group. Each group follows this process until
all members of each group have heard the whispered message.
Here are the rules to follow:
The message must keep moving from one person to the other with no skipping of participants. The
instructor should ask a student to keep time of the full message activity from first participant to last
participant stating the messages. The first or last person would mostly likely be the best one to keep
this time.
The last student will say aloud exactly what he or she heard.
Your instructor will repeat the original message so that the group can compare it to the message that was
delivered by the last student in the group.
Required Resources
Timer for the student who is keeping a record of the conversations duration.
Reflection
1. Would the contents of this message need to be fully correct when you received them if you were
depending on this message to drive your personal/business calendar, studying schedule, etc.?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2. Would the length of time taken to deliver the message be an important factor to the sender and recipient?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Objectives
Part 1: Prepare Wireshark to Capture Packets
Examine information within packets, including IP addresses, TCP port numbers, and TCP control flags.
Background / Scenario
In this lab, you will use Wireshark to capture and examine packets generated between the PC browser using
the HyperText Transfer Protocol (HTTP) and a web server, such as www.google.com. When an application,
such as HTTP or File Transfer Protocol (FTP) first starts on a host, TCP uses the three-way handshake to
establish a reliable TCP session between the two hosts. For example, when a PC uses a web browser to surf
the Internet, a three-way handshake is initiated and a session is established between the PC host and web
server. A PC can have multiple, simultaneous, active TCP sessions with various web sites.
Note: This lab cannot be completed using Netlab. This lab assumes that you have Internet access.
Required Resources
1 PC (Windows 7, Vista, or XP with a command prompt access, Internet access, and Wireshark installed)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
b. Write down the IP and MAC addresses associated with the selected Ethernet adapter, because that is the
source address to look for when examining captured packets.
The PC host IP address: ________________________________________________________
The PC host MAC address: _____________________________________________________
c.
In the Wireshark: Capture Interfaces window, click the check the box next to the interface connected to
your LAN.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
Find the appropriate packet for the start of your three-way handshake. In this example, frame 15 is the
start of the TCP three-way handshake.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
Step 3: Examine information within packets including IP addresses, TCP port numbers, and
TCP control flags.
a. In our example, frame 15 is the start of the three-way handshake between the PC and the Google web
server. In the packet list pane (top section of the main window), select the frame. This highlights the line
and displays the decoded information from that packet in the two lower panes. Examine the TCP
information in the packet details pane (middle section of the main window).
b. Click the + icon to the left of the Transmission Control Protocol in the packet details pane to expand the
view of the TCP information.
c.
Click the + icon to the left of the Flags. Look at the source and destination ports and the flags that are set.
Note: You may have to adjust the top and middle windows sizes within Wireshark to display the
necessary information.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
What are the values of the source and destination ports? ______________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
Reflection
1. There are hundreds of filters available in Wireshark. A large network could have numerous filters and many
different types of traffic. Which three filters in the list might be the most useful to a network administrator?
_______________________________________________________________________________________
2. What other ways could Wireshark be used in a production network?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 6
Objectives
Part 1: Record a PCs IP Configuration Information
Part 2: Use Wireshark to Capture DNS Queries and Responses
Part 3: Analyze Captured DNS or UDP Packets
Background / Scenario
If you have ever used the Internet, you have used the Domain Name System (DNS). DNS is a distributed
network of servers that translates user-friendly domain names like www.google.com to an IP address. When
you type a website URL into your browser, your PC performs a DNS query to the DNS servers IP address.
Your PCs DNS server query and the DNS servers response make use of the User Datagram Protocol (UDP)
as the transport layer protocol. UDP is connectionless and does not require a session setup as does TCP.
DNS queries and responses are very small and do not require the overhead of TCP.
In this lab, you will communicate with a DNS server by sending a DNS query using the UDP transport
protocol. You will use Wireshark to examine the DNS query and response exchanges with the name server.
Note: This lab cannot be completed using Netlab. This lab assumes that you have Internet access.
Required Resources
1 PC (Windows 7, Vista, or XP with a command prompt access, Internet access, and Wireshark installed)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
After selecting the desired interface, click Start to capture the packets.
b. In the packet list pane (top section) of the main window, locate the packet that includes standard query
and A www.google.com. See frame 4 as an example.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
a. In the packet details pane, frame 4 had 74 bytes of data on the wire as displayed on the first line. This is
the number of bytes to send a DNS query to a name server requesting the IP addresses of
www.google.com.
b. The Ethernet II line displays the source and destination MAC addresses. The source MAC address is
from your local PC because your local PC originated the DNS query. The destination MAC address is
from the default gateway, because this is the last stop before this query exits the local network.
Is the source MAC address the same as recorded from Part 1 for the local PC? _________________
c.
In the Internet Protocol Version 4 line, the IP packet Wireshark capture indicates that the source IP
address of this DNS query is 192.168.1.11, and the destination IP address is 192.168.1.1. In this
example, the destination address is the default gateway. The router is the default gateway in this network.
Can you pair up the IP and MAC addresses for the source and destination devices?
Device
IP Address
MAC Address
Local PC
Default Gateway
The IP packet and header encapsulates the UDP segment. The UDP segment contains the DNS query
as the data.
d. A UDP header only has four fields: source port, destination port, length, and checksum. Each field in UDP
header is only 16 bits as depicted below.
Expand the User Datagram Protocol in the packet details pane by clicking the plus (+) sign. Notice that
there are only four fields. The source port number in this example is 52110. The source port was
randomly generated by the local PC using port numbers that are not reserved. The destination port is 53.
Port 53 is a well-known port reserved for use with DNS. DNS servers listen on port 53 for DNS queries
from clients.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
In this example, the length of this UDP segment is 40 bytes. Out of 40 bytes, 8 bytes are used as header.
The other 32 bytes are used by DNS query data. The 32 bytes of DNS query data is highlighted in the
following illustration in the packet bytes pane (lower section) of the Wireshark main window.
The checksum is used to determine the integrity of the packet after it has traversed the Internet.
The UDP header has low overhead because UDP does not have fields that are associated with three-way
handshake in TCP. Any data transfer reliability issues that occur must be handled by the application
layer.
Record your Wireshark results in the table below:
Frame Size
Source MAC address
Destination MAC address
Source IP address
Destination IP address
Source Port
Destination Port
Is the source IP address the same as the local PCs IP address recorded in Part 1? _____________
Is the destination IP address the same as the default gateway noted in Part 1? _____________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
b. In the Ethernet II frame for the DNS response, from what device is the source MAC address and what
device is the destination MAC address?
____________________________________________________________________________________
c.
Notice the source and destination IP addresses in the IP packet. What is the destination IP address?
What is the source IP address?
Destination IP address: _______________________Source IP address: ________________________
What happened to the roles of source and destination for the local host and default gateway?
____________________________________________________________________________________
d. In the UDP segment, the role of the port numbers has also reversed. The destination port number is
52110. Port number 52110 is the same port that was generated by the local PC when the DNS query was
sent to the DNS server. Your local PC listens for a DNS response on this port.
The source port number is 53. The DNS server listens for a DNS query on port 53 and then sends a DNS
response with a source port number of 53 back to originator of the DNS query.
When the DNS response is expanded, notice the resolved IP addresses for www.google.com in the
Answers section.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
Reflection
What are the benefits of using UDP instead of TCP as a transport protocol for DNS?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 6
Interface
IP Address
Subnet Mask
Default Gateway
S1
VLAN 1
192.168.1.1
255.255.255.0
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Identify TCP Header Fields and Operation Using a Wireshark FTP Session Capture
Part 2: Identify UDP Header Fields and Operation Using a Wireshark TFTP Session Capture
Background / Scenario
The two protocols in the TCP/IP transport layer are the TCP, defined in RFC 761, and UDP, defined in RFC
768. Both protocols support upper-layer protocol communication. For example, TCP is used to provide
transport layer support for the HyperText Transfer Protocol (HTTP) and FTP protocols, among others. UDP
provides transport layer support for the Domain Name System (DNS) and TFTP among others.
Note: Understanding the parts of the TCP and UDP headers and operation are a critical skill for network
engineers.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 14
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7, Vista, or XP with Wireshark and a TFTP server, such as tftpd32 installed)
Console cable to configure the Cisco IOS devices via the console port
Part 1: Identify TCP Header Fields and Operation Using a Wireshark FTP
Session Capture
In Part 1, you use Wireshark to capture an FTP session and inspect TCP header fields.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 14
TCP is routinely used during a session to control datagram delivery, verify datagram arrival, and manage
window size. For each data exchange between the FTP client and FTP server, a new TCP session is started.
At the conclusion of the data transfer, the TCP session is closed. Finally, when the FTP session is finished,
TCP performs an orderly shutdown and termination.
In Wireshark, detailed TCP information is available in the packet details pane (middle section). Highlight the
first TCP datagram from the host computer, and expand the TCP record. The expanded TCP datagram
appears similar to the packet detail pane shown below.
The image above is a TCP datagram diagram. An explanation of each field is provided for reference:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 14
The TCP source port number belongs to the TCP session host that opened a connection. The value is
normally a random value above 1,023.
The TCP destination port number is used to identify the upper layer protocol or application on the
remote site. The values in the range 01,023 represent the well-known ports and are associated with
popular services and applications (as described in RFC 1700, such as Telnet, FTP, HTTP, and so on).
The combination of the source IP address, source port, destination IP address, and destination port
uniquely identifies the session to both sender and receiver.
Note: In the Wireshark capture below, the destination port is 21, which is FTP. FTP servers listen on port 21
for FTP client connections.
The Sequence number specifies the number of the last octet in a segment.
The Acknowledgment number specifies the next octet expected by the receiver.
The Code bits have a special meaning in session management and in the treatment of segments.
Among interesting values are:
-
SYN Synchronize, only set when a new TCP session is negotiated during the TCP three-way
handshake.
The Window size is the value of the sliding window; determines how many octets can be sent before
waiting for an acknowledgement.
The Urgent pointer is only used with an Urgent (URG) flag when the sender needs to send urgent data
to the receiver.
The Options has only one option currently, and it is defined as the maximum TCP segment size (optional
value).
Using the Wireshark capture of the first TCP session startup (SYN bit set to 1), fill in information about the
TCP header:
From the PC to CDC server (only the SYN bit is set to 1):
Source IP Address:
Destination IP Address:
Source port number:
Destination port number:
Sequence number:
Acknowledgement number:
Header length:
Window size:
In the second Wireshark filtered capture, the CDC FTP server acknowledges the request from the PC. Note
the values of the SYN and ACK bits.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 14
By applying an ftp filter, the entire sequence of the FTP traffic can be examined in Wireshark. Notice the
sequence of the events during this FTP session. The username anonymous was used to retrieve the Readme
file. After the file transfer completed, the user ended the FTP session.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 14
Part 2: Identify UDP Header Fields and Operation Using a Wireshark TFTP
Session Capture
In Part 2, you use Wireshark to capture a TFTP session and inspect UDP header fields.
Step 1: Set up this physical topology and prepare for TFTP capture.
a. Establish a console and Ethernet connection between PC-A and Switch S1.
b. If not already done, manually configure the IP address on the PC to 192.168.1.3. It is not required to set
the default gateway.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 14
c.
Configure the switch. Assign an IP address of 192.168.1.1 to VLAN 1. Verify connectivity with the PC by
pinging 192.168.1.3. Troubleshoot as necessary.
Switch> enable
Switch# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# host S1
S1(config)# interface vlan 1
S1(config-if)# ip address 192.168.1.1 255.255.255.0
S1(config-if)# no shut
*Mar 1 00:37:50.166: %LINK-3-UPDOWN: Interface Vlan1, changed state to up
*Mar 1 00:37:50.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1,
changed state to up
S1(config-if)# end
S1# ping 192.168.1.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/203/1007 ms
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 14
Click Browse and change the current directory to C:\Users\user1\Desktop\TFTP by replacing user1 with
your username.
The TFTP server should look like this:
Notice that in Current Directory, it lists the user and the Server (PC-A) interface as the IP address of
192.168.1.3.
d. Test the ability to copy a file using TFTP from the switch to the PC. Troubleshoot as necessary.
S1# copy start tftp
Address or name of remote host []? 192.168.1.3
Destination filename [s1-confg]?
!!
1638 bytes copied in 0.026 secs (63000 bytes/sec)
If you see that the file has copied (as in the above output), then you are ready to go on to the next step. If
not, then troubleshoot. If you get the %Error opening tftp (Permission denied) error, first
check to make sure your firewall is not blocking TFTP, and that you are copying to a location where your
username has adequate permission, such as the desktop.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 14
e. Set the filter to tftp. Your output should look similar to the output shown above. This TFTP transfer is
used to analyze transport layer UDP operations.
In Wireshark, detailed UDP information is available in the Wireshark packet details pane. Highlight the
first UDP datagram from the host computer, and move the mouse pointer to the packet details pane. It
may be necessary to adjust the packet details pane and expand the UDP record by clicking the protocol
expand box. The expanded UDP datagram should look similar to the diagram below.
The figure below is a UDP datagram diagram. Header information is sparse, compared to the TCP
datagram. Similar to TCP, each UDP datagram is identified by the UDP source port and UDP destination
port.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 14
Using the Wireshark capture of the first UDP datagram, fill in information about the UDP header. The
checksum value is a hexadecimal (base 16) value, denoted by the preceding 0x code:
Source IP Address:
Destination IP Address:
Source Port Number:
Destination Port Number:
UDP Message Length:
UDP Checksum:
How does UDP verify datagram integrity?
____________________________________________________________________________________
____________________________________________________________________________________
Examine the first frame returned from tftpd server. Fill in the information about the UDP header:
Source IP Address:
Destination IP Address:
Source Port Number:
Destination Port Number:
UDP Message Length:
UDP Checksum:
Notice that the return UDP datagram has a different UDP source port, but this source port is used for the
remainder of the TFTP transfer. Because there is no reliable connection, only the original source port
used to begin the TFTP session is used to maintain the TFTP transfer.
Also notice that the UDP Checksum is incorrect. This is most likely caused by UDP checksum offload.
You can learn more about why this happens by searching for UDP checksum offload.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 14
Reflection
This lab provided the opportunity to analyze TCP and UDP protocol operations from captured FTP and TFTP
sessions. How does TCP manage communication differently than UDP?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Challenge
Because neither FTP nor TFTP are secure protocols, all transferred data is sent in clear text. This includes
any user IDs, passwords, or clear-text file contents. Analyzing the upper-layer FTP session will quickly identify
the user ID, password, and configuration file passwords. Upper-layer TFTP data examination is a bit more
complicated, but the data field can be examined and the configuration user ID and password information
extracted.
Cleanup
Unless directed otherwise by your instructor:
1) Remove the files that were copied to your PC.
2) Erase the configurations on switch S1.
3) Remove the manual IP address from the PC and restore Internet connectivity.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 14
Background/Scenario
Note: It is important that the students have completed the Introductory MA for this chapter. This activity
works best in medium-sized groups of 6 to 8 students.
Your instructor will whisper a complex message to the first student in a group. An example of the
message might be We are expecting a blizzard tomorrow. It should be arriving in the morning and school
will be delayed 2 two hours so bring your homework.
That student whispers the message to the next student in the group. Each group follows this process until
all members of each group have heard the whispered message.
Here are the rules to follow:
You can whisper the message in short parts to your neighbor AND you can repeat the
message parts after verifying your neighbor heard the correct message.
Small parts of the message may be checked and repeated again (clockwise OR counterclockwise to ensure accuracy of the message parts) by whispering. A student will be
assigned to time the entire activity.
When the message has reached the end of the group, the last student will say aloud what
was heard. Small parts of the message may be repeated (i.e., re-sent), and the process can
be restarted to ensure that ALL parts of the message are fully delivered and correct.
Your instructor will repeat the original message to check for quality delivery.
Reflection
1. Would the contents of this message need to be clear and correct when you received them, if you were
depending on this message to drive your personal/business calendar, studying schedule, etc.?
____________________________________________________________________________________
____________________________________________________________________________________
2. Would the length of time taken to deliver the message be an important factor to the sender and recipient?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
3. Compare the Introductory Modeling Activity of this chapter to this activity. What differences do you notice
about the delivery of the message?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Background /Scenario
Today, more than 99% of our world remains unconnected. Tomorrow, we will be connected to almost
everything. 37 billion devices will be connected to the Internet by 2020. From trees to water to cars, the
organic and the digital will work together for a more intelligent and connected world. This tomorrow of
networking is known as The Internet of Everything or IoE.
If traffic, transportation, networking and space exploration depend on digital information sharing, how will
that information be identified from its source to its destination?
In this activity, you will begin to think about not only what will be identified in the IoE world, but how
everything will be addressed in the same world!
Activity directions for class or individual students:
1. Read the blog/news source, Internet of Everything: Fueling an Amazing Future
#TomorrowStartsHere authored by John Chambers regarding the Internet of Everything (IoE).
This blog is located at http://blogs.cisco.com/news/internet-of-everything-2.
2. Then view the video, Cisco Commercial: Tomorrow Starts Here located halfway down the page.
3. Next, navigate to the IoE main page located at http://www.cisco.com/web/tomorrow-startshere/index.html.Then click on a category that interests you from within the graphic collage.
4. Next, watch the video or read through the blog or .pdf that belongs to your IoE category of
interest.
5. Write 5 comments or questions about what you saw or read. Be prepared to share with the class.
Required Resources
Internet connectivity for research on the cisco.com site. Headphones may also be useful if students are
individually completing this activity within a group setting.
Recording capabilities (paper, tablet, etc.) for comments or questions regarding the videos, blogs and/or
.pdfs read or viewed for Step 3.
Reflection
1. Why do you think there is a need to address trees? Windmills? Cars? Refrigerators? Why will just
about anything be able to use an IP address?
____________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Objectives
Part 1: Access the Windows Calculator
Part 2: Convert between Numbering Systems
Part 3: Convert Host IPv4 Addresses and Subnet Masks into Binary
Part 4: Determine the Number of Hosts in a Network Using Powers of 2
Part 5: Convert MAC Addresses and IPv6 Addresses to Binary
Background / Scenario
Network technicians use binary, decimal, and hexadecimal numbers when working with computers and
networking devices. Microsoft provides a built-in Calculator application as part of the operating system. The
Windows 7 version of Calculator includes a Standard view that can be used to perform basic arithmetic tasks
such as addition, subtract, multiplication, and division. The Calculator application also has advanced
programming, scientific, and statistical capabilities.
In this lab, you will use the Windows 7 Calculator application Programmer view to convert between the binary,
decimal, and hexadecimal number systems. You will also use the Scientific view powers function to determine
the number of hosts that can be addressed based on the number of host bits available.
Required Resources
Note: If using an operating system other than Windows 7, the Calculator application views and functions
available may vary from those shown in this lab. However, you should be able to perform the calculations.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 7
Step 1: Click the Windows Start button and select All Programs.
Step 2: Click the Accessories folder and select Calculator.
Step 3: After Calculator opens, click the View menu.
What are the four available modes?
_______________________________________________________________________________________
Note: The Programmer and Scientific modes are used in this lab.
Click the Hex (Hexadecimal) radio button. Which characters are activated on the number pad now?
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 7
Click the Hex radio button to change to Hexadecimal mode. Which hexadecimal character (0 through 9
or A to F) represents decimal 15? _______________________
g. As you were switching between the numbering systems, you may have noticed the binary number 1111 is
displayed during the conversion. This assists you in relating the binary digits to other numbering system
values. Each set of 4 bits represents a hexadecimal character or potentially multiple decimal characters.
h. Clear the values in the window by clicking C above the 9 on the calculator keypad. Convert the following
numbers between the binary, decimal, and hexadecimal numbering systems.
Decimal
Binary
Hexadecimal
86
175
204
0001 0011
0100 1101
0010 1010
38
93
E4
i.
As you record the values in the table above, do you see a pattern between the binary and hexadecimal
numbers?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 7
Part 3: Convert Host IPv4 Addresses and Subnet Masks into Binary
Internet Protocol version 4 (IPv4) addresses and subnet masks are represented in a dotted decimal format
(four octets), such as 192.168.1.10 and 255.255.255.0, respectively. This makes these addresses more
readable to humans. Each of the decimal octets in the address or a mask can be converted to 8 binary bits.
An octet is always 8 binary bits. If all 4 octets were converted to binary, how many bits would there be?
________________________
a. Use the Windows Calculator application to convert the IP address 192.168.1.10 into binary and record the
binary numbers in the following table:
Decimal
Binary
192
168
1
10
b. Subnet masks, such as 255.255.255.0, are also represented in a dotted decimal format. A subnet mask
will always consist of four 8-bit octets, each represented as a decimal number. Using the Windows
Calculator, convert the 8 possible decimal subnet mask octet values to binary numbers and record the
binary numbers in the following table:
Decimal
Binary
0
128
192
224
240
248
252
254
255
c.
With the combination of IPv4 address and the subnet mask, the network portion can be determined and
the number of hosts available in a given IPv4 subnet can also be calculated. The process is examined in
Part 4.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 7
192.168.1.10
255.255.248.0
Because the first 21 bits in the subnet mask are consecutive numeral ones, the corresponding first 21 bits
in the IP address in binary is 110000001010100000000; these represent the network portion of the
address. The remaining 11 bits are 00100001010 and represent the host portion of the address.
What is the decimal and binary network number for this address?
____________________________________________________________________________________
What is the decimal and binary host portion for this address?
____________________________________________________________________________________
Because the network number and the broadcast address use two addresses out of the subnet, the
formula to determine the number of hosts available in an IPv4 subnet is the number 2 to the power of the
number of host bits available, minus 2:
Number of available hosts = 2 (number of host bits) 2
b. Using the Windows Calculator application, switch to the Scientific mode by clicking the View menu, then
select Scientific.
c.
d. Input 11. Click =, or press Enter on the keyboard for the answer.
e. Subtract 2 from the answer by using the calculator if desired.
f.
In this example, there are 2046 hosts are available on this network (211-2).
g. If given the number of host bits, determine the number of hosts available and record the number in the
following table.
Number of Available Host Bits
5
14
24
10
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 7
Subnet Mask
255.255.255.0
11111111.11111111.11111111.00000000
255.255.240.0
11111111.11111111.11110000.00000000
255.255.255.128
11111111.11111111.11111111.10000000
255.255.255.252
11111111.11111111.11111111.11111100
255.255.0.0
11111111.11111111.00000000.00000000
Number of
Available
Host Bits
Number of
Available
Hosts
Convert the MAC address into binary digits using the Windows Calculator application.
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 7
Hexadecimal
Binary
2001
0DB8
ACAD
0001
0000
0000
0000
0001
Reflection
1. Can you perform all the conversions without the assistance of the calculator? What can you do to make it
happen?
_______________________________________________________________________________________
2. For most IPv6 addresses, the network portion of the address is usually 64 bits. How many hosts are available
on a subnet where the first 64 bits represent the network? Hint: All host addresses are available in the subnet
for hosts.
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 7
Background / Scenario
Every IPv4 address is comprised of two parts: a network portion and a host portion. The network portion of an
address is the same for all devices that reside in the same network. The host portion identifies a specific host
within a given network. The subnet mask is used to determine the network portion of an IP address. Devices
on the same network can communicate directly; devices on different networks require an intermediary Layer 3
device, such as a router, to communicate.
To understand the operation of devices on a network, we need to look at addresses the way devices doin
binary notation. To do this, we must convert the dotted decimal form of an IP address and its subnet mask to
binary notation. After this has been done, we can use the bitwise ANDing operation to determine the network
address.
This lab provides instructions on how to determine the network and host portion of IP addresses by converting
addresses and subnet masks from dotted decimal to binary, and then using the bitwise ANDing operation.
You will then apply this information to identify addresses in the network.
Binary
192
11000000
168
10
255
2
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 4
Binary
11000000.10101000.00001010.00001010
209.165.200.229
172.16.18.183
10.86.252.17
255.255.255.128
255.255.192.0
Step 1: Determine the number of bits to use to calculate the network address.
Description
Decimal
Binary
IP Address
192.168.10.131
11000000.10101000.00001010.10000011
Subnet Mask
255.255.255.192
11111111.11111111.11111111.11000000
Network Address
192.168.10.128
11000000.10101000.00001010.10000000
How do you determine what bits to use to calculate the network address?
____________________________________________________________________________________
In the example above, how many bits are used to calculate the network address?
______________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 4
Decimal
IP Address
172.16.145.29
Subnet Mask
255.255.0.0
Binary
Network Address
b. Enter the missing information into the table below:
Description
Decimal
IP Address
192.168.10.10
Subnet Mask
255.255.255.0
Binary
Network Address
c.
Decimal
IP Address
192.168.68.210
Subnet Mask
255.255.255.128
Binary
Network Address
d. Enter the missing information into the table below:
Description
Decimal
IP Address
172.16.188.15
Subnet Mask
255.255.240.0
Binary
Network Address
e. Enter the missing information into the table below:
Description
Decimal
IP Address
10.172.2.8
Subnet Mask
255.224.0.0
Binary
Network Address
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 4
Reflection
Why is the subnet mask important in determining the network address?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 4
Background / Scenario
Addressing is an important function of network layer protocols because it enables data communication
between hosts on the same network, or on different networks. In this lab, you will examine the structure of
Internet Protocol version 4 (IPv4) addresses. You will identify the various types of IPv4 addresses and the
components that help comprise the address, such as network portion, host portion, and subnet mask. Types
of addresses covered include public, private, unicast, and multicast.
Required Resources
Step 1: Analyze the table shown below and identify the network portion and host portion of the
given IPv4 addresses.
The first two rows show examples of how the table should be completed.
Key for table:
N = all 8 bits for an octet are in the network portion of the address
n = a bit in the network portion of the address
H = all 8 bits for an octet are in the host portion of the address
h = a bit in the host portion of the address
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 4
Network/Host
N,n = Network
IP Address/Prefix
H,h = Host
Subnet Mask
Network Address
192.168.10.10/24
N.N.N.H
255.255.255.0
192.168.10.0
10.101.99.17/23
N.N.nnnnnnnh.H
255.255.254.0
10.101.98.0
209.165.200.227/27
172.31.45.252/24
10.1.8.200/26
172.16.117.77/20
10.1.1.101/25
209.165.202.140/27
192.168.28.45/28
Step 2: Analyze the table below and list the range of host and broadcast addresses given a
network/prefix mask pair.
The first row shows an example of how the table should be completed.
IP Address/Prefix
192.168.10.10/24
Last Host
Address
192.168.10.254
Broadcast
Address
192.168.10.255
10.101.99.17/23
209.165.200.227/27
172.31.45.252/24
10.1.8.200/26
172.16.117.77/20
10.1.1.101/25
209.165.202.140/27
192.168.28.45/28
Step 1: Analyze the table shown below and identify the type of address (network, host,
multicast, or broadcast address).
The first row shows an example of how the table should be completed.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 4
IP Address
Subnet Mask
10.1.1.1
255.255.255.252
192.168.33.63
255.255.255.192
239.192.1.100
255.252.0.0
172.25.12.52
255.255.255.0
10.255.0.0
255.0.0.0
172.16.128.48
255.255.255.240
209.165.202.159
255.255.255.224
172.16.0.255
255.255.0.0
224.10.1.11
255.255.255.0
Address Type
host
Step 2: Analyze the table shown below and identify the address as public or private.
IP Address/Prefix
Public or Private
209.165.201.30/27
192.168.255.253/24
10.100.11.103/16
172.30.1.100/28
192.31.7.11/24
172.20.18.150/22
128.107.10.1/16
192.135.250.10/24
64.104.0.11/16
Step 3: Analyze the table shown below and identify whether the address/prefix pair is a valid
host address.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 4
IP Address/Prefix
Reason
127.1.0.10/24
172.16.255.0/16
241.19.10.100/24
192.168.0.254/24
192.31.7.255/24
64.102.255.255/14
224.0.0.5/16
10.0.255.255/8
198.133.219.8/24
Reflection
Why should we continue to study and learn about IPv4 addressing if the available IPv4 address space is
depleted?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 4
Objectives
Part 1: Identify the Different Types of IPv6 Addresses
Background / Scenario
With the depletion of the Internet Protocol version 4 (IPv4) network address space and the adoption and
transition to IPv6, networking professionals must understand how both IPv4 and IPv6 networks function.
Many devices and applications already support IPv6. This includes extensive Cisco device Internetwork
Operating System (IOS) support and workstation/server operating system support, such as that found in
Windows and Linux.
This lab focuses on IPv6 addresses and the components of the address. In Part 1, you will identify the IPv6
address types, and in Part 2, you will view the IPv6 settings on a PC. In Part 3, you will practice IPv6 address
abbreviation.
Required Resources
Note: The IPv6 protocol is enabled in Windows 7 and Vista by default. The Windows XP operating system
does not enable IPv6 by default and is not recommended for use with this lab. This lab uses Windows 7 PC
hosts.
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 7
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 7
0000 to 00FF
2000 to 3FFF
FE80 to FEBF
FC00 to FCFF
FF00 to FFFF
Multicast address
There are other IPv6 address types that are either not yet widely implemented, or have already become
deprecated, and are no longer supported. For instance, an anycast address is new to IPv6 and can be
used by routers to facilitate load sharing and provide alternate path flexibility if a router becomes
unavailable. Only routers should respond to an anycast address. Alternatively, site-local addresses
have been deprecated and replaced by unique-local addresses. Site-local addresses were identified by
the numbers FEC0 in the initial hextet.
In IPv6 networks, there are no network (wire) addresses or broadcast addresses as there are in IPv4
networks.
Answer
Answer Choices
2001:0DB8:1:ACAD::FE55:6789:B210
1. ____
a. Loopback address
::1
2. ____
FC00:22:A:2::CD4:23E4:76FA
3. ____
c. Link-local address
2033:DB8:1:1:22:A33D:259A:21FE
4. ____
d. Unique-local address
FE80::3201:CC01:65B1
5. ____
e. Multicast address
FF00::
6. ____
FF00::DB7:4322:A231:67C
7. ____
FF02::2
8. ____
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 7
d. On the left side of the window, click Change adapter settings. You should now see icons representing
your installed network adapters. Right-click your active network interface (it may be a Local Area
Connection or a Wireless Network Connection), and then click Properties.
e. You should now see your Network Connection Properties window. Scroll through the list of items to
determine whether IPv6 is present, which indicates that it is installed, and if it is also check marked, which
indicates that it is active.
f.
Select the item Internet Protocol Version 6 (TCP/IPv6) and click Properties. You should see the IPv6
settings for your network interface. Your IPv6 properties window is likely set to Obtain an IPv6 address
automatically. This does not mean that IPv6 relies on the Dynamic Host Configuration Protocol (DHCP).
Instead of using DHCP, IPv6 looks to the local router for IPv6 network information and then autoconfigures its own IPv6 addresses. To manually configure IPv6, you must provide the IPv6 address, the
subnet prefix length, and the default gateway.
Note: The local router can refer host requests for IPv6 information, especially Domain Name System
(DNS) information, to a DHCPv6 server on the network.
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 7
g. After you have verified that IPv6 is installed and active on your PC, you should check your IPv6 address
information. To do this, click the Start button, type cmd in the Search programs and files form box, and
press Enter. This opens a Windows command prompt window.
h. Type ipconfig /all and press Enter. Your output should look similar to this:
C:\Users\user> ipconfig /all
Windows IP Configuration
<output omitted>
Wireless LAN adapter Wireless Network Connection:
Connection-specific DNS Suffix
Description . . . . . . . . . .
Physical Address. . . . . . . .
DHCP Enabled. . . . . . . . . .
Autoconfiguration Enabled . . .
Link-local IPv6 Address . . . .
IPv4 Address. . . . . . . . . .
Subnet Mask . . . . . . . . . .
Lease Obtained. . . . . . . . .
Lease Expires . . . . . . . . .
Default Gateway . . . . . . . .
DHCP Server . . . . . . . . . .
DHCPv6 IAID . . . . . . . . . .
DHCPv6 Client DUID. . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
:
:
:
:
:
:
:
:
:
:
:
:
:
:
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 7
i.
You can see from the output that the client PC has an IPv6 link-local address with a randomly generated
interface ID. What does it indicate about the network regarding IPv6 global unicast address, IPv6 uniquelocal address, or IPv6 gateway address?
____________________________________________________________________________________
____________________________________________________________________________________
j.
What kind of IPv6 addresses did you find when using ipconfig /all?
____________________________________________________________________________________
____________________________________________________________________________________
Step 1: Study and review the rules for IPv6 address abbreviation.
Rule 1: In an IPv6 address, a string of four zeros (0s) in a hextet can be abbreviated as a single zero.
2001:0404:0001:1000:0000:0000:0EF0:BC00
2001:0404:0001:1000:0:0:0EF0:BC00 (abbreviated with single zeros)
Rule 2: In an IPv6 address, the leading zeros in each hextet can be omitted, trailing zeros cannot be omitted.
2001:0404:0001:1000:0000:0000:0EF0:BC00
2001:404:1:1000:0:0:EF0:BC00 (abbreviated with leading zeros omitted)
Rule 3: In an IPv6 address, a single continuous string of four or more zeros can be abbreviated as a double
colon (::). The double colon abbreviation can only be used one time in an IP address.
2001:0404:0001:1000:0000:0000:0EF0:BC00
2001:404:1:1000::EF0:BC00 (abbreviated with leading zeroes omitted and continuous zeros
replaced with a double colon)
The image below illustrates these rules of IPv6 address abbreviation:
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 7
Reflection
1. How do you think you must support IPv6 in the future?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. Do you think IPv4 networks continue on, or will everyone eventually switch over to IPv6? How long do you
think it will take?
_______________________________________________________________________________________
_______________________________________________________________________________________
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 7
Addressing Table
Device
R1
Interface
IPv6 Address
Prefix
Length
Default Gateway
G0/0
2001:DB8:ACAD:A::1
64
N/A
G0/1
2001:DB8:ACAD:1::1
64
N/A
S1
VLAN 1
2001:DB8:ACAD:1::B
64
N/A
PC-A
NIC
2001:DB8:ACAD:1::3
64
FE80::1
PC-B
NIC
2001:DB8:ACAD:A::3
64
FE80::1
Objectives
Part 1: Set Up Topology and Configure Basic Router and Switch Settings
Part 2: Configure IPv6 Addresses Manually
Part 3: Verify End-to-End Connectivity
Background / Scenario
Knowledge of the Internet Protocol version 6 (IPv6) multicast groups can be helpful when assigning IPv6
addresses manually. Understanding how the all-router multicast group is assigned and how to control address
assignments for the Solicited Nodes multicast group can prevent IPv6 routing issues and help ensure best
practices are implemented.
In this lab, you will configure hosts and device interfaces with IPv6 addresses and explore how the all-router
multicast group is assigned to a router. You will use show commands to view IPv6 unicast and multicast
addresses. You will also verify end-to-end connectivity using the ping and traceroute commands.
Note: The routers used with CCNA hands-on labs are Cisco 1941 ISRs with Cisco IOS Release 15.2(4)M3
(universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9
image). Other routers, switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS
version, the commands available and output produced might vary from what is shown in the labs. Refer to the
Router Interface Summary table at the end of the lab for the correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Required Resources
1 Router (Cisco 1941 with Cisco IOS software, Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 11
Console cables to configure the Cisco IOS devices via the console ports
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing and an Ethernet straightthrough cable may be used between the router and PC-B. If using another model Cisco router, it may be
necessary to use an Ethernet crossover cable.
Note: The IPv6 protocol is enabled in Windows 7 and Vista by default. The Windows XP operating system
does not enable IPv6 by default and is not recommended for use with this lab. This lab uses Windows 7 PC
hosts.
Part 1: Set Up Topology and Configure Basic Router and Switch Settings
Step 1: Cable the network as shown in the topology.
Step 2: Initialize and reload the router and switch.
Step 3: Verify that the PC interfaces are configured to use the IPv6 protocol.
Verify that the IPv6 protocol is active on both PCs by ensuring that the Internet Protocol Version 6
(TCP/IPv6) check box is selected in the Local Area Connection Properties window.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 11
Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as
though they were hostnames.
Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as
though they were hostnames.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 11
R1#
c.
Issue the show ipv6 interface g0/0 command. Notice that the interface is listing two Solicited Nodes
multicast groups, because the IPv6 link-local (FE80) Interface ID was not manually configured to match
the IPv6 unicast Interface ID.
Note: The link-local address displayed is based on EUI-64 addressing, which automatically uses the
interface Media Access Control (MAC) address to create a 128-bit IPv6 link-local address.
R1# show ipv6 interface g0/0
GigabitEthernet0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::D68C:B5FF:FECE:A0C0
No Virtual link-local address(es):
Global unicast address(es):
2001:DB8:ACAD:A::1, subnet is 2001:DB8:ACAD:A::/64
Joined group address(es):
FF02::1
FF02::1:FF00:1
FF02::1:FFCE:A0C0
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ICMP unreachables are sent
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds (using 30000)
ND advertised reachable time is 0 (unspecified)
ND advertised retransmit interval is 0 (unspecified)
ND router advertisements are sent every 200 seconds
ND router advertisements live for 1800 seconds
ND advertised default router preference is Medium
Hosts use stateless autoconfig for addresses.
R1#
d. To get the link-local address to match the unicast address on the interface, manually enter the link-local
addresses on each of the Ethernet interfaces on R1.
R1# config t
Enter configuration commands, one per line.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 11
R1#
What multicast groups have been assigned to interface G0/0?
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 11
c.
Use the show ipv6 interface g0/0 command to see what multicast groups are assigned to interface
G0/0. Notice that the all-router multicast group (FF02::2) now appears in the group list for interface G0/0.
Note: This will allow the PCs to obtain their IP address and default gateway information automatically
using Stateless Address Autoconfiguration (SLAAC).
R1# show ipv6 interface g0/0
GigabitEthernet0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::1
No Virtual link-local address(es):
Global unicast address(es):
2001:DB8:ACAD:A::1, subnet is 2001:DB8:ACAD:A::/64 [EUI]
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF00:1
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ICMP unreachables are sent
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds (using 30000)
ND advertised reachable time is 0 (unspecified)
ND advertised retransmit interval is 0 (unspecified)
ND router advertisements are sent every 200 seconds
ND router advertisements live for 1800 seconds
ND advertised default router preference is Medium
Hosts use stateless autoconfig for addresses.
R1#
d. Now that R1 is part of the all-router multicast group, re-issue the ipconfig command on PC-B. Examine
the IPv6 address information.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 11
Why did PC-B receive the Global Routing Prefix and Subnet ID that you configured on R1?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 11
b. Click the Use the following IPv6 address radio button. Refer to the Addressing Table and enter the IPv6
address, Subnet prefix length, and Default gateway information. Click OK.
c.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 11
Note: You can also test connectivity by using the global unicast address, instead of the link-local address.
b. Ping the S1 management interface from PC-A.
c.
Use the tracert command on PC-A to verify that you have end-to-end connectivity to PC-B.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 11
Note: If end-to-end connectivity is not established, troubleshoot your IPv6 address assignments to verify
that you entered the addresses correctly on all devices.
Reflection
1. Why can the same link-local address, FE80::1, be assigned to both Ethernet interfaces on R1?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. What is the Subnet ID of the IPv6 unicast address 2001:db8:acad::aaaa:1234/64?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 11
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 15
Addressing Table
Device
LOCAL
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
192.168.1.1
255.255.255.0
N/A
S0/0/0 (DCE)
10.1.1.1
255.255.255.252
N/A
S0/0/0
10.1.1.2
255.255.255.252
N/A
S0/0/1 (DCE)
10.2.2.2
255.255.255.252
N/A
G0/1
192.168.3.1
255.255.255.0
N/A
S0/0/1
10.2.2.1
255.255.255.252
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
S3
VLAN 1
192.168.3.11
255.255.255.0
192.168.3.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
PC-C
NIC
192.168.3.3
255.255.255.0
192.168.3.1
ISP
REMOTE
Objectives
Part 1: Build and Configure the Network
Part 3: Use Tracert and Traceroute Commands for Basic Network Testing
Background / Scenario
Ping and traceroute are two tools that are indispensable when testing TCP/IP network connectivity. Ping is a
network administration utility used to test the reachability of a device on an IP network. This utility also
measures the round-trip time for messages sent from the originating host to a destination computer. The ping
utility is available on Windows, Unix-like operating systems (OS), and the Cisco Internetwork Operating
System (IOS).
The traceroute utility is a network diagnostic tool for displaying the route and measuring the transit delays of
packets travelling an IP network. The tracert utility is available on Windows, and a similar utility, traceroute, is
available on Unix-like OS and Cisco IOS.
In this lab, the ping and traceroute commands are examined and command options are explored to modify
the command behavior. Cisco devices and PCs are used in this lab for command exploration. Cisco routers
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 15
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 15
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 15
Step 1: Test network connectivity from the LOCAL network using PC-A.
All the pings from PC-A to other devices in the topology should be successful. If they are not, check the
topology and the cabling, as well as the configuration of the Cisco devices and the PCs.
a. Ping from PC-A to its default gateway (LOCALs GigabitEthernet 0/1 interface).
C:\Users\User1> ping 192.168.1.1
Pinging 192.168.1.1 with 32 bytes of data:
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 15
TTL
192.168.1.1 (LOCAL)
192.168.1.11 (S1)
10.1.1.1 (LOCAL)
10.1.1.2 (ISP)
10.2.2.2 (ISP)
10.2.2.1 (REMOTE)
192.168.3.1 (REMOTE)
192.168.3.11 (S3)
192.168.3.3 (PC-C)
Notice the average round trip time to 192.168.3.3 (PC-C). The time increased because the ICMP
requests were processed by three routers before PC-A received the reply from PC-C.
C:\Users\User1> ping 192.168.3.3
Pinging 192.168.3.3 with 32 bytes of data:
Reply from 192.168.3.3: bytes=32 time=41ms
Reply from 192.168.3.3: bytes=32 time=41ms
Reply from 192.168.3.3: bytes=32 time=40ms
Reply from 192.168.3.3: bytes=32 time=41ms
TTL=125
TTL=125
TTL=125
TTL=125
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 15
-a
-n
-l
-f
-i
-v
-r
-s
-j
-k
-w
-R
-S
-4
-6
count
size
TTL
TOS
count
count
host-list
host-list
timeout
srcaddr
To illustrate the results when a host is unreachable, disconnect the cable between the REMOTE router
and the S3 switch, or shut down the GigabitEthernet 0/1 interface on the REMOTE router.
Reply from 192.168.3.3: bytes=32 time=41ms TTL=125
Reply from 192.168.1.3: Destination host unreachable.
Reply from 192.168.1.3: Destination host unreachable.
While the network is functioning correctly, the ping command can determine whether the destination
responded and how long it took to receive a reply from the destination. If a network connectivity problem
exists, the ping command displays an error message.
c.
Reconnect the Ethernet cable or enable the GigabitEthernet interface on the REMOTE router (using the
no shutdown command) before moving onto the next step. After about 30 seconds, the ping should be
successful again.
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Reply from 192.168.3.3: bytes=32 time=41ms TTL=125
Reply from 192.168.3.3: bytes=32 time=40ms TTL=125
Step 3: Test network connectivity from the LOCAL network using Cisco devices.
The ping command is also available on Cisco devices. In this step, the ping command is examined using the
LOCAL router and the S1 switch.
a. Ping PC-C on the REMOTE network using the IP address of 192.168.3.3 from the LOCAL router.
LOCAL# ping 192.168.3.3
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 15
The exclamation point (!) indicates that the ping was successful from the LOCAL router to PC-C. The
round trip takes an average of 64 ms with no packet loss, as indicated by a 100% success rate.
b. Because a local host table was configured on the LOCAL router, you can ping PC-C on the REMOTE
network using the hostname configured from the LOCAL router.
LOCAL# ping PC-C
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 60/63/64 ms
c.
There are more options available for the ping command. At the CLI, type ping and press Enter. Input
192.168.3.3 or PC-C for the Target IP address. Press Enter to accept the default value for other options.
LOCAL# ping
Protocol [ip]:
Target IP address: PC-C
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 60/63/64 ms
d. You can use an extended ping to observe when there is a network issue. Start the ping command to
192.168.3.3 with a repeat a count of 500. Then, disconnect the cable between the REMOTE router and
the S3 switch or shut down the GigabitEthernet 0/1 interface on the REMOTE router.
Reconnect the Ethernet cable or enable the GigabitEthernet interface on the REMOTE router after the
exclamation points (!) have replaced by the letter U and periods (.). After about 30 seconds, the ping
should be successful again. Press Ctrl+Shift+6 to stop the ping command if desired.
LOCAL# ping
Protocol [ip]:
Target IP address: 192.168.3.3
Repeat count [5]: 500
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 500, 100-byte ICMP Echos to 192.168.3.3, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!U................
....!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 15
The letter U in the results indicates that a destination is unreachable. An error protocol data unit (PDU)
was received by the LOCAL router. Each period (.) in the output indicates that the ping timed out while
waiting for a reply from PC-C. In this example, 5% of the packets were lost during the simulated network
outage.
Note: You can also use the following command for the same results:
LOCAL# ping 192.168.3.3 repeat 500
or
LOCAL# ping PC-C repeat 500
e. You can also test network connectivity with a switch. In this example, the S1 switch pings the S3 switch
on the REMOTE network.
S1# ping 192.168.3.11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 67/67/68 ms
The ping command is extremely useful when troubleshooting network connectivity. However, ping cannot
indicate the location of problem when a ping is not successful. The tracert (or traceroute) command can
display network latency and path information.
Part 3: Use Tracert and Traceroute Commands for Basic Network Testing
The commands for tracing routes can be found on PCs and network devices. For a Windows-based PC, the
tracert command uses ICMP messages to trace the path to the final destination. The traceroute command
utilizes the User Datagram Protocol (UDP) datagrams for tracing routes to the final destination for Cisco
devices and other Unix-like PCs.
In Part 3, you will examine the traceroute commands and determine the path that a packet travels to its final
destination. You will use the tracert command from the Windows PCs and the traceroute command from the
Cisco devices. You will also examine the options that are available for fine tuning the traceroute results.
<1
24
48
59
ms
ms
ms
ms
<1
24
48
59
ms
ms
ms
ms
<1
24
48
59
ms
ms
ms
ms
192.168.1.1
10.1.1.2
10.2.2.1
PC-C [192.168.3.3]
Trace complete.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 15
b. Use the -d option. Notice that the IP address of 192.168.3.3 is not resolved as PC-C.
C:\Users\User1> tracert d 192.168.3.3
Tracing route to 192.168.3.3 over a maximum of 30 hops:
1
2
3
4
<1
24
48
59
ms
ms
ms
ms
<1
24
48
59
ms
ms
ms
ms
<1
24
48
59
ms
ms
ms
ms
192.168.1.1
10.1.1.2
10.2.2.1
192.168.3.3
Trace complete.
Step 3: Use the traceroute command from the LOCAL router to PC-C.
a. At the command prompt, type traceroute 192.168.3.3 or traceroute PC-C on the LOCAL router. The
hostnames are resolved because a local IP host table was configured on the LOCAL router.
LOCAL# traceroute 192.168.3.3
Type escape sequence to abort.
Tracing the route to PC-C (192.168.3.3)
VRF info: (vrf in name/id, vrf out name/id)
1 ISP (10.1.1.2) 16 msec 16 msec 16 msec
2 REMOTE (10.2.2.1) 28 msec 32 msec 28 msec
3 PC-C (192.168.3.3) 32 msec 28 msec 32 msec
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 15
The traceroute command has additional options. You can use the ? or just press Enter after typing
traceroute at the prompt to explore these options.
The following link provides more information regarding the ping and traceroute commands for a Cisco
device:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/products_tech_note09186a00800a6057.shtml
Step 4: From the LOCAL network, use ping and tracert or traceroute commands to
troubleshoot and correct the problem on the REMOTE network.
a. Use the ping and tracert commands from PC-A.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 15
One way to locate the network issue is to ping each hop in the network to PC-C. First determine if PC-A
can reach the ISP router Serial 0/0/1 interface with an IP address of 10.2.2.2.
C:\Users\Utraser1> ping 10.2.2.2
Pinging 10.2.2.2 with 32 bytes of data:
Reply from 10.2.2.2: bytes=32 time=41ms
Reply from 10.2.2.2: bytes=32 time=41ms
Reply from 10.2.2.2: bytes=32 time=41ms
Reply from 10.2.2.2: bytes=32 time=41ms
TTL=254
TTL=254
TTL=254
TTL=254
The ping was successful to the ISP router. The next hop in the network is the REMOTE router. Ping the
REMOTE router Serial 0/0/1 interface with an IP address of 10.2.2.1.
C:\Users\User1> ping 10.2.2.1
Pinging 10.2.2.1 with 32 bytes of data:
Reply from 10.2.2.1: bytes=32 time=41ms
Reply from 10.2.2.1: bytes=32 time=41ms
Reply from 10.2.2.1: bytes=32 time=41ms
Reply from 10.2.2.1: bytes=32 time=41ms
TTL=253
TTL=253
TTL=253
TTL=253
PC-A can reach the REMOTE router. Based on the successful ping results from PC-A to the REMOTE
router, the network connectivity issue is with 192.168.3.0/24 network. Ping the default gateway to PC-C,
which is the GigabitEthernet 0/1 interface of the REMOTE router.
C:\Users\User1> ping 192.168.3.1
Pinging 192.168.3.1 with 32 bytes of data:
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 15
PC-A cannot reach the GigabitEthernet 0/1 interface of the REMOTE router, as displayed by the results
from the ping command.
The S3 switch can also be pinged from PC-A to verify the location of the networking connectivity issue by
typing ping 192.168.3.11 at the command prompt. Because PC-A cannot reach GigabitEthernet 0/1 of
the REMOTE router, PC-A probably cannot ping the S3 switch successfully, as indicated by the results
below.
C:\Users\User1> ping 192.168.3.11
Pinging 192.168.3.11 with 32 bytes of data:
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Reply from 192.168.1.1: Destination host unreachable.
Ping statistics for 192.168.3.11:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
The tracert and ping results conclude that PC-A can reach the LOCAL, ISP, and REMOTE routers, but
not PC-C or the S3 switch, nor the default gateway for PC-C.
b. Use the show commands to examine the running configurations for the the REMOTE router.
REMOTE# show ip interface brief
Interface
Embedded-Service-Engine0/0
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
Serial0/0/1
IP-Address
unassigned
unassigned
192.168.8.1
unassigned
10.2.2.1
OK?
YES
YES
YES
YES
YES
Method
unset
unset
manual
unset
manual
Status
Protocol
administratively down down
administratively down down
up
up
administratively down down
up
up
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 15
The outputs of the show run and show ip interface brief commands indicate that the GigabitEthernet
0/1 interface is up/up, but was configured with an incorrect IP address.
c.
TTL=125
TTL=125
TTL=125
TTL=125
<1
24
48
59
ms
ms
ms
ms
<1
24
48
59
ms
ms
ms
ms
<1
24
48
59
ms
ms
ms
ms
192.168.1.1
10.1.1.2
10.2.2.1
PC-C [192.168.3.3]
Trace complete.
Note: This can also be accomplished using ping and traceroute commands from the CLI on the the
LOCAL router and the S1 switch after verifying that there are no network connectivity issues on the
192.168.1.0/24 network.
Reflection
1. What could prevent ping or traceroute responses from reaching the originating device beside network
connectivity issues?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 15
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 15 of 15
Background/Scenario
Note: This activity may be completed individually or in small/large groups.
This chapter discussed the ways in which small to medium-sized businesses are connected to networks
in groups. The IoE was introduced in the activity at the beginning of this chapter.
Choose one of the following:
Online banking
World news
Weather forecasting/climate
Traffic conditions
Devise an IPv6 addressing scheme for the area you have chosen. Your addressing scheme should
include how you would plan for:
Subnetting
Unicasts
Multicasts
Keep a copy of your scheme to share with the class or learning community. Be prepared to explain:
Required Resources
Packet Tracer (if you would like to display how your network would physically look)
Hard- or soft-copy of the final network topology with IPv6 addressing indicated for sharing with the class.
Reflection
1. What was the hardest part of designing this network model? Explain your answer.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Call me!
Objectives
Explain why routing is necessary for hosts on different subnets to communicate.
In this activity, you will:
Recognize that data is delivered quicker if group addressing identifiers are used.
Visualize how communication is facilitated through providing large groups and then splitting those
groups into more manageable parts. After reflecting on how your smartphone or landline telephone
numbers are divided, you can draw inferences to how networking employs the same practices.
Background/Scenario
In this chapter, you will learn how devices can be grouped into subnets, or smaller network groups, from a
large network.
In this modeling activity, you are asked to think about a number you probably use every day, a number
such as your telephone number. As you complete the activity, think about how your telephone number
compares to strategies that network administrators might use to identify hosts for efficient data
communication.
Complete the two sections listed below and record your answers. Save the two sections in either hard- or
soft-copy format to use later for class discussion purposes.
Explain how your smartphone or landline telephone number is divided into identifying groups of
numbers. Does your telephone number use an area code? An Internet service provider (ISP)
identifier? A city, state, or country code?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
In what ways does separating your telephone number into managed parts assist in contacting or
communicating with others?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Required Resources
Recording capabilities (paper, tablet, etc.) for reflective comments to be shared with the class
Reflection
1. Why do you think ISPs need your telephone number when setting up your account parameters?
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Background / Scenario
The ability to work with IPv4 subnets and determine network and host information based on a given IP
address and subnet mask is critical to understanding how IPv4 networks operate. The first part is designed to
reinforce how to compute network IP address information from a given IP address and subnet mask. When
given an IP address and subnet mask, you will be able to determine other information about the subnet such
as:
Network address
Broadcast address
In the second part of the lab, for a given IP address and subnet mask, you will determine such information as
follows:
Required Resources
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 7
192.168.10.10
Subnet Mask
255.255.255.0
==========
Result (Network)
192.168.10.0
Knowing this, you may only have to perform binary ANDing on an octet that does not have 255 or 0 in its
subnet mask portion.
Example:
IP Address
172.30.239.145
Subnet Mask
255.255.192.0
Analyzing this example, you can see that you only have to perform binary ANDing on the third octet. The first
two octets will result in 172.30 due to the subnet mask. The fourth octet will result in 0 due to the subnet
mask.
IP Address
172.30.239.145
Subnet Mask
255.255.192.0
==========
Result (Network)
172.30.?.0
Binary
239
11101111
192
11000000
=======
Result
192
11000000
172.30.239.145
Subnet Mask
255.255.192.0
==========
Result (Network)
172.30.192.0
Continuing with this example, determining the number of hosts per network can be calculated by analyzing
the subnet mask. The subnet mask will be represented in dotted decimal format, such as 255.255.192.0, or in
network prefix format, such as /18. An IPv4 address always has 32 bits. Subtracting the number of bits used
for the network portion (as represented by the subnet mask) gives you the number of bits used for hosts.
Using our example above, the subnet mask 255.255.192.0 is equivalent to /18 in prefix notation. Subtracting
18 network bits from 32 bits results in 14 bits left for the host portion. From there, it is a simple calculation:
2(number of host bits) - 2 = Number of hosts
214 = 16,384 2 = 16,382 hosts
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 7
Network Address
Broadcast Address
Total Number
of Host Bits
Total Number
of Hosts
192.168.100.25/28
172.30.10.130/30
10.1.113.75/19
198.133.219.250/24
128.107.14.191/22
172.16.104.99/27
The following example shows a sample problem along with the solution for solving this problem:
Given:
Host IP Address:
172.16.77.120
255.255.0.0
255.255.240.0
Find:
16
12
4,094
172.16.64.0
172.16.64.1
172.16.79.254
172.16.79.255
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 7
Description
2nd Octet
3rd Octet
4th Octet
Description
Network/Host
nnnnnnnn
nnnnnnnn
nnnnhhhh
hhhhhhhh
Subnet Mask
Binary
10101100
00010000
01000000
00000001
First Host
Decimal
172
16
64
First Host
Binary
10101100
00010000
01001111
11111110
Last Host
Decimal
172
16
79
254
Last Host
Binary
10101100
00010000
01001111
11111111
Broadcast
Decimal
172
16
79
255
Broadcast
Step 1: Fill out the tables below with appropriate answers given the IPv4 address, original
subnet mask, and new subnet mask.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 7
192.168.200.139
255.255.255.0
255.255.255.224
Find:
10.101.99.228
255.0.0.0
255.255.128.0
Find:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 7
Problem 3:
Given:
Host IP Address:
172.22.32.12
255.255.0.0
255.255.224.0
Find:
192.168.1.245
255.255.255.0
255.255.255.252
Find:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 7
128.107.0.55
255.255.0.0
255.255.255.0
Find:
Problem 6:
Given:
Host IP Address:
192.135.250.180
255.255.255.0
255.255.255.248
Find:
Reflection
Why is the subnet mask so important when analyzing an IPv4 address?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 7
Examine the use of the available network address space and future growth potential.
Background / Scenario
When given a network topology, it is important to be able to determine the number of subnets required. In this
lab, several scenario topologies will be provided, along with a base network address and mask. You will
subnet the network address and provide an IP addressing scheme that will accommodate the number of
subnets displayed in the topology diagram. You must determine the number of bits to borrow, the number of
hosts per subnet, and potential for growth as specified by the instructions.
How many usable host addresses per subnet are in this addressing scheme? ___________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 9
Subnet Address
Broadcast
Address
0
1
2
3
4
5
How many usable host addresses per subnet are in this addressing scheme? ___________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 9
Subnet Address
Broadcast
Address
0
1
2
3
4
5
6
7
How many usable host addresses per subnet are in this addressing scheme? ___________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 9
Subnet Address
Broadcast
Address
0
1
2
3
4
5
6
7
8
9
10
Interface
IP Address
Subnet Mask
GigabitEthernet 0/1
Serial 0/0/0
Serial 0/0/1
R2
GigabitEthernet 0/1
Serial 0/0/0
Serial 0/0/1
R3
GigabitEthernet 0/1
Serial 0/0/0
Serial 0/0/1
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 9
Interface
PC-A
NIC
PC-B
NIC
S1
VLAN 1
PC-C
NIC
PC-D
NIC
S2
VLAN 1
PC-E
NIC
PC-F
NIC
S3
VLAN 1
IP Address
Subnet Mask
Default Gateway
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 9
How many usable host addresses per subnet are in this addressing scheme? ___________
Subnet Address
Broadcast
Address
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 9
How many usable host addresses per subnet are in this addressing scheme? ___________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 9
Subnet Address
Broadcast
Address
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 9
Interface
IP Address
Subnet Mask
GigabitEthernet 0/0
GigabitEthernet 0/1
Serial 0/0/0
Serial 0/0/1
R2
GigabitEthernet 0/0
GigabitEthernet 0/1
Serial 0/0/0
Serial 0/0/1
R3
GigabitEthernet 0/0
GigabitEthernet 0/1
Serial 0/0/0
Serial 0/0/1
Reflection
1. What information is needed when determining an appropriate addressing scheme for a network?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. After the subnets are assigned, will all the host addresses be utilized in each subnet?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 9
Background / Scenario
While it is important to understand how to convert a decimal IP address to its binary format and apply the
bitwise ANDing operation to determine the network address, it is also a tedious and mistake-prone process.
To assist with these calculations, many network administrators make use of an IP subnet calculator utility
program. A number of these types of programs have been developed that can be downloaded or run directly
from the Internet.
In this lab, you will be introduced to a few of the free IP subnet calculators that are available. You will use a
web-based IP subnet calculator to perform the network operations in this lab.
Required Resources
Device with Internet access
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 5
b. On the IP Subnet Calculator screen, enter an IP address and subnet mask or an IP address and CIDR
prefix notation. Examples of how to enter each of these are shown in the Introduction area.
c.
In the Application field, enter 192.168.50.50/27 and click Calc!. The next screen displays a table with
network information in both decimal and binary formats.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 5
Decimal
Binary
10.223.23.136
Subnet mask
Network address
Broadcast address
First host address
Last host address
Number of hosts available
N/A
Step 2: Fill in the following table for the 172.18.255.92 address with a subnet mask of
255.255.224.0:
Description
Decimal
Address
172.18.255.92
Subnet mask
255.255.224.0
Binary
Network address
Broadcast address
First host address
Last host address
Number of hosts available
N/A
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 5
Step 3: Fill in the following table using the 192.168.184.78 address with a subnet mask of
255.255.255.252:
Description
Address
Decimal
Binary
192.168.184.78
Subnet mask
Network address
Broadcast address
First host address
Last host address
Number of hosts available
N/A
Decimal
Binary
209.165.200.225
Subnet mask
Network address
Broadcast address
First host address
Last host address
Number of hosts available
N/A
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 5
Decimal
Binary
64.104.110.7
Subnet mask
Network address
Broadcast address
First host address
Last host address
Number of hosts available
N/A
Reflection
1. What is an advantage of using a client-based subnet calculator?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. What is an advantage of using a web-based subnet calculator?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 5
Addressing Table
Device
R1
Interface
IP Address
Subnet Mask
Default Gateway
G0/0
N/A
G0/1
N/A
Lo0
N/A
Lo1
N/A
S1
VLAN 1
PC-A
NIC
PC-B
NIC
N/A
N/A
N/A
Objectives
Part 1: Design a Network Subnetting Scheme
Create a subnetting scheme that meets the required number of subnets and host addresses.
Complete the diagram, showing where the host IP addresses will be applied.
Configure the router Gigabit Ethernet interfaces with an IP address and subnet mask.
Create two loopback interfaces on the router, and configure each with an IP address and subnet mask.
Background / Scenario
In this lab, starting from a single network address and network mask, you will subnet the network into multiple
subnets. The subnet scheme should be based on the number of host computers required in each subnet, as
well as other network considerations, like future network host expansion.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 7
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing. An Ethernet straight-through
cable may be used between the router and PC-B. If using another Cisco router model, it may be necessary to
use an Ethernet crossover cable.
The first subnet is the employee network. You need a minimum of 25 host IP addresses.
The second subnet is the administration network. You need a minimum of 10 IP addresses.
The third and fourth subnets are reserved as virtual networks on virtual router interfaces, loopback 0 and
loopback 1. These virtual router interfaces simulate LANs attached to R1.
You also need two additional unused subnets for future network expansion.
Note: Variable length subnet masks will not be used. All of the device subnet masks will be the same length.
Answer the following questions to help create a subnetting scheme that meets the stated network
requirements:
1) How many host addresses are needed in the largest required subnet? _____________________
2) What is the minimum number of subnets required? _________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 7
(/25) 11111111.11111111.11111111.10000000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________, Number of hosts? ________________
(/26) 11111111.11111111.11111111.11000000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________, Number of hosts? ________________
(/27) 11111111.11111111.11111111.11100000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________ Number of hosts? ________________
(/28) 11111111.11111111.11111111.11110000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________ Number of hosts? _________________
(/29) 11111111.11111111.11111111.11111000
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________ Number of hosts? _________________
(/30) 11111111.11111111.11111111.11111100
Dotted decimal subnet mask equivalent: ________________________________
Number of subnets? ________________ Number of hosts? _________________
6) Considering your answers, which subnet masks meet the required number of minimum host
addresses?
________________________________________________________________________________
7) Considering your answers, which subnet masks meets the minimum number of subnets required?
________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 7
___________________ / ____
__________________________
___________________ / ____
__________________________
___________________ / ____
__________________________
___________________ / ____
__________________________
___________________ / ____
__________________________
___________________ / ____
__________________________
___________________ / ____
__________________________
___________________ / ____
__________________________
___________________ / ____
__________________________
___________________ / ____
__________________________
Step 2: Complete the diagram showing where the host IP addresses will be applied.
On the following lines provided, fill in the IP addresses and subnets masks in slash prefix notation. On the
router, use the first usable address in each subnet for each of the interfaces, Gigabit Ethernet 0/0, Gigabit
Ethernet 0/1, loopback 0, and loopback 1. Fill in an IP address for both PC-A and PC-B. Also enter this
information into the Addressing Table on Page 1.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 7
Configure both the G0/0 and G0/1 interfaces with IP addresses and subnet masks, and then enable them.
d. Loopback interfaces are created to simulate additional LANs on R1 router. Configure the loopback
interfaces with IP addresses and subnet masks. After they are created, loopback interfaces are enabled,
by default. (To create the loopback addresses, enter the command interface loopback 0 at the global
config mode)
Note: You can create additional loopbacks for testing with different addressing schemes, if desired.
e. Save the running configuration to the startup configuration file.
Test to see if PC-A can communicate with PC-B. From PC-A, open a command prompt and ping the IP
address of PC-B. Do you get a reply? _________________
d. If you answered no to any of the preceding questions, then you should go back and check all of your IP
address and subnet mask configurations, and ensure that the default gateways have been correctly
configured on PC-A and PC-B.
e. If you verify that all of the settings are correct, and you can still not ping successfully, then there are a few
additional factors that can block ICMP pings. On PC-A and PC-B within Windows, make sure that the
Windows Firewall is turned off for the Work, Home, and Public networks.
f.
Experiment by purposely misconfiguring the gateway address on PC-A to 10.0.0.1. What happens when
you try and ping from PC-B to PC-A? Do you receive a reply?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 7
Reflection
1. Subnetting one larger network into multiple smaller subnetworks allows for greater flexibility and security in
network design. However, what do you think some of the drawbacks are when the subnets are limited to
being the same size?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. Why do you think the gateway/router IP address is usually the first usable IP address in the network?
_______________________________________________________________________________________
_______________________________________________________________________________________
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Router(config)#
c.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 7
d. Configure both the G0/0 and G0/1 interfaces with IP addresses and subnet masks, and enable them.
R1(config)# interface g0/0
R1(config-if)# ip address <ip address> <subnet mask>
R1(config-if)# no shutdown
R1(config-if)# interface g0/1
R1(config-if)# ip address <ip address> <subnet mask>
R1(config-if)# no shutdown
e. Loopback interfaces are created to simulate additional LANs off of router R1. Configure the loopback
interfaces with IP addresses and subnet masks. When they are created, loopback interfaces are enabled,
by default.
R1(config)# interface loopback 0
R1(config-if)# ip address <ip address> <subnet mask>
R1(config-if)# interface loopback 1
R1(config-if)# ip address <ip address> <subnet mask>
R1(config-if)# end
f.
b. Configure the IP address, subnet mask, and default gateway settings on PC-B.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 7
Objectives
Part 1: Examine Network Requirements
Part 2: Design the VLSM Address Scheme
Part 3: Cable and Configure the IPv4 Network
Background / Scenario
Variable Length Subnet Mask (VLSM) was designed to avoid wasting IP addresses. With VLSM, a network is
subnetted and then re-subnetted. This process can be repeated multiple times to create subnets of various
sizes based on the number of hosts required in each subnet. Effective use of VLSM requires address
planning.
In this lab, use the 172.16.128.0/17 network address to develop an address scheme for the network displayed
in the topology diagram. VLSM is used to meet the IPv4 addressing requirements. After you have designed
the VLSM address scheme, you will configure the interfaces on the routers with the appropriate IP address
information.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). Other routers and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers have been erased and have no startup configurations. If you are unsure,
contact your instructor.
Required Resources
3 routers (Cisco 1941 with Cisco IOS software, Release 15.2(4)M3 universal image or comparable)
Console cable to configure the Cisco IOS devices via the console ports
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 7
Step 1: Determine how many host addresses and subnets are available.
How many host addresses are available in a /17 network? ________
What is the total number of host addresses needed in the topology diagram? ________
How many subnets are needed in the network topology? ______
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 7
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 7
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 7
Subnet Description
Number of
Hosts Needed
HQ G0/0
16,000
HQ G0/1
8,000
BR1 G0/1
4,000
BR1 G0/0
2,000
BR2 G0/1
1,000
BR2 G0/0
500
Network Address
/CIDR
First Host
Address
Broadcast
Address
Interface
IP Address
Subnet Mask
Device Interface
G0/0
G0/1
S0/0/0
BR1 S0/0/0
S0/0/1
BR2 S0/0/1
G0/0
G0/1
S0/0/0
HQ S0/0/0
S0/0/1
BR2 S0/0/0
G0/0
G0/1
S0/0/0
BR1 S0/0/1
S0/0/1
HQ S0/0/1
HQ
BR1
BR2
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 7
g. Create a banner that will warn anyone accessing the device that unauthorized access is prohibited.
Reflection
Can you think of a shortcut for calculating the network addresses of consecutive /30 subnets?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 7
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 7
Background/Scenario
Note: This activity may be completed individually or in small or large groups using Packet Tracer software.
You are setting up a dedicated, computer addressing scheme for patient rooms in a hospital. The
switch will be centrally located in the nurses station, as each of the five rooms will be wired so
that patients can just connect to an RJ45 port built into the wall of their room. Devise a physical
and logical topology for only one of the six floors using the following addressing scheme
requirements: There are six floors with five patient rooms on each floor for a total of 30
connections. Each room needs a network connection.
Use one router, one switch, and five host stations for addressing purposes.
Validate that all PCs can connect to the hospitals in-house services.
Keep a copy of your scheme to share later with the class or learning community. Be prepared to explain
how subnetting, unicasts, multicasts, and broadcasts would be incorporated, and where your addressing
scheme could be used.
Required Resources
Packet Tracer software
Reflection
1. How would you change your addressing scheme if you were going to add an additional network
connection to the hospital rooms with a total of 10 connections per floor or 2 ports per room?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1
Background/Scenario
It is the beginning of your work week. Your employer has decided to have IP telephones installed in your
workplace resulting in the network being inoperable until next week. Your work, however, must continue.
You have emails to send and quotes to write for your managers approval. Because of possible security
issues, you are not allowed to use personal or external computer systems, equipment, or offsite
equipment and systems, to complete your corporate workload.
Your instructor may ask you to complete the questions from both scenarios below, or to choose one
scenario (A. Emails or B. Quote for Managers Approval). Answer the questions fully for the scenarios.
Be prepared to discuss your answers in class.
A. Emails
You have a desktop application software package installed on your computer. Will it be relatively
easy to produce the quote your manager needs for the new contract due by the end of the week?
What limitations will be experienced while trying to complete the quote?
_____________________________________________________________________________
How will you present the quote to your manager for approval? How do you think your manager
will send the quote to the client for approval?
_____________________________________________________________________________
_____________________________________________________________________________
Are these methods cost effective to your corporation? Justify your answer.
_____________________________________________________________________________
_____________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Reflection
1. What steps did you identify as important to communicating without network applications available to you
for a week in your workplace? Which steps were not important? Justify your answer.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Background / Scenario
Peer-to-peer (P2P) computing is a powerful technology that has many uses. P2P networks can be used to
share and exchange music, movies, software, and other electronic materials.
The use of P2P networks to upload, download, or share copyrighted material, such as movies, music, and
software, can violate the rights of copyright owners. In the P2P file-sharing context, infringement may occur,
for example, when one person purchases an authorized copy and then uploads it to a P2P network to share
with others. Both the individual who makes the file available and those making copies may be found to have
infringed the rights of the copyright owners and may be violating copyright law.
Another problem with P2P file sharing is that very little protection is in place to ensure that the files exchanged
in these networks are not malicious. P2P networks are an ideal medium for spreading malware (computer
viruses, worms, Trojan horses, spyware, adware, and other malicious programs). In 2010, Cisco reported
increases in P2P activity, coupled with recent P2P malware developments, suggesting that P2P file shares
are becoming increasingly favored by users and malware attackers alike.
In this lab, you will research available P2P file sharing software and identify some issues that can arise from
the use of this technology.
Required Resources
Device with Internet access
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
What P2P file sharing protocol is attributed to producing the most P2P traffic on the Internet today?
____________________________________________________________________________________
d. What are the file sharing copyright laws in your area? Are they more strict or less strict than those in other
areas of the world? How aggressively do enforcement agencies in your area pursue those who share
copyrighted material?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
How could identity theft occur through the use of P2P file sharing?
____________________________________________________________________________________
____________________________________________________________________________________
Reflection
1. How can you be sure that the files you are downloading from P2P networks are not copyrighted and are safe
from malware?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Background / Scenario
The Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as
http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is used.
Common protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol over Secure Socket
Layer (HTTPS), and File Transfer Protocol (FTP).
DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain
name (www.cisco.com) to an IP address to allow the source host to reach the destination host. In this lab, you
will observe DNS in action and use the nslookup (name server lookup) command to obtain additional DNS
information. Work with a partner to complete this lab.
Required Resources
1 PC (Windows 7, Vista, or XP with Internet and command prompt access)
The first line of the output displays www.icann.org converted to an IP address by DNS. You should be
able to see the effect of DNS, even if your institution has a firewall that prevents pinging, or if the
destination server has prevented you from pinging its web server.
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 5
Most humans find it easier to remember words, rather than numbers. If you tell someone to go to
www.icann.org, they can probably remember that. If you told them to go to 192.0.32.7, they would have
a difficult time remembering an IP address. Computers process in numbers. DNS is the process of
translating words into numbers. There is a second translation that takes place. Humans think in Base 10
numbers. Computers process in Base 2 numbers. The Base 10 IP address 192.0.32.7 in Base 2 numbers
is 11000000.00000000.00100000.00000111. What happens if you cut and paste these Base 2 numbers
into a browser?
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 5
g. When you ping www.cisco.com, do you get the same IP address as the example, or a different IP
address, and why?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
h. Type the IP address that you obtained when you pinged www.cisco.com into a browser. Does the web
site dlsplay? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site
a. At the command prompt, type the nslookup command.
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 5
At the prompt, type the IP address of the Cisco web server that you just found. You can use nslookup to
get the domain name of an IP address if you do not know the URL.
You can use the nslookup tool to translate domain names into IP addresses. You can also use it to
translate IP addresses into domain names.
Using the nslookup tool, record the IP addresses associated with www.google.com.
____________________________________________________________________________________
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 5
A fundamental principle of network design is redundancy (more than one mail server is configured). In
this way, if one of the mail servers is unreachable, then the computer making the query tries the second
mail server. Email administrators determine which mail server is contacted first using MX preference (see
above image). The mail server with the lowest MX preference is contacted first. Based upon the output
above, which mail server will be contacted first when email is being sent to cisco.com?
____________________________________________________________________________________
c.
At the nslookup prompt, type exit to return to the regular PC command prompt.
Reflection
What is the fundamental purpose of DNS?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 5
Background / Scenario
The File Transfer Protocol (FTP) is part of the TCP/IP suite. FTP is used to transfer files from one network
device to another network device. Windows includes an FTP client application that you can execute from the
command prompt. There are also free graphical user interface (GUI) versions of FTP that you can download.
The GUI versions are easier to use than typing from a command prompt. FTP is frequently used for the
transfer of files that may be too large for attachment with an email.
When using FTP, one computer is normally the server and the other computer is the client. When accessing
the server from the client, you need to provide a username and password. Some FTP servers have a user
named anonymous. You can access these types of sites by simply typing anonymous for the user, without
a password. Usually, the site administrator has files that can be copied but does not allow files to be posted
with the anonymous user.
In this lab, you will learn how to use anonymous FTP from the Windows command-line C:\> prompt. You will
also use the GUI-based FTP program, WS_FTP LE. Finally, you will use an anonymous FTP in a browser.
Required Resources
1 PC (Windows 7, Vista, or XP with access to the command prompt and Internet access and WS_FTP LE
installed)
Notice that the C:\> prompt has been replaced with the ftp> prompt. Type ls to list the files and
directories. At the time that this lab was authored, there was a Readme file.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 9
At the prompt, type get Readme. This downloads the file to your local computer from the anonymous FTP
server that the Center for Disease Control has setup. The file will be copied into the directory shown in
the C:\> prompt (C:\Users\User1 in this case).
d. Type quit to leave FTP and return to the C:\> prompt. Type more Readme to see the contents of the
document.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 9
c.
In the Site Name field, type Center for Disease Control and click Next to continue.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 9
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 9
In the User Name field, type anonymous, and leave the password field blank. Click Next.
g. Click Finish.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 9
i.
You are now anonymously connected to the Center for Disease Control FTP site.
j.
On the WS_FTP LE toolbar menu under My Computer, click New Folder to create a folder on your local
C:\ drive.
k.
In the Make Directory dialog box name the folder as CDC and click OK.
Note: If the folder already exists, you can use the same folder or create another folder with a different
name. If using the same CDC folder, you can replace the existing Readme file with the downloaded
Readme file.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 9
l.
After the directory is created, in the My Computer tab page, double-click the directory to open it.
m. Drag the file Readme from the right side of the application (the remote CDC FTP server) into the CDC
folder on to the local C:\ drive.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 9
n. Double-click the Readme file in the C:\CDC folder on your local C:\ drive. If prompted for an application to
open the document, choose any word processing software. You should see a message that looks
something like this:
o. Which was easier, using FTP from the cmd prompt, or using WS_FTP LE? ________________________
p. Click Disconnect to disconnect from the ftp.cdc.gov site when finished.
q. The remote site will be removed from the saved list of FTP sites. In the Ipswitch WS_FTP LE window,
click the Open a Remote Connection link. Select the Center for Disease Control site, and click Delete
to remove the FTP site. Click Yes to confirm the deletion. Click Close to exit the Site Manager.
r.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 9
Reflection
1. Which FTP method was easiest to use?
_______________________________________________________________________________________
2. Was there any advantage to using FTP from the command prompt or using WS_FTP LE?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 9
Make it happen!
Objectives
Explain the operation of the application layer in providing support to end-user applications.
In this activity, you will apply new knowledge of application layer protocols and methods of the TCP/IP
layer in streamlining data/network communication.
Background/Scenario
Refer to the modeling activity from the beginning of this chapter as the basis for this activity.
Your IP telephones were installed in a half day vs. the full week originally anticipated. Your network has
been restored to full capacity and network applications are available for your use. You have the same
emails to answer and quotes to write for your managers approval.
Use the same scenario you completed in the introduction modeling activity to answer the following
questions:
A. Emails
What methods can you use to send email correspondence now that the network is working?
________________________________________________________________________________
What format will your emails be sent over the network? ____________________________________
How can you now send the same message to multiple recipients?
________________________________________________________________________________
How can you send the large attachments to multiple recipients using network applications?
________________________________________________________________________________
Would using network applications prove to be a cost-effective communication method for your
corporation?
________________________________________________________________________________
Because you have desktop application programs installed on your computer, will it be relatively easy
to produce the quote your manager needs for the new contract due by the end of the week? Explain
your answer.
________________________________________________________________________________
________________________________________________________________________________
When you finish writing the quote, how will you present it to your manager for approval? How will
your manager send the quote to the client for approval?
________________________________________________________________________________
Is using network applications a cost-effective way to complete business transactions? Justify your
answer.
________________________________________________________________________________
________________________________________________________________________________
Save a hard copy or an electronic copy of your answers. Be prepared to discuss your answers in
class.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Make it happen!
Reflection
1. Having network applications and services available to you may increase production, decrease costs, and
save time. Would this be true with the scenario you chose? Justify your answer.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Topology
Background/Scenario
Using the two networks in the topology diagram as reference, answer the following questions and record
your answers to share with the class.
Visually compare and contrast Network A and Network B. How are the two networks the same?
Make note of the devices used in each network design. Because the devices are labeled, you already
know what types of end and intermediary devices they are. How are the two networks different? Is
the number of devices present in one network the only differentiating factor? Justify your answer.
Which network you would select if you owned a small-to-medium-sized business. Justify your
selected network based on cost, speed, ports, expandability, and manageability.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 2
Required Resources
Recording capabilities (paper, tablet, etc.) for reflective comments to be shared with the class.
Reflection
1. Reflect upon your comparisons of the two network scenarios. What are some things you noted as points
of interest?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Identify elements of the model that map to real-world content:
Cost, speed, ports, expandability, and manageability are all factors to consider when designing a small to
medium-sized network.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 2
Identify several recent network security threats using the SANS site.
Identify sites beyond SANS that provide network security threat information.
Background / Scenario
To defend a network against attacks, an administrator must identify external threats that pose a danger to the
network. Security websites can be used to identify emerging threats and provide mitigation options for
defending a network.
One of the most popular and trusted sites for defending against computer and network security threats is
SysAdmin, Audit, Network, Security (SANS). The SANS site provides multiple resources, including a list of the
top 20 Critical Security Controls for Effective Cyber Defense and the weekly @Risk: The Consensus Security
Alert newsletter. This newsletter details new network attacks and vulnerabilities.
In this lab, you will navigate to and explore the SANS site, use the SANS site to identify recent network
security threats, research other websites that identify threats, and research and present the details about a
specific network attack.
Required Resources
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
Step 1: Complete the following form for the selected network attack.
Name of attack:
Type of attack:
Dates of attacks:
Computers / Organizations affected:
How it works and what it did:
Mitigation options:
Reflection
1. What steps can you take to protect your own computer?
_______________________________________________________________________________________
_______________________________________________________________________________________
2. What are some important steps that organizations can take to protect their resources?
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure the Router for SSH Access
Part 3: Examine a Telnet Session with Wireshark
Part 4: Examine a SSH Session with Wireshark
Part 5: Configure the Switch for SSH Access
Part 6: SSH from the CLI on the Switch
Background / Scenario
In the past, Telnet was the most common network protocol used to remotely configure network devices.
However, protocols such as Telnet do not authenticate or encrypt the information between the client and
server. This allows a network sniffer to intercept passwords and configuration information.
Secure Shell (SSH) is a network protocol that establishes a secure terminal emulation connection to a router
or other networking device. SSH encrypts all information that passes over the network link and provides
authentication of the remote computer. SSH is rapidly replacing Telnet as the remote login tool of choice for
network professionals. SSH is most often used to log in to a remote device and execute commands; however,
it can also transfer files using the associated Secure FTP (SFTP) or Secure Copy (SCP) protocols.
For SSH to function, the network devices communicating must be configured to support it. In this lab, you will
enable the SSH server on a router and then connect to that router using a PC with an SSH client installed. On
a local network, the connection is normally made using Ethernet and IP.
In this lab, you will configure a router to accept SSH connectivity, and use Wireshark to capture and view
Telnet and SSH sessions. This will demonstrate the importance of encryption with SSH. You will also be
challenged to configure a switch for SSH connectivity on your own.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 11
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term, and Wireshark
installed)
Console cables to configure the Cisco IOS devices via the console ports
Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as
though they were host names.
Configure and activate the G0/1 interface on the router using the information contained in the Addressing
Table.
j.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 11
Step 1: Open Wireshark and start capturing data on the LAN interface.
Note: If you are unable to start the capture on the LAN interface, you may need to open Wireshark using the
Run as Administrator option.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 11
c.
d. Enter exit to exit the Telnet session and out of Tera Term.
R1# exit
Step 5: Use the Follow TCP Stream feature in Wireshark to view the Telnet session.
a. Right-click one of the Telnet lines in the Packet list section of Wireshark, and in the drop-down list, select
Follow TCP Stream.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 11
c.
After you have finished reviewing your Telnet session in the Follow TCP Stream window, click Close.
Step 1: Open Wireshark and start capturing data on the LAN interface.
Step 2: Start an SSH session on the router.
a. Open Tera Term and enter the G0/1 interface IP address of R1 in the Host: field of the Tera Term: New
Connection window. Ensure that the SSH radio button is selected and then click OK to connect to the
router.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 11
What is the default TCP port used for SSH sessions? __________________
b. The first time you establish a SSH session to a device, a SECURITY WARNING is generated to let you
know that you have not connected to this device before. This message is part of the authentication
process. Read the security warning and then click Continue.
c.
In the SSH Authentication window, enter admin for the username and adminpass for the passphrase.
Click OK to sign into the router.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 11
d. You have established a SSH session on the router. The Tera Term software looks very similar to a
command window. At the command prompt, issue the show run command.
e. Exit the SSH session and out of Tera Term by issuing the exit command.
R1# exit
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 11
Step 5: Use the Follow TCP Stream feature in Wireshark to view the Telnet session.
a. Right-click one of the SSHv2 lines in the Packet list section of Wireshark, and in the drop-down list,
select the Follow TCP Stream option.
b. Examine the Follow TCP Stream window of your SSH session. The data has been encrypted and is
unreadable. Compare the data in your SSH session to the data of your Telnet session.
d. Close Wireshark.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 11
Step 1: View the parameters available for the Cisco IOS SSH client.
Use the question mark (?) to display the parameter options available with the ssh command.
S1# ssh
-c
-l
-m
-o
-p
-v
-vrf
WORD
?
Select encryption algorithm
Log in using this user name
Select HMAC algorithm
Specify options
Connect to this port
Specify SSH Protocol Version
Specify vrf name
IP address or hostname of a remote system
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 11
To return to the SSH session on R1, press Enter on a blank CLI line. You may need to press Enter a
second time to see the router CLI prompt.
S1#
[Resuming connection 1 to 192.168.1.1 ... ]
R1#
d. To end the SSH session on R1, type exit at the router prompt.
R1# exit
[Connection to 192.168.1.1 closed by foreign host]
S1#
What versions of SSH are supported from the CLI?
_______________________________________________________________________________________
_______________________________________________________________________________________
Reflection
How would you provide multiple users, each with their own username, access to a network device?
_______________________________________________________________________________________
_______________________________________________________________________________________
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 11
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure Basic Security Measures on the Router
Part 3: Configure Basic Security Measures on the Switch
Background / Scenario
It is recommended that all network devices be configured with, at least, a minimum set of best practice
security commands. This includes end user devices, servers, and network devices, such as routers and
switches.
In this lab, you will configure the network devices in the topology to accept SSH sessions for remote
management. You will also use the IOS CLI to configure common, basic best practice security measures. You
will then test the security measures to verify that they are properly implemented and working correctly.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 8
Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
j.
Configure and activate the G0/1 interface on the router using the information contained in the Addressing
Table.
k.
d. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as
though they were hostnames.
e. Assign class as the privileged EXEC encrypted password.
f.
Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
j.
Configure the default SVI with the IP address information contained in the Addressing Table.
k.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 8
Configure the transport input for the vty lines so that they accept SSH connections, but do not allow
Telnet connections.
R1(config)# line vty 0 4
R1(config-line)# transport input ssh
d. The vty lines should use the local user database for authentication.
R1(config-line)# login local
R1(config-line)# exit
e. Generate a RSA crypto key using a modulus of 1024 bits.
R1(config)# crypto key generate rsa modulus 1024
The name for the keys will be: R1.CCNA-lab.com
% The key modulus size is 1024 bits
% Generating 1024 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 2 seconds)
R1(config)#
*Jan 31 17:54:16.127: %SSH-5-ENABLED: SSH 1.99 has been enabled
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 8
console 0
exec-timeout 5 0
line vty 0 4
exec-timeout 5 0
exit
b. The following command impedes brute force login attempts. The router blocks login attempts for 30
seconds if someone fails two attempts within 120 seconds. This timer is set especially low for the purpose
of this lab.
R1(config)# login block-for 30 attempts 2 within 120
What does the 2 within 120 mean in the above command?
____________________________________________________________________________________
What does the block-for 30 mean in the above command?
____________________________________________________________________________________
IP-Address
unassigned
unassigned
192.168.1.1
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
Method
NVRAM
NVRAM
manual
NVRAM
NVRAM
Status
administratively
administratively
up
administratively
administratively
Protocol
down down
down down
up
down down
down down
Step 5: Verify that your security measures have been implemented correctly.
a. Use Tera Term to telnet to R1.
Does R1 accept the Telnet connection? ___________________________
Why or why not?
____________________________________________________________________________________
b. Use Tera Term to SSH to R1.
Does R1 accept the SSH connection? __________
c.
Intentionally mistype the user and password information to see if login access is blocked after two
attempts.
What happened after you failed to login the second time?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 8
e. After the 30 seconds has expired, SSH to R1 again and login using the admin username and
Admin15p@55 for the password.
After you successfully logged in, what was displayed? ________________________
f.
Enter privileged EXEC mode and use Enablep@55 for the password.
If you mistype this password, are you disconnected from your SSH session after two failed attempts
within 120 seconds? ______________
Why or why not?
____________________________________________________________________________________
g. Issue the show running-config command at the privileged EXEC prompt to view the security settings
you have applied.
Configure the transport input for the vty lines to allow SSH connections but not allow Telnet connections.
S1(config)# line vty 0 15
S1(config-line)# transport input ssh
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 8
console 0
exec-timeout 10 0
line vty 0 15
exec-timeout 10 0
exit
b. To impede brute force login attempts, configure the switch to block login access for 30 seconds if there
are 2 failed attempts within 120 seconds. This timer is set especially low for the purpose of this lab.
S1(config)# login block-for 30 attempts 2 within 120
S1(config)# end
IP-Address
192.168.1.11
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
Method
manual
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Status
up
down
down
down
down
up
up
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Protocol
up
down
down
down
down
up
up
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Page 6 of 8
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
YES
YES
YES
YES
YES
YES
unset
unset
unset
unset
unset
unset
down
down
down
down
down
down
down
down
down
down
down
down
b. Use the interface range command to shut down multiple interfaces at a time.
S1(config)# interface range f0/14 , f0/7-24 , g0/1-2
S1(config-if-range)# shutdown
S1(config-if-range)# end
S1#
c.
Verify that all inactive interfaces have been administratively shut down.
S1# show ip interface brief
Interface
Vlan1
FastEthernet0/1
FastEthernet0/2
FastEthernet0/3
FastEthernet0/4
FastEthernet0/5
FastEthernet0/6
FastEthernet0/7
FastEthernet0/8
FastEthernet0/9
FastEthernet0/10
FastEthernet0/11
FastEthernet0/12
FastEthernet0/13
FastEthernet0/14
FastEthernet0/15
FastEthernet0/16
FastEthernet0/17
FastEthernet0/18
FastEthernet0/19
FastEthernet0/20
FastEthernet0/21
FastEthernet0/22
FastEthernet0/23
FastEthernet0/24
GigabitEthernet0/1
GigabitEthernet0/2
S1#
IP-Address
192.168.1.11
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
Method
manual
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
Status
up
administratively
administratively
administratively
administratively
up
up
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
administratively
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Protocol
up
down
down
down
down
up
up
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Step 5: Verify that your security measures have been implemented correctly.
a. Verify that Telnet has been disabled on the switch.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 8
After the 30 seconds has expired, SSH to S1 again and log in using the admin username and
Admin15p@55 for the password.
Did the banner appear after you successfully logged in? __________
Reflection
1. The password cisco command was entered for the console and vty lines in your basic configuration in Part
1. When is this password used after the best practice security measures have been applied?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2. Are preconfigured passwords, shorter than 10 characters, affected by the security passwords min-length
10 command?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 8
Objectives
Part 1: Use Ping to Document Network Latency
Part 2: Use Traceroute to Document Network Latency
Background / Scenario
To obtain realistic network latency statistics, this activity must be performed on a live network. Be sure to
check with your instructor for any local security restrictions against using the ping command on the network.
The purpose of this lab is to measure and evaluate network latency over time, and during different periods of
the day to capture a representative sample of typical network activity. This will be accomplished by analyzing
the return delay from a distant computer with the ping command. Return delay times, measured in
milliseconds, will be summarized by computing the average latency (mean) and the range (maximum and
minimum) of the delay times.
Required Resources
ping
ping
ping
ping
www.arin.net
www.lacnic.net
www.afrinic.net
www.apnic.net
Note: Because www.ripe.net does not reply to ICMP requests, it cannot be used for this lab.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 5
-a
-n count
-l size
-f
-i TTL
-v TOS
<output omitted>
b. Using the ping command with the count option, you can send 25 echo requests to the destination as
illustrated below. Furthermore, it will create a text file with filename of arin.txt in the current directory. This
text file will contain the results of the echo requests.
C:\Users\User1> ping n 25 www.arin.net > arin.txt
Note: The terminal remains blank until the command has finished, because the output has been redirected to
a text file, arin.txt, in this example. The > symbol is used to redirect the screen output to the file and overwrite
the file if it already exists. If appending more results to the file is desired, replace > with >> in the command.
c.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 5
Note: Press the Spacebar to display the rest of the file or press q to exit.
To verify that the files have been created, use the dir command to list the files in the directory. Also the
wildcard * can be used to filter only the text files.
C:\Users\User1> dir *.txt
Volume in drive C is OS
Volume Serial Number is 0A97-D265
Directory of C:\Users\User1
02/07/2013
02/07/2013
02/07/2013
02/07/2013
12:59 PM
1,642 afrinic.txt
01:00 PM
1,615 apnic.txt
12:40 PM
1,641 arin.txt
12:58 PM
1,589 lacnic.txt
4 File(s)
6,487 bytes
0 Dir(s) 34,391,453,696 bytes free
Maximum
Average
www.afrinic.net
www.apnic.net
www.arin.net
www.lacnic.net
Compare the delay results. How is delay affected by geographical location?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 5
Step 1: Use the tracert command and record the output to text files.
Copy the following commands to create the traceroute files:
C:\Users\User1>
C:\Users\User1>
C:\Users\User1>
C:\Users\User1>
tracert
tracert
tracert
tracert
<1
11
10
19
13
72
72
74
75
74
71
73
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
<1
12
15
10
10
71
71
83
71
75
71
71
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
<1
11
11
11
11
70
72
73
73
73
71
71
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
ms
192.168.1.1
10.39.0.1
172.21.0.116
70.169.73.90
chnddsrj01-ae2.0.rd.ph.cox.net [70.169.76.229]
mrfddsrj02-ae0.0.rd.dc.cox.net [68.1.1.7]
68.100.0.146
172.22.66.29
172.22.66.29
wsip-98-172-152-14.dc.dc.cox.net [98.172.152.14]
host-252-131.arin.net [192.149.252.131]
www.arin.net [192.149.252.75]
Trace complete.
In this example, it took less than 1 ms to receive a reply from the default gateway (192.168.1.1). In hop
count 6, the round trip to 68.1.1.7 took an average of 71 ms. For the round trip to the final destination at
www.arin.net took an average of 72 ms.
Between lines 5 and 6, there is more network delay as indicated by the round trip time increase from an
average of 11 ms to 71 ms
b. Perform the same analysis with the rest of the tracert results.
What can you conclude regarding the relationship between the roundtrip time and geographical location?
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 5
Reflection
1. The tracert and ping results can provide important network latency information. What do you need to do if
you want an accurate baseline picture regarding network latency for your network?
_______________________________________________________________________________________
2. How can you use the baseline information?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 5
Addressing Table
Device
R1
Interface
IP Address
Subnet Mask
Default Gateway
G0/1
192.168.1.1
255.255.255.0
N/A
Lo0
209.165.200.225
255.255.255.224
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Set Up Topology and Initialize Devices
Background / Scenario
Documenting a working network is one of the most important tasks a network professional can perform.
Having proper documentation of IP addresses, model numbers, IOS versions, ports used, and testing
security, can go a long way in helping to troubleshoot a network.
In this lab, you will build a small network, configure the devices, add some basic security, and then document
the configurations by issuing various commands on the router, switch and PC to gather your information.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 11
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
Console cables to configure the Cisco IOS devices via the console ports
Step 1:
Step 2:
Step 1:
Configure the IPv4 address, subnet mask, and default gateway address for PC-A based on the Addressing
Table.
Step 2:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 11
Step 3:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 11
Step 4:
a. From a command prompt on PC-A, ping the S1 VLAN 1 IP address. Troubleshoot your physical and
logical configurations if the pings were not successful.
b. From the PC-A command prompt, ping your default gateway IP address on R1. Troubleshoot your
physical and logical configurations if the pings were not successful.
c.
From the PC-A command prompt, ping the loopback interface on R1. Troubleshoot your physical and
logical configurations if the pings were not successful.
d. Console back into the switch and ping the G0/1 IP address on R1. Troubleshoot your physical and logical
configurations if the pings were not successful.
Step 1:
One of the most basic steps is to gather information on the physical device, as well as information on the
operating system.
a. Issue the appropriate command to discover the following information:
Router Model:
__________________________________
IOS Version:
__________________________________
Total RAM:
__________________________________
Total NVRAM:
__________________________________
__________________________________
__________________________________
__________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 11
Issue the appropriate command to display the routing table. Write down the command and record your
results below.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
d. What command would you use to display the Layer 2 to Layer 3 mapping of addresses on the router?
Write down the command and record your results below.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
e. What command would you use to see detailed information about all the interfaces on the router or about a
specific interface? Write down the command below.
____________________________________________________________________________________
f.
Cisco has a very powerful protocol that operates at Layer 2 of the OSI model. This protocol can help you
map out how Cisco devices are connected physically, as well as determining model numbers and even
IOS versions and IP addressing. What command or commands would you use on router R1 to find out
information about switch S1 to help you complete the table below?
Device ID
Local
Interface
Capability
Model #
Remote
Port ID
IP Address
IOS Version
g. A very elementary test of your network devices is to see if you can telnet into them. Remember, Telnet is
not a secure protocol. It should not be enabled in most cases. Using a Telnet client, such as Tera Term or
PuTTY, try to telnet to R1 using the default gateway IP address. Record your results below.
___________________________________________________________________________________
h. From PC-A, test to ensure that SSH is working properly. Using an SSH client, such as Tera Term or
PuTTY, SSH into R1 from PC-A. If you get a warning message regarding a different key, click Continue.
Log in with the appropriate username and password you created in Part 2. Were you successful?
___________________________________________________________________________________
The various passwords configured on your router should be as strong and protected as possible.
Note: The passwords used for our lab (cisco and class) do not follow the best practices needed for
strong passwords. These passwords are used merely for the convenience of performing the labs. By
default, the console password and any vty passwords configured would display in clear text in your
configuration file.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 11
Verify that all of your passwords in the configuration file are encrypted. Write down the command and
record your results below.
Command: ________________________________________________
Is the console password encrypted? __________________________
Is the SSH password encrypted? _____________________________
Step 2:
Many of the commands that you used on R1 can also be used with the switch. However, there are some
differences with some of the commands.
a. Issue the appropriate command to discover the following information:
Switch Model: __________________________________
IOS Version:
__________________________________
Issue the appropriate command to display the switch MAC address table. Record the dynamic type MAC
addresses only in the space below.
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
d. Verify that Telnet VTY access is disabled on S1. Using a Telnet client, such as Tera Term or PuTTY, try
to telnet to S1 using the 192.168.1.11 address. Record your results below.
___________________________________________________________________________________
e. From PC-A, test to ensure that SSH is working properly. Using an SSH client, such as Tera Term or
PuTTY, SSH into S1 from PC-A. If you get a warning message regarding a different key, click Continue.
Log in with an appropriate username and password. Were you successful?
___________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 11
Complete the table below with information about router R1 using the appropriate command or commands
necessary on S1.
Device Id
Local
Interface
Capability
Model #
Remote
Port ID
IP Address
IOS Version
g. Verify that all of your passwords in the configuration file are encrypted. Write down the command and
record your results below.
Command: ________________________________________________
Is the console password encrypted? __________________________
Step 3:
Using various Windows utility commands, you will gather information on PC-A.
a. From the PC-A command prompt, issue the ipconfig /all command and record your answers below.
What is the PC-A IP address?
____________________________________________________________________________________
What is the PC-A subnet mask?
____________________________________________________________________________________
What is the PC-A default gateway address?
____________________________________________________________________________________
What is the PC-A MAC address?
____________________________________________________________________________________
b. Issue the appropriate command to test the TCP/IP protocol stack with the NIC. What command did you
use?
____________________________________________________________________________________
c.
Ping the loopback interface of R1 from the PC-A command prompt. Was the ping successful?
____________________________________________________________________________________
d. Issue the appropriate command on PC-A to trace the list of router hops for packets originating from PC-A
to the loopback interface on R1. Record the command and output below. What command did you use?
____________________________________________________________________________________
____________________________________________________________________________________
e. Issue the appropriate command on PC-A to find the Layer 2 to Layer 3 address mappings held on your
NIC. Record your answers below. Only record answers for the 192.168.1.0/24 network. What command
did you use?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 11
Reflection
Why is it important to document your network devices?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 11
c.
1) Assign a hostname to the router. Use the topology and Addressing Table as guidelines.
Router(config)# hostname R1
R1(config)#
2) Disable DNS lookup.
R1(config)# no ip domain-lookup
3) Create a MOTD banner that warns anyone accessing the device that unauthorized access is
prohibited.
R1(config)# banner motd #Warning! Unauthorized Access is prohibited.#
4) Assign class as the privileged EXEC encrypted password.
R1(config)# enable secret class
5) Assign cisco as the console password and enable console login access.
R1(config)# line con 0
R1(config-line)# password cisco
R1(config-line)# login
6) Encrypt clear text passwords.
R1(config)# service password-encryption
7) Create a domain name of cisco.com for SSH access.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 11
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Configure Basic Device Settings
Part 2: Use Terminal Emulation Software to Create a Backup Configuration File
Part 3: Use a Backup Configuration File to Restore a Router
Background / Scenario
It is a recommended best practice to maintain backup configuration files for routers and switches in the event
that they need to be restored to a previous configuration. Terminal emulation software can be used to easily
back up or restore a router or switch configuration file.
In this lab, you will use Tera Term to back up a router running configuration file, erase the router startup
configuration file, reload the router, and then restore the missing router configuration from the backup
configuration file.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
Console cables to configure the Cisco IOS devices via the console ports
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
Step 2: Configure the PC-A network settings according to the Addressing Table.
Step 3: Initialize and reload the router and switch.
Step 4: Configure the router.
a. Console into the router and enter global configuration mode.
b. Set the router name to R1.
c.
Configure and activate the G0/1 interface on the router using the information contained in the Addressing
Table.
j.
Configure the default SVI management interface with the IP address information contained in the
Addressing Table.
j.
k.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
c.
The Tera Term log file will create a record of every command issued and every output displayed.
Note: You can use this feature to capture the output from several commands in sequence and use it for
network documentation purposes. For example, you could issue the show version, show ip interface
brief, and show running-config commands to capture information about the router.
d. Continue pressing the space bar when --More-- is displayed until you see the router R1# prompt return.
e. Click the Tera Term: Log icon on the Task bar. Click Close to end log session.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
Note: You can also copy and paste the text from the Tera Term window directly into a text editor.
At the System Configuration Dialog prompt, type no; a router prompt displays, indicating an unconfigured
router.
--- System Configuration Dialog --Would you like to enter the initial configuration dialog? [yes/no]:
Press RETURN to get started!
<output omitted>
Router>
d. Enter privileged EXEC mode and enter a show running-config command to verify that all of the previous
configurations were erased.
Step 2: Edit the saved configuration backup file to prepare it for restoring the router
configuration.
To restore the router configuration from a saved running configuration backup file, you must edit the text.
a. Open the teraterm.log text file.
b. Remove each instance of --More-- in the text file.
Note: The --More-- was generated by pressing the Spacebar when displaying the running configuration.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
Delete the initial lines of the backup configuration file, so that the first line starts with the first configuration
command as shown below.
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
Change the message-of-the-day (MOTD) banner configuration to insert the delimiting characters as if you
were entering the command at the command line.
banner motd ^C Unauthorized Access is Prohibited! ^C
Change to:
banner motd Unauthorized Access is Prohibited!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
Reflection
Why do you think it is important to use a text editor instead of a word processor to copy and save your
command configurations?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 6
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: (Optional) Download TFTP Server Software
Part 3: Use TFTP to Back Up and Restore the Switch Running Configuration
Part 4: Use TFTP to Back Up and Restore the Router Running Configuration
Part 5: Back Up and Restore Running Configurations Using Router Flash Memory
Part 6: (Optional) Use a USB Drive to Back Up and Restore the Running Configuration
Background / Scenario
Cisco networking devices are often upgraded or swapped out for a number of reasons. It is important to
maintain backups of the latest device configurations, as well as a history of configuration changes. A TFTP
server is often used to backup configuration files and IOS images in production networks. A TFTP server is a
centralized and secure method used to store the backup copies of the files and restore them as necessary.
Using a centralized TFTP server, you can back up files from many different Cisco devices.
In addition to a TFTP server, most of the current Cisco routers can back up and restore files locally from
CompactFlash (CF) memory or a USB flash drive. The CF is a removable memory module that has replaced
the limited internal flash memory of earlier router models. The IOS image for the router resides in the CF
memory, and the router uses this IOS Image for the boot process. With the larger size of the CF memory,
additional files can be stored for backup purposes. A removable USB flash drive can also be used for backup
purposes.
In this lab, you will use TFTP server software to back up the Cisco device running configuration to the TFTP
server or flash memory. You can edit the file using a text editor and copy the new configuration back to a
Cisco device.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term, and a TFTP server)
Console cables to configure the Cisco IOS devices via the console ports
d. Configure the passwords and allow login for console and vty lines using the cisco as the password.
e. Configure the default gateway for the switch.
f.
g. Configure the IP address, subnet mask, and default gateway for PC-A.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
If a TFTP server is not found, a TFTP server can be downloaded from the Internet.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
c.
Click Browse to choose a directory where you have write permission, such as C:\Users\User1, or the
Desktop.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
tftp:
tmpsys:
xmodem:
ymodem:
Copy
Copy
Copy
Copy
from
from
from
from
b. Use the ? to display the destination options after a source file location is chosen. The flash: file system
for S1 is the source file system in this example.
S1# copy flash: ?
archive:
flash0:
flash1:
flash:
ftp:
http:
https:
idconf
null:
nvram:
rcp:
running-config
scp:
startup-config
syslog:
system:
tftp:
tmpsys:
xmodem:
ymodem:
Step 4: Transfer the running-config file from switch S1 to TFTP server on PC-A.
a. From the privileged EXEC mode on the switch, enter the copy running-config tftp: command. Provide
the remote host address of the TFTP server (PC-A), 192.168.1.3. Press Enter to accept default
destination filename (s1-confg) or provide your own filename. The exclamation marks (!!) indicate the
transfer process is in progress and is successful.
S1# copy running-config tftp:
Address or name of remote host []? 192.168.1.3
Destination filename [s1-confg]?
!!
1465 bytes copied in 0.663 secs (2210 bytes/sec)
S1#
The TFTP server also displays the progress during the transfer.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
Note: If you do not have permission to write to the current directory that is used by the TFTP server, the
following error message displays:
S1# copy running-config tftp:
Address or name of remote host []? 192.168.1.3
Destination filename [s1-confg]?
%Error opening tftp://192.168.1.3/s1-confg (Permission denied)
You can change the current directory in TFTP server by clicking Browse and choosing a different folder.
Note: Other issues, such as a firewall blocking TFTP traffic, can prevent the TFTP transfer. Please check
with your instructor for further assistance.
b. In the Tftpd32 server window, click Show Dir to verify that the s1-confg file has been transferred to your
current directory. Click Close when finished.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
c.
F70D0101 05050030
6E65642D 43657274
D2C59E23 102EC12E
35B38D90 E6F07CD4
0AF27EDC 6D6FA0E5
Save this file as a plain text file with a new filename, Switch1-confg.txt, in this example.
Note: When saving the file, an extension, such as .txt, may be added to the filename automatically.
d. In the Tftpd32 server window, click Show Dir to verify that the Switch1-confg.txt file is located in the
current directory.
Step 6: Upload running configuration file from TFTP server to switch S1.
a. From the privileged EXEC mode on the switch, enter the copy tftp running-config command. Provide
the remote host address of the TFTP server, 192.168.1.3. Enter the new filename, Switch1-confg.txt.
The exclamation mark (!) indicates the transfer process is in progress and is successful.
S1# copy tftp: running-config
Address or name of remote host []? 192.168.1.3
Source filename []? Switch1-confg.txt
Destination filename [running-config]?
Accessing tftp://192.168.1.3/Switch1-confg.txt...
Loading Switch1-confg.txt from 192.168.1.3 (via Vlan1): !
[OK - 1580 bytes]
[OK]
1580 bytes copied in 9.118 secs (173 bytes/sec)
*Mar 1 00:21:16.242: %PKI-4-NOAUTOSAVE: Configuration was modified.
memory" to save new certificate
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Issue "write
Page 7 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
*Mar 1 00:21:16.251: %SYS-5-CONFIG_I: Configured from tftp://192.168.1.3/Switch1confg.txt by console
Switch1#
After the transfer has completed, the prompt has changed from S1 to Switch1, because the running
configuration is updated with the hostname Switch1 command in the modified running configuration.
b. Enter the show running-config command to examine running configuration file.
Switch1# show running-config
Building configuration...
Current configuration : 3062 bytes
!
! Last configuration change at 00:09:34 UTC Mon Mar 1 1993
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch1
!
boot-start-marker
boot-end-marker
<output omitted>
Note: This procedure merges the running-config from the TFTP server with the current running-config in
the switch or router. If changes were made to the current running-config, the commands in the TFTP copy
are added. Alternatively, if the same command is issued, it updates the corresponding command in the
switch or router current running-config.
If you want to completely replace the current running-config with the one from the TFTP server, you must
erase the switch startup-config and reload the device. You will then need to configure the VLAN 1
management address, so there is IP connectivity between the TFTP server and the switch.
Step 2: Transfer the running configuration from router R1 to TFTP server on PC-A.
a. From the privileged EXEC mode on R1, enter the copy running-config tftp command. Provide the
remote host address of the TFTP server, 192.168.1.3, and accept the default filename.
b. Verify that the file has been transferred to the TFTP server.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
Size(b)
260153344
262136
-
Free(b)
64499712
242776
-
Type
opaque
opaque
opaque
opaque
network
disk
disk
nvram
opaque
opaque
opaque
network
network
network
network
opaque
Flags
rw
rw
rw
rw
rw
rw
rw
rw
wo
rw
rw
rw
rw
rw
rw
ro
Prefixes
archive:
system:
tmpsys:
null:
tftp:
flash0: flash:#
flash1:
nvram:
syslog:
xmodem:
ymodem:
rcp:
http:
ftp:
scp:
tar:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 9 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
-
network
opaque
rw
ro
https:
cns:
b. Use dir command to verify the running-config has been copied to flash.
R1# dir flash:
Directory of flash0:/
1 drw0
<output omitted>
20 -rw67998028
4.M3.bin
22 -rw2169
24 -rw5865
25 -rw6458
ipsdir
c1900-universalk9-mz.SPA.152R1-running-config-backup
lpnat
lpIPSec
c.
Use the more command to view the running-config file in flash memory. Examine the file output and scroll
to the Interface section. Notice the no shutdown command is not included with the GigabitEthernet0/1.
The interface is shut down when this file is used to update the running configuration on the router.
R1# more flash:R1-running-config-backup
<output omitted>
interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
<output omitted>
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
b. Copy the saved running-config file from flash to update the running-config.
Router# copy flash:R1-running-config-backup running-config
c.
Use the show ip interface brief command to view the status of the interfaces. The interface
GigabitEthernet0/1 was not enabled when the running configuration was updated, because it is
administratively down.
R1# show ip interface brief
Interface
Embedded-Service-Engine0/0
GigabitEthernet0/0
GigabitEthernet0/1
Serial0/0/0
Serial0/0/1
IP-Address
unassigned
unassigned
192.168.1.1
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
Method
unset
unset
TFTP
unset
unset
Status
administratively
administratively
administratively
administratively
administratively
down
down
down
down
down
Protocol
down
down
down
down
down
The interface can be enabled using the no shutdown command in the interface configuration mode on
the router.
Another option is to add the no shutdown command for the GigabitEthernet0/1 interface to the saved file
before updating the router running configuration file. This will be done in Part 6 using a saved file on a
USB flash drive.
Note: Because the IP address was configured by using a file transfer, TFTP is listed under the Method
heading in the show ip interface brief output.
Part 6: (Optional) Use a USB Drive to Back Up and Restore the Running
Configuration
A USB flash drive can be used to backup and restore files on a router with an available USB port. Two USB
ports are available on the 1941 routers.
Note: USB ports are not available on all routers, but you should still become familiar with the commands.
Note: Because some ISR G1 routers (1841, 2801, or 2811) use File Allocation Table (FAT) file systems, there
is a maximum size limit for the USB flash drives that can be used in this part of the lab. The recommended
maximum size for an ISR G1 is 4 GB. If you receive the following message, the file system on the USB flash
drive may be incompatible with the router or the capacity of the USB flash drive may have exceed maximum
size of the FAT file system on the router.
*Feb 8 13:51:34.831: %USBFLASH-4-FORMAT: usbflash0 contains unexpected values in
partition table or boot sector. Device needs formatting before use!
Step 1: Insert a USB flash drive into a USB port on the router.
Notice the message on the terminal when inserting the USB flash drive.
R1#
* *Feb
Free(b)
-
Type
opaque
opaque
opaque
Flags
rw
rw
rw
Prefixes
archive:
system:
tmpsys:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
260153344
262136
7728881664
64512000
244676
7703973888
opaque
network
disk
disk
nvram
opaque
opaque
opaque
network
network
network
network
opaque
network
opaque
usbflash
rw
rw
rw
rw
rw
wo
rw
rw
rw
rw
rw
rw
ro
rw
ro
rw
null:
tftp:
flash0: flash:#
flash1:
nvram:
syslog:
xmodem:
ymodem:
rcp:
http:
ftp:
scp:
tar:
https:
cns:
usbflash0:
Step 3: Copy the running configuration file to the USB flash drive.
Use the copy command to copy the running configuration file to the USB flash drive.
R1# copy running-config usbflash0:
Destination filename [running-config]? R1-running-config-backup.txt
2198 bytes copied in 0.708 secs (3105 bytes/sec)
-rw-rw-rw-rw-rw-rw-
16216
2462
24810439
71
65327
2198
Nov 15
May 26
Apr 16
Jun 4
Mar 11
Feb 5
2006
2006
2010
2010
2008
2013
09:34:04
21:33:40
10:28:00
11:23:06
10:54:26
21:36:40
+00:00
+00:00
+00:00
+00:00
+00:00
+00:00
ConditionsFR.txt
Nlm.ico
Twice.exe
AUTORUN.INF
ConditionsEN.txt
R1-running-config-backup.txt
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 12 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
c.
Modify the file using a text editor. The no shutdown command is added to the GigabitEthernet0/1
interface. Save the file as a plain text file on to the USB flash drive.
!
interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.0
no shutdown
duplex auto
speed auto
!
-rw-rw-rw-rw-rw-rw-
16216
2462
24810439
71
65327
2344
Nov 15
May 26
Apr 16
Jun 4
Mar 11
Feb 6
2006
2006
2010
2010
2008
2013
09:34:04
21:33:40
10:28:00
11:23:06
10:54:26
14:42:30
+00:00
+00:00
+00:00
+00:00
+00:00
+00:00
ConditionsFR.txt
Nlm.ico
Twice.exe
AUTORUN.INF
ConditionsEN.txt
R1-running-config-backup.txt
c.
IP-Address
unassigned
unassigned
192.168.1.1
unassigned
unassigned
OK?
YES
YES
YES
YES
YES
Method
unset
unset
TFTP
unset
unset
Status
administratively
administratively
up
administratively
administratively
Protocol
down down
down down
up
down down
down down
The G0/1 interface is enabled because the modified running configuration included the no shutdown
command.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 13 of 14
Lab Managing Device Configuration Files Using TFTP, Flash and USB
Reflection
1. What command do you use to copy a file from the flash to a USB drive?
_______________________________________________________________________________________
2. What command do you use to copy a file from the USB flash drive to a TFTP server?
_______________________________________________________________________________________
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 14 of 14
Part 2: Document the Password Recovery Procedure for a Specific Cisco Router
Research and record the process for password recovery on a specific Cisco router.
Background / Scenario
The purpose of this lab is to research the procedure for recovering or resetting the enable password on a
specific Cisco router. The enable password protects access to privileged EXEC and configuration mode on
Cisco devices. The enable password can be recovered, but the enable secret password is encrypted and
would need to be replaced with a new password.
In order to bypass a password, a user must be familiar with the ROM monitor (ROMMON) mode, as well as
the configuration register setting for Cisco routers. ROMMON is basic CLI software stored in ROM that can be
used to troubleshoot boot errors and recover a router when an IOS is not found.
In this lab, you will begin by researching the purpose and settings of the configuration register for Cisco
devices. You will then research and detail the exact procedure for password recovery for a specific Cisco
router.
Required Resources
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 3
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 3
Reflection
1. Why is it of critical importance that a router be physically secured to prevent unauthorized access?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 3
Background/Scenario
Note: This activity is best completed in groups of 2-3 students.
Design and build a network from scratch.
Your design must include a minimum of one router, one switch, and one PC.
Fully configure the network and use IPv4 or IPv6 (subnetting must be included as a part of your
addressing scheme).
Secure the network using SSH, secure passwords, and console passwords (minimum).
Create a rubric to use for informal peer grading. Alternatively, your instructor may choose to use the rubric
provided with this activity.
Present your Capstone Project to the class and be able to answer questions from your peers and Instructor.
Required Resources
Packet Tracer
Reflection
1. What was the most difficult portion of this activity?
2. Why do you think network documentation is so important to this activity and in the real world?
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 1