Ccna New Lab Manual by Esp Team
Ccna New Lab Manual by Esp Team
Ccna New Lab Manual by Esp Team
CCNA
Developed by
ESP Team
1- Ethernet Cables
Cross Cable………….…….………………………………………………4
Straight Cable………………………………………………………….......5
Roll-Over Cable……………..…….………………………………………6
2- How To Make A LAN
Connecting Two PC’s via Cross Cable..…………………………….....….7
Connecting Two PC’s via Straight Cable.…………………...……………8
3- How To Make A Web & Ftp Server
Web Server…………………………….……………………………........17
Ftp Server………………………………..……………………………….27
4- Open a Hyper Terminal Session………….…………………………..……...34
Section-II Routing
Extended ACL…………………………………………………..……….87
10- Network Address Translation
Static NAT………………………………………………………..……...92
Dynamic NAT……………………………………………………..…….97
Overload NAT……………………………………………………….....102
Section-IV Switching
Section-V WAN
Section-VI Voice
Section-VII Wireless
Section-VIII Appendix
Section 1
Network
Fundamentals
Lab # 1
Ethernet Cables
Objective
This lab demonstrates how to make an Ethernet Cables.
1) Straight-through cable
2) Crossover cable
3) Rolled cable
i. Straight-Through Cable
The straight-through cable is used to connect
Four wires are used in straight-through cable to connect Ethernet devices. It is relatively
simple to create ; Figure shows the four wires used in a straight-through Ethernet
cable.
Diagram
Straight-through Ethernet Cable
Hub/Switch Host
1 1
2 2
3 3
6 6
Notice that only pins 1, 2, 3, and 6 are used. Just connect 1 to 1, 2 to 2, 3 to 3, and 6 to 6.
However, remember that this would be an Ethernet-only cable and wouldn’t work with
Voice, Token Ring, ISDN, etc.
1) Switch to switch
2) Hub to hub
3) Host to host
4) Hub to switch
5) Router direct to host
The same four wires are used in this cable as in the straight-through cable; we just
connect different pins together. Figure shows how the four wires are used in a crossover
Ethernet cable.
Diagram
Hub/Switch/Host Hub/Switch/Host
1 1
2 2
3 3
6 6
Although rolled cable isn’t used to connect any Ethernet connections together, you can
use a rolled Ethernet cable to connect a host to a router console serial communication
(com) port.
Eight wires are used in this cable to connect serial devices, although not all eight are used
to send information, just as in Ethernet networks. Figure shows the eight wires used in a
rolled cable.
Diagram
Host Router/Switch
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
To make, just cut the one side like a straight-through cable and reverse the other end.
Once you connect the cable from your PC to the Cisco router or switch, you can start
HyperTerminal to create a console connection and configure the device
Lab # 2
Diagram
Cross Cable
Host A Host B
IP Address: 10.0.0.1 IP Address: 10.0.0.2
MAC: 00.01.02.62.fc.3b MAC: 02.00.01.e1.db.2c
Diagram
Straight Straight
Cable Cable
Fast Ethernet 0/1 Fast Ethernet 0/1
Host A Host B
IP Address: 10.0.0.1 IP Address: 10.0.0.2
MAC: 00.01.02.62.fc.3b MAC: 02.00.01.e1.db.2c
Procedure
1. Make sure that both NICs are installed onto your PC’s.
2. Assign IP address to your LAN (NIC) card on both PC’s.
3. Check their connectivity by PING command & DATA sharing.
Configuration
Step 1: Make sure that both NICs are installed onto your PC’s.
Then go to System
Note: - If LAN (NIC) card is not installed onto your PC then go to Windows Start
Button > Settings > Control Panel > Add/Remove Hardware.
D:\>ipconfig
D:\>ping 10.0.0.2
Pinging 10.0.0.2 with 32 bytes of data:
Lab # 3
1. Web Server.
2. Ftp Server.
Diagram
Procedure
1. Open an Internet Information Service (IIS) from an Administrative tools and
Make a WEB Server.
2. Open an Internet Information Service (IIS) from an Administrative tools and
Make a FTP Server.
3. Verifying the WEB & FTP Derver from Host ‘A’.
Configuration
Step 1: Open an Internet Information Service (IIS) from an Administrative tools
& Make a WEB Server.
Go to Windows Start Button > Programs > Administrative Tools > Internet Services
Manager.
Then, Start IIS & Right Click on the Computer Name > New > Web Site
Check the Web Page by Right Click & Press the Browse.
Then, Start IIS & Right Click on the Computer Name > New > Ftp Site
Check the Ftp Site by Right Click on Ftp Server & Press the Browse.
Check the Ftp Site by Right Click on Ftp Server & Press the Browse.
Step 3: Verifying the WEB & FTP Server from Host ‘A’.
WEB Server from Host ‘A’.
Lab # 4
Diagram
Router Switch
Console 0 Console 0
Roll Over Roll Over
Cable Cable
Host A Host B
Procedure
1. Open the Hyper Terminal Session From RUN by giving the command
‘hypertrm’ or from STRART Button -> Programs -> Accessories ->
Communications -> Hyper Terminal.
2. Give the Session name.
3. Define the connection type i-e., COM1.
Configuration
Step 1: Open the Hyper Terminal Session From RUN by giving the command
‘hypertrm’ or from START Button -> Programs -> Accessories ->
Communications -> Hyper Terminal.
Section 2
Routing
Lab # 5
Router
Console 0
Roll Over Cable
Host A
Configuration
Step 1: After connecting your PC to the Console Port.
Router con0 is now available
Step 2: To Enter Into Privilege mode/Executive Mode From User Mode & Vice-
Versa.
Router>enable
Router#
Router#disable
Router>
Step 5(A): Set the System Clock, Date & Time on the Router
R1#clock set ?
<1993-2035> Year
Step 5(B): Verify the System Clock, Date & Time on the Router
R1#show clock
Step 6(A): Set the Message of the Day Banner on the Router.
R1(config)#banner motd # HELLO & WELCOME TO CISCO WORLD #
Step 6(B): Verify the Message of the Day Banner on the Router.
R1 con0 is now available
R1>
OR
R1#show flash:
Password:
R1>
The enable secret you have chosen is the same as your enable password.
This is not recommended. Re-enter the enable secret.
Step 16: Remove the Privileged Mode Password (Level 15) in clear form.
R1(config)#no enable password cisco
Step 17: Remove the Privileged Mode Secret Password (Level 15) in encrypted
form.
Step 18: To enter in the Setup Mode (Initial Configuration Dialog) of Router.
Router#setup
At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.
hostname R1
enable secret 5 $1$ZFA2$ZR288i7VkOufhqSdIyiOs.
enable password cisco
line vty 0 4
password cisco
no snmp-server
!
no ip routing
!
interface Ethernet0
no shutdown
ip address 10.0.0.20 255.0.0.0
!
interface Serial0
shutdown
no ip address
!
!
interface Serial1
shutdown
no ip address
!
end
[0] Go to the IOS command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration to nvram and exit.
R1
IP Address
10.0.0.20
2950-SWA
IP Address 10.0.0.10
Host A
IP Address 10.0.0.1
Procedure
1. Check for the interfaces summary of the Router.
2. Assign the IP Address on the Ethernet Interface of the Router.
3. Display the interface information of the Ethernet interface of the router.
4. Verify the connectivity of the Router with the switch & PC.
Configuration
Step 3: Display the interface information of the Ethernet interface of the Router.
R1#show interfaces ethernet 0
Step 4(B): Verify the connectivity of the Router with the Switch.
R1#ping 10.0.0.10
Step 4(C): Verify the connectivity of the Router with the PC.
R1#ping 10.0.0.1
Diagram
R1 R2
WAN
Procedure
1) Check for the interfaces summary of the Router R1 & R2
2) Check for the DCE & DTE interfaces of the Router R1 & R2
3) Assign the IP Address on the Serial Interfaces of the Router R1 & R2.
4) Display the interface information of the Serial interface of the Router R1 & R2.
5) Verify the connectivity of the Router R1 & R2.
Configuration
Step 2(A): Check for the DCE cable of the Router R1.
R1#show controllers serial 0
Step 2(B): Check for the DTE cable of the Router R2.
R2#show controllers serial 0
Step 3(A): Assign the IP Address on the Serial Interface of the Router R1.
R1(config)#interface serial 0
R1(config-if)#ip address 15.0.0.1 255.0.0.0
R1(config-if)#no shutdown
R1(config-if)#clock rate 64000 (Clock Rate will set only DCE Interface)
R1(config-if)#end
Step 3(A): Assign the IP Address on the Serial Interface of the Router R2.
R2(config)#interface serial 0
R2(config-if)#ip address 15.0.0.2 255.0.0.0
R2(config-if)#no shutdown
R2(config-if)#end
Step 4: Display the interface information of the Serial interface of the Router.
R1#show interfaces serial 0
Step 5(A): Check for the Interfaces summary of the Router R1.
R1#show ip interface brief
Lab # 6
Diagram
R1 R2
WAN
Procedure
1) Check the Connectivity between 2 routers.
2) Set the Privilege mode password on Router R2.
3) Set the TELNET (line VTY) password on Router R2.
4) Verify the telnet Session from Router R1 to Router R2.
5) Disconnect the telnet Session.
Configuration
Step 1: Check the Connectivity between 2 routers.
R1#ping 15.0.0.2
Password:
R2>enable
Password:
R2#
Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns
0 CTY - - - - - 0 1 0/0
1 AUX 9600/9600 - - - - - 0 0 0/0
* 2 VTY - - - - - 5 0 0/0
3 VTY - - - - - 0 0 0/0
4 VTY - - - - - 0 0 0/0
5 VTY - - - - - 0 0 0/0
6 VTY - - - - - 0 0 0/0
R2#
Press [ Ctrl+Shift+6 and then ‘x’ ]
R1#
(Note: And then Resume connection by just Enter Key.)
Lab # 7
STATIC Routes
Objective
Understanding the Operation of Static Routes. Static Routes are administratively defined
routes that specify the address or interface of the next hop in the path that packets must
take while moving between a source & destination.
Diagram
Host A Host B
IP Address 10.0.0.1 IP Address 20.0.0.1
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Administratively define the Static Routes on both routers so that hosts on the both
routers can communicate with each other.
4. Check the routing table on both the routers after defining the Static Routes on
both sides.
5. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Router R1.
R1(config)#interface serial 0
R1(config-if)#ip address 15.0.0.1 255.0.0.0
R1(config-if)#no shutdown
R1(config-if)#clock rate 64000 (Clock Rate will set only DCE Interface)
R1(config)#interface ethernet 0
R1(config-if)#ip address 10.0.0.20 255.0.0.0
R1(config-if)#no shutdown
R2(config)#interface ethernet 0
R2(config-if)#ip address 20.0.0.2 255.0.0.0
R2(config-if)#no shutdown
Step 3(A): Administratively define the Static Route on the Router R1.
R1(config)#ip route 20.0.0.0 255.0.0.0 15.0.0.2 (Desired destination networks)
Step 3(B): Administratively define the Static Route on the Router R2.
R2(config)#ip route 10.0.0.0 255.0.0.0 15.0.0.1 (Desired destination networks)
Step 4(A): Check the Routing table of the Router R1 after enabling RIP.
R1#sh ip route
Step 4(B): Check the Routing table of the Router R2 after enabling RIP.
R2#sh ip route
Lab # 8 (i)
Routing Protocols
(RIP Configuration)
Objective
Understanding the Dynamic Routing table Updates using the Routing Protocol (RIP).
Diagram
IP Address 15.0.0.1 IP Address 15.0.0.2
Serial 0 Serial 0
Host A Host B
IP Address 10.0.0.1 IP Address 20.0.0.1
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the RIP protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Verifying the Routing protocols on the Router.
5. Check the routing table on both the routers after enabling the RIP on both sides.
6. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
20.0.0.0
Step 5(A): Check the Routing table of the Router R1 after enabling RIP.
R1#sh ip route
Step 5(B): Check the Routing table of the Router R2 after enabling RIP.
R2#sh ip route
Lab # 8 (ii)
Routing Protocols
(IGRP Configuration)
Objective
Understanding the dynamic Routing table using the Interior Gateway Routing Protocol
(IGRP).
Diagram
Host A Host B
IP Address 10.0.0.1 IP Address 20.0.0.1
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the IGRP protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Verifying the Routing protocols on the Router.
5. Check the routing table on both the routers after enabling the IGRP on both sides.
6. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
Redistributing: igrp 10
Routing for Networks:
10.0.0.0
15.0.0.0
Redistributing: igrp 10
Step 5(A): Check the Routing table of the Router R1 after enabling IGRP.
R1#sh ip route
Step 5(B): Check the Routing table of the Router R2 after enabling IGRP.
R2#sh ip route
Lab # 8 (iii)
Routing Protocols
(EIGRP Configuration)
Objective
Understanding the Routing Updates using the Dynamic Routing Protocol (EIGRP).
Diagram
Host A Host B
IP Address 10.0.0.1 IP Address 20.0.0.1
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the EIGRP protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Verifying the Routing protocols on the Router.
5. Check the routing table on both the routers after enabling the EIGRP on both
sides.
6. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
Redistributing: eigrp 10
Step 5(A): Check the Routing table of the Router R1 after enabling EIGRP.
R1#sh ip route
Step 5(B): Check the Routing table of the Router R2 after enabling EIGRP.
R2#sh ip route
Understanding the Routing Updates using the Open Shortest Path First (OSPF) in a single
area.
Lab # 8 (iv)
Routing Protocols
(OSPF)
Single Area Configuration
Objective
Understanding the Routing Updates process using the Open Shortest Path First (OSPF) in
a single area.
Diagram
WAN
IP Address IP Address
10.0.0.20 20.0.0.20
Ethernet 0 R1 R2 Ethernet 0
Host A Host B
IP Address 10.0.0.1 IP Address 20.0.0.1
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the OSPF protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Verifying the Routing protocols on the Router.
5. Check the routing table on both the routers after enabling the OSPF on both sides.
6. Verifying the OSPF neighbors on the routers.
7. Verifying the OSPF interfaces on the routers.
8. Verifying the OSPF database on the routers.
9. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
R1#sh ip route
Step 5(B): Check the Routing table of the Router R2 after enabling OSPF.
R2#sh ip route
Section 3
IP
Traffic
Management
Lab # 9
i. STANDARD ACL
• Standard IP lists (1-99) test conditions of all IP packets from source addresses.
• In this lab scenario, initially both the Hosts ’A’ & ‘B’ are accessing the Web &
Ftp services but then apply the Standard ACL so that the Host ‘A’ could not
access the Web & Ftp Services.
Diagram
FTP Server
WEB Server
IP Address
20.0.0.2
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the routing protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Check the routing table on both the routers after enabling the routing protocol on
both sides.
5. Make a web server & ftp server.
6. Verifying the access of web server & ftp server by the hosts A & B respectively.
7. Apply the Standard ACL on the router R1, so that Host A can not access these
services.
8. Verifying the Standard ACL by accessing the web & ftp server from Host A.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
Step 4(A): Check the Routing table of the Router R1 after enabling RIP.
R1#sh ip route
Step 4(B): Check the Routing table of the Router R2 after enabling RIP.
R2#sh ip route
Step 6(A): Verifying the Access of Web Server on Host ‘A’ by giving
( http://20.0.0.1 ) in the Address bar of Internet explorer.
Step 6(C): Verifying the Access of Web Server on Host ‘B’ by giving
( http://20.0.0.1 ) in the Address bar of Internet explorer.
Step 6(D): Verifying the Access of Ftp Server by the Host ‘B’ by giving
( ftp://20.0.0.1 ) in the Address bar of Internet explorer.
Step 7(A): Make the Standard ACL on the Router R1 so that Host A can not
accesses the Web & Ftp Server.
Step 7(B): Apply the Standard ACL on the Router (R1) Serial Interface.
R1(config)#interface serial 0
R1(config-if)#ip access-group 10 out
Step 8(A): Verifying the Standard ACL from Host ‘A’ by accessing Web Server.
(Host A won’t be accessing Web Server)
Step 8(B): Verifying the Standard ACL from Host ‘A’ by accessing FTP Server.
(Host A won’t be accessing FTP Server)
Step 8(C): Verifying the Standard ACL from Host ‘B’ by accessing Web Server.
(Host B will be accessing Web Server)
Step 8(D): Verifying the Standard ACL from Host ‘B’ by accessing FTP Server.
(Host B will be accessing FTP Server)
In this lab scenario, initially both the Hosts ’A’ & ‘B’ are accessing the Web & Ftp
services but then apply the Extended ACL in this way that Host ‘A’ can be access only
the web services & and Host ‘B’ could be access the Ftp Services only.
Diagram
FTP Server
WEB Server
IP Address
20.0.0.2
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the routing protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Check the routing table on both the routers after enabling the routing protocol on
both sides.
5. Make a web server & ftp server.
6. Verifying the access of web server & ftp server by the hosts A & B respectively.
7. Make & Apply the Extended ACL on the router R1, so that Host ‘A’ can not
access the Web services & Host ‘B’ can not access the Ftp services.
8. Verifying the ACL by accessing the Web & Ftp services from Host A & Host ‘B’.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
Step 4(A): Check the Routing table of the Router R1 after enabling RIP.
R1#sh ip route
Step 4(B): Check the Routing table of the Router R2 after enabling RIP.
R2#sh ip route
Step 6(A): Verifying the Access of Web Server on Host ‘A’ by giving
( http://20.0.0.1 ) in the Address bar of Internet explorer.
Step 6(B): Verifying the Access of Ftp Server by the Host ‘A’ by giving
( ftp://20.0.0.1 ) in the Address bar of Internet explorer.
Step 6(C): Verifying the Access of Web Server on Host ‘B’ by giving
( http://20.0.0.1 ) in the Address bar of Internet explorer.
Step 6(D): Verifying the Access of Ftp Server by the Host ‘B’ by giving
( ftp://20.0.0.1 ) in the Address bar of Internet explorer.
Step 7(A): Make the Extended ACL on the Router R1 so that Host A can not
access the Web Server & Host ‘B’ can not access the Ftp Server.
Step 7(B): Apply the Extended ACL on the Router (R1) Ethernet Interface.
R1(config)#interface Ethernet 0
R1(config-if)#ip access-group 110 in
Step 8(A): Verifying the Extended ACL from Host ‘A’ by accessing Web Server.
(Host A won’t be accessing Web Server)
Step 8(B): Verifying the Extended ACL from Host ‘A’ by accessing FTP Server.
Step 8(C): Verifying the Extended ACL from Host ‘B’ by accessing Web Server.
Step 8(D): Verifying the Extended ACL from Host ‘B’ by accessing FTP Server.
Lab # 10 (i)
i. STATIC NAT
In the Static NAT, we map the 1 Private IP Address to 1 reserved Public IP Address.
Diagram
Inside Global Outside Global
R1 R2
NAT
Translation Table Of
R1
10.0.0.1 15.0.0.11 FTP
10.0.0.2 15.0.0.12
WEB Server
IP Address
20.0.0.2
IP Address
20.0.0.1
Host A Host B
IP Address IP Address
10.0.0.1 10.0.0.2
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the routing protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Check the routing table on both the routers after enabling the routing protocol on
both sides.
5. Make web & FTP servers.
6. Establishes Static NAT Translation between an inside local address and an inside
global address.
7. Marks the interface as connected to the inside & outside networks.
8. Verifying the Standard Static NAT Translation by commands.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
Step 4(A): Check the Routing table of the Router R1 after enabling RIP.
R1#sh ip route
Step 4(B): Check the Routing table of the Router R2 after enabling RIP.
R2#sh ip route
R1(config)#int Ethernet 0
R1(config-if)#ip nat inside
R1(config)#int serial 0
R1(config-if)#ip nat outside
R1#debug ip nat
IP NAT debugging is on
Diagram
R1 R2
Dynamic NAT
Translation Table Of
R1
10.0.0.1-10.0.0.2 FTP
(15.0.0.41-15.0.0.45)
WEB Server
IP Address
20.0.0.2
IP Address
20.0.0.1
Host A Host B
IP Address IP Address
10.0.0.1 10.0.0.2
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the routing protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Check the routing table on both the routers after enabling the routing protocol on
both sides.
5. Make web & FTP servers.
6. Defines a pool of global addresses to be allocated as needed.
7. Defines a standard IP access list permitting those inside local addresses that are to
be translated.
8. Establishes dynamic source translation, specifying the access list defined in the
prior step.
9. Marks the interface as connected to the inside & outside networks.
10. Verifying the Standard Dynamic translation by commands.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
R2#sh ip route
Step 4(A): Check the Routing table of the Router R1 after enabling RIP.
R1#sh ip route
Step 4(B): Check the Routing table of the Router R2 after enabling RIP.
R2#sh ip route
2. Go to Start Button > All Programs > Administrative Tool > Internet Service
Manager
3. Right Click on the Computer name & goes to New tab > Web Site.
4. Follow the wizard and make the Web Server.
Step 7: Defines a standard IP access list permitting those inside local addresses
that are to be translated.
Step 8: Establishes dynamic source translation, specifying the access list defined
in the prior step.
R1(config)#int Ethernet 0
R1(config-if)#ip nat inside
R1(config)#int serial 0
R1(config-if)#ip nat outside
R1#debug ip nat
IP NAT debugging is on
Diagram
R1 R2
PAT Table Of
R1
10.0.0.1 = 15.0.0.200 + Dyn Port FTP
10.0.0.1 = 15.0.0.200 + Dyn Port
WEB Server
IP Address
20.0.0.2
IP Address
20.0.0.1
Host A Host B
IP Address IP Address
10.0.0.1 10.0.0.2
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the routing protocol on both routers so that hosts on the both routers can
communicate with each other.
4. Check the routing table on both the routers after enabling the routing protocol on
both sides.
5. Make web & FTP servers.
6. Defines a pool of global addresses to be allocated as needed.
7. Defines a standard IP access list permitting those inside local addresses that are to
be translated.
8. Establishes dynamic source translation, specifying the access list defined in the
prior step along with the keyword “overload”.
9. Marks the interface as connected to the inside & outside networks.
10. Verifying the Standard Dynamic translation by commands.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R1 as shown in figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of
Router R2 as shown in figure.
R2#sh ip route
Step 4(A): Check the Routing table of the Router R1 after enabling RIP.
R1#sh ip route
Step 4(B): Check the Routing table of the Router R2 after enabling RIP.
R2#sh ip route
2. Go to Start Button > All Programs > Administrative Tool > Internet Service
Manager
3. Right Click on the Computer name & goes to New tab > Web Site.
4. Follow the wizard and make the Web Server.
Step 7: Defines a standard IP access list permitting those inside local addresses
that are to be translated.
Step 8: Establishes dynamic source translation, specifying the access list defined
in the prior step.
R1(config)#int Ethernet 0
R1(config-if)#ip nat inside
R1#debug ip nat
IP NAT debugging is on
Section 4
Switching
Lab # 11
Diagram
SWA-2950
Console 0
Roll Over
Cable
Configuration
Step 1: After connecting your PC to the Console Port.
Switch con0 is now available
Step 2: To Enter Into Privilege mode/Executive Mode From User Mode & Vice-
Versa.
Switch>enable
Switch#
Switch#disable
Switch>
Switch#config t
Switch(config)#
Switch(config)#hostname 2950-SWA
2950-SWA(config)#
Building configuration...
OR
2950-SWA#show flash:
Directory of flash: /
<Output Omitted>
<Output Omitted>
2950-SWA#show interfaces
OR
OR
Name: Fa0/1
Switchport: Enabled
OR
FastEthernet0/1
Model: WS-C2950-24
Type: 10/100BaseTX
Speed: 10,100,auto
Duplex: half,full,auto
Trunk encap. type: 802.1Q,ISL
Trunk mode: on,off,desirable,nonegotiate
Channel: yes
<Output Omitted>
Fa0/24 1-2
2950-SWA(config-if)#speed 100
2950-SWA(config-if)#duplex full
2950-SWA(config-if)#description Fast-Ethernet-Port-1
Switch(config-if)#cdp enable
Password:
2950-SWA>enable
The enable secret you have chosen is the same as your enable password.
This is not recommended. Re-enter the enable secret.
2950-SWA(config-line)#password cisco
2950-SWA(config-line)#login
Lab # 12
Diagram
SWA-2950 A SWA-2950 B
FastEthernet 0/24 FastEthernet 0/24
Console 0 Console 0
Procedure
1. Verifying the Spanning Tree Protocol on the 2950-SWA & 2950-SWB switches.
2. Changing Non Root Switch into Root Switch By Decreasing the priority.
3. Verifying the Spanning Tree Protocol on the 2950-SWA & 2950-SWB switches
after changing priority.
4. Select Root Port on (Non-Root Switch) by Changing Cost of Port.
5. Verifying the Spanning Tree Protocol on the 2950-SWA & 2950-SWB switches
after changing Cost of Port.
Configuration
Step 1(A): Verifying the Spanning Tree Protocol on the 2950-SWA switch.
2950-SWA#show spanning-tree
OR
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0012.43a0.b840
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Step 1(B): Verifying the detailed information of Spanning Tree Protocol on the
2950-SWA switch.
OR
Step 2(A): Verifying the Spanning Tree Protocol on the 2950-SWB switch.
2950-SWB#show spanning-tree
OR
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0012.43a0.b840
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Step 2(B): Verifying the detailed information of Spanning Tree Protocol on the
2950-SWB switch.
OR
Step 3: Changing Non Root Switch into Root Switch By decreasing the priority
on 2950-SWB (Non-Root-Switch)
Step 4(A): Verifying the Spanning Tree Protocol on the 2950-SWB switch after
Changing priority on 2950-SWB
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 4097
Address 0012.43a0.b940
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Step 4(B): Verifying the Spanning Tree Protocol on the 2950-SWA switch after
Changing priority on 2950-SWB
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 4097
Address 0012.43a0.b940
Cost 19
Port 23 (FastEthernet0/23)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Step 6: Verifying the Spanning Tree Protocol on the 2950-SWA switch after
Changing Cost of Port.
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 4097
Address 0012.43a0.b940
Cost 18
Port 24 (FastEthernet0/24)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Step 6: Verifying the Spanning Tree Protocol on the 2950-SWB switch after
Changing Cost of Port.
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 4097
Address 0012.43a0.b940
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Lab # 13
VLAN
&
VLAN Trunking Protocol
Objective
Understanding the VLAN operation in switched environment. The major concerns are,
1. To make Vlan’s on 2950 switches & Vlan membership assignments to the ports.
2. VLAN Trunking Protocol (VTP).
i. VLAN
Diagram
VTP Domain
SWA-2950 SWA-2950
Host A Host B
IP Address: 10.0.0.1 IP Address: 10.0.0.2
MAC: 00.01.02.62.fc.3b MAC: 02.00.01.e1.db.2c
Procedure
1. Connecting PC with 2950 switches and verified by Commands.
2. Display the results that all ports are the members of the native VLAN.
3. Create a VLAN # 2 on 2950 Switch.
4. Assign a VLAN Member-ship for a Port on 2950 Switch.
5. Verification of VLAN # 2.
Configuration
Step 1(A): Connecting PC with 2950 switch and verified by the Interface
Command.
Full-duplex, 100Mb/s
<Output Omitted>
Step 1(B): Connecting PC with 2950 switch and verified by the MAC Address
Table Command.
OR
2950-SWA#show vlan id 1
VLAN 2 added:
Name: cttc
2950-SWA(vlan)#exit
APPLY completed.
Exiting....
2950-SWA#sh vlan id 2
Diagram
VTP Domain
VTP Mode: SERVER VTP Mode: Client
IP Address: 10.0.0.10 IP Address: 10.0.0.2
MAC: 0012.43a0.b840 MAC: 0012.43a0.b940
Host A Host B
IP Address: 10.0.0.1 IP Address: 10.0.0.2
MAC: 00.01.02.62.fc.3b MAC: 02.00.01.e1.db.2c
Procedure
1. Make a VTP domain CISCO on switches.
2. Make a VTP server to 2950-SWA and client to 2950-SWB.
3. Enable a Trunking on the fastEthernet ports 0/24 that connects both switches.
Configuration
VTP Version :2
Configuration Revision :3
Maximum VLANs supported locally : 1005
VTP Version :2
Configuration Revision :3
Maximum VLANs supported locally : 250
2950-SWA(config)#vlan 25
2950-SWA(config-vlan)#vlan 50
2950-SWA(config-vlan)#vlan 75
2950-SWA(config-vlan)#vlan 100
Step 6(A): Verifying the VTP Status on 2950-SWA switch after triggered update.
2950-SWA#sh vtp status
VTP Version :2
Configuration Revision :7
Maximum VLANs supported locally : 1005
Step 6(B): Verifying the VTP Status on 2950-SWB switch after triggered update.
2950-SWB#sh vtp status
VTP Version :2
Configuration Revision :7
Maximum VLANs supported locally : 250
2950-SWA#show vlan
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
-------- ------ ---------- ----- ------- --------- ---------- ---- ------------- ------- -------
1 enet 100001 1500 - - - - - 0 0
2 enet 100002 1500 - - - - - 0 0
25 enet 100025 1500 - - - - - 0 0
50 enet 100050 1500 - - - - - 0 0
75 enet 100075 1500 - - - - - 0 0
100 enet 100100 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
<Output Omitted>
2950-SWB#show vlan
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
-------- ------ ---------- ----- ------- --------- ---------- ---- ------------- ------- -------
1 enet 100001 1500 - - - - - 0 0
2 enet 100002 1500 - - - - - 0 0
25 enet 100025 1500 - - - - - 0 0
50 enet 100050 1500 - - - - - 0 0
75 enet 100075 1500 - - - - - 0 0
100 enet 100100 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - srb 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
<Output Omitted>
Section 5
WAN
Lab # 14
FRAME RELAY
Objective
To establish a Frame Relay PVC connection.
o Frame Relay is a standard that defines the process for sending data over a
public data network.
o Frame Relay is a connection-oriented data link technology that is
streamlined to provide high performance & efficiency.
o Frame Relay connections operate over virtual circuits.
Diagram
Frame Relay
Network
Serial 0 Serial 1
DCE DCE
R1 DLCI=102 DLCI=201
R2
IP Address 15.0.0.1 IP Address 15.0.0.2
Serial 0 Serial 0
DTE DTE
Procedure
1. Configuring the FR Switch.
2. Configuring & Assigning the IP addresses to the FR Clients (R1 & R2).
3. Verifying the Frame Relay Operation by commands.
4. Verifying the connectivity of both FR Clients.
Configuration
FR-SWITCH(config)#int s0
FR-SWITCH(config-if)#no ip address
FR-SWITCH(config-if)#no shutdown
FR-SWITCH(config-if)#encapsulation frame-relay
FR-SWITCH(config-if)#frame-relay intf-type dce
FR-SWITCH(config-if)#clock rate 64000
FR-SWITCH(config-if)#frame-relay route 102 int s1 201
FR-SWITCH(config)#int s1
FR-SWITCH(config-if)#no ip address
FR-SWITCH(config-if)#no shutdown
FR-SWITCH(config-if)#encapsulation frame-relay
FR-SWITCH(config-if)#frame-relay intf-type dce
FR-SWITCH(config-if)#clock rate 64000
FR-SWITCH(config-if)#frame-relay route 201 int s0 102
FR Client
The show frame-relay pvc command displays the status of each configured connection,
as well as traffic statistics.
The show frame-relay map command displays the DLCI-protocol address map entries,
as well as information about the connection.
FR Switch
The show frame-relay route command displays the status of each configured virtual
circuit connection, as well as their status and route to other interface.
Lab # 15
PPP
AUTHENTICATION
CHAP
Objective
Understanding the PPP Encapsulation by using CHAP Authenticaion.
Diagram
WAN
R1 R2
Procedure
1. Change the Hostname of Routers as it is in Diagram.
2. Configuring & Assigning the IP addresses on the routers R1 & R2.
3. Change the encapsulation & Configure CHAP Authentication on both
Routers.
4. Verifying the CHAP Authentication on both Routers.
Configuration
Step 1(A): Change the Hostname to R1 & Assign the IP addresses on the Serial
Interface of Router R1 as shown in figure.
Step 1(B): Change the Hostname to R2 & Assign the IP addresses on the Serial
Interface of Router R2 as shown in figure.
Section 6
Voice
Lab # 16
Objective
Establishing voip call over internet using IP Phones, ATAs, & Soft Phone.
Diagram
IP Address IP Address
15.0.0.1 15.0.0.2
Serial 0 Serial 0
Client 2 Client 2
Analog Phone With Analog Phone With
ATA ATA
IP Address IP Address
10.0.0.2 20.0.0.2
Client 1 Client 1
IP Address IP Address
10.0.0.1 20.0.0.1
Step 1: Assign the IP Addresses and Subnet masks to Serial and Ethernet
Interfaces of both Routers as defined in the above figure.
Step 3: Assign the IP Address, Subnet mask, & Gateway on Client #1 IP Phone in
the 10.0.0.0 network.
• On the phone dial pad, press the setup button (under envelop button).
• Using the 4-way navigation button, scroll down to “Network” and press the Left
Soft Key labeled ‘Select’.
• Set the ip address of the phone to10.0.0.1 &subnet mask to 255.0.0.0
• Set the gateway of the phone to 10.0.0.10
Step 4: Assign the IP Address , Subnet mask, & Gateway (Router’s Ethernet IP
Address) on Client #2 ATA by IVR in the 10.0.0.0 network.
• Press the star key four times ( * * * * ) on the dial pad of analog phone to enter
in the IVR Menu.
• Set the IP Address by pressing ( 111# ) to 10.0.0.2. For dots in ip address use the
star (*) key.
• Set the subnet mask by pressing ( 121# ) to 255.0.0.0. For dots use the star (*)
key.
• Set the Gateway to 10.0.0.10 by pressing ( 131# ). For dots use the star (*) key.
• Check the IP Address by pressing ( 110# ).
• Check the Subnet mask by pressing ( 120# ).
• Check the Gateway by pressing ( 130# ).
Step 5: Assign the IP Address, Subnet mask, & Gateway on Client #1 IP Phone in
the 20.0.0.0 network.
• On the phone dial pad, press the setup button (under envelop button).
• Using the 4-way navigation button, scroll down to “Network” and press the Left
Soft Key labeled ‘Select’.
• Set the ip address of the phone to20.0.0.1 &subnet mask to 255.0.0.0
• Set the gateway of the phone to 20.0.0.10
Step 6: Assign the IP Address , Subnet mask, & Gateway (Router’s Ethernet ip
address) on Client #2 ATA by IVR in the 20.0.0.0 network.
• Press the star key four times ( * * * * ) on the dial pad of analog phone to enter
in the IVR Menu.
• Set the IP Address by pressing ( 111# ) to 20.0.0.2. For dots in ip address use the
star (*) key.
• Set the subnet mask by pressing ( 121# ) to 255.0.0.0. For dots use the star (*)
key.
• Set the Gateway to 20.0.0.10 by pressing ( 131# ). For dots use the star (*) key.
• Check the IP Address by pressing ( 110# ).
• Check the Subnet mask by pressing ( 120# ).
• Check the Gateway by pressing ( 130# ).
Section 7
Wireless
Lab # 17 (i)
WIRELESS NETWORK
Objective
i. Connect Wireless Clients by using Access Point.
ii. Connect Wireless Clients without Access Point.
Diagram
i. WIRELESS INFRASTRUCTURE
Wired
Client
Wireless
192.168.1.4 Access Point
192.168.1.1
Wireless
Client
192.168.1.2 192.168.1.3
At Machine 192.168.1.4:
At Client 192.168.1.2:
Lab # 17 (ii)
Wireless
Adhoc-Mode
192.168.1.2 192.168.1.3
Wireless
Peer-to-Peer
Client
At Client 192.168.1.2:
Go to the Internet Explorer and type other machine’s ip now both machines
communicates in the Ad-hoc mode or you can ping from the command prompt by just
going into the command prompt and type ‘ping other machine’s ip’.
Section 8
Appendix
Lab # 18
Password Recovery
Objective
This lab demonstrates how to recover the password of 2500 series Routers. Password
Recovery procedure allows you to regain administrative control over the device.
Diagram
Router
Console 0
Roll Over Cable
Procedure
1. Attach a PC with terminal emulation software to the Router’s Console port.
2. Turn off the Router, and turn it on and press the Break Key on the PC within 60
seconds of turning on the Router.
3. Enter the command to By-Pass the NVRAM on the > prompt and initialize the
Router by command.
4. Enter no in response to the System Configuration dialog prompts.
5. Enter into the Router and copy the configuration from the NVRAM, change the
password & change the value of the configuration register & save the
configuration into NVRAM again and reload the Router.
Configuration
Step 1: Attach a PC with terminal emulation software to the Router’s Console
Port.
The configuration register value is 0x2102 by-default. It’s mean that whenever the Router
boots, it will read the contents of the NVRAM. So, we need to by-pass the NVRAM at
the time of startup for the password recovery.
Step 2: Turn off the Router, and turn it on and press the Break Key on the PC
within 60 seconds of turning on the Router.
The > prompt with no Router name appears at the Router screen.
Step 3: Enter the command to By-Pass the NVRAM on the > prompt and
initialize the Router by command.
Step 4: Enter no in response to the System Configuration dialog prompts until the
following message appears.
Step 5: Enter into the Router and copy the configuration from the NVRAM,
change the password & change the value of the configuration register &
save the configuration into NVRAM again and reload the Router.
Lab # 19
TFTP Server
Objective
This lab demonstrates how you can backup your configuration as well as upload your
configuration.
Procedure
1. Make a TFTP Server to Host ‘A’.
2. Verification of connectivity of PC & Router by ping command.
3. Upload the NVRAM Configuration into TFTP Server.
4. Verifying the uploaded configuration from the TFTP Server.
Configuration
Step 1: Make a TFTP Server to Host ‘A’.
Diagram
Procedure
1. Make a TFTP Server to Host ‘A’.
2. Remove the Configuration from the NVRAM and reload the Router.
3. Give the IP Address to the Router.
4. Verification of connectivity of PC & Router by ping command.
5. Download the NVRAM Configuration from the TFTP Server.
6. Verifying the uploaded configuration from the TFTP Server.
Configuration
Step 1: Make a TFTP Server to Host ‘A’.
Step 2: Remove the Configuration from the NVRAM & reload the Router.
R1#write erase
[OK]
R1#reload
Step 6(B): Verifying the uploaded configuration from the TFTP Server.