Cisco Intern PB

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

ADVANCING NETWORKING SKILLS THROUGH A VIRTUAL

INTERNSHIP WITH CISCO


Submitted to

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA BHOPAL (M.P)

INTERNSHIP REPORT

Submitted by

Pranjal Barnwal [0103IT211138]

Submitted to

Dr. Pushpendra Singh Tomar

Associate Professor

Department of Information Technology

Lakshmi Narain College of Technology, Bhopal (M.P.)

Session 2024-25
Certificate of Internship
LAKSHMI NARAIN COLLEGE OF TECHNOLOGY, BHOPAL

DEPARTMENT OF INFORMATION TECHNOLOGY

ACKNOWLEDGEMENT

Pranjal Barnwal (0103IT211138) would like to convey my gratitude to the Head of the department, In the
duration of July-Nov 2024 Summer Internship Program and giving me the platform to interact with
industry professionals.

I would also like to thank Marcella O’ Shea (Regional Manager APJC), CISCO

for giving me the opportunity to work on the industry.

I extend my warm gratitude and regards to everyone who helped me during my internship.

(Signature)

Pranjal Barnwal [0103IT211138]


lOMoAR cPSD| 9083663

Abstract
This report is to give a complete glance of four weeks of virtual industrial training that
had undergone at Cisco Network academy. I learnt a lot from this Industrial Training via
the Cisco Netacad portal and had a great learning experience as trainee in this firm. I
learnt a lot about how different networks are controlled in the industry or any department
with the help of networking processes, under the course CCSK v4.1 Foundation
Training:
Introduction to Cybersecurity, Cybersecurity Essentials, Introduction to Packet Tracer

I have learnt about different types of servers like DHCP Server, and DNS Server. In
today’s world computer has become an integral part of the business sector for
professional activities not only for professional activities but for personal activities also.

Computer Network is an interconnection between computers or we can say computer


network is group of computers linked to each other which enables one computer to
communicate with another computer. Computer networking is an interesting and
growing career. Organizations across industries require computer networking
professionals to develop, troubleshoot and protect their critical computer systems. Plus,
computer networking offers a wide range of potential career opportunities for those who
enjoy technology.
lOMoAR cPSD| 9083663

List of Figures

Figure Page No.

2.2.1 Interface of Cisco Packet Tracer (logical mode) 5

2.2.2 Cisco Packet Tracer (Physical Mode) 5

2.3.1 OSI reference model 7

2.3.2 TCP/IP model 8

2.3.3 Catalyst Switch 9

2.3.4 Basic switch configuration in packet tracer 9

2.3.5 Router 11

2.3.6 Router Basic Configuration 11

3.1.1 Mini Project Network Simulation 15


lOMoAR cPSD| 9083663

Abbreviations

CCNA - Cisco Certified Network Associate


LAN - Local Area Network

MAN - Metropolitan Area Network

WAN - Wide Area Network

DHCP - Dynamic Host Configuration Protocol

DNS - Domain Name System

CLI - Command Line Interface

MAC - Media Access Control


IP - Internet Protocol
lOMoAR cPSD| 9083663

Table Of Contents

Title Page No.

Cover Page i

Certificate of Internship ii

Abstract iii

List of Figures iv

Abbreviations v

1. Introduction 1

1.1 Organization Profile 1

1.2 Industrial Training through Cisco Networking Academy 1

2. Description 3

2.1 Outcomes of Industrial Training 3

2.2 Cisco Packet Tracer 4

2.3 Switching Concepts, VLANs, and Inter VLAN Routing 6

2.4 Available and Reliable Networks 12

2.5 L2 Security and WLANs 12

2.6 Routing Concepts and Configuration 13

3. Mini Project 15

4. Conclusion 17

5. References 18
1. INTRODUCTION

1.1 Organization Profile

Cisco Systems, Inc., commonly known as cisco an American based multinational digital
communications technology conglomerate corporation headquartered in San Jose, California.
Cisco Systems was developed in December 1984 by Leonard Bosack and Sandy Lerner. They
pioneered the concept of Local Area Network being used to connect distant computers over a
multiprotocol router system. Cisco develops, manufactures, and sells networking hardware,
software, telecommunications equipment and other high technology services and products. Cisco
specializes in specific tech markets, such as Internet of Things (IoT), domain security,
videoconferencing, an energy management with leading products including Webex, OpenDNS,
Jabber, Duo Security and Jasper. Cisco is one of the largest technology companies in the world
ranking 74 on the Fortune 100 with over $51 billion in revenue.

Cisco also provides training for certifications via portal called the Cisco Networking Academy.
Cisco is involved with technical education in 180 countries with its Cisco Academy program. The
cisco Learning network is a social learning community on the IT industry with a mission to provide
learning tools, training resources, and industry guidance to anyone interested in building an IT
career through Cisco certifications. The certification preparation materials offered on the Cisco
Learning Network do not constitute a complete self-study program but are supplemental materials
to enhance core learning programs.

1.2 Industrial Training through Cisco Networking Academy

NetAcad programs are designed with lots of hands-on activities and that is one thing which attracts
students to the program. Cisco Networking Academy is a global platform which can be used to
inspire students and instructors to make their future brighter. Cisco Networking Academy courses
are designed to prepare you for Cisco Certification and other industry recognized certification
exams. Cisco Networking Academy transforms the lives of learners, educators and communities

1
through the power of technology, education and career opportunities. Available to anyone,
anywhere. The link is: https://www.netacad.com/.

The CCNA which stands for Cisco Certified Network Associate is an entry-level information
technology (IT) certification issued by networking hardware company Cisco. The CCNA is
designed to validate your knowledge on fundamental networking concepts often requested in
networking roles in IT positions.

2
2. DESCRIPTION

2.1 Outcomes of Industrial Training

The outcomes of this course Switching, Routing, and Wireless Essentials (SRWE) in CCNA
curriculum series is to focuses on switching technologies and router operations that support small
to-medium business networks and includes wireless local area networks (WLAN) and security
concepts. In addition to learning, key switching and routing concepts, learners will be able to
perform basic network configuration and troubleshooting, identify and mitigate LAN security
threats, and configure and secure a basic WLAN.

These training will assist in developing the skills necessary to do the following,

• Configure devices using security best practices.

• Explain how Layer 2 switches forward data.

• Implement VLANs and trunking in a switched network.

• Troubleshoot inter-VLAN routing on Layer 3 devices.

• Explain how STP enables redundancy in a layer 2 network.

• Troubleshoot EtherChannel on switched networks.

• Implement DHCPv4 to operate across multiple LANs.

• Configure dynamic address allocation in IPv6 networks.

• Explain how FHRPs provide default gateway services in a redundant network.

• Explain how vulnerabilities compromise LAN security.

• Configure switch security to mitigate LAN attacks.

• Explain how WLANs enable network connectivity.

• Implement a WLAN using a wireless router and a WLC.

• Explain how routers use information in packets to make forwarding decisions.

3
• Configure IPv4 and IPv6 static routes.

• Troubleshoot static and default routes.

2.2 Cisco Packet Tracer

Cisco Packet Tracer as the name suggests, is a tool built by Cisco. This tool provides a network
simulation to practice simple and complex networks. The main purpose of Cisco Packet Tracer is
to help students learn the principles of networking with hands-on experience as well as develop
Cisco technology specific skills. Since the protocols are implemented in software only method,
this tool cannot replace the hardware Routers or Switches. Interestingly, this tool does not only
include Cisco products but also many more networking devices.

Using this tool is widely encouraged as it is part of the curriculum like CCNA, CCENT where
Faculties use Packet Trace to demonstrate technical concepts and networking systems. Students’
complete assignments using this tool, working on their own or in teams.

Engineers prefer to test any protocols on Cisco Packet Tracer before implementing them. Also,
Engineers who would like to deploy any change in the production network prefer to use Cisco
Packet Tracer to first test the required changes and proceed to deploy if and only if everything is
working as expected.

This makes the job easier for Engineers allowing them to add or remove simulated network
devices, with a Command line interface and a drag and drop user interface. You can download the
tool from https://www.netacad.com by clicking on the Packet Tracer graphic and selecting the
appropriate OS package, then you are good to play with it.

4
Fig. 2.2.1 Interface of Cisco Packet Tracer (logical mode)

Fig. 2.2.2 Cisco Packet Tracer (Physical Mode)

5
Workspace:

• Logical – Logical workspace shows the logical network topology of the network the user
has built. It represents the placing, connecting and clustering virtual network devices.

• Physical –Physical workspace shows the graphical physical dimension of the logical
network. It depicts the scale and placement in how network devices such as routers,
switches and hosts would look in a real environment. It also provides geographical
representation of networks, including multiple buildings, cities and wiring closets.

Key Features:

• Unlimited devices
• E-learning
• Customize single/multi user activities
• Interactive Environment
• Visualizing Networks
• Real-time mode and Simulation mode
• Self-paced
• Supports majority of networking protocols
• International language support
• Cross platform compatibility

2.3 Switching Concepts, VLANs, and Inter VLAN Routing

In this week, through this module I learnt about basic device configuration such as
switches, routers. And, also introduced with Cisco Packet Tracer through the lab-1: Packet tracer
exploration of physical and logical mode. I learnt about some networking related topics such as,
OSI reference model, TCP/IP model.

6
Fig. 2.3.1 OSI reference model

The Open Systems Interconnection model (OSI model) is a conceptual model that describes how
data is transmitted from one system to another system irrespective of distance and location. It
consists of seven-layer architecture. All seven layers contribute to the transmission of data from
one system to another system.

The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI
7layer model is still widely used, as it helps visualize and communicate how networks operate,
and helps isolate and troubleshoot networking problems.

OSI was introduced in 1983 by representatives of the major computer and telecom companies, and
was adopted by ISO as an international standard in 1984.

The OSI Model we just looked at is just a reference/logical model. It was designed to describe the
functions of the communication system by dividing the communication procedure into smaller and
simpler components. But when we talk about the TCP/IP model, it was designed and developed

7
by Department of Defence (DoD) in 1960s and is based on standard protocols. It stands for
Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the
OSI model. It contains four layers, unlike seven layers in the OSI model.

Fig. 2.3.2 TCP/IP Protocol

Cisco 2960 catalyst Switch:

Cisco Catalyst 2960 Series Intelligent Ethernet switches are a new family of fixed configuration
standalone devices that provide desktop 10/100 Fast Ethernet and 10/100/1000 Gigabit Ethernet
connectivity, enabling enhanced LAN services for entry-level enterprise, midmarket, and branch
office networks. The Cisco Catalyst 2960 Series offers integrated security, including network
admission control (NAC), advanced quality of service (QoS), and resiliency to deliver intelligent
services for the network edge.

8
Fig. 2.3.3 Catalyst switch

Basic Switch configuration:

I learnt about the basic switch configuration in packet tracer,

• Create a basic switch configuration, including a name and an IP address


• Configure passwords to ensure that access to the CLI is secured
• Configure switch port speed and duplex properties for an interface
• Configure basic switch port security
• Assign static MAC addresses
• Add and remove hosts on a switch

Fig. 2.3.4 Basic switch configuration in packet tracer

9
1. Cable a network that is similar to the one in the topology diagram. Create a console
connection to the switch.
2. You can access all the switch commands in privileged mode. However, because many of
the privileged commands configure operating parameters, privileged access should be
password-protected to prevent unauthorized use.
3. The privileged EXEC command set includes those commands contained in user EXEC
mode, as well as the configure command through which access to the remaining command
modes are gained.
4. Then, rename the switch name and assign the Ip address and MAC address by entering the
EXEC mode and global mode by using the CLI of the computer that is connected through
console connection.
5. We can enable SSH service in the switch also.

Cisco Router:

Cisco 1941 builds on the best-in-class offering of the existing Cisco 1841 Integrated Services
Routers by offering 2 models - Cisco 1941 and Cisco 1941W. In addition to the support of a wide
range of wireless and wired connectivity options supported on Cisco 1941 Series, Cisco 1941W
offers integration of IEEE 802.11n access point which is backwards compatible with IEEE
802.11a/b/g access points.

All Cisco 1900 Series Integrated Services Routers offer embedded hardware encryption
acceleration, optional firewall, intrusion prevention, and application services.

10
Fig. 2.3.5 Router

Routing is always associated with the network layer, layer 3, of the Open Systems Interconnection
(OSI) model, and the internet layer of the TCP/IP model. When you see the terms “router” or “layer
3” associated with a device from another layer, such as a switch, it is because the manufacturer has
built routing capabilities into a layer 2 device, forming a multifunction product.

The basic configuration of router is quite similar to switch configuration,

Fig. 2.3.6 Router basic configuration

11
2.4 Available and Reliable Networks

As the systems grow in size and complexity, they become more prone to failures and it becomes
essential to ensure their performance by carrying out reliability analysis. Here, the word system
connotes any assemblage of functional units and may be used to denote a complete installation or
equipment. A system may be quite gigantic such as computer communication networks or it could
be as small as an integrated circuitry.

The problem of determining the reliability of systems, whose components can have one or more
failure modes, often arises in variety of applications, ranging from telecommunication,
transportation, power systems, and mechanical systems to integrated circuits and computer
communication systems or large software structure. Therefore, all such systems can naturally be
expressed as in the form of a network, arising from the interconnections of various system
subdivisions. For instance, a telecommunication or a computer communication network may have
vertices representing the physical locations of computers or transmitters/receivers and may have
several edges representing the communication links between different sites. Depending on whether
vertices or edges work or fail, the network itself can be considered to be either working or failed.

2.5 L2 Security and WLANs

The data link layer (Layer 2) in IP over Ethernet networks is prone to several attacks since
the Layer 2 security has not been adequately addressed yet. Three most commonly known Layer
2 sniffing attacks are ARP poisoning, MAC flooding, and port stealing.

ARP is a network layer protocol used to map an IP address to a physical machine address
recognizable in the local network, such as an Ethernet address. When a host machine wishes to
find a physical address for an IP address, it broadcasts an ARP request, which includes the IP
address, on to the network. The host that owns the IP address sends an ARP reply message with its
physical address. Each host machine maintains a table, called ARP cache, used to convert IP
addresses to MAC addresses. Since ARP is a stateless protocol, every time a host gets an ARP
reply from another host, even though it has not sent an ARP request for that reply, it accepts that

12
ARP entry and updates its ARP cache. The process of updating a target host’s ARP cache with a
forged entry is referred to as poisoning.

The IEEE 802.11 (wireless LAN medium access control (MAC) and physical layer (PHY)
specifications) defines an optional Wired Equivalent Privacy (WEP) protocol, which is based on a
stream cipher RC4 encryption algorithm. The objective of the WEP in wireless networks was to
provide comparable confidentiality to a traditional wired network.

To improve security in wireless LANs, the IEEE 802.11i, an amendment of MAC security
enhancements for the IEEE 802.11 standard, was ratified in 2004. The IEEE 802.11i, also known
as Wi-Fi Protected Access 2 (WPA2), introduces a new security architecture called Robust Security
Network (RSN). In this amendment, the proposed improvements to the 802.11 architecture focus
on two areas: the IEEE 802.1X standard (EAPOL) and Advanced 40 Encryption Standard (AES),
for access control and encryption, respectively. The subset of the RSN architecture is also called
WPA.

2.6 Routing Concepts and Configuration

A routing protocol specifies how routers communicate with each other, disseminating information
that enables them to select routes between any two nodes on a computer network, the choice of the
route being done by routing algorithms. Each router has a priori knowledge only of networks
attached to it directly. A routing protocol shares this information first among immediate neighbors,
and then throughout the network. This way, routers gain knowledge of the topology of the network.
The term routing protocol may refer specifically to one operating at layer three of the OSI model,
which similarly disseminates topology information between routers. Although there are many
types of routing protocols, three major classes are in widespread use on IP networks:

• Interior gateway routing via link state routing protocols, such as OSPF and IS-IS

• Interior gateway routing via path vector or distance vector protocols, such as IGRP and
EIGRP

13
• Exterior gateway routing. BGP v4 is the routing protocol used by the public Internet.

It includes the following topics –

• Connected and Static Routes


• Default Routes and their configuration
• Routing Protocol IGP and EGP and algorithms
• Auto summarization and Manual Summarization Classless and Classful Routing Protocols
and Convergence

• Basic concepts configuring and verifying RIP 2


• Different metrics used and the show Ip route command
• Administrative Distance
• Debug command and RIP

14
3. MINI PROJECT

As a part of skill development through CCNA, I did a mini project on Port Security. A growing
challenge for network administrators is to be able to control who is allowed - and who isn't - to
access the organization's internal network. This access control is mandatory for critical
infrastructure protection in your network. It is not on public parts of the network where guest
users should be able to connect.

Port security is a feature implemented in Cisco Catalyst switches that helps network engineers in
implementing network security on network boundaries.

In its most basic form, the Port Security feature remembers the MAC address of the device
connected to the switch edge port and allows only that MAC address to be active on that port. If
any other MAC address is detected on that port, the port security feature shut down the switch
port.

The switch can be configured to send an SNMP trap to a network monitoring solution to alert that
a port is disabled for security reasons.

Fig. 3.1.1 Mini project network simulation

15
Interface Fast Ethernet 0/1 configuration - Restrict mode

The port-security restrict mode drops packets with unknown source addresses until you remove a
sufficient number of secure MAC addresses to drop below the maximum value and causes the
Security violation counter to increment.

Port security with sticky MAC addresses provides many of the same benefits as port security
with static MAC addresses, but sticky MAC addresses can be learned dynamically. Port security
with sticky MAC addresses retains dynamically learned MAC addresses during a link-down
condition.

When the rogue laptop is connected to the hub and tries to communicate with 192.168.1.4, the
number of mac-addresses learned on the fast Ethernet 0/1 interface exceeds 3. The interface
drops traffic with the new mac-address (not learned by the switch because 3 mac addresses have
already been registered on the fa0/1 interface) and increases the security violation counter based
on the 'restrict' port-security configuration of the interface.

Interface Fast Ethernet 0/2 configuration - Shutdown mode (default)


The port-security shutdown mode puts the interface into the error-disabled state immediately and
sends an SNMP trap notification.

Interface Fast Ethernet 0/3 configuration - Protect mode

The port-security protect mode silently drops packets with unknown source addresses until you
remove a sufficient number of secure MAC addresses to drop below the maximum value. No
counter is incremented.

16
4. CONCLUSION

In conclusion, I can infer that this Industrial Training helped me a lot to understand the essence of
networking, how actually end devices communicate, and how to configure network devices such
as switches, routers, servers, etc. I am able to understand the routing concepts such as RIP, EIGRP,
etc and the cisco packet tracer helps a lot to visualize the communication between networks
through CCNA v4.1: Switching, routing, and wireless networks. In the future, I could like to
explore more in computer networks to establish a strong career out of this industrial training.

17
5. REFERENCES

https://www.netacad.com/
https://www.cisco.com/c/en_in/index.html

18

You might also like