Escolar Documentos
Profissional Documentos
Cultura Documentos
CCNA
Developed by
M. Irfan Ghauri
M. Rizwan Khan
ESP Press
Copyrights 2009
LAB.
LABS DESCRIPTION
PAGE NO.
ROUTING
1
2
3
2
12
13
14
15
16
17
18
19
20
21
SWITCHING
6
7
8
9
23
34
35
36
WAN
10
11
PPP Authentication
Frame Relay
38
39
WIRELESS
12
13
Infrastructure Mode
AdHoc Mode
41
47
VoIP
14
IP Phones
51
Appendix
Lab # 1
Router
Console 0
Roll Over Cable
Host A
Configuration
Step 1: After connecting your PC to the Console Port.
Router con0 is now available
Press RETURN to get started.
Router>
Step 2: To Enter Into Privilege mode/Executive Mode From User Mode & ViceVersa.
Router>enable
Router#
Router#disable
Router>
Step 5(A): Set the System Clock, Date & Time on the Router
R1#clock set ?
hh:mm:ss Current Time
R1#clock set 6:30:45 ?
<1-31> Day of the month
MONTH Month of the year
R1#clock set 6:30:45 1 JAN ?
<1993-2035> Year
R1#clock set 6:30:45 1 JAN 2005
Step 5(B): Verify the System Clock, Date & Time on the Router
R1#show clock
06:32:33.527 UTC Sat Jan 1 2005
Step 6(A): Set the Message of the Day Banner on the Router.
R1(config)#banner motd # HELLO & WELCOME TO CISCO WORLD #
Step 6(B): Verify the Message of the Day Banner on the Router.
R1 con0 is now available
Press RETURN to get started.
HELLO & WELCOME TO CISCO WORLD
R1>
Step 16: Remove the Privileged Mode Password (Level 15) in clear form.
R1(config)#no enable password cisco
Step 17: Remove the Privileged Mode Secret Password (Level 15) in encrypted
form.
R1(config)#no enable secret cisco1
Router.
Interface
IP-Address
OK? Method
Status
Ethernet0
unassigned
Serial0
unassigned
Serial1
unassigned
Protocol
R1
2950-SWA
IP Address 10.0.0.10
Configuration
Host A
IP Address 10.0.0.1
R2
WAN
IP Address 15.0.0.1
Serial 0
DCE
IP Address 15.0.0.2
Serial 0
DTE
Configuration
Step 1: Assign the IP Address on the Serial Interface of the Router R1.
R1(config)#interface serial 0
R1(config-if)#ip address 15.0.0.1 255.0.0.0
R1(config-if)#no shutdown
R1(config-if)#clock rate 64000 (Clock Rate will set only DCE Interface)
R1(config-if)#end
Step 2: Assign the IP Address on the Serial Interface of the Router R2.
R2(config)#interface serial 0
R2(config-if)#ip address 15.0.0.2 255.0.0.0
R2(config-if)#no shutdown
R2(config-if)#end
Verifying Commands
Router#show ip interface brief
Router#show controllers serial 0
10
R1
R2
WAN
IP Address 15.0.0.1
Serial 0
DCE
IP Address 15.0.0.2
Serial 0
DTE
Configuration
Step 1: Check the Connectivity between 2 routers.
R1#ping 15.0.0.2
11
to Router R1.
R2#
Press [ Ctrl+Shift+6 and then x ]
R1#
(Note: And then Resume connection by just Enter Key.)
Verifying Command
Router#show line
Router#show users
Router#show sessions
12
Lab # 2
STATIC Routes
Diagram
IP Address 15.0.0.1
Serial 0
IP Address 10.0.0.20
Ethernet 0
IP Address 15.0.0.2
Serial 0
WAN
R1
Host A
IP Address 10.0.0.1
R2
Host B
IP Address 20.0.0.1
Configuration
Step 1: Configure the Static Route on the Router R1.
R1(config)#ip route 20.0.0.0 255.0.0.0 15.0.0.2
Step 2: Configure the Static Route on the Router R2.
R2(config)#ip route 10.0.0.0 255.0.0.0 15.0.0.1
Verifying Command
Router#show ip route
Router#show running-config
IP Address 20.0.0.20
Ethernet 0
13
Lab # 3 (i)
IP Address 10.0.0.20
Ethernet 0
IP Address 15.0.0.2
Serial 0
WAN
R1
Host A
IP Address 10.0.0.1
R2
Host B
IP Address 20.0.0.1
Configuration
Step 1: Enable the RIP protocol on the Router R1.
R1(config)#router rip
R1(config-router)#network 10.0.0.0
R1(config-router)#network 15.0.0.0
IP Address 20.0.0.20
Ethernet 0
14
Lab # 3 (ii)
IP Address 10.0.0.20
Ethernet 0
IP Address 15.0.0.2
Serial 0
WAN
R1
Host A
IP Address 10.0.0.1
R2
Host B
IP Address 20.0.0.1
Configuration
Step 1: Enable the IGRP protocol on the Router R1.
R1(config)#router igrp 10
R1(config-router)#network 10.0.0.0
R1(config-router)#network 15.0.0.0
IP Address 20.0.0.20
Ethernet 0
15
Lab # 3 (iii)
IP Address 10.0.0.20
Ethernet 0
IP Address 15.0.0.2
Serial 0
WAN
R1
R2
Host A
IP Address 10.0.0.1
IP Address 20.0.0.20
Ethernet 0
Host B
IP Address 20.0.0.1
Configuration
Step 1: Enable the EIGRP protocol on the Router R1.
R1(config)#router eigrp 64
R1(config-router)#network 10.0.0.0
R1(config-router)#network 15.0.0.0
Step 2: Enable the EIGRP protocol on the Router R2.
R2(config)#router eigrp 64
R2(config-router)#network 20.0.0.0
R2(config-router)#network 15.0.0.0
Verifying Command
Router#show ip protocols
Router#show ip route
Router#clear ip route *
16
Lab # 3 (iv)
IP Address 15.0.0.2
Serial 0
WAN
IP Address
10.0.0.20
Ethernet 0
R1
R2
Host A
IP Address 10.0.0.1
IP Address
20.0.0.20
Ethernet 0
Host B
IP Address 20.0.0.1
Configuration
Step 1: Enable the OSPF protocol on the Router R1.
R1(config)#router ospf 1
R1(config-router)#network 10.0.0.0 0.255.255.255 area 0
R1(config-router)#network 15.0.0.0 0.255.255.255 area 0
Verifying Commands
Router#show ip protocols
Router#show ip route
Router#clear ip route *
17
Lab # 4
IP Address 15.0.0.2
Serial 0
WAN
R1
R2
IP Address
20.0.0.20
Ethernet 0
FTP Server
WEB Server
IP Address
20.0.0.2
IP Address
20.0.0.1
Host A
IP Address
10.0.0.1
Host B
IP Address
10.0.0.2
Configuration
Step 1: Make the Standard ACL on router R1 such that Host A can not be
accessing the Web & Ftp Server.
R1(config)#access-list 10 deny host 10.0.0.1
R1(config)#access-list 10 permit any
R1(config)#interface serial 0
R1(config-if)#ip access-group 10 out
Verifying commands (Now Host A should not be accessing both Web & FTP
servers. However, Host B should be accessing both Web & FTP Servers)
R1#show access-lists
R1#show ip interface serial 0
18
IP Address 15.0.0.2
Serial 0
WAN
R1
R2
IP Address
20.0.0.20
Ethernet 0
FTP Server
WEB Server
IP Address
20.0.0.2
IP Address
20.0.0.1
Host A
IP Address
10.0.0.1
Host B
IP Address
10.0.0.2
Configuration
Step 1: Make the Extended ACL on router R1 such that Host A can not be
accessing the Web Server & Host B can not be accessing the Ftp Server.
R1(config)#access-list 110 deny tcp host 10.0.0.1 host 20.0.0.1 eq www
R1(config)#access-list 110 deny tcp host 10.0.0.2 host 20.0.0.2 eq ftp
R1(config)#access-list 110 permit ip any any
Verifying commands
R1#show access-lists
R1#show ip interface ethernet 0
19
Lab # 5
Outside Global
Inside Local
Outside Local
IP Address 15.0.0.1
Serial 0
IP Address 10.0.0.20
Ethernet 0
IP Address 15.0.0.2
Serial 0
WAN
R1
R2
IP Address 20.0.0.20
Ethernet 0
NAT
Translation Table Of
R1
10.0.0.1
15.0.0.11
10.0.0.2
15.0.0.12
FTP Server
WEB Server
Host A
IP Address
10.0.0.1
Host B
IP Address
10.0.0.2
IP Address
20.0.0.1
IP Address
20.0.0.2
Configuration
Step 1: Establishes Static NAT Translation between an inside local address
and an inside global address.
R1(config)#ip nat inside source static 10.0.0.1 15.0.0.11
R1(config)#ip nat inside source static 10.0.0.2 15.0.0.12
20
Verifying Command
R1#show ip nat translation
R1#debug ip nat
Outside Global
Inside Local
Outside Local
IP Address 15.0.0.1
Serial 0
IP Address 10.0.0.20
Ethernet 0
IP Address 15.0.0.2
Serial 0
WAN
R2
R1
IP Address 20.0.0.20
Ethernet 0
Dynamic NAT
Translation Table Of
R1
10.0.0.1-10.0.0.2
(15.0.0.41-15.0.0.45)
Host A
IP Address
10.0.0.1
Host B
IP Address
10.0.0.2
FTP Server
IP Address
20.0.0.2
WEB Server
IP Address
20.0.0.1
Configuration
Step 1: Defines a pool of global addresses to be allocated as needed.
R1(config)#ip nat pool abc 15.0.0.41 15.0.0.45 netmask 255.0.0.0
Step 2: Defines a standard IP access list permitting those inside local addresses
that are to be translated.
R1(config)#access-list 1 permit 10.0.0.0 0.255.255.255
Step 3: Establishes dynamic source translation, specifying the access list defined
in the prior step.
R1(config)#ip nat inside source list 1 pool abc
21
Verifying Command
R1#debug ip nat
R1#show ip nat translations
R1#clear ip nat translation *
Outside Global
Inside Local
Outside Local
IP Address 15.0.0.1
Serial 0
IP Address 10.0.0.20
Ethernet 0
IP Address 15.0.0.2
Serial 0
WAN
R2
R1
IP Address 20.0.0.20
Ethernet 0
PAT Table Of
R1
10.0.0.1 = 15.0.0.200 + Dyn Port
10.0.0.1 = 15.0.0.200 + Dyn Port
Host A
IP Address
10.0.0.1
Host B
IP Address
10.0.0.2
FTP Server
IP Address
20.0.0.2
WEB Server
IP Address
20.0.0.1
Configuration
Step 1: Defines a pool of global addresses to be allocated as needed.
R1(config)#ip nat pool abc 15.0.0.200 15.0.0.200 netmask 255.0.0.0
Step 2: Defines a standard IP access list permitting those inside local addresses
that are to be translated.
R1(config)#access-list 1 permit 10.0.0.0 0.255.255.255
22
Step 3: Establishes dynamic source translation, specifying the access list defined
in the prior step.
R1(config)#ip nat inside source list 1 pool abc overload
Verifying Command
R1#debug ip nat
R1#show ip nat translations
23
Lab # 6
Console 0
Roll Over
Cable
Configuration
Step 1: After connecting your PC to the Console Port.
Switch con0 is now available
Press RETURN to get started.
Switch>
(User Mode)
Step 2: To Enter Into Privilege mode/Executive Mode From User Mode & ViceVersa.
Switch>enable
Switch#
Switch#disable
Switch>
24
25
26
27
IP-Address
10.0.0.10
OK
Method
Status
Protocol
YES manual
up
down
FastEthernet0/1
unassigned
YES unset
down
down
FastEthernet0/2
unassigned
YES unset
down
down
FastEthernet0/23
unassigned
YES unset
down
down
unassigned
YES unset
down
down
<Output Omitted>
FastEthernet0/24
GigabitEthernet0/1
unassigned
YES unset
down
down
GigabitEthernet0/2
unassigned
YES unset
down
down
Port
Name
Fa0/2
28
Status
Type
notconnect 1
auto auto
10/100BaseTX
notconnect
notconnect
notconnect
notconnect
notconnect
auto
auto
auto
auto
auto
10/100BaseTX
10/100BaseTX
10/100BaseTX
unknown
unknown
<Output Omitted>
Fa0/22
Fa0/23
Fa0/24
Gi0/1
Gi0/2
1
1
1
1
1
auto
auto
auto
auto
auto
29
Name: Fa0/1
Switchport: Enabled
Administrative Mode: dynamic desirable
Operational Mode: static access
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
<Output Omitted>
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Appliance trust: none
WS-C2950-24
10/100BaseTX
10,100,auto
half,full,auto
802.1Q,ISL
on,off,desirable,nonegotiate
yes
Mode
desirable
Encapsulation
n-802.1q
Status
trunking
Native vlan
1
Fa0/24
desirable
30
n-802.1q
trunking
Port
Vlans allowed on trunk
Fa0/23
1-4094
Fa0/24
1-4094
Port
Vlans allowed and active in management domain
Fa0/23
1-2
Fa0/24
1-2
Port
Vlans in spanning tree forwarding state and not pruned
Fa0/23
1-2
Fa0/24
2
Ports
----Fa0/1
31
32
33
34
Lab # 7
Root Switch
Priority: 32768
Priority: 4096
2950-SWA
Con 0
Fa 0/24
Blocked Port
Fa 0/23
Root Port
Fa 0/24
Designated Port
Fa 0/23
Designated Port
Configuration
Step 1: Switch (2950-SWB)
Switch(config)#spanning-tree vlan 1 priority 4096
Verifying Commands
Switch#show spanning-tree vlan 1
2950-SWB
Con 0
35
Lab # 8
VLANs
Diagram
Switch
Con 0
Configuration
Step 1: Creating
Verifying Command
Switch#show vlan
36
Lab # 9
SWA-2950
SWB-2950
FastEthernet 0/24
FastEthernet 0/24
Con 0
Con 0
Configuration
Step 1: To set the VTP Domain CISCO on the switch.
Switch(config)#vtp domain CISCO
Changing VTP domain name from NULL to CISCO
Verifying Command
Switch# show vtp status
Switch#show vlan
37
38
Lab # 10
IP Address 15.0.0.1
Serial 0
IP Address 15.0.0.2
Serial 0
WAN
R1
R2
Configuration
Step 1(A): Change the Hostname to R1 & Assign the IP addresses on the Serial
Interface of Router R1 as shown in figure.
Step 1(B): Change the Hostname to R2 & Assign the IP addresses on the Serial
Interface of Router R2 as shown in figure.
Verifying Commands
Router#show interfaces serial 0
Router#debug ppp authentication
39
Lab # 11
FRAME RELAY-(Point-to-Point)
Diagram
Frame Relay Network
(FR Switch)
R1
Serial 0
DCE
Serial 1
DCE
DLCI=102
DLCI=201
IP Address 15.0.0.1
Serial 0
DTE
R2
IP Address 15.0.0.2
Serial 0
DTE
Frame Relay
Client
Configuration
Step 1: Configuring the FR switch.
FR-SWITCH(config)#frame-relay switching
FR-SWITCH(config)#int s0
FR-SWITCH(config-if)#no ip address
FR-SWITCH(config-if)#no shutdown
FR-SWITCH(config-if)#encapsulation frame-relay
FR-SWITCH(config-if)#frame-relay intf-type dce
FR-SWITCH(config-if)#clock rate 64000
FR-SWITCH(config-if)#frame-relay route 102 int s1 201
FR-SWITCH(config)#int s1
FR-SWITCH(config-if)#no ip address
FR-SWITCH(config-if)#no shutdown
FR-SWITCH(config-if)#encapsulation frame-relay
FR-SWITCH(config-if)#frame-relay intf-type dce
FR-SWITCH(config-if)#clock rate 64000
FR-SWITCH(config-if)#frame-relay route 201 int s0 102
Frame Relay
Client
Verifying Commands
FR Client
Router#show frame-relay pvc
Router#show frame-relay map
Router#show frame-relay lmi
FR Switch
Router#show frame-relay route
40
41
Lab # 12
WIRELESS NETWORK
i. Infrastructure Mode
Diagram
Wired Client
Wireless
Access Point
192.168.1.1
192.168.1.4
Wireless
Client
192.168.1.2
192.168.1.3
At Machine 192.168.1.4:
First configure the Access Point.
Go to the Internet Explorer and type http://192.168.1.1 in address bar.
42
43
At Client 192.168.1.2:
44
45
46
47
ii. Adhoc-Mode
Wireless
Adhoc-Mode
192.168.1.2
Wireless
Peer-to-Peer
Client
At Client 192.168.1.2:
Go to the LINKSYS G Wireless Utility at the task bar.
Press the configuration on the less side of LAN Monitor
Go to the Profile Tag & Follow the Wizard.
192.168.1.3
48
49
50
51
Lab # 13
IP PHONES
Diagram
IP Address
15.0.0.1
Serial 0
IP Address
15.0.0.2
Serial 0
WAN
IP Address
10.0.0.20
R1
IP Address
20.0.0.20
R2
Client 2
Analog Phone With
ATA
IP Address
10.0.0.2
Client 2
Analog Phone With
ATA
IP Address
20.0.0.2
Client 1
IP Address
10.0.0.1
Client 1
IP Address
20.0.0.1
52
Appendix
53
Network Fundamentals
Ethernet Cables
i. Straight-Through Cable
The straight-through cable is used to connect
1) Host to switch or hub
2) Router to switch or hub
Four wires are used in straight-through cable to connect Ethernet devices. It is relatively
simple to create ; Figure shows the four wires used in a straight-through Ethernet
cable.
Diagram
Straight-through Ethernet Cable
Hub/Switch
Host
1
2
3
6
1
2
3
6
Notice that only pins 1, 2, 3, and 6 are used. Just connect 1 to 1, 2 to 2, 3 to 3, and 6 to 6.
However, remember that this would be an Ethernet-only cable and wouldnt work with
Voice, Token Ring, ISDN, etc.
54
3) Host to host
4) Hub to switch
5) Router direct to host
The same four wires are used in this cable as in the straight-through cable; we just
connect different pins together. Figure shows how the four wires are used in a crossover
Ethernet cable.
Notice that instead of connecting 1 to 1, etc., here we connect pins 1 to 3 and 2 to 6 on
each side of the cable.
Diagram
Cross-over Ethernet Cable
Hub/Switch/Host
Hub/Switch/Host
1
2
3
1
2
3
6
55
Diagram
Rolled Ethernet Cable
Host
Router/Switch
1
2
3
4
5
6
7
8
1
2
3
4
5
6
7
8
To make, just cut the one side like a straight-through cable and reverse the other end.
Once you connect the cable from your PC to the Cisco router or switch, you can start
HyperTerminal to create a console connection and configure the device
56
Host A
IP Address: 10.0.0.1
MAC: 00.01.02.62.fc.3b
Host B
IP Address: 10.0.0.2
MAC: 02.00.01.e1.db.2c
Straight
Cable
Fast Ethernet 0/1
Host A
IP Address: 10.0.0.1
MAC: 00.01.02.62.fc.3b
Host B
IP Address: 10.0.0.2
MAC: 02.00.01.e1.db.2c
Procedure
1. Make sure that both NICs are installed onto your PCs.
2. Assign IP address to your LAN (NIC) card on both PCs.
Configuration
Step 1: Make sure that both NICs are installed onto your PCs.
Go to Windows Start Button > Settings > Control Panel
Then go to System
57
58
Note: - If LAN (NIC) card is not installed onto your PC then go to Windows Start
Button > Settings > Control Panel > Add/Remove Hardware.
59
60
61
62
63
64
65
Procedure
1. Open an Internet Information Service (IIS) from an Administrative tools and
Make a WEB Server.
2. Open an Internet Information Service (IIS) from an Administrative tools and
Make a FTP Server.
3. Verifying the WEB & FTP Derver from Host A.
Configuration
Step 1: Open an Internet Information Service (IIS) from an Administrative tools
& Make a WEB Server.
Go to Windows Start Button > Programs > Administrative Tools > Internet Services
Manager.
Then, Start IIS & Right Click on the Computer Name > New > Web Site
66
67
68
69
70
71
72
Check the Web Page by Right Click & Press the Browse.
73
74
Then, Start IIS & Right Click on the Computer Name > New > Ftp Site
75
76
77
78
Check the Ftp Site by Right Click on Ftp Server & Press the Browse.
79
Check the Ftp Site by Right Click on Ftp Server & Press the Browse.
80
81
82
Console 0
Roll Over
Cable
Host A
Switch
Console 0
Roll Over
Cable
Host B
Procedure
1. Open the Hyper Terminal Session From RUN by giving the command
hypertrm or from STRART Button -> Programs -> Accessories ->
Communications -> Hyper Terminal.
2. Give the Session name.
3. Define the connection type i-e., COM1.
Configuration
Step 1: Open the Hyper Terminal Session From RUN by giving the command
hypertrm or from START Button -> Programs -> Accessories ->
Communications -> Hyper Terminal.
83
84
COM Port.
85
86
87
Password Recovery
Diagram
Router
Console 0
Roll Over Cable
Procedure
1. Attach a PC with terminal emulation software to the Routers Console port.
2. Turn off the Router, and turn it on and press the Break Key on the PC within 60
seconds of turning on the Router.
3. Enter the command to By-Pass the NVRAM on the > prompt and initialize the
Router by command.
4. Enter no in response to the System Configuration dialog prompts.
5. Enter into the Router and copy the configuration from the NVRAM, change the
password & change the value of the configuration register & save the
configuration into NVRAM again and reload the Router.
Configuration
Step 1: Attach a PC with terminal emulation software to the Routers Console
Port.
88
The configuration register value is 0x2102 by-default. Its mean that whenever the Router
boots, it will read the contents of the NVRAM. So, we need to by-pass the NVRAM at
the time of startup for the password recovery.
Step 2: Turn off the Router, and turn it on and press the Break Key on the PC
within 60 seconds of turning on the Router.
The > prompt with no Router name appears at the Router screen.
Step 3: Enter the command to By-Pass the NVRAM on the > prompt and
initialize the Router by command.
> o/r 0x2142 (to boot from flash)
>i
(initialize the Router)
Step 4: Enter no in response to the System Configuration dialog prompts until the
following message appears.
Press RETURN to get started!
Step 5: Enter into the Router and copy the configuration from the NVRAM,
change the password & change the value of the configuration register &
save the configuration into NVRAM again and reload the Router.
Router#copy stratup-config running-config
Router(config)#no enable password
Router(config)#enable password cisco
Router(config)#configuration-register 0x2102
Router#write memory (Equivalent Command of copy running-config startup-config)
Router#reload
89
TFTP Server
i. Uploading Configuration from Router to the TFTP
Server
Diagram
Uploading
Configuration
Procedure
1.
2.
3.
4.
Configuration
Step 1: Make a TFTP Server to Host A.
90
91
Diagram
Procedure
1.
2.
3.
4.
5.
6.
Configuration
Step 1: Make a TFTP Server to Host A.
Step 2: Remove the Configuration from the NVRAM & reload the Router.
R1#write erase
[OK]
R1#reload
Proceed with reload? [confirm]
%SYS-5-RELOAD: Reload requested
System Bootstrap, Version 11.0(10c), SOFTWARE
Copyright (c) 1986-1996 by cisco Systems
<Output Omitted>
92
Step 6(B): Verifying the uploaded configuration from the TFTP Server.
93