Instructor Lab Manual
Instructor Lab Manual
Instructor Lab Manual
Topology
Objectives
Part 1: Set Up Devices in the Network as Shown in the Topology
Part 2: Initialize the Router and Reload
Part 3: Initialize the Switch and Reload
Background / Scenario
Before starting a CCNA hands-on lab that makes use of either a Cisco router or switch, ensure that the
devices in use have been erased and have no startup configurations present. Otherwise, the results of your
lab may be unpredictable. This lab provides a detail procedure for initializing and reloading a Cisco router and
a Cisco switch.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs.
Required Resources
1 Router (Cisco 1941 with Cisco IOS software, Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Initializing and Reloading a Router and Switch
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Initializing and Reloading a Router and Switch
Switch> enable
Switch#
Step 2: Determine if there have been any virtual local-area networks (VLANs) created.
Use the show flash command to determine if any VLANs have been created on the switch.
Switch# show flash
Directory of flash:/
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Initializing and Reloading a Router and Switch
Reflection
1. Why is it necessary to erase the startup configuration before reloading the router?
_______________________________________________________________________________________
The startup configuration file is loaded into memory and becomes the running-config after the router reloads.
Erasing this file allows the router to return to its basic configuration after a reload.
2. You find a couple configurations issues after saving the running configuration to the startup configuration, so
you make the necessary changes to fix those issues. If you were to reload the device now, what configuration
would be restored to the device after the reload?
_______________________________________________________________________________________
The configuration at the time of the last save is restored to the device after a reload. Any changes made to
the running configuration after the last save would be lost.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Class Activity - Draw Your Concept of the Internet (Instructor
Version Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Demonstrate that networks are made of many different components.
Background / Scenario
Draw and label a map of the Internet as you interpret it now. Include your home or school/university location
and its respective cabling, equipment, devices, etc. Some items you may want to include:
o Devices or equipment
o Media (cabling)
o Link addresses or names
o Sources and destinations
o Internet service providers
Upon completion, save your work in a hard-copy format, it will be used for future reference at the end of this
chapter. If it is an electronic document, save it to a server location provided by your instructor. Be prepared to
share and explain your work in class.
For an example to get you started, please visit: http://www.kk.org/internet-mapping.
Note: This webpage requires Adobe Flash.
Instructor Note: This optional Modeling Activity is not intended to be a graded assignment. Its purpose is to
help students to reflect on their perceptions of how a network is set up for personal use. Discussion should be
facilitated by the instructor as a result of this activity. Facilitation of the discussion should include student-to-
student discussions of each others work.
Required Resources
Internet access
Paper and pencils or pens (if students are creating a hard copy)
Reflection
1. After reviewing your classmates drawings, were there computer devices that you could have included on your
diagram? If so, which ones and why?
_______________________________________________________________________________________
Answers will vary.
2. After reviewing your classmates drawings, how were some of the model designs the same or different? What
modifications would you make to your drawing after reviewing the other drawings?
_______________________________________________________________________________________
Answers will vary.
3. In what way could icons on a network drawing provide a streamlined thought process and facilitate your
learning? Explain your answer.
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - Draw Your Concept of the Internet
Students should note that having a set of representative ic ons will assist them in learning how to draw/design
network representation. It consolidates information, and is easily understood by others who understand what
the icons represent. It is a form of shorthand for people in the same industry.
Initial Network Diagrams and Network Components will vary. A very basic network
design representation from the website is depicted below (this diagram is for Instructor
reference.)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab - Researching Network Collaboration Tools (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Use Collaboration Tools
Part 2: Share Documents with Google Drive
Part 3: Explore Conferencing and Web Meetings
Part 4: Create Wiki Pages
Background / Scenario
Network collaboration tools provide people with the opportunity to work together efficiently and productively
without the constraints of location or time zone. Collaborative tools include document sharing, web meetings,
and wikis.
Required Resources
Device with Internet access
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 12
Lab - Researching Network Collaboration Tools
a. Browse to www.google.com and click Sign in (located at the top-right corner of the web page).
b. On the Google Accounts web page, if you already have a Google account, you can sign in. If you do not
have an account, click Create an account.
c. On the Create your Google Account web page, fill out the form to the right. Provide all the required
information. The name you enter in the Choose your username field becomes the account name. It is
not necessary to supply your mobile phone or current email address. You must agree to the Google
Terms of Service and Privacy Policy before clicking Next step.
d. The next web page allows you to add a profile photo. Click Create your profile to complete the account
creation process.
e. You have successfully created your Google account when the Welcome screen appears.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 12
Lab - Researching Network Collaboration Tools
a. Click the Apps ( ) icon to access a list of Google Services. Use the credentials you created in Step 1 to
sign in to all of the Google services.
d. The new document displays. Many of the functions of the Google editor work similarly to Microsoft Word.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 12
Lab - Researching Network Collaboration Tools
b. Name your new document, and then click the Save button. Because you created the document, you are
the document owner.
c. In the Share with others dialog box, enter the names, groups, or email addresses with whom to share
this document. You can choose to allow others to view, comment, or edit the document.
d. When you start entering information into the Share with others dialog box, you may also add a note.
e. Click the Send button. This will navigate you back to the open document.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 12
Lab - Researching Network Collaboration Tools
f. All users can see who currently has the document open. Users currently viewing the document are
represented by the icons at the top right corner. You can determine where the other users are making
changes by locating the other users cursors in the document.
g. This new document is automatically saved on the Google Drive. You can close the document by closing
the associated browser window or tab.
Note: You can navigate directly to the Google Drive using https://drive.google.com and view the list of
documents created by you or shared with you.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 12
Lab - Researching Network Collaboration Tools
Although many different wiki servers are available, the following common features have been formalized into
every wiki:
Any web browser can be used to view or edit pages or create new content.
Edit and auto links are available to edit a page and automatically link pages. Text formatting is similar to
creating an email.
A search engine is used for quick content location.
Access control can be set by the topic creator, which defines who is permitted to edit content.
A wiki is a grouping of web pages with different collaboration groups.
In this part of the lab, you will use the Google account that you created in Part 2 and create a wiki page in
Google Sites.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 12
Lab - Researching Network Collaboration Tools
a. Google provides templates to customize the look of your new wiki site. Click the More Action ( )
icon for the drop-down menu, and then click Manage site.
b. Click Themes, Colors, and Fonts at the bottom of the left sidebar.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 12
Lab - Researching Network Collaboration Tools
c. Currently, the site is using the Base theme. Click Browse more themes to select a Wiki site template.
d. Search and select a wiki template for your site. Click Select to continue.
e. The preview of your home page appears. You can also customize the colors and fonts on your home
page. Click Edit Colors and Fonts. When you are satisfied with your new home page, click Save to
accept the changes.
f. After you have saved your theme selection, click your site name under Manage Site.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 12
Lab - Researching Network Collaboration Tools
b. Click Save to save the changes and exit the page edit mode.
a. Click the Create page ( ) icon to create a new page for posting.
b. In the Name your page field, enter a page name. In the example below, the name Routers is used as the
topic for this page.
c. Click the Web Page drop-down menu and select Announcements. Google uses this term to indicate a
wiki page.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 12
Lab - Researching Network Collaboration Tools
e. Your new wiki page, called Routers, displays. The new page has a New post menu option that allows
information to be added to the page. (Notice that the left sidebar has a new link to allow your site visitors
access to this page.)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 12
Lab - Researching Network Collaboration Tools
b. You can invite specific individuals to view or edit this website. You may also grant ownership to others.
c. You can specify how to notify people about the wiki by entering their email address. Click Send to share
the wiki with others.
d. The Manage Site page displays the people who have access to your site. Notice Jane Smith was added
to the list of people with access. Click your site name to return to your home page.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 12
Lab - Researching Network Collaboration Tools
Reflection
1. Can you think of other collaboration tools used in the business world today?
_______________________________________________________________________________________
Answers will vary.
2. What collaboration tools do you see as useful to a network administrator?
_______________________________________________________________________________________
Answers will vary.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 12
Lab - Researching Converged Network Services (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Survey Your Understanding of Convergence
Part 2: Research ISPs Offering Converged Services
Part 3: Research Local ISPs Offering Converged Services
Part 4: Select Best Local ISP Converged Service
Part 5: Research Local Company or Public Institution Using Convergence Technologies
Background / Scenario
Convergence in the context of networking is a term used to describe the process of combining voice, video,
and data communications over a common network infrastructure. Technology advances have made
convergence readily available to large, medium, and small businesses, as well as for the home consumer. In
this lab, you will research the converged services available to you.
Required Resources
Device with Internet access
Step 1: Describe convergence as you understand it and provide examples of its use in the
home.
Write a definition of convergence and list at least two examples.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Convergence - Converged networks are capable of delivering voice, video streams, text, and graphics
between many different types of devices over the same communication channel and network structure. On a
converged network, there are still many points of contact and many specialized devices, such as personal
computers, phones, TVs, and tablet computers, but there is one common network infrastructure. An example
of a converged network at home is a Triple Play service from Charter.com. Voice, Video (TV), and phone are
bundled together and come into the home on one cable, typically hybrid fiber coax.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Lab - Researching Converged Network Services
Step 2: Fill in the following form for the ISPs you selected.
Step 2: Fill in the following form for the ISPs you selected.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Lab - Researching Converged Network Services
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary and will typically be based on price per month and relative priority of Internet speeds versus
number of TV channels offered in the basic packages. Student may choose Comcast for higher download
speeds for Internet. Emphasize to students that home users priorities can affect their choice of service. For
example, users who stream movies exclusively may want higher download speeds versus a user who mainly
does casual surfing of the Internet and checks email.
Reflection
1. Identify at least two advantages of using convergence technologies?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Blending voice, video, and data signals onto one communication infrastructure allows companies to better
manage the technology because the network will use a common set of rules and standards. The need for
separate distribution equipment to offer voice and data will no longer be necessary.
2. Identify at least two disadvantages of using convergence technologies?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Until the technologies fully mature, configuration and management of voice, video, and data flowing on one
channel can be a challenge. Giving voice precedence over data using Quality of Service (QoS) technologies
can be quite complex for companies that do not have trained IT personnel on staff.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Lab - Researching IT and Networking Job Opportunities (Instructor
Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Research Job Opportunities
Part 2: Reflect on Research
Background / Scenario
Jobs in Information Technology (IT) and computer networking continue to grow. Most employers require some
form of industry standard certification, degree, or other qualifications from their potential employees,
especially those with limited experience. The Cisco CCNA certification is a known and established entry-level
networking certification that is respected in the industry. There are additional levels and kinds of Cisco
certifications that one can attain, and each certification may enhance employment opportunities as well as
salary range.
In this lab, you will complete targeted job searching on the web to find what types of IT and computer
networking jobs are available; what kinds of skills and certifications you will need; and the salary ranges
associated with the various job titles.
Required Resources
Device with Internet access
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Lab - Researching IT and Networking Job Opportunities
c. Now, focus your search by adding terms to the search for Network Administrator. Try terms like Cisco
CCNA, CCNP, CCNA Security, CCNA Voice, etc.
d. Now try refining your search by adding different geographical locations. Did you find jobs in the locations
you entered?
____________________________________________________________________________________
Answers will vary.
e. Try searching a different website. Go to http://salary.com and click the Job Search menu bar button.
Note: For salary listings outside of the U.S., use the following link to search for your country:
http://www.payscale.com/rccountries.aspx
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Lab - Researching IT and Networking Job Opportunities
f. Add a search term like Information Technology to the job title field box and click Submit.
g. In the image below, note the large number of matching search results. Additional tools for refining your
search are available in the left column.
h. Spend time searching for jobs and looking through the search results. Take note of what skills are
required for different job titles and the range of starting salaries.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Lab - Researching IT and Networking Job Opportunities
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Class Activity - Draw Your Concept of the Internet Now (Instructor
Version Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Identify the common components of a network.
Background / Scenario
In this activity, you will use the knowledge you have acquired throughout Chapter 1, and the modeling activity
document that you prepared at the beginning of this chapter. You may also refer to the other activities
completed in this chapter, including Packet Tracer activities.
Draw a map of the Internet as you see it now. Use the icons presented in the chapter for media, end devices,
and intermediary devices.
In your revised drawing, you may wish to include some of the following:
o WANs
o LANs
o Cloud computing
o Internet Service Providers (tiers)
Save your drawing in hard-copy format. If it is an electronic document, save it to a server location provided by
your instructor. Be prepared to share and explain your revised work in class.
Instructor Note: This optional Modeling Activity may be selected as a graded assignment, because its
purpose is to validate the learning gained in Chapter 1 about:
o WANs
o LANs
o Cloud computing
o Internet Service Providers (tiers)
Required Resources
Beginning of chapter modeling activity drawing
Packet Tracer (may be optional if students sketch their own drawing)
Paper and pencils or pens
Reflection
After completing Chapter 1, are you more aware of the devices, cabling, and physical components of a small-
to-medium size network? Explain your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________
(Answers will vary per student but this reflection question will generate some good class discussion and
foster community between students and the Instructor)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - Draw Your Concept of the Internet Now
Instructor Note: This is a representative model that might be built as a result of this activity.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Class Activity - It Is Just an Operating System! (Instructor Version
Optional Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Describe the command structure of Cisco IOS software.
Background / Scenario
Imagine that you are employed as an engineer for a car manufacturing company. The company is currently
working on a new car model. This model will have selected functions which can be controlled by the driver
giving specific voice commands.
You must design the set of commands used by this voice-activated control system.
Some of functions of the car that can be controlled by voice commands are:
o Lights
o Wipers
o Radio
o Telephone set
o Air conditioning
o Ignition
Your task is to devise a simple set of spoken commands that will be used to control these systems and
identify how they are going to be executed.
Instructor Note: This optional Modeling Activity is not intended to be a graded assignment. Its purpose is to
help students reflect on their perceptions of how a network is set up using voice commands (much like the
IOS command structure). Facilitation of the discussion should include student-to-student discussions of each
others work.
Required Resources
Paper and pencils or pens, or computer
Reflection
How can devising a set of voice commands assist in operating a vehicle? How could these same commands
be used on a computer or network operating system?
_______________________________________________________________________________________
Some suggested answers for discussion include:
Discuss that the options for putting together a set of spoken words will constitute the command set. An
obvious choice is using simple English words as the command set. Other choices include words in
different languages, using command numbers or shortcuts. Note, however, that this would make the
command set significantly less intuitive.
Talk about the students choice to make the command set direct, without hierarchy, or whether they
grouped commands according to their function. Highlight that, for example, a help command without any
further context would not be usable because it does not indicate what exactly the user needs help to.
There are two ways of providing a context to a command:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - It Is Just an Operating System!
Ask students if they explicitly expressed the context with each command (for example, radio volume
up/radio volume down; phone volume up/phone volume down) which is the direct, flat approach. Or did
they introduce modes; groupings of commands that refer to a particular context and once positioned in
that context, did not have to be reemphasized., For example, after placing the instruction in the radio
mode, the commands volume up and volume down are unambiguous.
Discuss the advantages of both approaches. For a small set of commands, the direct approach is more
suitable. For a larger set of commands which may possibly grow into extensive, multi-word sentences,
using modes helps to keep the command set organized and limits the length of individual commands, and
is preferred.
How did students decide how the voice command recognition would be started so that the car did not
mistakenly interpret a casual conversation of passengers as commands? Possibilities include saying a
specific, otherwise unused word, or pressing a button on the steering wheel. Also, discuss how students
handled a system that should prompt the user to enter the voice commands, and how the user would be
informed that the spoken command was not properly understood or valid.
How did the students handle access to more safety-critical commands such as lights and ignition?)How
were these commands protected or isolated so that no inadvertent manipulation could occur?
Possibilities include saying a specific, otherwise unused word, or pressing a button on the steering wheel.
Ask students to discuss which part of the software running on the cars built-in computer would be
processing the voice commands and what software would be actually executing the commands. The
software that performs speech recognition and translates voice commands into a form the computer can
understand is the command interface used to interact with the car. However, the commands need to be
processed by the central operating software of the car that controls all its functions and orchestrates all its
systems. As an example, saying engine on involves processing the voice command in the command
interface, and then the operating system processes this command by activating the starter motor for a
certain period of time, enabling the flow of the fuel, etc., coordinating multiple systems of a car to make it
work.
Identify elements of the model that map to IT-related content:
Different systems of the car which can be controlled by voice commands relate to different components of
routers and switches that can be configured.
Vocal commands relate to IOS commands
The choice of short English words or phrases as the command set relates to the general style of IOS CLI.
The mode-oriented organization of the voice command set relates to the mode-oriented IOS CLI.
Starting the voice recognition process relates to starting a CLI EXEC session by pressing Enter. Also, the
voice prompts by the car relate to the prompts on the command line.
Potentially disruptive commands, such as lights off or engine on relates to potentially disruptive IOS
commands (reload, erase flash: or delete startup-config).
The voice interface and the cars operating system relate to the IOS EXEC (the command interpreter) and
the IOS itself.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab - Establishing a Console Session with Tera Term (Instructor
Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Access a Cisco Switch through the Serial Console Port
Part 2: Display and Configure Basic Device Settings
Part 3: (Optional) Access a Cisco Router Using a Mini-USB Console Cable
Note: Netlab users or other remote access equipment should complete only Part 2.
Instructor Note: Rollover and mini-USB console cables are no longer automatically shipped with the newer
ISR G2 routers, such as Cisco 1941, Cisco 2901, or Cisco 2911. These console cables can be purchased
from Cisco Systems, Inc. or other third-party vendors.
Background / Scenario
Various models of Cisco routers and switches are used in all types of networks. These devices are managed
using a local console connection or a remote connection. Nearly all Cisco devices have a serial console port
to which you can connect. Some newer models, such as the 1941 Integrated Services Router (ISR) G2 used
in this lab, also have a USB console port.
In this lab, you will learn how to access a Cisco device via a direct local connection to the console port, using
the terminal emulation program called Tera Term. You will also learn how to configure the serial port settings
for the Tera Term console connection. After you have established a console connection with the Cisco device,
you can display or configure device settings. You will only display settings and configure the clock in this lab.
Note: The routers used with CCNA hands-on labs are Cisco 1941 ISRs with Cisco IOS Release 15.2(4)M3
(universalk9 image). The switches used in the labs are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2)
(lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model
and Cisco IOS version, the commands available and the output produced might vary from what is shown in
the labs. Refer to the Router Interface Summary Table at the end of the lab for the correct interface identifiers.
Note: Make sure that the switch and router have been erased and have no startup configuration. If you are
unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
1 Router (Cisco 1941 with Cisco IOS software, release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7 or 8 with a terminal emulation program, such as Tera Term)
Rollover (DB-9 to RJ-45) console cable to configure the switch or router via the RJ-45 console port
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 11
Lab - Establishing a Console Session with Tera Term
Mini-USB cable to configure the router via the USB console port
Instructor Note: If Tera Term is not installed on the PC, it can be downloaded from the following link by
selecting Tera Term:
http://logmett.com/index.php?/download/free-downloads.html
Instructor Note: A USB driver must be installed prior to connecting a Microsoft Windows-based PC to a
Cisco IOS device with a USB cable. The driver can be found on www.cisco.com with the related Cisco IOS
device. The USB driver can be downloaded from the following link:
http://www.cisco.com/cisco/software/release.html?mdfid=282774238&flowid=714&softwareid=282855122
&release=3.1&relind=AVAILABLE&rellifecycle=&reltype=latest
Instructor Note: You must have a valid Cisco Connection Online (CCO) account to download the USB driver
file.
Step 1: Connect a Cisco switch and computer using a rollover console cable.
a. Connect the rollover console cable to the RJ-45 console port of the switch.
b. Connect the other cable end to the serial COM port on the computer.
Note: Serial COM ports are no longer available on most computers. A USB-to-DB9 adapter can be used
with the rollover console cable for console connection between the computer and a Cisco device. USB-to-
DB9 adapters can be purchased at any computer electronics store.
Note: If using a USB-to-DB9 adapter to connect to the COM port, you may be required to install a driver
for the adapter provided by the manufacturer of your computer. To determine the COM port used by the
adapter, please see Part 3 Step 4. The correct COM port number is required to connect to the Cisco IOS
device using a terminal emulator in Step 2.
c. Turn on the Cisco switch and computer.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 11
Lab - Establishing a Console Session with Tera Term
Step 2: Configure Tera Term to establish a console session with the switch.
Tera Term is a terminal emulation program. This program allows you to access the terminal output of the
switch. It also allows you to configure the switch.
a. Start Tera Term by clicking the Windows Start button located in the task bar. Locate Tera Term under
All Programs.
Note: If the program is not installed on the system, Tera Term can be downloaded from the following link
by selecting Tera Term:
http://logmett.com/index.php?/download/free-downloads.html
b. In the New Connection dialog box, click the Serial radio button. Verify that the correct COM port is
selected and click OK to continue.
c. From the Tera Term Setup menu, choose the Serial port to verify the serial settings. The default
parameters for the console port are 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control. The
Tera Term default settings match the console port settings for communications with the Cisco IOS switch.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 11
Lab - Establishing a Console Session with Tera Term
d. When you can see the terminal output, you are ready to configure a Cisco switch. The following console
example displays the terminal output of the switch while it is loading.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 11
Lab - Establishing a Console Session with Tera Term
____________________________________________________________________________________
c2960-lanbasek9-mz.150-2.SE.bin. Answers will vary depending on the switch.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 11
Lab - Establishing a Console Session with Tera Term
Note: You must use either the USB port or the RJ-45 port. Do not use both ports simultaneously. When the
USB port is used, it takes priority over the RJ-45 console port.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 11
Lab - Establishing a Console Session with Tera Term
http://www.cisco.com/cisco/software/release.html?mdfid=282774238&flowid=714&softwareid=282855122&rel
ease=3.1&relind=AVAILABLE&rellifecycle=&reltype=latest
Note: You must have a valid Cisco Connection Online (CCO) account to download this file.
Note: This link is related to the Cisco 1941 router. However, the USB console driver is not Cisco IOS device-
model specific. This USB console driver only works with Cisco routers and switches. The computer requires a
reboot after finishing the installation of the USB driver.
Note: After the files are extracted, the folder contains instructions for installation, removal, and the necessary
drivers for different operating systems and architectures. Please choose the appropriate version for your
system.
When the LED indicator for the USB console port has turned green, the USB console port is ready for access.
Step 3: (Optional) Enable the COM port for the Windows 7 PC.
If you are using a Microsoft Windows 7 PC, you may need to perform the following steps to enable the COM
port:
a. Click the Windows Start icon to access the Control Panel.
b. Open the Device Manager.
c. Click the Ports (COM & LPT) tree link to expand it. Right-click the USB Serial Port icon and choose
Update Driver Software.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 11
Lab - Establishing a Console Session with Tera Term
e. Choose Let me pick from a list of device drivers on my computer and click Next.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 11
Lab - Establishing a Console Session with Tera Term
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 11
Lab - Establishing a Console Session with Tera Term
g. Note the port number assigned at the top of the window. In this sample, COM 5 is used for
communication with the router. Click Close.
h. Open Tera Term. Click the Serial radio button and choose the appropriate serial port, which is Port
COM5: Cisco Serial (COM 5) in this example. This port should now be available for communication with
the router. Click OK.
Reflection
1. How do you prevent unauthorized personnel from accessing your Cisco device through the console port?
____________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 11
Lab - Establishing a Console Session with Tera Term
____________________________________________________________________________________
Physically secure the device and use password protection
2. What are the advantages and disadvantages of using the serial console connection compared to the USB
console connection to a Cisco router or switch?
____________________________________________________________________________________
____________________________________________________________________________________
It depends on the port availability on the PC and the router or switch. If the PC has a serial port and a DB9-to-
RJ45 cable is available, it is generally easier to connect to the router or switch using the serial console port. If
the PC does not have a serial port, a third party USB-to-Serial adapter can be used. Cisco switches do not
have mini-USB console ports, so connecting via USB is not an option. If you are frequently connecting to a
Cisco router that has a mini USB console port, this can be the most effective method after the Cisco drivers
are installed because nearly all newer PCs have USB ports.
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 11
Lab - Building a Simple Network (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Addressing Table
Objectives
Part 1: Set Up the Network Topology (Ethernet only)
Part 2: Configure PC Hosts
Part 3: Configure and Verify Basic Switch Settings
Background / Scenario
Networks are constructed of three major components: hosts, switches, and routers. In this lab, you will build a
simple network with two hosts and two switches. You will also configure basic settings including hostname,
local passwords, and login banner. Use show commands to display the running configuration, IOS version,
and interface status. Use the copy command to save device configurations.
You will apply IP addressing for this lab to the PCs to enable communication between these two devices. Use
the ping utility to verify connectivity.
Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other
switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the
commands available and output produced might vary from what is shown in the labs.
Note: Make sure that the switches have been erased and have no startup configurations. Refer to Appendix A
for the procedure to initialize and reload a switch.
Required Resources
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 18
Lab - Building a Simple Network
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 18
Lab - Building a Simple Network
b. In the Network and Internet section, click the View network status and tasks link.
Note: If the Control Panel displays a list of icons, click the drop-down option next to the View by: and
change this option to display by Category.
c. In the left pane of the Network and Sharing Center window, click the Change adapter settings link.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 18
Lab - Building a Simple Network
d. The Network Connections window displays the available interfaces on the PC. Right-click the Local Area
Connection interface and select Properties.
e. Select the Internet Protocol Version 4 (TCP/IPv4) option and then click Properties.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 18
Lab - Building a Simple Network
Note: You can also double-click Internet Protocol Version 4 (TCP/IPv4) to display the Properties
window.
f. Click the Use the following IP address radio button to manually enter an IP address, subnet mask, and
default gateway.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 18
Lab - Building a Simple Network
Note: In the above example, the IP address and subnet mask have been entered for PC-A. The default
gateway has not been entered, because there is no router attached to the network. Refer to the
Addressing Table on page 1 for PC-Bs IP address information.
g. After all the IP information has been entered, click OK. Click OK on the Local Area Connection Properties
window to assign the IP address to the LAN adapter.
h. Repeat the previous steps to enter the IP address information for PC-B.
b. The cmd.exe window is where you can enter commands directly to the PC and view the results of those
commands. Verify your PC settings by using the ipconfig /all command. This command displays the PC
hostname and the IPv4 address information.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 18
Lab - Building a Simple Network
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 18
Lab - Building a Simple Network
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 18
Lab - Building a Simple Network
<output omitted>
!
banner motd ^C
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 18
Lab - Building a Simple Network
Unauthorized access is strictly prohibited and prosecuted to the full extent of the
law. ^C
!
line con 0
password cisco
login
line vty 0 4
login
line vty 5 15
login
!
end
S1#
Step 10: Display the IOS version and other useful switch information.
Use the show version command to display the IOS version that the switch is running, along with other useful
information. Again, you will need to use the spacebar to advance through the displayed information.
S1# show version
Cisco IOS Software, C2960 Software (C2960-LANBASEK9-M), Version 15.0(2)SE, RELEASE
SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Sat 28-Jul-12 00:29 by prod_rel_team
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 18
Lab - Building a Simple Network
Step 11: Display the status of the connected interfaces on the switch.
To check the status of the connected interfaces, use the show ip interface brief command. Press the
spacebar to advance to the end of the list.
S1# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Vlan1 unassigned YES unset up up
FastEthernet0/1 unassigned YES unset up up
FastEthernet0/2 unassigned YES unset down down
FastEthernet0/3 unassigned YES unset down down
FastEthernet0/4 unassigned YES unset down down
FastEthernet0/5 unassigned YES unset down down
FastEthernet0/6 unassigned YES unset up up
FastEthernet0/7 unassigned YES unset down down
FastEthernet0/8 unassigned YES unset down down
FastEthernet0/9 unassigned YES unset down down
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 18
Lab - Building a Simple Network
Step 13: Record the interface status for the following interfaces.
S1 S2
F0/1 Up Up Up Up
F0/6 Up Up Down Down
F0/18 Down Down Up Up
VLAN 1 Up Up Up Up
Why are some FastEthernet ports on the switches are up and others are down?
_______________________________________________________________________________________
_______________________________________________________________________________________
The FastEthernet ports are up when cables are connected to the ports unless they were manually shutdown
by the administrators. Otherwise, the ports would be down.
Reflection
What could prevent a ping from being sent between the PCs?
_______________________________________________________________________________________
Wrong IP address, media disconnected, switch powered off or ports administratively down, firewall.
Note: It may be necessary to disable the PC firewall to ping between PCs.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 18
Lab - Building a Simple Network
Step 2: Determine if there have been any virtual local-area networks (VLANs) created.
Use the show flash command to determine if any VLANs have been created on the switch.
Switch# show flash
Directory of flash:/
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 18
Lab - Building a Simple Network
Device Configs
Switch S1 (complete)
S1#sh run
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 18
Lab - Building a Simple Network
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 18
Lab - Building a Simple Network
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
!
ip http server
ip http secure-server
!
banner motd ^C
Unauthorized access is strictly prohibited and prosecuted to the full extent of the
law. ^C
!
line con 0
password cisco
login
line vty 0 4
login
line vty 5 15
login
!
end
Switch S2 (complete)
S2#sh run
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 18
Lab - Building a Simple Network
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 18
Lab - Building a Simple Network
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
!
ip http server
ip http secure-server
!
banner motd ^C
Unauthorized access is strictly prohibited and prosecuted to the full extent of the
law. ^C
!
line con 0
password cisco
login
line vty 0 4
login
line vty 5 15
login
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 18
Lab - Configuring a Switch Management Address (Instructor
Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Configure a Basic Network Device
Part 2: Verify and Test Network Connectivity
Background / Scenario
Cisco switches have a special interface, known as a switch virtual interface (SVI). The SVI can be configured
with an IP address, commonly referred to as the management address. The management address is used for
remote access to the switch to display or configure settings.
In this lab, you will build a simple network using Ethernet LAN cabling and access a Cisco switch using the
console and remote access methods. You will configure basic switch settings, IP addressing, and
demonstrate the use of a management IP address for remote switch management. The topology consists of
one switch and one host using only Ethernet and console ports.
Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other
switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the available
commands and output produced might vary from what is shown in the labs.
Note: Make sure that the switch has been erased and has no startup configuration. If you are unsure, contact
your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10
Lab - Configuring a Switch Management Address
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 10
Lab - Configuring a Switch Management Address
What shortcut keys are used to go directly from global configuration mode to privileged EXEC mode?
____________________________________________________________________________________
Ctrl+Z
h. Return to privileged EXEC mode from user EXEC mode.
S1> enable
Password: class
S1#
Note: The password will not show up on the screen when entering.
i. Enter global configuration mode to set the SVI IP address to allow remote switch management.
S1# config t
S1#(config)# interface vlan 1
S1(config-if)# ip address 192.168.1.2 255.255.255.0
S1(config-if)# no shut
S1(config-if)# exit
S1(config)#
j. Restrict console port access. The default configuration is to allow all console connections with no
password needed.
S1(config)# line con 0
S1(config-line)# password cisco
S1(config-line)# login
S1(config-line)# exit
S1(config)#
k. Configure the VTY line for the switch to allow Telnet access. If you do not configure a VTY password, you
will not be able to telnet to the switch.
S1(config)# line vty 0 4
S1(config-line)# password cisco
S1(config-line)# login
S1(config-line)# end
S1#
*Mar 1 00:06:11.590: %SYS-5-CONFIG_I: Configured from console by console
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 10
Lab - Configuring a Switch Management Address
<output omitted>
interface FastEthernet0/24
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 10
Lab - Configuring a Switch Management Address
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.2 255.255.255.0
!
ip http server
ip http secure-server
!
banner motd ^C
Unauthorized access is strictly prohibited. ^C
!
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
login
!
end
b. Verify the status of your SVI management interface. Your VLAN 1 interface should be up/up and have an
IP address assigned. Notice that switch port F0/6 is also up because PC-A is connected to it. Because all
switch ports are initially in VLAN 1, by default, you can communicate with the switch using the IP address
you configured for VLAN 1.
S1# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Vlan1 192.168.1.2 YES manual up up
FastEthernet0/1 unassigned YES unset down down
FastEthernet0/2 unassigned YES unset down down
FastEthernet0/3 unassigned YES unset down down
FastEthernet0/4 unassigned YES unset down down
FastEthernet0/5 unassigned YES unset down down
FastEthernet0/6 unassigned YES unset up up
FastEthernet0/7 unassigned YES unset down down
FastEthernet0/8 unassigned YES unset down down
FastEthernet0/9 unassigned YES unset down down
FastEthernet0/10 unassigned YES unset down down
FastEthernet0/11 unassigned YES unset down down
FastEthernet0/12 unassigned YES unset down down
FastEthernet0/13 unassigned YES unset down down
FastEthernet0/14 unassigned YES unset down down
FastEthernet0/15 unassigned YES unset down down
FastEthernet0/16 unassigned YES unset down down
FastEthernet0/17 unassigned YES unset down down
FastEthernet0/18 unassigned YES unset down down
FastEthernet0/19 unassigned YES unset down down
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 10
Lab - Configuring a Switch Management Address
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 10
Lab - Configuring a Switch Management Address
b. After entering the cisco password, you will be at the user EXEC mode prompt. Type enable at the
prompt. Enter the class password to enter privileged EXEC mode and issue a show run command.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 10
Lab - Configuring a Switch Management Address
Reflection
Why must you use a console connection to initially configure the switch? Why not connect to the switch via
Telnet or SSH?
_______________________________________________________________________________________
No IP addressing parameters are configured yet. Initially, a switch has no networking configured.
Device Configs
Switch S1(Complete)
S1#show run
Building configuration...
!
Current configuration : 1508 bytes
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname S1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
system mtu routing 1500
!
!
no ip domain-lookup
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 10
Lab - Configuring a Switch Management Address
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 10
Lab - Configuring a Switch Management Address
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.2 255.255.255.0
!
ip http server
ip http secure-server
!
banner motd ^C
Unauthorized access is strictly prohibited. ^C
!
line con 0
password cisco
login
line vty 0 4
password class
login
line vty 5 15
login
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 10
Class Activity - Tutor me! (Instructor Version Optional Class
Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Configure initial settings on a network device using the Cisco IOS software.
Background / Scenario
(Students will work in pairs. Packet Tracer is required to be used with this activity.)
Assume that a new colleague has asked you for an orientation to the Cisco IOS CLI. This colleague has
never worked with Cisco devices before.
You explain the basic CLI commands and structure, because you want your colleague to understand that the
CLI is a simple, yet powerful, command language that can be easily understood and navigated.
Use Packet Tracer and one of the activities available in this chapter as a simple network model. Focus on
these areas:
o While the commands are technical, do they resemble any statements from plain English?
o How is the set of commands organized into subgroups or modes? How does an administrator know
which mode he or she is currently using?
o What are the individual commands to configure the basic settings of a Cisco device? How would you
explain this command in laymens terms? Use parallels to real life whenever appropriate.
Suggest how to group different commands together according to their modes so that a minimum number of
moves between modes will be needed.
Instructor Note: This optional Modeling Activity may be used as a graded assignment. However, its purpose
is to help students reflect on the knowledge acquired from Chapter 2, focusing on how the Cisco IOS is used
directly to configure intermediary devices. Instructor facilitation of the discussion should encourage student-to-
student discussions of each others work.
Required Resources
Packet Tracer
Any simple network model activity available from Chapter 2
Reflection
1. After completing Chapter 2, do you feel as though you have a concrete understanding of what the Cisco IOS
does and how it operates? What were some of the difficulties you encountered when explaining the basic CLI
commands and structure to your colleague? If you were the new colleague, what would be some of the
difficulties that you would have learning the basic CLI commands and structure?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2. Answer the following questions, and discuss your answers with the entire class:
a. While the commands are technical, do they resemble any statements from plain English?
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Class Activity - Tutor me!
____________________________________________________________________________________
____________________________________________________________________________________
b. How is the set of commands organized into subgroups or modes? How does an administrator know which
mode he or she is currently using?
____________________________________________________________________________________
____________________________________________________________________________________
c. What are the individual commands to configure the basic settings of a Cisco device? How would you
explain this command in laymens terms? Use parallels to real life whenever appropriate.
____________________________________________________________________________________
____________________________________________________________________________________
d. With the help of your colleague, try to suggest how to group different commands together according to
their modes so that a minimum number of moves between modes will be needed.
____________________________________________________________________________________
____________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Class Activity - Tutor me!
banner The message displayed to a user that tries to access the device
interface Vlan 1 enter the configuration mode of the interface called Vlan1
description Assign a textual comment to an interface to help the administrator know what is the
purpose and location of the interface
ip address Assign a numerical IP address to an interface
no shutdown Removes the shutdown command and thereby making an interface active
end Exit the configuration editor
Moving through the configuration and making changes to the device settings is like navigating in a maze.
Each configuration mode is like a chamber in a maze. Even if you know the map of the maze, you may
still move through the maze in a disorganized way, possibly never finding a way out. Similarly, even if you
know the meaning of individual commands and the modes in which they are located, the way you move
through these modes when configuring a device depends mostly on you.
d. With the help of your colleague, try to suggest how to group different commands together according to
their modes so that a minimum number of moves between modes is needed.
One of possible effective command sequences for configuring a device is:
enable
configure terminal
hostname AtlantaSw
service password-encryption
banner login ^
^
enable secret V3ry5ecr3tP4ssw0rd
line con 0
password 5ecr3tP4ssw0rd
login
exit
line vty 0 4
password 5ecr3tP4ssw0rd
login
exit
interface Vlan 1
ip address 192.0.2.11 255.255.255.0
no shutdown
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Class Activity - Tutor me!
password 5ecr3tP4ssw0rd
exit
banner login ^
^
line con 0
login
exit
interface Vlan 1
ip address 192.0.2.11 255.255.255.0
exit
line vty 0 4
login
exit
enable secret V3ry5ecr3tP4ssw0rd
interface Vlan 1
no shutdown
end
(Note that while both configurations lead to the same resulting set of settings, the second configuration is
slightly larger (because of repetitive entering individual modes again and again) and is very difficult to follow
because the flow of commands is practically random and does not follow their logical sequence and modal
commonality Instructor)
Identify elements of the model that map to IT content:
Commands
Modes
Efficient orientation in configuration mode
Real-world customer relations skills
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Class Activity Designing a Communications System (Instructor
Version Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain the role of protocols and standards organizations in facilitating interoperability in network
communications.
Background / Scenario
You have just purchased a new automobile for your personal use. After driving the car for a week or so, you
find that it is not working correctly. Discussing the problem with several of your peers, you decide to take it to
an automotive repair facility that they highly recommend. It is the only repair facility located in close proximity.
When you arrive at the repair facility, you find that all the mechanics speak another language. You are having
difficulty explaining the automobiles performance problems, but the repairs really need to be done. You are
not sure you can drive it back home to research other options.
You must find a way to work with the repair facility to ensure your automobile is fixed correctly.
How will you communicate with the mechanics? Design a communications model to ensure that the car is
properly repaired.
Instructor Note: This Modeling Activity is not intended to be a graded assignment. Its purpose is to
encourage students to reflect on their perceptions of how a communications system facilitates the transfer of
data from source to destination (personally and in corporate practice). Discussion should be initiated as a
result of this activity.
Reflection
What steps did you identify as important to communicating your repair request? Justify your answer.
_______________________________________________________________________________________
To resolve this issue, some steps might include:
Establishing a language for communication (could be voice, written, or kinesthetic/physical).
Very carefully (in small steps), explaining the problem experienced with the automobile (again voice,
written/pictures, or kinesthetic/physical representations).
Asking the mechanic to confirm his/her understanding of the problem.
Waiting for the repair to be done.
Driving the automobile to ensure repairs were successful.
Closing the meeting by paying for the repairs and thanking the mechanic.
Identify elements of the model that map to IT content:
Establishing a language to communicate (Application protocol)
Dividing the message into small steps to facilitate understanding of the problem to be solved a little at a
time (Transfer protocol).
Checking to see if the message has been delivered and correctly understood to the mechanic who will be
performing the repairs. (Internet protocol)
Delivery of automobile and wait time for repairs (Network Access protocol)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 1
Lab - Researching Networking Standards (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Research Networking Standards Organizations
Part 2: Reflect on Internet and Computer Networking Experience s
Background / Scenario
Using web search engines like Google, research the non-profit organizations that are responsible for
establishing international standards for the Internet and the development of Internet technologies.
Required Resources
Device with Internet access
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Lab - Researching Networking Standards
Vinton Cerf co-founded Internet Society (ISOC) with Bob Kahn in 1992, helped with the creation of ICANN,
and served as the chair of Internet Architecture Board (IAB) from 1989 1991.
4. What organization is responsible for publishing Request for Comments (RFC)? (Search hint: IETF)
________________________________________________________ _______________________________
Internet Engineering Task Force (IETF)
5. What do RFC 349 and RFC 1700 have in common? (Search hint: Request for Comments, Google RFC
349, RFC 1700)
_______________________________________________________________________________________
_______________________________________________________________________________________
Port Numbers. The current list can be found at http://www.iana.org/assignments/service-names-port-
numbers/service-names-port-numbers.xml
6. What RFC number is the ARPAWOCKY? What is it? (Search hint: Request for Comments, Google
ARPAWOCKY)
_______________________________________________________________________________________
RFC 527. The first humorous RFC which then led to IETF launching April fools day RFC in 1989.
7. Who founded the World Wide Web Consortium (W3C)? (Search hint: W3C)
_______________________________________________________________________________________
Founded by Tim Berners-Lee at MIT
8. Name 10 World Wide Web (WWW) standards that the W3C develops and maintains? (Search hint: W3C)
_______________________________________________________________________________________
_______________________________________________________________________________________
Some samples: Common Gateway Interface (CGI), Document Object Model (DOM), HyperText Markup
Language (HTML), Extensible Markup Language (XML)
9. Where is the Institute of Electrical and Electronics Engineers (IEEE) headquarters located and what is the
significance of its logo? (Search hint: IEEE)
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Institute of Electrical and Electronics Engineers (IEEE) is headquartered in New York City, New York, United
States. The IEEE logo is a diamond-shaped design which illustrates the right hand grip rule embedded in
Benjamin Franklin's kite.
10. What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security protocol? (Search hint: WPA2)
_______________________________________________________________________________________
_______________________________________________________________________________________
WPA2 is based on IEEE 802.11i standard. It is commonly used on Wi-Fi wireless network.
11. Is the Wi-Fi Alliance a non-profit standards organization? What is their goal? (Search hint: WiFi Alliance)
_______________________________________________________________________________________
_______________________________________________________________________________________
Yes, Wi-Fi Alliance is a non-profit trade association, and its goals are to ensure interoperability and backward
compatibility and provide innovation support.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Lab - Researching Networking Standards
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Lab - Researching Networking Standards
International Organization for Standardization (ISO) was founded in 1947 and its headquarters are located in
Geneva, Switzerland.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Lab Installing Wireshark (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Download and Install Wireshark
Background / Scenario
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting,
analysis, software and protocol development, and education. As data streams travel back and forth over the
network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content
according to the appropriate RFC or other specifications.
Wireshark is a useful tool for anyone working with networks and can be used with most labs in the CCNA
courses for data analysis and troubleshooting. This lab provides instructions for downloading and installing
Wireshark.
Required Resources
1 PC (Windows 7 or 8 with Internet access)
Instructor Note: Using a packet sniffer such as Wireshark may be considered a breach of the security policy
of the school. It is recommended that permission is obtained before running Wireshark for this lab. If using a
packet sniffer such as Wireshark is an issue, the instructor may wish to assign the lab as homework or
perform a walk-through demonstration.
c. Choose the software version you need based on your PCs architecture and operating system. For
instance, if you have a 64-bit PC running Windows, choose Windows Installer (64-bit).
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6
Lab Installing Wireshark
After making a selection, the download should start. The location of the downloaded file depends on the
browser and operating system that you use. For Windows users, the default location is the Downloads
folder.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6
Lab Installing Wireshark
c. If this is the first time to install Wireshark, or after you have completed the uninstall process, you will
navigate to the Wireshark Setup wizard. Click Next.
d. Continue advancing through the installation process. Click I Agree when the License Agreement window
displays.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6
Lab Installing Wireshark
e. Keep the default settings on the Choose Components window and click Next.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6
Lab Installing Wireshark
g. You can change the installation location of Wireshark, but unless you have limited disk space, it is
recommended that you keep the default location.
h. To capture live network data, WinPcap must be installed on your PC. If WinPcap is already installed on
your PC, the Install check box will be unchecked. If your installed version of WinPcap is older than the
version that comes with Wireshark, it is recommended that you allow the newer version to be installed by
clicking the Install WinPcap x.x.x (version number) check box.
i. Finish the WinPcap Setup Wizard if installing WinPcap.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6
Lab Installing Wireshark
j. Wireshark starts installing its files and a separate window displays with the status of the installation. Click
Next when the installation is complete.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6
Lab - Using Wireshark to View Network Traffic (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Objectives
Part 1: Capture and Analyze Local ICMP Data in Wireshark
Part 2: Capture and Analyze Remote ICMP Data in Wireshark
Background / Scenario
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting,
analysis, software and protocol development, and education. As data streams travel back and forth over the
network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content
according to the appropriate RFC or other specifications.
Wireshark is a useful tool for anyone working with networks and can be used with most labs in the CCNA
courses for data analysis and troubleshooting. In this lab, you will use Wireshark to capture ICMP data packet
IP addresses and Ethernet frame MAC addresses.
Required Resources
1 PC (Windows 7 or 8 with Internet access)
Additional PC(s) on a local-area network (LAN) will be used to reply to ping requests.
Instructor Note: This lab assumes that the student is using a PC with Internet access and can ping other
PCs on the local area network.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 14
Lab - Using Wireshark to View Network Traffic
Using a packet sniffer such as Wireshark may be considered a breach of the security policy of the school. It is
recommended that permission is obtained before running Wireshark for this lab. If using a packet sniffer such
as Wireshark is an issue, the instructor may wish to assign the lab as homework or perform a walk-through
demonstration.
c. Ask a team member for their PCs IP address and provide your PCs IP address to them. Do not provide
them with your MAC address at this time.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 14
Lab - Using Wireshark to View Network Traffic
Note: Clicking the first interface icon in the row of icons also opens the Interface List.
c. On the Wireshark: Capture Interfaces window, click the check box next to the interface connected to your
LAN.
Note: If multiple interfaces are listed and you are unsure which interface to check, click the Details
button, and then click the 802.3 (Ethernet) tab. Verify that the MAC address matches what you noted in
Step 1b. Close the Interface Details window after verifying the correct interface.
d. After you have checked the correct interface, click Start to start the data capture.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 14
Lab - Using Wireshark to View Network Traffic
Information will start scrolling down the top section in Wireshark. The data lines will appear in different
colors based on protocol.
e. This information can scroll by very quickly depending on what communication is taking place between
your PC and the LAN. We can apply a filter to make it easier to view and work with the data that is being
captured by Wireshark. For this lab, we are only interested in displaying ICMP (ping) PDUs. Type icmp in
the Filter box at the top of Wireshark and press Enter or click on the Apply button to view only ICMP
(ping) PDUs.
f. This filter causes all data in the top window to disappear, but you are still capturing the traffic on the
interface. Bring up the command prompt window that you opened earlier and ping the IP address that you
received from your team member. Notice that you start seeing data appear in the top window of
Wireshark again.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 14
Lab - Using Wireshark to View Network Traffic
Note: If your team members PC does not reply to your pings, this may be because their PC firewall is
blocking these requests. Please see Appendix A: Allowing ICMP Traffic Through a Firewall for information
on how to allow ICMP traffic through the firewall using Windows 7.
g. Stop capturing data by clicking the Stop Capture icon.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 14
Lab - Using Wireshark to View Network Traffic
a. Click the first ICMP request PDU frames in the top section of Wireshark. Notice that the Source column
has your PCs IP address, and the Destination contains the IP address of the teammates PC you pinged.
b. With this PDU frame still selected in the top section, navigate to the middle section. Click the plus sign to
the left of the Ethernet II row to view the Destination and Source MAC addresses.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 14
Lab - Using Wireshark to View Network Traffic
Does the Source MAC address match your PCs interface? ______ Yes
Does the Destination MAC address in Wireshark match your team members MAC address?
_____ Yes
How is the MAC address of the pinged PC obtained by your PC?
___________________________________________________________________________________
The MAC address is obtained through an ARP request.
Note: In the preceding example of a captured ICMP request, ICMP data is encapsulated inside an IPv4
packet PDU (IPv4 header) which is then encapsulated in an Ethernet II frame PDU (Ethernet II header)
for transmission on the LAN.
b. Make sure the check box next to the LAN interface is checked, and click Start.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 14
Lab - Using Wireshark to View Network Traffic
c. A window prompts to save the previously captured data before starting another capture. It is not
necessary to save this data. Click Continue without Saving.
d. With the capture active, ping the following three website URLs:
1) www.yahoo.com
2) www.cisco.com
3) www.google.com
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 14
Lab - Using Wireshark to View Network Traffic
Note: When you ping the URLs listed, notice that the Domain Name Server (DNS) translates the URL to
an IP address. Note the IP address received for each URL.
e. You can stop capturing data by clicking the Stop Capture icon.
Step 2: Examining and analyzing the data from the remote hosts.
a. Review the captured data in Wireshark, examine the IP and MAC addresses of the three locations that
you pinged. List the destination IP and MAC addresses for all three locations in the space provided.
st
1 Location: IP: _____._____._____._____ MAC: ____:____:____:____:____:____
nd
2 Location: IP: _____._____._____._____ MAC: ____:____:____:____:____:____
rd
3 Location: IP: _____._____._____._____ MAC: ____:____:____:____:____:____
IP addresses: 72.30.38.140, 192.133.219.25, 74.125.129.99 (these IP addresses may vary)
MAC address: This will be the same for all three locations. It is the physical address of the routers
default-gateway LAN interface.
b. What is significant about this information?
____________________________________________________________________________________
The MAC addresses for all three locations are the same.
c. How does this information differ from the local ping information you received in Part 1?
____________________________________________________________________________________
____________________________________________________________________________________
A ping to a local host returns the MAC address of the PCs NIC. A ping to a remote host returns the MAC
address of the default gateways LAN interface.
Reflection
Why does Wireshark show the actual MAC address of the local hosts, but not the actual MAC address for the
remote hosts?
_______________________________________________________________________________________
_______________________________________________________________________________________
MAC addresses for remote hosts are not known on the local network, so the MAC address of the default-
gateway is used. After the packet reaches the default-gateway router, the layer 2 information is stripped from
the packet and a new Layer 2 header is attached with the destination MAC address of the next hop router.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 14
Lab - Using Wireshark to View Network Traffic
Step 1: Create a new inbound rule allowing ICMP traffic through the firewall.
a. From the Control Panel, click the System and Security option.
c. In the left pane of the Windows Firewall window, click Advanced settings.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 14
Lab - Using Wireshark to View Network Traffic
d. On the Advanced Security window, choose the Inbound Rules option on the left sidebar and then click
New Rule on the right sidebar.
e. This launches the New Inbound Rule wizard. On the Rule Type screen, click the Custom radio button
and click Next
f. In the left pane, click the Protocol and Ports option and using the Protocol type drop-down menu, select
ICMPv4, and then click Next.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 14
Lab - Using Wireshark to View Network Traffic
g. In the left pane, click the Name option and in the Name field, type Allow ICMP Requests. Click Finish.
This new rule should allow your team members to receive ping replies from your PC.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 14
Lab - Using Wireshark to View Network Traffic
b. To disable the rule, click the Disable Rule option. When you choose this option, you will see this option
change to Enable Rule. You can toggle back and forth between Disable Rule and Enable Rule; the
status of the rule also shows in the Enabled column of the Inbound Rules list.
c. To permanently delete the ICMP rule, click Delete. If you choose this option, you must re-create the rule
again to allow ICMP replies.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 14
Lab - Using Wireshark to View Network Traffic
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 14
Class Activity - Guaranteed to Work! (Instructor Version Optional
Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain the role of protocols and standards organizations in facilitating interoperability in network
communications.
Background / Scenario
You have just completed the Chapter 3 content regarding network protocols and standards.
Assuming you resolved the beginning of this chapters modeling activity, how would you compare the
following steps taken to design a communications system to the networking models used for
communications?
Associated
Steps to Communicate Possible Answers
TCP/IP Model Layer
Instructor Note: This optional Modeling Activity may be used as a graded assignment. It should demonstrate
how network protocols and standards facilitate the transfer of data from source to destination, in both
personal and in corporate practice. Facilitation of the discussion should include student-to-student
discussions to show how students perceptions have been changed.
Required Resources
Blank Steps to Communicate table (above) for students to record their answers based upon their
Chapter 3 content knowledge.
Reflection
How does your network model in developing an automotive repair communications plan compare to a network
communications interoperability plan?
_______________________________________________________________________________________
Students tables might look like this (with variations)
Associated
Steps to Communicate Possible Answers
TCP/IP Model Layer
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - Guaranteed to work!
Checking to see if the message has been Asking the mechanic to repeat Internet Layer
delivered correctly to the mechanic who will be the full problem which is
performing the repairs occurring with the automobile. (Packets)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Class Activity Managing the Medium (Instructor Version Optional
Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Describe the purpose and function of the data link layer in preparing communication for transmission on
specific media.
Background /Scenario
You and your colleague are attending a networking conference. There are many lectures and presentations
held during this event, and because they overlap, each of you can attend only a limited set of sessions.
Therefore, you decide to split up, each of you attending a separate set of presentations, and after the event
ends, you share the slides and the knowledge each of you gained during the event.
Instructor Note: This optional Modeling Activity is not intended to be a graded assignment. Its purpose is to
encourage students to reflect on their perceptions of how a network is prepared to use specific media in data
transmission for personal and corporate practice. Facilitation of the discussion should be initiated as a result
of this activity
Required Resources
Recording capabilities (paper, tablet, etc.) for reflective comments to be shared with the class.
Reflection
1. How would you personally organize a conference where multiple sessions are held at the same time? Would
you put all of them into a single conference room, or would you use multiple rooms? What would be the
reason? Explain your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
If multiple independent sessions are being held, it is necessary to put them into separate rooms. Otherwise,
the speakers would overlap, making it very hard, if not impossible, to understand what the presenters are
saying. Keeping separate sessions in separate rooms is not done for the purpose of security (although there
can be private sessions only for invited guests with restrictions on who can join and what can be shared after
the session) but rather for the purpose of keeping the communication separated for better clarity and
efficiency.
Our networks are separated into multiple data-link layer domains (broadcast domains) for the purpose of
containing the communication of similar properties workgroups, applications, floors, security requirements,
etc. This is similar to separating all sessions into multiple conference rooms according to their topics.
2. Assume that the conference room is properly fitted with audiovisual equipment to display large-size video and
amplify the speakers voice. If a person wanted to attend a specific session, does it matter which seat will the
person takes, or is it sufficient for the person to sit anywhere as long as it is in appropriate conference room?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Class Activity Managing the Medium
It is sufficient to visit the proper conference room. A particular seat is not important as long as from each seat,
an attendee can hear and listen without obstructions.
The relative independence on the particular seat is similar to the relative independence of a node within a
network from its particular host address. For the purpose of communication within a single network, it is
sufficient that the nodes are in the same data-link layer domain and have unique addresses but it is not
important what exact addresses these are. Two nodes in a common data-link layer domain can talk to each
other and hear each other immediately.
3. What are the potential consequences or benefits if the speech from one conference room somehow leaked
into another?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
It would definitely be at least annoying and distracting, if not directly damaging to the flow of the session.
In real networks, there are situations where two data-link layer domains originally intended to be separate
become joined (incorrect wiring, misconfiguration, bug) and leak information from one to another. This is
not a correct situation. Even if nodes from two different data-link layer domains are to communicate together,
their connection must be done in a controlled way using routers that interconnect separate data-link layer
domains similar to a person attending a single session and then, afterwards, sharing the knowledge with
(i.e. routing the knowledge to) another person who did not attend.
4. If questions or inquiries arise during a presentation, should an attendee simply shout out his/her question, or
should there be some process of assuring that attendees are given an opportunity to ask questions that
everyone can hear? What would happen without this process?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Questions, comments, inquiries etc. from the audience should be given in a controlled manner. Otherwise,
two or more people will be talking at the same time, causing their neighbors to not understand any of them,
and each speaker would need to repeat what he/she said. Usually, a raised hand indicates that a person has
something to say.
In networks, there are two main methods of accessing the medium either deterministic or random. Raising a
hand and waiting to be given a turn is a deterministic approach, similar to token passing. Seizing an
opportunity to raise a question in a moment of silence without waiting to be given a turn is a random, or
stochastic approach. Note that either of these approaches allows for the information to be exchanged both
ways between the audience and the presenter, i.e. a sort of duplex is present. However, because a
conference room is a domain of a shared medium where only one person can speak at a time, otherwise
collisions occur, the duplex here is a half-duplex.
5. Can a session run out of time without going through the entire intended content if an interesting topic elicits a
larger discussion where many attendees have questions? If you did not want this to happen, what would be
the best way to ensure that it does not occur?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Absolutely with increasing amount of information to be shared over the same medium, each speaker must
wait for others to finish their speech. This in turn delays every speaker, possibly resulting in the presenter not
making it through the whole content of the presentation. With increasing number of stations in a network,
especially if the communication has a one-to-all nature, it may become more and more difficult to transmit
data in time.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Class Activity Managing the Medium
6. Imagine that the session is in a panel format, which allows more free discussion of attendees with the
panelists and among themselves. If a person wants to address another person within the same room, can
he/she do it directly? If so, how is this possible? How would a panelist invite another person to join who is not
presently in the room?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Within the same room, attendees can address themselves directly they are in the same domain, on the
same medium, they can hear each other immediately. There is no need for any intermediate process to
deliver the data. Even if there is a device that aids to relay the information just to the intended recipient within
the room (such as one person asking another to relay his message to the faraway neighbor), if any person
stood out and started shouting, everyone could hear it.
If a panelist wanted to invite another person to the room, he/she would need to ask the assistants to search
for that person and invite him. These assistants would need to purposefully route the invitation further until it
reaches the invited person.
Communication within the same network is done immediately. Communication with nodes outside the network
is mediated by routers.
7. What benefit, if any, was achieved by the isolation of multiple sessions into separate conference rooms if,
after the event, people could meet and share the information?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
As explained, the isolation was not done to provide security in the first place. The isolation was to contain the
communication of the same or similar properties into a well-managed environment that allows the participants
to interact directly, and to talk in a mediated, routed way to those who are not within the same domain. This
reduced the number of possible collisions and also reduces the impact of broadcasts (shouting) on the
network.
Identify elements of the model that map to IT-related content:
Conference room Data-link layer domain, broadcast domain
Seat in a conference room Corresponds to a particular L3 or L2 address
Questions, inquiries Correspond to bi-directional, duplex communication
Method of asking a question Corresponds to media access control method
Shouting over a conference room Corresponds to broadcast
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Lab A - Identifying Network Devices and Cabling (Instructor
Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Part 1: Identify Network Devices
Part 2: Identify Network Media
Background / Scenario
As a member of the networking support staff, you must be able to identify different networking equipment.
You must also understand the function of equipment in the appropriate part of the network. In this lab, you will
have access to network devices and media. You will identify the type and characteristics of the network
equipment and media.
Instructor Note: This is an open-ended lab. Devices and cabling to be identified will be dependent on what
the academy and instructor have available (either standalone or in racks). Although real equipment is
preferable, the instructor can supplement real devices with good quality photos of devices, if desired.
Instructor Note: Instructors are encouraged to contact the local telephone company (telco) and cable
operators for cabling examples. A tour of the academy data center (with approval of the IT director) can be a
valuable experience for the students. The instructor can coordinate with the IT or Networking department to
tag various devices in a real environment for identification.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Lab A - Identifying Network Devices and Cabling
2 GigabitEthernet Ports
2 EHWIC slots
1 Cisco 1941 Router Router 2 CompactFlash slots
1 ISM slot
2 Console ports: USB, RJ-45
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Lab A - Identifying Network Devices and Cabling
Reflection
After you have identified the network equipment, where would you find more information about the
equipment?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
RFC, equipment manufacturer website or literature
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Lab - Building an Ethernet Crossover Cable (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Addressing Table
Objectives
Part 1: Analyze Ethernet Cabling Standards and Pinouts
Part 2: Build an Ethernet Crossover Cable
Part 3: Test an Ethernet Crossover Cable
Background / Scenario
In this lab, you will build and terminate an Ethernet crossover cable and test it by connecting two PCs
together and pinging between them. You will first analyze the Telecommunications Industry
Association/Electronic Industries Association (TIA/EIA) 568-A and 568-B standards and how they apply to
Ethernet cables. You will then construct an Ethernet crossover cable and test it. Finally, you will use the cable
you just constructed to connect two PCs together and test it by pinging between them.
Note: With autosensing capabilities available on many devices, such as the Cisco 1941 Integrated Services
Router (ISR) switch, you may see straight-through cables connecting like devices.
Instructor Note: This optional lab can be quite challenging for some students. Many RJ-45 connectors may
be used before a successful cable is built. If resources are limited, you may wish to have two students build
one cable instead of having each student construct one individually.
Required Resources
One length of cable, either Category 5 or 5e. Cable length should be 0.6 to 0.9m (2 to 3 ft.)
2 RJ-45 connectors
RJ-45 crimping tool
Wire cutter
Wire stripper
Ethernet cable tester (optional)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6
Lab - Building an Ethernet Crossover Cable
2 PCs (Windows 7 or 8)
Step 1: Analyze diagrams and tables for the TIA/EIA 568-A standard Ethernet cable.
The following table and diagrams display the color scheme and pinouts, as well as the function of the four
pairs of wires used for the 568-A standard.
Note: In LAN installations using 100Base-T (100 Mb/s), only two pairs out of the four are used.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6
Lab - Building an Ethernet Crossover Cable
10Base-T Signal
Pin Number Pair Number Wire Color 100Base-TX Signal 1000Base-T Signal
The following diagrams display how the wire color and pinouts align with an RJ-45 jack for the 568-A
standard.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6
Lab - Building an Ethernet Crossover Cable
Step 2: Analyze diagrams and tables for the TIA/EIA 568-B standard Ethernet cable.
The following table and diagram display the color scheme and pinouts for the 568-B standard.
568-B 10/100/1000-BaseTX Ethernet
10Base-T Signal
Pin Number Pair Number Wire Color 100Base-TX Signal 1000Base-T Signal
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6
Lab - Building an Ethernet Crossover Cable
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6
Lab - Building an Ethernet Crossover Cable
Step 2: Connect two PCs together via NICs using your Ethernet crossover cable.
a. Working with a lab partner, set your PC to one of the IP addresses shown in the Addressing Table (see
page 1). For example, if your PC is PC-A, your IP address should be set to 192.168.10.1 with a 24-bit
subnet mask. You partners IP address should be 192.168.10.2. The default gateway address can be left
empty.
b. Using the crossover cable you made, connect the two PCs together via their NICs.
c. On the PC-A command prompt, ping the PC-B IP address.
Note: The Windows firewall may have to be temporarily disabled for pings to be successful. If the firewall is
disabled, make sure you re-enable it at the conclusion of this lab.
d. Repeat the process and ping from PC-B to PC-A.
Assuming IP addressing and firewall are not issues, your pings should be successful if the cables were
properly made.
Reflection
1. Which part of making cables did you find the most difficult?
_______________________________________________________________________________________
Answers will vary. Inserting the cables in the proper order into the RJ-45 connector is usually the hardest part.
2. Why do you have to learn how to make a cable if you can easily buy pre-made cables?
_______________________________________________________________________________________
A cable may go bad in a production environment. It may be too time consuming or costly to replace and it is
often simpler to merely re-cable each end if necessary.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6
Lab Viewing Wireless and Wired NIC Information (Instructor
Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Part 1: Identify and Work with PC NICs
Part 2: Identify and Use the System Tray Network Icons
Background / Scenario
This lab requires you to determine the availability and status of the network interface cards (NICs) on the PC
that you use. Windows provides a number of ways to view and work with your NICs.
In this lab, you will access the NIC information of your PC and change the status of these cards.
Required Resources
1 PC (Windows 7 or 8 with two NICs, wired and wireless, and a wireless connection)
Note: At the start of this lab, the wired Ethernet NIC in the PC was cabled to one of the integrated switch
ports on a wireless router and the Local Area Connection (wired) was enabled. The wireless NIC was
disabled initially. If the wired and wireless NICs are both enabled the PC will receive two different IP
addresses and the wireless NIC will take precedence.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 11
Lab Viewing Wireless and Wired NIC Information
Note: Virtual Private Network (VPN) adapters and other types of network connections may also be
displayed in this window.
c. The Wireless Network Connection Status window displays where you can view information about your
wireless connection.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 11
Lab Viewing Wireless and Wired NIC Information
What is the Service Set Identifier (SSID) for the wireless router of your connection?
__________________________ rrplace (in above example)
What is the speed of your wireless connection?
__________________________ 144.0 Mb/s (in above example)
d. Click Details to display the Network Connection Details window.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 11
Lab Viewing Wireless and Wired NIC Information
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 11
Lab Viewing Wireless and Wired NIC Information
Notice that the information displayed here is the same information that was displayed in the Network
Connection Details window in Step d.
g. Close the command window and the Network Connection Details windows. This should bring you back to
the Wireless Network Connection Status window. Click Wireless Properties.
h. In the Wireless Network Properties window, click the Security tab.
i. The type of security the connected wireless router has implemented displays. Click the Show characters
check box to display the actual Network security key, instead of the hidden characters, and then click OK.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 11
Lab Viewing Wireless and Wired NIC Information
j. Close the Wireless Network Properties and the Network Connection Status windows. Select and right-
click the Wireless Network Connection option > Connect/Disconnect. A pop-up window should appear
at the bottom right corner of your desktop that displays your current connections, along with a list of
SSIDs that are in range of the wireless NIC of your PC. If a scrollbar appears on the right side of this
window, you can use it to display additional SSIDs.
k. To join one of the other wireless network SSIDs listed, click the SSID that you want to join, and then click
Connect.
l. If you have selected a secure SSID, you are prompted to enter the Security key for the SSID. Type the
security key for that SSID and click OK. You can click the Hide characters check box to prevent people
from seeing what you type in the Security key field.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 11
Lab Viewing Wireless and Wired NIC Information
b. The Local Area Connection Status window will open. This window displays information about your wired
connection to the LAN.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 11
Lab Viewing Wireless and Wired NIC Information
c. Click Details to view the address information for your LAN connection.
d. Open a command window prompt and type ipconfig /all. Find your Local Area Connection information
and compare this with the information displayed in the Network Connection Details window.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 11
Lab Viewing Wireless and Wired NIC Information
b. Click the Open Network and Sharing Center link. Note: This is a shortcut way to bring up this window.
c. In the left pane, click the Change adapter settings link to display the Network Connections window.
d. Select and right-click the Wireless Network Connection, and then click Disable to disable your wireless
NIC.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 11
Lab Viewing Wireless and Wired NIC Information
e. Examine your system tray. The Wireless Network Connection icon should be replaced by the Wired
Network icon, which indicates that you are using your wired NIC for network connectivity.
Note: If both NICs are active, the Wireless Network icon is the one that is displayed.
b. Click the Open Network and Sharing Center link > Change adapter settings and Enable your
Wireless Network Connection. The Wireless Network icon should replace the Wired Network icon in
your system tray.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 11
Lab Viewing Wireless and Wired NIC Information
b. The system tray now displays the Network Disabled icon, which indicates that network connectivity has
been disabled.
c. You can click this icon to return to the Network and Sharing Center window (examine the network
diagram at the top).
You can click the red X to have the PC troubleshoot the problem with the network connection.
Troubleshooting attempts to resolve the network issue for you.
d. If troubleshooting did not enable one of your NICs, then you should do this manually to restore the
network connectivity of your PC.
Note: If a network adapter is enabled and the NIC is unable to establish network connectivity, then the
Network Problem icon appears in the system tray.
If this icon appears, you can troubleshoot this issue just like you did in Step 3c.
Reflection
Why would you activate more than one NIC on a PC?
_______________________________________________________________________________________
Answers may vary. Multiple NICs can be used if more than one path is needed for the PC. One example of
this would be if the PC is being used as a Proxy Server.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 11
Class Activity - Linked In! (Instructor Version Optional Class
Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Connect devices using wired and wireless media.
Physical Topology
Background /Scenario
Note: This activity is best completed in groups of 2-3 students.
Your small business is moving to a new location! Your building is brand new, and you must come up with a
physical topology so that network port installation can begin.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Class Activity - Linked In!
Your instructor will provide you with a blueprint created for this activity. The area on the blueprint, indicated by
Number 1, is the reception area and the area numbered RR is the restroom area.
All rooms are within Category 6 UTP specifications (100 meters), so you have no concerns about hard-wiring
the building to code. Each room in the diagram must have at least one network connection available for
users/intermediary devices.
Do not go into excessive detail on your design. Just use the content from the chapter to be able to justify your
decisions to the class.
Instructor Note: This optional Modeling Activity is not intended to be a graded assignment. Its purpose is to
encourage students to reflect on their comprehension of the data link layer from a physical perspective
wired and wireless connectivity. A facilitated discussion should be initiated as a result of this activity.
Required Resources
Packet Tracer software
Reflection
1. Where would you locate your network main distribution facility, while keeping security in mind?
_______________________________________________________________________________________
_______________________________________________________________________________________
Room 11 is the smallest room and would serve well as the main distribution facility or network center. It is
situated away from plumbing, which could interfere with copper quality. It is also located away from most of
the other offices/rooms for security purposes and has only one entry door.
2. How many intermediary devices you would use and where would you place them?
_______________________________________________________________________________________
_______________________________________________________________________________________
One or two switches could be placed in Room 11 for scalability and access to other end devices. One
router for connectivity to the ISP could be placed in Room 11, as well. One or two wireless ISRs could be
placed in the diagram, possibly in Room 7 or 12 for wireless access throughout the physical space.
3. What kind of cabling you would use (UTP, STP, wireless, fiber optics, etc.) and where would the ports be
placed?
_______________________________________________________________________________________
_______________________________________________________________________________________
Each room would incorporate at least one UTP jack for intermediary device connectivity or singular user
access. The central network room (main distribution facility) would need more than one network port as it
serves internal (LAN) connections and external (WAN) connections for the WAN, fiber optics would
probably be run for ISP connectivity.
4. What types of end devices you would use (wired, wireless, laptops, desktops, tablets, etc.)?
_______________________________________________________________________________________
_______________________________________________________________________________________
Using the answers stated above, it would be feasible to use a combination of wired, wireless laptops,
desktops, servers, tablets, etc. Security and scalability are considered in this model.
Identify elements of the model that map to real-world content:
Network security is considered when connecting a network at the network access layer.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Class Activity - Linked In!
Types of cabling and different modes of technology are included as considerations in designing a network
at the network access layer.
Different data technologies are options are available to designers to facilitate data traffic flow at the
network access layer.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Class Activity - Join My Social Circle! (Instructor Version Optional
Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Describe the impact of ARP requests on network and host performance.
Background / Scenario
Note: This activity can be completed individually in class or outside of class.
A lot of our network communication is in the form of email, messaging (text or instant), video contact, and
social media postings.
For this activity, choose one of the following types of network communications and answer the questions in
the Reflection section.
o Text or instant message
o Audio/video conference
o Email
o Online gaming
Instructor Note: This optional Modeling Activity is not intended to be a graded assignment. Its purpose is to
encourage students to reflect on their perceptions of source and destination host identification as compared to
social media. Students answers should generate discussion about how we are identified as we communicate
through these types of networks.
Required Resources
Recording capabilities (paper, tablet, etc.) so that reflective comments can be shared with the class.
Reflection
1. Is there a procedure you must follow to register others and yourself so that you can form a communications
account? Why do you think that a procedure is needed?
_______________________________________________________________________________________
_______________________________________________________________________________________
In each of these services, you are bringing the person you want to communicate with directly into your
network. You are doing this in order to have contact with your friends and be able to communicate directly.
You do not want to have an intermediary person relay messages between you and your friends in your
network. By registering yourself and your friends to your contact list, you are building your own (social)
communication network.
During the registration process, you as a person with a civil name are assigned a service-specific user
identifier that identifies you in the particular communication service. When you add your friends to your
contact list, you are looking for their service-specific user identifiers. This service-specific user identifier may
have different formats:
o Email service: Has an email address
o ICQ accounts: Have a number
o Skype, LinkedIn, or Facebook accounts: Have a username
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - Join My Social Circle!
When you contact the person, you select their civil name in your contact list and the system contacts the user
using the associated user identifier. A single person may have different user identifiers depending on how
many social networks he or she subscribes to.
In communication networks, there is a similar process. Although a network node (for example, a PC) is a
single entity, it may have several network interface cards (NICs). In IP networks, this would be a process of
associating the peers IP address in the same network with its Layer 2 data-link layer address. On Ethernet
and WiFi, IP uses a supporting protocol called Address Resolution Protocol (ARP) to perform this translation.
2. How do you initiate contact with the person or people with whom you wish to communicate?
_______________________________________________________________________________________
_______________________________________________________________________________________
The exact sequence of steps depends on the service you are using to communicate with your peer. However,
there will always be common steps: First, decide within which network your peer is reachable. Second, look
up the persons contact in your contact list, and use it to send your peer a message. Depending on the
service, the message will be received only by this person (email or instant messaging services) or it may be
visible by other people in the recipients network (LinkedIn or Facebook message boards). However, there is
no doubt who the intended recipient is.
When Node A needs to send a message to Node B in an IP network, it determines which network the peer
(Node B) is located within. Node A performs a destination IP (or next-hop IP) into Layer 2 address translation
in order to determine how to address Node Bs NIC. If there are switches on the path between Node A and B,
Node A can send a message that can only be delivered to Node Bs NIC. If there are WiFi stations that can
hear each other, Node As message to Node B can be seen by others.
3. How do you ensure that your conversations are received only by those with whom you wish to communicate?
_______________________________________________________________________________________
_______________________________________________________________________________________
The primary prerequisite is that the message is clearly addressed to a single intended recipient. This is the
purpose of using a contact list that associates individual persons with their unique user identifiers. If we do not
know the user identifier of the recipient, we have to send the message to everyone or not at all. In IP
networks, this is accomplished by the resolution of the recipient (or next-hop) IP address into its unique Layer
2 address, using ARP or a similar mechanism. It is then up to the network technology to make sure that the
message is sent only to the intended recipient.
Some technologies do not allow messages to be sent in a way that prevents third parties from seeing the
message. For example, in Ethernet deployments using hubs or WiFi, the transmission is always visible to all
nodes in the network. Only the intended recipient will process the message, but others can see it. This is
similar to message boards on LinkedIn or Facebook where, although intended for a single recipient, many or
all other users can see the messages.
Identify elements of the model that map to IT-related content:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab Using Wireshark to Examine Ethernet Frames (Instructor
Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Objectives
Part 1: Examine the Header Fields in an Ethernet II Frame
Part 2: Use Wireshark to Capture and Analyze Ethernet Frames
Background / Scenario
When upper layer protocols communicate with each other, data flows down the Open Systems
Interconnection (OSI) layers and is encapsulated into a Layer 2 frame. The frame composition is dependent
on the media access type. For example, if the upper layer protocols are TCP and IP and the media access is
Ethernet, then the Layer 2 frame encapsulation will be Ethernet II. This is typical for a LAN environment.
When learning about Layer 2 concepts, it is helpful to analyze frame header information. In the first part of this
lab, you will review the fields contained in an Ethernet II frame. In Part 2, you will use Wireshark to capture
and analyze Ethernet II frame header fields for local and remote traffic.
Instructor Note: This lab assumes that the student is using a PC with Internet access. It also assumes that
Wireshark has been pre-installed on the PC. The screenshots in this lab were taken from Wireshark v1.12.5
for Windows 7 (64bit).
Required Resources
1 PC (Windows 7 or 8 with Internet access with Wireshark installed)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8
Lab Using Wireshark to Examine Ethernet Frames
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 8
Lab Using Wireshark to Examine Ethernet Frames
Preamble Not shown in capture This field contains synchronizing bits, processed by the NIC
hardware.
Destination Address Broadcast Layer 2 addresses for the frame. Each address is 48 bits
(ff:ff:ff:ff:ff:ff) long, or 6 octets, expressed as 12 hexadecimal digits, 0-
9,A-F.
Source Address GemtekTe_ea:63:8c
A common format is 12:34:56:78:9A:BC.
(00:1a:73:ea:63:8c)
The first six hex numbers indicate the manufacturer of the
network interface card (NIC), the last six hex numbers are
the serial number of the NIC.
The destination address may be a broadcast, which contains
all ones, or a unicast. The source address is always unicast.
Frame Type 0x0806 For Ethernet II frames, this field contains a hexadecimal
value that is used to indicate the type of upper-layer protocol
in the data field. There are numerous upper-layer protocols
supported by Ethernet II. Two common frame types are:
Value Description
0x0800 IPv4 Protocol
0x0806 Address resolution protocol (ARP)
Data ARP Contains the encapsulated upper-level protocol. The data
field is between 46 1,500 bytes.
FCS Not shown in capture Frame Check Sequence, used by the NIC to identify errors
during transmission. The value is computed by the sending
machine, encompassing frame addresses, type, and data
field. It is verified by the receiver.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 8
Lab Using Wireshark to Examine Ethernet Frames
What is the Vendor ID (OUI) of the Sources NIC? __________________________ GemtekTe (Gemtek
Technology Co., Ltd.)
What portion of the MAC address is the OUI?
_______________________________________________________________________________________
The first 3 octets of the MAC address indicate the OUI.
What is the Sources NIC serial number? _________________________________ ea:63:8c
c. On the Wireshark: Capture Interfaces window, select the interface to start traffic capturing by clicking the
appropriate check box, and then click Start. If you are uncertain of what interface to check, click Details
for more information about each interface listed.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 8
Lab Using Wireshark to Examine Ethernet Frames
Step 4: From the command prompt window, ping the default gateway of your PC.
From the command window, ping the default gateway using the IP address that you recorded in Step 1.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 8
Lab Using Wireshark to Examine Ethernet Frames
a. In the Packet List pane (top section), click the first frame listed. You should see Echo (ping) request
under the Info heading. This should highlight the line blue.
b. Examine the first line in the Packet Details pane (middle section). This line displays the length of the
frame; 74 bytes in this example.
c. The second line in the Packet Details pane shows that it is an Ethernet II frame. The source and
destination MAC addresses are also displayed.
What is the MAC address of the PCs NIC? ________________________ 00:1a:73:ea:63:8c in example
What is the default gateways MAC address? ______________________ 80:37:73:ea:b1:7a in example
d. You can click the plus (+) sign at the beginning of the second line to obtain more information about the
Ethernet II frame. Notice that the plus sign changes to a minus (-) sign.
What type of frame is displayed? ________________________________ 0x0800 or an IPv4 frame type.
e. The last two lines displayed in the middle section provide information about the data field of the frame.
Notice that the data contains the source and destination IPv4 address information.
What is the source IP address? _________________________________ 192.168.1.17 in the example
What is the destination IP address? ______________________________ 192.168.1.1 in the example
f. You can click any line in the middle section to highlight that part of the frame (hex and ASCII) in the
Packet Bytes pane (bottom section). Click the Internet Control Message Protocol line in the middle
section and examine what is highlighted in the Packet Bytes pane.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 8
Lab Using Wireshark to Examine Ethernet Frames
Step 10: Examine the new data in the packet list pane of Wireshark.
In the first echo (ping) request frame, what are the source and destination MAC addresses?
Source: _________________________________ This should be the MAC address of the PC.
Destination: ______________________________ This should be the MAC address of the Default Gateway.
What are the source and destination IP addresses contained in the data field of the frame?
Source: _________________________________ This is still the IP address of the PC.
Destination: ______________________________ This is the address of the server at www.cisco.com.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 8
Lab Using Wireshark to Examine Ethernet Frames
Compare these addresses to the addresses you received in Step 6. The only address that changed is the
destination IP address. Why has the destination IP address changed, while the destination MAC address
remained the same?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Layer 2 frames never leave the LAN. When a ping is issued to a remote host, the source will use the Default
Gateways MAC address for the frame destination. The Default Gateway receives the packet, strips the Layer
2 frame information from the packet and then creates a new frame header with the next hops MAC address.
This process continues from router to router until the packet reaches its destination IP address.
Reflection
Wireshark does not display the preamble field of a frame header. What does the preamble contain?
_______________________________________________________________________________________
_______________________________________________________________________________________
The preamble field contains seven octets of alternating 1010 sequences, and one octet that signals the
beginning of the frame, 10101011.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 8
Lab Viewing Network Device MAC Addresses (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Addressing Table
Objectives
Part 1: Configure Devices and Verify Connectivity
Part 2: Display, Describe, and Analyze Ethernet MAC Addresses
Background / Scenario
Every device on an Ethernet LAN is identified by a Layer 2 MAC address. This address is assigned by the
manufacturer and stored in the firmware of the NIC. This lab will explore and analyze the components that
make up a MAC address, and how you can find this information on a switch and a PC.
You will cable the equipment as shown in the topology. You will configure the switch and PC to match the
addressing table. You will verify your configurations by testing for network connectivity.
After the devices have been configured and network connectivity has been verified, you will use various
commands to retrieve information from the devices to answer questions about your network equipment.
Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other
switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the
commands available and the output produced might vary from what is shown in the labs.
Note: Make sure that the switches have been erased and have no startup configurations. If you are unsure,
ask your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7 or 8 with a terminal emulation program, such as Tera Term)
Console cable to configure the Cisco switch via the console ports
Ethernet cables as shown in the topology
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8
Lab Viewing Network Device MAC Addresses
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 8
Lab Viewing Network Device MAC Addresses
hexadecimal digits that are usually separated by dashes, colons, or periods. The following example shows the
same MAC address using the three different notation methods:
00-05-9A-3C-78-00 00:05:9A:3C:78:00 0005.9A3C.7800
Note: MAC addresses are also called physical addresses, hardware addresses, or Ethernet hardware
addresses.
You will issue commands to display the MAC addresses on a PC and a switch, and you will analyze the
properties of each one.
What is the OUI portion of the MAC address for this device?
________________________________________________________________________________
5C-26-0A
What is the serial number portion of the MAC address for this device?
________________________________________________________________________________
24-2A-60
Using the example above, find the name of the vendor that manufactured this NIC.
________________________________________________________________________________
Dell Inc.
b. From the command prompt on PC-A, issue the ipconfig /all command and identify the OUI portion of the
MAC address for the NIC of PC-A.
________________________________________________________________________________
Answers will vary based on manufacturer.
Identify the serial number portion of the MAC address for the NIC of PC-A.
________________________________________________________________________________
Answers will vary based on manufacturer serial number code.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 8
Lab Viewing Network Device MAC Addresses
Identify the name of the vendor that manufactured the NIC of PC-A.
________________________________________________________________________________
Answers will vary based on manufacturer OUI.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 8
Lab Viewing Network Device MAC Addresses
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 8
Lab Viewing Network Device MAC Addresses
Reflection
1. Can you have broadcasts at the Layer 2 level? If so, what would the MAC address be?
_______________________________________________________________________________________
You can have broadcasts at Layer 2. ARP will use broadcasts to find MAC address information. The
broadcast address is FF.FF.FF.FF.FF.FF.
2. Why would you need to know the MAC address of a device?
_______________________________________________________________________________________
There could be a variety of reasons. In a large network, it may be easier to pinpoint location and identity of a
device by its MAC address instead of its IP address. The MAC OUI will list the manufacturer, which may help
narrow down the search. Security measures can be applied at Layer 2, so knowledge of allowable MAC
addresses is needed.
Device Config
Switch S1
S1# show run
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 8
Lab Viewing Network Device MAC Addresses
!
boot-start-marker
boot-end-marker
!
no aaa new-model
system mtu routing 1500
!
no ip domain-lookup
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 8
Lab Viewing Network Device MAC Addresses
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.1 255.255.255.0
!
ip http server
ip http secure-server
logging esm config
!
line con 0
line vty 5 15
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 8
Lab Viewing the Switch MAC Address Table (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Build and Configure the Network
Part 2: Examine the Switch MAC Address Table
Background / Scenario
The purpose of a Layer 2 LAN switch is to deliver Ethernet frames to host devices on the local network. The
switch records host MAC addresses that are visible on the network, and maps those MAC addresses to its
own Ethernet switch ports. This process is called building the MAC address table. When a switch receives a
frame from a PC, it examines the frames source and destination MAC addresses. The source MAC address
is recorded and mapped to the switch port from which it arrived. Then the destination MAC address is looked
up in the MAC address table. If the destination MAC address is a known address, then the frame is forwarded
out of the corresponding switch port associated with that MAC address. If the MAC address is unknown, then
the frame is broadcasted out of all switch ports, except the one from which it came. It is important to observe
and understand the function of a switch and how it delivers data on the network. The way a switch operates
has implications for network administrators whose job it is to ensure secure and consistent network
communication.
Switches are used to interconnect and deliver information to computers on local area networks. Switches
deliver Ethernet frames to host devices identified by network interface card MAC addresses.
In Part 1, you will build a multi-switch topology with a trunk linking the two switches. In Part 2, you will ping
various devices and observe how the two switches build their MAC address tables.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other
switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the
commands available and output produced might vary from what is shown in the labs.
Note: Make sure that the switches have been erased and have no startup configurations. If you are unsure
contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Note: The Fast Ethernet interfaces on Cisco 2960 switches are autosensing and an Ethernet straight-through
cable may be used between switches S1 and S2. If using another model Cisco switch, it may be necessary to
use an Ethernet crossover cable.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
Step 3: Clear the S2 MAC address table and display the MAC address table again.
a. In privileged EXEC mode, type the clear mac address-table dynamic command and press Enter.
S2# clear mac address-table dynamic
b. Quickly type the show mac address-table command again. Does the MAC address table have any
addresses in it for VLAN 1? Are there other MAC addresses listed?
___________________________________________________________________________________
No. The student will most likely discover that the MAC address for the other switchs F0/1 switch port has
been quickly reinserted in the MAC address table.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
Step 4: From PC-B, ping the devices on the network and observe the switch MAC address
table.
a. From PC-B, open a command prompt and type arp -a. Not including multicast or broadcast addresses,
how many device IP-to-MAC address pairs have been learned by ARP?
____________________________________________________________________________________
Answers will vary. The ARP cache may have no entries in it, or it may have the gateway IP address to
MAC address mapping.
C:\Users\PC-B> arp -a
Interface: 192.168.1.2 --- 0xb
Internet Address Physical Address Type
192.168.1.1 30-f7-0d-a3-17-c1 dynamic
C:\Users\PC-B>
b. From the PC-B command prompt, ping PC-A, S1, and S2. Did all devices have successful replies? If not,
check your cabling and IP configurations.
____________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
____________________________________________________________________________________
If the network was cabled and configured correctly the answer should be yes.
c. From a console connection to S2, enter the show mac address-table command. Has the switch added
additional MAC addresses to the MAC address table? If so, which addresses and devices?
____________________________________________________________________________________
____________________________________________________________________________________
There may only be one additional MAC address mapping added to the table, most likely the MAC address
of PC-A.
S2# show mac address-table
Mac Address Table
-------------------------------------------
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
Reflection
On Ethernet networks, data is delivered to devices by their MAC addresses. For this to happen, switches and
PCs dynamically build ARP caches and MAC address tables. With only a few computers on the network this
process seems fairly easy. What might be some of the challenges on larger networks?
_______________________________________________________________________________________
ARP broadcasts could cause broadcast storms. Because ARP and switch MAC tables do not authenticate or
validate the IP addresses to MAC addresses it would be easy to spoof a device on the network.
Device Configs
Switch S1
S1#show running-config
Building configuration...
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname S1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
system mtu routing 1500
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.11 255.255.255.0
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
!
ip default-gateway 192.168.1.1
ip http server
ip http secure-server
!
line con 0
line vty 0 4
password cisco
login
line vty 5 15
login
!
end
Switch S2
S2#show running-config
Building configuration...
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname S2
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
system mtu routing 1500
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.12 255.255.255.0
!
ip default-gateway 192.168.1.1
ip http server
ip http secure-server
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 11
Lab - Using IOS CLI with Switch MAC Address Tables
line con 0
line vty 0 4
password cisco
login
line vty 5 15
login
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 11
Class Activity - MAC and Choose (Instructor Version Optional
Class Activity))
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Describe basic switching concepts.
Background / Scenario
Note: This activity is best completed in groups of 2-3 students.
Please view the video titled The History of Ethernet, and located at the following link:
http://www.netevents.tv/video/bob-metcalfe-the-history-of-ethernet
Topics discussed in the video include not only where we have come from in Ethernet development, but where
we are going with Ethernet technology in the future!
After viewing the video, go to the web and search for information about Ethernet.
Collect three pictures of old, current, and possible future Ethernet physical media and devices. Focus your
search on switches if possible. Share these pictures with the class and discuss.
Use the questions in the Reflection section to guide your search.
Instructor Note: This optional Modeling Activity is not intended to be a graded assignment. Its purpose is to
encourage students to reflect on their perceptions of how Ethernet has developed to todays standards,
including its use in LANs and WANs for the transmission of frames. Facilitation of the discussion should
include student-to-student discussions of each others work.
Required Resources
Internet access to the video titled History of Ethernet, and located at http://www.netevents.tv/video/bob-
metcalfe-the-history-of-ethernet
Hard or soft-copy media to record answers to questions and to share in class.
Reflection
1. How was Ethernet used when it was first developed?
_______________________________________________________________________________________
_______________________________________________________________________________________
Students may mention that Ethernet was first developed to be used with printers (video information).
2. How has Ethernet stayed the same over the past 25 years? What changes are being made to make it more
useful/applicable to todays data transmission methods?
_______________________________________________________________________________________
_______________________________________________________________________________________
Ethernet still uses copper cabling and wireless transmission, while the speed and distance of the
transmissions are being developed to meet current and future data transmission methods.
3. How have Ethernet physical media and intermediary devices changed?
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
MAC and choose
_______________________________________________________________________________________
The speed and distance of data communications have increased exponentially. Intermediary devices have
been designed to use different types of cabling endpoints to support the increase in speed and distance.
4. How have Ethernet physical media and intermediary devices stayed the same?
_______________________________________________________________________________________
_______________________________________________________________________________________
Switches still handle most Ethernet transmissions, whether they are Layer 2 or Layer 3. However, the framing
is the same except for minor modifications to the frames introductory sections, which indicate what type of
frame is being transmitted, etc.
5. How do you think the Ethernet will change in the future? What factors could influence these changes?
_______________________________________________________________________________________
_______________________________________________________________________________________
Device connections and speed/distance developments will change how networks will access other networks,
but the underlying technology of Ethernet and the framing of Ethernet transmissions will probably stay the
same. Wireless is an example of this. It is legacy and current/futuristic.
Reality
Identify elements of the model that map to IT-related content:
Ethernet is a technology-based idea with cabling, speed. Methods of signaling are all involved in deciding
which method of Ethernet to use in a network.
Switches use Ethernet technology at both the LAN and WAN sides of a network.
Even though Ethernet is legacy in its inception, it is still fully current in application on todays networks,
especially in framing formats with slight modifications.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Class Activity - The Road Less TraveledOr Is It? (Instructor
Version Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain how network devices use routing tables to direct packets to a destination network.
Background /Scenario
During the upcoming weekend, you decide to visit a schoolmate who is currently at home sick. You know his
street address but you have never been to his town before.
Instead of looking up the address on the map, you decide to take it easy and to simply ask town residents for
directions after you arrive by train.
The citizens you ask for directions are very helpful. However, they all have an interesting habit. Instead of
explaining the entire route to your destination, they all tell you, Take this road and as soon as you arrive at
the nearest crossroad, ask somebody there again.
Somewhat bemused at this apparent oddity, you follow these instructions and finally arrive, crossroad by
crossroad, and road by road, at your friends house.
Instructor Note: This optional Modeling Activity is not intended to be a graded assignment. Its purpose is to
encourage students to reflect on their perceptions of how a network uses pathways to send and receive data
communications. Facilitation of the discussion should be initiated as a result of this activity.
Reflection
1. Would it have made a significant difference if you were told about the whole route or a larger part of the route
instead of just being directed to the nearest crossroad?
_______________________________________________________________________________________
_______________________________________________________________________________________
It would not really make a difference. The key fact to remember here is that to reach any part of the route
behind the nearest crossroad, we must first reach that crossroad. If residents at each crossroad can be
assumed to know their town well, it is not really helpful to ask about what is beyond the first crossroad as we
must still reach it, and on each crossroad, we will be directed appropriately. Please make the students aware,
however, that congestion can also affect whether an route is better than another to use.
2. Would it have been more helpful to ask about the specific street address or just about the street name?
_______________________________________________________________________________________
_______________________________________________________________________________________
Asking about the street name, omitting the house number, is sufficient. Once we get to the destination street,
we can easily look up the house ourselves. People at crossroads will be able to direct us even without telling
them the exact house number. They do not need to know each and every house in every street it is
sufficient they know the streets themselves.
3. What would happen if the person you asked for directions did not know where the destination street was or
directed you through an incorrect road?
_______________________________________________________________________________________
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
The Road Less TraveledOr Is It?
In that case, we would be in risk of getting either misrouted and following a longer route to the destination
than necessary, or we may even end up going in circles or getting lost.
4. Assuming that on your way back home, you again choose to ask residents for directions. Is it guaranteed that
you will be directed via the same route you took to get to your friends home? Explain your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________
There is no such guarantee. Each person at a crossroad makes an individual and independent choice about
the best path. It is quite possible that if the residents do not have the same knowledge or ideas about the
routes within their town, you would be going back to the train station via a different route.
5. Is it necessary to explain where you depart from when asking directions to an intended destination?
_______________________________________________________________________________________
_______________________________________________________________________________________
Describing where you departed from is not helpful when choosing path towards a destination. It is only the
destination itself that matters when selecting the best route towards it.
Identify elements of the model that map to IT-related content:
Crossroads Correspond to stops along the way (routers)
Roads Correspond to interface links between routers
Street Corresponds to a network
Irrelevancy of house number when asking for the path to the destination street Corresponds to routers
knowing about networks, not about individual hosts
Asking about the path to destination at each crossroad Corresponds to path selection performed on
each router
Train station, friends house Corresponds to source and destination
Relevancy of only the destination when asking for a path Corresponds to destination-based routing
Different possible paths to and from the friend Correspond to independent routing to and from a
destination
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab - Exploring Router Physical Characteristics (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Examine Router External Characteristics
Part 2: Examine Router Internal Characteristics Using Show Commands
Background / Scenario
In this lab, you will examine the outside of the router to become familiar with its characteristics and
components, such as its power switch, management ports, LAN and WAN interfaces, indicator lights, network
expansion slots, memory expansion slots, and USB ports.
You will also identify the internal components and characteristics of the IOS by consoling into the router and
issuing various commands, such as show version and show interfaces, from the CLI.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). Other routers and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs.
Note: Make sure that the routers have been erased and have no startup configurations. If you are unsure,
contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Instructor Note: Depending on equipment availability, the instructor may wish to use the lab as a guided
lecture/demonstration to point out the router characteristics and discuss them with the class.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9
Lab - Exploring Router Physical Characteristics
a. Circle and label the routers power switch. Is the power switch on your router in the same area as the
router depicted in the image?
____________________________________________________________________________________
Answers may vary depending on the academys lab routers. Students should draw a line around the
on/off switch in the image
b. Circle and label the management ports. What are the built-in management ports? Are the management
ports the same on your router? If not, how are they different?
____________________________________________________________________________________
Answers may vary depending on the academys lab routers. Students should draw a circle around the
console port, auxiliary port, and mini USB console port in the image.
c. Circle and label the routers LAN interfaces. How many LAN interfaces does the router in the image have
and what is the interface technology type? Are the LAN interfaces the same on your router? If not, how
are they different?
____________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 9
Lab - Exploring Router Physical Characteristics
Answers may vary depending on the academys lab routers. Students should draw a circle around the
Gigabit Ethernet 0/0 and 0/1 interfaces in the image.
d. Circle and label the routers WAN interfaces. How many WAN interfaces does the router in the image
have and what is the interface technology type? Are the WAN interfaces the same on your router? If not,
how are they different?
____________________________________________________________________________________
Answers may vary depending on the academys lab routers. Students should draw a circle around the
Serial 0 and Serial 1 interfaces in the image.
e. The Cisco 1941 ISR is a modular platform and comes with module expansion slots for varied network
connectivity requirements. Circle and label the module slots. How many module slots are there? How
many are used? What type of module expansion slots are they? Are the module slots the same on your
router? If not, how are they different?
____________________________________________________________________________________
Answers may vary depending on the academys lab routers. The image depicts a Cisco 1941 ISR with
two module expansion slots for Enhanced High-Speed WAN interface cards, EHWIC 0 and EHWIC 1.
EHWIC 0 is occupied by a Smart Serial WAN interface card. EHWIC1 will accept a double wide
expansion card. The EHWIC slot replaces the high-speed WAN interface card (HWIC) slot and can
natively support HWICs, WAN interface cards (WICs), voice interface cards (VICs), and voice/WAN
interface cards (VWICs).
f. The Cisco 1941 router comes with CompactFlash memory slots for high speed storage. Circle and label
the CompactFlash memory slots. How many memory slots are there? How many are used? How much
memory can they hold? Are the memory slots the same on your router? If not, how are they different?
____________________________________________________________________________________
Answers may vary depending on the academys lab routers. The image depicts a Cisco 1941 ISR with
two CompactFlash memory slots, CF0 and CF1. CF0 is occupied by a 256 MB CompactFlash memory
card used to store the Cisco IOS system image file.
g. The Cisco 1941 router comes with USB 2.0 ports. The built-in USB ports support eToken devices and
USB flash memory. The USB eToken device feature provides device authentication and secure
configuration of Cisco routers. The USB flash feature provides optional secondary storage capability and
an additional boot device. Circle and label the USB ports. How many USB ports are there? Are there USB
ports on your router?
____________________________________________________________________________________
Answers may vary depending on the academys lab routers. The image depicts a Cisco 1941 ISR with
two USB 2.0 ports.
h. The Cisco 1941 router also comes with a mini-B USB console port. Circle and label the mini-B USB
console port.
____________________________________________________________________________________
Answers may vary depending on the academys lab routers. The image depicts a Cisco 1941 ISR with a
mini USB console port next to the regular console port.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 9
Lab - Exploring Router Physical Characteristics
a. In the top image above, examine the indicator lights on the front panel of the router? The lights are
labeled SYS, ACT, and POE. What do the labels refer to? What do the lights in the image indicate about
the status of the router? These labels would be readable if they were not lit.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The SYS, ACT, and POE lights refer to: system status, network activity, and power over Ethernet. The
lights in the image show that the routers system is successfully powered on, that there is network activity,
and that Power over Ethernet is not activated.
b. In the backplane image above, examine the indicator lights on the router. There are three visible activity
lights, one for each of the connected interfaces and management ports. Examine the interface lights on
your router. How are the lights labeled, and what is their meaning?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The lights in the image show that the serial and Gigabit Ethernet interfaces are active and that the
Console management port is enabled and active. The Gigabit Ethernet interfaces have two lights each,
one labeled S for sending and the other labeled L for link. The console port and mini USB console port
have an EN label for enabled. The serial interfaces each have a light labeled Conn for connected.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 9
Lab - Exploring Router Physical Characteristics
c. Aside from the management ports and network interfaces, what other indicator lights are on the
backplane of the router and what might their purpose be?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The backplane of the router also show CF0 and CF1 lights for the CompactFlash memory slots as well as
an ISM/WLAN light which would indicate the presence of either a Cisco Internal Services Module or
wireless LAN card.
<output omitted>
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 9
Lab - Exploring Router Physical Characteristics
-----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
ipbase ipbasek9 Permanent ipbasek9
security securityk9 Permanent securityk9
data None None None
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 9
Lab - Exploring Router Physical Characteristics
Step 2: Use the show interface command to examine the network interfaces.
a. Use the show interface gigabitEthernet 0/0 command to see the status of the Gigabit Ethernet 0/0
interface.
Note: After typing part of the command, for example, show interface g, you can use the Tab key on your
keyboard to complete the gigabitEthernet command parameter.
Router# show interface gigabitEthernet 0/0
GigabitEthernet0/0 is administratively down, line protocol is down
Hardware is CN Gigabit Ethernet, address is 442b.031a.b9a0 (bia 442b.031a.b9a0)
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full Duplex, 100Mbps, media type is RJ45
output flow-control is unsupported, input flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
3 packets input, 276 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
b. Given the output of the show interface gigabitEthernet 0/0 command depicted above, or using the
output from your router, answer the following questions:
What is the hardware type and MAC address of the Gigabit Ethernet interface?
____________________________________________________________________________________
The hardware type is CN Gigabit Ethernet and the burned in address (bia) or MAC address is
442b.031a.b9a0
What is the interface media type? Is the interface up or down?
____________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 9
Lab - Exploring Router Physical Characteristics
According to the output the interface media type is RJ45 and the Gigabit Ethernet interface is
administratively down and the line protocol is down.
c. Use the show interfaces serial 0/0/0 command to view the status of the Serial 0/0/0 interface.
Router# show interface serial 0/0/0
Serial0/0/0 is administratively down, line protocol is down
Hardware is WIC MBRD Serial
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, loopback not set
Keepalive set (10 sec)
Last input 07:41:21, output never, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1 packets input, 24 bytes, 0 no buffer
Received 1 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 2 interface resets
0 unknown protocol drops
0 output buffer failures, 0 output buffers swapped out
1 carrier transitions
DCD=down DSR=down DTR=down RTS=down CTS=down
d. Given the output command depicted above, answer the following questions:
What is the frame encapsulation type?
___________________________________________________________________________________
According to the output above, the frame encapsulation type is HDLC.
What is the hardware type? Is the interface up or down?
___________________________________________________________________________________
The hardware type is WIC MBRD Serial and the interface is administratively down and line protocol down.
Reflection
1. Why might you need to use an EHWIC expansion slot?
_______________________________________________________________________________________
Answers will vary. You may need to have a WAN connection to your ISP over a WAN interface technology
that does not come with the router by default.
2. Why might you need to upgrade the Flash memory?
_______________________________________________________________________________________
Answers will vary. You may want to store an additional IOS image file or upgrade to a larger IOS image.
3. What is the purpose of the mini-USB port?
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 9
Lab - Exploring Router Physical Characteristics
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
The purpose of the mini USB port is to give you the ability to console into the router if you do not have a COM
serial port on your laptop or computer.
4. What is the purpose of the ISM/WLAN indicator light on the backplane of the router? What does it refer to?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
The Cisco 1941 router can support a Cisco Internal Services Module that can enhance the intelligence and
abilities of the router to perform activities like intrusion prevention scanning. The Cisco 1941 router can also
be equipped with a Wireless LAN card for supporting wireless local area networks.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 9
Class Activity - Can You Read This Map? (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Explain how network devices use routing tables to direct packets to a destination network.
Background /Scenario
Note: It is suggested that students work in pairs; however, if preferred, students can complete this activity
individually.
Your instructor will provide you with output generated by a routers show ip route command. Use Packet
Tracer to build a topology model using this routing information.
At a minimum, the following should be used in your topology model:
1 Catalyst 2960 switch
1 Cisco Series 1941 Router with one HWIC-4ESW switching port modular card and IOS version 15.1 or
higher
3 PCs (can be servers, generic PCs, laptops, etc.)
Use the note tool in Packet Tracer to indicate the addresses of the router interfaces and possible addresses
for the end devices you chose for your model.
Label all end devices, ports, and addresses ascertained from the show ip route output/routing table
information in your Packet Tracer file. Save your work in hard or soft copy to share with the class.
Instructor Note: This Modeling Activity is not intended to be a graded assignment. Its purpose is to
encourage students to reflect on their perceptions of how a network is configured and then checked for
routing table information.
Print out or project the Table 1 graphic found in the Required Resources section of this document. Students
should be able to assist each other as they read the routing table provided and then construct the model
using Packet Tracer software. Facilitation of small group discussion should be initiated as a result of this
activity.
Instructor Note: It is suggested, but not required, that students work in pairs for this activity.
Required Resources
Packet Tracer software program.
Routing Table 1 students can use the table to assist each other as they read the information provided
and then construct the model using Packet Tracer.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Class Activity - Can You Read This Map?
Reflection
What was the hardest part of designing this network model? Explain your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary within groups some students may mention source or destination identifiers or some may
mention the actual IP addresses being cited in the routing table the important concept here is that students
can comfortably identify where information is coming from on the final routing table as depicted.
Topologies will vary by group some students will place their switch off of the Gig0/1 port, etc.
Optional: As an advanced modeling activity, students can create a simple one-router network with four
Gigabit interfaces connected to end devices, configure the router and LANs with passwords, IP addresses,
banners, etc., and then produce a routing table to support the network information.
Possible topology built by the students could look like this:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Class Activity - Can You Read This Map?
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Lab - Building a Switch and Router Network (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Set Up the Topology and Initialize Devices
Part 2: Configure Devices and Verify Connectivity
Part 3: Display Device Information
Background / Scenario
This is a comprehensive lab to review previously covered IOS commands. In this lab, you will cable the
equipment as shown in the topology diagram. You will then configure the devices to match the addressing
table. After the configurations have been saved, you will verify your configurations by testing for network
connectivity.
After the devices have been configured and network connectivity has been verified, you will use IOS
commands to retrieve information from the devices to answer questions about your network equipment.
This lab provides minimal assistance with the actual commands necessary to configure the router. Test your
knowledge by trying to configure the devices without referring to the content or previous activities.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Ensure that the routers and switches have been erased and have no startup configurations. Consult
with your instructor for the procedure to initialize and reload a router and switch.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 12
Lab - Building a Switch and Router Network
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing and an Ethernet straight-
through cable may be used between the router and PC-B. If using another model Cisco router, it may be
necessary to use an Ethernet crossover cable.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 12
Lab - Building a Switch and Router Network
Step 1: Retrieve hardware and software information from the network devices.
a. Use the show version command to answer the following questions about the router.
R1# show version
Cisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M), Version 15.2(4)M3, RELEASE
SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Thu 26-Jul-12 19:34 by prod_rel_team
R1 uptime is 10 minutes
System returned to ROM by power-on
System image file is "flash0:c1900-universalk9-mz.SPA.152-4.M3.bin"
Last reload type: Normal Reload
Last reload reason: power-on
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 12
Lab - Building a Switch and Router Network
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
License Info:
License UDI:
-------------------------------------------------
Device# PID SN
-------------------------------------------------
*0 CISCO1941/K9 FTX1636848Z
-----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
ipbase ipbasek9 Permanent ipbasek9
security None None None
data None None None
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 12
Lab - Building a Switch and Router Network
____________________________________________________________________________________
Answers may vary, but the default DRAM memory configuration on a 1941 router is 512MB or 524,288K
bytes. The total can be calculated by adding the two DRAM numbers together from the output of the show
version command: Cisco CISCO1941/K9 (revision 1.0) with 446464K/77824K bytes of memory.
How much NVRAM memory does the router have?
____________________________________________________________________________________
Answers may vary, but the output from the show version on 1941 router is: 255K bytes of non-volatile
configuration memory.
How much Flash memory does the router have?
____________________________________________________________________________________
Answers may vary, but the default output from the show version command on the 1941 router is 250880K
bytes of ATA System CompactFlash 0 (Read/Write).
b. Use the show version command to answer the following questions about the switch.
Switch# show version
Cisco IOS Software, C2960 Software (C2960-LANBASEK9-M), Version 15.0(2)SE, RELEASE
SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Sat 28-Jul-12 00:29 by prod_rel_team
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 12
Lab - Building a Switch and Router Network
Switch#
What is the name of the IOS image that the switch is running?
____________________________________________________________________________________
Image version may vary, but answers should be something like c2960-lanbasek9-mz.150-2.SE.bin.
How much dynamic random access memory (DRAM) does the switch have?
____________________________________________________________________________________
Answers may vary, but the default DRAM memory configuration on a 2960-24TT-L switch is 65536K of
memory.
How much nonvolatile random-access memory (NVRAM) does the switch have?
____________________________________________________________________________________
Answers may vary, but the default non-volatile memory configuration on a 2960-24TT-L switch is 64K
bytes.
What is the model number of the switch?
____________________________________________________________________________________
Answers may vary, but the answer should appear in this form: WS-C2960-24TT-L.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 12
Lab - Building a Switch and Router Network
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 12
Lab - Building a Switch and Router Network
Step 4: Display a summary list of the interfaces on the router and switch.
There are several commands that can be used to verify an interface configuration. One of the most useful of
these is the show ip interface brief command. The command output displays a summary list of the
interfaces on the device and provides immediate feedback to the status of each interface.
a. Enter the show ip interface brief command on the router.
R1# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Embedded-Service-Engine0/0 unassigned YES unset administratively down down
GigabitEthernet0/0 192.168.0.1 YES manual up up
GigabitEthernet0/1 192.168.1.1 YES manual up up
Serial0/0/0 unassigned YES unset administratively down down
Serial0/0/1 unassigned YES unset administratively down down
R1#
b. Enter the show ip interface brief command on the switch.
Switch# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Vlan1 unassigned YES manual up up
FastEthernet0/1 unassigned YES unset down down
FastEthernet0/2 unassigned YES unset down down
FastEthernet0/3 unassigned YES unset down down
FastEthernet0/4 unassigned YES unset down down
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 12
Lab - Building a Switch and Router Network
Reflection
1. If the G0/1 interface showed administratively down, what interface configuration command would you use to
turn the interface up?
_______________________________________________________________________________________
R1(config-if)# no shut
2. What would happen if you had incorrectly configured interface G0/1 on the router with an IP address of
192.168.1.2?
_______________________________________________________________________________________
_______________________________________________________________________________________
PC-A would not be able to ping PC-B. This is because PC-B is on a different network than PC-A which
requires the default-gateway router to route these packets. PC-A is configured to use the IP address of
192.168.1.1 for the default-gateway router, but this address is not assigned to any device on the LAN. Any
packets that need to be sent to the default-gateway for routing will never reach their destination.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 12
Lab - Building a Switch and Router Network
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the router type and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router R1
R1# show run
Building configuration...
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 12
Lab - Building a Switch and Router Network
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
description Connection to PC-B.
ip address 192.168.0.1 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/1
description Connection to S1.
ip address 192.168.1.1 255.255.255.0 duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
control-plane
!
!
banner motd ^C
Unauthorized access prohibited!
^C
!
line con 0
password 7 13061E010803
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 12
Lab - Building a Switch and Router Network
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
password 7 070C285F4D06
login
transport input all
!
scheduler allocate 20000 1000
!
end
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 12
Class Activity - The Internet of Everything (IoE) (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain how network devices use routing tables to direct packets to a destination network.
Background /Scenario
Today, more than 99% of our world remains unconnected. Tomorrow, we will be connected to almost
everything. 37 billion devices will be connected to the Internet by 2020. From trees to water to cars, the
organic and the digital will work together for a more intelligent and connected world. This tomorrow of
networking is known as The Internet of Everything or IoE.
If traffic, transportation, networking and space exploration depend on digital information sharing, how will that
information be identified from its source to its destination?
In this activity, you will begin to think about not only what will be identified in the IoE world, but how everything
will be addressed in the same world!
Activity directions for class or individual students:
1) Navigate to the IoE main page located at http://www.cisco.com/c/r/en/us/internet-of-everything-ioe.
2) Next, watch some videos or read through some content from the IoE main page that interests you.
3) Write 5 comments or questions about what you saw or read. Be prepared to share with the class.
Instructor Note: This is an individual or an in-class Modeling Activity (MA). It is not intended to be a
graded assignment. Its purpose is to encourage student reflection about their perception of networks and
how they will be identified in the future. IPv6 is necessary to support the Internet of Everything.
Required Resources
Internet connectivity for research on the cisco.com site. Headphones may also be useful if students are
individually completing this activity within a group setting.
Recording capabilities (paper, tablet, etc.) for comments or questions regarding the videos, blogs and/or
.pdfs read or viewed for Step 3.
Reflection
Why do you think there is a need to address trees? Windmills? Cars? Refrigerators? Why will just about
anything be able to use an IP address?
_______________________________________________________________________________________
The research for the scenario will be varied. Some concepts worth mentioning or discussing include:
To support the new IoE concepts/implementation and growing number of devices that connect to the
internet, an exponential amount of addresses will be needed. Might need to briefly discuss HOW trees
can be connected to the Internet (i.e., different kinds of sensors which transmit data see
http://www.ericsson.com/article/connected_tree_2045546582_c )
Knowing how to use IPv6 addressing will be important to network administrators, ISPs/TSPs, and the
general public as we move to more and more network types/classifications of networks.
Identify elements of the model that map to IT-related content:
Network types (subnets, etc.)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - The Internet of Everything
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab Using the Windows Calculator with Network
Addresses (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Access the Windows Calculator
Part 2: Convert between Numbering Systems
Part 3: Convert Host IPv4 Addresses and Subnet Masks into Binary
Part 4: Determine the Number of Hosts in a Network Using Powers of 2
Part 5: Convert MAC Addresses and IPv6 Addresses to Binary
Background / Scenario
Network technicians use binary, decimal, and hexadecimal numbers when working with computers and
networking devices. Microsoft provides a built-in Calculator application as part of the operating system. The
Windows 7 version of Calculator includes a Standard view that can be used to perform basic arithmetic tasks
such as addition, subtract, multiplication, and division. The Calculator application also has advanced
programming, scientific, and statistical capabilities.
In this lab, you will use the Windows 7 Calculator application Programmer view to convert between the binary,
decimal, and hexadecimal number systems. You will also use the Scientific view powers function to determine
the number of hosts that can be addressed based on the number of host bits available.
Required Resources
1 PC (Windows 7 or 8)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 7
Lab Using the Windows Calculator with Network Addresses
Note: If using an operating system other than Windows 7, the Calculator application views and functions
available may vary from those shown in this lab. However, you should be able to perform the calculations.
Step 1: Click the Windows Start button and select All Programs.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 7
Lab Using the Windows Calculator with Network Addresses
h. Clear the values in the window by clicking C above the 9 on the calculator keypad. Convert the following
numbers between the binary, decimal, and hexadecimal numbering systems.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 7
Lab Using the Windows Calculator with Network Addresses
86 0101 0110 56
175 1010 1111 AF
204 1100 1100 CC
19 0001 0011 13
77 0100 1101 4D
42 0010 1010 2A
56 0011 1000 38
147 1001 0011 93
228 1110 0100 E4
i. As you record the values in the table above, do you see a pattern between the binary and hexadecimal
numbers?
____________________________________________________________________________________
____________________________________________________________________________________
Every hexadecimal digit can be converted into four binary numbers separately. For example, hex 0A is
1010 in binary.
Part 3: Convert Host IPv4 Addresses and Subnet Masks into Binary
Internet Protocol version 4 (IPv4) addresses and subnet masks are represented in a dotted decimal format
(four octets), such as 192.168.1.10 and 255.255.255.0, respectively. This makes these addresses more
readable to humans. Each of the decimal octets in the address or a mask can be converted to 8 binary bits.
An octet is always 8 binary bits. If all 4 octets were converted to binary, how many bits would there be?
________________________ 32
a. Use the Windows Calculator application to convert the IP address 192.168.1.10 into binary and record the
binary numbers in the following table:
Decimal Binary
b. Subnet masks, such as 255.255.255.0, are also represented in a dotted decimal format. A subnet mask
will always consist of four 8-bit octets, each represented as a decimal number. Using the Windows
Calculator, convert the 8 possible decimal subnet mask octet values to binary numbers and record the
binary numbers in the following table:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7
Lab Using the Windows Calculator with Network Addresses
Decimal Binary
0 0000 0000
128 1000 0000
192 1100 0000
224 1110 0000
240 1111 0000
248 1111 1000
252 1111 1100
254 1111 1110
255 1111 1111
c. With the combination of IPv4 address and the subnet mask, the network portion can be determined and
the number of hosts available in a given IPv4 subnet can also be calculated. The process is examined in
Part 4.
Decimal IP Address and Subnet Mask Binary IP Address and Subnet Mask
192.168.1.10 11000000.10101000.00000001.00001010
255.255.248.0 11111111.11111111.11111000.00000000
Because the first 21 bits in the subnet mask are consecutive numeral ones, the corresponding first 21 bits
in the IP address in binary is 110000001010100000000; these represent the network portion of the
address. The remaining 11 bits are 00100001010 and represent the host portion of the address.
What is the decimal and binary network number for this address?
____________________________________________________________________________________
Decimal: 192.168.0.0 Binary: 11000000.10101000.00000000.00000000
What is the decimal and binary host portion for this address?
____________________________________________________________________________________
Decimal: 1.10 Binary: 00000000.00000000.00000001.00001010
Because the network number and the broadcast address use two addresses out of the subnet, the
formula to determine the number of hosts available in an IPv4 subnet is the number 2 to the power of the
number of host bits available, minus 2:
(number of host bits)
Number of available hosts = 2 2
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 7
Lab Using the Windows Calculator with Network Addresses
b. Using the Windows Calculator application, switch to the Scientific mode by clicking the View menu, then
select Scientific.
y
c. Input 2. Click the x key. This key raises a number to a power.
d. Input 11. Click =, or press Enter on the keyboard for the answer.
e. Subtract 2 from the answer by using the calculator if desired.
11
f. In this example, there are 2046 hosts are available on this network (2 -2).
g. If given the number of host bits, determine the number of hosts available and record the number in the
following table.
5 30
14 16382
24 16777214
10 1022
h. For a given subnet mask, determine the number of hosts available and record the answer in the following
table.
Number of Number of
Available Available
Subnet Mask Binary Subnet Mask Host Bits Hosts
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7
Lab Using the Windows Calculator with Network Addresses
Hexadecimal Binary
Reflection
1. Can you perform all the conversions without the assistance of the calculator? What can you do to make it
happen?
_______________________________________________________________________________________
Lots of practice. For example, a binary game found on Cisco Learning Network
at https://learningnetwork.cisco.com/ can help with conversion between binary and decimal numbering
systems.
2. For most IPv6 addresses, the network portion of the address is usually 64 bits. How many hosts are available
on a subnet where the first 64 bits represent the network? Hint: All host addresses are available in the subnet
for hosts.
_______________________________________________________________________________________
64
There are 64 bits left for host addresses which is over 18.4 trillion (2 - 2) hosts available in a 64-bit (/64)
subnet.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7
Lab Converting IPv4 Addresses to Binary (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Part 1: Convert IPv4 Addresses from Dotted Decimal to Binary
Part 2: Use Bitwise ANDing Operation to Determine Network Addresses
Part 3: Apply Network Address Calculations
Background / Scenario
Every IPv4 address is comprised of two parts: a network portion and a host portion. The network portion of an
address is the same for all devices that reside in the same network. The host portion identifies a specific host
within a given network. The subnet mask is used to determine the network portion of an IP address. Devices
on the same network can communicate directly; devices on different networks require an intermediary Layer 3
device, such as a router, to communicate.
To understand the operation of devices on a network, we need to look at addresses the way devices doin
binary notation. To do this, we must convert the dotted decimal form of an IP address and its subnet mask to
binary notation. After this has been done, we can use the bitwise ANDing operation to determine the network
address.
This lab provides instructions on how to determine the network and host portion of IP addresses by converting
addresses and subnet masks from dotted decimal to binary, and then using the bitwise ANDing operation.
You will then apply this information to identify addresses in the network.
Decimal Binary
192 11000000
168 10101000
10 00001010
255 11111111
2 00000010
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Lab Converting IPv4 Addresses to Binary
Decimal Binary
192.168.10.10 11000000.10101000.00001010.00001010
209.165.200.229 11010001.10100101.11001000.11100101
172.16.18.183 10101100.00010000.00010010.10110111
10.86.252.17 00001010.01010110.11111100.00010001
255.255.255.128 11111111.11111111.11111111.10000000
255.255.192.0 11111111.11111111.11000000.00000000
Step 1: Determine the number of bits to use to calculate the network address.
How do you determine what bits to use to calculate the network address?
____________________________________________________________________________________
The bits that are set to 1 in the binary subnet mask are used to calculate the network address.
In the example above, how many bits are used to calculate the network address?
______________ 26 bits
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Lab Converting IPv4 Addresses to Binary
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Lab Converting IPv4 Addresses to Binary
Reflection
Why is the subnet mask important in determining the network address?
_______________________________________________________________________________________
_______________________________________________________________________________________
The subnet mask provides the number of bits to use for the network portion of an address. The network
address cannot be determined without it.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Lab Identifying IPv4 Addresses (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Identify IPv4 Addresses
Part 2: Classify IPv4 Addresses
Background / Scenario
In this lab, you will examine the structure of Internet Protocol version 4 (IPv4) addresses. You will identify the
various types of IPv4 addresses and the components that help comprise the address, such as network
portion, host portion, and subnet mask. Types of addresses covered include public, private, unicast, and
multicast.
Instructor Note: This optional activity can be done individually in class or assigned as homework. The lab
can also be done in class with students working in pairs. If the lab is done in class, it should be followed up by
discussion with correct answers. All public IP addresses used in this lab are owned by Cisco.
Required Resources
Device with Internet access
Optional: IPv4 address calculator
Step 1: Analyze the table shown below and identify the network portion and host portion of the
given IPv4 addresses.
The first two rows show examples of how the table should be completed.
Key for table:
N = all 8 bits for an octet are in the network portion of the address
n = a bit in the network portion of the address
H = all 8 bits for an octet are in the host portion of the address
h = a bit in the host portion of the address
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Lab Identifying IPv4 Addresses
Network/Host
IP Address/Prefix N,n = Network, H,h = Host Subnet Mask Network Address
Step 2: Analyze the table below and list the range of host and broadcast addresses given a
network/prefix mask pair.
The first row shows an example of how the table should be completed.
Step 1: Analyze the table shown below and identify the type of address (network, host,
multicast, or broadcast address).
The first row shows an example of how the table should be completed.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Lab Identifying IPv4 Addresses
Step 2: Analyze the table shown below and identify the address as public or private.
209.165.201.30/27 Public
192.168.255.253/24 Private
10.100.11.103/16 Private
172.30.1.100/28 Private
192.31.7.11/24 Public
172.20.18.150/22 Private
128.107.10.1/16 Public
192.135.250.10/24 Public
64.104.0.11/16 Public
Step 3: Analyze the table shown below and identify whether the address/prefix pair is a valid
host address.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Lab Identifying IPv4 Addresses
127.1.0.10/24 No Loopback
172.16.255.0/16 Yes Host address
241.19.10.100/24 No Reserved
192.168.0.254/24 Yes Host address
192.31.7.255/24 No Broadcast
64.102.255.255/14 Yes Host address
224.0.0.5/16 No Multicast
10.0.255.255/8 Yes Host address
198.133.219.8/24 Yes Host address
Reflection
Why should we continue to study and learn about IPv4 addressing if the available IPv4 address space is
depleted?
_______________________________________________________________________________________
_______________________________________________________________________________________
Many organizations will continue to use the private IPv4 address space for their internal networking needs.
The public IPv4 addresses will be used for many years to come.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Lab Identifying IPv6 Addresses (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Objectives
Part 1: Identify the Different Types of IPv6 Addresses
Part 2: Examine a Host IPv6 Network Interface and Address
Part 3: Practice IPv6 Address Abbreviation
Background / Scenario
With the depletion of the Internet Protocol version 4 (IPv4) network address space and the adoption and
transition to IPv6, networking professionals must understand how both IPv4 and IPv6 networks function.
Many devices and applications already support IPv6. This includes extensive Cisco device Internetwork
Operating System (IOS) support and workstation/server operating system support, such as that found in
Windows and Linux.
This lab focuses on IPv6 addresses and the components of the address. In Part 1, you will identify the IPv6
address types, and in Part 2, you will view the IPv6 settings on a PC. In Part 3, you will practice IPv6 address
abbreviation.
Instructor Note: This optional lab has three sections that can be split up into two parts (Part 1/2 and Part 3).
It can be performed in multiple sessions, or assigned as homework.
Required Resources
1 PC (Windows 7 or 8 with Internet access)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8
Lab Identifying IPv6 Addresses
255.255.255.255
An IPv6 address is 8 hextets and is commonly written or displayed in hexadecimal notation.
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF
In an IPv4 address, each individual octet is 8 binary digits (bits). Four octets equals one 32-bit IPv4 address.
11111111 = 255
11111111.11111111.11111111.11111111 = 255.255.255.255
In an IPv6 address, each individual hextet is 16 bits long. Eight hextets equals one 128-bit IPv6 address.
1111111111111111 = FFFF
1111111111111111.1111111111111111.1111111111111111.1111111111111111.
1111111111111111.1111111111111111.1111111111111111.1111111111111111 =
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF
If we read an IPv6 address starting from the left, the first (or far left) hextet identifies the IPv6 address type.
For example, if the IPv6 address has all zeros in the far left hextet, then the address is possibly a loopback
address.
0000:0000:0000:0000:0000:0000:0000:0001 = loopback address
::1 = loopback address abbreviated
As another example, if the IPv6 address has FE80 in the first hextet, then the address is a link-local address.
FE80:0000:0000:0000:C5B7:CB51:3C00:D6CE = link-local address
FE80::C5B7:CB51:3C00:D6CE = link-local address abbreviated
Study the chart below to help you identify the different types of IPv6 address based on the numbers in the first
hextet.
There are other IPv6 address types that are either not yet widely implemented, or have already become
deprecated, and are no longer supported. For instance, an anycast address is new to IPv6 and can be used
by routers to facilitate load sharing and provide alternate path flexibility if a router becomes unavailable. Only
routers should respond to an anycast address. Alternatively, site-local addresses have been deprecated and
replaced by unique-local addresses. Site-local addresses were identified by the numbers FEC0 in the initial
hextet.
In IPv6 networks, there are no network (wire) addresses or broadcast addresses as there are in IPv4
networks.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 8
Lab Identifying IPv6 Addresses
Answers: 1. B, 2. A, 3. D, 4. B, 5. C, 6. E, 7. E, 8. E
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 8
Lab Identifying IPv6 Addresses
f. Select the item Internet Protocol Version 6 (TCP/IPv6) and click Properties. You should see the IPv6
settings for your network interface. Your IPv6 properties window is likely set to Obtain an IPv6 address
automatically. This does not mean that IPv6 relies on the Dynamic Host Configuration Protocol (DHCP).
Instead of using DHCP, IPv6 looks to the local router for IPv6 network information and then auto-
configures its own IPv6 addresses. To manually configure IPv6, you must provide the IPv6 address, the
subnet prefix length, and the default gateway.
Note: The local router can refer host requests for IPv6 information, especially Domain Name System
(DNS) information, to a DHCPv6 server on the network.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 8
Lab Identifying IPv6 Addresses
g. After you have verified that IPv6 is installed and active on your PC, you should check your IPv6 address
information. To do this, click the Start button, type cmd in the Search programs and files form box, and
press Enter. This opens a Windows command prompt window.
h. Type ipconfig /all and press Enter. Your output should look similar to this:
C:\Users\user> ipconfig /all
Windows IP Configuration
<output omitted>
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 8
Lab Identifying IPv6 Addresses
8.8.4.4
<output omitted>
i. You can see from the output that the client PC has an IPv6 link-local address with a randomly generated
interface ID. What does it indicate about the network regarding IPv6 global unicast address, IPv6 unique-
local address, or IPv6 gateway address?
____________________________________________________________________________________
____________________________________________________________________________________
It indicates that there is no IPv6 enabled gateway router providing global address, local address, or
subnet information on the network.
j. What kind of IPv6 addresses did you find when using ipconfig /all?
____________________________________________________________________________________
____________________________________________________________________________________
Answers will vary, but most likely they will be link-local addresses also.
Step 1: Study and review the rules for IPv6 address abbreviation.
Rule 1: In an IPv6 address, a string of four zeros (0s) in a hextet can be abbreviated as a single zero.
2001:0404:0001:1000:0000:0000:0EF0:BC00
2001:0404:0001:1000:0:0:0EF0:BC00 (abbreviated with single zeros)
Rule 2: In an IPv6 address, the leading zeros in each hextet can be omitted, trailing zeros cannot be omitted.
2001:0404:0001:1000:0000:0000:0EF0:BC00
2001:404:1:1000:0:0:EF0:BC00 (abbreviated with leading zeros omitted)
Rule 3: In an IPv6 address, a single continuous string of four or more zeros can be abbreviated as a double
colon (::). The double colon abbreviation can only be used one time in an IP address.
2001:0404:0001:1000:0000:0000:0EF0:BC00
2001:404:1:1000::EF0:BC00 (abbreviated with leading zeroes omitted and continuous zeros
replaced with a double colon)
The image below illustrates these rules of IPv6 address abbreviation:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 8
Lab Identifying IPv6 Addresses
Reflection
1. How do you think you must support IPv6 in the future?
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 8
Lab Identifying IPv6 Addresses
2. Do you think IPv4 networks continue on, or will everyone eventually switch over to IPv6? How long do you
think it will take?
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 8
Lab - Configuring IPv6 Addresses on Network Devices (Instructor
Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Set Up Topology and Configure Basic Router and Switch Settings
Part 2: Configure IPv6 Addresses Manually
Part 3: Verify End-to-End Connectivity
Background / Scenario
Knowledge of the Internet Protocol version 6 (IPv6) multicast groups can be helpful when assigning IPv6
addresses manually. Understanding how the all-router multicast group is assigned and how to control address
assignments for the Solicited Nodes multicast group can prevent IPv6 routing issues and help ensure best
practices are implemented.
In this lab, you will configure hosts and device interfaces with IPv6 addresses and explore how the all-router
multicast group is assigned to a router. You will use show commands to view IPv6 unicast and multicast
addresses. You will also verify end-to-end connectivity using the ping and traceroute commands.
Note: The routers used with CCNA hands-on labs are Cisco 1941 ISRs with Cisco IOS Release 15.2(4)M3
(universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9
image). Other routers, switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS
version, the commands available and output produced might vary from what is shown in the labs. Refer to the
Router Interface Summary table at the end of the lab for the correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 19
Lab - Configuring IPv6 Addresses on Network Devices
Instructor Note: The default bias template used by the Switch Database Manager (SDM) does not provide
IPv6 address capabilities. Verify that SDM is using either the dual-ipv4-and-ipv6 template or the lanbase-
routing template. The new template will be used after reboot even if the config is not saved.
S1# show sdm prefer
Follow these steps to assign the dual-ipv4-and-ipv6 template as the default SDM template:
S1# configure terminal
S1(config)# sdm prefer dual-ipv4-and-ipv6 default
S1(config)# end
S1# reload
Required Resources
1 Router (Cisco 1941 with Cisco IOS software, Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing and an Ethernet straight-
through cable may be used between the router and PC-B. If using another model Cisco router, it may be
necessary to use an Ethernet crossover cable.
Part 1: Set Up Topology and Configure Basic Router and Switch Settings
Step 1: Cable the network as shown in the topology.
Step 3: Verify that the PC interfaces are configured to use the IPv6 protocol.
Verify that the IPv6 protocol is active on both PCs by ensuring that the Internet Protocol Version 6
(TCP/IPv6) check box is selected in the Local Area Connection Properties window.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 19
Lab - Configuring IPv6 Addresses on Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 19
Lab - Configuring IPv6 Addresses on Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 19
Lab - Configuring IPv6 Addresses on Network Devices
FF02::1:FFCE:A0C0
MTU is 1500 bytes
<output omitted>
d. To get the link-local address to match the unicast address on the interface, manually enter the link-local
addresses on each of the Ethernet interfaces on R1.
R1# config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# interface g0/0
R1(config-if)# ipv6 address fe80::1 link-local
R1(config-if)# interface g0/1
R1(config-if)# ipv6 address fe80::1 link-local
R1(config-if)# end
R1#
Note: Each router interface belongs to a separate network. Packets with a link-local address never leave
the local network; therefore, you can use the same link-local address on both interfaces.
e. Re-issue the show ipv6 interface g0/0 command. Notice that the link-local address has been changed to
FE80::1 and that there is only one Solicited Nodes multicast group listed.
R1# show ipv6 interface g0/0
GigabitEthernet0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::1
No Virtual link-local address(es):
Global unicast address(es):
2001:DB8:ACAD:A::1, subnet is 2001:DB8:ACAD:A::/64
Joined group address(es):
FF02::1
FF02::1:FF00:1
MTU is 1500 bytes
<output omitted>
What multicast groups have been assigned to interface G0/0?
____________________________________________________________________________________
The all-nodes multicast group (FF02::1) and the Solicited Nodes multicast group (FF02::1:FF00:1).
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 19
Lab - Configuring IPv6 Addresses on Network Devices
Note: This will allow the PCs to obtain their IP address and default gateway information automatically
using Stateless Address Autoconfiguration (SLAAC).
R1# show ipv6 interface g0/0
GigabitEthernet0/0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::1
No Virtual link-local address(es):
Global unicast address(es):
2001:DB8:ACAD:A::1, subnet is 2001:DB8:ACAD:A::/64 [EUI]
Joined group address(es):
FF02::1
FF02::2
FF02::1:FF00:1
MTU is 1500 bytes
<output omitted>
d. Now that R1 is part of the all-router multicast group, re-issue the ipconfig command on PC-B. Examine
the IPv6 address information.
Why did PC-B receive the Global Routing Prefix and Subnet ID that you configured on R1?
____________________________________________________________________________________
____________________________________________________________________________________
R1 G0/0 is now part of the All-router multicast group, FF02::2. This allows it to send Router Advertisement
(RA) messages with the Global Network Address and Subnet ID information to all nodes on the LAN.
Notice that it also sent the link-local address, FE80::1, as the Default Gateway. The PCs will receive their
IP address and default gateway via SLAAC.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 19
Lab - Configuring IPv6 Addresses on Network Devices
b. Click the Use the following IPv6 address radio button. Refer to the Addressing Table and enter the IPv6
address, Subnet prefix length, and Default gateway information. Click OK.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 19
Lab - Configuring IPv6 Addresses on Network Devices
Note: You can also test connectivity by using the global unicast address, instead of the link-local address.
b. Ping the S1 management interface from PC-A.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 19
Lab - Configuring IPv6 Addresses on Network Devices
c. Use the tracert command on PC-A to verify that you have end-to-end connectivity to PC-B.
Note: If end-to-end connectivity is not established, troubleshoot your IPv6 address assignments to verify
that you entered the addresses correctly on all devices.
Reflection
1. Why can the same link-local address, FE80::1, be assigned to both Ethernet interfaces on R1?
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 19
Lab - Configuring IPv6 Addresses on Network Devices
_______________________________________________________________________________________
Link-local packets never leave the local network, so the same link-local address can be used on an interface
associated to a different local network.
2. What is the Subnet ID of the IPv6 unicast address 2001:db8:acad::aaaa:1234/64?
_______________________________________________________________________________________
th
0 (zero) or 0000 (zeros). The 4 hextet is the Subnet ID of an IPv6 address with a prefix of /64. In the
th
example the 4 hextet contains all zeros and the IPv6 Omitting All 0 Segment rule is using the double colon to
depict the Subnet ID and the first two hextets of the Interface ID.
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/0/0) Serial 0/1/1 (S0/0/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 19
Lab - Configuring IPv6 Addresses on Network Devices
boot-start-marker
boot-end-marker
!
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
no ip domain lookup
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
control-plane
!
banner motd ^C
**********************************************
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 19
Lab - Configuring IPv6 Addresses on Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 19
Lab - Configuring IPv6 Addresses on Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 19
Lab - Configuring IPv6 Addresses on Network Devices
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
!
ip http server
ip http secure-server
!
banner motd ^C
**********************************************
* Warning: Unauthorzed access is prohibited! *
**********************************************
^C
!
line con 0
password 7 121A0C041104
login
line vty 0 4
password 7 121A0C041104
login
line vty 5 15
password 7 121A0C041104
login
!
end
Router R1 (Final)
R1#show run
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 19
Lab - Configuring IPv6 Addresses on Network Devices
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 15
!
no ip domain lookup
ip cef
ipv6 unicast-routing
ipv6 cef
multilink bundle-name authenticated
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
ipv6 address FE80::1 link-local
ipv6 address 2001:DB8:ACAD:A::1/64
!
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
ipv6 address FE80::1 link-local
ipv6 address 2001:DB8:ACAD:1::1/64
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
control-plane
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 19
Lab - Configuring IPv6 Addresses on Network Devices
banner motd ^C
**********************************************
* Warning: Unauthorzed access is prohibited! *
**********************************************
^C
!
line con 0
password 7 01100F175804
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
password 7 104D000A0618
login
transport input all
!
scheduler allocate 20000 1000
!
end
Switch S1 (Final)
S1#sh run
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 19
Lab - Configuring IPv6 Addresses on Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 19
Lab - Configuring IPv6 Addresses on Network Devices
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
ipv6 address FE80::B link-local
ipv6 address 2001:DB8:ACAD:1::B/64
!
ip http server
ip http secure-server
!
!
banner motd ^C
**********************************************
* Warning: Unauthorzed access is prohibited! *
**********************************************
^C
!
line con 0
password 7 121A0C041104
login
line vty 0 4
password 7 121A0C041104
login
line vty 5 15
password 7 121A0C041104
login
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 19
Lab - Configuring IPv6 Addresses on Network Devices
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 19
Lab Testing Network Connectivity with Ping and
Traceroute (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 27
Lab Testing Network Connectivity with Ping and Traceroute
Addressing Table
Objectives
Part 1: Build and Configure the Network
Part 2: Use Ping Command for Basic Network Testing
Part 3: Use Tracert and Traceroute Commands for Basic Network Testing
Part 4: Troubleshoot the Topology
Background / Scenario
Ping and traceroute are two tools that are indispensable when testing TCP/IP network connectivity. Ping is a
network administration utility used to test the reachability of a device on an IP network. This utility also
measures the round-trip time for messages sent from the originating host to a destination computer. The ping
utility is available on Windows, Unix-like operating systems (OS), and the Cisco Internetwork Operating
System (IOS).
The traceroute utility is a network diagnostic tool for displaying the route and measuring the transit delays of
packets travelling an IP network. The tracert utility is available on Windows, and a similar utility, traceroute, is
available on Unix-like OS and Cisco IOS.
In this lab, the ping and traceroute commands are examined and command options are explored to modify
the command behavior. Cisco devices and PCs are used in this lab for command exploration. Cisco routers
will use Enhanced Interior Gateway Routing Protocol (EIGRP) to route packets between networks. The
necessary Cisco device configurations are provided in this lab.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 27
Lab Testing Network Connectivity with Ping and Traceroute
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet and serial cables as shown in the topology
Step 2: Erase the configurations on the routers and switches, and reload the devices.
Step 3: Configure PC IP addresses and default gateways according to the Addressing Table.
Step 4: Configure the LOCAL, ISP, and REMOTE routers using the initial configurations
provided below.
At the switch or router global config mode prompt, copy and paste the configuration for each device. Save the
configuration to startup-config.
Instructor Note: The command no auto-summary for EIGRP is included for compatibility with older routers
and IOS versions. With the 1941 router and IOS 15 specified for this lab, no auto-summary is the default,
Initial configurations for the LOCAL router:
hostname LOCAL
no ip domain-lookup
interface s0/0/0
ip address 10.1.1.1 255.255.255.252
clock rate 56000
no shutdown
interface g0/1
ip add 192.168.1.1 255.255.255.0
no shutdown
router eigrp 1
network 10.1.1.0 0.0.0.3
network 192.168.1.0 0.0.0.255
no auto-summary
Initial configurations for ISP:
hostname ISP
no ip domain-lookup
interface s0/0/0
ip address 10.1.1.2 255.255.255.252
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 27
Lab Testing Network Connectivity with Ping and Traceroute
no shutdown
interface s0/0/1
ip add 10.2.2.2 255.255.255.252
clock rate 56000
no shutdown
router eigrp 1
network 10.1.1.0 0.0.0.3
network 10.2.2.0 0.0.0.3
no auto-summary
end
Initial configurations for REMOTE:
hostname REMOTE
no ip domain-lookup
interface s0/0/1
ip address 10.2.2.1 255.255.255.252
no shutdown
interface g0/1
ip add 192.168.3.1 255.255.255.0
no shutdown
router eigrp 1
network 10.2.2.0 0.0.0.3
network 192.168.3.0 0.0.0.255
no auto-summary
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 27
Lab Testing Network Connectivity with Ping and Traceroute
no shutdown
exit
ip default-gateway 192.168.3.1
end
Step 1: Test network connectivity from the LOCAL network using PC-A.
All the pings from PC-A to other devices in the topology should be successful. If they are not, check the
topology and the cabling, as well as the configuration of the Cisco devices and the PCs.
a. Ping from PC-A to its default gateway (LOCALs GigabitEthernet 0/1 interface).
C:\Users\User1> ping 192.168.1.1
Pinging 192.168.1.1 with 32 bytes of data:
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 27
Lab Testing Network Connectivity with Ping and Traceroute
b. From PC-A, ping the addresses listed in the following table and record the average round trip time and
Time to Live (TTL).
*Instructor Note: The average round trip time was increased if the message Request timed out was
displayed during the first ICMP request. The delay was caused by ARP, and this resulted in packet loss.
Notice the average round trip time to 192.168.3.3 (PC-C). The time increased because the ICMP
requests were processed by three routers before PC-A received the reply from PC-C.
C:\Users\User1> ping 192.168.3.3
Pinging 192.168.3.3 with 32 bytes of data:
Reply from 192.168.3.3: bytes=32 time=41ms TTL=125
Reply from 192.168.3.3: bytes=32 time=41ms TTL=125
Reply from 192.168.3.3: bytes=32 time=40ms TTL=125
Reply from 192.168.3.3: bytes=32 time=41ms TTL=125
Options:
-t Ping the specified host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 27
Lab Testing Network Connectivity with Ping and Traceroute
Step 3: Test network connectivity from the LOCAL network using Cisco devices.
The ping command is also available on Cisco devices. In this step, the ping command is examined using the
LOCAL router and the S1 switch.
a. Ping PC-C on the REMOTE network using the IP address of 192.168.3.3 from the LOCAL router.
LOCAL# ping 192.168.3.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.3, timeout is 2 seconds:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 27
Lab Testing Network Connectivity with Ping and Traceroute
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 60/64/68 ms
The exclamation point (!) indicates that the ping was successful from the LOCAL router to PC-C. The
round trip takes an average of 64 ms with no packet loss, as indicated by a 100% success rate.
b. Because a local host table was configured on the LOCAL router, you can ping PC-C on the REMOTE
network using the hostname configured from the LOCAL router.
LOCAL# ping PC-C
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 60/63/64 ms
c. There are more options available for the ping command. At the CLI, type ping and press Enter. Input
192.168.3.3 or PC-C for the Target IP address. Press Enter to accept the default value for other options.
LOCAL# ping
Protocol [ip]:
Target IP address: PC-C
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 60/63/64 ms
d. You can use an extended ping to observe when there is a network issue. Start the ping command to
192.168.3.3 with a repeat a count of 500. Then, disconnect the cable between the REMOTE router and
the S3 switch or shut down the GigabitEthernet 0/1 interface on the REMOTE router.
Reconnect the Ethernet cable or enable the GigabitEthernet interface on the REMOTE router after the
exclamation points (!) have replaced by the letter U and periods (.). After about 30 seconds, the ping
should be successful again. Press Ctrl+Shift+6 to stop the ping command if desired.
LOCAL# ping
Protocol [ip]:
Target IP address: 192.168.3.3
Repeat count [5]: 500
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 500, 100-byte ICMP Echos to 192.168.3.3, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!U................
....!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 27
Lab Testing Network Connectivity with Ping and Traceroute
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!
Success rate is 95 percent (479/500), round-trip min/avg/max = 60/63/72 ms
The letter U in the results indicates that a destination is unreachable. An error protocol data unit (PDU)
was received by the LOCAL router. Each period (.) in the output indicates that the ping timed out while
waiting for a reply from PC-C. In this example, 5% of the packets were lost during the simulated network
outage.
Note: You can also use the following command for the same results:
LOCAL# ping 192.168.3.3 repeat 500
or
LOCAL# ping PC-C repeat 500
e. You can also test network connectivity with a switch. In this example, the S1 switch pings the S3 switch
on the REMOTE network.
S1# ping 192.168.3.11
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.11, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 67/67/68 ms
The ping command is extremely useful when troubleshooting network connectivity. However, ping cannot
indicate the location of problem when a ping is not successful. The tracert (or traceroute) command can
display network latency and path information.
Part 3: Use Tracert and Traceroute Commands for Basic Network Testing
The commands for tracing routes can be found on PCs and network devices. For a Windows-based PC, the
tracert command uses ICMP messages to trace the path to the final destination. The traceroute command
utilizes the User Datagram Protocol (UDP) datagrams for tracing routes to the final destination for Cisco
devices and other Unix-like PCs.
In Part 3, you will examine the traceroute commands and determine the path that a packet travels to its final
destination. You will use the tracert command from the Windows PCs and the traceroute command from the
Cisco devices. You will also examine the options that are available for fine tuning the traceroute results.
Trace complete.
The tracert results indicates the path from PC-A to PC-C is from PC-A to LOCAL to ISP to REMOTE to
PC-C. The path to PC-C traveled through three router hops to the final destination of PC-C.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 27
Lab Testing Network Connectivity with Ping and Traceroute
Options:
-d Do not resolve addresses to hostnames.
-h maximum_hops Maximum number of hops to search for target.
-j host-list Loose source route along host-list (IPv4-only).
-w timeout Wait timeout milliseconds for each reply.
-R Trace round-trip path (IPv6-only).
-S srcaddr Source address to use (IPv6-only).
-4 Force using IPv4.
-6 Force using IPv6.
b. Use the -d option. Notice that the IP address of 192.168.3.3 is not resolved as PC-C.
C:\Users\User1> tracert d 192.168.3.3
Tracing route to 192.168.3.3 over a maximum of 30 hops:
Trace complete.
Step 3: Use the traceroute command from the LOCAL router to PC-C.
a. At the command prompt, type traceroute 192.168.3.3 or traceroute PC-C on the LOCAL router. The
hostnames are resolved because a local IP host table was configured on the LOCAL router.
LOCAL# traceroute 192.168.3.3
Type escape sequence to abort.
Tracing the route to PC-C (192.168.3.3)
VRF info: (vrf in name/id, vrf out name/id)
1 ISP (10.1.1.2) 16 msec 16 msec 16 msec
2 REMOTE (10.2.2.1) 28 msec 32 msec 28 msec
3 PC-C (192.168.3.3) 32 msec 28 msec 32 msec
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 27
Lab Testing Network Connectivity with Ping and Traceroute
Step 3: Copy and paste the following configuration into the REMOTE router.
hostname REMOTE
no ip domain-lookup
interface s0/0/1
ip address 10.2.2.1 255.255.255.252
no shutdown
interface g0/1
ip add 192.168.8.1 255.255.255.0
no shutdown
router eigrp 1
network 10.2.2.0 0.0.0.3
network 192.168.3.0 0.0.0.255
no auto-summary
end
Step 4: From the LOCAL network, use ping and tracert or traceroute commands to
troubleshoot and correct the problem on the REMOTE network.
a. Use the ping and tracert commands from PC-A.
You can use the tracert command to determine end-to-end network connectivity. This tracert result
indicates that PC-A can reach its default gateway of 192.168.1.1, but PC-A does not have network
connectivity with PC-C.
C:\Users\User1> tracert 192.168.3.3
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 27
Lab Testing Network Connectivity with Ping and Traceroute
Trace complete.
One way to locate the network issue is to ping each hop in the network to PC-C. First determine if PC-A
can reach the ISP router Serial 0/0/1 interface with an IP address of 10.2.2.2.
C:\Users\Utraser1> ping 10.2.2.2
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 27
Lab Testing Network Connectivity with Ping and Traceroute
PC-A cannot reach the GigabitEthernet 0/1 interface of the REMOTE router, as displayed by the results
from the ping command.
The S3 switch can also be pinged from PC-A to verify the location of the networking connectivity issue by
typing ping 192.168.3.11 at the command prompt. Because PC-A cannot reach GigabitEthernet 0/1 of
the REMOTE router, PC-A probably cannot ping the S3 switch successfully, as indicated by the results
below.
C:\Users\User1> ping 192.168.3.11
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 27
Lab Testing Network Connectivity with Ping and Traceroute
The outputs of the show run and show ip interface brief commands indicate that the GigabitEthernet
0/1 interface is up/up, but was configured with an incorrect IP address.
c. Correct the IP address for GigabitEthernet 0/1.
REMOTE# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
REMOTE(config)# interface GigabitEthernet 0/1
REMOTE(config-if)# ip address 192.168.3.1 255.255.255.0
d. Verify that PC-A can ping and tracert to PC-C.
C:\Users\User1> ping 192.168.3.3
Pinging 192.168.3.3 with 32 bytes of data:
Reply from 192.168.3.3: bytes=32 time=44ms TTL=125
Reply from 192.168.3.3: bytes=32 time=41ms TTL=125
Reply from 192.168.3.3: bytes=32 time=40ms TTL=125
Reply from 192.168.3.3: bytes=32 time=41ms TTL=125
Trace complete.
Note: This can also be accomplished using ping and traceroute commands from the CLI on the the
LOCAL router and the S1 switch after verifying that there are no network connectivity issues on the
192.168.1.0/24 network.
Reflection
1. What could prevent ping or traceroute responses from reaching the originating device beside network
connectivity issues?
_______________________________________________________________________________________
_______________________________________________________________________________________
Firewall on the PCs, access lists command, routing issues, interface is down, network delay
2. If you ping a non-existent address on the remote network, such as 192.168.3.4, what is the message
displayed by the ping command? What does this mean? If you ping a valid host address and receive this
response, what should you check?
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 27
Lab Testing Network Connectivity with Ping and Traceroute
_______________________________________________________________________________________
Request timed out or periods (.). This means that there was no response in the default time period. Some of
the items you may check: router is down, destination host is down, return route to your device and latency of
the response is not more than the default time period
3. If you ping an address that does not exist in any network in your topology, such as 192.168.5.3, from a
Windows-based PC, what is the message displayed by the ping command? What does this message
indicate?
_______________________________________________________________________________________
_______________________________________________________________________________________
Destination host unreachable. This message indicates that there is no route to the destination as the network
is not listed by the routing table.
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router LOCAL
LOCAL# show running-config
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 27
Lab Testing Network Connectivity with Ping and Traceroute
!
hostname LOCAL
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
memory-size iomem 15
!
!
!
!
!
!
!
no ip domain lookup
ip host REMOTE 10.2.2.1 192.168.3.1
ip host ISP 10.1.1.2 10.2.2.2
ip host LOCAL 192.168.1.1 10.1.1.1
ip host PC-C 192.168.3.3
ip host PC-A 192.168.1.3
ip host S1 192.168.1.11
ip host S3 192.168.3.11
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 27
Lab Testing Network Connectivity with Ping and Traceroute
interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 10.1.1.1 255.255.255.252
clock rate 56000
!
interface Serial0/0/1
no ip address
shutdown
!
!
router eigrp 1
network 10.1.1.0 0.0.0.3
network 192.168.1.0
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login
transport input all
!
scheduler allocate 20000 1000
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 27
Lab Testing Network Connectivity with Ping and Traceroute
ROUTER ISP
ISP# show running-config
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 27
Lab Testing Network Connectivity with Ping and Traceroute
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
ip address 10.1.1.2 255.255.255.252
!
interface Serial0/0/1
ip address 10.2.2.2 255.255.255.252
clock rate 56000
!
!
router eigrp 1
network 10.1.1.0 0.0.0.3
network 10.2.2.0 0.0.0.3
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 27
Lab Testing Network Connectivity with Ping and Traceroute
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login
transport input all
!
scheduler allocate 20000 1000
!
end
Router REMOTE
REMOTE# show running-config
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 20 of 27
Lab Testing Network Connectivity with Ping and Traceroute
!
!
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
ip address 10.2.2.1 255.255.255.252
!
!
router eigrp 1
network 10.2.2.0 0.0.0.3
network 192.168.3.0
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
!
!
!
control-plane
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 21 of 27
Lab Testing Network Connectivity with Ping and Traceroute
!
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login
transport input all
!
scheduler allocate 20000 1000
!
end
Switch S1
S1# show running-config
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 22 of 27
Lab Testing Network Connectivity with Ping and Traceroute
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 23 of 27
Lab Testing Network Connectivity with Ping and Traceroute
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.11 255.255.255.0
!
ip default-gateway 192.168.1.1
ip http server
ip http secure-server
!
!
!
line con 0
line vty 5 15
!
end
Switch S3
S3# show running-config
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 24 of 27
Lab Testing Network Connectivity with Ping and Traceroute
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname S3
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
system mtu routing 1500
!
!
no ip domain-lookup
!
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 25 of 27
Lab Testing Network Connectivity with Ping and Traceroute
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.3.11 255.255.255.0
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 26 of 27
Lab Testing Network Connectivity with Ping and Traceroute
ip default-gateway 192.168.3.1
ip http server
ip http secure-server
!
!
line con 0
line vty 5 15
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 27 of 27
Lab - Mapping the Internet (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Part 1: Test Network Connectivity Using Ping
Part 2: Trace a Route to a Remote Server Using Windows Tracert
Background
Route tracing computer software is a utility that lists the networks data has to traverse from the user's
originating end device to a distant destination network.
This network tool is typically executed at the command line as:
tracert <destination network name or end device address>
(Microsoft Windows systems)
or
traceroute <destination network name or end device address>
(UNIX and similar systems)
Route tracing utilities allow a user to determine the path or routes as well as the delay across an IP network.
Several tools exist to perform this function.
The traceroute (or tracert) tool is often used for network troubleshooting. By showing a list of routers
traversed, it allows the user to identify the path taken to reach a particular destination on the network or
across internetworks. Each router represents a point where one network connects to another network and
through which the data packet was forwarded. The number of routers is known as the number of "hops" the
data traveled from source to destination.
The displayed list can help identify data flow problems when trying to access a service such as a website. It
can also be useful when performing tasks such as downloading data. If there are multiple websites (mirrors)
available for the same data file, one can trace each mirror to get a good idea of which mirror would be the
fastest to use.
Two trace routes between the same source and destination conducted some time apart may produce different
results. This is due to the "meshed" nature of the interconnected networks that comprise the Internet and the
Internet Protocols ability to select different pathways over which to send packets.
Command-line-based route tracing tools are usually embedded with the operating system of the end device.
Scenario
Using an Internet connection, you will use three route tracing utilities to examine the Internet pathway to
destination networks. This activity should be performed on a computer that has Internet access and access to
the command line. First, you will use the Windows embedded tracert utility.
Instructor Note: Many schools do not have access to the command prompt. Traceroutes are included in
Appendix A for your use. Depending on the situation, this lab can be assigned in the classroom, as homework
or can be performed by the instructor as a walk-through demonstration.
Some institutions disable ICMP echo replies used by both ping and traceroute utilities. Before students begin
this activity, make sure there are no local restrictions related to ICMP datagrams. This activity assumes that
ICMP datagrams are not restricted by any local security policy.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10
Lab - Mapping the Internet
Required Resources
1 PC (Windows 7 or 8 with Internet access)
d. The first output line displays the Fully Qualified Domain Name (FQDN) e144.dscb.akamaiedge.net. This
is followed by the IP address 23.1.48.170. Cisco hosts the same web content on different servers
throughout the world (known as mirrors). Therefore, depending upon where you are geographically, the
FQDN and the IP address will be different.
e. From this portion of the output:
Four pings were sent and a reply was received from each ping. Because each ping was responded to,
there was 0% packet loss. On average, it took 54 ms (54 milliseconds) for the packets to cross the
th
network. A millisecond is 1/1,000 of a second.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 10
Lab - Mapping the Internet
Instructor Note: If the first ICMP packet times out, this could be a result of the PC resolving the
destination address. This should not occur if you repeat the ping as the address is now cached.
Streaming video and online games are two applications that suffer when there is packet loss, or a slow
network connection. A more accurate determination of an Internet connection speed can be determined
by sending 100 pings, instead of the default 4. Here is how to do that:
f. Now ping Regional Internet Registry (RIR) websites located in different parts of the world:
For Africa:
C:\> ping www.afrinic.net
For Australia:
C:\> ping www.apnic.net
For Europe:
C:\> ping www.ripe.net
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 10
Lab - Mapping the Internet
All these pings were run from a computer located in the United States. What happens to the average ping
time in milliseconds when data is traveling within the same continent (North America) as compared to
data from North America traveling to different continents?
____________________________________________________________________________________
____________________________________________________________________________________
Answer varies based on location. In the data above, the average ping time in milliseconds dramatically
increases.
What is interesting about the pings that were sent to the European website?
____________________________________________________________________________________
____________________________________________________________________________________
At the time that these pings were sent, the site was unreachable. Successful pings to a destination
indicate the destination is up and running. A number of reasons can lead to unsuccessful pings. A site
can be unreachable because it has been configured not to respond to ICMP packets, the firewall is
blocking ICMP or there is no route to the site from the machine generating the pings.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 10
Lab - Mapping the Internet
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 10
Lab - Mapping the Internet
In the example output shown above, the tracert packets travel from the source PC to the local router
default gateway (hop 1: 192.168.1.1) to the ISPs Point of Presence (POP) router (hop 2: 10.18.20.1).
Every ISP has numerous POP routers. These POP routers are at the edge of the ISPs network and are
the means by which customers connect to the Internet. The packets travel along the Verizon network for
two hops and then jump to a router that belongs to alter.net. This could mean that the packets have
traveled to another ISP. This is significant because sometimes there is packet loss in the transition
between ISPs, or sometimes one ISP is slower than another. How could we determine if alter.net is
another ISP or the same ISP?
e. There is an Internet tool known as whois. The whois tool allows us to determine who owns a domain
name. A web-based whois tool is found at http://whois.domaintools.com/. This domain is also owned by
Verizon according to the web-based whois tool.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 10
Lab - Mapping the Internet
To summarize, Internet traffic starts at a home PC and travels through the home router (hop 1). It then
connects to the ISP and travels through its network (hops 2-7) until it arrives at the remote server (hop 8).
This is a relatively unusual example in which there is only one ISP involved from start to finish. It is typical
to have two or more ISP involved as displayed in the following examples.
f. Now examine an example that involves Internet traffic crossing multiple ISPs. Below is the tracert for
www.afrinic.net:
What happens at hop 7? Is level3.net the same ISP as hops 2-6, or a different ISP? Use the whois tool to
answer this question.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 10
Lab - Mapping the Internet
____________________________________________________________________________________
The Internet traffic goes from being on alter.net to level3.net. The whois tool reveals that this is a
separate company/separate ISP.
What happens in hop 10 to the amount of time it takes for a packet to travel between Washington D.C.
and Paris, as compared with the earlier hops 1-9?
____________________________________________________________________________________
In hops 1-9 most packets traverse their link in 50 ms or less. On the Washington D.C. to Paris link, the
time increases to 132 ms.
What happens in hop 18? Do a whois lookup on 168.209.201.74 using the whois tool. Who owns this
network?
____________________________________________________________________________________
The time to traverse one link in the network goes up from 159 ms to 340 ms. From the increased time, the
traffic probably is moved to a different network from the Level3 backbone network. Using the whois tool,
IP address (168.209.201.74) is owned by the African Network Information Center.
g. Type tracert www.lacnic.net.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 10
Lab - Mapping the Internet
Reflection
What are the functional differences between the commands ping and tracert?
_______________________________________________________________________________________
_______________________________________________________________________________________
The ping command generates ICMP packets with TTL=255, the maximum value allowed by the IP protocol.
The TTL is set to 255 because ICMP packets generated by ping are designed to go from source to
destination, a situation when the distance is unknown.
Each hop in the tracert results displays the routes that the packets take when traveling to the final destination.
The tracert command creates ICMP packets and the tracert packets are crafted to reach the next router only,
By initially setting the TTL=1 and increasing its value as it receives "TTL expired" messages from the routers
in the path from source to destination, tracert is able to display all the routers in the path.
Appendix A
C:\> tracert www.cisco.com
Trace complete.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 10
Lab - Mapping the Internet
Trace complete.
Trace complete.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 10
Class Activity - The Internet of EverythingNaturally! (Instructor
Version Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain the need for IPv6 network addresses.
Background /Scenario
Note: This activity may be completed individually or in small/large groups.
This chapter discussed the ways that small to medium-sized businesses are connected to networks in groups.
The IoE was introduced in the modeling activity at the beginning of this chapter.
For this activity, choose one of the following:
o Online banking
o World news
o Weather forecasting/climate
o Traffic conditions
Devise an IPv6 addressing scheme for the area you have chosen. Your addressing scheme should include
how you would plan for:
o Subnetting
o Unicasts
o Multicasts
Keep a copy of your scheme to share with the class or learning community. Be prepared to explain:
o how subnetting, unicasts, and multicasts could be incorporated
o where your addressing scheme could be used
o how small to medium-size businesses would be affected by using your plan
Instructor Note: This optional Modeling Activity is not intended to be a graded assignment. Its purpose is to
encourage students to reflect on their perceptions of how a network could use IPv6 and the undecillion
addresses available both for personal and corporate practice. Instructors should facilitate class discussion
and idea sharing as a result of this activity.
Required Resources
Paper, pens or pencils, or tablets
Packet Tracer (if you would like to display how your network would look physically)
Hard or soft copy of the final network topology with IPv6 addressing indicated for sharing with the class.
Reflection
What was the hardest part of designing this network model? Explain your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Class Activity - The Internet of EverythingNaturally!
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary within groups (as will the topologies developed). Some students may mention designing a
main group and then subnetted groups from the main group, some may indicate the actual addressing of the
network, some may indicate they had difficulty with where unicasts and multicasts could occur.
A possible solution to the scenario might include:
Weather Forecasting/Climate
The area in which you live has many hot days during summer months. Electricity costs skyrocket on those
days.
Your local electrical area includes 6 local cities and all of these cities are then incorporated into one, large
state. Multiple states are incorporated into one large country. To decrease costs and increase productivity of
electricity, you could install windmills or solar panels that would generate electrical current to your immediate
area and larger geographic areas. The windmills or solar panels could be controlled using network
accessibility.
Using an IPv6 addressing scheme:
o Each windmill (or solar panel) will be assigned an IPv6 address.
o Windmills and/or solar panels will be turned on to generate electricity by, city, state or country
(subnetting).
o Cities, states or countries will receive additional electricity based on unicast or multicast operation of
the windmills/solar panels.
Note: Depending on the focus or use of this activity, students could actually draw a schematic of their
windmills or solar panels and address them to show mastery of the subnetting concept. They could also
group the windmills or solar panels to show unicast or multicast transmissions types.
Other possible scenarios might include:
1. Energy Efficiency
- Each household light bulb could be connected to the network and remotely managed. Each one would
therefore need an IPv6 address.
- Each home appliance should also be connected to the network and would also need IPv6.
- The network structure could group all appliances of a home into one subnet. Route summaries could be
created to group neighborhoods together. Unicast messages would be used to manage single devices.
Appliances of the same type could have a multicast group (all TVs, for instance) and managed in bulk.
2. Weather Forecast
- Sensor on trees would need IPv6 addresses to be connected to the network
- Mobile weather stations would also need IPv6 (several stations per city, for accuracy)
- Floating weather stations would gather info about the oceans and rivers and also need IPv6
- Once again route summaries would group/represent physical locations. Multicast groups could be created
based on station placement (land, river, and ocean) and unicast addresses used to manage a specific station
3. Traffic Conditions
- Each traffic light would need an IPv6 to be connected to the network.
- Road traffic sensors (to provide the rate vehicle/minute) could also be connected to the network and would
need IPv6 addresses.
- Multicast groups could be created based on device type (sensor or traffic light) and unicast addresses could
be used to manage a specific device.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Class Activity - The Internet of EverythingNaturally!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3
Class Activity - Call Me! (Instructor Version Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain why routing is necessary for hosts on different subnets to communicate.
Background /Scenario
In this chapter, you will be learning how devices can be grouped into subnets, or smaller network groups,
from a large network.
In this modeling activity, you are asked to think about a number you probably use every day, a number such
as your telephone number. As you complete the activity, think about how your telephone number compares
to strategies that network administrators might use to identify hosts for efficient data communication.
Complete the two sections listed below and record your answers. Save the two sections in either hard- or
soft-copy format to use later for class discussion purposes.
Explain how your smartphone or landline telephone number is divided into identifying groups of numbers.
Does your telephone number use an area code? An ISP identifier? A city, state, or country code?
In what ways does separating your telephone number into managed parts assist in contacting or
communicating with others?
Instructor Note: This is an individual or an in-class small/large group modeling activity. It is not intended to
be a graded assignment. Its purpose is to encourage students to reflect on their current knowledge of how
networks are grouped using a numerical basis. Facilitation of the discussion should be initiated as a result of
this Activity.
Instructor Note: Please have students adjust their answers to incorporate a country area code if necessary.
Required Resources
Recording capabilities (paper, tablet, etc.) for reflective comments to be shared with the class.
Reflection
Why do you think ISPs need your telephone number when setting up your account parameters?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Example telephone number and identifying groups in that telephone number (if your country uses another
identifier, it would need to be incorporated into this sections answers:
Area Code (or ISP identifier) City Telephone Identifier
571 555 1212
571 directs calls from my telephone showing the general, geographic location of my ISP or state. I wish to call
someone in another state or through a different ISP, the area code or ISP identifier will be different.
555 indicates the city from which I am calling and this helps to route my communications to the correct
switches or routers.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - Call Me!
1212 indicates my personal smartphone or landline telephone identifier when combined with the first two
groups. This enables my telephone to receive the communication after being processed, generally, through
my area code/ISP and city identifiers.
Identify elements of the model that map to IT-related content:
Hierarchies are employed when using addressing schemes
Connectivity is influenced by the addressing scheme identifiers
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab Calculating IPv4 Subnets (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Determine IPv4 Address Subnetting
Part 2: Calculate IPv4 Address Subnetting
Background / Scenario
The ability to work with IPv4 subnets and determine network and host information based on a given IP
address and subnet mask is critical to understanding how IPv4 networks operate. The first part is designed to
reinforce how to compute network IP address information from a given IP address and subnet mask. When
given an IP address and subnet mask, you will be able to determine other information about the subnet.
Instructor Note: This activity can be done in class or assigned as homework. If the assignment is done in
class, you may wish to have students work alone or in teams of 2 students each. It is suggested that the first
problem is done together in class to give students guidance as to how to proceed for the rest of the
assignment.
The public IP addresses used in this lab are owned by Cisco.
Required Resources
1 PC (Windows 7 or 8 with Internet access)
Optional: IPv4 address calculator
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 7
Lab Calculating IPv4 Subnets
IP Address 172.30.239.145
Subnet Mask 255.255.192.0
==========
Result (Network) 172.30.?.0
Perform binary ANDing on the third octet.
Decimal Binary
239 11101111
192 11000000
=======
Result 192 11000000
Analyzing this example again produces the following result:
IP Address 172.30.239.145
Subnet Mask 255.255.192.0
==========
Result (Network) 172.30.192.0
Continuing with this example, determining the number of hosts per network can be calculated by analyzing
the subnet mask. The subnet mask will be represented in dotted decimal format, such as 255.255.192.0, or in
network prefix format, such as /18. An IPv4 address always has 32 bits. Subtracting the number of bits used
for the network portion (as represented by the subnet mask) gives you the number of bits used for hosts.
Using our example above, the subnet mask 255.255.192.0 is equivalent to /18 in prefix notation. Subtracting
18 network bits from 32 bits results in 14 bits left for the host portion. From there, it is a simple calculation:
(number of host bits)
2 - 2 = Number of hosts
14
2 = 16,384 2 = 16,382 hosts
Determine the network and broadcast addresses and number of host bits and hosts for the given IPv4
addresses and prefixes in the following table.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 7
Lab Calculating IPv4 Subnets
Given:
Find:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 7
Lab Calculating IPv4 Subnets
st nd rd th
Description 1 Octet 2 Octet 3 Octet 4 Octet Description
Step 1: Fill out the tables below with appropriate answers given the IPv4 address, original
subnet mask, and new subnet mask.
a. Problem 1:
Given:
Find:
b. Problem 2:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7
Lab Calculating IPv4 Subnets
Given:
Find:
c. Problem 3:
Given:
Find:
d. Problem 4:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 7
Lab Calculating IPv4 Subnets
Given:
Find:
e. Problem 5:
Given:
Find:
f. Problem 6:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7
Lab Calculating IPv4 Subnets
Given:
Find:
Reflection
Why is the subnet mask so important when analyzing an IPv4 address?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
The subnet mask determines everything about the address: the network, number of host bits, number of hosts
and the broadcast address. Merely looking at an IPv4 address tells you nothing. You need the subnet mask to
fill in all the important pieces of information.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7
Lab - Designing and Implementing a Subnetted IPv4 Addressing
Scheme (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
R1 G0/0 N/A
G0/1 N/A
Lo0 N/A
Lo1 N/A
S1 VLAN 1 N/A N/A N/A
PC-A NIC
PC-B NIC
Objectives
Part 1: Design a Network Subnetting Scheme
Part 2: Configure the Devices
Part 3: Test and Troubleshoot the Network
Background / Scenario
In this lab, starting from a single network address and network mask, you will subnet the network into multiple
subnets. The subnet scheme should be based on the number of host computers required in each subnet, as
well as other network considerations, like future network host expansion.
After you have created a subnetting scheme and completed the network diagram by filling in the host and
interface IP addresses, you will configure the host PCs and router interfaces, including loopback interfaces.
The loopback interfaces are created to simulate additional LANs attached to router R1.
After the network devices and host PCs have been configured, you will use the ping command to test for
network connectivity.
This lab provides minimal assistance with the actual commands necessary to configure the router. However,
the required commands are provided in Appendix A. Test your knowledge by trying to configure the devices
without referring to the appendix.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at this end of the lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing. An Ethernet straight-through
cable may be used between the router and PC-B. If using another Cisco router model, it may be necessary to
use an Ethernet crossover cable.
1111111.11111111.11111111.00000000
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
4) The subnet mask is made up of two portions, the network portion, and the host portion. This is
represented in the binary by the ones and the zeros in the subnet mask.
In the network mask, what do the ones represent? ________________________________________
The ones represent the network portion.
In the network mask, what do the zeros represent? _______________________________________
The zeroes represent the host portion.
5) To subnet a network, bits from the host portion of the original network mask are changed into subnet
bits. The number of subnet bits defines the number of subnets. Given each of the possible subnet
masks depicted in the following binary format, how many subnets and how many hosts are created in
each example?
Hint: Remember that the number of host bits (to the power of 2) defines the number of hosts per
subnet (minus 2), and the number of subnet bits (to the power of two) defines the number of subnets.
The subnet bits (depicted in bold type face) are the bits that have been borrowed beyond the original
network mask of /24. The /24 is the slash prefix notation and corresponds to a dotted decimal mask of
255.255.255.0.
(/25) 11111111.11111111.11111111.10000000
Dotted decimal subnet mask equivalent: ________________________________
255.255.255.128
Number of subnets? ________________, Number of hosts? ________________
1 7
Two subnets (2 ) and 128 hosts (2 ) 2 = 126 hosts per subnet
(/26) 11111111.11111111.11111111.11000000
Dotted decimal subnet mask equivalent: ________________________________
255.255.255.192
Number of subnets? ________________, Number of hosts? ________________
2 6
Four subnets (2 ) and 64 hosts (2 ) 2 = 62 hosts per subnet
(/27) 11111111.11111111.11111111.11100000
Dotted decimal subnet mask equivalent: ________________________________
255.255.255.224
Number of subnets? ________________ Number of hosts? ________________
3 5
Eight subnets (2 ) and 32 hosts (2 ) 2 = 30 hosts per subnet
(/28) 11111111.11111111.11111111.11110000
Dotted decimal subnet mask equivalent: ________________________________
255.255.255.240
Number of subnets? ________________ Number of hosts? _________________
4 4
Sixteen subnets (2 ) and 16 hosts (2 ) 2 = 14 hosts per subnet
(/29) 11111111.11111111.11111111.11111000
Dotted decimal subnet mask equivalent: ________________________________
255.255.255.248
Number of subnets? ________________ Number of hosts? _________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
5 3
Thirty two subnets (2 ) and 8 hosts (2 ) 2 = 6 hosts per subnet
(/30) 11111111.11111111.11111111.11111100
Dotted decimal subnet mask equivalent: ________________________________
255.255.255.252
Number of subnets? ________________ Number of hosts? _________________
6 2
Sixty four subnets (2 ) and 4 hosts (2 ) 2 = 2 hosts per subnet
6) Considering your answers, which subnet masks meet the required number of minimum host
addresses?
________________________________________________________________________________
/25, /26, /27
7) Considering your answers, which subnet masks meets the minimum number of subnets required?
________________________________________________________________________________
/27, /28, /29, /30 will give the required number of subnets.
8) Considering your answers, which subnet mask meets both the required minimum number of hosts
and the minimum number of subnets required?
________________________________________________________________________________
/27 will give you eight subnets, which is greater than the minimum of five required, and 30 hosts per
subnet, which is greater than the 25 hosts required for the first subnet.
9) When you have determined which subnet mask meets all of the stated network requirements, you will
derive each of the subnets starting from the original network address. List the subnets from first to
last below. Remember that the first subnet is 192.168.0.0 with the newly acquired subnet mask.
Subnet Address / Prefix Subnet Mask (dotted decimal)
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
___________________ / ____ __________________________
192.168.0.0, 192.168.0.32, 192.168.0.64, 192.168.0.96, 192.168.0.128, 192.168.0.160,
192.168.0.192, 192.168.0.224 All prefix is /27. All subnet mask is (dotted decimal) 255.255.255.224.
Step 2: Complete the diagram showing where the host IP addresses will be applied.
On the following lines provided, fill in the IP addresses and subnets masks in slash prefix notation. On the
router, use the first usable address in each subnet for each of the interfaces, Gigabit Ethernet 0/0, Gigabit
Ethernet 0/1, loopback 0, and loopback 1. Fill in an IP address for both PC-A and PC-B. Also enter this
information into the Addressing Table on Page 1.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
The addresses of the router Gigabit Ethernet 0/0, Gigabit Ethernet 0/1, loopback 0 and loopback 1 interfaces
would be: 192.168.0.1/27, 192.168.0.33/27, 192.168.0.65/27, 192.168.0.97/27. If the Gigabit 0/0 interface is
the first subnet then PC-Bs IP address would be a number between 192.168.0.2 and 192.168.0.30. If the
Gigabit 0/1 interface is the second subnet, then PC-As IP address would be a number between 192.168.0.34
and 192.168.0.62.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
If the PC and router interface have been configured correctly then the ping should be successful. If not,
check items d and e below.
b. Test to see if PC-B can communicate with its default gateway. From PC-B, open a command prompt and
ping the IP address of the router Gigabit Ethernet 0/0 interface. Do you get a reply? ________________
If the PC and router interface have been configured correctly then the ping should be successful. If not,
check items d and e below.
c. Test to see if PC-A can communicate with PC-B. From PC-A, open a command prompt and ping the IP
address of PC-B. Do you get a reply? _________________
If both PCs and the router Gigabit Ethernet interfaces have been configured correctly, then the pings
should be successful. If not, check items d and e below.
d. If you answered no to any of the preceding questions, then you should go back and check all of your IP
address and subnet mask configurations, and ensure that the default gateways have been correctly
configured on PC-A and PC-B.
e. If you verify that all of the settings are correct, and you can still not ping successfully, then there are a few
additional factors that can block ICMP pings. On PC-A and PC-B within Windows, make sure that the
Windows Firewall is turned off for the Work, Home, and Public networks.
f. Experiment by purposely misconfiguring the gateway address on PC-A to 10.0.0.1. What happens when
you try and ping from PC-B to PC-A? Do you receive a reply?
____________________________________________________________________________________
____________________________________________________________________________________
With deliberate misconfigurations, the answer should be no.
Reflection
1. Subnetting one larger network into multiple smaller subnetworks allows for greater flexibility and security in
network design. However, what do you think some of the drawbacks are when the subnets are limited to
being the same size?
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. Students may suggest that, because some subnetworks require many ip addresses and
others require only a few, having all of the subnets the same size is not the most efficient way to divide the
subnets.
2. Why do you think the gateway/router IP address is usually the first usable IP address in the network?
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. It may be suggested that the router or gateway is like a door to the network and therefore it
is logical that its address is at the beginning of the network. It is purely a convention however, and therefore
the router does not have to have the first or last address in the network.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
e. Loopback interfaces are created to simulate additional LANs off of router R1. Configure the loopback
interfaces with IP addresses and subnet masks. When they are created, loopback interfaces are enabled,
by default.
R1(config)# interface loopback 0
R1(config-if)# ip address <ip address> <subnet mask>
R1(config-if)# interface loopback 1
R1(config-if)# ip address <ip address> <subnet mask>
R1(config-if)# end
f. Save the running configuration to the startup configuration file.
R1# copy running-config startup-config
b. Configure the IP address, subnet mask, and default gateway settings on PC-B.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
Device Configs
Router R1
R1#show run
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
interface Loopback1
ip address 192.168.0.97 255.255.255.224
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
ip address 192.168.0.1 255.255.255.224
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 192.168.0.33 255.255.255.224
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 11
Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme
login
transport input all
!
scheduler allocate 20000 1000
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 11
Lab Designing and Implementing a VLSM Addressing Scheme
(Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Objectives
Part 1: Examine Network Requirements
Part 2: Design the VLSM Address Scheme
Part 3: Cable and Configure the IPv4 Network
Background / Scenario
Variable Length Subnet Mask (VLSM) was designed to avoid wasting IP addresses. With VLSM, a network is
subnetted and then re-subnetted. This process can be repeated multiple times to create subnets of various
sizes based on the number of hosts required in each subnet. Effective use of VLSM requires address
planning.
In this lab, use the 172.16.128.0/17 network address to develop an address scheme for the network displayed
in the topology diagram. VLSM is used to meet the IPv4 addressing requirements. After you have designed
the VLSM address scheme, you will configure the interfaces on the routers with the appropriate IP address
information.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). Other routers and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers have been erased and have no startup configurations. If you are unsure,
contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
This lab can be performed in multiple sessions if time is an issue. Parts 1 and 2 are paper based and can be
assigned as homework. Part 3 is Hands-on and requires lab equipment.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
It is worth noting to the students that as a network administrator, you would not have a single network with
over 1000 hosts. You would break these down further in a production network.
Required Resources
3 routers (Cisco 1941 with Cisco IOS software, Release 15.2(4)M3 universal image or comparable)
1 PC (with terminal emulation program, such as Tera Term, to configure routers)
Console cable to configure the Cisco IOS devices via the console ports
Ethernet (optional) and serial cables, as shown in the topology
Windows Calculator (optional)
Step 1: Determine how many host addresses and subnets are available.
How many host addresses are available in a /17 network? ________ 32,766
What is the total number of host addresses needed in the topology diagram? ________ 31,506
How many subnets are needed in the network topology? ______ 9
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
Can you subnet the remaining subnet again and still support this subnet? ______ yes
What are the two network addresses that would result from this subnetting?
_____________________ 172.16.192.0/19
_____________________ 172.16.224.0/19
Use the first network address for this subnet.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
_____________________ 172.16.248.0/22
_____________________ 172.16.252.0/22
Use the first network address for this subnet.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
Reflection
Can you think of a shortcut for calculating the network addresses of consecutive /30 subnets?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers may vary. A /30 network has 4 address spaces: the network address, 2 host addresses, and a
broadcast address. Another technique for obtaining the next /30 network address would be to take the
network address of the previous /30 network and add 4 to the last octet.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
no ip domain lookup
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
description LAN with 2,000 hosts.
ip address 172.16.240.1 255.255.248.0
duplex auto
speed auto
!
interface GigabitEthernet0/1
description LAN with 4,000 hosts.
ip address 172.16.224.1 255.255.240.0
duplex auto
speed auto
!
interface Serial0/0/0
description Connection to HQ S0/0/0.
ip address 172.16.254.2 255.255.255.252
clock rate 128000
!
interface Serial0/0/1
description Connection to BR2 S0/0/0.
ip address 172.16.254.9 255.255.255.252
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
control-plane
!
!
banner motd ^C
Warning: Unauthorzed access is prohibited!
^C
!
line con 0
password 7 14141B180F0B
login
line aux 0
line 2
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
password 7 094F471A1A0A
login
transport input all
!
scheduler allocate 20000 1000
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
shutdown
!
interface GigabitEthernet0/0
description LAN with 16,000 hosts.
ip address 172.16.128.1 255.255.192.0
duplex auto
speed auto
!
interface GigabitEthernet0/1
description LAN with 8,000 hosts.
ip address 172.16.192.1 255.255.224.0
duplex auto
speed auto
!
interface Serial0/0/0
description Connection to BR1 S0/0/0.
ip address 172.16.254.1 255.255.255.252
!
interface Serial0/0/1
description Connection to BR2 S0/0/1.
ip address 172.16.254.5 255.255.255.252
clock rate 128000
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
control-plane
!
!
banner motd ^C
Warning: Unauthorzed access is prohibited!
^C
!
line con 0
password 7 02050D480809
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
password 7 00071A150754
login
transport input all
!
scheduler allocate 20000 1000
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 12
Lab Designing and Implementing a VLSM Addressing Scheme
speed auto
!
interface GigabitEthernet0/1
description LAN with 1,000 hosts.
ip address 172.16.248.1 255.255.252.0
duplex auto
speed auto
!
interface Serial0/0/0
description Connection to BR1 S0/0/1.
ip address 172.16.254.10 255.255.255.252
clock rate 128000
!
interface Serial0/0/1
description Connection to HQ S0/0/1.
ip address 172.16.254.6 255.255.255.252
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
control-plane
!
!
banner motd ^C
Warning: Unauthorzed access is prohibited!
^C
!
line con 0
password 7 070C285F4D06
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
password 7 0822455D0A16
login
transport input all
!
scheduler allocate 20000 1000
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 12
Class Activity - Can You Call Me Now? (Instructor Version
Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Calculate the necessary subnet mask in order to accommodate a given number of hosts.
Background /Scenario
Note: This activity may be completed individually or in small/large groups using Packet Tracer software.
You are setting up a dedicated, computer addressing scheme for patient rooms in a hospital. The switch
will be centrally located in the nurses station, as each of the five rooms will be wired so that patients can
just connect to a RJ45 port built into the wall of their room. Devise a physical and logical topology for only
one of the six floors using the following addressing scheme requirements: There are six floors with five
patient rooms on each floor for a total of thirty connections. Each room needs a network connection.
Subnetting must be incorporated into your scheme.
Use one router, one switch, and five host stations for addressing purposes.
Validate that all PCs can connect to the hospitals in-house services.
Keep a copy of your scheme to share later with the class or learning community. Be prepared to explain how
subnetting, unicasts, multicasts and broadcasts would be incorporated, and where your addressing scheme
could be used.
Instructor Note: This optional Modeling Activity may or may not be a graded assignment. Its purpose is to
check students mastery of hierarchical subnets and subnet masking operation. A facilitated chapter review
discussion can be initiated as a result of this activity.
Required Resources
Packet Tracer software
Reflection
How would you change your addressing scheme if you were going to add an additional network connection to
the hospital rooms with a total of 10 connections per floor or 2 ports per room?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
If the number of network connections were doubled, a subnet mask of 255.255.255.240 with a prefix of /28
would be necessary to support connectivity.
Another possible solution to the original activity might be:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - Can You Call Me Now?
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Class Activity - We Need to Talk (Instructor Version Optional Class
Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain how transport layer protocols and services support communications across data networks.
Background / Scenario
Note: This activity works best with medium-sized groups of 6 to 8 students per group.
This chapter helps you understand how transport layer protocols and services support network data
communications.
The instructor will whisper a complex message to the first student in a group. An example of the message
might be Our final exam will be given next Tuesday, February 5th, at 2 p.m. in Room 1151.
That student whispers the message to the next student in the group. Each group follows this process until all
members of each group have heard the whispered message. Here are the rules you are to follow:
o You can whisper the message only once to your neighbor.
o The message must keep moving from one person to the other with no skipping of participants. The
instructor should ask a student to keep time of the full message activity from first participant to last
participant stating the messages. The first or last person would mostly likely be the best one to keep
this time.
o The last student will say aloud exactly what he or she heard.
The instructor will then restate the original message so that the group can compare it to the message that was
delivered by the last student in the group.
Instructor Note: You should have a different complex message for each group of students. Initiate discussion
about what happened in the activity. Focus on these five questions:
1) Was the message complete when it reached the last student?
2) Was the message correct as delivered to the last student?
3) How long did it take for the message to get to the last student?
4) If you were depending on this message to drive your personal/business calendar, studying schedule,
etc., would the contents of this message need to be fully correct when you received them?
5) Would the length of time taken to deliver the message be important to the sender and recipient?
Instructor Note: This is an optional in-class Modeling Activity (MA). It is not intended to be a graded
assignment. Its purpose is to initiate student discussion about their perception of how data is transferred from
source to destination, both personally and in corporate practice. This MA introduces students to TCP/UDP,
transport layer content.
Required Resources
Timer for the student who is keeping a record of the conversations duration.
Reflection
1. Would the contents of this message need to be fully correct when you received them if you were depending
on this message to drive your personal/business calendar, studying schedule, etc.?
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - We Need to Talk
_______________________________________________________________________________________
_______________________________________________________________________________________
2. Would the length of time taken to deliver the message be an important factor to the sender and recipient?
_______________________________________________________________________________________
_______________________________________________________________________________________
In the discussion initiated as a result of this activity, students should mention:
The importance of messages being delivered fully from sender to recipient (TCP vs. UDP - was the
message method correct to use in this situation?)
The importance of details within the message being correct from sender to recipient (Guaranteed vs.
Non-guaranteed delivery - was the message correct as delivered to the last person?)
The importance of timing of a message to the details of the message and to the date/time needed to
take action on the message (Segment establishment and delivery vs. full message delivery - did it take
very long for the message to get to the last student?)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab - Using Wireshark to Observe the TCP 3-Way
Handshake (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Prepare Wireshark to Capture Packets
Part 2: Capture, Locate, and Examine Packets
Background / Scenario
In this lab, you will use Wireshark to capture and examine packets generated between the PC browser using
the HyperText Transfer Protocol (HTTP) and a web server, such as www.google.com. When an application,
such as HTTP or File Transfer Protocol (FTP) first starts on a host, TCP uses the three-way handshake to
establish a reliable TCP session between the two hosts. For example, when a PC uses a web browser to surf
the Internet, a three-way handshake is initiated, and a session is established between the PC host and web
server. A PC can have multiple, simultaneous, active TCP sessions with various web sites.
Note: This lab cannot be completed using Netlab. This lab assumes that you have Internet access.
Instructor Note: Using a packet sniffer, such as Wireshark, may be considered a breach of the security
policy of the school. It is recommended that permission be obtained before running Wireshark for this lab. If
using a packet sniffer is an issue, the instructor may wish to assign the lab as homework or perform a walk-
through demonstration.
Required Resources
1 PC (Windows 7 or 8 with a command prompt access, Internet access, and Wireshark installed)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 7
Lab - Using Wireshark to Observe the TCP 3-Way Handshake
b. Write down the IP and MAC addresses associated with the selected Ethernet adapter. That is the source
address to look for when examining captured packets.
The PC host IP address: ____________________________________________________________
Answers will vary. In this case, it is 192.168.1.130.
The PC host MAC address: __________________________________________________________
Answers will vary. In this case, it is 00:1A:73:EA:63:8C.
c. In the Wireshark: Capture Interfaces window, click the check the box next to the interface that is
connected to your LAN.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 7
Lab - Using Wireshark to Observe the TCP 3-Way Handshake
Note: If multiple interfaces are listed and you are unsure which interface to select, click Details. Click the
802.3 (Ethernet) tab, and verify that the MAC address matches what you wrote down in Step 1b. Close
the Interface Details window after verification.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 7
Lab - Using Wireshark to Observe the TCP 3-Way Handshake
Step 3: Examine the information within packets including IP addresses, TCP port numbers,
and TCP control flags.
a. In our example, frame 14 is the start of the three-way handshake between the PC and the Google web
server. In the packet list pane (top section of the main window), select the frame. This highlights the line
and displays the decoded information from that packet in the two lower panes. Examine the TCP
information in the packet details pane (middle section of the main window).
b. Click the + icon to the left of the Transmission Control Protocol in the packet details pane to expand the
view of the TCP information.
c. Click the + icon to the left of the Flags. Look at the source and destination ports and the flags that are set.
Note: You may have to adjust the top and middle windows sizes within Wireshark to display the
necessary information.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7
Lab - Using Wireshark to Observe the TCP 3-Way Handshake
What is the TCP source port number? __________________________ Answers will vary. In this
example, the source port is 49387.
How would you classify the source port? ________________________ Dynamic or Private
What is the TCP destination port number? _______________________ Port 443
How would you classify the destination port? _____________________ Well-known, registered (HTTPS
or secure web protocol)
Which flag (or flags) is set? ________________________ SYN flag
What is the relative sequence number set to? ____________________ 0
d. To select the next frame in the three-way handshake, select Go on the Wireshark menu and select Next
Packet In Conversation. In this example, this is frame 15. This is the Google web server reply to the
initial request to start a session.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 7
Lab - Using Wireshark to Observe the TCP 3-Way Handshake
What are the values of the source and destination ports? ______________________________________
Source Port is now 443, and Destination Port is now 49387
Which flags are set? ___________________________________________________________________
The Acknowledgement flag (ACK) and Syn flag (SYN)
What are the relative sequence and acknowledgement numbers set to?
____________________________________________________________________________________
The relative sequence number is 0, and the relative acknowledgement number is 1.
e. Finally, examine the third packet of the three-way handshake in the example. Click frame 16 in the top
window to display the following information in this example:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7
Lab - Using Wireshark to Observe the TCP 3-Way Handshake
Reflection
1. There are hundreds of filters available in Wireshark. A large network could have numerous filters and many
different types of traffic. List three filters that might be useful to a network administrator?
_______________________________________________________________________________________
Answers will vary but could include TCP, specific IP Addresses (source and/or destination), and protocols
such as HTTP.
2. What other ways could Wireshark be used in a production network?
_______________________________________________________________________________________
Wireshark is often used for security purposes for after-the-fact analysis of normal traffic or after a network
attack. New protocols or services may need to be captured to determine what port or ports are used.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7
Lab - Using Wireshark to Examine a UDP DNS Capture (Instructor
Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Record a PCs IP Configuration Information
Part 2: Use Wireshark to Capture DNS Queries and Responses
Part 3: Analyze Captured DNS or UDP Packets
Background / Scenario
If you have ever used the Internet, you have used the Domain Name System (DNS). DNS is a distributed
network of servers that translates user-friendly domain names like www.google.com to an IP address. When
you type a website URL into your browser, your PC performs a DNS query to the DNS servers IP address.
Your PCs DNS server query and the DNS servers response make use of the User Datagram Protocol (UDP)
as the transport layer protocol. UDP is connectionless and does not require a session setup as does TCP.
DNS queries and responses are very small and do not require the overhead of TCP.
In this lab, you will communicate with a DNS server by sending a DNS query using the UDP transport
protocol. You will use Wireshark to examine the DNS query and response exchanges with the same server.
Note: This lab cannot be completed using Netlab. This lab assumes that you have Internet access.
Instructor Note: Using a packet sniffer, such as Wireshark, may be considered a breach of the security
policy of the school. It is recommended that permission be obtained before running Wireshark for this lab. If
using a packet sniffer is an issue, the instructor may wish to assign the lab as homework or perform a walk-
through demonstration.
Required Resources
1 PC (Windows 7 or 8 with a command prompt access, Internet access, and Wireshark installed)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6
Lab - Using Wireshark to Examine a UDP DNS Capture
b. In the packet list pane (top section) of the main window, locate the packet that includes Standard query
and A www.google.com. See frame 5 as an example.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6
Lab - Using Wireshark to Examine a UDP DNS Capture
a. In the first line in the packet details pane, frame 5 had 74 bytes of data on the wire. This is the number of
bytes to send a DNS query to a named server requesting the IP addresses of www.google.com.
b. The Ethernet II line displays the source and destination MAC addresses. The source MAC address is
from your local PC because your local PC originated the DNS query. The destination MAC address is
from the default gateway because this is the last stop before this query exits the local network.
Is the source MAC address the same as the one recorded from Part 1 for the local PC?
_________________
The answer should be yes. If not, please verify that Wireshark is using the same interface for capturing
the packets.
c. In the Internet Protocol Version 4 line, the IP packet Wireshark capture indicates that the source IP
address of this DNS query is 192.168.1.11 and the destination IP address is 192.168.1.1. In this example,
the destination address is the default gateway. The router is the default gateway in this network.
Can you identify the IP and MAC addresses for the source and destination devices?
The IP packet and header encapsulates the UDP segment. The UDP segment contains the DNS query
as the data.
d. A UDP header only has four fields: source port, destination port, length, and checksum. Each field in a
UDP header is only 16 bits as depicted below.
Expand the User Datagram Protocol in the packet details pane by clicking the plus (+) sign. Notice that
there are only four fields. The source port number in this example is 60868. The source port was
randomly generated by the local PC using port numbers that are not reserved. The destination port is 53.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6
Lab - Using Wireshark to Examine a UDP DNS Capture
Port 53 is a well-known port reserved for use with DNS. DNS servers listen on port 53 for DNS queries
from clients.
In this example, the length of the UDP segment is 40 bytes. Out of 40 bytes, 8 bytes are used as the
header. The other 32 bytes are used by DNS query data. The 32 bytes of DNS query data is highlighted
in the following illustration in the packet bytes pane (lower section) of the Wireshark main window.
The checksum is used to determine the integrity of the packet after it has traversed the Internet.
The UDP header has low overhead because UDP does not have fields that are associated with the three-
way handshake in TCP. Any data transfer reliability issues that occur must be handled by the application
layer.
Record your Wireshark results in the table below:
Frame size
Source IP address
Destination IP address
Source port
Destination port
Is the source IP address the same as the local PCs IP address you recorded in Part 1?
_____________ Yes
Is the destination IP address the same as the default gateway noted in Part 1? _____________
Yes, if the default gateway is also performing DNS.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6
Lab - Using Wireshark to Examine a UDP DNS Capture
b. In the Ethernet II frame for the DNS response, what device is the source MAC address and what device is
the destination MAC address?
____________________________________________________________________________________
The source MAC address is the default gateway and the destination MAC address is the local host.
c. Notice the source and destination IP addresses in the IP packet. What is the destination IP address?
What is the source IP address?
Destination IP address: _______________________Source IP address: ________________________
The answer will vary. In this example, the destination is 192.168.1.11 and the source is 192.168.1.1.
What happened to the roles of source and destination for the local host and default gateway?
____________________________________________________________________________________
The local host and the default gateway have reversed their roles in DNS query and response packets.
d. In the UDP segment, the role of the port numbers has also reversed. The destination port number is
60868. Port number 60868 is the same port that was generated by the local PC when the DNS query was
sent to the DNS server. Your local PC listens for a DNS response on this port.
The source port number is 53. The DNS server listens for a DNS query on port 53 and then sends a DNS
response with a source port number of 53 back to the originator of the DNS query.
When the DNS response is expanded, notice the resolved IP addresses for www.google.com in the
Answers section.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6
Lab - Using Wireshark to Examine a UDP DNS Capture
Reflection
What are the benefits of using UDP instead of TCP as a transport protocol for DNS?
_______________________________________________________________________________________
UDP as a transport protocol provides quick session establishment, quick response, minimal overhead, no
need for retries, segment reassembly, and acknowledgement of received packets.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6
Lab - Using Wireshark to Examine TCP and UDP
Captures (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Identify TCP Header Fields and Operation Using a Wireshark FTP Session Capture
Part 2: Identify UDP Header Fields and Operation Using a Wireshark TFTP Session Capture
Background / Scenario
Two protocols in the TCP/IP transport layer are TCP (defined in RFC 761) and UDP (defined in RFC 768).
Both protocols support upper-layer protocol communication. For example, TCP is used to provide transport
layer support for the HyperText Transfer Protocol (HTTP) and FTP protocols, among others. UDP provides
transport layer support for the Domain Name System (DNS) and TFTP, among others.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
Note: Understanding the parts of the TCP and UDP headers and operation are a critical skill for network
engineers.
In Part 1 of this lab, you will use the Wireshark open source tool to capture and analyze TCP protocol header
fields for FTP file transfers between the host computer and an anonymous FTP server. The Windows
command line utility is used to connect to an anonymous FTP server and download a file. In Part 2 of this lab,
you will use Wireshark to capture and analyze UDP header fields for TFTP file transfers between the host
computer and S1.
Instructor Note: If Wireshark version 1.8.3 or later has not been loaded on the PC, it may be downloaded
from this URL http://www.wireshark.org/download.html. For Part 2 of the lab, if tftpd32 version 4.0 or later has
not been installed on the PC, it may be downloaded from this
URL http://tftpd32.jounin.net/tftpd32_download.html.
Note: The switch used is a Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other
switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the available
commands and the output produced might vary from what displays in the labs.
Note: Make sure that the switch has been erased and has no startup configurations. If you are unsure,
contact your instructor.
Note: Part 1 assumes the PC has Internet access and cannot be performed using Netlab. Part 2 is Netlab
compatible.
Instructor Note: Instructions for erasing the switch are provided in the Lab Manual.
Instructor Note: This lab may be performed in two sessions based on time and equipment availability. The
sequence of Part 1 and Part 2 is not critical.
Instructor Note: Using a packet sniffer, such as Wireshark may be considered a breach of the security policy
of the school. It is recommended that permission be obtained before running Wireshark for this lab. If using a
packet sniffer is an issue, the instructor may wish to assign the lab as homework or perform a walk-through
demonstration.
Part 1: Identify TCP Header Fields and Operation Using a Wireshark FTP
Session Capture
In Part 1, you use Wireshark to capture an FTP session and inspect TCP header fields.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
c. Locate and download the Readme file by entering the ls command to list the files.
d. Enter the command get Readme to download the file. When the download is complete, enter the
command quit to exit.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
TCP is routinely used during a session to control datagram delivery, verify datagram arrival, and manage
window size. For each data exchange between the FTP client and FTP server, a new TCP session is started.
At the conclusion of the data transfer, the TCP session is closed. When the FTP session is finished, TCP
performs an orderly shutdown and termination.
In Wireshark, detailed TCP information is available in the packet details pane (middle section). Highlight the
first TCP datagram from the host computer, and expand the TCP datagram. The expanded TCP datagram
appears similar to the packet detail pane shown below.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
The image above is a TCP datagram diagram. An explanation of each field is provided for reference:
The TCP source port number belongs to the TCP session host that opened a connection. The value is
normally a random value above 1,023.
The TCP destination port number is used to identify the upper layer protocol or application on the
remote site. The values in the range 01,023 represent the well-known ports and are associated with
popular services and applications (as described in RFC 1700), such as Telnet, FTP, and HTTP. The
combination of the source IP address, source port, destination IP address, and destination port uniquely
identifies the session to the sender and receiver.
Note: In the Wireshark capture below, the destination port is 21, which is FTP. FTP servers listen on port 21
for FTP client connections.
The Sequence number specifies the number of the last octet in a segment.
The Acknowledgment number specifies the next octet expected by the receiver.
The Code bits have a special meaning in session management and in the treatment of segments.
Among interesting values are:
- ACK Acknowledgement of a segment receipt.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
- SYN Synchronize, only set when a new TCP session is negotiated during the TCP three-way
handshake.
- FIN Finish, the request to close the TCP session.
The Window size is the value of the sliding window. It determines how many octets can be sent before
waiting for an acknowledgement.
The Urgent pointer is only used with an Urgent (URG) flag when the sender needs to send urgent data
to the receiver.
The Options has only one option currently, and it is defined as the maximum TCP segment size (optional
value).
Using the Wireshark capture of the first TCP session startup (SYN bit set to 1), fill in information about the
TCP header.
From the PC to CDC server (only the SYN bit is set to 1):
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
Header length 20
When the FTP session has finished, the FTP client sends a command to quit. The FTP server
acknowledges the FTP termination with a Response: 221 Goodbye. At this time, the FTP server TCP session
sends a TCP datagram to the FTP client, announcing the termination of the TCP session. The FTP client TCP
session acknowledges receipt of the termination datagram, then sends its own TCP session termination.
When the originator of the TCP termination (the FTP server) receives a duplicate termination, an ACK
datagram is sent to acknowledge the termination and the TCP session is closed. This sequence is visible in
the diagram and capture below.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
By applying an ftp filter, the entire sequence of the FTP traffic can be examined in Wireshark. Notice the
sequence of the events during this FTP session. The username anonymous was used to retrieve the
Readme file. After the file transfer completed, the user ended the FTP session.
Apply the TCP filter again in Wireshark to examine the termination of the TCP session. Four packets are
transmitted for the termination of the TCP session. Because TCP connection is full-duplex, each direction
must terminate independently. Examine the source and destination addresses.
In this example, the FTP server has no more data to send in the stream. It sends a segment with the FIN flag
set in frame 149. The PC sends an ACK to acknowledge the receipt of the FIN to terminate the session from
the server to the client in frame 150.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
In frame 151, the PC sends a FIN to the FTP server to terminate the TCP session. The FTP server responds
with an ACK to acknowledge the FIN from the PC in frame 152. Now the TCP session terminated between
the FTP server and PC.
Part 2: Identify UDP Header Fields and Operation Using a Wireshark TFTP
Session Capture
In Part 2, you use Wireshark to capture a TFTP session and inspect the UDP header fields.
Step 1: Set up this physical topology and prepare for TFTP capture.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
Notice that in Current Directory, it lists the user and the Server (PC-A) interface with the IP address of
192.168.1.3.
d. Test the ability to copy a file using TFTP from the switch to the PC. Troubleshoot as necessary.
S1# copy start tftp
Address or name of remote host []? 192.168.1.3
Destination filename [s1-confg]?
!!
1638 bytes copied in 0.026 secs (63000 bytes/sec)
If you see that the file has been copied then you are ready to go on to the next step. If the file has not
been copied, troubleshoot as needed. If you get the %Error opening tftp (Permission denied)
error, determine whether your firewall is blocking TFTP and whether you are copying the file to a location
where your username has adequate permission, such as the desktop.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
Instructor Note: This is a change from previous versions of this lab because the technology has
changed. Search for checksum offloading in Wireshark.
b. Start a Wireshark capture.
c. Run the copy start tftp command on the switch.
d. Stop the Wireshark capture.
e. Set the filter to tftp. Your output should look similar to the output shown above. This TFTP transfer is
used to analyze transport layer UDP operations.
Instructor Note: If students point out UDP acknowledgements, explain that the UDP header does not
contain an acknowledgement field. It is the responsibility of the upper-layer protocol, in this case TFTP, to
manage data transfer and receipt information. This will be shown during the UDP datagram examination.
Detailed UDP information is available in the Wireshark packet details pane. Highlight the first UDP
datagram from the host computer and move the mouse pointer to the packet details pane. It may be
necessary to adjust the packet details pane and expand the UDP record by clicking the protocol expand
box. The expanded UDP datagram should look similar to the diagram below.
The figure below is a UDP datagram diagram. Header information is sparse, compared to the TCP
datagram. Similar to TCP, each UDP datagram is identified by the UDP source port and UDP destination
port.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
Using the Wireshark capture of the first UDP datagram, fill in information about the UDP header. The
checksum value is a hexadecimal (base 16) value, denoted by the preceding 0x code:
Source IP address 192.168.1.1
Destination IP address 192.168.1.3
Source port number 62513*
Destination port number 69
UDP message length 25 bytes*
UDP checksum 0x482c [correct]*
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 14
Lab - Using Wireshark to Examine TCP and UDP Captures
Notice that the return UDP datagram has a different UDP source port, but this source port is used for the
remainder of the TFTP transfer. Because there is no reliable connection, only the original source port
used to begin the TFTP session is used to maintain the TFTP transfer.
Also, notice that the UDP Checksum is incorrect. This is most likely caused by UDP checksum offload.
You can learn more about why this happens by searching for UDP checksum offload.
Reflection
This lab provided the opportunity to analyze TCP and UDP protocol operations from captured FTP and TFTP
sessions. How does TCP manage communication differently than UDP?
_______________________________________________________________________________________
_______________________________________________________________________________________
TCP manages communication much differently than UDP because reliability and guaranteed delivery requires
additional control over the communication channel. UDP has less overhead and control, and the upper-layer
protocol must provide some type of acknowledgement control. Both protocols, however, transport data
between clients and servers using Application Layer protocols and are appropriate for the upper-layer
protocol each supports.
Challenge
Because neither FTP or TFTP are secure protocols, all transferred data is sent in clear text. This includes any
user IDs, passwords, or clear-text file contents. Analyzing the upper-layer FTP session will quickly identify the
user ID, password, and configuration file passwords. Upper-layer TFTP data examination is more
complicated, but the data field can be examined, and the configurations user ID and password information
extracted.
Cleanup
Unless directed otherwise by your instructor:
1) Remove the files that were copied to your PC.
2) Erase the configurations on S1.
3) Remove the manual IP address from the PC and restore Internet connectivity.
Device Configs
Switch S1
S1#show run
Building configuration...
!
hostname S1
!
interface Vlan1
ip address 192.168.1.1 255.255.255.0
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 14
Class Activity - We Need to Talk, Again (Instructor Version
Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain how transport layer protocols and services support communications across data networks.
Background /Scenario
Note: It is important that the students have completed the Introductory MA for this chapter. This activity works
best in medium-sized groups of 6 to 8 students.
The instructor will whisper a complex message to the first student in a group. An example of the message
might be We are expecting a blizzard tomorrow. It should be arriving in the morning and school will be
delayed 2 two hours so bring your homework.
That student whispers the message to the next student in the group. Each group follows this process until all
members of each group have heard the whispered message. Here are the rules you are to follow:
Here are the rules you are to follow:
You can whisper the message in short parts to your neighbor AND you can repeat the message parts
after verifying your neighbor heard the correct message.
Small parts of the message may be checked and repeated again (clockwise OR counter-clockwise to
ensure accuracy of the message parts) by whispering. A student will be assigned to time the entire
activity.
When the message has reached the end of the group, the last student will say aloud what she or he
heard. Small parts of the message may be repeated (i.e., re-sent), and the process can be restarted to
ensure that ALL parts of the message are fully delivered and correct.
The Instructor will restate the original message to check for quality delivery.
Instructor Note: Please initiate discussion about what happened in the Activity. Focus on these three
questions:
1. Was the message complete when it reached the last student?
2. Was the message correct as delivered to the last person?
3. Did it take very long for the message to get to the last student?
If you were depending on this message to drive your personal/business calendar, studying schedule, etc.,
would the contents of this message need to be clear and correct when you received them?
Would the length of time taken to deliver the message be important to the sender and recipient?
Compare the Introductory MA of this chapter to the Review MA (this activity). What differences do you notice
about the delivery of the message?
Please remind students that TCP and UDP protocols ensure that:
Network communications with different levels of importance are sent and received according to their
levels of importance.
The type of data will affect whether TCP or UDP will be used as the method of delivery.
The time in which the message must be delivered will affect whether TCP or UDP will be used as the
method of delivery.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - We Need to Talk, Again
Reflection
1. Would the contents of this message need to be clear and correct when you received them, if you were
depending on this message to drive your personal/business calendar, studying schedule, etc.,?
____________________________________________________________________________
The importance of full messages being delivered fully from sender to recipient TCP guarantees full delivery.
2. Would the length of time taken to deliver the message be an important factor to the sender and recipient?
____________________________________________________________________________
The importance of timing to the details of the message and to the date/time needed to take action on the
message is important to all facets of data transmission windowing and sliding windows takes care of this in
TCP UDP does not.
3. Compare the Introductory MA of this chapter to this activity. What differences do you notice about the
delivery of the message?
____________________________________________________________________________________
Representative (discussion) answers may look like the following suggestions:
The message took a lot longer to get from the initiator to the last recipient.
More (if not all) of the message arrived and the content was probably better (if not completely accurate)
Identify elements of the model that map to IT-related content:
Establishing a method of transporting information over a network is important to obtain complete delivery
of network data (TCP is guaranteed UDP is not).
Ensuring quality of delivery of data over a network is affected by the type of transport used. TCP will
check for checksum errors and will acknowledge and synchronize each segment. In contrast, UDP has
no error correction.
Selecting TCP or UDP based on a time-factor for delivery of data over a communications system.
Windows are set and adjusted in TCP if congestion is found on the network; whereas, UDP keeps
transmitting.
While unreliable, UDP has its value: the message in first activity was delivered much faster than in the
second. If the message was simpler (such as a message consisting of a single digit, for example), the first
transport method (UDP) could prove itself much better than the second (TCP).
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Class Activity Application Investigation (Instructor Version
Optional Class Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain how the Application layer provides support to end-user applications.
Background / Scenario
It is the beginning of your work week. Your employer has decided to install IP telephones in your workplace,
which results in the network being inoperable until next week.
However, your work must continue. You have emails to send and quotes to write for your managers approval.
Due to possible security issues, you are not allowed to use personal or external computer systems,
equipment, or off-site equipment and systems.
Your instructor may ask you to complete the questions from both scenarios below. Answer the questions fully
for the scenario(s). Be prepared to discuss your answers in class.
Emails
o What method(s) can you use to send email communication?
o How can you send the same email to multiple recipients?
o How can you get a large attachment to multiple recipients?
o Are these methods cost effective to your corporation?
o Do these methods violate any security policies of your corporation?
Quote for Managers Approval
o You have a desktop application software package installed on your computer. Will it be relatively easy
to produce the quote your manager needs for the new contract due by the end of the week? What
limitations will be experienced while trying to complete the quote?
o How will you present the quote to your manager for approval? How do you think he or she will send
the quote to the client for their approval?
o Are these methods cost effective to your corporation? Justify your answer.
Instructor Note: This optional Modeling Activity is introductory in nature. Its purpose is to focus on how the
application layer is necessary in order for networking to operate effectively. To save classroom time (for
discussion), students may complete only one of the two scenarios.
Reflection
What steps did you identify as important to communicating without network applications available to you for a
week in your workplace? Which steps were not important? Justify your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity Application Investigation
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab - Researching Peer-to-Peer File Sharing (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Identify P2P Networks, File Sharing Protocols, and Applications
Part 2: Research P2P File Sharing Issues
Part 3: Research P2P Copyright Litigations
Background / Scenario
Peer-to-peer (P2P) computing is a powerful technology that has many uses. P2P networks can be used to
share and exchange files, and other electronic materials.
The use of P2P networks to upload, download, or share copyrighted material, such as movies, music, and
software, can violate the rights of copyright owners. In the P2P file-sharing context, infringement may occur
when one person purchases an authorized copy and then uploads it to a P2P network to share with others.
Both the individual who makes the file available and those making copies may be found to have infringed the
rights of the copyright owners and may be violating copyright law.
Another problem with P2P file sharing is that very little protection is in place to ensure that the files exchanged
in these networks are not malicious. P2P networks are an ideal medium for spreading malware, such as
computer viruses, worms, Trojan horses, spyware, adware, and other malicious programs.
In this lab, you will research available P2P file sharing software and identify issues that can arise from the use
of this technology.
Required Resources
Device with Internet access
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Lab - Researching Peer-to-Peer File Sharing
____________________________________________________________________________________
In P2P networks, clients provide resources, which may include bandwidth, storage space, and computing
power. This property is one of the primary advantages of using P2P networks because it makes the setup
and running costs small for the original content distributor. As nodes arrive and demand on the system
increases, the total capacity of the system increases and the likelihood of failure decreases. If one peer
on the network fails to function properly, the whole network is not compromised or damaged. In contrast,
with a typical clientserver architecture, clients share their demands with the system but not their
resources. In this case, as more clients join the system, fewer resources are available to serve each
client. If the central server fails, the entire network is taken down. The decentralized nature of P2P
networks removes the single point of failure that can be inherent in a client-server based system.
c. Identify at least two disadvantages of P2P networks.
____________________________________________________________________________________
____________________________________________________________________________________
A P2P network is decentralized, which makes it difficult to administer. Security is difficult to implement
and maintain, which allows for the possibility of copyrighted material and malware to be transmitted over
a P2P network.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Lab - Researching Peer-to-Peer File Sharing
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Lab - Researching Peer-to-Peer File Sharing
Torrent poisoning is the act of using the BitTorrent protocol to intentionally share corrupt data or data with
misleading file names. The practice of uploading fake torrents is sometimes carried out by anti-piracy
organizations as an attempt to prevent the P2P sharing of copyrighted content and to gather the IP
addresses of downloaders.
c. How could identity theft occur through the use of P2P file sharing?
____________________________________________________________________________________
____________________________________________________________________________________
If the P2P client software is incorrectly configured, it may provide access to the personal information and
files stored on your computer.
Reflection
How can you be sure that the files you are downloading from P2P networks are not copyrighted and are safe
from malware?
_______________________________________________________________________________________
There is no absolute assurance that P2P files are free of malware and not copyrighted. Use P2P file sharing
applications at your own risk.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Lab - Observing DNS Resolution (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Part 1: Observe the DNS Conversion of a URL to an IP Address
Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site
Part 3: Observe DNS Lookup Using the nslookup Command on Mail Servers
Background / Scenario
The Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such
as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is used.
Common protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol over Secure Socket
Layer (HTTPS), and File Transfer Protocol (FTP).
DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain
name (www.cisco.com) to an IP address to allow the source host to reach the destination host. In this lab, you
will observe DNS in action and use the nslookup (name server lookup) command to obtain additional DNS
information. Work with a partner to complete this lab.
Required Resources
1 PC (Windows 7 or 8 with Internet and command prompt access)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6
Lab - Observing DNS Resolution
c. Type the IP address from step b into a web browser, instead of the URL. Click Continue to this website
(not recommended). to proceed.
Most humans find it easier to remember words, rather than numbers. If you tell someone to go to
www.icann.org, they can probably remember that. If you told them to go to 192.0.32.7, they would have
a difficult time remembering an IP address. Computers process in numbers. DNS is the process of
translating words into numbers. There is a second translation that takes place. Humans think in Base 10
numbers. Computers process in Base 2 numbers. The Base 10 IP address 192.0.32.7 in Base 2 numbers
is 11000000.00000000.00100000.00000111. What happens if you cut and paste these Base 2 numbers
into a browser?
____________________________________________________________________________________
____________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6
Lab - Observing DNS Resolution
____________________________________________________________________________________
The web site does not display. The software code used in web browsers recognizes Base 10 numbers. It
does not recognize Base 2 numbers.
e. Now type ping www.cisco.com.
Note: If the domain name is resolved to an IPv6 address, use the command ping -4 www.cisco.com to
translate into an IPv4 address if desired.
f. When you ping www.cisco.com, do you get the same IP address as the example? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Answer will vary depending upon where you are geographically. Cisco hosts its web content on a series
of mirror servers. This means that Cisco uploads the exact same content to geographically diverse
(spread out all over the world) servers. When someone tries to reach www.cisco.com, the traffic is
directed to the closest mirror server.
g. Type the IP address that you obtained when you pinged www.cisco.com into a browser. Does the web
site display? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The cisco.com web site does not display. There are at least two possible explanations for this: 1. Some
web servers are configured to accept IP addresses sent from a browser and some are not. 2. It may be a
firewall rule in the Cisco security system that prohibits an IP address from being sent via a browser.
Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site
a. At the command prompt, type the nslookup command.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6
Lab - Observing DNS Resolution
Site dependent
Notice how the command prompt changed to a greater than (>) symbol. This is the nslookup prompt.
From this prompt, you can enter commands related to DNS.
At the prompt, type ? to see a list of all the available commands that you can use in nslookup mode.
b. At the prompt, type www.cisco.com.
You can use the nslookup tool to translate domain names into IP addresses. You can also use it to
translate IP addresses into domain names.
Using the nslookup tool, record the IP addresses associated with www.google.com.
____________________________________________________________________________________
Answers may vary. At the time of writing, the IP addresses are 173.194.75.147, 173.194.75.105,
173.194.75.99, 173.194.75.103, 173.194.75.106, and 173.194.75.104.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6
Lab - Observing DNS Resolution
A fundamental principle of network design is redundancy (more than one mail server is configured). In
this way, if one of the mail servers is unreachable, then the computer making the query tries the second
mail server. Email administrators determine which mail server is contacted first by using MX preference
(see above image). The mail server with the lowest MX preference is contacted first. Based upon the
output above, which mail server will be contacted first when the email is sent to cisco.com?
____________________________________________________________________________________
rcdn-mx-01.cisco.com
c. At the nslookup prompt, type exit to return to the regular PC command prompt.
d. At the PC command prompt, type ipconfig /all.
e. Write the IP addresses of all the DNS servers that your school uses.
____________________________________________________________________________________
Site-dependent
Reflection
What is the fundamental purpose of DNS?
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6
Lab - Observing DNS Resolution
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
People process in words. Computers process in numbers. People have a difficult time remembering a long
string of numbers. Therefore, DNS exists to translate the numbers world of computers to the words world
of people.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6
Lab - Exploring FTP (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Part 1: Use FTP from a Command Prompt
Part 2: Use FTP in a Browser
Part 3: Download an FTP File Using WS_FTP LE (Optional)
Background / Scenario
The File Transfer Protocol (FTP) is part of the TCP/IP suite. FTP is used to transfer files from one network
device to another network device. Windows includes an FTP client application that you can execute from the
command prompt. There are also free graphical user interface (GUI) versions of FTP that you can download.
The GUI versions are easier to use than typing from a command prompt. FTP is frequently used for the
transfer of files that may be too large to send using email.
When using FTP, one computer is normally the server and the other computer is the client. When accessing
the server from the client, you need to provide a username and password. Some FTP servers have a user
named anonymous. You can access these types of sites by simply typing anonymous for the user, without
a password. Usually, the site administrator has files that can be copied but does not allow files to be posted
with the anonymous user. Furthermore, FTP is not a secure protocol because the data is not encrypted during
transmission.
In this lab, you will learn how to use anonymous FTP from the Windows command-line C:\> prompt. You will
access an anonymous FTP server using your browser. Finally, you will use the GUI-based FTP program,
WS_FTP LE.
Required Resources
1 PC (Windows 7 or 8 with access to the command prompt, Internet access, and WS_FTP LE installed
(optional))
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10
Lab - Exploring FTP
Notice that the C:\> prompt has been replaced with the ftp> prompt. Type ls to list the files and
directories. At the time that this lab was authored, there was a Readme file.
c. At the prompt, type get Readme. This downloads the file to your local computer from the anonymous FTP
server the Center for Disease Control has setup. The file will be copied into the directory shown in the
C:\> prompt (C:\Users\User1 in this case).
Instructor Note: The students require a folder where ftp.exe has read and write access for the download
and viewing of the Readme file from the ftp site. The folder C:\>Users\User1 is used as an example.
d. Type quit to leave FTP and return to the C:\> prompt. Type more Readme to see the contents of the
document.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 10
Lab - Exploring FTP
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 10
Lab - Exploring FTP
Instructor Note: Instructors will need to install WS_FTP LE on each student computer. At the time of
authoring this was available at: http://www.wsftple.com/download.aspx. If this URL has changed, use your
favorite search engine to look for download WS_FTP LE or download free FTP.
a. Start WS_FTP LE. If the Ipswitch WS_FTP LE window displays, click Next to continue and skip to step c.
Otherwise, click the Open a Remote Connection link.
c. In the Site Name field, type Center for Disease Control and click Next to continue.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 10
Lab - Exploring FTP
d. Click the Connection Type drop-down list, select FTP (the default connection type), and click Next.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 10
Lab - Exploring FTP
f. In the User Name field, type anonymous, and leave the password field blank. Click Next.
g. Click Finish.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 10
Lab - Exploring FTP
h. When the Login Information Missing dialog box displays, click OK. Do not type a password in the
Password field.
i. You are now anonymously connected to the Center for Disease Control FTP site.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 10
Lab - Exploring FTP
j. On the WS_FTP LE toolbar menu under My Computer, click New Folder to create a folder on your local
C:\ drive.
k. In the Make Directory dialog box name the folder as CDC and click OK.
Note: If the folder already exists, you can use the same folder or create another folder with a different
name. If using the same CDC folder, you can replace the existing Readme file with the downloaded
Readme file.
l. After the directory is created, in the My Computer tab page, double-click the directory to open it.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 10
Lab - Exploring FTP
m. Drag the Readme file from the right side of the application (the remote CDC FTP server) into the CDC
folder on to the local C:\ drive.
n. Double-click the Readme file in the C:\CDC folder on your local C:\ drive. If prompted for an application to
open the document, choose any word processing software. You should see a message that looks
something like this:
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 10
Lab - Exploring FTP
o. Which was easier, using FTP from the cmd prompt, or using WS_FTP LE? __________________
After it has been installed, a GUI FTP application such as WS_FTP LE is easier to use, especially if
working with a large number of big files.
p. Verify that the Center for Disease Control window is highlighted. Click Disconnect to disconnect from
the ftp.cdc.gov site when finished.
q. The remote site will be removed from the saved list of FTP sites. In the Ipswitch WS_FTP LE window,
click the Open a Remote Connection link. Select the Center for Disease Control site, and click Delete
to remove the FTP site. Click Yes to confirm the deletion. Click Close to exit the Site Manager.
r. Remove the C:\CDC folder.
Instructor Note: Please remove C:\CDC or other folders that the students created in this lab.
s. Close Ipswitch WS_FTP_LE.
Reflection
List the advantages for using FTP from the command prompt, the browser, and an FTP client, such as
WS_FTP LE?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Command line provides quick access, but is more difficult when accessing some features. A browser allows
for the quick view of text files. Client software provides the most functionality with expert features, such as
batch downloads.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 10
Class Activity - Make It Happen! (Instructor Version - Optional Class
Activity)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain the operation of the application layer in providing support to end-user applications.
Background /Scenario
Refer to the modeling activity from the beginning of this chapter as the basis for this activity.
Your IP telephones were installed in a half day vs. the full week originally anticipated. Your network has been
restored to full capacity and network applications are available for your use. You have the same emails to
answer and quotes to write for your managers approval.
Use the same scenario you completed in the introduction modeling activity to answer the following questions:
Emails
o What method(s) can you use to send email correspondence now that the network is working?
o What format will your emails be sent over the network?
o How can you now send the same message to multiple recipients?
o How can you send the large attachments to multiple recipients using network applications?
o Would using network applications prove to be a cost-effective communication method for your
corporation?
Quote for Managers Approval
o Because you have desktop application programs installed on your computer, will it be relatively easy
to produce the quote your manager needs for the new contract due by the end of the week? Explain
your answer.
o When you finish writing the quote, how will you present it to your manager for approval? How will he
or she send the quote to the client for their approval?
o Is using network applications a cost-effective way to complete business transactions? Justify your
answer.
o Save a hard copy or an electronic copy of your answers. Be prepared to discuss your answers in
class.
Instructor Note: This optional Modeling Activitys purpose is to review the content learned in Chapter 4. The
focus is on how the application layer uses network applications to operate effectively.
To save classroom time (for discussion), students may be assigned to complete only one scenario (Emails or
Quote for Managers Approval).
Stress that students must carefully read through the first paragraph of this modeling activity to know the
parameters of the assignment.
Reflection
Having network applications and services available to you may increase production, decrease costs, and
save time. Would this be true with the scenario you chose? Justify your answer.
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - Make It Happen!
_______________________________________________________________________________________
_______________________________________________________________________________________
Representative (discussion) answers may look like the following suggestions:
Emails:
What method(s) can you use to send email correspondence now that the network is working? Most likely,
POP or IMAP email delivery in conjunction with a network email software program will be used.
What format will your emails be sent over the network? POP or IMAP
How can you now send the same message to multiple recipients? The SAME copy of the email can be
sent to multiple recipients in a matter of seconds.
How can you send the large attachments to multiple recipients using the network applications? Write the
email, address it to the recipients and send the large attachments with the email (no printing required!).
Would using network applications prove to be cost-effective communications methods for your
corporation? This method would save time, resources, and provide a quality-driven product (everyone
gets the same information)
Quote for Managers Approval:
You have a word processing, spreadsheet and database program installed locally on your computer.
Will it be relatively easy to produce the quote your manager needs for the new contract due by the
end of the week? The local workstation software will assist in creating the quote for the manager at
no different cost in this scenario.
When you finish writing the quote, how will you present it to your manager for approval? Usually, it
will be sent as an email with attachment(s) to the manager.
How will he/she send the quote to the client for their consideration for approval? Most likely, it will be
emailed to the client (sometimes, though, an additional hard/paper copy or media copy is sent of the
quote to the client for their approval or sign-off)
Is using network applications a cost-effective way to complete business transactions? Using network
applications is more time-efficient and does definitely save resources.
Identify elements of the model that map to IT-related content:
Costs involved in daily business production decrease when using network applications
Time-efficiency is increased if working with network applications
Quality communication is enhanced by using network applications
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Class Activity - Did You Notice? (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Explain how a small network of directly connected segments is created, configured and verified.
Topology
Background /Scenario
Take a look at the two networks in the topology diagram. Answer the following questions and record your
answers in the Reflection section to share with the class.
o Visually compare and contrast Network A and Network B. How are the two networks the same?
o Make note of the devices used in each network design. Because the devices are labeled, you already
know what types of end and intermediary devices they are. How are the two networks different? Is the
number of devices present in one network the only differentiating factor? Justify your answer.
o Which network would you select if you owned a small to medium-sized business? Justify your
selected network based on cost, speed, ports, expandability, and manageability.
Instructor Note: This Modeling Activity is not intended to be a graded assignment. Rather students should
note similarities and differences regarding the network equipment shown and the types of networks created.
Addressing of the two networks should also be a factor in their comparisons of both networks. Facilitation of
the discussion should include student-to-student discussions of each others work.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Class Activity - Did You Notice?
Required Resources
Recording capabilities (paper, tablet, etc.) for reflective comments to be shared with the class.
Reflection
Reflect upon your comparisons of the two network scenarios. What are some things you noted as points of
interest?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Multiple students may select Network B as their choice of the best network for a small to medium-sized
business. But this may not necessarily be the best choice.
Network A is less costly in equipment. It also provides a more streamlined design, which should assist with
network speed issues. Since there is no switch present in this particular network, expandability would be an
issue and limited to the ports already present on the ISRs. Manageability would be easy, as there are fewer
devices to keep documented and up to date.
Network B is more costly than Network A in equipment alone. It provides for redundancy which is important to
the cost of performing business functions. It allows for wireless transmission, not just Ethernet as in Network
A. Incorporating wireless technology increases the possibility of security breaches and can increase
manageability considerations. Speed could be enhanced if the devices used load balancing and static routes
to assist with load balancing.
Therefore, all categories considered, either network would be acceptable to use for a small to medium-sized
business. Network A and B offer different positives and negatives, and it would be up to the small to medium-
sized business to prioritize cost, speed, ports, expandability and manageability. They would eventually go on
from their prioritization list with a look to the future and select the best design for the business. This is similar
to separating all sessions into multiple conference rooms according to their topics.
Identify elements of the model that map to real-world content:
Cost, speed, ports, expandability and manageability are all factors to consider when designing a
small to medium-sized network.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Lab Researching Network Security Threats (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Part 1: Explore the SANS Website
Part 2: Identify Recent Network Security Threats
Part 3: Detail a Specific Network Security Threat
Background / Scenario
To defend a network against attacks, an administrator must identify external threats that pose a danger to the
network. Security websites can be used to identify emerging threats and provide mitigation options for
defending a network.
One of the most popular and trusted sites for defending against computer and network security threats is
SysAdmin, Audit, Network, Security (SANS). The SANS site provides multiple resources, including a list of the
top 20 Critical Security Controls for Effective Cyber Defense and the weekly @Risk: The Consensus Security
Alert newsletter. This newsletter details new network attacks and vulnerabilities.
In this lab, you will navigate to and explore the SANS site, use the SANS site to identify recent network
security threats, research other websites that identify threats, and research and present the details about a
specific network attack.
Required Resources
Device with Internet access
Presentation computer with PowerPoint or other presentation software installed
20157/21/2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Lab Researching Network Security Threats
Select one of the 20 Critical Controls and list three of the implementation suggestions for this control.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary. Critical Control 5: Malware Defenses. Employ automated tools to continuously monitor
workstations, servers, and mobile devices. Employ anti-malware software and signature auto-update features.
Configure network computers to not auto-run content from removable media.
20157/21/2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Lab Researching Network Security Threats
Step 1: Complete the following form for the selected network attack.
20157/21/2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Lab Researching Network Security Threats
all.
Mitigation options:
To prevent the exploitation of the IIS vulnerability, organizations needed to apply the IIS patch
from Microsoft.
Reflection
1. What steps can you take to protect your own computer?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary but could include keeping the operating system and applications up to date with patches
and service packs, using a personal firewall, configuring passwords to access the system and bios,
configuring screensavers to timeout and requiring a password, protecting important files by making them
read-only, encrypting confidential files and backup files for safe keeping.
2. What are some important steps that organizations can take to protect their resources?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary but could include the use of firewalls, intrusion detection and prevention, hardening of
network devices, endpoint protection, network vulnerability tools, user education, and security policy
development.
20157/21/2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Lab - Accessing Network Devices with SSH (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Addressing Table
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure the Router for SSH Access
Part 3: Configure the Switch for SSH Access
Part 4: SSH from the CLI on the Switch
Background / Scenario
In the past, Telnet was the most common network protocol used to remotely configure network devices.
Telnet does not encrypt the information between the client and server. This allows a network sniffer to
intercept passwords and configuration information.
Secure Shell (SSH) is a network protocol that establishes a secure terminal emulation connection to a router
or other networking device. SSH encrypts all information that passes over the network link and provides
authentication of the remote computer. SSH is rapidly replacing Telnet as the remote login tool of choice for
network professionals. SSH is most often used to log in to a remote device and execute commands; however,
it can also transfer files using the associated Secure FTP (SFTP) or Secure Copy (SCP) protocols.
The network devices that are communicating must be configured to support SSH in order for SSH to function.
In this lab, you will enable the SSH server on a router and then connect to that router using a PC with an SSH
client installed. On a local network, the connection is normally made using Ethernet and IP.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and the output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 11
Lab - Accessing Network Devices with SSH
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term, and Wireshark installed)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 11
Lab - Accessing Network Devices with SSH
R1(config)#
*Jan 28 21:09:29.867: %SSH-5-ENABLED: SSH 1.99 has been enabled
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 11
Lab - Accessing Network Devices with SSH
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 11
Lab - Accessing Network Devices with SSH
Step 1: View the parameters available for the Cisco IOS SSH client.
Use the question mark (?) to display the parameter options available with the ssh command.
S1# ssh ?
-c Select encryption algorithm
-l Log in using this user name
-m Select HMAC algorithm
-o Specify options
-p Connect to this port
-v Specify SSH Protocol Version
-vrf Specify vrf name
WORD IP address or hostname of a remote system
R1#
b. You can return to S1 without closing the SSH session to R1 by pressing Ctrl+Shift+6. Release the
Ctrl+Shift+6 keys and press x. The switch privileged EXEC prompt displays.
R1#
S1#
c. To return to the SSH session on R1, press Enter on a blank CLI line. You may need to press Enter a
second time to see the router CLI prompt.
S1#
[Resuming connection 1 to 192.168.1.1 ... ]
R1#
d. To end the SSH session on R1, type exit at the router prompt.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 11
Lab - Accessing Network Devices with SSH
R1# exit
Reflection
How would you provide multiple users, each with their own username, access to a network device?
_______________________________________________________________________________________
Answers may vary. You would add each users username and password to the local database using the
username command. It is also possible to use a RADIUS or TACACS server, but this has not been covered
yet.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 11
Lab - Accessing Network Devices with SSH
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Router R1
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 10
!
no ip domain lookup
ip domain name ccna-lab.com
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
username admin privilege 15 secret 4 QHjxdsVkjtoP7VxKIcPsLdTiMIvyLkyjT1HbmYxZigc
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 11
Lab - Accessing Network Devices with SSH
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
control-plane
!
!
banner motd ^C
****************************************
Unauthorized Access is Prohibited!
****************************************
^C
!
line con 0
password 7 00071A150754
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0
password 7 110A1016141D
login local
transport input telnet ssh
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 11
Lab - Accessing Network Devices with SSH
line vty 1 4
login local
transport input telnet ssh
!
scheduler allocate 20000 1000
!
end
Switch S1
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname S1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
username admin privilege 15 secret 4 QHjxdsVkjtoP7VxKIcPsLdTiMIvyLkyjT1HbmYxZigc
no aaa new-model
system mtu routing 1500
!
!
no ip domain-lookup
ip domain-name ccna-lab.com
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 11
Lab - Accessing Network Devices with SSH
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.11 255.255.255.0
!
ip http server
ip http secure-server
!
!
banner motd ^C
****************************************
Unauthorized Access is Prohibited!
****************************************
^C
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 11
Lab - Accessing Network Devices with SSH
line con 0
password 7 060506324F41
login
line vty 0 4
password 7 060506324F41
login local
transport input telnet ssh
line vty 5 15
password 7 00071A150754
login local
transport input telnet ssh
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 11
Lab - Examining Telnet and SSH in Wireshark (Instructor Version
Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Addressing Table
Objectives
Part 1: Configure the Devices for SSH Access
Part 2: Examine a Telnet Session with Wireshark
Part 3: Examine a SSH Session with Wireshark
Background / Scenario
In this lab, you will configure a router to accept SSH connectivity, and use Wireshark to capture and view
Telnet and SSH sessions. This will demonstrate the importance of encryption with SSH.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term, and Wireshark installed)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 11
Lab - Examining Telnet and SSH in Wireshark
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 11
Lab - Examining Telnet and SSH in Wireshark
What is the default TCP port for Telnet sessions? _________________ Port 23
b. At the Username: prompt, enter admin and at the Password: prompt, enter adminpass. These prompts
are generated because you configured the VTY lines to use the local database with the login local
command.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 11
Lab - Examining Telnet and SSH in Wireshark
Step 5: Use the Follow TCP Stream feature in Wireshark to view the Telnet session.
a. Right-click one of the Telnet lines in the Packet list section of Wireshark, and from the drop-down list,
select Follow TCP Stream.
b. The Follow TCP Stream window displays the data for your Telnet session with the router. The entire
session is displayed in clear text, including your password. Notice that the username and show run
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 11
Lab - Examining Telnet and SSH in Wireshark
command that you entered are displayed with duplicate characters. This is caused by the echo setting in
Telnet to allow you to view the characters that you type on the screen.
c. After you have finished reviewing your Telnet session in the Follow TCP Stream window, click Close.
Step 1: Open Wireshark and start capturing data on the LAN interface.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 11
Lab - Examining Telnet and SSH in Wireshark
What is the default TCP port used for SSH sessions? __________________ Port 22
b. The first time you establish a SSH session to a device, a SECURITY WARNING is generated to let you
know that you have not connected to this device before. This message is part of the authentication
process. Read the security warning and click Continue.
c. In the SSH Authentication window, enter admin for the username and adminpass for the passphrase.
Click OK to sign into the router.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 11
Lab - Examining Telnet and SSH in Wireshark
d. You have established an SSH session on the router. The Tera Term software looks very similar to a
command window. At the command prompt, issue the show run command.
Step 5: Use the Follow TCP Stream feature in Wireshark to view the SSH session.
a. Right-click one of the SSHv2 lines in the Packet list section of Wireshark, and in the drop-down list,
select the Follow TCP Stream option.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 11
Lab - Examining Telnet and SSH in Wireshark
b. Examine the Follow TCP Stream window of your SSH session. The data has been encrypted and is
unreadable. Compare the data in your SSH session to the data of your Telnet session.
Reflection
How would you provide multiple users, each with their own username, access to a network device?
_______________________________________________________________________________________
Answers may vary. You would add each users username and password to the local database using the
username command. It is also possible to use a RADIUS or TACACS server, but this has not been covered
yet.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 11
Lab - Examining Telnet and SSH in Wireshark
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Router R1
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2
!
no aaa new-model
memory-size iomem 10
!
no ip domain lookup
ip domain name ccna-lab.com
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
username admin privilege 15 secret 4 QHjxdsVkjtoP7VxKIcPsLdTiMIvyLkyjT1HbmYxZigc
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 11
Lab - Examining Telnet and SSH in Wireshark
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
description Connection to S1-F0/5.
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
control-plane
!
!
banner motd ^C
****************************************
Unauthorized Access is Prohibited!
****************************************
^C
!
line con 0
password 7 00071A150754
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0
password 7 110A1016141D
login local
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 11
Lab - Examining Telnet and SSH in Wireshark
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 11
Lab Securing Network Devices (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure Basic Security Measures on the Router
Part 3: Configure Basic Security Measures on the Switch
Background / Scenario
It is recommended that all network devices be configured with at least a minimum set of best practice security
commands. This includes end user devices, servers, and network devices, such as routers and switches.
In this lab, you will configure the network devices in the topology to accept SSH sessions for remote
management. You will also use the IOS CLI to configure common, basic best practice security measures. You
will then test the security measures to verify that they are properly implemented and working correctly.
Note: The routers used with CCNA hands-on labs are Cisco 1941 ISRs with Cisco IOS Release 15.2(4)M3
(universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9
image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco
IOS version, the commands available and output produced might vary from what is shown in the labs. Refer
to the Router Interface Summary table at the end of the lab for the correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
1 Router (Cisco 1941 with Cisco IOS software, release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 13
Lab Securing Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 13
Lab Securing Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 13
Lab Securing Network Devices
Any unused ports that are not in an administratively down state should be disabled using the shutdown
command in interface configuration mode.
R1# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Embedded-Service-Engine0/0 unassigned YES NVRAM administratively down down
GigabitEthernet0/0 unassigned YES NVRAM administratively down down
GigabitEthernet0/1 192.168.1.1 YES manual up up
Serial0/0/0 unassigned YES NVRAM administratively down down
Serial0/0/1 unassigned YES NVRAM administratively down down
R1#
Step 6: Verify that your security measures have been implemented correctly.
a. Use Tera Term to telnet to R1.
Does R1 accept the Telnet connection? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
No, the connection is refused. Telnet was disabled with the transport input ssh command.
b. Use Tera Term to SSH to R1.
Does R1 accept the SSH connection? __________ Yes
c. Intentionally mistype the user and password information to see if login access is blocked after two
attempts.
What happened after you failed to login the second time?
____________________________________________________________________________________
____________________________________________________________________________________
The connection to R1 was disconnected. If you attempt to reconnect within 30 seconds, the connection
will be refused.
d. From your console session on the router, issue the show login command to view the login status. In the
example below, the show login command was issued within the 30 second login blocking period and
shows that the router is in Quiet-Mode. The router will not accept any login attempts for 14 more seconds.
R1# show login
A default login delay of 1 second is applied.
No Quiet-Mode access list has been configured.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 13
Lab Securing Network Devices
After you successfully logged in, what was displayed? ________________________ The R1 login
banner.
f. Enter privileged EXEC mode and use Enablep@55 for the password.
If you mistype this password, are you disconnected from your SSH session after two failed attempts
within 120 seconds? Explain.
____________________________________________________________________________________
____________________________________________________________________________________
No. The login block-for 30 attempts 2 within 120 command only monitors session login attempts.
g. Issue the show running-config command at the privileged EXEC prompt to view the security settings
you have applied.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 13
Lab Securing Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 13
Lab Securing Network Devices
S1#
c. Verify that all inactive interfaces have been administratively shut down.
S1# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Vlan1 192.168.1.11 YES manual up up
FastEthernet0/1 unassigned YES unset administratively down down
FastEthernet0/2 unassigned YES unset administratively down down
FastEthernet0/3 unassigned YES unset administratively down down
FastEthernet0/4 unassigned YES unset administratively down down
FastEthernet0/5 unassigned YES unset up up
FastEthernet0/6 unassigned YES unset up up
FastEthernet0/7 unassigned YES unset administratively down down
FastEthernet0/8 unassigned YES unset administratively down down
FastEthernet0/9 unassigned YES unset administratively down down
FastEthernet0/10 unassigned YES unset administratively down down
FastEthernet0/11 unassigned YES unset administratively down down
FastEthernet0/12 unassigned YES unset administratively down down
FastEthernet0/13 unassigned YES unset administratively down down
FastEthernet0/14 unassigned YES unset administratively down down
FastEthernet0/15 unassigned YES unset administratively down down
FastEthernet0/16 unassigned YES unset administratively down down
FastEthernet0/17 unassigned YES unset administratively down down
FastEthernet0/18 unassigned YES unset administratively down down
FastEthernet0/19 unassigned YES unset administratively down down
FastEthernet0/20 unassigned YES unset administratively down down
FastEthernet0/21 unassigned YES unset administratively down down
FastEthernet0/22 unassigned YES unset administratively down down
FastEthernet0/23 unassigned YES unset administratively down down
FastEthernet0/24 unassigned YES unset administratively down down
GigabitEthernet0/1 unassigned YES unset administratively down down
GigabitEthernet0/2 unassigned YES unset administratively down down
S1#
Step 6: Verify that your security measures have been implemented correctly.
a. Verify that Telnet has been disabled on the switch.
b. SSH to the switch and intentionally mistype the user and password information to see if login access is
blocked.
c. After the 30 seconds has expired, SSH to S1 again and log in using the SSHadmin username and
Admin1p@55 for the password.
Did the banner appear after you successfully logged in? __________ Yes
d. Enter privileged EXEC mode using Enablep@55 as the password.
e. Issue the show running-config command at the privileged EXEC prompt to view the security settings
you have applied.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 13
Lab Securing Network Devices
Reflection
1. The password cisco command was entered for the console and VTY lines in your basic configuration in Part
1. When is this password used after the best practice security measures have been applied?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
This password will not be used any longer. Even though the password command still appears in the line
sections of the running-config, this command was disabled as soon as the login local command was entered
for those lines.
2. Are preconfigured passwords shorter than 10 characters affected by the security passwords min-length 10
command?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
No. The security passwords min-length command only affects passwords that are entered after this command
is issued. Any pre-existing passwords remain in effect. If they are changed, they will need to be at least 10
characters long.
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/0/0) Serial 0/1/1 (S0/0/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Router R1
service timestamps debug datetime msec
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 13
Lab Securing Network Devices
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 13
Lab Securing Network Devices
^C
!
line con 0
exec-timeout 5 0
password 7 094F471A1A0A57
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
exec-timeout 5 0
password 7 104D000A0618
login local
transport input ssh
!
scheduler allocate 20000 1000
!
end
Switch S1
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname S1
!
boot-start-marker
boot-end-marker
!
enable secret 4 jowh6xYPeJucL2dB/ulkSjK2YGee/Usr./fiqFhbxTQ
!
username SSHadmin secret 4 242gliTpEQCwPzaoNHLFrFqBSTmqPiFhU9fJFdhRKbU
!
system mtu routing 1500
!
no ip domain-lookup
ip domain-name CCNA-lab.com
login block-for 30 attempts 2 within 120
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 13
Lab Securing Network Devices
interface FastEthernet0/1
shutdown
!
interface FastEthernet0/2
shutdown
!
interface FastEthernet0/3
shutdown
!
interface FastEthernet0/4
shutdown
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
shutdown
!
interface FastEthernet0/8
shutdown
!
interface FastEthernet0/9
shutdown
!
interface FastEthernet0/10
shutdown
!
interface FastEthernet0/11
shutdown
!
interface FastEthernet0/12
shutdown
!
interface FastEthernet0/13
shutdown
!
interface FastEthernet0/14
shutdown
!
interface FastEthernet0/15
shutdown
!
interface FastEthernet0/16
shutdown
!
interface FastEthernet0/17
shutdown
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 13
Lab Securing Network Devices
interface FastEthernet0/18
shutdown
!
interface FastEthernet0/19
shutdown
!
interface FastEthernet0/20
shutdown
!
interface FastEthernet0/21
shutdown
!
interface FastEthernet0/22
shutdown
!
interface FastEthernet0/23
shutdown
!
interface FastEthernet0/24
shutdown
!
interface GigabitEthernet0/1
shutdown
!
interface GigabitEthernet0/2
shutdown
!
interface Vlan1
ip address 192.168.1.11 255.255.255.0
!
ip http server
ip http secure-server
!
banner motd ^C
^C
!
line con 0
password 7 110A1016141D
login
line vty 0 4
password 7 110A1016141D
login local
transport input ssh
line vty 5 15
login local
!
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 13
Lab Securing Network Devices
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 13
Lab - Testing Network Latency with Ping and Traceroute
(Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Use Ping to Document Network Latency
Part 2: Use Traceroute to Document Network Latency
Background / Scenario
To obtain realistic network latency statistics, this activity must be performed on a live network. Be sure to
check with your instructor for any local security restrictions against using the ping command on the network.
Instructor Note: Some institutions disable ICMP echo replies throughout the network. Before students begin
this activity, make sure there are no local restrictions related to ICMP datagrams. This activity assumes that
ICMP datagrams are not restricted by any local security policy.
The purpose of this lab is to measure and evaluate network latency over time, and during different periods of
the day to capture a representative sample of typical network activity. This will be accomplished by analyzing
the return delay from a distant computer with the ping command. Return delay times, measured in
milliseconds, will be summarized by computing the average latency (mean) and the range (maximum and
minimum) of the delay times.
Required Resources
1 PC (Windows 7 or 8 with Internet access)
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6
Lab - Testing Network Latency with Ping and Traceroute
Note: If the websites are resolved to IPv6 addresses, the option -4 can be used to resolve to IPv4 addresses
if desired. The command becomes ping -4 www.arin.net.
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] [-R] [-S srcaddr] [-4] [-6] target_name
Options:
-t Ping the specified host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don't Fragment flag in packet (IPv4-only).
-i TTL Time To Live.
-v TOS Type Of Service (IPv4-only. This setting has been deprecated
<output omitted>
b. Using the ping command with the count option, you can send 25 echo requests to the destination as
illustrated below. Furthermore, it will create a text file with filename of arin.txt in the current directory. This
text file will contain the results of the echo requests.
C:\Users\User1> ping n 25 www.arin.net > arin.txt
Note: The terminal remains blank until the command has finished, because the output has been redirected to
a text file, arin.txt, in this example. The > symbol is used to redirect the screen output to the file and overwrite
the file if it already exists. If appending more results to the file is desired, replace > with >> in the command.
c. Repeat the ping command for the other websites.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6
Lab - Testing Network Latency with Ping and Traceroute
Directory of C:\Users\User1
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6
Lab - Testing Network Latency with Ping and Traceroute
____________________________________________________________________________________
____________________________________________________________________________________
In most instances, the response time is longer when compared to the physical distance to the destination.
Step 1: Use the tracert command and record the output to text files.
Copy the following commands to create the traceroute files:
C:\Users\User1> tracert www.arin.net > traceroute_arin.txt
C:\Users\User1> tracert www.lacnic.net > traceroute_lacnic.txt
C:\Users\User1> tracert www.afrinic.net > traceroute_afrinic.txt
C:\Users\User1> tracert www.apnic.net > traceroute_apnic.txt
Note: If the websites are resolved to IPv6 addresses, the option -4 can be used to resolve to IPv4 addresses
if desired. The command becomes tracert -4 www.arin.net > traceroute_arin.txt.
Trace complete.
In this example, it took less than 1 ms to receive a reply from the default gateway (192.168.1.1). In hop
count 6, the round trip to 68.1.1.7 took an average of 71 ms. For the round trip to the final destination at
www.arin.net took an average of 72 ms.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6
Lab - Testing Network Latency with Ping and Traceroute
Between lines 5 and 6, there is more network delay as indicated by the round trip time increase from an
average of 11 ms to 71 ms
b. Perform the same analysis with the rest of the tracert results.
What can you conclude regarding the relationship between the roundtrip time and geographical location?
____________________________________________________________________________________
____________________________________________________________________________________
In most instances, the response time is longer when compared to the physical distance to the destination.
Trace complete.
What is different about the tracert output when the d option was added?
____________________________________________________________________________________
____________________________________________________________________________________
tracert didnt reverse resolve the IP addresses. It simply presented the IP addresses associated with the
path hops.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6
Lab - Testing Network Latency with Ping and Traceroute
Note: Windows tracert will present a list of available options and their descriptions when issued without
any options.
Note: Cisco IOS implementation of traceroute also allows for fine tuning but it does not rely on command
line options. Cisco IOS extended traceroute presents a number of simple questions to allow the
administrator to provide values for the desired parameters.
Instructor Note: Redirecting tracert output to a text file is useful for data collection and analysis but will
keep the student from watching the commands operation. It may be interesting to encourage students to
issue tracert and tracert d without redirecting the output to a text file; tracert d is much faster than
tracert as it doesnt need to reverse resolve hop IP addresses.
Reflection
1. The tracert and ping results can provide important network latency information. What do you need to do if
you want an accurate baseline picture regarding network latency for your network?
_______________________________________________________________________________________
Answers will vary. You will need to perform careful delay analysis over successive days and during different
periods of the day.
2. How can you use the baseline information?
_______________________________________________________________________________________
You can compare baseline data against current data to determine if there has been a change in network
response times. This analysis may assist with troubleshooting network issues and scheduling of routine data
transfer during off-peak hours.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6
Lab Using the CLI to Gather Network Device
Information (Instructor Version Optional Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Topology
Addressing Table
Objectives
Part 1: Set Up Topology and Initialize Devices
Part 2: Configure Devices and Verify Connectivity
Part 3: Gather Network Device Information
Background / Scenario
Documenting a working network is one of the most important tasks a network professional can perform.
Having proper documentation of IP addresses, model numbers, IOS versions, ports used, and testing
security, can go a long way in helping to troubleshoot a network.
In this lab, you will build a small network, configure the devices, add some basic security, and then document
the configurations by issuing various commands on the router, switch and PC to gather your information.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 14
Lab Using the CLI to Gather Network Device Information
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 14
Lab Using the CLI to Gather Network Device Information
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 14
Lab Using the CLI to Gather Network Device Information
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 14
Lab Using the CLI to Gather Network Device Information
The show ip interface brief command can be used from either the user EXEC or privileged EXEC
prompt.
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/1 192.168.1.1 YES NVRAM up up
Loopback0 209.165.200.225 YES NVRAM up up
<some output omitted>
c. Issue the appropriate command to display the routing table. Write down the command and record your
results below.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The show ip route command can be used from either the user EXEC or privileged EXEC prompt.
192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.1.0/24 is directly connected, GigabitEthernet0/1
L 192.168.1.1/32 is directly connected, GigabitEthernet0/1
209.165.200.0/24 is variably subnetted, 2 subnets, 2 masks
C 209.165.200.224/27 is directly connected, Loopback0
L 209.165.200.225/32 is directly connected, Loopback0
d. What command would you use to display the Layer 2 to Layer 3 mapping of addresses on the router?
Write down the command and record your results below.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The show arp command can be used from either the user EXEC or privileged EXEC prompt.
Protocol Address Age (min) Hardware Addr Type Interface
Internet 192.168.1.1 - 30f7.0da3.1821 ARPA GigabitEthernet0/1
Internet 192.168.1.3 0 c80a.a9fa.de0d ARPA GigabitEthernet0/1
Internet 192.168.1.11 2 0cd9.96d2.34c0 ARPA GigabitEthernet0/1
e. What command would you use to see detailed information about all the interfaces on the router or about a
specific interface? Write down the command below.
____________________________________________________________________________________
The show interfaces command can be used from either the user EXEC or privileged EXEC prompt.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 14
Lab Using the CLI to Gather Network Device Information
f. Cisco has a very powerful protocol that operates at Layer 2 of the OSI model. This protocol can help you
map out how Cisco devices are connected physically, as well as determining model numbers and even
IOS versions and IP addressing. What command or commands would you use on router R1 to find out
information about switch S1 to help you complete the table below?
Local Remote
Device ID Interface Capability Model # Port ID IP Address IOS Version
The show cdp neighbors detail command can be used from either the user EXEC or privileged EXEC
prompt.
g. A very elementary test of your network devices is to see if you can telnet into them. Remember, Telnet is
not a secure protocol. It should not be enabled in most cases. Using a Telnet client, such as Tera Term or
PuTTY, try to telnet to R1 using the default gateway IP address. Record your results below.
___________________________________________________________________________________
Tera Term Output: Connection refused.
h. From PC-A, test to ensure that SSH is working properly. Using an SSH client, such as Tera Term or
PuTTY, SSH into R1 from PC-A. If you get a warning message regarding a different key, click Continue.
Log in with the appropriate username and password you created in Part 2. Were you successful?
___________________________________________________________________________________
Yes.
The various passwords configured on your router should be as strong and protected as possible.
Note: The passwords used for our lab (cisco and class) do not follow the best practices needed for
strong passwords. These passwords are used merely for the convenience of performing the labs. By
default, the console password and any vty passwords configured would display in clear text in your
configuration file.
i. Verify that all of your passwords in the configuration file are encrypted. Write down the command and
record your results below.
Command: ________________________________________________
The show running-config or show run command can be used from the privileged EXEC prompt.
Is the console password encrypted? __________________________ Yes
Is the SSH password encrypted? _____________________________ Yes
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 14
Lab Using the CLI to Gather Network Device Information
_____________________________________________________________
The show version command can be used from either the user EXEC or privileged EXEC prompt.
b. Issue the appropriate command to display a summary of status information about the switch interfaces.
Write down the command and record your results below.
Note: Only record active interfaces.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
The show ip interface brief command can be used from either the user EXEC or privileged EXEC
prompt.
Interface IP-Address OK? Method Status Protocol
Vlan1 192.168.1.11 YES NVRAM up up
FastEthernet0/5 unassigned YES unset up up
FastEthernet0/6 unassigned YES unset up up
<some output omitted>
c. Issue the appropriate command to display the switch MAC address table. Record the dynamic type MAC
addresses only in the space below.
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
The show mac address-table command can be used from either the user EXEC or privileged EXEC
prompt.
Mac Address Table
-------------------------------------------
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 14
Lab Using the CLI to Gather Network Device Information
Yes.
f. Complete the table below with information about router R1 using the appropriate command or commands
necessary on S1.
Local Remote
Device Id Interface Capability Model # Port ID IP Address IOS Version
The show cdp neighbors detail command can be used from either the user EXEC or privileged EXEC
prompt.
g. Verify that all of your passwords in the configuration file are encrypted. Write down the command and
record your results below.
Command: ________________________________________________
The show running-config or show run command can be used from the privileged EXEC prompt.
Is the console password encrypted? __________________________ Yes
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 14
Lab Using the CLI to Gather Network Device Information
b. Issue the appropriate command to test the TCP/IP protocol stack with the NIC. What command did you
use?
____________________________________________________________________________________
C:\> ping 127.0.0.1
Reflection
Why is it important to document your network devices?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 14
Lab Using the CLI to Gather Network Device Information
_______________________________________________________________________________________
Having the proper information including: IP addresses, physical port connections, IOS versions, copies of
configuration files, and the amount of memory storage, can greatly aid you when troubleshooting and
performing network baseline tests. Having good documentation can also help you recover from network
outages and replacing equipment when necessary.
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router R1
R1#sh run
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 14
Lab Using the CLI to Gather Network Device Information
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 14
Lab Using the CLI to Gather Network Device Information
!
!
control-plane
!
!
banner motd ^CWarning! Unauthorized access is prohibited.^C
!
line con 0
password 7 060506324F41
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login local
transport input ssh
!
scheduler allocate 20000 1000
!
End
Switch S1
S1#sh run
Building configuration...
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 14
Lab Using the CLI to Gather Network Device Information
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 14
Lab Using the CLI to Gather Network Device Information
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.11 255.255.255.0
!
ip default-gateway 192.168.1.1
ip http server
ip http secure-server
!
banner motd ^CWarning! Unauthorized access is prohibited.^C
!
line con 0
password 7 00071A150754
login
line vty 0 4
login local
transport input ssh
line vty 5 15
login local
transport input ssh
!
end
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 14
Class Activity - Design and Build a Small Business Network
(Capstone Project) (Instructor Version Optional Class Activity)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Optional
activities are designed to enhance understanding and/or to provide additional practice.
Objectives
Explain how a small network of directly connected segments is created, configured and verified.
Background /Scenario
Note: This activity is best completed in groups of 2-3 students.
Design and build a network from scratch.
o Your design must include a minimum of one router, one switch, and one PC.
o Fully configure the network and use IPv4 or IPv6 (subnetting must be included as a part of your
addressing scheme).
o Verify the network using at least five show commands.
o Secure the network using SSH, secure passwords and console passwords (minimum).
Create a rubric to use for informal peer grading. Present your Capstone Project to the class and be able to
answer questions from your peers and Instructor!
Instructor Note: This optional Modeling Activity is suggested to be a graded assignment after completing
Chapters 1-11. Students should be able to show how small networks are designed, configured, verified and
secured. Documentation is a large factor of this project and students must be able to explain their network
design and verification through the use of show commands.
Required Resources
Packet Tracer
Student/group-created rubric for assessment of the assignment
Reflection
1. What was the most difficult portion of this activity?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers will vary.
2. Why do you think network documentation is so important to this activity and in the real world?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Documentation is imperative to good network management and without it, network administrators have to
recreate topologies, physically check addressing, etc. This takes time, which could be used elsewhere.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 7
Class Activity - Design and Build a Small Business Network (Capstone Project)
(20 suggested)
Logical Addressing subnetting used?
Create a small network of directly connected segments, at a minimum 1 router, 1 switch and 1 PC, and
include a screenshot of the network in your final documentation.
Configure the network to include switches, routers, and end devices and use your own network addressing.
You must use subnetting of some type and you can use either IPv4 or IPv6 logical addressing. Create a table
showing your physical addressing scheme for the router, switch, and PC and include it in your final
documentation.
Verify the network by using show commands (at least 5) to provide a performance baseline. Be able to
discuss why you chose the show commands you selected and what the output means (use all Packet Tracer
activities for Chapters 1-11). Keep screenshots of your output and include in your final documentation.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 7
Class Activity - Design and Build a Small Business Network (Capstone Project)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 7
Class Activity - Design and Build a Small Business Network (Capstone Project)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7
Class Activity - Design and Build a Small Business Network (Capstone Project)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 7
Class Activity - Design and Build a Small Business Network (Capstone Project)
Secure the network using common configuration to include SSH, secure passwords, console security, etc.
and show the commands configured by enacting a show running-configuration screen as output. Include in
your final documentation.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7
Class Activity - Design and Build a Small Business Network (Capstone Project)
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7
Lab - Troubleshooting Connectivity Issues (Instructor Version
Recommend Lab)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Identify the Problem
Part 2: Implement Network Changes
Part 3: Verify Full Functionality
Part 4: Document Findings and Configuration Changes
Background / Scenario
In this lab, the company that you work for is experiencing problems with their Local Area Network (LAN). You
have been asked to troubleshoot and resolve the network issues. In Part 1, you will connect to devices on the
LAN and use troubleshooting tools to identify the network issues, establish a theory of probable cause, and
test that theory. In Part 2, you will establish a plan of action to resolve and implement a solution. In Part 3, you
will verify full functionality has been restored. Part 4 provides space for you to document your troubleshooting
findings along with the configuration changes that you made to the LAN devices.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions may be used.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 19
Lab - Troubleshooting Cables and Interfaces
Depending on the model and Cisco IOS version, the commands available and the output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Required Resources
2 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Ethernet and Serial cables as shown in the topology
Troubleshooting Configurations
The following settings must be configured on the devices shown in the topology. Paste the configurations onto
the specified devices prior to starting the lab.
PC:
IP Address: 192.168.1.10
Subnet Mask: 255.255.255.0
Default Gateway: (leave blank)
Instructor: You may choose to configure the PC settings; otherwise, student will know that the missing
default gateway setting is a problem.
S1:
no ip domain-lookup
hostname S1
ip domain-name ccna-lab.com
username admin01 privilege 15 secret 9
$9$lJgfiLCHj.Xp/q$hA2w.oyQPTMhBGPeR.FZo3NZRJ9T1FdqvgRCFyBYnNs
interface FastEthernet0/1
shutdown
interface FastEthernet0/2
shutdown
interface FastEthernet0/3
shutdown
interface FastEthernet0/4
shutdown
interface FastEthernet0/5
duplex full
interface Vlan1
ip address 192.168.1.2 255.255.255.0
line vty 0 4
login local
transport input ssh
line vty 5 15
login local
transport input ssh
crypto key generate rsa general-keys modulus 1024
end
R1:
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 19
Lab - Troubleshooting Cables and Interfaces
hostname R1
no ip domain-lookup
ip domain-name ccna-lab.com
username admin01 privilege 15 secret 9
$9$8a4jGjbPPpeeoE$WyPsIiOaYT4ATlJzrR6T9E6vIdESOGF.NYX53arPmtA
interface GigabitEthernet0/0
shutdown
interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex half
speed auto
no shutdown
interface Serial0/0/0
ip address 10.1.2.1 255.255.255.252
no shutdown
interface Serial0/0/1
no ip address
shutdown
line vty 0 4
login local
transport input ssh
crypto key generate rsa general-keys modulus 1024
end
ISP:
hostname ISP
no ip domain-lookup
interface Serial0/0/0
ip address 10.1.1.2 255.255.255.252
no shut
interface Lo0
ip address 209.165.200.226 255.255.255.255
ip route 0.0.0.0 0.0.0.0 10.1.1.1
end
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 19
Lab - Troubleshooting Cables and Interfaces
b. Use the ipconfig command to determine the network settings on the PC.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 19
Lab - Troubleshooting Cables and Interfaces
a. SSH to S1 using its IP Address of 192.168.1.2 and log into the switch using admin01 for the user name
and cisco12345 for the password.
b. Issue the terminal monitor command on S1 to allow log messages to be sent to the VTY line of your
SSH session. After a few seconds you notice the following error message being displayed in your SSH
window.
S1# terminal monitor
S1#
*Mar 1 02:08:11.338: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on
FastEthernet0/5 (not half duplex), with R1.ccna-lab.com GigabitEthernet0/1
(half duplex).
S1#
c. On S1, issue the show interface f0/5 command to view the duplex setting of the interface.
S1# show interface f0/5
FastEthernet0/5 is up, line protocol is up (connected)
Hardware is Fast Ethernet, address is 0cd9.96e8.8a05 (bia 0cd9.96e8.8a05)
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full-duplex, 100Mb/s, media type is 10/100BaseTX
input flow-control is off, output flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:35, output 00:00:01, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
849 packets input, 104642 bytes, 0 no buffer
Received 123 broadcasts (122 multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 19
Lab - Troubleshooting Cables and Interfaces
b. Issue the terminal monitor command on R1 to allow log messages to be sent to the VTY line of your
SSH session for R1. After a few seconds the duplex mismatch message appears on R1s SSH session.
R1# terminal monitor
R1#
*Nov 23 16:12:36.623: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on
GigabitEthernet0/1 (not full duplex), with S1.ccna-lab.com FastEthernet0/5 (full
duplex).
R1#
c. Issue the show interface G0/1 command on R1 to display the duplex setting.
R1# show interfaces g0/1
GigabitEthernet0/1 is up, line protocol is up
Hardware is CN Gigabit Ethernet, address is d48c.b5ce.a0c1 (bia d48c.b5ce.a0c1)
Internet address is 192.168.1.1/24
MTU 1500 bytes, BW 100000 Kbit/sec, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Half Duplex, 100Mbps, media type is RJ45
output flow-control is unsupported, input flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 19
Lab - Troubleshooting Cables and Interfaces
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 19
Lab - Troubleshooting Cables and Interfaces
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 19
Lab - Troubleshooting Cables and Interfaces
Step 2: Set the duplex setting for interface G0/1 on R1 to full duplex.
R1# conf t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#
*Nov 23 17:23:36.879: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on
GigabitEthernet0/1 (not full duplex), with S1.ccna-lab.com FastEthernet0/5
(full duplex).
R1(config)#
R1(config)# interface g0/1
R1(config-if)# duplex full
R1(config-if)# exit
*Nov 23 17:24:08.039: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to
down
R1(config)#
*Nov 23 17:24:10.363: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to
up
*Nov 23 17:24:10.459: %SYS-5-CONFIG_I: Configured from console by console
R1(config)#
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 19
Lab - Troubleshooting Cables and Interfaces
Step 4: Configure the Gateway of last resort on R1 with a 10.1.1.2 default route.
R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.2
R1(config)# end
Step 1: Verify that all interfaces and routes have been set correctly and that routing has been
restored on R1.
a. Issue the show ip route command to verify that the default gateway has been set correctly.
R1# show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 19
Lab - Troubleshooting Cables and Interfaces
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 19
Lab - Troubleshooting Cables and Interfaces
b. Issue the ping 209.165.200.226 command from the CMD window on the PC
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 19
Lab - Troubleshooting Cables and Interfaces
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Documentation will vary but should include the date when troubleshooting was conducted, devices that were
tested, commands used along with the output generated by those commands, issues found, and configuration
changes made to resolve those issues.
Reflection
This lab had you troubleshoot all devices before making any changes. Is there another way to apply the
troubleshooting methodology?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers may vary. Another way the troubleshooting methodology could be applied would be to complete all 6
steps on a device before moving on to another device. e.g. After you determined that the default gateway was
not set on the PC, you would add the default gateway setting and verify functionality. If network issues still
exist, you would then move on to the next device, S1 in this example. When the troubleshooting process had
been completed on S1 and issues still exist, you would then move on to R1. This process would continue until
full network functionality was achieved.
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 19
Lab - Troubleshooting Cables and Interfaces
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Router R1
R1# show run
Building configuration...
Current configuration : 1531 bytes
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
no aaa new-model
memory-size iomem 15
!
no ip domain lookup
ip domain name ccna-lab.com
ip cef
no ipv6 cef
!
multilink bundle-name authenticated
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 19
Lab - Troubleshooting Cables and Interfaces
!
cts logging verbose
!
username admin01 privilege 15 secret 9
$9$8a4jGjbPPpeeoE$WyPsIiOaYT4ATlJzrR6T9E6vIdESOGF.NYX53arPmtA
!
redundancy
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex full
speed auto
!
interface Serial0/0/0
ip address 10.1.1.1 255.255.255.252
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 10.1.1.2
!
control-plane
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 19
Lab - Troubleshooting Cables and Interfaces
login local
transport input ssh
!
scheduler allocate 20000 1000
!
end
Switch S1
S1# show run
Building configuration...
Current configuration : 1585 bytes
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname S1
!
boot-start-marker
boot-end-marker
!
username admin01 privilege 15 secret 9
$9$lJgfiLCHj.Xp/q$hA2w.oyQPTMhBGPeR.FZo3NZRJ9T1FdqvgRCFyBYnNs
no aaa new-model
system mtu routing 1500
!
no ip domain-lookup
ip domain-name ccna-lab.com
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
shutdown
!
interface FastEthernet0/2
shutdown
!
interface FastEthernet0/3
shutdown
!
interface FastEthernet0/4
shutdown
!
interface FastEthernet0/5
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 19
Lab - Troubleshooting Cables and Interfaces
duplex full
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.2 255.255.255.0
!
ip http server
ip http secure-server
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 19
Lab - Troubleshooting Cables and Interfaces
!
line con 0
line vty 0 4
login local
transport input ssh
line vty 5 15
login local
transport input ssh
!
end
Router ISP
ISP# show run
Building configuration...
Current configuration : 1390 bytes
!
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ISP
!
boot-start-marker
boot-end-marker
!
no aaa new-model
memory-size iomem 15
!
no ip domain lookup
ip cef
no ipv6 cef
!
multilink bundle-name authenticated
!
cts logging verbose
!
redundancy
!
interface Loopback0
ip address 209.165.200.226 255.255.255.255
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
shutdown
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 19
Lab - Troubleshooting Cables and Interfaces
duplex auto
speed auto
!
interface GigabitEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
ip address 10.1.1.2 255.255.255.252
!
interface Serial0/0/1
no ip address
shutdown
clock rate 125000
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 10.1.1.1
!
control-plane
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login
transport input none
!
scheduler allocate 20000 1000
!
end
2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 19
Lab Observing ARP with the Windows CLI, IOS CLI, and
Wireshark (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Objectives
Part 1: Build and Configure the Network
Part 2: Use the Windows ARP Command
Part 3: Use the IOS Show ARP Command
Part 4: Use Wireshark to Examine ARP Exchanges
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
Background / Scenario
The Address Resolution Protocol (ARP) is used by TCP/IP to map a Layer 3 IP address to a Layer 2 MAC
address. When a frame is placed on the network, it must have a destination MAC address. To dynamically
discover the MAC address for the destination device, an ARP request is broadcast on the LAN. The device
that contains the destination IP address responds, and the MAC address is recorded in the ARP cache. Every
device on the LAN keeps its own ARP cache, or small area in RAM that holds ARP results. An ARP cache
timer removes ARP entries that have not been used for a certain period of time.
ARP is an excellent example of performance tradeoff. With no cache, ARP must continually request address
translations each time a frame is placed on the network. This adds latency to the communication and could
congest the LAN. Conversely, unlimited hold times could cause errors with devices that leave the network or
change the Layer 3 address.
A network administrator should be aware of ARP, but may not interact with the protocol on a regular basis.
ARP is a protocol that enables network devices to communicate with the TCP/IP protocol. Without ARP, there
is no efficient method to build the datagram Layer 2 destination address. Also, ARP is a potential security risk.
ARP spoofing, or ARP poisoning, is a technique used by an attacker to inject the wrong MAC address
association in a network. An attacker forges the MAC address of a device, and frames are sent to the wrong
destination. Manually configuring static ARP associations is one way to prevent ARP spoofing. Finally, an
authorized MAC address list may be configured on Cisco devices to restrict network access to only approved
devices.
In this lab, you will use the ARP commands in both Windows and Cisco routers to display the ARP table. You
will also clear the ARP cache and add static ARP entries.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with
Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco
IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the
correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup configurations. If you
are unsure, contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Instructor Note: Some of the ARP commands in Windows Vista or later operating systems will require
administrator privileges.
Required Resources
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term and Wireshark
installed)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Note: The Fast Ethernet interfaces on Cisco 2960 switches are autosensing and an Ethernet straight-through
cable may be used between switches S1 and S2. If using another Cisco switch model, it may be necessary to
use an Ethernet crossover cable.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
Step 2: Configure the IP addresses for the devices according to the Addressing Table.
Step 3: Verify network connectivity by pinging all the devices from PC-B.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
d. In the Administrator command prompt window, type arp d *. This command deletes all the ARP cache
entries. Verify that all the ARP cache entries are deleted by typing arp a at the command prompt.
C:\windows\system32> arp d *
C:\windows\system32> arp a
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
Fill in the following table with information about your first captured ARP packet.
Field Value
Fill in the following table with information about your second captured ARP packet.
Field Value
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
c. Ping switch S2 (192.168.1.12). The ping should be successful after the first echo request.
Note: If all the pings were successful, S1 should be reloaded to observe network latency with ARP.
C:\Users\User1> ping 192.168.1.12
Request timed out.
Reply from 192.168.1.12: bytes=32 time=2ms TTL=255
Reply from 192.168.1.12: bytes=32 time=2ms TTL=255
Reply from 192.168.1.12: bytes=32 time=2ms TTL=255
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
Reflection
1. How and when are static ARP entries removed?
_______________________________________________________________________________________
They are deleted manually.
2. Why do you want to add static ARP entries in the cache?
_______________________________________________________________________________________
A static ARP entry can mitigate ARP spoofing or poisoning in the network.
3. If ARP requests can cause network latency, why is it a bad idea to have unlimited hold times for ARP entries?
_______________________________________________________________________________________
Unlimited hold times could cause errors with devices that leave the network or change the Layer 3 address.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(F0/0) (F0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(F0/0) (F0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
Device Configs
Router R1
R1#show run
Building configuration...
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
!
!
!
!
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
!
!
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
!
control-plane
!
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login
transport input all
!
scheduler allocate 20000 1000
!
end
Switch S1
S1#show run
Building configuration...
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.11 255.255.255.0
!
ip http server
ip http secure-server
!
!
!
line con 0
line vty 5 15
!
end
Switch S2
S2#show run
Building configuration...
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
no aaa new-model
system mtu routing 1500
!
!
!
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 18
Lab Observing ARP with the Windows CLI, IOS CLI and Wireshark
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.1.12 255.255.255.0
!
ip http server
ip http secure-server
!
!
line con 0
line vty 5 15
!
end
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 18
Lab Researching Subnet Calculators (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Objectives
Part 1: Review Available Subnet Calculators
Part 2: Perform Network Calculations Using a Subnet Calculator
Background / Scenario
While it is important to understand how to convert a decimal IP address to its binary format and apply the
bitwise ANDing operation to determine the network address, it is also a tedious and mistake-prone process.
To assist with these calculations, many network administrators make use of an IP subnet calculator utility
program. A number of these types of programs have been developed that can be downloaded or run directly
from the Internet.
In this lab, you will be introduced to a few of the free IP subnet calculators that are available. You will use a
web-based IP subnet calculator to perform the network operations in this lab.
Required Resources
Device with Internet access
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5
Lab Researching Subnet Calculators
b. On the IP Subnet Calculator screen, enter an IP address and subnet mask or an IP address and CIDR
prefix notation. Examples of how to enter each of these are shown in the Introduction area.
c. In the Application field, enter 192.168.50.50/27 and click Calc!. The next screen displays a table with
network information in both decimal and binary formats.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 5
Lab Researching Subnet Calculators
d. Using the information provided in the example above, answer the following questions.
What is the network address? ____________________________ 192.168.50.32
What is the subnet mask? _______________________________ 255.255.255.224
How many hosts will this network support? __________________ 30
What is the lowest host address? _________________________ 192.168.50.33
What is the highest host address? ________________________ 192.168.50.62
What is the broadcast address? __________________________ 192.168.50.63
Step 2: Fill in the following table for the 172.18.255.92 address with a subnet mask of
255.255.224.0:
What is the CIDR prefix notation for this network? ________ /19
What type of address, public, or private? _____________ Private
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 5
Lab Researching Subnet Calculators
Step 3: Fill in the following table using the 192.168.184.78 address with a subnet mask of
255.255.255.252:
What is the CIDR prefix notation for this network? ________ /30
What type of address, public, or private? _____________ Private
Where would you most likely find a network like this being used?
_______________________________________________________________________________________
Answers may vary, but a good use for a /30 network is on serial link between two routers. Only two host
addresses are needed for this type of link.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 5
Lab Researching Subnet Calculators
Reflection
1. What is an advantage of using a client-based subnet calculator?
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers may vary. Client-based subnet calculators do not require Internet access.
2. What is an advantage of using a web-based subnet calculator?
_______________________________________________________________________________________
_______________________________________________________________________________________
Answers may vary, but web-based subnet calculators do not require download and installation. They can be
accessed by any device with Internet access, including mobile devices such as a smart phones and tablets.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 5
Lab Subnetting Network Topologies (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Objectives
Parts 1 to 5, for each network topology:
Determine the number of subnets.
Design an appropriate addressing scheme.
Assign addresses and subnet mask pairs to device interfaces.
Examine the use of the available network address space and future growth potential.
Background / Scenario
When given a network topology, it is important to be able to determine the number of subnets required. In this
lab, several scenario topologies will be provided, along with a base network address and mask. You will
subnet the network address and provide an IP addressing scheme that will accommodate the number of
subnets displayed in the topology diagram. You must determine the number of bits to borrow, the number of
hosts per subnet, and potential for growth as specified by the instructions.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9
Lab Subnetting Network Topologies
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 9
Lab Subnetting Network Topologies
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 9
Lab Subnetting Network Topologies
b. Fill in the following table with the IP addresses and subnet masks for devices in the LAN as displayed in
topology.
Instructor Note: These are suggested IP addresses based on using the first 6 subnets from the table
above as assigned to each segment.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 9
Lab Subnetting Network Topologies
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 9
Lab Subnetting Network Topologies
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 9
Lab Subnetting Network Topologies
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 9
Lab Subnetting Network Topologies
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 9
Lab Subnetting Network Topologies
Reflection
1. What information is needed when determining an appropriate addressing scheme for a network?
_______________________________________________________________________________________
_______________________________________________________________________________________
Number of networks and hosts are needed when determining an appropriate addressing scheme for a
network.
2. After the subnets are assigned, will all the host addresses be utilized in each subnet?
_______________________________________________________________________________________
_______________________________________________________________________________________
No. For the WAN serial links, only two addresses will be utilized. For the subnets with host PCs, all the
addresses can be used in each subnet.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 9
Lab - Viewing Host Routing Tables (Instructor Version)
Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only.
Topology
Objectives
Part 1: Access the Host Routing Table
Part 2: Examine IPv4 Host Routing Table Entries
Part 3: Examine IPv6 Host Routing Table Entries
Background / Scenario
To access a resource on a network, your host will determine the route to the destination host using its routing
table. The host routing table is similar to that of a router, but is specific to the local host and much less
complex. For a packet to reach a local destination, the local host routing table is required. To reach a remote
destination, both the local host routing table and the router routing table are required. The netstat r and
route print commands provide insight into how your local host routes packets to the destination.
In this lab, you will display and examine the information in the host routing table of your PC using the netstat
r and route print commands. You will determine how packets will be routed by your PC depending on the
destination address.
Note: This lab cannot be completed using Netlab. This lab assumes that you have Internet access.
Required Resources
1 PC (Windows 7, Vista, or XP with Internet and command prompt access)
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6
Lab - Viewing Host Routing Tables
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6
Lab - Viewing Host Routing Tables
The first column is the interface number. The second column is the list of MAC addresses associated with the
network-capable interfaces on the hosts. These interfaces can include Ethernet, Wi-Fi and Bluetooth
adapters. The third column shows the manufacturer and a description of the interface.
In this example, the first line displays the wireless interface that is connected to the local network.
Note: If you have a PC with an Ethernet interface and a Wireless adapter enabled, both interfaces would be
listed in the Interface List.
What is the MAC address of the interface connected to your local network? How does the MAC address
compare to the recorded MAC address in Step 1?
_______________________________________________________________________________________
Answers will vary. The MAC address in this example is 90:4C:E5:BE:15:63 The MAC address should be the
same as recorded in Step 1 using ipconfig /all.
The second line is loopback interface. The loopback interface is automatically assigned an IP address of
127.0.0.1 when the Transmission Control Protocol/Internet Protocol (TCP/IP) is running on a host.
The last four lines represent transition technology that allows communication in a mixed environment and
includes IPv4 and IPv6.
The output is divided in five columns: Network Destination, Netmask, Gateway, Interface, and Metric.
The Network Destination column lists the reachable network. The Network Destination is used with
Netmask to match the destination IP address.
The Netmask lists the subnet mask that the host uses to determine the network and host portions of the
IP address.
The Gateway column lists the address that the host uses to send the packets to a remote network
destination. If a destination is directly connected, the gateway is listed as On-link in the output.
The Interface column lists the IP address that is configured on the local network adaptor. This is used to
forward a packet on the network.
The Metric column lists the cost of using a route. It is used to calculate the best route to a destination. A
preferred route has a lower metric number than other routes listed.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6
Lab - Viewing Host Routing Tables
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6
Lab - Viewing Host Routing Tables
The output of the IPv6 Route Table differs in column headings and format because the IPv6 addresses are
128 bits versus only 32 bits for IPv4 addresses. The IPv6 Route Table section displays four columns:
The If column lists the interface numbers of the IPv6-enabled network interfaces from the Interface List
section of the netstat r command.
The Metric column lists the cost of each route to a destination. The lower cost is the preferred route, and
the metric is used to select between multiple routes with the same prefix.
The Network Destination column lists the address prefix for the route.
The Gateway lists the next-hop IPv6 address to reach the destination. On-link is listed as the next-hop
address if it is directly connected to the host.
In this example, the figure displays the IPv6 Route Table section generated by the netstat r command to
reveal the following network destinations:
::/0: This is the IPv6 equivalent of the local default route. The Gateway column provides the link-local
address of the default router.
::1/128: This is equivalent to the IPv4 loopback address and provides services to the local host.
2001::/32: This is the global unicast network prefix.
2001:0:9d38:6ab8:1863:3bca:3f57:fef4/128: This is the global unicast IPv6 address of the local computer.
fe80::/64: This is the local link network route address and represents all computers on the local-link IPv6
network.
fe80::1863:3bca:3f57:fef4/128: This is the link-local IPv6 address of the local computer.
ff00::/8: These are special reserved multicast class D addresses equivalent to the IPv4 224.x.x.x
addresses.
The host routing table for IPv6 has similar information as the IPv4 routing table. What is the local default route
for IPv4 and what is it for IPv6?
_______________________________________________________________________________________
IPv4 is 0.0.0.0 0.0.0.0 (quad zero) and IPv6 is ::/0.
What is the loopback address and subnet mask for IPv4? What is the loopback IP address for IPv6?
_______________________________________________________________________________________
IPv4 is 127.0.0.1 0.0.0.0 0.0.0.0 and IPv6 is ::1/128.
How many IPv6 addresses have been assigned to this PC?
_______________________________________________________________________________________
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6
Lab - Viewing Host Routing Tables
There are two IP addresses. The link-local address and the global unicast address.
How many broadcast addresses does the IPv6 routing table contain?
_______________________________________________________________________________________
None, IPv6 does not use broadcast addresses.
Reflection
1. How is the number of bits for the network indicated for IPv4. How is it done for IPv6?
______________________________________________________________________________________
IPv4 uses a 32-bit dotted decimal subnet mask in the form of a.b.c.d. IPv6 uses a slash number.
2. Why is there both IPv4 and IPv6 information in the host routing tables?
______________________________________________________________________________________
Modern day PCs run both protocols and ISPs frequently assign both IPV4 and IPv6 addresses to support
access to servers on the Internet that are running either protocol.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6