EEE3093S - Lab - 4 2022

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

COMMUNICATION &

NETWORK ENGINEERING
(EEE3093S)
BASIC ROUTING & SWITCHING

STUDENT LAB 42 MANUAL

19 September,
OCTOBER, 2022
2021
Venue: Red Lab

Due: 30 September, 2022

Course Lecturer: Dr. Daniel Ramotsoela.


Maurine Chepkoech
Teaching Assistant: Adedotun Ajibare
Lab 2 Pre-Prac. (No marks)
This section (the Pre-Prac), is to be read before the lab so as to save time.

Learning Objectives
Upon completion of this lab, you will be able to:
 Cable a network according to the Topology Diagram.
 Erase the start-up configuration and reload a router to the default state.
 Perform basic configuration tasks on a router.
 Configure and activate Ethernet interfaces.
 Test and verify configurations.
 Reflect upon and document the network implementation.

Scenario
In this lab activity, you will create a network that is similar to the one shown in the Topology
Diagram below using packet tracer (Available under resources in Vula).

Figure 1: Network Topology

You will then perform the initial router configurations required for connectivity. Use the IP
addresses that are provided in the Topology Diagram to apply an addressing scheme to the
network devices. When the network configuration is complete, ping from one device to the
other to verify that the network is operating properly.

2.1 Resources used in the labs


Switches
Switches are link-layer devices that forward frames (link layer packets) based on LAN
destination addresses. When a frame comes into a switch interface, the switch examines the
link layer destination address of the frame and attempts to forward it on the interface that leads
to the destination. A typical switch consists of all the hardware components that will be
explained for a router.

1|Page
A network switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a network bridge that processes and routes data at the
data link layer (layer 2) of the OSI model. Switches that additionally process data at the network
layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.

Cables
Three different types of cables will be used for the labs. They are straight-through cable,
console (rollover) cable and crossover cable. They differ from one another as to how the
component wires of the cable are inserted into the pins of the adapters at the two ends of the
cable (see Figure 2). In the figure, the numbers refer to pins in the adapters.

Figure 2: Types of cables

Straight-through cable (only four wires are used):


 Host to switch or hub
 Router to switch or hub
Crossover cable (only four wires are used):
 Switch to switch
 Hub to hub
 Host to host
 Hub to switch
 Router direct to host
Rollover/Rolled/Console cable (also, not all wires are used):
 Connects router to host via serial communication (COMX) port (using
HyperTerminal!)
 **Find out which wires are used in the rolled cable**

2|Page
Routers
A router is a network device that forwards network traffic along optimized paths. Router uses
networks protocols (set of network rules and algorithms) to connect different network
segments. A router allows users in a network to share a single connection to the Internet or a
WAN.
A router is an electronic device that interconnects two or more computer networks, and
selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. Where multiple
routers are used in a large collection of interconnected networks, the routers exchange
information about target system addresses, so that each router can build up a table showing the
preferred paths between any two systems on the interconnected networks. A router can also be
viewed as a specialized computer that is designed to forward packets very efficiently. Like a
computer, a typical router consists of the following: CPU, Memory, System Bus, and network
interfaces (Figure 1). These components are described below.

Figure 3: Hardware component of a Router

a) CPU – The Central Processing Unit performs the computation and logical operations.
b) Interfaces – These are the network connections through which packets transverse the
router. The console and auxiliary ports are examples of the router interfaces. The console
port is an asynchronous data port for the direct terminal access to the router. Remote router
access can be provided by a modem connection to the aux port. The aux port can also be
used for WAN connection.
c) Memory – Routers have four types of memory:
i. ROM (Read Only Memory) – ROM contains power-on diagnostics, the bootstrap
program, and the operating system software loader.
ii. RAM (Random Access Memory) – RAM is for storing routing tables, the ARP cache,
fast-switching caches, and packet queuing and buffering. This memory provides
temporary (or running) memory for the router’s configurations while the router is
powered on. When the router is powered off, all the data in the RAM, including the
running configuration and routing tables, will be cleared.

3|Page
iii. NVRAM (Non-volatile RAM) – This is where the router’s configurations are saved.
As this would suggest, the NVRAM content is retained when you power down or
reboot the router.
iv. Flash (Erasable, Programmable ROM) – Flash memory holds the operating system
image (IOS Software) and macrocodes. Using flash memory allows you to update 5
software without removing or replacing chips on the processor. Flash contents are
retained when you power down or reboot the router.

Repeater:
The function at Physical Layer. A repeater is an electronic device that receives a signal and
retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so
that the signal can cover longer distances. Repeater have two ports, so cannot be use to connect
for more than two devices.

Hub
An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a device for
connecting multiple twisted pair or fibre optic Ethernet devices together and making them act
as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The
device is a form of multiport repeater. Repeater hubs also participate in collision detection,
forwarding a jam signal to all ports if it detects a collision.

Switch:
A network switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a network bridge that processes and routes data at the
data link layer (layer 2) of the OSI model. Switches that additionally process data at the network
layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.

Bridge
A network bridge connects multiple network segments at the data link layer (Layer of the OSI
model. In Ethernet networks, the term bridge formally means a device that behaves according
to the IEEE 802.1D standard. A bridge and switch are very much alike; a switch being a bridge
with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge
.Bridges can analyse incoming data packets to determine if the bridge is able to send the given
packet to another segment of the network.

Gate way
In a communications network, a network node equipped for interfacing with another network
that uses different protocols.
 A gateway may contain devices such as protocol translators, impedance matching
devices, rate converters, fault isolators, or signal translators as necessary to provide
system interoperability. It also requires the establishment of mutually acceptable
administrative procedures between both networks.
 A protocol translation/mapping gateway interconnects networks with different network
protocol technologies by performing the required protocol conversions.

4|Page
2.2 Establishing a Session with Packet Tracer
Launch the Cisco Packet Tracer from your desktop. (or download and install from VULA)

Figure 4: Cisco packet tracer interface

2.3 Common Commands


Objective:
To familiarize students with common commands used to interact with switches
and routers.
Introduction
To connect to the router we execute Internetworking Operating System (IOS) commands. IOS
is software that runs on all routers and allows the user to manage and configure the processes
that occur on the router. IOS is command-line interface (CLI) software which accepts user
commands and displays router output.
This commands includes:
• Configuring the Router commands
• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics 6
• IP Commands
• Other IP Commands e.g. show ip route etc.
As a security feature, Cisco IOS provides separate commands into two different access level
modes; user EXEC level and privileged EXEC level.
User EXEC level: allows a person to access only a limited number of basic monitoring
commands. In this mode, the router or switch prompt is displayed as: hostname>
The right arrow (>) in the prompt indicates that the router or switch is at the user EXEC mode.
Privileged EXEC level: allows a person to access all router commands
(including configuration and management) and can be password protected to allow only
authorized people to access the router. In this mode the symbol “#” is displayed as the prompt.
hostname#

5|Page
There is also a sublevel of the Privileged Exec level, the configuration level. From privileged
mode, you can monitor devices, view the status of interfaces, or run debugging. However, if
you want to change the configuration of the router, you must enter configuration mode.
1. In the cisco packet tracer, open a Router CLI
2. Now you should be prompted with Router > which shows that you are working in the user
exec level. Use the Help command ? to see the list of available commands in the user exec
level.
Router > ?
3. When the word “more” appears, press the space bar to display the next page of
information.
4. Practice the frequently used user exec commands from table 1 by typing the
commands and pressing Enter.

Table 1. Few frequently used commands in the user Exec level.

Command Purpose
Router > show Show running system information
Router > where List active connections
List all commands that begin with “sh”. Note that there is
Router > sh?
no space before ? Try also arbitrary letters other than “sh”.
List all available arguments that match with some command
Router > show ? (eg. show) Note: there is space before ? Try also valid
command words other than “show”.

Commands are often abbreviated to the minimum number of letters that identifies
a unique selection. The CLI is smart enough to recognize abbreviated commands. For example
“sh” would be enough instead of “show” to issue the command: Router> show ? because
show” is the only valid command that begins with “sh”. In addition, if you enter the first few
letters of a command and hitTab, it will display the remainder of the command.
5. Press the up arrow to see or reuse the last entered command. Press it again to
go to the command before that. Press the down arrow to go back through the list.
6. Enter the Privileged EXEC level.
Router > enable [Enter]
Enter the password given to you by the lab administrator when prompted.
7. Use the Help command ? to see the list of available commands in the privileged
level.
Router # ?
Practice the frequently used privileged commands from table 2.
Table 2. Few frequently used commands in the privileged level

Command purpose
Router# dir List files on a file system
Router#co? List of commands that begin with a particular character sequence, type
in those characters followed immediately by the question mark (?)
Router#configure ? List keywords or arguments, enter a question mark in place of a
keyword or argument. Include a space before the question mark.
r1# show ip interface Learn about the status of the interfaces of this router
Router# show run View the configuration of the router

6|Page
View the Running Configuration. (There are two different
Router# show configurations stored on the router; the Running Configuration and the
running-config Start-Up Configuration. The Running Configuration is your current,
working configuration. It is stored in the RAM memory of the router.)
View the Start-Up configuration. It is the configuration that is loaded
r1# show startup
when the router initializes its boot sequence and it is stored in the
config
NVRAM of the router.
Router# show version Find the version and system information about your router
r1# show memory Find memory information about the router
8. Enter the Configuration level.
Router# configure terminal [Enter]

Practice the frequently used configuration commands from table 3. Use also the help command
“?” to see available commands.

Table 3. Few frequently used commands in the configuration level.


Command purpose
Router> no ip address To delete the statement ip address 192.168.13.1
192.168.13.1 255.255.255.0 255.255.255.0
Change the router name from “Router” to “r1”. The
Router(config)# hostname r1
command prompt will look now r1(config)#
Router(config if)#no Delete a configuration statement line. Eg. to reverse the
statement result of the router name change: r1(config)# no hostname r1
Router(config)#<CTRL>+Z Switch from configuration to privileged mode

9. To exit the Privileged EXEC level use the command:


Router # exit [Enter]
10. At the end of the practical lesson, close the cisco packet tracer.
Other commands includes ping, tracert etc.
ping:
ping sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds, you
get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a
machine is alive. If there is no response, you know something is wrong.

Figure 5: Pinging command prompt

7|Page
Traceroute:
Tracert is a command which can show you the path a packet of information taken from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop'
from router to router takes.

Figure 6: Tracert command prompt

nslookup:
Displays information from Domain Name System (DNS) name servers.
NOTE: If you write the command as above it shows as default your pc's server name firstly.
pathping:
A better version of tracert that gives you statics about packet lost and latency.

Figure 6: Pathping command prompt

8|Page
Lab 42 Practical
(30 marks)
Instructions:
 Save your screenshots at every stage of the experiment and paste with the solution as a single file
(.doc, .pdf, or .jpg).
 If you are in doubt, ask any of the tutors.
 Hand-in your screenshots and the solution from the last sheet on vula before leaving the lab.

2.4 Controlling User Access to the Router


Objective
To familiarize students with controlling access to a router using passwords, and
performing password recovery.
Introduction
Securing the router with a password was introduced in 2.3. In fact, there are 5
passwords used to secure the router. The enable password and enable secret
are used to secure the privileged EXEC mode. The enable secret is the newer
encrypted version and overrides the enable password if set. The remaining three
are used to secure the user EXEC mode. They secure the console (con) port,
the auxiliary (aux) port (can be used as console), and the telnet (vty) ports for
remote access to the router.
Experiment
Securing the router’s privileged EXEC mode:
1. Enter the privileged mode:
Router> enable [ENTER]
2. Enter configuration mode:
Router# config t [ENTER]
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
3. Set the secret password to “cisco”:
Router(config)# enable secret cisco [ENTER]

Securing the router’s user EXEC mode:

4. Enter the console line and set the password


Router(config)# line con 0 [ENTER]
Router(config-line)# password conpassword [ENTER]
Router(config-line)# login
The login command ensures that the router prompts for authentication. It
has to be used only after setting a password.
Router(config-line)# exit [ENTER]

9|Page
5. Enter the aux line and set the password
Router(config)# line aux 0 [ENTER]
Router(config-line)# password auxpassword [ENTER]
Router(config-line)# login
Router(config-line)# exit [ENTER]

6. Enter the vty lines and enter the password:


Router(config)# line vty 0 4 [ENTER]
Router(config-line)# password vtypassword [ENTER]
Router(config-line)# login
Router(config-line)# exit [ENTER]
7. Exit the config mode, save the configuration and check that passwords have been set:
Router(config)# exit [ENTER]
Router# copy run start
Router# sh run [ENTER]
!
hostname Router
!
enable secret 5 $1$FWX0$hlzpT92by9EgO78nOxobD0
!
ip subnet-zero
!
!
line con 0
password conpassword
login
line aux 0
password auxpassword
login
line vty 0 4
password vtypassword
login
!
end

 Save your screenshot at this stage of the experiment and paste with the solution as a single file
(.doc, .pdf, or .jpg).

___________________________________________________________________________
__________________ [2 marks]
8. The output shows the encrypted secret password, and the unencrypted user EXEC
passwords. Exit the session, (Router#exit) and restart it again (press ENTER). Now both the
router’s user EXEC and privileged EXEC mode should ask you for a password (let’s assume
you remember them).
Password Recovery:
Upon booting, the router loads the IOS program from flash memory. The IOS then finds a
configuration (startup-config) file in NVRAM. This is then copied into RAM and called

10 | P a g e
(running-config) and used to run the router. NVRAM has a software register, the value of
which controls the router’s boot sequence. The passwords were saved into NVRAM with the
command copy run start. Changing the router’s boot sequence (by changing the register value)
to avoid the NVRAM will therefore bypass the passwords, and allow the router to be reset.
9. Check the value of the config register with:
Router# sh ver [ENTER]
10. For this lab, you will remove all the passwords by entering the
configuration mode:
Router# config t [ENTER]
Router(config)# no enable secret [ENTER]
Remove the console port password:
Router(config)# line con 0 [ENTER]
Router(config-line)# no password [ENTER]
Router(config-line)# exit [ENTER]
Remove the auxiliary port password:
Router(config)# line aux 0 [ENTER]
Router(config-line)# no password [ENTER]
Router(config-line)# exit [ENTER]
Remove the telnet password:
Router(config)# line vty 0 4 [ENTER]
Router(config-line)# no password [ENTER]
Router(config-line)# exit [ENTER]

11. Change the register value to 0x2102 to boot from NVRAM (startup-config), and leave the
configuration mode:
!!!! IT IS EXTREMELY CRITICAL THAT YOU ENTER THE CORRECT REGISTER VALUE!!!!!

Router(config)# config-register 0x2102 [ENTER]


Router(config)# exit [ENTER]
12. Save the new configuration and confirm changes:
Router# copy run start [ENTER]
Router# sh run [ENTER]
**Notice the changes? **
 Save your screenshot at this stage of the experiment and paste with the solution as a single file
(.doc, .pdf, or .jpg).

___________________________________________________________________________
__________________ [2 marks]
13. Reboot the router and check that it does not prompt you for passwords.

11 | P a g e
2.5 Static Routing
Objective
To establish connectivity between two Local Area Networks (LANS) on a Wide Area Network
(WAN) link using static routing.
Introduction
IP routing is automatically enabled on Cisco routers, for this lab, we are using packet tracer to
demonstrate a real-world scenario (Packet Tracer is available under resources in Vula).
Router(config)#ip routing
There are two main ways a router knows where to send packets. Either through static routes,
or the router can learn routes by employing a dynamic routing protocol. These days static
routes are generally used in very simple networks or in particular cases that necessitate their
use. To create a static route, the administrator tells the router operating system that any
network traffic destined for a specified network layer address should be forwarded to a
similarly specified network layer address. In the Cisco IOS this is done with the ip route
command. Static routes can be configured by specifying the next-hop ip address of the adjacent
router or by specifying the outgoing interface. The syntax is as follows:
Router(config)#ip route [destination network] [subnet mask] [next-hop ip address]
Or
Router(config)#ip route [destination network] [subnet mask] [outgoing interface]

For example
Router(config)# ip route 192.168.3.0 255.255.255.0 172.16.7.1
Or
Router(config)# ip route 192.168.3.0 255.255.255.0 serial 0/0

Two things need to be said about this example. First, the packet destination address must
include the subnet mask for that destination network. Second, the address it is to be forwarded
to is the specified address of the next router along the path to the destination or the outgoing
interface.
Preparation
The following resources are required:
• Two PCs as end devices (Generic work-station)
• Two Routers (1941 series)
• Two Switches (2960-24TT series)
• Four straight through cables
• Two Console Cables
• 1 serial cable

12 | P a g e
Experiment
Step 1:
Open Packet tracer from the list of available programs in the computer
Step 2:
You are required to set up the network as shown in the diagram.

Step 3:
Configure static IP addresses for the two workstations as shown below:
WORKSTATION 1 ACTIVITY

13 | P a g e
WORKSTATION 2 ACTIVITY

Step 4:
Enter configuration mode on the router (Cape Town)
WORKSTATION 1 ACTIVITY

Router> enable // Enter privileged mode


Router# Config t // Enter configuration mode
Router(config)#
Step 5:
Set the enable password to “cisco”
Router(config)# enable secret cisco
Step 6:
Change the name of the router to CapeTown
Router(config)# hostname CapeTown

14 | P a g e
Step 7:
Configure the GigabitEthernet0/0 on the CapeTown router
CapeTown(config)# interface GigabitEthernet0/0
CapeTown(config-if)# ip address 192.168.4.1 255.255.255.0
CapeTown(config-if)# no shutdown // Turn on the interface
CapeTown(config-if)#exit
CapeTown(config)#exit
Step 8:
Configure the serial interface GigabitEthernet0/1 on the CapeTown router
CapeTown(config)# interface GigabitEthernet0/1
CapeTown(config-if)# ip address 192.168.1.1 255.255.255.0
CapeTown(config-if)# no shutdown
CapeTown(config-if)#exit
CapeTown(config)#

Save your configuration using the following command:


CapeTown# copy run start.
Step 9:
Enter configuration mode on the router (Durban)
WORKSTATION 2 ACTIVITY

Router> enable // Enter privileged mode


Router# Config t // Enter configuration mode
Router(config)#
Step 10:
Set the enable password to “cisco”
Router(config)# enable secret cisco

15 | P a g e
Step 11:
Change the name of the router to Durban
Router(config)# hostname Durban
Step 12:
Configure the FastEthernet interface GigabitEthernet0/0 on the Durban router
Durban(config)# interface GigabitEthernet0/0
Durban(config-if)# ip address 192.168.8.1 255.255.255.0
Durban(config-if)# no shutdown // Turn on the interface
Durban(config-if)# exit
Durban(config)#
Step 13:
Configure the serial interface GigabitEthernet0/1 on the Durban router
Durban(config) interface GigabitEthernet0/1
Durban(config-if) ip address 192.168.1.2 255.255.255.0
Durban(config-if) no shutdown
Durban(config-if)# exit
Durban(config)#
Save your configuration using the following command
Durban# copy run start
Step 14:
Display the ip routing table on the Cape Town router.
The networks that are directly connected to the router are denoted by C. If a route is not in the
routers to which the host is connected, the host cannot reach the destination host.
WORKSTATION 1 ACTIVITY
CapeTown# show ip route

16 | P a g e
Step 15:
Display the ip routing table on the Durban router.
The networks that are directly connected to the router are denoted by C. If a route is not in the
routers to which the host is connected, the host cannot reach the destination host.
WORKSTATION 2 ACTIVITY
Durban# show ip route

Ping Command
The ping utility is used to test network connectivity. The ping command sends a packet to the
destination host and then waits for a reply from that host. Results from the ping command can
help to evaluate path-to-host reliability, delays over the path and whether the host is reachable
or is functioning. The ping output displays minimum, maximum and average times it takes for
a ping packet to find a specified host and return. The ping command uses internet control
message protocol (ICMP) and is a basic testing mechanism for network connectivity.
Exclamation marks (!) indicate each successful echo. One or more periods (.) indicates a
timeout while waiting for a packet from the ping target.
Example: ping any device within the network to check your connectivity.

You are required to show your own set up of the network as in Step 2 (page 13)
 Save your screenshot (of your configuration on packet tracer) and paste with the solution as a
single file (.doc, .pdf, or .jpg).

___________________________________________________________________________
__________________ [2 marks]

17 | P a g e
Answer the questions on pages 18-19 & 21-23
Fill in your details and submit with your screenshots as a single
document/file on vula before the end of the lab.

STUDENT NAME
STUDENT NUMBER
UIN
SESSION
DATE & TIME

WORKSTATION 1 ACTIVITY
Step 16:
Q: From workstation 1, use the command prompt to ping the Fast Ethernet interface of the
Cape Town router at 192.168.4.1. Was the ping successful? [2 marks]
__________________
Q: From workstation1, use the command prompt to ping workstation 2 at 192.168.8.2. Was the
ping successful? 2 marks] ____________________
Why? [3 marks]
______________________________________________________________________
___________________________________________________________________________
Step 17:
Configure static routes to the network 192.168.8.0 on the CapeTown router.
CapeTown(config)#ip route 192.168.8.0 255.255.255.0 192.168.1.2
Display the ip routing table on the CapeTown router. The network denoted by S is the static
route that was configured.
CapeTown#show ip route

18 | P a g e
WORKSTATION 2 ACTIVITY
Step 18:
Configure static routes to the network 192.168.4.0 on the Durban router.
Durban(config)#ip route 192.168.4.0 255.255.255.0 192.168.1.1
Display the ip routing table on the Durban router. The network denoted by S is
the static route that was configured.
Durban#show ip route

Step 19:
Configure workstation 2 Gateway to be 192.168.1.2
WORKSTATION 1 ACTIVITY
Step 20:
Configure workstation 1 Gateway to be 192.168.1.1
Step 21:
Q: From workstation1, use the command prompt to ping workstation 2 at 192.168.8.2. Was the
ping successful? [2 marks] ____________________
Why? [2 marks]
______________________________________________________________________
___________________________________________________________________________
Q: Why is a static route needed on both routers? [5 marks]
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
Kindly clear your static route in order to understand RIP configuration using:
Durban(config)#no ip route 192.168.4.0 255.255.255.0 192.168.1.1
CapeTown(config)#no ip route 192.168.8.0 255.255.255.0 192.168.1.2

19 | P a g e
2.6 RIP-Routing Information Protocol
Objective
The objective is to learn how to configure Routing Information Protocol (RIP) on a network.
You will use relevant IOS commands to monitor RIP routing updates between routes and to
control RIP updates messages. After completing this lab you know how to:
 Configure RIP on Routers with different network connections and interfaces
 Interpret the RIP routing update messages traveling between the routers with debug
commands.
 Modify the default timers for routing updates on Cisco router
 Test connectivity between RIP routers and routing updates are exchanged between
routers
 Understand how Split-Horizon works and when you may need to disable it.

Background

RIP is one of the first distance vector routing protocols. It was designed for ease of use and for
small networks. RIP is implemented by many host computers as well as networking devices,
and it is the choice of many network administrators for small networks or for confined areas of
larger networks. RIP uses a metric called ‘hops’, which is simply a count of the number of
links traversed on a path.

This is an adequate metric in networks composed of homogeneous media, for example, an all
Ethernet network. However, the simple metric does not account for different types of media or
for the congestion of traffic in the network. Also, the original specification of RIP was
incapable of measuring hops greater than 16, limiting the maximum network diameter.

This limitation was originally included to mitigate convergence delays and handle count to
infinity problems. RIP was available for almost every protocol suite; DecNet, Novell, and so
on. Integrated routing is the practice of maintaining a single routing table for all RIP-discovered
paths, which permitted network administrators to configure only one RIP (usually TCP/IP) to
cut down on update traffic.

Configuring RIP

To configure RIP, the following steps must be taken:

 Select a routing protocol.


 Assign IP network numbers without specifying subnet values. This is because RIP is a
classful protocol. It is only concerned with major network boundaries. To configure
RIP type the following commands in configuration mode.

20 | P a g e
WORKSTATION 1 ACTIVITY

STEP 22:
Create a RIP routing process

When you are in configuration mode, create a RIP routing process with the router rip
command.

STEP 23:
Add the network(s) to participate in RIP
Next, the network(s) participating in the RIP routing process must be specified using
the network subcommand. For Cape Town router, the networks to add are 192.168.1.0
and 192.168.4.0.

Hint: #^Z = CNTL/Z or multiple “exist”

STEP 24:
Verify that RIP is configured on Cape Town router
Now, use the show ip protocols command to verify that RIP is configured. The output
shows that the routing protocol RIP has been configured and is routing for the networks
192.168.4.0 and 192.168.1.0.

 Save your screenshot and paste with the solution as a single file (.doc, .pdf, or .jpg).

________________________________________________________________[2 marks]

21 | P a g e
WORKSTATION 2 ACTIVITY

STEP 25:
Enter configuration mode on Durban router
Telnet into Durban router and enter configuration mode using the config t command.

Step 26:
Create a RIP routing process.
When you are in configuration mode, create a RIP routing process with the router rip
command.

Step 27:
Add the network(s) to participate in RIP.
Next, specify the network(s) participating in the RIP routing process by using the
network subcommand. Add 192.168.1.0 and 192.168.8.0

Step 28:
Verify the RIP configuration on Durban router.
Check to see that you have configured RIP correctly; use show ip protocols command.
In the show ip protocols output, you should notice that Durban router has already
received RIP update on interface GigabitEthernet0/0.

 Save your screenshot and paste with the solution as a single file (.doc, .pdf, or .jpg).

________________________________________________________________[2 marks]

22 | P a g e
Step 29:
View the routing table on Durban router.
Use the show ip route command to view the routing table of Durban router. You should
now be able to see the networks learned via RIP in the routing table.

 Save your screenshot and paste with the solution as a single file (.doc, .pdf, or .jpg).

________________________________________________________________[2 marks]

WORKSTATION 1 ACTIVITY

STEP 30:
View the routing table on Cape Town router.
Use the show ip route command to view the routing table of Cape Town router.

 Save your screenshot and paste with the solution as a single file (.doc, .pdf, or .jpg).

________________________________________________________________[2 marks]

Goodluck.

23 | P a g e

You might also like