Packet Tracer LAB CISCO
Packet Tracer LAB CISCO
Packet Tracer LAB CISCO
Introduction
A new switch just purchased from Cisco contains no default configuration. You need to
configure the switch with setup mode or from scratch using the command line interface (CLI)
before connecting it in your network environment.
As a Cisco CCNA certified professional, it is very important to know the basic Cisco switch
configuration commands to improve the performances and the security of the enterprise network.
Network diagram
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
2023-08-15
Lab instructions
This lab will test your ability to configure basic settings such as hostname, motd banner,
encrypted passwords, and terminal options on a Cisco Catalyst 2960 switch emulated in Packet
Tracer 8.1.1.
1. Use the local laptop connect to the switch console and configure the laptop with the right
parameters for console access to the Cisco 2960 Catalyst switch
2. Configure Switch hostname as LOCAL-SWITCH
4. Configure the password for privileged mode access as "cisco". The password must be md5
encrypted
5. Configure password encryption on the switch using the global configuration command
7. Configure the IP address of the switch as 192.168.1.2/24 and it's default gateway IP
(192.168.1.1).
8. Test telnet connectivity from the Remote Laptop using the telnet client.
Lab solution
Configure Switch hostname as LOCAL-SWITCH
Switch(config)#hostname LOCAL-SWITCH
Switch(config)#banner motd #
Unauthorized access is forbidden#
Configure the password for privileged mode access as "cisco". The password must be md5
encrypted
Configure password encryption on the switch using the global configuration command
Password encryption is an important setting for securing switch credentials as defaut behavior is
saving clear-text passwords in the running-config. Although useful to avoid naive hacking,be
advised that tools have been released to crack those passwords. Use the service password-
encryption command with additional security measures.
Switch(config)#service password-encryption
Switch(config)#line con 0
Switch(config-line)#password ciscoconsole
Switch(config-line)#logging synchronous
Switch(config-line)#login
Switch(config-line)#history size 15
Switch(config-line)#exec-timeout 6 45
Switch(config)#line vty 0 15
Switch(config-line)#exec-timeout 8 20
Switch(config-line)#password ciscotelnet
Switch(config-line)#logging synchronous
Switch(config-line)#login
Switch(config-line)#history size 15
Configure the IP address of the switch as 192.168.1.2/24 and it's default gateway IP
(192.168.1.1).
Switch(config)#interface Vlan1
Network diagram
This lab will test your ability to configure speed, duplex, and vlan settings on the network
interfaces of a Catalyst 2960 switch using Cisco Packet Tracer 8.1.1 .
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
2023-08-15
Lab instructions
1. Connect to Switch0 using console interface and configure each Switch0 fastethernet
switchport for operation.
4. Configure those two links as trunk lines without using trunk negotiation between switches
Solution
1. Connect to Switch0 using console interface and configure each Switch0 fastethernet
switchport for operation.
Explicitly configuring the speed with the speed 100 IOS command of a Cisco Catalyst network
interface disable auto-negociation on this interface
Switch(config)#interface FastEthernet0/1
Switch(config)#interface FastEthernet0/2
Switch(config-if)#switchport mode access
Switch(config-if)#duplex full
Switch(config-if)#speed 100
Switch(config)#interface FastEthernet0/3
Switch(config-if)#switchport mode access
Switch(config-if)#duplex full
Switch(config-if)#speed 100
Switch(config)#interface FastEthernet0/4
Switch(config-if)#switchport mode access
Switch(config-if)#duplex full
Switch(config-if)#speed 100
2. PC "192.168.1.4" seems to be unable to ping other PCs in the network. Check switch
configuration.
Switch(config)#interface FastEthernet0/4
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 1
Crossover network cable have to be used to connect two network devices of the same type
together (two network switches, two routers, two PC). Crossed wiring inside the crossover
cable connects the transmit PIN at one end of the cable to the receive PIN at the other end.
4. Configure those two links as trunk lines without using trunk negotiation between
switches
On every interface that has to be configured for trunk operation, configure the following
settings :
Switch(config)#interface GigabitEthernet1/X
Switch(config-if)#switchport mode trunk
Verify interface operational mode using the show interface GigabitEthernet1/X switchport
command :
Name: Gig1/2
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Another useful IOS command is show interfaces trunk :
Network diagram
The aim of this lab is to test your ability to configure VLAN and VTP on a small network of 4
switches using Packet Tracer 7.2.1.
This lab will help you to prepare the VTP testlet and simlet questions of the Cisco ICND1
exam.
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
2023-08-15
Lab instructions
1.Configure the VTP-SERVER switch as a VTP server
4.Configure VLAN 10 with name "STUDENTS" and VLAN 50 with name "SERVERS"
5. Check propagation on all switches of the VTP domain.
2. Connect to the 3 other Catalyst switches and configure them as VTP clients.
All links between swiches must be configured as trunk lines.
Verify the VTP operating mode of the switch using the show vtp status command. The "VTP
Operating Mode" shoud have the"Client" value. Example with VTP-CLIENT3 switch is
provided below.
interface GigabitEthernet1/1
switchport mode trunk
interface GigabitEthernet1/2
switchport mode trunk
4. Configure VLAN 10 with name "STUDENTS" and VLAN 50 with name "SERVERS"
On the VTP server Catalyst 2960 switch, configure the following commands to create both
"STUDENTS" and "SERVERS" vlans :
VTP-SERVER(config)#vlan 10
VTP-SERVER(config-vlan)#name STUDENTS
VTP-SERVER(config)#vlan 50
VTP-SERVER(config-vlan)#name SERVERS
5. Check propagation of both "STUDENTS" and "SERVERS" vlans on all Catalyst 2960
network switches of the VTP domain.
Use the show vlan brief on each switch to check propagation of the 2 VLANS.
Introduction
A growing challenge for network administrators is to be able to control who is allowed - and
who isn't - to access the organization's internal network. This access control is mandatory for
critical infrastructure protection in your network. It is not on public parts of the network where
guest users should be able to connect.
Port security is a feature implemented in Cisco Catalyst switches which helps network engineers
in implementing network security on network boundaries.
In its most basic form, the Port Security feature remembers the MAC address of the device
connected to the switch edge port and allows only that MAC address to be active on that port. If
any other MAC address is detected on that port, port security feature shutdown the switch port.
The switch can be configured to send a SNMP trap to a network monitoring solution to alert that
a port is disabled for security reasons.
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
2023-08-15
Network diagram
Lab instructions
This lab will test your ability to configure port security on CiscoTM 2960 switch interfaces.
1. Configure port security on interface Fa 0/1 of the switch with the following settings :
- Port security enabled
- Mode : restrict
2. Configure port security on interface Fa 0/2 of the switch with the following settings :
- Mode : shutdown
3. Configure port security on interface Fa 0/3 of the switch with the following settings :
- Mode : protect
4. From LAPTOP 1 :
The port-security restrict mode drops packets with unknown source addresses until you remove
a sufficient number of secure MAC addresses to drop below the maximum value and causes
the SecurityViolation counter to increment.
Port security with sticky MAC addresses provides many of the same benefits as port security
with static MAC addresses, but sticky MAC addresses can be learned dynamically. Port
security with sticky MAC addresses retains dynamically learned MAC addresses during a link-
down condition.
interface FastEthernet0/1
switchport mode access
switchport port-security
switchport port-security maximum 3
switchport port-security mac-address sticky
switchport port-security violation restrict
When the rogue laptop is connected to the hub and tries to communicate with 192.168.1.4, the
number of mac-addresses learned ont the fastethernet 0/1 interface exceeds 3. The interface
drops traffic with the new mac-address (not learned by the switch because 3 mac addresses have
already been registered on the fa0/1 interface) and increases the security viloation counter based
on the 'restrict' port-security configuration of the interface.
Switch#show port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)
--------------------------------------------------------------------
Fa0/1 3 3 5 Restrict
Fa0/2 3 1 0 Shutdown
Fa0/3 1 1 0 Protect
----------------------------------------------------------------------
The port-security shutdown mode puts the interface into the error-disabled state immediately
and sends an SNMP trap notification.
interface FastEthernet0/2
switchport mode access
switchport voice vlan 20
switchport port-security
switchport port-security maximum 3
switchport port-security mac-address sticky
Interface FastEthernet 0/3 configuration - Protect mode
The port-security protect mode silently drops packets with unknown source addresses until
you remove a sufficient number of secure MAC addresses todrop below the maximum value. No
counter is incremented
interface FastEthernet0/3
switchport mode access
switchport port-security
switchport port-security violation protect
{wbamp-hide start}
{wbamp-hide end}
1. Labs
2. Lab 4 : Port security
Packet Tracer - Lab 6 : Basic router setup
LAST UPDATED: 03 MAY 2023
Introduction
At the first boot of a Cisco ISR router, some basic configuration has to be performed to secure
adminitrative access to the router. This lab will test your ability to configure the basic security
settngs of a Cisco ISR router and help you to get ready for the router configuration simulation
activities in the CCENT / ICND1 certification exam (Chapter 5.0 Infrastructure
Maintenance of Cisco Certified Entry Networking Technician (CCENT) exam)
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
Lab 1 - Basic switch setup
2023-08-15
Network diagram
Lab instructions
The aim of this lab is to test your ability to perform a basic router setup. You have 15 minutes to
complete this simulation.
1. Configure the LAPTOP terminal software with the right console parameters.
Solution
1. Configure the laptop terminal software
The terminal software in not correctly configured on the laptop. You have to change the settings
to 9600 / 8 / None / 1 to connect to the router's console. Remerber this tip as it could help you
answer CCENT questions or achieve CCENT simlet.
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname GATEWAY
3. Configure the enable password and secret to "cisco"
The enable secret <password> command stores a MD5 hash of the password required for
privileged mode access. The enable secret password of a Cisco ISR router is used for restricting
access to enable mode and to the global configuration mode (configure terminal) of a router.
GATEWAY(config)#service password-encryption
Console access is protected by the 'cisco' password and login is required at console access.
The exec-timeout command automatically logs off user from console after defined inactivity
period (2'45'' in this lab)
GATEWAY(config)#line console 0
GATEWAY(config-line)#password cisco
GATEWAY(config-line)#login
GATEWAY(config-line)#logging synchronous
GATEWAY(config-line)#exec-timeout 2 45
GATEWAY(config-line)#history size 10
Video tutorial
Tutorial description
This tutorial is designed to help you to configure the voice over ip (voip) features available in
Packet Tracer 8.1.1
It will show you the steps required to :
Network diagram
Note : Connect only IP Phone 1 at the beginning of the lab. IP Phone 2 must be disconnected.
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
2023-08-15
RouterA>enable
RouterA#configure terminal
RouterA(config)#interface FastEthernet0/0
RouterA(config-if)#ip address 192.168.10.1 255.255.255.0
RouterA(config-if)#no shutdown
The DHCP server is needed to provide each IP phone connected to the network with an IP adress
and the TFTP server location.
After configuring the ISR router, wait a moment and check that ‘IP Phone 1’ has received an IP
address by placing your cursor over the phone until a configuration summary appears.
Tasks 2 : Configure the Call Manager Express telephony
service on RouterA
You must now configure the Call Manager Express telephony service on RouterA to enable voip
on your network.
Tutorial description
This tutorial will guide you for advanced voip configuration in Cisco Packet Tracer 8.1.1
network simulation software. Based on the Cisco's Hierarchical Network Design Model, this
simulated network has voip call routing features enabled between two campus buildings with
network services (DNS, DHCP ...) centralized in the datacenter.
In a real world environment, the CUCME router would also be located in the datacenter.
However, Packet Tracer doesn't seems to support this configuration as IP phones don't register
and receive a valid phone number.
Network diagram
Download lab (Packet Tracer >= 6.2)
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
2023-08-15
Configuration tasks
CME-3 configuration
IP configuration
hostname CME-3
!
interface FastEthernet0/0
ip address 192.168.69.254 255.255.255.0
duplex auto
speed auto
!
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.69.1
!
Telephony service configuration
telephony-service
max-ephones 5
max-dn 5
ip source-address 192.168.69.254 port 2000
auto assign 4 to 6
auto assign 1 to 5
Ephone declaration and number assignment
ephone-dn 1
number 2001
!
ephone-dn 2
number 2002
!
ephone 1
device-security-mode none
mac-address 0090.0C57.C85E
type 7960
!
ephone 2
device-security-mode none
mac-address 0090.0C20.BA20
type 7960
!
ephone 3
device-security-mode none
mac-address 0005.5E9E.2AC5
type 7960
button 1:2
!
ephone 4
device-security-mode none
mac-address 0060.5C2D.6220
type 7960
button 1:1
CME configuration
IP configuration
hostname CME
!
interface FastEthernet0/1
ip address 192.168.65.3 255.255.255.0
duplex auto
speed auto
!
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.69.1
!
Telephony service configuration
telephony-service
max-ephones 42
max-dn 144
ip source-address 192.168.65.3 port 2000
auto assign 4 to 6
auto assign 1 to 5
Ephone declaration and number assignment
ephone-dn 1
number 1101
!
ephone-dn 2
number 1102
!
ephone-dn 3
number 1103
!
ephone-dn 4
number 1104
!
ephone-dn 5
number 1105
!
ephone-dn 6
number 1106
!
ephone 1
device-security-mode none
mac-address 0090.0C57.C85E
type 7960
button 1:1
!
ephone 2
device-security-mode none
mac-address 0090.0C20.BA20
type 7960
button 1:2
!
ephone 3
device-security-mode none
mac-address 00E0.A340.E430
type 7960
button 1:3
!
ephone 4
device-security-mode none
mac-address 0060.4710.AE01
type 7960
button 1:4
!
ephone 5
device-security-mode none
mac-address 000C.8521.0C20
type 7960
button 1:5
!
ephone 6
device-security-mode none
mac-address 00D0.D31A.7EE9
type CIPC
button 1:6
The destination pattern can be either a complete telephone number or a partial telephone number
with wildcard digits, represented by a period (.) character. Each "." represents a wildcard for an
individual digit that the originating router expects to match. For example, if the destination
pattern for a dial peer is defined as "555....", then any dialed string beginning with 555, plus at
least four additional digits, matches this dial peer.
Network diagram
Lab instructions
1. Configure NAT to allow LAN users to access the INTERNET
3. Configure inbound NAT rule to allow access to the 172.16.1.10 DMZ webserver from the
Internet with 148.12.56.68 public IP address.
4. Configure ICMP rules to allow laptop1 to ping 148.12.56.1 internet router and any internet
resource. An access-list, named OUTSIDE, will be configured to allow incoming echo-reply and
unreachable ICMP replies
5.Configure the required access-lists on the internet facing interface to allow incoming trafic to
the DMZ webserver
6.Test HTTP connectivity from the Public laptop to the DMZ webserver (http://148.12.56.68)
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
2023-08-15
Lab Solution
1. Configure NAT to allow LAN users to access the INTERNET
In this lab, the AutoNAT feature of ASA 5506-X firewall is used to configure the NAT rules
that allow the hosts on the LAN segments to connect to the Internet. Network Address
Translation is needed because these internal hosts use private IP addresses which are not routable
on the Internet. Network Address Translation makes the addresses so that they look like the
ASA's outside interface IP address. AutoNAT suits best if the ASA external IP changes
frequently (DHCP).
AutoNAT configuration for the LAN subnet is done by creating a network object representing
each LAN subnet. In each of these objects, a dynamic nat rule is configured to conduct Port
Address Translation (PAT) on these clients as they pass from the inside to the outside interface.
The name of each interface, configured with nameif, is used in the AutoNAT command : nat
(inside,outside) dynamic interface
5.Configure the required ACL to allow incoming trafic to the DMZ webserver
Complete the previous access-list with the rules to allow inbound HTTP trafic and apply the
ACL to the outside interface.
The new ASA 5506-X firewall provided in Packet Tracer 7.2 is configured with 8 layer 3
network interfaces. Each interface can be configured with it's own name and security level.
ASA 5506-X is configured with the Security Plus license by default which unlocks unlimited
usage of the layer 3 physical interfaces, 30 vlans (50% more than ASA 5505), and 50 VPN peers
(100% more than ASA 5505)
ASA 5505 - Vlan interfaces and basic license bundle problems with DMZ
creation
The ASA 5505 firewall provided in Packet Tracer 7.1.1 was shipped and installed by default
with the basic license bundle. The content of this license package is displayed below :
If you try to configure a third vlan to host your DMZ,the ASA device will return the following
error because of the limited licence :
ERROR: This license does not allow configuring more than 2 interfaces with nameif and without
a "no forward" command on this interface or on 1 interface(s) with nameif already configured.
You have to limit communications between two vlan interfaces to make the creation of the third
vlan interface possible. This can be done for example using the command no forward interface
vlan 1 on the "interface vlan 3" to deny communications betwen the inside network and the
DMZ
The "security plus" license bundle which remove this limitation in the ASA 5505 (available
from Packet Tracer 7.1.1) and can be unlocked with the activation-key 0x1321CF73
0xFCB68F7E 0x801111DC 0xB554E4A4 0x0F3E008D command. Up to 20 vlans can now be
configured in the ASA 5505.
References
https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-
firewalls/115904-asa-config-dmz-00.html
Network diagram
Lab instructions
Configure the ASA firewall to allow HTTP traffic from the laptop (inside network) to the HTTP
server located on the other side of the firewall. The traffic will be deeply inspected by the
firewall to make sure it contains real HTTP instead of rogue traffic.
All the communication from the outside to the inside network have to remain denied. Only the
statefull sessions established from the inside network have to be allowed by the firewall.
Interfaces and vlans default configuration is provided below. The default vlan security levels
have been manually added in the picture.
READ NEXT :
Download Cisco Packet Tracer 8.2.2 & GNS3
2024-04-09
Lab 20 - CBAC trafic Inspection with ISR router
2024-02-13
2023-12-09
2023-08-15
2023-08-15
Lab Solution
The default ASA 5505 firewall behavior is to allow traffic to flow from interfaces with higher
security levels ("inside" interfaces) to interfaces with lower security levels ("outside" interfaces),
but to deny traffic on the other way. Access-lists must be configured to allow the traffic flow
from lower security levels to higher security levels.
Despite this default behavior, the simulated ASA 5505 available in Packet Tracer 6.1 does not
allow the laptop to establish a working TCP connection with the HTTP server located in the
outside network. The TCP SYN is allowed to flow from the laptop to the server, but the TCP
ACK is blocked by the firewall.
The following configuration has to be applied to the firewall to establish a working TCP session
between the laptop and the HTTP server. This configuration uses the Modular Policy Framework
available in Cisco PIX/ASA products :
Configure a class-map to define the traffic flow having to be inspected
Define a policy-map to define the particular policy having to be applied to this traffic
flow
Assign the policy to a specific interface (inside interface in the lab)
class-map HTTP
match default-inspection-traffic
!
policy-map TestPolicy
class HTTP
inspect http
!
service-policy TestPolicy interface inside