0% found this document useful (0 votes)
53 views62 pages

CN Lab File Rizwan

Uploaded by

Girish Maurya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views62 pages

CN Lab File Rizwan

Uploaded by

Girish Maurya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

Practical-1

AIM: Installation and Introduction to Cisco Packet Tracer

Introduction

Network simulation is one kind of method in the research of a computer network where a software
program forms the performance of a network by analyzing the relations between the various network
entities such as links, switches, routers, nodes, access points.

Cisco Packet Tracer is a network simulation tool developed by Cisco Systems, designed to help
individuals and organizations understand, configure, and troubleshoot network topologies in a virtual
environment. Ideal for students, educators, and networking professionals, Packet Tracer offers a hands-on
approach to learning networking concepts and practicing network configurations without the need for
physical equipment. This tool is integral to Cisco's Networking Academy curriculum and supports both
basic and advanced networking scenarios.

Packet Tracer allows users to build and test network designs using a variety of network devices such as
routers, switches, and end-user devices. It provides an interactive and visual approach to network
simulation, which enhances the learning experience and facilitates the development of practical
networking skills.

Other Network Simulators

While Cisco Packet Tracer is widely used, there are several other network simulation tools available that
offer different features and capabilities. Here is a brief overview of some popular alternatives:

Ns3

This type of simulator is mainly designed for the purpose of education as well as research. When compared
with the Ns2 type, it uses Python to work in a better way because of the low level of abstraction. The
modules of Ns3 include protocols and network devices, written in the languages of C++, Python.

Netki
Netki is open-source software that uses User-mode Linux. This simulator is used whenever there is a need
to form a networking environment with small endeavors. It is a simulation tool based on the command
line. It is also used to create a total network over a single PC through exploiting VN (virtual network)
devices. It is designed to help network engineers and administrators test and validate DNS records,
troubleshoot connectivity issues, and ensure that network configurations are correctly applied.

Marionnet

Marionnet/Virtual Network Laboratory is utilized as an educational tool because of its smart Graphical
user interface. By using this, a complex network can be defined by the user on a host computer.

1 Rizwan (16) IT-2


069150031222
OPNET

It is used in research & development to provide whole flexibility to study regarding communication
networks, protocols, and applications. When it includes both programming environment and GUI, then it
provides a platform for the user to form the network when they require it.

Installing Packet Tracer on Mac


Follow the bellow steps to install Packet Tracer on Mac:

Step 1: Visit the website below


https://learningnetwork.cisco.com/s/packet-tracer-alternative-lab-solutions

Step 2: Click on the Download button and it redirect you to netacad.


Step 3: Press the login button and select log in option.
Step 4: Next screen will appear, click on the sign-up option or login with credentials.

OR

2 Rizwan (16) IT-2


069150031222
Step 4: After Login go this website for download
https://www.netacad.com/resources/lab-downloads?courseLang=en-US

Step 5: Scroll down, now click on Resources and choose MacOS option and
Downloading will start automatically.

Step 6: Check for the executable file in your system and run it.

3 Rizwan (16) IT-2


069150031222
Step 7: Next Screen is of License Agreement so Click on continue.

Step 8: Click on install and enter Admin Password.

4 Rizwan (16) IT-2


069150031222
Step 9: After enter the password then press enter to ok.

Step 10: Click on the continue and finally installed on your system.

Step 11: An icon is created in the launchpad or Application Folder in finder and
Click icon to initialize.

Step 12: After initialization it ask to sign in then choose Cisco Network Academy option.

5 Rizwan (16) IT-2


069150031222
Step 13: Enter the credentials which we created before the download and
Tick the remember me then Login.

Step 14: Now Finally, the interface is ready to use.

----------END----------
6 Rizwan (16) IT-2
069150031222
Practical-2

AIM: Using Cisco Packet Tracer connect two PC’s using appropriate network wire using static IP
configuration.

THEORY:

IP Address:
An IP (Internet Protocol) address is a unique numerical identifier assigned to each device connected to a
network that uses the Internet Protocol for communication. The IP addresses serves two primary purposes:
identification of the host or network interface, and location addressing.

Static IP configuration:
A static IP address is a 32- bit number assigned to a computer as an address on the internet. This number
is in the form of a dotted quad and is typically provided by an internet service provider (ISP).

The RJ-45 connector (Registered Jack 45) is a widely used standard connector for networking, primarily
with Ethernet cables. It is used in both residential and commercial networks to connect computers, network
switches, routers, and other network devices. It is a rectangular plug with eight pins or contacts that align
with the eight wires in an Ethernet cable. Straight through and crossover are two types of terminating
cable conductors in the RJ45 connector Crossover cables are twisted-pair cables that are used to connect
the same devices in LANs. A PC to a PC for instance will be connected using a crossover cable whereas
a PC will be connected to a router using a straight-through cable.

Crossover cable is defined by the fact that its ends are configured into jacks and connectors as
per different wiring standards. If one end of the cable is configured according to the T568A standard, the
other end will be configured according to the T568B standard.

TOPOLOGY:

7 Rizwan (16) IT-2


069150031222
STEPS TO DO SIMIULATION:

Follow the below the steps to initiate the setup connection:

Step 1: Launch the Cisco Packet Tracer from Applications.

Step 2: From the bottom toolbar, click on ‘End Devices’ and select ‘PC’ and then click on the
screen (for two PC’s do this step twice).

This is how it will appear on the screen.

8 Rizwan (16) IT-2


069150031222
Step 3: Now to connect the PC’s, we require a wire, we use cross-over wire to connect similar devices.
Select Connections from the bottom toolbar, and select cross-over wire (that is the fourth wire).

Step 4: After selecting the wire click on the computer on the screen (here PC0) and select
FastEthernet0.

Then, drag the wire to the other pc (here PC1) and do the same.

Step 5: Now, we will assign the IP address to both the PCs (PC0 & PC1). Click on PC0. A dialog box
will appear on the screen, select Desktop and then select IP configuration.

9 Rizwan (16) IT-2


069150031222
Now in IP Address, write 192.168.1.2, Subnet mask will be 255.255.255.0. Similarly, assign
192.168.1.2 to PC1.

From the Secondary Toolbar at the top, select ‘Add sample PDU’ that is the second last icon. Now click
on PC0 and then PC1.

10 Rizwan (16) IT-2


069150031222
Now you can see the massage being transferred.

Now if in Realtime box- PDU list window it shows successful, that means all the connections
are correct and the data transfer is successful

Now go to desktop menu and select Command Prompt

11 Rizwan (16) IT-2


069150031222
COMMANDS TO SHOW CONNECTIVITY:

PING & IPCONFIG

----------END----------
12 Rizwan (16) IT-2
069150031222
Practical-3

AIM: Create a basic network of one server and two computers using appropriate network wire using
Dynamic IP address allocation. Verify the connectivity.

THEORY:

A local area network (LAN) allows multiple devices to communicate and share resources. In a basic
network setup with one server and two computers, the server often acts as a central point to manage and
allocate IP addresses dynamically using the Dynamic Host Configuration Protocol (DHCP). The network
requires proper configuration, including the use of appropriate network cables (e.g., Ethernet cables) and
devices (e.g., switches or routers).

Network Components
The following components will be used in Cisco Packet Tracer:

1. Server: A device that provides network services, such as DHCP, to other network devices (clients).

2. Computers (PCs): End devices that connect to the network and receive an IP address dynamically from
the DHCP server.

3. Switch: A device used to connect multiple devices on the same network. It forwards data to the correct
device using MAC addresses.

4. Copper Straight-Through Cables: In Packet Tracer, these cables are used to connect devices such as
PCs and servers to the switch.

Dynamic Host Configuration Protocol (DHCP)


It is used to dynamically allocate IP addresses to devices on the network. The server is configured as the
DHCP server, which means it will automatically assign IP addresses to the connected computers from a
predefined range.

IP Address Allocation (Dynamic Allocation using DHCP)


For assigning IP addresses dynamically we use the DHCP protocol Dynamic Host Configuration Protocol
(DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP
address and other related configuration information such as the subnet mask and default gateway. The
DHCP server maintains a pool of IP addresses and leases an address to any DHCP-enabled client when it
starts up on the network. Because the IP addresses are dynamic (leased) rather than static (permanently
assigned), addresses no longer in use are automatically returned to the pool for reallocation.15

13 Rizwan (16) IT-2


069150031222
How DHCP Works:

1. Discovery: When a computer (client) connects to the network, it sends a DHCP Discover message to
find a DHCP server.

2. Offer: The DHCP server responds with a DHCP Offer, proposing an IP address for the client.

3. Request: The client sends a DHCP Request, accepting the offered IP address.

4. Acknowledge: The DHCP server sends a DHCP Acknowledge message, confirming the IP address
assignment. The IP address allocation is temporary and referred to as a lease. When the lease expires, the
client must request a new IP address or renew the existing one.

Benefits of DHCP

1. Reliable IP address configuration: DHCP minimizes configuration errors caused by manual IP


address configuration, such as typographical errors, or address conflicts caused by the assignment of an
IP address to more than one computer at the same time.

2. Reduced network administration: DHCP includes the following features to reduce network
administration DHCP runs at the application layer of the Transmission Control Protocol/IP (TCP/IP) stack
to dynamically assign IP addresses to DHCP clients and to allocate TCP/IP configuration information to
DHCP clients. This includes subnet mask information, default gateway IP addresses and domain name
system (DNS)addresses.

TOPOLOGY:

14 Rizwan (16) IT-2


069150031222
STEPS TO DO SIMULATION:

Step 1: Go to the End Devices section at the bottom of the interface.

Drag and drop one ‘Server’ and two ‘PCs’ onto the workspace.

Step 2: Go to the Network Devices section, then the Switches tab.

Drag and drop a PT-Switch onto the workspace.

15 Rizwan (16) IT-2


069150031222
Step 3: Use the Copper Straight-Through Cable to connect ‘PC1’ to the ‘Switch’
.

Similarly use the Copper Straight-Through Cable to connect ‘PC2’ to the ‘Switch’.

Step 4: Click on the Server and go to the Desktop tab.

Open IP Configuration
Set the static IP address as 10.0.0.1, Default Gateway as 10.0.0.2 and DNS Server as 10.0.0.1

16 Rizwan (16) IT-2


069150031222
Step 6: Go to the Services tab on the Server. Click on DHCP from the left menu and turn the DHCP
service On

Set the Default Gateway as 10.0.0.2, DNS Server as 10.0.0.1 and the Start IP Address as 10.0.0.3
Click Save to apply the configuration.

Step 7: Click on PC0 and go to the Desktop tab.

17 Rizwan (16) IT-2


069150031222
Open IP Configuration.
Set the IP configuration to DHCP. The PC will automatically request and receive an IP address from the
server. In this is case it is 10.0.0.4

Similarly do with PC1 (in this case it is 10.0.0.5)

18 Rizwan (16) IT-2


069150031222
Step 9: From the Secondary Toolbar at the top, select ‘Add sample PDU’ that is the second last icon.
1. Now click on PC0 and then the Server0.
2. Now click on PC0 and then PC1.
Check the Realtime tab

COMMANDS TO SHOW CONNECTIVITY:


1. IPCONFIG
Click on the PC0 and go to the Desktop tab and click on Command Prompt.

19 Rizwan (16) IT-2


069150031222
Click on the PC1 and go to the Desktop tab and click on Command Prompt.

2. PING
On PC0 open command prompt and test the connectivity with PC1 and Server0

----------END----------
20 Rizwan (16) IT-2
069150031222
Practical-4

AIM: Create a basic network of one server, two computers and two mobile/movable devices using
appropriate network wire and verify connectivity.

THEORY:

A wireless network is a computer network that uses wireless data connections between network nodes.
Wireless networking allows homes, telecommunications networks and business installations to avoid the
costly process of introducing cables into a building, or as a connection between various equipment
locations.
A wireless network is a system that uses radio waves to transmit and receive data between devices without
the need for physical cables. It allows devices like smartphones, laptops, and tablets to connect to the
internet or communicate with each other wirelessly, using components such as wireless routers and access
points. By leveraging standards like Wi-Fi, a wireless network provides flexibility and mobility, enabling
users to move freely within the network's range while maintaining connectivity.
A wireless access point (WAP) is a device that allows wireless devices to connect to a wired network using
Wi-Fi or other wireless communication standards. It acts as a bridge between the wired network (like
Ethernet) and the wireless devices (like laptops, smartphones, or tablets).
DHCP, or Dynamic Host Configuration Protocol, is a network protocol used to automatically assign IP
addresses and other network configuration parameters to devices on a network. In a wireless network,
DHCP simplifies the process of connecting devices by managing the IP address allocation

TOPOLOGY:

21 Rizwan (16) IT-2


069150031222
STEPS TO DO SIMULATION:
Follow the below steps to initiate the setup for the connection.

STEP 1: From the bottom toolbar, select two PC’s, one mobile, one laptop and one home wireless
router.

STEP 2: After clicking on the PC0, we click on physical and drag and drop the WMP300N MODULE
after switching the PC off. After the module has been dropped, we switch it on.

22 Rizwan (16) IT-2


069150031222
STEP 3: After clicking on desktop, we see that already IP address has been assigned to pc.

STEP 4: Now on PC0 and PC1, firstly switched off the light and then WMP300N and again switch on
the CPU, both the pc will connect to home router wireless.

23 Rizwan (16) IT-2


069150031222
STEP 5: Now, switch off the laptop and connect PT-LAPTOP-NM-1W and switch on the laptop.

STEP 6: Now, switch off the server and connect WPM300N in server to it wireless connectivity,
carefully switch on the server.

24 Rizwan (16) IT-2


069150031222
STEP 7: We see the connection has been established between 2 pc, server, laptop and router.

STEP 8: Finally, the message will be delivered wirelessly.

25 Rizwan (16) IT-2


069150031222
COMMANDS TO SHOW CONNECTIVITY:

----------END----------
26 Rizwan (16) IT-2
069150031222
Practical-5

Aim: To Understand the operation of TELNET by accessing the router in a server room from a
PC in IT Office.

Theory:

Telnet is a network protocol that allows for remote communication with another computer over the internet
or a local area network (LAN). It was developed in the late 1960s and is used primarily for managing
remote devices, servers, or network equipment.

When you connect to a remote machine using Telnet, it enables a command-line interface (CLI) that gives
you control of that machine as if you were physically present at its terminal. Telnet uses Transmission
Control Protocol (TCP) and typically communicates over port 23.

However, Telnet does not encrypt data, including passwords, making it insecure for modern usage. As a
result, it has largely been replaced by more secure protocols like SSH (Secure Shell). Despite its security
shortcomings, Telnet is still used in certain network troubleshooting scenarios or for accessing older
systems that don't support more secure protocols.

TOPOLOGY:

STEPS TO DO SIMULATION:

Step 1: Bring one PC and one ISR4321 Router from the bottom to your screen and connect it
through copper straight through wire.

27 Rizwan (16) IT-2


069150031222
Step 2: Open the IP Configuration section in the PC 0 Tab, set the ipv4 192.168.1.2 or any and
192.168.1.1(Default Gateway) to get a screen like this.

Step 3: After that type the commands

Step 4: Now type these commands to active telnet service on the router.

28 Rizwan (16) IT-2


069150031222
COMMANDS TO SHOW CONNECTIVITY:

1. PING
On PC0 open command prompt and test the connectivity with PC0 and Router0.

2. TELNET
On PC0 open command prompt and type telnet with IP of router (192.168.1.1).

3. MESSAGE

Now Drag the message icon form top tool bar for PC0 to Router0 similarly Router0 to PC0.

------------END----------
29 Rizwan (16) IT-2
069150031222
Practical-6

Aim: To implement the Static Routing using CISCO packet tracer.

Theory: In networking, routing refers to the process of selecting paths in a network along which
to send data packets. Static routing is a type of network routing where the network administrator
manually configures routes in the routing table. Unlike dynamic routing, static routes don't adjust
automatically in response to network topology changes. Static routing is generally used in small
networks or in scenarios where the network environment is stable, and the administrator has full
control over the paths.

In CISCO Packet Tracer, a network simulation tool, static routing can be implemented to direct
data packets between different routers based on manually set routes. This method ensures
predictability and minimal router overhead, but it requires more manual intervention when network
changes occur.

TOPOLOGY: (4 PCs, 2 Switches, 2 Routers).

30 Rizwan (16) IT-2


069150031222
STEP TO DO SIMULATIONS:

Step 1: Select Router1941

Two units

Step 2: Select Switch2950-24 of two units

Step 3: Select four PCs and establish connection using copper cross over cable with Fast
Ethernet ports.

After the connections with all devices, we would have something like below

31 Rizwan (16) IT-2


069150031222
Step 4: Now we just mark IP addresses of every device for remembering due it’s complexity

Step 5: Go to PC0 IP Configuration tab & input the Static IP and Default Gateway (192.168.1.2)

Step 6: Go to the PC1 and do the same process with same Default Gateway.

32 Rizwan (16) IT-2


069150031222
Step 7: Go to the PC2 & PC3, statically assign IP Addresses and Default Gateway (192.168.2.2)

Step 8: Go to Router0 Config tab then click on GigabitEthernet0/0 and assign IP Address and
subnet mask, mark the Port Status ON

Step 9: Repeat the steps with GigabitEthernet0/1 and mark the Port Status ON

33 Rizwan (16) IT-2


069150031222
Step 10: Go to Router0 Config tab then click on GigabitEthernet0/0 and assign IP Address and
subnet mask, mark the Port Status ON and similarly do with GigabitEthernet0/1.

Step 11: Now we have to set Static Routing in the routers and network address.

34 Rizwan (16) IT-2


069150031222
Step 12: Go to the Router0 assign network address, subnet mask, Next Hop.

Step 13: Go to the Router1 assign network address, subnet mask, Next Hop.

35 Rizwan (16) IT-2


069150031222
TO SHOW CONNECTIVITY

1. PING
On PC1 open command prompt and test the connectivity with PC1 and PC2.

On PC2 open command prompt and test the connectivity with PC2 and PC1.

2. MESSAGE

Now Drag the message icon form top tool bar. (Note: Sometime Network take time to fully active)

----------END----------

36 Rizwan (16) IT-2


069150031222
Practical-7

Aim: To implement the DNS, Email services, FTP and Web server in the network using CISCO
Packet Tracer.

Theory: In Cisco Packet Tracer, implementing network services like DNS, Email, FTP, and Web
servers allows for simulating real-world networking scenarios.

1. DNS (Domain Name System) resolves domain names to IP addresses, enabling easier
navigation on the network. In Packet Tracer, a DNS server is configured to map domain names to
the IPs of other servers in the network.

2. Web Server serves webpages over HTTP/HTTPS. Configuring a Web server lets client
devices access the server's content via a browser.

3. FTP (File Transfer Protocol) allows file sharing between clients and the server. An FTP
server configuration includes user authentication for secure file access.

4. Email Server enables sending and receiving emails using SMTP (sending) and POP3
(receiving) protocols. Setting up user accounts on the Email server allows for communication
within the network.

These setups allow network management, testing, and troubleshooting in a controlled


environment, making Packet Tracer an excellent tool for practical learning in networking.

Topology:

37 Rizwan (16) IT-2


069150031222
STEPS TO DO SIMULATIONS:

Step 1: Setup the Network by Adding required devices (2Nos PCs, 1Nos Router, 2Nos Switches, 4Nos
Servers).

Step 2: Add Router 2911

Step 3: Add Switch 2950t-24 and Servers PT and PCs

Step 4: Connect Via respective wire or just auto connect (Red-Orange Lighting Icon)

Step 5: After Connecting all the devices with topology.

38 Rizwan (16) IT-2


069150031222
Step 6: Now just write the IPs and rename of every devices (just for remembering).

Step 7: Now assign IP of router 192.168.10.1

Step 8: Go to the DNS Server then IP Configuration Tab and staticaly assign IPv4 192.168.10.1, same to
DNS server and Default gatway will be the IP address of router which set earliar.

39 Rizwan (16) IT-2


069150031222
Step 9: Go to Command Prompt of DNS server check the connectivity with Router.

Step 10: Staticaly assign IP to Email Server(192.168.10.3)

Step 11: Staticaly assign IP to FTP Server (192.168.10.4)

Step 12: Staticaly assign IP to Web Server(192.168.10.5)

40 Rizwan (16) IT-2


069150031222
Step 13: Setup DNS Server, go to Services > DNS and Select ON, Add entries for each server (FTP,
Email, Web) by entering their domain names (www.rizwan.com) and the respective IP addresses.

Step 14: Select the Web Server and click Services > HTTP.
Enable HTTP Service and configure the home page content if required,enable HTTPS as well.

41 Rizwan (16) IT-2


069150031222
Step 15: Select the FTP Server and click Services > FTP.
Turn on FTP service and add user accounts for authentication.

Step 16: Set Up Email Server


Select the Email Server and click Services > EMAIL.
Enable SMTP and POP3 services.
Create user accounts with email addresses for sending and receiving messages.

42 Rizwan (16) IT-2


069150031222
TEST SERVICES:

1. DNS: Open the command prompt on a PC, and ping the domain name of each server (e.g., ping
www.rizwan.com) to check if DNS is resolving correctly.

2. Web: Open a web browser on a client PC1.

type the Web server's domain name(www.rizwan.com)

43 Rizwan (16) IT-2


069150031222
3. FTP: Open an FTP client or use the command prompt (ftp command) to connect to the FTP server.

4. Email: Use an email client or configure Packet Tracer’s built-in email client to test sending and
receiving emails.

Now to go every PC0( for Rizwan) and Configure the email ( such as name, email address, server and
logon information which set earliar in the email server)

44 Rizwan (16) IT-2


069150031222
Now to go every PC1( for Rohit) and Configure the email ( such as name, email address, server and
logon information which set earliar in the email server)

Now to go every PC2( for Sumit) and Configure the email ( such as name, email address, server and logon information
which set earliar in the email server)

45 Rizwan (16) IT-2


069150031222
Go to Compose in PC0

On the bottom will see success message with other important details( in this sending mail From PC0 to
PC1)

Go to the PC1 and Choose receive there will see mail from [email protected](PC0)

46 Rizwan (16) IT-2


069150031222
Now choose reply there we able to reply back to (from PC1 to PC0)

Go to PC0 choose receive

-----------END----------

47 Rizwan (16) IT-2


069150031222
Practical-8

Aim: To implement subnetting in small networks using CISCO Packet Tracer.

Theory: Subnetting is a technique used in networking to divide a large IP network into smaller, more
manageable subnetworks (subnets). Each subnet can function as an independent network, but they all
share the original network’s IP address range.
Subnetting allows organizations to:
• Efficiently use IP addresses.
• Enhance network security by segmenting networks.
• Reduce network congestion.
• Make management easier by isolating different departments or groups.

IP Addresses and Subnet Masks


An IP address is composed of two parts:
1. Network Portion: Identifies the specific network.
2. Host Portion: Identifies the specific device (host) within that network.

A subnet mask determines which part of the IP address is designated for the network and which part for
the hosts. For example, in a /24 subnet mask (255.255.255.0), the first 24 bits are used for the network,
leaving the last 8 bits for host addresses.

Topology:

48 Rizwan (16) IT-2


069150031222
STEPS TO DO SIMULATIONS:

Step 1: After establishing the connections with all devices, go to Router0 config tab >Interface
GigabitEthernet0/0 assign 192.168.10.1 & subnet mask 255.255.255.128, turn Port Status>ON.

Step 2: Go to Router0 config tab >Interface GigabitEthernet0/1 assign 192.168.10.129 & subnet mask
255.255.255.128, turn Port Status>ON.

49 Rizwan (16) IT-2


069150031222
Step 3: Go to PC0 IP Configuration assign the IP 192.168.10.2 & Default Gateway 192.168.10.1 (g0/0)

Step 4: Go to PC1 IP Configuration assign the IP 192.168.10.3 & Default Gateway 192.168.10.1 (g0/0)

50 Rizwan (16) IT-2


069150031222
Step 5: Go to PC2 IP Configuration assign the IP 192.168.10.130 & Default Gateway 192.168.10.129
(g0/1)

Step 6: Go to PC3 IP Configuration assign the IP 192.168.10.131 & Default Gateway 192.168.10.129
(g0/1)

51 Rizwan (16) IT-2


069150031222
TO CHECK CONNECTIVITY:

PING:

Ping PC1 to PC2

Ping PC3 to PC0

-------------END------------
52 Rizwan (16) IT-2
069150031222
Practical-9

Aim: To implement the Static Network Address Translation (NAT) using CISCO Packet Tracer.

Theory: Network Address Translation (NAT) is a method used in networking to map private IP
addresses within a local network to a public IP address before data is sent to external networks.
NAT is essential because IPv4 addresses are limited, and NAT allows multiple devices on a private
network to share a single public IP address.

Why NAT is Important


1. Conservation of IP Addresses: NAT allows multiple devices on a private network to
access the Internet using a single public IP address.
2. Enhanced Security: NAT hides the internal IP addresses of devices within the local
network, making it harder for external entities to directly access them.
3. Flexible Addressing: Organizations can use private IP ranges internally, simplifying IP
address management without affecting global networks.

Types of NAT
There are three main types of NAT, each serving different needs:
1. Static NAT
• Maps a single private IP address to a single public IP address on a one-to-one basis.
• Useful when a specific device (like a web server) needs to be accessed from the outside
network using a consistent public IP address.
2. Dynamic NAT
• Maps a private IP address to an available public IP address from a pool of addresses.
• Unlike static NAT, it doesn’t provide a fixed public IP for each device. Instead, it assigns
an IP address from the available pool dynamically when needed.
• Typically used when there are more internal devices than available public IP addresses, but
still require unique addresses for each connection.
3. Port Address Translation (PAT), also known as Overloading
• A variant of dynamic NAT that maps multiple private IP addresses to a single public IP
address by differentiating each connection with a unique port number.
• This is the most commonly used type of NAT, as it enables many devices to share a single
public IP, conserving IP address resources while still allowing individual connections.

NAT in Action
When a device in a private network sends data to the internet, NAT changes the private IP address
of the device to a public IP address. This allows the data to pass through the router and reach the
external network. When the external network sends data back, NAT translates the public IP address
back to the device's private IP address, ensuring that the data reaches the intended device within
the network.

53 Rizwan (16) IT-2


069150031222
Topology:

Steps to Simulate:

Step 1: Drag the devices (2 router-PT, 2 switch-PT, 2 PCs, 1 Server-PT) according to the
topology and connect them via respective wires.

Step 2: Assign the IP to each End Devices.

54 Rizwan (16) IT-2


069150031222
Step 3: Assign IPs to Router0 Interfaces f0/0 and Se2/0.

Step 4: Assign IPs to Router1 Interfaces f0/0 and Se2/0.

55 Rizwan (16) IT-2


069150031222
Step 5: Now type these commands in CLI of Router0.

Step 6: Now type these commands in CLI of Router1

56 Rizwan (16) IT-2


069150031222
CONNECTIVITY CHECK:

Ping:

Ping PC0 to PC2 (Global IP / outside network

NAT Translations:

Network Address Transla>ons of Router0

Network Address Transla>ons of Router1

----------END----------

57 Rizwan (16) IT-2


069150031222
Practical-10

Aim: Conducting a Network capture and Monitoring with Wireshark Simulation Tool.

Theory: Wireshark is an open-source network protocol analyzer used for monitoring and
analyzing network traffic. It captures data packets traveling over a network, displaying them in
real time and allowing users to analyze traffic at a very detailed level. Wireshark is commonly used
by network administrators, cybersecurity professionals, and IT support for tasks such as network
troubleshooting, security analysis, performance monitoring, and protocol development.
Key Concepts of Network Capture and Monitoring
1. Packet Capture: Capturing involves intercepting packets as they travel across the
network. This data capture provides insights into communication between devices, such as
the type of traffic, sources, and destinations.
2. Packet Analysis: Wireshark allows users to analyze the captured data, displaying detailed
packet information. This analysis helps diagnose network problems, monitor network
activity, or even detect security threats.
3. Protocol Analysis: Wireshark supports over a thousand network protocols, such as IP, TCP,
UDP, HTTP, DNS, and SSL. This protocol support makes it versatile for analyzing various
types of network traffic.
Key Features of Wireshark
• Real-Time Monitoring: Wireshark captures and displays network packets in real time,
allowing immediate insight into network activity.
• Filtering Capabilities: Wireshark provides powerful filtering options to focus on specific
traffic. Users can set capture filters to limit the initial capture or apply display filters post-
capture for analysis.
• Detailed Packet View: Each captured packet can be expanded to show details about its
layers, including the Ethernet, IP, TCP/UDP, and application layers.
• Decryption Support: Wireshark supports decryption for protocols like SSL/TLS if proper
keys are provided, enabling more in-depth analysis of encrypted traffic.
Components of Wireshark's Interface
1. Packet List Pane: Displays captured packets in sequence, showing columns such as packet
number, time, source and destination IPs, protocol, length, and additional info.
2. Packet Details Pane: Provides an in-depth view of the selected packet, breaking down the
packet by protocol layers and fields.
3. Packet Bytes Pane: Shows the raw data (in hexadecimal) of the selected packet.
How Wireshark Captures and Analyzes Packets
1. Interface Selection: When Wireshark starts, it lists all available network interfaces. The
user selects an interface to begin capturing packets.
2. Packet Filtering: Capture filters are applied to limit what Wireshark captures. After
capture, display filters help narrow down the data displayed for analysis.
3. Protocol Dissection: Wireshark analyzes each packet based on its protocols, dividing
packets into layers, which include the Data Link, Network, Transport, and Application
layers.
4. Packet Decoding: Wireshark decodes each packet, interpreting the data and displaying
meaningful information for each field, allowing in-depth analysis of protocols and traffic.

58 Rizwan (16) IT-2


069150031222
Steps to conduct a network capture and monitor traffic using Wireshark:

Step 1: Download and Install: Download Wireshark


from https://2.na.dl.wireshark.org/osx/Wireshark%204.4.1%20Arm%2064.dmg and install it.

Step 2: Open Wireshark: Once installed, open the tool, and you’ll see a list of network interfaces
available for capturing.

59 Rizwan (16) IT-2


069150031222
Step 3: Select a Network Interface for Capture Wi-Fi: en0
Click on the Start Capture button (blue shark fin icon) to begin capturing packets.

Step 4: Live Traffic Monitoring: As soon as you start, Wireshark will display packets being
transmitted and received on the selected interface in real time.

Step 5: Now go some http site such as home router configuration page (192.168.1.1)

60 Rizwan (16) IT-2


069150031222
Step 6: Provide details in Username, Password and ValidateCode.

Step 6: After this go Wireshark>Capture and Click on the Stop Capture button (red square icon)
to end capturing packets.

Step 7: Applying Filters for Specific Traffic

61 Rizwan (16) IT-2


069150031222
Step 8: Analyzing Packets
Packet Details: Click on a packet to view its details in the pane below. Wireshark breaks down
each packet by layers, such as Ethernet, IP, TCP/UDP, and application layer protocols.
Packet Bytes: The bottom pane shows the raw hexadecimal representation of the packet.

Step 9: On the left bottom window, we find HTML form (For capture sensitive info password,
cards numbers etc.) in this tab whatever we have provided info on router site that was not
encrypted that is why it show as plain text otherwise it will show as some encrypted values.

-----------END-----------

62 Rizwan (16) IT-2


069150031222

You might also like