0% found this document useful (0 votes)
7 views114 pages

Cybersecond

The document outlines the configuration and management of VLANs, VTP, EtherChannel, and inter-VLAN routing in a Cisco network environment. It includes step-by-step tasks for creating VLANs, assigning IP addresses, and configuring trunk ports, along with verification commands. Additionally, it covers Router on a Stick (ROAS) for inter-VLAN communication using a router and a Layer 2 switch.

Uploaded by

Neel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views114 pages

Cybersecond

The document outlines the configuration and management of VLANs, VTP, EtherChannel, and inter-VLAN routing in a Cisco network environment. It includes step-by-step tasks for creating VLANs, assigning IP addresses, and configuring trunk ports, along with verification commands. Additionally, it covers Router on a Stick (ROAS) for inter-VLAN communication using a router and a Layer 2 switch.

Uploaded by

Neel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 114

CISCO CERTIFIED NETWORK ASSOCIATE

Contents
VLAN ................................................................................................................................................................... 2
VTP...................................................................................................................................................................... 6
EtherChannel ..................................................................................................................................................... 10
INTER VLAN ROUTING (IVR) ................................................................................................................................ 14
ROUTER ON STICK (ROAS) .................................................................................................................................. 16
SPANNING TREE PROTOCOL (STP)....................................................................................................................... 20
ROUTING ........................................................................................................................................................... 26
STATIC ROUTING ................................................................................................................................................ 26
DEFAULT ROUTING ............................................................................................................................................ 31
ROUTING INFORMATION PROTOCOL (RIP) .......................................................................................................... 32
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP) ............................................................................ 37
OPEN SHORTEST PATH FIRST (OSPF) ................................................................................................................... 41
DHCP and DNS .................................................................................................................................................. 48
NETWORK TIME PROTOCOL (NTP) ...................................................................................................................... 53
TELNET, SSH, HTTP, HTTPS .................................................................................................................................. 54
ACCESS-CONTROL LIST (ACL)............................................................................................................................... 58
NETWORK ADDRESS TRANSALATION (NAT) & ..................................................................................................... 63
PORT ADDRESS TRANSLATION (PAT)................................................................................................................... 63
ACL AND NAT ..................................................................................................................................................... 68
HOW TO ADD YOUR LAPTOP/PC TO EVE-NG LAB SETUP ...................................................................................... 74
SYSLOG .............................................................................................................................................................. 77
CDP ................................................................................................................................................................... 80
LLDP .................................................................................................................................................................. 81
PASSWORD ASSIGNMENT .................................................................................................................................. 82
PASSWORD RECOVERY ....................................................................................................................................... 85
IOS UPGRADATION ............................................................................................................................................ 87
L2 SECURITY ....................................................................................................................................................... 90
IPv6 ................................................................................................................................................................. 111

1
AUTHOR:- KUSHAL H. KORDE
VLAN
VLAN stands for virtual local area network. VLAN is a technology we use for the purpose of
Broadcast isolation or segregation of LAN .
Generally what happen in company there is so many department , for that each and every
department require pc and to connect that pc we require Switch .If we buy different switch
for each department the cost of IT infra will going to increase ,to save that cost company
implement vlan on their switch.so here we go.

Task-1.1 Create VLAN


VLAN 10 sales
VLAN 20 mrkt
VLAN 30 finance
VLAN 40 IT
Task-1.2 IP Range

VLAN 10 - 192.168.10.0/27 For sales department require IP is 30


VLAN 20 - 192.168.20.0/26 For marketing department require IP is 42
VLAN 30 - 192.168.30.0/27 For finance department require IP is 25
VLAN 40 - 192.168.40.0/28 For IT department require IP is 14
Task-1.3 Assign VLAN to the respected port as per diagram & assign IP to the pc

2
AUTHOR:- KUSHAL H. KORDE
SOLUTION
So, start first with the switch
Switch> enable
Switch#configure terminal
Step 1:- Now we have to create VLAN
Switch(config)#vlan 10
Switch(config)#name sales
Switch(config)#exit
Switch(config)#vlan 20
Switch(config)#name mrkt
Switch(config)#exit
Switch(config)#Vlan 30
Switch(config)#name finance
Switch(config)#exit
Switch(config)#vlan 40
Switch(config)#name IT
Switch(config)#exit
Step 2 :- Assignment of VLAN
Now open interface and assign VLAN
Switch(config)#interface ethernet 0/0
Switch(config)#Switchport mode access
Switch(config)#Switchport access vlan 10
Switch(config)#Exit
Switch(config)#interface ethernet 0/1
Switch(config)#switchport mode access
Switch(config)#switchport access vlan 10
Switch(config)#exit
Switch(config)#interface ethernet 0/2
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 20
Switch(config)# exit
Switch(config)#interface ethernet 0/3
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 20
Switch(config)# exit

3
AUTHOR:- KUSHAL H. KORDE
Switch(config)#interface ethernet 1/0
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 30
Switch(config)# exit
Switch(config)#interface ethernet 1/1
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 30
Switch(config)# exit
Switch(config)#interface ethernet 1/2
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 30
Switch(config)# exit
Switch(config)#interface ethernet 1/3
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 40
Switch(config)# exit
Switch(config)#interface ethernet 2/0
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 40
Switch(config)# exit
Switch(config)#interface ethernet 2/1
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 40
Switch(config)# exit
Note- Assign IP to the respected VLAN Pc’s
VERIFICATION
Switch# show vlan

4
AUTHOR:- KUSHAL H. KORDE
Switch# Show running-config

5
AUTHOR:- KUSHAL H. KORDE
VTP
VTP stands for VLAN Trunking Protocol. why we use VTP? This is the important question we
generally face. So, in the company there were almost 30-40 switches more or less. As
engineer we need to configure each and every switch and if each switch has minimum 10
VLAN on it. It means 40 Switches x 10 VLAN per switch = 400 times you need create vlan.to
reduce this task and to make all switches manageable we configure VTP.
So here we go,

Task 2.1- Create VLAN on sw1


Task 2.2- Make interface trunk on sw1 eth0/0 and sw2 eth0/0 & eth0/1 , sw3 eth0/0
Task 2.3- Configure VTP mode, vtp domain, vtp password on all switches.
SOLUTION
Task 2.1
sw1(config)#vlan 10
sw1(config-vlan)#name sales
sw1(config-vlan)#exit
sw1(config)#vlan 20
sw1(config-vlan)#name mrkt
sw1(config-vlan)#exit
sw1(config)#vlan 30
sw1(config-vlan)#name IT
sw1(config-vlan)#exit
sw1(config)#vlan 40
sw1(config-vlan)#name DC
sw1(config-vlan)#exit

6
AUTHOR:- KUSHAL H. KORDE
Task 2.2
On switch 1
sw1(config)#interface ethernet0/0
sw1(config-if)#switchport trunk encapsulation dot1q
sw1(config-if)#switchport mode trunk
sw1(config-if)#exit
On switch 2
sw2(config)#interface ethernet0/0
sw2(config-if)#switchport trunk encapsulation dot1q
sw2(config-if)#switchport mode trunk
sw2(config-if)#exit
sw2(config)#interface ethernet0/1
sw2(config-if)#switchport trunk encapsulation dot1q
sw2(config-if)#switchport mode trunk
sw2(config-if)#exit
On switch 3
sw3(config)#interface ethernet0/0
sw3(config-if)#switchport trunk encapsulation dot1q
sw3(config-if)#switchport mode trunk
sw3(config-if)#exit
Task 2.3
sw1(config)#vtp mode server
Device mode already VTP Server for VLANS.
sw1(config)#vtp domain ccn.com
Changing VTP domain name from NULL to ccn.com
sw1(config)#vtp password ccn@123
Setting device VTP password to ccn@123
sw2(config)#vtp mode client
Setting device to VTP Client mode for VLANS.
sw2(config)#vtp domain ccn.com
Domain name already set to ccn.com.
sw2(config)#vtp password ccn@123
Setting device VTP password to ccn@123
sw3(config)#vtp mode client
Setting device to VTP Client mode for VLANS.
sw3(config)#vtp domain ccn.com
Domain name already set to ccn.com.
sw3(config)#vtp password ccn@123
Setting device VTP password to ccn@123

7
AUTHOR:- KUSHAL H. KORDE
VERIFICATION
Verification of #show vlan command
Sw1

Sw2

Sw3

8
AUTHOR:- KUSHAL H. KORDE
Verification of #show vtp status command
Sw1

Sw2

Sw3

Note – After VLAN data forwarding to each and every switch via vtp configuration we can
assign VLAN to switchports with the help of Step 2 :- Assignment of VLAN

9
AUTHOR:- KUSHAL H. KORDE
EtherChannel
EtherChannel is a technology use to Bundle/Aggregate the Link/Node/Port, with the use of
some protocols such as LACP or PAgP.
Why we use EtherChannel?
When we face lack of bandwidth with links then at that time we configure EtherChannel to
bundle the link and get combined speed. Like each interface is ethernet means 10MBPS of
each then, if we bundle 3 link at a time then the combine speed will be 300 MBPS

EtherChannel uses PAgP or LACP as a Negotiation Protocol

LINK AGGREGATION CONTROL PROTOCOL (LACP)


❖ LACP was made by IEEE and define with code of 802.3ad
❖ LACP is a Open Source and support all vendors in the market
❖ LACP adds up LACPDU to establish a etherchannel
❖ LACP has two modes
1. Active – enable LACP unconditionally
2. passive – enable LACP when LACP device is detected

PORT AGGREGATION CONTROL PROTOCOL (PAgP)


❖ PAgP was made by cisco.
❖ PAgP is a Cisco Proprietary Protocol. Hence, it only supports cisco devices
❖ PAgP has two modes
1. Desirable – enable PAgP unconditionally
2. Auto – enable PAgP when PAgP device is detected

So here we go,

10
AUTHOR:- KUSHAL H. KORDE
Task 3
Task 3.1 - Configure sw1 interface ethernet 0/0, 0/1, 0/2 for EtherChannel
Task 3.2 - Configure sw2 interface ethernet 0/0, 0/1, 0/2 for EtherChannel
Task 3.3 – Configure sw1 to sw2 link as a trunk

Solution,
Task 3.1
Sw1
sw1(config)#interface range ethernet 0/0-2
sw1(config)#channel-protocol lacp
sw1(config-if-range)#channel-group 1 mode active
Creating a port-channel interface Port-channel 1
sw1(config-if-range)#exit
Task 3.2
sw2
sw2(config)#interface range ethernet 0/0-2
sw1(config)#channel-protocol lacp
sw2(config-if-range)#channel-group 1 mode active
Creating a port-channel interface Port-channel 1
sw2(config-if-range)#exit
Task 3.3
Sw1
sw1(config)#interface range ethernet 0/0-2
sw1(config-if-range)#switchport trunk encapsulation dot1q
sw1(config-if-range)#switchport mode trunk
sw1(config-if-range)#exit
OR
sw1(config)#interface port-channel 1
sw1(config-if)#switchport trunk encapsulation dot1q
sw1(config-if)#switchport mode trunk
sw1(config-if)#exit

11
AUTHOR:- KUSHAL H. KORDE
sw2
sw2(config)#interface range ethernet 0/0-2
sw2(config-if-range)#switchport trunk encapsulation dot1q
sw2(config-if-range)#switchport mode trunk
sw2(config-if-range)#exit
VERIFICATION
Sw1

12
AUTHOR:- KUSHAL H. KORDE
sw2

13
AUTHOR:- KUSHAL H. KORDE
INTER VLAN ROUTING (IVR)
❖ Inter VLAN routing is method we use for the purpose of inter VLAN communication.
❖ Inter VLAN Routing is a new method to route between Multiple VLAN’s.
❖ Inter VAN Routing require one device which is L3 Switch.
So here we go,

TASK
Task 4.1 Configure switch with VLAN 10 – SALES & VLAN 20 – MRKT
Task 4.2 Implement VLAN on the respected interface as per Diagram
Task 4.3 Create Default Gateway for the VLAN 10 & VLAN 20 PC’s
Task 4.4 Assign IP to the PC
SOLUTION
Task 4.1 On switch,first we need to create vlan
Switch(config)#vlan 10
Switch(config-vlan)#name SALES
Switch(config-vlan)#exit
Switch(config)#vlan 20
Switch(config-vlan)#name MRKT
Switch(config-vlan)#exit

14
AUTHOR:- KUSHAL H. KORDE
Task 4.2 We need to apply vlan on interface
Switch(config)#interface range gigabitethernet0/0-1
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 10
Switch(config-if-range)#exit
Switch(config)#interface range gigabitethernet0/2-3
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 20
Switch(config-if-range)#exit
Task 4.3 Now, we need to configure interface vlan as a gateway for the PC’s
Switch(config)#interface vlan 10
Switch(config-if)#ip address 192.168.10.254 255.255.255.0
Switch(config-if)#no shutdown
Switch(config-if)#exit
Switch(config-if)#interface vlan 20
Switch(config-if)#ip address 192.168.20.254 255.255.255.0
Switch(config-if)#no shutdown
Switch(config-if)#exit
Note - Now IP given on interface VLAN, will become a gateway for the PC to communicate
over the VLAN.
VERIFICATION

15
AUTHOR:- KUSHAL H. KORDE
ROUTER ON STICK (ROAS)
❖ Router On Stick is also method to establish communication between two or more VLAN.
❖ Router On Stick configuration is old Method
❖ It requires 2 devices that is Router and L2 Switch
so here we go,

TASK
Task 5.1 Configure VLAN 10 – SALES & VLAN 20 – MRKT
TASK 5.2 Implement VLAN on respected interface
Task 5.3 Make interface Trunk which is connected to Router
Task 5.4 Create a gateway on Router
Task 5.5 Assign IP’s to the PC of respected VLAN
SOLUTION
Task 5.1 First we need to Create VLAN
SW(config)#vlan 10
SW(config-vlan)#name SALES
SW(config-vlan)#exit

16
AUTHOR:- KUSHAL H. KORDE
SW(config)#vlan 20
SW(config-vlan)#name MRKT
SW(config-vlan)#exit
Task 5.2 We need to Assign VLAN
SW(config)#interface range ethernet 0/1-2
SW(config-if-range)#switchport mode access
SW(config-if-range)#switchport access vlan 10
SW(config-if-range)#exit

SW(config)#interface range ethernet 0/3 , ethernet 1/0


SW(config-if-range)#switchport mode access
SW(config-if-range)#switchport access vlan 20
SW(config-if-range)#exit
Task 5.3 Now we have to create trunk
SW(config)#interface ethernet 0/0
SW(config-if)#switchport trunk encapsulation dot1q
SW(config-if)#switchport mode trunk
SW(config-if)#exit
Task 5.4 Now, configure router
R1(config)#interface ethernet0/0
R1(config-if)#no shutdown
R1(config-if)#exit

R1(config)#interface ethernet0/0.10
R1(config-subif)#encapsulation dot1q 10
R1(config-subif)#ip address 192.168.10.254 255.255.255.0
R1(config-subif)#no shutdown
R1(config-subif)#exit

R1(config)#interface ethernet0/0.20
R1(config-subif)#encapsulation dot1q 20
R1(config-subif)#ip address 192.168.20.254 255.255.255.0
R1(config-subif)#no shutdown
R1(config-subif)#exit

17
AUTHOR:- KUSHAL H. KORDE
VERIFICATION
On Router

On Switch

18
AUTHOR:- KUSHAL H. KORDE
METHOD 2

Creation of VLAN
SW(config)#vlan 10
SW(config-vlan)#name SALES
SW(config-vlan)#exit
SW(config)#vlan 20
SW(config-vlan)#name MRKT
SW(config-vlan)#exit
VLAN Assignment
SW(config)#interface range ethernet 0/2-3
SW(config-if-range)#switchport mode access
SW(config-if-range)#switchport access vlan 10
SW(config-if-range)#exit
SW(config)#interface range ethernet 1/0-1
SW(config-if-range)#switchport mode access
SW(config-if-range)#switchport access vlan 20
SW(config-if-range)#exit
Configure switch interface which is connected to the router
SW(config)#interface ethernet 0/0
SW(config-if)#switchport mode access
SW(config-if)#switchport access vlan 10
SW(config-if)#exit
SW(config)#interface ethernet 0/1
19
AUTHOR:- KUSHAL H. KORDE
SW(config-if)#switchport mode access
SW(config-if)#switchport access vlan 20
SW(config-if)#exit
Now, configure router
R1(config)#interface ethernet 0/0
R1(config-if)#ip address 192.168.10.254 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#interface ethernet 0/1
R1(config-if)#ip address 192.168.20.254 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#exit
NOTE:-In this method we are not configuring only one interface for multiple VLAN rather
we are configuring multiple interfaces for multiple VLAN .that’s why here we are not
configuring trunk interface.
VERIFICATION
On Switch

On Router

20
AUTHOR:- KUSHAL H. KORDE
SPANNING TREE PROTOCOL (STP)
Spanning tree is a loop prevention mechanism, generally used to stop broadcast storm in a
Switch based network topology.it uses election method to select a ROOT BRIDGE in a switch
network to have control over a switch network. if switch will able to choose a root bridge,
then all the traffic passes through that root bridge where, it uses
STEP-1 SELECTION OF ROOT BRIDGE
1.lowest priority
❖ Default priority of every cisco switch is 32,768
❖ Then it adds up a VLAN ID so default VLAN is 1, hence ultimate value become a
32,769 (32,768+1)
❖ So, the default priority of every switch is same hence it tie up this criteria ,then the next
criteria is
2.lowest MAC address
The first question is how to calculate lowest mac address
Here it is, MAC address is Hexadecimal value consist of numbers and alphabets
0 1 2 3 4 5 6 7 8 9 A B C D E F
HERE 0 IS LOWEST, THEN MOVE IT FORWARD TO F IS HIGHEST
NOTE:- IF LOWEST PRORITY HIT THEN ROOT BRIDGE SELECTED ON THE BASIS OF LOWEST
PRIORITY, IF THAT CRITERIA TIE UP THEN MOVE FORWARD TO LOWEST MAC ADDRESS.
STEP-2 SELECTION OF ROOT PORT
Root port get selected on the basis of port cost which is already assigned on interfaces
Default Port Cost of interface
INTERFACE TYPE PORT COST
ETHERNET (10MBPS) 100
FAST ETHERNET (100 MBPS) 19
1 GIGABIT ETHERNET (1 GBPS) 4
10 GIGABIT ETHERNET (10 GBPS) 2
Root port defines the nearest path to reach the destination
So, the rule is
Root port  designated port [RP=DP]
Designated port  root port or block port [DP=RP / DP=BP]
Root bridge has each port as designated port, and ports on other switches can be root port
or block port
21
AUTHOR:- KUSHAL H. KORDE
STEP -3 SELECTION OF BLOCK PORT
In the process of selection of block port switch uses a lowest priority and lowest MAC
address criteria again, the same criteria applied here as it is. If the lowest priority is equal,
then it move toward the lowest mac address.
TASK 6
Task 6.1 Verify the root bridge
Task 6.2 Change the root bridge
Task 6.3 Change the port cost
So, let’s start

In this picture
Sw-1 Will become a root bridge

22
AUTHOR:- KUSHAL H. KORDE
Now see switch 1 has all port ad designated port
Now, we are going to change root bridge
We going to plan switch 2 must be root bridge and if switch 2 fails in network switch 3 will
become a root bridge

In this switch 2 configuration we can clearly see eth 0/0 selected as root port cause the cost
to reach the root bridge is only 100. if switch chooses other route it will take 200 cost, to
reach the destination. (from switch 2 >switch 3 > switch 1= 200 cost)

23
AUTHOR:- KUSHAL H. KORDE
Same goes with switch 3

In this switch eth0/0 will become a root bridge as the cost is 100, whereas if switch chooses
a different path to reach the destination it will take more cost than usual (from switch 3 >
switch 2 > switch 1= 200 cost)
Now what if we dedicatedly want to change the root bridge role from switch 1 to switch 2
So, we play with switch priority first because we won’t change the mac address of the
switches.
SW-2(config)#spanning-tree vlan 1 root primary
We make switch 2 as root bridge by giving above command

As a result of that command switch 2 act as a root switch

24
AUTHOR:- KUSHAL H. KORDE
Now,
SW-3(config)#spanning-tree vlan 1 root secondary
By giving this above command we make switch 3 as a secondary root switch means if switch
2 fails as a root bridge. Then, switch 3 will become a root bridge.
Now how to change path cost

See, switch 3 has root port as eth 0/1 after changing the path cost. we make other port as a
root port
SW-3(config)#interface ethernet 0/0
SW-3(config-if)#spanning-tree cost 10
SW-3(config-if)#exit
By applying such command on switch 3 ethernet 0/0, switch 1 – ethernet 0/0 & 0/1, switch
2 ethernet 0/0 we create root port on switch 3 from 0/1 to 0/0

25
AUTHOR:- KUSHAL H. KORDE
ROUTING
Router is a device which we use for the purpose of routing. Now, there is a question what is
routing. routing means to route a data packet between networks .in layman language
routing means to show the path to the data packet.
here we go to the routing
routing has generally major two type
1. static routing
2. dynamic routing
STATIC ROUTING – In this method we as a network engineer, have to define each and every
route to the destination on every router till the destination.
DYNAMIC ROUTING – In this method we as a network engineer, have to only advertise the
network which is directly connected to router. Dynamic Routing has different types of
protocol, some of them are RIPv1 , RIPv2 , EIGRP , OSPF , ETC

STATIC ROUTING
LET’S START WITH THE STATIC ROUTING FIRST
TASK-7
Task 7.1 provide hostname accordingly
Task 7.2 Assign IP address to interface
Task 7.3 Do static routing, PC-1,2,3 should communicate withPC-4,5,6

IN THE ABOVE LAB CONFIGURE THE GIVEN TASK


26
AUTHOR:- KUSHAL H. KORDE
R1
Router(config)#hostname R1
R1(config)#interface ethernet 0/0
R1(config-if)#ip address 192.168.10.254 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#interface ethernet 0/2
R1(config-if)#ip address 20.21.21.1 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#exit
R2
Router(config)#hostname R2
R2(config)#interface ethernet 0/0
R2(config-if)#ip address 20.21.21.2 255.255.255.252
R2(config-if)#no shut
R2(config-if)#exit
R2(config)#interface ethernet 0/1
R2(config-if)#ip address 45.62.60.1 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface ethernet 0/2
R2(config-if)#ip address 16.15.1.1 255.255.255.252
R2(config-if)#no shut
R2(config-if)#exit
R3
Router(config)#hostname R3
R3(config)#interface ethernet 0/0
R3(config-if)#ip address 45.62.60.2 255.255.255.252
R3(config-if)#no shutdown
R3(config-if)#exit
R3(config)#interface ethernet 0/1
R3(config-if)#ip address 199.56.66.1 255.255.255.252
R3(config-if)#no shutdown
R3(config-if)#exit

27
AUTHOR:- KUSHAL H. KORDE
R4
Router(config)#hostname R4
R4(config)#interface ethernet 0/1
R4(config-if)#ip address 16.15.1.2 255.255.255.252
R4(config-if)#no shutdown
R4(config-if)#exit
R4(config)#interface ethernet 0/0
R4(config-if)#ip address 166.15.89.1 255.255.255.252
R4(config-if)#no shutdown
R4(config-if)#exit
R5
Router(config)#hostname R5
R5(config)#interface ethernet 0/0
R5(config-if)#ip address 199.56.66.2 255.255.255.252
R5(config-if)#no shutdown
R5(config-if)#exit
R5(config)#interface ethernet 0/1
R5(config-if)#ip address 166.15.89.2 255.255.255.252
R5(config-if)#no shutdown
R5(config-if)#exit
R5(config)#interface ethernet 0/2
R5(config-if)#ip address 20.21.22.1 255.255.255.224
R5(config-if)#no shutdown
R5(config-if)#exit
R6
Router(config)#hostname R6
R6(config)#interface ethernet 0/0
R6(config-if)#ip address 20.21.22.2 255.255.255.224
R6(config-if)#no shutdown
R6(config-if)#exit
R6(config)#interface ethernet 0/1
R6(config-if)#ip address 192.168.20.254 255.255.255.0
R6(config-if)#no shutdown
R6(config-if)#exit

28
AUTHOR:- KUSHAL H. KORDE
Now, we have done with initial configuration part that is IP’S to the interface and hostname
to router.
Well further we have to do is static routing. Let’s start with it.
In static routing we have to define path to reach the destination.
Command for static routing
IP ROUTE <….Dest Network Address…...> <……Dest Subnet Mask….> <Next hop ip
address>

Before starting with routing there is no route to the destination of 192.168.20.0 network.
so, we have to provide path for that network.
Start with R1,
R1(config)#ip route 192.168.20.0 255.255.255.0 20.21.21.2
Destination network address- 192.168.20.0
Destination subnet mask – 255.255.255.0
Next hop ip address – 20.21.21.2
After static routing command, there is an additional route start with “S”

Same thing we have to do with other routers, each router require path to reach the
destination.
R2
R2(config)#ip route 192.168.20.0 255.255.255.0 45.62.60.2

29
AUTHOR:- KUSHAL H. KORDE
R3
R3(config)#ip route 192.168.20.0 255.255.255.0 199.56.66.2
R5
R5(config)#ip route 192.168.20.0 255.255.255.0 20.21.22.2
We don’t need to configure R6 cause R6 already has route which is directly connected to it.
Represented with “C” in routing table.

When data came in the network of 192.168.20.0/24 then the PC gives back echo-reply to
the source device. Because we were trying to ping that network PC.
So, in this case source device is 192.168.10.1 in the network of 192.168.10.0/24, and to give
back a reply we don’t have return route to the 192.168.10.0/24 network. Now we need to
provide path to the destination network of 192.168.10.0/24.
R6
R6(config)#ip route 192.168.10.0 255.255.255.0 20.21.22.1
R5
R5(config)#ip route 192.168.10.0 255.255.255.0 166.15.89.1
R4
R4(config)#ip route 192.168.10.0 255.255.255.0 16.15.1.1
R2
R2(config)#ip route 192.168.10.0 255.255.255.0 20.21.21.1
Now we don’t need to provide path to the R1 for 192.168.10.0 network because that
network is directly connected to R1.
Now provide IP to pc and verify it by doing ping

Done with the static routing.

30
AUTHOR:- KUSHAL H. KORDE
DEFAULT ROUTING
we have done static routing here. now there is a concept called default routing which is a
part of static routing. Default routing basically forwarding data to some given IP and then
that data can be forwarded by the device which is holding a given IP with the help of their
routing table. when we do default routing on edge router we only create one default entry
rest of the work is done by other router. we use default routing entry when we connect
router to internet. And on internet there is a lot of networks which we can’t define so there
we use default entry to push all the data packets to particular IP which is belongs to ISP and
then ISP do the main routing stuff.
Considering the static routing lab, where R1 is companies edge router which is connected
with multiple networks.
R1
R1(config)#ip route 0.0.0.0 0.0.0.0 20.21.21.2
Destination network address- 0.0.0.0 (UNKNOWN)
Destination subnet mask – 0.0.0.0 (UNKNOWN)
Next hop ip address – 20.21.21.2
Here we are telling the router that we don’t know the path to reach the destination but
we are forwarding that data on IP 20.21.21.2. So,20.21.21.2 can forward the data with
their own routing table. Rest configuration is same.

31
AUTHOR:- KUSHAL H. KORDE
ROUTING INFORMATION PROTOCOL (RIP)
❖ Rip is a dynamic routing protocol
❖ Rip uses Bellman Ford Algorithm
❖ Rip supports max 15 hop count
❖ Rip has AD value of 120
❖ Rip has a periodic update timer of 30 sec
❖ Rip has flush timer of 240 sec out of which 180 sec is a hold down timer & 60 sec is path
update timer.
❖ Rip has two version- version 1(RIPv1) & version 2(RIPv2)
❖ Ripv1 uses broadcast address to send messages, ripv1 do not support authentication
❖ Ripv2 has multicast address – 224.0.0.9, ripv2 support authentication.
TASK 8
Task 8.1 Assign hostname to the devices
Task 8.2 IP address to interfaces & pc’s
Task 8.3 Configure Routing

FROM THE ABOVE GIVEN LAB ASSIGN IP ADDRESS ACCORDINGLING


R1-R2 200.1.61.0/24 R2-R7 200.1.17.0/24
R2-R3 200.1.15.0/24 R7-R8 200.1.78.0/24
R3-R4 200.1.54.0/24 R8-R9 200.1.89.0/24
R4-R10 200.1.41.0/24 R9-R4 200.1.94.0/24
R2-R5 200.1.12.0/24 R1 LAN 192.168.1.0/24
R5 -R6 200.1.23.0/24 R10 LAN 192.168.2.0/24
R6-R4 200.1.34.0/24 -- --
After Assigning Ip on The Interfaces, Let’s Move Further to The Routing
32
AUTHOR:- KUSHAL H. KORDE
R1
R1(config)#router rip
R1(config-router)#network 192.168.1.0
R1(config-router)#network 200.1.61.0
R1(config-router)#exit
Here, we only have to advertise the directly connected network on router.
R2
R2(config)#router rip
R2(config-router)#network 200.1.12.0
R2(config-router)#network 200.1.15.0
R2(config-router)#network 200.1.17.0
R2(config-router)#network 200.1.61.0
R2(config-router)#exit
Now, we go through R7 to verify how rip works
R7
R7(config)#router rip
R7(config-router)#network 200.1.17.0
R7(config-router)#network 200.1.78.0
R7(config-router)#exit
R8
R8(config)#router rip
R8(config-router)#network 200.1.78.0
R8(config-router)#network 200.1.89.0
R8(config-router)#exit
R9
R9(config)#router rip
R9(config-router)#network 200.1.89.0
R9(config-router)#network 200.1.94.0
R9(config-router)#exit
R4
R4(config)#router rip
R4(config-router)#network 200.1.34.0
R4(config-router)#network 200.1.54.0
R4(config-router)#network 200.1.94.0
33
AUTHOR:- KUSHAL H. KORDE
R4(config-router)#network 200.1.41.0
R4(config-router)#exit
R10
R10(config)#router rip
R10(config-router)#network 200.1.41.0
R10(config-router)#network 192.168.2.0
R10(config-router)#exit
Lets try to do ping from pc1 – pc2

Now try to do tracing

See in the above trace, router chooses a route of R1--R2--R7--R8--R9--R4--R10


Lets go to the R2 to check the route

34
AUTHOR:- KUSHAL H. KORDE
Router R2 chooses 200.1.17.2 path to reach the destination of 192.168.2.0 network
NOW CONFIGURE ROUTE OF R1—R2—R5—R6—R4—R10
R1—R2—R4—R10 were already configured. So, we have to configure the rest
R5
R5(config)#router rip
R5(config-router)#network 200.1.12.0
R5(config-router)#network 200.1.23.0
R5(config-router)#exit
R6
R6(config)#router rip
R6(config-router)#network 200.1.23.0
R6(config-router)#network 200.1.34.0
R6(config-router)#exit
NOW GO TO R2

Now see R2 chooses 200.1.12.2 path to reach the destination of 192.168.2.0 network
pc1 tracing path to reach 192.168.2.1

35
AUTHOR:- KUSHAL H. KORDE
Now configure the path of R1—R2—R3—R4—R10
R3
R3(config)#router rip
R3(config-router)#network 200.1.15.0
R3(config-router)#network 200.1.54.0
R3(config-router)#exit
router R2 for routes update

Now let’s look at pc1 tracing

So, here we are with the conclusion of RIP chooses lowest hop count path to reach the
destination.

36
AUTHOR:- KUSHAL H. KORDE
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP)
❖ Eigrp is a Dynamic routing protocol. Under this it is a Hybrid Protocol.
❖ Eigrp uses DUAL ALGORITHEM (Diffusing Update Algorithm)
❖ Eigrp support classless IP addressing, also support Authentication.
❖ Eigrp has AD value of 90
❖ Eigrp has hello timer of 5 sec and hold down timer is 15 sec. Eigrp do incremental
update.
❖ Eigrp has Multicast address 224.0.0.10
❖ Eigrp has default hop count is 100. We can increase the limit till 255 hops.
❖ Eigrp uses Metric : Bandwidth + Delay (+MTU+Reliability+load)
❖ Eigrp make three table :- 1.Neighbor table 2.Topology table 3.Routing table
TASK 9
Task 9.1 Assign ip to the interfaces
Task 9.2 Assign hostname on devices
Task 9.3 Configure EIGRP routing

Assign ip and hostname to the devices


Now lets move to the Routing part
Firstly we choose middle part to route data (R1—R2—R3—R4—vIOS7—R10)
R1
R1(config)#router eigrp 100
R1(config-router)#network 192.168.1.0 0.0.0.255
R1(config-router)#network 200.10.12.0 0.0.0.255
R1(config-router)#exit

37
AUTHOR:- KUSHAL H. KORDE
R2
R2(config)#router eigrp 100
R2(config-router)#network 200.10.12.0 0.0.0.255
R2(config-router)#network 200.10.25.0 0.0.0.255
R2(config-router)#network 200.10.23.0 0.0.0.255
R2(config-router)#network 200.10.20.0 0.0.0.255
R2(config-router)#exit
R3
R3(config)#router eigrp 100
R3(config-router)#network 200.10.23.0 0.0.0.255
R3(config-router)#network 200.10.34.0 0.0.0.255
R3(config-router)#exit
R4
R4(config)#router eigrp 100
R4(config-router)#network 200.10.34.0 0.0.0.255
R4(config-router)#network 200.10.47.0 0.0.0.255
R4(config-router)#exit
vIOS7
vISO7(config)#router eigrp 100
vISO7(config-router)#network 200.10.47.0 0.0.0.255
vISO7(config-router)#network 200.10.67.0 0.0.0.255
vISO7(config-router)#network 200.10.97.0 0.0.0.255
vISO7(config-router)#network 200.10.70.0 0.0.0.255
vISO7(config-router)#exit
R10
R10(config)#router eigrp 100
R10(config-router)#network 200.10.70.2 0.0.0.255
R10(config-router)#network 192.168.2.0 0.0.0.0.255
R10(config-router)#network 192.168.2.0 0.0.0.255
R10(config-router)#exit

38
AUTHOR:- KUSHAL H. KORDE
Now lets ping from PC1 – PC3

Now trace for path

Now we have to configure new path R1—R2—vIOS—R9—vIOS7—R10


vIOS
vIOS(config)#router eigrp 100
vIOS(config-router)#network 200.10.90.0 0.0.0.255
vIOS(config-router)#network 200.10.20.0 0.0.0.255
vIOS(config-router)#exit
R9
R9(config)#router eigrp 100
R9(config-router)#network 200.10.90.0 0.0.0.255
R9(config-router)#network 200.10.97.0 0.0.0.255
R9(config-router)#exit
Now eigrp chooses route of R1—R2—vIOS—R9—vIOS7—R10
trace from PC1 to PC3

39
AUTHOR:- KUSHAL H. KORDE
Now configure upper route
vIOS5
vISO5(config)#router eigrp 100
vISO5(config-router)#network 200.10.25.0 0.0.0.255
vISO5(config-router)#network 200.10.56.0 0.0.0.255
vISO5(config-router)#exit
vIOS6
vIOS6(config)#router eigrp 100
vIOS6(config-router)#network 200.10.56.0 0.0.0.255
vIOS6(config-router)#network 200.10.67.0 0.0.0.255
vIOS6(config-router)#exit
Now router R2 chooses a upper path

Now let’s trace from PC1 to PC3

40
AUTHOR:- KUSHAL H. KORDE
OPEN SHORTEST PATH FIRST (OSPF)
❖ OSPF is dynamic routing protocol, under this ospf is a link state protocol.
❖ OSPF uses DIJKSTRA ALGORITHM or SPF (SHORTEST PATH FIRST) ALGORITHEM
❖ OSPF has AD value of 110
❖ OSPF uses multicast address 224.0.0.5 and 224.0.0.6
❖ OSPF supports classless routing and also supports authentication
❖ OSPF creates 3 Routing Table
1. Neighbor table
2. Database table
3. Routing table
❖ OSPF do trigger update (incremental update + every 30 min whole routing table update)
❖ OSPF uses lowest bandwidth as a cost to reach the destination
TASK 10
Task 10.1 Assign IP to the interfaces
Task 10.2 Assign hostname on devices
Task 10.3 Configure OSPF routing

WE HAVE ALREADY GIVEN AN IP ADDRESS AND HOSTNAME TO THE DEVICES


41
AUTHOR:- KUSHAL H. KORDE
R1

R2

R3

R4

R5

We done with the verification of ip and hostname on the devices


Let’s move to the OSPF configuration
R1
R1(config)#router ospf 100
R1(config-router)#network 192.168.70.0 0.0.0.255 area 1
R1(config-router)#network 172.16.29.0 0.0.0.3 area 0
R1(config-router)#exit

R2
42
AUTHOR:- KUSHAL H. KORDE
R2(config)#router ospf 100
R2(config-router)#network 172.16.29.0 0.0.0.3 area 0
R2(config-router)#network 172.16.29.4 0.0.0.3 area 0
R2(config-router)#network 172.16.29.8 0.0.0.3 area 0
R2(config-router)#network 172.16.29.12 0.0.0.3 area 0
R2(config-router)#exit
R3
R3(config)#router ospf 100
R3(config-router)#network 172.16.29.4 0.0.0.3 area 0
R3(config-router)#network 192.168.71.0 0.0.0.255 area 2
R3(config-router)#exit
R4
R4(config)#router ospf 100
R4(config-router)#network 172.16.29.12 0.0.0.3 area 0
R4(config-router)# network 192.168.73.0 0.0.0.255 area 3
R4(config-router)#exit
R5
R5(config)#router ospf 100
R5(config-router)#network 172.16.29.8 0.0.0.3 area 0
R5(config-router)#network 192.168.72.0 0.0.0.255 area 4
R5(config-router)#exit
For VERIFICATION,
#show ip route
R1

43
AUTHOR:- KUSHAL H. KORDE
R2

R3

R4

R5

44
AUTHOR:- KUSHAL H. KORDE
We have verify the routing, now let’s try to ping form PC1 to PC4

From PC1 to PC7

From PC1 to PC6

So, here we done with OSPF.


Till the time we have done routing with each single protocol like only lab with RIP/ EIGRP
/ OSPF individually. What if we want to do routing between multiple protocol like routing
between RIP, EIGRP, OSPF at a same time, that’s what we called “REDISTRIBUTION”.
CONSIDER THIS LAB FOR REDISTRIBUTION
WE HAVE MADE SLIGHT CHANGES IN THE OSPF LAB FOR MAKE IT FIT FOR THE PURPOSE OF
REDISTRIBUTION
TASK 10
Task 10.4 R4 ROUTER NOW PROCESS TWO PROTOCOL OF OSPF & RIPv2
Task 10.5 R5 ROUTER NOW PROCESS TWO PROTOCOL OF OSPF 100 & EIGRP 90

45
AUTHOR:- KUSHAL H. KORDE
REST CONFIGURATION IS SAME.EXCEPT R4 and R5
R4
Interface ethernet 0/0 consist network of 172.16.29.12/30 will be advertise in OSPF and
Interface ethernet 0/1 consist network of 192.168.73.0/24 will be advertise in RIP .
R4(config)#router ospf 100
R4(config-router)#network 172.16.29.13 0.0.0.3 area 0
R4(config-router)#exit
R4(config)#router rip
R4(config-router)#version 2
R4(config-router)#network 192.168.73.0
R4(config-router)#exit
See there is no route on R2 router for 192.168.73.0/24 network cause R2 is in ospf and
192.168.73.0/24 is in RIP

Now we have to advertise RIP network in OSPF and vice versa

46
AUTHOR:- KUSHAL H. KORDE
Let’s do it
R4(config)#router ospf 100
R4(config-router)#redistribute rip subnets
R4(config-router)#exit

R4(config)#router rip
R4(config-router)#redistribute ospf 100 metric 1
R4(config-router)#exit
Now see R2 will have 192.168.73.0/24 network in his routing table

R5
Interface ethernet 0/0 consist network of 172.16.29.8/30 will be advertise in OSPF and
Interface ethernet 0/1 consist network of 192.168.72.0/24 will be advertise in EIGRP .
R5(config)#router ospf 100
R5(config-router)#network 172.16.29.8 0.0.0.3 area 0
R5(config-router)#exit
R5(config)#router eigrp 90
R5(config-router)#network 192.168.72.0 0.0.0.255
R5(config-router)#exit
See there is no route on R2 router for 192.168.72.0/24 network cause R2 is in ospf and
192.168.72.0/24 is in EIGRP

47
AUTHOR:- KUSHAL H. KORDE
Now we have to advertise EIGRP network in OSPF and vice versa
R5(config)#router eigrp 90
R5(config-router)#redistribute ospf 100 metric 10000 1000 255 255 1500
R5(config-router)#exit
Here 10000 is a bandwidth of interface,1000 is a delay of the ethernet interface,255 is a
reliability,255 is a load, 1500 is MTU
R5(config)#router ospf 100
R5(config-router)#redistribute eigrp 90 subnets
R5(config-router)#exit
Now we can see 192.168.72.0/24 network in R2’s routing table

We have done with the REDISTRIBUTION task.

48
AUTHOR:- KUSHAL H. KORDE
DHCP and DNS

IN THIS ABOVE LAB we are going to configure DHCP, DNS first


So what is DHCP (dynamic host configuration protocol), it is the protocol we generally used
to assign IP address automatically.
And what is DNS (domain name system/server), it is the service we uses to resolve domain
name to IP address .like if we put www.google.com in our web browser ,it redirect us to
that website but in actual scenario we are heading towards the ip address of that perticullar
web site instead .cause devices wont understand domain name rather they recognize ip
address which is associated with that domain name just like
Example :- www.google.com = 142.250.183.4
TASK 11
Task 11.1 Configure R1 LAN network with the IP range of 192.168.10.0/24
Task 11.2 Assign ip to the pc through DHCP
Task 11.3 Then, do routing on all devices
Task 11.4 Configure R4-DNS as a DNS server
Task 11.5 Try to ping www.ccn.com which is SERVER-1

49
AUTHOR:- KUSHAL H. KORDE
IP’s of the devices
R1 Eth0/0 – 192.168.10.254/24 Eth0/1 – 12.12.21.1/30
R2 Eth0/0 – 12.12.21.2/30 Eth0/1 – 200.10.20.30/24
R4-DNS ETH 0/0 – 200.10.20.10/24
SERVER-1 ETH 0/0 – 200.10.20.20/24

Let’s do it
R1(config)#ip dhcp pool CCN-LAN
R1(dhcp-config)#network 192.168.10.0 255.255.255.0
R1(dhcp-config)#default-router 192.168.10.254
R1(dhcp-config)#dns-server 200.10.20.10
R1(dhcp-config)#lease 0 12
R1(dhcp-config)#exit
➢ To configure DHCP we need 4 basic things that is IP, subnet mask, default gateway
and DNS
➢ From network command we provide IP and subnet mask
➢ From default-router command we have provide a default gateway
➢ From DNS-SERVER command we provided a DNS server IP
➢ And by giving lease command we provided a lease period for that assigning IP

R1(config)#ip dhcp excluded-address 192.168.10.254


(If we want to remove any IP from that DHCP POOL, just to avoid duplicate IP’s)
VERIFICATION

Then, how to ip to the VPC and R-PC

50
AUTHOR:- KUSHAL H. KORDE
VPC

R-PC, this is actually a router considering and acting as a PC


R-PC(config)#interface ethernet 0/0
R-PC(config-if)#ip address dhcp
R-PC(config-if)#no shutdown
R-PC(config-if)#exit
To verify that give command

3 so now do routing on all devices here we running eigrp on router you can do any routing
R1
R1(config)#router eigrp 100
R1(config-router)#network 192.168.10.0 0.0.0.255
R1(config-router)#network 12.12.21.0 0.0.0.3
R1(config-router)#exit
R2
R2(config)#router eigrp 100
R2(config-router)#network 12.12.21.0 0.0.0.3
R2(config-router)#network 200.10.20.0 0.0.0.255
R2(config-router)#exit
R-PC
R-PC(config)#ip route 0.0.0.0 0.0.0.0 192.168.10.254
R-DNS
R4-DNS(config)#ip route 0.0.0.0 0.0.0.0 200.10.20.30
SERVER-1 (www.ccn.com)
www.ccn.com(config)#ip route 0.0.0.0 0.0.0.0 200.10.20.3
4 now start the dns server on R4-DNS

51
AUTHOR:- KUSHAL H. KORDE
R4-DNS(config)#ip dns server
R4-DNS(config)#ip host www.ccn.com 200.10.20.20
First command is to start DNS server port number udp-53
And second command is to bind domain name with ip address
5 now ping the www.ccn.com consist ip 200.10.20.20

52
AUTHOR:- KUSHAL H. KORDE
NETWORK TIME PROTOCOL (NTP)
❖ NTP is a network time uses UDP port -123
❖ Basically, NTP uses on all LAN as well as WAN devices just to sync time of their devices
with NTP server, if time of those won’t match then internet won’t be able to work on
that device.
❖ With the help of NTP we generate logs of the devices to solve the issues which generally
occur in Enterprise environment. if time is mismatching then the troubleshoot will be
more difficult.
We are going to consider lab which we used for the DHCP & DNS configuration
R2 (NTP Master)
R2(config)#interface loopback 1
R2(config-if)#ip address 10.10.10.1 255.255.255.255
R2(config-if)#no shutdown
R2(config-if)#exit

R2(config)#ntp master 1
R2(config)#ntp source loopback 1
Here we specify the NTP master stratum number 1 which mean it is most trusted NTP
server in a network and we specify the source interface from where NTP broadcast will
happen
R1(NTP Client)
R1(config)#ntp server 10.10.10.1
Here we specify the NTP servers ip address which is R2’s loopback 1 interface ip address
Now the NTP authentication is totally optional
R1
R1(config)#ntp authentication-key 1 md5 ccn
R1(config)#ntp authenticate
R2
R2(config)#ntp authentication-key 1 md5 ccn
R2(config)#ntp authenticate
VERIFICATION
R1#show ntp status OR R1#show ntp association

53
AUTHOR:- KUSHAL H. KORDE
TELNET, SSH, HTTP, HTTPS

TELNET
Telnet is a remote access service works under TCP and uses port number 23 .generally
telnet sends data in clear text format.
SSH
SSH is also a remote access service works under tcp and uses port number 22 . Genrally ,
ssh send data in encrypted format over the networks .it encrypts data through rsa
algorithem , and consist key size of 2048 bit which is market standard.
Now configure the TELNET, SSH, HTTP, HTTPS on devices
Task 12
Task 12.1 Assign IP according to networks represents in diagram
Task 12.2 Configure SERVER 1 for TELENT service
Task 12.3 Configure SERVER 2 for SSH service
Task 12.4 Configure SERVER 1 for HTTP service
Task 12.5 Configure SERVER 2 for HTTPS service

54
AUTHOR:- KUSHAL H. KORDE
R1 ETH 0/0 192.168.10.254/24 ETH 0/1 12.12.21.1/30

R1- INTERNAL PC7 PC8 R-PC


NETWORK PC 192.168.10.1/24 192.168.10.2/24 192.168.10.3/24

R2 ETH 0/0 12.12.21.2/24 ETH 0/1 200.10.20.30/24

SERVER 1 ETH 0/0 200.10.20.20/24

SERVER 2 ETH 0/0 200.10.20.10


NOW WE ARE CONFIGURING THE SERVER 1 FOR TELNET
ON SERVER 1
SERVER-1(config)#line vty 0 4
SERVER-1(config-line)#transport input telnet
SERVER-1(config-line)#login local
SERVER-1(config-line)#exit
Local username & password creation
SERVER-1(config)#username ccn privilege 15 password ccn
Here, line vty means virtual teletype which means a connection over a networks or
connection which is virtual. console access is direct access but telnet access is virtual access
on device. transport input telnet means the data travels over a network should only
connect to a telnet service activated on a device .and, login local means at the time of
login device should ask username & password which is verified from local user database
which is created on device.
How to take access?
For that we need a router(R-PC) in eve-ng setup
Router# telnet <destination_ip_address> <desired_service_port>

55
AUTHOR:- KUSHAL H. KORDE
SSH
SSH on server 2
SERVER-2(config)#line vty 0 4
SERVER-2(config-line)#transport input ssh
SERVER-2(config-line)#login local
SERVER-2(config-line)#exit
SERVER-2(config)#crypto key generate rsa modulus 2048 label mypubkey
Username & password
SERVER-2(config)#username ccn privilege 15 password ccn
Here line vty means virtual teletype which means a connection over a networks or
connection which is virtual .then , 0 4 means at a time 5 line connection can be activate
.transport input ssh means the data travels over a network should only connect to a ssh
service activated on a device .and , login local means at the time of login device should ask
username & password which is verified from local user database which is created on device.
Crypto key command is to start the encryption process of the data through rsa algorithem
with standard key 0f 2048 bit.
How to take access?
Router# ssh -l <username> <destination_ip_address>

56
AUTHOR:- KUSHAL H. KORDE
HTTP
HTTP on server 1
SERVER-1(config)#ip http server
By applying above command, we are enabling TCP port 80 which we generally use to take
GUI access.
VERIFICATION
Router# telnet <destination_ip_address> <desired_port>
With the command we get a output of […..open ] means http is enable on device

HTTPS
https on server 2
SERVER-2(config)#ip http secure-server
By applying this command we are enabling tcp port 443 on device which we genrally use to
take secure GUI access
To additional security we enable authentication
SERVER-2(config)#ip http authentication local
By applying this command we are enabling authentication on devices through local user
database.
VERIFICATION
Router# telnet <destination_ip_address> <desired_port>
With the command we get a output of […..open ] means https is enable on device

57
AUTHOR:- KUSHAL H. KORDE
ACCESS-CONTROL LIST (ACL)

TASK -
13
Task 13.1 Provide IP to the devices.
SECTION DEVICE NAME IP ON INTERFACE
CO-1 ETH0/0= 192.168.10.254/24
ETH0/1= 20.30.10.10/24
COMPANY - 1 VPC9 192.168.10.1/24
VPC10 192.168.10.2/24
VPC11 192.168.10.3/24
R-PC 192.168.10.100/24
CO-2 ETH0/0= 172.16.10.254/24
ETH 0/1 = 20.30.10.20/24
COMPANY - 2 VPC12 172.16.10.1/24
VPC13 172.16.10.2/24
VPC14 172.16.10.3/24
INTERNAL_SERVER 172.16.10.100/24
ISP ISP-MUMBAI ETH0/0 = 20.30.10.30/24
ETH0/1= 200.10.20.10/24
DNS_SERVER 200.10.20.20/24
WEB-1 200.10.20.30/24
OTHERS WEB-2 200.10.20.40/24
SERVER-1 200.10.20.50/24
USER_PC 200.10.20.60/24
Task 13.2 Do Routing on devices (Any kind of Routing)
58
AUTHOR:- KUSHAL H. KORDE
Task 13.3 Create a ACL for company - 1
1. R-PC should TELNET WEB-1 and WEB-2
2. R-PC should SSH WEB-1 and WEB-2
3. R-PC should HTTP WEB-1 and WEB-2
4. R-PC should HTTPS WEB-1 and WEB-2
5. Network of 192.168.10.0/24 should PING DNS_SERVER & SERVER-1
6. R-PC should PING/TELNET/SSH/HTTP/HTTPS to SERVER-1 (www.ccn.com)
Task 13.4 Create A ACL For Company – 2
1. USER_PC should TELNET INTERNAL_SERVER
2. USER_PC should SSH INTERNAL_SERVER
3. USER_PC should HTTP INTERNAL_SERVER
4. USER_PC should HTTPS INTERNAL_SERVER
5. USER_PC should PING a Network of 172.16.10.0/24
SOLUTION
COMPANY 1 ACL
1) R-PC SHOULD TELNET WEB-1 AND WEB-2
ip access-list extended in-out
1 permit tcp host 192.168.10.100 host 200.10.20.30 eq telnet
2 permit tcp host 192.168.10.100 host 200.10.20.40 eq telnet
ip access-list extended out-in
1 permit tcp host 200.10.20.30 host 192.168.10.100 ack
2 permit tcp host 200.10.20.40 host 192.168.10.100 ack
2) R-PC SHOULD SSH WEB-1 AND WEB-2
ip access-list extended in-out
3 permit tcp host 192.168.10.100 host 200.10.20.30 eq 22
4 permit tcp host 192.168.10.100 host 200.10.20.40 eq 22
In first entry we are provided permission of ack to the TCP given IP, so again we don’t need
to do it
3) R-PC SHOULD HTTP WEB-1 AND WEB-2
ip access-list extended in-out
5 permit tcp host 192.168.10.100 host 200.10.20.30 eq 80
6 permit tcp host 192.168.10.100 host 200.10.20.40 eq 80
4) R-PC SHOULD HTTPS WEB-1 AND WEB-2

59
AUTHOR:- KUSHAL H. KORDE
ip access-list extended in-out
7 permit tcp host 192.168.10.100 host 200.10.20.30 eq 443
8 permit tcp host 192.168.10.100 host 200.10.20.40 eq 443
5) NETWORK OF 192.168.10.0/24 SHOULD PING DNS_SERVER & SERVER-1
ip access-list extended in-out
9 permit icmp 192.168.10.0 0.0.0.255 host 200.10.20.20 echo
10 permit icmp 192.168.10.0 0.0.0.255 host 200.10.20.50 echo
ip access-list extended out-in
3 permit icmp host 200.10.20.20 192.168.10.0 0.0.0.255 echo-reply
4 permit icmp host 200.10.20.50 192.168.10.0 0.0.0.255 echo-reply
6) R-PC SHOULD PING/TELNET/SSH/HTTP/HTTPS TO SERVER-1 (www.ccn.com)
ip access-list extended in-out
11 permit tcp host 192.168.10.100 host 200.10.20.50 eq www
12 permit tcp host 192.168.10.100 host 200.10.20.50 eq 443
13 permit tcp host 192.168.10.100 host 200.10.20.50 eq 22
14 permit tcp host 192.168.10.100 host 200.10.20.50 eq telnet
15 permit icmp host 192.168.10.100 host 200.10.20.50 echo
ip access-list extended out-in
5 permit tcp host 200.10.20.50 host 192.168.10.100 ack
6 permit icmp host 200.10.20.50 host 192.168.10.100 echo-reply
COMPANY 2 ACL
1) USER_PC SHOULD TELNET INTERNAL_SERVER
ip access-list extended out-in
permit tcp host 200.10.20.60 host 172.16.10.100 eq 23
2) USER_PC SHOULD SSH INTERNAL_SERVER
ip access-list extended out-in
permit tcp host 200.10.20.60 host 172.16.10.100 eq 22
3) USER_PC SHOULD HTTP INTERNAL_SERVER
ip access-list extended out-in
permit tcp host 200.10.20.60 host 172.16.10.100 eq 80
4) USER_PC SHOULD HTTPS INTERNAL_SERVER
ip access-list extended out-in
permit tcp host 200.10.20.60 host 172.16.10.100 eq 443

60
AUTHOR:- KUSHAL H. KORDE
5) USER_PC SHOULD PING NETWORK OF 172.16.10.0/24
ip access-list extended out-in
permit icmp host 200.10.20.60 172.16.10.0 0.0.0.255 echo
WE HAVE TO PERMIT ROUTING PROTOCOL BECAUSE THAT PROTOCOL SENDING HELLO
MESSGAES AND BLOCKED BY ACL
ip access-list extended out-in
permit eigrp any any
VERIFICATION
COMPANY-1

COMPANY-2

61
AUTHOR:- KUSHAL H. KORDE
STANDARD ACL
❖ Basically, We Do Make Standard Access-Control List For Permit/Deny Source Traffic Only
Unlike Extended ACL Where We Permit/Deny Source To Destination Traffic With The
Control Of Protocol & Services As Well
❖ Standard ACL permit source traffic and allow all kinds of traffic on that give ip or a
network/subnet
Let’s make Standard ACL
CREATION
Router(config)#ip access-list standard lan-wan
Router(config)#permit host 192.168.10.1 …………..(permit single ip with all source traffic)
OR
Router(config)#permit 192.168.10.0 0.0.0.255…permit whole network with all source
traffic)
Router(config)#deny any
IMPLEMENTATION
Router(config)#interface ethernet 0/0
Router(config)#ip access-group lan-wan in
Router(config)#exit

VERIFICATION
Router# show ip access-list ……..(show all acl)
OR
Router#show ip access-list lan-wan ………(show only lan-wan acl)
Allowing all kinds of source traffic will make it more vulnerable that’s why we use extended
ACL, otherwise we use Standard ACL for NAT/PAT configuration or VPN configuration.

62
AUTHOR:- KUSHAL H. KORDE
NETWORK ADDRESS TRANSALATION (NAT) &
PORT ADDRESS TRANSLATION (PAT)

❖ We use a NAT technology to translate private IP to public IP. Then, there are many
things in a NAT that is Static NAT, Dynamic NAT, PAT (Port Address Translation)
❖ Static NAT – in Static NAT translate private IP to public IP, it is one to one translate and
we do manual entry for that. with Static NAT bidirectional connection can be made.
❖ Dynamic NAT- dynamic NAT also translate private IP to public IP but in different way.
Here
we create pool of public IP then random private IP can be translate to public IP out of
this pool. It creates unidirectional connection.
❖ PAT – PAT also translate private IP to public IP but adds up port number. Many private IP
translate into one public IP with the effect of port number. pat provide unidirectional
connection.
TASKS – 14
IP
CO-1 ETH 0/0=192.168.10.254/24 ETH 0/1=20.30.10.1/24
VPC9 192.168.10.1

VPC10 192.168.10.2
CO-1 PC
VPC11 192.168.10.3

63
AUTHOR:- KUSHAL H. KORDE
INTERNAL_SERVER 192.168.10.100
CO-2 ETH0/0 = 172.16.10.254/24 ETH0/1 = 25.35.45.1/27
VPC12 172.16.10.1
VPC13 172.16.10.2
CO-2 PC VPC14 172.16.10.3
R-PC-40 172.16.10.100
CO-3 ETH0/0=10.10.10.254/24 ETH0/1=130.30.30.1/30
R-PC-2 10.10.10.100
PC24 10.10.10.1
CO-3 PC PC25 10.10.10.2
PC26 10.10.10.3
ISP-MUMBAI
ETH0/0.111 20.30.10.2/24
ETH0/0.219 25.35.45.2/27
ETH0/0.389 130.30.30.2/30
ETH0/1 200.10.20.1/24
ISP-SW
ETH0/0 VLAN 111 = CO-1_ISP
ETH0/1 VLAN 219 = CO-2_ISP
ETH0/3 VLAN 389 = CO-3_ISP
ETH0/2 TRUNK
OTHERS
WEB-1 200.10.20.10/24
WEB-2 200.10.20.20/24
SERVER-1 200.10.20.30/24
USER_PC 200.10.20.40/24
ROUTING EIGRP 199
Task 14.1 CO-1
VPC-9, VPC-10 , VPC-11 , INTERNAL SERVER Should Assign Static Mapped With The Ip Of
20.30.10.10 ,20.30.10.20 , 20.30.10.30 , 20.30.10.40
Do telnet on IP 20.30.10.40 it redirects to the INTERNAL SERVER
Task 14.2 – CO-2
VPC-12 , VPC-13 , VPC-14 , R-PC-40 Should Dynamically Mapped With The Given Pool Of IP
25.35.45.3 – 25.35.45.7
Task 14.3 -CO-3

64
AUTHOR:- KUSHAL H. KORDE
A Whole Network of Company 3 Should Mapped With The Ip Of ETH 0/1 (CO-3)
LET’S DO IT
TASK – 14.1
1.Do Static NAT entry on router
CO-1(config)#ip nat inside source static 192.168.10.1 20.30.10.10
CO-1(config)#ip nat inside source static 192.168.10.2 20.30.10.20
CO-1(config)#ip nat inside source static 192.168.10.3 20.30.10.30
CO-1(config)#ip nat inside source static 192.168.10.100 20.30.10.40
2.then activate NAT on interface
CO-1(config)#interface ethernet 0/0
CO-1(config-if)#ip nat inside
CO-1(config-if)#exit
CO-1(config)#interface ethernet 0/1
CO-1(config-if)#ip nat outside
CO-1(config-if)#exit
VERIFCATION
ON ROUTER

Debug on web-1 A ping via vpc-9


WEB-1#debug ip packet

To stop Debugging
WEB-1#undebug all

65
AUTHOR:- KUSHAL H. KORDE
Telnet

TASK – 14.2
To Combine all Private IP we create Standard ACL
CO-2(config)#ip access-list standard DYN_NAT-LIST
CO-2(config-std-nacl)#permit 172.16.10.0 0.0.0.255
CO-2(config-std-nacl)#exit
To create NAT POOL
CO-2(config)# ip nat pool CCN-DYN_NAT 25.35.45.3 25.35.45.7 netmask 255.255.255.224
To match up Private IP ‘s list (ACL) with NAT POOL (pool)
CO-2(config)#ip nat inside source list DYN_NAT-LIST pool CCN-DYN_NAT
To Implement NAT
CO-2(config)#interface ethernet 0/0
CO-2(config-if)#ip nat inside
CO-2(config-if)#exit
CO-2(config)#interface ethernet 0/1
CO-2(config-if)#ip nat outside
CO-2(config-if)#exit

66
AUTHOR:- KUSHAL H. KORDE
VERIFICATION
Did ping from vpc-12 to web-1

TASK – 14.3
To combine all Private IP we create Standard ACL
CO-3(config)#ip access-list standard PAT-LIST
CO-3(config-std-nacl)#permit 10.10.10.0 0.0.0.255
CO-3(config-std-nacl)#exit
To combine ACL with Interface for PAT
CO-3(config)# ip nat inside source list PAT-LIST interface ethernet 0/1 overload
To Implement NAT/PAT
CO-3(config)#interface ethernet 0/0
CO-3(config-if)#ip nat inside
CO-3(config-if)#exit

CO-3(config)#interface ethernet 0/1


CO-3(config-if)#ip nat outside
CO-3(config-if)#exit

VERIFICATION

67
AUTHOR:- KUSHAL H. KORDE
ACL AND NAT

ETH0/0 = 192.168.10.254/24 ETH0/1 = 20.30.10.10/24

VPC-9 192.168.10.1/24

CO-1 VPC-10 192.168.10.2/24

VPC-11 192.168.10.3/24

R-PC 192.168.10.100/24

ETH0/0= 172.16.10.254/24 ETH0/1 = 45.35.55.65/24

VPC-12 172.16.10.1/24

CO-2 VPC-13 = 172.16.10.2/24

VPC-14 172.16.10.3/24

INTERNAL_SERVER 172.16.10.100/24

ISP-SW

ETH0/0 VLAN 99 => ISP_CO-1

68
AUTHOR:- KUSHAL H. KORDE
ETH0/1 VLAN 199 => ISP_CO-2

ETH 0/2 TRUNK

ETH0/0 NO SHUT / NO IP ADDRESS

ETH0/0.99 = 20.30.10.20/24
ISP-MUMBAI
ETH0/0.199 45.35.55.75/24

ETH0/1 200.10.20.1/24

OTHERS

DNS_SERVER 200.10.20.10/24

WEB-1 200.10.20.20

WEB-2 200.10.20.30

SERVER-1 200.10.20.40

USER_PC 200.10.20.50

ROUITNG
❖ CO-1 > EIGRP 199 on both side
❖ CO-2 > OSPF 100 AREA 1 both side
❖ ISP_MUMBAI > EIGRP 199 / OSPF 100 AREA 1 for CO-1 & CO-2’s other side RIP
❖ DNS_SERVER / WEB-1 / WEB-2 / SERVER-1 / USER_PC / R-PC / INTERNAL_SERVER =
DEFAULT ROUTING
TASK – 15
CO-1
Task – 15.1 ACL TASK
1.A whole network can PING WEB-1 AND WEB-2
2.R-PC can TELNET & SSH WEB-1 & WEB-2
3.R-PC can do HTTP & HTTPS TO SERVER-1

Task – 15.2 STATIC NAT TASK


VPC-9, VPC-10 , VPC-11 , R-PC should assign static mapped IP OF 20.30.10.1 , 20.30.10.2 ,
20.30.10.3 , 20.30.10.100 respectively
CO-2
69
AUTHOR:- KUSHAL H. KORDE
Task – 15.3 ACL TASK
1.USER_PC can PING a whole network
2.USER_PC can TELNET, SSH, HTTP , HTTPS to INTERNAL SERVER
Task – 15.4 STATIC NAT TASK
VPC-12, VPC-13, VPC-14 , INTERNAL SERVER should assign static ip of 45.35.55.10 ,
45.35.55.20 , 45.35.55.30 , 45.35.55.100
LET’s DO THE TASK
CO-1
First we are going to do NAT Task
Task - 15.2
CO-1(config)#ip nat inside source static 192.168.10.1 20.30.10.1
CO-1(config)#ip nat inside source static 192.168.10.2 20.30.10.2
CO-1(config)#ip nat inside source static 192.168.10.3 20.30.10.3
CO-1(config)#ip nat inside source static 192.168.10.100 20.30.10.100
Implementation of NAT
CO-1(config)#interface ethernet 0/0
CO-1(config-if)#ip nat inside
CO-1(config-if)#exit
CO-1(config)#interface ethernet 0/1
CO-1(config-if)#ip nat outside
CO-1(config-if)#exit

ACL
Task 15.1 = 1)
CO-1(config)#ip access-list extended in-out
CO-1(config-ext-nacl)#1 permit icmp 192.168.10.0 0.0.0.255 host 200.10.20.20 echo

CO-1(config-ext-nacl)#ip access-list extended out-in


CO-1(config-ext-nacl)#1 permit icmp host 200.10.20.20 host 20.30.10.1 echo-reply
CO-1(config-ext-nacl)#2 permit icmp host 200.10.20.20 host 20.30.10.2 echo-reply
CO-1(config-ext-nacl)#3 permit icmp host 200.10.20.20 host 20.30.10.3 echo-reply
CO-1(config-ext-nacl)#4 permit icmp host 200.10.20.20 host 20.30.10.100 echo-reply

70
AUTHOR:- KUSHAL H. KORDE
Task 15.1 = 2)
CO-1(config-ext-nacl)#ip access-list extended in-out
CO-1(config-ext-nacl)#2 permit tcp host 192.168.10.100 host 200.10.20.20 eq 23
CO-1(config-ext-nacl)#3 permit tcp host 192.168.10.100 host 200.10.20.20 eq 22
CO-1(config-ext-nacl)#2 permit tcp host 192.168.10.100 host 200.10.20.30 eq 23
CO-1(config-ext-nacl)#3 permit tcp host 192.168.10.100 host 200.10.20.30 eq 22
CO-1(config-ext-nacl)#ip access-list extended out-in
CO-1(config-ext-nacl)#5 permit tcp host 200.10.20.20 host 20.30.10.100 ack
CO-1(config-ext-nacl)#6 permit tcp host 200.10.20.30 host 20.30.10.100 ack
Task 15.1 = 3)
CO-1(config-ext-nacl)#ip access-list extended in-out
CO-1(config-ext-nacl)#4 permit tcp host 192.168.10.100 host 200.10.20.40 eq 80
CO-1(config-ext-nacl)#5 permit tcp host 192.168.10.100 host 200.10.20.40 eq 443

CO-1(config-ext-nacl)#ip access-list extended out-in


CO-1(config-ext-nacl)#7 permit tcp host 200.10.20.40 host 20.30.10.100 ack
Permit routing Eigrp on out-in
CO-1(config-ext-nacl)#ip access-list extended out-in
CO-1(config-ext-nacl)#8 permit eigrp any any
Implementation of ACL
CO-1(config-ext-nacl)#interface ethernet 0/0
CO-1(config-if)#ip access-group in-out in
CO-1(config-if)#exit
CO-1(config)#interface ethernet 0/1
CO-1(config-if)#ip access-group out-in in
CO-1(config-if)#exit
VERIFICATION
CO-1(config)#Show ip access-list

71
AUTHOR:- KUSHAL H. KORDE
CO – 2
First we are going to do NAT Task
Task -15.4
NAT
CO-2(config)#ip nat inside source static 172.16.10.1 45.35.55.10
CO-2(config)#ip nat inside source static 172.16.10.2 45.35.55.20
CO-2(config)#ip nat inside source static 172.16.10.3 45.35.55.30
CO-2(config)#ip nat inside source static 172.16.10.100 45.35.55.100
Implementation of NAT
CO-2(config)#interface ethernet 0/0
CO-2(config-if)#ip nat inside
CO-2(config-if)#exit
CO-2(config)#interface ethernet 0/1
CO-2(config-if)#ip nat outside
CO-2(config-if)#exit
ACL
Task 15.3 = 1)
CO-2(config)#ip access-list extended wan-lan
CO-2(config-ext-nacl)#1 permit icmp host 200.10.20.50 45.35.55.0 0.0.0.255 echo

CO-2(config)#ip access-list extended lan-wan


CO-2(config-ext-nacl)#1 permit icmp 172.16.10.0 0.0.0.255 host 200.10.20.50 echo-reply
Task 15.3 = 2)
CO-2(config)#ip access-list extended wan-lan
CO-2(config-ext-nacl)#2 permit tcp host 200.10.20.50 host 45.35.55.100 eq 22 23 80 44
CO-2(config)#ip access-list extended lan-wan
72
AUTHOR:- KUSHAL H. KORDE
CO-2(config-ext-nacl)#2 permit tcp host 172.16.10.100 host 200.10.20.50 ack
Implementation of ACL
CO-2(config)#interface ethernet 0/0
CO-2(config-if)#ip access-group lan-wan in
CO-2(config-if)#exit
CO-2(config)#interface ethernet 0/1
CO-2(config-if)#ip access-group wan-lan in
CO-2(config-if)#exit
Permit routing ospf
CO-2(config)#ip access-list extended wan-lan
CO-2(config-ext-nacl)#3 permit ospf any any
VERIFICATION
CO-2#Show ip access-list

ISP-MUMBAI

73
AUTHOR:- KUSHAL H. KORDE
HOW TO ADD YOUR LAPTOP/PC TO EVE-NG LAB SETUP
1.DO RIGHT CLICK SELECT ADD A NEW OBJECT >“NETWORK”.

Then, NAME/PREFIX - MY_PC >TYPE – Management(cloud0)

2.Here IP of the network is 192.168.232.0/24, here we put IP of that eve-ng network .so
your IP might be change according to your eve-ng network IP

74
AUTHOR:- KUSHAL H. KORDE
3.Assign one IP of that network to router interface ethernet 0/2=192.168.232.100
255.255.255.0

COMPANY-1(config)#interface ethernet 0/2


COMPANY-1(config-if)#ip address 192.168.232.100 255.255.255.0
COMPANY-1(config-if)#no shutdown
COMPANY-1(config-if)#exit
4.Advertise that route via routing of any means here we using Router EIGRP

5.Then, go to your real PC/LAPTOP open command prompt – run as administrator and add
a manual route to the eve-ng network

The IP of 192.168.232.1 is the ip of your VMnet8 adapters

75
AUTHOR:- KUSHAL H. KORDE
6. Then try to ping IP 192.168.232.100(router’s IP)

If it is pinging it means your real PC/LAPTOP got connected with eve-ng LAB setup

76
AUTHOR:- KUSHAL H. KORDE
SYSLOG
❖ Syslog means system logs. we generally use this log to identify the problem or trouble
shoot the issue, to monitor the network, to identify the problematic area
❖ Syslog has basically THREE METHODS
1. CONSOLE- all the logs generated by the device will show it on screen/terminal like
putty, Secure-CRT
2. BUFFER- All the logs generated by the device will stored it in buffer/memory of the
device
3. TRAP- All the logs generated by the device will trap and send it given specific IP

CONSOLE
COMPANY-1(config)#logging on …..(to start the logging on devices)
COMPANY-1(config)#logging console informational

BUFFER
COMPANY-1(config)#logging on
COMPANY-1(config)#logging buffered 4096 …………… (allocate memory size)
COMPANY-1(config)#logging buffered informational (logs message till informational level)
Verification
COMPANY-1# show logging
77
AUTHOR:- KUSHAL H. KORDE
TRAP
COMPANY-1(config)#logging on
COMPANY-1(config)#logging trap informational
COMPANY-1(config)#logging host 192.168.232.1 ……(logs are trapped and send it to this ip)
For trapped messages we need some tools to view it so here we use the ‘kiwi syslog server’
1.This is the kiwi syslog server look

2.how to setup this application. Go to File > Setup

78
AUTHOR:- KUSHAL H. KORDE
3.then , go to 1.Input > 2.Add IP address of the log generating device > Add > Apply > OK

4.finally you get message over here like this if event occur. here we done manual interface
shutdown just to check messages are trapped or not. so, we get the messages.

79
AUTHOR:- KUSHAL H. KORDE
CDP
❖ CDP stands for Cisco Discovery Protocol uses to find neighboring cisco devices only.
❖ Default, CDP timer is 60 sec, whereas CDP hold down timer is 180 sec.
❖ CDP is default running on cisco devices.

Commands
To run CDP on Global mode
COMPANY-1(config)#cdp run
To set CDP timer
COMPANY-1(config)#cdp timer …. <5-254>……
To set CDP Holdtime
COMPANY-1(config)#cdp holdtime ……<10-255>……..
To enable CDP on interface
COMPANY-1(config)#interface ethernet 0/1
COMPANY-1(config-if)#cdp enable
COMPANY-1(config-if)#exit
COMPANY-1(config)#interface ethernet 0/0
COMPANY-1(config-if)#cdp enable
COMPANY-1(config-if)#exit
VERIFICATION
COMPANY-1#show cdp neighbors
COMPANY-1#show cdp neighbors detail

80
AUTHOR:- KUSHAL H. KORDE
LLDP
LLDP is a Link Layer Discovery Protocol we use this to find out neighbor devices in a
network. it is a Layer 2 protocol of OSI model. LLDP timer is 30 sec. whereas, LLDP
holdtime is 120 sec.
Commands
To start LLDP Globally
COMPANY-1(config)#lldp run
To LLDP on interface (first start it Globally)
COMPANY-1(config-if)#interface ethernet 0/0
COMPANY-1(config-if)#lldp transmit
COMPANY-1(config-if)#lldp receive
COMPANY-1(config-if)#exit
COMPANY-1(config)#interface ethernet 0/1
COMPANY-1(config-if)#lldp transmit
COMPANY-1(config-if)#lldp receive
COMPANY-1(config-if)#exit
VERIFICATION
COMPANY-1#show lldp neighbors
COMPANY-1#show lldp neighbors detail

81
AUTHOR:- KUSHAL H. KORDE
PASSWORD ASSIGNMENT
How to assign password on router and switches?
the commands are same no changes
ROUTER/SWITCH
To Give Password to CONSOLE PORT
Router(config)#line con 0
Router(config-line)#password ccn
Router(config-line)#login
Router(config-line)#exit

NOTE:-By Applying This Command Device Will Only Ask For The Password
If Company Wants To Ask For Username And Password To There Employee Then We Can
Set Accordingly
Router(config)#line con 0
Router(config-line)#login local ……(by this it will ask for username & password at the time
of console login)
Router(config-line)#exit
For that we have to create username and password
Router(config)#username ccn privilege 1 password ccn …..(make entry in clear text format
)
OR
Router(config)#username ccn privilege 1 secret ccn123 …..( make entry in clear encrypted
format)

82
AUTHOR:- KUSHAL H. KORDE
Applying password at PRIVILAGE MODE
Router(config)#enable password ccn1234
This will enable password at privilege mode with clear text format

VERIFICATION

For that we have to encrypt this password


Router(config)#service password-encryption

We can crack this password


https://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/358-cisco-type7-
password-crack.html
to decrypt this password go to above link and put this value on Encrypted Password section
“ 03075805575D7218 “ and press submit button.

83
AUTHOR:- KUSHAL H. KORDE
Now, because of this weakness we most probably assign password in encrypted format
Router(config)#enable secret ccn123

This password is now encrypted in md5 hash value. Now, this value is not reversible.

84
AUTHOR:- KUSHAL H. KORDE
PASSWORD RECOVERY
if we fail to remember the password then the only condition is to recover the password this
situation is not that often in company. we need to know what to do in such condition.
ROUTER PASSWORD RECOVERY
1.First Check Router Register Value
Router#show version
In this command we can see the register value
Configuration register is 0x2102
• 0x2102 is a default value by reading this value router read the startup-config
• 0x2142 is another value by reading this value router skip the startup-config
So we have to change this value but we can’t get inside the router CLI .so what else we can
do is
Go to routers rommon mode (read only memory monitor mode).
1.Restart the router
2.When router is decompressing the iso image press button
CTRL + C
OR
CTRL + PAUSE/BREAK
3.And enter in rommon mode
Now change the register value
rommon 1 > confreg 0x2142
rommon 2 > boot
after booting the router go to privilege type #show version
Configuration register is 0x2142
It will show you 0x2142
Now, bring startup-config to running-config
Router#copy startup-config running-config
4.It is the time to change the password or remove the password
5.After changing the password change the register value as well
Router(config)#config-register 0x2102
Now, to verify
Router#show version
It will show you output like this

85
AUTHOR:- KUSHAL H. KORDE
Configuration register is 0x2142 (will be 0x2102 at next reload)
After all this save the configuration
Router# write memory

SWITCH PASSWORD RECOVERY


Because of password we can’t enter in switch so we have to recover the password by
entering in switch mode. by clicking mode button on cisco switch while decompressing the
image. We will enter in switch mode.

switch: flash_init …..(to initiate flash)


switch:dir flash: ……(to check the flash content)
switch store all the configuration in config.text file so if we change the file extension then
the file will not be in readable format
switch: rename flash:config.text config:config.aaa
switch:reset …..(to start the switch)
after booting the switch,
check out the flash of switch
switch#dir flash:
now you can see the config.aaa file > change it back to config.text
switch#rename flash:config.aaa flash:config.text
now,get back your startup-config
switch#copy startup-config running-config
change all the password and then save the configuration

86
AUTHOR:- KUSHAL H. KORDE
IOS UPGRADATION

IOS stands for INTERNETWORK OPERATING SYSTEM which is a Basic OS for all cisco Router
and Switches.
Certainly, Cisco launches a New updates in their operating system like current version of
cisco IOS is 15.1.1 after some fixes cisco launches a new update which will be like 15.1.2. so
here we have to upgrade the old OS with new one.
How to do it?
Let’s see,
On ROUTER,
Here is the reference diagram,

S
In the above reference lab “FLR-1_ROUTER-1”is the main router. then, that Net-TFTP is our
real pc connected in a network
Before going for upgradation we took backup of the configuration file and current IOS
version just to take care from future uncertainty.
1.Take Configuration backup of Device

we are using tftpd64 tool to create our pc as a TFTP se


NOTE:- All the upcoming task like IOS upgradation , configuration file and IOS file backup .all
are done on real devices or we can do it cisco packet tracer if you don’t have devices to co

87
AUTHOR:- KUSHAL H. KORDE
Here is the first look of the tftpd64 tool
2.Take IOS back up on device
FLR-1_ROUTER-1#copy flash: tftp:
Then, provide remote address of the host means address of TFTP server => now provide
source file which will be going copy from routers flash to

Here we can take backup of IOS file


Now, how to load IOS in device (it only support actual device)
FLR-1_ROUTER-1#copy tftp: flash:

88
AUTHOR:- KUSHAL H. KORDE
While copying of this data, tftpd64 looks like

Provide them remote address of tftp server and file name of the IOS which we want to load
Then it will start copying the file. It will take some time to copy data.
Similarly, we can do reversal of configuration file.
Provide them remote address of the tftp server. And source file name.
WHAT IF WE DO HAVE TWO OPERATING SYSTEM ON DEVICE. then,

By applying the above command, we can specify the OS which will be loading at the time
of booting.

89
AUTHOR:- KUSHAL H. KORDE
L2 SECURITY
❖ L2 security means overall switch security. when it comes to LAN network we have to
secure the network switches and when it comes to internet we have to secure routers
by doing proper configuration.
❖ So, in LAN network there is possibility that a rouge employee can attack a company’s
IT Infra with some malicious intention. Just like to steal company’s data, to create jitter
in a network, to redirect company’s employees to malicious site just to gather
information.
❖ in such situation how can we secure our organization, so here is the solution – L2
security
In This Scenario We Have to Consider Potential Threats And Make Our Lan Network More
Secure Against The Attacks
ATTACKS SECURITY
DHCP starvation attack
MAC spoofing
SWITCHPORT SECUIRTY
MAC flooding
CDP flooding
Rouge DHCP server / DHCP spoofing DHCP SNOOPING
IP spoofing IP SOURCE GUARD
ARP poisoning DYNAMIC ARP INSPECTION (DAI)
STP attacks BPDU GUARD / BPDU FILTER / ROOT
GUARD

90
AUTHOR:- KUSHAL H. KORDE
1.DHCP STRAVATION ATTACK
In this attack linux PC fetch all the IP of DHCP pool and left it with 0 IP’s to assign to genuine
user.
How to perform this attack
Go to linux =>Terminal => yersinia -G

Tool like this will open

91
AUTHOR:- KUSHAL H. KORDE
This tool can perform different types of attacks
First, we are going do DHCP starvation attack
Before this attack DHCP server allotted only two IP’s

Let’s perform attack


1.launch attack => 2. DHCP tab => 3. Sending DISCOVER packet => OK

How to stop attack


1.list attack => 2. Cancel all attacks

92
AUTHOR:- KUSHAL H. KORDE
Effect of this attack is pool of DHCP server will get empty

See leased addresses is 251 means all IP’s of this pool is allotted.
Effect on switch

See dynamic address count is 13,635 it means switch reads multiple MAC addresses. we
also can see it with command
#show mac address-table
93
AUTHOR:- KUSHAL H. KORDE
2.MAC SPOOFING
Mac spoofing means to mask someone’s mac address and put it on our interface.
How to perform this attack
Select a target = workstation4 is our target => command - show ip => observe MAC –
00:50:79:66:68:04

Observe this mac of workstation because we are spoofing this mac and putting it on linux
pc

Default mac address of this linux pc 00:50:00:00:09:00


Now we have to change linux mac address with workstation4 mac address
With the use of macchanger tool command => macchanger -m 00:50:79:66:68:04 eth0

94
AUTHOR:- KUSHAL H. KORDE
New spoofed mac address of linux pc

This is how we can spoof the mac address


How to change back it to normal
Same macchanger tool with command of > macchanger -p eth0

Check it on interface properties

3.MAC FLOODING
In mac flooding attack we flood the mac address table of the switch.
Before this attack switch mac table

Now perform an attack with the command of ~#macof -i eth0

To stop this attack press CTRL+C

95
AUTHOR:- KUSHAL H. KORDE
After attack switch MAC Address table get flooded

4.CDP FLOODING
In the CDP Flooding Attack, we flood the CDP table of the switch with fake entries
Before starting the attack

Check it out, at last CDP entries is 3


Now, perform CDP flooding attacks
Go to terminal => yersinia -G > Move to CDP tab => flooding CDP table > OK

96
AUTHOR:- KUSHAL H. KORDE
To stop attack
List attacks => cancel all attacks

After this attack check CDP table, you will see it flooded.
Now, how can we secure switches from such type of attacks cause all of this attacks are
mac based attacks.
Here we use SWITCHPORT SECURITY
Switch(config)#interface eth 0/0
Switch(config-if)#switchport mode access
Switch(config-if)#switchport port-security mac-address 00:50:00:00:09:00 ….(manual
mac)

97
AUTHOR:- KUSHAL H. KORDE
OR
Switch(config-if)#switchport port-security mac-address sticky(sticky means any mac
address)
Switch(config-if)#switchport port-security maximum 1 …..(max mac accepted is 1)
Switch(config-if)#switchport port-security violation protect ..(take action if max limit
violate)
Switch(config-if)#switchport port-security ……(to activate this above parameter)
For violation we do have 3 options. we can use anyone of them as per policy.

• Protect—This mode permits traffic from known MAC addresses to continue to be forwarded while
dropping traffic from unknown MAC addresses when over the allowed MAC address limit. When
configured with this mode, no notification action is taken when traffic is dropped.
• Restrict—This mode permits traffic from known MAC addresses to continue to be forwarded while
dropping traffic from unknown MAC addresses and make interface status as error-disable. when
over the allowed MAC address limit. When configured with this mode, a syslog message is logged, a
Simple Network Management Protocol (SNMP) trap is sent, and a violation counter is incremented
when traffic is dropped.
• Shutdown—This mode is the default violation mode; when in this mode, the switch will
automatically force the switchport into an error disabled (err-disable) state when a violation occurs.
While in this state, the switchport forwards no traffic. The switchport can be brought out of this
error disabled state by issuing the errdisable recovery cause CLI command or by disabling and
reenabling the switchport.

Basically, we activate switchport security on all the Access Ports interfaces except the trunk
interface.
5.ROUGE DHCP SERVER / DHCP SPPOFING
In this attack we create a fake/rouge DHCP server to redirect users from its original
network. This attack is a part of MITM (man in the middle) attack.
Let’s perform this attack
First, we have to do DHCP starvation attack and fetch all the IP’s. so that genuine user
won’t get IP from original DHCP server. now the real task is to generate Rouge DHCP in a
network and PC’s in a network get Rouge DHCP networks IP.
Go to Linux - terminal => ettercap -G

Now tool like this will open

98
AUTHOR:- KUSHAL H. KORDE
After opening to click on Sniff => unified sniffing => Network interface – eth0

Then, go to MITM > DHCP Spoofing

99
AUTHOR:- KUSHAL H. KORDE
Now set the parameter and then click OK

Will create a Rouge DHCP server


Our existing network is 192.168.10.0/24 but, Rogue DHCP Pool IP is 172.16.10.0/24
After, Rogue DHCP server creation pc will take IP of that network

100
AUTHOR:- KUSHAL H. KORDE
Now we have to secure this network from such attack with DHCP snooping security
DHCP SNOOPING SECURITY
In this security we are untrusting all the interfaces of switch except one which is directly
connected to DHCP Server. So, we have to make that interface trust by applying command.
Switch(config)#ip dhcp snooping vlan 1 …..(to set snooping parameter)
Switch(config)#ip dhcp snooping ……..(to activate DHCP snooping)
Now we are trusting only one port which is connected to Actual DHCP server
Switch(config)#interface ethernet 0/3
Switch(config-if)#ip dhcp snooping trust
Switch(config-if)#exit
When we activate DHCP Snooping it will add on additional information to the packet- that
information is VLAN ID and interface details. Now this additional information won’t
understand by actual DHCP server for that we have to put command to reply it back
DHCP_SERVER(config)#ip dhcp relay information trust-all
By this command router will understand the additional information
VERIFICATION

In this image you can see the VLAN & INTERFACE heading and it actually adds up that
information to the data packet.
We implement this security on global mode to untrust all the ports. We make interface
trust only for actual port which is connected to DHCP server and the trunk ports from
where the traffic is ingresses.

6.IP SPPOFING
In this type of attack we spoof the IP of targeted pc with some malicious intent. if we able
to spoof that IP we will represent ourselves as same as that pc

101
AUTHOR:- KUSHAL H. KORDE
In this scenario attacker successfully spoofed the IP of Host A. by spoofing the IP attacker
can bypass the ACL.
We change the IP by assigning static ip .then, only we can change the actual ip with spoofed
ip.to stop all such attack we implement a security called IP SOURCE GUARD
IP SOURCE GUARD
IP Source Guard (IPSG) is a security feature that restricts IP traffic on untrusted Layer 2 ports by
filtering traffic based on the DHCP snooping binding database or manually configured IP source
bindings

To implement security
Switch(config-if)#interface ethernet 1/0
Switch(config-if)#ip verify source
Switch(config-if)#exit
VERIFICATION OF DHCP SNOOPING BINDING
Switch#show ip dhcp snooping binding
OR
Manual IP SOURCE BINDING
Switch(config)#ip source binding 00:50:00:00:02:00 vlan 1 192.168.10.100 interface
ethernet 0/1
OR

102
AUTHOR:- KUSHAL H. KORDE
This IP SOURCE GUARD we verify with the port-security
Switch(config-if)#interface ethernet 1/0
Switch(config-if)#ip verify source port-security
Switch(config-if)#exit
VERIFICATION
Switch# show ip verify source

DYNAMIC ARP INSPECTION (DAI)


Dynamic ARP inspection is a security feature we used reduce a risk platform regarding arp
requests. Like ARP flooding, ARP poisoning, etc
Implementation
Switch(config)#ip arp inspection vlan 1
By applying this command switch untrust all the ports for ARP requests. we left all the ports
as untrust for PC's . we most probably make port trust for the Servers and trunk ports which
is only connected with the other switch.If port is in trust then it bypass arp inspection
validation check.
How to do it
Switch(config)#interface ethernet 0/2
Switch(config-if)#ip arp inspection trust …..(to make interface trust for ARP inspection)
Switch(config-if)#ip arp inspection limit rate 5 ……(to limit the arp packet per
sec)[OPTIONAL]
Switch(config-if)#exit
DYNAMIC ARP INSPECTION VERIFY THE ARP PACKET WITH THE DHCP SNOOPING BINDING
TABLE
to statically verifies the ARP entries
Switch(config)#arp access-list ARP-LIST
Switch(config-arp-nacl)# permit ip host 192.168.10.253 mac host aabb.cc00.2000
Switch(config-arp-nacl)#exit
Switch(config)#ip arp inspection filter ARP-LIST vlan 1
VERIFICATION
Switch# show ip arp inspection
Switch# show ip arp inspection statistics
7.STP ATTACKS
Spanning tree protocol is also a attackable platform on a switch. so, what kind of attacks
will perform on a switch. spanning tree root status stealing/spoofing , BPDU flooding ,etc.
Just to save our network from such types of attack we will implement some sort of security

103
AUTHOR:- KUSHAL H. KORDE
BPDU GUARD
Switch(config)#interface ethernet 1/0
Switch(config-if)# spanning-tree portfast
Switch(config-if)# spanning-tree bpduguard enable
Switch(config-if)# exit
We enable BPDUGUARD with PORTFAST because, when enable PORTFAST switch won’t
sends BPDU on that interface and when we enable BPDU GUARD switch won’t receive any
BPDU’s on that interface
BPDU FILTER
Switch(config)#interface ethernet 1/0
Switch(config-if)#spanning-tree portfast
Switch(config-if)#spanning-tree bpdufilter enable
Switch(config-if)#exit
If we use BPDUFILTER only then what does BPDUFILTER do is it will listen the BPDU’s but
won’t reply it back and PORTFAST won’t send an update on that interface. and when we
implement BPDUFILTER with PORTFAST it will create some mess around like if we receive a
BPDU from an unexpected interface it will lose its status of PORTFAST and it will create a
temporary looping.
So, in most cases we prefer BPDU GUARD with PORTFAST

ROOT GUARD
We do use root guard because we don’t want that any lowest priority or lowest mac
address will MAC address will influence the switch STP selection process. what does root
guard do is it will ignore the bpdu which consist the lowest priority and lowest mac
Switch(config)#interface ethernet 1/0
Switch(config-if)#spanning-tree guard root
Switch(config-if)#exit

VERIFICATION
Switch#show running-config | section interface ethernet 1/0

104
AUTHOR:- KUSHAL H. KORDE
L2 SECURITY LAB

TASK – 16
Task 16.1 Host Name Should Be Same As Mention In First Look Name
Task 16.2 Create and Implement
VLAN - 111 => SALES_DEPT = 192.168.111.0/24
VLAN - 345 => MRKT_DEPT = 192.168.112.0/24
VLAN - 568 => IT_DEPT = 192.168.113.0/24
VTP DOMAIN - ccn.com
VTP PASSWORD - ccn@123
VTP mode - SWITCH-1=SERVER, SWITCH-2 =CLIENTS , SWITCH-3 = CLIENTS
Task 16.3 Secure Network from MAC BASED ATTACK
Task 16.4 Secure Network from DHCP SPOOFING ATTACK
Task 16.5 Secure Network from IP SPOOFING ATTACK
Task 16.6 Secure Network Form ARP ATTACKS
Task 16.7 secure network from BPDU FLOODING ATTACKS
Task 16.8 MAKE SWITCH-1 AS ROOT BRIDGE AND make sure no infirioe BPDU WILL AFFECT
THE NETWORK

105
AUTHOR:- KUSHAL H. KORDE
VERIFICATION
Switch-1

106
AUTHOR:- KUSHAL H. KORDE
SWITCH-2

107
AUTHOR:- KUSHAL H. KORDE
108
AUTHOR:- KUSHAL H. KORDE
SWITCH-3

109
AUTHOR:- KUSHAL H. KORDE
COM-1-R1

110
AUTHOR:- KUSHAL H. KORDE
IPv6

TASK - 17
Task 17.1 Configure hostname as per the lab
Task 17.2 Configure the routers LAN interfaces with given IPv6 network and EUI-64. Now,
fetch IP from it
Task 17.3 Configure the routers R11-eth 0/1, R12-eth 0/1
Task 17.4 Configure routers with the static ipv6 routing
Task 17.5 Configure routers with the OSPFv3
Task 17.6 Configure the router with EIGRP-ng
Task 17.7 Configure the routers with RIP-ng
After doing routing try to ping other network pc with each type of routing
VERIFICATION
R11

ROUTEING

By applying this command router start IPv6 routing

111
AUTHOR:- KUSHAL H. KORDE
R12

ROUTING

112
AUTHOR:- KUSHAL H. KORDE
Ping form PC5 to PC7

How to check routing table


Router# show ipv6 route

113
AUTHOR:- KUSHAL H. KORDE

You might also like