Cybersecond
Cybersecond
Contents
VLAN ................................................................................................................................................................... 2
VTP...................................................................................................................................................................... 6
EtherChannel ..................................................................................................................................................... 10
INTER VLAN ROUTING (IVR) ................................................................................................................................ 14
ROUTER ON STICK (ROAS) .................................................................................................................................. 16
SPANNING TREE PROTOCOL (STP)....................................................................................................................... 20
ROUTING ........................................................................................................................................................... 26
STATIC ROUTING ................................................................................................................................................ 26
DEFAULT ROUTING ............................................................................................................................................ 31
ROUTING INFORMATION PROTOCOL (RIP) .......................................................................................................... 32
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP) ............................................................................ 37
OPEN SHORTEST PATH FIRST (OSPF) ................................................................................................................... 41
DHCP and DNS .................................................................................................................................................. 48
NETWORK TIME PROTOCOL (NTP) ...................................................................................................................... 53
TELNET, SSH, HTTP, HTTPS .................................................................................................................................. 54
ACCESS-CONTROL LIST (ACL)............................................................................................................................... 58
NETWORK ADDRESS TRANSALATION (NAT) & ..................................................................................................... 63
PORT ADDRESS TRANSLATION (PAT)................................................................................................................... 63
ACL AND NAT ..................................................................................................................................................... 68
HOW TO ADD YOUR LAPTOP/PC TO EVE-NG LAB SETUP ...................................................................................... 74
SYSLOG .............................................................................................................................................................. 77
CDP ................................................................................................................................................................... 80
LLDP .................................................................................................................................................................. 81
PASSWORD ASSIGNMENT .................................................................................................................................. 82
PASSWORD RECOVERY ....................................................................................................................................... 85
IOS UPGRADATION ............................................................................................................................................ 87
L2 SECURITY ....................................................................................................................................................... 90
IPv6 ................................................................................................................................................................. 111
1
AUTHOR:- KUSHAL H. KORDE
VLAN
VLAN stands for virtual local area network. VLAN is a technology we use for the purpose of
Broadcast isolation or segregation of LAN .
Generally what happen in company there is so many department , for that each and every
department require pc and to connect that pc we require Switch .If we buy different switch
for each department the cost of IT infra will going to increase ,to save that cost company
implement vlan on their switch.so here we go.
2
AUTHOR:- KUSHAL H. KORDE
SOLUTION
So, start first with the switch
Switch> enable
Switch#configure terminal
Step 1:- Now we have to create VLAN
Switch(config)#vlan 10
Switch(config)#name sales
Switch(config)#exit
Switch(config)#vlan 20
Switch(config)#name mrkt
Switch(config)#exit
Switch(config)#Vlan 30
Switch(config)#name finance
Switch(config)#exit
Switch(config)#vlan 40
Switch(config)#name IT
Switch(config)#exit
Step 2 :- Assignment of VLAN
Now open interface and assign VLAN
Switch(config)#interface ethernet 0/0
Switch(config)#Switchport mode access
Switch(config)#Switchport access vlan 10
Switch(config)#Exit
Switch(config)#interface ethernet 0/1
Switch(config)#switchport mode access
Switch(config)#switchport access vlan 10
Switch(config)#exit
Switch(config)#interface ethernet 0/2
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 20
Switch(config)# exit
Switch(config)#interface ethernet 0/3
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 20
Switch(config)# exit
3
AUTHOR:- KUSHAL H. KORDE
Switch(config)#interface ethernet 1/0
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 30
Switch(config)# exit
Switch(config)#interface ethernet 1/1
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 30
Switch(config)# exit
Switch(config)#interface ethernet 1/2
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 30
Switch(config)# exit
Switch(config)#interface ethernet 1/3
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 40
Switch(config)# exit
Switch(config)#interface ethernet 2/0
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 40
Switch(config)# exit
Switch(config)#interface ethernet 2/1
Switch(config)# switchport mode access
Switch(config)# switchport access vlan 40
Switch(config)# exit
Note- Assign IP to the respected VLAN Pc’s
VERIFICATION
Switch# show vlan
4
AUTHOR:- KUSHAL H. KORDE
Switch# Show running-config
5
AUTHOR:- KUSHAL H. KORDE
VTP
VTP stands for VLAN Trunking Protocol. why we use VTP? This is the important question we
generally face. So, in the company there were almost 30-40 switches more or less. As
engineer we need to configure each and every switch and if each switch has minimum 10
VLAN on it. It means 40 Switches x 10 VLAN per switch = 400 times you need create vlan.to
reduce this task and to make all switches manageable we configure VTP.
So here we go,
6
AUTHOR:- KUSHAL H. KORDE
Task 2.2
On switch 1
sw1(config)#interface ethernet0/0
sw1(config-if)#switchport trunk encapsulation dot1q
sw1(config-if)#switchport mode trunk
sw1(config-if)#exit
On switch 2
sw2(config)#interface ethernet0/0
sw2(config-if)#switchport trunk encapsulation dot1q
sw2(config-if)#switchport mode trunk
sw2(config-if)#exit
sw2(config)#interface ethernet0/1
sw2(config-if)#switchport trunk encapsulation dot1q
sw2(config-if)#switchport mode trunk
sw2(config-if)#exit
On switch 3
sw3(config)#interface ethernet0/0
sw3(config-if)#switchport trunk encapsulation dot1q
sw3(config-if)#switchport mode trunk
sw3(config-if)#exit
Task 2.3
sw1(config)#vtp mode server
Device mode already VTP Server for VLANS.
sw1(config)#vtp domain ccn.com
Changing VTP domain name from NULL to ccn.com
sw1(config)#vtp password ccn@123
Setting device VTP password to ccn@123
sw2(config)#vtp mode client
Setting device to VTP Client mode for VLANS.
sw2(config)#vtp domain ccn.com
Domain name already set to ccn.com.
sw2(config)#vtp password ccn@123
Setting device VTP password to ccn@123
sw3(config)#vtp mode client
Setting device to VTP Client mode for VLANS.
sw3(config)#vtp domain ccn.com
Domain name already set to ccn.com.
sw3(config)#vtp password ccn@123
Setting device VTP password to ccn@123
7
AUTHOR:- KUSHAL H. KORDE
VERIFICATION
Verification of #show vlan command
Sw1
Sw2
Sw3
8
AUTHOR:- KUSHAL H. KORDE
Verification of #show vtp status command
Sw1
Sw2
Sw3
Note – After VLAN data forwarding to each and every switch via vtp configuration we can
assign VLAN to switchports with the help of Step 2 :- Assignment of VLAN
9
AUTHOR:- KUSHAL H. KORDE
EtherChannel
EtherChannel is a technology use to Bundle/Aggregate the Link/Node/Port, with the use of
some protocols such as LACP or PAgP.
Why we use EtherChannel?
When we face lack of bandwidth with links then at that time we configure EtherChannel to
bundle the link and get combined speed. Like each interface is ethernet means 10MBPS of
each then, if we bundle 3 link at a time then the combine speed will be 300 MBPS
So here we go,
10
AUTHOR:- KUSHAL H. KORDE
Task 3
Task 3.1 - Configure sw1 interface ethernet 0/0, 0/1, 0/2 for EtherChannel
Task 3.2 - Configure sw2 interface ethernet 0/0, 0/1, 0/2 for EtherChannel
Task 3.3 – Configure sw1 to sw2 link as a trunk
Solution,
Task 3.1
Sw1
sw1(config)#interface range ethernet 0/0-2
sw1(config)#channel-protocol lacp
sw1(config-if-range)#channel-group 1 mode active
Creating a port-channel interface Port-channel 1
sw1(config-if-range)#exit
Task 3.2
sw2
sw2(config)#interface range ethernet 0/0-2
sw1(config)#channel-protocol lacp
sw2(config-if-range)#channel-group 1 mode active
Creating a port-channel interface Port-channel 1
sw2(config-if-range)#exit
Task 3.3
Sw1
sw1(config)#interface range ethernet 0/0-2
sw1(config-if-range)#switchport trunk encapsulation dot1q
sw1(config-if-range)#switchport mode trunk
sw1(config-if-range)#exit
OR
sw1(config)#interface port-channel 1
sw1(config-if)#switchport trunk encapsulation dot1q
sw1(config-if)#switchport mode trunk
sw1(config-if)#exit
11
AUTHOR:- KUSHAL H. KORDE
sw2
sw2(config)#interface range ethernet 0/0-2
sw2(config-if-range)#switchport trunk encapsulation dot1q
sw2(config-if-range)#switchport mode trunk
sw2(config-if-range)#exit
VERIFICATION
Sw1
12
AUTHOR:- KUSHAL H. KORDE
sw2
13
AUTHOR:- KUSHAL H. KORDE
INTER VLAN ROUTING (IVR)
❖ Inter VLAN routing is method we use for the purpose of inter VLAN communication.
❖ Inter VLAN Routing is a new method to route between Multiple VLAN’s.
❖ Inter VAN Routing require one device which is L3 Switch.
So here we go,
TASK
Task 4.1 Configure switch with VLAN 10 – SALES & VLAN 20 – MRKT
Task 4.2 Implement VLAN on the respected interface as per Diagram
Task 4.3 Create Default Gateway for the VLAN 10 & VLAN 20 PC’s
Task 4.4 Assign IP to the PC
SOLUTION
Task 4.1 On switch,first we need to create vlan
Switch(config)#vlan 10
Switch(config-vlan)#name SALES
Switch(config-vlan)#exit
Switch(config)#vlan 20
Switch(config-vlan)#name MRKT
Switch(config-vlan)#exit
14
AUTHOR:- KUSHAL H. KORDE
Task 4.2 We need to apply vlan on interface
Switch(config)#interface range gigabitethernet0/0-1
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 10
Switch(config-if-range)#exit
Switch(config)#interface range gigabitethernet0/2-3
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 20
Switch(config-if-range)#exit
Task 4.3 Now, we need to configure interface vlan as a gateway for the PC’s
Switch(config)#interface vlan 10
Switch(config-if)#ip address 192.168.10.254 255.255.255.0
Switch(config-if)#no shutdown
Switch(config-if)#exit
Switch(config-if)#interface vlan 20
Switch(config-if)#ip address 192.168.20.254 255.255.255.0
Switch(config-if)#no shutdown
Switch(config-if)#exit
Note - Now IP given on interface VLAN, will become a gateway for the PC to communicate
over the VLAN.
VERIFICATION
15
AUTHOR:- KUSHAL H. KORDE
ROUTER ON STICK (ROAS)
❖ Router On Stick is also method to establish communication between two or more VLAN.
❖ Router On Stick configuration is old Method
❖ It requires 2 devices that is Router and L2 Switch
so here we go,
TASK
Task 5.1 Configure VLAN 10 – SALES & VLAN 20 – MRKT
TASK 5.2 Implement VLAN on respected interface
Task 5.3 Make interface Trunk which is connected to Router
Task 5.4 Create a gateway on Router
Task 5.5 Assign IP’s to the PC of respected VLAN
SOLUTION
Task 5.1 First we need to Create VLAN
SW(config)#vlan 10
SW(config-vlan)#name SALES
SW(config-vlan)#exit
16
AUTHOR:- KUSHAL H. KORDE
SW(config)#vlan 20
SW(config-vlan)#name MRKT
SW(config-vlan)#exit
Task 5.2 We need to Assign VLAN
SW(config)#interface range ethernet 0/1-2
SW(config-if-range)#switchport mode access
SW(config-if-range)#switchport access vlan 10
SW(config-if-range)#exit
R1(config)#interface ethernet0/0.10
R1(config-subif)#encapsulation dot1q 10
R1(config-subif)#ip address 192.168.10.254 255.255.255.0
R1(config-subif)#no shutdown
R1(config-subif)#exit
R1(config)#interface ethernet0/0.20
R1(config-subif)#encapsulation dot1q 20
R1(config-subif)#ip address 192.168.20.254 255.255.255.0
R1(config-subif)#no shutdown
R1(config-subif)#exit
17
AUTHOR:- KUSHAL H. KORDE
VERIFICATION
On Router
On Switch
18
AUTHOR:- KUSHAL H. KORDE
METHOD 2
Creation of VLAN
SW(config)#vlan 10
SW(config-vlan)#name SALES
SW(config-vlan)#exit
SW(config)#vlan 20
SW(config-vlan)#name MRKT
SW(config-vlan)#exit
VLAN Assignment
SW(config)#interface range ethernet 0/2-3
SW(config-if-range)#switchport mode access
SW(config-if-range)#switchport access vlan 10
SW(config-if-range)#exit
SW(config)#interface range ethernet 1/0-1
SW(config-if-range)#switchport mode access
SW(config-if-range)#switchport access vlan 20
SW(config-if-range)#exit
Configure switch interface which is connected to the router
SW(config)#interface ethernet 0/0
SW(config-if)#switchport mode access
SW(config-if)#switchport access vlan 10
SW(config-if)#exit
SW(config)#interface ethernet 0/1
19
AUTHOR:- KUSHAL H. KORDE
SW(config-if)#switchport mode access
SW(config-if)#switchport access vlan 20
SW(config-if)#exit
Now, configure router
R1(config)#interface ethernet 0/0
R1(config-if)#ip address 192.168.10.254 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#interface ethernet 0/1
R1(config-if)#ip address 192.168.20.254 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#exit
NOTE:-In this method we are not configuring only one interface for multiple VLAN rather
we are configuring multiple interfaces for multiple VLAN .that’s why here we are not
configuring trunk interface.
VERIFICATION
On Switch
On Router
20
AUTHOR:- KUSHAL H. KORDE
SPANNING TREE PROTOCOL (STP)
Spanning tree is a loop prevention mechanism, generally used to stop broadcast storm in a
Switch based network topology.it uses election method to select a ROOT BRIDGE in a switch
network to have control over a switch network. if switch will able to choose a root bridge,
then all the traffic passes through that root bridge where, it uses
STEP-1 SELECTION OF ROOT BRIDGE
1.lowest priority
❖ Default priority of every cisco switch is 32,768
❖ Then it adds up a VLAN ID so default VLAN is 1, hence ultimate value become a
32,769 (32,768+1)
❖ So, the default priority of every switch is same hence it tie up this criteria ,then the next
criteria is
2.lowest MAC address
The first question is how to calculate lowest mac address
Here it is, MAC address is Hexadecimal value consist of numbers and alphabets
0 1 2 3 4 5 6 7 8 9 A B C D E F
HERE 0 IS LOWEST, THEN MOVE IT FORWARD TO F IS HIGHEST
NOTE:- IF LOWEST PRORITY HIT THEN ROOT BRIDGE SELECTED ON THE BASIS OF LOWEST
PRIORITY, IF THAT CRITERIA TIE UP THEN MOVE FORWARD TO LOWEST MAC ADDRESS.
STEP-2 SELECTION OF ROOT PORT
Root port get selected on the basis of port cost which is already assigned on interfaces
Default Port Cost of interface
INTERFACE TYPE PORT COST
ETHERNET (10MBPS) 100
FAST ETHERNET (100 MBPS) 19
1 GIGABIT ETHERNET (1 GBPS) 4
10 GIGABIT ETHERNET (10 GBPS) 2
Root port defines the nearest path to reach the destination
So, the rule is
Root port designated port [RP=DP]
Designated port root port or block port [DP=RP / DP=BP]
Root bridge has each port as designated port, and ports on other switches can be root port
or block port
21
AUTHOR:- KUSHAL H. KORDE
STEP -3 SELECTION OF BLOCK PORT
In the process of selection of block port switch uses a lowest priority and lowest MAC
address criteria again, the same criteria applied here as it is. If the lowest priority is equal,
then it move toward the lowest mac address.
TASK 6
Task 6.1 Verify the root bridge
Task 6.2 Change the root bridge
Task 6.3 Change the port cost
So, let’s start
In this picture
Sw-1 Will become a root bridge
22
AUTHOR:- KUSHAL H. KORDE
Now see switch 1 has all port ad designated port
Now, we are going to change root bridge
We going to plan switch 2 must be root bridge and if switch 2 fails in network switch 3 will
become a root bridge
In this switch 2 configuration we can clearly see eth 0/0 selected as root port cause the cost
to reach the root bridge is only 100. if switch chooses other route it will take 200 cost, to
reach the destination. (from switch 2 >switch 3 > switch 1= 200 cost)
23
AUTHOR:- KUSHAL H. KORDE
Same goes with switch 3
In this switch eth0/0 will become a root bridge as the cost is 100, whereas if switch chooses
a different path to reach the destination it will take more cost than usual (from switch 3 >
switch 2 > switch 1= 200 cost)
Now what if we dedicatedly want to change the root bridge role from switch 1 to switch 2
So, we play with switch priority first because we won’t change the mac address of the
switches.
SW-2(config)#spanning-tree vlan 1 root primary
We make switch 2 as root bridge by giving above command
24
AUTHOR:- KUSHAL H. KORDE
Now,
SW-3(config)#spanning-tree vlan 1 root secondary
By giving this above command we make switch 3 as a secondary root switch means if switch
2 fails as a root bridge. Then, switch 3 will become a root bridge.
Now how to change path cost
See, switch 3 has root port as eth 0/1 after changing the path cost. we make other port as a
root port
SW-3(config)#interface ethernet 0/0
SW-3(config-if)#spanning-tree cost 10
SW-3(config-if)#exit
By applying such command on switch 3 ethernet 0/0, switch 1 – ethernet 0/0 & 0/1, switch
2 ethernet 0/0 we create root port on switch 3 from 0/1 to 0/0
25
AUTHOR:- KUSHAL H. KORDE
ROUTING
Router is a device which we use for the purpose of routing. Now, there is a question what is
routing. routing means to route a data packet between networks .in layman language
routing means to show the path to the data packet.
here we go to the routing
routing has generally major two type
1. static routing
2. dynamic routing
STATIC ROUTING – In this method we as a network engineer, have to define each and every
route to the destination on every router till the destination.
DYNAMIC ROUTING – In this method we as a network engineer, have to only advertise the
network which is directly connected to router. Dynamic Routing has different types of
protocol, some of them are RIPv1 , RIPv2 , EIGRP , OSPF , ETC
STATIC ROUTING
LET’S START WITH THE STATIC ROUTING FIRST
TASK-7
Task 7.1 provide hostname accordingly
Task 7.2 Assign IP address to interface
Task 7.3 Do static routing, PC-1,2,3 should communicate withPC-4,5,6
27
AUTHOR:- KUSHAL H. KORDE
R4
Router(config)#hostname R4
R4(config)#interface ethernet 0/1
R4(config-if)#ip address 16.15.1.2 255.255.255.252
R4(config-if)#no shutdown
R4(config-if)#exit
R4(config)#interface ethernet 0/0
R4(config-if)#ip address 166.15.89.1 255.255.255.252
R4(config-if)#no shutdown
R4(config-if)#exit
R5
Router(config)#hostname R5
R5(config)#interface ethernet 0/0
R5(config-if)#ip address 199.56.66.2 255.255.255.252
R5(config-if)#no shutdown
R5(config-if)#exit
R5(config)#interface ethernet 0/1
R5(config-if)#ip address 166.15.89.2 255.255.255.252
R5(config-if)#no shutdown
R5(config-if)#exit
R5(config)#interface ethernet 0/2
R5(config-if)#ip address 20.21.22.1 255.255.255.224
R5(config-if)#no shutdown
R5(config-if)#exit
R6
Router(config)#hostname R6
R6(config)#interface ethernet 0/0
R6(config-if)#ip address 20.21.22.2 255.255.255.224
R6(config-if)#no shutdown
R6(config-if)#exit
R6(config)#interface ethernet 0/1
R6(config-if)#ip address 192.168.20.254 255.255.255.0
R6(config-if)#no shutdown
R6(config-if)#exit
28
AUTHOR:- KUSHAL H. KORDE
Now, we have done with initial configuration part that is IP’S to the interface and hostname
to router.
Well further we have to do is static routing. Let’s start with it.
In static routing we have to define path to reach the destination.
Command for static routing
IP ROUTE <….Dest Network Address…...> <……Dest Subnet Mask….> <Next hop ip
address>
Before starting with routing there is no route to the destination of 192.168.20.0 network.
so, we have to provide path for that network.
Start with R1,
R1(config)#ip route 192.168.20.0 255.255.255.0 20.21.21.2
Destination network address- 192.168.20.0
Destination subnet mask – 255.255.255.0
Next hop ip address – 20.21.21.2
After static routing command, there is an additional route start with “S”
Same thing we have to do with other routers, each router require path to reach the
destination.
R2
R2(config)#ip route 192.168.20.0 255.255.255.0 45.62.60.2
29
AUTHOR:- KUSHAL H. KORDE
R3
R3(config)#ip route 192.168.20.0 255.255.255.0 199.56.66.2
R5
R5(config)#ip route 192.168.20.0 255.255.255.0 20.21.22.2
We don’t need to configure R6 cause R6 already has route which is directly connected to it.
Represented with “C” in routing table.
When data came in the network of 192.168.20.0/24 then the PC gives back echo-reply to
the source device. Because we were trying to ping that network PC.
So, in this case source device is 192.168.10.1 in the network of 192.168.10.0/24, and to give
back a reply we don’t have return route to the 192.168.10.0/24 network. Now we need to
provide path to the destination network of 192.168.10.0/24.
R6
R6(config)#ip route 192.168.10.0 255.255.255.0 20.21.22.1
R5
R5(config)#ip route 192.168.10.0 255.255.255.0 166.15.89.1
R4
R4(config)#ip route 192.168.10.0 255.255.255.0 16.15.1.1
R2
R2(config)#ip route 192.168.10.0 255.255.255.0 20.21.21.1
Now we don’t need to provide path to the R1 for 192.168.10.0 network because that
network is directly connected to R1.
Now provide IP to pc and verify it by doing ping
30
AUTHOR:- KUSHAL H. KORDE
DEFAULT ROUTING
we have done static routing here. now there is a concept called default routing which is a
part of static routing. Default routing basically forwarding data to some given IP and then
that data can be forwarded by the device which is holding a given IP with the help of their
routing table. when we do default routing on edge router we only create one default entry
rest of the work is done by other router. we use default routing entry when we connect
router to internet. And on internet there is a lot of networks which we can’t define so there
we use default entry to push all the data packets to particular IP which is belongs to ISP and
then ISP do the main routing stuff.
Considering the static routing lab, where R1 is companies edge router which is connected
with multiple networks.
R1
R1(config)#ip route 0.0.0.0 0.0.0.0 20.21.21.2
Destination network address- 0.0.0.0 (UNKNOWN)
Destination subnet mask – 0.0.0.0 (UNKNOWN)
Next hop ip address – 20.21.21.2
Here we are telling the router that we don’t know the path to reach the destination but
we are forwarding that data on IP 20.21.21.2. So,20.21.21.2 can forward the data with
their own routing table. Rest configuration is same.
31
AUTHOR:- KUSHAL H. KORDE
ROUTING INFORMATION PROTOCOL (RIP)
❖ Rip is a dynamic routing protocol
❖ Rip uses Bellman Ford Algorithm
❖ Rip supports max 15 hop count
❖ Rip has AD value of 120
❖ Rip has a periodic update timer of 30 sec
❖ Rip has flush timer of 240 sec out of which 180 sec is a hold down timer & 60 sec is path
update timer.
❖ Rip has two version- version 1(RIPv1) & version 2(RIPv2)
❖ Ripv1 uses broadcast address to send messages, ripv1 do not support authentication
❖ Ripv2 has multicast address – 224.0.0.9, ripv2 support authentication.
TASK 8
Task 8.1 Assign hostname to the devices
Task 8.2 IP address to interfaces & pc’s
Task 8.3 Configure Routing
34
AUTHOR:- KUSHAL H. KORDE
Router R2 chooses 200.1.17.2 path to reach the destination of 192.168.2.0 network
NOW CONFIGURE ROUTE OF R1—R2—R5—R6—R4—R10
R1—R2—R4—R10 were already configured. So, we have to configure the rest
R5
R5(config)#router rip
R5(config-router)#network 200.1.12.0
R5(config-router)#network 200.1.23.0
R5(config-router)#exit
R6
R6(config)#router rip
R6(config-router)#network 200.1.23.0
R6(config-router)#network 200.1.34.0
R6(config-router)#exit
NOW GO TO R2
Now see R2 chooses 200.1.12.2 path to reach the destination of 192.168.2.0 network
pc1 tracing path to reach 192.168.2.1
35
AUTHOR:- KUSHAL H. KORDE
Now configure the path of R1—R2—R3—R4—R10
R3
R3(config)#router rip
R3(config-router)#network 200.1.15.0
R3(config-router)#network 200.1.54.0
R3(config-router)#exit
router R2 for routes update
So, here we are with the conclusion of RIP chooses lowest hop count path to reach the
destination.
36
AUTHOR:- KUSHAL H. KORDE
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL(EIGRP)
❖ Eigrp is a Dynamic routing protocol. Under this it is a Hybrid Protocol.
❖ Eigrp uses DUAL ALGORITHEM (Diffusing Update Algorithm)
❖ Eigrp support classless IP addressing, also support Authentication.
❖ Eigrp has AD value of 90
❖ Eigrp has hello timer of 5 sec and hold down timer is 15 sec. Eigrp do incremental
update.
❖ Eigrp has Multicast address 224.0.0.10
❖ Eigrp has default hop count is 100. We can increase the limit till 255 hops.
❖ Eigrp uses Metric : Bandwidth + Delay (+MTU+Reliability+load)
❖ Eigrp make three table :- 1.Neighbor table 2.Topology table 3.Routing table
TASK 9
Task 9.1 Assign ip to the interfaces
Task 9.2 Assign hostname on devices
Task 9.3 Configure EIGRP routing
37
AUTHOR:- KUSHAL H. KORDE
R2
R2(config)#router eigrp 100
R2(config-router)#network 200.10.12.0 0.0.0.255
R2(config-router)#network 200.10.25.0 0.0.0.255
R2(config-router)#network 200.10.23.0 0.0.0.255
R2(config-router)#network 200.10.20.0 0.0.0.255
R2(config-router)#exit
R3
R3(config)#router eigrp 100
R3(config-router)#network 200.10.23.0 0.0.0.255
R3(config-router)#network 200.10.34.0 0.0.0.255
R3(config-router)#exit
R4
R4(config)#router eigrp 100
R4(config-router)#network 200.10.34.0 0.0.0.255
R4(config-router)#network 200.10.47.0 0.0.0.255
R4(config-router)#exit
vIOS7
vISO7(config)#router eigrp 100
vISO7(config-router)#network 200.10.47.0 0.0.0.255
vISO7(config-router)#network 200.10.67.0 0.0.0.255
vISO7(config-router)#network 200.10.97.0 0.0.0.255
vISO7(config-router)#network 200.10.70.0 0.0.0.255
vISO7(config-router)#exit
R10
R10(config)#router eigrp 100
R10(config-router)#network 200.10.70.2 0.0.0.255
R10(config-router)#network 192.168.2.0 0.0.0.0.255
R10(config-router)#network 192.168.2.0 0.0.0.255
R10(config-router)#exit
38
AUTHOR:- KUSHAL H. KORDE
Now lets ping from PC1 – PC3
39
AUTHOR:- KUSHAL H. KORDE
Now configure upper route
vIOS5
vISO5(config)#router eigrp 100
vISO5(config-router)#network 200.10.25.0 0.0.0.255
vISO5(config-router)#network 200.10.56.0 0.0.0.255
vISO5(config-router)#exit
vIOS6
vIOS6(config)#router eigrp 100
vIOS6(config-router)#network 200.10.56.0 0.0.0.255
vIOS6(config-router)#network 200.10.67.0 0.0.0.255
vIOS6(config-router)#exit
Now router R2 chooses a upper path
40
AUTHOR:- KUSHAL H. KORDE
OPEN SHORTEST PATH FIRST (OSPF)
❖ OSPF is dynamic routing protocol, under this ospf is a link state protocol.
❖ OSPF uses DIJKSTRA ALGORITHM or SPF (SHORTEST PATH FIRST) ALGORITHEM
❖ OSPF has AD value of 110
❖ OSPF uses multicast address 224.0.0.5 and 224.0.0.6
❖ OSPF supports classless routing and also supports authentication
❖ OSPF creates 3 Routing Table
1. Neighbor table
2. Database table
3. Routing table
❖ OSPF do trigger update (incremental update + every 30 min whole routing table update)
❖ OSPF uses lowest bandwidth as a cost to reach the destination
TASK 10
Task 10.1 Assign IP to the interfaces
Task 10.2 Assign hostname on devices
Task 10.3 Configure OSPF routing
R2
R3
R4
R5
R2
42
AUTHOR:- KUSHAL H. KORDE
R2(config)#router ospf 100
R2(config-router)#network 172.16.29.0 0.0.0.3 area 0
R2(config-router)#network 172.16.29.4 0.0.0.3 area 0
R2(config-router)#network 172.16.29.8 0.0.0.3 area 0
R2(config-router)#network 172.16.29.12 0.0.0.3 area 0
R2(config-router)#exit
R3
R3(config)#router ospf 100
R3(config-router)#network 172.16.29.4 0.0.0.3 area 0
R3(config-router)#network 192.168.71.0 0.0.0.255 area 2
R3(config-router)#exit
R4
R4(config)#router ospf 100
R4(config-router)#network 172.16.29.12 0.0.0.3 area 0
R4(config-router)# network 192.168.73.0 0.0.0.255 area 3
R4(config-router)#exit
R5
R5(config)#router ospf 100
R5(config-router)#network 172.16.29.8 0.0.0.3 area 0
R5(config-router)#network 192.168.72.0 0.0.0.255 area 4
R5(config-router)#exit
For VERIFICATION,
#show ip route
R1
43
AUTHOR:- KUSHAL H. KORDE
R2
R3
R4
R5
44
AUTHOR:- KUSHAL H. KORDE
We have verify the routing, now let’s try to ping form PC1 to PC4
45
AUTHOR:- KUSHAL H. KORDE
REST CONFIGURATION IS SAME.EXCEPT R4 and R5
R4
Interface ethernet 0/0 consist network of 172.16.29.12/30 will be advertise in OSPF and
Interface ethernet 0/1 consist network of 192.168.73.0/24 will be advertise in RIP .
R4(config)#router ospf 100
R4(config-router)#network 172.16.29.13 0.0.0.3 area 0
R4(config-router)#exit
R4(config)#router rip
R4(config-router)#version 2
R4(config-router)#network 192.168.73.0
R4(config-router)#exit
See there is no route on R2 router for 192.168.73.0/24 network cause R2 is in ospf and
192.168.73.0/24 is in RIP
46
AUTHOR:- KUSHAL H. KORDE
Let’s do it
R4(config)#router ospf 100
R4(config-router)#redistribute rip subnets
R4(config-router)#exit
R4(config)#router rip
R4(config-router)#redistribute ospf 100 metric 1
R4(config-router)#exit
Now see R2 will have 192.168.73.0/24 network in his routing table
R5
Interface ethernet 0/0 consist network of 172.16.29.8/30 will be advertise in OSPF and
Interface ethernet 0/1 consist network of 192.168.72.0/24 will be advertise in EIGRP .
R5(config)#router ospf 100
R5(config-router)#network 172.16.29.8 0.0.0.3 area 0
R5(config-router)#exit
R5(config)#router eigrp 90
R5(config-router)#network 192.168.72.0 0.0.0.255
R5(config-router)#exit
See there is no route on R2 router for 192.168.72.0/24 network cause R2 is in ospf and
192.168.72.0/24 is in EIGRP
47
AUTHOR:- KUSHAL H. KORDE
Now we have to advertise EIGRP network in OSPF and vice versa
R5(config)#router eigrp 90
R5(config-router)#redistribute ospf 100 metric 10000 1000 255 255 1500
R5(config-router)#exit
Here 10000 is a bandwidth of interface,1000 is a delay of the ethernet interface,255 is a
reliability,255 is a load, 1500 is MTU
R5(config)#router ospf 100
R5(config-router)#redistribute eigrp 90 subnets
R5(config-router)#exit
Now we can see 192.168.72.0/24 network in R2’s routing table
48
AUTHOR:- KUSHAL H. KORDE
DHCP and DNS
49
AUTHOR:- KUSHAL H. KORDE
IP’s of the devices
R1 Eth0/0 – 192.168.10.254/24 Eth0/1 – 12.12.21.1/30
R2 Eth0/0 – 12.12.21.2/30 Eth0/1 – 200.10.20.30/24
R4-DNS ETH 0/0 – 200.10.20.10/24
SERVER-1 ETH 0/0 – 200.10.20.20/24
Let’s do it
R1(config)#ip dhcp pool CCN-LAN
R1(dhcp-config)#network 192.168.10.0 255.255.255.0
R1(dhcp-config)#default-router 192.168.10.254
R1(dhcp-config)#dns-server 200.10.20.10
R1(dhcp-config)#lease 0 12
R1(dhcp-config)#exit
➢ To configure DHCP we need 4 basic things that is IP, subnet mask, default gateway
and DNS
➢ From network command we provide IP and subnet mask
➢ From default-router command we have provide a default gateway
➢ From DNS-SERVER command we provided a DNS server IP
➢ And by giving lease command we provided a lease period for that assigning IP
50
AUTHOR:- KUSHAL H. KORDE
VPC
3 so now do routing on all devices here we running eigrp on router you can do any routing
R1
R1(config)#router eigrp 100
R1(config-router)#network 192.168.10.0 0.0.0.255
R1(config-router)#network 12.12.21.0 0.0.0.3
R1(config-router)#exit
R2
R2(config)#router eigrp 100
R2(config-router)#network 12.12.21.0 0.0.0.3
R2(config-router)#network 200.10.20.0 0.0.0.255
R2(config-router)#exit
R-PC
R-PC(config)#ip route 0.0.0.0 0.0.0.0 192.168.10.254
R-DNS
R4-DNS(config)#ip route 0.0.0.0 0.0.0.0 200.10.20.30
SERVER-1 (www.ccn.com)
www.ccn.com(config)#ip route 0.0.0.0 0.0.0.0 200.10.20.3
4 now start the dns server on R4-DNS
51
AUTHOR:- KUSHAL H. KORDE
R4-DNS(config)#ip dns server
R4-DNS(config)#ip host www.ccn.com 200.10.20.20
First command is to start DNS server port number udp-53
And second command is to bind domain name with ip address
5 now ping the www.ccn.com consist ip 200.10.20.20
52
AUTHOR:- KUSHAL H. KORDE
NETWORK TIME PROTOCOL (NTP)
❖ NTP is a network time uses UDP port -123
❖ Basically, NTP uses on all LAN as well as WAN devices just to sync time of their devices
with NTP server, if time of those won’t match then internet won’t be able to work on
that device.
❖ With the help of NTP we generate logs of the devices to solve the issues which generally
occur in Enterprise environment. if time is mismatching then the troubleshoot will be
more difficult.
We are going to consider lab which we used for the DHCP & DNS configuration
R2 (NTP Master)
R2(config)#interface loopback 1
R2(config-if)#ip address 10.10.10.1 255.255.255.255
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#ntp master 1
R2(config)#ntp source loopback 1
Here we specify the NTP master stratum number 1 which mean it is most trusted NTP
server in a network and we specify the source interface from where NTP broadcast will
happen
R1(NTP Client)
R1(config)#ntp server 10.10.10.1
Here we specify the NTP servers ip address which is R2’s loopback 1 interface ip address
Now the NTP authentication is totally optional
R1
R1(config)#ntp authentication-key 1 md5 ccn
R1(config)#ntp authenticate
R2
R2(config)#ntp authentication-key 1 md5 ccn
R2(config)#ntp authenticate
VERIFICATION
R1#show ntp status OR R1#show ntp association
53
AUTHOR:- KUSHAL H. KORDE
TELNET, SSH, HTTP, HTTPS
TELNET
Telnet is a remote access service works under TCP and uses port number 23 .generally
telnet sends data in clear text format.
SSH
SSH is also a remote access service works under tcp and uses port number 22 . Genrally ,
ssh send data in encrypted format over the networks .it encrypts data through rsa
algorithem , and consist key size of 2048 bit which is market standard.
Now configure the TELNET, SSH, HTTP, HTTPS on devices
Task 12
Task 12.1 Assign IP according to networks represents in diagram
Task 12.2 Configure SERVER 1 for TELENT service
Task 12.3 Configure SERVER 2 for SSH service
Task 12.4 Configure SERVER 1 for HTTP service
Task 12.5 Configure SERVER 2 for HTTPS service
54
AUTHOR:- KUSHAL H. KORDE
R1 ETH 0/0 192.168.10.254/24 ETH 0/1 12.12.21.1/30
55
AUTHOR:- KUSHAL H. KORDE
SSH
SSH on server 2
SERVER-2(config)#line vty 0 4
SERVER-2(config-line)#transport input ssh
SERVER-2(config-line)#login local
SERVER-2(config-line)#exit
SERVER-2(config)#crypto key generate rsa modulus 2048 label mypubkey
Username & password
SERVER-2(config)#username ccn privilege 15 password ccn
Here line vty means virtual teletype which means a connection over a networks or
connection which is virtual .then , 0 4 means at a time 5 line connection can be activate
.transport input ssh means the data travels over a network should only connect to a ssh
service activated on a device .and , login local means at the time of login device should ask
username & password which is verified from local user database which is created on device.
Crypto key command is to start the encryption process of the data through rsa algorithem
with standard key 0f 2048 bit.
How to take access?
Router# ssh -l <username> <destination_ip_address>
56
AUTHOR:- KUSHAL H. KORDE
HTTP
HTTP on server 1
SERVER-1(config)#ip http server
By applying above command, we are enabling TCP port 80 which we generally use to take
GUI access.
VERIFICATION
Router# telnet <destination_ip_address> <desired_port>
With the command we get a output of […..open ] means http is enable on device
HTTPS
https on server 2
SERVER-2(config)#ip http secure-server
By applying this command we are enabling tcp port 443 on device which we genrally use to
take secure GUI access
To additional security we enable authentication
SERVER-2(config)#ip http authentication local
By applying this command we are enabling authentication on devices through local user
database.
VERIFICATION
Router# telnet <destination_ip_address> <desired_port>
With the command we get a output of […..open ] means https is enable on device
57
AUTHOR:- KUSHAL H. KORDE
ACCESS-CONTROL LIST (ACL)
TASK -
13
Task 13.1 Provide IP to the devices.
SECTION DEVICE NAME IP ON INTERFACE
CO-1 ETH0/0= 192.168.10.254/24
ETH0/1= 20.30.10.10/24
COMPANY - 1 VPC9 192.168.10.1/24
VPC10 192.168.10.2/24
VPC11 192.168.10.3/24
R-PC 192.168.10.100/24
CO-2 ETH0/0= 172.16.10.254/24
ETH 0/1 = 20.30.10.20/24
COMPANY - 2 VPC12 172.16.10.1/24
VPC13 172.16.10.2/24
VPC14 172.16.10.3/24
INTERNAL_SERVER 172.16.10.100/24
ISP ISP-MUMBAI ETH0/0 = 20.30.10.30/24
ETH0/1= 200.10.20.10/24
DNS_SERVER 200.10.20.20/24
WEB-1 200.10.20.30/24
OTHERS WEB-2 200.10.20.40/24
SERVER-1 200.10.20.50/24
USER_PC 200.10.20.60/24
Task 13.2 Do Routing on devices (Any kind of Routing)
58
AUTHOR:- KUSHAL H. KORDE
Task 13.3 Create a ACL for company - 1
1. R-PC should TELNET WEB-1 and WEB-2
2. R-PC should SSH WEB-1 and WEB-2
3. R-PC should HTTP WEB-1 and WEB-2
4. R-PC should HTTPS WEB-1 and WEB-2
5. Network of 192.168.10.0/24 should PING DNS_SERVER & SERVER-1
6. R-PC should PING/TELNET/SSH/HTTP/HTTPS to SERVER-1 (www.ccn.com)
Task 13.4 Create A ACL For Company – 2
1. USER_PC should TELNET INTERNAL_SERVER
2. USER_PC should SSH INTERNAL_SERVER
3. USER_PC should HTTP INTERNAL_SERVER
4. USER_PC should HTTPS INTERNAL_SERVER
5. USER_PC should PING a Network of 172.16.10.0/24
SOLUTION
COMPANY 1 ACL
1) R-PC SHOULD TELNET WEB-1 AND WEB-2
ip access-list extended in-out
1 permit tcp host 192.168.10.100 host 200.10.20.30 eq telnet
2 permit tcp host 192.168.10.100 host 200.10.20.40 eq telnet
ip access-list extended out-in
1 permit tcp host 200.10.20.30 host 192.168.10.100 ack
2 permit tcp host 200.10.20.40 host 192.168.10.100 ack
2) R-PC SHOULD SSH WEB-1 AND WEB-2
ip access-list extended in-out
3 permit tcp host 192.168.10.100 host 200.10.20.30 eq 22
4 permit tcp host 192.168.10.100 host 200.10.20.40 eq 22
In first entry we are provided permission of ack to the TCP given IP, so again we don’t need
to do it
3) R-PC SHOULD HTTP WEB-1 AND WEB-2
ip access-list extended in-out
5 permit tcp host 192.168.10.100 host 200.10.20.30 eq 80
6 permit tcp host 192.168.10.100 host 200.10.20.40 eq 80
4) R-PC SHOULD HTTPS WEB-1 AND WEB-2
59
AUTHOR:- KUSHAL H. KORDE
ip access-list extended in-out
7 permit tcp host 192.168.10.100 host 200.10.20.30 eq 443
8 permit tcp host 192.168.10.100 host 200.10.20.40 eq 443
5) NETWORK OF 192.168.10.0/24 SHOULD PING DNS_SERVER & SERVER-1
ip access-list extended in-out
9 permit icmp 192.168.10.0 0.0.0.255 host 200.10.20.20 echo
10 permit icmp 192.168.10.0 0.0.0.255 host 200.10.20.50 echo
ip access-list extended out-in
3 permit icmp host 200.10.20.20 192.168.10.0 0.0.0.255 echo-reply
4 permit icmp host 200.10.20.50 192.168.10.0 0.0.0.255 echo-reply
6) R-PC SHOULD PING/TELNET/SSH/HTTP/HTTPS TO SERVER-1 (www.ccn.com)
ip access-list extended in-out
11 permit tcp host 192.168.10.100 host 200.10.20.50 eq www
12 permit tcp host 192.168.10.100 host 200.10.20.50 eq 443
13 permit tcp host 192.168.10.100 host 200.10.20.50 eq 22
14 permit tcp host 192.168.10.100 host 200.10.20.50 eq telnet
15 permit icmp host 192.168.10.100 host 200.10.20.50 echo
ip access-list extended out-in
5 permit tcp host 200.10.20.50 host 192.168.10.100 ack
6 permit icmp host 200.10.20.50 host 192.168.10.100 echo-reply
COMPANY 2 ACL
1) USER_PC SHOULD TELNET INTERNAL_SERVER
ip access-list extended out-in
permit tcp host 200.10.20.60 host 172.16.10.100 eq 23
2) USER_PC SHOULD SSH INTERNAL_SERVER
ip access-list extended out-in
permit tcp host 200.10.20.60 host 172.16.10.100 eq 22
3) USER_PC SHOULD HTTP INTERNAL_SERVER
ip access-list extended out-in
permit tcp host 200.10.20.60 host 172.16.10.100 eq 80
4) USER_PC SHOULD HTTPS INTERNAL_SERVER
ip access-list extended out-in
permit tcp host 200.10.20.60 host 172.16.10.100 eq 443
60
AUTHOR:- KUSHAL H. KORDE
5) USER_PC SHOULD PING NETWORK OF 172.16.10.0/24
ip access-list extended out-in
permit icmp host 200.10.20.60 172.16.10.0 0.0.0.255 echo
WE HAVE TO PERMIT ROUTING PROTOCOL BECAUSE THAT PROTOCOL SENDING HELLO
MESSGAES AND BLOCKED BY ACL
ip access-list extended out-in
permit eigrp any any
VERIFICATION
COMPANY-1
COMPANY-2
61
AUTHOR:- KUSHAL H. KORDE
STANDARD ACL
❖ Basically, We Do Make Standard Access-Control List For Permit/Deny Source Traffic Only
Unlike Extended ACL Where We Permit/Deny Source To Destination Traffic With The
Control Of Protocol & Services As Well
❖ Standard ACL permit source traffic and allow all kinds of traffic on that give ip or a
network/subnet
Let’s make Standard ACL
CREATION
Router(config)#ip access-list standard lan-wan
Router(config)#permit host 192.168.10.1 …………..(permit single ip with all source traffic)
OR
Router(config)#permit 192.168.10.0 0.0.0.255…permit whole network with all source
traffic)
Router(config)#deny any
IMPLEMENTATION
Router(config)#interface ethernet 0/0
Router(config)#ip access-group lan-wan in
Router(config)#exit
VERIFICATION
Router# show ip access-list ……..(show all acl)
OR
Router#show ip access-list lan-wan ………(show only lan-wan acl)
Allowing all kinds of source traffic will make it more vulnerable that’s why we use extended
ACL, otherwise we use Standard ACL for NAT/PAT configuration or VPN configuration.
62
AUTHOR:- KUSHAL H. KORDE
NETWORK ADDRESS TRANSALATION (NAT) &
PORT ADDRESS TRANSLATION (PAT)
❖ We use a NAT technology to translate private IP to public IP. Then, there are many
things in a NAT that is Static NAT, Dynamic NAT, PAT (Port Address Translation)
❖ Static NAT – in Static NAT translate private IP to public IP, it is one to one translate and
we do manual entry for that. with Static NAT bidirectional connection can be made.
❖ Dynamic NAT- dynamic NAT also translate private IP to public IP but in different way.
Here
we create pool of public IP then random private IP can be translate to public IP out of
this pool. It creates unidirectional connection.
❖ PAT – PAT also translate private IP to public IP but adds up port number. Many private IP
translate into one public IP with the effect of port number. pat provide unidirectional
connection.
TASKS – 14
IP
CO-1 ETH 0/0=192.168.10.254/24 ETH 0/1=20.30.10.1/24
VPC9 192.168.10.1
VPC10 192.168.10.2
CO-1 PC
VPC11 192.168.10.3
63
AUTHOR:- KUSHAL H. KORDE
INTERNAL_SERVER 192.168.10.100
CO-2 ETH0/0 = 172.16.10.254/24 ETH0/1 = 25.35.45.1/27
VPC12 172.16.10.1
VPC13 172.16.10.2
CO-2 PC VPC14 172.16.10.3
R-PC-40 172.16.10.100
CO-3 ETH0/0=10.10.10.254/24 ETH0/1=130.30.30.1/30
R-PC-2 10.10.10.100
PC24 10.10.10.1
CO-3 PC PC25 10.10.10.2
PC26 10.10.10.3
ISP-MUMBAI
ETH0/0.111 20.30.10.2/24
ETH0/0.219 25.35.45.2/27
ETH0/0.389 130.30.30.2/30
ETH0/1 200.10.20.1/24
ISP-SW
ETH0/0 VLAN 111 = CO-1_ISP
ETH0/1 VLAN 219 = CO-2_ISP
ETH0/3 VLAN 389 = CO-3_ISP
ETH0/2 TRUNK
OTHERS
WEB-1 200.10.20.10/24
WEB-2 200.10.20.20/24
SERVER-1 200.10.20.30/24
USER_PC 200.10.20.40/24
ROUTING EIGRP 199
Task 14.1 CO-1
VPC-9, VPC-10 , VPC-11 , INTERNAL SERVER Should Assign Static Mapped With The Ip Of
20.30.10.10 ,20.30.10.20 , 20.30.10.30 , 20.30.10.40
Do telnet on IP 20.30.10.40 it redirects to the INTERNAL SERVER
Task 14.2 – CO-2
VPC-12 , VPC-13 , VPC-14 , R-PC-40 Should Dynamically Mapped With The Given Pool Of IP
25.35.45.3 – 25.35.45.7
Task 14.3 -CO-3
64
AUTHOR:- KUSHAL H. KORDE
A Whole Network of Company 3 Should Mapped With The Ip Of ETH 0/1 (CO-3)
LET’S DO IT
TASK – 14.1
1.Do Static NAT entry on router
CO-1(config)#ip nat inside source static 192.168.10.1 20.30.10.10
CO-1(config)#ip nat inside source static 192.168.10.2 20.30.10.20
CO-1(config)#ip nat inside source static 192.168.10.3 20.30.10.30
CO-1(config)#ip nat inside source static 192.168.10.100 20.30.10.40
2.then activate NAT on interface
CO-1(config)#interface ethernet 0/0
CO-1(config-if)#ip nat inside
CO-1(config-if)#exit
CO-1(config)#interface ethernet 0/1
CO-1(config-if)#ip nat outside
CO-1(config-if)#exit
VERIFCATION
ON ROUTER
To stop Debugging
WEB-1#undebug all
65
AUTHOR:- KUSHAL H. KORDE
Telnet
TASK – 14.2
To Combine all Private IP we create Standard ACL
CO-2(config)#ip access-list standard DYN_NAT-LIST
CO-2(config-std-nacl)#permit 172.16.10.0 0.0.0.255
CO-2(config-std-nacl)#exit
To create NAT POOL
CO-2(config)# ip nat pool CCN-DYN_NAT 25.35.45.3 25.35.45.7 netmask 255.255.255.224
To match up Private IP ‘s list (ACL) with NAT POOL (pool)
CO-2(config)#ip nat inside source list DYN_NAT-LIST pool CCN-DYN_NAT
To Implement NAT
CO-2(config)#interface ethernet 0/0
CO-2(config-if)#ip nat inside
CO-2(config-if)#exit
CO-2(config)#interface ethernet 0/1
CO-2(config-if)#ip nat outside
CO-2(config-if)#exit
66
AUTHOR:- KUSHAL H. KORDE
VERIFICATION
Did ping from vpc-12 to web-1
TASK – 14.3
To combine all Private IP we create Standard ACL
CO-3(config)#ip access-list standard PAT-LIST
CO-3(config-std-nacl)#permit 10.10.10.0 0.0.0.255
CO-3(config-std-nacl)#exit
To combine ACL with Interface for PAT
CO-3(config)# ip nat inside source list PAT-LIST interface ethernet 0/1 overload
To Implement NAT/PAT
CO-3(config)#interface ethernet 0/0
CO-3(config-if)#ip nat inside
CO-3(config-if)#exit
VERIFICATION
67
AUTHOR:- KUSHAL H. KORDE
ACL AND NAT
VPC-9 192.168.10.1/24
VPC-11 192.168.10.3/24
R-PC 192.168.10.100/24
VPC-12 172.16.10.1/24
VPC-14 172.16.10.3/24
INTERNAL_SERVER 172.16.10.100/24
ISP-SW
68
AUTHOR:- KUSHAL H. KORDE
ETH0/1 VLAN 199 => ISP_CO-2
ETH0/0.99 = 20.30.10.20/24
ISP-MUMBAI
ETH0/0.199 45.35.55.75/24
ETH0/1 200.10.20.1/24
OTHERS
DNS_SERVER 200.10.20.10/24
WEB-1 200.10.20.20
WEB-2 200.10.20.30
SERVER-1 200.10.20.40
USER_PC 200.10.20.50
ROUITNG
❖ CO-1 > EIGRP 199 on both side
❖ CO-2 > OSPF 100 AREA 1 both side
❖ ISP_MUMBAI > EIGRP 199 / OSPF 100 AREA 1 for CO-1 & CO-2’s other side RIP
❖ DNS_SERVER / WEB-1 / WEB-2 / SERVER-1 / USER_PC / R-PC / INTERNAL_SERVER =
DEFAULT ROUTING
TASK – 15
CO-1
Task – 15.1 ACL TASK
1.A whole network can PING WEB-1 AND WEB-2
2.R-PC can TELNET & SSH WEB-1 & WEB-2
3.R-PC can do HTTP & HTTPS TO SERVER-1
ACL
Task 15.1 = 1)
CO-1(config)#ip access-list extended in-out
CO-1(config-ext-nacl)#1 permit icmp 192.168.10.0 0.0.0.255 host 200.10.20.20 echo
70
AUTHOR:- KUSHAL H. KORDE
Task 15.1 = 2)
CO-1(config-ext-nacl)#ip access-list extended in-out
CO-1(config-ext-nacl)#2 permit tcp host 192.168.10.100 host 200.10.20.20 eq 23
CO-1(config-ext-nacl)#3 permit tcp host 192.168.10.100 host 200.10.20.20 eq 22
CO-1(config-ext-nacl)#2 permit tcp host 192.168.10.100 host 200.10.20.30 eq 23
CO-1(config-ext-nacl)#3 permit tcp host 192.168.10.100 host 200.10.20.30 eq 22
CO-1(config-ext-nacl)#ip access-list extended out-in
CO-1(config-ext-nacl)#5 permit tcp host 200.10.20.20 host 20.30.10.100 ack
CO-1(config-ext-nacl)#6 permit tcp host 200.10.20.30 host 20.30.10.100 ack
Task 15.1 = 3)
CO-1(config-ext-nacl)#ip access-list extended in-out
CO-1(config-ext-nacl)#4 permit tcp host 192.168.10.100 host 200.10.20.40 eq 80
CO-1(config-ext-nacl)#5 permit tcp host 192.168.10.100 host 200.10.20.40 eq 443
71
AUTHOR:- KUSHAL H. KORDE
CO – 2
First we are going to do NAT Task
Task -15.4
NAT
CO-2(config)#ip nat inside source static 172.16.10.1 45.35.55.10
CO-2(config)#ip nat inside source static 172.16.10.2 45.35.55.20
CO-2(config)#ip nat inside source static 172.16.10.3 45.35.55.30
CO-2(config)#ip nat inside source static 172.16.10.100 45.35.55.100
Implementation of NAT
CO-2(config)#interface ethernet 0/0
CO-2(config-if)#ip nat inside
CO-2(config-if)#exit
CO-2(config)#interface ethernet 0/1
CO-2(config-if)#ip nat outside
CO-2(config-if)#exit
ACL
Task 15.3 = 1)
CO-2(config)#ip access-list extended wan-lan
CO-2(config-ext-nacl)#1 permit icmp host 200.10.20.50 45.35.55.0 0.0.0.255 echo
ISP-MUMBAI
73
AUTHOR:- KUSHAL H. KORDE
HOW TO ADD YOUR LAPTOP/PC TO EVE-NG LAB SETUP
1.DO RIGHT CLICK SELECT ADD A NEW OBJECT >“NETWORK”.
2.Here IP of the network is 192.168.232.0/24, here we put IP of that eve-ng network .so
your IP might be change according to your eve-ng network IP
74
AUTHOR:- KUSHAL H. KORDE
3.Assign one IP of that network to router interface ethernet 0/2=192.168.232.100
255.255.255.0
5.Then, go to your real PC/LAPTOP open command prompt – run as administrator and add
a manual route to the eve-ng network
75
AUTHOR:- KUSHAL H. KORDE
6. Then try to ping IP 192.168.232.100(router’s IP)
If it is pinging it means your real PC/LAPTOP got connected with eve-ng LAB setup
76
AUTHOR:- KUSHAL H. KORDE
SYSLOG
❖ Syslog means system logs. we generally use this log to identify the problem or trouble
shoot the issue, to monitor the network, to identify the problematic area
❖ Syslog has basically THREE METHODS
1. CONSOLE- all the logs generated by the device will show it on screen/terminal like
putty, Secure-CRT
2. BUFFER- All the logs generated by the device will stored it in buffer/memory of the
device
3. TRAP- All the logs generated by the device will trap and send it given specific IP
CONSOLE
COMPANY-1(config)#logging on …..(to start the logging on devices)
COMPANY-1(config)#logging console informational
BUFFER
COMPANY-1(config)#logging on
COMPANY-1(config)#logging buffered 4096 …………… (allocate memory size)
COMPANY-1(config)#logging buffered informational (logs message till informational level)
Verification
COMPANY-1# show logging
77
AUTHOR:- KUSHAL H. KORDE
TRAP
COMPANY-1(config)#logging on
COMPANY-1(config)#logging trap informational
COMPANY-1(config)#logging host 192.168.232.1 ……(logs are trapped and send it to this ip)
For trapped messages we need some tools to view it so here we use the ‘kiwi syslog server’
1.This is the kiwi syslog server look
78
AUTHOR:- KUSHAL H. KORDE
3.then , go to 1.Input > 2.Add IP address of the log generating device > Add > Apply > OK
4.finally you get message over here like this if event occur. here we done manual interface
shutdown just to check messages are trapped or not. so, we get the messages.
79
AUTHOR:- KUSHAL H. KORDE
CDP
❖ CDP stands for Cisco Discovery Protocol uses to find neighboring cisco devices only.
❖ Default, CDP timer is 60 sec, whereas CDP hold down timer is 180 sec.
❖ CDP is default running on cisco devices.
Commands
To run CDP on Global mode
COMPANY-1(config)#cdp run
To set CDP timer
COMPANY-1(config)#cdp timer …. <5-254>……
To set CDP Holdtime
COMPANY-1(config)#cdp holdtime ……<10-255>……..
To enable CDP on interface
COMPANY-1(config)#interface ethernet 0/1
COMPANY-1(config-if)#cdp enable
COMPANY-1(config-if)#exit
COMPANY-1(config)#interface ethernet 0/0
COMPANY-1(config-if)#cdp enable
COMPANY-1(config-if)#exit
VERIFICATION
COMPANY-1#show cdp neighbors
COMPANY-1#show cdp neighbors detail
80
AUTHOR:- KUSHAL H. KORDE
LLDP
LLDP is a Link Layer Discovery Protocol we use this to find out neighbor devices in a
network. it is a Layer 2 protocol of OSI model. LLDP timer is 30 sec. whereas, LLDP
holdtime is 120 sec.
Commands
To start LLDP Globally
COMPANY-1(config)#lldp run
To LLDP on interface (first start it Globally)
COMPANY-1(config-if)#interface ethernet 0/0
COMPANY-1(config-if)#lldp transmit
COMPANY-1(config-if)#lldp receive
COMPANY-1(config-if)#exit
COMPANY-1(config)#interface ethernet 0/1
COMPANY-1(config-if)#lldp transmit
COMPANY-1(config-if)#lldp receive
COMPANY-1(config-if)#exit
VERIFICATION
COMPANY-1#show lldp neighbors
COMPANY-1#show lldp neighbors detail
81
AUTHOR:- KUSHAL H. KORDE
PASSWORD ASSIGNMENT
How to assign password on router and switches?
the commands are same no changes
ROUTER/SWITCH
To Give Password to CONSOLE PORT
Router(config)#line con 0
Router(config-line)#password ccn
Router(config-line)#login
Router(config-line)#exit
NOTE:-By Applying This Command Device Will Only Ask For The Password
If Company Wants To Ask For Username And Password To There Employee Then We Can
Set Accordingly
Router(config)#line con 0
Router(config-line)#login local ……(by this it will ask for username & password at the time
of console login)
Router(config-line)#exit
For that we have to create username and password
Router(config)#username ccn privilege 1 password ccn …..(make entry in clear text format
)
OR
Router(config)#username ccn privilege 1 secret ccn123 …..( make entry in clear encrypted
format)
82
AUTHOR:- KUSHAL H. KORDE
Applying password at PRIVILAGE MODE
Router(config)#enable password ccn1234
This will enable password at privilege mode with clear text format
VERIFICATION
83
AUTHOR:- KUSHAL H. KORDE
Now, because of this weakness we most probably assign password in encrypted format
Router(config)#enable secret ccn123
This password is now encrypted in md5 hash value. Now, this value is not reversible.
84
AUTHOR:- KUSHAL H. KORDE
PASSWORD RECOVERY
if we fail to remember the password then the only condition is to recover the password this
situation is not that often in company. we need to know what to do in such condition.
ROUTER PASSWORD RECOVERY
1.First Check Router Register Value
Router#show version
In this command we can see the register value
Configuration register is 0x2102
• 0x2102 is a default value by reading this value router read the startup-config
• 0x2142 is another value by reading this value router skip the startup-config
So we have to change this value but we can’t get inside the router CLI .so what else we can
do is
Go to routers rommon mode (read only memory monitor mode).
1.Restart the router
2.When router is decompressing the iso image press button
CTRL + C
OR
CTRL + PAUSE/BREAK
3.And enter in rommon mode
Now change the register value
rommon 1 > confreg 0x2142
rommon 2 > boot
after booting the router go to privilege type #show version
Configuration register is 0x2142
It will show you 0x2142
Now, bring startup-config to running-config
Router#copy startup-config running-config
4.It is the time to change the password or remove the password
5.After changing the password change the register value as well
Router(config)#config-register 0x2102
Now, to verify
Router#show version
It will show you output like this
85
AUTHOR:- KUSHAL H. KORDE
Configuration register is 0x2142 (will be 0x2102 at next reload)
After all this save the configuration
Router# write memory
86
AUTHOR:- KUSHAL H. KORDE
IOS UPGRADATION
IOS stands for INTERNETWORK OPERATING SYSTEM which is a Basic OS for all cisco Router
and Switches.
Certainly, Cisco launches a New updates in their operating system like current version of
cisco IOS is 15.1.1 after some fixes cisco launches a new update which will be like 15.1.2. so
here we have to upgrade the old OS with new one.
How to do it?
Let’s see,
On ROUTER,
Here is the reference diagram,
S
In the above reference lab “FLR-1_ROUTER-1”is the main router. then, that Net-TFTP is our
real pc connected in a network
Before going for upgradation we took backup of the configuration file and current IOS
version just to take care from future uncertainty.
1.Take Configuration backup of Device
87
AUTHOR:- KUSHAL H. KORDE
Here is the first look of the tftpd64 tool
2.Take IOS back up on device
FLR-1_ROUTER-1#copy flash: tftp:
Then, provide remote address of the host means address of TFTP server => now provide
source file which will be going copy from routers flash to
88
AUTHOR:- KUSHAL H. KORDE
While copying of this data, tftpd64 looks like
Provide them remote address of tftp server and file name of the IOS which we want to load
Then it will start copying the file. It will take some time to copy data.
Similarly, we can do reversal of configuration file.
Provide them remote address of the tftp server. And source file name.
WHAT IF WE DO HAVE TWO OPERATING SYSTEM ON DEVICE. then,
By applying the above command, we can specify the OS which will be loading at the time
of booting.
89
AUTHOR:- KUSHAL H. KORDE
L2 SECURITY
❖ L2 security means overall switch security. when it comes to LAN network we have to
secure the network switches and when it comes to internet we have to secure routers
by doing proper configuration.
❖ So, in LAN network there is possibility that a rouge employee can attack a company’s
IT Infra with some malicious intention. Just like to steal company’s data, to create jitter
in a network, to redirect company’s employees to malicious site just to gather
information.
❖ in such situation how can we secure our organization, so here is the solution – L2
security
In This Scenario We Have to Consider Potential Threats And Make Our Lan Network More
Secure Against The Attacks
ATTACKS SECURITY
DHCP starvation attack
MAC spoofing
SWITCHPORT SECUIRTY
MAC flooding
CDP flooding
Rouge DHCP server / DHCP spoofing DHCP SNOOPING
IP spoofing IP SOURCE GUARD
ARP poisoning DYNAMIC ARP INSPECTION (DAI)
STP attacks BPDU GUARD / BPDU FILTER / ROOT
GUARD
90
AUTHOR:- KUSHAL H. KORDE
1.DHCP STRAVATION ATTACK
In this attack linux PC fetch all the IP of DHCP pool and left it with 0 IP’s to assign to genuine
user.
How to perform this attack
Go to linux =>Terminal => yersinia -G
91
AUTHOR:- KUSHAL H. KORDE
This tool can perform different types of attacks
First, we are going do DHCP starvation attack
Before this attack DHCP server allotted only two IP’s
92
AUTHOR:- KUSHAL H. KORDE
Effect of this attack is pool of DHCP server will get empty
See leased addresses is 251 means all IP’s of this pool is allotted.
Effect on switch
See dynamic address count is 13,635 it means switch reads multiple MAC addresses. we
also can see it with command
#show mac address-table
93
AUTHOR:- KUSHAL H. KORDE
2.MAC SPOOFING
Mac spoofing means to mask someone’s mac address and put it on our interface.
How to perform this attack
Select a target = workstation4 is our target => command - show ip => observe MAC –
00:50:79:66:68:04
Observe this mac of workstation because we are spoofing this mac and putting it on linux
pc
94
AUTHOR:- KUSHAL H. KORDE
New spoofed mac address of linux pc
3.MAC FLOODING
In mac flooding attack we flood the mac address table of the switch.
Before this attack switch mac table
95
AUTHOR:- KUSHAL H. KORDE
After attack switch MAC Address table get flooded
4.CDP FLOODING
In the CDP Flooding Attack, we flood the CDP table of the switch with fake entries
Before starting the attack
96
AUTHOR:- KUSHAL H. KORDE
To stop attack
List attacks => cancel all attacks
After this attack check CDP table, you will see it flooded.
Now, how can we secure switches from such type of attacks cause all of this attacks are
mac based attacks.
Here we use SWITCHPORT SECURITY
Switch(config)#interface eth 0/0
Switch(config-if)#switchport mode access
Switch(config-if)#switchport port-security mac-address 00:50:00:00:09:00 ….(manual
mac)
97
AUTHOR:- KUSHAL H. KORDE
OR
Switch(config-if)#switchport port-security mac-address sticky(sticky means any mac
address)
Switch(config-if)#switchport port-security maximum 1 …..(max mac accepted is 1)
Switch(config-if)#switchport port-security violation protect ..(take action if max limit
violate)
Switch(config-if)#switchport port-security ……(to activate this above parameter)
For violation we do have 3 options. we can use anyone of them as per policy.
• Protect—This mode permits traffic from known MAC addresses to continue to be forwarded while
dropping traffic from unknown MAC addresses when over the allowed MAC address limit. When
configured with this mode, no notification action is taken when traffic is dropped.
• Restrict—This mode permits traffic from known MAC addresses to continue to be forwarded while
dropping traffic from unknown MAC addresses and make interface status as error-disable. when
over the allowed MAC address limit. When configured with this mode, a syslog message is logged, a
Simple Network Management Protocol (SNMP) trap is sent, and a violation counter is incremented
when traffic is dropped.
• Shutdown—This mode is the default violation mode; when in this mode, the switch will
automatically force the switchport into an error disabled (err-disable) state when a violation occurs.
While in this state, the switchport forwards no traffic. The switchport can be brought out of this
error disabled state by issuing the errdisable recovery cause CLI command or by disabling and
reenabling the switchport.
Basically, we activate switchport security on all the Access Ports interfaces except the trunk
interface.
5.ROUGE DHCP SERVER / DHCP SPPOFING
In this attack we create a fake/rouge DHCP server to redirect users from its original
network. This attack is a part of MITM (man in the middle) attack.
Let’s perform this attack
First, we have to do DHCP starvation attack and fetch all the IP’s. so that genuine user
won’t get IP from original DHCP server. now the real task is to generate Rouge DHCP in a
network and PC’s in a network get Rouge DHCP networks IP.
Go to Linux - terminal => ettercap -G
98
AUTHOR:- KUSHAL H. KORDE
After opening to click on Sniff => unified sniffing => Network interface – eth0
99
AUTHOR:- KUSHAL H. KORDE
Now set the parameter and then click OK
100
AUTHOR:- KUSHAL H. KORDE
Now we have to secure this network from such attack with DHCP snooping security
DHCP SNOOPING SECURITY
In this security we are untrusting all the interfaces of switch except one which is directly
connected to DHCP Server. So, we have to make that interface trust by applying command.
Switch(config)#ip dhcp snooping vlan 1 …..(to set snooping parameter)
Switch(config)#ip dhcp snooping ……..(to activate DHCP snooping)
Now we are trusting only one port which is connected to Actual DHCP server
Switch(config)#interface ethernet 0/3
Switch(config-if)#ip dhcp snooping trust
Switch(config-if)#exit
When we activate DHCP Snooping it will add on additional information to the packet- that
information is VLAN ID and interface details. Now this additional information won’t
understand by actual DHCP server for that we have to put command to reply it back
DHCP_SERVER(config)#ip dhcp relay information trust-all
By this command router will understand the additional information
VERIFICATION
In this image you can see the VLAN & INTERFACE heading and it actually adds up that
information to the data packet.
We implement this security on global mode to untrust all the ports. We make interface
trust only for actual port which is connected to DHCP server and the trunk ports from
where the traffic is ingresses.
6.IP SPPOFING
In this type of attack we spoof the IP of targeted pc with some malicious intent. if we able
to spoof that IP we will represent ourselves as same as that pc
101
AUTHOR:- KUSHAL H. KORDE
In this scenario attacker successfully spoofed the IP of Host A. by spoofing the IP attacker
can bypass the ACL.
We change the IP by assigning static ip .then, only we can change the actual ip with spoofed
ip.to stop all such attack we implement a security called IP SOURCE GUARD
IP SOURCE GUARD
IP Source Guard (IPSG) is a security feature that restricts IP traffic on untrusted Layer 2 ports by
filtering traffic based on the DHCP snooping binding database or manually configured IP source
bindings
To implement security
Switch(config-if)#interface ethernet 1/0
Switch(config-if)#ip verify source
Switch(config-if)#exit
VERIFICATION OF DHCP SNOOPING BINDING
Switch#show ip dhcp snooping binding
OR
Manual IP SOURCE BINDING
Switch(config)#ip source binding 00:50:00:00:02:00 vlan 1 192.168.10.100 interface
ethernet 0/1
OR
102
AUTHOR:- KUSHAL H. KORDE
This IP SOURCE GUARD we verify with the port-security
Switch(config-if)#interface ethernet 1/0
Switch(config-if)#ip verify source port-security
Switch(config-if)#exit
VERIFICATION
Switch# show ip verify source
103
AUTHOR:- KUSHAL H. KORDE
BPDU GUARD
Switch(config)#interface ethernet 1/0
Switch(config-if)# spanning-tree portfast
Switch(config-if)# spanning-tree bpduguard enable
Switch(config-if)# exit
We enable BPDUGUARD with PORTFAST because, when enable PORTFAST switch won’t
sends BPDU on that interface and when we enable BPDU GUARD switch won’t receive any
BPDU’s on that interface
BPDU FILTER
Switch(config)#interface ethernet 1/0
Switch(config-if)#spanning-tree portfast
Switch(config-if)#spanning-tree bpdufilter enable
Switch(config-if)#exit
If we use BPDUFILTER only then what does BPDUFILTER do is it will listen the BPDU’s but
won’t reply it back and PORTFAST won’t send an update on that interface. and when we
implement BPDUFILTER with PORTFAST it will create some mess around like if we receive a
BPDU from an unexpected interface it will lose its status of PORTFAST and it will create a
temporary looping.
So, in most cases we prefer BPDU GUARD with PORTFAST
ROOT GUARD
We do use root guard because we don’t want that any lowest priority or lowest mac
address will MAC address will influence the switch STP selection process. what does root
guard do is it will ignore the bpdu which consist the lowest priority and lowest mac
Switch(config)#interface ethernet 1/0
Switch(config-if)#spanning-tree guard root
Switch(config-if)#exit
VERIFICATION
Switch#show running-config | section interface ethernet 1/0
104
AUTHOR:- KUSHAL H. KORDE
L2 SECURITY LAB
TASK – 16
Task 16.1 Host Name Should Be Same As Mention In First Look Name
Task 16.2 Create and Implement
VLAN - 111 => SALES_DEPT = 192.168.111.0/24
VLAN - 345 => MRKT_DEPT = 192.168.112.0/24
VLAN - 568 => IT_DEPT = 192.168.113.0/24
VTP DOMAIN - ccn.com
VTP PASSWORD - ccn@123
VTP mode - SWITCH-1=SERVER, SWITCH-2 =CLIENTS , SWITCH-3 = CLIENTS
Task 16.3 Secure Network from MAC BASED ATTACK
Task 16.4 Secure Network from DHCP SPOOFING ATTACK
Task 16.5 Secure Network from IP SPOOFING ATTACK
Task 16.6 Secure Network Form ARP ATTACKS
Task 16.7 secure network from BPDU FLOODING ATTACKS
Task 16.8 MAKE SWITCH-1 AS ROOT BRIDGE AND make sure no infirioe BPDU WILL AFFECT
THE NETWORK
105
AUTHOR:- KUSHAL H. KORDE
VERIFICATION
Switch-1
106
AUTHOR:- KUSHAL H. KORDE
SWITCH-2
107
AUTHOR:- KUSHAL H. KORDE
108
AUTHOR:- KUSHAL H. KORDE
SWITCH-3
109
AUTHOR:- KUSHAL H. KORDE
COM-1-R1
110
AUTHOR:- KUSHAL H. KORDE
IPv6
TASK - 17
Task 17.1 Configure hostname as per the lab
Task 17.2 Configure the routers LAN interfaces with given IPv6 network and EUI-64. Now,
fetch IP from it
Task 17.3 Configure the routers R11-eth 0/1, R12-eth 0/1
Task 17.4 Configure routers with the static ipv6 routing
Task 17.5 Configure routers with the OSPFv3
Task 17.6 Configure the router with EIGRP-ng
Task 17.7 Configure the routers with RIP-ng
After doing routing try to ping other network pc with each type of routing
VERIFICATION
R11
ROUTEING
111
AUTHOR:- KUSHAL H. KORDE
R12
ROUTING
112
AUTHOR:- KUSHAL H. KORDE
Ping form PC5 to PC7
113
AUTHOR:- KUSHAL H. KORDE