0% found this document useful (0 votes)
31 views28 pages

CCNA Lab Reprt

The document consists of lab reports from Mirpur University of Science and Technology covering various aspects of networking, including demonstrations of network devices, Ethernet cable designs, basic configurations of switches and routers, and routing protocols like RIP and OSPF. Each lab report provides step-by-step instructions and configurations using simulation software such as Packet Tracer and GNS3. The reports serve as a practical guide for students in the BSc Information Engineering Technology program to understand and implement networking concepts effectively.

Uploaded by

Ammad Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views28 pages

CCNA Lab Reprt

The document consists of lab reports from Mirpur University of Science and Technology covering various aspects of networking, including demonstrations of network devices, Ethernet cable designs, basic configurations of switches and routers, and routing protocols like RIP and OSPF. Each lab report provides step-by-step instructions and configurations using simulation software such as Packet Tracer and GNS3. The reports serve as a practical guide for students in the BSc Information Engineering Technology program to understand and implement networking concepts effectively.

Uploaded by

Ammad Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

1

Mirpur University of Science and Technology (MUST)


Mirpur Azad Jammu & Kashmir

BSc Information Engineering Technology

Submitted to: Engr. Waqas Riaz


Submitted by: Ehsan Ishaq, Ahmad Usama, Ahmad Raza

Roll No: FA22-IET-003,007,023

Session: 2022-2026

Course title: Communication & Network Technology Lab

Course Code: IET-353L

Semester: 5th

MUST MIRPUR
2

Lab Report 01:


Demonstration of Network devices (Hubs, Switches, Routers, Bridges, Repeaters, Gateway,
Modem, Access point) and simulation software (Packet Tracer/GNS3/Wireshark)

1. Network Devices and Their Functions


Hub:

A basic networking device that broadcasts incoming data to all connected devices without
filtering. Works at the Physical layer (Layer 1) and can cause network congestion.

Demonstration in Packet Tracer:

• Open Cisco Packet Tracer.


• Drag and drop a hub from the device list.
• Connect multiple PCs to the hub using copper straight-through cables.
• Assign IP addresses to PCs (e.g., 192.168.1.1, 192.168.1.2, etc.).
• Send a message from one PC to another using the ping command.
• Observe that the hub forwards packets to all devices, even if they are not the destination.
Switch:

Operates at the Data Link layer (Layer 2) and forwards data based on MAC addresses, reducing
unnecessary traffic and improving network efficiency.

Demonstration in Packet Tracer:

• Add a switch and multiple PCs.


• Connect them using copper straight-through cables.
• Assign IP addresses to the PCs.
• Use the ping command to test connectivity.
Router:

Works at the Network layer (Layer 3) and routes data between different networks using IP
addresses, enabling internet connectivity.

Demonstration in Packet Tracer:

• Add a router and two switches.


• Connect two different networks (e.g., 192.168.1.0 and 192.168.2.0).
• Assign IP addresses to router interfaces:
• Configure static routes or enable dynamic routing (RIP, OSPF).
• Test connectivity with ping and traceroute.
3

Bridge:

Connects two network segments and filters traffic, reducing collisions and improving network
performance. Operates at Layer 2.

Demonstration in Packet Tracer:

• Add two different LANs.


• Connect them using a bridge.
• Assign IP addresses to PCs.
• Test connectivity and observe that the bridge only forwards necessary traffic.
Repeater:

Amplifies and regenerates weak network signals to extend the network range. Works at Layer 1.

Demonstration in Packet Tracer:

• Connect two PCs located far apart.


• Insert a repeater in between.
• Observe how it boosts the signal and allows communication

Gateway:

Converts data between different network protocols, allowing communication between networks
with different architectures. Operates across multiple layers.

Demonstration in GNS3:

• Connect a VoIP network and a data network.


• Use a gateway device to translate communication.
• Test VoIP calls and data transfer.

Modem:

Converts digital signals from a computer into analog signals for transmission over telephone lines
(DSL or cable internet) and vice versa.

Demonstration in Packet Tracer:

• Connect a modem to a PC and ISP router.


• Configure PPP (Point-to-Point Protocol).
• Test internet connectivity.
4

Access Point (AP):

Expands a wireless network by allowing Wi-Fi devices to connect to a wired network. Acts as a
bridge between wired and wireless networks.

Demonstration in Packet Tracer:

• Add an Access Point and configure SSID & security settings.


• Connect a wireless laptop to the AP.
• Test connectivity using the ping command.

2. Network Simulation Software


Packet Tracer:
A Cisco network simulator that allows users to design and test network topologies with virtual
routers, switches, and PCs. Useful for learning networking concepts.
GNS3:

An advanced network emulator that runs actual Cisco IOS images, enabling users to create
complex real-world network topologies and integrate them with physical devices.

Wireshark:

A network packet analysis tool used to capture and inspect live network traffic, filter packets, and
diagnose network issues. Essential for troubleshooting.

FINAL COMPARISON OF SIMULATION SOFTWARE

Feature Packet Tracer GNS3 Wireshark

Network Real-world network


Purpose Packet analysis
simulation emulation

Beginner- Requires networking


Complexity Advanced
friendly knowledge

Device Cisco devices Cisco & third-party


Any network
Support only devices

WAN, VPN, BGP


Best for CCNA practice Security analysis
simulation
5

Lab Report 02:


Ethernet Cable Designing (Straight-through, Crossover, Rollover Console):

Ethernet cables are designed for different networking purposes.


There are three main types:
• Straight-through Cable
• Crossover Cable
• Rollover (Console) Cable
1.Straight-through Cable
Uses T568A on both ends OR T568B on both ends
Connecting a PC to a switch or router
Wiring (T568A & T568B Standards)
Pin T568A Color T568B Color
1 White-Green White-Orange
2 Green Orange
3 White-Orange White-Green
4 Blue Blue
5 White-Blue White-Blue
6 Orange Green
7 White-Brown White-Brown
8 Brown Brown

If both ends use T568A or both use T568B, it’s a straight-through cable.

2. Crossover Cable
One end T568A, the other end T568B
Used for same-type device connections (PC-to-PC, switch-to-switch, router-to-router)
Wiring (T568A on one end, T568B on the other)
Pin T568A Color T568BColor
1 White-Green White-Orange
2 Green Orange
3 White-Orange White-Green
4 Blue Blue
5 White-Blue White-Blue
6 Orange Green
7 White-Brown White-Brown
8 Brown Brown
This swaps Tx (Transmit) and Rx (Receive) pairs for direct communication between devices.
6

3. Rollover (Console) Cable


Used to connect a PC to a router’s console port for configuration
Pinouts are completely reversed
Wiring (Reversed Pins: 1 ↔ 8, 2 ↔ 7, 3 ↔ 6, 4 ↔ 5)
Pin Side A Side B

1 White-Orange Brown

2 Orange White-Brown

3 White-Green Blue

4 Blue White-Green

5 White-Blue Green

6 Green White-Blue

7 White-Brown Orange

8 Brown White-Orange

Typically used with a serial-to-RJ45 adapter and software like PuTTY to access router settings.
7

Lab Report 03:


Basic configurations of Switch & Router (Setting Hostname, Enable password,
Enable Secret, Enable Console password, Setting Banners), IP addressing:
Topology:

Basic Configuration:
Router>enable
Router# configure terminal

Set hostname:
Router(config)# hostname R1

Enable Password:
R1(config)#enable password khuiratta001

Enable encrypted secret password:


R1(config)# enable secret khuiratta002

Console password setup:


R1(config)# line console 0
R1(config-line)# password khuiratta003
R1(config-line)# login
R1(config-line)# exit
8

Auxiliary (AUX) password:


R1 (config)# line aux 0
R1 (config-line)# password khuiratta004
R1 (config-line)# login
R1 (config-line)# exit

MOTD Banner”
R1(config)# banner motd c

WARNING: Authorized Access Only!


c
Configure IP address on an interface
R1(config)# interface Gigabite0/0/0
R1(config-if)# ip address 192.168.1.10 255.255.255.0
R1(config-if)# no shutdown
R1(config-if)# exit
9

Lab Report 04:


Switch/Router's Interfaces Configuration (Checking Interfaces' status, Setting Bandwidth,
Setting Clock Rate, Removing configurations, Administrative shutdown), IP addressing
and Telnet:

Topology:

Checking Interface Status

•View all interfaces and their status:


R2>enable
R2#show ip interface brief

2. Basic Interface Configuration


a)Setting Bandwidth (Logical Setting for Routing Protocols):
R2(config)#interface GigabitEthernet0/0/1
R2(config-if)#bandwidth 1000

b)Setting Clock Rate (for Serial Interfaces):


R2(config)# interface Serial0/1/0
R2(config-if)# clock rate 64000

c)Administrative Shutdown/Enable:
R2(config-if)# shutdown
R2(config-if)# no shutdown
10

d)Removing Interface Configurations:


R2(config)# interface Gigabite0/0/0
R2(config-if)# no ip address # Remove IP
R2(config-if)# no shutdown # Re-enable if needed

3. IP Addressing:
Router interface:
R2(config)# interface Gigabite0/0/0
R2(config-if)# ip address 172.168.20.4 255.255.0.0
R2(config-if)# no shutdown

4. Telnet Configuration:
R2(config)# line vty 0 4
R2(config-line)# password telnet
R2(config-line)# login
R2(config-line)# exit

Test telnet:
C:\> telnet 172.16.1.2 # From a connected PC
11

Lab Report 05:


Basic design of LAN/WAN using Switch/Router:

Topology:

Explanation:

The left side of the topology represents a Local Area Network (LAN), where multiple PCs in the
192.168.1.0 network are connected to a switch, which then connects to Router R1. Similarly, the
right side is another LAN with PCs in the 172.168.20.10 network, connected to a switch, which is
linked to Router R2.

When these Two LANs are connected via the serial link (Se0/1/0) between Router R1 and Router
R2, they together form a Wide Area Network (WAN).
This WAN connection enables communication between devices in different LANs, allowing data
exchange over a broader network infrastructure.
12

Lab Report 06:


Configuring Static routing and Cisco Discovery Protocol (Looking for neighbors, Checking
routing tables):

Topology:

Static Routing:
In this topology, static routing and Cisco Discovery Protocol (CDP) are used to establish
connectivity and verify network neighbors. Below are the steps to configure them on routers
ISR4331 R1 and ISR4331 R2.

1. Static Routing Configuration


Static routing is used to manually define routes between networks.

On Router R1:
R1>enable
R1#config t
R1(config)#ip route 172.168.0.0 255.255.0.0 10.1.1.2
R1(config)#exit
R1#wr
This command defines a static route to the 172.168.0.0/16 network via the 10.1.1.2 interface.

On Router R2:
R2>enable
R2#config t
R2(config)#ip route 192.168.1.0 255.255.255.0 10.1.1.1
R2(config)#exit
R2#wr
This command defines a static route to the 192.168.1.0/24 network via the Serial0/1/0 interface.
13

2. Checking the Routing Table:


After configuring static routes, verify them using:

For R1:
R1#show ip route

For R2:
R2#show ip route
•This will display the routing table and confirm that the static routes are present.

3 .Looking for Neighbors:


For R1
R1#show cdp neighbors

For R2:
R2#show cdp neighbors
14

Lab Report 07:


Configuration of Routing Information Protocol (RIP):

Topology:

Step-by-Step RIP Configuration


1. Access Router CLI
For each router, enter the CLI in Packet Tracer.

2. Enter Global Configuration Mode


Router>enable
Router#configure terminal

3. Enable RIP Routing


R2(config)router rip

4. Advertise Connected Networks


Each router must be configured with the networks directly connected to it.

For Router 1 (R1)


R1(config)#router rip
R1(config-router)#network 192.168.1.0
R1(config-router)#network 10.0.0.0
R1(config-router)#network 11.0.0.0
R1(config-router)#exit
15

For Router 2 (R2)


R2(config)#router rip
R2(config-router)#network 172.20.0.0
R2(config-router)#network 10.0.0.0
R2(config-router)#network 12.0.0.0
R2(config-router)#exit

For Router 3 (R3)


R3(config)#router rip
R3(config-router)#network 152.16.0.0
R3(config-router)#network 11.0.0.0
R3(config-router)#network 12.0.0.0
R3(config-router)#exit

Verifying RIP Configuration


After configuring RIP on all routers, verify the routing table:
Router#show ip route

To check RIP neighbors:


Rout#show ip protocols
16

Lab Report 08:


Configuration of Open Shortest Path First (0SPF):

Topology:

Step-by-Step OSPF Configuration


1. Access Router CLI
For each router in the topology, go to the CLI in Packet Tracer.

2. Enter Global Configuration Mode


Router>enable
Router#configure terminal
Router#hostname R1

3. Enable OSPF Routing


Assign an OSPF process ID (can be any number, commonly 1):
R1# router ospf 1

4. Advertise Networks in OSPF


Use the wildcard mask (inverse of subnet mask) when defining networks.

For Router 1 (R1)


R1(config)#router ospf 1
R1(config-router)#network 192.168.1.0 0.0.0.255 area 0
R1(config-router)#network 10.0.0.0 0.255.255.255 area 0
R1(config-router)#exit
17

For Router 2:
R2(config)#router ospf 1
R2(config-router)#network 10.0.0.0 0.255.255.255 area 0
R2(config-router)#network 172.168.0.0 0.0.255.255 area
R2(config-router)#exit

5. Verify OSPF Neighbor Relationships


After configuring all routers, check if OSPF neighbors are detected:
R2# show ip ospf neighbor

6. Verify Routing Table


To confirm that OSPF routes are installed in the routing table:
R2# show ip route

7. Save Configuration
R2# wr
18

Lab Report 09:


Configuration of Extended Inter Gateway Routing Protocol (EIGRP)

Topology:

Configuration Step by Step:

Router R1 Configuration:
R1(config)# router eigrp 1
R1(config-router)# network 192.168.1.0 0.0.0.255
R1(config-router)# network 10.0.0.0 0.255.255.255
R1(config-router)# exit

Router R2 Configuration
R2(config)# router eigrp 100
R2(config-router)# network 172.168.1.0 0.0.255.255
R2(config-router)# network 11.0.0.0 0.255.255.255
R2(config-router)# exit

How to Verify EIGRP Configuration


Check EIGRP Neighbors
R1# show ip eigrp neighbors
Check EIGRP Routes
R1# show ip route eigrp
Check EIGRP Topology Table
R1# show ip eigrp topology
19

Lab Report 10:


Configuration of Network Address Translation (Static, Dynamic)

Topology:

Static NAT Configuration:


Static NAT maps a private IP to a public IP permanently. This is useful when an internal server
(like a web or DNS server) needs to be accessible from the outside network.
Network Setup
PC (192.168.10.2) → Needs to access Server
Server (172.16.10.2) → Will be mapped with a public IP
Router0 (NAT Router) → Will perform static NAT
R2→ Connects the Server network

Steps to Configure Static NAT on R1


Define Inside & Outside Interfaces
Router>enable
Router#configure terminal
Router#hostname R1

Inside Interface (LAN)


R1(config)#interface GigabitEthernet0/0/0
R1(config-if)#ip address 192.168.10.1 255.255.255.0
R1(config-if)#ip nat inside
R1(config-if)#no shutdown
20

Outside Interface (WAN)


R1(config)#interface GigabitEthernet0/0/1
R1(config-if)#ip address 10.1.1.1 255.0.0.0
R1(config-if)#ip nat outside
R1(config-if)#no shutdown

Configure Static NAT


We will map the private Server IP (172.16.10.2) to a public IP (10.1.1.2).
R1#ip nat inside source static 172.16.10.2 10.1.1.2
Any external device accessing 10.1.1.2 will be forwarded to 172.16.10.2.

Configure R2:
Router>enable
Router#configure terminal
Router#hostnmae R2

WAN Interface (connected to Router2)


R2(Config)interface Serial0/1/0
R2(Config-if)ip address 10.1.1.2 255.0.0.0
R2(Config)no shutdown

LAN Interface (connected to Server)


R2(Config)interface GigabitEthernet0/0/0
R2(Config-if)ip address 172.16.10.1 255.255.0.0
R2(Config)no shutdown

Static Route to Reach PC Network


R2(Config)ip route 192.168.10.0 255.255.255.0 10.1.1.1
Configure the Server
Click on Server
Go to Desktop → IP Configuration
IP Address: 172.16.10.2
Subnet Mask: 255.255.0.0
Default Gateway: 172.16.10.1
Testing Static NAT
From the PC (192.168.10.2), ping the public IP 10.1.1.2
ping 10.1.1.3
Result: The ping should be successful, confirming NAT is working.
To check NAT:
Show ip NAT translation
21

Lab Report 11:

Network security: Access Control List (ACL)

Topology:

Router 1 (R1) Configuration


Router>enable
Router#configure terminal
Router#host name R1
Configure Rip
R1(config)# router rip
R1(config-router)#network 192.168.1.0
R1(config-router)#network 11.0.0.0
R1(config-router)#exit
Create ACL
R1(config)# access-list 101 deny tcp 192.168.1.1 0.0.0.0 192.168.10.11 0 0.0.0.0 eq 80
R1(config)# access-list 101 permit ip any any
Apply ACL on outbound traffic towards R2
R1(config-if)# interface Serial0/1/0
R1(config-if)# ip access-group 101 out
R1(config-if)# exit
Save Configuration
R1#wr
22

Router 2 (R2) Configuration


Router>enable
Router#configure terminal
Router#hostname R2
Configure Rip
R2(config)# router rip
R2(config-router)#network 192.168.10.10
R2(config-router)#network 11.0.0.0
R2(config-router)#exit

Save Configuration
R2#wr

Web Server Configuration (192.168.10.11)


Click on the Web Server.
Go to Desktop → IP Configuration.
IP Address: 192.168.10.11
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.10.11
Go to Services → HTTP.
Turn ON HTTP.

DNS Server Configuration (192.168.10.12)


Click on the DNS Server.
Go to Desktop → IP Configuration.
IP Address: 192.168.10.12
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.10.12
Go to Services → DNS.
Turn ON DNS Service.
Add an entry:
Domain Name: www.cisco.com
IP Address: 192.168.10.12 (Web Server)
23

PC1 Configuration
Click on PC1.
Go to Desktop → IP Configuration.
IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.10
DNS Server: 1192.168.10.12

The below picture shows that the access to web server is allowed from PC1:
24

PC2 (Blocked) Configuration


Click on PC2.
Go to Desktop → IP Configuration.
IP Address: 192.168.1.2
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.10
DNS Server:192.168.10.12

The below picture shows that the access to web server is denied from PC2:
25

Lab Report 12:

Configuration of Virtual Local Area Network (VLAN):

Topology:

VLAN Configuration for This Topology:


Access Switch CLI
Click on the switch and go to the CLI in Packet Tracer.
2. Enter Global Configuration Mode
Switch# >enable
Switch# #configure terminal
Switch(config)#hostname SW.A

3.Create VLANs:
SW.A (config)#vlan 2
SW.A (config-vlan)#Physics
SW.A (config-vlan)#exit
SW.A (config)#vlan 3
SW.A (config-vlan)#Civil
26

SW.A (config-vlan)#exit
SW.A (config)#vlan 4
SW.A (config-vlan)#Electrical
SW.A (config-vlan)#exit

4.Assigning ports to VLANs:


VLAN 2:
SW.A (config)#interface range fastethernet 0/1-3
SW.A (config-if-range)#switchport mode access
SW.A (config-if range)#switchport access vlan 2
SW.A (config-if)#exit

VLAN 3:
SW.A (config)#interface range fastethernet 0/10-12
SW.A (config-if-range)#switchport mode access
SW.A (config-if range)#switchport access vlan 3
SW.A (config-if)#exit

VLAN 4:
SW.A (config)#interface range fastethernet 0/20-22
SW.A (config-if-range)#switchport mode access
SW.A (config-if range)#switchport access vlan 4
SW.A (config-if)#exit
27

Lab Report 13:


Configuration of Spanning Tree Proto col (STP):
Topology

I went into CLI of switch2 and I used the show spanning-tree command to show the following
properties and Mac address.

As our spanning tree is working as per VLAN. Now, I am going to config terminal mode to check
which type of commands are available:

So, these are available and I am choosing VLAN 1 and setting it as root primary:
28

Now the Switch2 is root bridge

Now, using show spanning-tree command to check:

The port with Switch2 is now blocked and Switch0 is the root bridge.

THE END

You might also like