125 Custom Student Lab Manual
125 Custom Student Lab Manual
125 Custom Student Lab Manual
Background / Preparation
In this hands-on lab, you will plan and build a simple peer-to-peer network using two PCs and an Ethernet
crossover cable.
The following resources are required:
• Two Window XP Professional PCs, each with an installed and functional Network Interface Card
(NIC)
• An Ethernet crossover cable
b. A simple network like the one you designed can use a hub or switch as a central connecting device,
or the PCs may be directly connected. Which kind of cable is required for a direct Ethernet connection
between the two PCs? _________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 7
CCNA Discovery
Networking for Home and Small Businesses
PC1 Name:
PC2 Name:
b. Check to see if the two PCs have the same name. If they do, change the name of one PC by clicking
the Change button, typing a new name in the Computer name field, then clicking OK.
c. Click OK to close the System Properties window.
d. Why is it important that each PC on a network have a unique name?
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 7
CCNA Discovery
Networking for Home and Small Businesses
c. If the Local Area Connection does not indicate that it is connected, troubleshoot by repeating Steps 3
and 4. You may also want to ask your instructor to confirm that you are using an Ethernet crossover
cable.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 7
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 7
CCNA Discovery
Networking for Home and Small Businesses
c. Select the Use the following IP address radio button and enter the following information:
IP Address 192.168.1.1
d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close button
to exit the Local Area Connection Properties window.
e. Repeat steps 5a – 5d for the second PC using the following information:
IP Address 192.168.1.2
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 7
CCNA Discovery
Networking for Home and Small Businesses
c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or DISABLED
(OFF) for the Ethernet port. ____________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable the
firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the following to
apply this setting.
e. Now that the two PCs are physically connected and configured correctly with IP addresses, we need
to make sure they communicate with each other. The ping command is a simple way to accomplish
this task. The ping command is included with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows command prompt window
will appear as shown in the figure below.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will verify the IP
connectivity. It should produce results similar to those shown in here.
h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.
i. Close the Windows command prompt window on both PCs.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 7
CCNA Discovery
Networking for Home and Small Businesses
b. Do you see an icon for the other PC in your peer-to-peer network? _______________________
c. What is the name of the other PC? ________________________________________________
d. Is it the same name you recorded in Step 2? _________________________________________
e. Perform Step 7a on the second PC.
f. Close any open windows.
Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall
a. If you disabled the Windows Firewall in Step 6, click Start, select Control Panel, and open the
Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced tab.
Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began), click the On radio
button to enable the firewall. Click OK in this dialog box and the following one to apply this setting.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 7
CCNA Discovery
Networking for Home and Small Businesses
Objective
• Determine the MAC address of a Windows XP computer on an Ethernet network using the ipconfig
/all command.
• Access to the Run command.
Background/Preparation
Every computer on an Ethernet local network has a Media Access Control (MAC) address that is burned into
the Network Interface Card (NIC). Computer MAC addresses are usually displayed as 6 sets of two
hexadecimal numbers separated by dashes or colons. (example: 15-EF-A3-45-9B-57). The ipconfig /all
command displays the computer MAC address. You may work individually or in teams.
• Windows XP workstation with at least one Ethernet network interface card (NIC)
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 5
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 5
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 5
CCNA Discovery
Networking for Home and Small Businesses
b. Press Enter. (Typical results are shown in the following figure, but your computer will display different
information.)
Step 3: Locate the MAC (physical) address(es) in the output from the ipconfig /all command
a. Use the table below to fill in the description of the Ethernet adapter and the Physical (MAC) Address:
Description Physical Address
Step 4: Reflection
____________________________________________________________________________
____________________________________________________________________________
b. The sample output from the ipconfig /all command shown previously had only one MAC address.
Suppose the output was from a computer that also had wireless Ethernet capability. How might the
output change?
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 5
CCNA Discovery
Networking for Home and Small Businesses
c. Try disconnecting the cable(s) to your network adapter(s) and use the ipconfig /all command again.
What changes do you see? Does the MAC address still display? Will the MAC address ever change?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 5
CCNA Discovery
Networking for Home and Small Businesses
Objective
• Use the ipconfig /all command to determine the IP address of a Windows XP host on an Ethernet
network.
Background / Preparation
Every computer connected to the Internet has a unique identifier, called an IP address. IP addresses are
displayed as four numbers, known as octets, separated by periods (example: 192.168.1.4). The ipconfig /all
command displays your computer’s IP address and information about the network. The following resources
are required:
• A workstation that is attached to the local network and that has it’s IP address already configured
• Access to the Run command
In this lab you will locate your computer’s IP address to discover its unique number.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Networking for Home and Small Businesses
b. In the Run dialog box, type cmd then click the OK button.
d. The ipconfig /all command then displays a list of information about your computer’s IP configuration.
An example is shown in the following figure. The information displayed for your computer will be
different.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Networking for Home and Small Businesses
Objectives
• Build a simple peer-to-peer network and verify physical connectivity.
• Assign various IP addresses to hosts and observe the effects on network communication
Background / Preparation
In this lab, you will build a simple peer-to-peer network using two PCs and an Ethernet crossover cable. You
will assign various compatible and non-compatible IP addresses to the hosts and determine the effects on
their ability to communicate.
The following resources are required:
NOTE: You may use the small peer-to-peer network that was built in Lab 3.1.5
• Two Windows XP Professional PCs, each with an installed and functional Network Interface Card
(NIC)
• An Ethernet cross-over cable to connect the PCs (provided by instructor)
• (Optional lab setup) A hub or switch and two straight-through cables to connect the PCs (provided by
instructor)
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6
CCNA Discovery
Networking for Home and Small Businesses
b. Go to the Control Panel, double click the Network Connections icon, and confirm that the local
area connection is established. The following figure shows an active local area connection. If physical
connectivity problems exist, you will see a red X over the Local Area Connection icon with the words
Network cable unplugged.
c. If the Local Area Connection does not indicate that it is connected, troubleshoot by repeating Steps 1
and 2. You may also want to ask your instructor to confirm that you are using an Ethernet crossover
cable.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 6
CCNA Discovery
Networking for Home and Small Businesses
b. Using the scroll bar in the Local Area Connection Properties window, scroll down to highlight Internet
Protocol (TCP/IP). Click the Properties button.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 6
CCNA Discovery
Networking for Home and Small Businesses
c. Select the Use the following IP address radio button and enter an IP address of 192.168.1.1 and a
subnet mask of 255.255.255.0. With this IP address and subnet mask, the network number the host
is on is 192.168.1.0 and 192.168.1.1 is the first host on the 192.168.1.0 network :
IP Address 192.168.1.1
d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close
button to exit the Local Area Connection Properties window.
e. Repeat steps 3a – 3d for the PC2 using an IP address of 192.168.1.2 and a subnet mask of
255.255.255.0. The network number this PC is on is 192.168.1.0 and 192.168.1.2 is the second host
on the 192.168.1.0 network.
IP Address 192.168.1.2
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 6
CCNA Discovery
Networking for Home and Small Businesses
b. Right-click the Local Area Connection icon and select Properties. Click the Advanced tab. Locate
and click the Settings button.
c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or DISABLED
(OFF) for the Ethernet port. _____________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable the
firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the following to
apply this setting. Repeat Steps 4a-4d on the second PC.
e. Now that the two PCs are physically connected and configured correctly with IP addresses, we need
to make sure they communicate with each other. The ping command is a simple way to accomplish
this task. The ping command is included with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Window command prompt window
will appear as shown in the following figure.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will verify the IP
connectivity. It should produce results similar to those shown in the figure that follows.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 6
CCNA Discovery
Networking for Home and Small Businesses
Step 9: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall
a. If you disabled the Windows Firewall in Step 4, click Start, select Control Panel, and click Network
Connections.
b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced tab.
Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began), click the On radio
button to enable the firewall. Click OK in this dialog box and the following one to apply this setting.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 6
CCNA Discovery
Networking for Home and Small Businesses
Background / Preparation
In order for the PC to participate in the local network and the Internet, it must be connected to a network
device. The following resources will be required:
• Linksys Model WRT300N wireless router or equivalent SOHO router
• Two computers with Ethernet NICs and Windows XP Professional installed on both
• Two straight-through cables
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 9
CCNA Discovery
Networking for Home and Small Businesses
b. On the PC, locate the Ethernet port. The port could be integrated into the motherboard or it could be
an adapter. In either case, the port will be an RJ-45 port. The photo shows an Ethernet port on an
adapter.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 9
CCNA Discovery
Networking for Home and Small Businesses
e. In the middle window, scroll down until you see and can double-click the Internet Protocol (TCP/IP)
option. The figure that follows shows this option.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 9
CCNA Discovery
Networking for Home and Small Businesses
f. Click the Properties button and the Internet Protocol [TCP/IP] Properties window will appear.. Next,
click the Use the following IP address button, which activates the IP address, Subnet mask, and
Default gateway textboxes.
In the IP address field, enter 192.168.10.2. Configure the subnet mask to 255.255.255.0. Configure
the default gateway to 192.168.10.1. The figure that follows shows these settings. (DNS server
information is not necessary at this time, so the fields under Use the following DNS server
addresses don’t need to be filled out.) When finished, click OK.
g. From the Internet Protocol [TCP/IP] Properties window, click OK to apply the changes. Be patient,
since this step may take some time. After the changes are applied, you will be returned to the
Network Connections window.
h. Since the two computers are on the same network, their IP addresses will be similar, their subnet
masks will be identical, and their default gateways will be identical. Perform the same procedures on
the second PC to assign an IP address, subnet mask, and default gateway using the following
information:
IP address: 192.168.10.3
Subnet mask: 255.255.255.0
Default gateway: 192.168.10.1
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 9
CCNA Discovery
Networking for Home and Small Businesses
i. Why do you think the IP addresses are different, but the subnet masks and default gateways are the
same? ______________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
d. In the command line prompt, type ipconfig /all. Verify that the IP address and the default gateway
are the values that you entered in the earlier steps. If they are incorrect, repeat Steps 3 and 4.
e. Are the IP address, subnet mask, and default gateway correct for the first PC? _____________
f. Perform the same configuration check on the second PC. If the values are incorrect, repeat Steps 3
and 4.
g. Are the IP address, subnet mask, and default gateway correct for the second PC? ___________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 9
CCNA Discovery
Networking for Home and Small Businesses
g. From the command prompt on the second PC, type ping 192.168.10.2 to check connectivity to the
first PC.
The ping should succeed.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 9
CCNA Discovery
Networking for Home and Small Businesses
d. Right-click the My Computer icon on your Windows XP desktop and select the Properties option.
The System Properties window appears.
NOTE: If the My Computer icon does not appear on the desktop, click Start then right-click My
Computer.
e. Click the Computer Name tab. An example of the window that appears follows:
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 9
CCNA Discovery
Networking for Home and Small Businesses
b. Use the nbtstat command to view and gather information about remote computers. From the
command prompt, type nbtstat and press Enter. Help for the command displays as shown:
The letters shown are options called switches that you can use with the nbtstat command.
a. On PC1, type nbtstat –n and press Enter to see the local NetBIOS name of PC1.
b. On PC2, type the same command to verify the NetBIOS name is set to PC2.
c. The nbtstat –a command can be used to look at a remote computer’s name table. Type nbtstat
again from the command prompt. Notice in the output that when you use the –a switch, you have to
put a space and then type a remote computer’s name (RemoteName).
From PC1, type nbtstat –a PC2 and press Enter. The nbtstat information for PC2 shows on PC1’s
monitor.
What command would be used from the command prompt on PC2 to view information about PC1?
____________________________________________________________________________
d. From PC2, type the appropriate command to view PC1’s nbtstat information.
e. The nbtstat –A (notice that the switch is a capital A this time) can be used to view the same
information using an IP address rather than a name. If you type nbtstat again, you can see that the
command syntax tells us that we use –A followed by an IP address. The IP address is that of the
remote computer.
From PC1, type nbtstat –A 192.168.10.3 to see the same information that was returned by the
nbtstat –a PC2 command.
f. Write the command that would be typed on PC2 to view information about PC1, using the IP address
of PC1 instead of the NetBIOS name. _____________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 9
CCNA Discovery
Networking for Home and Small Businesses
g. From PC1, you can use the ping command to verify connectivity. However, instead of using an IP
address, you can use the NetBIOS name. From the PC1 command prompt, type ping PC2 (notice
the capitalization). The result should be successful.
h. From PC1, type ping pc2 (notice the capitalization).
i. Does the ping succeed using lower case letters? ______________________________________
j. You can use the nbtstat –r command to see NetBIOS names that have been resolved (they are
known). From the PC1 and PC2 command prompt, type nbtstat –r to see that the remote computer is
known using NetBIOS.
k. Close the command prompt window.
Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall
a. If the answer to Step 5c was OFF or ENABLED on PC1, click Start, select Control Panel, and open
the Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced tab.
Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began), click the On radio
button to disable the firewall. Click OK in this dialog box and the following one to apply this setting.
b. Either with a classmate assigned to you or by choosing one yourself, share this information with
them.
In your opinion, are the names descriptive? _________________________________________
c. Are all of the computers in the classroom part of the same local network? How could you prove that?
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 9
Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
Learning Objectives
• Experiment with Wireshark features and options such as PDU capture and display filtering.
Background
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network
troubleshooting, analysis, software and protocol development, and education. Before June 2006,
Wireshark was known as Ethereal.
A packet sniffer (also known as a network analyzer or protocol analyzer) is computer software that can
intercept and log data traffic passing over a data network. As data streams travel back and forth over the
network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content
according to the appropriate RFC or other specifications.
Wireshark is programmed to recognize the structure of different network protocols. This enables it to
display the encapsulation and individual fields of a PDU and interpret their meaning.
It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses
for data analysis and troubleshooting.
Scenario
To capture PDUs the computer on which Wireshark is installed must have a working connection to the
network and Wireshark must be running before any data can be captured.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
To start data capture it is first necessary to go to the Capture menu and select the Options choice.
The Options dialog provides a range of settings and filters which determines which and how much data
traffic is captured.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
First, it is necessary to ensure that Wireshark is set to monitor the correct interface. From the Interface
drop down list, select the network adapter in use. Typically, for a computer this will be the connected
Ethernet Adapter.
Then other Options can be set. Among those available in Capture Options, the two highlighted below
are worth examination.
If this feature is NOT checked, only PDUs destined for this computer will be captured.
If this feature is checked, all PDUs destined for this computer AND all those detected by the computer
NIC on the same network segment (i.e., those that "pass by" the NIC but are not destined for the
computer) are captured.
Note: The capturing of these other PDUs depends on the intermediary device connecting the end device
computers on this network. As you use different intermediary devices (hubs, switches, routers) throughout
these courses, you will experience the different Wireshark results.
This option allows you to control whether or not Wireshark translates network addresses found in PDUs
into names. Although this is a useful feature, the name resolution process may add extra PDUs to your
captured data perhaps distorting the analysis.
There are also a number of other capture filtering and process settings available.
Clicking on the Start button starts the data capture process and a message box displays the progress of
this process.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
As data PDUs are captured, the types and number are indicated in the message box
The examples above show the capture of a ping process and then accessing a web page.
When the Stop button is clicked, the capture process is terminated and the main screen is displayed.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
The PDU (or Packet) List Pane at the top of the diagram displays a summary of each packet captured. By
clicking on packets in this pane, you control what is displayed in the other two panes.
The PDU (or Packet) Details Pane in the middle of the diagram displays the packet selected in the Packet
List Pane in more detail.
The PDU (or Packet) Bytes Pane at the bottom of the diagram displays the actual data (in hexadecimal
form representing the actual binary) from the packet selected in the Packet List Pane, and highlights the
field selected in the Packet Details Pane.
Each line in the Packet List corresponds to one PDU or packet of the captured data. If you select a line in
this pane, more details will be displayed in the "Packet Details" and "Packet Bytes" panes. The example
above shows the PDUs captured when the ping utility was used and http://www.Wireshark.org was
accessed. Packet number 1 is selected in this pane.
The Packet Details pane shows the current packet (selected in the "Packet List" pane) in a more detailed
form. This pane shows the protocols and protocol fields of the selected packet. The protocols and fields of
the packet are displayed using a tree, which can be expanded and collapsed.
The Packet Bytes pane shows the data of the current packet (selected in the "Packet List" pane) in what
is known as "hexdump" style. In this lab, this pane will not be examined in detail. However, when a more
in-depth analysis is required this displayed information is useful for examining the binary values and
content of PDUs.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
The information captured for the data PDUs can be saved in a file. This file can then be opened in
Wireshark for analysis some time in the future without the need to re-capture the same data traffic again.
The information displayed when a capture file is opened is the same as the original capture.
When closing a data capture screen or exiting Wireshark you are prompted to save the captured PDUs.
Clicking on Continue without Saving closes the file or exits Wireshark without saving the displayed
captured data.
From the command line of the computer, ping the IP address of another network connected and powered
on end device on in the lab topology. In this case, ping the Eagle Server at using the command ping
192.168.254.254.
After receiving the successful replies to the ping in the command line window, stop the packet capture.
The Packet List pane on Wireshark should now look something like this:
Look at the packets listed above; we are interested in packet numbers 6, 7, 8, 9, 11, 12, 14 and 15.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
If you performed Step 1A above match the messages displayed in the command line window when the
ping was issued with the six packets captured by Wireshark.
_____________________________________________________________________
Are the listed source and destination IP addresses what you expected? Yes / No
Why? ___________________________________
Step 3: Select (highlight) the first echo request packet on the list with the mouse.
The Packet Detail pane will now display something similar to:
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
As you can see, the details for each section and protocol can be expanded further. Spend some time
scrolling through this information. At this stage of the course, you may not fully understand the
information displayed but make a note of the information you do recognize.
Locate the two different types of 'Source" and "Destination". Why are there two types?
__________________________________________________________________
____________________________________________________________
As you select a line in the Packets Detail pane all or part of the information in the Packet Bytes pane also
becomes highlighted.
For example, if the second line (+ Ethernet II) is highlighted in the Details pane the Bytes pane now
highlights the corresponding values.
This shows the particular binary values that represent that information in the PDU. At this stage of the
course, it is not necessary to understand this information in detail.
At the command line on your computer running Wireshark, enter ftp 192.168.254.254
When the connection is established, enter anonymous as the user without a password.
Userid: anonymous
Password: <ENTER>
You may alternatively use login with userid cisco and with password cisco.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
ftp> quit
221 Goodbye.
C:\Documents and Settings\ccna1>
When the file has successfully downloaded, stop the PDU capture in Wireshark.
Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed.
Locate and note those PDUs associated with the file download.
These will be the PDUs from the Layer 4 protocol TCP and the Layer 7 protocol FTP.
Identify the three groups of PDUs associated with the file transfer.
If you performed the step above, match the packets with the messages and prompts in the FTP command
line window.
The first group is associated with the "connection" phase and logging into the server.
List examples of messages exchanged in this phase.
___________________________________________________________________
Locate and list examples of messages exchanged in the second phase that is the actual download
request and the data transfer.
__________________________________________________________________
___________________________________________________________________
The third group of PDUs relate to logging out and "breaking the connection".
List examples of messages exchanged during this process.
__________________________________________________________________
___________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
Locate recurring TCP exchanges throughout the FTP process. What feature of TCP does this indicate?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
What does this say about the security of this FTP login process?
___________________________________________________________________
Highlight a packet containing the actual file content - note the plain text visible in the Byte pane.
Highlight and examine, in the Details and Byte panes, some packets exchanged in the third phase of the
file download.
What features distinguish the content of these packets?
___________________________________________________________________
When finished, close the Wireshark file and continue without saving
Note: Capture Options do not have to be set if continuing from previous steps of this lab.
Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed.
Locate and identify the TCP and HTTP packets associated with the webpage download.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
Note the similarity between this message exchange and the FTP exchange.
Step 3: In the Packet List pane, highlight an HTTP packet that has the notation "(text/html)" in the
Info column.
In the Packet Detail pane click on the "+" next to "Line-based text data: html"
When this information expands what is displayed?
___________________________________________________________________
When finished close the Wireshark file and continue without saving
Task 4: Reflection
Consider the encapsulation information pertaining to captured network data Wireshark can provide.
Relate this to the OSI and TCP/IP layer models. It is important that you can recognize and link both the
protocols represented and the protocol layer and encapsulation types of the models with the information
provided by Wireshark.
Task 5: Challenge
Discuss how you could use a protocol analyzer such as Wireshark to:
and
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
Task 6: Cleanup
Unless instructed otherwise by your instructor, exit Wireshark and properly shutdown the computer.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 11
CCNA Discovery
Networking for Home and Small Businesses
Background / Preparation
In this lab you will build and terminate Ethernet straight-through patch cables and crossover cables. With a
straight-through cable, the color of wire used by pin 1 on one end is the same color used by pin 1 on the other
cable end, and similarly for the remaining seven pins. The cable will be constructed using either TIA/EIA
T568A or T568B standards for Ethernet, which determine which color wire is used on each pin. Straight-
through patch cables are normally used to connect a host directly to a hub or switch or to a wall plate in and
office area.
With a crossover cable the second and third pairs on the RJ-45 connector at one end of the cable are
reversed at the other end. The pinouts for the cable are the T568A standard on one end and the T568B
standard on the other end. Crossover cables are normally used to connect hubs and switches or can be used
to directly connect two hosts to create a simple network. This is a two-part lab that can be done individually, in
pairs, or in groups.
The following resources will be required:
• Two 0.6 to 0.9m (2 to 3 ft.) lengths of cable, Category 5 or 5e
• A minimum of four RJ-45 connectors (more may be needed if mis-wiring occurs)
• An RJ-45 crimping tool
• An Ethernet cable tester
• Wire cutters
T568A Standard
Pin No. Pair No. Wire Color Function
1 2 White/Green Transmit
2 2 Green Transmit
3 3 White/Orange Receive
4 1 Blue Not used
5 1 White/Blue Not used
6 3 Orange Receive
7 4 White/Brown Not used
8 4 Brown Not used
T568B Standard
Pin No. Pair No. Wire Color Function
1 2 White/Orange Transmit
2 2 Orange Transmit
3 3 White/Green Receive
4 1 Blue Not used
5 1 White/Blue Not used
6 3 Green Receive
7 4 White/Brown Not used
8 4 Brown Not used
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 5
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 5
CCNA Discovery
Networking for Home and Small Businesses
c. If everything is correctly aligned and inserted properly, place the RJ-45 connector and cable into the
crimper. The crimper will push two plungers down on the RJ-45 connector.
d. Visually re-inspect the connector. If improperly installed, cut the end off and repeat the process.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 5
CCNA Discovery
Networking for Home and Small Businesses
d. Visually re-inspect the connector. If improperly installed, cut the end off and repeat the process.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 5
CCNA Discovery
Networking for Home and Small Businesses
Step 6: Reflection
a. Which part of making these cables did you find the most difficult? Compare your views with a
classmate.
b. Are all four pairs of cables twisted the same amount? Discuss the reasons why or why not.
c. Ask a local business or check a site such as http://www.workopolis.com/ to see how much a
beginning cable installer earns and which criteria they look for in a cable installer. Write the
information you discover in the space provided.
____________________________________________________________________________
____________________________________________________________________________
d. Many technicians keep a crossover cable in their toolkit. When do you think that you would use a
crossover cable and when do you think a network technician would use this cable?
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 5
CCNA Discovery
Networking for Home and Small Businesses
Objectives
• Switch between the two Windows Calculator modes.
• Use Windows Calculator to convert between decimal, binary, and hexadecimal.
• Use Windows Calculator to determine the number of hosts in a network with powers of 2.
Background / Preparation
Network technicians work with binary, decimal, hexadecimal numbers with computers and networking
devices. In this lab you will use the Windows Calculator application to convert between the binary, decimal,
and hexadecimal number systems. You will also use the powers function to determine the number of hosts
that can be addressed based on the number of bits available.
The following resources are required:
• PC with Windows XP installed and functional
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 6
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 6
CCNA Discovery
Networking for Home and Small Businesses
MAC broadcast
FF:FF:FF:FF:FF:FF
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 6
CCNA Discovery
Networking for Home and Small Businesses
e. Convert each of the hexadecimal pairs to binary. For example, if the number CC-12-DE-4A-BD-88
was the physical address, convert the hexadecimal number CC to binary (11001100). Then convert
the hexadecimal number 12 to binary (00010010) and so on. Be sure to add the leading zeros for a
total of 8 binary digits per pair of hex digits.
Hexadecimal Binary
Step 8: (Optional) Determine the network number and number of hosts based on subnet mask
a. Given the IP network address of 172.16.203.56 and a subnet mask of 255.255.248.0, determine the
network portion of the address and calculate how many hosts can be created from host bits left.
b. Start by converting the 4 octets of the decimal IP address to binary and then convert the decimal
subnet mask to binary. Remember to include leading zeros when converting to binary in order to
make a total of 8 bits per octet.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 6
CCNA Discovery
Networking for Home and Small Businesses
Decimal IP address
Binary IP address and subnet mask
and subnet mask
172.16.203.56
255.255.248.0
c. Align the 32 bits of the subnet mask to the 32 bits of the IP address and compare them. The bits in
the IP address that align with the ones bits in the subnet mask represent the network number. What is
the binary and decimal network number for this IP address? Determine the binary address first
(include all 32 bits) and then convert it to decimal.
Binary network address: ____________________________________________________________
Decimal network address: ___________________________________________________________
d. How many ones bits are in the subnet mask? ____________________________________________
e. How many bits are left for host bits? ___________________________________________________
f. How many hosts can be created with the bits left? ________________________________________
Step 9: Reflection
a. List one other thing for which you might use the Windows Calculator scientific mode. It does not have
to be related to networking.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 6
Activity 6.7.3: IPv4 Address Subnetting Part 1
Learning Objectives
Upon completion of this activity, you will be able to determine network information for a given IP address
and network mask.
Background
This activity is designed to teach how to compute network IP address information from a given IP
address.
Scenario
When given an IP address and network mask, you will be able to determine other information about the
IP address such as:
• Network address
• Network broadcast address
• Total number of host bits
• Number of hosts
Find:
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts
Step 1: Translate Host IP address and network mask into binary notation.
Convert the host IP address and network mask to binary:
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 4
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.3: IPv4 Address Subnetting Part 1
172 25 0 0
Network Add. 10101100 11001000 00000000 00000000
Mask 11111111 11111111 00000000 00000000
Broadcast. 10101100 11001000 11111111 11111111
172 25 255 255
By counting the number of host bits, we can determine the total number of usable hosts for this network.
Host bits: 16
Total number of hosts:
16
2 = 65,536
65,536 – 2 = 65,534 (addresses that cannot use the all 0s address, network address, or the all 1s
address, broadcast address.)
Add this information to the table:
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 4
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.3: IPv4 Address Subnetting Part 1
Task 2: Challenge
Problem 1
Problem 2
Host IP Address 172.30.1.33
Network Mask 255.255.255.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts
Problem 3
Host IP Address 192.168.10.234
Network Mask 255.255.255.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts
Problem 4
Host IP Address 172.17.99.71
Network Mask 255.255.0.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 4
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.3: IPv4 Address Subnetting Part 1
Problem 5
Host IP Address 192.168.3.219
Network Mask 255.255.0.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts
Problem 6
Host IP Address 192.168.3.219
Network Mask 255.255.255.224
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts
Task 3: Clean Up
Remove anything that was brought into the lab, and leave the room ready for the next class.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 4
Activity 6.7.4: IPv4 Address Subnetting Part 2
Learning Objectives
Upon completion of this activity, you will be able to determine subnet information for a given IP address
and subnetwork mask.
Background
Borrowing Bits
How many bits must be borrowed to create a certain number of subnets or a certain number of hosts per
subnet?
Using this chart, it is easy to determine the number of bits that must be borrowed.
Things to remember:
• Subtract 2 for the usable number of hosts per subnet, one for the subnet address and one for the
broadcast address of the subnet.
210 29 28 27 26 25 24 23 22 21 20
1,024 512 256 128 64 32 16 8 4 2 1
Number of bits borrowed:
10 9 8 7 6 5 4 3 2 1 1
1,024 512 256 128 64 32 16 8 4 2 1
Hosts or Subnets
Dec. Binary
255 11111111
254 11111110
252 11111100
248 11111000
240 11110000
224 11100000
192 11000000
128 10000000
0 00000000
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2
Scenario
When given an IP address, network mask, and subnetwork mask, you will be able to determine other
information about the IP address such as:
• The subnet address of this subnet
• The broadcast address of this subnet
• The range of host addresses for this subnet
• The maximum number of subnets for this subnet mask
• The number of hosts for each subnet
• The number of subnet bits
• The number of this subnet
Task 1: For a Given IP Address and Subnet Mask, Determine Subnet Information.
Given:
Find:
Step 1: Translate host IP address and subnet mask into binary notation.
Step 2: Determine the network (or subnet) where this host address belongs.
1. Draw a line under the mask.
2. Perform a bit-wise AND operation on the IP Address and the Subnet Mask.
Note: 1 AND 1 results in a 1’ 0 AND anything results in a 0.
3. Express the result in dotted decimal notation.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2
Step 3: Determine which bits in the address contain network information and which contain host
information.
1. Draw the Major Divide (M.D.) as a wavy line where the 1s in the major network mask end (also
the mask if there was no subnetting). In our example, the major network mask is 255.255.0.0, or
the first 16 left-most bits.
2. Draw the Subnet Divide (S.D.) as a straight line where the 1s in the given subnet mask end. The
network information ends where the 1s in the mask end.
3. The result is the Number of Subnet Bits, which can be determined by simply counting the number
of bits between the M.D. and S.D., which in this case is 10 bits.
Step 5: Determine the range of host addresses available on this subnet and the broadcast address
on this subnet.
1. Copy down all of the network/subnet bits of the network address (that is, all bits before the S.D.).
2. In the host portion (to the right of the S.D.), make the host bits all 0s except for the right-most bit
(or least significant bit), which you make a 1. This gives us the first host IP address on this
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2
subnet, which is the first part of the result for Range of Host Addresses for This Subnet, which in
the example is 172.25.114.193.
3. Next, in the host portion (to the right of the S.D.), make the host bits all 1s except for the right-
most bit (or least significant bit), which you make a 0. This gives us the last host IP address on
this subnet, which is the last part of the result for Range of Host Addresses for This Subnet,
which in the example is 172.25.114.254.
4. In the host portion (to the right of the S.D.), make the host bits all 1s. This gives us the broadcast
IP address on this subnet. This is the result for Broadcast Address of This Subnet, which in the
example is 172.25.114.255.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2
Task 2: Challenge.
Problem 1
Host IP Address 172.30.1.33
Subnet Mask 255.255.255.0
Number of Subnet Bits
Number of Subnets
Problem 2
Host IP Address 172.30.1.33
Subnet Mask 255.255.255.252
Number of Subnet Bits
Number of Subnets
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2
Problem 3
Host IP Address 192.192.10.234
Subnet Mask 255.255.255.0
Number of Subnet Bits
Number of Subnets
Problem 4
Host IP Address 172.17.99.71
Subnet Mask 255.255.0.0
Number of Subnet Bits
Number of Subnets
Problem 5
Host IP Address 192.168.3.219
Subnet Mask 255.255.255.0
Number of Subnet Bits
Number of Subnets
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2
Problem 6
Host IP Address 192.168.3.219
Subnet Mask 255.255.255.252
Number of Subnet Bits
Number of Subnets
Task 3: Clean Up
Remove anything that was brought into the lab, and leave the room ready for the next class.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 8
Lab 6.7.5: Subnet and Router Configuration
Topology Diagram
Addressing Table
Fa0/0 N/A
R1
S0/0/0 N/A
Fa0/0 N/A
R2
S0/0/0 N/A
PC1 NIC
PC2 NIC
Learning Objectives
Upon completion of this lab, you will be able to:
• Subnet an address space per given requirements.
• Assign appropriate addresses to interfaces and document.
• Configure and activate Serial and FastEthernet interfaces.
• Test and verify configurations.
• Reflect upon and document the network implementation.
Scenario
In this lab activity, you will design and apply an IP addressing scheme for the topology shown in the
Topology Diagram. You will be given one address block that you must subnet to provide a logical
addressing scheme for the network. The routers will then be ready for interface address configuration
according to your IP addressing scheme. When the configuration is complete, verify that the network is
working properly.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4 Lab 6.7.5: Subnet and Router Configuration
The plan should have equal size subnets and use the smallest subnet sizes that will accommodate the
appropriate number of hosts.
Step 2: Consider the following questions when creating your network design.
How many subnets are needed for this network? ____________________
What is the subnet mask for this network in dotted decimal format? ____________________
What is the subnet mask for the network in slash format? ____________________
Step 2: Document the addresses to be used in the table provided under the Topology Diagram.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4 Lab 6.7.5: Subnet and Router Configuration
Task 5: Reflection
Are there any devices on the network that cannot ping each other?
__________________________________________________________________________
__________________________________________________________________________
What is missing from the network that is preventing communication between these devices?
__________________________________________________________________________
__________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
Lab 5.5.1: Examining a Device’s Gateway
Topology Diagram
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway
Learning Objectives
Upon completion of this lab, you will be able to:
Understand and explain the purpose of a gateway address.
Understand how network information is configured on a Windows computer.
Troubleshoot a hidden gateway address problem.
Background
An IP address is composed of a network portion and a host portion. A computer that communicates with
another device must first know how to reach the device. For devices on the same local area network
(LAN), the host portion of the IP address is used as the identifier. The network portion of the destination
device is the same as the network portion of the host device.
However, devices on different networks have different source and destination network numbers. The
network portion of the IP address is used to identify when a packet must be sent to a gateway address,
which is assigned to a network device that forwards packets between distant networks.
A router is assigned the gateway address for all the devices on the LAN. One purpose of a router is to
serve as an entry point for packets coming into the network and exit point for packets leaving the network.
Gateway addresses are very important to users. Cisco estimates that 80 percent of network traffic will be
destined to devices on other networks, and only 20 percent of network traffic will go to local devices. This
is called the 80/20 rule. Therefore, if a gateway cannot be reached by the LAN devices, users will not be
able to perform their job.
Scenario
Pod host computers must communicate with Eagle Server, but Eagle Server is located on a different
network. If the pod host computer gateway address is not configured properly, connectivity with Eagle
Server will fail.
Using several common utilities, network configuration on a pod host computer will be verified.
For local area network (LAN) traffic, the gateway address is the address of the Ethernet interface
connected to the LAN. Figure 1 shows two devices on the same network communicating with the ping
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway
command. Any device that has the same network address—in this example, 172.16.0.0—is on the
same LAN.
Referring to Figure 1, what is the MAC address of the network device on IP address 172.16.1.1?
____________________________________________________________________________
There are several Windows commands that will display a network gateway address. One popular
command is netstat –r. In the following transcript, the netstat –r command is used to view the
gateway addresses for this computer. The top highlight shows what gateway address is used to forward
all network packets destined outside of the LAN. The ”quad-zero” Network Destination and Netmask
values, 0.0.0.0 and 0.0.0.0, refer to any network not specifically known. For any non-local network,
this computer will use 172.16.255.254 as the default gateway. The second yellow highlight displays
the information in human-readable form. More specific networks are reached through other gateway
addresses. A local interface, called the loopback interface, is automatically assigned to the 127.0.0.0
network. This interface is used to identify the local host to local network services. Refer to the gray
highlighted entry. Finally, any device on network 172.16.0.0 is accessed through gateway
172.16.1.2, the IP address for this Ethernet interface. This entry is highlighted in green.
C:\>netstat –r
Route Table
=======================================================================
Interface List
0x1 ......................... MS TCP Loopback interface
0x20005 ...00 16 76 ac a7 6a Intel(R) 82562V 10/100 Network Connection
=======================================================================
=======================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.16.255.254 172.16.1.2 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
172.16.0.0 255.255.0.0 172.16.1.2 172.16.1.2 20
172.16.1.2 255.255.255.255 127.0.0.1 127.0.0.1 20
172.16.255.255 255.255.255.255 172.16.1.2 172.16.1.2 20
255.255.255.255 255.255.255.255 172.16.1.2 172.16.1.2 1
Default Gateway: 172.16.255.254
=======================================================================
Persistent Routes:
None
C:\>
Step 2: Use the ping command to verify connectivity with IP address 127.0.0.1.
Was the ping successful? __________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway
Step 3: Use the ping command to ping different IP addresses on the 127.0.0.0 network,
127.10.1.1, and 127.255.255.255.
Were responses successful? If not, why?
____________________________________________________________________________
____________________________________________________________________________
A default gateway address permits a network device to communicate with other devices on different
networks. In essence, it is the door to other networks. All traffic destined to different networks must go
through the network device that has the default gateway address.
As shown in Figure 2, communication between devices on different networks is different than on a LAN.
Pod host computer #2, IP address 172.16.1.2, initiates a ping to IP address 192.168.254.254.
Because network 172.16.0.0 is different from 192.168.254.0, the pod host computer requests the
MAC address of the default gateway device. This gateway device, a router, responds with its MAC
address. The computer composes the Layer 2 header with the destination MAC address of the router and
places frames on the wire to the gateway device.
Referring to Figure 2, what is the MAC address of the gateway device?
____________________________________________________________________________
Referring to Figure 2, what is the MAC address of the network device with IP address 192.168.254.254?
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway
However, a dynamic IP address may be configured, as shown in Figure 4. In this case, the Network
Properties settings window is not very useful for determining IP address information.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway
A more consistently reliable method for determining network settings on a Windows computer is to use
the ipconfig command:
Step 2: Using the command ipconfig /all, fill in the following table with information from your
pod host computer:
Description Address
IP Address
Subnet Mask
Default Gateway
DNS Server
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway
When troubleshooting network issues, a thorough understanding of the network can often assist in
identifying the real problem. Refer to the network topology in Figure 5 and the logical IP address
assignments in Table 1.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway
As the 3rd shift help desk Cisco engineer, you are asked for assistance from the help desk technician.
The technician received a trouble ticket from a user on computer host-1A, complaining that computer
host-11B, host-11B.example.com, does not respond to pings. The technician verified the cables and
network settings on both computers, but nothing unusual was found. You check with the corporate
network engineer, who reports that R2-Central has been temporarily brought down for a hardware
upgrade.
Nodding your head in understanding, you ask the technician to ping the IP address for host-11B,
172.16.11.2 from host-1A. The pings are successful. Then, you ask the technician to ping the gateway
IP address, 172.16.255.254, and the pings fail.
What is wrong?
____________________________________________________________________________
____________________________________________________________________________
You instruct the help desk technician to tell the user to use the IP address for host-11B temporarily, and
the user is able to establish connectivity with the computer. Within the hour the gateway router is back on
line, and normal network operation resumes.
Task 4: Reflection
A gateway address is critical to network connectivity, and in some instances LAN devices require a
default gateway to communicate with other devices on the LAN.
Using Windows command line utilities such as netstat –r and ipconfig /all will report gateway
settings on host computers.
Task 5: Challenge
Use Wireshark to capture a ping between two pod host computers. It may be necessary to restart the
host computer to flush the DNS cache. First, use the hostname of the destination pod computer for DNS
to reply with the destination IP address. Observe the communication sequence between network devices,
especially the gateway. Next, capture a ping between network devices using only IP addresses. The
gateway address should not be needed.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 8
Lab 5.5.2: Examining a Route
Topology Diagram
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route
Learning Objectives
Upon completion of this lab, you will be able to:
Use the route command to modify a Windows computer routing table.
Use a Windows Telnet client command telnet to connect to a Cisco router.
Examine router routes using basic Cisco IOS commands.
Background
For packets to travel across a network, a device must know the route to the destination network. This lab
will compare how routes are used in Windows computers and the Cisco router.
Some routes are added to routing tables automatically, based upon configuration information on the
network interface. The device considers a network directly connected when it has an IP address and
network mask configured, and the network route is automatically entered into the routing table. For
networks that are not directly connected, a default gateway IP address is configured that will send traffic
to a device that should know about the network.
Scenario
Using a pod host computer, examine the routing table with the route command and identify the different
routes and gateway IP address for the route. Delete the default gateway route, test the connection, and
then add the default gateway route back to the host table.
Use a pod host computer to telnet into R2-Central, and examine the routing table.
Task 1: Use the route Command to Modify a Windows Computer Routing Table.
C:\>netstat –r
Route Table
=======================================================================
Interface List
0x1 ......................... MS TCP Loopback interface
0x20005 ...00 16 76 ac a7 6a Intel(R) 82562V 10/100 Network Connection
=======================================================================
=======================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.16.255.254 172.16.1.2 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
172.16.0.0 255.255.0.0 172.16.1.2 172.16.1.2 20
172.16.1.2 255.255.255.255 127.0.0.1 127.0.0.1 20
172.16.255.255 255.255.255.255 172.16.1.2 172.16.1.2 20
255.255.255.255 255.255.255.255 172.16.1.2 172.16.1.2 1
Default Gateway: 172.16.255.254
=======================================================================
Persistent Routes:
None
C:\>
Figure 1. Output of the netstat Command
Shown in Figure 1, output from the netstat –r command is useful to determine route and gateway
information.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route
Examine the active routing table and verify that the default gateway route has been removed:
What is the default gateway IP address?
____________________________________________________________________________
If the default gateway IP address is removed, how can the DNS server be reached to resolve eagle-
server.example.com?
Can other LAN devices be reached, such as 172.16.255.254?
____________________________________________________________________________
Examine the active routing table, and verify that the default gateway route has been restored:
Has the default gateway route been restored? __________:
Task 2: Use a Windows Telnet Client Command telnet to Connect to a Cisco Router.
In this task, you will telnet into the R2-Central router and use common IOS commands to examine the
router routing table. Cisco devices have a Telnet server and, if properly configured, will permit remote
logins. Access to the router is restricted, however, and requires a username and password. The
password for all usernames is cisco. The username depends on the pod. Username ccna1 is for users
on pod 1 computer, ccna2 is for students on pod 2 computers, and so on.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route
A login window will prompt for a username, as shown below. Enter the applicable username, and press
<ENTER>. Enter the password, cisco, and press <ENTER>. The router prompt should be visible after a
successful login.
*****************************************************************
This is Eagle 1 lab router R2-Central.
Authorized access only.
*****************************************************************
Username: ccna1
Password: cisco (hidden)
R2-Central#
At the prompt, R2-Central#, a successful Telnet login has been created. Only limited permissions for
ccnax usernames are available; therefore, it is not possible to modify router settings or view the
configuration. The purpose of this task was to establish a Telnet session, which has been accomplished.
In the next task, the router routing table will be examined.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route
The Codes section shown in Figure 3 provides an explanation for the symbols to the left of each route
entry.
C denotes directly connected networks and the interface that supports the connection.
S denotes a static route, which is manually entered by the Cisco network engineer.
Because the route is ”quad-zero,” it is a candidate default route.
If there is no other route in the routing table, use this gateway of last resort IP
address to forward packets.
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route
____________________________________________________________________________
When finished examining the routing table, exit the router with the command exit <ENTER>. The
telnet client will also close the connection with the telnet escape sequence <CTRL> ] and quit. Close
the terminal window.
Task 4: Reflection
Two new Windows commands were used in this lab. The route command was used to view, delete, and
add route information on the pod host computer.
The Windows Telnet client, telnet, was used to connect to a lab router, R2-Central. This technique will
be used in other labs to connect to Cisco network devices.
The router routing table was examined with the Cisco IOS command show ip route. Routes for
directly connected networks, statically assigned routes, and gateway of last resort information are
displayed.
Task 5: Challenge
Other Cisco IOS commands can be used to view IP address information on a router. Similar to the
Windows ipconfig command, the Cisco IOS command show ip interface brief will display IP
address assignments.
Using Windows commands and the Cisco IOS commands in this lab, compare network information
output. What was missing? What critical network information was similar?
____________________________________________________________________________
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 7
CCNA Discovery
Networking for Home and Small Businesses
Background / Preparation
Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as
http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is being used.
Common ones are HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer Protocol over Secure
Socket Layer), and FTP (File Transfer Protocol).
DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain
name (like www.cisco.com) to an IP address in order to allow the source host to reach the destination host.
Work in pairs to complete this lab.
The following resources are required:
• Windows-based computer with Internet connectivity
• Access to the Run command
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Networking for Home and Small Businesses
Step 4: Reflection
a. If your school did not have a DNS server, what effect would this have on your use of the Internet?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. Some companies do not dedicate a single server for DNS. Instead, the DNS server provides other
functions as well. Which functions do you think might be included on a DNS server? Use the ipconfig
/all command to help you with this.
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Networking for Home and Small Businesses
Background / Preparation
File Transfer Protocol (FTP) is part of the TCP/IP suite. FTP is used to transfer files from one network device
to another network device. Windows includes an FTP application that you can execute from the command
prompt. There are also many free GUI versions of FTP that you can download. The GUI versions are easier
to use than typing from a command prompt.
When using FTP, one computer is normally the server and the other computer is the client. When accessing
the server from the client, you need to provide a username and password. Some FTP servers have a userID
named anonymous. You can access these types of sites by simply typing “anonymous” for the userID, without
a password. Usually, the site administrator has files that can be copied but does not allow files to be posted
with the anonymous userID.
If your class does not have an FTP server available, you can download and install a freeware version, such
as Home FTP Server or Cerberus FTP server. The FTP Server on a computer running the CCNA Discovery
Live CD may also be used. Another computer will act as the FTP client by using FTP from the command line,
a web browser, or download a freeware version of an FTP client, such as SmartFTP Client or Core FTP LE
client. Work in teams of two to complete this lab.
The following resources are required:
• Windows-based computer with an FTP client
• FTP server (Existing FTP server, downloaded freeware, or use Live CD)
c. From the ftp prompt, type ? to see a list of the commands that can be used in this mode.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
Lab 10.3.2: How Many Networks?
Learning Objectives
Upon completion of this lab, you will be able to:
• Determine the number of subnets.
• Design an appropriate addressing scheme.
• Assign addresses and subnet mask pairs to device interfaces.
• Examine the use of the available network address space.
Scenario
In this lab, you have been given the network address 192.168.26.0/24 to subnet and provide the
IP addressing for the networks shown in the Topology Diagrams. You must determine the number
of networks needed then design an appropriate addressing scheme. Place the correct address
and mask in the Addressing Table. In this example, the number of hosts is not important. You are
only required to determine the number of subnets per topology example.
Topology Diagram A
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?
Topology Diagram B
Fa0/0 Fa0/0
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?
Topology Diagram C
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?
Topology Diagram D
Fa1/0
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?
Reflection
What information is needed when determining an appropriate addressing scheme for a network?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 6
Lab 11.5.1: Basic Cisco Device Configuration
Topology Diagram
Learning Objectives
Background
Hardware Qty Description
Cisco Router 1
Part of CCNA Lab bundle.
Cisco Switch 1
Part of CCNA Lab bundle.
*Computer (host) 1
Lab computer.
Console (rollover) cable 1
Connects computer host 1 to Router
console port.
UTP Cat 5 crossover cable 1 Connects computer host 1 to Router
LAN interface Fa0/0
Straight Through Cable 3 Connects computer hosts to Switch
and switch to router
Table 1. Equipment and hardware required for this lab.
Gather the necessary equipment and cables. To configure the lab, make sure the equipment listed in
Table 1 is available.
Common configuration tasks include setting the hostname, access passwords, and MOTD banner.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Configuration changes may also be saved off-line in a text file for auditing or device replacement.
Scenario
In this lab students will configure common settings on a Cisco Router and Cisco Switch.
Given an IP address of 198.133.219.0/24, with 4 bits borrowed for subnets, fill in the following
information in the table below.
(Hint: fill in the subnet number, then the host address. Address information will be easy to compute with
the subnet number filled in first)
th
Maximum number of usable subnets (including the 0 subnet): _______________
Before proceeding, verify your addresses with the instructor. The instructor will assign subnetworks.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Ensure that power has been applied to the host computer, switch and router.
Connection Description
Name: Lab 11_2_11
Icon: Personal choice
Connect to
Connect Using: COM1 (or appropriate COM port)
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
COM1 Properties
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow Control: None
When the HyperTerminal session window comes up, press the Enter key until there is a response from
the router.
When in privileged exec command mode, any misspelled or unrecognized commands will attempt to be
translated by the router as a domain name. Since there is no domain server configured, there will be a
delay while the request times out. This can take between several seconds to several minutes. To
terminate the wait, simultaneously hold down the <CTRL><SHIFT>6 keys then release and press x:
Router>enabel
Translating "enabel"...domain server (255.255.255.255) %
Router>
Router> enable
Router#
Verify a clean configuration file with the privileged exec command show running-config. If a
configuration file was previously saved, it will have to be removed. Appendix 1 shows a typical default
router’s configuration. Depending on router’s model and IOS version, your configuration may look slightly
different. However, there should be no configured passwords or IP addresses. If your router does not
have a default configuration, ask the instructor to remove the configuration.
What shortcut command can be used to enter the privileged exec mode? _________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Examine the different configuration modes that can be entered with the command configure? Write
down the list of configuration modes and description:
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
What three commands may be used to leave the global configuration mode and return to the privileged
exec mode?
___________________________________________________________________________________
___________________________________________________________________________________
What shortcut command can be used to enter the global configuration mode? ______________________
___________________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Create a suitable MOTD banner. Only system administrators of the ABC Company are authorized access,
unauthorized access will be prosecuted, and all connection information will be logged.
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
Examine the different banner modes that can be entered. Write down the list of banner modes and
description.
Router1(config)# banner ?
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
Choose a terminating character that will not be used in the message text.__________________
Configure the MOTD banner. The MOTD banner is displayed on all connections before the login prompt.
Use the terminating character on a blank line to end the MOTD entry:
%
Router1(config)#
___________________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Access passwords are set for the privileged exec mode and user entry point such as console, aux, and
virtual lines. The privileged exec mode password is the most critical password, since it controls access to
the configuration mode.
There are three commands that may be used to exit the line configuration mode:
Command Effect
Return to the global configuration mode.
Exit configuration and return to the privileged exec mode.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Issue the command exit. What is the router prompt? What is the mode?
Router1(config-line)# exit
___________________________________________________________________________________
___________________________________________________________________________________
Issue the command end. What is the router prompt? What is the mode?
___________________________________________________________________________________
___________________________________________________________________________________
Figure 2 shows a network topology where a host computer is connected to Router1, interface Fa0/0.
The first IP address will be used to configure the host computer LAN. Write down the first IP Address:
___________________________________________________________________________________
The last IP address will be used to configure the router fa0/0 interface. Write down the last IP Address:
___________________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Apply the description on the router interface with the interface configuration command, description:
Apply the description on the router interface with the interface configuration command, description:
Click OK, and then Close. Open a terminal window, and verify network settings with the ipconfig
command.
What Cisco IOS command can be used to verify the interface status? __________________________
What Windows command can be used to verify host computer configuration? _____________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
What is the correct LAN cable between host1 and Router1? _______________________________
Key Description
<SPACE> Display the next page.
<RETURN> Display the next line.
Q Quit
<CTRL> c Quit
Write down one possible shortcut command that will display the contents of NVRAM.
Display the contents of NVRAM. If the output of NVRAM is missing, it is because there is no saved
configuration.:
Router1#show running-config
Does your MOTD banner contain the information you entered earlier? __________________________
Do your interface descriptions contain the information you entered earlier? ____________________
Write down one possible shortcut command that will display the contents of RAM. _________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Router1#
Write down one possible shortcut command that will copy the RAM configuration to NVRAM.
____________________________
Review the contents of NVRAM, and verify that the configuration is the same as the configuration in RAM.
Switch> en
Switch# config t
Switch(config)#
Configure the MOTD banner. The MOTD banner is displayed on all connections before the login prompt.
Use the terminating character on a blank line to end the MOTD entry. For assistance, review the similar
step for configuring a router MOTD banner.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Apply the descriptions on the switch interface with the interface configuration command, description:
Review the contents of NVRAM, and verify that the configuration is the same as the configuration in RAM.
Task 6: Reflection
The more you practice the commands, the faster you will become in configuring a Cisco IOS router and
switch. It is perfectly acceptable to use notes at first to help configure a device, but a professional network
engineer does not need a ‘cheat sheet’ to perform common configuration tasks. The following table lists
commands covered in this lab:
Purpose Command
Enter the global configuration mode. configure terminal
Example:
Router> enable
Router# configure terminal
Router(config)#
Specify the name for the router. hostname name
Example:
Router(config)# hostname Router1
Router(config)#
Specify an encrypted password to enable secret password
prevent unauthorized access to the Example:
privileged exec mode. Router(config)# enable secret cisco
Router(config)#
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Task 7: Challenge
It is often necessary, and always handy, to save the configuration file to an off-line text file. One way to
save the configuration file is to use HyperTerminal Transfer menu option Capture.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 14 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Refer to Figure 2. All communication between the host computer and router are saved to a file. The file
can be edited, and saved. The file can also be edited, copied, and pasted into a router:
To start a capture, select Hyperterminal menu option Transfer | Capture Text. Enter a path and file name,
and select Start.
Issue the privileged exec command show running-config, and press the <SPACE> key until all of
the configuration has been displayed.
Stop the capture. Select menu option Transfer | Capture Text | Stop.
Open the text file and review the contents. Remove any lines that are not configuration commands, such
as the more prompt. Manually correct any lines that were scrambled or occupy the same line. After
checking the configuration file, highlight the lines and select Notepad menu Edit | Copy. This places the
configuration in host computer memory.
To load the configuration file, it is ALWAYS best practice to begin with a clean RAM configuration.
Otherwise, stale configuration commands may survive a paste action and have unintended
consequences (also known as the Law of Unintended Consequences):
Router1# reload
Proceed with reload? [confirm] <ENTER>
Router> en
Router# config t
Router(config)#
Using the mouse, right-click inside the Hyperterminal window and select Paste To Host. The configuration
will be loaded, very quickly, to the router. Watch closely for error messages, each message must be
investigated and corrected.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 15 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
Task 6: Cleanup
Before turning off power to the router and switch, remove the NVRAM configuration file from each device
with the privileged exec command erase startup-config.
Unless directed otherwise by the instructor, restore host computer network connectivity, then turn off
power to the host computers. Remove anything that was brought into the lab, and leave the room ready
for the next class.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 16 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 17 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 18 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
no ip address
!
interface FastEthernet0/13
no ip address
!
interface FastEthernet0/14
no ip address
!
interface FastEthernet0/15
no ip address
!
interface FastEthernet0/16
no ip address
!
interface FastEthernet0/17
no ip address
!
interface FastEthernet0/18
no ip address
!
interface FastEthernet0/19
no ip address
!
interface FastEthernet0/20
no ip address
!
interface FastEthernet0/21
no ip address
!
interface FastEthernet0/22
no ip address
!
interface FastEthernet0/23
no ip address
!
interface FastEthernet0/24
no ip address
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/2
no ip address
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
ip http server
!
!
line con 0
line vty 5 15
!
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 19 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration
end
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 20 of 20