125 Custom Student Lab Manual

Download as pdf or txt
Download as pdf or txt
You are on page 1of 113

2009FA NET125 Custom Student Lab Manual

This document is exclusive property of Cisco Systems, Inc. Permission is granted to


print and copy this document for non-commercial distribution and exclusive use by
instructors in the CCNA Discovery and Exploration courses as part of an official
Cisco Networking Academy.
CCNA Discovery
Networking for Home and Small Businesses

Lab 3.1.5 Building a Peer-to-Peer Network


Objectives
• Design and build a simple peer-to-peer network using a crossover cable supplied by the instructor.
• Verify connectivity between the peers using the ping command.

Background / Preparation
In this hands-on lab, you will plan and build a simple peer-to-peer network using two PCs and an Ethernet
crossover cable.
The following resources are required:
• Two Window XP Professional PCs, each with an installed and functional Network Interface Card
(NIC)
• An Ethernet crossover cable

Step 1: Diagram the network


a. A network diagram is a map of the logical topology of the network. In the space below, sketch a
simple peer-to-peer network connecting two PCs. Label one PC with IP address 192.168.1.1 and the
other PC with IP address 192.168.1.2. Use labels to indicate connecting media and any necessary
network devices.

b. A simple network like the one you designed can use a hub or switch as a central connecting device,
or the PCs may be directly connected. Which kind of cable is required for a direct Ethernet connection
between the two PCs? _________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 7
CCNA Discovery
Networking for Home and Small Businesses

Step 2: Document the PCs


a. Check the computer name settings for each PC and make adjustments as necessary. For each PC,
select Start and Control Panel. Double-click the System icon, then click the Computer Name tab.
Write down the computer name that is displayed following Full computer name:

PC1 Name:

PC2 Name:

b. Check to see if the two PCs have the same name. If they do, change the name of one PC by clicking
the Change button, typing a new name in the Computer name field, then clicking OK.
c. Click OK to close the System Properties window.
d. Why is it important that each PC on a network have a unique name?
____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 7
CCNA Discovery
Networking for Home and Small Businesses

Step 3: Connect the Ethernet cable


a. Use the Ethernet crossover cable provided by the instructor. Plug one end of the cable into the
Ethernet NIC of PC1.
b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the cable, you should
hear a click which indicates that the cable connector is properly inserted into the port.

Step 4: Verify physical connectivity


a. After the Ethernet crossover cable is connected to both PCs, take a close look at each Ethernet port.
A light (usually green or amber) indicates that physical connectivity has been established between the
two NICs. Try unplugging the cable from one PC then reconnecting it to verify that the light goes off
then back on.
b. Go to the Control Panel, double click the Network Connections icon, and confirm that the local
area connection is established. The following figure shows an active local area connection. If physical
connectivity problems exist, you will see a red X over the Local Area Connection icon with the words
Network cable unplugged.

c. If the Local Area Connection does not indicate that it is connected, troubleshoot by repeating Steps 3
and 4. You may also want to ask your instructor to confirm that you are using an Ethernet crossover
cable.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 7
CCNA Discovery
Networking for Home and Small Businesses

Step 5: Configure IP settings


a. Configure the logical addresses for the two PCs so that they are able to communicate using TCP/IP.
On one of the PCs, go to the Control Panel, double click the Network Connections icon, and then
right click the connected Local Area Connection icon. Choose Properties from the pull-down menu.
b. Using the scroll bar in the Local Area Connection Properties window, scroll down to highlight
Internet Protocol (TCP/IP). Click the Properties button.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 7
CCNA Discovery
Networking for Home and Small Businesses

c. Select the Use the following IP address radio button and enter the following information:

IP Address 192.168.1.1

Subnet Mask 255.255.255.0

d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close button
to exit the Local Area Connection Properties window.
e. Repeat steps 5a – 5d for the second PC using the following information:

IP Address 192.168.1.2

Subnet Mask 255.255.255.0

Step 6: Verify IP connectivity between the two PCs


NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled temporarily on both
PCs. Windows Firewall should be re-enabled after the tests have been completed.
a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select Control Panel, and
double-click Network Connections.
b. Right-click the Local Area Connection icon and select Properties. Click the Advanced tab. Locate
and click the Settings button.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 7
CCNA Discovery
Networking for Home and Small Businesses

c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or DISABLED
(OFF) for the Ethernet port. ____________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable the
firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the following to
apply this setting.
e. Now that the two PCs are physically connected and configured correctly with IP addresses, we need
to make sure they communicate with each other. The ping command is a simple way to accomplish
this task. The ping command is included with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows command prompt window
will appear as shown in the figure below.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will verify the IP
connectivity. It should produce results similar to those shown in here.

h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.
i. Close the Windows command prompt window on both PCs.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 7
CCNA Discovery
Networking for Home and Small Businesses

Step 7: Verify connectivity using My Network Places


a. A PC can share its resources with other PCs on the network. PCs with shared resources should be
visible through My Network Places. On PC1, go to Start, click My Network Places, and then click
View workgroup computers in the left panel.

b. Do you see an icon for the other PC in your peer-to-peer network? _______________________
c. What is the name of the other PC? ________________________________________________
d. Is it the same name you recorded in Step 2? _________________________________________
e. Perform Step 7a on the second PC.
f. Close any open windows.

Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall
a. If you disabled the Windows Firewall in Step 6, click Start, select Control Panel, and open the
Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced tab.
Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began), click the On radio
button to enable the firewall. Click OK in this dialog box and the following one to apply this setting.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 7
CCNA Discovery
Networking for Home and Small Businesses

Lab 3.3.3 Determine the MAC Address of a Host

Objective
• Determine the MAC address of a Windows XP computer on an Ethernet network using the ipconfig
/all command.
• Access to the Run command.

Background/Preparation
Every computer on an Ethernet local network has a Media Access Control (MAC) address that is burned into
the Network Interface Card (NIC). Computer MAC addresses are usually displayed as 6 sets of two
hexadecimal numbers separated by dashes or colons. (example: 15-EF-A3-45-9B-57). The ipconfig /all
command displays the computer MAC address. You may work individually or in teams.

The following resources are required:

• Windows XP workstation with at least one Ethernet network interface card (NIC)

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 5
CCNA Discovery
Networking for Home and Small Businesses

Step 1: Open a Windows command prompt window

a. From the Windows XP desktop, click Start then Run.

b. Type cmd in the Run dialogue box then click OK.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 5
CCNA Discovery
Networking for Home and Small Businesses

c. A Windows command prompt window opens.

Step 2: Use the ipconfig /all command

a. Enter the ipconfig /all command at the command prompt.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 5
CCNA Discovery
Networking for Home and Small Businesses

b. Press Enter. (Typical results are shown in the following figure, but your computer will display different
information.)

Step 3: Locate the MAC (physical) address(es) in the output from the ipconfig /all command

a. Use the table below to fill in the description of the Ethernet adapter and the Physical (MAC) Address:
Description Physical Address

Step 4: Reflection

a. Why might a computer have more than one MAC address?

____________________________________________________________________________

____________________________________________________________________________

b. The sample output from the ipconfig /all command shown previously had only one MAC address.
Suppose the output was from a computer that also had wireless Ethernet capability. How might the
output change?

____________________________________________________________________________

____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 5
CCNA Discovery
Networking for Home and Small Businesses

c. Try disconnecting the cable(s) to your network adapter(s) and use the ipconfig /all command again.
What changes do you see? Does the MAC address still display? Will the MAC address ever change?

____________________________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

d. What are other names for the MAC address?

____________________________________________________________________________

____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 5
CCNA Discovery
Networking for Home and Small Businesses

Lab 3.3.6 Determine the IP Address of a Computer

Objective
• Use the ipconfig /all command to determine the IP address of a Windows XP host on an Ethernet
network.

Background / Preparation
Every computer connected to the Internet has a unique identifier, called an IP address. IP addresses are
displayed as four numbers, known as octets, separated by periods (example: 192.168.1.4). The ipconfig /all
command displays your computer’s IP address and information about the network. The following resources
are required:
• A workstation that is attached to the local network and that has it’s IP address already configured
• Access to the Run command
In this lab you will locate your computer’s IP address to discover its unique number.

Step 1: Determine the IP address of the computer


a. From the Windows XP desktop, click the Start button, and then click Run.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Networking for Home and Small Businesses

b. In the Run dialog box, type cmd then click the OK button.

c. At the command prompt, type ipconfig /all and press Enter.

d. The ipconfig /all command then displays a list of information about your computer’s IP configuration.
An example is shown in the following figure. The information displayed for your computer will be
different.

e. Locate the IP address and record the finding.


IP address _____________________________________
f. Why is it important that a computer get an IP address? ________________________________
____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
CCNA Discovery
Networking for Home and Small Businesses

Lab 3.5.2 IP Addresses and Network Communication

Objectives
• Build a simple peer-to-peer network and verify physical connectivity.
• Assign various IP addresses to hosts and observe the effects on network communication

Background / Preparation
In this lab, you will build a simple peer-to-peer network using two PCs and an Ethernet crossover cable. You
will assign various compatible and non-compatible IP addresses to the hosts and determine the effects on
their ability to communicate.
The following resources are required:
NOTE: You may use the small peer-to-peer network that was built in Lab 3.1.5
• Two Windows XP Professional PCs, each with an installed and functional Network Interface Card
(NIC)
• An Ethernet cross-over cable to connect the PCs (provided by instructor)
• (Optional lab setup) A hub or switch and two straight-through cables to connect the PCs (provided by
instructor)

Step 1: Connect the PCs to create a peer-to-peer network


a. Obtain an Ethernet crossover cable provided by the instructor to connect the two PCs.
NOTE: (optional lab setup) The PCs may be connected to a hub (or switch) using two straight-
through cables. The following instructions assume you are using a crossover cable.
b. Plug one end of the cable into the Ethernet NIC of PC1. Plug the other end of the cable into the
Ethernet NIC of PC2. As you insert the cable, you should hear a click which indicates that the cable
connector is properly inserted into the port.

Step 2: Verify physical connectivity


a. After the Ethernet crossover cable is connected to both PCs, take a close look at each Ethernet port.
A link light (usually green or amber) indicates that physical connectivity has been established
between the two NICs. Try unplugging the cable from one PC then reconnecting it to verify that the
light goes off then back on.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6
CCNA Discovery
Networking for Home and Small Businesses

b. Go to the Control Panel, double click the Network Connections icon, and confirm that the local
area connection is established. The following figure shows an active local area connection. If physical
connectivity problems exist, you will see a red X over the Local Area Connection icon with the words
Network cable unplugged.

c. If the Local Area Connection does not indicate that it is connected, troubleshoot by repeating Steps 1
and 2. You may also want to ask your instructor to confirm that you are using an Ethernet crossover
cable.

Step 3: Configure IP settings for the two PCs


a. Configure the logical IP addresses for the two PCs so that they are able to communicate using
TCP/IP. On PC1, go to the Control Panel, double click the Network Connections icon, and then right
click the connected Local Area Connection icon. Choose Properties from the pull-down menu.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 6
CCNA Discovery
Networking for Home and Small Businesses

b. Using the scroll bar in the Local Area Connection Properties window, scroll down to highlight Internet
Protocol (TCP/IP). Click the Properties button.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 6
CCNA Discovery
Networking for Home and Small Businesses

c. Select the Use the following IP address radio button and enter an IP address of 192.168.1.1 and a
subnet mask of 255.255.255.0. With this IP address and subnet mask, the network number the host
is on is 192.168.1.0 and 192.168.1.1 is the first host on the 192.168.1.0 network :

IP Address 192.168.1.1

Subnet Mask 255.255.255.0

d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close
button to exit the Local Area Connection Properties window.
e. Repeat steps 3a – 3d for the PC2 using an IP address of 192.168.1.2 and a subnet mask of
255.255.255.0. The network number this PC is on is 192.168.1.0 and 192.168.1.2 is the second host
on the 192.168.1.0 network.

IP Address 192.168.1.2

Subnet Mask 255.255.255.0

Step 4: Verify IP connectivity between the two PCs


NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled temporarily on both
PCs. Windows Firewall should be re-enabled after the tests have been completed.
a. On each PC, on the Windows XP desktop, click Start. From the Start menu, select Control Panel,
and double-click Network Connections.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 6
CCNA Discovery
Networking for Home and Small Businesses

b. Right-click the Local Area Connection icon and select Properties. Click the Advanced tab. Locate
and click the Settings button.
c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or DISABLED
(OFF) for the Ethernet port. _____________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable the
firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the following to
apply this setting. Repeat Steps 4a-4d on the second PC.
e. Now that the two PCs are physically connected and configured correctly with IP addresses, we need
to make sure they communicate with each other. The ping command is a simple way to accomplish
this task. The ping command is included with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Window command prompt window
will appear as shown in the following figure.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will verify the IP
connectivity. It should produce results similar to those shown in the figure that follows.

h. Repeat this procedure for PC2 but ping 192.168.1.1.


i. Close the Windows command prompt window on both PCs.

Step 5: Change IP address for PC2


a. On PC2, go to the Control Panel, double click the Network Connections icon, and then right click the
connected Local Area Connection icon. Choose Properties from the pull-down menu.
b. Using the scroll bar in the Local Area Connection Properties window, scroll down to highlight Internet
Protocol (TCP/IP). Click the Properties button.
c. Change the logical IP address for PC2 from 192.168.1.2 to 192.168.2.2 and leave the subnet mask
set to 255.255.255.0. On what network is PC2 now? _________________________________
d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close
button to exit the Local Area Connection Properties window.
e. Refer back to Step 3c. On what network is PC1? ____________________________________
f. The two PCs are still on the same physical Ethernet network. Are they on the same logical IP
network? _____________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 6
CCNA Discovery
Networking for Home and Small Businesses

Step 6: Test network connectivity between the 2 PCs


a. On PC1, go to Start, then Run. Type cmd, and then click OK. A Window command prompt window
will appear.
b. At the > prompt, type ping 192.168.2.2 and press Enter. Was it successful? _________________
Why or why not? _________________________________________________________________
c. What type of networking device would allow the PCs to communicate? ______________________

Step 7: Change IP address for PC1


a. Using the procedure previously described, change the logical IP address for PC1 from 192.168.1.1 to
192.168.2.99 and leave the subnet mask set to 255.255.255.0. On what network is PC1 now?
_______________________________________________________________________________
b. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close
button to exit the Local Area Connection Properties window.
c. The two PCs are still on the same physical Ethernet network. Are they on the same logical IP network
now? ___________________________________________________________________________

Step 8: Test network connectivity between the 2 PCs


a. On PC2, go to Start, then Run. Type cmd, and then click OK. A Window command prompt window
will appear.
b. At the > prompt, type ping 192.168.2.99 and press Enter. Was it successful? _________________
Why or why not? __________________________________________________________________

Step 9: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall
a. If you disabled the Windows Firewall in Step 4, click Start, select Control Panel, and click Network
Connections.
b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced tab.
Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began), click the On radio
button to enable the firewall. Click OK in this dialog box and the following one to apply this setting.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 6
CCNA Discovery
Networking for Home and Small Businesses

Lab 3.6.4 Connect and Configure Hosts


Objectives
• Connect a PC to a router using a straight-through cable.
• Configure the PC with an appropriate IP address.
• Configure the PC with a NetBIOS computer name.
• Verify the PC configuration using Windows XP and through a command prompt.

Background / Preparation
In order for the PC to participate in the local network and the Internet, it must be connected to a network
device. The following resources will be required:
• Linksys Model WRT300N wireless router or equivalent SOHO router
• Two computers with Ethernet NICs and Windows XP Professional installed on both
• Two straight-through cables

Step 1: Identify Ethernet ports


a. On the Linksys router, locate the Ethernet (Local Area Network) LAN ports. The Ethernet LAN ports
connect your network hosts and devices. The four LAN ports are grouped together in the center of the
router as shown in the following figure.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 9
CCNA Discovery
Networking for Home and Small Businesses

b. On the PC, locate the Ethernet port. The port could be integrated into the motherboard or it could be
an adapter. In either case, the port will be an RJ-45 port. The photo shows an Ethernet port on an
adapter.

Step 2: Connect the cable between the PC and the router


a. Connect one end of the straight-through Ethernet cable to an Ethernet LAN port on the router.
b. Connect the other end of the cable to the PC Ethernet port.
c. Repeat this procedure for the second PC.

Step 3: Assign the PCs an IP address and default gateway


a. In order to assign an IP address and default gateway to a Windows XP host, from the Start menu,
select Control Panel.
b. There are two ways to view Control Panels: Classic view and Category view. The options available
depend on which one of these two views you are using. If you see an option on the left that says
Switch to Category View, you are currently in the Classic view mode. If you see an option on the left
that says Switch to Classic View, you are currently in Category view mode. Ensure that you are in
Classic view mode.
c. Locate and double-click the Network Connections control panel icon.
d. Right-click the Local Area Connection icon that represents your NIC and click the Properties menu
option.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 9
CCNA Discovery
Networking for Home and Small Businesses

e. In the middle window, scroll down until you see and can double-click the Internet Protocol (TCP/IP)
option. The figure that follows shows this option.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 9
CCNA Discovery
Networking for Home and Small Businesses

f. Click the Properties button and the Internet Protocol [TCP/IP] Properties window will appear.. Next,
click the Use the following IP address button, which activates the IP address, Subnet mask, and
Default gateway textboxes.
In the IP address field, enter 192.168.10.2. Configure the subnet mask to 255.255.255.0. Configure
the default gateway to 192.168.10.1. The figure that follows shows these settings. (DNS server
information is not necessary at this time, so the fields under Use the following DNS server
addresses don’t need to be filled out.) When finished, click OK.

g. From the Internet Protocol [TCP/IP] Properties window, click OK to apply the changes. Be patient,
since this step may take some time. After the changes are applied, you will be returned to the
Network Connections window.
h. Since the two computers are on the same network, their IP addresses will be similar, their subnet
masks will be identical, and their default gateways will be identical. Perform the same procedures on
the second PC to assign an IP address, subnet mask, and default gateway using the following
information:
IP address: 192.168.10.3
Subnet mask: 255.255.255.0
Default gateway: 192.168.10.1

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 9
CCNA Discovery
Networking for Home and Small Businesses

i. Why do you think the IP addresses are different, but the subnet masks and default gateways are the
same? ______________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Step 4: Verify the IP address configuration


a. On the Windows XP desktop, click Start.
b. From the Start menu, Select the Run menu option.
c. In the Open: textbox, type cmd and press Enter. A command prompt appears. The figures that follow
show this process.

d. In the command line prompt, type ipconfig /all. Verify that the IP address and the default gateway
are the values that you entered in the earlier steps. If they are incorrect, repeat Steps 3 and 4.
e. Are the IP address, subnet mask, and default gateway correct for the first PC? _____________
f. Perform the same configuration check on the second PC. If the values are incorrect, repeat Steps 3
and 4.
g. Are the IP address, subnet mask, and default gateway correct for the second PC? ___________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 9
CCNA Discovery
Networking for Home and Small Businesses

Step 5: Test connectivity between the two PCs


NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled temporarily on both
PCs. Windows Firewall should be re-enabled after the tests have been completed.
a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select Control Panel, and
double-click Network Connections.
b. Right-click the Local Area Connection icon and select Properties. Click the Advanced tab. Locate and
click the Settings button.
c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or DISABLED
(OFF) for the Ethernet port. _______________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable the
firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the following to
apply this setting.
e. From the same command prompt on the first PC, type ping 192.168.10.3 to test connectivity with the
second PC.
f. If the ping is successful, you will see results similar to the following figure. If the ping is not
successful, perform the appropriate troubleshooting steps such as checking the cabling and checking
your IP address, subnet mask, and default gateway assignments.

g. From the command prompt on the second PC, type ping 192.168.10.2 to check connectivity to the
first PC.
The ping should succeed.

Step 6: Configure the NetBIOS name


a. Right-click Start and select the Explore option.
b. How many drive letters are shown in the window that appears? _________________________
c. Which drive letters are shown? ___________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 9
CCNA Discovery
Networking for Home and Small Businesses

d. Right-click the My Computer icon on your Windows XP desktop and select the Properties option.
The System Properties window appears.
NOTE: If the My Computer icon does not appear on the desktop, click Start then right-click My
Computer.
e. Click the Computer Name tab. An example of the window that appears follows:

f. Click Change. Make a note of the current computer name. _______________


g. In the Computer Name textbox, type PC1. Ensure the Member of radio button or field is set to
Workgroup.
h. Make a note of the Workgroup name. __________________________________________
i. Click OK. If prompted to restart the computer, click OK to restart and follow the directions on the
screen.
j. Use the same process to name the second computer PC2. Also ensure that the Workgroup name is
set to the same value as PC1.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 9
CCNA Discovery
Networking for Home and Small Businesses

Step 7: Verify configuration


a. To verify the new configuration, open a command prompt on each computer. If you forgot how, refer
to Steps 4a, b, and c.

b. Use the nbtstat command to view and gather information about remote computers. From the
command prompt, type nbtstat and press Enter. Help for the command displays as shown:
The letters shown are options called switches that you can use with the nbtstat command.
a. On PC1, type nbtstat –n and press Enter to see the local NetBIOS name of PC1.
b. On PC2, type the same command to verify the NetBIOS name is set to PC2.
c. The nbtstat –a command can be used to look at a remote computer’s name table. Type nbtstat
again from the command prompt. Notice in the output that when you use the –a switch, you have to
put a space and then type a remote computer’s name (RemoteName).
From PC1, type nbtstat –a PC2 and press Enter. The nbtstat information for PC2 shows on PC1’s
monitor.
What command would be used from the command prompt on PC2 to view information about PC1?
____________________________________________________________________________
d. From PC2, type the appropriate command to view PC1’s nbtstat information.
e. The nbtstat –A (notice that the switch is a capital A this time) can be used to view the same
information using an IP address rather than a name. If you type nbtstat again, you can see that the
command syntax tells us that we use –A followed by an IP address. The IP address is that of the
remote computer.
From PC1, type nbtstat –A 192.168.10.3 to see the same information that was returned by the
nbtstat –a PC2 command.
f. Write the command that would be typed on PC2 to view information about PC1, using the IP address
of PC1 instead of the NetBIOS name. _____________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 9
CCNA Discovery
Networking for Home and Small Businesses

g. From PC1, you can use the ping command to verify connectivity. However, instead of using an IP
address, you can use the NetBIOS name. From the PC1 command prompt, type ping PC2 (notice
the capitalization). The result should be successful.
h. From PC1, type ping pc2 (notice the capitalization).
i. Does the ping succeed using lower case letters? ______________________________________
j. You can use the nbtstat –r command to see NetBIOS names that have been resolved (they are
known). From the PC1 and PC2 command prompt, type nbtstat –r to see that the remote computer is
known using NetBIOS.
k. Close the command prompt window.

Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall
a. If the answer to Step 5c was OFF or ENABLED on PC1, click Start, select Control Panel, and open
the Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced tab.
Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began), click the On radio
button to disable the firewall. Click OK in this dialog box and the following one to apply this setting.

Step 9: Return IP Address and NetBIOS Name to original values


a. Return to Step 3 to change the IP address back to the original.
b. Return to Step 6d to change the NetBIOS name back to the original.

Step 10: Reflection


a. Check two or three computers in your lab at school. Complete the following table:

Computer Name IP Address & Subnet Default Gateway


Mask

b. Either with a classmate assigned to you or by choosing one yourself, share this information with
them.
In your opinion, are the names descriptive? _________________________________________
c. Are all of the computers in the classroom part of the same local network? How could you prove that?
____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 9
Lab 2.6.2: Using Wireshark™ to View Protocol Data Units
Learning Objectives

• Be able to explain the purpose of a protocol analyzer (Wireshark).

• Be able to perform basic PDU capture using Wireshark.

• Be able to perform basic PDU analysis on straightforward network data traffic.

• Experiment with Wireshark features and options such as PDU capture and display filtering.

Background
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network
troubleshooting, analysis, software and protocol development, and education. Before June 2006,
Wireshark was known as Ethereal.

A packet sniffer (also known as a network analyzer or protocol analyzer) is computer software that can
intercept and log data traffic passing over a data network. As data streams travel back and forth over the
network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content
according to the appropriate RFC or other specifications.

Wireshark is programmed to recognize the structure of different network protocols. This enables it to
display the encapsulation and individual fields of a PDU and interpret their meaning.

It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses
for data analysis and troubleshooting.

For information and to download the program go to - http://www.Wireshark.org

Scenario
To capture PDUs the computer on which Wireshark is installed must have a working connection to the
network and Wireshark must be running before any data can be captured.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

When Wireshark is launched, the screen below is displayed.

To start data capture it is first necessary to go to the Capture menu and select the Options choice.
The Options dialog provides a range of settings and filters which determines which and how much data
traffic is captured.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

First, it is necessary to ensure that Wireshark is set to monitor the correct interface. From the Interface
drop down list, select the network adapter in use. Typically, for a computer this will be the connected
Ethernet Adapter.

Then other Options can be set. Among those available in Capture Options, the two highlighted below
are worth examination.

Setting Wireshark to capture packets in promiscuous mode

If this feature is NOT checked, only PDUs destined for this computer will be captured.
If this feature is checked, all PDUs destined for this computer AND all those detected by the computer
NIC on the same network segment (i.e., those that "pass by" the NIC but are not destined for the
computer) are captured.
Note: The capturing of these other PDUs depends on the intermediary device connecting the end device
computers on this network. As you use different intermediary devices (hubs, switches, routers) throughout
these courses, you will experience the different Wireshark results.

Setting Wireshark for network name resolution

This option allows you to control whether or not Wireshark translates network addresses found in PDUs
into names. Although this is a useful feature, the name resolution process may add extra PDUs to your
captured data perhaps distorting the analysis.

There are also a number of other capture filtering and process settings available.

Clicking on the Start button starts the data capture process and a message box displays the progress of
this process.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

As data PDUs are captured, the types and number are indicated in the message box

The examples above show the capture of a ping process and then accessing a web page.

When the Stop button is clicked, the capture process is terminated and the main screen is displayed.

This main display window of Wireshark has three panes.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

Packet List Pane

Packet Details Pane

Packets Bytes Pane

The PDU (or Packet) List Pane at the top of the diagram displays a summary of each packet captured. By
clicking on packets in this pane, you control what is displayed in the other two panes.

The PDU (or Packet) Details Pane in the middle of the diagram displays the packet selected in the Packet
List Pane in more detail.

The PDU (or Packet) Bytes Pane at the bottom of the diagram displays the actual data (in hexadecimal
form representing the actual binary) from the packet selected in the Packet List Pane, and highlights the
field selected in the Packet Details Pane.

Each line in the Packet List corresponds to one PDU or packet of the captured data. If you select a line in
this pane, more details will be displayed in the "Packet Details" and "Packet Bytes" panes. The example
above shows the PDUs captured when the ping utility was used and http://www.Wireshark.org was
accessed. Packet number 1 is selected in this pane.

The Packet Details pane shows the current packet (selected in the "Packet List" pane) in a more detailed
form. This pane shows the protocols and protocol fields of the selected packet. The protocols and fields of
the packet are displayed using a tree, which can be expanded and collapsed.

The Packet Bytes pane shows the data of the current packet (selected in the "Packet List" pane) in what
is known as "hexdump" style. In this lab, this pane will not be examined in detail. However, when a more
in-depth analysis is required this displayed information is useful for examining the binary values and
content of PDUs.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

The information captured for the data PDUs can be saved in a file. This file can then be opened in
Wireshark for analysis some time in the future without the need to re-capture the same data traffic again.
The information displayed when a capture file is opened is the same as the original capture.

When closing a data capture screen or exiting Wireshark you are prompted to save the captured PDUs.

Clicking on Continue without Saving closes the file or exits Wireshark without saving the displayed
captured data.

Task 1: Ping PDU Capture


Step 1: After ensuring that the standard lab topology and configuration is correct, launch
Wireshark on a computer in a lab pod.
Set the Capture Options as described above in the overview and start the capture process.

From the command line of the computer, ping the IP address of another network connected and powered
on end device on in the lab topology. In this case, ping the Eagle Server at using the command ping
192.168.254.254.

After receiving the successful replies to the ping in the command line window, stop the packet capture.

Step 2: Examine the Packet List pane.

The Packet List pane on Wireshark should now look something like this:

Look at the packets listed above; we are interested in packet numbers 6, 7, 8, 9, 11, 12, 14 and 15.

Locate the equivalent packets on the packet list on your computer.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

If you performed Step 1A above match the messages displayed in the command line window when the
ping was issued with the six packets captured by Wireshark.

From the Wireshark Packet List answer the following:

What protocol is used by ping? ______________________________

What is the full protocol name? ______________________________

What are the names of the two ping messages? ______________________________

_____________________________________________________________________

Are the listed source and destination IP addresses what you expected? Yes / No

Why? ___________________________________

Step 3: Select (highlight) the first echo request packet on the list with the mouse.

The Packet Detail pane will now display something similar to:

Click on each of the four "+" to expand the information.

The packet Detail Pane will now be similar to:

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

As you can see, the details for each section and protocol can be expanded further. Spend some time
scrolling through this information. At this stage of the course, you may not fully understand the
information displayed but make a note of the information you do recognize.

Locate the two different types of 'Source" and "Destination". Why are there two types?

__________________________________________________________________

What protocols are in the Ethernet frame?

____________________________________________________________

As you select a line in the Packets Detail pane all or part of the information in the Packet Bytes pane also
becomes highlighted.

For example, if the second line (+ Ethernet II) is highlighted in the Details pane the Bytes pane now
highlights the corresponding values.

This shows the particular binary values that represent that information in the PDU. At this stage of the
course, it is not necessary to understand this information in detail.

Step 4: Go to the File menu and select Close.


Click on Continue without Saving when this message box appears.

Task 2: FTP PDU Capture

Step 1: Start packet capture.


Assuming Wireshark is still running from the previous steps, start packet capture by clicking on the Start
option on the Capture menu of Wireshark.

At the command line on your computer running Wireshark, enter ftp 192.168.254.254

When the connection is established, enter anonymous as the user without a password.
Userid: anonymous
Password: <ENTER>
You may alternatively use login with userid cisco and with password cisco.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

When successfully logged in enter get /pub/eagle_labs/eagle1/chapter1/gaim-1.5.0.exe


and press the enter key <ENTER>. This will start downloading the file from the ftp server. The output will
look similar to:

C:\Documents and Settings\ccna1>ftp eagle-server.example.com


Connected to eagle-server.example.com.
220 Welcome to the eagle-server FTP service.
User (eagle-server.example.com:(none)): anonymous
331 Please specify the password.
Password:<ENTER>
230 Login successful.
ftp> get /pub/eagle_labs/eagle1/chapter1/gaim-1.5.0.exe
200 PORT command successful. Consider using PASV.
150 Opening BINARY mode data connection for
pub/eagle_labs/eagle1/chapter1/gaim-1.5.0.exe (6967072 bytes).
226 File send OK.
ftp: 6967072 bytes received in 0.59Seconds 11729.08Kbytes/sec.

When the file download is complete enter quit

ftp> quit
221 Goodbye.
C:\Documents and Settings\ccna1>

When the file has successfully downloaded, stop the PDU capture in Wireshark.

Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed.
Locate and note those PDUs associated with the file download.
These will be the PDUs from the Layer 4 protocol TCP and the Layer 7 protocol FTP.

Identify the three groups of PDUs associated with the file transfer.

If you performed the step above, match the packets with the messages and prompts in the FTP command
line window.

The first group is associated with the "connection" phase and logging into the server.
List examples of messages exchanged in this phase.

___________________________________________________________________
Locate and list examples of messages exchanged in the second phase that is the actual download
request and the data transfer.

__________________________________________________________________

___________________________________________________________________

The third group of PDUs relate to logging out and "breaking the connection".
List examples of messages exchanged during this process.

__________________________________________________________________

___________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

Locate recurring TCP exchanges throughout the FTP process. What feature of TCP does this indicate?

___________________________________________________________________

___________________________________________________________________

Step 3: Examine Packet Details.


Select (highlight) a packet on the list associated with the first phase of the FTP process.
View the packet details in the Details pane.

What are the protocols encapsulated in the frame?

___________________________________________________________________

Highlight the packets containing the user name and password.


Examine the highlighted portion in the Packet Byte pane.

What does this say about the security of this FTP login process?

___________________________________________________________________

Highlight a packet associated with the second phase.


From any pane, locate the packet containing the file name.

The filename is: ______________________________

Highlight a packet containing the actual file content - note the plain text visible in the Byte pane.

Highlight and examine, in the Details and Byte panes, some packets exchanged in the third phase of the
file download.
What features distinguish the content of these packets?
___________________________________________________________________

When finished, close the Wireshark file and continue without saving

Task 3: HTTP PDU Capture


Step 1: Start packet capture.
Assuming Wireshark is still running from the previous steps, start packet capture by clicking on the Start
option on the Capture menu of Wireshark.

Note: Capture Options do not have to be set if continuing from previous steps of this lab.

Launch a web browser on the computer that is running Wireshark.


Enter the URL of the Eagle Server of example.com or enter the IP address-192.168.254.254. When the
webpage has fully downloaded, stop the Wireshark packet capture.

Step 2: Increase the size of the Wireshark Packet List pane and scroll through the PDUs listed.
Locate and identify the TCP and HTTP packets associated with the webpage download.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 11
CCNA Exploration
Network Fundamentals:
Communicating over the Network Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

Note the similarity between this message exchange and the FTP exchange.

Step 3: In the Packet List pane, highlight an HTTP packet that has the notation "(text/html)" in the
Info column.
In the Packet Detail pane click on the "+" next to "Line-based text data: html"
When this information expands what is displayed?
___________________________________________________________________

Examine the highlighted portion of the Byte Panel.


This shows the HTML data carried by the packet.

When finished close the Wireshark file and continue without saving

Task 4: Reflection
Consider the encapsulation information pertaining to captured network data Wireshark can provide.
Relate this to the OSI and TCP/IP layer models. It is important that you can recognize and link both the
protocols represented and the protocol layer and encapsulation types of the models with the information
provided by Wireshark.

Task 5: Challenge
Discuss how you could use a protocol analyzer such as Wireshark to:

(1) Troubleshoot the failure of a webpage to download successfully to a browser on a computer.

and

(2) Identify data traffic on a network that is requested by users.

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

Task 6: Cleanup
Unless instructed otherwise by your instructor, exit Wireshark and properly shutdown the computer.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 11
CCNA Discovery
Networking for Home and Small Businesses

Lab 4.5.3 Building Straight-Through and Crossover UTP Cables


Objective
• Build and test straight-through and crossover Unshielded Twisted Pair (UTP) Ethernet network
cables.

Background / Preparation
In this lab you will build and terminate Ethernet straight-through patch cables and crossover cables. With a
straight-through cable, the color of wire used by pin 1 on one end is the same color used by pin 1 on the other
cable end, and similarly for the remaining seven pins. The cable will be constructed using either TIA/EIA
T568A or T568B standards for Ethernet, which determine which color wire is used on each pin. Straight-
through patch cables are normally used to connect a host directly to a hub or switch or to a wall plate in and
office area.
With a crossover cable the second and third pairs on the RJ-45 connector at one end of the cable are
reversed at the other end. The pinouts for the cable are the T568A standard on one end and the T568B
standard on the other end. Crossover cables are normally used to connect hubs and switches or can be used
to directly connect two hosts to create a simple network. This is a two-part lab that can be done individually, in
pairs, or in groups.
The following resources will be required:
• Two 0.6 to 0.9m (2 to 3 ft.) lengths of cable, Category 5 or 5e
• A minimum of four RJ-45 connectors (more may be needed if mis-wiring occurs)
• An RJ-45 crimping tool
• An Ethernet cable tester
• Wire cutters
T568A Standard
Pin No. Pair No. Wire Color Function
1 2 White/Green Transmit
2 2 Green Transmit
3 3 White/Orange Receive
4 1 Blue Not used
5 1 White/Blue Not used
6 3 Orange Receive
7 4 White/Brown Not used
8 4 Brown Not used

T568B Standard
Pin No. Pair No. Wire Color Function
1 2 White/Orange Transmit
2 2 Orange Transmit
3 3 White/Green Receive
4 1 Blue Not used
5 1 White/Blue Not used
6 3 Green Receive
7 4 White/Brown Not used
8 4 Brown Not used

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 5
CCNA Discovery
Networking for Home and Small Businesses

Part A: Build and test an Ethernet straight-through patch cable

Step 1: Obtain and prepare the cable


a. Determine the length of cable required. This could be from a device such as a computer to the device
to which it connects (like a hub or switch) or between a device and an RJ-45 outlet jack. Add at least
30.48 cm (12 in.) to the distance. The TIA/EIA standard states the maximum length is 5 m (16.4 ft.).
Standard Ethernet cable lengths are usually .6 m (2 ft.), 1.83 m (6 ft.), or 3.05 m (10 ft.).
b. Which length of cable did you choose and why did you choose this length?
____________________________________________________________________________
c. Cut a piece of cable to the desired length. Stranded UTP cable is commonly used for patch cables
(the cables between an end network device such as a PC and an RJ-45 connector) because it is
more durable when bent repeatedly. It is called stranded because each of the wires within the cable is
made up of many strands of fine copper wire, rather than a single solid wire. Solid wire is used for
cable runs that are between the RJ-45 jack and a punch-down block.
d. Using wire strippers, remove 5.08 cm (2 in.) of the cable jacket from both ends of the cable.

Step 2: Prepare and insert the wires


a. Determine which wiring standard will be used. Circle the standard.
[T568A | T568B]
b. Locate the correct table based on the wiring standard used.
c. Spread the cable pairs and arrange them roughly in the desired order based on the standard chosen.
d. Untwist a short length of the pairs and arrange them in the exact order needed by the standard. It is
very important to untwist as little as possible. The twists are important because they provide
noise cancellation.
e. Straighten and flatten the wires between your thumb and forefinger.
f. Ensure the cable wires are still in the correct order as the standard.
g. Cut the cable in a straight line to within 1.25 to 1.9 cm (1/2 to 3/4 in.) from the edge of the cable
jacket. If it is longer than this, the cable will be susceptible to crosstalk (the interference of bits from
one wire with an adjacent wire).
h. The tang (the prong that sticks out from the RJ-45 connector) should be on the underside pointing
downward when inserting the wires. Insert the wires firmly into the RJ-45 connector until all wires are
pushed as far as possible into the connector.

Step 3: Inspect, crimp, and re-inspect


a. Visually inspect the cable and ensure the right color codes are connected to the correct pin numbers.
b. Visually inspect the end of the connector. The eight wires should be pressed firmly against the end of
the RJ-45 connector. Some of the cable jacket should be inside the first portion of the connector.
This provides strain relief for the cable. If the cable jacket is not far enough inside the connector, it
may eventually cause the cable to fail.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 5
CCNA Discovery
Networking for Home and Small Businesses

c. If everything is correctly aligned and inserted properly, place the RJ-45 connector and cable into the
crimper. The crimper will push two plungers down on the RJ-45 connector.

d. Visually re-inspect the connector. If improperly installed, cut the end off and repeat the process.

Step 4: Terminate the other cable end


a. Use the previously described steps to attach an RJ-45 connector to the other end of the cable.
b. Visually re-inspect the connector. If improperly installed, cut the end off and repeat the process.
c. Which standard [T568A | T568B] is used for patch cables in your school? __________________

Step 5: Test the cable


a. Using a cable tester, test the straight-through cable for functionality. If it fails, repeat the lab.
b. (Optional) Use the cable to connect a PC to a network.
c. (Optional) Click the Start button and select the Run option.
d. (Optional) Type cmd and press Enter.
e. (Optional) From the command prompt, type ipconfig.
f. (Optional) Write down the default gateway IP address. _________________________________
g. (Optional) From the command prompt, type ping followed by the default gateway IP address. If the
cable is functional, the ping should be successful (provided that no other network problem exists and
the default gateway router is connected and functional).

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 5
CCNA Discovery
Networking for Home and Small Businesses

Part B: Build and test an Ethernet crossover cable

Step 1: Obtain and prepare the cable


a. Determine the length of cable required. This could be from a hub to a hub, hub to switch, switch to
switch, computer to router, or from one computer to another computer. Add at least 30.48 cm (12 in.)
to the distance. Which length of cable did you choose and why did you choose this length?
____________________________________________________________________________
b. Cut a piece of cable to the desired length and, using wire strippers, remove 5.08 cm (2 in.) of the
cable jacket from both ends of the cable.

Step 2: Prepare and insert the T568A wires


a. Locate the T568A table at the beginning of the lab.
b. Spread the cable pairs and arrange them roughly in the desired order based on the T568A standard.
c. Untwist a short length of the pairs and arrange them in the exact order needed by the standard. It is
very important to untwist as little as possible. Twists are important because they provide noise
cancellation.
d. Straighten and flatten the wires between your thumb and forefinger.
e. Ensure the cable wires are in the correct order based on the standard.
f. Cut the cable in a straight line to within 1.25 to 1.9 cm (1/2 to 3/4 in.) from the edge of the cable
jacket. If it is longer than this, the cable will be susceptible to crosstalk (the interference of bits from
one wire with an adjacent wire).
g. The tang (the prong that sticks out from the RJ-45 connector) should be on the underside pointing
downward when inserting the wires. Insert the wires firmly into the RJ-45 connector until all wires are
pushed as far as possible into the connector.

Step 3: Inspect, crimp, and re-inspect


a. Visually inspect the cable and ensure the right color codes are connected to the correct pin numbers.
b. Visually inspect the end of the connector. The eight wires should be pressed firmly against the RJ-45
connector. Some of the cable jacket should be inside the first portion of the connector. This provides
for cable strain relief which can eventually cause the cable to fail.
c. If everything is correctly aligned and inserted properly, place the RJ-45 connector and cable into the
crimper. The crimper will push two plungers down on the RJ-45 connector.

d. Visually re-inspect the connector. If improperly installed, cut the end off and repeat the process.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 5
CCNA Discovery
Networking for Home and Small Businesses

Step 4: Terminate the T568B cable end


a. On the other end, use the previously described steps (but use the T568B table and standard) to
attach an RJ-45 connector to the cable.
b. Visually re-inspect the connector. If improperly installed, cut the end off and repeat the process.
c. Which standard [T568A | T568B] would you rather use at home if you have or would like to have a
home network?

Step 5: Test the cable


a. Using a cable tester, test the crossover cable for functionality. If it fails, repeat the lab.
b. Use the cable to connect two PCs.
c. On both computers, click the Start button and select Run.
NOTE: If the Run command is unavailable on your PC, visually check the LED status lights on the
NIC card. If they are on (usually green or amber) the cable is functional.
d. On both computers, type cmd and press Enter.
e. On both computers from the command prompt, type ipconfig.
f. Write the IP address of both computers.
Computer 1: _________________________
Computer 2: _________________________
g. From the command prompt of one computer, type ping followed by the IP address of the other
computer. If the cable is functional, the ping should be successful. Do the ping on the other computer
as well.
NOTE: The Windows Firewall on the target computer must be temporarily disabled for the ping to be
successful. Refer to Lab 3.1.5 if you need help with this. If you disable the firewall, be sure to re-
enable it.

Step 6: Reflection
a. Which part of making these cables did you find the most difficult? Compare your views with a
classmate.
b. Are all four pairs of cables twisted the same amount? Discuss the reasons why or why not.
c. Ask a local business or check a site such as http://www.workopolis.com/ to see how much a
beginning cable installer earns and which criteria they look for in a cable installer. Write the
information you discover in the space provided.
____________________________________________________________________________
____________________________________________________________________________
d. Many technicians keep a crossover cable in their toolkit. When do you think that you would use a
crossover cable and when do you think a network technician would use this cable?
____________________________________________________________________________
____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 5
CCNA Discovery
Networking for Home and Small Businesses

Lab 5.1.4 Using the Windows Calculator with Network Addresses

Objectives
• Switch between the two Windows Calculator modes.
• Use Windows Calculator to convert between decimal, binary, and hexadecimal.
• Use Windows Calculator to determine the number of hosts in a network with powers of 2.

Background / Preparation
Network technicians work with binary, decimal, hexadecimal numbers with computers and networking
devices. In this lab you will use the Windows Calculator application to convert between the binary, decimal,
and hexadecimal number systems. You will also use the powers function to determine the number of hosts
that can be addressed based on the number of bits available.
The following resources are required:
• PC with Windows XP installed and functional

Step 1: Access Windows Calculator and determine mode of operation


a. From the Start button menu, select All Programs > Accessories, and click on Calculator. An
alternate method of starting the Calculator application is to access the Start menu, click on Run, type
calc and press Enter. Try both methods.
b. Once the Calculator application opens, select the View menu option.
c. Which mode [Standard | Scientific] is currently active? ____________________________________
d. Select the Standard mode. This is a basic mode for simple calculations. How many mathematical
functions are available in this mode? __________________________________________________
e. From the View menu option, select the Scientific Calculator mode.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6
CCNA Discovery
Networking for Home and Small Businesses

f. How many mathematical functions are available in this mode? __________________________

Step 2: Convert between number systems


a. Access Scientific mode. Notice the number system modes available—Hex (Hexadecimal), Dec
(Decimal), Oct (Octal), and Bin (Binary).
b. Which number system is currently active? __________________________________________
c. Which numbers on the number pad are active in Decimal mode? ________________________
Click on the Bin (Binary) mode radio button. Which numbers on the number pad are now active?
____________________________________________________________________________
d. Why do you think the other numbers are grayed out? _________________________________
e. Click on the Hex (Hexadecimal) mode radio button.
f. Which characters on the number pad are now activated? ______________________________
g. Click on the Dec radio button. Using your mouse, click on the number 1 followed by the number 5 on
the number pad. The decimal number 15 has now been entered. Click on the Bin radio button.
h. What happened to the number 15 listed in the textbox at the top of the window? _____________
i. By selecting different modes, numbers are converted from one number system to another. Select Dec
mode again. The number in the window converts back to decimal. Select the Hex mode.
j. Which hexadecimal character (0 through 9 or A through F) represents decimal 15? ___________
k. Clear the hexadecimal value representing 15 in the window. Select Dec mode again. Not only can
the mouse be used to enter numbers, but the numerical keypad on the keyboard as well as numbers
on the keyboard can also be used. Using the numerical keypad to the right of the ENTER key, type
the number 22. Note that if the number does not enter into the calculator, press the Num Lock key to
enable the numeric keypad. While the number 22 is showing in the calculator, use the number keys
across the top of the keyboard to add a 0 to the number 22 (220 should now be on the calculator).
Select the Bin radio button.
l. What is the binary equivalent of 220? _______________________________________________
m. Clear the binary value representing 220 in the window. From Binary mode, type in the following
binary number: 11001100. Select the Dec radio button.
n. What is the decimal equivalent to the binary number of 11011100? ________________________
o. Convert the following decimal numbers to binary.
Decimal Binary
86
175
204
19
p. Convert the following binary numbers to decimal.
Binary Decimal
11000011
101010
111000
10010011

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 6
CCNA Discovery
Networking for Home and Small Businesses

Step 3: Convert host IP addresses


a. Computer hosts usually have two addresses, an Internet Protocol (IP) address and an Ethernet
Media Access Control (MAC) address. For the benefit of humans, the IP address is normally
represented as a dotted decimal notation, such as 135.15.227.68. Each of the decimal octets in the
address or a mask can be converted to 8 binary bits. Remember that the computer only understands
binary bits. If all 4 octets were converted to binary, how many bits would there be? _____________
b. IP addresses are normally shown with four decimal numbers ranging from 0 to 255 and separated by
a period. Convert the 4 parts of the IP address 192.168.10.2 to binary.
Decimal Binary
192
168
10
2
c. Notice in the previous problem how the 10 converted to only four digits and the number 2 converted
to only two digits. When IP addresses can have any number from 0 to 255 in each position, eight
digits are normally used to represent each number. In the previous example, eight digits were needed
to convert 192 and 168 to binary, but 10 and 2 did not need as many digits. Normally 0s are added to
the left of the digits to have eight digits in binary for each IP address number. The number 10 would
be shown as 00001010. Four extra zeros are added to the front of the other four binary digits.
d. On the calculator in Binary mode, enter the digits 00001010 and select the Dec radio button.
e. Which decimal number is equivalent to 00001010? ___________
f. Did adding “leading” zeros affect the number any? ____________
g. What would the number 2 (in the previous example) be if you were to make it eight digits? ________

Step 4: Convert host IP subnet masks


a. Subnet masks, such as 255.255.255.0, are also represented as dotted decimal. A subnet mask will
always consist of four 8-bit octets, each one represented as a decimal number. With the exception of
decimal 0 (all 8 binary zeros) and decimal 255 (all 8 binary ones), each octet will have some number
of ones on the left and some number of zeros on the right. Convert the 8 possible decimal subnet
octet values to binary.
Decimal Binary
0
128
192
224
240
248
252
254
255

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 6
CCNA Discovery
Networking for Home and Small Businesses

b. Convert the four parts of the subnet mask 255.255.255.0 to binary.


Decimal Binary
255
255
255
0

Step 5: Convert broadcast addresses


a. Computer hosts and network devices use broadcast addresses to send messages to all hosts.
Convert the following broadcast addresses.
Address Binary
IP broadcast
255.255.255.255

MAC broadcast
FF:FF:FF:FF:FF:FF

Step 6: Convert IP and MAC addresses for a host


a. Click the Start button, select Run, type cmd, and press Enter. From the command prompt, type
ipconfig /all.
b. Make a note of the IP address and physical address (also known as a MAC address).
IP Address: ____________________________________________________________________
MAC Address: __________________________________________________________________
c. Using the calculator, convert the four numbers contained in the IP address to binary.
Decimal Binary

d. The MAC or physical address is normally represented as 12 hexadecimal characters, grouped in


pairs and separated by dashes (-). Physical addresses on a Windows-based computer are shown in a
format of xx-xx-xx-xx-xx-xx, where each x is a number from 0 to 9 or a letter from a to f. Each of the
hex characters in the address can be converted to 4 binary bits which is what the computer
understands. If all 12 hex characters were converted to binary, how many bits would there be?
____________________________________________________________________________
____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 6
CCNA Discovery
Networking for Home and Small Businesses

e. Convert each of the hexadecimal pairs to binary. For example, if the number CC-12-DE-4A-BD-88
was the physical address, convert the hexadecimal number CC to binary (11001100). Then convert
the hexadecimal number 12 to binary (00010010) and so on. Be sure to add the leading zeros for a
total of 8 binary digits per pair of hex digits.
Hexadecimal Binary

Step 7: Manipulate powers of 2 to determine the number of hosts on a network


a. Binary numbers use two digits, 0 and 1. When you calculate how many hosts can be on a
subnetwork, you use powers of two because binary is being used. As an example, we have a subnet
mask that leaves six bits in the host portion of the IP address. In this case, the number of hosts on
that network is 2 to the 6th power minus 2 (because you need a number to represent the network and
a number that can be used to reach all the hosts—the broadcast address). The number 2 is always
used because we are working in binary. The number 6 is the number of bits that are used for the host
bits.
b. On the calculator, in Dec mode, input the number 2. Select the x^y key, the key which raises a
number to a power. Input the number 6. Click on the = key, press Enter on the keyboard, or press the
= key on the keyboard—all give the total. The number 64 appears in the output. To subtract two, click
on the minus (-) key and then the 2 key followed by the = key. The number 62 appears in the output.
This means 62 hosts could be utilized.
c. Using the previously described process, determine the number of hosts if the following number of bits
are used for host bits.

No. of Bits Used for


No. of Hosts
Hosts
5
14
24
10
d. Using a similar technique as learned previously, determine what 10 to the 4th power equals.
____________________________________________________________________________
e. Close the Windows Calculator application.

Step 8: (Optional) Determine the network number and number of hosts based on subnet mask
a. Given the IP network address of 172.16.203.56 and a subnet mask of 255.255.248.0, determine the
network portion of the address and calculate how many hosts can be created from host bits left.
b. Start by converting the 4 octets of the decimal IP address to binary and then convert the decimal
subnet mask to binary. Remember to include leading zeros when converting to binary in order to
make a total of 8 bits per octet.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 6
CCNA Discovery
Networking for Home and Small Businesses

Decimal IP address
Binary IP address and subnet mask
and subnet mask
172.16.203.56
255.255.248.0
c. Align the 32 bits of the subnet mask to the 32 bits of the IP address and compare them. The bits in
the IP address that align with the ones bits in the subnet mask represent the network number. What is
the binary and decimal network number for this IP address? Determine the binary address first
(include all 32 bits) and then convert it to decimal.
Binary network address: ____________________________________________________________
Decimal network address: ___________________________________________________________
d. How many ones bits are in the subnet mask? ____________________________________________
e. How many bits are left for host bits? ___________________________________________________
f. How many hosts can be created with the bits left? ________________________________________

Step 9: Reflection
a. List one other thing for which you might use the Windows Calculator scientific mode. It does not have
to be related to networking.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 6
Activity 6.7.3: IPv4 Address Subnetting Part 1

Learning Objectives
Upon completion of this activity, you will be able to determine network information for a given IP address
and network mask.

Background
This activity is designed to teach how to compute network IP address information from a given IP
address.

Scenario
When given an IP address and network mask, you will be able to determine other information about the
IP address such as:
• Network address
• Network broadcast address
• Total number of host bits
• Number of hosts

Task 1: For a given IP address, Determine Network Information.


Given:

Host IP Address 172.25.114.250


Network Mask 255.255.0.0 (/16)

Find:
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

Step 1: Translate Host IP address and network mask into binary notation.
Convert the host IP address and network mask to binary:

172 25 114 250


IP Address 10101100 11001000 01110010 11111010
Network Mask 11111111 11111111 00000000 00000000
255 255 0 0

Step 2: Determine the network address.


1. Draw a line under the mask.
2. Perform a bit-wise AND operation on the IP address and the subnet mask.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 4
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.3: IPv4 Address Subnetting Part 1

Note: 1 AND 1 results in a 1; 0 AND anything results in a 0.


3. Express the result in dotted decimal notation.
4. The result is the network address for this host IP address, which is 172.25.0.0.

172 25 114 250


IP Address 10101100 11001000 01110010 11111010
Subnet Mask 11111111 11111111 00000000 00000000
Network Address 10101100 11001000 00000000 00000000
172 25 0 0

Step 3: Determine the broadcast address for the network address


The network mask separates the network portion of the address from the host portion. The network
address has all 0s in the host portion of the address and the broadcast address has all 1s in the host
portion of the address.

172 25 0 0
Network Add. 10101100 11001000 00000000 00000000
Mask 11111111 11111111 00000000 00000000
Broadcast. 10101100 11001000 11111111 11111111
172 25 255 255

By counting the number of host bits, we can determine the total number of usable hosts for this network.
Host bits: 16
Total number of hosts:
16
2 = 65,536
65,536 – 2 = 65,534 (addresses that cannot use the all 0s address, network address, or the all 1s
address, broadcast address.)
Add this information to the table:

Host IP Address 172.25.114.250


Network Mask 255.255.0.0 (/16)
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 4
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.3: IPv4 Address Subnetting Part 1

Task 2: Challenge

For all problems:


Create a Subnetting Worksheet to show and record all work for each problem.

Problem 1

Host IP Address 172.30.1.33


Network Mask 255.255.0.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

Problem 2
Host IP Address 172.30.1.33
Network Mask 255.255.255.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

Problem 3
Host IP Address 192.168.10.234
Network Mask 255.255.255.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

Problem 4
Host IP Address 172.17.99.71
Network Mask 255.255.0.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 4
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.3: IPv4 Address Subnetting Part 1

Problem 5
Host IP Address 192.168.3.219
Network Mask 255.255.0.0
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

Problem 6
Host IP Address 192.168.3.219
Network Mask 255.255.255.224
Network Address
Network Broadcast Address
Total Number of Host Bits
Number of Hosts

Task 3: Clean Up
Remove anything that was brought into the lab, and leave the room ready for the next class.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 4
Activity 6.7.4: IPv4 Address Subnetting Part 2

Learning Objectives
Upon completion of this activity, you will be able to determine subnet information for a given IP address
and subnetwork mask.

Background
Borrowing Bits
How many bits must be borrowed to create a certain number of subnets or a certain number of hosts per
subnet?
Using this chart, it is easy to determine the number of bits that must be borrowed.
Things to remember:
• Subtract 2 for the usable number of hosts per subnet, one for the subnet address and one for the
broadcast address of the subnet.

210 29 28 27 26 25 24 23 22 21 20
1,024 512 256 128 64 32 16 8 4 2 1
Number of bits borrowed:
10 9 8 7 6 5 4 3 2 1 1
1,024 512 256 128 64 32 16 8 4 2 1
Hosts or Subnets

Possible Subnet Mask Values


Because subnet masks must be contiguous 1’s followed by contiguous 0’s, the converted dotted decimal
notation can contain one of a certain number of values:

Dec. Binary
255 11111111
254 11111110
252 11111100
248 11111000
240 11110000
224 11100000
192 11000000
128 10000000
0 00000000

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2

Scenario
When given an IP address, network mask, and subnetwork mask, you will be able to determine other
information about the IP address such as:
• The subnet address of this subnet
• The broadcast address of this subnet
• The range of host addresses for this subnet
• The maximum number of subnets for this subnet mask
• The number of hosts for each subnet
• The number of subnet bits
• The number of this subnet

Task 1: For a Given IP Address and Subnet Mask, Determine Subnet Information.
Given:

Host IP Address 172.25.114.250


Network Mask 255.255.0.0 (/16)
Subnet Mask 255.255.255.192 (/26)

Find:

Number of Subnet Bits


Number of Subnets
Number of Host Bits per Subnet
Number of Usable Hosts per Subnet
Subnet Address for this IP Address
IP Address of First Host on this Subnet
IP Address of Last Host on this Subnet
Broadcast Address for this Subnet

Step 1: Translate host IP address and subnet mask into binary notation.

172 25 114 250


IP Address 10101100 00011001 01110010 11111010
11111111 11111111 11111111 11000000
Subnet Mask 255 255 255 192

Step 2: Determine the network (or subnet) where this host address belongs.
1. Draw a line under the mask.
2. Perform a bit-wise AND operation on the IP Address and the Subnet Mask.
Note: 1 AND 1 results in a 1’ 0 AND anything results in a 0.
3. Express the result in dotted decimal notation.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2

4. The result is the Subnet Address of this Subnet, which is 172.25.114.192

172 25 114 250


IP Address 10101100 00011001 01110010 11111010
Subnet Mask 11111111 11111111 11111111 11000000
Subnet Address 10101100 00011001 01110010 11000000
172 25 114 192

Add this information to the table:

Subnet Address for this IP Address 172.25.114.192

Step 3: Determine which bits in the address contain network information and which contain host
information.
1. Draw the Major Divide (M.D.) as a wavy line where the 1s in the major network mask end (also
the mask if there was no subnetting). In our example, the major network mask is 255.255.0.0, or
the first 16 left-most bits.
2. Draw the Subnet Divide (S.D.) as a straight line where the 1s in the given subnet mask end. The
network information ends where the 1s in the mask end.

3. The result is the Number of Subnet Bits, which can be determined by simply counting the number
of bits between the M.D. and S.D., which in this case is 10 bits.

Step 4: Determine the bit ranges for subnets and hosts.


1. Label the subnet counting range between the M.D. and the S.D. This range contains the bits that
are being incremented to create the subnet numbers or addresses.
2. Label the host counting range between the S.D. and the last bits at the end on the right. This
range contains the bits that are being incremented to create the host numbers or addresses.

Step 5: Determine the range of host addresses available on this subnet and the broadcast address
on this subnet.
1. Copy down all of the network/subnet bits of the network address (that is, all bits before the S.D.).
2. In the host portion (to the right of the S.D.), make the host bits all 0s except for the right-most bit
(or least significant bit), which you make a 1. This gives us the first host IP address on this

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2

subnet, which is the first part of the result for Range of Host Addresses for This Subnet, which in
the example is 172.25.114.193.
3. Next, in the host portion (to the right of the S.D.), make the host bits all 1s except for the right-
most bit (or least significant bit), which you make a 0. This gives us the last host IP address on
this subnet, which is the last part of the result for Range of Host Addresses for This Subnet,
which in the example is 172.25.114.254.
4. In the host portion (to the right of the S.D.), make the host bits all 1s. This gives us the broadcast
IP address on this subnet. This is the result for Broadcast Address of This Subnet, which in the
example is 172.25.114.255.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2

Let’s add some of this information to our table:

Host IP Address 172.25.114.250


Major Network Mask 255.255.0.0 (/16)
Major (Base) Network Address 172.25.0.0
Major Network Broadcast Address 172.25.255.255
Total Number of Host Bits 16 bits or 216 or 65,536 total hosts
Number of Hosts 65,536 – 2 = 65,534 usable hosts
Subnet Mask 255.255.255.192 (/26)
Number of Subnet Bits
Number of Subnets

Number of Host Bits per Subnet


Number of Usable Hosts per Subnet
Subnet Address for this IP Address
IP Address of First Host on this Subnet
IP Address of Last Host on this Subnet
Broadcast Address for this Subnet

Step 6: Determine the number of subnets.


The number of subnets is determined by how many bits are in the subnet counting range (in this example,
10 bits).
Use the formula 2n, where n is the number of bits in the subnet counting range.
1. 210 = 1024

Number of Subnet Bits 10 bits


Number of Subnets 210 = 1024 subnets
(all 0s used, all 1s not used)

Step 7: Determine the number usable hosts per subnet.


The number of hosts per subnet is determined by the number of host bits (in this example, 6 bits) minus 2
(1 for the subnet address and 1 for the broadcast address of the subnet).
26 – 2 = 64 – 2 = 62 hosts per subnet
Number of Host Bits per Subnet 6 bits
Number of Usable Hosts per Subnet 26 – 2 = 64 – 2 = 62 hosts per subnet

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2

Step 8: Final Answers


Host IP Address 172.25.114.250
Subnet Mask 255.255.255.192 (/26)
Number of Subnet Bits 10 bits
Number of Subnets 210 = 1024 subnets

Number of Host Bits per Subnet 6 bits


Number of Usable Hosts per Subnet 26 – 2 = 64 – 2 = 62 hosts per subnet
Subnet Address for this IP Address 172.25.114.192
IP Address of First Host on this Subnet 172.25.114.193
IP Address of Last Host on this Subnet 172.25.114.254
Broadcast Address for this Subnet 172.25.114.255

Task 2: Challenge.

For all problems:


Create a Subnetting Worksheet to show and record all work for each problem.

Problem 1
Host IP Address 172.30.1.33
Subnet Mask 255.255.255.0
Number of Subnet Bits
Number of Subnets

Number of Host Bits per Subnet


Number of Usable Hosts per Subnet
Subnet Address for this IP Address
IP Address of First Host on this Subnet
IP Address of Last Host on this Subnet
Broadcast Address for this Subnet

Problem 2
Host IP Address 172.30.1.33
Subnet Mask 255.255.255.252
Number of Subnet Bits
Number of Subnets

Number of Host Bits per Subnet


Number of Usable Hosts per Subnet
Subnet Address for this IP Address
IP Address of First Host on this Subnet
IP Address of Last Host on this Subnet
Broadcast Address for this Subnet

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2

Problem 3
Host IP Address 192.192.10.234
Subnet Mask 255.255.255.0
Number of Subnet Bits
Number of Subnets

Number of Host Bits per Subnet


Number of Usable Hosts per Subnet
Subnet Address for this IP Address
IP Address of First Host on this Subnet
IP Address of Last Host on this Subnet
Broadcast Address for this Subnet

Problem 4
Host IP Address 172.17.99.71
Subnet Mask 255.255.0.0
Number of Subnet Bits
Number of Subnets

Number of Host Bits per Subnet


Number of Usable Hosts per Subnet
Subnet Address for this IP Address
IP Address of First Host on this Subnet
IP Address of Last Host on this Subnet
Broadcast Address for this Subnet

Problem 5
Host IP Address 192.168.3.219
Subnet Mask 255.255.255.0
Number of Subnet Bits
Number of Subnets

Number of Host Bits per Subnet


Number of Usable Hosts per Subnet
Subnet Address for this IP Address
IP Address of First Host on this Subnet
IP Address of Last Host on this Subnet
Broadcast Address for this Subnet

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 8
CCNA Exploration
Network Fundamentals:
Addressing the Network - IPv4 Activity 6.7.4: IPv4 Address Subnetting Part 2

Problem 6
Host IP Address 192.168.3.219
Subnet Mask 255.255.255.252
Number of Subnet Bits
Number of Subnets

Number of Host Bits per Subnet


Number of Usable Hosts per Subnet
Subnet Address for this IP Address
IP Address of First Host on this Subnet
IP Address of Last Host on this Subnet
Broadcast Address for this Subnet

Task 3: Clean Up
Remove anything that was brought into the lab, and leave the room ready for the next class.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 8
Lab 6.7.5: Subnet and Router Configuration

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

Fa0/0 N/A
R1
S0/0/0 N/A
Fa0/0 N/A
R2
S0/0/0 N/A
PC1 NIC
PC2 NIC

Learning Objectives
Upon completion of this lab, you will be able to:
• Subnet an address space per given requirements.
• Assign appropriate addresses to interfaces and document.
• Configure and activate Serial and FastEthernet interfaces.
• Test and verify configurations.
• Reflect upon and document the network implementation.

Scenario
In this lab activity, you will design and apply an IP addressing scheme for the topology shown in the
Topology Diagram. You will be given one address block that you must subnet to provide a logical
addressing scheme for the network. The routers will then be ready for interface address configuration
according to your IP addressing scheme. When the configuration is complete, verify that the network is
working properly.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4 Lab 6.7.5: Subnet and Router Configuration

Task 1: Subnet the Address Space.

Step 1: Examine the network requirements.


You have been given the 192.168.1.0/24 address space to use in your network design. The network
consists of the following segments:
• The LAN connected to router R1 will require enough IP addresses to support 15 hosts.
• The LAN connected to router R2 will require enough IP addresses to support 30 hosts.
• The link between router R1 and router R2 will require IP addresses at each end of the link.

The plan should have equal size subnets and use the smallest subnet sizes that will accommodate the
appropriate number of hosts.

Step 2: Consider the following questions when creating your network design.
How many subnets are needed for this network? ____________________
What is the subnet mask for this network in dotted decimal format? ____________________

What is the subnet mask for the network in slash format? ____________________

How many usable hosts are there per subnet? ____________________

Step 3: Assign subnetwork addresses to the Topology Diagram.


1. Assign second subnet to the network attached to R1.
2. Assign third subnet to the link between R1 and R2.
3. Assign fourth subnet to the network attached to R2.

Task 2: Determine Interface Addresses.

Step 1: Assign appropriate addresses to the device interfaces.


1. Assign the first valid host address in second subnet to the LAN interface on R1.
2. Assign the last valid host address in second subnet to PC1.
3. Assign the first valid host address in third subnet to the WAN interface on R1.
4. Assign the last valid host address in third subnet to the WAN interface on R2.
5. Assign the first valid host address in fourth subnet to the LAN interface of R2.
6. Assign the last valid host address in fourth subnet to PC2.

Step 2: Document the addresses to be used in the table provided under the Topology Diagram.

Task 3: Configure the Serial and FastEthernet Addresses.

Step 1: Configure the router interfaces.


Configure the interfaces on the R1 and R2 routers with the IP addresses from your network design.
Please note, to complete the activity in Packet Tracer you will be using the Config Tab. When you have
finished, be sure to save the running configuration to the NVRAM of the router.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4 Lab 6.7.5: Subnet and Router Configuration

Step 2: Configure the PC interfaces.


Configure the Ethernet interfaces of PC1 and PC2 with the IP addresses and default gateways from your
network design.

Task 4: Verify the Configurations.


Answer the following questions to verify that the network is operating as expected.
From the host attached to R1, is it possible to ping the default gateway? __________
From the host attached to R2, is it possible to ping the default gateway? __________
From the router R1, is it possible to ping the Serial 0/0/0 interface of R2? __________
From the router R2, is it possible to ping the Serial 0/0/0 interface of R1? __________

Task 5: Reflection
Are there any devices on the network that cannot ping each other?
__________________________________________________________________________

__________________________________________________________________________

What is missing from the network that is preventing communication between these devices?
__________________________________________________________________________

__________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
Lab 5.5.1: Examining a Device’s Gateway

Topology Diagram

Addressing Table
Device Interface IP Address Subnet Mask Default Gateway

S0/0/0 10.10.10.6 255.255.255.252 N/A


R1-ISP
Fa0/0 192.168.254.253 255.255.255.0 N/A
S0/0/0 10.10.10.5 255.255.255.252 N/A
R2-Central
Fa0/0 172.16.255.254 255.255.0.0 N/A
N/A 192.168.254.254 255.255.255.0 192.168.254.253
Eagle Server
N/A 172.31.24.254 255.255.255.0 N/A
hostPod#A N/A 172.16.Pod#.1 255.255.0.0 172.16.255.254
hostPod#B N/A 172.16.Pod#.2 255.255.0.0 172.16.255.254
S1-Central N/A 172.16.254.1 255.255.0.0 172.16.255.254

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway

Learning Objectives
Upon completion of this lab, you will be able to:
Understand and explain the purpose of a gateway address.
Understand how network information is configured on a Windows computer.
Troubleshoot a hidden gateway address problem.

Background
An IP address is composed of a network portion and a host portion. A computer that communicates with
another device must first know how to reach the device. For devices on the same local area network
(LAN), the host portion of the IP address is used as the identifier. The network portion of the destination
device is the same as the network portion of the host device.
However, devices on different networks have different source and destination network numbers. The
network portion of the IP address is used to identify when a packet must be sent to a gateway address,
which is assigned to a network device that forwards packets between distant networks.
A router is assigned the gateway address for all the devices on the LAN. One purpose of a router is to
serve as an entry point for packets coming into the network and exit point for packets leaving the network.
Gateway addresses are very important to users. Cisco estimates that 80 percent of network traffic will be
destined to devices on other networks, and only 20 percent of network traffic will go to local devices. This
is called the 80/20 rule. Therefore, if a gateway cannot be reached by the LAN devices, users will not be
able to perform their job.

Scenario
Pod host computers must communicate with Eagle Server, but Eagle Server is located on a different
network. If the pod host computer gateway address is not configured properly, connectivity with Eagle
Server will fail.
Using several common utilities, network configuration on a pod host computer will be verified.

Task 1: Understand and Explain the Purpose of a Gateway Address.

Figure 1. Communication Between LAN Devices

For local area network (LAN) traffic, the gateway address is the address of the Ethernet interface
connected to the LAN. Figure 1 shows two devices on the same network communicating with the ping

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway

command. Any device that has the same network address—in this example, 172.16.0.0—is on the
same LAN.
Referring to Figure 1, what is the MAC address of the network device on IP address 172.16.1.1?
____________________________________________________________________________
There are several Windows commands that will display a network gateway address. One popular
command is netstat –r. In the following transcript, the netstat –r command is used to view the
gateway addresses for this computer. The top highlight shows what gateway address is used to forward
all network packets destined outside of the LAN. The ”quad-zero” Network Destination and Netmask
values, 0.0.0.0 and 0.0.0.0, refer to any network not specifically known. For any non-local network,
this computer will use 172.16.255.254 as the default gateway. The second yellow highlight displays
the information in human-readable form. More specific networks are reached through other gateway
addresses. A local interface, called the loopback interface, is automatically assigned to the 127.0.0.0
network. This interface is used to identify the local host to local network services. Refer to the gray
highlighted entry. Finally, any device on network 172.16.0.0 is accessed through gateway
172.16.1.2, the IP address for this Ethernet interface. This entry is highlighted in green.

C:\>netstat –r

Route Table
=======================================================================
Interface List
0x1 ......................... MS TCP Loopback interface
0x20005 ...00 16 76 ac a7 6a Intel(R) 82562V 10/100 Network Connection
=======================================================================
=======================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.16.255.254 172.16.1.2 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
172.16.0.0 255.255.0.0 172.16.1.2 172.16.1.2 20
172.16.1.2 255.255.255.255 127.0.0.1 127.0.0.1 20
172.16.255.255 255.255.255.255 172.16.1.2 172.16.1.2 20
255.255.255.255 255.255.255.255 172.16.1.2 172.16.1.2 1
Default Gateway: 172.16.255.254
=======================================================================
Persistent Routes:
None
C:\>

Step 1: Open a terminal window on a pod host computer.


What is the default gateway address?
____________________________________________________________________________

Step 2: Use the ping command to verify connectivity with IP address 127.0.0.1.
Was the ping successful? __________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway

Step 3: Use the ping command to ping different IP addresses on the 127.0.0.0 network,
127.10.1.1, and 127.255.255.255.
Were responses successful? If not, why?
____________________________________________________________________________

____________________________________________________________________________

A default gateway address permits a network device to communicate with other devices on different
networks. In essence, it is the door to other networks. All traffic destined to different networks must go
through the network device that has the default gateway address.

Figure 2. Communication Between Devices on Different Networks

As shown in Figure 2, communication between devices on different networks is different than on a LAN.
Pod host computer #2, IP address 172.16.1.2, initiates a ping to IP address 192.168.254.254.
Because network 172.16.0.0 is different from 192.168.254.0, the pod host computer requests the
MAC address of the default gateway device. This gateway device, a router, responds with its MAC
address. The computer composes the Layer 2 header with the destination MAC address of the router and
places frames on the wire to the gateway device.
Referring to Figure 2, what is the MAC address of the gateway device?
____________________________________________________________________________
Referring to Figure 2, what is the MAC address of the network device with IP address 192.168.254.254?
____________________________________________________________________________

Task 2: Understand how Network Information is Configured on a Windows Computer.


Many times connectivity issues are attributed to wrong network settings. In troubleshooting connectivity
issues, several tools are available to quickly determine the network configuration for any Windows
computer.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway

Figure 3. Network Interface with Static IP Address

Step 1: Examine network properties settings.


One method that may be useful in determining the network interface IP properties is to examine the pod
host computer’s Network Properties settings. To access this window:
1. Click Start > Control Panel > Network Connections.
2. Right-click Local Area Connection, and choose Properties.
3. On the General tab, scroll down the list of items in the pane, select Internet Protocol (TCP/IP),
and click the Properties button. A window similar to the one in Figure 3 will be displayed.

Figure 4. Network Interface with Dynamic IP Address

However, a dynamic IP address may be configured, as shown in Figure 4. In this case, the Network
Properties settings window is not very useful for determining IP address information.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway

A more consistently reliable method for determining network settings on a Windows computer is to use
the ipconfig command:

 IP address for this pod host computer


 Subnet mask
 Default gateway address
There are several options available with the ipconfig command, accessible with the command
ipconfig /?. To show the most information about the network connections, use the command
ipconfig /all.

 Domain name server IP address

Step 2: Using the command ipconfig /all, fill in the following table with information from your
pod host computer:

Description Address
IP Address
Subnet Mask
Default Gateway
DNS Server

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway

Task 3: Troubleshoot a Hidden Gateway Address Problem.

Figure 5. Topology Diagram

Device Interface IP Address Subnet Mask Default Gateway

S0/0/0 10.10.10.6 255.255.255.252 N/A


R1-ISP
Fa0/0 192.168.254.253 255.255.255.0 N/A
S0/0/0 10.10.10.5 255.255.255.252 N/A
R2-Central
Fa0/0 172.16.255.254 255.255.0.0 N/A
N/A 192.168.254.254 255.255.255.0 192.168.254.253
Eagle Server
N/A 172.31.24.254 255.255.255.0 N/A
hostPod#A N/A 172.16.Pod#.1 255.255.0.0 172.16.255.254
hostPod#B N/A 172.16.Pod#.2 255.255.0.0 172.16.255.254
S1-Central N/A 172.16.254.1 255.255.0.0 172.16.255.254

Table 1. Logical Address Assignments

When troubleshooting network issues, a thorough understanding of the network can often assist in
identifying the real problem. Refer to the network topology in Figure 5 and the logical IP address
assignments in Table 1.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 8
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.1: Examining a Device’s Gateway

As the 3rd shift help desk Cisco engineer, you are asked for assistance from the help desk technician.
The technician received a trouble ticket from a user on computer host-1A, complaining that computer
host-11B, host-11B.example.com, does not respond to pings. The technician verified the cables and
network settings on both computers, but nothing unusual was found. You check with the corporate
network engineer, who reports that R2-Central has been temporarily brought down for a hardware
upgrade.
Nodding your head in understanding, you ask the technician to ping the IP address for host-11B,
172.16.11.2 from host-1A. The pings are successful. Then, you ask the technician to ping the gateway
IP address, 172.16.255.254, and the pings fail.
What is wrong?
____________________________________________________________________________

____________________________________________________________________________
You instruct the help desk technician to tell the user to use the IP address for host-11B temporarily, and
the user is able to establish connectivity with the computer. Within the hour the gateway router is back on
line, and normal network operation resumes.

Task 4: Reflection
A gateway address is critical to network connectivity, and in some instances LAN devices require a
default gateway to communicate with other devices on the LAN.
Using Windows command line utilities such as netstat –r and ipconfig /all will report gateway
settings on host computers.

Task 5: Challenge
Use Wireshark to capture a ping between two pod host computers. It may be necessary to restart the
host computer to flush the DNS cache. First, use the hostname of the destination pod computer for DNS
to reply with the destination IP address. Observe the communication sequence between network devices,
especially the gateway. Next, capture a ping between network devices using only IP addresses. The
gateway address should not be needed.

Task 6: Clean Up.


Unless directed otherwise by the instructor, turn off power to the host computers. Remove anything that
was brought into the lab, and leave the room ready for the next class.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 8
Lab 5.5.2: Examining a Route

Topology Diagram

Addressing Table
Device Interface IP Address Subnet Mask Default Gateway

S0/0/0 10.10.10.6 255.255.255.252 N/A


R1-ISP
Fa0/0 192.168.254.253 255.255.255.0 N/A
S0/0/0 10.10.10.5 255.255.255.252 N/A
R2-Central
Fa0/0 172.16.255.254 255.255.0.0 N/A
N/A 192.168.254.254 255.255.255.0 192.168.254.253
Eagle Server
N/A 172.31.24.254 255.255.255.0 N/A
hostPod#A N/A 172.16.Pod#.1 255.255.0.0 172.16.255.254
hostPod#B N/A 172.16.Pod#.2 255.255.0.0 172.16.255.254
S1-Central N/A 172.16.254.1 255.255.0.0 172.16.255.254

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route

Learning Objectives
Upon completion of this lab, you will be able to:
Use the route command to modify a Windows computer routing table.
Use a Windows Telnet client command telnet to connect to a Cisco router.
Examine router routes using basic Cisco IOS commands.

Background
For packets to travel across a network, a device must know the route to the destination network. This lab
will compare how routes are used in Windows computers and the Cisco router.
Some routes are added to routing tables automatically, based upon configuration information on the
network interface. The device considers a network directly connected when it has an IP address and
network mask configured, and the network route is automatically entered into the routing table. For
networks that are not directly connected, a default gateway IP address is configured that will send traffic
to a device that should know about the network.

Scenario
Using a pod host computer, examine the routing table with the route command and identify the different
routes and gateway IP address for the route. Delete the default gateway route, test the connection, and
then add the default gateway route back to the host table.
Use a pod host computer to telnet into R2-Central, and examine the routing table.

Task 1: Use the route Command to Modify a Windows Computer Routing Table.

C:\>netstat –r

Route Table
=======================================================================
Interface List
0x1 ......................... MS TCP Loopback interface
0x20005 ...00 16 76 ac a7 6a Intel(R) 82562V 10/100 Network Connection
=======================================================================
=======================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.16.255.254 172.16.1.2 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
172.16.0.0 255.255.0.0 172.16.1.2 172.16.1.2 20
172.16.1.2 255.255.255.255 127.0.0.1 127.0.0.1 20
172.16.255.255 255.255.255.255 172.16.1.2 172.16.1.2 20
255.255.255.255 255.255.255.255 172.16.1.2 172.16.1.2 1
Default Gateway: 172.16.255.254
=======================================================================
Persistent Routes:
None
C:\>
Figure 1. Output of the netstat Command

Shown in Figure 1, output from the netstat –r command is useful to determine route and gateway
information.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route

Step 1: Examine the active routes on a Windows computer.


A useful command to modify the routing table is the route command. Unlike the netstat –r
command, the route command can be used to view, add, delete, or change routing table entries. To
view detailed information about the route command, use the option route /?.
An abbreviated option list for the route command is shown below:
route PRINT Prints active routes
route ADD Adds a route:
route ADD network MASK mask gateway
route DELETE Deletes a route:
route DELETE network
route CHANGE Modifies an existing route

To view active routes, issue the command route PRINT:

C:\ >route PRINT


=======================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x70003 ...00 16 76 ac a7 6a .Intel(R) 82562V 10/100 Network Connection
=======================================================================
=======================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.16.255.254 172.16.1.2 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
172.16.0.0 255.255.0.0 172.16.1.2 172.16.1.2 20
172.16.1.2 255.255.255.255 127.0.0.1 127.0.0.1 20
172.16.255.255 255.255.255.255 172.16.1.2 172.16.1.2 20
255.255.255.255 255.255.255.255 172.16.1.2 172.16.1.2 1
Default Gateway: 172.16.255.254
=======================================================================
Persistent Routes:
None
C:\>

Verify network connectivity to Eagle Server:


C:\> ping eagle-server.example.com
Pinging eagle-server.example.com [192.168.254.254] with 32 bytes
of data:

Reply from 192.168.254.254: bytes=32 time<1ms TTL=63


Reply from 192.168.254.254: bytes=32 time<1ms TTL=63
Reply from 192.168.254.254: bytes=32 time<1ms TTL=63
Reply from 192.168.254.254: bytes=32 time<1ms TTL=63

Ping statistics for 192.168.254.254:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
C:\>

What is the gateway address to eagle-server.example.com?


____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route

Step 2: Delete a route from the Windows computer routing table.


How important is the default gateway route? Delete the gateway route, and try to ping Eagle Server. The
syntax to remove the default gateway route is:
route DELETE network

C:/> route DELETE 0.0.0.0

Examine the active routing table and verify that the default gateway route has been removed:
What is the default gateway IP address?
____________________________________________________________________________

Try to ping Eagle Server. What are the results?


____________________________________________________________________________

If the default gateway IP address is removed, how can the DNS server be reached to resolve eagle-
server.example.com?
Can other LAN devices be reached, such as 172.16.255.254?
____________________________________________________________________________

Step 3: Insert a route into the Windows computer routing table.


In the following configuration, use the IP address assigned to your host pod interface. The syntax to add a
route to the Windows computer routing table is:
route ADD network MASK mask gateway-IP address

C:/> route ADD 0.0.0.0 MASK 0.0.0.0 172.16.255.254

Examine the active routing table, and verify that the default gateway route has been restored:
Has the default gateway route been restored? __________:

Try to ping Eagle Server. What are the results?


____________________________________________________________________________

Task 2: Use a Windows Telnet Client Command telnet to Connect to a Cisco Router.
In this task, you will telnet into the R2-Central router and use common IOS commands to examine the
router routing table. Cisco devices have a Telnet server and, if properly configured, will permit remote
logins. Access to the router is restricted, however, and requires a username and password. The
password for all usernames is cisco. The username depends on the pod. Username ccna1 is for users
on pod 1 computer, ccna2 is for students on pod 2 computers, and so on.

Step 1: Using the Windows Telnet client, log in to a Cisco router.


Open a terminal window by clicking Start > Run. Type cmd, and click OK. A terminal window and prompt
should be available. The Telnet utility has several options and can be viewed with the telnet /?
command. A username and password will be required to log in to the router. For all usernames, the
corresponding password is cisco.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route

Pod Number Username


1 ccna1
2 ccna2
3 ccna3
4 ccna4
5 ccna5
6 ccna6
7 ccna7
8 ccna8
9 Ccna9
10 ccna10
11 ccna11

To start a Telnet session with router R2-central, type the command:


C:/> telnet 172.16.255.254 <ENTER>

A login window will prompt for a username, as shown below. Enter the applicable username, and press
<ENTER>. Enter the password, cisco, and press <ENTER>. The router prompt should be visible after a
successful login.

*****************************************************************
This is Eagle 1 lab router R2-Central.
Authorized access only.
*****************************************************************

User Access Verification

Username: ccna1
Password: cisco (hidden)
R2-Central#

At the prompt, R2-Central#, a successful Telnet login has been created. Only limited permissions for
ccnax usernames are available; therefore, it is not possible to modify router settings or view the
configuration. The purpose of this task was to establish a Telnet session, which has been accomplished.
In the next task, the router routing table will be examined.

Task 3: Examine Router Routes using Basic Cisco IOS Commands.


As with any network device, gateway addresses instruct the device about how to reach other networks
when no other information is available. Similar to the host computer default gateway IP address, a router
may also employ a default gateway. Also similar to a host computer, a router is knowledgeable about
directly connected networks.
This task will not examine Cisco IOS commands in detail but will use a common IOS command to view
the routing table. The syntax to view the routing table is:

show ip route <ENTER>

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route

Step 1: Enter the command to display the router routing table.


The route information displayed is much more detailed than the route information on a host computer.
This is to be expected, because the job of a router is to route traffic between networks. The information
required of this task, however, is not difficult to glean. Figure 2 shows the routing table for R2-Central.

Figure 2. Output of the Cisco IOS show ip route Command

The Codes section shown in Figure 3 provides an explanation for the symbols to the left of each route
entry.

Figure 3. Explanation of Codes

 C denotes directly connected networks and the interface that supports the connection.
 S denotes a static route, which is manually entered by the Cisco network engineer.
 Because the route is ”quad-zero,” it is a candidate default route.
 If there is no other route in the routing table, use this gateway of last resort IP
address to forward packets.

How is IP mask information displayed in a router routing table?


____________________________________________________________________________

____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 7
CCNA Exploration
Network Fundamentals: OSI Network Layer Lab 5.5.2: Examining a Route

What would the router do with packets destined to 192.168.254.254?


____________________________________________________________________________

____________________________________________________________________________

When finished examining the routing table, exit the router with the command exit <ENTER>. The
telnet client will also close the connection with the telnet escape sequence <CTRL> ] and quit. Close
the terminal window.

Task 4: Reflection
Two new Windows commands were used in this lab. The route command was used to view, delete, and
add route information on the pod host computer.
The Windows Telnet client, telnet, was used to connect to a lab router, R2-Central. This technique will
be used in other labs to connect to Cisco network devices.
The router routing table was examined with the Cisco IOS command show ip route. Routes for
directly connected networks, statically assigned routes, and gateway of last resort information are
displayed.

Task 5: Challenge
Other Cisco IOS commands can be used to view IP address information on a router. Similar to the
Windows ipconfig command, the Cisco IOS command show ip interface brief will display IP
address assignments.

R2-Central#show ip interface brief


Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 172.16.255.254 YES manual up up
FastEthernet0/1 unassigned YES unset administratively down down
Serial0/2/0 10.10.10.5 YES manual up up
Serial0/2/1 unassigned YES unset administratively down down
R2-Central#

Using Windows commands and the Cisco IOS commands in this lab, compare network information
output. What was missing? What critical network information was similar?
____________________________________________________________________________

____________________________________________________________________________

Task 6: Clean Up.


Unless directed otherwise by the instructor, turn off power to the host computers. Remove anything that
was brought into the lab, and leave the room ready for the next class.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 7
CCNA Discovery
Networking for Home and Small Businesses

Lab 6.2.1 Observing DNS Name Resolution


Objectives
• Observe the conversion of a URL to an IP address.
• Observe DNS lookup using the nslookup command.

Background / Preparation
Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as
http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is being used.
Common ones are HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer Protocol over Secure
Socket Layer), and FTP (File Transfer Protocol).
DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain
name (like www.cisco.com) to an IP address in order to allow the source host to reach the destination host.
Work in pairs to complete this lab.
The following resources are required:
• Windows-based computer with Internet connectivity
• Access to the Run command

Step 1: Observe DNS conversion


a. Click the Start button, select Run, type cmd, and then click OK. The command prompt window
appears.
b. At the command prompt, type ping www.cisco.com. The computer needs to translate
www.cisco.com into an IP address so it knows where to send the Internet Control Message Protocol
(ICMP) packets. Ping is a type of ICMP packet.
c. The first line of the output shows www.cisco.com converted to an IP address by DNS. You should be
able to see the effect of DNS even if your school has a firewall that prevents pinging, or if Cisco has
prevented people from pinging their web server.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3
CCNA Discovery
Networking for Home and Small Businesses

d. Which IP address is shown on the screen? _________________________________________


e. Is it the same as the one shown in the figure? _________ Why do you think this occurred?
____________________________________________________________________________
f. Work together with another student and discuss one or two other instances (besides the ping
command) in which the computer would use DNS.
____________________________________________________________________________

Step 2: Verify DNS operation using the nslookup command


a. At the command prompt, type the nslookup command.
b. What is the default DNS server being used? _________________________________________
c. Notice how the command prompt changed. This is the NSLOOKUP prompt. From this prompt, you
can enter commands related to DNS.
d. At the prompt, type ? to see a list of all the available commands that you can use in NSLOOKUP
mode.
e. Write three commands that you can use with NSLOOKUP. _____________________________
____________________________________________________________________________
____________________________________________________________________________
f. At the NSLOOKUP prompt, type www.cisco.com.
g. What is the translated IP address? ________________________________________________
h. Is it the same as the IP address shown with the ping command? _________________________
i. At the prompt, type the IP address of the Cisco web server that you just found. You can use
NSLOOKUP to get the domain name of an IP address if you do not know the URL.
Using the previous procedures, find an IP address associated with www.google.com.
____________________________________________________________________________

Step 3: Identify mail servers using the nslookup command


a. At the prompt, type set type=mx to have NSLOOKUP identify mail servers.
b. At the prompt, type www.cisco.com.
c. What is the primary name server, the responsible mail address, and the default Time to Live (TTL)?
____________________________________________________________________________
____________________________________________________________________________
d. At the prompt, type exit to return to the regular command prompt.
e. At the prompt, type ipconfig /all.
f. Write the IP addresses of all the DNS servers that your school uses.
____________________________________________________________________________
g. Type exit to close the command prompt window.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 3
CCNA Discovery
Networking for Home and Small Businesses

Step 4: Reflection
a. If your school did not have a DNS server, what effect would this have on your use of the Internet?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
b. Some companies do not dedicate a single server for DNS. Instead, the DNS server provides other
functions as well. Which functions do you think might be included on a DNS server? Use the ipconfig
/all command to help you with this.
____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 3
CCNA Discovery
Networking for Home and Small Businesses

Lab 6.2.3 Exploring FTP


Objective
• Demonstrate how to use FTP from the command prompt and GUI.

Background / Preparation
File Transfer Protocol (FTP) is part of the TCP/IP suite. FTP is used to transfer files from one network device
to another network device. Windows includes an FTP application that you can execute from the command
prompt. There are also many free GUI versions of FTP that you can download. The GUI versions are easier
to use than typing from a command prompt.
When using FTP, one computer is normally the server and the other computer is the client. When accessing
the server from the client, you need to provide a username and password. Some FTP servers have a userID
named anonymous. You can access these types of sites by simply typing “anonymous” for the userID, without
a password. Usually, the site administrator has files that can be copied but does not allow files to be posted
with the anonymous userID.
If your class does not have an FTP server available, you can download and install a freeware version, such
as Home FTP Server or Cerberus FTP server. The FTP Server on a computer running the CCNA Discovery
Live CD may also be used. Another computer will act as the FTP client by using FTP from the command line,
a web browser, or download a freeware version of an FTP client, such as SmartFTP Client or Core FTP LE
client. Work in teams of two to complete this lab.
The following resources are required:
• Windows-based computer with an FTP client
• FTP server (Existing FTP server, downloaded freeware, or use Live CD)

Step 1: Examine FTP from the command prompt


a. Click the Start button, select Run, type cmd on the command line, and then click OK.
b. At the prompt, type ftp to start the FTP application. The prompt changes.

c. From the ftp prompt, type ? to see a list of the commands that can be used in this mode.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
CCNA Discovery
Networking for Home and Small Businesses

d. List three FTP commands. _______________________________________________________


e. At the prompt, type help put to see a short description of the put command.
f. What is the purpose of the put command? ___________________________________________
g. Use the help command again to get the purpose of the get, send, and recv commands.
get __________________________________________________________________________
send _________________________________________________________________________
recv _________________________________________________________________________
NOTE: The original FTP commands were PUT to send a file to an FTP server and GET to download
a file from the FTP server. You also had to select ASCII or binary file mode. If you download
a binary file in ASCII mode it could end up being corrupted. Some of the newer graphical
programs now use send and receive in their place.
h. Partner with another student. Using procedures demonstrated in previous labs, write down the names
and IP addresses of each partner computer. It is very important to get these names correct. Some
FTP applications allow you to use either the IP address or the computer name.
Computer 1: __________________________________________________________________
Computer 2: __________________________________________________________________

Step 2: Use a GUI FTP client or web browser


a. If you are using a web browser as the FTP client, open the web browser and type
ftp://ip_address_of_FTP_server. If the FTP server is configured to use an anonymous userID,
connect directly to the FTP server. Using the FTP client, download an available file from the server.
b. If you are using a GUI FTP client, open the application. For most FTP clients, you must configure a
new connection by giving it a name, the IP address of the FTP server, and a username and
password. You may have to type anonymous if the FTP server allows this type of connection. Some
applications have a checkbox that allows an anonymous login. When you have configured the
connection, connect to the FTP server and download a file.
c. What is the name of the file you downloaded from the FTP server? ______________________
d. List one example of when FTP might be beneficial to a computer technician. _______________
____________________________________________________________________________
____________________________________________________________________________

Step 3: (Optional) Use both an FTP server and client


a. If you control both the FTP server and client, practice sending files to and getting files from the client
and the server.
b. Show your transferred files to another group of students.
c. Close the FTP server and client applications.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 2
Lab 10.3.2: How Many Networks?

Learning Objectives
Upon completion of this lab, you will be able to:
• Determine the number of subnets.
• Design an appropriate addressing scheme.
• Assign addresses and subnet mask pairs to device interfaces.
• Examine the use of the available network address space.

Scenario
In this lab, you have been given the network address 192.168.26.0/24 to subnet and provide the
IP addressing for the networks shown in the Topology Diagrams. You must determine the number
of networks needed then design an appropriate addressing scheme. Place the correct address
and mask in the Addressing Table. In this example, the number of hosts is not important. You are
only required to determine the number of subnets per topology example.

Topology Diagram A

Task 1: Determine the Number of Subnets in the Topology Diagram.

Step 1: How many networks are there? ____


Step 2: How many bits should you borrow to create the required number of subnets? ____
Step 3: How many usable host addresses and usable subnets did this give you? ____
Step 4: What is the new subnet mask in decimal form? _____________________________
Step 5: How many subnets are available for future use? ____

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?

Task 2: Record Subnet Information.


Step 1: Fill in the following chart with the subnet information.
Subnet First Usable Last Usable Broadcast
Subnet Address
Number Host Address Host Address Address
0
1
2
3
4
5
6
7

Topology Diagram B

Fa0/0 Fa0/0

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?

Task 1: Determine the Number of Subnets in the Topology Diagram.

Step 1: How many networks are there? ____


Step 2: How many bits should you borrow to create the required number of subnets? ____
Step 3: How many usable host addresses and usable subnets did this give you? ____
Step 4: What is the new subnet mask in decimal form? _____________________________
Step 5: How many subnets are available for future use? ____

Task 2: Record Subnet Information.


Step 1: Fill in the following chart with the subnet information.
Subnet First Usable Last Usable Broadcast
Subnet Address
Number Host Address Host Address Address
0
1
2
3
4
5
6
7

Topology Diagram C

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?

Task 1: Determine the Number of Subnets in the Topology Diagram.

Step 1: How many networks are there? ____


Step 2: How many bits should you borrow to create the required number of subnets? ____
Step 3: How many usable host addresses and usable subnets did this give you? ____
Step 4: What is the new subnet mask in decimal form? _____________________________
Step 5: How many subnets are available for future use? ____

Task 2: Record Subnet Information.


Step 1: Fill in the following chart with the subnet information.

Subnet First Usable Last Usable Broadcast


Subnet Address
Number Host Address Host Address Address
0
1
2
3
4
5
6
7
8
9
10

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?

Topology Diagram D

Fa1/0

Task 1: Determine the Number of Subnets in the Topology Diagram.

Step 1: How many networks are there? ____


Step 2: How many bits should you borrow to create the required number of subnets? ____
Step 3: How many usable host addresses and usable subnets did this give you? ____
Step 4: What is the new subnet mask in decimal form? _____________________________
Step 5: How many subnets are available for future use? ____

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 6
CCNA Exploration
Network Fundamentals: Planning and Cabling Networks Lab 10.3.2 How Many Networks?

Task 2: Record Subnet Information.


Step 1: Fill in the following chart with the subnet information.

Subnet First Usable Last Usable Broadcast


Subnet Address
Number Host Address Host Address Address
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

Reflection
What information is needed when determining an appropriate addressing scheme for a network?
_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 6
Lab 11.5.1: Basic Cisco Device Configuration

Topology Diagram

Learning Objectives

• Configure Cisco router global configuration settings.


• Configure Cisco router password access.
• Configure Cisco router interfaces.
• Save the router configuration file.
• Configure a Cisco switch.

Background
Hardware Qty Description
Cisco Router 1
Part of CCNA Lab bundle.
Cisco Switch 1
Part of CCNA Lab bundle.
*Computer (host) 1
Lab computer.
Console (rollover) cable 1
Connects computer host 1 to Router
console port.
UTP Cat 5 crossover cable 1 Connects computer host 1 to Router
LAN interface Fa0/0
Straight Through Cable 3 Connects computer hosts to Switch
and switch to router
Table 1. Equipment and hardware required for this lab.

Gather the necessary equipment and cables. To configure the lab, make sure the equipment listed in
Table 1 is available.

Common configuration tasks include setting the hostname, access passwords, and MOTD banner.

Interface configuration is extremely important. In addition to assigning a Layer 3 IP address, enter a


description that describes the destination connection speeds troubleshooting time.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Configuration changes are effective immediately.

Configuration changes must be saved in NVRAM to be persistent across reboot.

Configuration changes may also be saved off-line in a text file for auditing or device replacement.

Cisco IOS switch configuration is similar to Cisco IOS router configuration.

Scenario
In this lab students will configure common settings on a Cisco Router and Cisco Switch.

Given an IP address of 198.133.219.0/24, with 4 bits borrowed for subnets, fill in the following
information in the table below.
(Hint: fill in the subnet number, then the host address. Address information will be easy to compute with
the subnet number filled in first)
th
Maximum number of usable subnets (including the 0 subnet): _______________

Number of usable hosts per subnet: ___________________

IP Address: Subnet mask:


# Subnet First host address Last host Broadcast
address
0

Before proceeding, verify your addresses with the instructor. The instructor will assign subnetworks.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Task 1: Configure Cisco Router Global Configuration Settings.

Figure 1. Lab cabling.

Step 1: Physically connect devices.


Refer to Figure 1. Connect the console or rollover cable to the console port on the router. Connect the
other end of the cable to the host computer using a DB-9 or DB-25 adapter to the COM 1 port. Connect
the crossover cable between the host computer’s network interface card (NIC) and Router interface
Fa0/0. Connect a straight-through cable between the Router interface Fa0/1 and any of the switch’s
interfaces (1-24).

Ensure that power has been applied to the host computer, switch and router.

Step 2: Connect host computer to router through HyperTerminal.


From the Widows taskbar, start the HyperTerminal program by clicking on Start | Programs | Accessories
| Communications | HyperTerminal.

Configure HyperTerminal with the proper settings:

Connection Description
Name: Lab 11_2_11
Icon: Personal choice

Connect to
Connect Using: COM1 (or appropriate COM port)

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

COM1 Properties
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow Control: None

When the HyperTerminal session window comes up, press the Enter key until there is a response from
the router.

If the router terminal is in the configuration mode, exit by typing NO.

Would you like to enter the initial configuration dialog? [yes/no]: no

Press RETURN to get started!


Router>

When in privileged exec command mode, any misspelled or unrecognized commands will attempt to be
translated by the router as a domain name. Since there is no domain server configured, there will be a
delay while the request times out. This can take between several seconds to several minutes. To
terminate the wait, simultaneously hold down the <CTRL><SHIFT>6 keys then release and press x:

Router>enabel
Translating "enabel"...domain server (255.255.255.255) %

Briefly hold down the keys <CTRL><SHIFT>6, release and press x

Name lookup aborted

Router>

From the user exec mode, enter privileged exec mode:

Router> enable
Router#

Verify a clean configuration file with the privileged exec command show running-config. If a
configuration file was previously saved, it will have to be removed. Appendix 1 shows a typical default
router’s configuration. Depending on router’s model and IOS version, your configuration may look slightly
different. However, there should be no configured passwords or IP addresses. If your router does not
have a default configuration, ask the instructor to remove the configuration.

Step 3: Configure global configuration hostname setting.


What two commands may be used to leave the privileged exec mode? ___________________

What shortcut command can be used to enter the privileged exec mode? _________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Examine the different configuration modes that can be entered with the command configure? Write
down the list of configuration modes and description:
___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

From the privileged exec mode, enter global configuration mode:

Router# configuration terminal


Router(config)#

What three commands may be used to leave the global configuration mode and return to the privileged
exec mode?
___________________________________________________________________________________

___________________________________________________________________________________

What shortcut command can be used to enter the global configuration mode? ______________________

Set the device hostname to Router1:

router(config)# hostname Router1


Router1(config)#

How can the hostname be removed?


___________________________________________________________________________________

___________________________________________________________________________________

Step 5: Configure the MOTD banner.


In production networks, banner content may have a significant legal impact on the organization. For
example, a friendly “Welcome” message may be interpreted by a court that an attacker has been granted
permission to hack into the router. A banner should include information about authorization, penalties for
unauthorized access, connection logging, and applicable local laws. The corporate security policy should
provide policy on all banner messages.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Create a suitable MOTD banner. Only system administrators of the ABC Company are authorized access,
unauthorized access will be prosecuted, and all connection information will be logged.
___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

Examine the different banner modes that can be entered. Write down the list of banner modes and
description.

Router1(config)# banner ?
___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

___________________________________________________________________________________

Choose a terminating character that will not be used in the message text.__________________

Configure the MOTD banner. The MOTD banner is displayed on all connections before the login prompt.
Use the terminating character on a blank line to end the MOTD entry:

Router1(config)# banner motd %


Enter TEXT message. End with the character '%'
***You are connected to an ABC network device. Access is granted to only
current ABC company system administrators with prior written approval. ***

*** Unauthorized access is prohibited, and will be prosecuted. ***

*** All connections are continuously logged. ***

%
Router1(config)#

What is the global configuration command to remove the MOTD banner?

___________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Task 2: Configure Cisco router password access.

Access passwords are set for the privileged exec mode and user entry point such as console, aux, and
virtual lines. The privileged exec mode password is the most critical password, since it controls access to
the configuration mode.

Step 1: Configure the privileged exec password.


Cisco IOS supports two commands that set access to the privileged exec mode. One command, enable
password, contains weak cryptography and should never be used if the enable secret command is
available. The enable secret command uses a very secure MD5 cryptographic hash algorithm. Cisco
says “As far as anyone at Cisco knows, it is impossible to recover an enable secret based on the contents
of a configuration file (other than by obvious dictionary attacks).” Password security relies on the
password algorithm, and the password. . In production environments, strong passwords should be used
at all times. A strong password consists of at least nine characters of upper and lower case letters,
numbers, and symbols. In a lab environment, we will use weak passwords.

Set the privileged exec password to cisco.

Router1(config)# enable secret cisco


Router1(config)#

Step 2: Configure the console password.


Set the console access password to class. The console password controls console access to the router.

Router1(config)# line console 0


Router1(config-line)# password class
Router1(config-line)# login

What is the command to remove the console password? _____________________________

Step 3: Configure the virtual line password.


Set the virtual line access password to class. The virtual line password controls Telnet access to the
router. In early Cisco IOS versions, only five virtual lines could be set, 0 through 4. In newer Cisco IOS
versions, the number has been expanded. Unless a telnet password is set, access on that virtual line is
blocked.

Router1(config-line)# line vty 0 4


Router1(config-line)# password class
Router1(config-line)# login

There are three commands that may be used to exit the line configuration mode:

Command Effect
Return to the global configuration mode.
Exit configuration and return to the privileged exec mode.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Issue the command exit. What is the router prompt? What is the mode?
Router1(config-line)# exit
___________________________________________________________________________________

___________________________________________________________________________________

Issue the command end. What is the router prompt? What is the mode?
___________________________________________________________________________________

___________________________________________________________________________________

Task 3: Configure Cisco Router Interfaces.


All cabled interfaces should contain documentation about the connection. On newer Cisco IOS versions,
the maximum description is 240 characters.

Figure 2. Physical lab topology.

Figure 2 shows a network topology where a host computer is connected to Router1, interface Fa0/0.

Write down your subnet number and mask: ________________________________________________

The first IP address will be used to configure the host computer LAN. Write down the first IP Address:
___________________________________________________________________________________

The last IP address will be used to configure the router fa0/0 interface. Write down the last IP Address:
___________________________________________________________________________________

Step 1: Configure the router fa0/0 interface.


Write a short description for the connections on Router1:
Fa0/0 ->
___________________________________________________________________________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Apply the description on the router interface with the interface configuration command, description:

Router1(config)# interface fa0/0


Router1(config-if)# description Connection to Host1 with crossover cable
Router1(config-if)# ip address address mask
Router1(config-if)# no shutdown
Router1(config-if)# end
Router1#

Look for the interface to become active:


*Mar 24 19:58:59.602: %LINEPROTO-5-UPDOWN: Line protocol on Interface
FastEthernet0/0, changed state to up

Step 2: Configure the router Fa0/1 interface.


Write a short description for the connections on Router1:
Fa0/1 ->
___________________________________________________________________________________

Apply the description on the router interface with the interface configuration command, description:

Router1(config)# interface fa0/1


Router1(config-if)# description Connection to switch with straight-through
cable
Router1(config-if)# ip address address mask
Router1(config-if)# no shutdown
Router1(config-if)# end
Router1#

Look for the interface to become active:


*Mar 24 19:58:59.602: %LINEPROTO-5-UPDOWN: Line protocol on Interface
FastEthernet0/1, changed state to up

Step 3: Configure the host computer.


Configure the host computer for LAN connectivity. Recall that the LAN configuration window is accessed
through Start | Control Panel | Network Connections. Right-click on the LAN icon, and select Properties.
Highlight the Internet Protocol field, and select Properties. Fill in the following fields:

IP Address: The first host address __________________________


Subnet Mask: The subnet mask ____________________________
Default Gateway: Router’s IP Address _______________________

Click OK, and then Close. Open a terminal window, and verify network settings with the ipconfig
command.

Step 4: Verify network connectivity.


Use the ping command to verify network connectivity with the router. If ping replies are not successful
troubleshoot the connection:

What Cisco IOS command can be used to verify the interface status? __________________________

What Windows command can be used to verify host computer configuration? _____________________

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

What is the correct LAN cable between host1 and Router1? _______________________________

Task 4: Save the Router Configuration File.


Cisco IOS refers to RAM configuration storage as running-configuration, and NVRAM configuration
storage as startup-configuration. For configurations to survive rebooting or power restarts, the RAM
configuration must be copied into non-volatile RAM (NVRAM). This does not occur automatically, NVRAM
must be manually updated after any changes are made.

Step 1: Compare router RAM and NVRAM configurations.


Use the Cisco IOS show command to view RAM and NVRAM configurations. The configuration is
displayed one screen at a time. A line containing “ -- more -- “ indicates that there is additional
information to display. The following list describes acceptable key responses:

Key Description
<SPACE> Display the next page.
<RETURN> Display the next line.
Q Quit
<CTRL> c Quit

Write down one possible shortcut command that will display the contents of NVRAM.

Display the contents of NVRAM. If the output of NVRAM is missing, it is because there is no saved
configuration.:

Router1# show startup-config


startup-config is not present
Router1#

Display the contents of RAM.

Router1#show running-config

Use the output to answer the following questions:

How large is the configuration file? ____________________

What is the enable secret password? ________________________

Does your MOTD banner contain the information you entered earlier? __________________________

Do your interface descriptions contain the information you entered earlier? ____________________

Write down one possible shortcut command that will display the contents of RAM. _________________

Step 2: Save RAM configuration to NVRAM.


For a configuration to be used the next time the router is powered on or reloaded, it must be manually
saved in NVRAM. Save the RAM configuration to NVRAM:

Router1# copy running-config startup-config


Destination filename [startup-config]? <ENTER>
Building configuration...
[OK]

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Router1#

Write down one possible shortcut command that will copy the RAM configuration to NVRAM.

____________________________

Review the contents of NVRAM, and verify that the configuration is the same as the configuration in RAM.

Task 5: Configure a Cisco Switch.


Cisco IOS switch configuration is (thankfully) similar to configuring a Cisco IOS router. The benefit of
learning IOS commands is that they are similar to many different devices and IOS versions.

Step 1: Connect the host to the switch.


Move the console, or rollover, cable to the console port on the switch. Ensure power has been applied to
the switch. In Hyperterminal, press Enter until the switch responds.

Step 2. Configure global configuration hostname setting.


Appendix 2 shows a typical default switch configuration. Depending on router model and IOS version,
your configuration may look slightly different. However, there should be no configured passwords. If your
router does not have a default configuration, ask the instructor to remove the configuration.

From the user exec mode, enter global configuration mode:

Switch> en
Switch# config t
Switch(config)#

Set the device hostname to Switch1.

Switch(config)# hostname Switch1


Switch1(config)#

Step 3: Configure the MOTD banner.


Create a suitable MOTD banner. Only system administrators of the ABC company are authorized access,
unauthorized access will be prosecuted, and all connection information will be logged.

Configure the MOTD banner. The MOTD banner is displayed on all connections before the login prompt.
Use the terminating character on a blank line to end the MOTD entry. For assistance, review the similar
step for configuring a router MOTD banner.

Switch1(config)# banner motd %

Step 4: Configure the privileged exec password.


Set the privileged exec password to cisco.

Switch1(config)# enable secret cisco


Switch1(config)#

Step 5: Configure the console password.


Set the console access password to class.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Switch1(config)# line console 0


Switch1(config-line)# password class
Switch1(config-line)# login

Step 6: Configure the virtual line password.


Set the virtual line access password to class. There are 16 virtual lines that can be configured on a
Cisco IOS switch, 0 through 15.

Switch1(config-line)# line vty 0 15


Switch1(config-line)# password class
Switch1(config-line)# login

Figure 3. Network topology.

Step 7: Configure the interface description.


Figure 3 shows a network topology where Router1 is connected to Switch1, interface Fa0/1. Switch1
interface Fa0/2 is connected to host computer 2, and interface Fa0/3 is connected to host computer 3.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Write a short description for the connections on Switch1:

Router1 Interface Description


Fa0/1
Fa0/2
Fa0/3

Apply the descriptions on the switch interface with the interface configuration command, description:

Switch1(config)# interface fa0/1


Switch1(config-if)# description Connection to Router1
Switch1(config)# interface fa0/2
Switch1(config-if)# description Connection to host computer 2
Switch1(config)# interface fa0/3
Switch1(config-if)# description Connection to host computer 3
Switch1(config-if)# end
Switch1#

Step 7: Save RAM configuration to NVRAM.


For a configuration to be used the next time the switch is powered on or reloaded, it must be manually
saved in NVRAM. Save the RAM configuration to NVRAM:

Switch1# copy run start


Destination filename [startup-config]? <ENTER>
Building configuration...
[OK]
Switch1#

Review the contents of NVRAM, and verify that the configuration is the same as the configuration in RAM.

Task 6: Reflection
The more you practice the commands, the faster you will become in configuring a Cisco IOS router and
switch. It is perfectly acceptable to use notes at first to help configure a device, but a professional network
engineer does not need a ‘cheat sheet’ to perform common configuration tasks. The following table lists
commands covered in this lab:

Purpose Command
Enter the global configuration mode. configure terminal
Example:
Router> enable
Router# configure terminal
Router(config)#
Specify the name for the router. hostname name
Example:
Router(config)# hostname Router1
Router(config)#
Specify an encrypted password to enable secret password
prevent unauthorized access to the Example:
privileged exec mode. Router(config)# enable secret cisco
Router(config)#

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Specify a password to prevent password password


unauthorized access to the console. login
Example:
Router(config)# line con 0
Router(config-line)# password class
Router(config-line)# login
Router(config)#
Specify a password to prevent password password
unauthorized telnet access. login
Router vty lines: 0 4 Example:
Switch vty lines: 0 15 Router(config)# line vty 0 4
Router(config-line)# password class
Router(config-line)# login
Router(config-line)#
Configure the MOTD banner. Banner motd %
Example:
Router(config)# banner motd %
Router(config)#
Configure an interface. Example:
Router- interface is OFF by default Router(config)# interface fa0/0
Switch- interface is ON by default Router(config-if)# description description
Router(config-if)# ip address address mask
Router(config-if)# no shutdown
Router(config-if)#
Save the configuration to NVRAM. copy running-config startup-config
Example:
Router# copy running-config startup-config
Router#

Task 7: Challenge
It is often necessary, and always handy, to save the configuration file to an off-line text file. One way to
save the configuration file is to use HyperTerminal Transfer menu option Capture.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 14 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Figure 2. Hyperterminal Capture menu.

Refer to Figure 2. All communication between the host computer and router are saved to a file. The file
can be edited, and saved. The file can also be edited, copied, and pasted into a router:

To start a capture, select Hyperterminal menu option Transfer | Capture Text. Enter a path and file name,
and select Start.

Issue the privileged exec command show running-config, and press the <SPACE> key until all of
the configuration has been displayed.

Stop the capture. Select menu option Transfer | Capture Text | Stop.

Open the text file and review the contents. Remove any lines that are not configuration commands, such
as the more prompt. Manually correct any lines that were scrambled or occupy the same line. After
checking the configuration file, highlight the lines and select Notepad menu Edit | Copy. This places the
configuration in host computer memory.

To load the configuration file, it is ALWAYS best practice to begin with a clean RAM configuration.
Otherwise, stale configuration commands may survive a paste action and have unintended
consequences (also known as the Law of Unintended Consequences):

Erase the NVRAM configuration file:

Router1# erase start


Erasing the nvram filesystem will remove all configuration files! Continue?
[confirm] <ENTER>
[OK]
Erase of nvram: complete

Reload the router:

Router1# reload
Proceed with reload? [confirm] <ENTER>

When the router reboots, enter the global configuration mode:

Router> en
Router# config t
Router(config)#

Using the mouse, right-click inside the Hyperterminal window and select Paste To Host. The configuration
will be loaded, very quickly, to the router. Watch closely for error messages, each message must be
investigated and corrected.

Verify the configuration, and save to NVRAM.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 15 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Task 6: Cleanup
Before turning off power to the router and switch, remove the NVRAM configuration file from each device
with the privileged exec command erase startup-config.

Delete any configuration files saved on the host computers.

Unless directed otherwise by the instructor, restore host computer network connectivity, then turn off
power to the host computers. Remove anything that was brought into the lab, and leave the room ready
for the next class.

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 16 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Appendix 1- default Cisco IOS router configuration

Current configuration : 824 bytes


!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
no aaa new-model
ip cef
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/1/0
no ip address
shutdown
no fair-queue
!
interface Serial0/1/1
no ip address
shutdown
clock rate 2000000
!
interface Vlan1
no ip address
!
ip http server
no ip http secure-server
!
control-plane
!
line con 0
line aux 0
line vty 0 4
login
!
scheduler allocate 20000 1000
end

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 17 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

Appendix 2- default Cisco IOS switch configuration

Current configuration : 1519 bytes


!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch
!
!
ip subnet-zero
!
!
spanning-tree mode pvst
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
!
interface FastEthernet0/1
no ip address
!
interface FastEthernet0/2
no ip address
!
interface FastEthernet0/3
no ip address
!
interface FastEthernet0/4
no ip address
!
interface FastEthernet0/5
no ip address
!
interface FastEthernet0/6
no ip address
!
interface FastEthernet0/7
no ip address
!
interface FastEthernet0/8
no ip address
!
interface FastEthernet0/9
no ip address
!
interface FastEthernet0/10
no ip address
!
interface FastEthernet0/11
no ip address
!
interface FastEthernet0/12

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 18 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

no ip address
!
interface FastEthernet0/13
no ip address
!
interface FastEthernet0/14
no ip address
!
interface FastEthernet0/15
no ip address
!
interface FastEthernet0/16
no ip address
!
interface FastEthernet0/17
no ip address
!
interface FastEthernet0/18
no ip address
!
interface FastEthernet0/19
no ip address
!
interface FastEthernet0/20
no ip address
!
interface FastEthernet0/21
no ip address
!
interface FastEthernet0/22
no ip address
!
interface FastEthernet0/23
no ip address
!
interface FastEthernet0/24
no ip address
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/2
no ip address
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
ip http server
!
!
line con 0
line vty 5 15
!

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 19 of 20
CCNA Exploration
Network Fundamentals:
Configuring and Testing Your Network Lab 11.5.1 Basic Cisco Device Configuration

end

All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 20 of 20

You might also like