acn man (1)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

ACN Practical no.

6
Configure User datagram Protocol (UDP) Part-1 using relevant software.
UDP
UDP, or User Datagram Protocol, is one of the core protocols of the Internet Protocol (IP) suite. It is used
for transmitting data over a network. UDP is suitable for applications where speed is critical and
occasional data loss is acceptable, making it a popular choice for real-time communications.
key features of UDP:
 Connectionless
 Unreliable
 Low Latency
 No Ordering
 Lightweight
Steps to Configure UDP
1. Set Up the Network
 Open Cisco Packet Tracer.
 Drag and drop the necessary devices (routers, switches, PCs) onto the workspace.
 Connect the devices using appropriate cables (usually copper straight-through for PCs to
switches and serial for routers).
2. Configure IP Addresses
 Click on each PC and go to the Desktop tab.
 Select IP Configuration and assign an IP address and subnet mask. For example:
o PC1: IP Address: 192.168.1.2, Subnet Mask: 255.255.255.0
o PC2: IP Address: 192.168.1.3, Subnet Mask: 255.255.255.0
 Ensure that the devices are on the same subnet.
3. Configure UDP Services
 You can simulate UDP traffic by using tools like the Packet Tracer’s built-in
applications (e.g., Telnet, or using the Simulation Mode for UDP traffic).
 For example, to use a UDP service:
o Click on PC1, go to the Desktop tab, and select Command Prompt.
o You can use ping to check connectivity.
4. Set Up a UDP Server (if applicable)
 If you want to simulate a UDP server ( TFTP server):
o Drag a server from the device list (e.g., a Generic Server).
o Configure it by clicking on the server, going to the Config tab, and setting up the
relevant UDP service.
o For example, enable TFTP service by going to the Services tab and turning on
TFTP.
5. Testing UDP Configuration
 On PC1, open the Command Prompt again and use a tool like TFTP or another UDP
application to test connectivity.
 You can send a request from PC1 to the server and check if the server responds correctly.
6. Using Simulation Mode
 Switch to Simulation Mode in Packet Tracer.
 Generate packets and see how they are sent over the network. You can filter for UDP
packets to observe the flow of communication.
Practical no. 7
Configure User datagram Protocol (UDP) Part-2 using relevant software.
Steps to Configure UDP
1. Set Up the Network
 Open Cisco Packet Tracer.
 Drag and drop the necessary devices (routers, switches, PCs) onto the workspace.
 Connect the devices using appropriate cables (usually copper straight-through for PCs to
switches and serial for routers).
2. Configure IP Addresses
 Click on each PC and go to the Desktop tab.
 Select IP Configuration and assign an IP address and subnet mask. For example:
o PC1: IP Address: 192.168.1.2, Subnet Mask: 255.255.255.0
o PC2: IP Address: 192.168.1.3, Subnet Mask: 255.255.255.0
 Ensure that the devices are on the same subnet.
3. Configure UDP Services
 You can simulate UDP traffic by using Simulation Mode for UDP traffic
 For example, to use a UDP service:
o Click on PC1, go to the Desktop tab, and select Command Prompt.
o You can use ping to check connectivity.
4. Set Up a UDP Server (if applicable)
 If you want to simulate a UDP server DNS server
o Drag a server from the device list (e.g., a Generic Server).
o Configure it by clicking on the server, going to the Config tab, and setting up the
relevant UDP service.
o For example, enable DNS service by going to the Services tab and turning on
DNS. Give name and IP address for setting up the DNS.
5. Testing UDP Configuration
 On PC1, open the Command Prompt again and use the web browser to test the UDP
application.
 You can send a request from PC1 to the server and check if the server responds correctly.
6. Using Simulation Mode
 Switch to Simulation Mode in Packet Tracer.
 Generate packets and see how they are sent over the network. You can filter for UDP
packets to observe the flow of communication.
Practical no. 8
Configure Transmission Control Protocol(TCP) using relevant software.
TCP, or Transmission Control Protocol, is one of the main protocols in the Internet Protocol
Suite. It is used for transmitting data over a network in a reliable, ordered, and error-checked
manner. Configuring TCP in Cisco Packet Tracer involves setting up devices to use TCP for
communication.
Key Features of TCP:
1. Connection-Oriented:
o TCP establishes a connection between the sender and receiver before data
transmission begins. This process is known as the three-way handshake (SYN,
SYN-ACK, ACK).
2. Reliable Delivery:
o TCP ensures that data is delivered accurately and in the correct order. If any
packets are lost during transmission, TCP will detect this and retransmit the
missing packets.
3. Data Segmentation:
o Large messages are divided into smaller packets (segments) for transmission.
Each segment is then reassembled in the correct order at the destination.
4. Flow Control:
o TCP manages the rate of data transmission between sender and receiver to prevent
overwhelming the receiver. This is done using a mechanism called windowing,
where the sender adjusts the amount of data sent based on the receiver’s capacity
to process it.
5. Error Checking:
o Each TCP segment contains a checksum that is used to verify the integrity of the
data. If the checksum does not match, the segment is discarded, and the sender is
notified to retransmit.
6. Congestion Control:
oTCP implements algorithms to manage network congestion, adjusting the rate of
data transmission to reduce network traffic and avoid packet loss.
Steps to configure tcp services.:
Step 1: Set Up Devices
1. Open Cisco Packet Tracer and create a new project.
2. Add Devices: Drag and drop at least two devices and a server onto the workspace.
Step 2: Configure IP Addresses
1. Select a Device (e.g., PC1), click on it, and go to the "Desktop" tab.
2. Click on IP Configuration.
3. Assign IP Address: Input an IP address and subnet mask (e.g., IP: 192.168.1.1, Subnet
Mask: 255.255.255.0).
4. Repeat for another device with a different IP address in the same subnet
Step 3: Verify Connectivity
1. Ping from one PC to the other:
o Go to the "Desktop" tab and open Command Prompt.
o Type ping 192.168.1.2 (or the IP of the other PC) and press Enter. You should
receive replies.
Step 4: Set Up a Simple TCP Application
1. Use the Simulation Mode:
o Switch to Simulation Mode in Packet Tracer.
2. Add an Application: You can simulate TCP by using applications like Telnet or HTTP.
o For example, set up a web server :
 Click on server, go to the "services" tab, and choose HTTP.
 Enable the web server.
3. Access the Server:
o On PC, go to the "Desktop" tab and open Web Browser.
o Enter the IP address of server .
o If configured correctly, you should be able to access the web server.
Step 5: Configure Additional TCP Settings (Optional)
 Set up Telnet or FTP for more TCP interaction:
o Go to PC1, enable Telnet in the Command Prompt or set up FTP through the
relevant applications.
o Test connectivity from PC2 using the appropriate client application.
Practical no. 8
Configure dynamic Host Configuration Protocol(DHCP) using relevant software.
DHCP is a network management protocol used in networks to dynamically assign IP addresses
and other network configuration information like default gateway, mask, DNS server address,
etc. It is an application layer protocol.
In this article, we will know about DHCP server configuration using Cisco Packet Tracer.
Steps to Configure and Verify DHCP Server in Cisco Packet Tracer:
Step 1: First, open the cisco packet tracer desktop and select the devices given below:
S.NO Device Model-Name Unit
1. PC PC 5
2. Switch PT-Switch 2
3. Router PT-Router 1
4. Server Server-PT 1
 Now create a network topology as shown below the image.
 Use an Automatic connecting cable to connect the devices with others.
Step 2:
 Configure the Server with IPv4 address and Subnet Mask according to
the Data given above.
 To assign an IP address in Server, click on Server-PT.
 Then, go to desktop and IP configuration and there you will find IPv4
configuration.
 Add IPv4 address, subnet mask, and Default Gateway.
Parameters Address value
IPv4 Address 172.168.10.2
Subnet Mask 255.255.255.0
Default-Gateway 172.168.10.1
2. Assigning IP address using the ipconfig command.
 We can also assign an IP address with the help of a command.
 Go to the command prompt of the server
 Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if
needed)
example: ipconfig 172.168.10.2 255.255.255.0 172.168.10.1
Step 3: Configuring the DHCP server.
To configure the DHCP server first,
 Click on Server then, Go to services.
 Click on DHCP and turn on the services and, configure the DHCP server
with the help of the data given below.
o Delete the default values of Start IP Address and subnet Mask
then save the info.
o Create two new pools.
POOL1 and POOL2 and fill the data as shown in the images below.
Step 4: Configuring Router with IPv4 Address and Subnet Mask.
IP Addressing Table for Router:
S.NO Device Interface IPv4 Address Subnet Mask
FastEthernet0/0 172.168.10.1 255.255.255.0
router0
1. FastEthernet0/1 192.168.10.1 255.255.255.0
 To assign an IP address in router0, click on router0.
 Then, go to config and then Interfaces, and make sure to turn on the
ports.
 Then, configure the IP address in FastEthernet according to IP
addressing Table.
 Fill IPv4 address and subnet mask.
Step 5: Configuring the PCs and changing the IP configuration.
 To assign an IP address in PC0, click on PC0.
 Then, go to desktop and IP configuration and there you will find IPv4
configuration.
 Change its state from static to DHCP.
 It will automatically fetch the data and configure itself.
 Repeat the same procedure with other PCs to configure them thoroughly.
Practical no. 9
Configure Doman Name Server (DNS) server using Relevant Software.
DNS:
DNS, or Domain Name System, is a system that translates human-readable domain names (like
www.example.com) into IP addresses (like 192.0.2.1) that computers use to identify each other
on the network. It serves as the "phonebook" of the internet, allowing users to access websites
using easy-to-remember names instead of numerical IP addresses.
Steps to configure DNS Server.
Step 1: Set Up the Network
1. Open Cisco Packet Tracer and create a new project.
2. Add Devices: Drag and drop at least one PC (as a client) and a server (for DNS) onto the
workspace.
Step 2: Configure the DNS Server
1. Select the Server: Click on the server, go to the "Config" tab.
2. Enable DNS Service:
o On the left side, select DNS.
o Check the box to enable DNS service.
3. Add DNS Records:
o In the DNS section, enter the following details:
 Name: The domain name (e.g., example.com).
 Address: The corresponding IP address of the device (e.g., 192.168.1.2
for a PC).
o Click Add to create the record.
o Repeat for any additional records you want to add.
Step 3: Configure the Client PC
1. Select the PC: Click on the PC, go to the "Desktop" tab.
2. IP Configuration:
o Set a static IP address in the same subnet as the server (e.g., IP: 192.168.1.2,
Subnet Mask: 255.255.255.0).
o Set the Default Gateway to the router or the server IP, if applicable.
o Set the DNS Server to the IP address of the DNS server (e.g., 192.168.1.1).
Step 4: Test DNS Configuration
1. Open Command Prompt: On the PC, go to the "Desktop" tab and select Command
Prompt.
2. Ping the Domain Name: Type ping example.com (or the domain name you configured)
and press Enter. You should receive replies from the corresponding IP address.
3. Simulation: Capture the DNS Packets.
Practical no. 9
Configure file Transfer Protocol (FTP) server using Relevant Software.
FTP
File Transfer Protocol, is a standard network protocol used to transfer files between a client and a
server over a TCP/IP network. It is widely used for sharing files and managing file transfers in both local
and internet environments.
Key Features of FTP:
1. File Transfer: FTP allows users to upload (send) and download (receive) files between
their local device and a remote server.
2. Client-Server Model: FTP operates on a client-server architecture where the client
initiates requests to the server to access files.
3. Authentication: FTP typically requires users to log in with a username and password,
although it can also support anonymous access for public file sharing.
4. Active and Passive Modes:
o Active Mode: The client opens a random port and the server connects back to the
client to transfer data.
o Passive Mode: The server opens a port and the client connects to it, which helps
with firewall traversal.
5. Directory Management: Users can navigate directories on the server, list files, and
manage files and folders.
6. Support for Multiple File Types: FTP can handle both ASCII and binary files, allowing
for the transfer of text files, images, videos, and more.
Common Uses of FTP:
 Website Management: Web developers use FTP to upload and manage files on web
servers.
 File Sharing: Organizations use FTP servers to share large files or datasets with clients
or partners.
 Backup: FTP can be used for backing up files from local machines to remote servers.
Security Considerations:
While FTP is widely used, it is not secure by default. Data, including usernames and passwords,
is transmitted in plain text. For secure file transfers, protocols like FTPS (FTP Secure) or SFTP
(SSH File Transfer Protocol) are recommended, as they encrypt the data being transferred.
Overall, FTP is a fundamental tool for file management and transfer in networked environments,
facilitating collaboration and data sharing.
Steps to configure FTP server:
Step 1: Set Up the Network
1. Open Cisco Packet Tracer and create a new project.
2. Add Devices: Drag and drop at least one PC (as a client) and a server (for FTP) onto the
workspace.
Step 2: Configure the FTP Server
1. Select the Server: Click on the server, and go to the Config tab.
2. Enable FTP Service:
o On the left side, select FTP.
o Check the box to enable FTP service.
3. Add Users:
o Under the FTP section, enter the following details:
Username: Enter a username (e.g., user1).
 Password: Enter a password (e.g., pass123).
 Directory: Specify a directory where files will be stored (e.g.,
/home/user1).
o Click Add to create the FTP user. Repeat for any additional users as needed.
Step 3: Configure the Client PC
1. Select the PC: Click on the PC, and go to the Desktop tab.
2. IP Configuration:
o Set a static IP address in the same subnet as the server (e.g., IP: 192.168.1.2,
Subnet Mask: 255.255.255.0).
o Set the Default Gateway to the router or the server IP, if applicable.
3. Open FTP Client:
o In the "Desktop" tab, select FTP.
o Enter the IP address of the FTP server (e.g., 192.168.1.1).
Step 4: Test FTP Configuration
1. Log In: When prompted, enter the username and password you created on the FTP
server.
2. Transfer Files:
o You can upload files from the PC to the FTP server or download files from the
server to the PC using the FTP client interface.
o Use commands like put to upload and get to download files.
Practical no. 10
Configure Hypertext Transfer Protocol (HTTP) using Relevant Software.
HTTP, or Hypertext Transfer Protocol, is the foundational protocol used for transferring data on
the World Wide Web. It facilitates communication between web clients (like browsers) and web
servers. Here are some key aspects of HTTP:
Key Features of HTTP:
1. Request-Response Model:
o HTTP follows a client-server model where the client sends a request to the server,
and the server responds with the requested resource (like a web page or image).
2. Stateless Protocol:
o Each HTTP request from a client to a server is independent. The server does not
retain information about previous requests, which simplifies the protocol but
requires other mechanisms (like cookies) to maintain session state.
3. Methods:
o HTTP defines several request methods, including:
 GET: Requests data from a specified resource.
 POST: Submits data to be processed (like form submissions).
 PUT: Updates a current resource with new data.
 DELETE: Removes a specified resource.
 HEAD: Similar to GET, but retrieves only the headers.
4. Status Codes:
o HTTP responses include status codes indicating the outcome of the request:
 200 OK: The request was successful.
 404 Not Found: The requested resource could not be found.
 500 Internal Server Error: A server error occurred.
5. Headers:
o HTTP messages can include headers that provide additional information about the
request or response (like content type, caching, and authentication).
Importance of HTTP:
 Web Browsing: HTTP is the primary protocol that enables web browsing, allowing users
to access websites and interact with online content.
 Content Delivery: It is used for delivering not only HTML pages but also images,
videos, and other multimedia content.
Security Considerations:
While HTTP is widely used, it does not encrypt data, making it vulnerable to eavesdropping and
man-in-the-middle attacks. For secure communications, HTTPS (HTTP Secure) is used, which
combines HTTP with SSL/TLS encryption to protect data in transit.
Configuring an HTTP server in Cisco Packet Tracer allows you to host a web service and serve
web pages.
Steps To Configure HTTP:
Step 1: Set Up the Network
1. Open Cisco Packet Tracer and create a new project.
2. Add Devices: Drag and drop at least one PC (as a client) and a server (for the HTTP
server) onto the workspace.
Step 2: Configure the HTTP Server
1. Select the Server: Click on the server you added, then go to the Config tab.
2. Enable HTTP Service:
o On the left side, find and select HTTP.
o Check the box to enable the HTTP service.
3. Set Up Web Page:
o Still in the HTTP configuration section, you can add a simple web page:
 Index.html: Click on Edit (or similar) to create an HTML file.
 Enter some basic HTML content. For example:
html
Copy code
<html>
<head><title>Welcome to My HTTP Server</title></head>
<body><h1>Hello, World!</h1><p>This is a simple web page
served by KCE Polytechnic students.</p></body>
</html>
 Save the changes.
Step 3: Configure the Client PC
1. Select the PC: Click on the PC you added, then go to the Desktop tab.
2. IP Configuration:
o Set a static IP address in the same subnet as the server (e.g., IP: 192.168.1.2,
Subnet Mask: 255.255.255.0).
o Set the Default Gateway to the IP address of the server or router (if applicable).
3. Open Web Browser:
o In the "Desktop" tab, select Web Browser.
o Enter the IP address of the server (e.g., 192.168.1.1).
Step 4: Test the HTTP Configuration
1. After entering the server's IP in the web browser, you should see the web page you
created.
2. If the page loads successfully, the HTTP server is configured correctly.
Step 5: Verify and Troubleshoot
 If you encounter issues:
o Check the IP address configurations on both the PC and the server.
o Ensure the HTTP service is enabled on the server.
o Verify that the firewall settings on the PC (if applicable) are not blocking HTTP
traffic.
Practical no. 11
a) Use TELNET to login a remote machine.
TELNET
Telnet is a network protocol used for remote communication and management of devices over a
network, typically the internet. It allows users to log into remote systems and execute commands
as if they were physically present at the console of the machine.
Key Features of Telnet:
1. Text-Based Communication:
o Telnet provides a command-line interface for communication, enabling users to
interact with remote systems using text-based commands.
2. Client-Server Model:
o Telnet operates on a client-server architecture where the Telnet client initiates a
connection to the Telnet server.
3. Port Usage:
o The default port for Telnet is 23. Clients connect to this port on the server to
establish a session.
4. Authentication:
o Users typically need to log in with a username and password to access the remote
system, providing a layer of security.
5. Session Control:
o Users can manage the remote session, execute commands, and perform
administrative tasks.
Common Uses of Telnet:
 Remote Management: Administrators use Telnet to manage servers, routers, and
switches remotely.
 Testing: Telnet can be used to test connectivity and troubleshoot network services (e.g.,
checking if a specific port on a server is open).
Security Considerations:
 Insecure Protocol: Telnet transmits data, including usernames and passwords, in plain
text. This makes it vulnerable to eavesdropping and man-in-the-middle attacks.
 Alternatives: Due to its security weaknesses, Telnet has largely been replaced by more
secure protocols, such as SSH (Secure Shell), which encrypts all data transmitted
between the client and server.
Logging into a remote machine using Telnet in Cisco Packet Tracer involves setting up a Telnet
server on the remote device and then using a client to connect to it.
Steps to Configure TELNET Server:
Step 1: Set Up the Network
1. Open Cisco Packet Tracer and create a new project.
2. Add Devices: Drag and drop at least one router (or switch) as the Telnet server and one
PC as the Telnet client.
Step 2: Configure the Telnet Server (Router/Switch)
1. Select the Router/Switch: Click on the router or switch you want to configure for
Telnet.
2. Access CLI: Go to the CLI tab to enter command-line interface mode.
3. Enter Global Configuration Mode:
enable
configure terminal
4. Set a Hostname (optional but recommended):
hostname Router1
5. Set Password for Telnet Access:
line vty 0 4
password yourpassword
login
Replace yourpassword with a secure password.
6. Enable Telnet Access:
o Make sure that your router/switch has an IP address assigned to its interface that
the PC can connect to.
o If not already configured, assign an IP address:
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
o Exit to global configuration:
exit
Step 3: Configure the Client PC
1. Select the PC: Click on the PC that will act as the Telnet client.
2. IP Configuration:
o Go to the Desktop tab and select IP Configuration.
o Assign an IP address in the same subnet as the router (e.g., IP: 192.168.1.2,
Subnet Mask: 255.255.255.0).
o Set the Default Gateway to the router’s IP address (e.g., 192.168.1.1).
Step 4: Use Telnet to Connect to the Remote Machine
1. Open Command Prompt:
o In the PC's Desktop tab, select Command Prompt.
2. Telnet Command:
o Type the following command:
telnet 192.168.1.1
o Replace 192.168.1.1 with the IP address of the Telnet server (router/switch).
3. Login Prompt:
o When prompted, enter the password you set earlier.
Step 5: Verify Connection
 If the connection is successful, you will be logged into the Telnet session on the remote
machine.
 You can now enter commands on the remote device as if you were directly connected to
it.
Step 6: Exit Telnet Session
 To exit the Telnet session, type:
exit
Troubleshooting Tips
 Ensure the router/switch has an IP address configured and is connected to the same
network as the client PC.
 Make sure the line vty configuration is correct, and that you've enabled the password.
 If you can't connect, check firewall settings on the client machine (if applicable).
b) Connect remote machine using Secure Shell(SSH).
SSH, or Secure Shell, is a network protocol used for secure communication over an unsecured
network. It provides a secure channel for connecting to remote machines and executing
commands, making it an essential tool for system administrators and developers. Here are some
key aspects of SSH:
Key Features of SSH:
1. Encryption:
o SSH encrypts data transmitted between the client and server, ensuring
confidentiality and integrity. This protects sensitive information, such as
usernames and passwords, from eavesdropping.
2. Authentication:
o SSH supports multiple methods of authentication, including:
 Password-based authentication: Users provide a username and
password.
 Public key authentication: Users generate a key pair (public and private
keys) and use the private key to authenticate, which is more secure.
3. Port Forwarding:
o SSH can tunnel other network protocols securely over its connection. This feature
is known as SSH port forwarding and is useful for accessing services securely.
4. Secure File Transfer:
o SSH includes secure file transfer capabilities via protocols like SFTP (SSH File
Transfer Protocol) and SCP (Secure Copy Protocol), allowing users to transfer
files securely between systems.
5. Remote Command Execution:
o Users can log into remote machines and execute commands, manage
configurations, and perform administrative tasks as if they were directly
connected to the terminal.
Common Uses of SSH:
 Remote Server Management: System administrators use SSH to manage servers,
routers, and switches securely from anywhere.
 Secure Data Transfer: Transferring files securely between computers or servers using
SFTP or SCP.
 Tunneling Services: Creating secure tunnels for web traffic or other services to enhance
security.
Advantages of SSH:
 Security: Provides strong encryption and secure authentication methods.
 Versatility: Supports various functionalities, including remote command execution, file
transfer, and port forwarding.
 Widely Supported: Available on most operating systems, including Linux, macOS, and
Windows.
Step 1: Set Up the SSH Server (Router/Switch)
1. Add a Device: Drag and drop a router or switch onto the workspace in Cisco Packet
Tracer.
2. Access CLI:
o Click on the device and go to the CLI tab.
3. Enter Global Configuration Mode:
enable
configure terminal
4. Set a Hostname:
hostname Router1
5. Set a Domain Name:
ip domain-name example.com
6. Generate SSH Keys:
crypto key generate rsa
o When prompted, choose a key size (e.g., 1024 bits).
7. Configure VTY Lines for SSH Access:
(VTY lines, or Virtual Terminal Lines, are a concept used in Cisco networking devices like routers
and switches to manage remote access sessions.)
line vty 0 4
transport input ssh
login local
8. Create a Username and Password:
username admin privilege 15 secret adminpass
o Replace admin and adminpass with your preferred username and password.
9. Assign an IP Address to the Interface:
o Ensure you have an IP address assigned to an interface:
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
Step 2: Set Up the Client PC
1. Add a PC: Drag and drop a PC onto the workspace.
2. Configure the PC's IP Address:
o Click on the PC and go to the Desktop tab.
o Select IP Configuration and set:
 IP Address: 192.168.1.2
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1 (the router's IP address).
3. Open Command Prompt:
o In the PC’s Desktop tab, select Command Prompt.
Step 3: Connect to the Remote Machine via SSH
1. Use the SSH Command:
o In the Command Prompt, type:
ssh -l admin 192.168.1.1
o Replace admin with your configured username and 192.168.1.1 with the router's
IP address.
2. Enter Your Password:
o When prompted, enter the password you configured ( adminpass).
Step 4: Verify Connection
 If everything is set up correctly, you should be logged into the router via SSH, and you
can now execute commands on the router.
Troubleshooting Tips
 Check IP Configuration: Ensure the IP addresses and subnet masks are correctly
configured on both the router and the PC.
 SSH Configuration: Verify that the SSH settings (hostname, domain name, and VTY
lines) are correctly configured on the router.
 Firewall Settings: Although Packet Tracer typically simulates a simple environment, in
real scenarios, ensure firewalls allow SSH traffic.
Practical no. 12
Configuring SMTP, POP3, and IMAP in Cisco Packet Tracer involves setting up a mail
server and configuring clients to send and receive emails.
SMTP, POP3, and IMAP are protocols used in email communication. Each serves a different
purpose in the process of sending and receiving emails. Here’s a breakdown of each:
SMTP (Simple Mail Transfer Protocol)
 Purpose: SMTP is used for sending emails from a client to a server or between servers.
 How It Works: When you compose and send an email, SMTP is responsible for
transferring that email from your email client (e.g., Outlook, Thunderbird) to the
recipient's email server. It can also relay messages between mail servers.
 Port: Typically operates on port 25, but can also use ports 587 or 465 for secure
connections (with TLS/SSL).
 Characteristics:
o It's a push protocol, meaning it pushes emails to the recipient's server.
o It does not store messages; instead, it transfers them directly.
POP3 (Post Office Protocol version 3)
 Purpose: POP3 is used for retrieving emails from a mail server to a client.
 How It Works: When you check your email using a POP3 client, it connects to the mail
server, downloads your messages, and typically deletes them from the server (unless
configured to keep a copy). This means emails are stored locally on your device.
 Port: Operates on port 110, with secure connections typically using port 995.
 Characteristics:
o It’s best for users who want to access their emails from a single device.
o Limited functionality for managing messages on the server (like folders or
keeping messages synchronized).
IMAP (Internet Message Access Protocol)
 Purpose: IMAP is also used for retrieving emails, but it offers more advanced features
than POP3.
 How It Works: IMAP allows users to access their emails directly on the mail server.
When you check your email, the messages remain on the server, allowing you to organize
them into folders and manage them from multiple devices.
 Port: Operates on port 143, with secure connections typically using port 993.
 Characteristics:
o Ideal for users who access their emails from multiple devices (e.g., smartphone,
tablet, computer).
o Supports synchronization of email folders and status (read/unread) across devices.
These protocols work together to ensure efficient email communication, each playing a specific
role in the overall process.
Steps to configure:
Step 1: Set Up the Mail Server
1. Add a Server:
o Drag and drop a Server device from the device list onto the workspace.
2. Configure the Server:
o Click on the server and go to the Config tab.
o Under the Services section, enable the following services:
SMTP (Simple Mail Transfer Protocol)
o Select SMTP from the services list.
o Check the box to enable the SMTP service.
o Set a domain name (e.g., example.com).
POP3 (Post Office Protocol version 3)
o Select POP3 from the services list.
o Check the box to enable the POP3 service.
IMAP (Internet Message Access Protocol)
o Select IMAP from the services list.
o Check the box to enable the IMAP service.
3. Create User Accounts:
o Go to the Mail section in the server configuration.
o Add user accounts by specifying usernames and passwords for each user (e.g.,
[email protected] with password password1).
Step 2: Configure the Client PCs
1. Add Client PCs:
o Drag and drop one or more PCs onto the workspace.
2. IP Configuration for Each PC:
o Click on each PC and go to the Desktop tab.
o Select IP Configuration.
o Assign an IP address in the same subnet as the server (e.g., 192.168.1.2,
192.168.1.3, etc.) with a subnet mask of 255.255.255.0. Set the default gateway to
the server's IP address.
3. Email Configuration:
o Click on the Desktop tab and select Email for each PC.
o Enter the following details:
 Email Address: Use the accounts you created on the mail server (e.g.,
[email protected]).
 Display Name: Set a name to be displayed.
 Password: Enter the corresponding password for the email account.
SMTP Settings
o SMTP Server: Set to the mail server's IP address (e.g., 192.168.1.1).
POP3 Settings
o POP3 Server: Set to the mail server's IP address (e.g., 192.168.1.1).
o Port: Default is 110 (for POP3).
IMAP Settings
o IMAP Server: Set to the mail server's IP address (e.g., 192.168.1.1).
o Port: Default is 143 (for IMAP).
Step 3: Test Email Sending and Receiving
1. Send an Email:
o On one of the PCs, go to the Email application, compose a new message, and send it to
another user (e.g., [email protected]).
2. Check Email:
o On the other PC, open the Email application and check for new messages. You can
retrieve messages using either POP3 or IMAP.
Troubleshooting Tips
 Verify Connections: Ensure all devices are properly connected and that the server is configured
with the correct IP settings.
 Check Firewall Settings: Make sure that firewall settings (if applicable) allow traffic on SMTP
(port 25), POP3 (port 110), and IMAP (port 143).
 User Credentials: Double-check usernames and passwords for accuracy when sending and
receiving emails.

You might also like