0% found this document useful (0 votes)
28 views11 pages

CYB204 Lab1 InitialConfig-Phys V1

The document outlines a lab activity for the CYB204 course, focusing on the initial configuration of switches and routers in a LAN and WAN setup. It provides a detailed addressing table, required resources, and step-by-step instructions for configuring network devices, including switches and routers, along with verification steps for connectivity. Additionally, it includes a troubleshooting challenge to ensure full connectivity between devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views11 pages

CYB204 Lab1 InitialConfig-Phys V1

The document outlines a lab activity for the CYB204 course, focusing on the initial configuration of switches and routers in a LAN and WAN setup. It provides a detailed addressing table, required resources, and step-by-step instructions for configuring network devices, including switches and routers, along with verification steps for connectivity. Additionally, it includes a troubleshooting challenge to ensure full connectivity between devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Course: CYB204 (Cisco Technologies – CCNA)

Lab 1: Initial Configuration – Switches and


Routers

Student Name: Sri Naga Sai Kumar


Student ID: 24000792
Section: Evening

1
Lab Activity – Initial Configuration:
• There is a LAN and a WAN in the topology below. Please build the following
topology on the physical pod/rack in the lab room.

Required Resources:
• One Layer-3/Multilayer Switch (Cisco Catalyst 1000 Series with Cisco IOS
Release 15.1+ image)
• Two Routers (Cisco 4221 with Cisco IOS Release 17.6+ image)
• Two Laptops (Windows with Terminal Emulation Program)
• One Desktop PC (Windows with Terminal Emulation Program)

• Cables:

2
o Console cables to configure the Cisco IOS devices through the console
port.
o Ethernet cables as shown in the topology.
Addressing Table:

Device Interface IP Address Subnet Mask / CIDR Default Gateway


S1 VLAN1 192.168.Pod#.2 255.255.255.0 192.168.Pod#.1
G0/0/1 192.168.Pod#.1 255.255.255.0 OR /24 N/A
R1
S0/1/0 172.16.10.1 /30 N/A
R2 S0/1/0 172.16.10.2 /30 N/A
Laptop-1 NIC 192.168.Pod#.11 255.255.255.0 192.168.Pod#.1
Laptop-2 NIC 192.168.Pod#.12 255.255.255.0 192.168.Pod#.1
PC-A NIC 192.168.Pod#.13 255.255.255.0 192.168.Pod#.1

Lab Description:
• In this lab, please build a LAN and WAN-based simple network.
o LAN A with one multi-layer/layer-3 switch and three hosts.
o WAN-1 with two routers.

• You are also required to do the basic configuration on the following devices:
o Switch:
▪ Hostnames
▪ SVI
▪ Default gateway
▪ Login banner
▪ DNS lookup (disable)
o Laptops and PC:
▪ IP addressing
▪ Default gateway
o Routers:
▪ Hostnames
▪ IP addressing
▪ Login banner
▪ DNS lookup (disable)
Instructions:
Step 1: Set up the network topology.
• Develop the topology by cabling and using all the physical devices illustrated
above:
o Turn on the devices.
o Connect the switch with the default gateway.

3
o Connect the laptops and the PC with their respective switches.
o Make sure all the lights between switches, laptops and the PC are green.

Step 2: Configure the PC and laptop hosts.


• Configure the following on the PC and laptops appropriately according to the
addressing table:
o IP address
o Subnet mask
o Default gateway

4
Step 3: Configure and verify basic switch settings.
• Console into the switch and enter the global configuration mode:
o Assign the switch with a host name according to the addressing table.
▪ enable
▪ config terminal
▪ hostname S1
o Disable unwanted DNS lookup.
▪ no ip domain lookup
o Configure a login MOTD banner to warn about illegal access.
▪ banner motd “Warning! Authorized Access Only!”
o Assign the encrypted password cisco to privilege exec mode (#).
▪ enable secret cisco
o Protect the physical and virtual lines from having console access.
▪ line console 0
▪ password trios
▪ login
▪ exit
▪ line vty 0 15
▪ password trios
▪ login local
▪ exit
o Configure the domain name as trios.com (both the hostname and domain
name are required for the encryption keys to be generated).
▪ ip domain-name trios.com

5
o Configure the username, to access Secure Shell Protocol (SSH) client
access, as Admin and the password as cisco123.
▪ username Admin privilege 15 password cisco123
o Generate the encryption keys (1024) for securing the session.
▪ crypto key generate rsa
o Enable SSH version 2
▪ ip ssh version 2
o Allow switch to be accessed remotely using only SSH.
▪ line vty 0 15
▪ transport input ssh
▪ exit
o Encrypt all current and future passwords by enabling the required service.
▪ service password-encryption
o Configure and activate SVI according to the addressing table.
▪ int vlan 1
▪ ip address 192.168.Pod#.2 255.255.255.0
▪ no shut
▪ exit
o Configure default gateway according to the addressing table.
▪ ip default-gateway 192.68.Pod#.1
▪ exit

Step 4: Configure and verify basic router settings on both routers.


• Console into the router and enter the global configuration mode:
o Assign the routers with host names according to the addressing table.
6
▪ enable
▪ config terminal
▪ hostname R1
o Disable unwanted DNS lookup.
▪ no ip domain-lookup
o Configure a login MOTD banner to warn about illegal access.
▪ banner motd “Warning! Authorized Access Only!”
o Assign the encrypted password cisco to privilege exec mode (#)
▪ enable secret cisco
o Protect the physical and virtual lines from having console access.
▪ line console 0
▪ password trios
▪ login
▪ exit

▪ login local
▪ exit
o Configure the domain name as trios.com
▪ ip domain-name trios.com
o Configure the username, to access SSH client access, as Admin and the
password as cisco123
▪ username Admin privilege 15 password cisco123
o Generate the encryption keys (1024 bits) for securing the session.
▪ crypto key generate rsa
o Enable SSH version 2.
▪ ip ssh version 2
o Allow the router to be accessed remotely using only SSH.
▪ line vty 0 15
▪ transport input ssh
▪ exit
o Encrypt all current and future passwords by enabling the required service.
▪ service password-encryption
o Configure and activate all the interfaces according to the addressing table.
▪ int g0/0
▪ ip address 192.168.Pod#.1 255.255.255.0
▪ no shut
▪ exit
▪ int s0/0/0
▪ ip address 172.16.10.1 255.255.255.252
▪ no shut
▪ exit
o Provide appropriate descriptions of all the active interfaces.
▪ int g0/0

7
▪ description Link to LAN-A
▪ int s0/0/0
▪ description Link to Router-2 (WAN-1)
▪ exit
▪ exit

8
Step 5: Verify the connectivity.
• Using the command line at PC-A, ping the IP address of int. g0/0/1 at R1.
• Using the command line at PC-A, ping the IP address of int. S0/1/0 at R1.
• Using the command line at PC-A, ping the IP address of SVI of S1.
• Using the command line at Laptop-1, ping the IP address of int. g0/0/1 at R1.
• Using the command line at Laptop1, ping the IP address of int. S0/1/0 at R1.
• Using the command line at Laptop-2, ping the IP address of SVI of S1.
• Using the command line at Laptop-2, ping the IP address of int. g0/0/1 at R1.
• Using the command line at Laptop-2, ping the IP address of int. S0/1/0 at R1.
• Using the command line at Laptop-2, ping the IP address of int. S0/1/0 at R2.
• Using the command line at Laptop-1, ping the IP address of int. S0/1/0 at R2.
• Using the command line at PC-A, ping the IP address of int. S0/1/0 at R2.
CHALLENGE:
The last three pings to R2 may not be successful. You must troubleshoot to make sure
there is full connectivity from Laptop-1, Laptop-2, and PC-A to S0/1/0 interface of
Router R2.
(Hint: Check the networks learned by each router using command: show ip route.)

9
10
11

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy