HEP 456 Module 5 Section 12 and 13 Planning for Analysis and Interpretation and Gantt chartĀ
HEP 456 Module 5 Section 12 and 13 Planning for Analysis and Interpretation and Gantt chartĀ Name HEP 456: ā¦
NETW202 GROUP PROJECT PROF:
TEAM MEMBERS:ā
Draw a small Local Area Network that consists of one router, two switches, and two PCs basically in this layout: PC1 - Switch1 - Router - Switch2 - PC2. Copy and paste your diagram on to the second page of your Word document.
Write out the full configuration of ALL of the devices in your network to include two IPv4 subnets with the appropriate IP addresses, subnet masks, default gateways, and VLAN1 addresses. Include names for the devices and provide secure passwords at all levels of the network appliances. Include SSH on the router.
Router Configuration
Router(config)#hostname Router
Router(config)#Line console 0
Router(config-line)#password cisco1
Router(config-line)#login
Router(config-line)#exit
Router(config)#line vty 0
Router(config-line)#transport input ssh
Router(config-line)#password cisco1
Router(config-line)#login
Router(config-line)#exit
Router(config)#enable secret cisco1
Router(config)#exit
Router#wr
Router# write memory
Router#exit
User Access Verification
Password: cisco1
Router>en
Password:cisco1
Router#conf t
Router(config)#interface fastethernet0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#desc connection to SW1
Router(config-if)#no shutdown
Router(config-if)#exit
Routr(config)#exit
Router#
Router#show ip interface brief
Router#show interfacef0/0
Router#conf t
Router(config)# dhcp ?
Router(config)# ip dhcp pool Pool1
Router(dhcp-config)#network 192.168.1.0
Router(dhcp-config)#default router 192.168.1.1
Router(dhcp-config)#dns-server 192.168.1.10
Router(dhcp-config)#exit
Router(config)#ip dhcp excluded address ?
Router(config)#ip dhcp excluded address 192.168.1.100? Router(config)#ip dhcp excluded address 192.168.1.100 192.168.1.150 Router(config)#ip route?
Router(config)# ip route 172.16.0.0?
Router(config)#ip route 172.16.0.0 255.255.0.0?
Router(config)#ip route 172.16.0.0 255.255.0.0 serial?
Router(config)#ip route 172.16.0.0 255.255.0.0 serial0/0?
Router(config)#ip route 172.16.0.0 255.255.0.0 serial 0/0
Router(config)#exit
Router#show1
C 192.168.1.0/24 is directly connected, Fastethernet0/0 Router#
Switch - 1 Configuration
Switch>en
Switch#conf t
Switch(config)#hostname Switch1
Switch1(config)#enable password password
Switch1(config)#enable secret cisco
Switch1(config)#end
Switch1#conf t
Switch1(config)#line con 0
Switch1(cofig-line)#logging synchronous
Switch1(config-line)#exec-timeout 0 0
Switch1(config-line)#line vty 0 15
Switch1(config-line)#login
Switch1(config-line)#password cisco
Switch1(config-line)#end
Switch1#conf t
Switch1(config)#vlan 999
Switch1(config-vlan)#name VLAN1
Switch1(config-vlan)#exit
Swith1(config)#int ra fa 0/11 -24
Switch1(config-if-range)#switch mode access
Switch1(config-if-range)#switchport acc
Switch1(config-if-range)#switchport access v1
Switch1(config-if-range)#switchport access vlan 999
Switch1(config-if-range)#end
Switch1#show
Switch1#show vlan
Switch1#show run | begin int
Switch1#conf t
Switch1(config)#int gig 0/1
Switch1(config-if)#des
Switch1(config-if)#description LINK_TO_SW1
Switch1(config-if)int gig 0/2
Switch1(config-if)#dis
Switch1(config-if)#des
Switch1(config-if)#description LINK_TO_SW2
Switch1(config-if)#exit
Switch1(config)#end
Switch1#show int
Switch1#show int des
Switch1#show int description
Switch1#conf t
Switch1(config)#banner login $
Enter TEXT message. End with the chararacter ā$ā
W A R N I N G Enter (takes to next line)
Authorized users only. Violators will be prosecuted. $
Switch1(config)#end
Switch1#conf t
Switch1(config)#line con 0
Switch1(config-line)#login
% login disabled on line 0, until āpasswordā is set
Switch1(config-line)#password cisco
Switch1(config-line)#end
Switch1#exit
User Access Verification Password:
Switch1>en
Password: cisco (Encrypted)
Password: cisco (Encrypted)
Switch1#show run | begin line
You can see passwords in plain text
Switch1#conf t
Switch1(config)#service
Switch1(config)#service pass
Switch(config)#service password ā encryption
Switch1(config)#end |
Swith1(config)#end
Switch1#show run | begin line
Switch - 2 Configuration
Switch>en
Switch#conf t
Switch(config)#hostname Switch2
Switch2(config)#enable password password
Switch2(config)#enable secret cisco Switch2(config)#end
Switch2#conf t
Switch2(config)#line con 0
Switch2(cofig-line)#logging synchronous
Switch2(config-line)#exec-timeout 0 0
Switch2(config-line)#line vty 0 15
Switch2(config-line)#login
Switch2(config-line)#password cisco
Switch2(config-line)#end
Switch2#conf t
Switch2(config)#vlan 999
Switch2(config-vlan)#name VLAN1
Switch2(config-vlan)#exit
Swith1(config)#int ra fa 0/11 -24
Switch2(config-if-range)#switch mode access
Switch2(config-if-range)#switchport acc
Switch2(config-if-range)#switchport access v1
Switch2(config-if-range)#switchport access vlan 999
Switch2(config-if-range)#end
Switch2#show
Switch2#show vlan
Switch2#show run | begin int
Switch2#conf t
Switch2(config)#int gig 0/1
Switch2(config-if)#des
Switch2(config-if)#description LINK_TO_SW1
Switch2(config-if)int gig 0/2
Switch2(config-if)#dis
Switch2(config-if)#des
Switch2(config-if)#description LINK_TO_SW2
Switch2(config-if)#exit
Switch2(config)#end
Switch2#show int
Switch2#show int des
Switch2#show int description
Switch2#conf t
Switch2(config)#banner login $
Enter TEXT message. End with the chararacter ā$ā
W A R N I N G Enter (takes to next line)
Authorized users only. Violators will be prosecuted. $
Switch2(config)#end
Switch2#conf t
Switch2(config)#line con 0
Switch2(config-line)#login
% login disabled on line 0, until āpasswordā is set
Switch2(config-line)#password cisco Switch2(config-line)#end
Switch2#exit
User Access Verification Password:
Switch2>en
Password: cisco (Encrypted)
Password: cisco (Encrypted)
Switch2#show run | begin line
You can see passwords in plain text
Switch2#conf t
Switch2(config)#service
Switch2(config)#service pass
Switch(config)#service password ā encryption
Switch2(config)#end |
Swith1(config)#end
Switch2#show run | begin line
Switch - 1 to PC1: SSH
Switch1>en
Password: cisco (encrypted)
Switch1#conf t
Enter configuration commands, one per line
Switch1(config)#line vty 0 15
Switch1(config-line)#password cisco
Switch1(config-line)#login
Switch1(config-line)#end
Switch1#
% Sys-5-Config_I: Configured from console by console
Switch1#conf t
Enter configuration commands, one per line
Switch1(config)#ip domain-name PC1
Switch1(config)#crypto key generate rsa
The name for the keys will be: Switch1.PC1
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys.
Choosing a key modulus greater than 512 may take a few minutes.
How many bits in the modulus[512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportableā¦[OK]
Switch1(config)#ip SSH version 2
* August 22 21:30:0:0: % SSH-5-Enabled: SSH1.99 has been enabled
Switch1(config)#line vty 0 15 Switch1(config-line)#transport input ?
all - All Protocols none - No Protocols ssh - TCP/IP SSH protocol telnet - TCP/IP Telnet protocol Switch1(config-line)#transport input ssh
Switch1(config-line)#Crtl Z
Switch1#
% Sys 5-Config_I: Configured from console by console
Switch1#show ip ssh
Authentication timeout: 120 secs, Authentication retries 3
Switch1>enable
Password: cisco (encrypted)
Switch1#configure terminal
Enter configuration commands, one per line
Switch1(config)#username PC1 secret cisco
Switch1(config)#line vty 0 15
Switch1(config-line)#login local Switch1(config-line)#end
Switch - 2 to PC2: SSH
Switch2>en
Password: cisco (encrypted)
Switch2#conf t
Enter configuration commands, one per line
Switch2(config)#line vty 0 15
Switch2(config-line)#password cisco
Switch2(config-line)#login
Switch2(config-line)#end
Switch2#
% Sys-5-Config_I: Configured from console by console
Switch2#conf t
Enter configuration commands, one per line
Switch2(config)#ip domain-name PC2
Switch2(config)#crypto key generate rsa
The name for the keys will be: Switch2.PC2
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys.
Choosing a key modulus greater than 512 may take a few minutes.
How many bits in the modulus[512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportableā¦[OK]
Switch2(config)#ip SSH version 2
* August 22 21:30:0:0: % SSH-5-Enabled: SSH1.99 has been enabled
Switch2(config)#line vty 0 15
Switch2(config-line)#transport input ?
all - All Protocols none - No Protocols ssh - TCP/IP SSH protocol telnet - TCP/IP Telnet protocol Switch2(config-line)#transport input ssh
Switch2(config-line)#Crtl Z
Switch2#
% Sys 5-Config_I: Configured from console by console
Switch2#show ip ssh
Authentication timeout: 120 secs, Authentication retries 3
Switch2>enable
Password: cisco (encrypted)
Switch2#configure terminal
Enter configuration commands, one per line
Switch2(config)#username PC2 secret cisco
Switch2(config)#line vty 0 15
Switch2(config-line)#login local Switch2(config-line)#end
Switch - 1 to Switch - 2
Switch#
% Sys-5-Config_I: Configured from console by console
Switch1# conf 1
Switch(config)# int fa0/23
Switch1(config-if)sw
Switch1(config-if)#switchport mode access
Switch1(config-if)#sw
Switch1(config-if)#switchport access vlan99
Switch1(config-if)#
Switch>en
Switch#conf t
Switch(Config)#hostname Switch2
Switch2(config)# vlan99
Switch2(config-vlan)#name vlan2
Switch2(config-vlan)# Ctrl Z
Switch2#
Switch2#conf t
Swtich2(config)# int vlan 99
% Link-5-changed: interface Vlan 99, changed state to up
Switch2(config-if)# ip address 192.168.99.3 255.255.255.0
Switch2(config-if)#no shut
Switch2(config-if)#end
Switch2#cconf t
Switch2(config)#int fa 0/23
Switch2(config-if)#sw
Swith2(config-if)# switchport mode access
Switch2(config-if)#sw
Switch2(config-if)#switchport access vlan 99 Switch2(config-if)#Ctrl Z
Switch2#
Switch2#ping 192.168.99.2
Type escape sequence to abort
Sending 5, 100-byte ICMP Echos to 192.168.99.2, time out is 2 seconds
. . . .
Success rate is 0 percent (0/5)
Switch2#ping 192.168.99.2
Type escape sequence to abort
Sending 5, 100-byte ICMP Echos to 192.168.99.2, timeout is 2 seconds
. ! ! ! !
Success rate is 80 percent (4/5), round trip min/avg/max = 4/4/5 ms
Switch2#ssh Switch2#ssh ?
Switch2#ssh ā v -2 ā L switch2 192.168.99.2
Password: cisco (Encrypted)
Switch1>ā
Write out the full command line syntax to (1) save the configurations; (2) verify connectivity from one PC through the network to the other PC (use two different commands to do this); (3) display the saved configuration of the devices; and (4) display the routing table.
Saved Configurations
Router ā Router#wr
Router#write memory
Router#exit
Switch ā Switch1#enable
Switch1#copy running-config startup-config To display the startup configuration:
Switch1>enable
Switch1#copy startup-config running-config To erase both configuration files:
Switch1>enable
Switch1#write erase
Switch1#reload
Connectivity Verification from first PC through network to second PC
Switch2#ping 192.168.99.2
Type escape sequence to abort
Sending 5, 100-byte ICMP Echos to 192.168.99.2
Timeout is 2 seconds:
. ! ! ! !
Success rate is 80 percent (4/5), round trip min/avg/max = 4/4/5 ms
Switch2#ipconfig /all
Display of saved configurations of devices
Cisco Router ā Router>conf t
Router(config)#enable secret cisco1
Router(config)#terminal length 0
Router(config)#show run
Router(config)#show run brief
Router(config)#end
Router #
Cisco Switch Switch1>conf t
Switch1(config)#enable secret cisco1
Switch1(config)#terminal length 0
Switch1(config)#show run
Switch1(config)#show run brief
Switch1(config)#end
Switch1 #
Routing Table
Show ip route 192.168.1.1
Show ip route 192.168.1.9
IP Mask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.21 Internet 276 10.1.0.0 255.255.0.0 10.1.255.253 VPN 276
10.1.255.253 255.255.255.255 10.1.255.253 VPN 276
127.0.0.0 255.0.0.0 127.0.0.1 Null nic 306
127.0.0.1 255.255.255.255 127.0.0.1 Null nic 306
127.255.255.255 255.255.255.255 127.0.01 Null nic 306
192.168.1.0 255.255.255.0 192.168.1.20 Internet 276
192.168.1.20 255.255.255.255 192.168.1.20 Internet 276
192.168.1.255 255.255.255.255 192.168.1.20 Internet 276
192.168.2.0 255.255.255.0 192.168.2.2 HomeRealtek 276
192.168.2.2 255.255.255.255 192.168.2.2 HomeRealtek 276
192.168.2.255 255.255.255.255 192.168.2.2 HomeRealtek 276
192.168.11.0 255.255.255.0 192.168.11.1 <null> 276
192.168.11.1 255.255.255.255 192.168.11.1 <null> 276
192.168.11.255 255.255.255.255 192.168.11.1 <null> 276
192.168.12.0 255.255.255.0 192.168.12.1 <null> 276
192.168.12.1 255.255.255.255 192.168.12.1 <null> 276
192.168.12.255 255.255.255.255 192.168.12.1 <null> 276
192.168.56.0 255.255.255.0 192.168.56.1 VirtualBox Host- 276 Only
192.168.56.1 255.255.255.255 192.168.56.1 VirtualBox Host- 276 Only
192.168.56.255 255.255.255.255 192.168.56.1 VirtualBox Host- 276 Only
192.168.57.0 255.255.255.0 192.168.57.1 VirtualBox Host- 276 Only
192.168.57.1 255.255.255.255 192.168.57.1 VirtualBox Host- 276 Only
192.168.57.255 255.255.255.255 192.168.57.1 VirtualBox Host- 276 Only
Answer the following: What part of this project was the most difficult and why? Do you feel more confident in your ability to actually build this kind of a network having completed this project? Why or why not?
HEP 456 Module 5 Section 12 and 13 Planning for Analysis and Interpretation and Gantt chartĀ Name HEP 456: ā¦
NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Question 1 1 / 1 pts I have read the ASU ā¦
HEP 456 Module 6 Section 14 Communication and Dissemination of The Findings HEP 456: Health Promotion Program ā¦