NETW 202 GROUP DISCUSSION-NETWORK CONFIGURATION

31 July, 2024 | 8 Min Read

NETW202 GROUP PROJECT PROF:

TEAM MEMBERS:ā€ƒ

Draw a small Local Area Network that consists of one router, two switches, and two PCs basically in this layout: PC1 - Switch1 - Router - Switch2 - PC2. Copy and paste your diagram on to the second page of your Word document.

Write out the full configuration of ALL of the devices in your network to include two IPv4 subnets with the appropriate IP addresses, subnet masks, default gateways, and VLAN1 addresses. Include names for the devices and provide secure passwords at all levels of the network appliances. Include SSH on the router.

Router Configuration

Router(config)#hostname Router

Router(config)#Line console 0

Router(config-line)#password cisco1

Router(config-line)#login

Router(config-line)#exit

Router(config)#line vty 0

Router(config-line)#transport input ssh

Router(config-line)#password cisco1

Router(config-line)#login

Router(config-line)#exit

Router(config)#enable secret cisco1

Router(config)#exit

Router#wr

Router# write memory

Router#exit

User Access Verification

Password: cisco1

Router>en

Password:cisco1

Router#conf t

Router(config)#interface fastethernet0/0

Router(config-if)#ip address 192.168.1.1 255.255.255.0

Router(config-if)#desc connection to SW1

Router(config-if)#no shutdown

Router(config-if)#exit

Routr(config)#exit

Router#

Router#show ip interface brief

Router#show interfacef0/0

Router#conf t

Router(config)# dhcp ?

Router(config)# ip dhcp pool Pool1

Router(dhcp-config)#network 192.168.1.0

Router(dhcp-config)#default router 192.168.1.1

Router(dhcp-config)#dns-server 192.168.1.10

Router(dhcp-config)#exit

Router(config)#ip dhcp excluded address ?

Router(config)#ip dhcp excluded address 192.168.1.100? Router(config)#ip dhcp excluded address 192.168.1.100 192.168.1.150 Router(config)#ip route?

Router(config)# ip route 172.16.0.0?

Router(config)#ip route 172.16.0.0 255.255.0.0?

Router(config)#ip route 172.16.0.0 255.255.0.0 serial?

Router(config)#ip route 172.16.0.0 255.255.0.0 serial0/0?

Router(config)#ip route 172.16.0.0 255.255.0.0 serial 0/0

Router(config)#exit

Router#show1

C 192.168.1.0/24 is directly connected, Fastethernet0/0 Router#

Switch - 1 Configuration

Switch>en

Switch#conf t

Switch(config)#hostname Switch1

Switch1(config)#enable password password

Switch1(config)#enable secret cisco

Switch1(config)#end

Switch1#conf t

Switch1(config)#line con 0

Switch1(cofig-line)#logging synchronous

Switch1(config-line)#exec-timeout 0 0

Switch1(config-line)#line vty 0 15

Switch1(config-line)#login

Switch1(config-line)#password cisco

Switch1(config-line)#end

Switch1#conf t

Switch1(config)#vlan 999

Switch1(config-vlan)#name VLAN1

Switch1(config-vlan)#exit

Swith1(config)#int ra fa 0/11 -24

Switch1(config-if-range)#switch mode access

Switch1(config-if-range)#switchport acc

Switch1(config-if-range)#switchport access v1

Switch1(config-if-range)#switchport access vlan 999

Switch1(config-if-range)#end

Switch1#show

Switch1#show vlan

Switch1#show run | begin int

Switch1#conf t

Switch1(config)#int gig 0/1

Switch1(config-if)#des

Switch1(config-if)#description LINK_TO_SW1

Switch1(config-if)int gig 0/2

Switch1(config-if)#dis

Switch1(config-if)#des

Switch1(config-if)#description LINK_TO_SW2

Switch1(config-if)#exit

Switch1(config)#end

Switch1#show int

Switch1#show int des

Switch1#show int description

Switch1#conf t

Switch1(config)#banner login $

Enter TEXT message. End with the chararacter ā€˜$’

W A R N I N G Enter (takes to next line)

Authorized users only. Violators will be prosecuted. $

Switch1(config)#end

Switch1#conf t

Switch1(config)#line con 0

Switch1(config-line)#login

% login disabled on line 0, until ā€˜password’ is set

Switch1(config-line)#password cisco

Switch1(config-line)#end

Switch1#exit

User Access Verification Password:

Switch1>en

Password: cisco (Encrypted)

Password: cisco (Encrypted)

Switch1#show run | begin line

You can see passwords in plain text

Switch1#conf t

Switch1(config)#service

Switch1(config)#service pass

Switch(config)#service password – encryption

Switch1(config)#end |

Swith1(config)#end

Switch1#show run | begin line

Switch - 2 Configuration

Switch>en

Switch#conf t

Switch(config)#hostname Switch2

Switch2(config)#enable password password

Switch2(config)#enable secret cisco Switch2(config)#end

Switch2#conf t

Switch2(config)#line con 0

Switch2(cofig-line)#logging synchronous

Switch2(config-line)#exec-timeout 0 0

Switch2(config-line)#line vty 0 15

Switch2(config-line)#login

Switch2(config-line)#password cisco

Switch2(config-line)#end

Switch2#conf t

Switch2(config)#vlan 999

Switch2(config-vlan)#name VLAN1

Switch2(config-vlan)#exit

Swith1(config)#int ra fa 0/11 -24

Switch2(config-if-range)#switch mode access

Switch2(config-if-range)#switchport acc

Switch2(config-if-range)#switchport access v1

Switch2(config-if-range)#switchport access vlan 999

Switch2(config-if-range)#end

Switch2#show

Switch2#show vlan

Switch2#show run | begin int

Switch2#conf t

Switch2(config)#int gig 0/1

Switch2(config-if)#des

Switch2(config-if)#description LINK_TO_SW1

Switch2(config-if)int gig 0/2

Switch2(config-if)#dis

Switch2(config-if)#des

Switch2(config-if)#description LINK_TO_SW2

Switch2(config-if)#exit

Switch2(config)#end

Switch2#show int

Switch2#show int des

Switch2#show int description

Switch2#conf t

Switch2(config)#banner login $

Enter TEXT message. End with the chararacter ā€˜$’

W A R N I N G Enter (takes to next line)

Authorized users only. Violators will be prosecuted. $

Switch2(config)#end

Switch2#conf t

Switch2(config)#line con 0

Switch2(config-line)#login

% login disabled on line 0, until ā€˜password’ is set

Switch2(config-line)#password cisco Switch2(config-line)#end

Switch2#exit

User Access Verification Password:

Switch2>en

Password: cisco (Encrypted)

Password: cisco (Encrypted)

Switch2#show run | begin line

You can see passwords in plain text

Switch2#conf t

Switch2(config)#service

Switch2(config)#service pass

Switch(config)#service password – encryption

Switch2(config)#end |

Swith1(config)#end

Switch2#show run | begin line

Switch - 1 to PC1: SSH

Switch1>en

Password: cisco (encrypted)

Switch1#conf t

Enter configuration commands, one per line

Switch1(config)#line vty 0 15

Switch1(config-line)#password cisco

Switch1(config-line)#login

Switch1(config-line)#end

Switch1#

% Sys-5-Config_I: Configured from console by console

Switch1#conf t

Enter configuration commands, one per line

Switch1(config)#ip domain-name PC1

Switch1(config)#crypto key generate rsa

The name for the keys will be: Switch1.PC1

Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys.

Choosing a key modulus greater than 512 may take a few minutes.

How many bits in the modulus[512]: 1024

% Generating 1024 bit RSA keys, keys will be non-exportable…[OK]

Switch1(config)#ip SSH version 2

* August 22 21:30:0:0: % SSH-5-Enabled: SSH1.99 has been enabled

Switch1(config)#line vty 0 15 Switch1(config-line)#transport input ?

all - All Protocols none - No Protocols ssh - TCP/IP SSH protocol telnet - TCP/IP Telnet protocol Switch1(config-line)#transport input ssh

Switch1(config-line)#Crtl Z

Switch1#

% Sys 5-Config_I: Configured from console by console

Switch1#show ip ssh

Authentication timeout: 120 secs, Authentication retries 3

Switch1>enable

Password: cisco (encrypted)

Switch1#configure terminal

Enter configuration commands, one per line

Switch1(config)#username PC1 secret cisco

Switch1(config)#line vty 0 15

Switch1(config-line)#login local Switch1(config-line)#end

Switch - 2 to PC2: SSH

Switch2>en

Password: cisco (encrypted)

Switch2#conf t

Enter configuration commands, one per line

Switch2(config)#line vty 0 15

Switch2(config-line)#password cisco

Switch2(config-line)#login

Switch2(config-line)#end

Switch2#

% Sys-5-Config_I: Configured from console by console

Switch2#conf t

Enter configuration commands, one per line

Switch2(config)#ip domain-name PC2

Switch2(config)#crypto key generate rsa

The name for the keys will be: Switch2.PC2

Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys.

Choosing a key modulus greater than 512 may take a few minutes.

How many bits in the modulus[512]: 1024

% Generating 1024 bit RSA keys, keys will be non-exportable…[OK]

Switch2(config)#ip SSH version 2

* August 22 21:30:0:0: % SSH-5-Enabled: SSH1.99 has been enabled

Switch2(config)#line vty 0 15

Switch2(config-line)#transport input ?

all - All Protocols none - No Protocols ssh - TCP/IP SSH protocol telnet - TCP/IP Telnet protocol Switch2(config-line)#transport input ssh

Switch2(config-line)#Crtl Z

Switch2#

% Sys 5-Config_I: Configured from console by console

Switch2#show ip ssh

Authentication timeout: 120 secs, Authentication retries 3

Switch2>enable

Password: cisco (encrypted)

Switch2#configure terminal

Enter configuration commands, one per line

Switch2(config)#username PC2 secret cisco

Switch2(config)#line vty 0 15

Switch2(config-line)#login local Switch2(config-line)#end

Switch - 1 to Switch - 2

Switch#

% Sys-5-Config_I: Configured from console by console

Switch1# conf 1

Switch(config)# int fa0/23

Switch1(config-if)sw

Switch1(config-if)#switchport mode access

Switch1(config-if)#sw

Switch1(config-if)#switchport access vlan99

Switch1(config-if)#

Switch>en

Switch#conf t

Switch(Config)#hostname Switch2

Switch2(config)# vlan99

Switch2(config-vlan)#name vlan2

Switch2(config-vlan)# Ctrl Z

Switch2#

Switch2#conf t

Swtich2(config)# int vlan 99

% Link-5-changed: interface Vlan 99, changed state to up

Switch2(config-if)# ip address 192.168.99.3 255.255.255.0

Switch2(config-if)#no shut

Switch2(config-if)#end

Switch2#cconf t

Switch2(config)#int fa 0/23

Switch2(config-if)#sw

Swith2(config-if)# switchport mode access

Switch2(config-if)#sw

Switch2(config-if)#switchport access vlan 99 Switch2(config-if)#Ctrl Z

Switch2#

Switch2#ping 192.168.99.2

Type escape sequence to abort

Sending 5, 100-byte ICMP Echos to 192.168.99.2, time out is 2 seconds

. . . .

Success rate is 0 percent (0/5)

Switch2#ping 192.168.99.2

Type escape sequence to abort

Sending 5, 100-byte ICMP Echos to 192.168.99.2, timeout is 2 seconds

. ! ! ! !

Success rate is 80 percent (4/5), round trip min/avg/max = 4/4/5 ms

Switch2#ssh Switch2#ssh ?

Switch2#ssh – v -2 – L switch2 192.168.99.2

Password: cisco (Encrypted)

Switch1>ā€ƒ

Write out the full command line syntax to (1) save the configurations; (2) verify connectivity from one PC through the network to the other PC (use two different commands to do this); (3) display the saved configuration of the devices; and (4) display the routing table.

Saved Configurations

Router – Router#wr

Router#write memory

Router#exit

Switch – Switch1#enable

Switch1#copy running-config startup-config To display the startup configuration:

Switch1>enable

Switch1#copy startup-config running-config To erase both configuration files:

Switch1>enable

Switch1#write erase

Switch1#reload

Connectivity Verification from first PC through network to second PC

Switch2#ping 192.168.99.2

Type escape sequence to abort

Sending 5, 100-byte ICMP Echos to 192.168.99.2

Timeout is 2 seconds:

. ! ! ! !

Success rate is 80 percent (4/5), round trip min/avg/max = 4/4/5 ms

Switch2#ipconfig /all

Display of saved configurations of devices

Cisco Router – Router>conf t

Router(config)#enable secret cisco1

Router(config)#terminal length 0

Router(config)#show run

Router(config)#show run brief

Router(config)#end

Router #

Cisco Switch Switch1>conf t

Switch1(config)#enable secret cisco1

Switch1(config)#terminal length 0

Switch1(config)#show run

Switch1(config)#show run brief

Switch1(config)#end

Switch1 #

Routing Table

Show ip route 192.168.1.1

Show ip route 192.168.1.9

IP Mask Gateway Interface Metric

0.0.0.0 0.0.0.0 192.168.1.21 Internet 276 10.1.0.0 255.255.0.0 10.1.255.253 VPN 276

10.1.255.253 255.255.255.255 10.1.255.253 VPN 276

127.0.0.0 255.0.0.0 127.0.0.1 Null nic 306

127.0.0.1 255.255.255.255 127.0.0.1 Null nic 306

127.255.255.255 255.255.255.255 127.0.01 Null nic 306

192.168.1.0 255.255.255.0 192.168.1.20 Internet 276

192.168.1.20 255.255.255.255 192.168.1.20 Internet 276

192.168.1.255 255.255.255.255 192.168.1.20 Internet 276

192.168.2.0 255.255.255.0 192.168.2.2 HomeRealtek 276

192.168.2.2 255.255.255.255 192.168.2.2 HomeRealtek 276

192.168.2.255 255.255.255.255 192.168.2.2 HomeRealtek 276

192.168.11.0 255.255.255.0 192.168.11.1 <null> 276

192.168.11.1 255.255.255.255 192.168.11.1 <null> 276

192.168.11.255 255.255.255.255 192.168.11.1 <null> 276

192.168.12.0 255.255.255.0 192.168.12.1 <null> 276

192.168.12.1 255.255.255.255 192.168.12.1 <null> 276

192.168.12.255 255.255.255.255 192.168.12.1 <null> 276

192.168.56.0 255.255.255.0 192.168.56.1 VirtualBox Host- 276 Only

192.168.56.1 255.255.255.255 192.168.56.1 VirtualBox Host- 276 Only

192.168.56.255 255.255.255.255 192.168.56.1 VirtualBox Host- 276 Only

192.168.57.0 255.255.255.0 192.168.57.1 VirtualBox Host- 276 Only

192.168.57.1 255.255.255.255 192.168.57.1 VirtualBox Host- 276 Only

192.168.57.255 255.255.255.255 192.168.57.1 VirtualBox Host- 276 Only

Answer the following: What part of this project was the most difficult and why? Do you feel more confident in your ability to actually build this kind of a network having completed this project? Why or why not?

Related posts