0% found this document useful (0 votes)
106 views12 pages

Topology:: Addressing Table

This document contains configuration details for routers, switches and PCs in a network topology. It describes IP addressing schemes, VLAN configurations on switches, OSPF routing protocol configuration on routers and ACL for NAT on router R1. Key devices include routers R1, R2 and R3, and switches S1, S2 and S3. The topology interconnects VLANs for different departments on the switches and establishes routing between subnets.

Uploaded by

Hassan Ajmal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views12 pages

Topology:: Addressing Table

This document contains configuration details for routers, switches and PCs in a network topology. It describes IP addressing schemes, VLAN configurations on switches, OSPF routing protocol configuration on routers and ACL for NAT on router R1. Key devices include routers R1, R2 and R3, and switches S1, S2 and S3. The topology interconnects VLANs for different departments on the switches and establishes routing between subnets.

Uploaded by

Hassan Ajmal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Topology:

Part 1:
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway

R1 G0/0 191.0.0.2 255.255.0.0 N/A

R1
G0/1 191.10.0.1 255.255.0.0

R1

R3 G0/0 191.0.0.3 255.255.0.0 N/A

R2
G0/1 191.20.0.1 255.255.0.0

R2

S1 VLAN 2 (CS Dept) 191.2.0.0 255.255.0.0 191.2.0.1


S2 VLAN 3 (HR Dept) 191.3.0.0 255.255.0.0 191.3.0.1
S3 VLAN 4 (Management) 191.4.0.0 255.255.0.0 191.4.0.1
S3 VLAN 6 (Web Server) 191.6.0.0 255.255.0.0 191.6.0.1

Part 3:
Addressing Table:
Description PC-A PC-B PC-C PC-D Webserver
IP Address 191.2.0.2 191.2.0.3 191.4.0.2 191.3.0.2 191.6.0.2
Subnet Mask 255.255.0.0 255.255.0.0 255.255.0.0 255.255.0.0 255.255.0.0
Default Gateway 191.2.0.1 191.2.0.1 191.4.0.1 191.3.0.1 191.6.0.1

Commands:
Part 1:
Configuring Routers:
R1:
#en
#conf t
#config-register 0x2102
#end
#wr
#reload
#en
#conf t
#no ip domain-lookup
#hostname R1
#enable secret ciscopass1
#line console 0
#password ciscopass11
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret Cisco123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd “unauthorized access no allowed….. FA19-BCS-049”
#int g0/1
#ip address 191.10.0.2 255.255.0.0
#no shut
#int g0/0
#ip address 191.0.0.1 255.255.0.0
#no shut

Creating 802.1q trunk:


#en
#conf t
#int g0/1
#int g0/1.2
#encapsulation dot1Q 2
#ip address 191.2.0.1 255.255.0.0
#int g0/1.3
#encapsulation dot1Q 3
#ip address 191.3.0.1 255.255.0.0

R3:
#en
#conf t
#config-register 0x2102
#end
#wr
#reload
#en
#conf t
#no ip domain-lookup
#hostname R3
#enable secret ciscopass1
#line console 0
#password ciscopass11
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret Cisco123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd “unauthorized access no allowed….. FA19-BCS-049”
#int g0/1
#ip address 191.20.0.2 255.255.0.0
#no shut
#int g0/0
#ip address 191.0.0.2 255.255.0.0
#no shut

Creating 802.1q trunk:


#en
#conf t
#int g0/1
#int g0/1.4
#encapsulation dot1Q 4
#ip address 191.4.0.1 255.255.0.0
#int g0/1.6
#encapsulation dot1Q 6
#ip address 191.6.0.1 255.255.0.0

Configuration for Swithes:


S1:
#en
#conf t
#no ip domain-lookup
#hostname S1
#enable secret Cisco1234
#line console 0
#password Cisco1234
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret admin123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd # “unthourized access not allowed …….FA19-BCS-049”
#en
#conf t
#vlan 2
#name cs
#vlan 3
#name hr
#vlan 5
#name null
#vlan 1
#int vlan 2
#int vlan 3
#int vlan 1
#int range f0/6-7
#switchport mode access
#switchport access 2
#int range f0/1-4
#switchport mode access
#switchport access vlan 5
#shutdown
#int range f0/6-16
#switchport mode access
#switchport access vlan 5
#shutdown
#int range f0/19-24
#switchport mode access
#switchport access vlan 5
#shutdown
#int f0/5
#switchport mode trunk
#switchport trunk native vlan 1

Configuring the ethernet channel:


#int range fa0/1-2
#channel-group 1 mode passive
#int port-channel 1
#switchport mode trunk
#switchport trunk native vlan 1

S2:
#en
#conf t
#no ip domain-lookup
#hostname S2
#enable secret Cisco1234
#line console 0
#password Cisco1234
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret admin123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd “unathourized access not allowed……….. FA19-BCS-049”
#en
#conf t
#vlan 2
#name cs
#vlan 3
#name hr
#vlan 5
#name null
#vlan 1
#int vlan 2
#int vlan 3
#int vlan 1
#int f0/10
#switchport mode access
#switchport access vlan 3
#int range f0/1-4
#switchport mode access
#switchport access vlan 5
#shutdown
#int range f0/6-16
#switchport mode access
#switchport access vlan 5
#shutdown
#int range f0/19-24
#switchport mode access
#switchport access vlan 5
#shutdown

Configuring the ethernet channel:


#int range fa0/1-2
#channel-group 1 mode passive
#int port-channel 1
#switchport mode trunk
#switchport trunk native vlan 1

S3:
#en
#conf t
#no ip domain-lookup
#hostname S1
#enable secret Cisco1234
#line console 0
#password Cisco1234
#login
#end
#wr
#reload
#en
#conf t
#username admin privilege 15 secret admin123
#line vty 0
#login local
#line vty 0
#transport input telnet
#service password-encryption
#banner motd # “unthourized access not allowed …….FA19-BCS-049”
#en
#conf t
#vlan 4
#name management
#vlan 6
#name webserver
#vlan 5
#name null
#vlan 1
#int vlan 4
#int vlan 6
#int vlan 1
#int f0/18
#switchport mode access
#switchport access vlan 4
#int f0/17
#switchport mode access
#switchport access vlan 6
*now to assign vlan 5
#int range f0/1-4
#switchport mode access
#switchport access vlan 5
#int range f0/6-16
#switchport mode access
#switchport access vlan 5
#int range f0/19-24
#switchport mode access
#switchport access vlan 5
#int f0/5
#switchport mode trunk
#switchport trunk native vlan 1
Part 2:
Configuring ospf routing:
R1:
#en
#conf t
#router ospf 1
#network 191.3.0.0 0.0.255.255 area 0
#network 191.2.0.0 0.0.255.255 area 0
`#network 191.0.0.0 0.0.255.255 area 0
#passive int g0/1

R3:
#en
#conf t
#router ospf 1
#network 191.6.0.0 0.0.255.255 area 0
#network 191.4.0.0 0.0.255.255 area 0
`#network 191.0.0.0 0.0.255.255 area 0
#passive int g0/1

Configuring ACL For Nat on R1:

#ip access-list standard 9


#permit 191.0.0.0 0.255.255.255
#int g0/0
#ip access-group 9 out

You might also like