0% found this document useful (0 votes)
11 views

Lab's_assignment

Uploaded by

Hager Babiker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Lab's_assignment

Uploaded by

Hager Babiker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Lab’s Assignment

Name : Fatima Mustafa ABUBAKER OSMAN


Index number : 20-633
Level : 3rd IT

1. Device Setup :
Task 1 : Advanced IP Address Configuration :
Steps :

Set router(2911) and connect with switch by copper straight and connect the PCs to
switch by copper straight.

2.Configure the Router’s Interfaces:

From router0 :
Description of Router configuration :
Router Configuration:
Enter privileged mode:
Router> enable :
Purpose: Enables access to privileged EXEC mode for configuration commands.
Access global configuration mode:
Router# configure terminal
Purpose: Allows configuration of the router settings.
interface g0/0: Select an interface (gigabit ethernet0/0)
ip address 192.168.2.1 255.255.255.0: Assign static IPs to router interfaces for subnet
separation.
no shutdown: Enable the interface.

3. Assign IPs to PCs:

2. PC Configuration:
Assign static IPs, subnet masks, and default gateways to ensure each PC is in the correct
subnet.

PC 1:
IP : 192.168.1.2,
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1
PC 2:
IP: 192.168.2.2
Subnet Mask: 255.255.255.0,
Default Gateway: 192.168.2.1

PC 3:
IP: 192.168.3.2
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.3.1 :
Verification Steps :
1. Ping within Subnets:
● Ping from PC1 in the same subnet and ping to the default gateway :

The reply was received from pc1 in the subnet and received from his gateway this means
the configuration works as well

● Ping from PC2 in the same subnet and Ping to the default gateway :

The reply was received from pc1 in the subnet and received from his gateway this means
the configuration works as well
● Ping from PC3 in the same subnet and Ping to the default gateway :

The reply was received from pc1 in the subnet and received from his gateway this
means the configuration works as well
Troubleshooting Notes :

The issue is that the ping from the pc2 to the gateway is not working and from pc3 to the
gateway is not working because I use a router with a single port.
The solution was replaced by a router with three ports.
Task 2: Implementing Access Control Lists (ACLs)
Device Setup:

1. Server Configuration :
Set a server in the workspace and connect it to the switch, and Assign the server an IP
address (192.168.1.10) in Subnet A.
Purpose: To ensure the server is accessible and identifiable within the network.

2.. Apply the ACL to the Interface and Configure ACL on the Router:

Apply ACL 100:


Router(config)# access-list 100 permit ip 192.168.2.0 0.0.0.255 any
Purpose: Permits traffic from Subnet B (192.168.2.0/24) to any destination, including the
server.

Deny traffic from Subnet C:


Router(config)# access-list 100 deny ip 192.168.3.0 0.0.0.255 any
Purpose: Blocks traffic from Subnet C (192.168.3.0/24) to any destination, including the
server.
Apply ACL 100 to the interface:
Router(config)# interface g0/0
Router(config-if)# ip access-group 100 in
Purpose: Ensures the ACL is enforced on incoming traffic to the router's g0/0 interface.

Verification Steps :
1.Ping the Server from Subnet B:

Result: The ping is successful.


Reason: Traffic from Subnet B is permitted by the ACL

2.Ping the Server from Subnet C :

Result : The ping fails.


Reason : Traffic from subnet C is deny by the ACL
Task 3: VLAN Trunking and Inter-Switch Connectivity :
1. Device Setup:

1. Adding and Connecting Devices:


Connect two switches using a crossover cable on ports Fa0/24 and attach PCs to various
ports for VLAN testing.
Purpose: Establish a physical setup to facilitate VLAN communication across switches.

2. Create VLANs on Both Switches and Assign Ports to VLANs and Configure Trunk
Link
3. Create VLANs:
Purpose: Define VLANs 10, 20, and 30 for segregating network traffic by departments
(Sales, HR, IT).
Assigning Ports to VLANs

1. Configure ports for access mode and assign them to VLANs:


Switch(config)# interface fa0/1
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 10

Purpose: Designates port Fa0/1 for VLAN 10 (Sales), Fa0/2 for vlan 20 (HR), Fa0/3 for Vlan
30 (HR)

Configuring the Trunk Link :

1. Set Fa0/24 as a trunk port:


Switch(config)# interface fa0/24
Switch(config-if)# switchport mode trunk

Purpose: Enables the port to carry traffic for all VLANs between the two switches.
On the first switch :

On the second switch :


IP Configuration for the first pc in vlan 10 :

IP Configuration for the first pc in vlan 20 :


IP Configuration for the first pc in vlan 30 :

IP configuration for the second pc in vlan 10


IP configuration for the second PC in vlan 20

IP configuration fir the second PC in vlan 30


Verification Steps :
1. Ping Test Within VLANs:
● Ping From pc(id is 192.168.10.2) to pc (id is 192.168.10.3)

Result: The ping should succeed, confirming VLAN trunking is operational and VLAN 10
traffic flows correctly between switches.

● Ping From pc(id is 192.168.30.3) to pc (id is 192.168.30.2)

Result: The ping should succeed, confirming VLAN trunking is operational and VLAN 30
traffic flows correctly between switches.
● Ping From pc(id is 192.168.20.2) to pc (id is 192.168.20.3)

Result: The ping should succeed, confirming VLAN trunking is operational and VLAN 20
traffic flows correctly between switches.
2. Verify Trunk Link:
From the first switch :

Result : Port Fa0/24 is listed as a trunk with all VLANs allowed.

From the second switch :

Result : Port Fa0/24 is listed as a trunk with all VLANs allowed.


Task 4: Static Routing Configuration :
1. Device Setup:

Placing two routers and connecting them with a Crossover link:


This step ensures physical connectivity between the two routers for inter-network
communication.

2. Configure Static Routes :


On the first router :
Router1 Configuration:
ip route 10.0.2.0 255.255.255.0 192.168.4.2:
This command sets a static route on Router1 to reach the LAN of Router2 (10.0.2.0/24) via
the next-hop address 192.168.4.2 (Router2's WAN interface).

The second router :

Router2 Configuration:

IP route 10.0.1.0 255.255.255.0 192.168.4.1:


This command adds a static route on Router2 to reach the LAN of Router1 (10.0.1.0/24) via
the next-hop address 192.168.4.1 (Router1's WAN interface).
Assign ips for pcs :

Ip for first pc :

Ip for second pc
Verification Steps :
1. Ping Across LANs:

A ping test is conducted from a PC in Router1’s LAN (10.0.1.2) to a PC in Router2’s LAN


(10.0.2.2), the ping should succeed, confirming that packets are successfully routed between
the two LANs.

2. Check Routing Table:


Router 1

Show ip route
This command display the routing table for router1
Router 2

Show ip route
This command display the routing table for router1
Task 5: Configuring Wireless Security with MAC Filtering
1. Device Setup :

Device Setup

Purpose: Establish a basic network setup to simulate wireless access.


Add a Wireless Router: Connect it to the main network switch to provide wireless
connectivity.
Add Three Wireless-Enabled PCs: These represent authorized devices that will connect to
the wireless network.

2. Wireless Security Configuration :

Purpose: Secure the wireless network to prevent unauthorized access.


3. Enable MAC Filtering :

Purpose: Allow only specific devices to connect to the network by filtering based on MAC
addresses.

Add the MAC addresses of the three authorized devices to the filter list.
Explanation: MAC filtering ensures that only devices with listed MAC addresses can access
the network, adding an additional layer of security.
Verification Steps
1. Connect Authorized Devices:
On each authorized wireless-enabled PC:
Enter the WPA2 passphrase (securepassword).
Attempt to connect to the wireless network.
Expected Result: All three authorized devices should successfully connect to the network.

Device 1
Device 2
2. Test Unauthorized Device Access:
Attempt to connect an unauthorized device (one not listed in the MAC filter).
Expected Result: The connection should fail, verifying that MAC filtering is active and
blocking unauthorized devices.

You might also like