Professional Documents
Culture Documents
REPORT
On
“Networking Technology and devices”
AT
Guided by Submitted by
Ravinderjeet Singh Roll No. - 15113354
Branch – E.C.E (4th Sem)
While presenting this report I would like to express my deep sense of gratitude to entire
Tata CMC academy staff that were indispensable part of my training giving me unending
training at Tata CMC academy. The training was an extremely productive & enriching
experience, not only technically but also from providing practical skills.
I am extremely thankful to Mr. Ravinderjeet Singh who had devoted a lot of time in guiding and
I must place my gratitude towards Mr. Balkrishan Nangla (H.O.D. of C.S.E. Dept.) for their
valuable advice and guidance in carrying out this enjoyable and productive experience, which
Technology has rapidly grown in past two-three decades. An engineer without practical
knowledge and skills cannot survive in this technical area. Theoretical knowledge does matter
but it is the practical knowledge that is the difference between the best and the better.
Organizations also prefer experienced engineers than fresher ones due to practical knowledge
and industrial exposure of the former. The practical training is highly conductive for solid
foundation for:-
3. Confidence building.
4. Enhancement of creativity.
5. Practicality
TABLE OF CONTENTS
1. COMPANY PROFILE
2. BASIC
3. IP ADDRESS V4
4. IP ROUTING
5. LAN SWITCHING
6. ACL
7. NAT
8. PROJECT
9. REFERCENCES
COMPANY PROFILE
What is Network?
In one network more than one computer connected with each other through centralized device.
They can share files and resources with each other.
LAN
LAN stands for Local Area Network. The scope of the LAN is within one building, one school
or within one lab. In LAN (Hub), media access method is used CSMA/CD in which each
computer sense the carrier before sending the data over the n/w. if carrier is free then you can
transmit otherwise you have to wait or you have to listen. In multiple access each computer have
right that they can access each other. If two computers sense the carrier on same time then the
collision occur. Each computer, in the network, aware about the collision. Now this stop
transmitting and they will use back off algorithm. In which random number is generated. This
number or algorithm is used by each computer. Who has short number or small number, he has
first priority to transmit the data over the network and other computers will wait for their turn.
WAN
WAN stands for Wide Area Network, in which two local area networks are connected through
public n/w. it may be through telecommunication infrastructure or dedicated lines. For e.g: -
ISDN lines, Leased lines etc.
In which we can use WAN devices and WAN technology. You can also connect with your
remote area through existing Internetwork called Internet.
Devices
Hub
Hub is centralized device, which is used to connect multiple workstations. There are two types of
Hub: -
(i) Active Hub
(ii) Passive Hub
it has no special kind of memory. It simply receives the frame (data) and forwards it to all its
nodes except the receiving node. It always performs broadcasting. In case of hub, there is one
collision domain and one broadcast domain. In case of hub, the media access method is used
CSMA/CD (Carrier Sense Multiple Access/Collision Detection).
(i) Active Hub
In Active hub, it receives the frame regenerate and then forward to all its nodes.
Switch is also used to connect multiple workstations. Switch is more intelligent than hub. It has
special kind of memory called mac address/filter/lookup table. Switch reads mac addresses.
Switch stores mac addresses in its filter address table. Switch when receives frame, it reads the
destination mac address and consult with its filter table. If he has entry in its filter table then he
forwards the frame to that particular mac address, if not found then it performs broadcasting to
all its connected nodes.
Every port has its own buffer memory. A port has two queues one is input queue and
second is output queue. When switch receives the frame, the frame is received in input queue and
forward from output queue. So in case of switch there is no chance or place for collisions. In case
of switch, the media access method is used CSMA/CA (Carrier Sense Multiple Access/ Collision
Avoidance). Switches provide more efficiency, more speed and security.
There are two types of switches: -
(i) Manageable switches (can be configured with console cable).
(ii) Non-manageable switches.
We can perform LAN segmentation by using switches.
Bridge
Bridge is a hardware device, which is used to provide LAN segmentation means it is used for
break the collision domain. It has same functionality as performed by switch. We can use bridge
between two different topologies. It has fewer ports. Each port has a own buffer memory. It
works on Data Link Layer of OSI model. It also read mac address and stores it in its filter table.
In case of bridge there is one broadcast domain.
Router
Router is hardware device, which is used to communicate two different networks. Router
performs routing and path determination. It does not perform broadcast information. There are
two types of routers: -
(i) Hardware Routers are developed by Cisco, HP.
(ii) Software Routers is configured with the help of routing and remote access. This feature is
offered by Microsoft. This feature is by default installed, but you have to enable or configure it.
Hardware routers are dedicated routers. They are more efficient.
But in case of software routers, it has less features, slow performance. They are not very much
efficient.
Lan Card
Lan card is media access device. Lan card provide us connectivity in the network. There is a
RJ45 (Registered Jack) connector space on the Lan card. RJ45 is used in UTP cable. There is
another led which is also called heartbeat of Lan card. When any activity occur it may be
receiving or transmitting any kind of data. This led start blinking and also tell us the status of lan
card.
LAN Topologies
BUS Topology
Cable Type – Coaxial
Connector Type – BNC (Bayonet Neill-Concelman), T type, Terminator
Coaxial – Thick Maximum length – 500 meters
N/w devices 100
Coaxial – Thin Maximum length – 185 meters
N/w devices 30
Star Topology
Cable type - UTP
Connector type - RJ45
Maximum Length – 100 meters (with proper color coding)
UTP (Unshielded Twisted Pair)
Ethernet Family
Cross Cable
1 Orange white - Green white
2 Orange - Green
3 Green white - Orange white
4 Blue - Blue
5 Blue white - Blue white
6 Green - Orange
7 Brown white - Brown white
8 Brown - Brown
RJ45 Connector
This layer performs function like logical addressing and path determination. Each
networking device has a physical address that is MAC address. But logical addressing is
easier to communicate on large size network.
Logical addressing defines network address and host address. This type of addressing is
used to simplify implementation of large network. Some examples of logical addressing
are: - IP addresses, IPX addresses etc.
(6) Data Link Layer
The functions of Data Link layer are divided into two sub layers
a. Logical Link Control
b. Media Access Control
(i) Logical Link Control defines the encapsulation that will be used by the NIC to
delivered data to destination. Some examples of Logical Link Control are
ARPA (Ethernet), 802.11 wi-fi.
(ii) Media Access Control defines methods to access the shared media and
establish the identity with the help of MAC address. Some examples of Media
Access Control are CSMA/CD, Token Passing.
Physical Layer is responsible to communicate bits over the media this layer deals with the
standard defined for media and signals. This layer may also perform modulation and
demodulation as required.
Router
Router Access Modes
When we access router command prompt the router will display different modes. According to
the modes, privileges and rights are assigned to the user.
User mode
In this mode, we can display basic parameter and status of the router we can test connectivity and
perform telnet to other devices. In this mode we are not enable to manage & configure router.
Privileged mode
In this mo dede, we can display all information, configuration, perform administration task,
debugging, testing and connectivity with other devices. We are not able to perform here
configuration editing of the router.
The command to enter in this mode is ‘enable’. We have to enter enable password
or enable secret password to enter in this mode. Enable secret has more priority than enable
password. If both passwords are configured then only enable secret will work.
Global configuration
This mode is used for the configuration of global parameters in the router. Global parameters
applied to the entire router.
For e.g: - router hostname or access list of router
The command enter in this mode is ‘configure terminal’.
Line configuration mode
This mode is used to configure lines like console, vty and auxiliary. There are main types of line
that are configured.
(i) Console
router(config)#line console 0
(ii) Auxiliary
router(config)#line aux 0
This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc.
Configuring Password
To display running-configuration
Router#show running-configuration
Router#show startup-configuration
Router#erase startup-configuration
Configuring HostName
Router#configure terminal
Router#hostname <name>
<name>#exit or end or /\z
Configuration Interfaces
Interfaces configuration is one of the most important part of the router configuration. By default,
all interfaces of Cisco router are in disabled mode. We have to use different commands as our
requirement to enable and configure the interface.
Router#configure terminal
Router(config-if)#description <line>
Configuring secondary IP
Router#config terminal
Router(config)#interface <type> <no>
Router(config-if)#IP address 192.168.10.5 255.255.255.0
Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary
Router(config-if)#no shutdown (to enable the interface because they always shutdown)
Router(config-if)#exit
Router#show history
Router#show terminal
Configuring Banners
Banners are just a message that can appear at different prompts according to the type. Different
banners are: -
Subnet Mask
Subnet mask is also 32-bit address, which tell us how many bits are used for network and how
many bits are used for host address.
In Subnet mask Network bits are always 1 and Host bits are always 0.
When we are going to assign IP addresses to our computers then we have to follow some rules.
Rules: -
(1) All Host bits cannot be 0 (10.0.0.0), because it represent network address which is reserved
for router.
(2) All Host bits cannot be 1 (10.255.255.255), because this is broadcast address of that network
(10th network).
(3) All bits cannot be 0 (0.0.0.0), because this address is reserved for Default routing. Default
routing is used in case of Stub n/w (means our network has one exit point).
(4) All bits cannot be 1 (255.255.255.255), because this is reserved for Broadcasting.
(5) 127.0.0.1 - This is Loopback address, which is used for self-communication or
troubleshooting purpose.
C:\>ipconfig
C:\>ipconfig/all
It shows all detail.
IP Routing
When we want to connect two or more networks using different n/w addresses then we have to
use IP Routing technique. The router will be used to perform routing between the networks. A
router will perform following functions for routing.
(1) Path determination
(2) Packet forwarding
Static Routing
In this routing, we have to use IP route commands through which we can specify routes for
different networks. The administrator will analyze whole internetwork topology and then specify
the route for each n/w that is not directly connected to the router.
Next hop IP it is the IP address of neighbor router that is directly connected our router.
Default Routing
Default routing means a route for any n/w. these routes are specify with the help of following
syntax: -
Router(config)#ip route 0.0.0.0 0.0.0.0 <next hop>
Or
<exit interface>
Router#sh ip route
According to the working there are two types of Dynamic Routing Protocols.
(1) Distance Vector
(2) Link State
According to the type of area in which protocol is used there are again two types of protocol: -
(1) Interior Routing Protocol
(2) Exterior Routing Protocol
Configuring RIP
Router#conf ter
Router(config)#router rip
Router(config-router)#network <own net address>
Router(config-router)#network <own net address>
--------------
--------------
Router(config-router)#exit
172.16.0.6
Router(config-router)#network 10.0.0.0
Router(config-router)#network 172.16.0.0
Router(config-router)#network 200.100.100.0
2048 k 2048 k
256 k
sync
(1) Neighbor
(2) Passive interface
(3) Timer
(4) Distance (AD)
(5) Maximum path
This type of routing is based on link state. Its working is explain as under
(1) Each router will send Hello packets to all neighbors using all interfaces.
(2) The router from which Hello reply receive are stored in the neighborship table. Hello packets
are send periodically to maintain the neighbor table.
(3) The router will send link state information to the all neighbors. Link state information from
one neighbor is also forwarded to other neighbor.
(4) Each router will maintain its link state database created from link state advertisement
received from different routers.
(5) The router will use best path algorithm to store the path in routing table.
Problems of Link State Routing
Features: -
* Cisco proprietary
* Hybrid protocol
Link State
Distance Vector
* Multicast Updates using
Address 224.0.0.10
* Support AS
* Support VLSM
* Automatic Route Summarization
* Unequal path cost load balancing
* Metric (32 bit composite)
Bandwidth
Delay
Load
Reliability
MTU
* Neighbor Recovery
* Partial updates
* Triggered updates
* Backup Route
Configuring EIGRP
Router(config)#router eigrp <as no>
Router(config-router)#network <net addr.>
Router(config-router)#network <net addr.>
Router(config-router)#exit
OSPF Terminology
Router ID
Router ID is the highest IP address of router interfaces. This id is used as the identity of the
router. It maintaining link state databases. The first preference for selecting router ID is given to
the Logical interfaces. If logical interface is not present then highest IP of physical interface is
selected as router id.
Router#conf ter
Router(config)#router ospf <process no>
Router(config-router)#network <net address> <wild mask> area <area id>
Router(config-router)#network <net address> <wild mask> area <area id>
Router(config-router)#exit
Example 255.255.0.0
0.0.255.255
255.255.255.255
- Subnet mask
Wild mask
255.255.255.255
- 255.255.192.0 subnet mask
R2
Router(config)#router ospf 2
Router(config-router)#network 200.100.100.32 0.0.0.3 area 0
Router(config-router)#network 200.100.100.128 0.0.0.63 area 0
Router(config-router)#exit
LAN Switching
Ethernet switches are used in LAN to create Ethernet n/ws. Switches forward the traffic on the
basis of MAC address. Switches maintain a Mac Addresse table in which mac addresses and port
no.s are used to perform switching decision. Working of bridge and switch is similar to each
other.
Classification of switches
Switches are classified according to the following criteria: -
(3) Fragment-free
This switch receives 64 bytes of the frame, perform error checking and then start forwarding
data.
Qualities of switch
- No. of ports
- Speed of ports
- Type of media
- Switching or wire speed or throughput
IOS based switches are similar to the routers. We can perform following function on switches in
a similar manner as performed on router.
(1) Access switch using console
(2) Commands to enter & exit from different mode
(3) Commands to configure passwords
(4) Manage configuration
(5) Backup IOS and configuration
(6) Configuring and resolving hostnames
(7) Managing telnet
(8) Configuring CDP
(9) Configuring time clock
(10) Configuring Banners
(11) Command line shortcuts and editing shortcuts
(12) Managing history
(13) Configure logging
(14) Boot system commands
Following function and options are not similar in router and switch.
(1) Default hostname is ‘Switch’
(2) Auxiliary port is not present
(3) VTY ports are mostly 0 to 15
(4) By default interfaces are enabled
(5) IP address cannot be assign to interfaces
(6) Routing configuration mode is not present
(7) Interface no. starts from 1
(8) Web access is by default enabled
(9) Configuration registry is not present in similar manner
(10) Flash memory may contain multiple files and startup-configuration is also saved in flash
We can configure IP address on switch for web access or telnet IP address is required for the
administration of the switch. If we have to access switch from remote n/w then we will configure
default gateway in addition to IP address.
IP address is assigned to the logical interface of switch with following command:-
Switch(config)#interface vlan 1
Switch(config)#IP address <ip> <mask>
Switch(config)#no sh
Switch(config)#exit
Old Switches
Configuring Gateway
(1) Power off switch press mode button present in front of switch then power on the switch.
(2) Keep mode button press until ‘Switch:’ prompt appears on console.
(3) In switch monitor mode, type following commands: -
flash_init
load_helper
rename flash:config.text flash:<anyname>
dir flash:
boot
(4) After booting switch will prompt to enter in initial configuration dialog. Enter ‘no’ here and
type.
Switch>enable
Rename flash:<anyname> Flash:config.text
Configure memory
Change password and save config. Then copy run start_config.
To perform logical segmentation, we have to create VLAN in the network. With the help of
VLAN, we can logically divide the broadcast domain of the network.
In port based Vlan, first we have to create a Vlan on manageable switch then we have to add
ports to the Vlan.
Switch#config ter
Switch(config)#vlan <no>
[name <word>]
Switch(config)#exit optional
Or
Switch#vlan database
Switch(vlan)#vlan <no>
[name <word>]
Switch(vlan)#exit
By default, all ports are member of single vlan that is Vlan1. we can change vlan membership
according to our requirement.
Switch#conf ter
Switch(config)#interface <type> <no>
Switch(config-if)#switchport access vlan <no>
Switch(config-if)#exit
Commands to configure multiple ports in a vlan
Switch#conf ter
Switch(config)#interface range <type> <slot/port no (space)–(space) port no>
Switch(config-if)#switchport access vlan <no>
Switch(config-if)#exit
Example: - Suppose we want to add interface fast Ethernet 0/10 to 0/18 in vlan5
Switch#config ter
Switch(config)#interface range fastethernet 0/10 – 18
Switch(config-if)#switchport access vlan 5
Switchconfig-if#exit
Switch#config ter
Switch#config ter
Switch(config)#no ip http server
Switch#sh mac-address-table
Switch#sh vlan
Trunking
When there are multiple switches then we have to use trunk links to connect one switch with
other. If we are not using trunk links then we have to connect one cable from each vlan to the
corresponding vlan of the other switch.
Switches will perform trunking with the help of frame tagging. The trunk port will send data
frames by adding a Vlan id information to the frame, at the receiving end vlan id information is
removing from the end and according to the tag data is delivered to the corresponding vlan.
There are two protocols to perform frame tagging.
(1) Inter switch link (cisco prop)
(2) IEEE 802.1 q
Configuring Trunking
Switch#conf ter
Switch(config)#interface <type> <no>
Switch(config-if)#switchport mode <trunk|access|auto>
Switch(config-if)#exit on off desirable
By default all Vlans are allowed on Trunk port. We can add/remove a partucular Vlan from trunk
port with following command
Switch#config ter
Switch(config)#interface <type> <no>
Switch(config-if)#switchport trunk allowed vlan all
Remove <vlan>
Add <vlan>
Except <vlan>
After creating Vlans, each Vlan has own broadcast domain. If we want communication from one
Vlan to another Vlan then we need to perform routing. There are three methods for inter vlan
communication.
(1) Inter Vlan using multi-interface router
(2) Inter Vlan using router on a stick method
(3) Inter Vlan using layer 3 switch
1751, 2621 routers supports Vlan
(1) Inter Vlan using multi-interface router
In this case, we have to connect one interface of router in each Vlan. This interface will act as
gateway for the corresponding vlan. Each Vlan has to use different n/w addresses. Data from one
Vlan1 Vlan3
Vlan5
1, 3, 5 T T
T
1 3 1 3 5 1 3
N/w 5
10.x.x.x 11.x.x.x 5 12.x.x.x
Gateway 10.0.0.1 11.0.0.1 12.0.0.1
(2) Inter Vlan using router on a stick method
In this method a special router is used for Inter Vlan. In this router, we can create one
interface for each Vlan. The physical interface of router will be connected on trunk port switch.
This router will route traffic on the same interface by swapping vlan id information with the help
of frame tagging protocol.
Trunk
T T
Vlan 1, 3, 5
T
T T T
1 3 5 1 3 5 1 3 5
Router#conf ter
Router(config)#access-list <no> <permit|deny> <source>
Router(config)#exit
Router#conf ter
Router(config)#interface <type> <no>
Router(config-if)#ip access-group <ACL no.> <in|out>
Router(config-if)#exit
Internet
Router
Router(config)#interface serial 0
Router(config-if)#ip access-group 25 out
Router#config ter
Router(config)#ip access-list standard <name>
Router(config-std-nacl)#<deny|permit> <source>
Router(config-std-nacl)#exit
Router#conf ter
Router(config)#ip access-list standard abc
Router(config-std-nacl)#deny 172.16.0.16
Router(config-std-nacl)#deny 172.16.0.17
Router(config-std-nacl)#deny 172.16.0.18
Router(config-std-nacl)#permit any
Router(config-std-nacl)#exit
Router#conf ter
Router(config)#ip access-list standard abc
Router(config-std-nacl)#no deny 172.16.0.17
Router(config-std-nacl)#exit
Router#conf ter
Router(config)#access-list <no> <deny|permit> <protocol> <source> [<s.port>]
<destination> [<d.port>]
router(config)#exit
To display ACL
Router#show access-lists or
Router#show access-list <no>
Router#show ip interface
Router#conf ter
Router(config)#time-range no-http
Router(config-time-range)#periodic <Wednesday|weekdays|weekend> 06:00 to 12:00
Router(config-time-range)#exit
Router(config)#time-range tcp-yes
Router(config-time-range)#periodic weekend 06:00 to 12:00
Router(config-time-range)#exit
Router(config-ext-nacl)#interface f0/0
Router(config-if)#ip access-group time in
Router(config-if)#do show time-range
NAT is the feature that can be enable in a Router, Firewall or a Pc. With the help of NAT, we are
able to translate network layer addresses that are IP addresses of packets. With the help of Port
Address Translation, we are also able to translate port no.s present in transport layer header.
There are two reasons due to which we use NAT: -
(2) NAT enhances the network security by hiding PC & devices behind NAT.
Types of NAT
Static NAT
This NAT is used for servers in which one Live IP is directly mapped to one Local IP. This NAT
will forward on the traffic for the Live IP to the Local PC in the n/w.
Static NAT
200.1.1.5 = 192.168.10.6
Internet
Route
r
Live 200.1.1.5
Local 192.168.10.6
Dynamic NAT
Dynamic NAT is used for clients, which want to access Internet. The request from multiple
client IPs are translated with the Live IP obtained from the Pool. It is also called Pool Based
Dynamic NAT.
Pool => 200.1.1.8 – 200.1.1.12/28
Local address => 172.16.X.X
Except => 172.16.0.5 Internet
172.16.0.6
172.16.0.7
Route
r
Configuring NAT
Router#conf ter
Router(config)#int serial 0
Router(config-if)#ip nat outside
Router(config-if)#int eth 0
Router(config-if)#ip nat inside
Router(config-if)#exit
NAT + PAT
Command for Basic NAT
PROJECT REPORT
The project is based on the concepts of networking. It includes configuring different network
devices like Router, Switch, Bridge & connecting it with Hubs & PCs by using different types of
connecting wires by allocating the IP Addresses to all the interfaces after the sebneting of
network id . The beauty of configuring network devices is that it helps users access the network
with few constraints like allowing some to access the website but not allowing them to access the
mail server on the internet on private IP address which are otherwise excluded by internet service
provider (ISP).
We have used inter VLAN technology to make work efficient between 4 different and
independent departments .
DESCRIPTION
We have four different departments in a organization. We have purchased a network id and
devide that network id into number of small network ids by using Variable Length
Subnetmask(VLSM).
We have used Wi-Fi in our campus by using Wirelee Router. We have used 5
Routers & apply various configuration settings on each router.
On Router1 we have configured NAT with translates private range of IPs into
public range. We have used Router 2 as Internet Service Provider (ISP). Extented Access Control
List has been applied to Router 3.Router 4 is used only to connect Campus LAB with the
network. Switch 2 connected with Router 5 is used to create VLANs.
We also have a separate network in our cafeteria and we have used a PC as a
router to connect that network to the campus network.
CONFIGURATION
FOR ROUTER1
%SYS-5-CONFIG_I: Configured for ROUTER1
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname ROUTER1
ROUTER1(config)#line console 0
ROUTER1(config-line)#password net
ROUTER1(config-line)#login
ROUTER1(config-line)#exit
ROUTER1(config)#line vty 0 4
ROUTER1(config-line)#password net
ROUTER1(config-line)#login
ROUTER1(config-line)#exit
ROUTER1(config)#enable password net
ROUTER1(config)#enable secret net1
ROUTER1(config)#int f0/0
ROUTER1(config-if)#no sh
ROUTER1(config-subif)#encapsulation dot1q 3
ROUTER1(config-subif)#ip nat inside
ROUTER1(config-subif)#ip address 192.168.10.1 255.255.255.240
ROUTER1(config-subif)#no sh
ROUTER1(config-subif)#exit
ROUTER1(config)#int s0/0/0
ROUTER1(config-if)#ip nat outside
ROUTER1(config-if)#clock rate 64000
ROUTER1(config-if)#ip address 200.10.10.5 255.255.255.252
ROUTER1(config-if)#no sh
In our Routeranisation our clients want to access internet so we will configure dynamic nat with
overload for clients.
FOR SWITCH 1
Switch>en
Switch#vlan database
% Warning: It is recommended to configure VLAN from config mode,
as VLAN database mode is being deprecated. Please consult user
documentation for configuring VTP/VLAN in config mode.
Switch(vlan)#vlan 2 name server
VLAN 2 added:
Name: server
Switch(vlan)#vlan 3 name clients
VLAN 3 added:
Name: clients
Switch(vlan)#exit
APPLY completed.
Exiting....
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int f0/1
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int range f0/2 - 3
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit
Switch(config)#int f0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#wr
FOR ROUTER2
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname ROUTER2
ROUTER2(config)#line console 0
ROUTER2(config-line)#password net
ROUTER2(config-line)#login
ROUTER2(config-line)#exit
ROUTER2(config)#line vty 0 4
ROUTER2(config-line)#password net
ROUTER2(config-line)#login
ROUTER2(config-line)#exit
ROUTER2(config)#enable password net
ROUTER2(config)#enable secret net1
ROUTER2(config)#int f0/0
ROUTER2(config-if)#no sh
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
ROUTER2(config-if)#exit
ROUTER2(config)#int f0/0.1
ROUTER2(config-subif)#encapsulation dot1q 3
ROUTER2(config-subif)#ip nat inside
ROUTER2(config-subif)#ip address 192.168.10.1 255.255.255.240
ROUTER2(config-subif)#no sh
ROUTER2(config-subif)#exit
ROUTER2(config)#int s0/0/0
ROUTER2(config-if)#ip nat outside
ROUTER2(config-if)#clock rate 64000
ROUTER2(config-if)#ip address 200.10.10.9 255.255.255.252
ROUTER2(config-if)#no sh
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
ROUTER2(config-if)#exit
ROUTER2(config)#ip route 0.0.0.0 0.0.0.0 serial 0/0/0
ROUTER2(config)#ip nat inside source static 10.0.0.2 200.10.10.33
ROUTER2(config)#access-list 20 permit any
ROUTER2(config)#ip nat pool abc 200.10.10.34 200.10.10.36 netmask 255.255.255.240
ROUTER2(config)#ip nat inside source list 20 pool abc
ROUTER2(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
ROUTER2#wr
Building configuration...
[OK]
ROUTER2#
FOR SWITCH 2
Switch>en
Switch#vlan database
% Warning: It is recommended to configure VLAN from config mode,
as VLAN database mode is being deprecated. Please consult user
documentation for configuring VTP/VLAN in config mode.
Switch(vlan)#vlan 2 name server
VLAN 2 added:
Name: server
Switch(vlan)#vlan 3 name clients
VLAN 3 added:
Name: clients
Switch(vlan)#exit
APPLY completed.
Exiting....
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int f0/1
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int range f0/2 - 3
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit
Switch(config)#int f0/24
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#exit
Switch#wr
FOR ROUTER3
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname ROUTER3
ROUTER3(config)#line console 0
ROUTER3(config-line)#password net
ROUTER3(config-line)#login
ROUTER3(config-line)#exit
ROUTER3(config)#line vty 0 4
ROUTER3(config-line)#password net
ROUTER3(config-line)#login
ROUTER3(config-line)#exit
ROUTER3(config)#enable password net
ROUTER3(config)#enable secret net1
ROUTER3(config)#int f0/0
ROUTER3(config-if)#no sh
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
ROUTER3(config-if)#exit
ROUTER3(config)#int f0/0.1
REFERENCES
Wikipedia
Google
www.edu.ac.in
CISCO