Lab's_assignment
Lab's_assignment
Lab's_assignment
1. Device Setup :
Task 1 : Advanced IP Address Configuration :
Steps :
Set router(2911) and connect with switch by copper straight and connect the PCs to
switch by copper straight.
From router0 :
Description of Router configuration :
Router Configuration:
Enter privileged mode:
Router> enable :
Purpose: Enables access to privileged EXEC mode for configuration commands.
Access global configuration mode:
Router# configure terminal
Purpose: Allows configuration of the router settings.
interface g0/0: Select an interface (gigabit ethernet0/0)
ip address 192.168.2.1 255.255.255.0: Assign static IPs to router interfaces for subnet
separation.
no shutdown: Enable the interface.
2. PC Configuration:
Assign static IPs, subnet masks, and default gateways to ensure each PC is in the correct
subnet.
PC 1:
IP : 192.168.1.2,
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1
PC 2:
IP: 192.168.2.2
Subnet Mask: 255.255.255.0,
Default Gateway: 192.168.2.1
PC 3:
IP: 192.168.3.2
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.3.1 :
Verification Steps :
1. Ping within Subnets:
● Ping from PC1 in the same subnet and ping to the default gateway :
The reply was received from pc1 in the subnet and received from his gateway this means
the configuration works as well
● Ping from PC2 in the same subnet and Ping to the default gateway :
The reply was received from pc1 in the subnet and received from his gateway this means
the configuration works as well
● Ping from PC3 in the same subnet and Ping to the default gateway :
The reply was received from pc1 in the subnet and received from his gateway this
means the configuration works as well
Troubleshooting Notes :
The issue is that the ping from the pc2 to the gateway is not working and from pc3 to the
gateway is not working because I use a router with a single port.
The solution was replaced by a router with three ports.
Task 2: Implementing Access Control Lists (ACLs)
Device Setup:
1. Server Configuration :
Set a server in the workspace and connect it to the switch, and Assign the server an IP
address (192.168.1.10) in Subnet A.
Purpose: To ensure the server is accessible and identifiable within the network.
2.. Apply the ACL to the Interface and Configure ACL on the Router:
Verification Steps :
1.Ping the Server from Subnet B:
2. Create VLANs on Both Switches and Assign Ports to VLANs and Configure Trunk
Link
3. Create VLANs:
Purpose: Define VLANs 10, 20, and 30 for segregating network traffic by departments
(Sales, HR, IT).
Assigning Ports to VLANs
Purpose: Designates port Fa0/1 for VLAN 10 (Sales), Fa0/2 for vlan 20 (HR), Fa0/3 for Vlan
30 (HR)
Purpose: Enables the port to carry traffic for all VLANs between the two switches.
On the first switch :
Result: The ping should succeed, confirming VLAN trunking is operational and VLAN 10
traffic flows correctly between switches.
Result: The ping should succeed, confirming VLAN trunking is operational and VLAN 30
traffic flows correctly between switches.
● Ping From pc(id is 192.168.20.2) to pc (id is 192.168.20.3)
Result: The ping should succeed, confirming VLAN trunking is operational and VLAN 20
traffic flows correctly between switches.
2. Verify Trunk Link:
From the first switch :
Router2 Configuration:
Ip for first pc :
Ip for second pc
Verification Steps :
1. Ping Across LANs:
Show ip route
This command display the routing table for router1
Router 2
Show ip route
This command display the routing table for router1
Task 5: Configuring Wireless Security with MAC Filtering
1. Device Setup :
Device Setup
Purpose: Allow only specific devices to connect to the network by filtering based on MAC
addresses.
Add the MAC addresses of the three authorized devices to the filter list.
Explanation: MAC filtering ensures that only devices with listed MAC addresses can access
the network, adding an additional layer of security.
Verification Steps
1. Connect Authorized Devices:
On each authorized wireless-enabled PC:
Enter the WPA2 passphrase (securepassword).
Attempt to connect to the wireless network.
Expected Result: All three authorized devices should successfully connect to the network.
Device 1
Device 2
2. Test Unauthorized Device Access:
Attempt to connect an unauthorized device (one not listed in the MAC filter).
Expected Result: The connection should fail, verifying that MAC filtering is active and
blocking unauthorized devices.