Sunteți pe pagina 1din 33

d2 1.2.3.

4: Interpreting Ping and Traceroute


Output
Objectives:
Distinguish the difference between successful and unsuccessful ping attempts
Distinguish the difference between successful and unsuccessful traceroute attempts.

Figure 1: d2 1.2.3.4

0 JCManalo
201212692

d2 1.3.1.3 Determining Business Needs


Objectives:
Select the appropriate interface cards for the needs and budget of an organization.
Compare the trade-off between cost and flexibility.
Add new equipment to accommodate expansion and allow for future growth.

Figure 2: d2 1.3.1.3

QUESTIONS:
A.Which module provides the most Ethernet ports? How many ports does it provide?
Ang nag-provide ng apat na switching ports ay yung HWIC-4ESW.
B.Which module provides the most Serial ports? How many ports does it provide?
To remote sites or legacy serial network devices such as Synchronous Data Link Control (SDLC) concentrators, alarm systems, and packet over SONET (POS) devices,
ang WIC-1T ay nag provide ng single port na serial connection.
C. Which network module provides the most Ethernet ports? How many ports does it
provide?
Ang NM-ESW-161 provides the most Ethernet ports at nag-provide ng 16 switching
ports.
D. How many empty interface card slots (smaller slots) are available?
0 JCManalo
201212692

4 empty interface card slots ang available.


E. Which interface card provides the most Ethernet ports? How many ports does it
provide?
Ang interface card na nag-provide ng most Ethernet ports ay ang HWIC-4ESW that
provides apat na switching ports.
F. Which interface card provides the most Serial ports? How many ports does it
provide?
Ang interface card na nag-provide ng most Serial Ports ay ang 2-port asynchronous/synchronous
serial network module provides flexible multi-protocol support, with each port individually configurable in synchronous or asynchronous mode, offering mixed media
dial support in a single chassis. Applications for asynchronous/synchronous support
include: low speed WAN aggregation (up to 128 Kbps), dial-up modem support,
Async or Sync connections to management ports of other equipment, and transport
of legacy protocols such as Bi-sync and SDLC.

d2 2.3.1.3 Troubleshoot and Resolve Network


Issues
Objectives:
Troubleshoot and Resolve Network Issues

Figure 3: d2 2.3.1.3

REFLECTION:
A.What else could have caused connectivity problems on this network?
0 JCManalo

201212692

Ang naging problema kung kaya yung PC-PT 1A ay hindi nag-connect sa server
ay dahil walang Default Gateway address yung PC-PT 1A at maaari ding cause ng
problem ay iba yung IP address na nilagay sa router.

d2 3.1.3.2 Creating Network Diagrams


Objectives:
Investigate the customer network.
Create a network inventory list.
Create a logical topology diagram.

Figure 4: d2 3.1.3.2

0 JCManalo
201212692

d2 3.3.3.4 Exploring Different LAN Switch


Options
Objectives:
Determine the cable types to use to connect all devices to the switch.
Add appropriate modules to switches and routers.
Connect the devices to the switch using the appropriate cable types.

Figure 5: d2 3.3.3.4
QUESTIONS:
A. Which interface is available on the router to connect to the new switch? and What
type of cable is required?
Pwedeng gamitin ang PT-ROUTER-nm-1cfe at PT-ROUTER-nm-1ss para sa bagong
switch connection at required na gamitin naman sa cable ay ang Copper straight.
B. What interface is available on the Linksys 300N to connect to the new switch? and
What type of cable is required?
Para naman dito,pwedeng gamitin sa linksys ang PT-ROUTER-NM-1CE(for Linksys)
para sa connection ng bagong switch, at copper cross-over naman ang para sa cable.

0 JCManalo
201212692

d2 3.3.4.3 Exploring Internetworking Devices


Objectives:
Describe the different options available on an ISR and a router.
Determine which options provide the needed connectivity.
Add the correct modules and interfaces to the ISR and the router and interconnect
the devices.

Figure 6: d2 3.3.4.3

d2 4.1.3.5 Implementing an IP Addressing


Scheme
Objectives:
Subnet an address space based on host requirements.
Assign host addresses to devices.
Configure devices with IP addressing.
Verify the addressing configuration.

Figure 7: d2 4.1.3.5
QUESTION:
How many bits must be left for host addresses?
Host-A:12
REFLECTION:
A. How many subnets are still available for future expansion?
74 subnets are still available for future expansion.
B. What would be the two subnet addresses if the host requirement was 80 hosts per
LAN?
The two subnet addresses is 255.255.255.128 and 255.255.255.192.

d2 4.1.5.2 Communicating Between Subnets


Objectives:
Describe how hosts on separate subnets communicate to share resources.
7

Figure 8: d2 4.1.5.2
QUESTIONS:
A. Were the ping attempts successful?
No
B. Is myPC in the same subnet as myServer, or the FastEthernet 0/0 interface of
myRouter?
Yes
REFLECTION:
A. Why was myPC unable to communicate with myServer at the beginning of this
activity?
Because myPC ay meron lang 32 host address samantalang yung myServer ay meron
lang na 12 host address.
B. This exercise demonstrates how subnetting affects which devices can communicate
on a network. What does this mean for IP address planning when upgrading a network?
Dapat pantay lang yung subnet sa bilang nung host adrdress. If there is greater
subnet, there must be also greater number of host address provides.

d2 4.2.3.3 Examining Network Address


Translation (NAT)
Objectives:
Examine NAT processes as traffic traverses a NAT border router.

Figure 9: d2 4.2.3.3
QUESTIONS:
A. In the PDU Information at Device: Customer PC window, which IP address is
Customer PC attempting to find a MAC address for?
192.168.1.10
B. In the Event List window, click Capture/Forward twice. Which device answers the
ARP request from Customer PC? Which MAC address is placed inside the ARP reply?
Ang customer switch ay yung device that answers the ARP request mula customer
pc. There is no MAC address placed inside the ARP reply.

d2 5.1.5.2 Exploring the Running


Configuration and Startup Configuration
Files
Objectives:
View the router configurations.

Figure 10: d2 5.1.5.2


REFLECTIONS:
A. What was the configuration for the Fast Ethernet0/0 interface in the CustomerRouter running configuration before you issued the reload command?
Ang IP address ng FastEthernet 0/0 ay 192.168.1.1 at yung subnet mask naman nya
ay 255.255.255.0 and it was already running bago pa lang ireload yung command.
B What was the configuration for the Serial0/0/0 interface in the CustomerRouter
running configuration before you issued the reload command?
Ang IP address ng Serial0/0/0 ay 209.165.200.225 at yung subnet mask naman nya
ay 255.255.255.0 and it was already running bago pa lang ireload yung command.
C. What was the configuration for the Fast Ethernet0/0 interface in the CustomerRouter running configuration after you issued the reload command?
Pagkatapos i-issued yung reload command, ang mga files ay automatic na madedelete
na sa start-up configuration.
D. What was the configuration for the Serial0/0/0 interface in the CustomerRouter
startup configuration after you issued the reload command?
Pagkatapos i-issued yung start-up command, ang mga files ay automatic na madedelete.
E. Explain what happened to the configuration of the Fast Ethernet0/0 interface and
the Serial0/0/0 interface after you issued the reload command.
Pagkatapos ma-issued yung reload command, ang mga files ay automatic na madedelete na sa start-up configuration.

0 JCManalo
201212692

10

d2 5.3.2.5 Exploring the Cisco IOS CLI


Objectives:
Using the Cisco IOS CLI.

Figure 11: d2 5.3.2.5

REFLECTION:
A. List two Cisco IOS CLI commands that are available from the CustomerRouterNo.
prompt that are not available from the CustomerRouterprompt.
The reload and conf command ay hindi available sa CustomerRouterPrompt but
available naman sa CustomerRouterNo.
B. What does (cr) indicate at the end of a list of commands after you have requested
help?
(cr) means that walang ibang parameters would be able in CLI.

0 JCManalo
201212692

11

d2 5.3.3.3 Using the Cisco IOS Show


Commands
Objectives:
Using the Cisco IOS show commands.

Figure 12: d2 5.3.3.3


REFLECTION:
A. Why do you need to be in privileged EXEC mode to explore the Cisco IOS show
commands that were used in this lab?
Because in privileging EXER mode meron lamang na certain advantages na yung
admin lang ang pwedeng maka-access pero kapag naman User mode naman, ang
mga simpleng commands only canl be permitted to execute.
B. How much ash memory is reported?
May total na 32768K bytes of ash memory.
C. Which of the following is subnetted?
i. 209.165.201.0
ii. 209.165.201.1
iii.209.165.201.10
i.209.165.201.0
D. Which interface is up and running?
Yung FastEthernet0/0 lang yung up and running.
0 JCManalo
201212692

12

d2 5.3.4.4 Performing an Initial Router


Configuration
Objectives:
Perform an initial router configuration.

Figure 13: d2 5.3.4.4


REFLECTION:
A. Which Cisco IOS CLI commands did you use most?
Basic na CLI commands lang, the en or ung enable then yung conf t which is the
configure terminal and then yung sh ip route where you can view the list of IP of
the routers.
B. How can you make the customer router passwords more secure?
Ang Network Administration ang bahalang mag-construct ng global configuration
mode password then configure the encrypted priviledged mode password kung saan
dito niya gagamitin yung command na enable secret. Pagkatapos, the console password naman must be set by using the command line console 0 and thats it.

0 JCManalo
201212692

13

d2 5.3.5.4 Configuring Serial and Ethernet


Interfaces
Objectives:
Configure the Serial and Ethernet interfaces on a Cisco 1841 router.

Figure 14: d25.3.5.4

REFLECTION:
A. When you ping the LAN IP address of the ISP router, what happens and why?
Pag pini-ping yung connection ng LAN IP address ng ISP router may lalabas na
Request time out, it means failed kase yung configuration ng CustomerRouter hindi
pa nakaset.
B. Which Cisco ISO CLI mode do you need to be in to configure the description of an
interface?
To configure the description of an interface ang kailangang gamitin ay yung CustomerRouter(configif)No.
C. You configured the Fast Ethernet 0/0 interface with the no shutdown command and
verified the configuration. However, when you rebooted the router, the interface was shut
down. You reconfigured the Fast Ethernet 0/0 interface and verified that the configuration
works. Explain what most likely happened.
Sigruo na-delay lang, yung tinatawag natin na time consumption kase it needs time
para mag-work.
0 JCManalo
201212692

14

d2 5.3.6.2 Configuring a Default Route


Objectives:
Configuring a Default Route

Figure 15: d2 5.3.6.2

REFLECTION:
A. Is this type of access to the ISP LAN likely to happen in the real world?
in my opinion, it will not happpen in real world.
B. Why has the student lab been configured to allow this type of access?
For us to know yung iba pang type of access na available.

0 JCManalo
201212692

15

d2 5.3.7.2 Configuring a Cisco Router as a


DHCP Server

Objectives:
Configuring a Cisco Router as a DHCP Server

Figure 16: d2 5.3.7.2


REFLECTION:
A. What is the purpose of DHCP on the customer network?
The purpose of DHCP on the customer network is to make the connection easier,
yun nga yung paglalagay ng IP address at automatic na magko-connect yung mga
devices.
B. What IP address is assigned to the workstation after its IP address is renewed?
The assigned IP Adress is 192.168.1.50.
C. What other DHCP options can be defined on the Cisco 1841 ISR router that are
not configured in this activity?
DHCP Pool.
0 JCManalo
201212692

16

d2 5.3.8.2 Configuring Static NAT on a Cisco


Router

Objectives:
Configure the customer Cisco 1841 ISR to use NAT.

Figure 17: d2 5.3.8.2


REFLECTION:
A. What is the purpose of static NAT?
The purpose of static NAT ay it will convert the private IP address to become a
public IP address so that people can access the Internet.
B. What command is used to designate the inside interface for static NAT?
To designate the inside interface for static NAT,the command used is (config-if)No.
ip NAT.
C. What IP address does the server respond to when the customer workstation pings
the Customer DNS server?
Ang IP address does the server respond to when the customer workstation pings the
Customer DNS server ay 192.168.1.10.

0 JCManalo
201212692

17

d2 5.3.9.3 Backing Up a Cisco Router


Configuration to a TFTP Server
Objectives:
Save the current running configuration to the startup configuration.
Back up the configuration to a TFTP server.

Figure 18: d2 5.3.9.3


REFLECTION:
A. What are the consequences of reloading a router without saving the running configuration to the startup configuration?
Merong possibility na mawala yung na-set na configuration kung hindi ito na save
muna at bumalik sa pinakaumpisa. :(
B. How is the backed up startup configuration used to recover from hardware failure
in the Cisco 1841 ISR?
Ang copy run start yung command na pwedeng gamitin to save, back-up and recover
pa ang start configuration na ginamit kahit merong hardware failure.
C. What command do you use to back up the startup configuration to the TFTP server
at IP address 192.168.1.10?
To back-up the startup configuration, ginamit ko yung command na copy run start.
0 JCManalo
201212692

18

d2 5.4.4.5 Mapping a Network using CDP


Objectives:
Examine CDP show commands.
View CDP configuration settings.
View CDP neighbor information.

Figure 19: d2 5.4.4.5

REFLECTION:
A. How could CDP be used to troubleshoot network connectivity issues?
The CDP o ang Cisco Discovery Protocol ay ginagamit para malaman ang mga
connectivity issues regarding sa particular network.
B. Is it likely that an ISP would have CDP configured on their gateway router?
Yes, CDP ay maaaring i-enable globally to thenetwork kaya, it can configured on
their gateway router.

0 JCManalo
201212692

19

d2 5.5.3.4 Performing an Initial Switch


Configuration
Objectives:
Performing an Initial Switch Configuration

Figure 20: d2 5.5.3.4


REFLECTION:
A. What is the significance of assigning the IP address to the VLAN1 interface instead
of any of the FastEthernet interfaces?
Maaaring magdagdag ng madaming ports kaya ito ang isang advantage sa pagaassign ng IP address sa VLAN1 interface. Ito ang madalas na ginamit instead of
any of the other fastethernet interfaces.
B. What command is necessary to enforce password authentication on the console and
vty lines?
Ang command na ginagamit to enforce password authentication sa console ay yung
Enable password or yung enable secret at para naman sa vty lines ay yung command
na login ang gamit.
C. How many gigabit ports are available on the Cisco Catalyst 2960 switch that you
used in the activity?
Sa Cisco Catalyst 2960 switch, one gigabit port lang ang available.
0 JCManalo
201212692

20

d2 5.5.4.4 Connecting a Switch


Objectives:
Connect a switch to the network.
Verify the configuration on the switch.

Figure 21: d2 5.5.4.4

REFLECTION:
A. What is the significance of the enable secret command compared to the enable
password?
The command enable secret ay ginagamit para sa pag se-set ng password for the
priviledged administrative access to the Cisco IOS System, mas secure na gamitin
compare to enable command. Kase yung enable command ay gumagamit ng weak
encryption algorithm kaya mas madali ma-hack.
B. If you want to remove the requirement to enter a password to access the console,
what commands do you issue from your starting point in privileged EXEC mode?
The command that I will be issue ay ang Line Interfae command.

0 JCManalo
201212692

21

d2 5.5.5.2 Using CDP as a Network


Discovery Tool
Objectives:
Examine CDP show commands.
Examine CDP configuration commands.

Figure 22: d2 5.5.5.2

REFLECTION:
A. How could CDP be used to troubleshoot network connectivity issues?
Ang CDP o ang Cisco Discovery Protocol ay ginagamit to know all the connectivity
issues regarding sa particular network.
B. Is it likely that an ISP would have CDP configured on their gateway router?
Yes, CDP can configured on their gateway router dahil it can enable globally sa mga
networks.

0 JCManalo
201212692

22

d2 5.5.6.2 Configuring a Serial Connection


Between a Customer and an ISP
Objectives:
Configure the IP on the serial WAN interface and change the encapsulation from
HDLC to PPP.

Figure 23: d2 5.5.6.2

REFLECTION:
A. What are the benefits of using the PPP encapsulation type instead of the default
HDLC?
HDLC is a simple protocol that is used sa pagko-connect ng point-to-point serial
device ant its default WAN protocol while PPP is used for most every dial up connection sa Internet na gumagamit of more sub-protocols and it is feature-rich with
dial up networking features.

0 JCManalo
201212692

23

d2 6.1.1.5 Configuring Static Routes


Objectives:
Configure static routes on each of the routers to allow communication between all
clients.
Test connectivity to ensure that each device can fully communicate with all other
devices.

Figure 24: d2 6.1.1.5

d2 6.1.5.3 Configuring a Serial Connection


Between a Customer and an ISP
Objectives:
Configure routers using basic interface configuration commands and enable RIP routing.

0 JCManalo
201212692

24

Figure 25: d2 6.1.5.3

d2 8.2.2.3 Planning Network-based Firewalls


Objectives:
Place the firewalls in the appropriate locations to satisfy the security requirements.

REFLECTION:
A. Why would you install a firewall on the internal network?
Firewall is a software or hardware that checks information coming from the internet
or a networkand then either blocks it or allows it to pass through to your computer,
depending on your firewall settings. Through the use of firewall, tumutulong ito
sa pag-prevent ng mga hackers or malicious software from gaining access to your
computer through a network or the Internet. A firewall can also help stop your
computer from sending malicious software to other computers.
B. How does a router that is configured to use NAT help to protect computer systems
on the inside of the NAT router?
There are higher security level sa pagconfigure ng isang router sa paggamit ng NAT.
C. Examine the location of Firewall 1 and Firewall 2 in the completed network topology.
Which networks are considered trusted and untrusted for Firewall 1? Which networks
are considered trusted and untrusted for Firewall 2?
The trusted network ng Firewall 1 ay ang PC C and the untrusted network ay ang
PC B. The trusted network of Firewall 2 naman is yung PC B while ang untrusted
naman ay ang PC C.
0 JCManalo
201212692

25

Figure 26: d2 8.2.2.3

d2 8.2.4.2 Configuring WEP on a Wireless


Router
Objectives:
Configure WEP security between a computer and a Linksys wireless router.

Figure 27: d2 8.2.4.2


REFLECTION:
A. What is the purpose of using WEP on a wireless network?
0 JCManalo

201212692

26

The purpose of using Wired Equivalent Privacy (WEP) ay to encrypts transmitted


data.
B. What is the significance of the key that you used to secure WEP?
Ang WEP key provides information na responsable sa pagharang para hindi makaconnect yung ibang network sa isang network.
C. Is WEP the best choice for wireless security?
No, kasi ang WEP ay madaling pasukin, masira at ma-crack ng ibang users.

d4 1.2.1.3 Comparing Mesh Topologies


Objectives:
Compare the routing tables of a partial mesh topology with a full mesh topology
Observe the convergence of the network when an interface is shut down and brought
back up
Examine the EIGRP packets in the Simulation Mode as the network converges

Figure 28: d4 1.2.1.3


REFLECTION:
A. On router br2p, when you shut down the interface s0/0/0, why was the one original
route to the 192.168.0.160 network replaced with two routes?
0 JCManalo
201212692

27

Sa full mesh topology kapag na-shutdown na merong possibility na maging available


sa kabilang connection.
B. What are the advantages and disadvantages of a full mesh topology?
Advantages:
The arrangement of the network nodes is such that it is possible to transmit data
from one node to many other nodes at the same time.
Extended range with extra hop.
Increased NLOS Coverage when one or more mesh nodes are added to go around
obstacles.
Alternate paths in case of failure or performance degradation.
Disadvantages:
The arrangement wherein every network node is connected to every other node of
the network, many of the connections serve no major purpose. This leads to the
redundancy of many of the network connections.
Increased delay introduced by multiple hops.
Increased complexity of protocols (MAC, routing, management, security).
Increased complexity of planning of initial coverage (network seeding).

0 JCManalo
201212692

28

d4 1.2.3.2 Observing Network Convergence


Objectives:
Connect and configure WAN connections
Configure EIGRP to advertise specific networks
Observe the convergence of the network through the CLI window when an interface
is shut down and brought back up
Examine the EIGRP packets in the Simulation Mode as the network converges

Figure 29: d4 1.2.3.2


REFLECTION:
A. What output was shown in the CLI window once EIGRP had converged?
The output shown in the CLI window once EIGRP had converged is 172.16.3.222
Serial 0/0/1.
B. When the WAN link between HQ and New Branch went down, what happened to
the EIGRP packets on the New LAN?
The EIGRP of the packets will stop.

0 JCManalo
201212692

29

d4 1.3.1.3 Demonstrating Distribution Layer


Functions
Objectives:
Demonstrating Distribution Layer Functions

Figure 30: d4 1.3.1.3

REFLECTION:
A. Why cant PC0 communicate with PC1 but PC1 can communicate with PC0s
default gateway?
PC0 cant communicate to PC1 is because of Protocol Data Unit ay ginagamit lang
sa distibution ng connection.
B. What effect on connectivity would removing the subinterfaces have?
Ang pagtanggal sa subinterface ay magre-resulta sa pagkawala ng connection ng
bawat isa dahil ito ay ang gingamit bilang default gateway.
C. Why must a router be in the topology to have communication between the VLANs?
Ang router yung nagbibigay ng connection in every device at ito rin yung responsible
sa pagko-combine nung LAN ports.
0 JCManalo
201212692

30

d4 1.3.2.2 Investigating Failure Domains


Objectives:
Observe the flow of network traffic in different topologies
Observe the change of flow in network traffic when a point of failure is introduced
into the network

Figure 31: d4 1.3.2.2


REFLECTION:
A. How was the effect of the network failure in the star topology different from the
partial mesh and full mesh topologies?
Sa star topology, madali lang ma-identify yung mga error, kung may cable mang
may failure, wala itong magiging epekto sa kabuuan ng network unless kung ang
switch yung may problema.Then, dun naman sa Partial Mesh Topology gumagana
ito depende sa router and if may error man, ang router ang bahalang magsesearch ng
any madaling paraan para makarating sa destination. Then in FullMesh Topology
naman, lahat ay connected sa bawat isa then if meron mang failure dun sa isang
path madaming choices kung san niya gusto dumaan at yung message ang mismong
humahanap ng other way if not available yung isang line.
B. What effect did the removal of the link in the star topology have on the hosts that
were attached to the Star2 switch?
Walang magiging epekto o failure sa entire network kung inalis man yung link sa
Star Topology.
0 JCManalo
201212692

31

d2 1.3.4.3 Placing ACLs


Objectives:
Verify network connectivity -Examine the Access Control Lists (ACLs) that are
configured on the routers -Determine the appropriate interface to apply the ACLs
-Examine the affects of the ACL

Figure 32: d2 1.3.4.3


REFLECTION:
A. How can ACLs be used to control the flow of network traffic?
Through the use of ACL or the Access Control List, there is limitation and controlling
in accessing to the network at nagagawang mapataas ang security level ng network
dahil nga merong limitasyon sa pagpasok at paglabas sa network.
B. By default, what is always the last statement in an ACL?
The last statement in an ACL is always permit deny any? deny any any?

0 JCManalo
201212692

32

d4 1.4.1.4 Exploring Access Layer Functions


Objectives:
Describe the function of the Network Access Layer including equipment usually
installed in the wiring closets.

Figure 33: d4 1.4.1.4


REFLECTION:
A. Why are the Sales and HR servers connected to the network at the Access Layer?
Dahil meron yung Sales at HR servers na higher level of access para sa pag-swap ng
informations.
B. If you wanted to restrict access to the HR server, at which hierarchical network
layer would you place the necessary configuration?
I will choose to put the config dun sa may Distribution 2.

0 JCManalo
201212692

33

S-ar putea să vă placă și