Learn Python, Microsoft 365 and Google Workspace
Connect with me: Youtube | LinkedIn | WhatsApp Channel | Web | Facebook | Twitter
To access the updated handouts, please click on the following link: https://yasirbhutta.github.io/tools/docs/cisco-packet-tracer.html
Objective: Create a simple network where two PCs communicate with each other.
Steps:
IP: 192.168.1.1
Subnet Mask: 255.255.255.0
Do the same for PC2 with:
IP: 192.168.1.2
Subnet Mask: 255.255.255.0
Learning Outcome: Understand basic IP addressing and connectivity testing using the ping command.
Objective: Build a small network with multiple PCs communicating via a switch.
Steps:
PC1: 192.168.1.1 / 255.255.255.0
PC2: 192.168.1.2 / 255.255.255.0
PC3: 192.168.1.3 / 255.255.255.0
PC4: 192.168.1.4 / 255.255.255.0
Learning Outcome: Understand how a switch enables communication between multiple devices on the same network.
Configuring a DHCP (Dynamic Host Configuration Protocol) server in Cisco Packet Tracer allows you to automate the assignment of IP addresses to devices on your network. Below is a step-by-step guide to setting up a DHCP server using Packet Tracer’s built-in server functionality. This guide assumes you have a basic understanding of networking concepts and Packet Tracer’s interface.
Before configuring the DHCP server, you need to set up a basic network topology. Here’s a simple example:
The router will act as the default gateway for your network.
Router> enable
Router# configure terminal
Router(config)# interface GigabitEthernet0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# exit
Router# write memory
Using Packet Tracer’s built-in server functionality is straightforward.
Ensure that client devices are set to obtain their IP addresses automatically.
Ensure that DHCP is correctly assigning IP addresses to all clients.
ping 192.168.1.1
If you prefer to use the router as your DHCP server instead of a dedicated server, follow these steps:
Router> enable
Router# configure terminal
Router(config)# ip dhcp pool LAN
Router(dhcp-config)# network 192.168.1.0 255.255.255.0
Router(dhcp-config)# default-router 192.168.1.1
Router(dhcp-config)# dns-server 8.8.8.8
Router(dhcp-config)# exit
ip dhcp excluded-address
command.
Router(config)# ip dhcp excluded-address 192.168.1.1 192.168.1.10
Router(config)# exit
Router# write memory
ip dhcp excluded-address
command on routers to exclude specific IP ranges.no shutdown
on router interfaces).Configuring a DHCP server in Packet Tracer simplifies network management by automating IP address assignments. Whether you choose to use a dedicated server or configure the router to handle DHCP duties, the process involves setting up the DHCP pool parameters and ensuring clients are set to receive IP addresses automatically. By following the steps outlined above, you can efficiently set up and verify a DHCP server in your simulated network environment.
To configure a DNS server in Cisco Packet Tracer, follow these steps:
Assign IP addresses to each device manually or use DHCP for automatic IP assignment.
www.example.com
).A Record
.
- Record #2:gudgk.edu.pk
).A Record
.ping www.example.com
To create the network diagram in Cisco Packet Tracer based on the whiteboard image, follow these steps:
Devices and IPs:
IP Address: 192.168.30.1
IP Address: 192.168.30.10
Assign IP addresses from the range 192.168.30.160 onwards
IP Address: 192.168.30.30
Connected to a switch, both configured as DHCP clients to obtain IPs dynamically.
Static IP: 192.168.30.31
All PCs, DHCP, and DNS servers are connected through this switch.
Steps in Cisco Packet Tracer:
Drag a Router, Switch, 3 PCs, DHCP Server, and DNS Server onto the workspace.
Go to the Router -> Config tab, assign the IP address 192.168.30.1 to the appropriate interface (e.g., GigabitEthernet0/0).
Set the IP address of the DHCP Server to 192.168.30.10.
Go to the Services tab and configure DHCP. Set the start IP range to 192.168.30.160.
Assign the IP address 192.168.30.30 to the DNS server.
In the Services tab, configure DNS with any domain names you want to resolve.
Domain Name | IP Address |
---|---|
example.com | 192.168.30.50 |
site.local | 192.168.30.60 |
network.internal | 192.168.30.70 |
appserver.company | 192.168.30.80 |
database.service | 192.168.30.90 |
PC1 and PC2: Go to each PC, and in the IP Configuration tab, set the IP configuration to DHCP.
PC3: Manually configure its IP address to 192.168.30.31 in the Static IP section.
Use cables to connect the devices to the switch (PCs, DHCP, DNS Server).
Connect the switch to the router.
To check connectivity between PCs in different subnets as represented in your diagram, you can perform the following tasks:
Make sure that all the PCs are configured with the IP addresses shown in the diagram:
PC1: 192.168.2.10
PC2: 192.168.2.11
PC3: 192.168.1.10
PC4: 192.168.1.11
From PC1, open the terminal and run:
ping 192.168.2.11
From PC2, run:
ping 192.168.2.10
From PC3, open the terminal and run:
ping 192.168.1.11
From PC4, run:
ping 192.168.1.10
From PC1, run:
ping 192.168.1.10
From PC3, run:
ping 192.168.2.10
From PC2, run:
ping 192.168.1.11
From PC4, run:
ping 192.168.2.11
Tips: A router or Layer 3 switch is configured for routing between subnets.
By completing these tasks, you can check the connectivity between PCs in the same and different subnets.
Connecting two Local Area Networks (LANs) using a router allows devices on different networks to communicate with each other.
Network Diagram
[LAN 1] ------ [Router] ------ [LAN 2]
Connecting two Local Area Networks (LANs) using a router in Cisco Packet Tracer involves several steps, including configuring the router and the devices within each LAN. Here’s a detailed guide to help you set up this connection:
Enter
to access the command line interface.Router> enable
Router# configure terminal
optional to show interfaces
Router# show interfaces
Router(config)# interface GigabitEthernet0/0 # Gi0/0 or G0/0 would refer to GigabitEthernet0/0.
Router(config-if)# ip address 192.168.1.1 255.255.255.0 # Assigning IP address
Router(config-if)# no shutdown # Activating the interface
Router(config)# interface GigabitEthernet0/1 # Gi0/1 or G0/1 would refer to GigabitEthernet0/1.
Router(config-if)# ip address 192.168.2.1 255.255.255.0 # Assigning IP address
Router(config-if)# no shutdown # Activating the interface
192.168.1.2
255.255.255.0
192.168.1.1
192.168.2.2
255.255.255.0
192.168.2.1
ping 192.168.2.2 # This pings PC2 in LAN2
Router# write memory
Switch# write memory
By following these steps, you can successfully connect two LANs using a router in Cisco Packet Tracer. This setup allows devices from one LAN to communicate with devices on another LAN, demonstrating the fundamental concept of routing in computer networks. If you have any further questions or need additional details, feel free to ask!
Objective: Create two networks with different subnets and connect them using a router.
Steps:
PCs connected to Switch 1:
PC1: 192.168.1.2 / 255.255.255.0 PC2: 192.168.1.3 / 255.255.255.0
PCs connected to Switch 2:
PC3: 192.168.2.2 / 255.255.255.0 PC4: 192.168.2.3 / 255.255.255.0
Interface Gig0/0: 192.168.1.1 / 255.255.255.0 Interface Gig0/1: 192.168.2.1 / 255.255.255.0
Learning Outcome: Learn basic router configuration to enable communication between different subnets.
Using Cisco Packet Tracer, we can set up a VLAN configuration step-by-step. Let’s create a simple network with two VLANs for two different departments: Sales and Engineering. This example will guide you through configuring VLANs on a Cisco switch.
Enter configuration mode to create the VLANs.
enable
configure terminal
Create VLAN 10 for Sales:
vlan 10
name Sales
Create VLAN 20 for Engineering:
vlan 20
name Engineering
Exit VLAN configuration mode:
exit
Now, assign the ports connected to Sales PCs to VLAN 10 and Engineering PCs to VLAN 20.
Assign FastEthernet0/1 and FastEthernet0/2 to VLAN 10:
# FastEthernet0/1 is often abbreviated as Fa0/1
interface FastEthernet0/1
switchport mode access
switchport access vlan 10
exit
interface FastEthernet0/2
switchport mode access
switchport access vlan 10
exit
Assign FastEthernet0/3 and FastEthernet0/4 to VLAN 20:
interface FastEthernet0/3
switchport mode access
switchport access vlan 20
exit
interface FastEthernet0/4
switchport mode access
switchport access vlan 20
exit
Switch# write memory
Now, assign IP addresses to each PC according to the VLAN they belong to.
To check the VLAN configuration on a Cisco switch, you can use the following commands in privileged EXEC mode:
Show VLANs
show vlan brief
Output Example:
VLAN Name Status Ports
---- -------------------------------- --------- ----------------
1 default active Fa0/1, Fa0/2
10 Sales active Fa0/3, Fa0/4
20 Engineering active Fa0/5, Fa0/6
Open the Command Prompt on each PC and use the ping
command to test connectivity:
ping 192.168.10.2
It should succeed.
ping 192.168.10.20
This should also succeed.
This setup demonstrates how to create and assign VLANs on a Cisco switch using Cisco Packet Tracer. Each VLAN can only communicate within its own network segment, providing network segmentation and increased security.
To configure a web server using Cisco Packet Tracer, follow these steps:
Launch Cisco Packet Tracer and open a new workspace.
Use a copper straight-through cable to connect:
Click on the Server to open its configuration panel.
Go to the Desktop tab and select IP Configuration.
Assign an IP address to the server, e.g., 192.168.1.2.
Set the subnet mask, e.g., 255.255.255.0.
Leave the default gateway blank for now if it’s a simple setup.
Go to the Services tab.
Click on HTTP and turn on the HTTP service (it’s usually on by default).
Optionally, turn on the HTTPS service for secure connections.
Click on the PC to open its configuration panel.
Go to the Desktop tab and select IP Configuration.
Assign an IP address, e.g., 192.168.1.3.
Use the same subnet mask as the server, e.g., 255.255.255.0.
Set the default gateway to 192.168.1.1 (if required for external routing).
Go to the PC’s Desktop, open the Command Prompt, and type:
ping 192.168.1.2
If the ping is successful, the connection is working.
On the PC, open the Web Browser from the Desktop tab.
In the URL bar, enter the server’s IP address, e.g., http://192.168.1.2.
The web browser should display the default web page hosted by the Packet Tracer server.
In the Services tab of the server, under HTTP, you can modify the content of the web page (e.g., index.html) by editing the file.
This allows you to serve custom content to clients accessing the web server.
Once everything is working, save your project for future reference.
This basic configuration sets up a web server in Cisco Packet Tracer for a small network.
To upload a custom index.html page on a web server in Cisco Packet Tracer, follow these steps:
You can either edit this file directly or upload your own HTML file.
Click on the file name (index.html) and a text editor will appear where you can modify the contents of the web page.
Replace the default HTML content with your custom HTML code.
Click the Upload button (if available) and browse for the index.html file from your computer (this option is not always available depending on the version of Packet Tracer you’re using).
Once you’ve edited or uploaded the HTML file:
This process allows you to customize the web content served by the server in Cisco Packet Tracer.
To configure a DNS server in Cisco Packet Tracer to redirect a domain name (e.g., www.example.com) to a specific website hosted on a web server, follow these steps:
Ensure you have the following devices already placed and connected in Cisco Packet Tracer:
Under Name, enter the domain name you want to use (e.g., www.example.com).
Under Address, enter the IP address of the web server (e.g., 192.168.1.2).
Click Add to add this DNS entry.
ping www.example.com
This should resolve to the IP address of the web server (192.168.1.2).
You should be redirected to the website hosted on the web server.
After verifying that everything works, save your Packet Tracer project.
This setup allows you to configure a DNS server that resolves a domain name to the IP address of a web server, effectively redirecting the domain to the website.
192.168.1.1
.192.168.1.x
subnet.192.168.1.7
.192.168.10.x
subnet.192.168.10.10
.192.168.10.20
.192.168.1.1
.192.168.10.1
.192.168.1.x
with:
192.168.1.1
.192.168.1.100
to 192.168.1.200
).www.example.com
to 192.168.10.10
).192.168.10.10
) and domain name (via the DNS Server).192.168.1.x
192.168.10.x
192.168.1.1
192.168.2.1
192.168.2.2
192.168.10.1
ip route 192.168.10.0 255.255.255.0 192.168.2.2
ip route 192.168.1.0 255.255.255.0 192.168.2.1
ping
command from one PC to another PC in the other network to verify connectivity.##
Here’s an updated task incorporating a Class B network for the connections between routers and Class C private networks for the LANs.
Objective: Simulate a network with Class B subnets for inter-router connections and Class C private subnets for LANs. Configure IP addressing, routing, and basic connectivity.
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
172.16.4.0/30
for Router 1 ↔ Router 2 (subnet mask 255.255.255.252
)172.16.5.0/30
for Router 2 ↔ Router 3192.168.1.1/24
192.168.1.10-192.168.1.254
192.168.2.1/24
192.168.2.10
192.168.3.1/24
192.168.3.10
172.16.4.1/30
172.16.4.2/30
172.16.5.1/30
172.16.5.2/30
192.168.1.0/24
).192.168.1.1
(Router 1).www.example.com
to 192.168.2.10
).192.168.1.10
) to the DNS server.www.google.com
to 192.168.3.10
).192.168.1.10
) to the DNS server.192.168.2.10
) to the Web Server in LAN2192.168.3.10
) to the Web Server in LAN3.192.168.1.1
192.168.2.1
192.168.3.1
ip route 192.168.2.0 255.255.255.0 172.16.4.2
ip route 192.168.3.0 255.255.255.0 172.16.4.2
ip route 192.168.1.0 255.255.255.0 172.16.4.1
ip route 192.168.3.0 255.255.255.0 172.16.5.2
ip route 192.168.2.0 255.255.255.0 172.16.5.1
ip route 192.168.3.0 255.255.255.0 172.16.5.1
RIP (Routing Information Protocol) is one of the oldest and simplest distance-vector routing protocols used to determine the best path for data packets in a network. It works by sharing routing tables between routers at regular intervals.
Versions of RIP:
RIPv1: Classful (does not support subnet masks). Broadcasts updates.
RIPv2: Classless (supports subnet masks). Uses multicasts for routing updates. Supports authentication.
RIPng: Designed for IPv6 networks.
Objective: Simulate a network with Class B subnets for inter-router connections and Class C private subnets for LANs. Use RIP (Routing Information Protocol) to enable dynamic routing between routers and ensure connectivity across LANs.
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
172.16.4.0/30
for Router 1 ↔ Router 2172.16.5.0/30
for Router 2 ↔ Router 3192.168.1.1/24
192.168.1.10-192.168.1.254
192.168.2.1/24
192.168.2.10
192.168.3.1/24
172.16.4.1/30
172.16.4.2/30
172.16.5.1/30
172.16.5.2/30
192.168.1.2
).192.168.1.10 - 192.168.1.254
).192.168.1.1
.192.168.1.3
).www.example.com
→ 192.168.2.10
(Web Server in LAN2).www.test.com
→ 192.168.3.10
(Web Server in LAN3).192.168.2.10
.192.168.3.10
.Router> enable
Router# configure terminal
Router(config)# router rip
Router(config-router)# version 2
Router(config-router)# network 192.168.1.0
Router(config-router)# network 172.16.4.0
Router(config-router)# network 192.168.2.0
Router(config-router)# network 172.16.4.0
Router(config-router)# network 172.16.5.0
Router(config-router)# network 192.168.3.0
Router(config-router)# network 172.16.5.0
Router(config-router)# exit
Router# write memory
see Appendix B to learn the Importance of Configuring Network Addresses in RIP Protocol
192.168.2.10
).www.example.com
).Router# show ip route
To configure a DHCP (Dynamic Host Configuration Protocol) server in Cisco Packet Tracer, follow these steps:
For example:
DHCP_Pool
192.168.1.1
8.8.8.8
(or any DNS server)192.168.1.10
255.255.255.0
50
If you’re using a router to provide DHCP addresses, you need to configure the router to relay DHCP requests:
Router> enable
Router# configure terminal
Router(config)# ip dhcp pool DHCP_Pool
Router(dhcp-config)# network 192.168.1.0 255.255.255.0
Router(dhcp-config)# default-router 192.168.1.1
Router(dhcp-config)# dns-server 8.8.8.8
Router(dhcp-config)# exit
Router(config)# ip dhcp excluded-address 192.168.1.1 192.168.1.9
In RIP (Routing Information Protocol), we configure network addresses to inform the router which networks it should include in the routing process. This configuration allows RIP to:
Suppose you have the following networks connected to a router:
192.168.1.0/24
172.16.4.0/30
By configuring these network addresses in RIP:
router rip
version 2
network 192.168.1.0
network 172.16.4.0
Without specifying the network addresses:
Here are additional beginner-friendly Cisco Packet Tracer lab tasks that introduce essential networking concepts:
Lab Task 24: Basic Router Configuration
Objective: Configure basic router settings such as hostname, passwords, and interfaces.
Steps:
Create a network with a Router and a PC connected to the router.
Configure the router’s hostname and passwords:
Router> enable Router# configure terminal Router(config)# hostname MyRouter Router(config)# enable secret cisco123 Router(config)# line console 0 Router(config-line)# password console123 Router(config-line)# login Router(config-line)# exit Router(config)# line vty 0 4 Router(config-line)# password vty123 Router(config-line)# login Router(config-line)# exit
Router(config)# interface gig0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shutdown
Learning Outcome: Learn how to set up a router’s basic settings, such as passwords and IP configurations, and establish basic network connectivity.
Lab Task 25: Configuring a Switch
Objective: Set up a switch with basic configurations, including VLANs and interface settings.
Steps:
Create a network with a Switch and two PCs.
Configure the switch’s hostname and enable port security:
Switch> enable Switch# configure terminal Switch(config)# hostname MySwitch Switch(config)# interface range fa0/1 - 2 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport port-security Switch(config-if-range)# switchport port-security maximum 1 Switch(config-if-range)# switchport port-security violation shutdown
Switch(config)# vlan 10 Switch(config-vlan)# name Sales Switch(config)# interface fa0/1 Switch(config-if)# switchport access vlan 10 Switch(config-if)# exit Switch(config)# interface fa0/2 Switch(config-if)# switchport access vlan 10
Learning Outcome: Understand how to configure a switch for basic VLAN and port security settings.
Lab Task 26: Static Routing Configuration
Objective: Configure static routes between two routers.
Steps:
Create a network with two routers, two switches, and four PCs.
Assign IP addresses to each network segment:
Router 1 (Gig0/0): 192.168.1.1 / 255.255.255.0
Router 1 (Gig0/1): 192.168.2.1 / 255.255.255.0
Router 2 (Gig0/0): 192.168.2.2 / 255.255.255.0
Router 2 (Gig0/1): 192.168.3.1 / 255.255.255.0
On Router 1:
Router1> enable Router1# configure terminal Router1(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2
On Router 2:
Router2> enable Router2# configure terminal Router2(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.1
Learning Outcome: Learn how to configure static routing to enable communication between different networks.
Lab Task 27: Basic DHCP Configuration
Objective: Set up a DHCP server on a router to dynamically assign IP addresses to client devices.
Steps:
Create a network with a Router, Switch, and three PCs.
Configure the router’s DHCP settings:
Router> enable Router# configure terminal Router(config)# ip dhcp excluded-address 192.168.1.1 192.168.1.10 Router(config)# ip dhcp pool MYPOOL Router(config-dhcp)# network 192.168.1.0 255.255.255.0 Router(config-dhcp)# default-router 192.168.1.1 Router(config-dhcp)# dns-server 8.8.8.8
Router(config)# interface gig0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shutdown
Learning Outcome: Understand how to configure a router to act as a DHCP server and provide dynamic IP addresses to clients.
Lab Task 28: Configuring PAT (Port Address Translation)
Objective: Configure PAT to allow multiple internal devices to access the internet using a single public IP address.
Steps:
Create a network with a Router, Switch, and three PCs. Connect the router to the internet cloud (or simulate a WAN connection).
Assign private IP addresses to the PCs:
PC1: 192.168.1.2 / 255.255.255.0
PC2: 192.168.1.3 / 255.255.255.0
PC3: 192.168.1.4 / 255.255.255.0
Router> enable Router# configure terminal Router(config)# interface gig0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shutdown Router(config-if)# exit Router(config)# interface gig0/1 Router(config-if)# ip address 10.0.0.1 255.255.255.0 Router(config-if)# no shutdown
Router(config)# ip nat inside source list 1 interface gig0/1 overload Router(config)# access-list 1 permit 192.168.1.0 0.0.0.255 Router(config)# interface gig0/0 Router(config-if)# ip nat inside Router(config-if)# exit Router(config)# interface gig0/1 Router(config-if)# ip nat outside
Learning Outcome: Understand how to configure PAT for multiple internal devices to access external networks using one public IP.
Lab Task 29: Configuring ACL (Access Control List)
Objective: Configure an ACL to restrict access to certain parts of the network.
Steps:
Create a network with a Router, Switch, and two PCs.
Assign IP addresses:
PC1: 192.168.1.2 / 255.255.255.0
PC2: 192.168.1.3 / 255.255.255.0
Router> enable Router# configure terminal Router(config)# interface gig0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shutdown
Router(config)# access-list 100 deny ip host 192.168.1.2 any Router(config)# access-list 100 permit ip any any Router(config)# interface gig0/0 Router(config-if)# ip access-group 100 in
Learning Outcome: Understand how to configure basic ACLs to control network traffic and enforce security policies.
Lab Task 30: Basic OSPF Configuration
Objective: Configure OSPF on multiple routers to allow dynamic routing between different networks.
Steps:
Create a network with three routers and three PCs, each connected to a different router.
Assign IP addresses to each network segment:
Router 1: `192.168.1
Here are more Cisco Packet Tracer lab tasks specifically focused on firewalls and web servers:
Lab Task 18: Basic Firewall Configuration
Objective: Configure a basic firewall to allow HTTP traffic to a web server and block all other traffic.
Steps:
Router
Firewall
Web Server
Two PCs
Web Server: 192.168.2.2 / 255.255.255.0
Internal Network (PCs): 192.168.1.x / 255.255.255.0
Firewall Interfaces:
Inside (to PCs): 192.168.1.1
Outside (to Web Server): 192.168.2.1
Allow HTTP (port 80) traffic from the internal network to the web server.
Block all other traffic by default.
Example ACL:
Firewall> enable Firewall# configure terminal Firewall(config)# access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.2.2 eq 80 Firewall(config)# access-list 100 deny ip any any Firewall(config)# interface inside Firewall(config-if)# ip access-group 100 in
Learning Outcome: Understand how to configure basic firewall rules to allow HTTP traffic while blocking other traffic.
Lab Task 19: Configuring Firewall with NAT (Network Address Translation)
Objective: Configure a firewall to use NAT to translate private IPs into public IPs while allowing external access to a web server.
Steps:
Router
Firewall
Web Server
Two Internal PCs
Internal Network (PCs): 192.168.1.x / 255.255.255.0
Web Server: 192.168.2.2 / 255.255.255.0
Router (External Network): 10.0.0.1 / 255.255.255.0
Firewall Inside: 192.168.1.1
Firewall DMZ: 192.168.2.1
Firewall Outside: 10.0.0.2
Enable NAT on the inside and outside interfaces.
Use a static NAT translation for the web server so that external users can access it.
Firewall> enable Firewall# configure terminal Firewall(config)# interface inside Firewall(config-if)# ip nat inside Firewall(config-if)# exit Firewall(config)# interface outside Firewall(config-if)# ip nat outside Firewall(config-if)# exit Firewall(config)# ip nat inside source static 192.168.2.2 10.0.0.2
Learning Outcome: Learn how to use NAT in a firewall to allow both internal and external communication, including web server access.
Lab Task 20: Implementing DMZ (Demilitarized Zone) with Firewall
Objective: Set up a DMZ using a firewall to host a web server, ensuring it can be accessed from the internet but is isolated from the internal network.
Steps:
Router
Firewall
Web Server in the DMZ
Two PCs in the internal network
Web Server (DMZ): 192.168.100.2 / 255.255.255.0
Internal Network (PCs): 192.168.1.x / 255.255.255.0
Firewall:
Inside: 192.168.1.1
DMZ: 192.168.100.1
Outside: 10.0.0.2
Inside: The internal network.
DMZ: Where the web server is placed.
Outside: The internet.
Allow traffic from Outside to the DMZ for HTTP (port 80) only.
Allow traffic from Inside to Outside for all traffic.
Deny direct traffic from the Inside network to the DMZ.
Example:
Firewall> enable Firewall# configure terminal Firewall(config)# access-list 101 permit tcp any host 192.168.100.2 eq 80 Firewall(config)# access-list 102 permit ip 192.168.1.0 0.0.0.255 any Firewall(config)# access-list 103 deny ip 192.168.1.0 0.0.0.255 192.168.100.0 0.0.0.255 Firewall(config)# interface outside Firewall(config-if)# ip access-group 101 in Firewall(config-if)# interface inside Firewall(config-if)# ip access-group 102 in Firewall(config-if)# ip access-group 103 in
Accessing the web server from the outside network.
Ensuring that internal PCs cannot directly access the DMZ.
Internal PCs should be able to access the internet.
Learning Outcome: Understand how to use a firewall to configure a DMZ that isolates the internal network from publicly accessible servers.
Lab Task 21: Web Server Load Balancing using Firewalls
Objective: Configure load balancing between multiple web servers using a firewall to distribute traffic.
Steps:
Router
Firewall
Two Web Servers
Two PCs in the internal network.
Web Server 1: 192.168.2.2 / 255.255.255.0
Web Server 2: 192.168.2.3 / 255.255.255.0
Internal Network (PCs): 192.168.1.x / 255.255.255.0
Firewall Inside: 192.168.1.1
Firewall DMZ: 192.168.2.1
Firewall Outside: 10.0.0.2
Set up a virtual IP for the web servers (e.g., 192.168.2.10).
Distribute traffic between the two web servers.
Firewall> enable Firewall# configure terminal Firewall(config)# ip nat inside source static tcp 192.168.2.2 80 10.0.0.2 80 Firewall(config)# ip nat inside source static tcp 192.168.2.3 80 10.0.0.2 80
Learning Outcome: Learn how to configure load balancing on firewalls to distribute traffic to multiple servers and ensure high availability.
Lab Task 22: Configuring a Firewall with IPS (Intrusion Prevention System)
Objective: Set up a firewall with an IPS to detect and block malicious traffic.
Steps:
Router
Firewall with IPS
Web Server
Internal PCs
Web Server: 192.168.2.2 / 255.255.255.0
Internal Network (PCs): 192.168.1.x / 255.255.255.0
Firewall Inside: 192.168.1.1
Firewall Outside: 192.168.2.1
Firewall> enable Firewall# configure terminal Firewall(config)# ips signature-definition attack-type sql-injection Firewall(config)# ips signature action deny Firewall(config)# ips signature enable
Learning Outcome: Understand how to configure and use IPS on a firewall to protect against common network attacks.
Lab Task 23: Configuring Web Content Filtering with Firewall
Objective: Set up a firewall to block access to specific websites or content types.
Steps:
Here are more Cisco Packet Tracer lab tasks for beginners that involve slightly advanced concepts and more hands-on practice:
Lab Task 12: Configuring and Verifying SSH on a Router
Objective: Secure access to the router using SSH instead of Telnet.
Steps:
Create a simple network with a Router, Switch, and PC.
Assign an IP address to the router’s GigabitEthernet interface connected to the switch:
Router> enable Router# configure terminal Router(config)# interface gig0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shutdown
Router(config)# hostname MyRouter Router(config)# ip domain-name example.com Router(config)# crypto key generate rsa Router(config)# username admin privilege 15 secret password123 Router(config)# line vty 0 4 Router(config-line)# login local Router(config-line)# transport input ssh Router(config-line)# exit Router(config)# ip ssh version 2
ssh -l admin 192.168.1.1
Enter the password when prompted.
Learning Outcome: Understand how to secure remote access to a router using SSH instead of Telnet.
Lab Task 13: Configuring a Web Server and DNS Server
Objective: Set up a web server and a DNS server to allow clients to access a website using a domain name.
Steps:
Drag a Router, Switch, Web Server, DNS Server, and two PCs onto the workspace.
Assign IP addresses to the devices as follows:
Web Server: 192.168.1.2
DNS Server: 192.168.1.3
PC1: 192.168.1.4
PC2: 192.168.1.5
Open the DNS server, go to the Services tab, and enable the DNS service.
Add a new A record:
Name: mywebsite.com
Address: 192.168.1.2
Open the web server, go to the Services tab, and enable the HTTP service.
IP Address: 192.168.1.4 (PC1) and 192.168.1.5 (PC2)
Default Gateway: 192.168.1.1
DNS Server: 192.168.1.3
Learning Outcome: Learn how to configure DNS and web servers for clients to access websites using domain names.
Lab Task 14: Configuring EtherChannel
Objective: Configure EtherChannel to increase bandwidth and provide redundancy between switches.
Steps:
Drag two Switches onto the workspace and connect them with four Ethernet cables (e.g., Fa0/1, Fa0/2, Fa0/3, Fa0/4).
Configure EtherChannel on both switches using the Port-Channel Interface:
On Switch 1:
Switch1> enable Switch1# configure terminal Switch1(config)# interface range fa0/1 - 4 Switch1(config-if-range)# channel-group 1 mode active Switch1(config-if-range)# exit Switch1(config)# interface port-channel 1 Switch1(config-if)# switchport mode trunk
On Switch 2:
Switch2> enable Switch2# configure terminal Switch2(config)# interface range fa0/1 - 4 Switch2(config-if-range)# channel-group 1 mode active Switch2(config-if-range)# exit Switch2(config)# interface port-channel 1 Switch2(config-if)# switchport mode trunk
Switch# show etherchannel summary
Learning Outcome: Learn how to configure EtherChannel to increase the bandwidth between two switches and provide redundancy.
Lab Task 15: Configuring HSRP (Hot Standby Router Protocol)
Objective: Configure HSRP to provide redundancy for a default gateway.
Steps:
Create a network with two Routers, one Switch, and two PCs. Connect both routers to the switch.
Assign IP addresses to the routers and PCs:
Router 1 (Gig0/0): 192.168.1.1 / 255.255.255.0
Router 2 (Gig0/0): 192.168.1.2 / 255.255.255.0
PCs: IP addresses in the range 192.168.1.x / 255.255.255.0, default gateway 192.168.1.3
On Router 1:
Router1> enable Router1# configure terminal Router1(config)# interface gig0/0 Router1(config-if)# standby 1 ip 192.168.1.3 Router1(config-if)# standby 1 priority 110 Router1(config-if)# standby 1 preempt Router1(config-if)# standby 1 version 2 Router1(config-if)# exit
On Router 2:
Router2> enable Router2# configure terminal Router2(config)# interface gig0/0 Router2(config-if)# standby 1 ip 192.168.1.3 Router2(config-if)# standby 1 priority 90 Router2(config-if)# standby 1 preempt Router2(config-if)# standby 1 version 2 Router2(config-if)# exit
Learning Outcome: Understand how to configure HSRP for gateway redundancy, ensuring network uptime.
Lab Task 16: Configuring BGP (Border Gateway Protocol)
Objective: Set up basic BGP routing between two autonomous systems (AS).
Steps:
Create a network with two Routers in different AS networks (e.g., AS 100 and AS 200).
Assign IP addresses to the routers:
Router 1: 192.168.1.1 / 255.255.255.0
Router 2: 192.168.2.1 / 255.255.255.0
On Router 1:
Router1> enable Router1# configure terminal Router1(config)# router bgp 100 Router1(config-router)# neighbor 192.168.2.1 remote-as 200 Router1(config-router)# network 192.168.1.0 mask 255.255.255.0
On Router 2:
Router2> enable Router2# configure terminal Router2(config)# router bgp 200 Router2(config-router)# neighbor 192.168.1.1 remote-as 100 Router2(config-router)# network 192.168.2.0 mask 255.255.255.0
Router# show ip bgp
Learning Outcome: Learn the basics of configuring BGP for communication between two different autonomous systems.
Lab Task 17: Configuring a DMZ (Demilitarized Zone) with a Firewall
Objective: Create a DMZ using a router and firewall to separate public servers from internal networks.
Steps:
Set up a network with a Router, Firewall, Web Server, and two PCs.
Assign the following IP addresses:
Public Web Server: 192.168.100.2 / 255.255.255.0
Internal Network (PCs): 192.168.1.x / 255.255.255.0
Firewall interfaces: Internal: 192.168.1.1, External (DMZ): 192.168.100.1
Configure the firewall to allow web traffic (HTTP) to the web server but block any other traffic to the internal network.
Test by accessing the web server from an external PC while ensuring internal
Here are more beginner-level lab tasks to practice in Cisco Packet Tracer:
Lab Task 6: Configuring VLANs (Virtual LANs)
Objective: Create multiple VLANs to segment network traffic.
Steps:
Drag a Switch and connect four PCs to the switch using Copper Straight-Through cables.
Configure two VLANs on the switch:
VLAN 10: For PC1 and PC2
VLAN 20: For PC3 and PC4
PC1 and PC2: 192.168.10.x / 255.255.255.0
PC3 and PC4: 192.168.20.x / 255.255.255.0
Switch> enable Switch# configure terminal Switch(config)# vlan 10 Switch(config-vlan)# name Sales Switch(config-vlan)# exit Switch(config)# vlan 20 Switch(config-vlan)# name HR Switch(config-vlan)# exit Switch(config)# interface range fa0/1 - 2 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# exit Switch(config)# interface range fa0/3 - 4 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 20
Learning Outcome: Learn how to segment traffic using VLANs to increase network security and performance.
Lab Task 7: Inter-VLAN Routing
Objective: Configure a router to allow communication between two VLANs.
Steps:
Use the same setup as in Lab Task 6 (with two VLANs on the switch).
Add a Router and connect it to the switch using a Copper Straight-Through cable.
Configure a Router-on-a-Stick:
On the router, configure subinterfaces:
Router> enable Router# configure terminal Router(config)# interface gig0/0 Router(config-if)# no shutdown Router(config-if)# exit Router(config)# interface gig0/0.10 Router(config-subif)# encapsulation dot1Q 10 Router(config-subif)# ip address 192.168.10.1 255.255.255.0 Router(config-subif)# exit Router(config)# interface gig0/0.20 Router(config-subif)# encapsulation dot1Q 20 Router(config-subif)# ip address 192.168.20.1 255.255.255.0 Router(config-subif)# exit
PC1 and PC2: 192.168.10.1
PC3 and PC4: 192.168.20.1
Learning Outcome: Understand how to use a router to enable communication between VLANs.
Lab Task 8: Configuring a Wireless Network
Objective: Set up a simple wireless network with a router and wireless clients.
Steps:
Drag a Wireless Router and connect a PC to it using Copper Straight-Through cable.
Drag two Laptop PCs onto the workspace and configure them for wireless communication.
Click on the wireless router, go to the Config tab, and set the following:
SSID: MyNetwork
Security Mode: WPA2-PSK
Password: mypassword
On the laptops, go to the Desktop tab, open PC Wireless settings, and connect to the network “MyNetwork” using the password “mypassword.”
Assign IP addresses via DHCP on the wireless router:
IP address range: 192.168.0.100 - 192.168.0.200 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.0.1
Learning Outcome: Learn how to set up and configure a basic wireless network with security features.
Lab Task 9: Network Address Translation (NAT)
Objective: Configure NAT on a router to allow private IP addresses to communicate with the outside world.
Steps:
Create a simple network with a Router, Switch, and PCs. Add another Router to act as the outside world.
Assign IP addresses to the devices:
Inside network (connected to Router 1): 192.168.1.x / 255.255.255.0
Outside network (connected to Router 2): 10.0.0.x / 255.255.255.0
Router1> enable Router1# configure terminal Router1(config)# interface gig0/0 Router1(config-if)# ip address 192.168.1.1 255.255.255.0 Router1(config-if)# no shutdown Router1(config-if)# exit Router1(config)# interface serial0/0/0 Router1(config-if)# ip address 10.0.0.1 255.255.255.0 Router1(config-if)# no shutdown Router1(config)# ip nat inside source list 1 interface serial0/0/0 overload Router1(config)# access-list 1 permit 192.168.1.0 0.0.0.255 Router1(config)# interface gig0/0 Router1(config-if)# ip nat inside Router1(config-if)# exit Router1(config)# interface serial0/0/0 Router1(config-if)# ip nat outside Router1(config-if)# exit
Learning Outcome: Understand how NAT allows private IP addresses to communicate with external networks by translating them into public IP addresses.
Lab Task 10: Access Control Lists (ACLs)
Objective: Configure ACLs to control access to certain parts of the network.
Steps:
Create a network with a Router, Switch, and two PCs.
Assign IP addresses:
PC1: 192.168.1.2 / 255.255.255.0
PC2: 192.168.1.3 / 255.255.255.0
Router> enable Router# configure terminal Router(config)# access-list 1 deny 192.168.1.3 Router(config)# access-list 1 permit any Router(config)# interface gig0/0 Router(config-if)# ip access-group 1 in Router(config-if)# exit
Learning Outcome: Learn how to use ACLs to control network traffic and implement basic security policies.
Lab Task 11: Simple OSPF Configuration
Objective: Set up OSPF routing between two routers.
Steps:
Drag two Routers and connect them via a serial link. Connect each router to its own LAN with Switches and PCs.
Assign IP addresses to all devices in different subnets.
Configure OSPF on both routers:
Router1> enable Router1# configure terminal Router1(config)# router ospf 1 Router1(config-router)# network 192.168.1.0 0.0.0.255 area 0 Router1(config-router)# exit
Do the same for Router 2, adjusting the network command for its subnet.
Learning Outcome: Understand basic dynamic routing using OSPF.
These lab tasks cover a range of fundamental networking concepts like VLANs, wireless networks, NAT, ACLs, and dynamic routing protocols like OSPF. By completing them, you will develop a strong foundation in network configuration and management.
Here are some simple Cisco Packet Tracer lab tasks for beginners to get started with basic network concepts:
Lab Task 5: Basic Static Routing Between Two Routers
Objective: Configure two routers to enable communication between two different networks using static routing.
Steps:
Create two separate LANs (with a router, switch, and two PCs in each LAN).
Connect the two routers using a serial link.
Assign IP addresses to the PCs, routers, and serial interfaces (use two different subnets for each LAN and a third subnet for the serial link).
Configure static routes on both routers:
On Router 1:
Router(config)# ip route 192.168.2.0 255.255.255.0 10.0.0.2
On Router 2:
Router(config)# ip route 192.168.1.0 255.255.255.0 10.0.0.1
Learning Outcome: Learn how to configure static routes on routers for inter-network communication.
These lab tasks will help beginners understand the basics of networking using Cisco Packet Tracer, including IP addressing, switching, routing, and dynamic configuration.