R1,R2,R3--------------
Router(config)#hostname R1
Enable Secret Password:
Router(config)#enable secret class
Configure a password of cisco :R1,R2,R3
R3(config)#line console 0
R3(config-line)#password cisco
R3(config-line)#login
Configure a password of cisco for vty connections. R1,R2,R3
R1(config)#line vty 0 4
R1(config-line)#password cisco
R1(config-line)#login
Enable OSPF using process ID 1 on all routers for all networks:
R2(config)#router ospf 1
R2(config-router)#network 192.168.20.0 0.0.0.255 area 0
R2(config-router)#network 10.1.1.0 0.0.0.3 area 0
R2(config-router)#network 10.2.2.0 0.0.0.3 area 0
R1(config)#router ospf 1
R1(config-router)#network 192.168.10.0 0.0.0.255 area 0
R1(config-router)#network 192.168.11.0 0.0.0.255 area 0
R1(config-router)#network 10.1.1.0 0.0.0.3 area 0
R2(config-router)#network 209.165.200.0 0.0.0.3 area 0
R1(config)#router ospf 1
R1(config-router)#network 192.168.10.0 0.0.0.255 area 0
R1(config-router)#network 192.168.11.0 0.0.0.255 area 0
R1(config-router)#network 10.1.1.0 0.0.0.3 area 0
Configure a loopback interface on R2.
R2(config)#interface lo 0
R2(config-if)#ip address 209.165.200.225 255.255.255.224
R2(config-if)#no shutdown
Configure IP addresses for the VLAN 1 interface on each switch.
Switch 1:
Switch(config)#interface vlan 1
Switch(config-if)#ip address 192.168.10.2 255.255.255.0
Switch 2:
Switch(config)#interface vlan 1
Switch(config-if)#ip address 192.168.11.2 255.255.255.0
Switch 3:
Switch(config)#interface vlan 1
Switch(config-if)#ip address 192.168.30.2 255.255.255.0
Configure each switch with the appropriate default gateway.
Switch 1:
Switch(config)#ip default-gateway 192.168.10.1
Switch 2:
Switch(config)#ip default-gateway 192.168.11.1
Switch 3:
Switch(config)#ip default-gateway 192.168.30.1
Task 2: Configuring a Standard ACL
R1(config)#ip access-list standard std-1
R1(config-std-nacl)#deny 192.168.11.0 0.0.0.255
R1(config)#interface fastEthernet 1/0
R1(config-if)#ip access-group std-1 in
Task 4:
R2(config)#ip access-list standard task-4
R2(config-std-nacl)#permit 10.2.2.0 0.0.0.3
R2(config-std-nacl)#permit 192.168.30.0 0.0.0.255
R2(config-std-nacl)#deny any
R2(config)#line vty 0 4
R2(config-line)#access-class task-4 in
R1#telnet 10.1.1.2
LAB 11 -- ACL 2
Task 1:
Task 2:
Router(config)#hostname R1
To disable DNS Lookup-(to search unknown command takes more time to disable searching)
R1(config)#no ip domain-lookup
Setting banner for the router:
R1(config)#banner motd #
Enter TEXT message. End with the character '#'.
Hirushan's router 1 #
R1(config)#
--Router 1,2,3
R1(config)#line vty 0 4
R1(config-line)#password cisco
R1(config-line)#exit
R1(config)#enable password class
Pc1---Telnet
PC>telnet 10.1.1.254
Trying 10.1.1.254 ...
Hirushan's router 1
User Access Verification
Password: cisco
R1>enable
Password: class
R1#
--TElnet pc 1 to Router 2
PC>telnet 10.1.0.2
Trying 10.1.0.2 ...
User Access Verification
Password:
-telnet pc 1 to Router 3
PC>telnet 10.3.0.2
Trying 10.3.0.2 ...
User Access Verification
Password:
R1(config)#ip access-list standard hirushan
R1(config-std-nacl)#permit 10.1.0.0 0.0.0.255
R1(config)#interface fastEthernet 0/0
R1(config-if)#line vty 0 4
R1(config-line)#ip access-class hirusahn in
Check connectivity:
PC>telnet 10.3.1.1
Trying 10.3.1.1 ...
% Connection refused by remote host
R2(config)#access-list 101 deny tcp 10.1.1.0 0.0.0.255 10.3.1.0 0.0.0.255 eq telnet
R2(config)#access-list 101 permit ip any any
R2(config)#access-list 101 permit icmp any 10.1.0.2 0.0.0.0
R2(config)#access-list 101 permit tcp any any eq 80
R2(config-if)#ip access-group 101 in
Lab13-DCCN
HeadQ-
Router(config-if)#encapsulation frame-relay
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#interface serial 1/0.102 point-to-point
Router(config-subif)#ip address 192.168.102.1 255.255.255.0
Router(config-subif)#frame-relay interface-dlci 102
For other routers-Use main interface
Router(config)#interface serial 1/0
Router(config-if)#encapsulation frame-relay
Router(config-if)#ip address 192.168.103.2 255.255.255.0
Router(config-if)#frame-relay interface-dlci 301
FrameRelay-
Ser0- DLCI-102 Head to Kandy
DLCI-103 Head to Galle
Ser 1-DLCI-201 Kandy To HeadQ
Ser 2 -DLCI-301 Galle to HeadQ
kandy
Router(config)#router eigrp 1
Router(config-router)#network 200.200.102.0 0.0.0.255
Router(config-router)#network 192.168.102.0 0.0.0.255
HQ-
Router(config)#router eigrp 1
Router(config-router)#network 192.168.102.0 0.0.0.255
Router(config-router)#network 192.168.103.0 0.0.0.255
Router(config-router)#network 10.10.10.0 0.0.0.255
Galle-
Router(config)#router eigrp 1
Router(config-router)#network 192.168.103.0 0.0.0.255
Router(config-router)#network 200.200.103.0 0.0.0.255
Part 1:
Router1 configuration.......
router(config)#router ospf 1
Router(config-router)#network 172.16.10.0 0.0.0.255 area 0 //backbone area (same domain)
Router(config-router)#network 10.10.10.196 0.0.0.3 area 0
Router(config-router)#network 10.10.10.200 0.0.0.3 area 0
Router2
Router(config)#router ospf 1
Router(config-router)#network 10.10.10.192 0.0.0.3 area 0
Router(config-router)#network 10.10.10.196 0.0.0.3 area 0
Router(config-router)#network 192.168.10.0 0.0.0.255 area 0
Router 3
Router(config)#router ospf 1
Router(config-router)#network 10.10.10.192 0.0.0.3 area 0
Router(config-router)#network 10.10.10.200 0.0.0.3 area 0
Router(config-router)#network 172.16.10.32 0.0.0.31 area 0
Part 2:
Router#show ip route
Part 3:
Router#show ip ospf database
Router ID's :
Router 1:
OSPF Router with ID (172.16.10.1)
Router 2:
OSPF Router with ID (192.168.10.1)
Router 3:
OSPF Router with ID (172.16.10.33)
Part 5:
PC>tracert 172.16.10.33
Shortest Path
R1,R2,R3--------------
Router(config)#hostname R1
Enable Secret Password:
Router(config)#enable secret class
Configure a password of cisco :R1,R2,R3
R3(config)#line console 0
R3(config-line)#password cisco
R3(config-line)#login
Configure a password of cisco for vty connections. R1,R2,R3
R1(config)#line vty 0 4
R1(config-line)#password cisco
R1(config-line)#login
Enable OSPF using process ID 1 on all routers for all networks:
R2(config)#router ospf 1
R2(config-router)#network 192.168.20.0 0.0.0.255 area 0
R2(config-router)#network 10.1.1.0 0.0.0.3 area 0
R2(config-router)#network 10.2.2.0 0.0.0.3 area 0
R1(config)#router ospf 1
R1(config-router)#network 192.168.10.0 0.0.0.255 area 0
R1(config-router)#network 192.168.11.0 0.0.0.255 area 0
R1(config-router)#network 10.1.1.0 0.0.0.3 area 0
R2(config-router)#network 209.165.200.0 0.0.0.3 area 0
R1(config)#router ospf 1
R1(config-router)#network 192.168.10.0 0.0.0.255 area 0
R1(config-router)#network 192.168.11.0 0.0.0.255 area 0
R1(config-router)#network 10.1.1.0 0.0.0.3 area 0
Configure a loopback interface on R2.
R2(config)#interface lo 0
R2(config-if)#ip address 209.165.200.225 255.255.255.224
R2(config-if)#no shutdown
Configure IP addresses for the VLAN 1 interface on each switch.
Switch 1:
Switch(config)#interface vlan 1
Switch(config-if)#ip address 192.168.10.2 255.255.255.0
Switch 2:
Switch(config)#interface vlan 1
Switch(config-if)#ip address 192.168.11.2 255.255.255.0
Switch 3:
Switch(config)#interface vlan 1
Switch(config-if)#ip address 192.168.30.2 255.255.255.0
Configure each switch with the appropriate default gateway.
Switch 1:
Switch(config)#ip default-gateway 192.168.10.1
Switch 2:
Switch(config)#ip default-gateway 192.168.11.1
Switch 3:
Switch(config)#ip default-gateway 192.168.30.1
Task 2: Configuring a Standard ACL
R1(config)#ip access-list standard std-1
R1(config-std-nacl)#deny 192.168.11.0 0.0.0.255
R1(config)#interface fastEthernet 1/0
R1(config-if)#ip access-group std-1 in
Task 4:
R2(config)#ip access-list standard task-4
R2(config-std-nacl)#permit 10.2.2.0 0.0.0.3
R2(config-std-nacl)#permit 192.168.30.0 0.0.0.255
R2(config-std-nacl)#deny any
R2(config)#line vty 0 4
R2(config-line)#access-class task-4 in
R1#telnet 10.1.1.2
Cisco ACL Editor and Simulator
Cisco ACL Editor and Simulator can create Standard and Extended ACLs, edit Standard and Extended ACLs and simulate their use on a Cisco Router. You can save both Standard and Extended ACLs in their respective files and export all the ACLs to the Clipboard for pasting into HyperTerminal!
Features
Create Standard ACLs
Create Extended ACLs – Using IP, TCP, UDP and ICMP Protocols.
Edit Standard and Edit Extended ACLs
Visually Simulate Standard ACLs
Visually Simulate Extended ACLs
Save Standard ACLs as .sacl as XML
Save Extended ACLs as .eacl as XML
Export Standard and Extended ACLs – Ready for HyperTerminal
Download 30 day trial