Tuesday, 27 October 2020

 

 Configuring VLANs and Trunking Topology

Addressing Table

Device

Interface

IP Address

Subnet Mask

Default Gateway

S1

VLAN 1

192.168.1.11

255.255.255.0

N/A

S2

VLAN 1

192.168.1.12

255.255.255.0

N/A

PC-A

NIC

192.168.10.3

255.255.255.0

192.168.10.1

PC-B

NIC

192.168.10.4

255.255.255.0

192.168.10.1

PC-C

NIC

192.168.20.3

255.255.255.0

192.168.20.1

Objectives

objectives

Part 1: Build the Network and Configure Basic Device Settings

Part 2: Create VLANs and Assign Switch Ports

Part 3: Maintain VLAN Port Assignments and the VLAN Database

Part 4: Configure an 802.1Q Trunk between the Switches

Part 5: Delete the VLAN Database

Background / Scenario

Modern switches use virtual local-area networks (VLANs) to improve network performance by separating large Layer 2 broadcast domains into smaller ones. VLANs can also be used as a security measure by controlling which hosts can communicate. In general, VLANs make it easier to design a network to support the goals of an organization.

VLAN trunks are used to span VLANs across multiple devices. Trunks allow the traffic from multiple VLANS to travel over a single link, while keeping the VLAN identification and segmentation intact.

In this lab, you will create VLANs on both switches in the topology, assign VLANs to switch access ports, verify that VLANs are working as expected, and then create a VLAN trunk between the two switches to allow hosts in the same VLAN to communicate through the trunk, regardless of which switch the host is actually attached to.

Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs.

Note: Ensure that the switches have been erased and have no startup configurations. If you are unsure contact your instructor.

Required Resources

·         2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)

·         3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)

·         Console cables to configure the Cisco IOS devices via the console ports

·         Ethernet cables as shown in the topology

Part 1:     Build the Network and Configure Basic Device Settings

In Part 1, you will set up the network topology and configure basic settings on the PC hosts and switches.

Step 1:     Cable the network as shown in the topology.

Attach the devices as shown in the topology diagram, and cable as necessary.

Step 2:     Initialize and reload the switches as necessary.

Step 3:     Configure basic settings for each switch.

a.     Console into the switch and enter global configuration mode.

b.     Copy the following basic configuration and paste it to the running-configuration on the switch.

no ip domain-lookup

service password-encryption

enable secret class

banner motd #

Unauthorized access is strictly prohibited. #

line con 0

password cisco

login

logging synchronous

line vty 0 15

password cisco

logging synchronous

login

exit

a.     Configure the host name as shown in the topology.

b.     Configure the IP address listed in the Addressing Table for VLAN 1 on the switch.

c.     Administratively deactivate all unused ports on the switch.

d.     Copy the running configuration to the startup configuration.

Step 2:     Configure PC hosts.

Refer to the Addressing Table for PC host address information.

Step 3:     Test connectivity.

Verify that the PC hosts can ping one another.

Note: It may be necessary to disable the PCs firewall to ping between PCs.

Can PC-A ping PC-B?   yes

Can PC-A ping PC-C?   no  

Can PC-A ping S1?       no

Can PC-B ping PC-C?   no

Can PC-B ping S2?       no

Can PC-C ping S2?       no

Can S1 ping S2?           yes

If you answered no to any of the above questions, why were the pings unsuccessful?

The ones with no were pinging different subnets.

 

Part 2:     Create VLANs and Assign Switch Ports

In Part 2, you will create student, faculty, and management VLANs on both switches. You will then assign the VLANs to the appropriate interface. The show vlan command is used to verify your configuration settings.

Step 1:     Create VLANs on the switches.

a.     Create the VLANs on S1.

S1(config)# vlan 10

S1(config-vlan)# name Student

S1(config-vlan)# vlan 20

S1(config-vlan)# name Faculty

S1(config-vlan)# vlan 99

S1(config-vlan)# name Management

S1(config-vlan)# end


b.     Create the same VLANs on S2.

c.     Issue the show vlan command to view the list of VLANs on S1.

S1# show vlan

 

VLAN Name                             Status    Ports

---- -------------------------------- --------- -------------------------------

1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4

                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8

                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12

                                                Fa0/13, Fa0/14, Fa0/15, Fa0/16

                                                Fa0/17, Fa0/18, Fa0/19, Fa0/20

                                                Fa0/21, Fa0/22, Fa0/23, Fa0/24

                                                Gi0/1, Gi0/2

10   Student                          active   

20   Faculty                          active   

99   Management                       active   

1002 fddi-default                     act/unsup

1003 token-ring-default               act/unsup

1004 fddinet-default                  act/unsup

1005 trnet-default                    act/unsup

 

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------

1    enet  100001     1500  -      -      -        -    -        0      0  

10   enet  100010     1500  -      -      -        -    -        0      0  

20   enet  100020     1500  -      -      -        -    -        0      0  

99   enet  100099     1500  -      -      -        -    -        0      0  

         

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2

---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------

1002 fddi  101002     1500  -      -      -        -    -        0      0  

1003 tr    101003     1500  -      -      -        -    -        0      0  

1004 fdnet 101004     1500  -      -      -        ieee -        0      0  

1005 trnet 101005     1500  -      -      -        ibm  -        0      0  

 

Remote SPAN VLANs

------------------------------------------------------------------------------

 

 

Primary Secondary Type              Ports

------- --------- ----------------- ------------------------------------------

What is the default VLAN? 1

What ports are assigned to the default VLAN? all port.


Step 2:     Assign VLANs to the correct switch interfaces.

a.     Assign VLANs to the interfaces on S1.

1)    Assign PC-A to the Student VLAN.

S1(config)# interface f0/6

S1(config-if)# switchport mode access

S1(config-if)# switchport access vlan 10


2)    Move the switch IP address VLAN 99.

S1(config)# interface vlan 1

S1(config-if)# no ip address

S1(config-if)# interface vlan 99

S1(config-if)# ip address 192.168.1.11 255.255.255.0

S1(config-if)# end

b.     Issue the show vlan brief command and verify that the VLANs are assigned to the correct interfaces.

S1# show vlan brief

 

VLAN Name                             Status    Ports

---- -------------------------------- --------- -------------------------------

1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4

                                                Fa0/5, Fa0/7, Fa0/8, Fa0/9

                                                Fa0/10, Fa0/11, Fa0/12, Fa0/13

                                                Fa0/14, Fa0/15, Fa0/16, Fa0/17

                                                Fa0/18, Fa0/19, Fa0/20, Fa0/21

                                                Fa0/22, Fa0/23, Fa0/24, Gi0/1

                                                Gi0/2

10   Student                          active    Fa0/6

20   Faculty                          active   

99   Management                       active   

1002 fddi-default                     act/unsup

1003 token-ring-default               act/unsup

1004 fddinet-default                  act/unsup

1005 trnet-default                    act/unsup

c.     Issue the show ip interface brief command.

What is the status of VLAN 99? Why?

Active, administratively up, protocol down. Because no ports have been assigned.

d.     Use the Topology to assign VLANs to the appropriate ports on S2.


a.     Remove the IP address for VLAN 1 on S2.























Packet Tracer - Case Study - Prototype & Test the Solution

 

Packet Tracer - Case Study - Prototype & Test the Solution


Tapology


Objectives

·         Explore Packet Tracer as a Prototyping Tool

 

Background / Scenario

In this activity, you will have a chance to explore a Packet Tracer based IoT system prototype designed to allow a user to remotely check whether the garage door is open. You are encouraged to freely explore the prototype to gain a better understanding of the technologies used in the system.

 

Required Resources

·         PC with Packet Tracer 7.1 or newer installed

 

Part 1: The Topology

 

Step 1: The Network

The network topology is designed to simulate a home which is connected to the Internet via a DSL-based Internet Service Provider (ISP). A wireless router provides wireless access to all the home devices (desktop computers, laptops, smartphones, etc).

The wireless router is also connected to the WAN via a DSL modem which in turn connects to the Internet. Note that the DSL modem is provided by the ISP.

The SBC device represents a Raspberry Pi computer and is connected to the Garage Door. Since the garage door has no intelligence or Internet connectivity of its own, the SBC is used to fill that gap. Similar to the other devices in the home, the SBC connects to the home wireless via the home wireless network.

The Home PC and Home Laptop were added to represent other home devices which are connected. Any of these devices can also be used to access the system.

The Public WiFi Router is added to represent free Internet connections through the city. Think of it as wireless hot spots present in libraries, coffee shops, workplaces, and more. The key here is that the user will also have a connection to the Internet.

The Smartphone represents the user when he or she is away from the home. In this scenario, Internet access would be achieved through that Smartphone. Notice that the user could also connect to the system from any other device, as long it was connected to the Internet.

Note: Python used in PT is an open source Python to JavaScript interpreter that is not updating to Python 3.0. For this reason there may be slight differences in the syntax between the code observed in PT and that in devices using Python 3.

a. Click the SBC.

b. Click the Programming Tab. On the left pane that opens, a file name is displayed, main.py, in this case. This is the program that will be running in the SBC on behalf of the Garage Door.

c. Packet Tracer displays the actual code stored in main.py on the right area of the window. This is an important window because you can edit, stop and start the program.

d. Click the Run button to execute the program. What happens?

The program shows information about the status of the garage door



e.       This code, written in Python, is responsible for periodically transmitting the status of the garage door to a server on the Internet. If the door is shut, the code sends out 0. If the door is open, 1 is sent to the Internet server.

Looking at the code, answer the following questions:

How often are door status updates sent to the Internet server?

1000

What is the IP address and port of the server?

Server IP:209.165.201.2

Server Port :81

What are the variable names used to store the server IP address and server port number?

serverIP and server Port

 What Python modules were imported into the code?

 =Tcp, time, gpio

 

Part 2: Using the System

To use the system, consider the following use case scenario: The user leaves the house and stops by a coffee stop on his or her way to work. During the stop, the user wonders if the garage door was shut or not. 

Because the system is already in place, the user can quickly access the Internet server address from his or her phone web browser to check the door status.

Step 1: Opening the Status Page From the Smartphone

a.     Click the Smartphone and select the Desktop tab in the window that opens.

b.     Navigate to Desktop > Web Browser.

c.     In the URL address bar, type in www.connthings.example. This is the IP address of the Internet server used to collect the data sent by the SBC.

d.     The page that opens in the Smartphone should display a green bar, communicating the garage door is shut.

e.     With the status page still open on the Smartphone, open the garage door by holding down the ALT key and clicking the door. The door should open. 

What is displayed in the Smartphone?

The garage door is open

The SBC which connected to the door updates the server which in turn, updates a local file with the status of the door. When a user connects to the server via a web browser, the server presents a web page built based on the door status stored in the disk. 

Based on what you have learned in this course, what would be the role of the Internet server used in this Packet Tracer Prototype?

The Internet server allows the smartphone (which is from an external network) to wirelesslyoperate the entire system within the internal network, specifically the garage door in this case.

 

a.     The system is designed to allow any device that is connected to the Internet to use it. Try opening the door status page from the Home PC and from the Home Laptop.

Does it work?

Yes it does work

 

What is the benefit of accessing the system from within the house?

Accessing the system from within the house will be able to process the SBC faster than what it would be from a larger distance, and through the internet, as all the devices that have access will be within the same network.

Part 3: Challenge Questions

a.     Expand the Internet Cloud and explore its contents. Try locating the DNS server and the web server that receive the updates from the SBC.

b.     Locate the Multilayer Switch. What is its function in this prototype?

A multilayer switch provides traffic transport, integrated security monitoring and performs the functions of a switch at a much faster rate.

c.     Add more devices to the Home Network and try to access the system from them.

d.     The system currently doesn’t store garage door status but it could be a good future feature. Can you think of one benefit of storing the door status over time?

It is a good security measure as you can determine if somebody opened your garage without your consent.

e.     Can you describe, as an overview, what changes would have to happen for the current system to track the status?

Enhance network security

f. What crucial IoT feature is missing in this prototype?

Security from within and outside the network to view and manipulate devices within the network

Part 4: Reflection

The system prototyped here is simply a proof of concept but can be used to present and even refine some aspects of a project. By nature, Packet Tracer prototypes are very inexpensive as it allows for testing projects that require complex network topologies. Also, Packet Tracer’s Python support makes it easy to improve and eventually port any code to the actual devices when the testing phase is complete. 


or you can download it = https://drive.google.com/file/d/1RADXi_hOgL2jYmBj5QTHPtlw2NsZYFWY/view?usp=sharing

packet tracer =https://drive.google.com/file/d/1LrNPhauG5AbEL07UHy2XTBPUT_-XLqLU/view?usp=sharing

for you download packet tracer, you must copy the url ,search and you can download it!!