Download Creating a Peer-to

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Peering wikipedia , lookup

Wireless security wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Distributed firewall wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

IEEE 1355 wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

AppleTalk wikipedia , lookup

Computer network wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Network tap wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Configuring CISCO Routers
Step A: Physically connect Routers/Cables:
1. Obtain Serial Cables, Console Cables, Ethernet cables, etc..
2. Connect Serial Cables
 Be careful to not which end of connection is the DCE end.
3. Connect Ethernet Cables (Straight-thru cables from router to hub)
4.
Connect Console Cables
 Logically, Connect one end to the console port on the router and connect other
end to the serial port of the corresponding computer.
 In the lab, this connection is really done through the patch panel in the rack
 If there are enough people/groups, each person/group should connect the console
cable of one router to a computer for each group
 If doing alone, can wither set up 5 computers each with a connection to one
router of can switch console cable at the patch panel for each one
Step B: Deleting Previous Router Configuration:
1. Start ProgramsTeraterm SSH - >Serial Connection-> COM1
2. If just powered on the router, wait for the boot sequence to complete
3. Enter following Commands to Enable and then erase the old configurations
 Enable (with password if necessary)
 Erase startup-config
 Restart
*Will get router prompt
Step C: Configuring Host Name and Routers Interfaces
1. Enter the following Commands
 Enable
 Configure terminal (config t)
 Hostname <Name Of Router><example> <Lab C>
For routers with an Ethernet interface:
Step 1: Configuring Ethernet 0
Consult the network map to determine the IP address of the Ethernet interface
1. Enter the following Commands
 Interface Ethernet0
 IP address <Ethernet Address for respective Router and Subnet Mask><example>
<201.100.6.1 255.255.255.0>
 No shutdown

Exit
For Routers with a Serial Interface
Step 1: Configuring Serial 0
Consult the network map to determine the IP address of the Ethernet interface
1. Enter the following Commands
 Interface Serial0
 IP address <Serial 0 IP Address for respective Router and subnet mask ><example>
<201.100.3.1 255.255.255.0>
 No shutdown

Exit
Step 2: Configuring Serial 1
1. Enter the following Commands
 Interface Serial1
 IP address <Serial 1 IP Address for respective Router><example> <201.100.3.2>
 No shutdown

Exit
Step D: Testing Configurations
At this point, the router interfaces are configured but not the routing protocols. This means that
each router should be able to ping its directly connected neighbors, but not other routers or router
interfaces. For example, router 1 should be able to ping router 2 at 201.100.2.2, but not routers 35 or even router B’s 201.100.3.1 interface.
Step E: Routing Protocol
On each router, we will now configure the RIP routing protocol.
To do so enter the following Commands (after enable, config t if necessary).
 Router Rip
 Network <network number for first attached network>
 Network <network number for second attached network>
 ….

Network <networkl number for last attached network>
For example, router 5 is participating in two networks in our topology: the 201.100.5.0
network and the 201.100.6.0 network. Therefore on router D, we would enter the
Following commands:



Router Rip
Network 201.100.5.0
Network 201.100.6.0
Step D: Testing Configurations
You should now be able to ping anyone on the network. For example, Laptop A should be able to
ping all the way to laptop D.
--if you are able to ping others within the network you have completed the lab successfully