Lab - Design And Implement A VLSM Addressing Scheme

3y ago
269 Views
31 Downloads
461.42 KB
11 Pages
Last View : 8d ago
Last Download : 3m ago
Upload by : Dani Mulvey
Transcription

Lab - Design and Implement a VLSM Addressing SchemeTopologyObjectivesPart 1: Examine Network RequirementsPart 2: Design the VLSM Address SchemePart 3: Cable and Configure the IPv4 NetworkBackground / ScenarioVariable Length Subnet Mask (VLSM) was designed to avoid wasting IP addresses. With VLSM, a network issubnetted and then re-subnetted. This process can be repeated multiple times to create subnets of varioussizes based on the number of hosts required in each subnet. Effective use of VLSM requires addressplanning.In this lab, use the 192.168.33.128/25 network address to develop an address scheme for the networkdisplayed in the topology diagram. VLSM is used to meet the IPv4 addressing requirements. After you havedesigned the VLSM address scheme, you will configure the interfaces on the routers with the appropriate IPaddress information. The future LANS at BR2 will need to have addresses allocated, but no interfaces will beconfigured at this time.Note: The routers used with CCNA hands-on labs are Cisco 4221 with Cisco IOS XE Release 16.9.4(universalk9 image). The switches used in the labs are Cisco Catalyst 2960s with Cisco IOS Release 15.2(2)(lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the modeland Cisco IOS version, the commands available and the output produced might vary from what is shown inthe labs. Refer to the Router Interface Summary Table at the end of the lab for the correct interface identifiers.Note: Make sure that the routers have been erased and have no startup configurations. If you are unsure,contact your instructor.Required Resources 2 Routers (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or comparable) 2 Switches (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable) 1 PCs (Windows with terminal emulation program, such as Tera Term) Console cables to configure the Cisco IOS devices via the console ports Ethernet and serial cables as shown in the topology 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 1 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing Scheme Windows Calculator (optional)InstructionsPart 1: Examine Network RequirementsIn Part 1, you will examine the network requirements to develop a VLSM address scheme for the networkdisplayed in the topology diagram using the 192.168.33.128/25 network address.Note: You can use the Windows Calculator application and search the internet for an IP subnet calculator tohelp with your calculations.Step 1: Determine how many host addresses and subnets are available.Questions:How many host addresses are available in a /25 network?Type your answers here.126What is the total number of host addresses needed in the topology diagram?Type your answers here.80How many subnets are needed in the network topology?Type your answers here.6Step 2: Determine the largest subnet.Questions:What is the subnet description (e.g. BR1 LAN or BR1-BR2 link)?Type your answers here.BR1 LANHow many IP addresses are required in the largest subnet?Type your answers here.40What subnet mask can support that many host addresses?Type your answers here./26 or 255.255.255.192How many total host addresses can that subnet mask support?Type your answers here.62Can you subnet the 192.168.33.128/25 network address to support this subnet?Type your answers here.yesWhat are the network addresses that would result from this subnetting?Type your answers here. 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 2 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing Scheme192.168.33.128/26 and 192.168.33.192/26Use the first network address for this subnet.Step 3: Determine the second largest subnet.Questions:What is the subnet description?Type your answers here.BR2 LANHow many IP addresses are required for the second largest subnet?Type your answers here.25What subnet mask can support that many host addresses?Type your answers here./27 or 255.255.255.224How many total host addresses can that subnet mask support?Type your answers here.30Can you subnet the remaining subnet again and still support this subnet?Type your answers here.yesWhat are the network addresses that would result from this subnetting?Type your answers here.192.168.33.192/27 and 192.168.33.224/27Use the first network address for this subnet.Step 4: Determine the third largest subnet.Questions:What is the subnet description?Type your answers here.BR2 IoT LANHow many IP addresses are required for the next largest subnet?Type your answers here.5What subnet mask can support that many host addresses?Type your answers here./29 or 255.255.255.248How many total host addresses can that subnet mask support?Type your answers here.6Can you subnet the remaining subnet again and still support this subnet? 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 3 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing SchemeType your answers here.yesWhat are the network addresses that would result from this subnetting?Type your answers here.192.168.33.224/29, 192.168.33.232/29, 192.168.33.240/29, and 192.168.33.248/29Use the first network address for this subnet.Use the second network address for the CCTV LAN.Use the third network address for the HVAC C2 LAN.Step 5: Determine the fourth largest subnet.Questions:What is the subnet description?Type your answers here.BR1-BR2 LinkHow many IP addresses are required for the next largest subnet?Type your answers here.2What subnet mask can support that many host addresses?Type your answers here./30 or 255.255.255.252How many total host addresses can that subnet mask support?Type your answers here.2Can you subnet the remaining subnet again and still support this subnet?Type your answers here.yesWhat are the network addresses that would result from this subnetting?Type your answers here.192.168.33.248/30 and 192.168.33.252/30Use the first network address for this subnet.Part 2: Design the VLSM Address SchemeStep 1: Calculate the subnet information.Use the information that you obtained in Part 1 to fill in the following table.Subnet DescriptionNumber ofHosts NeededNetwork Address/CIDRFirst HostAddressBroadcastAddressBR1 BR2 LAN25192.168.33.192/27192.168.33.193192.168.33.223 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 4 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing SchemeSubnet DescriptionNumber ofHosts NeededNetwork Address/CIDRFirst HostAddressBroadcastAddressBR2 IoT R2 CCTV R2 HVAC 7BR1-BR2 Step 2: Complete the device interface address table.Assign the first host address in the subnet to the Ethernet interfaces. BR1 should be assigned the first hostaddress in the BR1-BR2 Link.DeviceInterfaceIP AddressSubnet MaskDevice -BR2 LinkBR1G0/0/1192.168.33.129255.255.255.19240 Host LANBR2G0/0/0192.168.33.250255.255.255.252BR1-BR2 LinkG0/0/1192.168.33.193255.255.255.22425 Host LANBR2Part 3: Cable and Configure the IPv4 NetworkIn Part 3, you will cable the network to match the topology and configure the three routers using the VLSMaddress scheme that you developed in Part 2.Step 1: Cable the network as shown in the topology.Step 2: Configure basic settings on each router.Open a configuration windowa. Assign the device name to the routers.router(config)# hostname BR1router(config)# hostname BR2b. Disable DNS lookup to prevent the routers from attempting to translate incorrectly entered commands asthough they were hostnames.BR1(config)# no ip domain lookupBR2(config)# no ip domain lookupc.Assign class as the privileged EXEC encrypted password for both routers.BR1(config)# enable secret classBR2(config)# enable secret classd. Assign cisco as the console password and enable login for the routers.BR1(config)# line con 0BR1(config-line)# password ciscoBR1(config)# loginBR2(config)# line con 0BR2(config-line)# password ciscoBR2(config)# login 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 5 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing Schemee. Assign cisco as the VTY password and enable login for the routers.BR1(config)# lineBR1(config-line)#BR1(config-line)#BR2(config)# lineBR2(config-line)#BR2(config-line)#f.vty 0 4password ciscologinvty 0 4password ciscologinEncrypt the plaintext passwords for the routers.BR1(config)# service password-encryptionBR2(config)# service password-encryptiong. Create a banner that will warn anyone accessing the device that unauthorized access is prohibited onboth routers.BR1(config)# banner motd Unauthorized Access is Prohibited BR2(config)# banner motd Unauthorized Access is Prohibited Step 3: Configure the interfaces on each router.a. Assign an IP address and subnet mask to each interface using the table that you completed in Part 2.BR1(config)# interface g0/0/0BR1(config-if)# ip address 192.168.33.249BR1(config-if)# interface g0/0/1BR1(config-if)# ip address 192.168.33.129BR2(config)# interface g0/0/0BR2(config-if)# ip address 192.168.33.250BR2(config-if)# interface g0/0/1BR2(config-if)# ip address 5.255.252255.255.255.224b. Configure an interface description for each interface.BR1(config)# interface g0/0/0BR1(config-if)# description BR1-BR2 LinkBR1(config-if)# interface g0/0/1BR1(config-if)# description Connected to S1BR2(config-if)# interface g0/0/0BR2(config-if)# description BR1-BR2 LinkBR2(config-if)# interface g0/0/1BR2(config-if)# description Connected to S2c.Activate the interfaces.BR1(config)# interface g0/0/0BR1(config-if)# no shutdownBR1(config-if)# interface g0/0/1BR1(config-if)# no shutdownBR2(config)# interface g0/0/0BR2(config-if)# no shutdownBR2(config-if)# interface g0/0/1BR2(config-if)# no shutdownStep 4: Save the configuration on all devices.BR1# copy running-config startup-config 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 6 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing SchemeBR2# copy running-config startup-configStep 5: Test Connectivity.a. From BR1, ping BR2’s G0/0/0 interface.b. From BR2, ping BR1’s G0/0/0 interface.c.Troubleshoot connectivity issues if pings were not successful.Close a configuration windowNote: Pings to the GigabitEthernet LAN interfaces on other routers will not be successful. A routing protocolneeds to be in place for other devices to be aware of those subnets. The GigabitEthernet interfaces also needto be in an up/up state before a routing protocol can add the subnets to the routing table. The focus of this labis on VLSM and configuring the interfaces.Reflection QuestionCan you think of a shortcut for calculating the network addresses of consecutive /30 subnets?Type your answers here.Answers may vary. A /30 network has 4 address spaces: the network address, 2 host addresses, anda broadcast address. Another technique for obtaining the next /30 network address would be to takethe network address of the previous /30 network and add 4 to the last octet.Router Interface Summary TableRouter ModelEthernet Interface #1Ethernet Interface #2Serial Interface #1Serial Interface #21800Fast Ethernet 0/0(F0/0)Fast Ethernet 0/1(F0/1)Serial 0/0/0 (S0/0/0)Serial 0/0/1 (S0/0/1)1900Gigabit Ethernet 0/0(G0/0)Gigabit Ethernet 0/1(G0/1)Serial 0/0/0 (S0/0/0)Serial 0/0/1 (S0/0/1)2801Fast Ethernet 0/0(F0/0)Fast Ethernet 0/1(F0/1)Serial 0/1/0 (S0/1/0)Serial 0/1/1 (S0/1/1)2811Fast Ethernet 0/0(F0/0)Fast Ethernet 0/1(F0/1)Serial 0/0/0 (S0/0/0)Serial 0/0/1 (S0/0/1)2900Gigabit Ethernet 0/0(G0/0)Gigabit Ethernet 0/1(G0/1)Serial 0/0/0 (S0/0/0)Serial 0/0/1 (S0/0/1)4221Gigabit Ethernet 0/0/0(G0/0/0)Gigabit Ethernet 0/0/1(G0/0/1)Serial 0/1/0 (S0/1/0)Serial 0/1/1 (S0/1/1)4300Gigabit Ethernet 0/0/0(G0/0/0)Gigabit Ethernet 0/0/1(G0/0/1)Serial 0/1/0 (S0/1/0)Serial 0/1/1 (S0/1/1)Note: To find out how the router is configured, look at the interfaces to identify the type of router and how manyinterfaces the router has. There is no way to effectively list all the combinations of configurations for each routerclass. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.The table does not include any other type of interface, even though a specific router may contain one. Anexample of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can beused in Cisco IOS commands to represent the interface.End of document 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 7 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing SchemeDevice ConfigsRouter BR1 (Final Configuration)BR1# show runBuilding configuration.Current configuration : 1558 bytes!version 16.9service timestamps debug datetime msecservice timestamps log datetime msecservice password-encryptionno platform punt-keepalive disable-kernel-core!hostname BR1!boot-start-markerboot-end-marker!!vrf definition Mgmt-intf!address-family ipv4exit-address-family!address-family ipv6exit-address-family!enable secret 5 1 ehVu efQjBqXqcVcSfwLJyhwHT/!no aaa new-model!no ip domain lookup!subscriber templating!multilink bundle-name authenticated!spanning-tree extend system-id!redundancymode none!interface GigabitEthernet0/0/0description BR1-BR2 Linkip address 192.168.33.249 255.255.255.252negotiation auto! 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 8 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing Schemeinterface GigabitEthernet0/0/1description Connected to S1ip address 192.168.33.129 255.255.255.192negotiation auto!interface Serial0/1/0!interface Serial0/1/1!interface GigabitEthernet0vrf forwarding Mgmt-intfno ip addressshutdownnegotiation auto!ip forward-protocol ndno ip http serverno ip http secure-serverip tftp source-interface GigabitEthernet0!control-plane!banner motd C Unauthorized Access is Prohibited C!line con 0password 7 121A0C041104loginstopbits 1line aux 0stopbits 1line vty 0 4password 7 045802150C2Elogin!endRouter BR2 (Final Configuration)BR2# show runBuilding configuration.Current configuration : 1468 bytes!version 16.9service timestamps debug datetime msecservice timestamps log datetime msecservice password-encryptionno platform punt-keepalive disable-kernel-core!hostname BR2 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 9 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing Scheme!boot-start-markerboot-end-marker!vrf definition Mgmt-intf!address-family ipv4exit-address-family!address-family ipv6exit-address-family!enable secret 5 1 .s3c IJxdfZCYkvll8ifXtsW8O/!no aaa new-model!no ip domain lookup!subscriber templating!multilink bundle-name authenticated!spanning-tree extend system-id!redundancymode none!interface GigabitEthernet0/0/0description BR1-BR2 Linkip address 192.168.33.250 255.255.255.252negotiation auto!interface GigabitEthernet0/0/1description Connected to S2ip address 192.168.33.193 255.255.255.224negotiation auto!interface Serial0/1/0!interface Serial0/1/1!interface GigabitEthernet0vrf forwarding Mgmt-intfno ip addressshutdownnegotiation auto!ip forward-protocol ndno ip http serverno ip http secure-server 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 10 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing Schemeip tftp source-interface GigabitEthernet0!control-plane!banner motd C Unauthorized Access is Prohibited C!line con 0password 7 0822455D0A16loginstopbits 1line aux 0stopbits 1line vty 0 4password 7 070C285F4D06login!end 2019 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco PublicPage 11 of 11www.netacad.com

Lab - Design and Implement a VLSM Addressing Scheme Topology Objectives Part 1: Examine Network Requirements Part 2: Design the VLSM Address Scheme Part 3: Cable and Configure the IPv4 Network Background / Scenario Variable Length Subnet Mask (VLSM) was designed to avoid wasting IP addresses. With VLSM, a network is subnetted and then re-subnetted.

Related Documents:

Contents Chapter 1 Lab Algorithms, Errors, and Testing 1 Chapter 2 Lab Java Fundamentals 9 Chapter 3 Lab Selection Control Structures 21 Chapter 4 Lab Loops and Files 31 Chapter 5 Lab Methods 41 Chapter 6 Lab Classes and Objects 51 Chapter 7 Lab GUI Applications 61 Chapter 8 Lab Arrays 67 Chapter 9 Lab More Classes and Objects 75 Chapter 10 Lab Text Processing and Wrapper Classes 87

Biology Lab Notebook Table of Contents: 1. General Lab Template 2. Lab Report Grading Rubric 3. Sample Lab Report 4. Graphing Lab 5. Personal Experiment 6. Enzymes Lab 7. The Importance of Water 8. Cell Membranes - How Do Small Materials Enter Cells? 9. Osmosis - Elodea Lab 10. Respiration - Yeast Lab 11. Cell Division - Egg Lab 12.

Lab 5-2: Configuring DHCP Server C-72 Lab 5-3: Troubleshooting VLANs and Trunks C-73 Lab 5-4: Optimizing STP C-76 Lab 5-5: Configuring EtherChannel C-78 Lab 6-1: Troubleshooting IP Connectivity C-80 Lab 7-1: Configuring and Troubleshooting a Serial Connection C-82 Lab 7-2: Establishing a Frame Relay WAN C-83 Lab 7

Each week you will have pre-lab assignments and post-lab assignments. The pre-lab assignments will be due at 8:00am the day of your scheduled lab period. All other lab-related assignments are due by 11:59 pm the day of your scheduled lab period. Pre-lab assignments cannot be completed late for any credit. For best performance, use only Firefox or

Lab EX: Colony Morphology/Growth Patterns on Slants/ Growth Patterns in Broth (lecture only) - Optional Lab EX: Negative Stain (p. 46) Lab EX : Gram Stain - Lab One (p. 50) Quiz or Report - 20 points New reading assignment 11/03 F Lab EX : Gram Stain - Lab Two Lab EX: Endospore Stain (p. 56) Quiz or Report - 20 points New reading .

Lab Journals AP and IB lab format 1 AP and IB Biology Internal Assessment Lab Format The following titles and subtitles should be used for your lab report and given in this order within your lab report. I. Design 1. Topic Short statement summarizing what your research lab is about 2.

2.00 Implement IPv4 2.0.0 Layer 2 Technologies 15 20 3.00 Implement IPv6 3.0.0 Layer 3 Technologies 40 40 4.00 Implement MPLS Layer 3 VPNs 4.0.0 VPN Technologies 15 20 5.00 Implement IP Multicast 5.0.0 Infrastructure Security 5 5 6.00 Implement Network Security 6.0.0 Infrastructure Services 15 15 7.00 Implement Network Services 6

Lab Notebook- Students are introduced to the purpose of a lab notebook and set up the lab notebook for session and the day’s lab. Afternoon Laboratory Safety Lab Safety Rules and Contracts Lab Equipment Scavenger Hunt: Students find and identify common lab equipment that they will use throughout the three weeks as well as get