Packet Tracer 5.0 Experiment (i) basic configuration and management of switchesFirst, the experimental targetMaster the configuration and management of switch basic informationSecond, the principle of technologyThere are two basic ways to manage switches: in-band management and out-of-band management.
The console port management switch through the switch is out of band management: This management m
192.168.2.0/24 is directly connected, vlan3switch #
6. Set the default gateway of the host under VLAN 2 and VLAN 3 as the IP address of the corresponding virtual interface;
V. Verification
enable pC1 command prompt
Packet tracer PC command line 1.0 Pc> ipconfigip address ......................: 192.168.1.2subnet mask .....................: 255.255.255.0default gateway .................: 192.168.1
on fastethernet0/0 from loading to full, loading doneR2 # Show IP Route // route information after route redistributionCodes: C-connected, S-static, I-IGRP, R-rip, M-mobile, B-BGPD-OSPF, ex-VPN external, o-OSPF, Ia-OSPF Inter AreaN1-ospf nssa external type 1, n2-ospf nssa external type 2E1-OSPF external type 1, E2-OSPF external type 2, E-EGPI-Is, L1-is level-1, L2-is level-2, Ia-Is Inter Area*-Candidate default, U-per-user static route, o-ODRP-periodic downloaded static routeGateway of last res
: Configure the wireless routerStep Two: give the client PC2 Add a wireless cardOn the PC, there is only one "Fast Ethernet" interface, and no wireless card.First click on the PC power switch, the PC shutdown, and then the lower PC Ethernet card to the point where the sword, the Ethernet card removed, and then drag the wireless card to the location of the Ethernet card just now, and then click on the PC power switch, the PC boot, the four-step is to the simulator of the ordinary PC to add wirele
Linux Network Application Programming Hub (Packet Tracer simulation), packettracerIntroduction to Packet Tracer 1: Overview of hubs
Connect to the received signal for regenerative shaping and amplification, to expand the transmission distance of the network, while all nodes are centered on it.
Working at the bottom lay
Packet Tracer 5.0 Experiment (VII) router one-arm routing configurationFirst, the experimental target
Master the single-arm routing configuration method;
The communication between different VLANs is realized by single-arm routing.
Second, the experimental backgroundAn enterprise has two main departments: Technical department and Sales department, divided into different offices, for securit
000: 11: 23: % OSPF-5-ADJCHG: Process 1, NBR 192.168.3.1 on serial/0 from loading to full, loading dor2 (config-router) # endr2 # % SYS-5-CONFIG_ I: configured from console by consoler2 # Show IP routecodes: C-connected, s-static, I-IGRP, R-rip, M-mobile, B-BGP D-VPN, ex-VPN external, o-OSPF, IA-OSPF Inter Area N1-ospf nssa external type 1, n2-ospf nssa external type 2 E1-OSPF external type 1, E2-OSPF external type 2, e-EGP I-is, L1-is level-1, L2-is level-2, Ia-Is Inter Area *-candidate defaul
Packet Tracer 5.2 Experiment (15) network port address translation NAPT configurationFirst, the experimental target
Understand the principle and function of NAT network address translation;
Master NAPT configuration, realize LAN access to the Internet;
Second, the experimental backgroundCorporate office network needs to access the Internet, the company only applied to the ISP a dedicated l
Packet Tracer 5.0 Experiment (ix) router RIP dynamic routing configurationFirst, the experimental target
Master the configuration method of RIP protocol;
Master to view the routes generated by RIP learning through dynamic routing protocols;
Familiar with the connection mode of WAN cable;
Second, the experimental backgroundSuppose that the campus network is connected to the campus netwo
vty 0 4r1 (config-line) # password ABC123 // set the Telnet Remote logon password r1 (config-line) # loginr1 (config-line) # exitr1 (config) # interface fa0/0r1 (config-If) # IP address 192.168.1.1 255.255.255.0 // configure the management IP address of the router r1 (config-If) # No shutdown // enable port r1 (config-If) # End % SYS-5-CONFIG_ I: configured from console by consoler1 #
Iv. PC logon Test
Packet tr
- EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static routeGateway of last resort is not setR 192.168.1.0/24 [120/2] via 192.168.4.1, 00:00:00, Serial2/0C 192.168.2.0/24 is directly connected, FastEthernet0/0R 192.168.3.0/24 [120/1] via 192.168.4.1, 00:00:00, Serial2/0C 192.168.4.0/24 is directly connected, Serial2/0R2#
V. Test
The use of packet tracer to do experiments so long, but do not know how to add, also did not pay attention to, today for an experiment need some modules, just remember to add, but when added, but it shows: Cannot add model when the "" is on. Studied the next, as if there is no place to turn off the equipment, is it the use of command? Check it out, there is no such order. So in the open router interface, go
Since the use of GNS3, it is not how to use Packet Tracer, today took packet tracer to do a terminal access to the server experiment, feel packet tracer more powerful than we think, it seems to be a good study ah.Let's start by in
Lab Environment:650) this.width=650; "alt=" Cisco Packet Tracert Spanning tree understanding-Ibm.chick-mingkang.zhou "src=" Http://img1.ph.126.net/-OTBVD6L D8mmccic2uxrbg==/6630564189373643902.png "style=" border:0px;height:auto;margin:0px 10px 0px 0px; "/>Experimental Purpose:1. Simple description of Spanning tree.2. Observe that a switch belongs to the root bridge.3, observe the switch is not the root bri
This article mainly uses an example to explain in detail how to solve the packet loss problem caused by CISCO router faults? The following article gives me a detailed answer.
Recently, some people in my department (Department A) reported that they could not access the network of the higher-level department (Department B. I use the ping command from the computer A1 (IP Address: 10.20.12.11/24) used by this p
Cisco held a network lecture entitled "define your router with 256 or fewer bytes". The subject of this lecture is: "the accuracy and performance improvement of network security products forces hackers to successfully launch attacks in the first 256 bytes of the Code, so that they can easily intrude into the network without being noticed ". As a result, Cisco developed a technology named Flexible
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.