Read about how to configure router in packet tracer, The latest news, videos, and discussion topics about how to configure router in packet tracer from alibabacloud.com
.
Cisco router in the configuration of ports, or to understand the next few port names and purposes more meaningful, s port is the meaning of serial interface, also known as high-speed asynchronous serial port, is mainly connected to the WAN v.35 cable, commonly said routers and routers when used in connection. F port is a fastethernet interface, called Fast Ethernet port, mainly connected to Ethernet (LAN) used, the popular saying is to connect swit
configuration mode:
Redistribute Protocol [metric] [metric-type] [Match internal | external type | NSSA-external type] [tag] [route-map route-Map-name] [subnets]
Iv. Experiment steps
Lab Topology
1. Direct Connection is used between the PC and the vswitch, and cross-line connection is used between the PC and the route, route, and route.
2. divide two VLANs on the layer-3 to run the ripv2 protocol; r2 to run the OSPF protocol;
3. Configure the r12002
Packet Tracer 5.0 Experiment (eight) router static routing configurationFirst, the experimental target
Master the configuration methods and techniques of static routing;
Mastering the connectivity of the network through static routing method;
Familiar with the connection mode of WAN cable;
Second, the experimental backgroundSchool has new an
Packet Tracer 5.0 Experiment (ix) router RIP dynamic routing configurationFirst, the experimental target
Master the configuration method of RIP protocol;
Master to view the routes generated by RIP learning through dynamic routing protocols;
Familiar with the connection mode of WAN cable;
Second, the experimental backgroundSuppose that the ca
Packet Tracer 5.0 Experiment (VII) router one-arm routing configurationFirst, the experimental target
Master the single-arm routing configuration method;
The communication between different VLANs is realized by single-arm routing.
Second, the experimental backgroundAn enterprise has two main departments: Technical department and Sales department
vty 0 4r1 (config-line) # password ABC123 // set the Telnet Remote logon password r1 (config-line) # loginr1 (config-line) # exitr1 (config) # interface fa0/0r1 (config-If) # IP address 192.168.1.1 255.255.255.0 // configure the management IP address of the router r1 (config-If) # No shutdown // enable port r1 (config-If) # End % SYS-5-CONFIG_ I: configured from console by consoler1 #
Iv. PC logon Test
The use of packet tracer to do experiments so long, but do not know how to add, also did not pay attention to, today for an experiment need some modules, just remember to add, but when added, but it shows: Cannot add model when the "" is on. Studied the next, as if there is no place to turn off the equipment, is it the use of command? Check it out, there is no such order. So in the open
successfully and you can view your saved files on the TFTP server.4. Restore your configuration file, ping the TFTP server, keep the connection, download from TFTP to the routerCopy tftp running-config Download the previously configured backup from TFTP and restore the router's configuration fileIP address of the 192.168.1.1 TFTP serverRUNNING-CONFIG-BK you want to restore the backed up files in TFTPRunning-config a name for your recovered files.Final reload, successful restart, successful reco
: Configure the wireless routerStep Two: give the client PC2 Add a wireless cardOn the PC, there is only one "Fast Ethernet" interface, and no wireless card.First click on the PC power switch, the PC shutdown, and then the lower PC Ethernet card to the point where the sword, the Ethernet card removed, and then drag the wireless card to the location of the Ethernet card just now, and then click on the PC power switch, the PC boot, the four-step is to t
numbers ranging from 1 ~ 99, 1300 ~ 1999,100 ~ 199, 2000 ~ 2699;
The standard IP address access list can be used to filter data packets according to the rule defined by the source IP address of the data packet;
The Extended IP address access list can define rules based on the source IP address, destination IP address, source port, destination port, and Protocol of data packets to filter data packets;
Ip acl rules-based applications are divided i
Packet Tracer Introductory One, Packet tracer introductionPacket Tracer is an assistive learning tool released by Cisco, which provides a network simulation environment for beginners in learning Cisco Web courses to design, configure
What is Cisco Packet tracer?The Cisco Packet Tracer is a powerful network simulation tool for training in Cisco certifications. It gives us a good view of the interfaces of each router and network device, with many options, and we can use unlimited devices in the network jus
policy in Router 2, specifying host and port7 The ACL takes effect under the port of the Router 2 Xia Lian serverNetwork topology1 Configuring Router 1 single-arm routing, establishing sub-interfaces and configuring IP addresses, etc.2 Configuring the Switch's VLAN and port type3 Configuring the IP address of the PC4 Configuring the interface address for
I. Lab Objectives
Understand the principles and functions of NAT network address translation;
Master static Nat configurations to enable LAN access to the Internet;
Ii. Lab background
To publish the WWW Service, the company now requires that the Intranet web server IP address be mapped to a global IP address to allow external networks to access the company's internal web servers.
Iii. Technical Principles
Network Address Translation (NAT) is widely used in various Int
Linux Network Application Programming Packet Tracer installation and interface introduction, packettracerIntroduction to Packet Tracer 1
Packet tracer is an auxiliary learning tool released by Cisco. It provides a network simulat
classless routing protocol and do not support vlsm. Route information is updated in broadcast mode. The update period is 30 seconds; r12002 is a classless routing protocol that supports vlsm and route updates in the form of multicast.
Iv. Experiment steps
Lab Topology
1. vlan10 and vlan20 are divided on layer-3 switches. vlan10 is used to connect to the campus network host and vlan20 is used to connect to R1;
2. The vrouters are connected through a serial port through the V.35 cable. the DCE e
port to enable ACL policyNetwork topology1, configure Router 1, turn on the single-arm routing configuration subinterface address and connect the physical interface address of another route and open the port2 Configuring the VLAN of the switch, configuring the port type3 Configuring the IP address of the PC, specifying the gateway4 Configuring router static rout
Tags: process proc ima RAC Technology share static term ADOBy configuring static routes, you can achieve an increase in routing entries for routers in a relatively simple network.However, if there are more than 20 routers in a network, it is difficult to configure static routes to accommodate the complexity of routing entries and changes in the network. At this point we can use the RIP protocol to configure
Packet Tracer 5.2 Experiment (15) network port address translation NAPT configurationFirst, the experimental target
Understand the principle and function of NAT network address translation;
Master NAPT configuration, realize LAN access to the Internet;
Second, the experimental backgroundCorporate office network needs to access the Internet, the company only applied to the ISP a dedicated l
Lab Environment:650) this.width=650; Tracer of "alt=" Cisco Packet EtherChannel increases link bandwidth and redundancy-Ibm.chick-mingkang.zhou "src=" http://img0.ph. 126.net/1inyhgrqquafdjfzpjjgsw==/6630808280955124494.jpg "style=" border:0px;height:auto;margin:0px 10px 0px 0px; "/ >Experimental Purpose:1. Observe the STP status of the two switches.2. Configure
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.