
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CCNA Packet Tracer Lab Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/ccna-packet-tracer-lab/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.technig.com/tag/ccna-packet-tracer-lab/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Wed, 23 Jun 2021 08:18:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>CCNA Packet Tracer Lab Archives - TECHNIG</title>
	<link>https://www.technig.com/tag/ccna-packet-tracer-lab/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>How to Configure Switch Port Security on Cisco Switches?</title>
		<link>https://www.technig.com/configure-switch-port-security-cisco-switches/</link>
					<comments>https://www.technig.com/configure-switch-port-security-cisco-switches/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 09 May 2018 05:00:34 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Switch Port Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14693</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Switch Port Security on Cisco Switch - Technig" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>This article describes how to configure switch port security on Cisco Switches. It provides guidelines, procedures, and configuration examples. To practice and learn to configure port security on Cisco switch, just download the port security packet tracer lab or create your own lab and follow the switch port security configuration guideline. Download Switch Port Security [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-switch-port-security-cisco-switches/">How to Configure Switch Port Security on Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Switch Port Security on Cisco Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Switch-Port-Security-on-Cisco-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>This article describes how to configure switch port security on Cisco Switches. It provides guidelines, procedures, and configuration examples. To practice and learn to configure port security on Cisco switch, just download the port security packet tracer lab or create your own lab and follow the switch port security configuration guideline.</p>
<p><strong>Download</strong> <a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-Port-Security-on-Cisco-Switches-Technig.zip" target="_blank" rel="noopener noreferrer">Switch Port Security Configuration</a> Packet Tracer Lab.</p>
<figure id="attachment_14695" aria-describedby="caption-attachment-14695" style="width: 841px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg"><img decoding="async" class="wp-image-14695 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg" alt="How to Configure Switch Port Security on Cisco Switches - Technig" width="841" height="490" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig-300x175.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-Switch-Port-Security-on-Cisco-Switches-Technig-768x447.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></a><figcaption id="caption-attachment-14695" class="wp-caption-text">How to Configure Switch Port Security on Cisco Switches &#8211; Technig</figcaption></figure>
<h2 class="p_H_Head1">Port Security Guidelines and Restrictions</h2>
<p class="pB1_Body1">Follow these guidelines when configuring port security.</p>
<ul style="list-style-type: circle;">
<li class="pBu1_Bullet1">A secure port cannot be a trunk port.</li>
<li class="pBu1_Bullet1">A secure port cannot be a destination port for Switch Port Analyzer (SPAN).</li>
<li class="pBu1_Bullet1">A secure port cannot belong to an EtherCha<img decoding="async" style="text-transform: initial;" src="https://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" width="19" height="2" border="0" /><span style="text-transform: initial;">nnel port-channel interface.</span></li>
<li class="pBu1_Bullet1">A secure port and static MAC address configuration are mutually exclusive.</li>
</ul>
<h2 class="p_H_Head1">Configure Switch Port Security</h2>
<p class="pB1_Body1">These sections describe how to configure port security using the Packet Tracer &#8211; Configuring Switch Port Security Lab.</p>
<p>In this activity, you will configure and verify port security on a switch. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic to the port.</p>
<p><strong>Part 1:</strong> Configure Port Security</p>
<p>a. Access the command line for S1 and enable port security on Fast Ethernet ports 0/1 and 0/2.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1&gt;enable 
SW1#configure terminal 
Enter configuration commands, one per line.  End with CNTL/Z.
SW1(config)#interface range fastEthernet 0/1-2
SW1(config-if-range)#switchport mode access 
SW1(config-if-range)#
SW1(config-if-range)#switchport port-security 
SW1(config-if-range)#</pre>
<p>b. Set the maximum so that only one device can access the Fast Ethernet ports 0/1 and 0/2.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security maximum 1
SW1(config-if-range)#</pre>
<p>c. Secure the ports so that the MAC address of a device is dynamically learned and added to the running configuration.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security mac-address sticky 
SW1(config-if-range)#</pre>
<p>d. Set the violation so that the Fast Ethernet ports 0/1 and 0/2 are not disabled when a violation occurs, but packets are dropped from an unknown source.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config-if-range)#switchport port-security violation restrict 
SW1(config-if-range)#</pre>
<p>e. Disable all the remaining unused ports. Hint: Use the range keyword to apply this configuration to all the ports simultaneously.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">SW1(config)#interface range fastEthernet 0/3-24, gigabitEthernet 0/1-2
SW1(config-if-range)#shutdown</pre>
<p>It&#8217;s all and enough to configure switch port security on this lab. Let&#8217;s test it.</p>
<p><strong>Part 2:</strong> Verify Port Security</p>
<p>Try to test your switch port security configuration with ping command and testing with the rogue laptop on the lab</p>
<ul>
<li>a. From PC1, ping PC2.</li>
<li>b. Verify port security is enabled and the MAC addresses of PC1 and PC2 were added to the running configuration with &#8220;<strong>show run</strong>&#8221; command.</li>
<li>c. Attach Rogue Laptop to any unused switch port and notice that the link lights are red.</li>
<li>d. Enable the port and verify that Rogue Laptop can ping PC1 and PC2. After verification shut down the port connected to Rogue Laptop.</li>
<li>e. Disconnect PC2 and connect Rogue Laptop to PC2’s port. Verify that Rogue Laptop is unable to ping PC1.</li>
<li>f. Display the port security violations for the port Rogue Laptop is connected to.</li>
<li>g. Disconnect Rouge Laptop and reconnect PC2. Verify PC2 can ping PC1.</li>
<li>h. Why is PC2 able to ping PC1, but the Rouge Laptop is not?</li>
</ul>
<p>That&#8217;s all, you need to learn about to configure switch port security on Cisco switches. If you need to study more about switch port security, try to read a book or simply read the below materials.</p>
<h3 class="p_H_Head1">Default Port Security Configuration</h3>
<table id="wp1047723table1047720" border="1" width="80%" cellspacing="0" cellpadding="3">
<tbody>
<tr align="left" valign="bottom">
<th scope="col">
<section class="pCH1_CellHead1">Feature</section>
</th>
<th scope="col">
<section class="pCH1_CellHead1">Default Setting</section>
</th>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Port security</p>
</td>
<td>
<p class="pB1_Body1">Disabled on a port</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Maximum number of secure MAC addresses</p>
</td>
<td>
<p class="pB1_Body1">1</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Violation mode</p>
</td>
<td>
<p class="pB1_Body1">Shutdown. The port shuts down when the maximum number of secure MAC addresses is exceeded, and an SNMP trap notification is sent.</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Aging</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Aging type</p>
</td>
<td>
<p class="pB1_Body1">Absolute</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Static Aging</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p class="pB1_Body1">Sticky</p>
</td>
<td>
<p class="pB1_Body1">Disabled</p>
</td>
</tr>
</tbody>
</table>
<h2 class="p_H_Head1">Overview of Configure Switch Port Security</h2>
<p class="pBu1_Bullet1">You can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts. Although sticky secure addresses can be manually configured, it is not recommended.</p>
<p class="pB1_Body1">You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling <em class="cEmphasis">sticky learning</em>. To enable sticky learning, enter the <b class="cBold">switchport</b> <b class="cBold">port-security mac-address sticky</b> command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses.</p>
<p class="pB1_Body1">The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup<em class="cEmphasis"> </em>configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the configuration, they are lost</p>
<p class="pB1_Body1">If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration.</p>
<p class="pB1_Body1">After the maximum number of secure MAC addresses is configured, they are stored in an address table. To ensure that an attached device has the full bandwidth of the port, configure the MAC address of the attached device and set the maximum number of addresses to one, which is the default.</p>
<p class="pB1_Body1">A security violation occurs if the maximum number of secure MAC addresses has been added to the address table and a workstation whose MAC address is not in the address table attempts to access the interface.</p>
<p class="pB1_Body1">You can configure the interface for one of these violation modes, based on the action to be taken if a violation occurs:</p>
<ul>
<li class="pBu1_Bullet1"><strong>Restrict</strong>—A port security violation restricts data, causes the SecurityViolation counter to increment, and causes an SNMP Notification to be generated. The rate at which SNMP traps are generated can be controlled by the SNMP-server enable traps port-security trap-rate command. The default value (&#8220;0&#8221;) causes an SNMP trap to be generated for every security violation.</li>
<li class="pBu1_Bullet1"><strong>Shutdown</strong>—A port security violation causes the interface to shut down immediately. When a secure port is in the error-disabled state, you can bring it out of this state by entering the <b class="cBold">errdisable recovery cause</b> psecure-violation global configuration command or you can manually re-enable it by entering the <b class="cBold">shutdown</b> and <b class="cBold">no shutdown</b> interface configuration commands. This is the default mode.</li>
</ul>
<p class="pB2_Body2">You can also customize the time to recover from the specified error-disable cause (default is 300 seconds) by entering the <b class="cBold">errdisable recovery interval </b>command.</p>
<p>Source: <a href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html" target="_blank" rel="noopener noreferrer">Cisco</a></p>
<h3>Related Search Queries:</h3>
<ul>
<li>Cisco port security violation</li>
<li>Switchport port-security maximum 2</li>
<li>Cisco port security violation options</li>
<li>Switchport port-security violation restrict vs protect</li>
<li>Port security configuration in packet tracer</li>
<li>Switchport port-security mac-address sticky</li>
<li>Port security in networking</li>
<li>Port security pdf</li>
<li>Switchport port-security maximum</li>
<li>Switchport port-security violation restrict vs protect</li>
<li>Cisco port security violation options</li>
<li>Switchport port-security mac-address sticky</li>
</ul>
<p>The post <a href="https://www.technig.com/configure-switch-port-security-cisco-switches/">How to Configure Switch Port Security on Cisco Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-switch-port-security-cisco-switches/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14693</post-id>	</item>
		<item>
		<title>How to Configure SSH on Cisco Router or Switch?</title>
		<link>https://www.technig.com/configure-ssh-on-cisco-router/</link>
					<comments>https://www.technig.com/configure-ssh-on-cisco-router/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Tue, 08 May 2018 05:00:16 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[Cisco Router Configuration]]></category>
		<category><![CDATA[Cisco Switch Configuration]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14677</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure SSH on Cisco Router or Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Short and complete guide to configure SSH on Cisco router and switch for secure remote connection. The Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users. SSH provides a secure channel over an unsecured [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-ssh-on-cisco-router/">How to Configure SSH on Cisco Router or Switch?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure SSH on Cisco Router or Switch - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Cisco-Router-or-Switch-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Short and complete guide to configure SSH on <a href="https://www.cisco.com/c/en_au/products/routers/index.html" target="_blank" rel="noopener noreferrer">Cisco router</a> and switch for secure remote connection. The Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best-known example application is for remote login to computer systems by users.</p>
<p>SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.</p>
<p><strong>The typical use of SSH Protocol</strong></p>
<p>The protocol is used in corporate networks for:</p>
<ul>
<li>providing secure access for users and automated processes</li>
<li>interactive and automated file transfers</li>
<li>issuing remote commands</li>
<li>managing network infrastructure and other mission-critical system components.</li>
</ul>
<h2>Configure SSH on Cisco Router or Switch</h2>
<p>To configure SSH on Cisco router, you need to do:</p>
<ol>
<li>Enable SSH on Cisco router.</li>
<li>Set Password for SSH.</li>
<li>Force remote access to use SSH.</li>
<li>Enable Password Encryption.</li>
<li>Add domain name Server (DNS).</li>
<li>Add Username and Password.</li>
</ol>
<p>Let&#8217;s enable and configure SSH on Cisco router or switch using the below packet tracer lab. The configure on a packet tracer lab and real Cisco devices are the same. Just try to learn and do it what the SSH remote authentication needs.</p>
<p>Download the packet tracer lab or create your own lab. <a href="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-SSH-on-Ciscor-Router-or-Switch.zip" target="_blank" rel="noopener noreferrer"><strong>SSH Configuration Packet Tracer Lab</strong></a>.</p>
<figure id="attachment_14680" aria-describedby="caption-attachment-14680" style="width: 916px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-14680 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg" alt="Configure SSH on Cisco Router or Switch - Technig" width="916" height="495" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig.jpg 916w, https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig-300x162.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-SSH-on-Cisco-Router-or-Switch-Technig-768x415.jpg 768w" sizes="(max-width: 916px) 100vw, 916px" /></a><figcaption id="caption-attachment-14680" class="wp-caption-text">Configure SSH on Cisco Router or Switch &#8211; Technig</figcaption></figure>
<p>In this example, I just enable and configure SSH on SW1 and trying to access it from PC1. It&#8217;s enough to learn how to configure SSH on Cisco router.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true">R1&gt;
R1&gt;enable 
R1#configure terminal 
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#
R1(config)#ip domain-name Technig.com
R1(config)#crypto key generate rsa 
The name for the keys will be: R1.Technig.com
Choose the size of the key modulus in the range of 360 to 2048 for your
  General Purpose Keys. Choosing a key modulus greater than 512 may take
  a few minutes.

How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]

R1(config)#
*Mar 1 0:5:57.974:  %SSH-5-ENABLED: SSH 1.99 has been enabled 
R1(config)#
R1(config)#username Admin password Technig
R1(config)#line vty 0 4
R1(config-line)#login local 
R1(config-line)#transport input ssh 
R1(config-line)#exit
R1(config)#ip ssh version 2
R1(config)#ip ssh authentication-retries 3
R1(config)#
R1(config)#ip ssh time-out 120
R1(config)#exit
R1#

</pre>
<p>That&#8217;s all. Let&#8217;s check the process one by one.</p>
<ol>
<li>I have set DNS domain name with &#8220;<strong>IP domain-name</strong>&#8221; command.</li>
<li>Then configure the router to use <strong>RSA</strong> key pair with modulus size of <strong>1024</strong> bites for remote service authentication with &#8220;<strong style="text-transform: initial;">crypto key generate rsa</strong><span style="text-transform: initial;">&#8221; command.</span></li>
<li>Add username &#8220;<strong>Admin</strong>&#8221; with Password of &#8220;<strong>Technig</strong>&#8221; for ssh authentication.</li>
<li>Enabled ssh with &#8220;<strong>line vty 0 4</strong>&#8221; command.</li>
<li>Configure ssh to use local username and password with &#8220;<strong>login local</strong>&#8221; command. <strong>Remember</strong> that you can set a username and password for ssh with &#8220;<strong>username Admin password Technig</strong>&#8221; command as well. But here we configure ssh to use local username and password.</li>
<li>Configure the router to accept only ssh connection with &#8220;<strong>transport input ssh</strong>&#8221; command.</li>
<li>Configure ssh to version 2 using &#8220;<strong>IP ssh version 2</strong>&#8221; and set the authentication times to 3 with &#8220;<strong>IP ssh authentication-retries 3</strong>&#8221; command.</li>
<li>Finally set the ssh timeout to 120 seconds with &#8220;<strong>IP ssh time-out 120</strong>&#8221; command.</li>
</ol>
<p><strong>Related Article:</strong> <a href="https://www.enlinux.com/install-configure-ssh-on-centos/" target="_blank" rel="noopener noreferrer">Install SSH on CentOS 8.x and Red Hat Linux</a></p>
<p>The final step is to test the connectivity of ssh from PC1 with &#8220;<strong>ssh -l Admin 192.168.1.1</strong>&#8221; command for command prompt.</p>
<pre class="font-size-enable:false nums:false lang:default decode:true ">C:\&gt;ssh -l Admin 192.168.1.1
Open
Password: 


R1&gt;en
R1&gt;enable 
Password: 
R1#</pre>
<p>OK, the ssh works perfectly.</p>
<p>The post <a href="https://www.technig.com/configure-ssh-on-cisco-router/">How to Configure SSH on Cisco Router or Switch?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-ssh-on-cisco-router/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14677</post-id>	</item>
		<item>
		<title>How to Configure Banner MOTD on Cisco Switch and Router?</title>
		<link>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/</link>
					<comments>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/#respond</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Mon, 07 May 2018 02:24:13 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[Cisco Router Configuration]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14609</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Banner Motd on Cisco Switch and Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>If you faced with the below error when you try to configure banner motd on Cisco switch or router. You can easily fix Cisco Motd banner ASCII art using this MOTD Banner configuration guide. SW1(config-line)#motd-banner !No Access for You?! ^ % Invalid input detected at '^' marker. It means that you did not type the banner [&#8230;]</p>
<p>The post <a href="https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/">How to Configure Banner MOTD on Cisco Switch and Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Banner Motd on Cisco Switch and Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>If you faced with the below error when you try to configure banner motd on Cisco switch or router. You can easily fix Cisco Motd banner ASCII art using this MOTD Banner configuration guide.</p>
<pre class=""><code class="language-markup">SW1(config-line)#motd-banner !No Access for You?!
^
% Invalid input detected at '^' marker.</code></pre>
<p>It means that you did not type the banner motd command correctly. Let&#8217;s test it and configure banner motd on Cisco switch and router using packet tracer.</p>
<h3>What is MOTD Banner?</h3>
<p>A <i>banner</i> is a message presented to a user who is using the Cisco switch. The type of banner you configured for use determines when this message is shown. You can configure three main types of banners on your Cisco switch, as shown here:</p>
<ul class="level-one">
<li>
<p class="first-para"><b>The message of the Day (MOTD):</b> This type of login message has been around for a long time on Unix and mainframe systems. The idea of the message is to display a temporary notice to users, such as issues with system availability.</p>
<p class="child-para">However, because the message displays when a user connects to the device before login, most network administrators are now using it to display legal notices regarding access to the switch, such as <i>unauthorized access to this device is prohibited and violators will be prosecuted to the full extent of the law</i> and other such cheery endearments.</p>
</li>
<li>
<p class="first-para"><b>Login:</b> This banner is displayed before login to the system, but after the MOTD banner is displayed. Typically, this banner is used to display a permanent message to the users.</p>
</li>
<li>
<p class="first-para"><b>Exec:</b> This banner displays after the login is complete when the connecting user enters User EXEC mode. Whereas all users who attempt to connect to the switch see the other banners, only users who successfully log on to the switch see this banner, which can be used to post reminders to your network administrators.</p>
</li>
</ul>
<figure id="attachment_14615" aria-describedby="caption-attachment-14615" style="width: 840px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png"><img loading="lazy" decoding="async" class="wp-image-14615 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png" alt="Configure Banner Motd on Cisco Switch and Router - Technig" width="840" height="420" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig.png 840w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-300x150.png 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-Banner-Motd-on-Cisco-Switch-and-Router-Technig-768x384.png 768w" sizes="(max-width: 840px) 100vw, 840px" /></a><figcaption id="caption-attachment-14615" class="wp-caption-text">Configure Banner Motd on Cisco Switch and Router &#8211; Technig</figcaption></figure>
<div class="ad x2">
<h2 id="article_page_content_ad" class="du-ad-region row"> Configure Banner MOTD on Cisco Switch and Router</h2>
<div>
<p>To configure each of these banners and set them up on your switch, follow these commands:</p>
</div>
</div>
<pre class="code">SW1#enable 
SW1#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)#banner motd #Admin Access only!#
SW1(config)#</pre>
<p>Now, the Motd banner has configured on a Cisco switch. Let&#8217;s test it what is going on?</p>
<pre class="nums:false lang:default decode:true">Press RETURN to get started!
Admin Access Only
User Access Verification
Password: 
</pre>
<p>Yes, you can see the message that prompts you before user authentication.</p>
<h3>Related Search Queries:</h3>
<p>Motd banner examples<br />
Cisco MOTD banner ASCII art<br />
Why should every switch have a motd banner?<br />
Show banner motd<br />
Cisco banner motd examples<br />
Banner motd packet tracer<br />
Cisco banner motd multiple lines<br />
Banner exec</p>
<p>The post <a href="https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/">How to Configure Banner MOTD on Cisco Switch and Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/how-to-configure-banner-motd-on-cisco-switch-and-router/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14609</post-id>	</item>
		<item>
		<title>How to Configure PAP and CHAP in Cisco Router?</title>
		<link>https://www.technig.com/configure-pap-and-chap-in-cisco-router/</link>
					<comments>https://www.technig.com/configure-pap-and-chap-in-cisco-router/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 03 May 2018 11:27:16 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[CCNA Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=14577</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="841" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure PAP and CHAP in Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x384.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></div>
<p>It&#8217;s a simple way you can learn to configure PAP and CHAP in Cisco router using this packet tracer lab. Just download the lab or create your own lab with packet tracer and follow the instruction to easy configure PAP and CHAP authentication protocols in a Cisco router. Configure PAP and CHAP in Cisco Router [&#8230;]</p>
<p>The post <a href="https://www.technig.com/configure-pap-and-chap-in-cisco-router/">How to Configure PAP and CHAP in Cisco Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="841" height="420" src="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="How to Configure PAP and CHAP in Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 841w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/How-to-Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x384.jpg 768w" sizes="(max-width: 841px) 100vw, 841px" /></div><p>It&#8217;s a simple way you can learn to configure PAP and CHAP in Cisco router using this packet tracer lab. Just download the lab or create your own lab with packet tracer and follow the instruction to easy configure PAP and CHAP authentication protocols in a Cisco router.</p>
<figure id="attachment_14578" aria-describedby="caption-attachment-14578" style="width: 1024px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-14578 size-full" src="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg" alt="Configure PAP and CHAP in Cisco Router - Technig" width="1024" height="432" srcset="https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig.jpg 1024w, https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig-300x127.jpg 300w, https://www.technig.com/wp-content/uploads/2018/05/Configure-PAP-and-CHAP-in-Cisco-Router-Technig-768x324.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption id="caption-attachment-14578" class="wp-caption-text">Configure PAP and CHAP in Cisco Router &#8211; Technig</figcaption></figure>
<h2>Configure PAP and CHAP in Cisco Router</h2>
<p>In this activity, you will practice configuring PPP encapsulation on serial links. You will also configure PPP PAP<br />
authentication and PPP CHAP authentication.</p>
<h3><strong>Part 1:</strong> Review Routing Configurations</h3>
<p><strong>Step 1:</strong> View running configurations on all routers.</p>
<ul>
<li>While reviewing the router configurations, note the use of both static and dynamic routes in the topology.</li>
</ul>
<p><strong>Step 2:</strong> Test connectivity between computers and the web server.</p>
<ul>
<li>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</li>
</ul>
<h3><strong>Part 2:</strong> Configure PPP as the Encapsulation Method</h3>
<p><strong>Step 1:</strong> Configure R1 to use PPP encapsulation with R3.</p>
<p>Enter the following commands on R1:</p>
<pre class="nums:false lang:default decode:true">R1(config)# interface s0/0/0
R1(config-if)# encapsulation ppp</pre>
<p><strong>Step 2:</strong> Configure R2 to use PPP encapsulation with R3.</p>
<p>Enter the appropriate commands on R2:</p>
<pre class="nums:false lang:default decode:true ">R2(config)# interface s0/0/1
R2(config-if)# encapsulation ppp</pre>
<p><strong>Step 3:</strong> Configure R3 to use PPP encapsulation with R1, R2, and ISP.</p>
<p>Enter the appropriate commands on R3:</p>
<pre class="nums:false lang:default decode:true">R3(config)# interface s0/0/0
R3(config-if)# encapsulation ppp
R3(config)# interface s0/0/1
R3(config-if)# encapsulation ppp
R3(config)# interface s0/1/0
R3(config-if)# encapsulation ppp</pre>
<p><strong>Step 4:</strong> Configure ISP to use PPP encapsulation with R3.</p>
<p><strong>a.</strong> Click the Internet cloud, then ISP. Enter the following commands:</p>
<pre class="nums:false lang:default decode:true ">Router(config)# interface s0/0/0
Router(config-if)# encapsulation ppp</pre>
<p><strong>b.</strong> Exit the Internet cloud by clicking Back in the upper left corner or by pressing Alt+left arrow.</p>
<p><strong>Step 5:</strong> Test connectivity to the web server.</p>
<p>PC and Laptop should be able to ping the web server at 209.165.200.2. This may take some time as<br />
interfaces start working again and EIGRP reconverges.</p>
<h3><strong>Part 3:</strong> Configure PPP Authentication</h3>
<p><strong>Step 1:</strong> Configure PPP PAP Authentication Between R1 and R3.</p>
<p><strong>Note:</strong> Instead of using the keyword password as shown in the curriculum, you will use the keyword secret to<br />
provide a better encryption of the password.</p>
<p><strong>a.</strong> Enter the following commands into R1:</p>
<pre class="nums:false lang:default decode:true ">R1(config)# username R3 secret class
R1(config)# interface s0/0/0
R1(config-if)# ppp authentication pap
R1(config-if)# ppp pap sent-username R1 password cisco</pre>
<p><strong>b.</strong> Enter the following commands into R3:</p>
<pre class="nums:false lang:default decode:true ">R3(config)# username R1 secret cisco
R3(config)# interface s0/0/0
R3(config-if)# ppp authentication pap
R3(config-if)# ppp pap sent-username R3 password class</pre>
<p><strong>Step 2:</strong> Configure PPP PAP Authentication Between R2 and R3.</p>
<p>Repeat step 1 to configure authentication between R2 and R3 changing the usernames as needed. Note that<br />
each password sent to each serial port matches the password expected by the opposite router.</p>
<pre class="nums:false lang:default decode:true ">R2(config-if)# username R3 secret class
R2(config)# interface s0/0/1
R2(config-if)# ppp authentication pap
R2(config-if)# ppp pap sent-username R2 password cisco</pre>
<pre class="nums:false lang:default decode:true ">R3(config-if)# username R2 secret cisco
R3(config)# interface s0/0/1
R3(config-if)# ppp authentication pap
R3(config-if)# ppp pap sent-username R3 password class</pre>
<h3><strong>Step 3:</strong> Configure PPP CHAP Authentication Between R3 and ISP</h3>
<p><strong>a.</strong> Enter the following commands into ISP. The hostname is sent as the username:</p>
<pre class="nums:false lang:default decode:true ">Router(config)# hostname ISP
ISP(config)# username R3 secret cisco
ISP(config)# interface s0/0/0
ISP(config-if)# ppp authentication chap</pre>
<p><strong>b.</strong> Enter the following commands into R3. The passwords must match for CHAP authentication:</p>
<pre class="nums:false lang:default decode:true ">R3(config)# username ISP secret cisco
R3(config)# interface serial0/1/0
R3(config-if)# ppp authentication chap</pre>
<p><strong>Step 4:</strong> Test connectivity between computers and the web server.</p>
<p>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</p>
<p><strong>Step 4:</strong> Test connectivity between computers and the web server.</p>
<p>From PC and Laptop, ping the web server at 209.165.200.2. Both ping commands should be successful.<br />
Remember to give enough time for STP and EIGRP to converge.</p>
<p><strong>Note:</strong> This is the Cisco Network Academy lab, you can join the netacad.com website to learn the entire CCNA.</p>
<p><strong>Download the Lab:</strong> <a href="https://www.technig.com/wp-content/uploads/2018/05/2.3.2.6-Packet-Tracer-Configuring-PAP-and-CHAP-Authentication.zip" target="_blank" rel="noopener noreferrer">PAP and CHAP Configuration</a> or <a href="https://www.technig.com/tag/ccna-packet-tracer-lab/" target="_blank" rel="noopener noreferrer">CCNA Packet Tracer Lab</a></p>
<p>That is all you need to learn to configure PAP and CHAP in Cisco Router. Let&#8217;s see what is the difference between PAP and CHAP authentication protocols?</p>
<h2>What is the Difference Between PAP and CHAP?</h2>
<p>The password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) are both used to authenticate PPP sessions and can be used with many VPNs. Basically, PAP works like a standard login procedure; the remote system authenticates itself to the user a static username and password combination. The password can be encrypted for additional security, but PAP is subject to numerous attacks. In particular, since the information is static, it is subject to password guessing as well as snooping.</p>
<p>CHAP takes a more sophisticated and secure approach to authentication by creating a unique challenge phrase (a randomly generated string) for each authentication. The challenge phrase is combined with device hostnames using one-way hashing functions to authenticate in a way where no static secret information is ever transmitted over the wire. Because all transmitted information is dynamic, CHAP is significantly more robust than PAP.</p>
<p>Another advantage of CHAP over PAP is that CHAP can be set up to do repeated midsession authentications. This is useful for dial-up PPP sessions and other sessions where a port may be left open even though the remote device has disconnected. In this case, its possible for someone else to pick up the connection mid-session simply by establish physical connectivity.</p>
<h3>Related Search:</h3>
<ul>
<li>PPP pap configuration</li>
<li>PPP chap configuration</li>
<li>Configure chap authentication on s0/0/0</li>
<li>pap chap configuration</li>
</ul>
<p>The post <a href="https://www.technig.com/configure-pap-and-chap-in-cisco-router/">How to Configure PAP and CHAP in Cisco Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-pap-and-chap-in-cisco-router/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14577</post-id>	</item>
		<item>
		<title>Configure Inter VLAN Routing on Cisco Router and Layer 3 Switches</title>
		<link>https://www.technig.com/configure-inter-vlan-routing-cisco-router/</link>
					<comments>https://www.technig.com/configure-inter-vlan-routing-cisco-router/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 01 Jun 2017 04:58:04 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Lab Manual]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[Cisco Router Configuration]]></category>
		<category><![CDATA[Configure VLAN]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Inter VLAN Routing]]></category>
		<category><![CDATA[Packet Tracer Lab]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=2449</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Inter VLAN Routing" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>A complete guide to configure Inter VLAN Routing on Cisco Router and Layer 3 switch to learn inter VLAN routing. </p>
<p>The post <a href="https://www.technig.com/configure-inter-vlan-routing-cisco-router/">Configure Inter VLAN Routing on Cisco Router and Layer 3 Switches</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Inter VLAN Routing" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>A step by step guide to configure Inter-VLAN Routing on the Cisco router or layer 3 switches. Basically, on a VLAN, no host can communicate with hosts within other VLANs. It means only hosts that are members of the same VLAN can communicate with each other. So if you want your VLANs hosts can communicate with each other, you must configure inter-VLAN routing using a router or a layer 3 switch. Here we completely demonstrate the Inter-VLAN configuration using a Cisco router and a layer 3 switch.</p>
<p>The router you are using for Inter-VLAN routing must be compatible and support <a href="https://en.wikipedia.org/wiki/Cisco_Inter-Switch_Link" target="_blank" rel="noopener noreferrer">Inter-Switch Link</a> (ISL) which is a Cisco Systems proprietary protocol, and IEEE 802.1q frame format for routing on the Fast Ethernet interfaces. In Inter-VLAN the physical Fast Ethernet interface of the router is divided into sub-Interfaces for each VLAN. You can set IP address for each sub-Interface in order to route between VLANs.</p>
<figure id="attachment_2450" aria-describedby="caption-attachment-2450" style="width: 840px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg"><img loading="lazy" decoding="async" class="wp-image-2450 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg" alt="Configure Inter VLAN Routing" width="840" height="420" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></a><figcaption id="caption-attachment-2450" class="wp-caption-text">Configure Inter VLAN Routing</figcaption></figure>
<h2>How to Create VLAN on Cisco Switches?</h2>
<p>Let&#8217;s configure it on the below Inter-VLAN routing Lab. Download the Packet Tracer <a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing-Technig.zip" target="_blank" rel="noopener noreferrer">Inter-VLAN routing</a> Lab for CCNA or create your own Lab.</p>
<p><strong>1.</strong> First of all, create two VLAN in the switch and named VLAN A and VLAN B with the following command.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch&gt;enable 
Switch#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 2
Switch(config-vlan)#name VLAN-A
Switch(config-vlan)#vlan 3
Switch(config-vlan)#name VLAN-B
Switch(config-vlan)#exit</pre>
<p><strong>2.</strong> OK, the VLANs A and B are created successfully. Now check them with &#8220;<strong>show vlan</strong>&#8221; command.</p>
<figure id="attachment_2457" aria-describedby="caption-attachment-2457" style="width: 563px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Inter-VLAN-Routing.jpg"><img loading="lazy" decoding="async" class="wp-image-2457 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Inter-VLAN-Routing.jpg" alt="Inter-VLAN Routing" width="563" height="271" srcset="https://www.technig.com/wp-content/uploads/2015/04/Inter-VLAN-Routing.jpg 563w, https://www.technig.com/wp-content/uploads/2015/04/Inter-VLAN-Routing-300x144.jpg 300w" sizes="(max-width: 563px) 100vw, 563px" /></a><figcaption id="caption-attachment-2457" class="wp-caption-text">Configure Inter-VLAN Routing</figcaption></figure>
<p><strong>3.</strong> You see the result in the screenshot, the VLANs are ready for assigning switch ports to them.</p>
<h2>Assigning Switch Ports for VLANs</h2>
<p>In this section, the switch ports are divide and assign to VLANs. Before configuring Inter-VLAN routing, a host in a VLAN can only communicate within its own VLAN and not reach to other VLANs. So let&#8217;s configure it.</p>
<p><strong>1.</strong> Try to assign switch ports for each VLANs with the following commands.</p>
<figure id="attachment_2459" aria-describedby="caption-attachment-2459" style="width: 278px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Assigning-Switch-Ports-to-VLANs.jpg"><img loading="lazy" decoding="async" class="wp-image-2459 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Assigning-Switch-Ports-to-VLANs.jpg" alt="Assigning Switch Ports to VLANs" width="278" height="189" /></a><figcaption id="caption-attachment-2459" class="wp-caption-text">Assigning Switch Ports to VLANs</figcaption></figure>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch(config)#interface fastEthernet 0/2
Switch(config-if)#switchport mode access 
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#
Switch(config)#interface fastEthernet 0/5
Switch(config-if)#switchport mode access 
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit</pre>
<p><strong>2.</strong> Now the port <strong>FastEthernet 0/2</strong> and <strong>FastEthernet 0/5</strong> are members of <strong>VLAN 2</strong> which named <strong>VLAN-A</strong>. Go to set the PC3 and PC2 to <strong>VLAN-B</strong>.</p>
<p><strong>3.</strong> Let&#8217;s assign a range of ports to a VLAN using &#8220;<strong>interface range</strong>&#8221; command.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch(config)#interface range fastEthernet 0/3-4
Switch(config-if-range)#switchport mode access 
Switch(config-if-range)#switchport access vlan 3
Switch(config-if-range)#exit</pre>
<p><strong>Note: </strong>The <strong>interface range</strong> command can assign a range of interfaces to a VLAN. Read more about basic VLAN configuration on &#8220;<a href="https://www.technig.com/configure-vlan-cisco-switches/" target="_blank" rel="noopener noreferrer">Configure VLAN on Cisco Switches Using Cisco Packet Tracer</a>&#8221; post.</p>
<figure id="attachment_2461" aria-describedby="caption-attachment-2461" style="width: 570px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Assign-Switch-Ports-to-VLAN.jpg"><img loading="lazy" decoding="async" class="wp-image-2461 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Assign-Switch-Ports-to-VLAN.jpg" alt="Assign Switch Ports to VLAN" width="570" height="257" srcset="https://www.technig.com/wp-content/uploads/2015/04/Assign-Switch-Ports-to-VLAN.jpg 570w, https://www.technig.com/wp-content/uploads/2015/04/Assign-Switch-Ports-to-VLAN-300x135.jpg 300w" sizes="(max-width: 570px) 100vw, 570px" /></a><figcaption id="caption-attachment-2461" class="wp-caption-text">Assign Switch Ports to VLAN</figcaption></figure>
<p><strong>4.</strong> Now we have just done the basic VLAN configuration like creating VLAN and assigning switch ports to VLANs. Let&#8217;s enable Trunking mode on the switch port to the router and then configure Inter-VLAN routing on the router.</p>
<h2>Configure Trunking Ports on Switch</h2>
<p>With the command &#8220;<strong>switch port mode trunk</strong>&#8221; you can configure trunking on the <strong>FastEthernet 0/1</strong> port of the <strong>SW1</strong>. The <strong>VLAN Trunking Protocol</strong> (VTP) let the VLANs transmit theirs traffics over a physical line simultaneously. Read more about <strong><a href="https://en.wikipedia.org/wiki/VLAN_Trunking_Protocol" target="_blank" rel="noopener noreferrer">VTP</a> </strong>on Wikipedia website.</p>
<figure id="attachment_2466" aria-describedby="caption-attachment-2466" style="width: 249px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Configuring-Trunk-Ports.jpg"><img loading="lazy" decoding="async" class="wp-image-2466 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Configuring-Trunk-Ports.jpg" alt="Configuring Trunk Ports" width="249" height="157" /></a><figcaption id="caption-attachment-2466" class="wp-caption-text">Configuring Trunk Ports</figcaption></figure>
<p><strong>1.</strong> Just navigate to <strong>FastEthernet 0/1</strong> interface and type &#8220;<strong>switchport mode trunk</strong>&#8220;<strong> </strong>the press enter to enable trunking on <strong>Fa0/1</strong> interface line.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch(config)#interface fastEthernet 0/1
Switch(config-if)#switchport mode trunk 
Switch(config-if)#</pre>
<p><strong>2.</strong> Now the VLANs can transmit traffic over the <strong>FastEthernet 0/1</strong> without any problems.</p>
<p><strong>Note:</strong> Try to enable trunking mode only to interface between to switch or router devices. It&#8217;s not necessary to enable it on the interface of the switch to PC.</p>
<h2>Configure Inter-VLAN Routing on Cisco Router</h2>
<p>Finally, the lab is ready to configure Inter-VLAN routing. If you test the PCs, they can ping with each other within a VLAN but not with other VLANs. So in order to communicate they need routing. Not network routing protocols such as <strong><a href="https://www.technig.com/ccna-configure-static-routing-in-cisco-packet-tracer/" target="_blank" rel="noopener noreferrer">Static routing</a></strong> or dynamic routing like <strong><a href="https://www.technig.com/configure-routing-information-protocol/" target="_blank" rel="noopener noreferrer">RIP</a></strong>, and <strong><a href="https://www.technig.com/configure-ospf-routing-protocol/" target="_blank" rel="noopener noreferrer">OSPF</a></strong>. Just need Inter-VLAN Routing which you simply configure according to below step by step Inter-VLAN routing guide.</p>
<p><strong>1.</strong> Try to assign an IP address to the router and enable the interface you want to configure inter-VLAN routing.</p>
<figure id="attachment_2470" aria-describedby="caption-attachment-2470" style="width: 275px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/VLAN-Routing.jpg"><img loading="lazy" decoding="async" class="wp-image-2470 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/VLAN-Routing.jpg" alt="VLAN Routing" width="275" height="130" /></a><figcaption id="caption-attachment-2470" class="wp-caption-text">VLAN Routing</figcaption></figure>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Router&gt;enable 
Router#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface fastEthernet 0/0
Router(config-if)#ip address 192.168.10.1 255.255.255.248
Router(config-if)#no shutdown</pre>
<p><strong>2.</strong> Good, the IP <strong>192.168.10.1</strong> with the subnet mask of <strong>255.255.255.248</strong> is assigned for physical <strong>FastEthernet 0/0</strong> interface.</p>
<p><strong>Note: </strong>We need to have subinterface for each VLANs on the router. The subinterface is a virtual interface card that inter-VLAN doing routing using them.</p>
<p><strong>3.</strong> Now try to create a subinterface for each VLAN with <strong>interface</strong> command and assign IP address from the different network for each VLAN. In this case, I have subnetted the<strong> 192.168.10.0/24</strong> IP address to <strong>3</strong> networks.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Router(config)#interface fastEthernet 0/0.2
Router(config-subif)#
Router(config-subif)#encapsulation dot1Q 2
Router(config-subif)#ip address 192.168.10.9 255.255.255.248
Router(config-subif)#</pre>
<p><strong>4.</strong> See the result with &#8220;<strong>do show ip interface brief</strong>&#8221; from sub-interface area.</p>
<figure id="attachment_2471" aria-describedby="caption-attachment-2471" style="width: 618px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Create-Sub-Interface.jpg"><img loading="lazy" decoding="async" class="wp-image-2471 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Create-Sub-Interface.jpg" alt="Create Sub-Interface" width="618" height="133" srcset="https://www.technig.com/wp-content/uploads/2015/04/Create-Sub-Interface.jpg 618w, https://www.technig.com/wp-content/uploads/2015/04/Create-Sub-Interface-300x65.jpg 300w" sizes="(max-width: 618px) 100vw, 618px" /></a><figcaption id="caption-attachment-2471" class="wp-caption-text">Create Sub-Interface</figcaption></figure>
<p>The virtual sub-interface <strong>FastEthernet0/0.2</strong> has created and it has the 192.168.10.9 IP address. This sub-interface act as a default gateway for VLAN-A with an address of <strong>192.168.10.8/29</strong>.</p>
<p><strong>5.</strong> Do the same to create a sub-interface for VLAN-B also.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Router(config)#interface fastEthernet 0/0.3
Router(config-subif)#ip address 192.168.10.17 255.255.255.248

% Configuring IP routing on a LAN subinterface is only allowed if that
subinterface is already configured as part of an IEEE 802.10, IEEE 802.1Q,
or ISL vLAN.

Router(config-subif)#encapsulation dot1Q 3
Router(config-subif)#ip address 192.168.10.17 255.255.255.248
Router(config-subif)#</pre>
<p><strong>6.</strong> Everything is fine, but you see the error with red colour! It is because we forgot to set the <strong>encapsulation dot1Q</strong> command. Before assigning an IP address to a sub-interface, you should set IEEE 802.1q with <strong>encapsulation</strong> command.</p>
<p>Finally, all VLANs hosts can communicate with each other. That&#8217;s all you need to configure Inter-VLAN routing on your corporate network. Download the complete Lab of <a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-Inter-VLAN-Routing.zip" target="_blank" rel="noopener noreferrer">Inter-VLAN routing</a> Cisco Packet Tracer Lab. Follow the below steps if you want to configure inter-VLAN on Layer 3 Switches or troubleshooting inter-VLAN on routers and switches.</p>
<h2>Configure Inter-VLAN Using Layer 3 Switches</h2>
<p>Work the same, just need a Cisco Layer 3 switch. To configure Inter-VLAN on a Layer 3 switch, you must assign an IP address to VLANs instead of sub-interfaces. Assigning an IP address to VLAN is easy, only read the &#8220;<strong>Assigning IP address to VLAN</strong>&#8221; section at the end of this articles.</p>
<p>To configure Inter-VLAN routing using layer 3 switches, you don&#8217;t need router anymore. All configuration has done within the layer 3 switch.</p>
<h2>Troubleshooting and Assigning IP address to VLANs</h2>
<p>As this post is related to configure Inter-VLAN routing, so we must do some more about VLAN configuration such as assigning IP address to VLANs, controlling VLANs remotely with Telnet, and some essential troubleshooting commands.</p>
<h3>How to Assign an IP address to VLANs?</h3>
<p>In order to assign an IP address to a VLAN, simply go to VLAN and set the IP address like assigning IP address to an interface of a router.</p>
<pre class="toolbar:2 nums-toggle:true lang:default decode:true">Switch(config)#interface vlan 1
Switch(config-if)#ip address 192.168.10.4 255.255.255.248
Switch(config-if)#no shutdown</pre>
<p>Check it with &#8220;<strong>do show ip interface brief</strong>&#8221; command, whether the default <strong>VLAN 1</strong> has gotten the IP address of <strong>192.168.10.4/29</strong> or not.</p>
<figure id="attachment_2472" aria-describedby="caption-attachment-2472" style="width: 550px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Default-VLAN-1.jpg"><img loading="lazy" decoding="async" class="wp-image-2472 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Default-VLAN-1.jpg" alt="Default VLAN 1" width="550" height="45" srcset="https://www.technig.com/wp-content/uploads/2015/04/Default-VLAN-1.jpg 550w, https://www.technig.com/wp-content/uploads/2015/04/Default-VLAN-1-300x25.jpg 300w" sizes="(max-width: 550px) 100vw, 550px" /></a><figcaption id="caption-attachment-2472" class="wp-caption-text">Default VLAN 1 &#8211; Configure Inter-VLAN Routing</figcaption></figure>
<p>Yes, that&#8217;s fine. This can help you remotely configure VLANs through the internet or network.</p>
<h3>Troubleshooting Inter-VLAN Routing</h3>
<p>To see the VLANs on a switch, type the &#8220;<strong>show vlan</strong>&#8221; command. This command will list all created VLANs within a switch.</p>
<p>The &#8220;<strong>show interface trunk</strong>&#8221; command shows encapsulation and trunking status.</p>
<p>The &#8220;<strong>show interfaces fastEthernet 0/1 switchport</strong>&#8221; display the status of a specific switch port. See the result on the screenshot.</p>
<figure id="attachment_2473" aria-describedby="caption-attachment-2473" style="width: 404px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Encapsulation-Status.jpg"><img loading="lazy" decoding="async" class="wp-image-2473 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Encapsulation-Status.jpg" alt="Configure Inter-VLAN routing - Encapsulation Status" width="404" height="343" srcset="https://www.technig.com/wp-content/uploads/2015/04/Encapsulation-Status.jpg 404w, https://www.technig.com/wp-content/uploads/2015/04/Encapsulation-Status-300x255.jpg 300w" sizes="(max-width: 404px) 100vw, 404px" /></a><figcaption id="caption-attachment-2473" class="wp-caption-text">Configure Inter-VLAN routing &#8211; Encapsulation Status</figcaption></figure>
<p>OK, I think it&#8217;s enough for Configuring Inter-VLAN routing. I hope you find this configure Inter-VLAN routing article&#8217;s helpful and if you have any problem or question regarding this article, ask us through the comment section.</p>
<p>The post <a href="https://www.technig.com/configure-inter-vlan-routing-cisco-router/">Configure Inter VLAN Routing on Cisco Router and Layer 3 Switches</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-inter-vlan-routing-cisco-router/feed/</wfw:commentRss>
			<slash:comments>15</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2449</post-id>	</item>
		<item>
		<title>How to Configure DHCP on Cisco Router?</title>
		<link>https://www.technig.com/how-to-configure-dhcp-on-cisco-router/</link>
					<comments>https://www.technig.com/how-to-configure-dhcp-on-cisco-router/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Wed, 01 Feb 2017 06:35:17 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[CCNA Certification]]></category>
		<category><![CDATA[CCNA Lab]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[Cisco Packet Tracer]]></category>
		<category><![CDATA[Cisco Router Configuration]]></category>
		<category><![CDATA[DHCP Relay Agent]]></category>
		<category><![CDATA[DHCP Server]]></category>
		<category><![CDATA[DHCP Server Configuration]]></category>
		<category><![CDATA[How to]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=1236</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1112" height="602" src="https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Lab - Configure DHCP Server Using Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig.jpg 1112w, https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig-300x162.jpg 300w, https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig-768x416.jpg 768w, https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig-1024x554.jpg 1024w" sizes="(max-width: 1112px) 100vw, 1112px" /></div>
<p>Configure DHCP on Cisco Router. Last week we published a topic about installation and configuration of DHCP Server in Windows Server 2012 R2. We have introduced the DHCP Server &#8220;Install and Configure DHCP Server on Windows Server 2012 R2&#8221; and told the necessary services and network protocols requirement if you don&#8217;t know the basic of DHCP Server? [&#8230;]</p>
<p>The post <a href="https://www.technig.com/how-to-configure-dhcp-on-cisco-router/">How to Configure DHCP on Cisco Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1112" height="602" src="https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="CCNA Lab - Configure DHCP Server Using Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig.jpg 1112w, https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig-300x162.jpg 300w, https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig-768x416.jpg 768w, https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Configure-DHCP-Server-Using-Cisco-Router-Technig-1024x554.jpg 1024w" sizes="(max-width: 1112px) 100vw, 1112px" /></div><p>Configure DHCP on Cisco Router. Last week we published a topic about installation and configuration of DHCP Server in <a href="https://www.technig.com/tag/windows-server-2012-r2/" target="_blank" rel="noopener noreferrer">Windows Server 2012 R2</a>. We have introduced the DHCP Server &#8220;<a href="https://www.technig.com/install-configure-dhcp-server-windows-server-2012-r2/" target="_blank" rel="noopener noreferrer">Install and Configure DHCP Server on Windows Server 2012 R2</a>&#8221; and told the necessary services and network protocols requirement if you don&#8217;t know the basic of DHCP Server? you must read the article first.</p>
<h3>Create and Configure a CCNA Lab within Cisco Packet Tracer.</h3>
<p>Download the DHCP configuration in Cisco router lab of packet tracer from the end of this post or try to create your own network lab with two routers and their LAN networks and then configure it with the following step by step guide.</p>
<figure id="attachment_14601" aria-describedby="caption-attachment-14601" style="width: 915px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2017/02/How-to-Configure-DHCP-on-Cisco-Router-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-14601 size-full" src="https://www.technig.com/wp-content/uploads/2017/02/How-to-Configure-DHCP-on-Cisco-Router-Technig.jpg" alt="How to Configure DHCP on Cisco Router - Technig" width="915" height="482" srcset="https://www.technig.com/wp-content/uploads/2017/02/How-to-Configure-DHCP-on-Cisco-Router-Technig.jpg 915w, https://www.technig.com/wp-content/uploads/2017/02/How-to-Configure-DHCP-on-Cisco-Router-Technig-300x158.jpg 300w, https://www.technig.com/wp-content/uploads/2017/02/How-to-Configure-DHCP-on-Cisco-Router-Technig-768x405.jpg 768w" sizes="(max-width: 915px) 100vw, 915px" /></a><figcaption id="caption-attachment-14601" class="wp-caption-text">How to Configure DHCP on Cisco Router &#8211; Technig</figcaption></figure>
<p>Configure the <strong>Router 1</strong> with below IP address and initial configuration. I assume you know and understand the basic router and Switch configuration clearly. So no need to explain the functions of the basic router and switch commands line.</p>
<p style="padding-left: 60px;">Router&gt;<strong>enable</strong><br />
Router#<strong>configure terminal</strong><br />
Enter configuration commands, one per line. End with CNTL/Z.</p>
<p style="padding-left: 60px;">Router(config)#<strong>hostname R1</strong><br />
R1(config)#<strong>interface serial 0/0/0</strong><br />
R1(config-if)#<strong>ip address 10.10.10.1 255.255.255.252</strong><br />
R1(config-if)#<strong>no shutdown</strong></p>
<p style="padding-left: 60px;">R1(config-if)#clock rate 64000<br />
R1(config-if)#</p>
<p>For <strong>Router 2</strong>, configure the same interface <strong>serial 0/0/0</strong> and <strong>FastEthernet 0/0</strong> with the following commands.</p>
<p style="padding-left: 60px;">Router&gt;<strong>enable</strong><br />
Router#<strong>configure terminal</strong><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
Router(config)#<strong>hostname R2</strong><br />
R2(config)#<strong>interface serial 0/0/0</strong><br />
R2(config-if)#<strong>ip address 10.10.10.2 255.255.255.252</strong><br />
R2(config-if)#<strong>no shutdown</strong></p>
<p style="padding-left: 60px;">R2(config-if)#</p>
<p style="padding-left: 60px;">R2(config)#<strong>interface fastEthernet 0/0</strong><br />
R2(config-if)#<strong>ip address 192.168.10.1 255.255.255.0</strong><br />
R2(config-if)#no shutdown</p>
<h3>Configure DHCP on Cisco Router Using Packet Tracer</h3>
<p>Let&#8217;s configure Router 2 as DHCP Server and set the clients to get their IP address from DHCP Server in Cisco Router.</p>
<p>In the R2 while you are in the config mode, type the command &#8216;<strong>IP DHCP excluded-address 192.168.10.1 192.168.10.20</strong>&#8216; and then press enter. This command &#8216;<strong>ip dhcp excluded-address&#8217; will </strong>create an exclusive range of IP addresses which reserved for Network Servers and DHCP Server will not assign them to clients.</p>
<p>The &#8216;<strong>ip dhcp pool</strong>&#8216; command creates a pool for a network. You can create many pools on a router for all Local area network that connected to the router.</p>
<figure id="attachment_1246" aria-describedby="caption-attachment-1246" style="width: 870px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/02/How-to-Configure-DHCP-on-Cisco-Router-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-1246 size-full" src="https://www.technig.com/wp-content/uploads/2015/02/How-to-Configure-DHCP-on-Cisco-Router-Technig.jpg" alt="How to Configure DHCP on Cisco Router - Technig" width="870" height="297" srcset="https://www.technig.com/wp-content/uploads/2015/02/How-to-Configure-DHCP-on-Cisco-Router-Technig.jpg 870w, https://www.technig.com/wp-content/uploads/2015/02/How-to-Configure-DHCP-on-Cisco-Router-Technig-300x102.jpg 300w, https://www.technig.com/wp-content/uploads/2015/02/How-to-Configure-DHCP-on-Cisco-Router-Technig-768x262.jpg 768w" sizes="(max-width: 870px) 100vw, 870px" /></a><figcaption id="caption-attachment-1246" class="wp-caption-text">How to Configure DHCP on Cisco Router &#8211; Technig</figcaption></figure>
<p style="padding-left: 60px;">R2&gt;<strong>enable</strong><br />
R2#<strong>configure terminal</strong><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
R2(config)#<strong>ip dhcp excluded-address 192.168.10.1 192.168.10.20</strong><br />
R2(config)#<strong>ip dhcp pool Technig_Clients</strong><br />
R2(dhcp-config)#<br />
R2(dhcp-config)#<strong>network 192.168.10.0 255.255.255.0</strong><br />
R2(dhcp-config)#<strong>default-router 192.168.10.1</strong><br />
R2(dhcp-config)#<strong>dns-server 192.168.10.100</strong><br />
R2(dhcp-config)#</p>
<p>Now go to client setting and set the IP Configuration to DHCP and see the client get a new IP address from DHCP Server.</p>
<figure id="attachment_1247" aria-describedby="caption-attachment-1247" style="width: 659px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/02/Get-IP-From-DHCP-Server.jpg"><img loading="lazy" decoding="async" class="wp-image-1247 size-full" src="https://www.technig.com/wp-content/uploads/2015/02/Get-IP-From-DHCP-Server.jpg" alt="Get IP From DHCP Server" width="659" height="286" srcset="https://www.technig.com/wp-content/uploads/2015/02/Get-IP-From-DHCP-Server.jpg 659w, https://www.technig.com/wp-content/uploads/2015/02/Get-IP-From-DHCP-Server-300x130.jpg 300w" sizes="(max-width: 659px) 100vw, 659px" /></a><figcaption id="caption-attachment-1247" class="wp-caption-text">Get IP From DHCP Server</figcaption></figure>
<p>So that&#8217;s it, configure DHCP on Cisco router within a minute! Simple and easy.</p>
<h3>DHCP Relay on Cisco Router</h3>
<p>Remember some DHCP options (DHCP Relay Agent) when you need to provide IP addresses from a DCHP server to clients that are outside of your network or are not in the same Local Area Network. You must use the &#8216;<strong>ip helper-address</strong>&#8216; to forward the DHCP client requests to the remote host.</p>
<figure id="attachment_1251" aria-describedby="caption-attachment-1251" style="width: 606px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/02/DHCP-Options-IP-Helper-address.jpg"><img loading="lazy" decoding="async" class="wp-image-1251 size-full" src="https://www.technig.com/wp-content/uploads/2015/02/DHCP-Options-IP-Helper-address.jpg" alt="DHCP Options - IP Helper-address" width="606" height="429" srcset="https://www.technig.com/wp-content/uploads/2015/02/DHCP-Options-IP-Helper-address.jpg 606w, https://www.technig.com/wp-content/uploads/2015/02/DHCP-Options-IP-Helper-address-300x212.jpg 300w" sizes="(max-width: 606px) 100vw, 606px" /></a><figcaption id="caption-attachment-1251" class="wp-caption-text">DHCP Options &#8211; IP Helper-address</figcaption></figure>
<p>Configure the <strong>R1</strong> to relay the DHCP client request. It does not work without routing. So configure Routers with static or dynamic routing. Here I&#8217;m testing with RIP.</p>
<p style="padding-left: 30px;">R1&gt;<strong>enable</strong><br />
R1#<strong>configure terminal</strong><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
R1(config)#<strong>interface fastEthernet 0/0</strong><br />
R1(config-if)#<strong>ip helper-address 10.10.10.2</strong><br />
R1(config-if)#<strong>exit</strong></p>
<p style="padding-left: 30px;">R1(config)#<strong>router rip</strong><br />
R1(config-router)#<strong>network 10.10.10.0</strong><br />
R1(config-router)#<strong>network 192.168.30.0</strong><br />
R1(config-router)#<strong>exit</strong></p>
<p>Go to the client IP configuration setting and see the forwarded request by DHCP Server.</p>
<figure id="attachment_1252" aria-describedby="caption-attachment-1252" style="width: 579px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/02/Forward-DHCP-client-request-on-Cisco-Router.jpg"><img loading="lazy" decoding="async" class="wp-image-1252 size-full" src="https://www.technig.com/wp-content/uploads/2015/02/Forward-DHCP-client-request-on-Cisco-Router.jpg" alt="Forward DHCP client request on Cisco Router" width="579" height="197" srcset="https://www.technig.com/wp-content/uploads/2015/02/Forward-DHCP-client-request-on-Cisco-Router.jpg 579w, https://www.technig.com/wp-content/uploads/2015/02/Forward-DHCP-client-request-on-Cisco-Router-300x102.jpg 300w" sizes="(max-width: 579px) 100vw, 579px" /></a><figcaption id="caption-attachment-1252" class="wp-caption-text">Forward DHCP client request on Cisco Router</figcaption></figure>
<p>Hope you learn the configuration of the DHCP Server on the Cisco Router and Download the <a href="https://www.technig.com/wp-content/uploads/2017/02/CCNA-Lab-DHCP-Configuration-on-Cisco-Router-Technig.zip" target="_blank" rel="noopener noreferrer" data-wplink-edit="true">DHCP on Cisco Router</a> Packet Tracer.</p>
<h3><span style="color: #808080;">Related Search: </span></h3>
<p>Configure DHCP on cisco router interface<br />
Configure DHCP on cisco router in packet tracer<br />
What is DHCP pool<br />
Configure DHCP on cisco switch 2960<br />
How to configure DHCP pool on cisco switch<br />
IP DHCP excluded-address<br />
Cisco DHCP lease command<br />
IP DHCP server</p>
<p>The post <a href="https://www.technig.com/how-to-configure-dhcp-on-cisco-router/">How to Configure DHCP on Cisco Router?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/how-to-configure-dhcp-on-cisco-router/feed/</wfw:commentRss>
			<slash:comments>23</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1236</post-id>	</item>
		<item>
		<title>How to Enable Telnet and SSH on Cisco Router and Switches?</title>
		<link>https://www.technig.com/enable-telnet-and-ssh-on-cisco-router/</link>
					<comments>https://www.technig.com/enable-telnet-and-ssh-on-cisco-router/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Fri, 08 May 2015 22:10:35 +0000</pubDate>
				<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Lab]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Secure Shell]]></category>
		<category><![CDATA[Telnet Service]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=2656</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/05/Configure-Telnet-and-SSH.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Telnet and SSH" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/05/Configure-Telnet-and-SSH.jpg 840w, https://www.technig.com/wp-content/uploads/2015/05/Configure-Telnet-and-SSH-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/05/Configure-Telnet-and-SSH-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Easy to configure SSH on Cisco Router and switch for remote access to the router and switch over the internet or network. </p>
<p>The post <a href="https://www.technig.com/enable-telnet-and-ssh-on-cisco-router/">How to Enable Telnet and SSH on Cisco Router and Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/05/Configure-Telnet-and-SSH.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Telnet and SSH" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/05/Configure-Telnet-and-SSH.jpg 840w, https://www.technig.com/wp-content/uploads/2015/05/Configure-Telnet-and-SSH-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/05/Configure-Telnet-and-SSH-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>This article is going to shows the CCNA students to configure and enable telnet and ssh on Cisco router and switches. The <a href="http://en.wikipedia.org/wiki/Telnet" rel="noopener">Telnet</a> is an old and non-secure application protocol for remote control services. You can configure telnet on all Cisco switches and routers with the following step by step guides. But it&#8217;s not the best way to the wide-area network. However, we just going to enable telnet and ssh to test them for CCNA Certification exams.</p>
<h2>Enable Telnet and SSH on Cisco Router</h2>
<p>To <a href="https://www.technig.com/enable-telnet-in-windows-10-server-2012-r2/" rel="noopener">enable telnet</a> on Cisco router, simply do it with &#8220;<strong>line vty</strong>&#8221; command. First of the first download the CCNA Lab to Enable Telnet and SSH on Cisco Router from <strong><a href="https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH.zip">Telnet and SSH</a></strong> Lab. The Lab is configured with DHCP server and all clients get an IP address from <a href="https://www.technig.com/how-to-configure-dhcp-on-cisco-router/">DHCP Server on Router</a>.</p>
<figure id="attachment_2658" aria-describedby="caption-attachment-2658" style="width: 660px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH.jpg"><img loading="lazy" decoding="async" class="wp-image-2658 size-full" src="https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH.jpg" alt="Enable Telnet and SSH" width="660" height="351" srcset="https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH.jpg 660w, https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH-300x160.jpg 300w" sizes="(max-width: 660px) 100vw, 660px" /></a><figcaption id="caption-attachment-2658" class="wp-caption-text">Enable Telnet and SSH</figcaption></figure>
<p>Go to router R1 console and configure telnet with &#8220;<strong>line vty</strong>&#8221; command.</p>
<pre class="toolbar:2 lang:default decode:true">R1&gt;enable 
R1#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#line vty 0 
R1(config-line)#password Pass123
R1(config-line)#login 
R1(config-line)#logging synchronous&amp;nbsp;
R1(config-line)#exec-timeout 40
R1(config-line)#motd banner $Admin Access Only$ 
R1(config-line)#exit 
R1(config)#</pre>
<ul style="list-style-type: circle;">
<li>The &#8220;<strong>line vty</strong>&#8221; command enable the telnet and the &#8220;<strong>0&#8243;</strong> is just let a single line or session to the router. If you need more session simultaneously, you must type &#8220;<strong>line vty 0 10</strong>&#8220;.</li>
<li>The &#8220;<strong>password</strong>&#8221; command set the &#8220;<strong>Pass123</strong>&#8221; as a password for telnet. You can set your own password.</li>
<li>The &#8220;<strong>login</strong>&#8221; command authenticate and ask you the password of telnet. If you type &#8220;<strong>no login</strong>&#8221; command, the telnet never authenticates for the password which is not a good practice in a real network environment.</li>
<li>The &#8220;<strong>logging synchronous</strong>&#8221; command stops any message output from splitting your typing.</li>
<li>The &#8220;<strong>exec-timeout&#8221;</strong> command just sets the time-out limit on the line from the default to &#8220;<strong>40&#8243; </strong>minutes.</li>
<li>The <strong>motd-banner</strong> forces a banner message to appear when logging in.</li>
</ul>
<p>OK, the Telnet services enabled successfully. But you must set the <strong>enable password</strong> for the router in order to control it remotely.</p>
<pre class="toolbar:2 lang:default decode:true ">R1(config)#enable password Password
R1(config)#exit</pre>
<h3>Testing Telnet Connectivity</h3>
<p>Now from a client PC test the telnet connectivity and to ensure that it works fine or not yet. If it does not work, try to <a href="https://www.technig.com/troubleshoot-telnet-errors/" rel="noopener">troubleshoot telnet errors</a>.</p>
<p>Let&#8217;s test telnet from the admin PC. Type <strong>telnet 192.168.10.1</strong> and press enter, then enter the telnet password. Next type <strong>enable</strong> command and press enter, then type the router password.</p>
<pre class="toolbar:2 lang:default decode:true">Packet Tracer PC Command Line 1.0
PC&gt;telnet 192.168.10.1
Trying 192.168.10.1 ...Open

User Access Verification

Password: 
R1&gt;enable 
Password: 
R1#</pre>
<p>Now you are remotely connected to router R1 and you can execute all router commands through a telnet command-line interface.</p>
<p>If you need more information about Telnet commands and options, from the <strong>config-line</strong> mode type &#8220;<strong>?</strong>&#8220;, the question mark will display all telnet commands.</p>
<figure id="attachment_2659" aria-describedby="caption-attachment-2659" style="width: 603px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/05/Telnet-Helps.jpg"><img loading="lazy" decoding="async" class="wp-image-2659 size-full" src="https://www.technig.com/wp-content/uploads/2015/05/Telnet-Helps.jpg" alt="Telnet Helps" width="603" height="368" srcset="https://www.technig.com/wp-content/uploads/2015/05/Telnet-Helps.jpg 603w, https://www.technig.com/wp-content/uploads/2015/05/Telnet-Helps-300x183.jpg 300w" sizes="(max-width: 603px) 100vw, 603px" /></a><figcaption id="caption-attachment-2659" class="wp-caption-text">Telnet Helps</figcaption></figure>
<p>That is it, the telnet services configuration on Cisco router.</p>
<h3>2. Enable Telnet and SSH: <span style="color: #339966;">SSH Configuration</span>.</h3>
<p>Secure Shell or <strong>SSH </strong>is a secure protocol and the replacement for Telnet and other insecure remote shell protocols. So for secure communication between network devices, I strongly recommend using SSH instead of Telnet.</p>
<p>Configure SSH on Cisco routers and switches with the below step by step guide to SSH configuration.</p>
<figure id="attachment_2658" aria-describedby="caption-attachment-2658" style="width: 660px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH.jpg"><img loading="lazy" decoding="async" class="wp-image-2658 size-full" src="https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH.jpg" alt="Enable Telnet and SSH on Cisco Router" width="660" height="351" srcset="https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH.jpg 660w, https://www.technig.com/wp-content/uploads/2015/05/Enable-Telnet-and-SSH-300x160.jpg 300w" sizes="(max-width: 660px) 100vw, 660px" /></a><figcaption id="caption-attachment-2658" class="wp-caption-text">Enable Telnet and SSH on Cisco Router</figcaption></figure>
<p><strong>1.</strong> Open the router R1 console line and create domain and username.</p>
<pre class="toolbar:2 lang:default decode:true">R1(config)#ip domain-name Technig.com
R1(config)#username Shais Password Pass123
R1(config)#</pre>
<p>Then &#8220;<strong>IP domain-name</strong>&#8221; command creates a domain and named Technig.com.</p>
<p>The &#8220;<strong>username Shais Password Pass123</strong>&#8221; command just create a username &#8220;<strong>Shais</strong>&#8221; with &#8220;<strong>Pass123</strong>&#8221; password.</p>
<p><strong>2.</strong> If you don, just follow and generate the encryption keys for securing the ssh session.</p>
<pre class="toolbar:2 lang:default decode:true">R1(config)#crypto key generate rsa 
The name for the keys will be: R1.Technig.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024
% Generating 1024&amp;nbsp;bit RSA keys, keys will be non-exportable...[OK]

R1(config)#</pre>
<p>Type &#8220;<strong>crypto key generate rsa</strong>&#8221; command and press enter when asking you &#8220;<strong>How many bits in the modulus [512]:</strong>&#8221; just type &#8220;<strong>1024&#8243;</strong> and press enter. The system will generate <strong>1024</strong> bits keys to secure session lines. You can choose modules in the range of 360 to 2048.</p>
<p><strong>3.</strong> Now enable SSH version 2, set timeout duration and login attempt time on the router. Remember this message if you going to use ssh version 2 &#8220;<strong>Please create RSA keys (of at least 768 bits size) to enable SSH v2.</strong>&#8221;</p>
<pre class="toolbar:2 lang:default decode:true">R1(config)#ip ssh version 2
R1(config)#ip ssh time-out 50
R1(config)#ip ssh authentication-retries 4</pre>
<p><strong>4.</strong> Enable vty lines and configure access protocols.</p>
<pre class="toolbar:2 lang:default decode:true">R1(config)#line vty 0
R1(config-line)#transport input ssh 
R1(config-line)#password Pass123
R1(config-line)#login&amp;nbsp;
R1(config-line)#logging synchronous 
R1(config-line)#motd-banner 
R1(config-line)#exit
R1(config)#</pre>
<p>The configuration is the same as telnet, just the<strong> transport input ssh </strong>command<b> </b>change the line to<b> Secure Shell. </b>The configuration has completed, next, you must test ssh from a client PC.</p>
<h3>Testing SSH Connectivity</h3>
<p>From a client PC, open the command line and type &#8220;<strong>ssh -l Shais 192.168.10.1</strong>&#8221; then press enter.</p>
<pre class="toolbar:2 lang:default decode:true ">Packet Tracer PC Command Line 1.0
PC&gt;ssh -l Shais 192.168.10.1
Open
Password:

R1&gt;enable 
Password: 
R1#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#</pre>
<p>Here, I have connected successfully and the connection is secured with Secure Shell.</p>
<p>Hope you understand the configuration of enabling Telnet and SSH on Cisco router and switches. Now you should be able to simply enable Telnet and SSH on your routers and switches.</p>
<p>The post <a href="https://www.technig.com/enable-telnet-and-ssh-on-cisco-router/">How to Enable Telnet and SSH on Cisco Router and Switches?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/enable-telnet-and-ssh-on-cisco-router/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2656</post-id>	</item>
		<item>
		<title>How to Configure OSPF Routing Protocol Using Packet Tracer?</title>
		<link>https://www.technig.com/configure-ospf-routing-protocol/</link>
					<comments>https://www.technig.com/configure-ospf-routing-protocol/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Sat, 25 Apr 2015 14:51:30 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Lab]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[OSPF Routing]]></category>
		<category><![CDATA[OSPF Routing Configuration]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=2427</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure OSPF Routing Packet Tracer - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Step by step guide to configure OSPF routing protocol on Cisco router in a real network environment. </p>
<p>The post <a href="https://www.technig.com/configure-ospf-routing-protocol/">How to Configure OSPF Routing Protocol Using Packet Tracer?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure OSPF Routing Packet Tracer - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Another post related to CCNA Certification and this time learn how to configure <a href="https://en.wikipedia.org/wiki/Open_Shortest_Path_First" target="_blank" rel="noopener noreferrer">OSPF</a> routing? The configuration of the OSPF routing protocol is easy as <a href="https://www.technig.com/configure-routing-information-protocol/" target="_blank" rel="noopener noreferrer">RIP Routing</a>. The Open Shortest Path First (OSPF) is a routing protocol for wide area networks and enterprise network. OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks. The IS-IS is another link-state dynamic routing protocol, which is more common in large service provider networks. The most widely used exterior gateway protocol is the Border Gateway Protocol (BGP), the principal routing protocol between autonomous systems on the Internet.</p>
<h3><span style="text-transform: initial;">OSPF Routing Lab Configuration</span></h3>
<p>Download the lab from this post or create your own OSPF Routing Lab and try to learn OSPF Routing configuration using this step by step guide.</p>
<h3><strong style="color: #4a4a4a; font-size: 15px; text-transform: initial;">Router 1:</strong><span style="color: #4a4a4a; font-size: 15px; text-transform: initial;"> Do the basic configuration of your routers, switches and computers. Set the IP address for each interface the same as a screenshot. The diagram is classless IP addresses and sub-netted to many networks. So it means you must familiar with IP sub-netting and VLSM.</span></h3>
<figure id="attachment_2441" aria-describedby="caption-attachment-2441" style="width: 840px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig.jpg"><img loading="lazy" decoding="async" class="wp-image-2441 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig.jpg" alt="Configure OSPF Routing Packet Tracer - Technig" width="840" height="420" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></a><figcaption id="caption-attachment-2441" class="wp-caption-text">Configure OSPF Routing Packet Tracer &#8211; Technig</figcaption></figure>
<pre class="toolbar:2 lang:default decode:true">R1&gt;enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface serial 1/3
R1(config-if)#ip address 20.10.10.1 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#
R1(config)#interface serial 1/1
R1(config-if)#ip address 10.10.10.1 255.255.255.252
R1(config-if)#clock rate 64000
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#
R1(config)#interface serial 1/0
R1(config-if)#ip address 10.10.10.5 255.255.255.252
R1(config-if)#clock rate 64000
R1(config-if)#no shutdown</pre>
<p><strong>Router 2:</strong> Do the following configuration for Router 2.</p>
<figure id="attachment_2433" aria-describedby="caption-attachment-2433" style="width: 229px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing.jpg"><img loading="lazy" decoding="async" class="wp-image-2433 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing.jpg" alt="Configure OSPF Routing" width="229" height="208" /></a><figcaption id="caption-attachment-2433" class="wp-caption-text">Configure OSPF Routing</figcaption></figure>
<pre class="toolbar:2 lang:default decode:true">R2(config)#interface serial 1/0
R2(config-if)#ip address 10.10.10.6 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface fastEthernet 0/0
R2(config-if)#ip address 192.168.10.1 255.255.255.0
R2(config-if)#no shutdown</pre>
<p><strong>Router 3:</strong> Now try to set IP address for Router 3 interfaces also.</p>
<figure id="attachment_2431" aria-describedby="caption-attachment-2431" style="width: 231px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Router-Commands.jpg"><img loading="lazy" decoding="async" class="wp-image-2431 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Router-Commands.jpg" alt="Router Commands" width="231" height="184" /></a><figcaption id="caption-attachment-2431" class="wp-caption-text">Router Commands</figcaption></figure>
<pre class="toolbar:2 lang:default decode:true">Router#enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R3
R3(config)#interface serial 1/0
R3(config-if)#ip address 10.10.10.2 255.255.255.252
R3(config-if)#no shutdown
R3(config-if)#exit
R3(config)#interface fastEthernet 0/0
R3(config-if)#ip address 192.168.1.1 255.255.255.0
R3(config-if)#no shutdown</pre>
<p>Good, the basic configuration has competed and now start configure OSPF routing protocol on this network.</p>
<h3>How to Configure OSPF Routing Protocol?</h3>
<p>The Lab is ready for routing, download and configures<a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Protocol-Technig.zip" target="_blank" rel="noopener noreferrer"> OSPF routing</a> with the following step by step guide. In router, <strong>R1</strong> configure OSFP routing with <strong>Router OSPF</strong> command.</p>
<figure id="attachment_2439" aria-describedby="caption-attachment-2439" style="width: 435px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-R1.jpg"><img loading="lazy" decoding="async" class="wp-image-2439 size-full" src="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-R1.jpg" alt="Configure OSPF Routing R1" width="435" height="235" srcset="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-R1.jpg 435w, https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-R1-300x162.jpg 300w" sizes="(max-width: 435px) 100vw, 435px" /></a><figcaption id="caption-attachment-2439" class="wp-caption-text">Configure OSPF Routing R1</figcaption></figure>
<pre class="toolbar:2 lang:default decode:true">R1&gt;enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#router ospf 1
R1(config-router)#network 20.10.10.0 0.0.0.3 area 0
R1(config-router)#network 10.10.10.0 0.0.0.3 area 0
R1(config-router)#network 10.10.10.4 0.0.0.3 area 0
R1(config-router)#</pre>
<p>The <span style="color: #339966;"><strong>router OSPF</strong></span> command enables OSPF routing on the router, and the <strong>1 </strong>before<strong> OSFP</strong> is the process ID of the OSFP Protocol. You can set different process id from &#8220;<strong>1-65535</strong>&#8221; for each router.</p>
<p>The <strong>network</strong> command with network ID &#8220;<strong>network 20.10.10.0</strong>&#8221; is the network identifier, and the &#8220;<strong> 0.0.0.3&#8243;</strong> is the wildcard mask of <strong>20.10.10.0</strong> network. Wildcard mask determines which interfaces to advertise because OSPF advertises interfaces, not networks.</p>
<p>Now go to Router R3 and configure with the following commands.</p>
<pre class="toolbar:2 lang:default decode:true">R3&gt;enable
R3#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#router ospf 1
R3(config-router)#network 192.168.1.0 0.0.0.255 area 0
R3(config-router)#network 10.10.10.0 0.0.0.3 area 0</pre>
<p>Don? So do the following for router R2.</p>
<pre class="toolbar:2 lang:default decode:true">R2&gt;enable
R2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#router ospf 1
R2(config-router)#network 192.168.10.0 0.0.0.255 area 0
R2(config-router)#network 10.10.10.4 0.0.0.3 area 0</pre>
<p>OK, OSPF routing configuration has been finished successfully, now test your network whether they can ping with each other or not. In my Lab they work perfect, you can download and see the result. Configure<a href="https://www.technig.com/wp-content/uploads/2015/04/Configure-OSPF-Routing-Protocol-Complete.zip"> OSPF Routing Protocol</a> &#8211; Complete Lab.</p>
<p><strong>Related Search: </strong></p>
<p>OSPF configuration step by step.<br />
how to configure OSPF between two routers.<br />
how to configure OSPF on Cisco router packet tracer.<br />
OSPF configuration in packet tracer.<br />
OSPF basic configuration.<br />
simple OSPF configuration example.<br />
OSPF routing protocol configuration pdf.<br />
how to configure the router in packet tracer.<br />
how to configure OSPF step by step.</p>
<p>The post <a href="https://www.technig.com/configure-ospf-routing-protocol/">How to Configure OSPF Routing Protocol Using Packet Tracer?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-ospf-routing-protocol/feed/</wfw:commentRss>
			<slash:comments>10</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2427</post-id>	</item>
		<item>
		<title>Configure Standard Access List On Cisco Router</title>
		<link>https://www.technig.com/configure-standard-access-list/</link>
					<comments>https://www.technig.com/configure-standard-access-list/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Thu, 26 Feb 2015 17:33:03 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[CCNA]]></category>
		<category><![CDATA[CCNA Lab]]></category>
		<category><![CDATA[CCNA Packet Tracer Lab]]></category>
		<category><![CDATA[Cisco Packet Tracer]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Standard Access List]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=1494</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/02/Configure-Standard-Access-List-On-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Standard Access List On Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/02/Configure-Standard-Access-List-On-Cisco-Router-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2015/02/Configure-Standard-Access-List-On-Cisco-Router-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/02/Configure-Standard-Access-List-On-Cisco-Router-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Cisco access-list examples, extended access list example, access list Cisco tutorial, ACL configuration in packet tracer, apply access list to interface, IP access-list extended example</p>
<p>The post <a href="https://www.technig.com/configure-standard-access-list/">Configure Standard Access List On Cisco Router</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/02/Configure-Standard-Access-List-On-Cisco-Router-Technig.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Configure Standard Access List On Cisco Router - Technig" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/02/Configure-Standard-Access-List-On-Cisco-Router-Technig.jpg 840w, https://www.technig.com/wp-content/uploads/2015/02/Configure-Standard-Access-List-On-Cisco-Router-Technig-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/02/Configure-Standard-Access-List-On-Cisco-Router-Technig-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Here we configure standard access list on Cisco router devices. The Standard Access List (<a href="http://en.wikipedia.org/wiki/Access_control_list" target="_blank" rel="noopener noreferrer">ACL</a>) on Cisco router works to permit or deny the entire network protocols of a host from being distinguishing. These decisions are all based on source IP address which filters network traffic by examining the source IP address in a packet. We can create the standard IP access list by using the access-list command with numbers 1 to 99 or in the expanded range of 1300 to 1999.</p>
<p>I&#8217;m using Cisco Packet Tracer to do this task. You can create your own network topology within Cisco packet tracer or use the best network simulator <a href="http://gns3.net/" target="_blank" rel="noopener noreferrer">GNS3</a>. If you are new in GNS3, I recommended to read the topics of GNS3 installation &#8220;<a href="https://www.technig.com/install-gns3-network-simulator/" target="_blank" rel="noopener noreferrer">Install GNS3 Network Simulator Step by Step in Windows</a>&#8221; and the configuration article &#8220;<a href="https://www.technig.com/essential-gns3-configuration-for-cisco-training-lab/" target="_blank" rel="noopener noreferrer">Essential GNS3 Configuration for Cisco Lab</a>&#8220;, these will help you to find your way in using GNS3.</p>
<p>Here I share my own created topology for standard IP access list with packet tracer. Download and test it. Download CCNA Lab: Configure <a href="http://3.90.216.52/wp-content/uploads/2015/02/How-to-Configure-Standard-IP-Access-List-on-Cisco-Routers.zip" target="_blank" rel="noopener noreferrer">Standard Access List</a>.</p>
<figure id="attachment_1497" aria-describedby="caption-attachment-1497" style="width: 704px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/02/CCNA-Lab-Standard-Access-List.jpg"><img loading="lazy" decoding="async" class="wp-image-1497 size-full" src="http://3.90.216.52/wp-content/uploads/2015/02/CCNA-Lab-Standard-Access-List.jpg" alt="CCNA Lab - Configure Standard Access List" width="704" height="421" srcset="https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Standard-Access-List.jpg 704w, https://www.technig.com/wp-content/uploads/2015/02/CCNA-Lab-Standard-Access-List-300x179.jpg 300w" sizes="(max-width: 704px) 100vw, 704px" /></a><figcaption id="caption-attachment-1497" class="wp-caption-text">CCNA Lab &#8211; Configure Standard Access List</figcaption></figure>
<p>Try to configure it with any routing protocol you want. Static route, RIP, or OSPF. This article &#8220;<a href="https://www.technig.com/ccna-configure-static-routing-in-cisco-packet-tracer/" target="_blank" rel="noopener noreferrer">Configure Static Routing in Packet Tracer</a>&#8221; can help you to configure static routing for <a href="http://www.cisco.com/web/learning/certifications/associate/ccna/index.html" target="_blank" rel="noopener noreferrer">CCNA</a>.</p>
<h3>Configure Standard Access List on Cisco Router</h3>
<p>Let&#8217;s test the standard access list on our network with preventing access from subnet 192.168.10.0 to network 192.168.0.0 which connected directory to router <strong>R1 </strong>and just allow PC2 can get access to the network 192.168.0.0/24.</p>
<figure id="attachment_1499" aria-describedby="caption-attachment-1499" style="width: 607px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/02/Standard-Access-List.jpg"><img loading="lazy" decoding="async" class="wp-image-1499 size-full" src="http://3.90.216.52/wp-content/uploads/2015/02/Standard-Access-List.jpg" alt="Configure Standard Access List on Cisco Router and Switch - Technig" width="607" height="429" srcset="https://www.technig.com/wp-content/uploads/2015/02/Standard-Access-List.jpg 607w, https://www.technig.com/wp-content/uploads/2015/02/Standard-Access-List-300x212.jpg 300w" sizes="(max-width: 607px) 100vw, 607px" /></a><figcaption id="caption-attachment-1499" class="wp-caption-text">Configure Standard Access List on Cisco Router and Switch &#8211; Technig</figcaption></figure>
<p>In the router R1, create an access list &#8220;<strong>access-list 10 permit 192.168.10.3 0.0.0.0</strong>&#8221; and then set it on the FastEthernet 0/0 which is the gateway to the network.</p>
<pre class="toolbar:2 lang:default decode:true">R1&gt;enable 
R1#configure terminal 
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#access-list 10 permit 192.168.10.3 0.0.0.0
R1(config)#interface FastEthernet 0/0
R1(config-if)#ip access-group 10 out
R1(config-if)#exit</pre>
<p>The command &#8221; <strong>access-list 10 permit 192.168.10.3 0.0.0.0</strong>&#8221; deny all host on the network <strong>192.168.10.0</strong> but permit only PC3. We use the wildcard <strong>0.0.0.0</strong> for PC3. It&#8217;s only allowed the exact host with <strong>192.168.10.3</strong> IP address.</p>
<p>The command &#8220;<strong>IP access-group 10 out</strong>&#8221; just apply this outbound traffic to this network.</p>
<p>Remember, we set the <strong>access list</strong> command on the global configuration and set the<strong> IP access-gorup</strong> to the interface configuration.</p>
<p>Now test the with ping from <strong>PC3</strong> to any host on the network <strong>192.168.0.0/24</strong>. It must ping successfully but not allowed for other PCs of the network <strong>192.168.10.0/24</strong>.</p>
<p>You can configure it with the following configuration also.</p>
<pre class="toolbar:2 lang:default decode:true">R1&gt;enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#access-list 10 deny 192.168.10.3 0.0.0.0
R1(config)#access-list 10 permit any
R1(config)#interface FastEthernet 0/0
R1(config-if)#ip access-group 10 out</pre>
<p>Working with Standard access list on Cisco router is easy and simple. Just try to do some more practice to get expert. If you want to know and test more access-list commands, simply type a question mark (?) in front of your command.</p>
<pre class="toolbar:2 lang:default decode:true ">R2(config)#access-list ?
&lt;1-99&gt; IP standard access list
&lt;100-199&gt; IP extended access list
R2(config)#access-list 10 ?
deny Specify packets to reject
permit Specify packets to forward
remark Access list entry comment
R2(config)#access-list 10 permit ?
A.B.C.D Address to match
any Any source host
host A single host address
R2(config)#access-list 10 permit any ?
&lt;cr&gt;</pre>
<p>Hope it would be helping you to understand the Standard IP access list on Cisco routers.</p>
<p>The post <a href="https://www.technig.com/configure-standard-access-list/">Configure Standard Access List On Cisco Router</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/configure-standard-access-list/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1494</post-id>	</item>
	</channel>
</rss>
