Packet Tracer - Explore Network Protocols (Answers Version)
Packet Tracer - Explore Network Protocols (Answers Version)
Addressing Table
Device Interface IPv4 Address Subnet Mask Default Gateway
Objectives
Part 1: Configure DNS
Part 3: Configure NTP
Part 5: Use SNMP
Background / Scenario
Many services run on networks behind the scene to make things happen reliably and efficiently. As a developer,
you should understand what services are available and how they can help you. You should also understand the
basics of how the most useful and popular services are configured. In Packet Tracer, these services
are simulated and the configuration is simple and straightforward. However, Packet Tracer does a very good job at
simulating the actual traffic. As you work through this lab and send traffic, we encourage you to switch to
Simulation mode to explore the contents of the various types of packets that the network is generating.
Note: Packet Tracer does not grade everything you do in this activity. However, you should be able to verify your
configurations by following the steps. At the end of the activity, your completion percentage should be 100%.
Note: In this activity, the two web servers are referred to as DEVASC Server and Example Server. In the topology,
they are named with their URL: www.devasc-netacad.pka and www.example.com.
Instructions
Part 1: Configure DNS
All of the hosts on a network are assigned an IP address. The IP address can be an IPv4 address, and IPv6 address,
or both. This includes all of the hosts on the internet too. But you do not use their IP address to communicate with
them. You use common names such as cisco.com. Domain Name System (DNS) is the service that automatically
translates the common, easy to remember names into IP addresses so that communication can take place
between devices. In this Packet Tracer activity, the devices are using IPv4 addresses.
Click DNS.
Now that DNS has been enabled, you will need to provide the information for all of the hosts on the network(s) to
which you would like to translate their name to an IPv4 address.
In the Name box, type www.example.com.
The IPv4 address of the server is 64.100.0.10. In the Address box, type the IPv4 address.
Click Add.
You will now see an entry that shows the hostname and IPv4 address of the Example Server. This is where DNS will
look for the hostname and return the IPv4 address of that host to any device that requests it.
Click Config.
Now when PC-A uses common hostnames, it will send out a DNS request for the IPv4 address of the host with that
name.
Ping www.example.com. The ping may not work the first time, or even the second, as the network converges. But
by your third attempt, it should succeed. Notice that the very first line of the output shows that PC-A is using the
right IPv4 address for the Example Server.
C:\> ping www.example.com
<output omitted>
C:\> ping www.example.com
C:\>
Note: There is a known issue with Packet Tracer’s implementation of the FIREWALL. You will not be able to access
the web servers from PC-A. However, PC-A will be able to send and receive email through the Example Server later
in the activity.
Click PC-B.
Click Config.
Ping www.example.com. The ping may take a few seconds, but it should be successful.
Ping www.devasc-netacad.pka. The ping may not work the first time, or even the second, as the network
converges. But by your third attempt, it should succeed.
Enter www.example.com in the URL field and click Go. You should now see the Example.com web page displayed
in the Web Browser.
Enter www.devasc-netacad.pka in the URL field and click Go. You should now see the DEVASC server web page
displayed in the Web Browser.
Another great feature abut DHCP is that it automatically sets not only the IPv4 address for a host, but also the
subnet, default gateway, and DNS server address. This makes it very easy for multiple pieces of information to be
configured on hosts automatically.
Click DHCP.
You will now define a pool of IPv4 addresses that you wish to assign to hosts. You will use IPv4 addresses in the
192.168.1.0 subnet. You cannot use the address of 192.168.1.1 because it is already in use by
the FIREWALL interface. You also cannot use the Corporate server address of 192.168.1.3. In addition, it is a good
practice to leave some addresses free for statically assigning to servers or other devices where you want their
address to remain the same.
For Default Gateway, enter the IPv4 address of the INSIDE interface of the FIREWALL: 192.168.1.1.
This will provide each DHCP host an address to use to send DNS messages.
For Maximum number of users, enter 245, the remaining amount after setting 10 aside.
Click IP Configuration.
Click DCHP.
This may take a little time, but you should be supplied with an IPv4 address from the router outside of the first 10
addresses. You should also see the subnet mask, default gateway, and DNS server all supplied for you
automatically.
Click Services.
Click NTP.
Click CLI.
Press Enter to get a command prompt. The enter privileged EXEC mode with the enable command. Use cisco as the
password.
S2> enable
Password: <cisco>
S2#
Display the current time and date using the show clock detail command. Notice that the time is set by hardware
and is not accurate.
S2#
You can manually configure the time with the clock command. However, a better practice is to use an NTP server.
Enter global configuration mode with the configure terminal command.
S2# configure terminal
S2(config)#
Configure S2 to use the Corporate server as its NTP server. Exit global configuration mode and verify S2 is now
using NTP. Your time and date should now be accurate.
S2(config)# ntp server 192.168.1.3
S2(config)# exit
S2#
Note: It may take some time before the source is updated to NTP. You can click Fast Forward Time (the double
arrow button) to speed up the simulation.
C:\> telnet 192.168.1.4
Trying 192.168.1.4 …Open
S2 denies your request because it is configured for SSH access only. Enter the command ssh and press Enter to see
how to use the command. Note that the option is a lowercase L, not a number 1.
C:\> ssh
C:\>
Password:
S2>
You are now accessing the command line for S2 over a secure connection. Enter global configuration mode with
the enable command to verify you can configure the switch remotely. Use cisco as the password. Then
enter exit to terminate the SSH session.
S2> enable
Password:
S2# exit
C:\>
Cisco devices use community strings to authenticate access to the Management Information Base (MIB). This is
where all of the information about the device is stored. A community string is simply a plaintext password.
Community strings can be either read-only (ro) or read-write (rw). These community strings have been created for
you on R3 so that you can investigate the MIB.
Note: Although SNMP can be programmatically accessed to managed the network, more sophisticated tools are
now available, as you will see in the rest of this course. However, SNMP has a large install base in networks
today and will continue to be a valuable management tool for the foreseeable future.
Click MIB Browser.
Click Advanced.
Click OK.
Expand .mgmt.
Expand .system. You may need to make the window wider at the point. You can also grab the middle bar between
the MIB Tree on the left and the Result Table on the right.
Click .sysName.
Click the GO button.
You will now see the Value of the object is R3. You can look at other objects in the MIB such as the interfaces on
the router.
You will see that two of three interfaces are up. You can now easily query anything about the router.
Part 6: Configure HTTPS
When you connect to a server using HTTP, you connect and assume that it is the correct server. The data
transferred between you and the server is sent in plaintext, so if anyone captured that data, they could read it and
manipulate it. Normally, this isn’t a problem if you are simply browsing the internet. But if you are creating an
account, accessing an account, or providing any personal information, it can be captured and used by someone
else. Secure HTTP (HTTPS) adds a layer of security by encrypting the connection between you and the server. A site
must posses a security certificate from a trusted source, to verify that the site is legitimate. Your browser checks
that the certificate is valid and from a trusted source before connecting you to the site.
Click Desktop.
Click Web Browser.
Enter www.devasc-netacad.pka in the URL box and click Go. You verified access earlier. However, after you
click Go, notice the protocol is HTTP (http://).
Click CLI.
Press Enter.
Enter enable and press Enter.
<output omitted>
<output omitted>
The line with www allows port 80, which is unsecured HTTP traffic. The line with port 443 allows port 443, which is
secured HTTP (HTTPS) traffic.
Remove the access-list statement that allows unsecured HTTP traffic on port 80. Enter the no version of the access-
list statement as shown below. The command will wrap to the next line, but do not press Enter until you have
completed the full command.
FIREWALL# configure terminal
FIREWALL(config)#
Step 3: Configure HTTPS.
Click the DEVASC Server.
Click Services > HTTP. Notice that HTTP is set to On, but HTTPS is Off.
Turn HTTP off and turn HTTPS on. Even though the FIREWALL will no longer allow HTTP access, it is best practice to
also configure the server to only allow HTTPS.
Verify PC-B can no longer access www.devasc-netacad.pka using HTTP. After a few seconds, you should get
a Request Timeout message. Click Fast Forward Time to speed this up.
https://www.devasc-netacad.pka
Click Services.
Click EMAIL.
Turn on both SMTP and POP3 services.
Enter www.example.com in the Domain Name box.
Click Set.
Click Desktop.
Click Email.
Your Name: Student1
Email Address: [email protected]
User Name: Student1
Password: class
Click Save.
Click Compose.
Subject: Email
In the message box, type a message to Student1 such as “How are you?”
Click Send.
Click Receive. This may take a little time and a few tries to complete.
Click Reply.
Click Send.
Click FTP.
In the Username box, type Student.
In the Password box, type class.
Check all of the boxes below these fields to set the user permission to allow write, read, delete, rename, and list.
Click Add.
Note: At this point, your completion percentage should be 100%. If not, click Check Results to see which required
components are not yet completed. The rest of this activity is not graded.
Click Desktop.
Click Command Prompt.
C:\> dir
Directory of C:\
26 bytes 1 File(s)
C:\>
C:\> ftp 192.168.1.3
Trying to connect…192.168.1.3
Connected to 192.168.1.3
Username:
Enter the username and password you configured previously to gain access.
ftp> ?
?
cd
delete
dir
get
help
passive
put
pwd
quit
rename
ftp>
ftp> dir
0 : asa842-k8.bin 5571584
1 : asa923-k8.bin 30468096
2 : c1841-advipservicesk9-mz.124-15.T1.bin 33591768
3 : c1841-ipbase-mz.123-14.T7.bin 13832032
<output omitted>
ftp> put sampleFile.txt
ftp>
Use the dir command again to list the contents of the FTP server again to see the file.
Enter get asa842-k8.bin to retrieve the file from the server. This can take 30 seconds or more to complete as the
file is big. Fast Forward Time does not help.
ftp> get asa842-k8.bin
ftp>
ftp> delete sampleFile.txt
ftp>
Display the contents of the directory on the PC again to see the image file from the FTP server.
In the Instructions window for this activity, your completion percentage should be 100%. If not, click Check
Results to see which required components are not yet completed.