Lab 130: Configuring Redundancy using HSRP

High availability and redundancy is one of the most important factor to enhance the productivity and reputation of an organization. The redundancy can be applied at the various levels such as Server level, Disk-level, and even the network device-level. In this exercise, we will explain the high availability …

Lab 129: Configuring WAN authentication

There are many ways to interconnect routers. One of the most popular and traditional way to interconnect routers on a WAN network is using the Serial interfaces. A serial cable has two ends: Data Communication Equipment (DCE) and Data Terminal Equipment (DTE). The DCE end is typically located …

Lab 128: Configuring Frame-Relay

Frame-relay is a WAN technology that supports up to 44.3 Mbps of speed. Nowadays it is not so much popular and heavily replaced by the latest technologies such as ATM. We assume that you know the basics of Frame-relay technology and are familiar with the basic components such …

Lab 127: Configuring Static and Dynamic NAT

Network Address Translation (NAT) technique translates private IP addresses into public IP addresses. NAT enhances the security of the network by hiding the actual IP information from the external users. The external users see the translated IP addresses rather than actual IP addresses. This is also called masking. …

Lab 126: Configuring Access Control Lists (ACLs)

Access Control List (ACL) is a security feature that allows you to filter the network traffic based on configured statements. An ACL can be used to filter either inbound or outbound traffic on an interface. Once you applied an access list on a router, the router examine every …

Lab 125: Configuring Spanning-Tree PortFast

We know that Spanning-Tree Protocol (STP) help us to prevent to occur switching loop. However, spanning-tree sometime can also create a problem for your network. For example, suppose you have a server that is connected into your switch. You are sure that there are no chances to occur …

Lab 124: Configuring Spanning-Tree Protocol

Network loop can create a huge problem in a network. Routing protocols such as RIP and IGRP have their own techniques to stop network loops from occurring at the Network layer of the OSI model. Unfortunately they (routing protocols) cannot be used to stop loops from occurring at …

Lab 123: Configuring Port Security

You can control to access your switch port. For example, you can control who can access a specific interface of a switch or how many devices could be connected to a specific switch interface. There is a feature called Switch Port Security that allow you to do so. …

Lab 122: Configuring Etherchannel

Etherchannel is a technique that allows you to combine multiple Ethernet switch ports in to a single logical port. Thus help you to combine bandwidth of all port and provide redundancy in case of a single port failure. This technique is also known as NIC Teaming, Link Aggregation, …

Lab 121: Configuring Inter-VLAN Routing

In the previous exercises, we have covered the basics of VLANs and its configuration. As discussed earlier, VLANs are used to separate network traffic, enhance network security, and divide a large network in to several small networks. We know that systems belong to one VLAN cannot communicate to …

Lab 120: Configuring VLANs

Introduction to VLAN VLANs are used to segment a large physical LAN into multiple small virtual LANs for better management and greater security. VLANs provide a number advantages and features. Some of the key features provided by VLANs are: VLANs allow to add, move, and change networks with …

Lab 119: Enabling Remote Access

A device can be managed either locally or remotely. There are various protocols, tools, and services (such as Telnet, Secure Shell, and Putty) that are used to manager devices remotely. These tools are also referred as remote administration tools. Similar to Cisco routers a Cisco switch can also …

Lab M: Process of Building MAC Address Table

We know that a switch has many advantages over a hub. One of the major reason behind switch’s popularity over hub is its Unicast transmission method. A Switch has ability to transmit a frame only to a device that deserve to receive it. For this, switch uses its …

Lab 118: Configuring DHCP on Cisco Router

DHCP stands for Dynamic Host Configuration Protocol. It is a service which allows you to configure TCP/ IP settings such as IP address and subnet mask on the clients (PC, laptop, printer, etc.) automatically. Typically, DHCP is configured on a dedicated server for better performance. The server can …