7.5.2 Packet Tracer – Challenge Wireless WRT300N Answers

7.5.2 Packet Tracer – Challenge Wireless WRT300N Answers

Topology

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 50

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 51

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway
R1 Fa0/1.10 172.17.10.1 255.255.255.0 N/A
Fa0/1.20 172.17.20.1 255.255.255.0 N/A
Fa0/1.88 172.17.88.1 255.255.255.0 N/A
Lo0 10.1.1.1 255.255.255.252 N/A
WRS2 WAN 172.17.88.25 255.255.255.0 172.17.88.1
LAN/Wireless 172.17.40.1 255.255.255.0 N/A
WRS3 WAN 172.17.88.35 255.255.255.0 172.17.88.1
LAN/Wireless 172.17.30.1 255.255.255.0 N/A
PC1 NIC 172.17.10.21 255.255.255.0 172.17.10.1
PC2 NIC 172.17.20.22 255.255.255.0 172.17.20.1

Learning Objectives

Upon completion of this lab, you will be able to:

  • Configure switch port VLAN information and port security
  • Hard reset a Linksys WRT300N router
  • Connect and verify connectivity to a wireless router
  • Navigate to a Linksys WRT300N’s web utility page
  • Configure the IP settings of a Linksys WRT300N
  • Configure DHCP on a Linksys WRT300N
  • Configure static routes on both standard Cisco routers and on a WRT300N
  • Change the network mode and corresponding network channel on a WRT300N
  • Learn how to enable WEP encryption and disable SSID broadcast
  • Enable a wireless MAC filter
  • Configure access restrictions on a WRT300N
  • Configure router management password on a WRT300N
  • Enable logging on a WRT300N
  • Upgrade WRT300N firmware
  • Learn diagnosis, backup, restore, and confirmation mechanisms on a WRT300N

Scenario

In this lab, you will configure a Linksys WRT300N, port security on a Cisco switch, and static routes on multiple devices. Make note of the procedures involved in connecting to a wireless network because some changes involve disconnecting clients, which may then have to reconnect after making changes to the configuration.

Task 1: Perform Basic Router Configurations

Configure R1 according to the following guidelines:

  • Router hostname
  • Disable DNS lookup
  • EXEC mode password
  • Fast Ethernet 0/1 and Fast Ethernet 0/0 and its subinterfaces
  • Loopback0
  • Synchronous logging, exec-timeout, and a login of cisco on the console port
enable
configure terminal
no ip domain-lookup
enable secret cisco
interface FastEthernet0/1.1
 encapsulation dot1 1
 ip address 172.17.1.1 255.255.255.0
!
interface FastEthernet0/1.10
 encapsulation dot1 10
 ip address 172.17.10.1 255.255.255.0
!
interface FastEthernet0/1.20
 encapsulation dot1 20
 ip address 172.17.20.1 255.255.255.0
!
interface FastEthernet0/1.88
 encapsulation dot1 88
 ip address 172.17.88.1 255.255.255.0
!
interface Loopback 0
 ip address 10.1.1.1 255.255.255.252
!
line con 0
 exec-timeout 0 0
 logging synchronous
 password cisco
 login
!

Task 2: Configure Switch Interfaces

Set the switches to transparent, clear the VLAN information, and create VLANs 10, 20, and 88.

<For all three switches>

 !
vtp mode transparent
no vlan 2-1001
vlan 10,20,88
!

Step 1: Configure switch port interfaces on S1, S2, and S3.

Configure the interfaces on the S1, S2, and S3 switches with the connections from topology diagram.

On connections between two switches configure trunks.

On connections to a wireless router configure them as access mode for vlan 88.

Configure S2’s connection to PC1 in vlan 10 and PC2’s connection in vlan 20.

Configure S1’s connection to R1 as a trunk.

Allow all VLANS across trunking interfaces.

S1

!
interface FastEthernet 0/1
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/2
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/3
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/4
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet0/5
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!

S2

!
interface FastEthernet 0/1
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/2
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/3
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/4
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet0/7
 switchport mode access
 switchport access vlan 88
 no shutdown
!

S3

!
interface FastEthernet 0/1
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/2
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/3
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdown
!
interface FastEthernet 0/4
 switchport trunk encapsulation dot1q
 switchport mode trunk
 no shutdwn
!
interface FastEthernet 0/7
 switchport mode access
 switchport access vlan 88
 no shutdown
!
interface FastEthernet 0/11
 switchport mode access
 switchport access vlan 11
 no shutdown
!
interface FastEthernet 0/18
 switchport mode access
 switchport access vlan 20
 no shutdown
!

Step 2: Verify VLANs and trunking.

Use the show ip interface trunk command on S1 and the show vlan command on S2 to verify that the switches are trunking correctly and the proper VLANs exist.

S1#show interface trunk

Port        Mode           Encapsulation  Status        Native vlan
Fa0/1       on             802.1q         trunking      1
Fa0/2       on             802.1q         trunking      1
Fa0/3       on             802.1q         trunking      1
Fa0/4       on             802.1q         trunking      1
Fa0/5       on             802.1q         trunking      1

Port      Vlans allowed on trunk
Fa0/1       1-4094
Fa0/2       1-4094
Fa0/3      1-4094
Fa0/4      1-4094
Fa0/5      1-4094

Port       Vlans allowed and active in management domain
Fa0/1      1,10,20,88
Fa0/2      1,10,20,88
Fa0/3      1,10,20,88
Fa0/4      1,10,20,88
Fa0/5      1,10,20,88

Port       Vlans in spanning tree forwarding state and not pruned

Port       Vlans in spanning tree forwarding state and not pruned
Fa0/1      1,10,20,88
Fa0/2      none         <-- blocked due to spanning tree
Fa0/3      1,10,20,88
Fa0/4      1,10,20,88
Fa0/5      1,10,20,88>

S2#show vlan
VLAN Name                             Status    Ports
---- -------------------------------- --------- -----------------------------
1    default                          active    Fa0/5, Fa0/6, Fa0/8, Fa0/9
                                                Fa0/10, Fa0/12, Fa0/13,Fa0/14
                                                Fa0/15, Fa0/16, Fa0/17,Fa0/19
                                                Fa0/20, Fa0/21, Fa0/22,Fa0/23
                                                Fa0/24, Gi0/1, Gi0/2
10   VLAN0010                         active    Fa0/11
20   VLAN0020                         active    Fa0/18
88   VLAN0088                         active    Fa0/7
1002 fddi-default                     act/unsup
1003 token-ring-default               act/unsup
1004 fddinet-default                  act/unsup
1005 trnet-default                    act/unsup

When you have finished, be sure to save the running configuration to the NVRAM of the router and switches.

Step 3: Configure the Ethernet interfaces of PC1 and PC2.

Configure the Ethernet interfaces of PC1 and PC2 with the IP addresses and default gateways according to the addressing table at the beginning of the lab.

Step 4: Test the PC configuration.

Ping the default gateway from the PC: 172.17.10.1 for PC1, and 172.17.20.1 from PC2.

Go to Start->Run->cmd and type ping 172.17.x.x

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 52

Task 3: Connect to the Linksys WRT300N Router

Check with your instructor that the wireless router has its factory default settings. If it does not, you must hard reset the router. To do so, find the reset button on the back of the router. Using a pen or other thin instrument, hold down the reset button for 5 seconds. The router should now be restored to its factory default settings.

Step 1: Use Windows XP to connect to the wireless router.

Locate the Wireless Network Connection icon in your taskbar, or go to Start > Control Panel > Network Connections. Right-click the icon and select View Available Wireless Networks.

You are prompted with the following display. Note that the factory default SSID of the router is simply “Linksys.”

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 53

Select Linksys and click Connect.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 54

After a period of time you will be connected.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 55

Step 2: Verify connectivity settings.

Verify the connectivity settings by going to Start > Run and typing cmd. At the command prompt, type the command ipconfig to view your network device information. Notice which IP address is the default gateway. This is the default IP address of a Linksys WRT300N.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 56

Task 4: Configure the WRT300N Using the Web Utility

Step 1: Go to the default URL.

In your favorite web browse, navigate to http://192.168.1.1 which is the default URL for the WRT300N.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 57

Step 2: Enter authentication information.

You are prompted for a username and password. Enter the WRT300N factory default password of admin and leave the username field blank.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 58

You should now be viewing the default page of the Linksys WRT300N web utility.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 59

Task 5: Configure IP Settings for the Linksys WRT300N

The best way to understand the following settings is to think of the WRT300N as being similar to a Cisco IOS-based router with two separate interfaces. One of the interfaces, the one configured under Internet Setup, acts as the connection to the switches and the interior of the network. The other interface, configured under Network Setup, acts as the interface connecting to the wireless clients, PC6 and PC3.

Step 1: Set the Internet connection type to static IP.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 60

Step 2: Set the IP address settings for Internet Setup.

  • Set the Internet IP address to 172.17.88.35.
  • Set the subnet mask to 255.255.255.0.
  • Set the default gateway to the Fa 0/1 VLAN 88 IP address of R1, 172.17.88.1.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 61

Step 3: Configure the Network Setup IP address to 172.17.30.1.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 62

Step 4: Save the settings.

Click Save Settings. You are prompted with the following window. Click Continue. If you are not redirected to the new URL of the web utility (http://172.17.30.1), navigate your browser there as you did in Task 4, Step 1.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 63

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 64

Step 5: Verify IP address changes.

Go back to the command prompt and notice the new IP addresses. Use the command ipconfig.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 65

Task 6: Configure DHCP Settings and Router Time Zone Settings

Step 1: Give Pc6 a static DHCP binding.

Click DHCP Reservations and find Pc6 in the list of current DHCP clients. Click Add Clients.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 66

This gives Pc6, the computer with a MAC address of 00:05:4E:49:64:F8, the same IP address, 172.17.30.100, whenever it requests an address through DHCP. This is only an example of a quick way to permanently bind a client to its current DHCP-given IP address. Now, you will assign Pc6 the IP address in the topology diagram, not the one it received initially. Click Remove to assign a new address.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 67

Step 2: Assign Pc6 the 172.17.30.26 address.

By entering the Pc6 address under Manually Adding Client, whenever Pc6 connects to the wireless router, it receives the IP address 172.17.30.26 via DHCP. Save your changes.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 68

Step 3: Verify the static IP address change.

Since we already have an IP address from DHCP we are not going to get the new address, 172.17.30.26, until we reconnect. We will wait and notice that later in Task 6, Step 5 and verify that this change has taken place.

Step 4: Configure the DHCP server.

Set the start address to 50, the maximum number of users to 25, and the lease time to 2 hours (or 120 minutes).

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 69

These settings give any PC that connects to this router wirelessly requesting an IP address through DHCP, an address between 172.17.30.50–74. Only 25 clients at a time are able to get an IP address and can only have the IP address for two hours, after which time they must request a new one.

Note: IP Address Range does not update until you click Save Settings.

Step 5: Configure the router for the appropriate time zone.

At the bottom of the Basic Setup page, change the time zone of the router to reflect your location.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 70

Step 6: Save your settings!

Task 7: Basic Wireless Settings

Step 1: Set the network mode.

The Linksys WRT300N allows you to choose in which network mode to operate. Currently, the most used network mode for clients is Wireless-G and for routers is BG-Mixed. When a router is operating in BG-Mixed, it can accept both B and G clients. However, if a B client connects, the router must scale down to the slower level of B. For this lab, we are assuming all clients are running B only, so choose Wireless-B Only.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 71

Step 2: Configure other settings.

Change the Network Name SSID to WRS3, Standard Channel to 6 – 2.437GHZ, and disable SSID Broadcast.

Why is it good to change the wireless channel to be different from the default channel?
To help prevent interference from other wireless routers

Why is it recommended to disable SSID broadcast?
This allows a measure of security. Someone attempting to connect to the router minimally needs to know the SSID before being able to connect to it.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 72

Step 3: Click Save Settings.

Step 4: Verify that the SSID of the router is no longer being broadcast.

Scan for wireless networks, as done in Task 3, Step 1. Does the SSID of the wireless router appear?
No

Step 5: Reconnect to the wireless network.

Navigate to Start > Control Panel > Network Connections, right-click the Wireless Network Connection icon, and select Properties.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 73

In the Wireless Networks tab, select Add.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 74

In the Association Tab, enter WR33 as the SSID, and set the Data Encryption to Disabled. Select OK, and then select OK again. Windows should now try to reconnect to the wireless router.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 75

Step 6: Verify the settings.

Now that you have reconnected to the network, you have the new DHCP settings that you configured in Task 5, Step 3. Verify this at the command prompt with the ipconfig command.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 76

Task 8: Enable Wireless Security

Step 1: Reconnect to the router setup page (http://172.17.30.1).

Step 2: Navigate to the Wireless page and then select the Wireless Security tab.

Step 3: Under Security Mode, select WEP.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 77

Step 4: Enter a WEP key.

A network is only as secure as its weakest point, and a wireless router is a very convenient place to start if someone wants to damage your network. By not broadcasting the SSID and requiring a WEP key to connect to the router, you are adding a few levels of security.

Unfortunately, there are tools that can discover networks that are not even broadcasting their SSID, and there are even tools that can crack WEP key encryption. A more robust form of wireless security is WPA and WPA-2, which are currently not supported on this router. Wireless MAC filters is more secure but sometimes impractical means of securing your network. It is discussed in the next task.

Add the WEP key 1234567890.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 78

Step 5: Save your settings.

You will become disconnected from the network.

Step 6: Configure Windows to use WEP authentication.

Navigate to the Network Connections page again and right-click the Wireless Network Connection icon. In the Wireless Networks tab, locate the WRS3 network, and click Properties.

  • Set Data Encryption to WEP.
  • Uncheck This Key Is Provided For Me.
  • Enter the network key of 1234567890, as configured before on the router.
  • Click OK and OK.

Windows should now reconnect to the network.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 79

Task 9: Configure a Wireless MAC Filter

Step 1: Add a Mac filter.

  • Navigate back to the web utility page of the router (http://172.17.30.1).
  • Navigate to the Wireless section and then to the Wireless MAC Filter tab.
  • Check Enabled.
  • Select Prevent PCs listed below from accessing the wireless network.
  • Enter the MAC address 00:05:4E:49:64:87.

This prevents any client with the MAC address 00:05:4E:49:64:87 from accessing the wireless network.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 80

Step 2: Click Wireless Client List.

The Wireless Client List shows anyone currently connected to the router via a wireless connection. Also take note of the option Save to MAC filter list. Checking this option automatically adds the MAC address of that client to the list of MAC addresses to prevent or permit access to the wireless network.
What is an extremely robust way of only allowing clients of your choosing to connect to the wireless network?

You could set the Access Restriction to Permit, which only allows MAC addresses listed in the table to connect wirelessly.

Why does this become not feasible in large networks?

You have to manually enter each MAC address.

What is a convenient way of adding MAC addresses if everyone to whom you wanted to allow access was already connected to the wireless network?

You could simply go to the Wireless Client List and check Save to MAC filter list.

Task 10: Setting Access Restrictions

Configure an access restriction that prevents Telnet access Monday through Friday to users getting a DHCP address from the preset pool (172.17.30.50 – 74).

Step 1: Navigate to the Access Restrictions tab.

In the Access Restrictions tab, set the following:

  • Policy Name – No_Telnet
  • Status – Enabled
  • Internet access – Allow
  • Days – Check Monday through Friday
  • Blocked List – Add Telnet

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 81

Step 2: Set the IP address range.

Apply this configuration to anyone that is using a default DHCP address in the range of 172.17.30.50 – 74.

Click the Edit List button at the top of the window and enter the IP address range. Save the settings.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 82

Save the access restriction settings

Task 11: Managing and Securing the Web Utility of the Router

Step 1: Configure web access.

Navigate to the Administration section. Change the router password to cisco.

For Web Utility Access, select both HTTP and HTTPS. Selecting HTTPS access allows a network administrator to manage the router via https://172.17.30.1 with SSL, a more secure form of HTTP. If you choose to do this in the lab, you may have to accept certificates.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 83

For Web Utility Access via Wireless, select Enabled. If you disabled this option, the Web Utility would not be available to clients connected wirelessly. Disabling access is another form of security, because it requires the user to be directly connected to the router before changing settings. However, in this lab scenario, you are configuring the router via wireless access, so disabling access would not be a good idea!

Now back up your configuration by clicking the Backup Configurations button. When prompted, save the file to your desktop.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 84

Step 2: Restore your configuration.

If your settings are accidentally or intentionally changed or erased, you can restore them from a working configuration using the Restore Configurations option located in the Backup and Restore section.

Click the Restore Configuration button now. In the Restore Configurations window, browse to the previously saved configuration file. Click the Start to Restore button. Your previous settings should be successfully restored.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 85

Step 3: Enable logging.

Navigate to the Log tab and enable logging. You are now able to view the log of the router.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 86

Step 4: Save your settings and end your wireless connection to the router.

Step 5: Plug an Ethernet cable into one of the wireless router’s LAN ports and connect to it

Step 6: Navigate to the router’s Web GUI.

Step 7: Navigate to the Administration section

Step 8: Upgrade the firmware.

Go to
http://www.linksys.com/servlet/Satellite?c=L_CASupport_C2&childpagename=US%2FLayout&cid=1166859841746&pagename=Linksys%2FCommon%2FVisitorWrapper&lid=4174637314B274&displaypage=download

Select your router version. Instructions for identifying the version are located on the Linksys website.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 87

Either click Firmware or the save icon. If prompted, save the file to the disk.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 88

Before upgrading, notice the current firmware version in the upper right corner.

Navigate to the Administration section. Click Upgrade Firmware. Browse to the file you just downloaded. Click Start to Upgrade. The upgrade should not be interrupted, so make sure to not power off the device.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 89

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 90

When completed, check the new version of firmware on your device.

Task 12: Creating and Verifying Full Connectivity

Step 1: Filter anonymous Internet requests.

In the Security section, uncheck Filter Anonymous Internet Requests. Disabling this option allows you to ping the WRS3 internal LAN/wireless IP address, 172.17.30.1, from places connected to its WAN port.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 91

Step 2: Disable NAT.

In the Setup section, click the Advanced Routing tab. Disable NAT.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 92

Step 3: Connect to WRS2.

Set the IP address settings for Internet Setup.

  • Set the Internet IP address to 172.17.88.25.
  • Set the subnet mask to 255.255.255.0.

Set the default gateway to the Fa 0/1 VLAN 88 IP address of R1, 172.17.88.1

Configure the Network Setup IP address to 172.17.30.1

Statically bind the MAC address of PC3 to the DHCP address 172.17.40.23 (hint: Task 6, Step 2).

Change the wireless SSID to WRS2 (hint: Task 7, Step 2).

Step 4: Give R1 static routes to the 172.17.30.0 and 172.17.40.0 networks.

R1config)#ip route 172.17.30.0 255.255.255.0 172.17.88.35
R1(config)#ip route 172.17.40.0 255.255.255.0 172.17.88.25

Step 5: Repeat steps 1 and 2 above for WRS2.

Step 6: Verify connectivity.

Verify that R1 has routes to PC3 and PC6 and that it can successfully ping them.

R1#sh ip route
<output deleted>

Gateway of last resort is not set

    172.17.0.0/24 is subnetted, 5 subnets
S      172.17.40.0 [1/0] via 172.17.88.25
S      172.17.30.0 [1/0] via 172.17.88.35
C      172.17.20.0 is directly connected, FastEthernet0/1.20
C      172.17.10.0 is directly connected, FastEthernet0/1.10
C      172.17.88.0 is directly connected, FastEthernet0/1.88
    10.0.0.0/24 is subnetted, 1 subnets
C      10.1.1.0 is directly connected, Loopback0

R1#ping 172.17.30.26

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.30.26, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms

R1#ping 172.17.40.23

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.40.23, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms

Verify that PC3 and PC6 can ping the loopback of R1.

Verify that PC3 and PC6 can ping each other.

Verify that PC3 and PC6 can ping PC1 and PC2.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 93

Task 13: Configuring Routing Efficiency

Step 1: Use Traceroute to view the network connection.

Because R1 is the default gateway, the Linksys router goes to R1 to get to a network it does not know how to get to, including the clients of the other Linksys routers.

A packet from PC3 to PC6 first reaches its default gateway of 172.17.40.1, then it is sent out the WRS2 WAN interface of 172.17.88.25 toward the WRS2 default gateway (172.17.88.1). From there, R1 send the packet to the WRS3 WAN interface, 172.17.88.35, where WRS3 handles it.

You can verify this in the Diagnostics tab in the Administration section. In the Traceroute Test field, enter the IP address of PC6 to PC6, 172.17.30.26

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 94

Now click Start to Traceroute, a pop-up will appear.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 95

If WRS2 knew that it could get to the 172.17.30.0 network from 172.17.88.35 it would just directly send it to that IP address. So lets tell it!

Step 2: Configure a new route.

In the Setup section, click the Advanced Routing tab. For Static Routing, enter the following settings:

  • In the Route Name field, enter To WRS2 Clients.
  • For Destination LAN IP, enter the network behind WRS2: 172.17.40.0
  • Enter a subnet mask of /24
  • Enter a gateway of 172.17.88.35
  • Set the interface to Internet (WAN)

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 96

Step 3: Verify the new route.

In the Diagnostics tab in the Administration section, re-enter the IP address of PC3 in the Traceroute Test field. Click Start to Traceroute to see the route.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 97

Notice WRS2 goes straight to WRS3 and saves us the extra hop to R1!

Do the same thing on WRS3 for the 172.17.40.0/24 network, pointing towards WRS2’s WAN interface, 172.17.88.25.

7.5.2 Packet Tracer - Challenge Wireless WRT300N Answers 98

Task 14: Configuring Port Security

Step 1: Configure PC1 port security.

Log on to switch S2. Configure the PC1 switch port 11, enable port security, and enable dynamic sticky MAC addresses.

Step 2: Configure PC2 port security.

Repeat Step 1 for switch port 18.

S2

!
interface FastEthernet 0/11
 switchport mode access
 switchport access vlan 10
 switchport port-security
 switchport port-security mac-address sticky
 no shutdown
!
!
interface FastEthernet 0/18
 switchport mode access
 switchport access vlan 20
 switchport port-security
 switchport port-security mac-address sticky
 no shutdown
!

Step 3: Generate traffic across the ports by pinging PC2 from PC1.

Step 4: Verify port security.

S1#show port-security address
          Secure Mac Address Table
------------------------------------------------------------------------
Vlan    Mac Address       Type               Ports         Remaining Age
                                                              (mins)
----    -----------       ----               -----         -------------
  10    0006.5b1e.33fa    SecureSticky       Fa0/11              -
  20    0001.4ac2.22ca    SecureSticky       Fa0/18              -
------------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 6272

S1#sh port-security int fa 0/11
Port Security              : Enabled
Port Status                : Secure-up
Violation Mode             : Shutdown
Aging Time                 : 0 mins
Aging Type                 : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses      : 1
Total MAC Addresses        : 1
Configured MAC Addresses   : 0
Sticky MAC Addresses       : 1
Last Source Address:Vlan   : 0006.5b1e.33fa:10
Security Violation Count   : 0

Appendix

Configurations

Hostname R1

!
enable secret class
!
no ip domain lookup
!
interface Loopback0
 ip address 10.1.1.1 255.255.255.0
!
interface FastEthernet0/1
 no shutdown
!
interface FastEthernet0/1.10
 encapsulation dot1Q 10
 ip address 172.17.10.1 255.255.255.0
!
interface FastEthernet0/1.20
 encapsulation dot1Q 20
 ip address 172.17.20.1 255.255.255.0
!
interface FastEthernet0/1.88
 encapsulation dot1Q 88
 ip address 172.17.88.1 255.255.255.0
!
!
ip route 172.17.30.0 255.255.255.0 172.17.88.35
ip route 172.17.40.0 255.255.255.0 172.17.88.25
!
!
!
!
line con 0
 exec-timeout 0 0
 logging synchronous
 password cisco
line aux 0
line vty 0 4
!
!
end

Hostname S1

!
!
vtp mode transparent
!
!
vlan 10,20,88
!
!
interface FastEthernet0/1
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/2
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/3
 switchport trunk encapsulation dot1q
switchport mode trunk
!
interface FastEthernet0/4
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/5
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
line con 0
 exec-timeout 0 0
 logging synchronous
!
end

Hostname S2

!
!
vtp mode transparent
!
vlan 10,20,88
!
!
interface FastEthernet0/1
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/2
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/3
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/4
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/7
 switchport mode access
 switchport access vlan 88
!
!
! PC1 and PC2’s MAC address will appear after ‘sticky’ on ports 11
! and 18 respectively, after traffic traverses them
!
!
interface FastEthernet0/11
 switchport access vlan 10
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky
 switchport port-security mac-address sticky ffff.ffff.ffff
!
interface FastEthernet0/18
 switchport access vlan 20
 switchport mode access
 switchport port-security
 switchport port-security mac-address sticky
 switchport port-security mac-address sticky ffff.ffff.ffff
!
line con 0
 exec-timeout 0 0
 logging synchronous
!
end

Hostname S3

!
vtp mode transparent
!
vlan 10,20,88
!
interface FastEthernet0/1
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/2
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/3
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/4
 switchport trunk encapsulation dot1q
 switchport mode trunk
!
interface FastEthernet0/7
 switchport mode access
 switchport access vlan 88
!
!
line con 0
 exec-timeout 0 0
 logging synchronous
!
!
end

Download Packet Tracer (.pka) file:

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x