LAB
Network Documentation
2
Introduction
In this lab, you will learn how to use various tools and techniques to determine and document IP network design. You will use the Windows Command Prompt to generate network traffic; Wireshark to capture and analyze the generated traffic; PuTTY to remotely access the Cisco Switch; and finally, you will issue IOS commands on the Cisco Switch to understand its various interfaces and inner workings.
Learning Objectives
Upon completing this lab, you will be able to:
• Develop a plan for identifying and documenting the logical IP network design and IP addressing schema based on data collected from Lab #1
• Use PuTTY to establish Telnet and SSH to the IP addresses of the identified
…show more content…
You will use this information to complete the deliverables for this lab.
FIGURE 2.3
Windows Command
Prompt window
7. Repeat step 6 for the following IP addresses to create a packet stream for Wireshark.
• 172.30.0.2
• 172.16.8.1
• 172.17.0.2
• 172.16.0.2
• 172.19.0.1
• 172.19.0.2 8. Minimize the Windows Command Prompt window. 9. Double-click the PuTTY icon on the desktop to start the PuTTY application.
Note:
The next steps use PuTTY, a terminal emulator program that you can use as a client to create a variety of secure connections to network resources. This lab uses it to create Telnet and SSH sessions.
Hands-On Steps
21
10. In the PuTTY application window, type the IP address for LAN Switch 1, 172.16.8.5. Select the Telnet
radio button and click the Open button to start the connection.
FIGURE 2.4
PuTTY application window 2
a. Username: cisco
b. Password: cisco
FIGURE 2.5
PuTTY terminal console window Network Documentation
11. PuTTY will launch a terminal console window. At the login prompt, type the following:
22
LAB #2 | Network Documentation
Note:
The next steps involve using the Cisco IOS show command to obtain network documentation information from the interface you’ve connected to (LAN Switch 1). Cisco IOS is a package of routing, switching, and networking commands integrated with a Cisco-specific operating system, of which the show command
* Perform a vulnerability assessment scan on the targeted IP subnet to discover what the weakest link in the system.
* Run a Flow Analysis to update the topology. Open the Visual CLI on the ISP router and ping all of the Servers and Host PCs including the Attack PC Use the IP addresses indicated on the network topology page. Select the commands you entered in the Virtual CLI using the mouse and click on the Copy button. Use <Ctrl>V to paste the commands and output results into your Lab Document.
When the open button is pressed, a command-line interface will be displayed; which ends the GUI interface of PuTTY. From there you’re able to setup iptables, install various packages and change the root password.
Step 1: Construct a network diagram for the project. (NOTE: EF for activity H should be 19)
Hint: Read and study the explanations within the lab for assistance. (2 points)The other method was through telnet. A command using transport input telnet ssh forces admins to SSH into the device.
Your report should include a list of equipment that you have determined will support the network requirements as well as a logical diagram showing how the devices are interconnected. Your diagrams can be created with Microsoft’s Visio design package or a similar product.
LAN: Local Area Network is a network that consists the local resources. A group of PCs in an IT company are said to be in LAN, A group of devices connected to wireless network in home are said to be in LAN.
Assign the first IP addresses in the networks that are provided in the Addressing Table to the LAN interfaces.
RakNet is a flexible networking engine that treats the users time as precious, keeping ‘bookkeeping’ to a minimum, such as storing connected IP’s, storing a GUID for connected users, pings, dropouts. This frees development time to work on the project. Alongside the minimal approach for users, the engine is well documented with explanations and examples of how to set up certain situations a user may need. This includes plugins designed alongside the general development of RakNet, to give them a superior level of function then something that people may make to work alongside RakNet.
The latest Cisco IOS innovation of NetFlow of version 9 is flexible and extensible method to record network performance data. A comprehensive solution for NetFlow-based, planning, monitoring and billing can provides to customers.
Due to its flexibility and modular nature, NS2 has gained constant popularity in the networking research community since its birth in 1989. Ever since, several revolutions and revisions have marked the growing maturity of the tool, thanks to substantial contributions from the players in the field. Among these are the University of California and Cornell University who developed the REAL network simulator, the foundation which NS is based on. Since 1995 the Defense Advanced Research Projects Agency (DARPA) supported development of NS through the Virtual Inter Network Test (VINT) project. Currently the National Science Foundation (NSF) has joined the ride in development. Last but not the least, the group of researchers and developers in the community are constantly working to keep NS2 strong and
Wirshark is a network packet analyzer with many applications including network troubleshooting, analysis and software development. Wireshark can be used from within its graphical user interface (GUI) or from a command line, and is available on most operating systems.
The basic fundamental objective of this lab was to set up a basic network which includes a Linux server and a Pfsense router. The basics were implemented so that the following labs can build off of the original architecture in order for there to be a base topology to work off of. First a router was installed with Pfsense and both is NIC’s were configured. One NIC was configured to connect to the local area network and the other was configured to connect to RIT’s servers in order to connect the virtual network to the World Wide Web, and act as a relay for the Linux server. The Linux server was configured to run the desktop interface in order for ease of usage, and a wiki server was installed and so was monitoring software
The following case study is used to illustrate the process and documentation required for a network design. This case study presents a scenario in which the XYZ Research Company has hired a Network Consultant Group to design their network. In order to help you organize this project, the scenario has been broken into eight phases listing requirements for each phase. A worksheet is to be completed for each part. A formal report, similar to what would be given to the company, will need to be created after all tasks have been completed.
The enable secret password allows you to enter enable mode (sometimes referred to as privileged mode or privileged-EXEC mode). To set a secret password: