cisco,思科,网络工程师,实验 (300)
- 格式:pdf
- 大小:120.35 KB
- 文档页数:8
大学生网络工程师实习总结(精选5篇)大学生网络工程师实习总结1我实习的单位是学院,这是一所由市教委、(集团)公司与德国基金会合作的一所探索、实践德国“双元制”职业教育模式的全日制中等专业学校。
我在学校里主要是负责校园内网的管理,其涉及到校园网网站的正常登陆和访问,校园内各系部主机是否正常互联,有无被病毒感染、传播。
使得校园网内的计算机能够正常运行,做好校园网的管理和维护工作。
从学生到实习工程师,短短几个月的工作过程使我受益匪浅。
不仅是在专业知识方面,最主要是在为人处事方面。
社会在加速度地发生变化,对人才的要求也越来越高,要用发展的眼光看问题,得不断提高思想认识,完善自己。
作为一名it从业者,所受的社会压力将比其他行业更加沉重,要学会创新求变,以适应社会的需要。
在单位里,小到计算机的组装维修,大到服务器的维护与测试,都需要一个人独立完成。
可以说,近3个月的工作使我成长了不少,从中有不少感悟,下面就是我的一点心得:第一是要真诚:你可以伪装你的面孔你的心,但绝不可以忽略真诚的力量。
第一天去网络中心实习,心里不可避免的有些疑惑:不知道老师怎么样,应该去怎么做啊,要去干些什么呢等等吧!踏进办公室,只见几个陌生的脸孔。
我微笑着和他们打招呼。
从那天起,我养成了一个习惯,每天早上见到他们都要微笑的说声:“老师早”,那是我心底真诚的问候。
我总觉得,经常有一些细微的东西容易被我们忽略,比如轻轻的一声问候,但它却表达了对老师同事对朋友的尊重关心,也让他人感觉到被重视与被关心。
仅仅几天的时间,我就和老师们打成一片,很好的跟他们交流沟通学习,我想,应该是我的真诚,换得了老师的信任。
他们把我当朋友也愿意指导我,愿意分配给我任务。
第二是沟通:要想在短暂的实习时间内,尽可能多的学一些东西,这就需要跟老师有很好的沟通,加深彼此的了解,刚到网络中心,老师并不了解你的工作学习能力,不清楚你会做那些工作,不清楚你想了解的知识,所以跟老师很好的沟通是很必要的。
学生实训(验)报告单课程名称:思科网络基础实训指导教师:***班级名称:2013级计算机网络技术2班学年学期: 2013-2014-1信息科学与工程学院信息科学与工程学院学生实训(验)报告单学号:201315030214 姓名:李涛项目名称Prcket Tracer综合技巧练习- 配置主机和服务实训目的在Packet Tracer 中使用由实际PC、服务器、路由器和交换机组成的标准实验配置来学习网络概念实训内容配置主机和服务;添加、配置并连接主机和服务器;了解DNS 与HTTP 如何协同工作;使用模拟模式查看DNS 和HTTP 生成的数据包详细信息实训步骤任务1:“修复”和测试拓扑在拓扑中加入一台PC,以"1B"(不含引号)作为其显示名称。
使用以下设置进行配置:IP 地址为172.16.1.2,子网掩码为255.255.0.0,默认网关为172.16.255.254,DNS 服务器为192.168.254.254。
将PC 1B 连接到S1-Central 交换机的Fa0/2 端口。
将Eagle Server 连接到R1-ISP 路由器的Fa0/0 端口。
启用HTTP,打开服务器上的Web 服务。
启用DNS 服务,添加一个将""(不含引号)与服务器IP 地址关联的DNS 条目。
任务2:了解DNS 与HTTP 如何协同工作从实时模式切换到模拟模式。
从PC 1B 的桌面打开Web 浏览器。
在地址栏中键入""(不含引号),按Enter,然后用Event List(事件列表)中的Capture / Forward(捕获/转发)按钮捕获DNS 与HTTP 的交互。
播放此动画,检查事件列表中每个事件的数据包内容(PDU Information(PDU 信息)窗口、Inbound PDU Details(入站PDU 详细数据)、Outbound PDU Details(出站PDU 详细数据)),特别是当数据包在PC 1B 或Eagle Server 上时。
网络工程师思科实训报告我于年月日受系部委派参加了为期五天的上海xxXX年度高校网络工程师职业体验竞赛学习。
这次活动的地址位于xx实训基地的江苏xx市,该实训基地由政府和xx一路投资和政府补助。
下面我谈一下参加这次学习进程的几点心得。
一、大赛目的这次竞赛由上海xx计算机科技举行,体验进程分为两个部份:网络职业体验竞赛和赛前免费培训。
举行该活动的目的是以提升大学生职业能力为目标,旨在通过优化整合中外优质教育培训资源,把高新技术培训和职业资格认证相结合,探索培训教育的有效途径,培育符合行业发展和企业需要的人材,增进大学生就业和创业。
xx为中国十大品牌it教育机构和中国it职业行业最具影响力的十大品牌,拥有一流的实训基地、配备超大机房、一流的师资水平的高品质就业技术培训。
在整个活动中,这一点是取得了充分的肯定的。
xx对这次体验赛给予了高度的重视,提供了最好的服务环境和教学师资,使这次体验变得尤其宝贵。
二、学习进程这次活动中前四天为免费实训阶段,最后一天为竞赛单元。
主要学习了思科网络技术(level 1)、微软网络技术(level 1)、网络系统集成项目(level 1)等内容。
整个进程学习强度比较大,内容比较多,属于高度浓缩的精华,通过理论和实验的方式,反复实践,辅导,使参加者不但了解了原理、思路,更让咱们实践操作,强化学习。
应该说,这是一套比较合理的培训模式。
在硬件上,xx的超大机房,为每一个参加者配备了两个路由器,和实验操作电脑。
解决理论和实践脱节的问题。
在师资上,xx提供的都是该行业权威的专业人材,这次为咱们上课的张硕淳老师是中国声誉最高的大师级认证:rhca的13个成员之一,另外,他还同时拥有四个ie。
能让他为咱们上课,是一件超级荣幸的事情。
在整个上课进程中,思维灵敏,节拍轻快,娓娓道来,让人感觉有点神通的感觉。
三、体会意得这次活动对我来讲,必然是收获颇丰的。
一、xx应该是一个可让你真正学到东西的地方。
思科实训路由器操作及配置班级:网络1031姓名:闫晓彤学院:轻工山西轻工职业技术学院2011年6月17日实验 1 简单的路由配置与抓包工具的使用实验目的1 学习使用CISCO仿真软件;2 学习使用路由配置基本命令.实验要求单独配置自己的路由器,完成路由的配置后,各路由器要能够ping通拓扑图中的所有网段。
并且使用抓包工具观察ping的数据流.实验项目性质设备的连通性。
实验设备计算机及CISCO仿真软件。
连接方式IP配置表名称地址网关PC0 172.168.1.12172.168.1.1PC1 172.168.1.22172.168.1.1路由器172.168.1.23172.168.1.1实验步骤1 将路由器、交换机和两台终端设备拖拽出来。
2 连接路由器和交换机,连接交换机和两台终端设备。
3 配置PC0,PC1 的IP地址,4 用抓包软件来看数据流的传输方向是否连通。
5 在PC0上使用PING命令去检测是否和PC1相连通.实验数据及结果数据流:先从PC0发送数据包到交换机,再从交换机将数据包发送到PC1,然后数据包从PC1返回到交换机,交换机将数据包发送到PC0,完成数据流的流通。
实验总结在试验的过程中我学会了用思科仿真软件来使用简单的路由配置和抓包操作。
通过使用PING命令来配置路由器等。
实验二简单的路由配置与抓包工具的使用一:实验目的1 学习使用CISCO仿真软件;2 学习使用路由配置基本命令。
二:实验要求单独配置自己的路由器,PC,完成路由与PC的配置后,各路由器要能够ping通拓扑图中的所有网段。
三:实验项目性质检测设备之间的连通性。
四:实验设备计算机及CISCO仿真软件。
五:连接方式IP配置表名称地址网关PC0 172.16.1.23 172.16.1.1PC1 172.16.1.13 172.16.1.1PC2 172.17.1.23 172.17.1.1PC3 172.17.1.13 172.17.1.1Router0 172.16.1.1 2172.16.1.1Router1 172.17.1.1 172.17.1.1六:实验步骤1 将两台路由器、两台交换机、以及四台PC机拖到思科仿真软件中。
Lab 1.3.3 Determining the Screen Resolution of a ComputerObjectives•Determine the current screen resolution of a PC monitor. •Determine the maximum resolution for the highest color quality. •Calculate the number of pixels needed for resolution settings. • Identify the type of monitor and graphics card installed.Background / PreparationThe resolution of a monitor determines the quality of the screen display. The resolution is determined by the number of horizontal and vertical picture elements (pixels) that are used to produce the image on the monitor. The number of pixels is typically predefined by the manufacturers of graphics cards and PC monitors. The highest number of pixels that a monitor and graphics card can support is referred to as maximum resolution. An example of maximum resolution is 1280 x1024, which means the display is composed of 1280 horizontal pixels and 1024 vertical pixels. The higher the resolution is set, the sharper the display image. The maximum resolution of a PC monitor and the number of colors the monitor can display are determined by two factors:•Capability of the monitor •Capability of the graphics card, especially the amount of onboard memory The following resources are required:• Computer with Windows XP installed Step 1: Determine the current screen resolutiona. To view the current screen resolution and color quality settings, right-click on any empty space on thedesktop and select Properties from the context menu. In the Display Properties window, select the Settings tab.You can also access Display Properties by opening the Control Panel and clicking the Displayicon.CCNA DiscoveryNetworking for Home and Small Businesses v4.0: Personal Computer Hardwareb. Use the Display Properties Settings tab to record the current settings on your PC:The screen resolution is (H by V) ______________________________________________The horizontal resolution is: __________________________________________________The vertical resolution is: ____________________________________________________The color quality value is: ____________________________________________________Step 2: Determine the maximum resolution for the highest color qualityThe slide bar under Screen resolution is used to configure the desired resolution.a. Move the slide bar to see the range of screen resolutions that are available on your PC. (The range isdetermined by the operating system when it identifies the display card and the monitor.)b. Use the Display Properties Settings tab to fill out the following table for the current settings on yourPC:Minimum screen resolutionMaximum screen resolutionAvailable color quality settingsStep 3: Calculate the pixels for current and maximum resolution settingsThe display on the screen consists of rows of pixels. The number of pixels in each row is the horizontal resolution. The number of rows is the vertical resolution. To determine the total number of pixels in a screen resolution, you multiply the horizontal resolution by the vertical resolution. For example, if the currentresolution is 1280 x 1024, the total number of pixels is 1280 times 1024, or 1,310,720.a. Calculate the total number of pixels for the lowest resolution: ___________________________b. Calculate the total number of pixels for the maximum resolution: ________________________ Step 4: Identify the type of graphics card installedYou can get detailed information about the graphics card (also called the display adapter) in the Display Properties screen.a. In the Display Properties screen, click the Advanced button.b. Select the Adapter tab.c. Use the information found in the Adapter tab to complete the following table:Graphics card manufacturer and model(Adapter Type)Graphics memory on card(Memory Size)Step 5: Identify the type of monitor and available refresh ratesYou can get detailed information about the monitor in the Display Properties screen. The screen refresh rate determines the number of times per second the screen is illuminated or redrawn. A refresh rate of 60 hertz means the screen is illuminated 60 times per second. Higher refresh rates provide less screen flicker, which reduces eye strain, but may adversely affect the monitor. You should set the refresh rate to the highest level the monitor can safely support.a. Click on the Monitor tab to see the monitor type and current refresh rate.b. Use the information found in the Monitor tab to complete the following table:Monitor typeSupported refresh ratesc. What can occur if you select a refresh rate that is higher than what the monitor can safely display?____________________________________________________________________________。
CCNA DiscoveryNetworking for Home and Small BusinessesLab 6.2.3 Exploring FTPObjective•Demonstrate how to use FTP from the command prompt and GUI.Background / PreparationFile Transfer Protocol (FTP) is part of the TCP/IP suite. FTP is used to transfer files from one network device to another network device. Windows includes an FTP application that you can execute from the command prompt. There are also many free GUI versions of FTP that you can download. The GUI versions are easier to use than typing from a command prompt.When using FTP, one computer is normally the server and the other computer is the client. When accessing the server from the client, you need to provide a username and password. Some FTP servers have a userID named anonymous. You can access these types of sites by simply typing “anonymous” for the userID, withouta password. Usually, the site administrator has files that can be copied but does not allow files to be postedwith the anonymous userID.If your class does not have an FTP server available, you can download and install a freeware version, such as Home FTP Server or Cerberus FTP server. The FTP Server on a computer running the CCNA Discovery Live CD may also be used. Another computer will act as the FTP client by using FTP from the command line,a web browser, or download a freeware version of an FTP client, such as SmartFTP Client or Core FTP LEclient. Work in teams of two to complete this lab.The following resources are required:•Windows-based computer with an FTP client•FTP server (Existing FTP server, downloaded freeware, or use Live CD)Step 1: Examine FTP from the command prompta. Click the Start button, select Run, type cmd on the command line, and then click OK.to start the FTP application. The prompt changes.b. At the prompt, type ftpc. From the ftp prompt, type ? to see a list of the commands that can be used in this mode.CCNA DiscoveryNetworking for Home and Small Businessesd. List three FTP commands. _______________________________________________________e. At the prompt, type help put to see a short description of the put command.f. What is the purpose of the put command? ___________________________________________g. Use the help command again to get the purpose of the get, send, and recv commands.get __________________________________________________________________________send _________________________________________________________________________recv _________________________________________________________________________NOTE: The original FTP commands were PUT to send a file to an FTP server and GET to downloada file from the FTP server. You also had to select ASCII or binary file mode. If you downloada binary file in ASCII mode it could end up being corrupted. Some of the newer graphicalprograms now use send and receive in their place.h. Partner with another student. Using procedures demonstrated in previous labs, write down the namesand IP addresses of each partner computer. It is very important to get these names correct. SomeFTP applications allow you to use either the IP address or the computer name.Computer 1: __________________________________________________________________Computer 2: __________________________________________________________________ Step 2: Use a GUI FTP client or web browsera. If you are using a web browser as the FTP client, open the web browser and typeftp://ip_address_of_FTP_server. If the FTP server is configured to use an anonymous userID,connect directly to the FTP server. Using the FTP client, download an available file from the server.b. If you are using a GUI FTP client, open the application. For most FTP clients, you must configure anew connection by giving it a name, the IP address of the FTP server, and a username andpassword. You may have to type anonymous if the FTP server allows this type of connection. Someapplications have a checkbox that allows an anonymous login. When you have configured theconnection, connect to the FTP server and download a file.c. What is the name of the file you downloaded from the FTP server? ______________________d. List one example of when FTP might be beneficial to a computer technician. _______________________________________________________________________________________________________________________________________________________________________ Step 3: (Optional) Use both an FTP server and clienta. If you control both the FTP server and client, practice sending files to and getting files from the clientand the server.b. Show your transferred files to another group of students.c. Close the FTP server and client applications.。
CCNA Discovery计算机网络设计和支持实验 9.2.4 制定安装时间表目标•根据维护时段和允许停机时间制定安装时间表。
预期结果和成功标准开始本实验前,请仔细阅读所要执行的任务。
您预计在执行完这些任务后会有什么样的结果?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ 确保客户和用户获悉网络和服务的中断时间为什么是项目实施的重要部分?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________背景/准备工作安装时间表中需要包括维护时段和计划停机时间。
如果每天只有几个小时可用于更改网络,那么项目时间表必须反映此限制。
否则,时间估算就不准确,而项目也可能会延迟。
网络的停机安排需要仔细规划,以免对客户造成严重的业务中断。
在本实验中,您将制定一份维护时间表,包括涉及的设备、所需时间以及对 FilmCompany 日常运营影响最小的维护安排建议。
CCNA DiscoveryIntroducing Routing and Switching in the EnterpriseLab 3.2.3 Building a Switched Network with Redundant LinksSwitch Designation SwitchNameEnableSecretPasswordEnable,Console,and vtyPasswordsVLAN 1IP AddressSubnetMaskDefaultGatewaySwitch 1 SwitchA class cisco 192.168.1.2 255.255.255.0 N/ASwitch 2 SwitchB class cisco 192.168.1.3255.255.255.0N/A Objectives•Create a switched network with redundant links.•Determine which switch is selected to be the root bridge with the factory default settings.•Configure the BID on a switch to control the selection of the root bridge.Background / PreparationThis lab examines the effect that selection of a root bridge has on traffic patterns in a switched network with redundant links. You will configure the network with default factory settings and then reassign the root bridge by changing the bridge priority value. You will observe the spanning tree as the network adjusts to thechanges.The following resources are required:•Two Cisco 2960 switches or other comparable switches•Two Windows-based PCs, one with a terminal emulation program; one as the host, one as the server •At least one RJ-45-to-DB-9 connector console cable to configure the switches•Two straight-through Ethernet cables•Two crossover Ethernet cables•Access to the PC command prompt•Access to PC network TCP/IP configurationNOTE: Make sure that the routers and the switches have been erased and have no startup configurations.Instructions for erasing both switch and router are provided in the Lab Manual, located on AcademyConnection in the Tools section.NOTE: SDM Enabled Routers - If the startup-config is erased in an SDM enabled router, SDM will no longer come up by default when the router is restarted. It will be necessary to build a basic router configuration using IOS commands. The steps provided in this lab use IOS commands and do not require the use of SDM. If you wish to use SDM, refer to the instructions in the Lab Manual, located on the Academy Connection in the Tools section or contact your instructor if necessary.Step 1: Cable the networka. Connect Host 1 to Switch 1 Fast Ethernet port Fa0/7, using a straight-through Ethernet cable.b. Connect Host 2 to Switch 2 Fast Ethernet port Fa0/8, using a straight-through Ethernet cable.c. Connect Switch 1 Fast Ethernet port Fa0/1 to Switch 2 Fast Ethernet port Fa0/1, using a crossoverEthernet cable.d. Create a redundant link between the switches by connecting Switch 1 Fast Ethernet port Fa0/4 toSwitch 2 Fast Ethernet port Fa0/4, using a crossover Ethernet cable.What typically undesirable traffic pattern have you created by using the two crossover cablesbetween the two switches? __________________________________________________Predict: What do you think the switches will do to keep this from becoming a problem?__________________________________________________________________________________________________________________________________________________Step 2: Configure the switchesa. Establish a terminal emulation session to Switch 1 from Host 1.b. Configure the switch hostname, passwords, interface VLAN 1 IP address, and subnet mask onSwitch 1.c. Save the configuration.d. Establish a terminal emulation session to Switch 2 from either Host 1 or Host 2.e. Configure the switch hostname, passwords, interface VLAN 1 IP address, and subnet mask onSwitch 2.f. Save the configuration.Step 3: Configure the hostsa. Configure each host to use an IP address in the same network as the switches.b. Configure each host to use the same subnet mask as the switches.Why is no default gateway specified for this network?_________________________________________Step 4: Verify connectivitya.b. To verify that the network is set up successfully, ping from Host 1 to Host 2.Was the ping successful? _____________If the ping is not successful, verify the connections and configurations again. Check to ensure that all cables are correct and that connections are seated.If the ping is not successful, what utility could you use to determine where the connection is failing?__________________________Step 5: Examine interface VLAN 1 informationa. From the terminal emulation session on either switch, enter the command show interface vlan1? at the privileged EXEC mode prompt.SwitchA#show interface vlan1 ?List some of the options that are available.____________________________________________________________________b. On SwitchA, enter the command show interface vlan1 at the privileged EXEC mode prompt.SwitchA#show interface vlan1What is the MAC address of the switch? ____________________________________What other term for MAC address is used? ________c. On SwitchB, enter the command show interface vlan1 at the privileged EXEC mode prompt.What is the MAC address of the switch? ____________________________________Which switch should be the root of the spanning tree for this network? _____________Step 6: Examine the spanning-tree tables on each switcha. On SwitchA, enter the command show spanning-tree at the privileged EXEC mode prompt.b. On SwitchB, enter the command show spanning-tree at the privileged EXEC mode prompt.c. Examine the outputs and answer the following questions:Which switch is the root bridge? _____________What is the priority of the root bridge? ____________What is the bridge ID of the root bridge? ____________________Which ports are forwarding on the root bridge? _________________________Which ports are blocking on the root bridge? ___________________________What is the priority of the non-root bridge? ____________________________What is the bridge ID of the non-root bridge? _________________________Which ports are forwarding on the non-root bridge? _________________________________Which ports are blocking on the non-root bridge? ___________________________________d. Examine the link lights on both switches.Can you tell which port is in blocking state? ________________________________________Why is there no change in the link lights? __________________________________________Step 7: Reassign the root bridgeWhat would you do if you wanted a different switch to be the root bridge for this network?__________________________________________________________________________________ Why might you want to do this?__________________________________________________________________________________ For the purposes of this lab, assume that the switch that is currently the root bridge is undesirable.The example assumes that SwitchB is preferred as the root switch. To “force” SwitchB to become the new root bridge, you need to configure a new priority for it.a. Go to the console and enter configuration mode on SwitchB.b. Determine the options that can be configured for the Spanning Tree Protocol by issuing thiscommand:SwitchB(config)#spanning-tree ?c. List the options that are available: ____________________________________________________________________________________________________________d. Set the priority of the switch to 4096.SwitchB(config)#spanning-tree vlan 1 priority 4096SwitchB(config)#exitStep 8: Look at the spanning-tree tablea. On SwitchA, enter show spanning-tree at the privileged EXEC mode prompt.b. On SwitchB, enter show spanning-tree at the privileged EXEC mode prompt.c. Examine the outputs and answer the following questions:Which switch is the root bridge? _______________________________________________What is the priority of the root bridge? __________________________________What is the bridge ID of the root bridge? _________________________________________Which ports are forwarding on the root bridge? ____________________________________Which ports are blocking on the root bridge? _________________________________What is the priority of the non-root bridge? ________________________________________What is the bridge ID of the non-root bridge? ______________________________________Which ports are forwarding on the non-root bridge? _________________________________Which ports are blocking on the non-root bridge? __________________________________Step 9: Verify the running configuration file on the root bridgea. On the switch that was changed to be the root bridge, enter the show running-config commandat the privileged EXEC mode prompt.b. Locate the spanning-tree priority information for this switch.c. How can you tell from the information given that this switch is the root bridge?_______________________________________________________________________________ Step 10: ReflectionSuppose that you are adding new switches to a company’s network. Why should you plan the physicaldesign carefully? Why should you be prepared to make adjustments to factory default settings?____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________。
CCNA Discovery 企业中的路由和交换简介实验 8.4.3 在 NAT 环境下配置ACL设备 主机名 FastEthernet 0/0 IP 地址 Serial 0/0/0 IP 地址 Serial 0/0/0接口类型默认网关 使能加密口令 使能口令、VTY 口令和控制台口令 Router 1 R1 192.168.1.1/24 209.165.201.1/30DTE class ciscoRouter 2 R2209.165.201.2/30DCEclass cisco Switch 1 S1 class ciscoHost 1 H1 192.168.1.2/24 192.168.1.1 Host 2H2192.168.1.3/24192.168.1.1目标• 配置 NAT 和PAT 并检验功能。
• 配置 ACL 并将其应用于进行 NAT 的接口。
•观察使用 NAT 时 ACL 的位置有何影响。
背景/准备工作参照图示,搭建一个类似的网络。
可以使用符合拓扑图所示接口要求的任何路由器。
例如,可以使用 800、1600、1700、1800、2500、2600 或 2800 系列路由器或其任意组合。
本实验的说明信息同样适用于 1841 系列路由器,其它路由器也适用;但是命令语法可能会有所差异。
根据路由器的型号,接口可能也不同。
例如,有些路由器上的 Serial 0 可能是 Serial 0/0 或 Serial 0/0/0,而 Ethernet0 可能是 FastEthernet 0/0。
Cisco Catalyst 2960 交换机出厂时已经过预配置,在将其接入网络之前,只需要为它指定基本安全信息即可。
本实验需要以下资源:•一台 Cisco 2960 交换机或其它同类交换机•两台 1841 系列路由器或同类路由器,每台都应具备串行连接和以太网接口•两台基于 Windows 的计算机,两台都装有终端仿真程序,而且两台都设置为主机•至少一根 RJ-45 转 DB-9 连接器控制台电缆,用于配置路由器和交换机•三根直通以太网电缆•一根两段式 (DTE/DCE) 串行电缆注意:确保路由器和交换机已擦除了所有启动配置。
CCNA Discovery家庭和小型企业网络实验 3.3.6 确定计算机的 IP 地址目标•使用ipconfig /all 命令确定以太网络上 Windows XP 主机的 IP 地址。
背景/准备工作每台连接到 Internet 的计算机都有一个唯一的标识符,称为 IP 地址。
IP地址显示为四组二进制八位数,中间用点分隔(例如:192.168.1.4)。
ipconfig /all命令可以显示计算机的 IP 地址和网络相关信息。
本实验需要以下资源:•一个连接到本地网络、已经配置 IP 地址的工作站•使用运行命令在本实验中,您将查找计算机的 IP 地址以确定其唯一的编号。
步骤 1:确定计算机的 IP 地址a. 在 Windows XP 桌面上,依次单击开始和运行。
CCNA Discovery家庭和小型企业网络b. 在“运行”对话框中,键入cmd,然后单击确定按钮。
c. 在命令提示符中键入ipconfig /all,然后按 Enter。
d. ipconfig /all命令将会显示一列有关计算机 IP 配置的信息。
下图所示为一示例,您的计算机将会显示不同的信息。
e. 找到并记录 IP 地址。
IP 地址 _____________________________________f. 为什么计算机获取 IP 地址很重要? ____________________________________________________________________________________________________________________________。
CCNA Discovery计算机网络设计和支持实验 8.2.2 制定 WAN 连通性测试计划目标•制定 WAN 连通性测试计划,通过多次测试确定:•模拟的帧中继连通性•备用的模拟 VPN 链路功能•说明每次测试要包含的必要信息:•测试说明•程序•预期结果和成功标准640-802 CCNA 考试目标本实验包含与下列 CCNA 考试目标相关的技能:•解释网络图。
•确定网络中两台主机之间的路径。
•选择满足网络规格所需的组件。
•选择适当的介质、电缆、端口和连接器,将交换机连接到其它网络设备和主机。
•使用路由器设置基本参数,包括 CLI/SDM。
•连接、配置并检验设备接口的操作状态。
•使用 ping、traceroute、Telnet、SSH 或其它实用程序,检验设备配置和网络连通性。
•执行路由配置,并且检验静态或默认路由是否符合特定的路由要求。
•配置、检验 EIGRP 并排查其问题。
•排除路由问题。
•使用show命令和debug命令,检验路由器硬件和软件的工作情况。
•部署基本路由器安全。
•说明连接 WAN 可以使用的不同方法。
•配置并检验基本的 WAN 串行连接。
•配置并检验 Cisco 路由器的帧中继。
•排除 WAN 实施问题。
预期结果和成功标准开始本实验前,请仔细阅读所要执行的任务。
您预计在执行完这些任务后会有什么样的结果?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ 制定测试计划将如何帮助您构思和规划创建实际的网络原型?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ 除了原型测试之外,为什么验证 WAN 设计可能还必须执行试运行测试?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________背景/准备工作在本实验中,您要证明可以通过测试计划来支持实现改进网络可用性的业务目标。
Lab 3.3.6 Determine the IP Address of a ComputerObjective• Use the ipconfig /all command to determine the IP address of a Windows XP host on an Ethernetnetwork.Background / PreparationEvery computer connected to the Internet has a unique identifier, called an IP address. IP addresses are displayed as four numbers, known as octets, separated by periods (example: 192.168.1.4). The ipconfig /all command displays your computer’s IP address and information about the network. The following resources are required:•A workstation that is attached to the local network and that has it’s IP address already configured • Access to the Run commandIn this lab you will locate your computer’s IP address to discover its unique number.Step 1: Determine the IP address of the computera. From the Windows XP desktop, click the Start button, and then click Run.CCNA DiscoveryNetworking for Home and Small BusinessesCCNA DiscoveryNetworking for Home and Small Businessesb. In the Run dialog box, type cmd then click the OK button.c. At the command prompt, type ipconfig /all and press Enter.d. The ipconfig /all command then displays a list of information about your computer’s IP configuration.An example is shown in the following figure. The information displayed for your computer will bedifferent.e. Locate the IP address and record the finding.IP address _____________________________________f. Why is it important that a computer get an IP address? ____________________________________________________________________________________________________________。
cisco课程设计实验报告一、教学目标本课程的教学目标是使学生掌握Cisco网络设备的基本配置和网络故障排除方法,培养学生具备网络工程师的基本技能。
具体目标如下:1.知识目标:学生能理解并描述Cisco设备的基本工作原理和网络架构;掌握IP地址、子网掩码、路由协议等基本网络概念;了解网络设备的安全配置和故障排除方法。
2.技能目标:学生能熟练操作Cisco路由器和交换机,进行基本配置和调试;能够运用网络仿真软件进行网络设计和故障排查;具备简单的网络编程能力。
3.情感态度价值观目标:培养学生对网络技术的兴趣和热情,提高学生解决实际问题的能力,培养学生的团队合作意识和创新精神。
二、教学内容教学内容主要包括Cisco设备的基本原理、配置和管理,网络故障排除和网络安全。
具体安排如下:1.第一章:Cisco设备概述,介绍Cisco路由器和交换机的基本原理和结构。
2.第二章:Cisco设备配置,讲解如何配置IP地址、子网掩码、路由协议等基本网络参数。
3.第三章:网络故障排除,介绍网络故障的常见原因和排除方法。
4.第四章:网络安全,讲解防火墙、VPN等网络安全技术和配置方法。
三、教学方法本课程采用讲授法、讨论法、案例分析法和实验法等多种教学方法。
1.讲授法:用于讲解基本概念和原理,帮助学生建立网络技术的基本框架。
2.讨论法:通过小组讨论,培养学生的思考能力和团队合作意识。
3.案例分析法:分析实际案例,让学生了解网络技术的应用和解决实际问题的方法。
4.实验法:操作Cisco设备,培养学生的动手能力和实际问题解决能力。
四、教学资源教学资源包括教材、参考书、多媒体资料和实验设备。
1.教材:选用《Cisco网络设备配置与故障排除》作为主教材,辅助以相关网络技术手册和在线文档。
2.参考书:推荐《Cisco网络技术内幕》等进阶阅读材料。
3.多媒体资料:制作课件、教学视频和网络仿真实验教程,以便学生复习和自学。
4.实验设备:配备Cisco路由器和交换机,供学生进行实验操作。
CCNA DiscoveryDesigning and Supporting Computer NetworksLab 7.3.5 Testing a Prototype NetworkIP Address PlanDevice Designation Interface IP Address Default GatewayS1 VLAN1172.18.1.11/24172.18.1.1 S2 VLAN1172.18.1.12/24172.18.1.1 S3 VLAN1172.18.1.13/24172.18.1.1R1 – Simulated Internet Router Fa0/0Fa0/1 209.165.200.15/30172.18.4.1/28To the InternetR2 – Simulated Branch Router Fa0/0Fa0/1.1 172.18.4.2/28172.18.1.1/24Default Route:172.18.4.1 to theDevice Designation Interface IP Address Default GatewayFa0/1.10 Fa0/1.20 Fa0/1.30 172.18.10.1/27172.18.20.1/27172.17.0.1/16Internet connection.PC1 – Simulated DatabaseServerFast Ethernet 172.18.10.21/27 172.18.10.1 PC2 – Simulated File Server Fast Ethernet 172.18.20.22/27 172.18.20.1PC3 – Discovery Server Fast Ethernet 172.17.1.1/16VLAN Plan:VLAN Name Switches toConfigureIDs IP Address Range GroupManagement All 1172.18.1.0/24ITManagers Backbone S1 4172.18.4.0/30Routers Database All 10 172.18.10.0/27 Private ServersFileServers All 20172.18.20.0/27Internal-onlyServers WebServers All 30172.17.0.0/16Web-accessibleServers Default VLAN All 99 none Default VLAN forunassigned ports andtrunk linksObjectives•Connect and configure the devices for the prototype FilmCompany server farm.•Verify successful implementation of RSTP, VLAN trunking, and VTP.•Configure routing between VLANs.•Create and apply appropriate ACLs to filter undesirable traffic.•Evaluate network performance based on previously determined checklist criteria.640-802 CCNA Exam ObjectivesThis lab contains skills that relate to the following CCNA exam objectives:•Interpret network diagrams.•Determine the path between two hosts across a network.•Select the components required to meet a network specification.•Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts.•Perform and verify initial switch configuration tasks, including remote access management.•Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), and show and debug commands.•Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q).•Describe how VLANs create logically separate networks and the need for routing between them.•Configure, verify, and troubleshoot VLANs.•Configure, verify, and troubleshoot trunking on Cisco switches.•Configure, verify, and troubleshoot inter-VLAN routing.•Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts.•Access and use the router to set basic parameters, including CLI/SDM.•Connect, configure, and verify operation status of a device interface.•Verify device configuration and network connectivity using ping, traceroute, Telnet, SSH or other utilities.Expected Results and Success CriteriaBefore starting this lab, read through the tasks that you are expected to perform. What do you expect the result of performing these tasks will be?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ Why is connectivity testing performed prior to configuring and applying ACLs, as well as after?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ Background / PreparationIn this lab, you will construct the FilmCompany server farm prototype network and perform the tests described in the Server Farm Test Plan. You will analyze the network performance after applying all the configurations, and will complete the results and conclusions sections of the Test Plan.Task 1: Assemble and connect component devicesStep 1: Review the Topology Diagram and the Equipment section of the test plana. Determine which equipment or suitable substitutes will be required to meet the objectives of the lab.b. Modify the topology diagram as necessary to fit available equipment.Step 2: Review the Installation Checklist provided in lab 7.3.2.Accommodate any equipment limitations with the use of loopback addresses.Task 2: Perform Test 1: Basic Connectivity TestStep 1: Using the Installation Checklist, perform the steps to connect and configure the prototype network to perform Test 1.Installation Steps CompletedTest 1 Requirements:Step 1: Perform basic switch configuration on each of the three switches. Includehostname, passwords, and VLAN1 IP address.Step 2: Connect the cables between switches as shown in the topology diagram.Step 3: Configure VLAN 4 on switch S1. Configure ports Fa0/10 and Fa0/11 for VLAN4.Step 4: Perform basic router configuration on each of the two routers. Includehostnames, passwords, and the backbone link (the 172.18.4.0 network).Step 5: Connect the cables between the two routers and switch S1 as shown in thetopology diagram.Step 6: Perform Test 1 according to the Server Farm Design Test PlanStep 2: Perform the Test 1 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.Task 3: Perform Test 2: VLAN Configuration TestStep 1: Using the Installation Checklist, perform the steps to connect and configure the prototype network to perform Test 2.Test 2 Requirements:Step 1: Create and name VLANs on each switch per the VLAN plan.Step 3: Assign switch ports to VLANs as shown on the topology diagram. Place therest of the ports in the default VLAN, VLAN 99.Step 4: Configure VTP domain. Set switch S1 as the server and the other two switchesas clients. Use Test as the domain name and cisco as the domain password.Step 5: Create trunk ports on the inter-switch links. On switch S1, exclude VLAN 4from the trunk links. Use the switchport trunk allowed vlan remove 4command in interface configuration mode.Step 6: Configure Rapid STP protocol.Step 7: Set switch S1 as the root bridge.Step 8: Perform Test 2 according to the Server Farm Design Test PlanStep 2: Perform the Test 2 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.Task 4: Perform Test 3: VLAN Routing TestStep 1: Using the Installation Checklist, perform the steps to connect and configure the prototype network to perform Test 3.Test 3 Requirements:Step 1: Connect the cable between switch S3 and Router R2 as shown in the topologydiagram.Step 1: Create a trunk port on switch S3 to connect to Router R2 as shown in thetopology diagram.Step 2: Create subinterface configuration on Router R2 Fa0/1 for each of the VLANs onthe trunk link using the 802.1q encapsulation. Do not put an IP address on thesubinterface for VLAN 99.Step 3: Perform Test 3 according to the Server Farm Design Test PlanStep 2: Perform the Test 3 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.Task 5: Perform Test 4: ACL Filtering TestStep 1: Review security goals for the FilmCompany networkExamine the test plan, checklist, and other documentation to determine how ACLs can support the security goals.Step 2: Examine results of connectivity tests to determine targets for the ACLs Decide which devices should be permitted, which protocols should be used, and where ACLs should be placed.Step 3: Create ACLsComplete this chart to record the structure and syntax of the proposed ACLs:Firewall Rule ACL StatementsFirewall Rule ACL StatementsStep 4: Using the Installation Checklist, perform the steps to connect and configure the prototype network to perform Test 4.Test 4 Requirements:Step 1: On router R2, configure ACLs to limit or permit access for testing.Step 2: Apply the access control lists to the appropriate interfaces and subinterfaces topermit or deny the selected traffic.Step 3: Perform Test 4 according to the Server Farm Design Test PlanStep 5: Perform the Test 4 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessaryTask 6 ReflectionExamine the test results and conclusions. How this network would be affected if:1. The number of servers was doubled?______________________________________________________________________________________________________________________________________________________________2. The S2 switch had a system failure?______________________________________________________________________________________________________________________________________________________________3. A new branch office with 25 new hosts was added?______________________________________________________________________________________________________________________________________________________________Now that you have followed the process of prototyping from creating the plan through testing and recording results and conclusions, what are the advantages and disadvantages of using a simulation program, such as Packet Tracer, compared to building the prototype with physical devices?_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________。
CCNA Discovery Introducing Routing and Switching in the EnterpriseLab 3.4.1 Creating VLANs and Assigning PortsDevice Switch 1Host Name Switch 1VLAN 10 Fa0/5 – Fa0/6VLAN 20 Fa0/7 – Fa0/8VLAN 1 All Remaining PortsVLAN 1 IP Address 172.16.1.2/24Objectives• • Configure three VLANs on a switch. Verify connectivity.All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.Page 1 of 4CCNA Discovery Introducing Routing and Switching in the Enterprise Background / PreparationThis lab focuses on the basic VLAN configuration of the Cisco 2960 switch (or similar) using Cisco IOS commands. The information in this lab applies to other switches; however, command syntax may vary. Depending upon the switch model, the interface designations may differ. For example, modular switches have multiple slots; therefore, the Fast Ethernet ports may be Fast Ethernet 0/1 or Fast Ethernet 1/1, depending on the slot and port. The following resources are required: • • • • One Cisco 2960 switch or other comparable switch Three Windows-based PCs with a terminal emulation program One RJ-45-to-DB-9 connector console cable to configure the switch Three straight-through Ethernet cables to connect from the PCs to Switch 1NOTE: Make sure that the switch has been erased and has no startup configurations. Instructions for erasing the switch are provided in the Lab Manual, located on Academy Connection in the Tools section.Step 1: Connect the equipmenta. Connect PC1 to the switch with a console cable. b. Connect PC1 to switch port Fast Ethernet 0/4 with a straight-through Ethernet cable. c. Connect PC2 to switch port Fast Ethernet 0/5 with a straight-through Ethernet cable.d. Connect PC3 to switch port Fast Ethernet 0/7 with a straight-through Ethernet cable.Step 2: Perform basic PC configurationUse this table to configure addressing on the PCs. Computer PC 1 PC 2 PC 3 IP Address 172.16.1.3 172.16.10.3 172.16.20.3 Subnet Mask 255.255.255.0 255.255.255.0 255.255.255.0 Default Gateway 172.16.1.1 172.16.10.1 172.16.20.1Step 3: Configure Switch 1a. Configure Switch 1 with a hostname and console, Telnet, and privileged passwords. b. Configure Switch 1 with the VLAN 1 IP address of 172.16.1.2/24. Switch1(config)#interface vlan1 Switch1(config-if)#ip address 172.16.1.2 255.255.255.0 Switch1(config-if)#no shutdown Switch1(config-if)#exit c. Create VLAN 10, named Faculty, and VLAN 20, named Students. Switch1(config)#vlan 10 Switch1(config-vlan)#name Faculty Switch1(config-vlan)#exit Switch1(config)#vlan 20 Switch1(config-vlan)#name Students Switch1(config-vlan)#exitAll contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.Page 2 of 4CCNA Discovery Introducing Routing and Switching in the Enterprised. Configure Switch 1 with the default gateway address of 172.16.1.1. Switch1(config)#ip default-gateway 172.16.1.1 e. Configure Switch 1 to place interfaces Fa0/5 and Fa0/6 in VLAN 10. Switch1(config)#interface Fa0/5 Switch1(config-if)#switchport mode access Switch1(config-if)#switchport access vlan 10 Switch1(config-if)#interface Fa0/6 Switch1(config-if)#switchport mode access Switch1(config-if)#switchport access vlan 10 Switch1(config-if)#exit f. Configure Switch 1 to place interfaces Fa0/7 and Fa0/8 in VLAN 20. Switch1(config)#interface Fa0/7 Switch1(config-if)#switchport mode access Switch1(config-if)#switchport access vlan 20 Switch1(config-if)#interface Fa0/8 Switch1(config-if)#switchport mode access Switch1(config-if)#switchport access vlan 20 Switch1(config-if)#end Switch1# g. Save the configuration. Switch1#copy running-config startup-config h. By default, there is only a single VLAN for all ports. You cannot rename or delete VLAN 1. Therefore, no further configuration is necessary to assign the rest of the ports to VLAN 1. To prove this, issue the command show vlan brief. Are all other switch ports in VLAN 1? _______ Which switch ports are in VLAN 10? ___________________ Which switch ports are in VLAN 20? ___________________ i. Issue the command show vlan. What difference is noticed between the two commands show vlan brief and show vlan? _____________________________________________________________ _______________________________________________________________________________Step 4: Verify connectivitya. Ping from each PC to Switch1 address of 172.16.1.2. Are PC1 pings successful? __________ Are PC2 pings successful? __________ Are PC3 pings successful? __________ b. Ping from PC1 to PC2 and PC3. Can PC1 ping PC2? _________ Can PC1 ping PC3? _________Step 5: Reflectiona. Why can PC1 ping Switch1 when PC2 and PC3 cannot?All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.Page 3 of 4CCNA Discovery Introducing Routing and Switching in the Enterprise_______________________________________________________________________________ _______________________________________________________________________________ b. The PCs cannot ping each other. Why? _______________________________________________________________________________ _______________________________________________________________________________All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.Page 4 of 4。
思科实验练习题思科实验练习题是网络工程师培训中常见的一种学习方法,通过实际操作和解答问题来提升学员的技能水平。
本文将通过一系列的实验练习题,帮助读者加深对思科网络设备的理解,并提升解决网络问题的能力。
一、实验练习题1:基本配置1. 在思科路由器上配置一个名称为“LabRouter”的主机名。
2. 设置主机名的提示符为“LabRouter>”。
3. 配置控制台口令为“cisco”。
4. 配置虚拟终端口令为“cisco”。
5. 为路由器配置一个管理IP地址为192.168.0.1/24。
6. 启用路由器上的SSH服务,并设置远程管理口令为“cisco”。
二、实验练习题2:静态路由1. 在思科路由器上配置两个接口,分别连接到两个局域网,网络地址分别为192.168.1.0/24和192.168.2.0/24。
2. 配置路由器上的静态路由,将流量从192.168.1.0/24网络发送到192.168.2.0/24网络。
三、实验练习题3:动态路由1. 在思科路由器上启用RIPv2协议,并配置路由器上的网络地址,包括192.168.1.0/24和192.168.2.0/24。
2. 配置路由器上的RIPv2协议,将流量从192.168.1.0/24网络发送到192.168.2.0/24网络。
四、实验练习题4:VLAN1. 在思科交换机上创建两个VLAN,分别为VLAN10和VLAN20。
2. 将端口1-10划分到VLAN10,端口11-20划分到VLAN20。
3. 配置交换机上的端口1为VLAN10的访问端口,端口10为VLAN10的特许端口。
4. 配置交换机上的端口11为VLAN20的访问端口,端口20为VLAN20的特许端口。
五、实验练习题5:STP1. 在思科交换机上启用Spanning Tree Protocol(STP)。
2. 配置交换机上的端口1为根桥接口。
3. 配置交换机上的端口2为备用根桥接口。
Cisco 交换机 / 路由器配置实习指导书修订版( 2005.07 )编写:赵存明陈华程伍端林宛扬一、实验教学的性质与目的本实验课程的性质是: Cisco 路由器交换机是计算机网络技术专业的主干专业课程,课间实习是教学中的实践教学环节。
Cisco 路由器交换机为技术应用性和实践性极强的学科,要求学生在学习本课程时应结合课程要求进行相应的课间实验来领会和掌握课程的基本知识与基本技能,本课程的课间实验学时为 22 学时,约占总学时的 30% 。
本实验课程的目的:在进行理论教学的同时,通过相应内容的实践教学使学生全面系统地领会本课程的基本理论、基本知识,掌握路由器交换机的基本配置技术,即:熟练进行网络环境的组建、路由器的基本配置、交换机的基本配置。
通过理论与实践的紧密结合能使学生更好地学好本课程,为未来走向网络管理工作岗位奠定坚实专业技能基础。
二、实验教学学时的分配:本课程实训共 22 时,其中 2 课时选做,具体安排可参照下表:Cisco 路由器交换机配置实训安排表三、实验的内容与目的实验 1 路由器基本配置现有—台 CISCO 2501 路由器,含有 so , s1 , AuI , Console 和 AuX 等接口,要求完成下列操作与配置:(1) 用一台装有 Windows 98 以上的 PC 实现以控制台的方式连接到路由器(2) 登录路由器,并实现用户 EXEC 模式、特权 EXEC 模式和全局配置模式之间的转换指导:路由器默认模式是用户 EXEC 模式;在用户 EXEC 模式下,输入 enable 命令进入特权 EXEC 模式;在特权 EXEC 模式下,用 config t 命令进入全局配置模式; Ctrl+Z 或exit 返回。
(3) 使用 IOS 的 CLI 提供的上下文帮助:指导:在路由器提示符下只输入一个“?”,可以显示当前模式下所有可用的命令及对应命令的注释。
.显示用户模式下的所有命令。
CCNA Discovery 企业中的路由和交换简介实验 4.3.3.3计算总结路由目标• 计算每台路由器的总结路由。
•计算出总的总结路由,这样 RouterA 就可以发一个较小的路由表给 ISP 。
设备Fa0/0网络及子网掩码 Fa0/1网络及子网掩码 Serial 0/0/0 网络及子网掩码 Serial 0/0/1 网络及子网掩码 Serial 0/1/0 网络及子网掩码RouterA 192.168.1.128/26 不适用 192.168.1.4/30 192.168.1.8/30 209.165.200.224/30RouterB 192.168.1.32/27 不适用 192.168.1.4/30 不适用 不适用 RouterC 192.168.1.64/27 192.168.1.96/27192.168.1.8/30不适用不适用CCNA Discovery企业中的路由和交换简介背景/准备工作利用拓扑图中提供的信息计算每台路由器的总结路由。
首先从 RouterC 开始,因为它有两个 FastEthernet 网络,而 RouterB 只有一个。
完成 RouterB 的表之后,计算 RouterC 的总结路由(此路由器只通告一条路由)。
接下来,计算 RouterA 的总结路由。
该路由器会总结自己的 FastEthernet 0/0 接口上的网络、所连接的串行网络以及来自 RouterB 和 RouterC 的总结路由。
步骤 1:完成 RouterC 的路由总结表RouterC二进制格式的网络号十进制格式的网络号Fa0/0Fa0/1总结路由步骤 2:完成 RouterB 的路由总结表RouterB二进制格式的网络号十进制格式的网络号Fa0/0Fa0/1 不适用不适用总结路由步骤 3:完成 RouterA 的路由总结表RouterA二进制格式的网络号十进制格式的网络号Fa0/0Fa0/1 不适用不适用Serial 0/0/0Serial 0/0/1来自 RouterC 的总结路由来自 RouterB 的总结路由总结路由。
实验报告实验题目Serv-U的安装和基本设置实验目的1、通过使用Serv-U软件,建立自己的FTP服务器。
2、熟练使用DOS命令。
数据包检测ping命令,数据包路径显示tracert命令,以及arp地址解析命令。
进一步理解因特网协议,了解其实际应用。
实验内容 1 安装serv-u软件。
执行程序文件“setup.exe”,即可开始安装;全部选默认选项即可。
点击“完成”。
2,使用向导设置相关内容。
“开始→程序→Serv-U FTP Server”。
建立一个可用的FTP服务器。
3随着安装向导按以下步骤来进行操作⑴IP address(IP地址):输入“192.168.9.9”。
⑵Domain name(域名):输入“E604”。
⑶Install as system server(安装成一个系统服务器吗):选“Yes”。
⑷Allowanonymous access(接受匿名登录吗):此处可根据自己需要选择;比如选“Yes”。
⑸anonymous home directory(匿名主目录):此处可输入(或选择)一个供匿名用户登录的主目录。
⑹Lock anonymous users in to their home directory(将用户锁定在刚才选定的主目录中吗):即是否将上步的主目录设为用户的根目录;一般选“Yes”。
⑺Create named account(建立其他帐号吗):此处询问是否建立普通登录用户帐号;一般选“Yes”。
⑻Account login name(用户登录名):普通用户帐号名,比如输入“北戴河”。
⑼Password(密码):设定用户密码。
⑽Homedirectory(主目录):输入(或选择)此用户的主目录。
⑾Lock anonymous users in to their home directory(将用户锁定在主目录中吗):选“Yes”。
⑿Account admin privilege(帐号管理特权):一般使用它的默认值“No privilege”(普通帐号)。
思科实验报告思科实验报告引言:在当今信息化时代,网络技术的发展已经成为推动社会进步的重要力量。
作为全球领先的网络技术公司,思科(Cisco)一直致力于推动网络技术的创新与应用。
本实验报告旨在通过对思科实验的探索与研究,深入了解思科在网络领域的技术和产品。
一、思科的背景与发展思科成立于1984年,总部位于美国加利福尼亚州圣何塞。
作为全球最大的网络技术公司之一,思科在网络设备、软件和服务领域占据重要地位。
公司的发展历程中,不仅推动了互联网的普及和发展,还为各行各业提供了全面的网络解决方案。
二、思科的技术创新1. 路由器技术思科的路由器技术是其最为知名和核心的创新之一。
路由器作为网络的核心设备,负责将数据包从源地址传输到目标地址。
思科的路由器产品具有高性能、高可靠性和安全性强的特点,能够满足不同规模和需求的网络环境。
2. 交换机技术交换机是构建局域网的重要设备,用于实现局域网内部的数据传输。
思科的交换机产品采用了先进的交换技术,能够提供高速、可靠的数据传输,同时支持灵活的网络管理和安全控制。
3. 无线技术随着移动互联网的普及,无线技术的发展变得越来越重要。
思科在无线技术领域也有着丰富的经验和创新成果。
其无线解决方案可以满足不同场景下的无线通信需求,提供稳定、高速的无线网络连接。
4. 安全技术网络安全是当前互联网发展中的一个重要问题。
思科在网络安全领域拥有丰富的经验和技术实力。
其安全产品和解决方案能够提供全面的网络安全保护,包括防火墙、入侵检测系统、虚拟专用网络等。
三、思科的产品应用思科的产品广泛应用于各个行业和领域,为用户提供了全面的网络解决方案。
以下是一些典型的应用案例:1. 企业网络思科的路由器、交换机和安全产品被广泛应用于企业网络中,为企业提供高效、稳定和安全的网络连接,支持企业的业务发展和运营管理。
2. 云计算和数据中心思科的网络设备和解决方案在云计算和数据中心领域具有重要应用。
通过思科的技术支持,云计算和数据中心能够提供高性能、高可靠性和高安全性的服务。
CCNA Discovery计算机网络设计和支持实验 5.5.3 创建 ACL 以实施防火墙规则集设备接口IP 地址SFC-ASW VLAN110.1.1.253/24SR1 Fa0/1S0/1/010.1.1.254/2410.1.0.1/30Edge2 S0/1/0S0/1/110.1.0.2/3010.3.0.1/30BR4 S0/1/1Fa0/0Fa0/110.3.0.2/30172.17.0.1/1610.3.1.254/24FC-ASW-2 VLAN1172.17.1.25/16 FC-ASW-1 VLAN110.3.1.253/24PC1 —10.1.1.1/24PC2 —10.3.1.1/24Production Server —172.17.1.1/16目标•解释安全策略以定义防火墙规则。
•创建 ACL 语句以实施防火墙规则。
•配置并测试 ACL。
640-802 CCNA 考试目标本实验包含与下列 CCNA 考试目标相关的技能:•说明 ACL 的用途和类型。
•根据网络过滤要求配置并应用 ACL(包括 CLI/SDM)。
•配置并应用 ACL 来限制使用 SDM/CLI 对路由器进行 Telnet 和 SSH 访问。
•在网络环境中验证和监控 ACL。
•排查 ACL 问题。
预期结果和成功标准开始本实验前,请仔细阅读所要执行的任务。
您预计在执行完这些任务后会有什么样的结果?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ 不使用 ACL 保护网络流量有何内在风险?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________可以使用哪几种方法来限制流量传入和传出 LAN 或 WAN?______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________背景/准备工作FilmCompany 为分支机构(例如位于体育馆的分支机构)提供服务。
该分支机构有一些比轻微的安全和性能问题,要求网络设计人员合并多个 ACL 来保护网络。
这些 ACL 必须成为控制流量的简单、有效工具。
根据 FilmCompany 的安全策略,创建防火墙规则集,并且实施命名式扩展 ACL 来实施该规则集。
在 FilmCompany 的安全策略中,有一个章节与远程站点的访问相关。
安全策略的具体内容如下:安全策略从远程地点(包括远程分支机构)访问网络的用户需要对站点网络资源进行以下访问:1. 远程用户必须能够访问 Production Server,以便在网上查看他们的日程安排以及输入新订单。
2. 远程用户必须能够通过 FTP 上传文件到 Production Server 或从中下载文件。
3. 远程用户可以使用 Production Server、通过 IMAP 和 SMTP 协议发送并查收电子邮件。
4. 不允许远程用户访问 Production Server 上的任何其它服务。
5. 不允许流量从总部中的工作站传输到远程员工工作站。
需要在两个站点之间传输的所有文件都必须存储在 Production Server 中,并且通过 FTP 检索。
6. 不允许流量从远程工作站传输到总部的工作站。
7. 不允许 Telnet 流量从远程工作站传输到除本地交换机以外的任何设备。
步骤 1:如拓扑图所示为网络布线注:如果本实验中使用的 PC 还连接到 Academy LAN 或 Internet,请务必记录电缆连接和 TCP/IP 设置,以便实验结束后将其恢复。
a. 根据所给的拓扑图和配置,连接和配置设备。
必须在串行链路间配置路由以建立数据通信。
注:在本实验中,您的指导教师可能会使用同类服务器来代替 Production Server。
b. 在每台路由器上配置 Telnet 访问。
c. 在 Host1、Host2 和 Production Server 之间执行 ping,确保网络连通。
如果 ping 或 Telnet 失败,请排查问题,然后建立连接。
步骤 2:执行基本路由器配置a. 按照以下原则配置网络设备:•在每台设备上配置主机名。
•配置执行模式口令class。
•为控制台连接配置口令cisco。
•为 vty 连接配置口令cisco。
•在所有设备上配置 IP 地址。
•在所有路由器上启用 EIGRP,并且将每台路由器配置为通告连接的所有网络。
•使用ping命令检验 IP 是否完全连通。
b. 通过 telnet 访问所有路由器,确认应用层连通。
步骤 3:创建防火墙规则集和访问列表语句使用 FilmCompany 远程访问的安全策略信息,创建实施该策略所必须采用的防火墙规则。
在记录防火墙规则之后,创建用于实施防火墙规则的访问列表语句。
实施一个规则可能需要多条语句。
下面以一个防火墙规则为例:安全策略 1:远程用户必须能够访问 Production Server,以便在网上查看他们的日程安排以及输入新订单。
防火墙规则:允许 10.1.1.0/24 上的用户访问 Production Server (172.17.1.1) 的 TCP 端口 80。
访问列表语句:permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 eq 80访问列表的位置:路由器 SR1 Fa0/1 的入站方向(请记住,扩展 ACL 应尽可能靠近流量的源)对于下列每一项安全策略:a. 创建一个防火墙规则。
b. 创建一条访问列表语句。
c. 确定访问列表应放到哪个位置来实施防火墙规则。
安全策略 2:远程用户必须能够通过 FTP 上传文件到 Production Server 或从中下载文件。
防火墙规则:______________________________________________________________________________________________________________________________________________________________访问列表语句:______________________________________________________________________________________________________________________________________________________________访问列表的位置:______________________________________________________________________________________________________________________________________________________________ 安全策略 3:远程用户可以使用 Production Server、通过 IMAP 和 SMTP 协议发送并查收电子邮件。
防火墙规则:______________________________________________________________________________________________________________________________________________________________访问列表语句:______________________________________________________________________________________________________________________________________________________________访问列表的位置:_______________________________________________________________________________ _______________________________________________________________________________ 安全策略 4:远程用户不能访问 Production Server 上的任何其它服务。
防火墙规则:_______________________________________________________________________________ _______________________________________________________________________________ 访问列表语句:_______________________________________________________________________________ _______________________________________________________________________________ 访问列表的位置:_______________________________________________________________________________ _______________________________________________________________________________安全策略 5:不允许总部工作站的流量传输到远程员工的工作站。