0% found this document useful (0 votes)
20 views

2019 Packet Tracer - Part 01

The document provides a comprehensive guide on installing and using Cisco Packet Tracer, including familiarization with its GUI, device interaction, and command line interface (CLI) modes. It details the steps for installation, device access, configuration commands, and security measures such as console and telnet passwords. Additionally, it outlines practical tasks for configuring a simple network and saving changes to memory.

Uploaded by

wabedin470
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

2019 Packet Tracer - Part 01

The document provides a comprehensive guide on installing and using Cisco Packet Tracer, including familiarization with its GUI, device interaction, and command line interface (CLI) modes. It details the steps for installation, device access, configuration commands, and security measures such as console and telnet passwords. Additionally, it outlines practical tasks for configuring a simple network and saving changes to memory.

Uploaded by

wabedin470
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

CISCO PACKET TRACER

PART ONE
Gordon Johnson

[email protected]
Introduction to Packet Tracer

▪ Installation of Cisco Packet Tracer


▪ Familiarize with the GUI
▪ Devices and IOS
▪ CLI Modes
▪ Basic Commands
Installation of Cisco Packet Tracer

▪ Visit URL: https://www.netacad.com/courses/packet-tracer


1. Click the ‘Enroll to download Packet Tracer’ button
Installation of Cisco Packet Tracer

▪ Visit URL: https://www.netacad.com/courses/packet-tracer


2. Click the ‘Sign up today!’ button

Click here
Installation of Cisco Packet Tracer

▪ Visit URL: https://www.netacad.com/courses/packet-tracer


3. Complete form and click Submit

2. Click
Installation of Cisco Packet Tracer

▪ Now go to URL: https://www.netacad.com/portal


4. Login with your new account
3. Download Packet Tracer

Optional Courses
PACKET TRACER GUI
7.1.1 && 7.2.2
Side by Side
Graphical User Interface - GUI

▪ Menu Bar: Open, save, print, change ▪ Common tool bars: Controls for
preferences etc. manipulating topologies, such as select,
move layout, add notes, delete, resize
▪ Main Toolbar: Shortcut icons to menu shape, add PDU
options that are commonly accessed,
e.g. zoom, save, undo, redo etc. ▪ Realtime / Simulation tabs: Toggle
between the real-time and the simulation
▪ Logical / Physical Workspace Tab: time
Allows to toggle between the logical and
the physical work areas ▪ Network Component Box: Contains all
the network and end devices available
▪ Workspace: Where topologies are
created, and simulations are displayed ▪ User Created Packet Box: Create highly
customized packets to test the topology,
while the results are displayed as a list
Networking Devices

▪ Routers

▪ Switches

▪ Wireless
End Devices and Connections

▪ End Devices

▪ Connections
Interacting with devices

Within the workspace area, click on a Router or Switch to access the device:
▪ Physical Tab: This displays the physical configuration of the device as if it were in
use, and by which you can alter the layout of the hardware
▪ Config Tab: While you can make some changes here, your learning process will be
best spent on the third tab
▪ CLI Tab: This screen/window is where you will spend most of your time, specifically
the Command Line Interface or CLI. While some graphical tools exist for
configuration, nearly every Cisco network engineer/technician works directly in the
CLI.
▪ Attributes Tab: Provides specifications of the device e.g. cost, rack units, wattage,
power sources etc.
Device Access - Physical
Device Access – Config (CHEAT?)
Device Access – CLI
IOS (not iOS)

▪ Just as your personal computer uses Microsoft Windows as its operating system,
Cisco routers use an operating system as well. This software is referred to as IOS, or
Internetwork Operating System, and different versions are introduced periodically.
▪ As a technician, you enter a series of configuration commands to tell the router
what to do, and the IOS software then instructs the router to carry out those
commands.
▪ When you first log into a Cisco switch or router, you will notice right away that the
device name is displayed (helpful for knowing which one you are accessing), as well
as a character called a prompt.
▪ The prompt is the clue which helps you identify the mode in which you are in
CLI Modes
CLI Modes
CLI – Executive Mode

▪ The first mode is called user mode, or


exec mode (exec = execution, or able to
enter commands). The associated
prompt is the > symbol.
▪ Exec mode is the lowest possible level in
a Cisco device, and has restrictions in
the commands allowed.
▪ If you use the ? symbol at the command
line, you will see a small list of
diagnostic commands that are available.
▪ You cannot view or make changes to the
configuration of the device from this
mode.
CLI – Privileged Mode

▪ The second mode is called Privileged


mode, and allows the user to do
anything they want with regard to the
device (full privileges).
▪ To access, you simply enter the
command “enable” from the executive
mode.
▪ To go back to Exec mode you can use
the “exit” or the “disable” command.
▪ Note the change in the prompt from the
> symbol to the # symbol.
CLI – Global Configuration Mode

▪ As the name suggests, this is the mode


in which network technicians enter
configuration commands, which are
stored in memory and executed.
▪ To access the configuration mode, type
“configure terminal” or “config t” while
being in the privileged mode.
▪ To go back to Privileged mode you can
use the “exit” or the “disable”
command.
▪ Note the change in the prompt from the
# symbol to (config)#.
Configuration Types

▪ There are two types of configuration commands:

▪ Running-configuration: This is the active configuration running in memory on the device. When the
device is switched off, this configuration is lost unless it is written to memory. To display the (active)
running-configuration, enter the command show running-configuration command (may be
abbreviated to sh run).

▪ Startup-configuration: This is the configuration stored in long-term memory and remains on the
device when powered off. When the device boots up, this configuration is loaded into active memory
and becomes the running configuration. To display the startup-configuration, use the command
show startup-configuration (may be abbreviated sh start).

▪ Remember that these are only available in privileged mode (# prompt).


Change the name of a device - Hostnames

▪ Access a switch or a router by double clicking the image to bring up the three
tabbed device window and then click the CLI tab.
▪ Enter the Global Configuration mode
▪ Configure the hostname of the device
▪ To change the existing name of a device, execute the hostname <NEW NAME>
command.
Console Password

▪ Creating passwords for access to


different levels of a device is a sensible
task.
▪ Effectively prevents anybody from
obtaining access of the device, without
the correct password.
▪ To activate a console password follow
the instructions and input the
commands into the CLI ->
Enable Password or Secret

▪ In production networks allowing access


to the privilege mode would leave critical
devices open, allowing unauthorized
personnel to make changes.
▪ To protect the higher modes use the
enable password or enable secret
commands within the Global
Configuration Mode.
▪ Both these commands accomplish the
same thing, but;

▪ enable secret encrypts the stored password.


▪ enable password stores as plain text.
Telnet Password

▪ Telnet is an application layer protocol


that provides access to a command-line
interface of an operating system on a
remote host.
▪ When we are telnetting, we establish a
connection with a telnet protocol, either
with a client or a programmatic
interface.
▪ The password provides a first level of
security to prevent unauthorized access
Save the Changes to Memory

▪ When you make changes on a Cisco IOS device, you alter the configuration held in
active memory (RAM).
▪ Similar to computers when the device is shut down everything in RAM gets lost.
▪ This is the reason for the two configuration files referred to earlier, the running-
configuration (running in RAM), and startup-configuration (stored in more permanent
memory, called non-volatile RAM or NVRAM).
▪ In order to save the changes that you make to the running-configuration, you need
to copy it to the startup-configuration using the command “copy run start” from the
privilege mode.
Challenge

Lets create a simple network:


▪ Use switch 2960-24TT.
▪ Add two PC End Devices.

On Switch try to:


Useful commands (in no particular order):
▪ Show the running-configuration
▪ enable
▪ Change the hostname ▪ configure terminal
▪ Create the console password
▪ sh run & sh start
▪ hostname NEWNAME
▪ Create the Enable Secret or Password ▪ line console 0
▪ Create the telnet password ▪ line vty 0 15
▪ password ****
Extended:
▪ enable secret ****
▪ Try to Configure IP Address and PING from PC0 to PC1 ▪ copy run start
Configuration Types

▪ There are two types of configuration commands:

▪ Running-configuration: This is the active configuration running in memory on the device. When the
device is switched off, this configuration is lost unless it is written to memory. To display the (active)
running-configuration, enter the command show running-configuration command (may be
abbreviated to sh run).

▪ Startup-configuration: This is the configuration stored in long-term memory and remains on the
device when powered off. When the device boots up, this configuration is loaded into active memory
and becomes the running configuration. To display the startup-configuration, use the command
show startup-configuration (may be abbreviated sh start).

▪ Remember that these are only available in privileged mode (# prompt).


Change the name of a device - Hostnames

▪ Access a switch or a router by double clicking the image to bring up the three
tabbed device window and then click the CLI tab.
▪ Enter the Global Configuration mode
▪ Configure the hostname of the device
▪ To change the existing name of a device, execute the hostname <NEW NAME>
command.
Console Password

▪ Creating passwords for access to


different levels of a device is a sensible
task.
▪ Effectively prevents anybody from
obtaining access of the device, without
the correct password.
▪ To activate a console password follow
the instructions and input the
commands into the CLI ->
Enable Password or Secret

▪ In production networks allowing access


to the privilege mode would leave critical
devices open, allowing unauthorized
personnel to make changes.
▪ To protect the higher modes use the
enable password or enable secret
commands within the Global
Configuration Mode.
▪ Both these commands accomplish the
same thing, but;

▪ enable secret encrypts the stored password.


▪ enable password stores as plain text.
Telnet Password

▪ Telnet is an application layer protocol


that provides access to a command-line
interface of an operating system on a
remote host.
▪ When we are telnetting, we establish a
connection with a telnet protocol, either
with a client or a programmatic
interface.
▪ The password provides a first level of
security to prevent unauthorized access
Save the Changes to Memory

▪ When you make changes on a Cisco IOS device, you alter the configuration held in
active memory (RAM).
▪ Similar to computers when the device is shut down everything in RAM gets lost.
▪ This is the reason for the two configuration files referred to earlier, the running-
configuration (running in RAM), and startup-configuration (stored in more permanent
memory, called non-volatile RAM or NVRAM).
▪ In order to save the changes that you make to the running-configuration, you need
to copy it to the startup-configuration using the command “copy run start” from the
privilege mode.
Assigning IP Address to End Device

1. Select Device
2. Click the Desktop tab
3. Enter desired IP Address
Next Time

▪ Use Telnet to access remotely another device.


▪ Use Secure Shell version 2 protocol which allows encrypted remote access.

You might also like