Instructor DevNet Associate Packet Tracer Activity
Instructor DevNet Associate Packet Tracer Activity
Addressing Table
Device Interface IPv4 Address Subnet Mask Default Gateway
Note: You will add PC-A and PC-B to the topology in Step 1.
Objectives
Part 1: Add PCs to the Topology
Part 2: Test Connectivity Across the Network
Part 3: Create a Web Page and View it
Part 4: Examine the FIREWALL Access Lists
Background / Scenario
Packet Tracer is a great tool for building and testing networks and network equipment. As a developer, it is
important that you are familiar with network devices and how they communicate with each other. The simple
network in this Packet Tracer activity is pre-configured to give you an opportunity to explore the devices.
Note: In this activity, the two web servers are referred to as DEVASC Server and Example Server. In the
topology, they are named with their URL: www.devasc-netacad.pka and www.example.com.
Instructions
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Packet Tracer - Explore a Simple Network
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Packet Tracer - Explore a Simple Network
Host 192.168.2.3 is the internal IPv4 address of the DEVASC server in the DMZ.
• The first access-list statement allows any device to access to the server using Internet Control
Message Protocol (ICMP), which is the protocol used by the ping command.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Packet Tracer - Explore a Simple Network
• The second access-list statement allows any device to access the server using Hypertext Transfer
Protocol (HTTP), which is the protocol used by web browsers.
i. If necessary, press the space bar until you are at the command prompt.
FIREWALL#
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com
PT 5.5.7
Addressing Table
Device Interface IPv4 Address Subnet Mask Default Gateway
Objectives
Part 1: Configure DNS
Part 2: Configure DHCP
Part 3: Configure NTP
Part 4: Use SSH to Configure a Switch
Part 5: Use SNMP
Part 6: Configure HTTPS
Part 7: Configure EMAIL
Part 8: Configure FTP
Background / Scenario
Many services run on networks behind the scene to make things happen reliably and efficiently. As a
developer, you should understand what services are available and how they can help you. You should also
understand the basics of how the most useful and popular services are configured. In Packet Tracer, these
services are simulated and the configuration is simple and straightforward. However, Packet Tracer does a
very good job at simulating the actual traffic. As you work through this lab and send traffic, we encourage you
to switch to Simulation mode to explore the contents of the various types of packets that the network is
generating.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
Note: Packet Tracer does not grade everything you do in this activity. However, you should be able to verify
your configurations by following the steps. At the end of the activity, your completion percentage should be
100%.
Note: In this activity, the two web servers are referred to as DEVASC Server and Example Server. In the
topology, they are named with their URL: www.devasc-netacad.pka and www.example.com.
Instructions
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
C:\>
Note: There is a known issue with Packet Tracer’s implementation of the FIREWALL. You will not be able
to access the web servers from PC-A. However, PC-A will be able to send and receive email through the
Example Server later in the activity.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
You will now define a pool of IPv4 addresses that you wish to assign to hosts. You will use IPv4
addresses in the 192.168.1.0 subnet. You cannot use the address of 192.168.1.1 because it is already in
use by the FIREWALL interface. You also cannot use the Corporate server address of 192.168.1.3. In
addition, it is a good practice to leave some addresses free for statically assigning to servers or other
devices where you want their address to remain the same.
d. The Pool Name is currently serverPool. Do not change it.
e. For Default Gateway, enter the IPv4 address of the INSIDE interface of the FIREWALL: 192.168.1.1.
This will provide each DHCP host a route to other networks.
f. For DNS Server, enter the IPv4 address of the Corporate server: 192.168.1.3.
This will provide each DHCP host an address to use to send DNS messages.
g. For Start IP Address, use 192.168.1.10.
This provides for a few statically-assigned devices on the network in the future.
h. For Subnet Mask, use 255.255.255.0.
i. For Maximum number of users, enter 245, the remaining amount after setting 10 aside.
j. Click Save to overwrite the default serverPool name.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
S2> enable
Password: <cisco>
S2#
d. Display the current time and date using the show clock detail command. Notice that the time is set by
hardware and is not accurate.
S2# show clock detail
*0:3:44.318 UTC Mon Mar 1 1993
Time source is hardware calendar
S2#
e. You can manually configure the time with the clock command. However, a better practice is to use an
NTP server. Enter global configuration mode with the configure terminal command.
S2# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
S2(config)#
f. Configure S2 to use the Corporate server as its NTP server. Exit global configuration mode and verify S2
is now using NTP. Your time and date should now be accurate.
S2(config)# ntp server 192.168.1.3
S2(config)# exit
S2# show clock detail
14:1:26.216 UTC Thu May 21 2020
Time source is NTP
S2#
Note: It may take some time before the source is updated to NTP. You can click Fast Forward Time (the
double arrow button) to speed up the simulation.
d. S2 denies your request because it is configured for SSH access only. Enter the command ssh and press
Enter to see how to use the command. Note that the option is a lowercase L, not a number 1.
C:\> ssh
Packet Tracer PC SSH
C:\>
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
Password:
S2>
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
The line with www allows port 80, which is unsecured HTTP traffic. The line with port 443 allows port 443,
which is secured HTTP (HTTPS) traffic.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
g. Remove the access-list statement that allows unsecured HTTP traffic on port 80. Enter the no version of
the access-list statement as shown below. The command will wrap to the next line, but do not press Enter
until you have completed the full command.
FIREWALL# configure terminal
FIREWALL(config)# no access-list OUTSIDE-DMZ extended permit tcp any host
192.168.2.3 eq www
FIREWALL(config)#
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 9 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
f. Enter the username and password you configured previously to gain access.
g. Enter? and press Enter to see the commands available in the ftp client.
ftp> ?
?
cd
delete
dir
get
help
passive
put
pwd
quit
rename
ftp>
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 10 of 11 www.netacad.com
Packet Tracer - Explore Network Protocols
ftp> dir
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 11 of 11 www.netacad.com
PT 5.6.6
Addressing Table
Device Interface IPv4 Address Subnet Mask Default Gateway
Objectives
Part 1: Test connectivity
Part 2: Troubleshoot R3
Part 3: Troubleshoot R1
Part 4: Troubleshoot DNS
Background / Scenario
Networks have a lot of components working together to ensure connectivity and data delivery. Often, these
components may not work properly. This may be due to a simple device misconfiguration, or many, seemingly
unrelated problems that must be systematically resolved. As a developer, you may need to troubleshoot
network issues to regain connectivity. To troubleshoot network issues, it is necessary to take a step-by-step
methodical approach, using clues to determine the problem and implement a solution. You may often find
more than one problem preventing a connection from working.
Note: In this activity, the two web servers are referred to as DEVASC Server and Example Server. In the
topology, they are named with their URL: www.devasc-netacad.pka and www.example.com.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 6 www.netacad.com
Packet Tracer - Troubleshoot Common Network Problems
Instructions
C:\>
Because there were successful replies, we know that TCP/IP is installed and working correctly. This
means that, most likely, either the Ethernet port on PC-B or S3 is not enabled.
e. Click Config on PC-B.
f. Click FastEthernet0.
g. The Port Status is Off. Click On next to Port Status to enable the interface.
Notice the icons between PC-B and S3 turn green after a few seconds to indicate communication
between the two devices.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 6 www.netacad.com
Packet Tracer - Troubleshoot Common Network Problems
h. Click Desktop.
i. Close the Command Prompt window.
Part 2: Troubleshoot R3
In this Part, you will test connectivity to the next network device, R3, to continue troubleshooting.
C:\>
You know that the IP addressing information on PC-B is correct, that the interface is up, and that the
TCP/IP stack is working properly. There must be something wrong with the default gateway preventing
communication.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 6 www.netacad.com
Packet Tracer - Troubleshoot Common Network Problems
b. Click Config.
c. Click GigabitEthernet0/0/1. This is the interface connected to the 172.16.3.0/24 network.
The interface is up, and there is IP addressing information for it, but it is not correct for the 172.16.3.0
network.
d. Change the IP address for the interface to 172.16.3.1.
C:\>
Great! We now have communication between PC-B and the default gateway.
b. Return to the Web Browser on PC-B and attempt to connect to the www.devasc-netacad.pka web
page on the DEVASC Server again.
It still does not work.
Part 3: Troubleshoot R1
In this Part, you will continue troubleshooting on the next device in the path, R1, because you do not have any
control over the devices in the Internet cloud.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 6 www.netacad.com
Packet Tracer - Troubleshoot Common Network Problems
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 6 www.netacad.com
Packet Tracer - Troubleshoot Common Network Problems
C:\>
This is what you wanted to see. We are getting all the way to the DEVASC Server, and all the way back
using ICMP. This tells you there may be something wrong with the DNS configuration.
The web page does not respond to port 80. In a previous lab, the server was configured to only connect
using secure HTTP (HTTPS). This was to make sure that the FIREWALL does not forwarding traffic on
the unencrypted port 80. You need to use HTTPS to connect to the web page:
https://209.165.200.227
After a few seconds, the web page finally displays!
The most likely problem is the DNS configuration.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 6 www.netacad.com
PT 8.8.2
Addressing Table
Note: All subnet masks are /24 (255.255.255.0).
R1 G0/0/0 192.168.101.1
R1
S0/1/0 192.168.1.2
R2 G0/0/0 192.168.102.1
R2
S0/1/1 192.168.2.2
R3 G0/0/0 10.0.1.1
R3
G0/0/1 10.0.2.1
R3
S0/1/0 192.168.1.1
R3
S0/1/1 192.168.2.1
SWL1 VLAN 1 192.168.101.2
SWL2 VLAN 1 192.168.102.2
SWR1 VLAN 1 10.0.1.2
SWR2 VLAN 1 10.0.1.3
SWR3 VLAN 1 10.0.1.4
SWR4 VLAN 1 10.0.1.5
Admin NIC 10.0.1.129
PC1 NIC 10.0.1.130
PC2 NIC 10.0.2.129
PC3 NIC 10.0.2.130
PC4 NIC 192.168.102.3
Example Server NIC 192.168.101.100
PT-Controller* NIC 192.168.101.254
Objectives
Part 1: Explore the Network Topology
Part 2: Use the CLI to Gather Information
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 7 www.netacad.com
Packet Tracer - Compare CLI and SDN Controller Network Management
Background / Scenario
In this Packet Tracer activity, you will compare the differences between managing a network from the
command line interface (CLI) and using a software-defined networking (SDN) controller to manage the
network.
Instructions
Step 1: From the Admin PC, securely access the SWR3 switch.
a. Click Admin > Desktop > Command Prompt.
b. Enter the command ssh -l cisco 10.0.1.4. The -l option is the letter “L”, not the number one.
c. When prompted, enter cisco123! as the password. You are now logged in to SWR3.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 7 www.netacad.com
Packet Tracer - Compare CLI and SDN Controller Network Management
Step 3: Gather the software information for the rest of the network devices.
a. From the Command Prompt on SWR3, securely access another network device and repeat Step 2
above.
b. Continue documenting the software versions until you have completed all nine network devices: SWL1,
SWL2, SWR1, SWR2, SWR3, SWR4, R1, R2, and R3.
c. Exit out of all of your SSH sessions.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 7 www.netacad.com
Packet Tracer - Compare CLI and SDN Controller Network Management
3) Under External Network Access, click Enable External Access for Network Controller REST
API.
4) Close Preferences and click PT-Controller0 > Config, if necessary.
5) On the left under REAL WORLD, click Controller.
f. The Server Status should now be Stopped. Click Access Enabled to enable it. Server Status changes
to Listening on port 58000. If the port is some other value, change it to 58000. This is the port number in
the Python scripts.
Step 1: Add credentials to access all the network devices in the topology.
a. From the Network Controller GUI, click the menu button to the left of the Cisco logo.
b. Select Provisioning. From here, you can manually add networking devices. However, you will use CDP
to automatically discover devices for you.
c. Click CREDENTIALS and then click + CREDENTIAL to add a New Credential.
d. For Username, enter cisco, and for Password, enter cisco123!. Leave Enable Password blank. For
Description, enter admin credentials, and then click OKAY.
e. The new CLI Credentials are now stored on PT-Controller0 for use in automation tasks.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 7 www.netacad.com
Packet Tracer - Compare CLI and SDN Controller Network Management
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 7 www.netacad.com
Packet Tracer - Compare CLI and SDN Controller Network Management
Step 3: Verify and test the network settings that were pushed to devices.
At the bottom of the NETWORK SETTINGS window, there is the following:
Note: This functionality is only supported on devices running IOS-XE OS and Switch 2960-24TT
This means that, for this version of Packet Tracer, your global settings were only applied to the routers.
a. Click any of the three routers. R1 is shown in the following output.
b. Click CLI.
c. Click inside the window and press Enter to get a command prompt.
d. Enter the privileged EXEC mode and verify the DNS settings.
R1> enable
R1# show run | begin ip domain
ip domain-name example.com
ip name-server 192.168.101.100
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 7 www.netacad.com
Packet Tracer - Compare CLI and SDN Controller Network Management
!
<output omitted>
R1#
e. Enter the following commands to verify the NTP settings. The time on R1 should match your current time.
Packet Tracer may take a little time to propagate NTP messages. You can click the Fast Forward Time
button to speed up the process.
R1# show ntp associations
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 7 www.netacad.com
PT 8.8.3
Addressing Table
Note: All subnet masks are /24 (255.255.255.0).
R1 G0/0/0 192.168.101.1/24
R1
S0/1/0 192.168.1.2
R2 G0/0/0 192.168.102.1
R2
S0/1/1 192.168.2.2
R3 G0/0/0 10.0.1.1
R3
G0/0/1 10.0.2.1
R3
S0/1/0 192.168.1.1
R3
S0/1/1 192.168.2.1
SWL1 VLAN 1 192.168.101.2
SWL2 VLAN 1 192.168.102.2
SWR1 VLAN 1 10.0.1.2
SWR2 VLAN 1 10.0.1.3
SWR3 VLAN 1 10.0.1.4
SWR4 VLAN 1 10.0.1.5
Admin NIC 10.0.1.129
PC1 NIC 10.0.1.130
PC2 NIC 10.0.2.129
PC3 NIC 10.0.2.130
PC4 NIC 192.168.102.3
Example Server NIC 192.168.101.100
PT-Controller NIC 192.168.101.254
Objectives
Part 1: Launch the DEVASC VM
Part 2: Verify External Connectivity to Packet Tracer
Part 3: Request an Authentication Token with Postman
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 8 www.netacad.com
Packet Tracer - Implement REST APIs with an SDN Controller
Background / Scenario
In this Packet Tracer activity, you will use the Packet Tracer Network Controller and associated API
documentation to send REST requests from Postman and from Visual Studio Code (VS Code). Packet Tracer
also supports a Python coding environment. Therefore, in the final Part of this activity, you will send REST
requests from within Packet Tracer.
Required Resources
• 1 PC with operating system of your choice
• Virtual Box or VMWare
• DEVASC Virtual Machine
Instructions
Step 1: If you have not done so already, open the Packet Tracer activity.
a. Within the DEVASC VM, access your course curriculum in the Chromium browser.
b. Navigate to the page for this activity.
c. Download and launch the file Packet Tracer - Implement REST APIs with an SDN Controller.pka
associated with these instructions.
Step 3: Verify you can access Packet Tracer from another program on the DEVASC VM.
Open Chromium and navigate to http://localhost:58000/api/v1/host.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 8 www.netacad.com
Packet Tracer - Implement REST APIs with an SDN Controller
You will get the following response. This step verifies that you can externally access Packet Tracer and PT-
Controller0. Notice that authorization requires a ticket. You will get an authorization token in the next Part.
{
"response": {
"detail": "Security Authentication Failure",
"errorCode": "REST_API_EXTERNAL_ACCESS",
"message": "Ticket-based authorization: empty ticket."
},
"version": "1.0"
} {
Step 1: Investigate the REST API documentation for the Network Controller.
To see the REST API documentation for PT-Controller0, complete the following steps:
a. Click Admin > Desktop > Web Browser.
b. Enter 192.168.101.254.
c. Log in to PT-Controller0 with user cisco and password cisco123!.
d. Click the menu next to the Cisco logo and choose API Docs.
e. You can also access this same documentation from the Help menu. Click Help > Contents.
f. In the navigation pane on the left, scroll down about two-thirds of the way and click Network Controller
API. This provides the same documentation you found on PT-Controller0.
g. In the API documentation, click addTicket. You will use this documentation in the next step.
Note: Some REST API functionality may not be available in the current version of Packet Tracer.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 8 www.netacad.com
Packet Tracer - Implement REST APIs with an SDN Controller
You should get a response similar to the following. However, your_serviceTicket will be an actual value.
{
"response": {
"idleTimeout": 900,
"serviceTicket": "your_serviceTicket",
"sessionTimeout": 3600
},
"version": "1.0"
}
b. Copy the serviceTicket value without the quotes to a text file for later use.
Step 1: Create a new GET request for all network devices in the network.
a. In Postman, click the plus sign to create a new Untitled Request.
b. Enter the URL http://localhost:58000/api/v1/network-device.
c. Below the URL field, click Headers.
d. Under the last KEY, click the Key field and enter X-Auth-Token.
e. In the Value field, enter the value for your service ticket.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 8 www.netacad.com
Packet Tracer - Implement REST APIs with an SDN Controller
"hostname": "SWL1",
"id": "CAT1010BT47-uuid",
"interfaceCount": "29",
"inventoryStatusDetail": "Managed",
"lastUpdateTime": "6",
"lastUpdated": "2020-06-11 22:55:51",
"macAddress": "000C.CF42.2B11",
"managementIpAddress": "192.168.101.2",
"platformId": "3650",
"productId": "3650-24PS",
"reachabilityFailureReason": "",
"reachabilityStatus": "Reachable",
"serialNumber": "CAT1010BT47-",
"softwareVersion": "16.3.2",
"type": "MultiLayerSwitch",
"upTime": "4 hours, 55 minutes, 11 seconds"
},
<output omitted>
],
"version": "1.0"
}
Step 3: Duplicate the GET request and modify it for all hosts on the network.
a. In Postman, right-click the tab for your host GET request and choose Duplicate Tab.
b. All information in the ticket is the same except for the URL. Simply change network-device to host:
http://localhost:58000/api/v1/host.
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 8 www.netacad.com
Packet Tracer - Implement REST APIs with an SDN Controller
],
"version": "1.0"
}
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 8 www.netacad.com
Packet Tracer - Implement REST APIs with an SDN Controller
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 8 www.netacad.com
Packet Tracer - Implement REST APIs with an SDN Controller
f. Copy and paste 02_get-network-device.py into the main.py. Change the URL and run it.
REST APIs (Python) finished running.
Starting REST APIs (Python)...
('Request status: ', 200)
('SWL1', '\t', '3650', '\t', '192.168.101.2')
('R1', '\t', 'ISR4300', '\t', '192.168.1.2')
('R3', '\t', 'ISR4300', '\t', '192.168.2.1')
('SWR1', '\t', '3650', '\t', '10.0.1.2')
('SWR2', '\t', '3650', '\t', '10.0.1.3')
('R2', '\t', 'ISR4300', '\t', '192.168.2.2')
('SWL2', '\t', '3650', '\t', '192.168.102.2')
('SWR4', '\t', '3650', '\t', '10.0.1.5')
('SWR3', '\t', '3650', '\t', '10.0.1.4')
REST APIs (Python) finished running
End of document
2020 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 8 www.netacad.com