ࡱ> @ RIjbjb -$Ccl((((,,,8H< /^B(jjj> ///////,k1 3/,/ ((jj+ (j,j/ @hh((((/ h a R:)J,j*T[ 0.*j*$//L*%4 %4j* Lab 2 - Basic Router Configuration In preparation for this lab review section 7.6 in the text and especially 7.6.1. In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how to connect two networks with routers by setting up static routing tables the firewall functions of a router by setting up access lists You need to turn in: your pre-lab at the beginning of your session your completed Lab 2 handout at the end of your session Each group of 2 students will use the following equipment for this experiment. 2 computers with Microsoft Windows 2000 Professional1 Cisco Systems Catalyst 2900 Series Switch1 Cisco 2621 Router1 rollover cable (null modem)1 DB9m adapter3 Ethernet cables1 Ethernet crossover cableEvery two groups share an additional Ethernet crossover cable Recap & Introduction: In Lab #1, you learned how to construct a TCP/IP network of four hosts via switches by assigning IP addresses and subnet masks to the hosts. You also learned how subnetting affects a network. In this lab, we will be implementing the network topology in  REF _Ref530551524 \h  \* MERGEFORMAT Figure 1 (on the last page of this lab) where two networks in different subnets are physically separated. There is no legend in the figure because you are required to add them in the pre-lab exercise. Our goal is to connect these two networks together. They could be on different floors in the same building. They could be in nearby buildings. Or they could be in different cities. To this end, you will first be introduced to the basics of the Cisco Internetwork Operating System (IOS). You will, then, assign IP addresses to the routers. The router acts as the gateway to its own network. Then, you will use an Ethernet crossover cable to simulate the cloud. Finally, you will set up static routing tables in the gateways and test the connection. Cisco Router Configuration Introduction to Cisco Internetwork Operating System (IOS) Cisco routers are powered by the Cisco IOS which allows the routers to be configured to perform specific tasks. Before you start configuration of a Cisco Router, you must understand the two EXEC modes available on a router: user EXEC mode and privileged EXEC mode. User mode allows you to perform basic trouble shooting tests, telnet to remote hosts, and list router system information. You know that the router is in this mode if the prompt is the router name followed by the greater than sign: RouterName>. Privileged mode, sometimes called enable mode, allows for full router configuration and advanced troubleshooting. RouterName# is an example of the privileged mode prompt. If you log into a router via a console or telnet connection, you enter user mode. To enter privileged mode requires that you issue the enable command. Before you actually configure a Cisco router, you must understand the two main configuration modes: global configuration mode and interface configuration mode. Each of the routers we use has two Ethernet interfaces. Settings made in global configuration mode affect overall router operations. You can use the command configure to enter this mode after you are in the privileged mode. If you wish to configure a particular interface, you must use interface configuration mode. To enter this mode, you need to be in the global configuration mode. You then enter the interface command followed by the name and number of the interface you wish to enter. If the router is in global configuration mode, the prompt will be RouterName (config)# while in interface configuration mode it will be RouterName(config-if)#. The BIG Picture: Task 1 is the groundwork. In task 2 and 3, group A will configure LAN A and Group B will configure LAN B. Task 4 will require the two groups work together to interconnect the two LANs. This lab requires two groups of two to work together as a team. For each group, there will be one designated router and switch. The routers provided are Cisco 2621 models. Cisco 12.0(7) IOS is loaded on them. The switch is a Cisco 2900 model with 12 ports. Initial Setup Plug one end of the rollover cable (null modem) into the console port of the router Locate the computer with a DB9m adapter connected to its serial port. This serial port is already configured as COM1 in Windows 2000. Plug the other end of the cable to the DB9m adapter. Verify that each of the two Pcs is physically connected to the dedicated switch with Ethernet cables. Task 1 Log on to the router using HyperTerminal We will use a Windows program called HyperTerminal to log on to the router from one of your Pcs. Verify the router is turned off. Launch HyperTerminal at Start(Programs(Accessories(Communication( HyperTerminal. You will now need to configure HyperTerminal so that it communicates with the router on COM1. Type router for the Connection Description Name. In the Connect To window the fourth field is titled Connect Using: Scroll down to select COM1, and then click OK Confirm and change if necessary the following settings in the COM1 Properties window popped up. Bits Per Second:9600Data Bits:8Parity:NoneStop Bits:1Flow Control:Xon/XoffClick OK. At the bottom left of the window, it should say Connected along with a connection timer. Turn on the router. Observe the boot-up procedure being displayed. This lists information about the hardware, as well as the initial configuration. We will be modifying this configuration during this lab. Be patient during this step, the router can take up to 3 minutes to boot. Note that there are two Ethernet interfaces at the back of the router. An IP address should already be assigned to each of these interfaces. Type show interfaces to see their current state. Record the MAC address, the speed of the interface, and the Maximum Transfer Unit (MTU) for each interface in the table below. This information is the details about each interface. MAC addressSpeedMTU EnableShowTraceroutePingWhen the router boots up initially, it is in the User EXEC mode. This has limited capabilities, which can be seen with the ? command. Type ?. Fill in the table below with the description given for the following commands. Observe other commands available. You will need to use this information in Task 3. TIP: You can type the ? command at any time to receive context sensitive help. Task 2 Clear router configuration Because we are unsure of the validity of the current configuration, we need to re-configure the router. First we need to clear the current configuration. To this end, we must be in Privileged EXEC Mode. Type enable to enter Privileged EXEC Mode. Type the password given on the chalkboard and press enter when prompt. The prompt should now end with #. Type erase startup-config to clear the current configuration residing on the router. Confirm that you wish to erase nvram filesystem and wait till it completes (up to 30 seconds). Type reload and confirm. This reboots the router and allows the changes to take effect. Type no if asked to save changes. TIP: One of the nice things about the Cisco IOS is that it does auto complete of commands, if you type a significant part of the command and press tab, the rest of the command will be added automatically. Another feature is the ability to abbreviate commands. Yet another and most useful feature is the ability to query for command syntax. For example if you dont know what arguments are accepted for the show command, type show ? and a list of possible arguments is printed. Feel free to explore this command. Task 3 Configure an IP address to the router Once the router has finished booting up, the previous configuration will be erased and the IOS will be in the System Configuration Dialog. Task 3A Configure FastInterface0/0 (i.e. the Routers LAN interface) Using the System Configuration Dialog Type yes to enter. Type no to skip the basic management setup. Type yes to see the current interface summary. Type in the name of your group for the host name. Type in the password given on the chalkboard for the enable secret. This password provides access to privileged EXEC mode. Type in the same password for the enable password. It will tell you not to use the same password, but it is okay. Just type it in again. Type in the same password for the virtual terminal password. Type no to configuring the SNMP Network Management. Type yes to configure IP. Type no to IGRP and RIP routing, as well as bridging and configuring Async lines. Type yes to configure the FastEthernet0/0 interface. Type yes to use the RJ-45 connector. Type yes to full duplex mode. Type yes to configure IP on the interface. Use the following  REF _Ref530551362 \h  \* MERGEFORMAT Table 1 for the next prompt. Group AGroup BSubnet Mask AddressFastEtherernet0/0192.168.0.1192.168.50.1255.255.255.0FastEthernet0/1192.168.100.1192.168.100.2255.255.255.0Table  SEQ Table \* ARABIC 1 Type no to configure the FastEthernet0/1 interface. We will do this later manually. Type 2 and press Enter to save the newly created configuration. Task 3B Configure FastInterface0/1 (i.e. the Routers WAN interface) Manually Type enable to enter the Privileged mode. Type in the password on the chalkboard when prompt. You can tell if this succeeded by the last character of the command prompt. If it has changed to #, then you are in the Privileged mode. Type ?. Observe the increased number of commands available. Write down two commands available in the Privileged EXEC mode that are not available in the User EXEC mode. Type configure terminal to enter the Global Configuration mode. Note the difference in the command prompt. Type ? to see commands available. Type interface ?. Write down the names of two interfaces that can be configured on router. Type interface FastEthernet0/1 to enter the Interface Configuration Mode for FastEthernet0/1. View the help description for the ip command. Type ip address XXX.XXX.XXX.XXX YYY.YYY.YYY.YYY where the Xs are the place for the IP address, while the Ys is the place for the subnet address. In this lab, the subnet address will be 255.255.255.0. Refer again to  REF _Ref530551362 \h  \* MERGEFORMAT Table 1 above. Type no shutdown in the Interface Configuration Mode to change FastEthernet0/1 to administratively up from administratively down. Type CTRL-Z (or type exit twice) to go back to the Privileged mode. Type show ip interface brief. Verify that the IP addresses have been correctly assigned. Attach the routers FastEthernet0/0 interface to your switch with an Ethernet cable. Set up the host machines with the following IP addresses and the correct gateway. Minimize the HyperTerminal Window. Group AIP Address:Subnet Mask Address:Gateway:Computer1 192.168.0.2255.255.255.0192.168.0.1Computer2192.168.0.3255.255.255.0192.168.0.1 Group BIP Address:Subnet Mask Address:Gateway:Computer1 192.168.50.2255.255.255.0192.168.50.1Computer2192.168.50.3255.255.255.0192.168.50.1 Task 4 Setting up static routing tables This task requires Group A and Group B to work together. If you are ahead of your partner group, feel free to explore other commands available on router. Now that each network has its gateway configured, we are ready to connect these two networks together. The remainder of the router configuration will be done across the network that you just built. We will use an Ethernet cable to act as the connection in the cloud. Find the Ethernet crossover cable and connect it between the FastEthernet 0/1 ports on both routers. Click Start, choose Run, type telnet XXX.XXX.XXX.XXX where the Xs are the place for the IP address of the router interface connected to your switch. Click OK. A telnet session is now open. Type the password given on the board when prompt. We will now set up a static routing table in each of the two routers. The idea is for the table to indicate that the other groups network can be reached via the 0/1 interfaces of both routers. To create a static entry in the routing table of the router, you must be in Configuration Mode. Enter the Privileged EXEC Mode. (Hint: refer to Step 1 in Task 2.) Type config terminal. Wait until the other group finishes Step 6. Use the command ip route to set up the static routing table. This command requires three parameters: 1) destination network/subnet number, 2) destination network subnet mask and 3) The IP address of the next hop that can reach the destination network. As an example, Group A should issue the command: ip route 192.168.50.0 255.255.255.0 192.168.100.2. Pre-lab Question 4: What command should Group B issue to set up an entry in the routing table so that machines in LAN2 can access machines in LAN1? By pinging a host from the other group, verify that the static routing table has been created, and hosts from both groups are able to communicate with each other. Note that you need to use the command prompt to run ping. Type exit to return to Privileged EXEC mode. To view the routing table, type show ip route. List the entries in the routing table. Indicate the line of the table that represents the entry that you just placed into the table.  Gaining information about the topology of our network. tracert, short for traceroute, responds back with information on the route that was to the destination host, for example the number of hops between the two hosts. To some degree, this information can be even used to see physical distances between two hops by looking at the time delay between the two hops. In a command prompt, type tracert on a host within your group's network. Record the information returned. Now execute a tracert command on a host in the other group. Record this information. Extra Tasks Access Lists (Firewall Packet Filtering) I. Introduction: The Access list is one of the most important control mechanisms to control access to both the internal and external network. Access lists consist of permit or deny statements that filter traffic based on the source address/port, destination address/port, and protocol type of the packet. In this lab, you have a chance to set up a Cisco router access list from scratch. Access-list format access-list [list #] [permit | deny] [source address] [source wildcard mask] [source port] [destination address] [destination wildcard] [destination port] [precedence precedence#] [tos tos] [log] [established] where [list #] : Standard IP access-lists are represented by a number in range 1-99 [permit | deny]: Either allow or deny access to certain source [source address]: The IP address of the source [source wildcard mask]: A wildcard mask, or inverse mask, applied to determine which bits of the source are significant.. Unlike subnet masks, 0s are placed in bit positions deemed significant, and 1s are placed in positions that are not significant. Wildcard mask examples. 172.22.5.20.0.0.0All bit positions must match exactly. Access list will be applied only to the host 172.22.5.2172.22.5.00.0.0.255Bit positions in the first three octets must match exactly, but the last octet can be any valid number. The access list will apply to all hosts in the 172.22.5.0 subnet.One of the most common problems with access list is the lack of planning. Since an access list is searched from top to bottom, the configuration and order of each entry must be precise to work correctly. Ex: The following access list is not correctly configured. Access-list 1 deny any Access-list 1 permit 168.243.32.0 0.0.0.255 Access-list 1 permit any According to the access-list above, none of the computers on the network will be able to get access to the router. This is because when a condition is satisfied by a rule in access-list, router will NOT continue to check any of remaining rules. Task 1 Reset Access List Make sure you are in privileged mode. Type configure terminal. Verify that the router is able to communicate with both computers by using the ping command with the IP address of a machine in your group and one in the other group. Task 2 Create new Access List Here you are going to configure the router so that one of the machines from the other group can talk with you, while the other cannot. Verify that there are no access lists using show access-lists access-list 1 deny 192.168.50.3 (GroupB use 192.168.0.2) access-list 1 permit 192.168.50.2 (GroupB use 192.168.0.3) Task 3 Applying Access List to Interfaces Enter the interface configuration mode to configure the 0/0 interface. Type interface FastEthernet 0/0 Apply the above list (list 1) to the out side of the interface: ip access-group 1 out Verify that the list has been entered, this time use the command show run. And verify that the router correctly filters packets. Use ping from both hosts to verify. Fill out the following table with the results of your verification. PingedSuccess (Yes/No)192.168.0.2192.168.0.3192.168.50.2192.168.50.3Pinging192.168.0.2192.168.0.3192.168.50.2192.168.50.3 Figure  SEQ Figure \* ARABIC 1  Page  PAGE 10 CS326 Fall 2002 Room: ESB 133 Name:_________________ Page  PAGE 1 #t}J~   ^ _ u v t u  h  üy?CJOJQJmHjCJOJQJUnHjCJOJQJUnHCJOJQJnH OJQJnH56OJQJnHCJ CJOJQJ5CJOJQJOJQJ CJOJQJ5CJOJQJ 5CJPJCJPJCJPJ6CJOJQJ5CJ0OJQJ/#t@J $$Ifa$ & F ^  & F [$^ x\$ & F %<^`%$a$ #t@J   ^ _ ` 7 ̿|xqmfb_\YVS    !  <=  OP  _`  ~      E}   }              ^ _ T|@Lp $$Ifa$e$$If&60R634ab_ ` 7 ]^_+./=Mdd[$\$ & Fdd[$\$'h$d%d&d'dNOPQ^h1$7$8$H$ . !'pzgq_o/=",-123=>?@AHIMNOYZ[\]jkstuCJ5CJOJQJ jCJOJQJ56CJOJQJ56CJOJQJ5:CJOJQJ5CJOJQJnH56OJQJnH5OJQJnHCJOJQJnH CJOJQJ? ]^_+./=MGhH-23>@AINŽ~wsleaZS             $    )      Z  (      noRGhH-2 $$Ifa$ & Fdd[$\$$hx[$\$^ha$ & Fd[$ & Fxd\$ h\$^h 23>@AINOZ\]ktu8||8||8||`|| $$Ifa$z$$If0V 6 8 0 634ab NOZ\]ktueqw{|~ǿ~ytpmfa]VQ                              N  f            ueqw{|~]W$If$$IfF  L0w6    34ab $$Ifa$ & Fdd[$\$ pqvwz{|>?8\- 3 u!{!!!!!#$$%%%,%.%X%[%&&0'3'J'L'''''''((L(M(c(d(t(j}CJOJQJUjCJOJQJU56OJQJ56CJOJQJ6CJOJQJ56CJOJQJ5CJOJQJCJ CJOJQJF~o$$IfF  L0w6    34a$Iful\O $&`#$/If$$&`#$/Ifa$dd[$\$$$IfF  L0w6    34a} m`}8m`} m`} $&`#$/If$$&`#$/Ifa$$$If04G# 6`0s#634ab 78\( S !p!!!##$$%'%S%þwrmhc^XP   , &UVVx    /         XYZ[            78\( S !p!!!##$$% ^`  & Fdd[$\$h^h ^` & Fdd[$\$ & F%'%S%%%0&&&+'E''''(:((((((( $$Ifa$$Ifdd[$\$ & Fdd[$\$S%%%0&&&+'E''''(:((((((((((((())ǿzvohaZVOH  <  LM  [  h  t            1  O  t        I            t(u({(|(}((((((((((((((((((())))) )-).)/)5)6)K)L)M)N)O)T)V))))6*;*A*"+#+++9,:,[,f,,,5-7-F-p-..1.2.B.C.jCJOJQJU56OJQJ5CJOJQJ CJOJQJ OJQJmHjOJQJUOJQJCJCJOJQJmH CJOJQJjCJOJQJUB((((((YPPPP $$Ifa$$$If\ * ^@@|0 634ab(()) ).)/)O)[RRRG[B$a$ $$$Ifa$ $$Ifa$$$If\ * ^@@|0 634ab) ).)/)O)))6*`*++4,V,,-A-S../;/v//@0H0T0i0ļ|tld\UNG      u      #  g      -         w  #       ]        .O)))6*`*++4,V,,-A-S../;/v//@0H0T0i0r0$If ^` & Fdd[$\$C.I.J.K.X.c......"/9/:/;/@0G0H0S0T0h0i0q0r0s0}0~0000000000000000000000011 1 111!1"1/101<1=1>1G1H1T1U1b1c1o1p1q1r1133Ƽ56CJOJQJ56CJOJQJ<CJ6CJOJQJ5CJOJQJjCJOJQJUCJOJQJmH CJOJQJJi0r0s0~00000000000001 1 11"101=1>1H1U1c1p1q1r1}vrkd]VRM              +  67  @  U  a  ijk  w                r0s0~000000000e____e____$If$$IfT \E l0 634a 000001 1e\VVVV$If$^a$$$IfT \E l0 634a 1 11"101=1>1H1U1c1p1b\\\\b\\\\$If$$IfT\ "g0 634a p1q1r1123i445b\Z\NNN\ & Fdd[$\$h^h$$IfT\ "g0 634ar1123i44566B6989D9999999:*<+<b<=@@@@@Aû}xsnid]VO      :[@  A  BC  DE  F  )      *  @         C 33366R6Z6778999 9d9q98:?:;;,<b<r<==+DFDqDD/EOEF4FMFoFFFGG]GsGGGHIIIII I!I"I#I$I'I.I/Ij0JCJOJQJUjwCJOJQJU OJQJmHjOJQJUOJQJ5CJOJQJnHCJOJQJnH56CJOJQJnH56CJOJQJ6CJOJQJ5CJOJQJ CJOJQJ7566B6989D9999999:*<{{{k$$Ifc"! t0634 l4a7 dd$If[$\$ & Fdd[$\$*<+<b<=@@@@@AA_$$IfF]5 c">j t06    34 l4a$Ifdd[$\$ AAA(AAABB6C+DFDlDD,E-E.E/EOEEEFMFFFFFGGsGGŽ{ocWͿ   #   0>   K    ,   j        fmn    "  -.AA(AAABB6C+DFDjhhhh`1$7$8$H$$$IfF]5 c">j t06    34 l4a$If FDlDD,E-E.E/EOEEEFMFFFFF & F 1$7$8$H$^`  h1$7$8$H$^h1$7$8$H$ 1$7$8$H$  & F1$7$8$H$^`  & F1$7$8$G$H$^` FGGsGGH\H]H^H_HfH$$1$7$8$H$Ifa$$1$7$8$H$If 1$7$8$H$ & F 1$7$8$H$^`  GH\H]H^H_HfHgHhHyHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHI"I$I&I'I6I8I:I;IKIqIrIsIIIIIII (   5   ?fHgHhHyHHHHHn^RRRRR $1$7$8$H$If$1$7$8$H$If $$If F]#  t06    34 l4aHHH5d$qq$1$7$8$H$If]q^qa$$$If ֈ]yD#\\ t0634 l4aHHHHHH $1$7$8$H$IfHHHHH3H''' $1$7$8$H$If$$If4 ֈ]yD#\\ t0634 l4aHHHHH'L$$If4 ֈ]yD#\\ t0634 l4a $1$7$8$H$IfHHHHHHH $1$7$8$H$IfHHHHH3L''' $1$7$8$H$If$$If4 ֈ]yD#\\ t0634 l4aHHHHH'$$If4 ֈ]yD#\\ t0634 l4a $1$7$8$H$IfHHHI"I$I&I'I:I;IKIqIrIsIIIIIIIIII  hdd[$\$^h$$a$dd[$\$ h1$7$8$H$^h1$7$8$H$/I5I6I8I9I:I;IqIsIzI{IIIIIIII CJOJQJ0JCJOJQJmHj0JCJOJQJU0JCJOJQJIII hdd[$\$^h+ 0&P1h/R / =!"#$%}DyK _Ref530551524}DyK _Ref530551362}DyK _Ref530551362:DdwV/N  C *ALab2Fig1bM: IkQ:w):jn!: IkQ:wPNG  IHDR(LG=gAMA|Q pHYs+9IDATx^}h[m AƄ~A`L(+DxJ0a &<cL1"[ݬE֘P|cƄy_bL6QJ0-A(EvdKsfhfm9s=?w棺z>F'l >®A,T=5TYc"v !hJq) q@ȓ'qX\!KDHIBz &r=ͥ>EUXL& W*@@ "ZCRܬ~%;|ZH< u|Zx@zLM;^8 h4p<@@ GhpBI3I8h}䭇3lH `>\ 0B"٪@'$1Nވ5`^\j>fBcLA$$ GB1 4u8]8b ""p:I,Em @A?DL@uqAH  G )v~/8pՋG)DA٨=>m6G5Շ@4pF TA6ۣC h8f#x{TS}MlojN' r^Nv (|{U6X7 `נnRjAխ nlZ@nu+C ![Yw:0g>VC`6ʻ$<^T Gnu+C ![FeV2jAխ nlZ@nu+C ![FeV2jAխ nlZ@nu+C ![FeV2jAխ nlZ@nu+C ![FeV2jAխ nlZ@nu+C ![FeV2jAխ nlZ@nu+C ![FeV2jAUqbAȴae 2@]ߤ\RAH4NAϕ*3'xG (yFmU.ZBcv C >=`NU?quۯcz_-X'gkI>@8v2bnDo'#\ DkO~m9Bc>_#2 ԽbUNC8Gd(k'Y,mܫ +?Gk'ccX6_a"<@ػ>2Ȗ˜zT AO.g!@!$ʆ{g/e\tSs+p1>2 &8rBXCyC m9GzL9g>9i3e^y>}NS@r"KinTU-`!GlM@{.[1[!ຬ8@A3}*r(5`4 H# !F'0zK Gm #y4#Blw w H @@/< #,/:= #>- I5342Ju˺jq'~E{Lw 3+/G=Hr;tŅ8=C,[k\Hk,P!iYѽZrl8Zl:)X~&Z>W̨ (LҺ3@F w[Y;p2b؛9@<Ȍ !BGgkD,Jùs6?Db+dQS%2N \DpuKC`b4Qc,W僟P8u#_m=9B$1#@yCn?В#ڊ#fbKh6 E usVK9ïuj![X8t%׸#G, X8 #(H9-i8Cp~9_C餓*})2#t# :˱[z ,(Hgr\fxXװD7\IZuj!u}[##`F8tV cF k4G4MM6G8-4N=I}G0|F2H[k@tPkD 5.-l勛C=큞ۨ!J&uWM9U!uy) n٫}o6ˏW^ޠшmOg's{oi#^ݏK@&^k~HU`ޭSQI/79uܙct2ًLg$]_[u!r>580CƖ8\9{ՙUiko N d1❢{YeH9ܕG _X̝CYsV.otlC xF}?B-g͞Hq ue 5^^d99p~Oey5gHx-:?4 `JyZ-iUv5zbzأ1#Ba"rSvdҋXw =*I:w1:4yyeh~eߏ ,Ƹuyʚ˓  IYZ{!8!5,7,Xk0澆\-iZQ|WB)j4ojKqQ n'|6z M#GhAߏ`݁Pm<.N=D ԮnɫMz.:vJǢ hpdH-:?oä>e7 'h1|ήn{`{3GBzo91o^O!qܠwC*I6i V|_^֗#4z!(Y2vx_y;h|_CaރGڜcMe?@~8_ $U=CxaރT֞E7{y:j,kvnE' $Gd؆3jo( LP$~n!r#X7]6 NΓܡ<F@/t>4z0q/ 2LՊ?u%)5E8TaB?hY;?j .5C7(8AjKL\ Mmr8egg!G0osy/(IH׶I]̯|Qȿ~;`D6Ȱ,q̷^G~{Gu64DGG #Njoo`1[ԈVE,\RݺacO1k8O<]wJ,F ꌩezCt-# @̨QӘ@ U@n'{iظ D"<\ڮj0dZYBWS#{@ ń`^Yܿ#ݺZOR~1Vͫhg\(gztf @e?E%(+y|T5F؁ 4>y`k v {Et(V~r@vF=6o}gY}A)V#ف2(=dR9^jPP@a@'+ [ ^REe Qwg:bv "ۅf֠RV,_ä؁`%&c9ۚ5Ja*Ʋ|=P[ II mj B2@ צ>/,]&'# &Z:tǪWEPa{<+L1e+o֠"V&CVP J׬c9nH//tJŲ;S+nAE(bމ5ɊJKPb4q@eq&aYsb e^V6,N<^ 5`?],K^V&72L `==8~xp +;n梢vrB`g 8/Gso'w8[d8,5*,+9=R=xEM !EG9[7g[ = {L-#i2GswM!BXz%`M">920I';2"C}?B!񹃝˳vRE*kvtxt24I[LnB8qVl2W(}]AEFq |ab2נG@-V~Ʊ#S]rcAbp ry{~tZ@^ksj y R(s=ws߀WArT]#XSPJX%`0Lp<,zWF葂,8eo B"%XA<AEFej YN kAh}ܔCs3Up Kx)X6k}ecwf*@SCgy^>ߑHV]\QG tqd;XM &Ci"#ѭ7(a:nK52)f ^ :>o76m 'l10љ!?)G,v{[6*DeDa tX%`.}U9*T:,@XUѾJ7I*nm^,^H) oy8eN 1^)ad;cɡۅizǠ] Bkś;s{M?G'r~@hq-mmYzN6ѧ'nVi@ | u}kaɝ2o&Rem- 9/&Ƀp3ԑ{8ѓ}S#e )[l|j*YLHn=d ՇQnLνNd|kOLxy{}'4}`"Vs[7s+ZxyM^ /OMG^@d^$}+^q{e#vuÉ+g d +8q p@ ?`7RSM>S}6 O Xs$ yv'ЖlASh|&AVPXCynUnd)k3 :IJ/yBK%@=bʘ2q[p^s0^yK{^Wy9@hh}noY%)<`)b_2Ő,n d|R=e6CN1@Xpǫ*Ce>tq?Be SEM!wno(,$c!#lZB̃ӏ+RMus>r+GF$$ǖJ3)Bmb34HEC Ɍ2l!++ )anIɔ@"Ɔq%Yu6$yP)[ͅ$@ * (gMg<$٪L R6 r^iY!8io0^J@ , CV, L cj>[c>25۫)3u)BBVr,#MﵯkWO< ߔPMZG-^mSTP[;-37 ?"ͫ 9Ը(6!Ceu龓ONlIFޮ{;h<㜀;Z+ "ȷzP  F XEV<$z  9 0B$9 t  1`,YZ `z5#$>$G^ 5BfQ#gYCr"#8qE$a2l3a=hHy[ M&r6ᔾfzYVzSp]%#HKL@0!: & c G`Ƥ"F&C3ȾL 1 S ,%S jRX Hywbz^QZE㦚4 “ + Mu?|g5mVc>B-A%=Rm~oG{;lըAK@.uc2}(bzhzsV7g]N @@FoOJEU^}!L8`wdtH6BB_X8}Yv+_#i Wl\3 {2IR0 TGFF^Ӄ8T5l`@H$jXB)E@l_}3Kq?k9M0 XYGϭdWMO}i\A3㓣4D#mYtҼ tT S e sť QCPcǐ=@ (J{h9l>!]AA_OO9ps8l8-L0<̈́R.!Xh7 8dEX*#Udÿxv|})ڣ#Ъ48pv nWs$3|.,#ڂvH2/A4R0 @cHm/>greޛbPX1eOrř+zǀȌ!-ljY:#eǀPbnifJIT#0'uTG/wrzW!!324+X!_eӭc=\kvsuH-=Swo75GO]|ٰi/>x=MNkǔ Vh[.OͧN1G͒oOzR>}Ukqh y~ǽtw v3Y>Qf4Һ(Ov9J>ۀ⟟{l"!l4>n)i0fnmܼsg;zbj2MĬZXDy] $Z^u G'VXބ?6r#oM"VQнs?|S$N\Q #ދ;AF_pF} cW2G=) G5-Y1UgTǐ?}^uƽGol69җJ(&d'#df1rv Z~=2캞5lH( h},+W|D+P]c#lѴe<@>^+:~#dzx Aj]>[ndzUGahϿMY).!loya1`ˎԳ8M54Tx&>VnoۆV O P-XX8GFMj;ĎW/j=7v:shmmncAB@w?irA80NGQo[#ԭ?mܘGX3{ ?qcnx X7p֧:I bX%%4vljOQȩgZo8̋ T @(jٱgGrTxZسȂF\*#TΈy#p^ʢkH/6r hWa @2?a#^^+P9O |<9O4t%ˡuJBi!ۚAhfoY M<^-ՙpA-ɚGX$G?8v3 Kc Gbhm8w.Kq!t*;]f<8gU+#_뾯9k\ 7/ʃ*-mK=G`;7OJ~|.)a,aH&Bgj)/wt'R89}9 "C%.3xR8ˉ"$L>,8x5G-Reݫ6].gA@ s$߫6Ǝ[4 ܙ7r+'rL)Jo8[π4a=ܙry$5򧠟k0y718僟V\jDdw0tlRk_%jc6^#P:=@ yk#<>p߼ \9u| \\l .>?\?w}~__DQwԭ#/.1Go9d0w{nP)ܤSjf؂S[X׏k>3B6 .$غΜq@Uv} lZ DJ苧͝{ t >}m@-E~l7}h0Ghi|rTC6cć.2N)1W ߟ-|1[onmK o)GeF~0CaFQ2SpQ#5|[2gRr@`96Ll6XDl:F |fyԓabbC>\Ѳ¹5:@=ij{=V?Oto\@x{4j=96B0za{E0Yݪ}.oOtj!I T辠B)NqI Xd{{w88bfKQ 斎:QNhtbmc@Md!ϯAS.WuGvLnT(mrX_iyI('p?ګ-N2lUX@xw2 ʷ-&ق@XNjS͜PYZ~8/`а)b$__*&\9(<- DEGoˋ?. -LŌ3hbt.υu 5 Z1#h8f#x{TS}Mlojix@QM!4 o=>mvv޵1wb1 V0kž&B F- ]2 t] kPA 0 ԁ@ H2LD u 4 q(˗JS{6]~Zv Z~ZA3ϗZkB h>~#RkMx?_j u@K5!?|&g</ք@:|G ֚Z~ZA3ϗZkB h>~#RkMx?_j u@K5!?|&g</ք@:|G ֚Z~ZA3ϗZkB h>~#RkMxMpŨ!M B  0# 0# 0# <]Bv .}֝Vr?`.O 7 5#DB07`ɖYt`A;cx+;6r#HNl ࣚz@G zxjcv={ z 0Ez(C*$.dZ>Q +]f#8<_+]A3 JׄdQM*J7 BK AE Ĝu'AAfPhd !%4®iB8jj8&0bw)aנ"z@$8|T  z0t@]={VZI [#ŤGᨡGWZP@l3F@nAլf\[@r5+yԊG!z1wm1x aIENDB` i8@8 NormalCJ_HaJmH sH tH L@L Heading 3$<@&5CJOJPJQJaJ<A@< Default Paragraph Font:^@: Normal (Web)dd[$\$@@  Balloon TextCJOJQJ^JaJ2"@2 Caption xxCJaJ,@", Header  !, @2, Footer  !&)@A& Page NumberC C  z z z z z z z z z z H!*4,6/?CCs*6 $ Obe t(C.3/II38>FKRc_ 2u~%((O)r00 1p15*<AFDFfHHHHHHHHHII467:;=?@ACDGHJMNOPSTVWXZ[\]^_`abd NS%)i0r1AGI59<BEILQUYtL"t"|"5#K#M#(B(J(CC CC   V]_e!t!l,2$:u^6B3|i 0@0 0(  B S  ?C _Ref530551362 _Ref530551524/#CCN#!CC"eq ` j  EOPVilBEks056@!!5'7'F'H'')))--0 0R0T0p1r1i3k34484?4K4U455558888885@;@p@v@ AA]A_A$CCC#s@CEP9?(3p{6$A$%#%4&:&;&=&[&f&--484?4??$C^C`CCC:::::::::::::::::::::::CS Dept.CS Dept.CS Dept.CS Dept.CS Dept.CS Dept.CS Dept. Kevin LooStudent Microcomputer Facility Jon Gibson4Mithrandir:Users:jgibson:Desktop:NIL:cs326e:lab2.doc o/ D_,8\|)TR[\|)[-y.8nڼ9nڼKt!9PHpRFh/?DN>KdYnڼMDiyu6#lU   ^` 5hH.  ^` hH0  ^` hH.  ^` hH. `  ` ^` ` hH0 @  @ ^@ ` hH.    ^ ` hH.  ^` hH0  ^` hH. ^` OJQJo(hHl ^` OJQJo(hHnp p^p` OJQJo(hHuP  P ^P ` OJQJo(hHl0  0 ^0 ` OJQJo(hHn ^` OJQJo(hHu ^` OJQJo(hHl ^` OJQJo(hHn ^` OJQJo(hHu ^` OJQJo(hHl ^` OJQJo(hHnp p^p` OJQJo(hHuP  P ^P ` OJQJo(hHl0  0 ^0 ` OJQJo(hHn ^` OJQJo(hHu ^` OJQJo(hHl ^` OJQJo(hHn ^` OJQJo(hHu^`5.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`. ^` CJOJQJaJo(hHl^`.p p^p` OJQJo(hHuP  P ^P ` OJQJo(hHl0  0 ^0 ` OJQJo(hHn ^` OJQJo(hHu ^` OJQJo(hHl ^` OJQJo(hHn ^` OJQJo(hHu  ^` 5hH.  ^` 5hH.  ^` hH.  ^` hH. `  ` ^` ` hH0 @  @ ^@ ` hH.    ^ ` hH.  ^` hH0  ^` hH.hh^h`5o(.  ^` hH0  ^` hH.  ^` hH. `  ` ^` ` hH0 @  @ ^@ ` hH.    ^ ` hH.  ^` hH0  ^` hH.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`5.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`. u6#ldY.89[-MDio/ ?DNpRFTR[8Kt!90 J ^_-23>@AINOZ\]ktueqw{|~"""""""""""## #.#/#@*H*T*i*r*s*~*************+ + ++"+0+=+>+H+U+c+p+q+3333334:::;;;(;;;]B^B_BfBgBhByBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBC@44044C@ @GTimes New Roman5Symbol3 Arial3Times=.e0}fԚTimes5 Tahoma;Wingdings"qh[k&[# H7 u 8 y!20dCB\B3qH!Lab #3 Basic Router Configuration Matt Bradbury Jon Gibson Oh+'0 ,8 T ` l x'"Lab #3 Basic Router Configurationcrab Matt BradburyouattattNormala Jon Gibsonr35 Microsoft Word 10.0@?!@~ļp@4^n@X  H7 ՜.+,D՜.+,L hp|  'ieuC$ "Lab #3 Basic Router Configuration TitleHDLl _PID_HLINKS_AdHocReviewCycleID_EmailSubject _AuthorEmail_AuthorEmailDisplayName_ReviewingToolsShownOnce'AL "I Lab2Fig10g"Lab 2 ( Doc format )ncematt@bscsf.utexas.educeMatt Bradburyxaatt  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdeghijklmnopqrstuvwxyz{|}~Root Entry FϨ&Data ff<1Table%4WordDocument-SummaryInformation(DocumentSummaryInformation8CompObjX FMicrosoft Word DocumentNB6WWord.Document.8