0% found this document useful (0 votes)
26 views13 pages

Arro, Cisco 11

The document outlines a series of Packet Tracer activities for a Cisco Networking Academy course, focusing on various networking concepts and configurations. It includes detailed instructions for exploring network devices, configuring routers and switches, and understanding the client-server model. The activities aim to provide practical experience in setting up and managing a small to medium-sized business network.

Uploaded by

jericarro23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views13 pages

Arro, Cisco 11

The document outlines a series of Packet Tracer activities for a Cisco Networking Academy course, focusing on various networking concepts and configurations. It includes detailed instructions for exploring network devices, configuring routers and switches, and understanding the client-server model. The activities aim to provide practical experience in setting up and managing a small to medium-sized business network.

Uploaded by

jericarro23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

UNIVERSITY OF CEBU – MAIN CAMPUS

COLLEGE OF ENGINEERING
Sanciangko Street cor. Osmena Blvd., Cebu City, 6000, Philippines

In partial fulfillment on the subject


CPE 222A (CISCO 1 – SWRE)
2nd Semester (2023-2024)

By:
Arro, Michael Jeric M.

BSCPE - II

To:
Engr. Ma. Cleo Boltiador Pilones Gatcho
Department of Computer Engineering

TABLE OF CONTENTS

MODULE 1 NETWORKING TODAY


1.0.5 Packet Tracer - Logical and Physical Mode Exploration 100%
1.5.5 Packet Tracer - Network Representation 100%
MODULE 2 BASIC SWITCH AND END DEVICE CONFIGURATION
2.3.7 Packet Tracer - Navigate the IOS 100%
2.5.5 Packet Tracer - Configure Initial Switch Settings 100%
2.7.6 Packet Tracer - Implement Basic Connectivity 100%
2.9.1 Packet Tracer - Basic Switch and End Device Configuration 100%
MODULE 3 PROTOCOLS AND MODELS
3.5.5 Packet Tracer - Investigate the TCP/IP and OSI Models in Action 100%
MODULE 4 PHYSICAL LAYER
4.6.5 Packet Tracer - Connect a Wired and Wireless LAN 100%
4.7.1 Packet Tracer - Physical Layer Exploration 100%
MODULE 9 ADDRESS RESOLUTION
9.2.9 Packet Tracer - Examine the ARP Table 100%
9.3.4 Packet Tracer - IPv6 Neighbor Discovery 100%
MODULE 10 BASIC ROUTER CONFIGURATION
10.1.4 Packet Tracer - Configure Initial Router Settings 100%
10.3.4 Packet Tracer - Connect a Router to a LAN 100%
10.3.5 Packet Tracer - Troubleshoot Default Gateway Issues 100%
MODULE 11 IPv4 ADDRESSING
11.5.5 Packet Tracer - Subnet an IPv4 Network 100%
11.7.5 Packet Tracer - Subnetting Scenario 100%
11.9.3 Packet Tracer - VLSM Design and Implementation Practice 100%
11.10.1 Packet Tracer - Design and Implement a VLSM Addressing Scheme 100%
MODULE 12 IPv6 ADDRESSING
12.6.6 Packet Tracer - Configure IPv6 Addressing 100%
12.9.1 Packet Tracer - Implement a Subnetted IPv6 Addressing Scheme 100%
MODULE 13 ICMP
13.2.6 Packet Tracer - Verify IPv4 and IPv6 Addressing 100%
13.2.7 Packet Tracer - Use Ping and Traceroute to Test Network Connectivity 100%
13.3.1 Packet Tracer - Use ICMP to Test and Correct Network Connectivity 100%
MODULE 14 TRANSPORT LAYER
14.8.1 Packet Tracer - TCP and UDP Communications 100%
MODULE 16 NETWORK SECURITY FUNDAMENTALS
16.4.6 Packet Tracer - Configure Secure Passwords and SSH 100%
16.5.1 Packet Tracer - Secure Network Devices 100%
MODULE 17 BUILD A SMALL NETWORK
17.5.9 Packet Tracer - Interpret show Command Output 100%
17.7.7 Lab - Troubleshoot Connectivity Issues 100%
17.8.2 Packet Tracer - Skills Integration Challenge 100%
17.8.3 Packet Tracer - Troubleshooting Challenge 100%

MODULE 1
NETWORKING TODAY
Packet Tracer Activity 1.0.5
Logical and Physical Mode Exploration
Objectives
Part 1: Investigate the Bottom Toolbar
Part 2: Investigate Devices in a Wiring Closet
Part 3: Connect End Devices to Networking Devices
Part 4: Install a Backup Router
Part 5: Configure a Hostname
Part 6: Explore the Rest of the Network
Background / Scenario
The network model in this Packet Tracer Physical Mode (PTPM) activity incorporates many of the
technologies that you can master in Cisco Networking Academy courses. It represents a
simplified version of
how a small to medium-sized business network might look.
Most of the devices in the Seward branch office and Warrenton data center are already
deployed and
configured. You have just been hired to review the devices and networks deployed. It is not
important that you
understand everything you see and do in this activity. Feel free to explore the network on your
own. If you
wish to proceed more systematically, follow the steps below. Answer the questions to the best of
your ability.
Note: This activity opens in and focuses on Physical mode. Many of the Packet Tracer activities
you
encounter in Cisco Networking Academy courses will use Logical mode. You can switch between
these
modes at any time to compare the differences by clicking the Logical (Shift+L) and Physical
(Shift+P)
buttons. However, in other activities in this course you may be locked out of one mode or the
other.
Instructions
Part 1: Investigate the Bottom Toolbar
The icon toolbar at the bottom left-hand corner has various categories of networking
components.
You should see categories that correspond to Network Devices, End Devices, and Components.
The fourth category(with the lightning bolt icon) is Connections and represents the networking
media supported by PacketTracer.
The last two categories are Miscellaneous and Multiuser Connection.

Question:
What are the subcategories for Network Devices?
• Routers, Switches, Hubs, Wireless Devices, Security, and WAN Emulation

Part 2: Investigate Devices in a Wiring Closet


a. If you went exploring, return to Physical mode and Intercity now. In the top blue bar,
click Physical, and then use the Navigation Panel or Back level buttons to navigate to
Intercity.
b. Click Seward, and then click the Branch Office.
c. Click the Branch Office Wiring Closet. Notice that the wiring closet has a Rack, a Cable
Pegboard, a Table, and a Shelf.
The Rack contains devices that can be racked mounted. If you zoom in on the rack (zoom
tool or Ctrl+scroll wheel), you can see that the devices are screwed in (mounted) in the
rack. Below the power distribution device, you will find a router. Routers connect
different networks.
d. Below the router are two switches. These switches provide wired connections to
connect to other devices. Notice that the devices have a name assigned by the network
administrator.

Question:
What devices use a wired connection to connect to switch ALS2?
• ALS1, Access_Point, WebServer

e. Below the switches in the Rack is a wireless access point named Access_Point.
Wireless access points use a wireless connection to connect to other devices. Switch to
Logical Mode.

Question:
Which device is connected to Access_Point?
• Laptop_1

f. Switch to Physical mode. You should be back in the Branch Office Wiring Closet.
Question:
Where is the device connected to Access_Point physically located?
• On the table

Part 3: Connect End Devices to Networking Devices


Devices can be connected in a variety of ways. For network connectivity, devices are
typically connected using either a copper straight-through cable or wirelessly. For
management connectivity, devices are typically connected using either a console cable
or USB cable.
Note: Packet Tracer will grade the rest of this activity. At any time, you can click Check
Results at the bottom of the Tasks window. Then click Assessment Items to see which
items you have not yet completed.
a. Investigate the Cable Pegboard. It includes two Console cables, ten Copper
Straight-Through cables, four Fiber cables, two Coaxial cables, and two USB
cables. Notice that the cable representations in Physical mode are more
representative of their real-world counterparts. Switch to Logical mode. Notice
that the cable representations are different in this mode.
b. Switch to Physical mode. Click a Copper Straight-Through cable from the Cable
Pegboard.
c. Float your mouse over the ports on PC_1 until you see the FastEthernet0
popup. The other RS232 port is for connecting Console cables.
d. With the Copper Straight-Through cable still selected, click the FastEthernet0
port to connect the cable. The port should now be highlighted in green.
e. Connect the other end of the cable to the ALS2 switch by clicking an empty
Fast Ethernet port. The cable should now be dangling between PC_1 and the
ALS2 port.
f. PCs and laptops can also be connected to networking devices using a console
cable or a USB cable. This connection provides management access. Click a
Console cable from the Cable Pegboard.
g. Click the RS232 port on PC_1. The port should now be highlighted in green.
h. Float your mouse over the Edge_Router and find the Console port. You can
right-click > Inspect Front to zoom in and make finding the port easier.
i. Click the Console port on Edge_Router to connect the Console cable. The cable
should now be dangling between PC_1 and the Console port on the
Edge_Router.

Part 4: Install a Backup Router


Newer models of networking devices can be accessed through a USB port for management
configuration. This is necessary because newer laptops and PCs typically do not include an RS232
port for console cable connections.
a. Investigate the Shelf. This includes an inventory of devices in the Seward Branch Office that are
not currently installed.
b. Click and drag the Backup_Router to an empty spot in the Rack.
c. Some devices are not automatically powered on when installed in the Rack. Click
Backup_Router > Inspect Rear. Find the power button and turn the router on.
d. On the Cable Pegboard, choose a USB cable. Return to the rear view of Backup_Router and
find the USB Console port on the far left. Click the port to connect the USB cable. The port
should now be highlighted in green.
e. Connect the other end of the USB cable to either of the USB ports on Laptop_1. The cable will
not dangle like the cables did for the connections to PC_1.
Part 5: Configure a Hostname
Network administrators typically assign a name to networking devices. To do this, you will use
your console connection to the Backup_Router.
a. Click Laptop_1 > Desktop tab > Terminal.
b. The Terminal Configuration is already set with the necessary port configuration. Click
OK.
c. You are now at the command line for Backup_Router and should see the following.
<output omitted>
cisco ISR4331/K9 (1RU) processor with 1795999K/6147K bytes of memory.
Processor board ID FLM232010G0
3 Gigabit Ethernet interfaces
2 Serial interfaces
32768K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
3207167K bytes of flash memory at bootflash:.
0K bytes of WebUI ODM Files at webui:.

--- System Configuration Dialog ---

Would you like to enter the initial configuration dialog? [yes/no]: no

d. Answer no to the question and then press ENTER to get the Router> command
prompt.
Press RETURN to get started!

<ENTER>
Router>

e. Enter the following commands to name the router Edge_Router_Backup.


Router> enable
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# hostname Edge_Router_Backup
Edge_Router_Backup(config)# end
Edge_Router_Backup#
Notice that the hostname changed from Router to Edge_Router_Backup.

f. Close the Laptop_1 window and return to the Branch Office Wiring Closet.
g. Notice that the display name for Backup_Router did not change. Click Backup_Router
> Config tab. In Global Settings, notice that Packet Tracer maintains two names for the
device: a Display Name and a Hostname.

Part 6: Explore the Rest of the Network


Take some time to explore the rest of the network. Become familiar with the network
representations in both Logical and Physical modes. In Physical mode, navigate to other areas
such as the Wellington Data Center and Teleworker Home. The technologies used in these
locations are discussed in greater detail inCisco Networking Academy courses. For now, see what
you can discover on your own. Don't worry about breaking anything. You can always close Packet
Tracer and open a fresh copy to start exploring again.

1.5.5 Packet Tracer


Network Representation

Objectives
The network model in this activity incorporates many of the technologies that you will master in
your CCNA
studies. It represents a simplified version of how a small to medium-sized business network
might look. Feel
free to explore the network on your own. When you are ready, proceed through the following
steps and
answer the questions.

Note: It is not important that you understand everything you see and do in this activity. Feel free
to explore
the network on your own. If you wish to proceed more systematically, follow the steps below.
Answer the
questions to the best of your ability.

Instructions
Step 1: Identify common components of a network as represented in Packet
Tracer.
The icon toolbar at the bottom left hand corner has various categories of
see categories that correspond to intermediary devices, end devices, and media.
The Connections category
(with the lightning bolt icon) represents the networking media supported by Packet
Tracer. There is also an
End Devices category and two categories specific to Packet Tracer: Custom
Connection.

Questions:

List the intermediary device categories.


1. Routers
2. Switches
3. Hubs
4. Bridges
5. Gateways
6. Modems
7. Access Points (APs)
8. Firewalls

Without entering into the internet cloud or intranet cloud, how many icons in the
topology represent endpoint
devices (only one connection leading to them)?

To determine the number of endpoint devices in the topology, visually inspect


the diagram and count the icons with only one connection leading to them, excluding
connections to the internet or intranet clouds.
Without counting the two clouds, how many icons in the topology represent
intermediary devices (multiple
connections leading to them)?

To determine the number of intermediary devices in the topology,


count the icons that have multiple connections leading to them,
excluding the internet and intranet clouds.

How many end devices are not desktop computers?

To find out how many end devices are not desktop computers count all the
endpoint devices in the topology and then subtract the number of desktop
computers. This will give you the total number of end devices that are not
desktop computers.

Step 2: Explain the purpose of the devices


a. In Packet Tracer, only the Server-PT device can act as a server. Desktop or Laptop
PCs cannot act as a server. Based on your studies so far, explain the client-server model.

In the client-server model, networked computers are categorized into


two roles: clients and servers. Clients request services or resources from servers, while
servers provide those services or resources upon request. This model facilitates
distributed computing, where tasks are divided between machines, typically with more
powerful and specialized servers handling requests from multiple clients. Servers are
configured to provide specific services such as file storage, web hosting, or database
management, while clients, such as desktop or laptop PCs, interact with these servers to
access the desired resources or services. This architecture promotes scalability,
efficiency, and centralized management of resources in networked environments.

b. List at least two functions of intermediary devices.

1. Routing: Intermediary devices such as routers analyze incoming


network traffic, determine the optimal path for data packets to reach their
destination based on routing tables, and forward them accordingly. Routing ensures
efficient data transmission across complex network topologies by directing packets along
the most efficient paths, thereby minimizing latency and maximizing network
performance.

2. Switching: Switches are intermediary devices that operate at the data


link layer of the OSI model and are responsible for forwarding data frames within a
local area network (LAN). They use MAC addresses to determine the destination of
incoming frames and forward them only to the appropriate port connected to the
destination device, thereby reducing network congestion and improving data
transmission efficiency within LANs.

Step 3: Compare and contrast LANs and WANs.

Questions:

a. Explain the difference between a LAN and a WAN. Give examples of each.
In the Packet Tracer network, how many WANs do you see?
A Local Area Network (LAN) is a network that typically covers a small
geographical area such as a single building, office, or campus. LANs are used to connect
devices like computers, printers, and servers within a confined space to facilitate
communication and resource sharing. Ethernet and Wi-Fi are common technologies used
in LANs. Examples of LANs include the network within a home, office building, or
university campus.

Conversely, a Wide Area Network (WAN) covers a larger geographic area, often
spanning cities, countries, or continents. WANs connect multiple LANs and other types of
networks over long distances, enabling communication and resource sharing across vast
areas. Various technologies like leased lines, satellite links, and fiber optics are used in
WANs. The Internet is the largest example of a WAN, connecting networks globally.
Additionally, corporate WANs connecting multiple branch offices or telecommunications
networks operated by service providers are common examples.

As for the number of WANs in a Packet Tracer network, it depends on the


specific topology being simulated. WAN connections in Packet Tracer might be
represented by simulated links such as serial connections between routers, DSL
connections, or cable connections between different geographical locations. Without
specific details about the Packet Tracer network in question, it's challenging to determine
the exact number of WANs present.

b. How many LANs do you see?

To determine the number of LANs in this activity, you would need to identify
distinct groups of interconnected devices within confined areas. Each group of devices
connected within a localized area, such as within a single building, office, or campus,
would constitute a LAN.

c. The internet in this Packet Tracer network is overly simplified and does not represent the
structure and form of the real internet. Briefly describe the internet.

The Internet is a vast global network that connects millions of devices


worldwide, allowing them to communicate and share information. It comprises a complex
infrastructure of interconnected networks, including private, public, academic, business,
and government networks. At its core, the Internet operates on a decentralized
architecture based on the TCP/IP protocol suite. It relies on a hierarchical system of
Internet Service Providers (ISPs), network infrastructure such as routers and switches, and
various transmission technologies like fiber optics, satellites, and wireless connections to
facilitate data transmission across vast distances. Additionally, the Internet incorporates
numerous services and protocols, including the World Wide Web, email, file transfer,
streaming media, and online gaming, making it a diverse and dynamic platform for
communication, collaboration, and information exchange on a global scale.

d. What are some of the common ways a home user connects to the internet?

1. DSL (Digital Subscriber Line): DSL utilizes existing telephone lines to provide
high-speed Internet access. It allows simultaneous use of the phone line for voice calls
while accessing the Internet.

2. Cable Internet: Cable Internet uses the same coaxial cable infrastructure as
cable television to deliver high-speed Internet access. It provides faster speeds compared
to DSL and is widely available in urban and suburban areas.
3. Fiber Optic Internet: Fiber optic Internet uses optical fibers to transmit data
using light signals. It offers extremely fast and reliable Internet connections but may be
less common and more expensive in some areas.

4. Wireless (Wi-Fi): Many home users connect to the Internet via wireless
technologies such as Wi-Fi. A wireless router connected to a wired Internet connection
(e.g., DSL or cable modem) broadcasts a Wi-Fi signal that allows devices like
smartphones, laptops, and tablets to connect to the Internet wirelessly.

5. Satellite Internet: In rural or remote areas where DSL, cable, or fiber optic
connections are unavailable, satellite Internet may be an option. It utilizes satellites in
orbit to provide Internet access to users, although it may have higher latency and slower
speeds compared to other options.

These are some of the common ways home users connect to the Internet, each with its
own advantages and limitations based on factors such as availability, speed, reliability,
and cost.

e. What are some common methods that businesses use to connect to the internet in your
area?

In Cebu City, as in many urban areas, businesses have access to a variety of


methods for connecting to the Internet. Some common methods include:

1. Fiber Optic Internet: Many businesses in urban areas like Cebu City have
access to high-speed fiber optic Internet connections. Fiber optic technology offers fast
and reliable Internet access, making it suitable for businesses with high bandwidth
requirements.

2. Ethernet Leased Line: Businesses may opt for dedicated Ethernet leased lines
provided by Internet Service Providers (ISPs). These leased lines offer symmetric
bandwidth (equal upload and download speeds) and high reliability, making them
suitable for businesses with critical connectivity needs.

3. Metro Ethernet: Metro Ethernet services provide high-speed Ethernet


connectivity within a metropolitan area like Cebu City. It allows businesses to connect
multiple locations or offices within the city to a single network, facilitating efficient
communication and data sharing.

4. Wireless Point-to-Point (PtP) or Point-to-Multipoint (PtMP) Connections: Some


businesses may use wireless technologies such as microwave or Wi-Fi to establish
dedicated connections between their locations or to connect to Internet Service
Providers.

5. Virtual Private Networks (VPNs): Businesses often use VPNs to securely


connect their local networks to the Internet or to connect remote employees to the
company network. VPNs encrypt data traffic over the Internet, ensuring privacy and
security.

6. Satellite Internet: In areas where terrestrial options are limited, businesses


may use satellite Internet connections. Satellite Internet can provide reliable
connectivity, although it may have higher latency compared to other methods.

These are some common methods that businesses in Cebu City may use to
connect to the Internet, each offering different advantages in terms of speed, reliability,
scalability, and cost. The choice of method depends on factors such as the business's
specific requirements, budget, and the availability of infrastructure in the area.

Challenge Question

Now that you have had an opportunity to explore the network represented in this Packet Tracer
activity, you may have picked up a few skills that you would like to try out. Or maybe you would
like the opportunity to explore this network in more detail. Realizing that most of what you see
and experience in Packet Tracer is currently beyond your skill level, here are some challenges you
might want to attempt. Do not worry if you cannot do them all. You will be a Packet Tracer master
user and network designer soon enough.

• Add an end device to the topology and connect it to one of the LANs with a media
connection. What else does this device need to send data to other end users? Can you
provide the information?

In addition to the components mentioned earlier, the end device also needs
appropriate network protocols and software applications to send data to other end
users. These include:

TCP/IP Stack: The Transmission Control Protocol/Internet Protocol (TCP/IP) stack


is a set of networking protocols that govern how data is transmitted and received over
the internet. It includes protocols like TCP (Transmission Control Protocol) for reliable
data transmission and IP (Internet Protocol) for addressing and routing.

Networking Software: The device needs networking software to handle tasks


such as packet routing, addressing, and error detection. This software could be part of
the operating system or installed as separate applications.

Network Applications: Depending on the type of data the device needs to send,
it may require specific network applications. For example, if the device needs to send
emails, it would require an email client application. Similarly, for web browsing, it would
need a web browser application.

Firewall and Security Software: To protect the device and its data from
unauthorized access and malicious threats, it's important to have firewall and security
software installed. This software helps monitor incoming and outgoing network traffic
and can block or allow traffic based on predefined rules.

Driver Software: If the device uses specialized hardware components (such as a


network adapter), it will need driver software to facilitate communication between the
hardware and the operating system.

Authentication Credentials: In some cases, the device may need authentication


credentials (such as usernames and passwords) to access certain network resources or
services.

These additional components and configurations ensure that the end device is
equipped to effectively communicate and share data with other end users on the
network.
• Is there a way to verify that you correctly connected the device?

Yes, there are several ways to verify if a device is correctly connected:

Physical Inspection: Ensure that all cables are securely plugged into their
respective ports on both the device and the connecting hardware (like a computer or a
router). Check for any loose connections or damage to cables.

Device Status Lights: Many devices have indicator lights that show their status.
For example, a network device might have lights indicating power, network activity, and
connection status. Refer to the device's manual to understand what each light
represents and verify that they indicate a successful connection.

Device Manager (for computers): In Windows, you can open Device Manager to
see a list of connected devices. Look for the device you've connected and ensure it's
listed without any warning icons (like a yellow exclamation mark). This indicates that the
device is recognized and functioning properly.

System Preferences (for Mac): On a Mac, you can check System Preferences >
Network to see if your device appears in the list of network connections.

Software Verification: For certain types of devices, you may need to install
drivers or software to enable them to work properly. Check the manufacturer's website
for any necessary software, and ensure it's installed correctly.

Functionality Test: Finally, test the functionality of the device to ensure it's
working as expected. For example, if it's a printer, try printing a test page. If it's a
network device, try accessing it from another device on the network.

By following these steps, you can verify that a device is correctly connected and
functioning as intended.

• Add a new intermediary device to one of the networks and connect it to one of the LANs
or WANs with a media connection. What else does this device need to serve as an
intermediary to other devices in the network?

When adding a new intermediary device, such as a router or switch, to a network and
connecting it to one of the LANs (Local Area Networks) or WANs (Wide Area Networks),
there are several additional configurations and considerations to ensure it can effectively
serve as an intermediary to other devices in the network:

1. IP Address Assignment: The intermediary device needs to be assigned an IP


address within the network's addressing scheme. This can be done manually by
configuring a static IP address or dynamically through DHCP (Dynamic Host
Configuration Protocol).

2. Routing Configuration (for routers): If the intermediary device is a router, it


needs to be configured with routing protocols or static routes to enable
communication between different networks. This ensures that packets are
forwarded to the appropriate destinations across the network.

3. VLAN Configuration (if applicable): If the network uses VLANs (Virtual Local Area
Networks) to segment traffic, the intermediary device may need to be
configured to support VLAN tagging and routing between VLANs.

4. Security Configuration: Implement appropriate security measures such as access


control lists (ACLs), firewall rules, and encryption protocols to protect the
network and its devices from unauthorized access and malicious activities.

5. Quality of Service (QoS) Configuration: Configure QoS settings to prioritize


certain types of traffic over others, ensuring that critical applications receive
sufficient bandwidth and network resources.

6. Monitoring and Management: Set up monitoring tools and management


interfaces to monitor the performance and health of the network, as well as to
troubleshoot any issues that may arise.

By addressing these additional configurations and considerations, the intermediary


device can effectively serve as a bridge or gateway between different devices and
networks in the overall network infrastructure.

• Open a new instance of Packet Tracer. Create a new network with at least two LANs
connected by a WAN. Connect all the devices. Investigate the original Packet Tracer
activity to see what else you might need to do to make your new network functional.

Record your thoughts and save your Packet Tracer file. You may want to revisit your
network later after you have mastered a few more skills.

You might also like