Time
15 hours 34 minutes
Difficulty
Intermediate
CEU/CPE
16

Video Description

IP Routing Lab This lesson introduces you to the concept of Inter VLAN Routing. You'll learn how to assign routers to specific VLANs each with a different/subnet mask. Afterwards, you can follow along with the videos in the CCNA course to gain and refine your hands on experience – HIGHLY recommended! PLEASE NOTE: Packet Tracer should be downloaded legally from it's property rights ownership, only.

Video Transcription

00:04
the next topic of discussion. It concerns routing Is router on a stick? Cisco likes to call this topic router on a stick. Much better term, in my opinion, is interval and routing.
00:16
So we're gonna do our interview and routing between router to here
00:22
and switch eight over hair. So between router to and switch eight. So this kind of looks like a round or sitting on a stick. That's why Cisco likes to call it rather on a stick
00:32
interview and routing is what we're actually doing.
00:35
So I'm going to put PC one and pc to in Network 10 10 10 0
00:41
slashed 24. I'm gonna assign PC one an I P. Address off 10 10 10 1 and pc to an I P address off. 10. 10 10 to pc one and two are going to be in villain 10
00:53
then pc three and P C. Four. I'm gonna put in Villa and 20
00:57
in the network. 2020 20 0 with PC three being 2020 23 PC for being 2020. 24 slash 24. The 10 network is also gonna have a slash 24 mask,
01:11
so let's go ahead and assign these species
01:14
their respective I p addresses.
01:17
So I go into the PC. By the way, guys, you guys can download a copy of packet tracer from the Internet. Just do a quick Google search for it. And then if you go to YouTube and watch a packet tracer tutorial, you guys can create their own this lab exactly as is at home,
01:37
and then do all these labs along with the video, which I highly recommend.
01:42
So I'm gonna go into PC one, do I pee configuration And the I P address is going to be 10 10 dot and, uh, one. My sub net master is going to be 255.255 dot through 55.0
02:00
pc to
02:00
same deal, but with an i p address off 10 dot Tenn dot turned up too
02:07
true. 55255255.0 Being the seven. That mask
02:14
PC three is going to be
02:16
$20.20 dollars, 20.3.
02:21
Again with the sub net master slashed 24
02:27
on the last P C P. C. Four
02:30
gonna sign it and the dress off $20.20 dollars 20.4 with the mass being 2552552550
02:42
Now
02:43
I'm gonna go to switch eight
02:46
and create well, and 10 and 20
02:50
need to maximize this. So I'm inside. I'll switch eight.
02:53
I'm going to create a villain,
02:55
Chen,
02:59
and
03:00
we can call it a name
03:02
accounting.
03:05
And I'm gonna create villain 20
03:07
so I can do the command villain 20 from the conflict villain mode and we'll just pop me into Bill and 20
03:15
and I'm going to call this name.
03:17
Let's call it the sales of the land
03:20
sales
03:22
exit out of here and check to see if my villains are there. So do show villain grief
03:30
on Well, and 10
03:31
and 20 are have been created and they are active.
03:36
Now
03:37
when I say I'm gonna put PC one and PC to in villain 10
03:42
as if we remember, that actually means
03:45
that the ports on which these P Cesaire connected the ports on the switch are going to be added to Dilantin.
03:52
So that's what puts PC one and PC to in Milan 10.
03:57
So it's hard difficult to see over here the ports, but I'm gonna tell you PC one is connected to port one and PC to is connected to zero slash to being poor, too.
04:08
So I'm gonna log into my switch again,
04:12
and I need to go to port one and poor to an Advil and 10 to port one and 42
04:18
Now, I could do this individually, or I haven't shown you this command previously.
04:25
You can do an interface Range Command
04:30
and do PC one and PC to simultaneously,
04:33
so I'm going to say interface range
04:35
fast Internet
04:38
zero slash 1-2 So the range is
04:44
port one and port to I could have said 1-24 then the range would have been port one to port 24. But at this time, I just need to configure port one and poor too,
04:55
and put them in, be land 10.
04:58
So first I tell Port one and poor, too,
05:01
that they're gonna be access ports
05:04
since they're connected to end devices and they're gonna be carrying only one villain and access port carries only one villain at a time. And then I'm going to say switch port
05:14
access.
05:15
Villain
05:16
Ken.
05:18
Now I'm going to go over to Port three and Port four,
05:24
where PC three and P C. Four are connected.
05:29
So I'm going to say interface range. Fascinating that zeroes. Last 3-4 and Advil and 22 Port three and four. Now can I say this from while being inside of conflict if range
05:42
or while being under this prompt? Of course I can. If I hit enter hair, it just pops me into port three and four.
05:48
Once again, I say switch port mode
05:53
access
05:55
making port three and four access ports and then switch port access Villain
06:01
20
06:02
I exit out of my range command and check my work. Do show villain brief. Make sure
06:11
so
06:12
Port one and two have been added to be Land 10
06:15
and poor three in Port four have been added to Villain 20
06:20
at this point,
06:24
PC one and PC to should be able to talk to each other and PC three and P C four should be able to talk to each other, so let's make sure that works.
06:34
Actually,
06:35
I need to make these ports go up
06:40
quickly.
06:42
So for all these ports, I'm going to say in the face rings you know, slash 1-4
06:48
in the face range. Fast Internet zero slash 1-4 and I'm gonna execute the spanning tree
06:57
court Fast command. Remember, guys, The Spanish report Fast command or the port fast peep feature
07:03
pops the port directly into fording without going through the 52nd spanning three convergence process from
07:13
blocking, which is 20 seconds to learning, which which is 2015 seconds to listening, which is 15 seconds. And then to fording the port goes directly to forging.
07:25
I saved my work
07:28
and now I'm gonna test connectivity between PC one and PC to.
07:33
So I go to my command, prompt. And I say paying 10 don't attend, attend to.
07:40
And you see that I'm getting a reply from
07:44
host
07:45
to do host to which is PC to So I got a reply from 10 9 10 9 10 dot too.
07:51
And then I go to p C three, go to his command, prompt
07:56
and then I paying $20. $20.20.4 which is P C four and I get a reply from p C four
08:09
now we'll pc one be able to ping p c three since PC one is in broadcast domain bill and 10 or a network. 10 10 10 0 slash 24 PC three is a network $20.20 dollars $20.0 slash 24 p. C. One is not going to be able to ping p C three or reach PC three
08:28
before I do that. If PC one can ping pc to Ken PC to ping p C. One off course it can.
08:35
Well, let's test it anyways
08:37
being 10 dot Tenn dot Tenn 10.0.0.1. So I'm on PC to and I'm pinging PC one and it works.
08:45
The reason it works is because remember, ICMP has two parts and echo and echo reply. So if PC one can Ping P C to B, C two has to send an echo reply, which means PC to camping PC one Also.
09:01
Now let's test out a ping between PC one and PC three,
09:05
so paying $20.2020 dollars. Three
09:09
and it is not going to work because
09:11
PC one and PC three are in two different broadcast domains. As you see it is timing out.
09:20
So now we need to set up interview and routing for this to function for PC one to be able to paying PC three or P C four or PC to to be able to paying PC three or P C four
09:33
so this link
09:35
between
09:35
switch eight,
09:37
Port 24 FAA zeros last 24 router to interface F zero slash one, or F ace Fast Internet zero slash one is going to be a trunk.
09:48
So we already know how to configure a trunk
09:52
on the sweet side.
09:54
So I'm gonna go into my port 24
09:58
by saying Interface
10:03
Fast Lieutenant zero slash 24
10:07
and I'm going to say switch port
10:09
trunk
10:11
encapsulation. Remember, we have to pick between 0.1 Q and I sl. Hence. This command exists, however, on switches. Nowadays, the only option that exists is not one cues on the real switch. If it's a new newer device, it's not going to contain this command.
10:28
However, since Packet tracer is a learning to and this command this part off your CCN exam, it still exists on packet tracer.
10:35
So I'm going to say switchboard trunk and consolation 0.1 Q.
10:39
Then I'm gonna make this a trunk switch, port mode,
10:45
trunk
10:46
and then I'm going to turn off DTP. Remember the automatic negotiation protocol
10:54
which automatically negotiates drunk ing between switches? Well, the other end off port 24
11:01
for switch a port 24. The other end is router to routers. Do not understand DTP anyways, so I might as well turn it off.
11:09
Switch port? No. Negotiate.
11:16
So if I look, do you show interface
11:20
fast it in a zero slash 24
11:24
switch ports? It should say that my negotiation of trunk ing is off. If I had not done the transport no negotiate command, this would have said on.
11:37
So the sweet side is done.
11:39
Now I go to the router end. Well,
11:41
not exactly Done.
11:45
Let me go into port. Fast. Internet zero slash 24. Remember, guys, by default,
11:52
all villains are allowed over the port.
11:54
If you see it's a strong king. Villains enabled all
11:58
I need to modify this list to just be land 10 and 20. Could I leave it like this? Yes. Is it best practice? No, that's too loose.
12:09
It's a security risk. So I'm going to say switch port
12:13
trunk
12:15
allowed.
12:16
Really, man
12:16
10 comma 20 just to allow villain 10 and 20 or that trump.
12:22
So if I look at my douceur interface faceted at zero slash 24 switch for command again.
12:31
Now this is
12:33
villains enabled just
12:35
10 and 20.
12:39
Okay, now we're just sending villains.
12:41
So before it says villains enabled all.
12:45
And now it says we lands enabled
12:48
10 and 20.
12:52
Okay, I'm done with the switch, and I will save my work.
12:56
Moving on to the router this is you see is interface facet in at zero slash one.
13:03
Go into outer too.
13:05
Maximize
13:09
going to config mode or global conflict Moved by saying configure terminal and I enter my fast Ethernet port zero slash one
13:20
by saying interface faceted at zero slash one.
13:24
And then I do a new shutdown on this port.
13:30
And then I said new I p address because there is not going to be an i p. Address
13:35
for this port.
13:39
Then I can put a description
13:45
on this port and say, trunk
13:48
two,
13:50
switch eight.
13:54
Now, how come I didn't put an I P address on that interface?
13:58
The reason being that I'm going to be creating sub interfaces. Little baby interfaces underneath the main interface.
14:05
So how do I can create a sub interface. I simply say interface
14:11
fast, Lieutenant, you know, slash one dot
14:16
And if I execute the help feature here by a pressing question mark,
14:20
I can pick any number between zero and this large number
14:26
for 294967295 actually, 4294967296 is two to the power 32. So 0 to 49 4967295 is actually 429496 79 6 Little tidbit for you Since this some interface is going to be carrying
14:43
villain 10
14:46
I'm just going to call it something to face 10.
14:48
Now, could I have called it something to face 9945? Of course I could have.
14:54
But as I said, since this sub interface is going to be carrying villain 10
15:01
I am going to
15:03
make it 0.10. I usually like matching my sub interface. I d.
15:07
In this case, it's not 10 with the villain is going to be carrying.
15:13
So at this point, if I say do show i p inter face brief,
15:20
you see that I have created the sub interface.
15:26
Next. If I trying to sign it an i p Address i p. Address
15:31
Tenn dot Tenn dot tend not to
15:35
2 54.2 54 being the last address in the $10.10 dollars $10.0 slash 24 range because the valid addresses go from 240.12 dot to 54
15:46
Let's see what happens if I try to assign it in a dress. Shouldn't let me.
15:52
So it says
15:54
basically well, let's read what it says configuring I p routing on a lance up interface is only allowed if that it's having two faces already configured as part of an IEEE it or two dot
16:04
one
16:06
or thio 2.10 or IEEE. It'll do that one. Q
16:11
or I sl villain. Basically, it's saying that unless this sub interface has already been made into a trunk
16:18
or has an encapsulation type off 82 dot
16:22
10 or it'll do 100.1 q r. I s l I'm not allowed to give it an I P address, so let's fix that
16:30
press in consolation
16:32
0.1 Q. 10. At this point, this sub interface is carrying Villain Tent.
16:40
I used my up arrow key
16:42
and bring up the I P. Address again, and at this point, it accepted that I p address.
16:48
So I simply picked the last possible I p address in the $10.10 dollars $10.0 slash 24 range and assigned it to this interface or sub interface. Next, I'm going to create a sub interface for villain 20.
17:04
So I simply used up Arrow Key to bring up the command interface fast. Internet zero slash 1.10
17:11
and I'm going to
17:14
make
17:15
turned the 10 into a 20
17:18
and at this point, you even see the logging message on my console. Say that something to face fast Internet zero slash wound up 20 has been created.
17:26
Next, I'm gonna make this sub interface carry villain 20
17:30
by saying encapsulation
17:33
0.1 Q 20. Next, I'm going to assign it an I P address out of the $20.20 dollars $20.0 slash 24 range,
17:45
which was villain 20.
17:47
So I'm going to say $20.20 dollars, $20 to 54 again, the last possible address in that range
17:55
and your slash 24 mask or 2552552550
18:03
I'm gonna say end,
18:04
save my work
18:07
and check to see if the sub interfaces have been created. So show
18:12
I p interface brief.
18:17
I hit Enter
18:18
and I see that my two sub interfaces have been created faceted at zero slash 1.10 and 20
18:26
and they have their respective eyepiece assigned.
18:30
Let me make sure the trunk has gone up
18:33
since I did a no *** on the main interface on router to the faceted zero slash one interface. This trunk on the switch should have gone up,
18:42
so let's make sure it has
18:45
sure interface trunk.
18:52
And you see that asked. Zito's last 24 is a trunk. The mode is on the encapsulation, is it? Oh, to that one. Q. And it is trunk ing and carrying Milan 10 and 20
19:04
Now. At this point will I be able to ping between PC one and PC three?
19:10
Let's find out
19:17
Ping, I'm on PC one and PC threes. I p addresses $20. 20 doc 20.3 And for some reason, it is not pinging still.
19:26
Well, we have one little bit of information missing from our PCs.
19:33
So let's go into PC one
19:37
and look at our I p configuration.
19:38
As you see that I left the default gateway
19:44
portion of this, I'd be configuration black. Now the default gateway off a device is your door out off your network, So PC one is a network. 10 10 10 zeroes Last 24. To go out, I need to go through a door to get to other networks.
20:00
That door we created on Router to
20:06
this sub interface Faceted at zero slash 1.10 that is the Door PC one and PC to Orville and 10 or network. $10.10 dollars $10.0 slash 24 will use to get out to other networks. So I need to assign
20:23
PC one and PC to a default gateway of 10 10 10
20:26
to 54
20:29
So let's go to P C. One again.
20:33
Go to the I P configuration and type in 10 dot Tenn dot Tenn dot to 54
20:38
Same for PC to
20:42
so
20:44
Tenn dot Tenn dot Tenn dot to 54
20:51
Now PC three and P C four also need a default Gateway and their default Gateway on Router to is going to be
21:00
the sub interface that is carrying Villain
21:03
20
21:04
which is your 2020 $20.00
21:10
network or specifically, the $20.20 dollars 20.254 address
21:15
on sub interface Facet, innit? Judo slash one about 20.
21:19
So let's go and assign PC three and PC for a default. Gateway of $20.20 dollars, $20 to 54
21:30
and p c four A default gateway
21:34
off
21:36
2020 20 dot to 54
21:41
pc one should be able to ping p C. Three
21:44
since our interview and routing should be working
21:48
now. First, let's go to Router to and make sure so we check the trunk
21:53
on
21:56
switch eight. Now let's see
21:59
if router to has both Network 10 and Network 20 in its i p routing table.
22:04
Let's find out
22:07
So we execute the command show I P route
22:11
to look at our I p routing table. And remember, guys, the i p routing table. It's simply a table with a listing of destinations that are available to the router
22:21
I hit. Enter and you see the network 10 not 10 not 10 0
22:26
slashed, 24
22:29
is directly connected on fast Internet zero slash 1.10
22:33
and Network 20 is directly connected on fast Internet zero slash 1.20
22:40
This network 1 51 01 45.0 is directly connected to facet in a 00 That's our landside, the 1 51 1 45 0 network, the network between router one router to router to Ian right before with those four switches. So we're not paying attention to this right now.
22:56
We're only concerned with these two entries.
23:00
The sea at the very left hand corner simply means these are connected networks
23:07
at this point. Since we have both destinations in the i p routing table, the router knows how to route between them. If a destination is not available on the rowdy I P routing table, the router would simply drop the packet.
23:22
So let's find out if PC one can ping P C. Three.
23:26
Well, a good rule of thumb is before you paying
23:30
across your network from your network to another network. You should pin your your default gateway to find out that locally you have connectivity,
23:41
so let's paying 10 that tend tend to 54 which is the fast Internet zero slash one dot
23:48
10 interface on router to
23:52
and I Get a Reply.
23:55
So I'm going to attempt to paying across now to PC three, which is $20.20 dollars, $20 3
24:03
So the first pain failed
24:06
because of the our process. PC one wanted to ping p C. Three so Pc one created a packet with a source address off 10 dot Tenn dot Tenn 10.0.0.1 and a destination address off 2020 20 that three,
24:21
then PC one send out in our broadcast requesting the Mac address of PC three.
24:27
However, since routers run proxy are on all that fast Internet interfaces or Ethan that interfaces period
24:34
router to
24:37
sent back its own Mac address to P C. One.
24:41
The Mac address reciting on f zero slash one.
24:45
Let's find out if that really happened.
24:48
So if I look at my our cash on this PC with command are minus a.
24:55
I see the physical address or the Mac address off. 10. Not 10 not 10 not 254 which is the Mac address reciting on F zero slash one.
25:04
So let's go find out if that is actually true.
25:08
So the address is 00 d zero d three b six
25:14
four b 02
25:17
Let's go to Ratter to
25:19
and say shoe
25:22
interface F zero slash one dot
25:26
Dr Ken
25:30
and you see this Mac address right here. This is going to be the same Mac address that's gonna be on f zero slash one. These these interfaces and sub interface is the main interface and its constituent. Some interfaces share a Mac address,
25:44
so
25:45
if I just simply say sure interface F zero slash one.
25:49
The Mac address here is 00 d zero d three b six
25:56
and on f zero slash one
25:59
sure interfaces of zero slash one. The main interface. You see the Mac address is the same 00 d zero
26:07
on the sub interface. Also, it was 00 d zero. Then it says d three b six b three b six
26:14
four B 0 to 4 B zero to and that is the same Mac address that was resolved on PC. One
26:23
00 d zero d. Three b 64 b 02
26:27
because router to send its own Mac address back to PC one because router to f zero slash one is running proxy art,
26:37
which is right
26:40
between the odd request and out replied between PC one and router to
26:45
this first ping timed out.
26:47
Now that the our cash has been created already, if I try the ping again, I should get 100% success rate.
26:57
If I trace
27:03
between PC one and PC three,
27:10
I see
27:11
that I go through. If I maximize this, I see that I go through peace router to F zero slash 1.10 and then I get to PC three.
27:23
So at this point, I should be able to ping from any PC to any PC. So let's try that.
27:30
Let's go to P C two
27:33
paying
27:34
20
27:37
Tween dot
27:37
2020 $20.3
27:41
and I can ping.
27:45
And
27:47
if I tried to ping from P C. Four to PC one, it should also ping. So if I'm paying
27:52
Tenn dot Tenn dot Tenn 0.0.0.1 from p C. Four with the source address 20.2020 dot for this should also work
28:04
now. What is happening in this case?
28:08
A detailed explanation is
28:11
PC one needs to ping PC Tree
28:15
PC one Creates and ICMP Echo Packet with source address. $10.10 dollars, 10.1 and destination at this 2022. 23
28:23
pc one that needs the Mac address for PC three to create
28:30
anything that frame for transmitting on the local data link between PC one and router to
28:37
so PC one ARPs for the Mac address off PC three and sends an art request, which is a broadcast.
28:45
The frame is sent.
28:47
The art frame receives, I mean, is received by the switch and forward it. Since it is a broadcast to out off all ports, the infinite frame
28:56
is received by the switch and ford it out off all ports in Villain 10. Since now, we have two virtual switches inside off the main physical device.
29:08
So
29:10
the odd request reaches Router to
29:12
which is also part of villain 10 on facet in at zero slash 1.10 and router to. Since it's running proxy out replies to PC one with its own Mac.
29:22
BC One receives router twos at zero slash one. Mac creates the Internet frame and sends it over to switch eight
29:32
Switch. It seems that this
29:34
frame belongs to Villain 10 inserts a 100.1 q Tag off villain 10 Inside of the frame and Fords it out off of zeros last 24 towards round or two
29:47
router to receives this frame on f zero slash 1.10.
29:52
Why? Because if you look at our running config, sure running config.
29:59
R f zero slash one
30:02
That 10 interface has encapsulation 100.1 Q. So this sub interface is going to receive frames from villain 10
30:10
so the frame goes inbound into outer two on fast Internet zero slash 1.10
30:17
rotter to receives the frame compares the destination Mac address in the frame with the Mac address on f zero slash one
30:25
0.10
30:26
and then, since it matches router router to discards the frame d encapsulate sit and extracts the original packet
30:33
next router to doesn't I? P. Routing table? Look up. So if we look at our round table with the show I p Route Command router to discovers the network 2020 $20.0 is directly connected on fast Internet zero slash 1.20
30:51
So rather too knows that it has to send
30:55
the packet out fast, Lieutenant
30:57
zero slash 1.20
31:00
Now, then router to needs to create
31:03
a frame and Internet frame for transmitting on the local data link between router to and PC three
31:12
router to, at this point sends out an art request requesting the Mac address that belongs to $20.20 dollars, $20 3
31:22
So router to
31:25
sends out our request. Host three replies back with its own Mac. So let's look at router. Choose
31:33
our table
31:33
with the show I P R. Command
31:37
and you see 29 29 20. That three has already been resolved. 000 B b E 85 754 This should be the Mac address sitting on PC three since PC three sent back and our reply
31:53
uni casted back to router to
31:56
router to has resolved PC threes i p. Address to its Mac address.
32:01
Let's check the Mac address on PC three
32:08
with the R minus a command
32:12
and you see
32:14
PC threes.
32:16
Actually, with the i p. Config.
32:21
Slash All command.
32:23
I think there's a space here
32:31
and you see PC three's Mac address is 000 b
32:37
be 85 754 the same address that exists on Router two's Our Cash
32:46
000 B b E 85 754
32:52
So at this point router to knows that it's going to be sending
32:57
this frame out off fast, sitting at zero slash 1.20
33:01
So router to builds the Internet frame with its own source. Mack with the Mack Address residing on F zero slash 1.20 and the destination Mac off PC three
33:14
router to also adds villain 20 tag into the frame and sends it over
33:22
to switch eight.
33:23
Switch eight receives
33:28
this frame on the trunk link between router to and router and switch eight, which is zero slash
33:36
as heroes last 24. Here we go zero slash 24 switch aid, then removes the tag and looks up at the Mac address in its Mac address table, which it should contain on Port three
33:51
Show, Mac
33:53
address table
33:58
and poor trees Not showing up yet. Let's paying ones so that the switch bills it's Mac address table. So paying
34:07
2020 $20 to 54
34:15
So now
34:15
the Mac address should be in switch eight. Mac address table
34:22
see on poor Tree
34:23
so
34:24
switch. It knows that Mac Ada's you know 00 b b e 85 754 is sitting on poor tree.
34:34
Switch eight. Removes the villain 20 tag and sends the frame over to PC three. P. C. Three Compares the destination Mac in the frame with its own Mac and finds that this frame is meant for itself.
34:47
Switch a PC three, then discards the frame. Dean Caps, relates it and extracts the original packet.
34:55
PC three, then compares the destination. I'd be in the packet with its own i p and since it matches
35:01
BC three cents back in the corps. Reply.
35:05
This concludes the router on a stick or interview and routing lecture.

Up Next

Cisco CCNA

Our free, online, self-paced CCNA training teaches students to install, configure, troubleshoot and operate LAN, WAN and dial access services for medium-sized networks. You'll also learn how to describe the operation of data networks.

Instructed By

Instructor Profile Image
Junaid Memon
Instructor