Latest Entries »

Configure RIP in Packet Tracer

Configure the interfaces as shown in the diagram:

RIP layout

Configure Router 1:

Router(config)#router rip

Router(config-router)#version 2

Router(config-router)#network 10.0.0.0

Router(config-router)#network 11.0.0.0

Router(config-router)#^Z                              [ctrl+Z  or  end]

Router#wr

Building configuration…

[OK]

Router#

Configure Router 0:

Similar as above with networks 11.0.0.0, 12.0.0.0 and 13.0.0.0

Configure Router 2:

Similar as above with networks 12.0.0.0 and 14.0.0.0

Configure Router 3:

Similar as above with networks 13.0.0.0 and 15.0.0.0

Configure the PC terminals as shown.

Start pinging from PC command prompt.

Tips:

Use show ip protocols for verifying RIP.

Use show ip route to check for routes.

Other useful commands:

Router(config)#no router rip Turns off the RIP routing process
Router(config-router)#no network a.b.c.d Removes network a.b.c.d from the RIP routing process
Router(config-router)#timers basic 30 90 180 270 Changes timers in RIP (in seconds): 30 = Update timer; 90 = Invalid timer; 180 = Hold-down timer; 270 = Flush timer
Router#debug ip rip Displays all RIP activity in real time
Router#show ip rip database Displays contents of the RIP database
Advertisements

Edit the configuration file:
#  vim  /etc/httpd/conf/httpd.conf
Press ‘shift+g‘ to go at the end of file, and add:

<Directory “/var/www/html”>
AuthType Basic
AuthName “Authorized Users only”
AuthUserFile  /etc/httpd/authpass
Require user user1 user2                     //add all usernames
</Directory>

 

#  htpasswd  -b  /etc/httpd/authpass [username]  [password]

#service httpd restart

http://127.0.0.1 (it will ask for username and password for accessing the website.)

OR edit  “/etc/hosts”, add

127.0.0.1                     http://www.abc.com

Access www.abc.com from browser.

You can create a simple webserver(without SSL) from here.

Create a certificate:

#  cd  /etc/pki/tls/certs

 

Create private key:

#  make  server.key

Enter the passphrase.

Remove passphrase from private key:

#  openssl  rsa  -in  server.key  -out  server.key

 

#  make  server.csr

Enter the relevant information for your certificate.

 

Create certificate:

#  openssl  x509  -in  server.csr  -out  server.crt  -req  -signkey  server.key  -days  365

#  chmod  400  server.*

 

Configure SSL:

 

#  yum  install  mod_ssl

 

#  vi  /etc/httpd/conf.d/ssl.conf

 

Edit line no. 77 & 78:

DocumentRoot            “/var/www/html”

ServerName                http://www.abc.com:443

 

Edit line no. 105:

SSLCertificateFile        /etc/pki/tls/certs/server.crt

 

Edit line no. 112:

SSLCertificateKeyFile              /etc/pki/tls/private/server.key

(Note: Private key is also present in “certs” directory, you can specify that one also or you can copy it in “private” directory.)

 

#  service httpd start

 

Now access https://www.abc.com from browser and install the certificate.(Map server name http://www.abc.com with ip address in “/etc/hosts”)