Latest Entries »

Configure RIP in Packet Tracer

Configure the interfaces as shown in the diagram:

RIP layout

Configure Router 1:

Router(config)#router rip

Router(config-router)#version 2



Router(config-router)#^Z                              [ctrl+Z  or  end]


Building configuration…



Configure Router 0:

Similar as above with networks, and

Configure Router 2:

Similar as above with networks and

Configure Router 3:

Similar as above with networks and

Configure the PC terminals as shown.

Start pinging from PC command prompt.


Use show ip protocols for verifying RIP.

Use show ip route to check for routes.

Other useful commands:

Router(config)#no router rip Turns off the RIP routing process
Router(config-router)#no network a.b.c.d Removes network a.b.c.d from the RIP routing process
Router(config-router)#timers basic 30 90 180 270 Changes timers in RIP (in seconds): 30 = Update timer; 90 = Invalid timer; 180 = Hold-down timer; 270 = Flush timer
Router#debug ip rip Displays all RIP activity in real time
Router#show ip rip database Displays contents of the RIP database

Edit the configuration file:
#  vim  /etc/httpd/conf/httpd.conf
Press ‘shift+g‘ to go at the end of file, and add:

<Directory “/var/www/html”>
AuthType Basic
AuthName “Authorized Users only”
AuthUserFile  /etc/httpd/authpass
Require user user1 user2                     //add all usernames


#  htpasswd  -b  /etc/httpd/authpass [username]  [password]

#service httpd restart (it will ask for username and password for accessing the website.)

OR edit  “/etc/hosts”, add           

Access from browser.

You can create a simple webserver(without SSL) from here.

Create a certificate:

#  cd  /etc/pki/tls/certs


Create private key:

#  make  server.key

Enter the passphrase.

Remove passphrase from private key:

#  openssl  rsa  -in  server.key  -out  server.key


#  make  server.csr

Enter the relevant information for your certificate.


Create certificate:

#  openssl  x509  -in  server.csr  -out  server.crt  -req  -signkey  server.key  -days  365

#  chmod  400  server.*


Configure SSL:


#  yum  install  mod_ssl


#  vi  /etc/httpd/conf.d/ssl.conf


Edit line no. 77 & 78:

DocumentRoot            “/var/www/html”



Edit line no. 105:

SSLCertificateFile        /etc/pki/tls/certs/server.crt


Edit line no. 112:

SSLCertificateKeyFile              /etc/pki/tls/private/server.key

(Note: Private key is also present in “certs” directory, you can specify that one also or you can copy it in “private” directory.)


#  service httpd start


Now access from browser and install the certificate.(Map server name with ip address in “/etc/hosts”)