This guide explains how to set up a secure, efficient home network using Cisco Packet Tracer, covering key concepts, security measures, and best practices.
Figure 1: Complete network topology showing router, switch, and end devices
The network consists of:
| Device Category | IP Range | Purpose |
|---|---|---|
| Infrastructure | 192.168.0.1 - 192.168.0.99 | Reserved for network devices (routers, switches) |
| Workstations | 192.168.0.100 - 192.168.0.105 | Desktop computers and FTP Server |
| Mobile Devices | 192.168.0.106 - 192.168.0.112 | Laptops, smartphones |
| Requirement | Implementation | Purpose |
|---|---|---|
| Internet Connectivity | WAN connection via ISP | Provide internet access to all devices |
| Local Network Access | LAN with DHCP | Enable automatic device configuration |
| Wireless Access | WPA2-secured WiFi | Support mobile devices |
| File Sharing | FTP Server | Enable document sharing between devices |
| Network Security | WPA2, IP segregation | Protect network resources |
| Task | Status | Notes |
|---|---|---|
| Verify Packet Tracer installation | Required | Version 8.2.2.0400 or higher |
| Prepare IP addressing scheme | Required | Use provided scheme or create custom |
| Gather device requirements | Required | List all devices to be connected |
Figure 2: Router console access and initial configuration
| Step | Command/Action | Verification |
|---|---|---|
| Access Router CLI | Connect via console | Router> prompt appears |
| Enter configuration mode | configure terminal | Router(config)# prompt |
| Configure WAN interface | interface FastEthernet0/0 | Check interface status |
| Configure LAN interface | interface FastEthernet1/0 | Check interface status |
! Basic Router Configuration Template enable configure terminal ! WAN Interface Configuration interface FastEthernet0/0 ip address 8.8.8.8 255.255.255.0 no shutdown description WAN Interface ! LAN Interface Configuration interface FastEthernet1/0 ip address 192.168.0.1 255.255.255.0 no shutdown description LAN Interface ! Save Configuration end write memory
| Issue | Possible Cause | Solution |
|---|---|---|
| Interface down | Missing 'no shutdown' | Enter 'no shutdown' command |
| IP conflict | Duplicate IP address | Verify IP addressing scheme |
Figure 3: DHCP pool configuration
Figure 4: DHCP binding verification
! DHCP Configuration Template ip dhcp pool BLOB network 192.168.0.0 255.255.255.0 default-router 192.168.0.1 dns-server 8.8.8.8 ! Exclude Static IP Addresses ip dhcp excluded-address 192.168.0.1 192.168.0.99 ! Verification Commands show ip dhcp binding show ip dhcp pool show ip dhcp server statistics
| Test | Expected Result | Troubleshooting |
|---|---|---|
| Client receives IP | IP in correct range | Check DHCP configuration |
| Gateway reachable | Ping successful | Verify default gateway |
| DNS resolution | Names resolve | Check DNS server setting |
Figure 5: Ping tests between devices
Figure 6: Traceroute verification comparing existing IPs (8.8.8.8, 192.168.0.2) with a non-existent IP (192.168.0.104).
Figure 7: Configuring DNS on the Internet Server with cisco.com and its IP.
Figure 8: Accessing cisco.com and its IP from Desktop and Laptop.
Figure 9: Initial state without WPA2 security, allowing automatic internet access.
Figure 10: After enabling WPA2 security, a PSK is required for internet access.
Figure 11: Enabling FTP on the server and configuring a user with a password.
Server Credentials:
ftp 192.168.0.105 username: cisco password: [enter password] put The_Clockmaker's_Secret.txt
Figure 12: Creating a text and uploading it to the FTP server using Laptop1.
ftp 192.168.0.105 username: cisco password: [enter password] get The_Clockmaker's_Secret.txt
Figure 13: Downloading the text from the FTP server using Smartphone0.
| Task | Frequency | Command/Action |
|---|---|---|
| Check DHCP leases | Weekly | show ip dhcp binding |
| Verify security settings | Monthly | show running-config |
Figure 14: Example of Security Settings Verification.