🏠 Main Page ⬅️ Previous Page

Building a Home Network: A Comprehensive Configuration Guide

Overview

This guide explains how to set up a secure, efficient home network using Cisco Packet Tracer, covering key concepts, security measures, and best practices.

Network Topology

Figure 1: Complete network topology showing router, switch, and end devices

The network consists of:

Network Addressing Scheme

Device Category IP Range Purpose
Infrastructure 192.168.0.1 - 192.168.0.99 Reserved for network devices (routers, switches)
Workstations 192.168.0.100 - 192.168.0.105 Desktop computers and FTP Server
Mobile Devices 192.168.0.106 - 192.168.0.112 Laptops, smartphones

Network Requirements Analysis

Requirement Implementation Purpose
Internet Connectivity WAN connection via ISP Provide internet access to all devices
Local Network Access LAN with DHCP Enable automatic device configuration
Wireless Access WPA2-secured WiFi Support mobile devices
File Sharing FTP Server Enable document sharing between devices
Network Security WPA2, IP segregation Protect network resources

Prerequisites

Required Tools

Required Knowledge

Pre-implementation Checklist

Task Status Notes
Verify Packet Tracer installation Required Version 8.2.2.0400 or higher
Prepare IP addressing scheme Required Use provided scheme or create custom
Gather device requirements Required List all devices to be connected

Configuration Steps

1. Basic Router Setup

Figure 2: Router console access and initial configuration

Configuration Checklist

Step Command/Action Verification
Access Router CLI Connect via console Router> prompt appears
Enter configuration mode configure terminal Router(config)# prompt
Configure WAN interface interface FastEthernet0/0 Check interface status
Configure LAN interface interface FastEthernet1/0 Check interface status

Router Configuration Template

! Basic Router Configuration Template
enable
configure terminal

! WAN Interface Configuration
interface FastEthernet0/0
 ip address 8.8.8.8 255.255.255.0
 no shutdown
 description WAN Interface
 
! LAN Interface Configuration
interface FastEthernet1/0
 ip address 192.168.0.1 255.255.255.0
 no shutdown
 description LAN Interface

! Save Configuration
end
write memory

Common Configuration Issues

Issue Possible Cause Solution
Interface down Missing 'no shutdown' Enter 'no shutdown' command
IP conflict Duplicate IP address Verify IP addressing scheme

2. DHCP Implementation

Figure 3: DHCP pool configuration

Figure 4: DHCP binding verification

DHCP Configuration Template

! DHCP Configuration Template
ip dhcp pool BLOB
 network 192.168.0.0 255.255.255.0
 default-router 192.168.0.1
 dns-server 8.8.8.8

! Exclude Static IP Addresses
ip dhcp excluded-address 192.168.0.1 192.168.0.99

! Verification Commands
show ip dhcp binding
show ip dhcp pool
show ip dhcp server statistics

DHCP Validation Checklist

Test Expected Result Troubleshooting
Client receives IP IP in correct range Check DHCP configuration
Gateway reachable Ping successful Verify default gateway
DNS resolution Names resolve Check DNS server setting

3. Connectivity Testing

Ping Testing

Figure 5: Ping tests between devices

Figure 6: Traceroute verification comparing existing IPs (8.8.8.8, 192.168.0.2) with a non-existent IP (192.168.0.104).

Internet Testing

Figure 7: Configuring DNS on the Internet Server with cisco.com and its IP.

Figure 8: Accessing cisco.com and its IP from Desktop and Laptop.

4. Wireless Security Implementation

Initial State (Before Security)

Initial Wireless Settings Default Security Settings

Figure 9: Initial state without WPA2 security, allowing automatic internet access.

Implementing WPA2 Security

  1. Access the Wireless Router configuration page
  2. Enable WPA2 Personal security mode
  3. Set PSK: secure123
  4. Apply the same settings on wireless clients
WPA2 Configuration Client WPA2 Settings

Figure 10: After enabling WPA2 security, a PSK is required for internet access.

5. File Sharing Setup

Setting Up the FTP Server

FTP Server Configuration

Figure 11: Enabling FTP on the server and configuring a user with a password.

Server Credentials:

File Transfer Example

  1. Create test file on Laptop1
  2. Upload file to FTP server:
  3. ftp 192.168.0.105
    username: cisco
    password: [enter password]
    put The_Clockmaker's_Secret.txt

    Figure 12: Creating a text and uploading it to the FTP server using Laptop1.

  4. Download file from another device:
  5. ftp 192.168.0.105
    username: cisco
    password: [enter password]
    get The_Clockmaker's_Secret.txt

Figure 13: Downloading the text from the FTP server using Smartphone0.

Network Maintenance

Regular Maintenance Tasks

Task Frequency Command/Action
Check DHCP leases Weekly show ip dhcp binding
Verify security settings Monthly show running-config

Figure 14: Example of Security Settings Verification.