Skip to content

saicharen19-net/RIPv2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

Lab Summary: RIPv2 Configuration in Cisco Packet Tracer In this lab, I implemented and tested RIPv2 routing across a multi-router topology using Cisco Packet Tracer. Key configurations include:

  • ✅ Assigned hostnames to all devices as per the topology for clarity and identification.
  • ✅ Configured router interfaces with IP addresses aligned to the network diagram.
  • ✅ Assigned IP addresses to PCs to enable end-to-end connectivity.
  • ✅ Enabled RIPv2 on all routers to facilitate dynamic routing.
  • ✅ Applied passive interface on R3’s LAN port to prevent routing updates from being sent to internal hosts.
  • ✅ Introduced a Rogue router connected to the switch to simulate a security test—verifying that passive interfaces effectively hide internal routing information.

🔍 Skills Demonstrated:

  • Routing protocol configuration (RIPv2)
  • Passive interface security technique
  • IP addressing and subnetting
  • Network simulation and troubleshooting

🔍 Skills Demonstrated:

  • Routing protocol configuration (RIPv2)
  • Passive interface security technique
  • IP addressing and subnetting
  • Network simulation and troubleshooting

📊 Final Implementation Snapshot image

✅ Ping Test: End-to-End Connectivity Verification Shows successful ping between PCs across routers, confirming RIPv2 routing is operational. image

✅Rogue Router: show ip route Output Blocked by Passive Interface Demonstrates how passive interface configuration prevents internal route visibility to unauthorized devices. image

👨‍💻 Author Sai Charen

Skilled in Networking, Cisco Packet Tracer, and Enterprise IT Solutions.

About

Packet tracer lab that contains RIPv2, passive interface security.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published