Blog

  • How to Implement DHCP for IPv4 and IPv6 Address Assignment on a Cisco Router

    Dynamic Host Configuration Protocol (DHCP) is a network management tool that automatically assigns IP addresses to devices on a network. By implementing DHCP on your Cisco router, you can simplify IP address management for both IPv4 and IPv6 networks. In this guide, we’ll walk you through the steps to configure DHCP for IPv4 and IPv6 address assignment on a Cisco router.


    Why Use DHCP?

    • IPv4 and IPv6 Address Management: Automates the assignment of IP addresses, reducing manual configuration errors.
    • Scalability: Easily supports growing networks with many devices.
    • Efficiency: Saves time and effort in managing IP addresses.
    • Centralized Control: Provides a single point of management for IP address allocation.

    Step 1: Access the Router’s CLI

    1. Connect to your router via console cable, Telnet, or SSH.
    2. Enter privileged EXEC mode:CopyRouter> enable Router#

    Step 2: Configure DHCP for IPv4

    1. Create a DHCP Pool

    1. Enter global configuration mode:
      Router# configure terminal
      Router(config)#
    2. Create a DHCP pool for IPv4:
      Router(config)# ip dhcp pool LAN_POOL
      Router(dhcp-config)#
      • Replace LAN_POOL with a name for your DHCP pool.

    2. Define the Network and Default Gateway

    1. Specify the network and subnet mask:
      Router(dhcp-config)# network 192.168.1.0 255.255.255.0
      • Replace 192.168.1.0 and 255.255.255.0 with your network details.
    2. Set the default gateway:
      Router(dhcp-config)# default-router 192.168.1.1
      • Replace 192.168.1.1 with your router’s interface IP address.

    3. Configure DNS Servers (Optional)

    1. Add DNS server addresses:
      Router(dhcp-config)# dns-server 8.8.8.8 8.8.4.4
      • Replace 8.8.8.8 and 8.8.4.4 with your preferred DNS servers.

    4. Exclude Reserved IP Addresses

    1. Exclude IP addresses from the DHCP pool (e.g., for static devices):
      Router(config)# ip dhcp excluded-address 192.168.1.1 192.168.1.10
      • Replace 192.168.1.1 and 192.168.1.10 with the range of addresses to exclude.

    Step 3: Configure DHCP for IPv6

    1. Enable IPv6 Routing

    1. Enable IPv6 routing on the router:
      Router(config)# ipv6 unicast-routing

    2. Create an IPv6 DHCP Pool

    1. Create a DHCP pool for IPv6:
      Router(config)# ipv6 dhcp pool LAN_POOL_IPV6 Router(config-dhcpv6)#
      • Replace LAN_POOL_IPV6 with a name for your IPv6 DHCP pool.

    3. Define the IPv6 Network and DNS

    1. Specify the IPv6 prefix:
      Router(config-dhcpv6)# address prefix 2001:db8::/64
      • Replace 2001:db8::/64 with your IPv6 network prefix.
    2. Add DNS server addresses:
      Router(config-dhcpv6)# dns-server 2001:4860:4860::8888
      • Replace 2001:4860:4860::8888 with your preferred IPv6 DNS server.

    4. Configure the Interface for IPv6 DHCP

    1. Enter interface configuration mode:
      Router(config)# interface GigabitEthernet0/0
      Router(config-if)#
    2. Enable IPv6 on the interface:
      Router(config-if)# ipv6 enable
    3. Assign an IPv6 address to the interface:
      Router(config-if)# ipv6 address 2001:db8::1/64
    4. Configure the interface to use the DHCP pool:
      Router(config-if)# ipv6 dhcp server LAN_POOL_IPV6

    Step 4: Verify the Configuration

    1. Exit configuration mode:
      Router(config-if)# exit
      Router(config)# exit
      Router#
    2. Verify the IPv4 DHCP pool:
      Router# show ip dhcp pool
    3. Verify the IPv6 DHCP pool:
      Router# show ipv6 dhcp pool

    Step 5: Test DHCP Functionality

    1. Connect a device to the network and check if it receives an IP address.
    2. Use the following commands to verify:
      • For IPv4:
        Router# show ip dhcp binding
      • For IPv6:
        Router# show ipv6 dhcp binding

    Step 6: Save the Configuration

    To ensure your changes persist after a reboot:

    Router# write memory

    or

    Router# copy running-config startup-config

    Conclusion

    Implementing DHCP for IPv4 and IPv6 address assignment on a Cisco router simplifies network management and ensures efficient IP address allocation. By following the steps outlined in this guide, you can configure DHCP to support both IPv4 and IPv6 networks, making your network more scalable and easier to manage.

    If you found this guide helpful, feel free to share it with your peers or leave a comment below with your thoughts or questions. Happy networking!

    About the Author:

    Ali Asad is a network engineer and tech enthusiast with a passion for sharing knowledge about networking, cybersecurity, and IT infrastructure. Follow [Your Blog/Social Media] for more tips and tutorials!

  • How to Configure and Verify Static Routes and Default Routes on a Cisco Router

    Static routes and default routes are essential components of network routing. They allow you to manually define paths for traffic to follow, ensuring efficient and reliable communication between networks. In this guide, we’ll walk you through the steps to configure and verify static and default routes on a Cisco router, along with tips for troubleshooting and best practices.


    What Are Static Routes and Default Routes?

    • Static Routes: Manually configured routes that define a specific path for traffic to reach a particular network.
    • Default Routes: A catch-all route used when no specific route is available for a destination. It’s often referred to as the “gateway of last resort.”

    Step 1: Access the Router’s CLI

    1. Connect to your router via console cable, Telnet, or SSH.
    2. Enter privileged EXEC mode:
      Router> enable
      Router#

    Step 2: Configure a Static Route

    1. Enter global configuration mode:
      Router# configure terminal
      Router(config)#
    2. Use the ip route command to configure a static route:
      Router(config)# ip route 192.168.2.0 255.255.255.0 10.0.0.2
      • 192.168.2.0 is the destination network.
      • 255.255.255.0 is the subnet mask.
      • 10.0.0.2 is the next-hop IP address (the router that will forward the traffic).

    Step 3: Configure a Default Route

    1. Use the ip route command with 0.0.0.0 0.0.0.0 to configure a default route:
      Router(config)# ip route 0.0.0.0 0.0.0.0 10.0.0.1
      • 0.0.0.0 0.0.0.0 represents any destination network.
      • 10.0.0.1 is the next-hop IP address.

    Step 4: Verify the Configuration

    1. Exit configuration mode:
      Router(config)# exit
      Router#
    2. Verify static routes:
      Router# show ip route static
    3. Verify default routes:
      Router# show ip route
      Look for a line that says S* 0.0.0.0/0 under the gateway of last resort.

    Step 5: Test Connectivity

    1. Use the ping command to test connectivity to the destination network:
      Router# ping 192.168.2.1
    2. Use the traceroute command to trace the path taken by packets:
      Router# traceroute 192.168.2.1

    Step 6: Save the Configuration

    To ensure your changes persist after a reboot:

    Router# write memory

    or

    Router# copy running-config startup-config

    Conclusion

    Configuring and verifying static routes and default routes on a Cisco router is a critical skill for network administrators. By following the steps outlined in this guide, you can ensure efficient traffic routing and maintain a reliable network. Whether you’re setting up a small office network or managing a large enterprise infrastructure, static and default routes are indispensable tools in your networking toolkit.

    If you found this guide helpful, feel free to share it with your peers or leave a comment below with your thoughts or questions. Happy routing!

    About the Author:

    Ali Asad is a network engineer and tech enthusiast with a passion for sharing knowledge about networking, cybersecurity, and IT infrastructure. Follow [Your Blog/Social Media] for more tips and tutorials!

  • How to Assign IPv4 and IPv6 Addresses to Router Interfaces

    Configuring IP addresses on router interfaces is a fundamental task for network administrators. Whether you’re setting up a new network or expanding an existing one, assigning both IPv4 and IPv6 addresses ensures compatibility with modern devices and future-proofs your infrastructure. In this guide, we’ll walk you through the steps to assign IPv4 and IPv6 addresses to router interfaces on a Cisco router.


    Why Assign Both IPv4 and IPv6 Addresses?

    • IPv4: Still widely used, but its address space is limited.
    • IPv6: Provides a vastly larger address space and is essential for the growing number of internet-connected devices.
    • Dual-Stack Configuration: Running both IPv4 and IPv6 on your router ensures compatibility with all devices and applications.

    Step 1: Access the Router’s CLI

    1. Connect to your router via console cable, Telnet, or SSH.
    2. Enter privileged EXEC mode:
      Router> enable
      Router#

    Step 2: Enter Interface Configuration Mode

    1. Enter global configuration mode:
      Router# configure terminal
      Router(config)#
    2. Select the interface you want to configure (e.g., GigabitEthernet0/0):
      Router(config)# interface GigabitEthernet0/0
      Router(config-if)#

    Step 3: Assign an IPv4 Address

    1. Assign an IPv4 address and subnet mask:CopyRouter(config-if)# ip address 192.168.1.1 255.255.255.0
      • Replace 192.168.1.1 with your desired IPv4 address and 255.255.255.0 with the appropriate subnet mask.
    2. Enable the interface:CopyRouter(config-if)# no shutdown

    Step 4: Assign an IPv6 Address

    1. Enable IPv6 on the interface:CopyRouter(config-if)# ipv6 enable
    2. Assign an IPv6 address and prefix length:
      Router(config-if)# ipv6 address 2001:db8::1/64
      • Replace 2001:db8::1/64 with your desired IPv6 address and prefix length.
    3. Enable the interface for IPv6:
      Router(config-if)# no shutdown

    Step 5: Verify the Configuration

    1. Exit configuration mode:
      Router(config-if)# exit
      Router(config)# exit
      Router#
    2. Verify the IPv4 configuration:
      Router# show ip interface brief
    3. Verify the IPv6 configuration:
      Router# show ipv6 interface brief

    Step 6: Save the Configuration

    To ensure your changes persist after a reboot:

    Router# write memory

    or

    Router# copy running-config startup-config

    Conclusion

    Assigning both IPv4 and IPv6 addresses to your router interfaces is a straightforward process that ensures your network is ready for today’s demands and future growth. By following the steps outlined in this guide, you can configure your router to support dual-stack networking, providing seamless connectivity for all devices.

    If you found this guide helpful, feel free to share it with your peers or leave a comment below with your thoughts or questions. Happy networking!

    About the Author:

    Ali Asad is a network engineer and tech enthusiast with a passion for sharing knowledge about networking, cybersecurity, and IT infrastructure. Follow [Your Blog/Social Media] for more tips and tutorials!

  • How to Configure a Cisco Router: Setting Hostname, Banners, and Basic Security Settings

    When it comes to managing a Cisco router, proper configuration is essential for both functionality and security. Whether you’re a network administrator or an IT enthusiast, understanding how to set up a router’s hostname, configure banners, and implement basic security settings is a fundamental skill. In this blog post, we’ll walk you through the steps to configure these settings on a Cisco router, ensuring your network is both organized and secure.


    Why Configure a Cisco Router?

    Before diving into the configuration steps, let’s briefly discuss why these settings matter:

    • Hostname: Assigning a unique hostname helps identify the router on the network, making management easier.
    • Banners: Banners provide important information or warnings to users attempting to access the router.
    • Basic Security Settings: Protecting your router from unauthorized access is critical to maintaining network integrity.

    Now, let’s get started!


    Step 1: Access the Cisco Router

    To begin, you’ll need to access the router’s command-line interface (CLI). You can do this via:

    • Console cable: Directly connect to the router using a console cable and a terminal emulator like PuTTY.
    • Telnet/SSH: If the router is already configured for remote access, use Telnet or SSH.

    Once connected, you’ll be prompted to enter privileged EXEC mode using the enable command:

    Router> enable
    Router#

    Step 2: Configure the Hostname

    The hostname is the name of your router, which is displayed in the CLI prompt. To set or change the hostname:

    1. Enter global configuration mode:
      Router# configure terminal
      Router(config)#
    2. Set the hostname using the hostname command:
      Router(config)# hostname MyRouter
      MyRouter(config)#
    3. Replace MyRouter with your desired hostname. The prompt will immediately reflect the new hostname.

    Step 3: Configure Banners

    Banners are messages displayed to users when they access the router. The most common banner is the Message of the Day (MOTD), which is shown to all users logging in.

    1. To configure the MOTD banner:
    2. MyRouter(config)# banner motd # Enter TEXT message. End with the character '#'. ****************************************** WARNING: Unauthorized access is prohibited! ****************************************** # MyRouter(config)#
    3. You can also configure other banners, such as:
      • Login Banner: Displayed before the username/prompt.
      • Exec Banner: Displayed after login but before the EXEC session starts.

    Step 4: Implement Basic Security Settings

    Securing your router is crucial to prevent unauthorized access and potential attacks. Here are some basic security configurations:

    1. Set a Strong Password for Privileged EXEC Mode

    MyRouter(config)# enable secret YourStrongPassword
    • Replace YourStrongPassword with a secure password. The enable secret command encrypts the password.

    2. Secure Console Access

    MyRouter(config)# line console 0
    MyRouter(config-line)# password ConsolePassword
    MyRouter(config-line)# login
    MyRouter(config-line)# exit
    • Replace ConsolePassword with a strong password for console access.

    3. Secure VTY (Remote Access) Lines

    MyRouter(config)# line vty 0 4
    MyRouter(config-line)# password VTYPassword
    MyRouter(config-line)# login
    MyRouter(config-line)# transport input ssh
    MyRouter(config-line)# exit
    • Replace VTYPassword with a strong password.
    • The transport input ssh command ensures only SSH is used for remote access, which is more secure than Telnet.

    4. Encrypt All Passwords

    To ensure all passwords are stored in an encrypted format:

    MyRouter(config)# service password-encryption

    If passwords are stored in plain text, anyone with access to the configuration file (e.g., via show running-config or show startup-config) can easily read them. Encrypting passwords ensures that even if someone gains access to the configuration, they cannot decipher the passwords.

    5. Disable Unnecessary Services

    Disable services that are not needed to reduce the attack surface:

    MyRouter(config)# no ip http server
    MyRouter(config)# no ip http secure-server
    MyRouter(config)# no cdp run

    Running the commands no ip http serverno ip http secure-server, and no cdp run on a Cisco router is part of a security hardening process. These commands disable certain services that are either unnecessary or pose potential security risks.


    Step 5: Save Your Configuration

    After making these changes, save the configuration to ensure they persist after a reboot:

    MyRouter# write memory

    or

    MyRouter# copy running-config startup-config

    Conclusion

    Configuring a Cisco router’s hostname, banners, and basic security settings is a critical step in setting up a secure and manageable network. By following the steps outlined in this guide, you can ensure your router is properly identified, displays appropriate warnings, and is protected against unauthorized access.

    Remember, these are just the basics. As your network grows, consider implementing advanced security measures like access control lists (ACLs), firewalls, and regular firmware updates to keep your network safe and efficient.

    If you found this guide helpful, feel free to share it with your peers or leave a comment below with your thoughts or questions. Happy networking!


    About the Author:

    Ali Asad is a network engineer and tech enthusiast with a passion for sharing knowledge about networking, cybersecurity, and IT infrastructure. Follow [Your Blog/Social Media] for more tips and tutorials!

  • How to Add SSL to XAMPP for Secure HTTPS Access

    Adding SSL (Secure Sockets Layer) to XAMPP allows you to enable HTTPS for secure web communication. This guide will walk you through the process of configuring SSL in XAMPP on Windows.

    Step 1: Obtain an SSL Certificate

    To enable SSL, you need an SSL certificate. You can either:

    1. Generate a Self-Signed SSL Certificate (for local development).
    2. Obtain a Free SSL Certificate (from Let’s Encrypt or another CA).
    3. Purchase an SSL Certificate (for production use).

    Step 2: Place the SSL Certificate Files in XAMPP

    Once you have the required files, move them to the Apache SSL directory in XAMPP:

    📂 Path: C:\xampp\apache\ssl\

    Ensure you have the following files:

    • domain.crt → SSL certificate file
    • domain.key → Private key file
    • domain.ca-bundle (if applicable) → CA chain file

    Step 3: Configure Apache for SSL

    Now, configure Apache to use SSL by editing the httpd-ssl.conf file.

    📂 Open: C:\xampp\apache\conf\extra\httpd-ssl.conf

    Find the existing <VirtualHost _default_:443> section and replace or modify it with the following configuration:

    <VirtualHost *:443>
    DocumentRoot "C:/xampp/htdocs"
    ServerName domain.com:443

    SSLEngine On
    SSLCertificateFile "C:/xampp/apache/ssl/domain.crt"
    SSLCertificateKeyFile "C:/xampp/apache/ssl/domain.key"
    SSLCACertificateFile "C:/xampp/apache/ssl/domain.ca-bundle"

    <Directory "C:/xampp/htdocs">
    Require all granted
    AllowOverride All
    </Directory>
    </VirtualHost>

    Explanation of Configuration

    • DocumentRoot "C:/xampp/htdocs" → Sets the root folder for your website.
    • ServerName domain.com:443 → Specifies the domain name. Replace domain.com with your actual domain.
    • SSLEngine On → Enables SSL.
    • SSLCertificateFile → Path to the SSL certificate.
    • SSLCertificateKeyFile → Path to the private key.
    • SSLCACertificateFile → Path to the certificate authority (CA) bundle (only if required).

    💡 Tip: Use forward slashes (/) in paths to avoid Apache errors.

    Step 4: Enable SSL Module in XAMPP

    Before restarting Apache, ensure SSL is enabled in XAMPP:

    1️⃣ Open C:\xampp\apache\conf\httpd.conf.
    2️⃣ Find and uncomment (remove #) the following lines:

    LoadModule ssl_module modules/mod_ssl.so
    Include conf/extra/httpd-ssl.conf

    Step 5: Restart Apache

    After making the changes:

    1. Open XAMPP Control Panel
    2. Click Stop on Apache
    3. Click Start on Apache

    If everything is configured correctly, Apache should start without errors.


    Step 6: Access Your Website with HTTPS

    Now, open your browser and enter:

    https://domain.com

    If using a self-signed certificate, your browser may show a security warning. You can proceed by clicking “Advanced” → “Proceed Anyway” (for local development).


    Optional: Force Redirect HTTP to HTTPS

    To automatically redirect all HTTP traffic to HTTPS, edit your .htaccess file in C:/xampp/htdocs/ and add:

    RewriteEngine On
    RewriteCond %{HTTPS} !=on
    RewriteRule ^(.*)$ https://%{HTTP_HOST}/$1 [R=301,L]

    This ensures all visitors use HTTPS.


    Final Thoughts

    By following these steps, you have successfully enabled SSL on XAMPP for secure HTTPS access. This helps in testing secure applications before deploying them to a live server.

    🔹 Key Takeaways:

    ✅ XAMPP supports SSL for secure local development
    ✅ Configure Apache to use SSL certificates
    ✅ Enable HTTPS by modifying httpd-ssl.conf
    ✅ Redirect HTTP to HTTPS using .htaccess

  • How to configure Port Forwarding in pfsense

     

     
     

     

     

    Port Forwarding in pfsense

    • Used when hosting servers, or using applications that require inbound connections from the Internet.
    • CISCO Terminology = NAT Overload or PAT (Port Address Translation)
    • The firewall will allow any traffic matching corresponding firewall rules for NAT. (Security Concern)
    • A single port can only be forwarded to one internal host for each available public IP address.
    • Port forwards take precedence over services running locally on the firewall, such as the web interface, and SSH.
    • Port forwards also take precedence over 1:1 NAT.
    • Each port forward rule has a corresponding automatically generated firewall rule.
    • The Source of the automatically generated rule should be restricted where possible, especially for remote management services such as SSH, and RDP.

     Steps

    1. Configure IP Address in the Server in LAN 

    We need to assign IP address to the server that is attached to the LAN interface of the pfsense. In this tutorial we have assigned 192.168.1.1 at pfsense LAN interface and Windows Server 2019 is assigned 192.168.1.2

    2. Add Port Forward rule in NAT from Firewall menu

     
     
    Next click at Add to add a new Port Forward rule and select Destination as WAN Address, Destination port range as 8080 and Redirect target IP as 192.168.1.2 that is Windows Server IP Address
     

     

    and enter Redirect target port as 80 which is port at which Web Server listens in LAN.

     
     
    Click at Save button to save the rule and click at Apply Changes to apply it.
     
     Next we see that changes are applied successfully,
     
     
    As we have mentioned in the introduction that by default a firewall rule is also added against a Port Forward NAT rule. We can verify that by looking at firewall rules.
     
     
     

    3. Verify the Configurations

     
    Now can can test if the port forwarding works by browsing pfsense WAN IP with port 8080

  • Difference Between Hard Link and Soft Link (Symbolic Link) in Linux

    Creation:

    The ln utility is used to create hard links and (with the -s
    option) soft links, also known as symbolic links or symlinks. These two
    kinds of links are very useful in UNIX-based operating systems.

    Suppose that file1 already exists. A hard link, called file2, is created with the command:

    $ ln file1 file2

    Soft (or Symbolic) links are created with the -s option, as in:

    $ ln -s file1 file3

    Differences

    1. In case of Hard Links both files have same inode number as compare to Soft Links which have different inode numbers.
    2. Symbolic links take no extra space on the filesystem (unless their names
      are very long). They are extremely convenient, as they can easily be
      modified to point to different places. 
    3. Unlike hard links, soft links can point to objects even on different filesystems, partitions, and/or disks and other media, which may or may not be currently available or even exist. In the case where the link does not point to a currently available or existing object, you obtain a dangling link.

     

     

     

  • Turning off the Graphical Desktop in LINUX

    Linux distributions can start and stop the graphical desktop in
    various ways. The exact method differs from distribution and among
    distribution versions. For the newer systemd-based distributions, the
    display manager is run as a service, you can stop the GUI desktop with
    the systemctl utility and most distributions will also work with the telinit command, as in:

    $ sudo systemctl stop gdm (or sudo telinit 3)

    and restart it (after logging into the console) with:

    $ sudo systemctl start gdm (or sudo telinit 5)

    On Ubuntu versions before 18.04 LTS, substitute lightdm for gdm.

     

  • How to setup and use sudo

     

     

    1. At the command line prompt, type su and press Enter. You will then be prompted for the root password, so enter it and press Enter.
      You should end up with a different looking
      prompt, often ending with ‘#’. For example:

      $ su
      Password:
      #


    2. Now, you need to create a configuration file to enable your user account to use sudo. Typically, this file is created in the /etc/sudoers.d/ directory with the name of the file the same as your username. For example, for this demo, let’s say your username is student. After doing step 1, you would then create the configuration file for student by doing this:

      # echo “student ALL=(ALL) ALL” > /etc/sudoers.d/student


    3. Finally, some Linux distributions will complain if you do not also change permissions on the file by doing:
      # chmod 440 /etc/sudoers.d/student

    4. To enable sudo without password

      # echo “student ALL=(ALL) NOPASSWD:ALL” > /etc/sudoers.d/student
       
  • What is difference between init and systemd

    init is the first program that is executed when Linux system boots up. All other deamons are child process of this process. 

    • init program resides at root filesystem (/sbin/init). Most other processes on the system trace their origin ultimately to init. 
    • Besides starting the system, init is responsible for keeping the system running and for shutting it down cleanly.
    • One of its responsibilities is to act when necessary as a manager for all non-kernel processes

     Drawbacks of init

    • Unix SysV init viewed things as a serial process, divided into a
      series of sequential stages. Each stage required completion before the
      next could proceed. Thus, startup did not easily take advantage of the
      parallel processing
      that could be done on multiple processors or cores. 
    • Furthermore, shutdown and reboot was seen as a relatively rare event;
      exactly how long it took was not considered important. This is no longer
      true, especially with mobile devices and embedded Linux systems.
    • Its process ID (PID) is always 1.
    • Latest Linux distributions use systemd instead of init

    systemd was adopted as alternative to the init. 

    • Systems with systemd start up faster than those with earlier init
      methods. This is largely because it replaces a serialized set of steps
      with aggressive parallelization techniques, which permits multiple
      services to be initiated simultaneously.
    • /sbin/init now just points to /lib/systemd/systemd; i.e. systemd takes over the init process.