/$$$$$$ /$$$$$$ /$$ /$$ /$$$$$$
/$$__ $$ /$$__ $$| $$$ | $$ /$$__ $$
| $$ \__/| $$ \__/| $$$$| $$| $$ \ $$
| $$ | $$ | $$ $$ $$| $$$$$$$$
| $$ | $$ | $$ $$$$| $$__ $$
| $$ $$| $$ $$| $$\ $$$| $$ | $$
| $$$$$$/| $$$$$$/| $$ \ $$| $$ | $$
\______/ \______/ |__/ \__/|__/ |__/
[ NETWORK & RESEARCH ]
|
|
|
In my CCNA journey, I utilize two distinct environments to master networking:
-
Cisco Packet Tracer (PT): Used for large-scale Enterprise topologies where I need to practice architectural design and multi-node routing (overcoming the node limits of virtual labs).
-
Cisco Modeling Labs (CML) + VMware: Used for High-Fidelity Labs. When a protocol requires real-world behavior, authentic IOSv commands, or complex OS-to-Network interaction (Linux/Windows), I migrate the core logic to CML.
Important
While Packet Tracer is excellent for learning basic CLI, it has limitations that only real IOS images and Linux Kernels can solve:
- Command Authenticity: CML runs real Cisco IOSv/IOSv-L2 images. Many advanced commands and sub-options missing in PT are fully functional here.
- The 5-Node Challenge: Working with the CML free/community version (limited to 5 nodes) forced me to be strategic. I design "surgical" labsβfocusing on the most critical parts of the network to observe real traffic flow and kernel-level reactions.
- Real OS Interaction: By connecting Linux VMs on VMware to CML routers, I troubleshoot real-world issues like Kernel Sysctl parameters, IPv6 RA behavior, and firewall interactions that a simulator simply cannot replicate.
Each folder represents one independent lab and contains:
- Lab Files: Packet Tracer files (
.pkt) for large topologies. - Visual Documentation: High-quality Screenshots of CML topologies and CLI outputs for high-fidelity labs.
- Lab-specific README with:
- Topology Description: Visual and text breakdown.
- Goal: What I aim to achieve/verify.
- Example Configuration: Key CLI snippets.
- Verification: Proof of connectivity or security enforcement (e.g., show commands, Wireshark captures).
- Troubleshooting Notes: Real-world issues encountered (e.g., Linux RA acceptance, interface states).
- L2 Security: MAC Flooding and DHCP Starvation using Kali Linux against real IOSvL2 images.
- IPv6 SLAAC Deep-Dive: Analyzing Linux host behavior and tuning
net.ipv6.conf.all.accept_rato ensure RA acceptance. - DHCP Snooping & IP Source Guard: Hardware-level security verification.
| LAB # | Topic & Objective | (CML) | Status | Difficulty |
|---|---|---|---|---|
| LAB 01 | Basic VLAN Configuration (Access Ports) | β | β Done | β |
| LAB 02A | VLAN Trunking (Default Trunk) | β | β Done | ββ |
| LAB 02B | VLAN Trunking (Allowed VLAN Restriction) | β | β Done | ββ |
| LAB 02C | (EXTRA) VLAN Trunking (Native VLAN mismatch) | β | β Done | βββ |
| LAB 03 | Inter-VLAN Routing (Router-on-a-Stick) | β | β Done | ββ |
| LAB 04 | DHCP | β | β Done | ββ |
| LAB 05(A) | STP | β | β Done | ββ |
| LAB 05B | STP Root Bridge | β | β Done | ββ |
| LAB 05C | STP PortFast & BPDU Guard | β | β Done | ββ |
| LAB 06 | Ethernet Channel & ASIC Hashing | β | β Done | βββ |
| LAB 07 | Static Routing | β | β Done | βββ |
| LAB 08 | Dynamic Routing (RIPv2) | β | β Done | βββ |
| LAB 9A | π Dynamic Routing (EIGRP - Feasible Successor) + BFD | β | β Done | ββββ |
| LAB 9B | Dynamic Routing (EIGRP - Unequal-Cost Load Balancing) | β | β Done | βββ |
| LAB 10A | Dynamic Routing (OSPF - Single Area) | β | β Done | βββ |
| LAB 10B | Dynamic Routing (OSPF - DR - BDR - DROTHER Election) | β | β Done | βββ |
| LAB 10C | Dynamic Routing (OSPF - Multi Area) | β | β Done | βββ |
| LAB 11A | π HSRP Enterprise Redundancy (PKT Optimized) | β | β Done | ββββ |
| LAB 11B | π HSRP Enterprise-Grade High Availability (CML more Optimized) | β | β Done | βββββ |
| LAB 12A | IPv6 Addressing & Basic Connectivity | β | β Done | ββ |
| LAB 12B | π IPv6 Basic Connectivity & Windows Stack Deep-Dive | β | β Done | ββββ |
| LAB 12C | π IPv6 SLAAC & Linux Kernel Behavior (CML FOCUSED) | β | β Done | ββββ |
| LAB 13 | IPv6 Static Routing | β | β Done | βββ |
| LAB 14 | π OSPFv3 | β | β Done | ββββ |
| LAB 15 (15.1 + 15.2) | π DHCPv6 Implement Stateless/Statefull (CML FOCUSED) | β | β Done | ββββ |
| LAB 16 | π IPv6 RA GUARD (CML FOCUSED) | β | β Done | ββββ |
| LAB 17 | π Hybrid DNS Infrastructure & Kali Linux Server (LINUX FOCUSED) | β | β Done | βββββ |
| LAB 18 | Standard ACL - Enterprise Traffic Engineering & Security Baseline | β | β Done | ββ |
| LAB 19 | Comprehensive NAT Architectures - Static, Dynamic & PAT | β | β Done | βββ |
| LAB 20 | π Advanced Network Security - Extended ACL & Service Hardening (LINUX FOCUSED) | β | β Done | βββββ |
| LAB 21 | π Enterprise Centralized Logging - Rsyslog, MariaDB & Web UI Hardening (LINUX FOCUSED) | β | β Done | ββββββ |
| LAB 22 | Infrastructure Hardening: Automated Syslog & Secure NTP Orchestration (LINUX FOCUSED) | β | β Done | βββ |
| LAB 23 | π Full-Stack Enterprise SNMPv3 Monitoring & Control (CML & LINUX FOCUSED) | β | β Done | βββββ |
| LAB 24 | β | β Done | ||
| LAB 25 | β | β Done |
Note: These labs focus on building large-scale networks to understand complex routing propagation and redundancy.
I don't just "input commands"; I analyze how data moves from the Application Layer of a real Linux OS down to the Cisco Silicon logic. This repository documents my transition from a student using simulators to a technician handling real-world network complexities.