| VLAN / Group | Users | Subnet ID | Subnet Mask | Gateway IP | IP Range |
|---|---|---|---|---|---|
| VLAN 40 (Stuffs) | 40 | 192.168.10.0 | 255.255.255.192 | 192.168.10.1 | .2 - .62 |
| VLAN 20 (Manager) | 30 | 192.168.10.64 | 255.255.255.224 | 192.168.10.65 | .66 - .94 |
| VLAN 10 (IT) | 20 | 192.168.10.96 | 255.255.255.224 | 192.168.10.97 | .98 - .126 |
| VLAN 30 (SR) | 15 | 192.168.10.128 | 255.255.255.224 | 192.168.10.129 | .130 - .158 |
| VLAN 50 (Servers) | 10 | 192.168.10.160 | 255.255.255.240 | 192.168.10.161 | .162 - .174 |
enable
configure terminal
interface gig0/0
no shutdown
interface gig0/0.10
encapsulation dot1Q 10
ip address 192.168.10.97 255.255.255.224
ip helper-address 192.168.10.162
exit
interface gig0/0.20
encapsulation dot1Q 20
ip address 192.168.10.65 255.255.255.224
ip helper-address 192.168.10.162
exit
interface gig0/0.30
encapsulation dot1Q 30
ip address 192.168.10.129 255.255.255.224
ip helper-address 192.168.10.162
exit
interface gig0/0.40
encapsulation dot1Q 40
ip address 192.168.10.1 255.255.255.192
ip helper-address 192.168.10.162
exit
interface gig0/0.50
encapsulation dot1Q 50
ip address 192.168.10.161 255.255.255.240
exit
enable
conf t
vlan 10
vlan 20
vlan 30
vlan 40
vlan 50
exit
interface fa0/1
switchport mode trunk
exit
interface range fa0/2 - 4
switchport mode trunk
exit
enable
conf t
vlan 10
vlan 20
exit
interface fa0/1
switchport mode trunk
exit
interface fa0/4
switchport mode trunk
exit
interface fa0/2
switchport mode access
switchport access vlan 10
exit
interface fa0/3
switchport mode access
switchport access vlan 20
exit
enable
conf t
vlan 30
vlan 40
exit
interface fa0/1
switchport mode trunk
exit
interface fa0/2
switchport mode access
switchport access vlan 40
exit
interface fa0/3
switchport mode access
switchport access vlan 30
exit
enable
conf t
vlan 50
exit
interface fa0/1
switchport mode trunk
exit
interface range fa0/2 - 3
switchport mode access
switchport access vlan 50
exit
DHCP+Email Server Static Setup:
DHCP Service Pools (Add Manually in Services Tab):
| Pool Name | Gateway | DNS Server | Start IP | Subnet Mask |
|---|---|---|---|---|
| IT_Pool (VLAN 10) | 192.168.10.97 | 192.168.10.163 | 192.168.10.98 | 255.255.255.224 |
| Mgr_Pool (VLAN 20) | 192.168.10.65 | 192.168.10.163 | 192.168.10.66 | 255.255.255.224 |
| SR_Pool (VLAN 30) | 192.168.10.129 | 192.168.10.163 | 192.168.10.130 | 255.255.255.224 |
| Stuff_Pool (VLAN 40) | 192.168.10.1 | 192.168.10.163 | 192.168.10.2 | 255.255.255.192 |
Go to Services tab on the DNS/HTTPS Server:
| Service | Configuration Detail |
|---|---|
| DNS (ON) |
Record: www.branch1.com -> 192.168.10.163Record: mail.branch1.com -> 192.168.10.162
|
| HTTP/HTTPS (ON) | Edit index.html to display: "Welcome to Branch 1 Enterprise Network" |
Go to Services tab on the DHCP/Email Server:
DHCP Pools:
| Pool Name | Gateway | DNS Server | Start IP | Subnet Mask |
|---|---|---|---|---|
| IT_Pool (VLAN 10) | 192.168.10.97 | 192.168.10.163 | 192.168.10.98 | 255.255.255.224 |
| Mgr_Pool (VLAN 20) | 192.168.10.65 | 192.168.10.163 | 192.168.10.66 | 255.255.255.224 |
| SR_Pool (VLAN 30) | 192.168.10.129 | 192.168.10.163 | 192.168.10.130 | 255.255.255.224 |
| Stuff_Pool (VLAN 40) | 192.168.10.1 | 192.168.10.163 | 192.168.10.2 | 255.255.255.192 |
Email Setup:
branch1.com (Click Set)it1, mgr1, sr1, stuff1 (Pass: 123)Follow these steps for every PC in the topology:
www.branch1.com. The welcome page should load.[username]@branch1.commail.branch1.commail.branch1.comNote: Ensure GigabitEthernet0/1 has NO IP address assigned to the physical interface before running this.
enable
configure terminal
interface gig0/1
no ip address
no shutdown
exit
interface gig0/1.60
encapsulation dot1Q 60
ip address 192.168.12.1 255.255.255.0
ip helper-address 192.168.10.162
exit
enable
configure terminal
vlan 60
name Floor2_Users
exit
interface fa0/1
switchport mode trunk
exit
interface range fa0/2 - 10
switchport mode access
switchport access vlan 60
exit
DHCP Server Pool (Manual Setup):
| Pool Name | Gateway | DNS Server | Start IP | Subnet Mask |
|---|---|---|---|---|
| Floor2_Pool | 192.168.12.1 | 192.168.10.163 | 192.168.12.2 | 255.255.255.0 |
Email Configuration for Floor 2 PCs:
For all PCs on ports fa0/2 through fa0/10:
192.168.12.x is assigned, verify you can ping the Gateway (192.168.12.1).This router acts as the gateway for all local VLANs and connects to the ISP and Central routers.
enable
configure terminal
hostname BUILDING1
# Interface Activation
interface gig0/0.10 (and .20, .30, .40, .50)
interface gig0/1.60
interface serial 0/3/0 (To ISP)
ip address 200.200.200.1 255.255.255.252
interface serial 0/3/1 (To Central)
ip address 203.203.203.1 255.255.255.252
# Routing Protocols
router ospf 1
network 192.168.10.0 0.0.0.255 area 0
network 192.168.12.0 0.0.0.255 area 0
network 200.200.200.0 0.0.0.3 area 0
network 203.203.203.0 0.0.0.3 area 0
router rip
version 2
network 192.168.10.0
network 192.168.12.0
network 200.200.200.0
network 203.203.203.0
no auto-summary
enable
configure terminal
hostname ISP_ROUTER
interface serial 0/3/0 (To B1)
ip address 200.200.200.2 255.255.255.252
interface serial 0/3/1 (To Central)
ip address 202.202.202.1 255.255.255.252
router ospf 1
network 200.200.200.0 0.0.0.3 area 0
network 202.202.202.0 0.0.0.3 area 0
router rip
version 2
network 200.200.200.0
network 202.202.202.0
no auto-summary
enable
configure terminal
hostname CENTRAL_ROUTER
interface serial 0/3/0 (To ISP)
ip address 202.202.202.2 255.255.255.252
interface serial 0/3/1 (To B1)
ip address 203.203.203.2 255.255.255.252
router ospf 1
network 202.202.202.0 0.0.0.3 area 0
network 203.203.203.0 0.0.0.3 area 0
router rip
version 2
network 202.202.202.0
network 203.203.203.0
no auto-summary
Test 1: Check Active OSPF Routes
Input: show ip route
# Expected Output Snippet:
O 192.168.10.0/24 [110/65] via 200.200.200.1
O 192.168.12.0/24 [110/65] via 203.203.203.1
Test 2: Check Background RIP Database
Input: show ip rip database
# Expected Output Snippet:
192.168.10.0/24 [1] via 203.203.203.1, Serial0/3/1
192.168.12.0/24 [1] via 203.203.203.1, Serial0/3/1
Test 3: Check OSPF Neighbors
Input: show ip ospf neighbor
# Expected Output Snippet:
Neighbor ID State Address Interface
203.203.203.1 FULL/ - 203.203.203.1 Serial0/3/1
202.202.202.2 FULL/ - 202.202.202.2 Serial0/3/0
To secure the Floor 2 network expansion (192.168.12.0/24), we implemented two specific levels of security filtering:
The following conditions define who can communicate with the Floor 2 devices and how:
| Source (User Group) | Destination | Logic / Condition | Ping Result | Web Result |
|---|---|---|---|---|
| VLAN 10 (IT) | Floor 2 | Total isolation from Floor 2 expansion. | Blocked | Blocked |
| VLAN 20 (Manager) | Floor 2 | Management access allowed, but web browsing restricted. | Allowed | Blocked |
| VLAN 30 (SR) | Floor 2 | Web browsing allowed, but network pings restricted. | Blocked | Allowed |
To demonstrate the ACL filtering logic (Ping vs. Browse), a dedicated Test Server was deployed on Floor 2. This requires specific configuration on both the new server and the existing DNS infrastructure.
Navigate to the Desktop > IP Configuration tab on the Floor 2 Server and apply the following:
| Setting | Value | Purpose |
|---|---|---|
| IP Address | 192.168.12.10 | Static IP on the Floor 2 Subnet |
| Subnet Mask | 255.255.255.0 | Class C Mask for Floor 2 |
| Default Gateway | 192.168.12.1 | Points to BUILDING1 Gig0/1.60 sub-interface |
| DNS Server | 192.168.10.163 | Points to the central DNS Server in VLAN 50 |
Navigate to the Services > HTTP tab on the Floor 2 Server:
index.html file to display: <h1>Floor 2 Secure Web Portal</h1>.To allow users to browse by name rather than IP, navigate to the VLAN 50 DNS Server (192.168.10.163) and add the following resource record:
Name: www.floor2.com
Type: A Record
Address: 192.168.12.10
Note: After adding the record, ensure the DNS service is toggled OFF and then ON again to refresh the database.
The following commands were executed on the Core Router to build and apply the security rules:
enable
configure terminal
# 1. Standard ACL: Blocks VLAN 10 Source from reaching Floor 2
access-list 10 deny 192.168.10.96 0.0.0.31
access-list 10 permit any
# 2. Extended ACL 120: Blocks Web (Port 80) for VLAN 20, allows Ping
access-list 120 deny tcp 192.168.10.64 0.0.0.31 192.168.12.0 0.0.0.255 eq 80
access-list 120 permit icmp 192.168.10.64 0.0.0.31 192.168.12.0 0.0.0.255
access-list 120 permit ip 192.168.10.64 0.0.0.31 any
# 3. Extended ACL 130: Blocks Ping for VLAN 30, allows Web (Port 80)
access-list 130 deny icmp 192.168.10.128 0.0.0.31 192.168.12.0 0.0.0.255
access-list 130 permit tcp 192.168.10.128 0.0.0.31 192.168.12.0 0.0.0.255 eq 80
access-list 130 permit ip 192.168.10.128 0.0.0.31 any
# 4. Applying the Logic to Router Interfaces
interface gig0/1.60
ip access-group 10 out
exit
interface gig0/0.20
ip access-group 120 in
exit
interface gig0/0.30
ip access-group 130 in
exit
To verify the ACLs, we use the show ip access-lists command. We can identify success by looking for Matches.
Verification Input: BUILDING1# show ip access-lists
Standard IP access list 10
10 deny 192.168.10.96 0.0.0.31 (8 matches)
20 permit any (24 matches)
Extended IP access list 120
10 deny tcp 192.168.10.64 0.0.0.31 192.168.12.0 0.0.0.255 eq www (4 matches)
20 permit icmp 192.168.10.64 0.0.0.31 192.168.12.0 0.0.0.255 (8 matches)
Extended IP access list 130
10 deny icmp 192.168.10.128 0.0.0.31 192.168.12.0 0.0.0.255 (4 matches)
20 permit tcp 192.168.10.128 0.0.0.31 192.168.12.0 0.0.0.255 eq www (2 matches)
How to Understand the Result: If a PC tries to send traffic that violates the rule, the packet hits the "deny" line and the "matches" counter increases. The packet is then dropped immediately. This proves the router is actively inspecting traffic headers at Layer 3 (IP) and Layer 4 (TCP/ICMP).
In this topology, Network Address Translation (NAT) serves as the security boundary between the private campus network (192.168.x.x) and the public infrastructure (ISP and Central Routers).
overload keyword, hundreds of internal hosts can share a single public IP simultaneously.Because BUILDING1 is connected to two different public entities (ISP and Central), NAT must be configured for multiple exit points. This ensures that regardless of which path a packet takes, its identity is protected.
| Zone Type | Interface | Description |
|---|---|---|
| Inside (LAN) | Gig0/0.10 - Gig0/1.60 | Trusted internal VLANs (192.168.10.0 & 12.0) |
| Outside (WAN 1) | Serial 0/3/0 | Link to ISP (200.200.200.0 network) |
| Outside (WAN 2) | Serial 0/3/1 | Link to Central Router (203.203.203.0 network) |
The following commands define the boundaries and enable the translation engine for both public exit paths:
enable
configure terminal
# 1. Define the Inside (Private) Sub-Interfaces
interface gig0/0.10
ip nat inside
interface gig0/0.20
ip nat inside
interface gig0/0.30
ip nat inside
interface gig0/0.40
ip nat inside
interface gig0/0.50
ip nat inside
interface gig0/1.60
ip nat inside
# 2. Define Both Outside (Public) Interfaces
interface serial 0/3/0
ip nat outside
interface serial 0/3/1
ip nat outside
# 3. Create Access List 1 to permit the internal networks
access-list 1 permit 192.168.10.0 0.0.0.255
access-list 1 permit 192.168.12.0 0.0.0.255
# 4. Enable NAT Overload for BOTH exit paths
ip nat inside source list 1 interface serial 0/3/0 overload
ip nat inside source list 1 interface serial 0/3/1 overload
# 5. Define Routing for Traffic Exit
ip route 0.0.0.0 0.0.0.0 serial 0/3/0
ip route 0.0.0.0 0.0.0.0 serial 0/3/1
To verify that NAT is functioning for both destinations, we monitor the translation table while pinging the Central Router IP (202.202.202.1).
Command: BUILDING1# show ip nat translations
Pro Inside global Inside local Outside local Outside global
icmp 203.203.203.1:10 192.168.10.15:10 202.202.202.1:10 202.202.202.1:10
Analysis: The Inside Global IP 203.203.203.1 proves that the router successfully translated the PC's private IP to the Serial 0/3/1 address when heading toward the Central Network. This confirms the multi-interface NAT logic is active.
This section provides realistic CLI commands and expected outputs for every major component in the Branch 1 topology. Use these during your presentation to prove that routing, NAT, ACLs, DHCP, Email, DNS, VLANs, and Floor 2 expansion are fully operational.
Command input:
Switch> enable Switch# show vlan brief
Expected output:
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8
10 IT active Fa0/2 (Room1), Fa0/3 (Room1)
20 Manager active Fa0/4 (Room1)
30 SR active Fa0/3 (Room2)
40 Stuffs active Fa0/2 (Room2)
50 Servers active Fa0/2, Fa0/3 (Server Floor)
60 Floor2_Users active Fa0/2 - Fa0/10 (Floor 2 Switch)
Command input:
BUILDING1# show ip route
Expected output:
Codes: L - local, C - connected, O - OSPF, R - RIP, S - static C 192.168.10.0/26 is directly connected, GigabitEthernet0/0.40 C 192.168.10.64/27 is directly connected, GigabitEthernet0/0.20 C 192.168.10.96/27 is directly connected, GigabitEthernet0/0.10 C 192.168.10.128/27 is directly connected, GigabitEthernet0/0.30 C 192.168.10.160/28 is directly connected, GigabitEthernet0/0.50 C 192.168.12.0/24 is directly connected, GigabitEthernet0/1.60 O 202.202.202.0/30 [110/65] via 200.200.200.2, 00:10:05, Serial0/3/0 O 203.203.203.0/30 [110/2] via 203.203.203.2, 00:00:12, Serial0/3/1 R 202.202.202.0/30 [120/2] via 200.200.200.2, 00:00:20, Serial0/3/0 (backup)
Command input:
BUILDING1# show ip nat translations
Expected output (active mapping):
Pro Inside global Inside local Outside local Outside global icmp 203.203.203.1:1024 192.168.10.98:1024 202.202.202.1:1024 202.202.202.1:1024 icmp 200.200.200.1:1050 192.168.10.66:1050 200.200.200.2:1050 200.200.200.2:1050 tcp 200.200.200.1:1080 192.168.10.130:49152 8.8.8.8:80 8.8.8.8:80
Command input (BUILDING1 Router):
BUILDING1# show ip access-lists
Expected output:
Standard IP access list 10 (Block VLAN10 from Floor2)
10 deny 192.168.10.96 0.0.0.31 (12 matches)
20 permit any (156 matches)
Extended IP access list 120 (VLAN20: Allow Ping, Block Web to Floor2)
10 deny tcp 192.168.10.64 0.0.0.31 192.168.12.0 0.0.0.255 eq www (6 matches)
20 permit icmp 192.168.10.64 0.0.0.31 192.168.12.0 0.0.0.255 (9 matches)
30 permit ip 192.168.10.64 0.0.0.31 any (45 matches)
Extended IP access list 130 (VLAN30: Allow Web, Block Ping to Floor2)
10 deny icmp 192.168.10.128 0.0.0.31 192.168.12.0 0.0.0.255 (5 matches)
20 permit tcp 192.168.10.128 0.0.0.31 192.168.12.0 0.0.0.255 eq www (4 matches)
30 permit ip 192.168.10.128 0.0.0.31 any (67 matches)
Command input (Floor 2 PC command prompt):
C:\> ipconfig /all
Expected output:
Host Name . . . . . . . . . : Floor2-PC1
DHCP Enabled . . . . . . . : Yes
DHCP Server . . . . . . . . : 192.168.10.162
IPv4 Address . . . . . . . : 192.168.12.2 (Preferred)
Subnet Mask . . . . . . . : 255.255.255.0
Default Gateway . . . . . : 192.168.12.1
DNS Servers . . . . . . . : 192.168.10.163
ip helper-address on Gig0/1.60 works.
Command input:
PC> nslookup www.branch1.com
Expected output:
Server: UnKnown Address: 192.168.10.163 Name: www.branch1.com Address: 192.168.10.163
Cross-VLAN DNS test (Floor2 Web Server):
PC> nslookup www.floor2.com
Server: UnKnown Address: 192.168.10.163 Name: www.floor2.com Address: 192.168.12.10
Email client configuration (Desktop → Email):
📧 Incoming Mail Server (POP3): mail.branch1.com (192.168.10.162) 📤 Outgoing Mail Server (SMTP): mail.branch1.com 👤 Username: it1 🔑 Password: 123 ✅ Status: Connected — Email sent from it1@branch1.com to mgr1@branch1.com successfully. ✅ Cross-VLAN Email: sr1@branch1.com → stuff1@branch1.com delivered successfully. ✅ Floor2 Email: Floor2 PC using it1@branch1.com receives emails from VLAN10.
From VLAN20 (Manager) to Floor2 Server:
C:\> ping 192.168.12.10
Reply from 192.168.12.10: bytes=32 time=2ms TTL=61
Reply from 192.168.12.10: bytes=32 time=2ms TTL=61 (Allowed: ACL 120 permits ICMP for VLAN20)
From VLAN30 (SR) to Floor2 Server:
C:\> ping 192.168.12.10
Request timed out.
Request timed out. (Blocked: ACL 130 denies ICMP for VLAN30)
From VLAN10 (IT) to Floor2 Server (Standard ACL Block):
C:\> ping 192.168.12.10
Request timed out.
Request timed out. (Blocked: Standard ACL 10 denies all traffic from VLAN10 to Floor2)
VLAN20 (Manager) browsing http://www.floor2.com:
❌ Connection refused / Timeout (Blocked by ACL 120 deny tcp eq 80 for VLAN20)
VLAN30 (SR) browsing http://www.floor2.com:
✅ HTTP/1.1 200 OK | Floor 2 Secure Web Portal (Permitted by ACL 130 permit tcp eq 80 for VLAN30)
VLAN10 (IT) browsing http://www.floor2.com:
❌ Destination unreachable (Blocked by Standard ACL 10 - total isolation)
Command input (BUILDING1 Router):
BUILDING1# show ip ospf neighbor
Expected output:
Neighbor ID Pri State Dead Time Address Interface 200.200.200.2 1 FULL/DR 00:00:35 200.200.200.2 Serial0/3/0 203.203.203.2 1 FULL/DR 00:00:32 203.203.203.2 Serial0/3/1
Command input:
BUILDING1# show ip rip database
Expected output:
192.168.10.0/24 auto-summary
192.168.12.0/24 auto-summary
202.202.202.0/30 directly connected, Serial0/3/0
[1] via 200.200.200.2, 00:00:20
203.203.203.0/30 directly connected, Serial0/3/1
[1] via 203.203.203.2, 00:00:18
Command input:
C:\> tracert 202.202.202.1
Expected output:
1 1 ms 1 ms 1 ms 192.168.10.65 2 2 ms 2 ms 2 ms 200.200.200.2 3 3 ms 3 ms 3 ms 202.202.202.1
On DHCP+Email Server (192.168.10.162):
netstat -an | find "25" TCP 0.0.0.0:25 0.0.0.0:0 LISTENING (SMTP Active) netstat -an | find "110" TCP 0.0.0.0:110 0.0.0.0:0 LISTENING (POP3 Active) netstat -an | find "67" UDP 0.0.0.0:67 *:* (DHCP Active)
On DNS+Web Server (192.168.10.163):
netstat -an | find "53" UDP 0.0.0.0:53 *:* (DNS Active) netstat -an | find "80" TCP 0.0.0.0:80 0.0.0.0:0 LISTENING (HTTP Active) netstat -an | find "443" TCP 0.0.0.0:443 0.0.0.0:0 LISTENING (HTTPS Active)
On Floor2 Web Server (192.168.12.10):
netstat -an | find "80" TCP 0.0.0.0:80 0.0.0.0:0 LISTENING (HTTP Active - Floor2 Portal)
Command input:
BUILDING1# show access-list 1
Expected output (NAT ACL):
Standard IP access list 1
10 permit 192.168.10.0 0.0.0.255 (2456 matches)
20 permit 192.168.12.0 0.0.0.255 (342 matches)
| Component | Verification Command | Expected Indicator | Status |
|---|---|---|---|
| VLANs | show vlan brief | VLAN 10,20,30,40,50,60 active | ✅ PASS |
| OSPF | show ip route ospf | O 202.202.202.0/30, O 203.203.203.0/30 | ✅ PASS |
| RIP | show ip route rip | R routes as backup (AD 120) | ✅ PASS |
| NAT/PAT | show ip nat translations | Inside global mapping to 200.200.200.1 & 203.203.203.1 | ✅ PASS |
| Standard ACL (VLAN10) | show access-list 10 | deny matches (VLAN10 to Floor2 blocked) | ✅ PASS |
| Extended ACL (VLAN20) | show access-list 120 | deny tcp matches (web blocked), permit icmp matches | ✅ PASS |
| Extended ACL (VLAN30) | show access-list 130 | deny icmp matches (ping blocked), permit tcp matches | ✅ PASS |
| DHCP Relay | ipconfig /all (Floor2 PC) | DHCP Server 192.168.10.162 | ✅ PASS |
| DNS (Local) | nslookup www.branch1.com | Address 192.168.10.163 | ✅ PASS |
| DNS (Floor2) | nslookup www.floor2.com | Address 192.168.12.10 | ✅ PASS |
| Email (SMTP/POP3) | Email client test | Send/Receive success across VLANs | ✅ PASS |
| HTTP Access (VLAN30) | Browser to www.floor2.com | 200 OK - Floor2 Portal | ✅ PASS |
| HTTP Block (VLAN20) | Browser to www.floor2.com | Connection refused | ✅ PASS |
| ICMP (VLAN20) | ping 192.168.12.10 | Reply received | ✅ PASS |
| ICMP Block (VLAN30) | ping 192.168.12.10 | Request timed out | ✅ PASS |
| OSPF Neighbors | show ip ospf neighbor | State FULL on both Serial interfaces | ✅ PASS |
| Floor2 DHCP Pool | show ip dhcp binding | 192.168.12.x addresses assigned | ✅ PASS |
| Purpose | Command | What to Look For |
|---|---|---|
| Show full routing table | show ip route | O (OSPF), R (RIP), C (Connected) |
| Show NAT translations | show ip nat translations | Inside Global vs Inside Local mapping |
| Show ACL hit counts | show access-lists | Match numbers on deny/permit lines |
| Show OSPF neighbors | show ip ospf neighbor | State FULL, Dead Time countdown |
| Show DHCP bindings | show ip dhcp binding | IP to MAC assignments |
| Test DNS resolution | nslookup www.floor2.com | Returns 192.168.12.10 |
| Test email manually | Email client send/receive | "Message sent successfully" |
| Verify interface status | show ip interface brief | Status up/up for all active ports |