Cisco and Router Configuration and Chapter 1 Review

14.3.5 Parcel Tracer – Basic Router Configuration Review (Teacher Version)

14.3.5 Packet Tracer - Basic Router Configuration Review

14.iii.five Packet Tracer – Basic Router Configuration Review

Addressing Tabular array

Device Interface IP Accost / Prefix Default Gateway
R2 G0/0/0 x.0.4.ane /24 Northward/A
2001:db8:acad:4::1 /64
fe80::2:a
G0/0/1 10.0.5.1 /24
2001:db8:acad:5::i /64
fe80::two:b
S0/1/0 x.0.3.2 /24
2001:db8:acad:3::2 /64
fe80::1:c
S0/one/1 209.165.200.225 /xxx
2001:db8:feed:224::ane/64
fe80::ane:d
PC1 NIC 10.0.1.ten /24 10.0.1.1
2001:db8:acad:ane::10 /64 fe80::i:a
PC2 NIC 10.0.2.x /24 10.0.two.1
2001:db8:acad:2::ten /64 fe80::1:b
PC3 NIC x.0.4.x /24 ten.0.iv.1
2001:db8:acad:4::10 /64 fe80::2:a
PC4 NIC 10.0.5.x /24 10.0.five.1
2001:db8:acad:v::10 /64 fe80::ii:b

Objectives

Function i: Configure Devices and Verify Connectivity

  • Assign static IPv4 and IPv6 addresses to the PC interfaces.
  • Configure basic router settings.
  • Configure the router for SSH.
  • Verify network connectivity.

Function two: Brandish Router Information

  • Retrieve hardware and software information from the router.
  • Interpret the startup configuration.
  • Interpret the routing table.
  • Verify the status of the interfaces.

Background / Scenario

This activity requires you to configure the R2 router using the settings from the Addressing Tabular array and the specifications listed. The R1 router and the devices continued to it have been configured. This is a comprehensive review of previously covered IOS router commands. In Part 1, y'all will complete basic configurations and interface settings on the router. In Part 2, you will use SSH to connect to the router remotely and utilise the IOS commands to retrieve information from the device to answer questions well-nigh the router. For review purposes, this lab provides the commands necessary for specific router configurations.

Instructions

Part 1: Configure Devices and Verify Connectivity

Stride 1: Configure the PC interfaces.

a. Configure the IPv4 and IPv6 addresses on PC3 equally listed in the Addressing Table.

b. Configure the IPv4 and IPv6 addresses on PC4 as listed in the Addressing Tabular array.

Step 2: Configure the router.

a. On the R2 router, open a terminal. Move to privileged EXEC mode.

          Router> enable        

b. Enter configuration mode.

          Router# configure terminal        

c. Assign a device proper name of R2 to the router.

          Router(config)# hostname R2        

d. Configure c1sco1234 every bit the encrypted privileged EXEC style password.

          R2(config)#enable secret c1sco1234        

e. Set the domain name of the router to ccna-lab.com.

          R2(config)# ip domain-name ccna-lab.com        

f. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands equally though they were host names.

          R2(config)# no ip domain lookup        

one thousand. Encrypt the plaintext passwords.

          R2(config)# service countersign-encryption        

h. Configure the username SSHadmin with an encrypted password of 55Hadm!due north.

          R2(config)# username SSHadmin secret 55Hadm!n        

i. Generate a prepare of crypto keys with a 1024 bit modulus.

          R2(config)# crypto key generate rsa        

j. Assign cisco as the console countersign, configure sessions to disconnect after six minutes of inactivity, and enable login. To preclude console messages from interrupting commands, use the logging synchronous control.

          R2(config)# line console 0          R2(config-line)# countersign cisco          R2(config-line)# logging synchronous          R2(config-line)# exec-timeout 6 0          R2(config-line)# login        

k. Assign cisco as the vty countersign, configure the vty lines to accept SSH connections only, configure sessions to disconnect afterwards six minutes of inactivity, and enable login using the local database.

          R2(config)# line vty 0 four          R2(config-line)# password cisco          R2(config-line)# exec-timeout six 0          R2(config-line)# transport input ssh          R2(config-line)# login local        

50. Create a imprint that warns anyone accessing the device that unauthorized access is prohibited.

          R2(config)# imprint motd $ Alert Authorized Users But! $        

m. Enable IPv6 Routing.

          R2(config)# ipv6 unicast-routing        

n. Configure all four interfaces on the router with the IPv4 and IPv6 addressing information from the addressing tabular array above. Configure all four interfaces with descriptions. Activate all four interfaces.

          R2(config)# interface g0/0/0          R2(config-if)# description Connectedness to S3          R2(config-if)# ip address 10.0.iv.1 255.255.255.0          R2(config-if)# ipv6 address fe80::ii:a link-local          R2(config-if)# ipv6 address 2001:db8:acad:four::ane/64          R2(config-if)# no shutdown          R2(config)# interface g0/0/1          R2(config-if)# description Connexion to S4          R2(config-if)# ip accost x.0.five.1 255.255.255.0          R2(config-if)# ipv6 address fe80::ii:b link-local          R2(config-if)# ipv6 address 2001:db8:acad:5::ane/64          R2(config-if)# no shutdown          R2(config)# interface s0/ane/0          R2(config-if)# description Link to R1          R2(config-if)# ip address 10.0.3.2 255.255.255.0          R2(config-if)# ipv6 address fe80::1:c link-local          R2(config-if)# ipv6 address 2001:db8:acad:3::2/64          R2(config-if)# no shutdown          R2(config-if)# interface s0/1/ane          R2(config-if)# clarification Link to Internet          R2(config-if)# ip accost 209.165.200.225 255.255.255.252          R2(config-if)# ipv6 address fe80::1:d link-local          R2(config-if)# ipv6 address 2001:db8:feed:224::1/64          R2(config-if)# no shutdown        

o. Save the running configuration to the startup configuration file.

          R2# copy running-config startup-config        
Pace 3: Verify network connectivity.

a. Using the control line at PC3, ping the IPv4 and IPv6 addresses for PC4.

Were the pings successful?

Yes

b. From the CLI on R2 ping the S0/one/1 address of R1 for both IPv4 and IPv6. The addresses assigned to the S0/ane/i interface on R1 are:

IPv4 address = 10.0.3.1
IPv6 accost = 2001:db8:acad:three::one

Were the pings successful?

Aye

From the command line of PC3 ping the ISP address 209.165.200.226.

Were the pings successful?

Yes, the PC is using the default gateway router to forwards the traffic.

From PC3 attempt to ping an address on the ISP for testing, 64.100.one.i.

Were the pings successful?

No, routing has not been configured on the router so only local connected networks are accessible. No default route is prepare on router R2.

c. From the control line of PC3 open an SSH session to the R2 G0/0/0 IPv4 accost and log in as SSHadmin with the password 55Hadm!n.

C:\> ssh -l SSHadmin 10.0.4.1 Countersign:

Was remote access successful?

Yep

Part 2: Display Router Information

In Function 2, you will use evidence commands from an SSH session to call back data from the router.

Step one: Establish an SSH session to R2.

From the control line of PC3 open an SSH session to the R2 G0/0/0 IPv6 accost and log in every bit SSHadmin with the password 55Hadm!n.

Step 2: Retrieve of import hardware and software information.

a. Use the show version control to reply questions about the router.

          R2# testify version Cisco IOS XE Software, Version 03.sixteen.05.S - Extended Support Release Cisco IOS Software, ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9-One thousand), Version Version 15.five (iii)S5, RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2017 by Cisco Systems, Inc. Compiled Thu xix-Jan-17 11:24 by mcpre  Cisco IOS-XE software, Copyright (c) 2005-2017 past cisco Systems, Inc. All rights reserved.  Sure components of Cisco IOS-XE software are licensed nether the GNU General Public License ("GPL") Version 2.0.  The software lawmaking licensed under GPL Version 2.0 is free software that comes with Admittedly NO WARRANTY.  You can redistribute and/or alter such GPL code under the terms of GPL Version ii.0.  For more details, see the documentation or "License Notice" file accompanying the IOS-XE software, or the applicative URL provided on the flyer accompanying the IOS-XE software.  ROM: IOS-XE ROMMON  Router uptime is 8 hours, 27 minutes, forty seconds Uptime for this control processor is 8 hours, 27 minutes, twoscore seconds Organisation returned to ROM past power-on Organisation image file is "bootflash:/isr4300-universalk9.03.16.05.S.155-3.S5-ext.SPA.bin" Concluding reload reason: PowerOn  This product contains cryptographic features and is subject field to United States and local country laws governing import, consign, transfer and employ. Delivery of Cisco cryptographic products does not imply third-political party authority to import, export, distribute or utilise encryption. Importers, exporters, distributors and users are responsible for compliance with U.Southward. and local country laws. By using this product you concord to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.  A summary of U.S. laws governing Cisco cryptographic products may be constitute at: http://world wide web.cisco.com/wwl/consign/crypto/tool/stqrg.html  If you crave further assistance please contact us by sending email to [email protected]  Suite License Information for Module:'esg' -------------------------------------------------------------------------------- Suite                 Suite Electric current         Type           Suite Side by side reboot  -------------------------------------------------------------------------------- FoundationSuiteK9     None                  None           None  securityk9 appxk9 	 AdvUCSuiteK9          None                  None           None  uck9 cme - srst cube  Technology Parcel License Information:  ------------------------------------------------------------------------ Technology    Technology-bundle                  Engineering-package               Current              Blazon           Next reboot ------------------------------------------------------------------------ appxk9           None             None             None uck9             None             None             None securityk9       securityk9       Permanent        securityk9 ipbase           ipbasek9         Permanent        ipbasek9 security         securityk9       Permanent        securityk9 ipbase           ipbasek9         Permanent        ipbasek9  cisco ISR4321/K9 (1RU) processor with 1687137K/6147K bytes of retentiveness. Processor board ID FLM2041W2HD 2 Gigabit Ethernet interfaces 2 Serial interfaces 32768K bytes of non-volatile configuration memory. 4194304K bytes of physical retentiveness. 3223551K bytes of flash retention at bootflash:.  Configuration register is 0x2102                  

What is the name of the IOS image that the router is running?

Epitome version isr4300-universalk9.03.xvi.05.Due south.155-3.S5-ext.SPA.bin.

How much non-volatile random-access memory (NVRAM) does the router accept?

32768K bytes of NVRAM.

How much Flash retentivity does the router have?

3223551K bytes of wink memory.

b. The show commands oft provide multiple screens of outputs. Filtering the output allows a user to display certain sections of the output. To enable the filtering control, enter a pipage (|) character later on a bear witness control, followed by a filtering parameter and a filtering expression. Yous can match the output to the filtering statement by using the include keyword to display all lines from the output that contain the filtering expression. Filter the show version command, using show version | include register to respond the following question.

          R2# show version | include register          Configuration register is 0x2102        

What is the boot procedure for the router on the next reload?

Answers may vary. In about cases (0x2102), the router will undergo a normal kicking, load the IOS from the Flash memory, and load the startup configuration from the NVRAM if present. If the config annals is 0x2142, the router will bypass the startup config and brainstorm at the user-mode command prompt. If the initial boot fails, the router goes into ROMMON way.

Step 3: Display the running configuration.

a. Use the show running-config control on the router to answer the following questions filtering for lines containing the discussion "password".

          R2# show running-config | include password service password-encryption  password seven 0822455D0A16  countersign 7 0822455D0A16                  

How are passwords presented in the output?

Passwords are encrypted due to the service password-encryption command.

b. Use the show running-config | begin vty command.

          R2# show running-config | begin vty line vty 0 iv  exec-timeout 6 0  password 7 0822455D0A16  login local  send input ssh                  

What is the upshot of using this command?

A user receives the running configuration output beginning with the line that includes the outset instance of the filtering expression.

Annotation: A more specific control would be show running-config | section vty; however, the current version of Package Tracer does not support the department filtering command.

Footstep four: Display the routing tabular array on the router.

Apply the show ip route command on the router to reply the following questions.

          R2# evidence ip route Codes: L - local, C - continued, S - static, R - RIP, Yard - mobile, B - BGP        D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter surface area        N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2        E1 - OSPF external type 1, E2 - OSPF external type 2, Due east - EGP        i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area        * - candidate default, U - per-user static road, o - ODR        P - periodic downloaded static road  Gateway of concluding resort is non set       10.0.0.0/8 is variably subnetted, half dozen subnets, 2 masks C       x.0.3.0/24 is directly connected, Serial0/one/0 L       x.0.3.2/32 is straight connected, Serial0/1/0 C       ten.0.iv.0/24 is direct connected, GigabitEthernet0/0/0 L       10.0.four.1/32 is straight connected, GigabitEthernet0/0/0 C       10.0.v.0/24 is direct connected, GigabitEthernet0/0/1 Fifty       10.0.5.1/32 is straight connected, GigabitEthernet0/0/ane      209.165.200.0/24 is variably subnetted, two subnets, 2 masks C       209.165.200.224/30 is directly connected, Serial0/1/1 L       209.165.200.225/32 is direct connected, Serial0/1/1Questions:                  

What code is used in the routing table to signal a directly connected network?

The C designates a direct connected subnet. An L designates a local interface. Both answers are correct.

How many route entries are coded with a C code in the routing table?

Footstep 5: Display a summary list of the interfaces on the router.

a. Use the show ip interface brief control on the router to answer the post-obit question.

          R2# show ip interface brief Interface              IP-Accost      OK? Method Status                Protocol  GigabitEthernet0/0/0   10.0.4.1        YES manual upwards                    up  GigabitEthernet0/0/1   10.0.5.i        YES manual up                    up  Serial0/1/0            x.0.3.2        YES transmission up                    upwardly  Serial0/i/one            209.165.200.225 Aye manual upward                    up  Vlan1                  unassigned      YES unset  administratively downward down                  

What control changed the status of the Gigabit Ethernet ports from administratively downwards to upwardly?

no shutdown

What filtering command would y'all use to display only the interfaces with addresses assigned?

testify ip interface brief | exclude unassigned

b. Utilize the bear witness ipv6 int brief control to verify IPv6 settings on R2.

          R2# show ipv6 interface brief GigabitEthernet0/0/0       [upwards/up]     FE80::2:A     2001:DB8:ACAD:4::1 GigabitEthernet0/0/ane       [upwards/upward]     FE80::2:B     2001:DB8:ACAD:5::ane Serial0/1/0                [upward/upwardly]     FE80::one:C     2001:DB8:ACAD:3::2 Serial0/1/1                [up/up]     FE80::1:D     2001:DB8:FEED:224::1 Vlan1                      [administratively down/down]     Unassigned                  

What is the meaning of the [upward/up] part of the output?

The [up/up] status reflects the Layer i and Layer 2 status of the interface and does non rely on Layer 3 for condition.

Answer Scripts – Working 100%

Router R2

enable configure terminal hostname R2 enable undercover c1sco1234 ip domain-proper noun ccna-lab.com no ip domain lookup service password-encryption username SSHadmin secret 55Hadm!n crypto central generate rsa 1024  line console 0 password cisco logging synchronous exec-timeout 6 0 login  line vty 0 four password cisco exec-timeout 6 0 send input ssh login local  banner motd $ WARNING Authorized Users Simply! $ ipv6 unicast-routing  interface g0/0/0 description Connection to S3 ip accost 10.0.4.1 255.255.255.0 ipv6 address fe80::2:a link-local ipv6 address 2001:db8:acad:4::i/64 no shutdown  interface g0/0/i description Connection to S4 ip address ten.0.5.1 255.255.255.0 ipv6 accost fe80::ii:b link-local ipv6 address 2001:db8:acad:v::1/64 no shutdown  interface s0/1/0 description Link to R1 ip accost 10.0.3.2 255.255.255.0 ipv6 accost fe80::1:c link-local ipv6 address 2001:db8:acad:3::2/64 no shutdown  interface s0/1/1 description Link to Internet ip accost 209.165.200.225 255.255.255.252 ipv6 address fe80::1:d link-local ipv6 address 2001:db8:feed:224::1/64 no shutdown  finish re-create running-config startup-config        

Download PDF & PKA file Completed:

[sociallocker id="54558″]


[/sociallocker]

wiliamsbeemed.blogspot.com

Source: https://itexamanswers.net/14-3-5-packet-tracer-basic-router-configuration-review-instructions-answer.html

0 Response to "Cisco and Router Configuration and Chapter 1 Review"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel