Cisco and Router Configuration and Chapter 1 Review
14.3.5 Parcel Tracer – Basic Router Configuration Review (Teacher Version)
14.iii.five Packet Tracer – Basic Router Configuration Review
Addressing Tabular array
| Device | Interface | IP Accost / Prefix | Default Gateway |
|---|---|---|---|
| R2 | G0/0/0 | x.0.4.ane /24 | Northward/A |
| 2001:db8:acad:4::1 /64 | |||
| fe80::2:a | |||
| G0/0/1 | 10.0.5.1 /24 | ||
| 2001:db8:acad:5::i /64 | |||
| fe80::two:b | |||
| S0/1/0 | x.0.3.2 /24 | ||
| 2001:db8:acad:3::2 /64 | |||
| fe80::1:c | |||
| S0/one/1 | 209.165.200.225 /xxx | ||
| 2001:db8:feed:224::ane/64 | |||
| fe80::ane:d | |||
| PC1 | NIC | 10.0.1.ten /24 | 10.0.1.1 |
| 2001:db8:acad:ane::10 /64 | fe80::i:a | ||
| PC2 | NIC | 10.0.2.x /24 | 10.0.two.1 |
| 2001:db8:acad:2::ten /64 | fe80::1:b | ||
| PC3 | NIC | x.0.4.x /24 | ten.0.iv.1 |
| 2001:db8:acad:4::10 /64 | fe80::2:a | ||
| PC4 | NIC | 10.0.5.x /24 | 10.0.five.1 |
| 2001:db8:acad:v::10 /64 | fe80::ii:b |
Objectives
Function i: Configure Devices and Verify Connectivity
- Assign static IPv4 and IPv6 addresses to the PC interfaces.
- Configure basic router settings.
- Configure the router for SSH.
- Verify network connectivity.
Function two: Brandish Router Information
- Retrieve hardware and software information from the router.
- Interpret the startup configuration.
- Interpret the routing table.
- Verify the status of the interfaces.
Background / Scenario
This activity requires you to configure the R2 router using the settings from the Addressing Tabular array and the specifications listed. The R1 router and the devices continued to it have been configured. This is a comprehensive review of previously covered IOS router commands. In Part 1, y'all will complete basic configurations and interface settings on the router. In Part 2, you will use SSH to connect to the router remotely and utilise the IOS commands to retrieve information from the device to answer questions well-nigh the router. For review purposes, this lab provides the commands necessary for specific router configurations.
Instructions
Part 1: Configure Devices and Verify Connectivity
Stride 1: Configure the PC interfaces.
a. Configure the IPv4 and IPv6 addresses on PC3 equally listed in the Addressing Table.
b. Configure the IPv4 and IPv6 addresses on PC4 as listed in the Addressing Tabular array.
Step 2: Configure the router.
a. On the R2 router, open a terminal. Move to privileged EXEC mode.
Router> enable b. Enter configuration mode.
Router# configure terminal c. Assign a device proper name of R2 to the router.
Router(config)# hostname R2 d. Configure c1sco1234 every bit the encrypted privileged EXEC style password.
R2(config)#enable secret c1sco1234 e. Set the domain name of the router to ccna-lab.com.
R2(config)# ip domain-name ccna-lab.com f. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands equally though they were host names.
R2(config)# no ip domain lookup one thousand. Encrypt the plaintext passwords.
R2(config)# service countersign-encryption h. Configure the username SSHadmin with an encrypted password of 55Hadm!due north.
R2(config)# username SSHadmin secret 55Hadm!n i. Generate a prepare of crypto keys with a 1024 bit modulus.
R2(config)# crypto key generate rsa j. Assign cisco as the console countersign, configure sessions to disconnect after six minutes of inactivity, and enable login. To preclude console messages from interrupting commands, use the logging synchronous control.
R2(config)# line console 0 R2(config-line)# countersign cisco R2(config-line)# logging synchronous R2(config-line)# exec-timeout 6 0 R2(config-line)# login
k. Assign cisco as the vty countersign, configure the vty lines to accept SSH connections only, configure sessions to disconnect afterwards six minutes of inactivity, and enable login using the local database.
R2(config)# line vty 0 four R2(config-line)# password cisco R2(config-line)# exec-timeout six 0 R2(config-line)# transport input ssh R2(config-line)# login local
50. Create a imprint that warns anyone accessing the device that unauthorized access is prohibited.
R2(config)# imprint motd $ Alert Authorized Users But! $ m. Enable IPv6 Routing.
R2(config)# ipv6 unicast-routing n. Configure all four interfaces on the router with the IPv4 and IPv6 addressing information from the addressing tabular array above. Configure all four interfaces with descriptions. Activate all four interfaces.
R2(config)# interface g0/0/0 R2(config-if)# description Connectedness to S3 R2(config-if)# ip address 10.0.iv.1 255.255.255.0 R2(config-if)# ipv6 address fe80::ii:a link-local R2(config-if)# ipv6 address 2001:db8:acad:four::ane/64 R2(config-if)# no shutdown R2(config)# interface g0/0/1 R2(config-if)# description Connexion to S4 R2(config-if)# ip accost x.0.five.1 255.255.255.0 R2(config-if)# ipv6 address fe80::ii:b link-local R2(config-if)# ipv6 address 2001:db8:acad:5::ane/64 R2(config-if)# no shutdown R2(config)# interface s0/ane/0 R2(config-if)# description Link to R1 R2(config-if)# ip address 10.0.3.2 255.255.255.0 R2(config-if)# ipv6 address fe80::1:c link-local R2(config-if)# ipv6 address 2001:db8:acad:3::2/64 R2(config-if)# no shutdown R2(config-if)# interface s0/1/ane R2(config-if)# clarification Link to Internet R2(config-if)# ip accost 209.165.200.225 255.255.255.252 R2(config-if)# ipv6 address fe80::1:d link-local R2(config-if)# ipv6 address 2001:db8:feed:224::1/64 R2(config-if)# no shutdown
o. Save the running configuration to the startup configuration file.
R2# copy running-config startup-config Pace 3: Verify network connectivity.
a. Using the control line at PC3, ping the IPv4 and IPv6 addresses for PC4.
Were the pings successful?
b. From the CLI on R2 ping the S0/one/1 address of R1 for both IPv4 and IPv6. The addresses assigned to the S0/ane/i interface on R1 are:
IPv4 address = 10.0.3.1
IPv6 accost = 2001:db8:acad:three::one
Were the pings successful?
From the command line of PC3 ping the ISP address 209.165.200.226.
Were the pings successful?
From PC3 attempt to ping an address on the ISP for testing, 64.100.one.i.
Were the pings successful?
c. From the control line of PC3 open an SSH session to the R2 G0/0/0 IPv4 accost and log in as SSHadmin with the password 55Hadm!n.
C:\> ssh -l SSHadmin 10.0.4.1 Countersign:
Was remote access successful?
Part 2: Display Router Information
In Function 2, you will use evidence commands from an SSH session to call back data from the router.
Step one: Establish an SSH session to R2.
From the control line of PC3 open an SSH session to the R2 G0/0/0 IPv6 accost and log in every bit SSHadmin with the password 55Hadm!n.
Step 2: Retrieve of import hardware and software information.
a. Use the show version control to reply questions about the router.
R2# testify version Cisco IOS XE Software, Version 03.sixteen.05.S - Extended Support Release Cisco IOS Software, ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9-One thousand), Version Version 15.five (iii)S5, RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2017 by Cisco Systems, Inc. Compiled Thu xix-Jan-17 11:24 by mcpre Cisco IOS-XE software, Copyright (c) 2005-2017 past cisco Systems, Inc. All rights reserved. Sure components of Cisco IOS-XE software are licensed nether the GNU General Public License ("GPL") Version 2.0. The software lawmaking licensed under GPL Version 2.0 is free software that comes with Admittedly NO WARRANTY. You can redistribute and/or alter such GPL code under the terms of GPL Version ii.0. For more details, see the documentation or "License Notice" file accompanying the IOS-XE software, or the applicative URL provided on the flyer accompanying the IOS-XE software. ROM: IOS-XE ROMMON Router uptime is 8 hours, 27 minutes, forty seconds Uptime for this control processor is 8 hours, 27 minutes, twoscore seconds Organisation returned to ROM past power-on Organisation image file is "bootflash:/isr4300-universalk9.03.16.05.S.155-3.S5-ext.SPA.bin" Concluding reload reason: PowerOn This product contains cryptographic features and is subject field to United States and local country laws governing import, consign, transfer and employ. Delivery of Cisco cryptographic products does not imply third-political party authority to import, export, distribute or utilise encryption. Importers, exporters, distributors and users are responsible for compliance with U.Southward. and local country laws. By using this product you concord to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be constitute at: http://world wide web.cisco.com/wwl/consign/crypto/tool/stqrg.html If you crave further assistance please contact us by sending email to [email protected] Suite License Information for Module:'esg' -------------------------------------------------------------------------------- Suite Suite Electric current Type Suite Side by side reboot -------------------------------------------------------------------------------- FoundationSuiteK9 None None None securityk9 appxk9 AdvUCSuiteK9 None None None uck9 cme - srst cube Technology Parcel License Information: ------------------------------------------------------------------------ Technology Technology-bundle Engineering-package Current Blazon Next reboot ------------------------------------------------------------------------ appxk9 None None None uck9 None None None securityk9 securityk9 Permanent securityk9 ipbase ipbasek9 Permanent ipbasek9 security securityk9 Permanent securityk9 ipbase ipbasek9 Permanent ipbasek9 cisco ISR4321/K9 (1RU) processor with 1687137K/6147K bytes of retentiveness. Processor board ID FLM2041W2HD 2 Gigabit Ethernet interfaces 2 Serial interfaces 32768K bytes of non-volatile configuration memory. 4194304K bytes of physical retentiveness. 3223551K bytes of flash retention at bootflash:. Configuration register is 0x2102 What is the name of the IOS image that the router is running?
How much non-volatile random-access memory (NVRAM) does the router accept?
How much Flash retentivity does the router have?
b. The show commands oft provide multiple screens of outputs. Filtering the output allows a user to display certain sections of the output. To enable the filtering control, enter a pipage (|) character later on a bear witness control, followed by a filtering parameter and a filtering expression. Yous can match the output to the filtering statement by using the include keyword to display all lines from the output that contain the filtering expression. Filter the show version command, using show version | include register to respond the following question.
R2# show version | include register Configuration register is 0x2102
What is the boot procedure for the router on the next reload?
Step 3: Display the running configuration.
a. Use the show running-config control on the router to answer the following questions filtering for lines containing the discussion "password".
R2# show running-config | include password service password-encryption password seven 0822455D0A16 countersign 7 0822455D0A16 How are passwords presented in the output?
b. Use the show running-config | begin vty command.
R2# show running-config | begin vty line vty 0 iv exec-timeout 6 0 password 7 0822455D0A16 login local send input ssh What is the upshot of using this command?
Annotation: A more specific control would be show running-config | section vty; however, the current version of Package Tracer does not support the department filtering command.
Footstep four: Display the routing tabular array on the router.
Apply the show ip route command on the router to reply the following questions.
R2# evidence ip route Codes: L - local, C - continued, S - static, R - RIP, Yard - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter surface area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, Due east - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static road, o - ODR P - periodic downloaded static road Gateway of concluding resort is non set 10.0.0.0/8 is variably subnetted, half dozen subnets, 2 masks C x.0.3.0/24 is directly connected, Serial0/one/0 L x.0.3.2/32 is straight connected, Serial0/1/0 C ten.0.iv.0/24 is direct connected, GigabitEthernet0/0/0 L 10.0.four.1/32 is straight connected, GigabitEthernet0/0/0 C 10.0.v.0/24 is direct connected, GigabitEthernet0/0/1 Fifty 10.0.5.1/32 is straight connected, GigabitEthernet0/0/ane 209.165.200.0/24 is variably subnetted, two subnets, 2 masks C 209.165.200.224/30 is directly connected, Serial0/1/1 L 209.165.200.225/32 is direct connected, Serial0/1/1Questions: What code is used in the routing table to signal a directly connected network?
How many route entries are coded with a C code in the routing table?
Footstep 5: Display a summary list of the interfaces on the router.
a. Use the show ip interface brief control on the router to answer the post-obit question.
R2# show ip interface brief Interface IP-Accost OK? Method Status Protocol GigabitEthernet0/0/0 10.0.4.1 YES manual upwards up GigabitEthernet0/0/1 10.0.5.i YES manual up up Serial0/1/0 x.0.3.2 YES transmission up upwardly Serial0/i/one 209.165.200.225 Aye manual upward up Vlan1 unassigned YES unset administratively downward down What control changed the status of the Gigabit Ethernet ports from administratively downwards to upwardly?
What filtering command would y'all use to display only the interfaces with addresses assigned?
b. Utilize the bear witness ipv6 int brief control to verify IPv6 settings on R2.
R2# show ipv6 interface brief GigabitEthernet0/0/0 [upwards/up] FE80::2:A 2001:DB8:ACAD:4::1 GigabitEthernet0/0/ane [upwards/upward] FE80::2:B 2001:DB8:ACAD:5::ane Serial0/1/0 [upward/upwardly] FE80::one:C 2001:DB8:ACAD:3::2 Serial0/1/1 [up/up] FE80::1:D 2001:DB8:FEED:224::1 Vlan1 [administratively down/down] Unassigned What is the meaning of the [upward/up] part of the output?
The [up/up] status reflects the Layer i and Layer 2 status of the interface and does non rely on Layer 3 for condition.
Answer Scripts – Working 100%
Router R2
enable configure terminal hostname R2 enable undercover c1sco1234 ip domain-proper noun ccna-lab.com no ip domain lookup service password-encryption username SSHadmin secret 55Hadm!n crypto central generate rsa 1024 line console 0 password cisco logging synchronous exec-timeout 6 0 login line vty 0 four password cisco exec-timeout 6 0 send input ssh login local banner motd $ WARNING Authorized Users Simply! $ ipv6 unicast-routing interface g0/0/0 description Connection to S3 ip accost 10.0.4.1 255.255.255.0 ipv6 address fe80::2:a link-local ipv6 address 2001:db8:acad:4::i/64 no shutdown interface g0/0/i description Connection to S4 ip address ten.0.5.1 255.255.255.0 ipv6 accost fe80::ii:b link-local ipv6 address 2001:db8:acad:v::1/64 no shutdown interface s0/1/0 description Link to R1 ip accost 10.0.3.2 255.255.255.0 ipv6 accost fe80::1:c link-local ipv6 address 2001:db8:acad:3::2/64 no shutdown interface s0/1/1 description Link to Internet ip accost 209.165.200.225 255.255.255.252 ipv6 address fe80::1:d link-local ipv6 address 2001:db8:feed:224::1/64 no shutdown finish re-create running-config startup-config
Download PDF & PKA file Completed:
[sociallocker id="54558″]
[/sociallocker]
Source: https://itexamanswers.net/14-3-5-packet-tracer-basic-router-configuration-review-instructions-answer.html
0 Response to "Cisco and Router Configuration and Chapter 1 Review"
Post a Comment