0% found this document useful (0 votes)
322 views

Lab 1.6.2

The document provides instructions for configuring basic settings on a router, including: - Configuring IP addresses and default gateways on two PCs for connectivity testing. - Configuring the router name, passwords, interfaces, IPv4 and IPv6 addresses, and other settings. - Verifying connectivity by pinging between the PCs and remotely accessing the router using SSH. - Using show commands to display hardware/software information, startup configuration, routing table, and interface status.

Uploaded by

Marion Sabandal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
322 views

Lab 1.6.2

The document provides instructions for configuring basic settings on a router, including: - Configuring IP addresses and default gateways on two PCs for connectivity testing. - Configuring the router name, passwords, interfaces, IPv4 and IPv6 addresses, and other settings. - Verifying connectivity by pinging between the PCs and remotely accessing the router using SSH. - Using show commands to display hardware/software information, startup configuration, routing table, and interface status.

Uploaded by

Marion Sabandal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

LAB REPORT 1.6.

2 - Configure Basic Router Settings

Course Code / Course Name: - CNET 217 / Switching & Routing Essentials

Program: - Computer Systems Technology

Section: - 002

Term: - Summer 2023

Group Number: 5

Student Names/ID:

Instructions

Part 1: Set Up the Topology and Initialize Devices

Step 1: Cable the network as shown in the topology.

a. Attach the devices as shown in the topology diagram, and cable as necessary.

b. Power on all the devices in the topology.

Step 2: Initialize and reload the router and switch.

- Lab is done via Cisco Packet Tracer

Part 2: Part 2: Configure Devices and Verify Connectivity

Step 1: Configure the PC interfaces.

a. Configure the IP address, subnet mask, and default gateway settings on PC-A.
b. Configure the IP address, subnet mask, and default gateway settings on PC-B.

Step 2: Configure the router.

a. Console into the router and enable privileged EXEC mode.


b. Enter configuration mode.

c. Assign a device name to the router.

d. Set the router’s domain name as ccna-lab.com.


e. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered
commands as though they were host names.

f. Encrypt the plaintext passwords.

g. Configure the system to require a minimum 12-character password.


h. Configure the username SSHadmin with an encrypted password of 55Hadm!n2020.

i. Generate a set of crypto keys with a 1024 bit modulus

j. Assign the privileged EXEC password to $cisco!PRIV*


k. Assign $cisco!!CON* as the console password, configure sessions to disconnect after four
minutes of inactivity, and enable login.

l. Assign $cisco!!VTY* as the vty password, configure the vty lines to accept SSH connections only,
configure sessions to disconnect after four minutes of inactivity, and enable login using the local
database.

m. Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
n. Enable IPv6 Routing

o. Configure all three interfaces on the router with the IPv4 and IPv6 addressing information from
the addressing table above. Configure all three interfaces with descriptions. Activate all three
interfaces.
p. The router should not allow vty logins for two minutes if three failed login attempts occur within
60 seconds.

q. Set the clock on the router.


r. Save the running configuration to the startup configuration file.

What would be the result of reloading the router prior to completing the copy running-config
startup-config command?
- The configuration stored in the RAM will be wiped out and the user will receive the “Would you
like to enter the initial configuration dialog?” prompt.

Step 3: Verify network connectivity.


a. Using the command line at PC-A, ping the IPv4 and IPv6 addresses for PC-B.

Note: It may be necessary to disable the PCs firewall.

Were the pings successful?

- Yes

b. Remotely access R1 from PC-A using the Tera Term SSH client.
Using Tera Term on PC-A, open an SSH session to the R1 Loopback interface IPv4 address.
Ensure that the SSH radio button is selected and then click OK to connect to the router. Log in as
SSHadmin with the password 55Hadm!n2020.

Was remote access successful?


- Yes

Using Tera Term on PC-A, open an SSH session to the R1 Loopback interface IPv6 address.
Ensure that the SSH radio button is selected and then click OK to connect to the router. Log in as
SSHadmin with the password 55Hadm!n2020. Note: The IPv6 address should be surrounded
with square brackets, i.e. [IPv6 address]

Was remote access successful?


- Yes
Why is the Telnet protocol considered to be a security risk?

- Telnet protocol is not secured because information is not encrypted.

Part 3: Display Router Information

In Part 3, you will use show commands from an SSH session to retrieve information from the
router.

Step 1: Establish an SSH session to R1.

Using Tera Term on PC-B, open an SSH session to the R1 Loopback interface IPv6 address and log
in as SSHadmin with the password 55Hadm!n2020.

Step 2: Retrieve important hardware and software information.


a. Use the show version command to answer questions about the router.
What is the name of the IOS image that the router is running?

How much non-volatile random-access memory (NVRAM) does the router have?

How much Flash memory does the router have?

b. The show commands often provide multiple screens of outputs. Filtering the output allows a
user to display certain sections of the output. To enable the filtering command, enter a pipe (|)
character after a show command, followed by a filtering parameter and a filtering expression.
You can match the output to the filtering statement by using the include keyword to display all
lines from the out.
What is the boot process for the router on the next reload?

- In this case, it is (0x2012) so the router will boot as normal and loads the startup configuration
from the NVRAM provided that it is available.
Step 3: Display the startup configuration.

Use the show startup-config command on the router to answer the following questions.

How are passwords presented in the output?

 Passwords are encrypted.

Use the show startup-config | section vty command.


What is the result of using this command?

 It says Invalid input detected at ‘^’ marker.

Step 4: Display the routing table on the router.

Use the show ip route command on the router to answer the following questions.

What code is used in the routing table to indicate a directly connected network?

o The C indicates connected while L indicates local

How many route entries are coded with a C code in the routing table?

o 3
Step 5: Display a summary list of the interfaces on the router.

a. Use the show ip interface brief command on the router to answer the following question.

What command changed the status of the Gigabit Ethernet ports from administratively down to
up?
o The “no shutdown” command

b. Use the show ipv6 int brief command to verify IPv6 settings on R1.
What is the meaning of the [up/up] part of the output?
o It indicates the status of the interface for both Layer 1 and Layer 2.

c. On PC-B, change its configuration so that it no longer has a static IPv6 address. You may have to
reboot the machine. Then, issue the ipconfig command on PC-B to examine the IPv6
configuration.

What is the IPv6 address assigned to PC-B?


What is the default gateway assigned to PC-B?

Issue a ping from PC-B to the R1 default gateway link local address. Was it successful?

o Yes
Issue a ping from PC-B to the R1 IPv6 unicast address 2001:db8:acad::1. Was it successful?

o Yes

Reflection Questions

1. In researching a network connectivity issue, a technician suspects that an interface was not
enabled. What show command could the technician use to troubleshoot this issue?
o show ip interface

2. In researching a network connectivity issue, a technician suspects that an interface was assigned
an incorrect subnet mask. What show command could the technician use to troubleshoot this
issue?
o show running-config

You might also like