Upload
lochana-pasyala
View
30
Download
1
Embed Size (px)
Citation preview
Lab Practice- Environment
Page 1 of 35
Lab Scenario (Station: 1 / Pod: 1)
Background
In this Lab, you are provided with a cisco 2600 series router, a cisco 2950 series switch and two
Windows 7 professional running computers. You will practice the skills necessary for navigating
the cisco IOS, physical layer cabling, routing, switching, testing and common show commands
used in a regular basis. This activity includes 7 parts. In each part, you will configure Cisco IOS
using instructions that you have been provided. Each and every physical devices and cables are
identical by their names. Please show your progress to the instructor at the end of each part.
Note: This lab environment is a team activity. At some points, you have to be patient until
your partner has finished his/her configuration.
Objectives
Part 1: Physical layer connectivity ................................................................................................ 3
Part 2: Establish a Console session on the router ........................................................................ 10
Part 3: Establish a telnet session on the switch via the management VLAN .............................. 13
Part 4: Pre configurations on the router and the switch (Resetting Lab) ..................................... 22
Part 5: Actual configurations on the router ................................................................................. 27
Part 6: Assign IP addresses and perform static routing ............................................................... 28
Part 7: Verify configurations and Test connectivity .................................................................... 31
Password Recovery Lab ................................................................................................................ 34
IP Addressing Table
Device Interface IP Address Subnet Mask Default Getaway
S1_P1_R1 Router Se0/0 10.10.1.1 255.255.255.252 N/A
Fa0/0 192.168.1.1 255.255.255.0 N/A
S1_P2_R1 Router Se0/0 10.10.1.2 255.255.255.252 N/A
Fa0/0 192.168.2.1 255.255.255.0 N/A
S1_P1_SW1 Switch VLAN 1 192.168.1.9 255.255.255.0 192.168.1.1 S1_P2_SW1 Switch VLAN 1 192.168.2.9 255.255.255.0 192.168.2.1 S1_P1_PC1 PC NIC 192.168.1.0/24 192.168.1.10 255.255.255.0 192.168.1.1
S1_P1_PC2 PC NIC 192.168.1.0/24 192.168.1.11 255.255.255.0 192.168.1.1
S1_P2_PC1 PC NIC 192.168.2.0/24 192.168.2.10 255.255.255.0 192.168.2.1
S1_P2_PC2 PC NIC 192.168.2.0/24 192.168.2.11 255.255.255.0 192.168.2.1
Lab Practice- Environment
Page 2 of 35
Topology
Introduction to KVM switch
The KVM (Keyboard Video and Mouse) switch is a hardware device that can be used to control
multiple computers using one keyboard, one mouse and one video monitor. In this activity, the
KVM switch has been already configured and you can select a preferred client computer by
pressing the select button on the KVM switch. See the picture below.
Note: Number 1 is S1_P1_PC1 and Number 2 is S1_P1_PC2.
Lab Practice- Environment
Part 1 Page 3 of 35
Part 1: Physical layer connectivity.
Background
In this activity, you will perform physical layer connectivity using different types of cables. You
will be able to identify different types of cables and their appropriate ports.
Requirements
Step 1: All the cables necessary to inter connect this network is available in your desk drawer.
Identify the appropriate cable types and their corresponding ports for physical layer connectivity.
Introduction to network media
Different types of wiring are used when building internetworks. There are three main types of
copper media used in the network, unshielded twisted-pair (UTP), Shield twisted-pair (STP) and
Coaxial cable. These cables are used to interconnect nodes on a LAN infrastructure with devices
such as switches, routers, hubs and wireless access point. The unshielded twisted-pair (UTP) cable
is most common networking media, terminated with RJ-45 connectors. You will be using the UTP
cables in this activity. The figure shows unshielded twisted-pair (UTP) cable of cross section area
and how two shields of wires are twisted around each other. See the picture below.
The following are the main cable types that are obtained by using specific wiring conventions in
this exercise:
Ethernet Straight-through (UTP): The most common type of networking cable. It is
commonly used to interconnect a router to a switch, and a host to a switch.
Ethernet Crossover (UTP): A cable used to interconnect similar devices (MAC devices),
a router to a router, a host to a host and a host to a router.
Rollover (UTP): A Cisco proprietary cable, often used to connect a workstation terminal
to a router or switch console port. Also known as DB9 console cable.
Cisco smart Serial cable: This cable is used to transfer information between two devices
using serial communication protocol via smart serial port.
Power cable: provide electrical power to the device.
Lab Practice- Environment
Part 1 Page 4 of 35
Cable types and connectors
Unshielded twisted-pair (UTP) cable
Ethernet Straight-through (Cable Type 1)
RJ45 connector
Ethernet Crossover (Cable Type 2)
RJ45 connector
Lab Practice- Environment
Part 1 Page 5 of 35
Rollover / Console cable (Cable Type 3)
Console jack
RS 232
Smart serial cable (Cable Type 4)
DTE Side of the cable
DCE Side of the cable
Power cables (Cable type 5)
Lab Practice- Environment
Part 1 Page 6 of 35
Ports and interface
The figure shows different types of interfaces and ports available on a cisco 2600 router.
1 2 3 4 5
Cisco 2600 series switch
Number Port/Interface
1 Ethernet port 0/0
2 Console port
3 Smart serial port
4 Power switch
5 Power slot
Lab Practice- Environment
Part 1 Page 7 of 35
The figure shows different types of interfaces and ports available on a cisco 2950 switch.
1 2 3
4 Conso 5
Cisco 2950 series router
Number Port/Interface
1 FastEthernet Port 1
2 FastEthernet Port 7
3 FastEthernet Port 8
4 Power switch
5 Console port
Lab Practice- Environment
Part 1 Page 8 of 35
Step 2: Perform the power cable connectivity using the power cables (cable type 5) both in the
router and the switch. But do not power on the devices until you have been instructed.
Note: Use the black color power strip to connect the power cables.
Step 3: Take a Smart serial (Cable Type 4) from the drawer. Plug, one end of the cable into the
router’s smart serial 0/0 port and the other end into the Pod 2 router’s smart serial port 0/0. In this
lab you will use the smart serial cable to connect two routers (WAN connectivity) instead of using
the Ethernet Crossover (Cable Type 2). There is one smart serial cable for each station.
Step 4: Take one Ethernet Straight-through (Cable Type 1) from the drawer and plug one end
of the cable into the routers’ Ethernet port 0/0. And the other end of the cable should be plugged
into the switch’s FastEthernet port 1.
Step 5: Take another Ethernet Straight-thorough (Cable Type 1) from the drawer. One end of
the cable should plug in to the switch’s FastEthernet port 7. And the other end of the cable should
be plugged into S1_P1_PC1 computer’s RJ 45 port. See the picture below.
The figure below shows RJ45 port in the computer
RJ-45 port
The figure below shows the WAN connectivity between two routers via serial cable
Lab Practice- Environment
Part 1 Page 9 of 35
Step 6: Take another Ethernet Straight-thorough (Cable Type 1) from the drawer. Plug, one end
of the cable into the switch’s FastEthernet port 8. And the other end of the cable should be plugged
into S1_P1_PC2 computer’s RJ 45 port.
Step 7: Take a Rollover cable (Cable Type 3) from the drawer. Plug, one end of the cable into the
router’s console port and the other end into S1_P1_PC1 computer’s RS232 serial port. See the
picture below.
Serial port (RS 232)
Step 8: Take other Rollover cable (Cable Type 3) from the drawer. Plug, one end of the cable into
the switch’s console port and the other end into the S1_P1_PC2 computer’s RS232 serial port.
Step 9: Power on both computers in the pod. Use ABcd1234 for login password.
The figure below shows RS232 port in the computer
Lab Practice- Environment
Part 2 Page 10 of 35
Part 2: Establish a Console session on the router.
Background
You will establish a Console session on the router by using the “PUTTY” terminal emulator
software which is already installed on your S1_P1_PC1.
Step 1: Power on the router.
Step 2: Switch to S1_P1_PC1 by pressing “select” on the KVM switch and double click on the
putty.exe file which is already installed on your desktop.
Step 3: In the Putty Configuration window, under the connection type select “serial”. Make sure
other parameters are similar as shown in the figure below.
Step 4: In the Putty Configuration window, click the open button. You can see, the CLI (Command
Line Interface) of the router is being loaded in your screen. If it is not, press the Enter key.
Note: The router might take a little while to load the CLI into the Putty Configuration
window. So be patient, if it is not being loaded yet.
.
The figure below shows Putty settings
The figure below shows router’s initialization process
Lab Practice- Environment
Part 2 Page 11 of 35
Step 5: If your router’s booting process is not completely finished keep waiting for it to finish. At
this point, you will see a prompt “Would you like to enter the initial configuration dialog
(yes/no)”. Type No and press the enter key. See the picture below.
Step 6: You will see a prompt “Would you like to terminate autoinstall (yes/no)”. Type Yes
and press the enter key. See the picture below.
Lab Practice- Environment
Part 2 Page 12 of 35
Step 7: At this point, Press enter key to continue. See the picture below.
Step 8: At the end, you will see the router’s command line interface with the initial prompt of;
Router> in the user EXEC mode. See the picture below.
Lab Practice- Environment
Part 3 Page 13 of 35
Part 3: Establish a telnet session on the switch via the
management VLAN.
Background
You will establish a telnet session on the switch via the management VLAN interface and you will
load the Command Line Interfaces (CLI) of the switch. A telnet connection allows you to access
the switch’s Command Line Interface.
Note: Prior to establishing a telnet session via the management VLAN on the switch, you will
be making a console connection between the switch and the computer.
Introduction to cisco IOS command modes
The table below shows various command modes of the IOS CLI. The Cisco IOS modes use a
hierarchical structure and are quite similar for both switches and routers. The user EXEC Mode is
useful for basic operations. It allows only basic monitoring commands (show commands). The
privilege EXEC, the Global configuration, the interface and the line configuration modes allow
the execution of any commands that might change the configuration of the device.
IOS Command Mode Default router Prompt Default Switch Prompt
User EXEC Mode Router > Switch >
Privileged EXEC Mode Router # Switch #
Global Configuration Mode Router (config)# Switch (config)#
Interface Configuration Mode Router (config-if)# Switch (config-if)#
ROM Monitor Mode rommon 1 > rommon 1 >
Lab Practice- Environment
Part 3 Page 14 of 35
Establish a console session on the switch
Step 1: Power on the switch.
Step 2: Switch to S1_P1_PC2 by pressing “select” on the KVM switch and double click on the
putty.exe file which is already installed on your desktop.
Step 3: In the Putty Configuration window, under the connection type select “serial”. Make sure
other parameters are similar as shown in the figure below.
Step 4: In the Putty configuration window, click the open button. You can see, the CLI (Command
Line Interface) of the switch is being loaded in your screen. If it is not, press the Enter key.
Note: The switch might take a little while to load the CLI into the Putty Configuration
window. So be patient, if it is not being loaded yet.
The figure below shows Putty configurations
The figure below shows Switch’s initialization process
Lab Practice- Environment
Part 3 Page 15 of 35
Step 5: If your switch’s booting process is not completely finished keep waiting for it to finish. At
the end of the process, you will see a prompt “Would you like to enter the initial configuration
dialog (yes/no)”. Type No and press the enter key. See the picture below.
Step 6: When the prompt of “Press RETURN to get started!” appears, press Enter key to
continue.
Step 7: After the initialization process is done, you will see the switch’s command line interface
(CLI) with the initial prompt of; Switch> in user EXEC mode. See the picture below.
Lab Practice- Environment
Part 3 Page 16 of 35
Step 8: After you get the CLI of the switch, type the following configurations on the global
configuration mode of the switch and execute the commands below.
8.1 Disable host to IP address translation to Prevent "Translating domain server
(255.255.255.255)" Messages.
Switch > enable
Switch # configure terminal
Switch (config) # no ip domain-lookup
8.2 Create the management interface VLAN 1.
Switch (config) # interface vlan 1
Switch (config-if) # ip address 192.168.1.9 255.255.255.0
Switch (config-if) # no shutdown
Switch (config-if) # exit
8.3 Create a telnet connection on the switch and set the telnet password as
“cisco”.
Switch (config) # line vty 0 4
Switch (config-line) # login local
Switch (config-line) # password cisco
Switch (config-line) # exit
8.4 Set the username and the password for the user of the switch.
Switch (config) # username admin password cisco
8.5 Set privileged exec (enable) password as “ccna”.
Switch (config) # enable password ccna
8.6 Configure the switch default gateway.
Switch (config) # ip default-gateway 192.168.1.1
8.7 Save the running configuration into NVRAM
Switch (config) # exit
Switch # copy running config startup config Press Enter []
Lab Practice- Environment
Part 3 Page 17 of 35
Step 9: Assign an IP address to the S1_P1_PC2.
9.1 Right click on the network icon in the taskbar and select “Open Network and Sharing Center”.
9.2 Click on the “Change adapter settings”. See the picture below.
9.3 Select your current network adapter (Local Area Connection). Right click on it and select
properties. See the picture below.
Lab Practice- Environment
Part 3 Page 18 of 35
9.4 Select the “Internet Protocol Version 4 (TCP/IPv4)” and click on the “Property”. See the
picture below.
9.5 Select “Use the following IP address:” Set the IP address, the subnet mask and the default
gateway based on the addressing table that you have provided. And press OK. See the picture
below.
Lab Practice- Environment
Part 3 Page 19 of 35
9.6 Close the Local Area Connection Properties window by pressing the Close button. See the
picture below.
9.7 Close the Network Connection window.
Step 10: Switch to S1_P1_PC1 and perform previous steps (9.1 - 9.7) to assign an IP address,
subnet mask and default gateway base on the addressing table.
Step 11: Switch to the S1_P1_PC2. Go to the start menu. Type CMD in the search field area and
press the enter key to open the Command prompt window. See the picture below.
Lab Practice- Environment
Part 3 Page 20 of 35
Step 12: In the command prompt, type “Ping 192.168.1.9” and press the enter key. If the ping was
successful, you have established the connection between the switch and the computer correctly. If
not troubleshoot again.
The figure below shows a Successful ping attempt, it is an example of echo replay
Step 13: In the next prompt, type “Ping 192.168.1.10” and press the enter key. If the ping was
successful, you have established the connection between S1_P1_PC1 and S1_P1_PC2 correctly.
If not troubleshoot again.
Step 14: Minimize the Command Prompt Window
Establish a telnet session on the switch
Step 15: Close the Putty Configuration window. Double click the putty.exe file again, which is
already installed on your S1_P1_PC2.
Step 16: In the Putty Configuration window, under the connection type, select “Telnet” and type
192.168.1.9 in the Host Name (or IP address) filed. See the picture below.
192.168.1.9
192.168.1.9
Lab Practice- Environment
Part 3 Page 21 of 35
Step 17: In the Putty configuration window, click the open button.
Step 18: You will see switch’s command line interface with the initial prompt of; User Access
Verification. Use username as admin and password as cisco. And press the Enter key to continue.
See the picture below.
Step 19: you will see the switch’s command line interface (CLI) with the initial prompt of;
Switch> in user EXEC mode. See the picture below.
Step 20: Unplug the Rollover cable (Cable Type 4) from the switch and S1_P1_PC2.
Lab Practice- Environment
Part 4 Page 22 of 35
Part 4: Pre configurations on the router and the switch
(Resetting Lab).
Background
In this activity, you will practice how to delete NVRAM of the router and how to erase VLAN
information of the switch.
Introduction to cisco IOS command modes
The table below shows various command modes of the IOS CLI. The Cisco IOS modes use a
hierarchical structure and are quite similar for both switches and routers. The user EXEC Mode is
useful for basic operations. It allows only basic monitoring commands (show commands). The
privilege EXEC, the Global configuration, the interface and the line configuration modes allow
the execution of any commands that might change the configuration of the device.
IOS Command Mode Default router Prompt Default Switch Prompt
User EXEC Mode Router > Switch >
Privileged EXEC Mode Router # Switch #
Global Configuration Mode Router (config)# Switch (config)#
Interface Configuration Mode Router (config-if)# Switch (config-if)#
ROM Monitor Mode rommon 1 > rommon 1 >
Lab Practice- Environment
Part 4 Page 23 of 35
Delete NVRAM (Start-up configuration) on the cisco Router
Step 1: Switch to the CLI of the router and disable host to IP address translation to prevent
"Translating domain server (255.255.255.255)" Messages.
Router > enable
Router # configuration terminal
Router (config) # no ip domain-lookup
Step 2: Change the router’s host name to TEST
Router (config) # hostname TEST
Test (config) # exit
Step 3: Delete the start-up configuration (NVRAM) on your router.
Test # erase startup-config [press Enter]
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
[OK] - [press Enter]
The figure below shows syslog massage of successful erase attempt of NVRAM
The figure below shows the current Hostname after change the hostname from the default
hostname
Lab Practice- Environment
Part 4 Page 24 of 35
Step 4: Reload the router.
Test # reload
Proceed with reload? [confirm] - [press Enter]
Step 5: The prompt will ask “System configuration has been modified. Save? [Yes/no]” prior
to reboot the router. Type No and press the enter key to continue. See the picture below.
Step 6: The router will begin to restart. This might take a little while to finish the reboot process.
So be patient until it completely finished.
Step 7: During the rebooting process, you will see a prompt “Would you like to enter the initial
configuration dialog (yes/no)”. Type No and press the enter key.
Step 8: Next, You will see a prompt “Would you like to terminate autoinstall (yes/no)”. Type
Yes and press the enter key.
Step 9: At the end of the reboot process, you will see the router’s command line interface with the
initial prompt of; Router> in user EXEC mode.
Step 10: Verify that the router does not have any previous configuration, look at the Hostname
of the router, it has been changed to default. See the picture below.
The figure below shows the Hostname (default Hostname) after delete the start-up configuration
Lab Practice- Environment
Part 4 Page 25 of 35
Delete VLAN information on the cisco switch.
Step 1: Go to CLI of the switch. Assign VLAN 10 to FastEthernet 0/3 port.
Switch > enable
Password: ccna
Switch # configure terminal
Switch (config) # interface fastEthernet 0/3
Switch (config-if) # switchport access vlan 10
% Access VLAN does not exist. Creating vlan 10’
Switch (config-if) # exit
Switch (config) #exit
Step 2: Execute the command “show vlan brief” in the Privileged EXEC mode and identify
FastEthernet 3/0 port is in the VLAN 10. See the picture below.
Step 3: Delete the vlan.dat file in order to clean VLAN information on your Switch.
Switch# delete vlan.dat [press Enter]
Delete filename [vlan.dat]? [Press Enter]
Delete flash:/vlan.dat? [confirm] - [press Enter]
Step 4: Save the current configuration in to the NVRAM of the switch.
Switch# copy running-config startup-config [press Enter]
Destination filename [startup-config]? [press Enter]
Building configuration.
Lab Practice- Environment
Part 4 Page 26 of 35
Step 5: Reload the switch.
Switch # reload
Proceed with reload? [confirm] - [press Enter]
Note: After executing the reboot command, the switch’s telnet session will be gone due to
network termination between the switch and the computer. Keep waiting until switch is fully
converge (i.e. the port LED indication light should remain solid green, See the picture below)
during the reboot process. This might take a little while to finish the converge process. After
reboot is done establish a telnet session again (See the Part 3, steps 15-19).
Step 6: After established the telnet session, go to the privilege EXEC mode and execute the
command “show vlan brief” and identify FastEthernet 3/0 port is in the default VLAN which is
VLAN 1. See the picture below.
Lab Practice- Environment
Part 5 Page 27 of 35
Part 5: Actual configurations on the router.
Background
In this activity, you will perform basic router configurations. You will secure access to the
command-line interface (CLI) and console port using encrypted and plain text passwords. You
will be also setting up the router hostname, configure MOTD banner and other basic IOS
commands.
Requirements
Step 1: Go to CLI of the router and assign a name to the router as “S1_P1_R1”
Router > enable
Router # configuration terminal
Router (config) # hostname S1_P1_R1
Step 2: Configure a message of the day (MOTD) banner. Use banner massage as “This is a secure
system. Authorized access only”.
Router (config) #banner motd $This is a secure system. Authorized access only$
Router (config) # exit
Step 3: Set the current time and date on the router.
Router # clock set [hh:mm:ss] [day of the month] [MONTH] [year]
EX- clock set 12:22:14 23 FEB 2001
Step 4: Secure access to the console line. Use “cisco” as the console password and verify that
console access is secured.
Router # configuration terminal
Router (config) # line con 0
Router (config-line) # password cisco
Router (config-line) # login
Router (config-line) # exit
Step 5: Configure an encrypted password to secure the privilege mode access. Use “ccna” as
enable password and verify that the privileged mode access is secure.
Router(config)# enable secret ccna
Step 6: Encrypt other plain text passwords on the router by using the appropriate command.
Router(config)#service password-encryption
Router(config)#exit
Step 7: Save the configurations in to the NVRAM.
Router# copy running-config startup-config
Lab Practice- Environment
Part 6 Page 28 of 35
Part 6: Assign IP addresses and perform static routing.
Background
In this activity you will use the addressing table to configure the router’s IP interfaces. Then you
will use the static routes to perform network interconnectivity.
Introduction to Static routing
Static routing is the process in which an administrator manually adds routs in each router’s routing
table rather than information from a dynamic routing traffic such as RIP, OSPF and EIGRP. The
static routs are fixed parameters and do not change if the network changes are occurred. Static
routes use less bandwidth than dynamic routes, and are primarily used for small networks.
Router(config)# ip route {Destination prefix} { Destination prefix mask} { Next hop address}
Introduction to the DCE and DTE side of WAN interface.
The devices that communicate over a serial cable are divided into two sides, DTE (Data Terminal
Equipment) WAN interface and DCE (Data communications equipment) WAN interface. Most
importantly clock signal settings must be configured on the DCE side of the WAN interface to
place the communication on the bus. DTE side of the interface does not need Clock signal settings.
In this activity, you have to find out which side of the cable you are going to configure. So you
can type “show controller serial 0/0” command in the router’s privilege EXEC mode and identify
which side of the cable you got. If it is DCE side, you will configure clock signal rate setting inside
the serial interface 0/0. If not, you do not need to configure clock signal settings. See the picture
below.
0
/
0
Lab Practice- Environment
Part 6 Page 29 of 35
Requirements
Step 1: Use the addressing table to configure router’s WAN interface. Configure a description for
each interface to help document the network information.
Router # configuration terminal
Router (config) # interface serial 0/0
Router (config-if) # ip address 10.10.1.1 255.255.255.252
Router (config-if) # description WAN network 10.10.1.0/30
Router (config-if) # no shutdown
Router (config-if) # exit
Step 2: Set the clock rate 64000s for DCE side of the serial interface.
Note: Type “show controller serial 0/0” command in the privilege EXEC mode and identify
DCE and DTE side of the serial interface. If it is the DCE side of the cable, you should
configure the clock-rate 64000 command inside the serial interface. If it is the DTE side of
the cable, you will not be needed to configure the clock rate command.
Router (config) # interface serial 0/0
Router (config-if) # Clock rate 64000
Router (config-if) # exit
Router (config) # exit
Note: If you are seeing this syslog massage in your CLI screen after configure WAN
connectivity both side. The connection has been established successfully. See the picture
below.
Step 3: Confirm connectivity between serial link by using Ping 10.10.1.2.
Router# ping 10.10.1.2
NOTE: your ping may not be successful between routers in Station 1 due to partial
configurations. Therefore, be patient until the next tier of configurations is done by your
partner. When he/she is done, check if the ping between routers in Station 1 is successful.
Even after, if the ping does not work, troubleshoot the serial connectivity until the ping
works.
Lab Practice- Environment
Part 6 Page 30 of 35
Step 4: Use the addressing table to configure the router’s LAN interface (Default gateway).
Configure a description for each interface to help document the network information.
Router# configuration terminal
Router(config)# interface fastEthernetl 0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)#description LAN network 192.168.1.0/24/default gateway
Router(config-if)# no shutdown
Router(config-if)#exit
Step 5: Use the addressing table to configure static IP address for client PCs.
Note: you have already configured static IPs for each PCs in part 2. If you have not
configured, follow the steps below.
1) Go to the “Network and Sharing center” on your PC.
2) Click on the “change adapter settings”.
3) Select your current network adapter and right click and select properties.
4) Select “internet protocol version 4 (TCP/IPv4)” and click on the “property” button
side of the window.
5) Set Static IP address based on the addressing table.
Step 6: Configure the next hop static route on S1_P1_R1 to every network not directly connected.
Router(config)# ip route {Destination prefix} { Destination prefix mask} { Next hop address}
Router(config)# ip route 192.168.2.0 255.255.255.0 10.10.1.2
Router(config)# exit
Step 7: Save the configurations into the NVRAM to avoid loss of data if the router is powered off.
Router# copy running-config startup-config
Lab Practice- Environment
Part 7 Page 31 of 35
Part 7: Verify configurations and Test connectivity.
Background
In this activity, you will apply some routing and switching IOS show commands, from the
privileged EXEC mode then find the answers for the questions below, at the same time you will
verify and compare your current configurations with the lab requirements which you have
configured. Finally, you will test the connection between the PCs and the routers in the station
using the Ping commands. If the ping was not successful, you will have to troubleshoot your
network again.
Switch requirement
Step 1: Go to CLI of the switch. Enter to the privilege EXEC mode.
Step 2: Using the IOS show commands as shown in the table, examine the current Switch
configurations. Then answer the following questions:
IOS show commands
Switch# show vlan brief
Switch# show cdp neighbors
Switch# show flash:
Switch# show running-config
Switch# show mac-address-table
Switch# show startup-config
1) In which VLAN is the FastEthernet 3/0 port in?
2) What is the privileged exec (enable) password?
3) How many FastEthernet ports are in this switch?
4) What is the IP address of the management interface VLAN 1?
5) Which command will display the current VLAN information in brief on your switch?
6) Which command will display the mac address information of the devices which are
attached to the ports?
7) Which IOS command will show all the directly connected Cisco equipments which are
connected to Fast Ethernet ports?
Lab Practice- Environment
Part 7 Page 32 of 35
Router requirements
Step 3: Go to CLI of the router. Enter to the privilege EXEC mode.
Step 4: Using the IOS show commands as shown in the table, examine the current Router
configurations. Then answer the following questions:
IOS show commands
Router# show ip route
Router# show interfaces serial 0/0
Router# show startup-config
Router# show version
Router# show controllers
Router# show ip interface brief
1) What is the default bandwidth of the Serial0/0?
2) What is the version of the cisco IOS?
3) What is the console password? Can you see it? If cannot see, what is the reason?
4) Which IOS command will show the summary of the key IP information for all the network
interfaces in the router?
5) Which command will display the current content of Non-Volatile Random-Access Memory
(NVRAM)?
6) Which command will be used to identify the DCE and the DTE side of the smart serial cable
which is attached to the router?
7) Which command will display the networks that are directly connected?
Lab Practice- Environment
Part 7 Page 33 of 35
Test connectivity
Step 5: Verify the connectivity between devices in Station 1.
Switch to the S1_P1_PC1 Windows Command Prompt (CMD) and execute the below commands
and verify if the pings are successful.
Ping 192.168.1.1 (default gateway)
Ping 192.168.2.10
Ping 192.168.2.11
Use “show ip route” command in the privilege EXEC mode to verify are
there any non-directly connected networks in the routing table.
Switch to the S1_P1_PC2 Windows Command Prompt (CMD) and execute the below commands
and verify if the pings are successful.
Ping 192.168.1.1 (default gateway)
Ping 192.168.2.10
Ping 192.168.2.11
Use “show ip route” command in the privilege EXEC mode to verify are
there any non-directly connected networks in the routing table.
NOTE: your ping may not be successful between routers in Station 1 due to partial
configurations. Therefore, be patient until the next tier of configurations is done by your
partner. When he/she is done, check if the ping between routers in Station 1 is successful.
Even after, if the ping does not work, troubleshoot the network until the ping works.
Lab Practice- Environment
Password Recovery Lab Page 34 of 35
Password Recovery Lab
Steps for password recovery of the cisco router
Step 1: Connect console cable to the Router and load the CLI of the Router.
Step 2: Power cycle of the router.
Step 3: Press CLT and Break keys while router is being initiated its booting process.
Step 4: Router will boot from the ROM mode.
Rommon>
Step 5: Change the configuration register value 0x2142. This value will skip the NVRAM
configuration file when the router boots. See the picture below.
Rommon> confreg 0x2142
Step 6: Reload the router form the ROMON mode.
Rommon> reset
Step 7: After router boot up is done, copy the startup configuration file to the running configuration
file.
Router# copy startup configuration-running configuration
Step 8: Change the enable password.
Router# enable password cisco
Step 9: Change the configuration register value to default value.
Router# config-registry 0x2122
Step 10: Copy the running configuration file into the startup configuration file.
Router# copy running configuration- startup configuration
Step 11: Reload the router.
Router# reload
Lab Practice- Environment
Password Recovery Lab Page 35 of 35
Steps for password recover of the cisco switch.
Step 1: Connect console cable to the switch and load the CLI of the switch.
Step 2: Power on the switch while holding the mode button.
Step 3: Initialize the flash file system.
Switch: flash_init
Step 4: Find the config file in flash: directory.
Switch: dir flash:
Step 5: The file we are looking for change the password setting is config.text. When the file is
found, rename the config.text file into config.text.old. It will skip the password line when it’s next
boot up process.
Switch: rename flash:config.text flash:config.text.old
Step 6: Boot up the switch.
Switch:boot
Step 7: After the booting process is done, go to the EXEC mode and rename the configuration file
to its original filename.
Switch# rename flash:config.text.old flash:config.text
Step 8: Copy the configuration file into the NVRAM.
Switch# copy flash:config.text system:running-config
Step 9: Change the enable password.
Switch config# enable password cisco
Step 10: Copy the running configuration file into the startup configuration file.
Switch# copy running configuration- startup configuration