CHAPTER 2 ACTIVITY

Similar documents
Jaringan Komputer (CCNA-1)

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

CCNA 1 Chapter 2 v5.0 Exam Answers %

MiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

CCNA Explorer 1 Chapter 11 Configuring & Testing Your Network

Lab Using the CLI to Gather Network Device Information Topology

Chapter 2. Chapter 2 A. Configuring a Network Operating System

Lab 7 Configuring Basic Router Settings with IOS CLI

Basic IOS Command Structure. Router#disable Router>

LAB 3 Basic Switch Configuration Commands

Chapter 2: Configure a Network Operating System. Every computer requires an operating system to function, including computerbased

Lab - Configuring a Switch Management Address

Skills Assessment Student Training Exam

ICND1. Switch Configuration Lab. All configurations have been set to factory defaults for these labs

config mode: Router> enable Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z.

Before you start the lab exercises see the lab administrator or EEE3080F tutor to get assigned to your routers.

Skills Assessment Student Practice

Chapter 11. Configuring and Testing Your Network

CCNA 1 Chapter 11 V4.0 Answers

Using the Command-Line Interface

Retake - Skills Assessment Student Training (Answer Key)

Lab 3: Basic Device Configuration

Using the Command-Line Interface

Lab 1. CLI Navigation. Scenario. Initial Configuration for R1

CCNA 1 Final Exam Answers UPDATE 2012 eg.2

Lab Securing Network Devices

Chapter 6: Network Layer

Lab - Examining Telnet and SSH in Wireshark

Configuring the Switch with the CLI-Based Setup Program

Configuring the Switch with the CLI-Based Setup Program

Chapter 4: Routing Concepts. Routing & Switching

Skills Assessment Student Training

Lab Managing Router Configuration Files with Terminal Emulation Software

Chapter 5 Router and IOS Basics

Skills Assessment (OSPF) Student Training Exam

Using the Command-Line Interface

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask

Using Cisco IOS XE Software

Skills Assessment (EIGRP) Student Training Exam

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge

Lab 1.4.6B Implementing Port Security

Skills Assessment (OSPF) Student Training Exam

Lab Configuring Basic Switch Settings (Solution)

CCNA 1 v5.0 R&S ITN Final Exam 2014

Skills Assessment (EIGRP) Student Training Exam

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

Lab 5.6.2: Challenge RIP Configuration

CCENT Study Guide. Chapter 6 Cisco s Internetworking Operating System (IOS)

Lab - Building a Switch and Router Network

Using the Command-Line Interface

Lab 2.8.2: Challenge Static Route Configuration

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

Lab Configuring Switch Security Features Topology

1. Which OSI layers offers reliable, connection-oriented data communication services?

Using the Cisco NCS Command-Line Interface

Administration of Cisco WLC

Controlling Switch Access with Passwords and Privilege Levels

DGS-3630-Series Switches

Using the Command-Line Interface

Skills Assessment Student Training Exam

Lab Exploring Cisco IOS and Configuring Basic Switch Settings

Command-Line Interfaces

Lab Establishing and Verifying a Telnet Connection Instructor Version 2500

Send document comments to

2. Which two functions of the OSI model occur at layer two? (Choose two.) physical addressing encoding routing cabling media access control

Lab Configuring and Verifying Extended ACLs Topology

Lab 6.4.2: Challenge Inter-VLAN Routing

Controlling Switch Access with Passwords and Privilege Levels

Using the Command-Line Interface

Lab Designing and Implementing a VLSM Addressing Scheme. Topology. Objectives. Background / Scenario

Catalyst 2960-X Switch Routing Configuration Guide, Cisco IOS Release 15.0(2)EX

Configuring the Switch with the CLI Setup Program

Lab Troubleshooting Using traceroute Instructor Version 2500

Lab Configuring and Verifying Standard IPv4 ACLs Topology

Lab Configure Basic AP Security through IOS CLI

Packet Tracer - Configuring Initial Switch Settings

Configuration and management of Networks LAB 1 Introduction to packet tracer

Lab Command Line Fundamentals Instructor Version 2500

OSI Model with Protocols. Layer Name PDU Address Protocols Device

Dr. Tom Hicks. Computer Science Department Trinity University

Hochschule Bremen Networking Lab

Using Cisco IOS Software

Lab 9.6.2: Challenge EIGRP Configuration Lab

Classful Address Subnet Mask Number of Hosts per Subnet (2 x 2)

Lab Troubleshooting Basic PPP with Authentication Topology

Upon completion of this chapter, you will be able to answer the following questions:

PT Activity: Configure AAA Authentication on Cisco Routers

Lecture (02) Switch remote configuration peer2peer star network clients/server star network Traffic analysis using Packet Tracer

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists

Network Technology I. Fall 2014 CCNA Semester 1 Truls Ringkjob

Lab Configuring an ISR with SDM Express

Lab Configuring Basic RIPv2 (Solution)

Overview of the Cisco NCS Command-Line Interface

Interconnecting Cisco Networking Devices Part 1 ( )

Antonio Cianfrani. Packet Tracer

Lab Configuring and Verifying Standard IPv4 ACLs (Instructor Version Optional Lab)

Lab Configuring DHCP

Lab - Configuring IPv6 Addresses on Network Devices

Transcription:

CHAPTER 2 ACTIVITY 2.1.1.1 1. CLI stands for 2. GUI stands for 3. Write the step you used to go to CLI interface on Windows 4. The OS, normally loads from a disk drive, into RAM. 5. The portion of the OS code that interacts directly with the computer hardware is known as the kernel. 6. The portion that interfaces with the applications and user is known as the shell. 7. Give 5 examples for GUI OS MS Windows, MAC OS X, Linux, Apple ios, Android, and more. 8. The operating system on home routers is usually called firmware. 9. The network operating system used on Cisco devices is called the Cisco Internetwork Operating System (IOS). 2.1.1.3 10. The IOS file itself is several megabytes in size and is stored in a semi-permanent memory area called flash. 11. Flash memory provides non-volatile storage. 12. IOS is copied from flash into random access memory (RAM) when the device is powered on. 13. A power cycle is when a device is purposely or accidently powered off and then powered back on. 14. figure shows a compact flash card. 15. What are the major functions performed or enabled by Cisco routers and switches include: Providing network security IP addressing of virtual and physical interfaces Enabling interface-specific configurations to optimize connectivity of the respective media Routing Enabling quality of service (QoS) technologies Supporting network management technologies 2.1.2.1 16. The three most common methods to access the CLI environment are: Console Telnet or SSH AUX port 17. The console port is a management port that provides out-of-band access to Cisco device. 18. When performing an initial configuration, a computer running terminal emulation software is connected to the console port of the device using a special cable. 2.1.2.2 19. Telnet is a method for remotely establishing a CLI session of a device, through a virtual interface, over a network.

20. The Secure Shell (SSH) protocol provides a remote login similar to Telnet, except that it uses more secure network services. It provides stronger password authentication than Telnet and uses encryption when transporting session data. 2.1.2.3 21. Name some terminal emulation programs available for connecting to a networking device either by a serial connection over a console port or by a Telnet/SSH connection. PuTTY (Figure 1) Tera Term (Figure 2) SecureCRT (Figure 3) HyperTerminal OS X Terminal 22. Do Activity 2.1.2.4 2.1.3.1 23. Answer the following questions from the IOS mode structure figure below:

a) List the commands used in User executive (User EXEC) mode: b) List the commands used in Privileged executive (Privileged EXEC) mode: c) List the commands used in Global configuration mode: 2.1.3.2 24. The two primary modes of operation are user EXEC mode and privileged EXEC mode. 25. Switch> is a user EXEC mode 26. Switch# is a Privileged EXEC Mode 2.1.3.3 27. The primary configuration mode is called global configuration or global config. 28. Which CLI command is used to take the device from privileged EXEC mode to the global configuration mode and to allow entry of configuration commands from a terminal: Switch# configure terminal 29. Switch(config)# is a global configuration mode 30. Label the different modes in the following figure:

31. Line mode - to configure one of the physical or virtual lines (console, AUX, VTY) 32. Interface mode - to configure one of the network interfaces (Fa0/0, S0/0/0) 33. To exit a specific configuration mode and return to global configuration mode, enter exit at a prompt. 34. To leave configuration mode completely and return to privileged EXEC mode, enter end or use the key sequence Ctrl-Z. 2.1.3.4 35. The enable and disable commands are used to change the CLI between the user EXEC mode and the privileged EXEC mode, respectively. 36. In order to access the privileged EXEC mode, use the enable command 37. The privileged EXEC mode is sometimes called the enable mode. 2.1.3.5 38. To quit from the global configuration mode and return to the privileged EXEC mode, enter the exit command. 2.1.4.1 39. Ping command is used to check the connectivity 40. Traceroute command is used to display the path from source to destination 41. The IOS has several forms of help available such as: a) Context-Sensitive Help b) Command Syntax Check c) Hot Keys and Shortcuts 42. Write the shortcut keys for the following functions? 2.1.4.5 a) Tab - Completes the remainder of a partially typed command or keyword b) Ctrl-Shift-6 - Allows the user to interrupt an IOS process such as ping or traceroute c) Ctrl-A - Moves to the beginning of the line d) Ctrl-E - Moves to the end of the line e) Ctrl-R - Redisplays a line f) Down Arrow, Ctrl-N - Allows the user to scroll forward through former commands g) Up Arrow, Ctrl-P - Allows the user to scroll backward through former commands h) Ctrl-C - Exits the configuration mode or aborts the current command i) Ctrl-Z - Exits the configuration mode and returns to user EXEC 2.1.4.6 43. show startup-config - Displays the saved configuration located in NVRAM. 44. show running-config - Displays the contents of the currently running configuration file. 45. When a command returns more output than can be displayed on a single screen, the --More-- prompt appears at the bottom of the screen. 2.1.4.7

46. show version command displays information about the currently loaded IOS version, along with hardware and device information. 2.2.1.2 47. Name some guidelines for naming conventions in Switch or Router: Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length 2.2.1.4 48. Configure the switch hostname to be Sw-Floor-1 Switch# 2.2.2.1 49. Name the different passwords the IOS uses in its hierarchical modes to help with device security: Enable password - Limits access to the privileged EXEC mode Enable secret - Encrypted, limits access to the privileged EXEC mode Console password - Limits device access using the console connection VTY password - Limits device access over Telnet 2.2.2.2 50. The enable secret command provides greater security because the password is encrypted. 51. Show the commands to set encrypted password class on privilege EXEC mode starting from the user EXEC mode below: Sw-Floor-1> 52. Write the command to move from Global config mode to Privileged EXEC mode: Sw-Floor-1(config)#exit 53. Write the command to move from Privileged EXEC mode to user EXEC mode: Sw-Floor-1#disable 54. Write the command to check the encrypted password: Sw-Floor-1> enable Password: Sw-Floor-1# 2.2.2.3

55. Write the commands to set a password for the console line: Switch(config)# line console 0 Switch(config-line)# password cisco Switch(config-line)# login 56. By default, many Cisco switches support up to 16 vty lines that are numbered 0 to 15. 57. Write the commands to set a password for the vty lines: Switch(config)# line vty 0 15 Switch(config-line)# password cisco Switch(config-line)# login 2.2.2.4 58. The command prevents passwords from showing up as plain text when viewing the configuration files is the service password-encryption command. 59. Enter the command to encrypt plain text password when viewing configuration files: Switch(config)# service password-encryption 60. One common banner is the message of the day (MOTD) which is often used for legal notification because it is displayed to all connected terminals. 61. Configure MOTD using the banner motd command from global configuration mode. 62. Write the command to display a banner This is a secured system. Authorized access ONLY!!! Switch(config)# banner motd # This is a secured system. Authorized access ONLY!!! # 2.2.3.1 63. The running configuration file reflects the current configuration applied to a Cisco IOS device 64. The running configuration file is stored in the working memory of the device, or random access memory (RAM). 65. The startup configuration file reflects the configuration that will be used by the device upon reboot. 66. The startup configuration file is stored in NVRAM. 67. Use the copy running-config startup-config command at the privileged EXEC mode 68. Give the command to save the running configuration to startup configuration file. Switch# copy running-config startup-config 69. To erase the startup configuration file use erase NVRAM:startup-config or erase startup-config at the privileged EXEC mode prompt: 70. Specify the command To erase the startup configuration file below:

Switch# erase startup-config 71. What command would you give on a switch in addition to the erase startup-config command in order to return the device to its default "out-of-the-box" configuration (comparable to a factory reset): Switch# delete vlan.dat 72. Give the steps of saving to a Text File in a Tera Term 2.2.3.2 73. Give the steps of saving to a Text File in a Hyper Terminal 2.3.1.1 74. Each end device on a network must be configured with IP addresses. 75. List some examples of end devices: Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones Security cameras Smart phones Mobile handheld devices (such as wireless barcode scanners) 76. The structure of an IPv4 address is called dotted decimal notation and is represented with four decimal numbers between 0 and 255. 77. IPv4 addresses are logical in nature, in that they provide information about the location of the device. 78. A subnet mask is a special type of IPv4 address that, coupled with the IP address, determines which particular subnet of a larger network the device is a member. 79. Virtual interface means that there is no physical hardware on the device associated with it. 2.3.1.2 80. What are Types of network media: twisted-pair copper cables, fiber-optic cables, coaxial cables, or wireless. 81. Ethernet is the most common local area network (LAN) technology used today. 82. RJ-45 connector is used to connect devices using an Ethernet port.

83. Cisco IOS switches have physical ports for devices to connect to, but also have one or more virtual interfaces called switch virtual interfaces (SVIs). 84. The default SVI is interface is called VLAN1. 2.3.2.1 85. IP address uniquely identifies end device on the internetwork 86. Subnet mask determines which part of a larger network is used by an IP address 87. no shutdown command Administratively enables the interface to an active state 2.3.2.2 88. Domain Name System (DNS) server is used to translate IP addresses to web addresses 89. The DNS server is used to maintain the mapping between the IP addresses and names of various devices 2.3.2.3 90. DHCP allows end devices to have IP information automatically configured. 91. It is possible to display the IP configuration settings on a Windows PC by using the ipconfig command at the command prompt. 2.3.3.1 92. The ping command is used to verify the internal IP configuration on a local host. 93. Device test is accomplished by using the ping command on a reserved address called the loopback (127.0.0.1) 94. Pinging 127.0.0.1 causes the device to ping itself 95. Successful ping request verifies that the network interface card, drivers, and the TCP/IP implementation are all functioning correctly. 2.3.3.2 96. Use the show ip interface brief command to verify the condition of the switch interface. 97. Write the command to enable IP connectivity to S1, using IP address 192.168.10.2: Switch(config#)#Interface vlan 1 Switch(config#)#Ip address 192.168.10.2 255.255.255.0 Switch(config#)#No shutdown