Lab Managing Router Configuration Files with Terminal Emulation Software

Similar documents
Lab - Building a Switch and Router Network

Lab - Examining Telnet and SSH in Wireshark

Lab Securing Network Devices

Lab Configuring 802.1Q Trunk-Based Inter-VLAN Routing Topology

Lab Using the CLI to Gather Network Device Information Topology

Lab Troubleshooting Basic PPP with Authentication Topology

Lab Configuring Basic RIPv2 (Solution)

Lab - Configuring a Switch Management Address

Lab Configuring Per-Interface Inter-VLAN Routing (Solution)

Lab Configuring Switch Security Features Topology

Device Interface IP Address Subnet Mask R1 G0/ N/A

Lab - Configuring IPv6 Addresses on Network Devices

Lab Configuring Per-Interface Inter-VLAN Routing (Instructor Version)

Lab Designing and Implementing a VLSM Addressing Scheme. Topology. Objectives. Background / Scenario

Lab Configuring 802.1Q Trunk-Based Inter-VLAN Routing (Instructor Version Optional Lab)

Lab Troubleshooting IPv4 and IPv6 Static Routes (Instructor Version Optional Lab)

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

Lab Configuring and Verifying Standard IPv4 ACLs Topology

Lab Configuring Basic Switch Settings (Solution)

Lab Configuring Port Address Translation (PAT) Topology

Lab - Configuring Basic DHCPv4 on a Router (Solution)

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab Configuring Dynamic and Static NAT (Solution)

Lab - Troubleshooting DHCPv4 Topology

Lab Configuring Port Address Translation (PAT) (Instructor Version)

Lab Configuring Dynamic and Static NAT (Instructor Version Optional Lab)

Skills Assessment Student Training Exam

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring and Verifying Standard IPv4 ACLs (Instructor Version Optional Lab)

Skills Assessment (EIGRP) Student Training Exam

Lab Configuring HSRP and GLBP Topology

Skills Assessment (OSPF) Student Training Exam

Lab - Troubleshooting ACL Configuration and Placement Topology

Skills Assessment Student Training

Skills Assessment Student Practice

Lab Configuring IPv4 Static and Default Routes (Solution)

Lab Correcting RIPv2 Routing Problems

Skills Assessment (OSPF) Student Training Exam

Retake - Skills Assessment Student Training (Answer Key)

Network Technology I. Fall 2014 CCNA Semester 1 Truls Ringkjob

Lab - Configuring Multi-area OSPFv2

Skills Assessment (EIGRP) Student Training Exam

Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme

Lab Troubleshooting RIP

Lab Configuring and Verifying Standard ACLs Topology

Lab - Establish a Console Session with Tera

Lab Troubleshooting IP Address Issues Instructor Version 2500

Lab Configuring Basic Router Settings with IOS CLI (Instructor Version Optional Lab)

Lab - Configuring VLANs and Trunking (Solution)

Lab Establishing and Verifying a Telnet Connection Instructor Version 2500

Lab Using the Boot System Command. Objective. Background/Preparation

Lab Configuring Static Routes Instructor Version 2500

Lab - Establishing a Console Session with Tera Term

Lab Well-Known Port Numbers and Multiple Sessions

Lab Configuring EtherChannel

CCNA Semester 1 labs. Part 1 of 2 Labs for chapters 1 7

Skills Assessment Student Training Exam

Lab - Configuring VLANs and Trunking

Lab Command Modes and Router Identification. Objective. Background/Preparation. Step 1 Login to the router in user EXEC mode

CCNA Semester 3 labs. Labs for chapters 2 10

Lab - Configuring VLANs and Trunking

Lab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab)

Lab - Securing Administrative Access Using AAA and RADIUS

Lab Configuring IPv6 Static and Default Routes

Lab Configuring Switch Security Features (Solution) Topology

Lab Exploring Cisco IOS and Configuring Basic Switch Settings

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Packet Tracer - Configuring Initial Switch Settings

Lab Backing up Configuration Files Instructor Version 2500

Lab Configuring Advanced EIGRP for IPv4 Features Topology

Lab Configure Extended VLANs, VTP, and DTP

Lab Router Configuration Using Setup Instructor Version 2500

Lab Configuring Router Passwords. Objective. Background/Preparation. Step 1 Login to the router in user EXEC mode

Lab Configuring OSPF Timers

Lab - Configuring Multi-area OSPFv3 Topology

Buy full file at

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

Lab Configuring ISDN BRI (U-Interface)

CCNA Semester 2 labs. Labs for chapters 2 10

Lab Configuring IPv6 Static and Default Routes (Solution)

Lab 4.2.5a Connectivity Tests Ping

Lab Verifying RIP v2 Configuration

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Lab Troubleshooting VTP Configuration

Skills Assessment. CCNA Routing and Switching: Connecting Networks. Topology. Assessment Objectives. Scenario

CCNA Semester 3 labs. Part 1 of 1 Labs for chapters 1 8

Lab Configuring the OSPF Routing Process

Lab Troubleshooting Routing Issues with show ip route and show ip protocols Instructor Version 2500

Device Interface IP Address Subnet Mask Default Gateway

Lab Configuring DHCP

Lab Verifying PPP Configuration

Backup a copy of a router IOS from flash to a TFTP server. Reload the backup IOS software image from a TFTP server into flash on a router.

Lab Backing up Configuration Files

Lab Configuring IGRP Instructor Version 2500

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask

Lab Spanning-Tree Recalculation

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Configuring the Switch with the CLI-Based Setup Program

ICND1. Switch Configuration Lab. All configurations have been set to factory defaults for these labs

Transcription:

Lab Managing Router Configuration Files with Terminal Emulation Software Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure Basic Device Settings Part 2: Use Terminal Emulation Software to Create a Backup Configuration File Part 3: Use a Backup Configuration File to Restore a Router Background / Scenario It is a recommended best practice to maintain backup configuration files for routers and switches in the event that they need to be restored to a previous configuration. Terminal emulation software can be used to easily back up or restore a router or switch configuration file. In this lab, you will use Tera Term to back up a router running configuration file, erase the router startup configuration file, reload the router, and then restore the missing router configuration from the backup configuration file. Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and the output produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the correct interface identifiers. Note: Make sure that the routers and switches have been erased and have no startup configurations. If you are unsure, contact your instructor. Required Resources 1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable) 1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable) 1 PC (Windows 7 or 8 with terminal emulation program, such as Tera Term) Console cables to configure the Cisco IOS devices via the console ports 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 7

Ethernet cables as shown in the topology Part 1: Configure Basic Device Settings In Part 1, you will set up the network topology and configure basic settings, such as the interface IP addresses, device access, and passwords on the router. Step 1: Cable the network as shown in the topology. Attach the devices as shown in the topology and cable as necessary. Step 2: Configure the PC-A network settings according to the Addressing Table. Step 3: Initialize and reload the router and switch. Step 4: Configure the router. a. Console into the router and enter global configuration mode. b. Set the router name to R1. c. Disable DNS lookup. d. Assign class as the privileged EXEC encrypted password. e. Assign cisco as the console password and enable login. f. Assign cisco as the VTY password and enable login. g. Encrypt the plain text passwords. h. Create a banner that warns anyone accessing the device that unauthorized access is prohibited. i. Configure and activate the G0/1 interface on the router using the information contained in the Addressing Table. j. Save the running configuration to the startup configuration file. Part 2: Use Terminal Emulation Software to Create a Backup Configuration File In part 2, you will use Tera Term as the terminal emulation software. If you are using other terminal emulation programs, the procedure will be different. Step 1: Establish a Tera Term console session to the router. a. Launch the Tera Term Program and in the New Connection window, select the Serial radio button and the appropriate communications port for your PC (i.e., COM7). Note: If Tera Term is not installed on the PC, it can be downloaded from the following link by selecting Tera Term: http://logmett.com/index.php?/download/free-downloads.html b. In Tera Term, press Enter to connect to the router. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 7

c. From the File menu, choose Log, and save the teraterm.log file to the Desktop. Ensure that the Append and Plain text check boxes are enabled (checked). d. The Tera Term log file will create a record of every command issued, and every output displayed. Note: You can use this feature to capture the output from several commands in sequence and use it for network documentation purposes. For example, you could issue the show version, show ip interface brief, and show running-config commands to capture information about the router. Step 2: Display the router running configuration. a. Issue the show running-config command. b. Continue pressing the space bar when --More-- is displayed until you see the router R1# prompt return. c. Click the Tera Term: Log icon on the Task bar. Click Close to end the log session. Note: You can also copy and paste the text from the Tera Term window directly into a text editor. Part 3: Use a Backup Configuration File to Restore a Router Step 1: Erase the router startup-configuration and reload. a. From privileged EXEC mode erase the startup configuration. R1# erase startup-config Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] [OK] Erase of nvram: complete 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 7

b. Reload the router. R1# reload Proceed with reload? [confirm] c. At the System Configuration Dialog prompt, type no. A router prompt will display, indicating an unconfigured router. --- System Configuration Dialog --- Would you like to enter the initial configuration dialog? [yes/no]: Press RETURN to get started! <output omitted> Router> d. Enter privileged EXEC mode and enter the show running-config command to verify that all of the previous configurations were erased. Step 2: Edit the saved configuration backup. To restore the router configuration from a saved running configuration backup file, you must edit the text. a. Open the teraterm.log text file. b. Remove each instance of --More-- in the text file. Note: The --More-- was generated by pressing the Spacebar when displaying the running configuration. c. Delete the initial lines of the backup configuration file, so that the first line starts with the first configuration command. service timestamps debug datetime msec service timestamps log datetime msec service password-encryption d. Replace the encrypted secret password. enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2 enable secret class e. In the lines for interface GigabitEthernet0/1, insert a new line to enable the interface. interface GigabitEthernet0/1 ip address 192.168.1.1 255.255.255.0 duplex auto speed auto interface GigabitEthernet0/1 ip address 192.168.1.1 255.255.255.0 duplex auto speed auto no shutdown 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 7

f. Change the message-of-the-day (MOTD) banner configuration so that it inserts the delimiting characters as if you were entering the command at the command line. banner motd ^C Unauthorized Access is Prohibited! ^C banner motd Unauthorized Access is Prohibited! g. In line con 0 and vty 0 4 sections, replace the encrypted password. line con 0 password 7 104D000A0618 line vty 0 4 password 7 104D000A0618 line con 0 password cisco line vty 0 4 password cisco h. After you have made all of the edits to the backup configuration file, save your changes to the filename R1-config-backup. Note: When saving the file, an extension, such as.txt, may be added to the filename automatically. Step 3: Restore the router configuration. You can restore the edited running configuration directly to the console terminal in router global configuration mode. The configurations are entered as if they were commands entered individually at the command prompt. a. From the Tera Term console connection to the router, enter global configuration mode. b. From the File menu, select Send file. c. Locate R1-config-backup and select Open. d. Save the running configuration to the startup configuration file. R1# copy running-config startup-config e. Verify the new running configuration. Part 4: Back Up and Restore the Switch (Optional) In part 4, you will practice the procedure to backup and restore a switch using the same procedure as is used for a router. You will create a basic configuration file on the switch. You will backup and restore the configuration file for the switch using a terminal emulation software. Step 1: Configure basic settings on the switch. a. Console into the switch and enter global configuration mode. b. Set the switch name to S1. c. Disable DNS lookup. d. Assign class as the privileged EXEC encrypted password. e. Assign cisco as the console password and enable login. f. Assign cisco as the VTY password and enable login. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 7

g. Encrypt the plain text passwords. h. Create a banner that warns anyone accessing the device that unauthorized access is prohibited. i. Configure the default SVI management interface with the IP address information contained in the Addressing Table. j. Configure the switch default gateway. k. Save the running configuration to the startup configuration file. Step 2: Back up the switch. a. Establish a Tera Term console session to the switch as necessary. b. Start a log file using Tera Term and save it to the Desktop. c. Enter the privileged EXEC mode on the switch and type the show running-config command. d. When the entire running configuration has been displayed, end the log session. Step 3: Erase and reload the switch. a. From privileged EXEC mode, erase the startup configuration. S1# erase startup-config b. Reload the switch. c. At the System Configuration Dialog prompt, type no to exit the initial configuration dialog. d. Verify that all of the previous configurations were erased. Step 4: Edit the saved configuration backup file. a. Open the saved configuration backup text file. b. Replace the encrypted password with a plaintext password. c. Activate the appropriate switchports to establish connectivity in the network. d. Remove each instance of --More-- from the text file. e. Delete the initial lines of the backup configuration file, so that the first line starts with the first configuration command. f. Replace the delimiting characters in the message-of-the-day (MOTD) banner configuration. g. After you have made all of the edits to the backup configuration file, save your changes to the filename S1-config-backup. Note: When saving the file, an extension, such as.txt, may be added to the filename automatically. Step 5: Restore the switch configuration. a. From the Tera Term console connection to the router, enter global configuration mode. b. From the File menu, select Send file. c. Locate S1-config-backup and select Open. d. Save the running configuration to the startup configuration file. R1# copy running-config startup-config e. Verify the new running configuration. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 7

Reflection Why do you think it is important to use a text editor instead of a word processor to copy and save your command configurations? Router Interface Summary Table Router Interface Summary Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2 1800 Fast Ethernet 0/0 (F0/0) 1900 Gigabit Ethernet 0/0 (G0/0) 2801 Fast Ethernet 0/0 (F0/0) 2811 Fast Ethernet 0/0 (F0/0) 2900 Gigabit Ethernet 0/0 (G0/0) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Fast Ethernet 0/1 (F0/1) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1) Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 7