Lab Activity 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Lab 1

Basic Switch Configuration


Learning Objectives:

• Configure a switch with a name 


• Configure passwords to ensure that access to the CLI is secured.
• Connect PC0 and PC1 to the switch as shown in the diagram
• Assign Static IP address to both PC’s 
• Verify the connectivity by sending PING message from PC0 to PC1
• Save the active configuration

Physical Topology: 

Switch name: IU
First Computer: PC0, 192.168.1.1
Second Computer: PC1, 192.168.1.2
Line Console password: cisco
Enable Secret password: cisco

Background/Preparation

Cable a network similar to the one in the diagram. The configuration output used in this lab is produced
from a 2960 series switch. Any other switch used may produce different output. Select the “Command
Line” option from the menu to perform the steps for this lab.
Step 1 Enter privileged mode

a. Privileged mode gives access to all the switch commands. Many of the privileged commands configure
operating parameters. Therefore, privileged access should be password-protected to prevent
unauthorized use. The privileged command set includes those commands contained in user EXEC mode,
as well as the configure command through which access to the remaining command modes is gained. 

Switch>enable
Switch#

b. Notice the prompt changed in the configuration to reflect privileged EXEC mode.

Step 2 Examine the current switch configuration

a. Examine the following current running configuration file:

Switch#show running-config

b. How many Ethernet or Fast Ethernet interfaces does the switch have? _______04____________

c. What is the range of values shown for the VTY lines? __________0-15_____________________

d. Examine the current contents of NVRAM as follows:

Switch#show startup-config
%% Non-volatile configuration memory is not present

e. Why does the switch give this response?


->  It displays this message because the configuration file was not saved to NVRAM. Currently it is only
located in RAM.
__________________________________________________________________________

Step 3 Assign a name to the switch

a. Enter enable and then the configuration mode. The configuration mode allows the management of
the switch. Enter IU, the name this switch will be referred to in the following:

Switch#configure terminal

Enter the configuration commands, one for each line. End by pressing Ctrl-Z. 

Switch(config)#hostname IU
IU(config)#exit

b. Notice the prompt changed in the configuration to reflect its new name. Type exit or press
Ctrl-Z to go back into privileged mode.

Step 4 Examine the current running configuration

a. Exam the current configuration that follows to verify that there is no configuration except for the
hostname:

IU#show running-config

b. Are there any passwords set on the lines? ___________no____________________________

c. What does the configuration show as the hostname of this switch? ___IU___________________

Step 5 Set the access passwords (1900: Skip to Step 6)

Enter config-line mode for the console. Set the password on this line as cisco for login. Configure the vty
lines 0 to 15 with the password cisco as follows: 

IU#configure terminal

Enter the configuration commands, one for each line. End by pressing Ctrl-Z.

IU (config)#line con 0
IU (config-line)#password cisco

IU (config-line)#line vty 0 15
IU (config-line)#password cisco

IU (config-line)#exit
lin

Step 6 Set the command mode passwords

a. Set the enable password to cisco and the enable secret password to class as follows:

IU (config)#enable password cisco


IU (config)#exit

IU (config)#enable secret password cisco


IU (config)#exit

b. Which password takes precedence, the enable password or enable secret password? 
______enable password______

Step 7 Assign IP addresses to both Computers


a. Click on PC0, Go to Config and assign IP address 192.168.1.1 to Fast Ethernet
Click on PC1, Go to Config and assign IP address 192.168.1.2 to Fast Ethernet

b. Open Command Prompt on PC0


Ping PC1 by using the command below

PC>Ping 192.168.1.2

c. Note down the PING result

Pinging 192.168.1.2 with 32 bytes of data:

Reply from 192.168.1.2: bytes=32 time=0ms TTL=128


Reply from 192.168.1.2: bytes=32 time=0ms TTL=128
Reply from 192.168.1.2: bytes=32 time=1ms TTL=128
Reply from 192.168.1.2: bytes=32 time=0ms TTL=128

Ping statistics for 192.168.1.2:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms

Step 8 Save the configuration

a. The basic configuration of the switch has just been completed. Back up the running configuration file
to NVRAM as follows: 

Note: This will ensure that the changes made will not be lost if the system is rebooted or loses power. 

IU#copy running-config startup-config


Destination filename [startup-config]?[Enter]
Building configuration... 

[OK]
IU#

b. Configuration upload is successfully completed.

Step 9 Examine the startup configuration file 


a. To see the configuration that is stored in NVRAM, type show startup-config from the privileged EXEC
(enable mode).

IU#show startup-config

b. What is displayed? 

Using 977 bytes


!
version 12.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname Switch
!
!
!
spanning-tree mode pvst
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
--More--

c. Are all the changes that were entered recorded in the file? 
-> Yes, it is the same as the running configuration.

Step 10 Exit the switch

Leave the switch welcome screen by typing exit as follows:

IU#exit

Once these steps are completed, logoff by typing exit, and turn all the devices off. Then remove and
store the cables and adapter. 

Conclusion: 
In this lab we learned how to setup a switch and apply password on it to make it
secure and connecting the end to end pcs for secure data
transfer.____________________________________________________________
___
Learning Outcomes:
In this lab we learned how to setup a switch and apply password on it to make it
secure and connecting the end to end pcs for secure data
transfer.____________________________________________________________
___
_______________________________________________________________

_______________________________________________________________

_______________________________________________________________

You might also like