11.3.4.6 Lab - Using The CLI To Gather Network Devi
11.3.4.6 Lab - Using The CLI To Gather Network Devi
11.3.4.6 Lab - Using The CLI To Gather Network Devi
Lab Us
sing the
e CLI to Gather
G
Network
N
k Device
e Information
T
Topology
A
Addressing
g Table
Device
R1
Interface
IP Ad
ddress
Subnet Ma
ask
D
Default
Gateway
G0/1
G
192.168
8.1.1
2
255.255.255.0
0
N/A
Lo0
L
209.165
5.200.225
2
255.255.255.2
224
N/A
S1
VLAN
V
1
192.168
8.1.11
2
255.255.255.0
0
192.1
168.1.1
PC
C-A
NIC
N
192.168
8.1.3
2
255.255.255.0
0
192.1
168.1.1
O
Objectives
Part 1: Se
et Up Topolo
ogy and Initia
alize Devices
s
Set up
p equipment to
t match the network topology.
Part 2: Co
onfigure Dev
vices and Ve
erify Connecttivity
Config
gure basic se
ettings on R1.
Config
gure basic se
ettings on S1.
Verify
y network connectivity.
Part 3: Ga
ather Network Device Infformation
Gathe
er information
n on R1 using IOS CLI com
mmands.
Gathe
er information
n on S1 using IOS CLI com
mmands.
Gathe
er information
n on PC-A using the comm
mand prompt C
CLI.
B
Backgroun
nd / Scenarrio
Documenting a working
g network is one
o of the mo
ost important tasks a netwo
ork profession
nal can perform.
Having prroper docume
entation of IP addresses, model
m
numberrs, IOS versio
ons, ports use
ed, and testing
security, can
c go a long way in helpin
ng to troubles
shoot a netwo
ork.
In this lab
b, you will build a small netw
work, configu
ure the device
es, add some basic securitty, and then d
document
the config
gurations by is
ssuing various
s commands on the routerr, switch and PC to gather your information.
P
Page 1 of 11
Required Resources
1 Router (Cisco 1941 with Cisco IOS software, release 15.2(4)M3 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
Console cables to configure the Cisco IOS devices via the console ports
Step 1:
Step 2:
Step 1:
Configure the IPv4 address, subnet mask, and default gateway address for PC-A based on the Addressing
Table.
Step 2:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 11
Step 3:
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 11
Step 4:
a. From a command prompt on PC-A, ping the S1 VLAN 1 IP address. Troubleshoot your physical and
logical configurations if the pings were not successful.
b. From the PC-A command prompt, ping your default gateway IP address on R1. Troubleshoot your
physical and logical configurations if the pings were not successful.
c.
From the PC-A command prompt, ping the loopback interface on R1. Troubleshoot your physical and
logical configurations if the pings were not successful.
d. Console back into the switch and ping the G0/1 IP address on R1. Troubleshoot your physical and logical
configurations if the pings were not successful.
Step 1:
One of the most basic steps is to gather information on the physical device, as well as information on the
operating system.
a. Issue the appropriate command to discover the following information:
Router Model:
IOS Version:
Total RAM:
Total NVRAM:
Total Flash Memory:
IOS Image File:
Configuration Register:
Technology Package:
What command did you issue to gather the information?
b. Issue the appropriate command to display a summary of important information about the router
interfaces. Write down the command and record your results below.
Note: Only record interfaces that have IP addresses.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 11
Issue the appropriate command to display the routing table. Write down the command and record your
results below.
d. What command would you use to display the Layer 2 to Layer 3 mapping of addresses on the router?
Write down the command and record your results below.
e. What command would you use to see detailed information about all the interfaces on the router or about a
specific interface? Write down the command below.
f.
Cisco has a very powerful protocol that operates at Layer 2 of the OSI model. This protocol can help you
map out how Cisco devices are connected physically, as well as determining model numbers and even
IOS versions and IP addressing. What command or commands would you use on router R1 to find out
information about switch S1 to help you complete the table below?
Device ID
Local
Interface
Capability
Model #
Remote
Port ID
IP Address
IOS Version
g. A very elementary test of your network devices is to see if you can telnet into them. Remember, Telnet is
not a secure protocol. It should not be enabled in most cases. Using a Telnet client, such as Tera Term or
PuTTY, try to telnet to R1 using the default gateway IP address. Record your results below.
h. From PC-A, test to ensure that SSH is working properly. Using an SSH client, such as Tera Term or
PuTTY, SSH into R1 from PC-A. If you get a warning message regarding a different key, click Continue.
Log in with the appropriate username and password you created in Part 2. Were you successful?
The various passwords configured on your router should be as strong and protected as possible.
Note: The passwords used for our lab (cisco and class) do not follow the best practices needed for
strong passwords. These passwords are used merely for the convenience of performing the labs. By
default, the console password and any vty passwords configured would display in clear text in your
configuration file.
i.
Verify that all of your passwords in the configuration file are encrypted. Write down the command and
record your results below.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 11
Step 2:
Many of the commands that you used on R1 can also be used with the switch. However, there are some
differences with some of the commands.
Instructor Note: Answers for all of Step 2 will vary based on Switch model, ports used and MAC addresses.
a. Issue the appropriate command to discover the following information:
Switch Model:
IOS Version:
Total NVRAM:
IOS Image File:
What command did you issue to gather the information?
b. Issue the appropriate command to display a summary of key information about the switch interfaces.
Write down the command and record your results below.
Note: Only record active interfaces.
c.
Issue the appropriate command to display the switch MAC address table. Record the dynamic type MAC
addresses only in the space below.
d. Verify that Telnet VTY access is disabled on S1. Using a Telnet client, such as Tera Term or PuTTY, try
to telnet to S1 using the 192.168.1.11 address. Record your results below.
e. From PC-A, test to ensure that SSH is working properly. Using an SSH client, such as Tera Term or
PuTTY, SSH into S1 from PC-A. If you get a warning message regarding a different key, click Continue.
Log in with an appropriate username and password. Were you successful?
f.
Complete the table below with information about router R1 using the appropriate command or commands
necessary on S1.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 6 of 11
Device Id
Local
Interface
Capability
Model #
Remote
Port ID
IP Address
IOS Version
g. Verify that all of your passwords in the configuration file are encrypted. Write down the command and
record your results below.
Command:
Is the console password encrypted?
Step 3:
Using various Windows utility commands, you will gather information on PC-A.
a. From the PC-A command prompt, issue the ipconfig /all command and record your answers below.
What is the PC-A IP address?
What is the PC-A subnet mask?
What is the PC-A default gateway address?
What is the PC-A MAC address?
b. Issue the appropriate command to test the TCP/IP protocol stack with the NIC. What command did you
use?
c.
Ping the loopback interface of R1 from the PC-A command prompt. Was the ping successful?
d. Issue the appropriate command on PC-A to trace the list of router hops for packets originating from PC-A
to the loopback interface on R1. Record the command and output below. What command did you use?
e. Issue the appropriate command on PC-A to find the Layer 2 to Layer 3 address mappings held on your
NIC. Record your answers below. Only record answers for the 192.168.1.0/24 network. What command
did you use?
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 7 of 11
Reflection
Why is it important to document your network devices?
Ethernet Interface #1
Ethernet Interface #2
Serial Interface #1
Serial Interface #2
1800
1900
2801
2811
2900
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 8 of 11
L
Lab Using the
t CLI to Ga
ather Networrk Device Infformation
S
Step 2: Co
onfigure the
e router.
a. Conso
ole into the ro
outer and ente
er privileged EXEC
E
mode.
Route
er> enable
e
Route
er#
b. Set th
he correct time
e on the route
er.
Route
er# clock set 10:40:
:30 6 Febr
ruary 2013
Route
er#
c.
1) Assign
A
a hostn
name to the ro
outer. Use the
e topology an
nd Addressing
g Table as guidelines.
Route
er(config)# hostname
e R1
R1(co
onfig)#
2) Disable
D
DNS lo
ookup.
R1(co
onfig)# no
o ip domain
n-lookup
3) Create
C
a MOTD banner that warns anyone accessing
g the device th
hat unauthorizzed access iss
prrohibited.
R1(co
onfig)# ba
anner motd #Warning! Unauthori
ized Acces
ss is prohi
ibited.#
4) Assign
A
class as
a the privileg
ged EXEC enc
crypted passw
word.
R1(co
onfig)# en
nable secre
et class
5) Assign
A
cisco as
a the console
e password and
a enable co
onsole login a
access.
R1(co
onfig)# li
ine con 0
R1(co
onfig-line
e)# passwor
rd cisco
R1(co
onfig-line
e)# login
6) Encrypt clear text
t
password
ds.
onfig)# se
ervice pass
sword-encr
ryption
R1(co
7) Create
C
a doma
ain name of cisco.com
c
forr SSH accesss.
P
Page 9 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 10 of 11
2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 11 of 11