Implement Basic Connectivity
Implement Basic Connectivity
Group 2, 439009881
Computer Networks
Report 4
Oct 5, 2021
Introduction
In this report, we will use the Cisco IOS to perform an initial configuration to a router, including host
name, passwords, a message-of-the-day (MOTD) banner, and other basic settings, that we verified on
the last report. Next, you will apply connectivity by perform basic configuring IP addressing on switches
and PCs.
Addressing Table
Device Interface IP Address Subnet Mask
S1 VLAN 1 192.168.1.253 255.255.255.0
S2 VLAN 1 192.168.1.254 255.255.255.0
PC1 NIC 192.168.1.1 255.255.255.0
PC2 NIC 192.168.1.2 255.255.255.0
Table 1 Addressing tracer
1.2 Configure the console and encrypted privileged EXEC mode passwords
Use cisco for the console password. Use class for the privileged EXEC mode password:
S1(config)# line console 0
S1(config-line)# password cisco
S1(config-line)# login
S1(config-line)# exit
S1(config)# enable secret class
1.3 Verify the password configurations for S1.
How can you verify that both passwords were configured correctly? Use an appropriate banner text to
warn unauthorized access. The following text is an example:
Authorized access only. Violators will be prosecuted to the full extent of the law.
S1(config)# banner motd “Authorized access only. Violators will
be prosecuted to the full extent of the law.”
Figure 1 IP Configuration
Question:
Question:
S2:
Note: You can also use the ping command on the switch CLI and on PC2.
All pings should be successful. If your first ping result is 80%, try again. It should now be 100%. You will
learn why a ping may sometimes fail the first time later in your studies. If you are unable to ping any of
the devices, recheck your configuration for errors.
Check Result
Conclusion
As we did in the previous lab, we configure both switches with a hostname, added a password for console
and privileged EXEC mode, then we wrote appropriate banner text to warn unauthorized access, and
saved the configuration file. After that we configured both PCs and switches with IP addresses, saved
configuration, and finally, verified our network connectivity.
Table of Contents
INTRODUCTION........................................................................................................................................................ 1
EQUIPMENT AND TOOLS ......................................................................................................................................... 1
ADDRESSING TABLE ................................................................................................................................................. 1
1 PERFORM A BASIC CONFIGURATION ON S1 AND S2 ....................................................................................... 1
1.1 CONFIGURE S1 WITH A HOSTNAME................................................................................................................... 1
1.2 CONFIGURE THE CONSOLE AND ENCRYPTED PRIVILEGED EXEC MODE PASSWORDS ....................................................... 1
1.3 VERIFY THE PASSWORD CONFIGURATIONS FOR S1. ............................................................................................... 2
1.4 SAVE THE CONFIGURATION FILE TO NVRAM. ..................................................................................................... 2
1.5 REPEAT STEPS 1 TO 5 FOR S2. ......................................................................................................................... 2
2 CONFIGURE THE PCS........................................................................................................................................ 3
2.1 CONFIGURE BOTH PCS WITH IP ADDRESSES. ....................................................................................................... 3
2.2 TEST CONNECTIVITY TO SWITCHES..................................................................................................................... 3
3 CONFIGURE THE SWITCH MANAGEMENT INTERFACE ..................................................................................... 3
3.1 CONFIGURE S1 WITH AN IP ADDRESS ................................................................................................................ 3
3.2 CONFIGURE S2 WITH AN IP ADDRESS ................................................................................................................ 4
3.3 VERIFY THE IP ADDRESS CONFIGURATION ON S1 AND S2 ....................................................................................... 5
3.4 SAVE CONFIGURATIONS FOR S1 AND S2 TO NVRAM. .......................................................................................... 6
3.5 VERIFY NETWORK CONNECTIVITY ...................................................................................................................... 6
CHECK RESULT.......................................................................................................................................................... 7
CONCLUSION............................................................................................................................................................ 7