0% found this document useful (0 votes)
46 views2 pages

Laboratory Experiment #7 (Answer)

The document summarizes the Cisco IOS CLI commands the author used most frequently, including show ip interface brief, show running-config, ping, traceroute, enable, configure terminal, show version, copy running-config startup-config, interface, and debug. It also provides recommendations for making customer router passwords more secure, such as using strong passwords with a mix of characters, changing default passwords, enabling two-factor authentication, using a password manager, and regularly updating passwords.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views2 pages

Laboratory Experiment #7 (Answer)

The document summarizes the Cisco IOS CLI commands the author used most frequently, including show ip interface brief, show running-config, ping, traceroute, enable, configure terminal, show version, copy running-config startup-config, interface, and debug. It also provides recommendations for making customer router passwords more secure, such as using strong passwords with a mix of characters, changing default passwords, enabling two-factor authentication, using a password manager, and regularly updating passwords.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Reflection:

1.) Which CISCO IOS CLI commands did you use the most?

- show ip interface brief: This command displays a summary of the IP addresses assigned to each
interface on the router.
- show running-config: This command displays the current configuration of the router, including any
changes that have been made but not saved.
- ping: This command sends an ICMP echo request to test network connectivity between two devices.
- traceroute: This command is used to trace the path that a packet takes from the source to the destination.
- enable: This command is used to enter privileged mode, which allows you to perform advanced
configuration tasks.
- configure terminal: This command is used to enter global configuration mode, which allows you to
make changes to the router's configuration.
- show version: This command displays information about the router's hardware and software.
- copy running-config startup-config: This command saves the current configuration of the router to non-
volatile memory, so that it will be retained even if the router is restarted.
- interface [interface name]: This command is used to enter interface configuration mode, which allows
you to configure individual router interfaces.
- debug [command]: This command is used to enable debug messages for a specific feature, such as OSPF
or BGP, to troubleshoot issues.
2.) How can you make the customer router passwords more secure?

- Use strong passwords: A strong password should be at least 12 characters long and include a mix
of upper and lowercase letters, numbers, and special characters. Avoid using common words,
phrases, or easily guessable information like your name or date of birth.
- Change the default password: Most routers come with a default password that is easily accessible
online. It is important to change the default password to something unique and secure.
- Use two-factor authentication: Two-factor authentication provides an extra layer of security by
requiring a second form of authentication, such as a code sent to your phone, in addition to your
password.
- Use a password manager: Password managers can generate and store strong, unique passwords
for each website and device. This reduces the risk of using the same password across multiple
sites or devices, which can make all of your accounts vulnerable if one is compromised.
- Regularly update your password: It's a good practice to update your password every few months
or if there is a security breach or suspicious activity on your account.

You might also like