1.1.7 Packet Tracer - Basic Switch Configuration - Physical Mode
1.1.7 Packet Tracer - Basic Switch Configuration - Physical Mode
• Addressing Table
Device Interface IP Address / Prefix
S1 VLAN 99
2001:db8:acad:1::2 /64
S1 VLAN 99
fe80::2
PC-A NIC 192.168.1.10 /24
PC-A NIC
2001:db8:acad:1::10 /64
Blank Line - no additional information
• Objectives
Part 1: Cable the Network and Verify the Default Switch Configuration
• Background / Scenario
Cisco switches can be configured with a special IP address known as the switch virtual interface
(SVI). The SVI, or management address, can be used for remote access to the switch to display or
configure settings. If the VLAN 1 SVI is assigned an IP address, by default, all ports on VLAN 1 have
access to the SVI IP address.
In this activity, you will build a simple topology using Ethernet LAN cabling to access a Cisco switch
using the console and remote access methods. You will examine default switch configurations before
configuring basic switch settings. These basic switch settings include device name, interface
description, local passwords, message of the day (MOTD) banner, IP addressing, and static MAC
address. You will also use a management IP address for remote switch management. The topology
consists of one switch and two hosts using only Ethernet and console ports. You will verify network
connectivity and manage a MAC address table using two end devices.
• Instructions
In Part 1, you will set up the network topology and verify default switch settings.
• Cable the network as shown in the topology.
• From the shelf, click and drag switch S1 and place it on the left side of the table.
• From the shelf, click and drag the device PC-A and place it on the right side of the table.
Power on PC-A.
• Connect a console cable from device PC-A to switch S1, as shown in the topology. Do
not connect the device PC-A Ethernet cable at this time.
• From the Desktop tab of PC-A, use Terminal to connect to the switch.
Question:
Why must you use a console connection to initially configure the switch? Why is it not possible to
connect to the switch via Telnet or SSH?
Type your answers here.
In this step, you will examine the default switch settings, such as current switch configuration, IOS
information, interface properties, VLAN information, and flash memory.
You can access all of the switch IOS commands in privileged EXEC mode. Access to privileged
EXEC mode should be restricted by password protection to prevent unauthorized use because it
provides direct access to global configuration mode and commands used to configure operating
parameters. You will set passwords later in this activity.
The privileged EXEC mode command set includes those commands contained in user EXEC mode,
as well as the configure command through which the access to the remaining command modes is
gained. Use the enable command to enter privileged EXEC mode.
• Assuming the switch had no configuration file stored in nonvolatile random-access
memory (NVRAM), a console connection using Terminal will place you at the user
EXEC mode prompt on the switch with a prompt of Switch>. Use the enable command
to enter privileged EXEC mode.
Open configuration window
Notice that the prompt changed in the configuration to reflect privileged EXEC mode.
• Verify that there is a clean default configuration file on the switch by issuing the show
running-config privileged EXEC mode command. Examine the current running
configuration file.
Questions:
What output do you see?Vlan1 is administratively down, line protocol is down.Internet protocol
processing is disabled.
Type your answers here.
• Connect an Ethernet cable from PC-A to GigabitEthernet1/0/6 on the switch. Allow time
for the switch and PC to negotiate duplex and speed parameters. Examine the IP
properties of the SVI VLAN 1.
Question:
What is the Cisco IOS version that the switch is running? Version 15.0(2)SE4, RELEASE
SOFTWARE (fcl)
Type your answers here.
What is the system image filename? flash:c290-lanbasek9-mz.150-2.SE4.bin
Type your answers here.
What is the base Ethernet MAC address of this switch? 00:E0:F9:57:6C:96
Type your answers here.
• Examine the default properties of the GigabitEthernet1/0/6 interface used by PC-A.
Switch# show interface gig1/0/6
Question:
In Part 2, you will configure basic settings for the switch and PC.
hostname S1
service password-encryption
banner motd #
For management purposes, use VLAN 99. The selection of VLAN 99 is arbitrary and in no way
implies that you should always use VLAN 99.
First, create the new VLAN 99 on the switch. Next, set the IP address of the switch to 192.168.1.2
with a subnet mask of 255.255.255.0 on the internal virtual interface VLAN 99. An IPv6 address
can also be configured on the SVI interface. Use the IPv6 addresses listed in the Addressing
Table.
Notice that the VLAN 99 interface is in the down state even though you entered the no shutdown
command. The interface is currently down because no switch ports are assigned to VLAN 99.
• Assign all user ports to VLAN 99.
To establish connectivity between the host and the switch, the ports used by the host must be in
the same VLAN as the switch. After a few seconds, VLAN 99 comes up because at least one
active port (Fa0/6 with PC-A attached) is now assigned to VLAN 99.
• Issue the show vlan brief command to verify that all ports are in VLAN 99.
• Configure the default gateway for S1. If no default gateway is set, the switch cannot be
managed from a remote network that is more than one router away. Although this activity
does not include an external IP gateway, assume that you will eventually connect the
LAN to a router for external access. Assuming that the LAN interface on the router is
192.168.1.1, set the default gateway for the switch.
• Console port access should also be restricted with a password. Use cisco as the
console login password in this activity. The default configuration is to allow all console
connections with no password needed. To prevent console messages from interrupting
commands, use the logging synchronous option.
S1(config)# line con 0
S1(config-line)# logging synchronous
• Configure the virtual terminal (vty) lines for the switch to allow Telnet access. If you do
not configure a vty password, you will not be able to use Telnet to access the switch.
Question:
Assign the IP address and subnet mask to the PC, as shown in the Addressing Table. An
abbreviated version of the procedure is described here. A default gateway is not required for this
topology to function; however, you should enter 192.168.1.1 and fe80::1 to simulate a router attached
to S1.
In Part 3, you will verify and document the switch configuration, test end-to-end connectivity between
PC-A and S1, and test the remote management capability of the switch.
Use the console connection on PC-A to display and verify the switch configuration. The show run
command displays the entire running configuration, one page at a time. Use the spacebar to advance
paging.
• A sample configuration is shown here. The settings you configured are highlighted in
yellow. The other configuration settings are IOS defaults.
Open configuration window
version 16.3.2
service password-encryption
hostname S1
no ip cef
no ipv6 cef
no ip domain-lookup
<output omitted>
interface GigabitEthernet1/0/6
!
<output omitted>
!
interface GigabitEthernet1/0/24
<output omitted>
interface Vlan1
no ip address
shutdown
interface Vlan99
mac-address 00e0.f795.d201
ip default-gateway 192.168.1.1
ip classless
banner motd ^C
line con 0
password 7 0822455D0A16
logging synchronous
login
line vty 0 4
password 7 0822455D0A16
login
line vty 5 15
password 7 0822455D0A16
login
end
• Verify the management VLAN 99 settings.
S1# show interface vlan 99
Questions:
Verify that PC-A can ping the IPv4 and IPv6 address for S1.
You will now use Telnet to remotely access the switch. In this activity, PC-A and S1 reside side by
side. In a production network, the switch could be in a wiring closet on the top floor while your
management PC is located on the ground floor. In this step, you will use Telnet to remotely access
switch S1 using the SVI management address. Telnet is not a secure protocol; however, you will use
it to test remote access. With Telnet, all information, including passwords and commands, are sent in
plaintext. In subsequent activities, you will use SSH to remotely access network devices.
• Open the Desktop tab on PC-A.
• Scroll down in the listing of apps and click the Telnet/SSH Client.
• Set the Connection Type to be Telnet.
• Enter the SVI management address to connect to S1 and click Connect.
• After entering the password cisco, you will be at the user EXEC mode prompt. Access
privileged EXEC mode using the enable command and providing the secret password
class.
• Save the configuration.
• Type exit to end the Telnet session. Click No to the pop-up.
You will now install switch S1 on the production network and disconnect the console cable. Telnet will
be used to remotely access the switch and complete any additional configuration and verification. In
subsequent activities, you will use SSH to remotely access network devices.
• Move switch S1 to the Rack.
• Right-click switch S1 and select Inspect Rear.
• Click and drag the console cable to the peg board.
• Reflection Questions
• Why should you configure the vty password for the switch?
Type your answers here.
• Why change the default VLAN 1 to a different VLAN number?
Type your answers here.
• How can you prevent passwords from being sent in plaintext?
Type your answers here.
End of document