0% found this document useful (0 votes)
21 views

Lab Week 1

1

Uploaded by

jeronreijne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Lab Week 1

1

Uploaded by

jeronreijne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Packet Tracer - Configure Router Interfaces

Addressing Table
Device Interface IPv4 and IPv6 Address/Prefix Default Gateway

R1 G0/0 192.168.1.1 /24 N/A


2001:db8:ACAD:A::1/64
G0/1 192.168.2.1 /24 N/A
2001:db8:ACAD:B::1/64
S1 NIC 192.168.1.2 /24 192.168.1.1
S2 NIC 192.168.2.2 /24 192.168.2.1
PC-A NIC 192.168.1.10 /24 192.168.1.1
2001:db8:ACAD:A::10/64 fe80::1
PC-B NIC 192.168.2.10 /24 192.168.2.1
2001:db8:ACAD:B::10/64 fe80::2

Objectives

Part 1: Configure Basic Device Configuration

Part 2: Configure SSH and Verify Connectivity

Part 3: Configure IPv4 Addressing and Verify Connectivity

Part 4: Configure IPv6 Addressing and Verify Connectivity

Background
Routers R1 and R2 each have two LANs. Your task is to configure basic device configuration, telnet and SSH
configurations and the appropriate addressing on each device and verify connectivity between the LANs.
Note: The user EXEC password is cisco. The privileged EXEC password is class.

 2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com
Instructions

Part 1: Configure Basic Device Configuration on S1


a. Disable DNS lookup
b. Configure console password as “cisco” and encrypted privilege mode password as “class”.
c. Configure vty lines password as “telnet”.
d. Show the current configuration and note that the passwords are in plain text. Enter the command that
encrypts plain text passwords:
S1(config)# service password-encryption
e. Verify that the passwords are encrypted.
f. Configure banner motd “Authorized Users Only!”

Part 2: Configure SSH on R1 as a Secure Remote Access Method.


Step 1: Set the IP domain name and generate secure keys.
It is generally not safe to use Telnet, because data is transferred in plain text. Therefore, use SSH whenever it
is available.
a. Configure the domain name to be netacad.pka.
b. Configure encrypted privilege mode password as “class”.
c. Secure keys are needed to encrypt the data. Generate the RSA keys using a 1024 key length.

Step 2: Create an SSH user and reconfigure the VTY lines for SSH-only access.
a. Create an administrator user with cisco as the secret password.

Part 3: Configure IPv4 Addressing and Verify Connectivity


Step 1: Assign IPv4 addresses to R1 and LAN devices.
Referring to the Addressing Table, configure IPv4 addressing for R1 LAN interfaces, PC-A and PC-B.

Step 2: Verify connectivity.


PC1 and PC2 should be able to ping each other.

Part 4: Configure IPv6 Addressing and Verify Connectivity


Step 1: Assign IPv6 addresses to R1 and LAN devices.
Referring to the Addressing Table, configure IPv6 addressing for R1 LAN interfaces, PC-A and PC-B.

Step 2: Verify connectivity.


PC-A and PC-B should be able to ping each other.

 2013 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com

You might also like