ICND120S03
ICND120S03
Switch(config)#service password-encryption
Switch(config)#exit
Switch#show running-config | include enable
enable secret 5 $1$vWZa$2sYQLDv4R4xMtU5NFDrbX.
enable password 7 04785A150C2E1D1C5A
Switch(config)#line console 0
Switch(config-line)#password C1sco123
Switch(config-line)#login
EXEC timeout:
Switch(config-line)#exec-timeout 5
Switch(config)#line vty 0 15
Switch(config-line)#login
Switch(config-line)#password CiScO
EXEC timeout:
Switch(config-line)#exec-timeout 5
Switch(config)#hostname SwitchX
SwitchX(config)#ip domain-name cisco.com
SwitchX(config)#username user1 secret C1sco123
SwitchX(config)#crypto key generate rsa modulus 1024
The name for the keys will be: SwitchX.cisco.com
% The key modulus size is 1024 bits
% Generating 1024 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 1 seconds)
SwitchX(config)#line vty 0 15
SwitchX(config-line)#login local
SwitchX(config-line)#transport input ssh
SwitchX(config-line)#exit
SwitchX(config)#ip ssh version 2
Switch#show ip ssh
SSH Enabled - version 2.0
Authentication timeout: 120 secs; Authentication retries: 3
Switch#show ssh
Connection Version Encryption State Username
0 1.5 3DES Session started cisco
Router(config)#line vty 0 15
Router(config-line)#access-class 1 in
Access for authorized users only. Please enter your username and password.
User Access Verification
Username:
SwitchX#show running-config
<output omitted>
!
interface FastEthernet0/1
shutdown
!
interface FastEthernet0/2
shutdown
!
interface FastEthernet0/3
shutdown
<output omitted>
The Fa0/1, Fa0/2, and Fa0/3 interfaces are disabled in the example.
SwitchX(config)#interface FastEthernet0/5
SwitchX(config-if)#switchport mode access
SwitchX(config-if)#switchport port-security
SwitchX(config-if)#switchport port-security maximum 1
SwitchX(config-if)#switchport port-security mac-address sticky
SwitchX(config-if)#switchport port-security violation shutdown
• Displays the port security settings that are defined for an interface
• Displays the port security settings that are defined for the FastEthernet 0/5 interface
• Displays the port security violation for the FastEthernet 0/5 interface
SwitchX#show port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count) (Count) (Count)
-------------------------------------------------------------------
Fa0/5 1 1 0 Shutdown
-------------------------------------------------------------------
Total Addresses in System (excluding one mac per port) : 0
Max Addresses limit in System (excluding one mac per port) : 1024
Router(config)#interface FastEthernet0/24
Router(config-if)#no cdp enable
Configure the SW1 switch as the NTP client, which will synchronize its time with the
Branch router.
Branch(config-if)#ip access-group 2 in
Important: Only one ACL per protocol, per direction, and per interface is allowed.
An extended ACL is activated on the interface in the same way as a standard ACL.
Named ACLs are activated on an interface with the same command as numbered
ACLs.
Branch#show access-lists
Standard IP access list SALES
10 deny 10.1.1.0, wildcard bits 0.0.0.255
20 permit 10.3.3.1
30 permit 10.4.4.1
40 permit 10.5.5.1
Extended IP access list ENG
10 permit tcp host 10.22.22.1 any eq telnet (25 matches)
20 permit tcp host 10.33.33.1 any eq ftp
30 permit tcp host 10.44.44.1 any eq ftp-data