LAB3/Lab 3 Answer Sheet(1).docx
Liberty University
CSIS331
Lab 3 Answer Sheet
Submit this completed document with your completed and saved packet tracer in the link provided in Blackboard.
Part 1: Questions.
Step 1:
a. Which command displays the statistics for all interfaces configured on a router?
b. Which command displays the information about the Serial 0/0/0 interface only?
c. 1) What is the IP address configured on R1?
c. 2) What is the bandwidth on the Serial 0/0/0 interface?
d. 1) What is the IP address on R1?
d. 2) What is the MAC address of the GigabitEthernet 0/0 interface?
d. 3) What is the bandwidth on the GigabitEthernet 0/0 interface?
Step 2. Questions.
a. Which command displays a brief summary of the current interfaces, statuses, and IP addresses assigned to them?
b. 1) How many serial interfaces are there on R1 and R2?
b. 2) How many Ethernet interfaces are there on R1 and R2?
b. 3) Are all the Ethernet interfaces on R1 the same? If no, explain the difference(s).
Step 3: Display the routing table on R1.
a. What command displays the content of the routing table?
b. 1) How many connected routes are there (uses the C code)?
b. 2) Which route is listed?
b. 3) How does a router handle a packet destined for a network that is not listed in the routing table?
Part 2 Step 3
a. What command did you use?
Part 3 Step 1
a. 1) How many interfaces on R1 and R2 are configured with IP addresses and in the “up” and “up” state?
a. 2) What part of the interface configuration is NOT displayed in the command output?
a. 3) What commands can you use to verify this part of the configuration?
b. 1) How many connected routes (uses the C code) do you see on each router?
b. 2) How many EIGRP routes (uses the D code) do you see on each router?
b. 3) If the router knows all the routes in the network, then the number of connected routes and dynamically learned routes (EIGRP) should equal the total number of LANs and WANs. How many LANs and WANs are in the topology?
b. 4) Does this number match the number of C and D routes shown in the routing table?
Ping Table:
Ping From Device IP
Ping to Device IP
Results
PC1
PC4
R2
PC2
__MACOSX/LAB3/._Lab 3 Answer Sheet(1).docx
LAB3/Lab 3.pka
__MACOSX/LAB3/._Lab 3.pka
LAB3/Lab 3 Instructions(1).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 3 Instructions
Packet Tracer:
[Adapted from Cisco Networking Academy Intro to Networking 6.4.3.3]
Overview
In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations.
Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands.
Part 1: Display Router Information
Step 1: Display interface information on R1. ...
1. LAB3/Lab 3 Answer Sheet(1).docx
Liberty University
CSIS331
Lab 3 Answer Sheet
Submit this completed document with your completed and saved
packet tracer in the link provided in Blackboard.
Part 1: Questions.
Step 1:
a. Which command displays the statistics for all interfaces
configured on a router?
b. Which command displays the information about the Serial
0/0/0 interface only?
c. 1) What is the IP address configured on R1?
c. 2) What is the bandwidth on the Serial 0/0/0 interface?
d. 1) What is the IP address on R1?
d. 2) What is the MAC address of the GigabitEthernet 0/0
interface?
d. 3) What is the bandwidth on the GigabitEthernet 0/0
interface?
Step 2. Questions.
a. Which command displays a brief summary of the current
interfaces, statuses, and IP addresses assigned to them?
b. 1) How many serial interfaces are there on R1 and R2?
b. 2) How many Ethernet interfaces are there on R1 and R2?
2. b. 3) Are all the Ethernet interfaces on R1 the same? If no,
explain the difference(s).
Step 3: Display the routing table on R1.
a. What command displays the content of the routing table?
b. 1) How many connected routes are there (uses the C code)?
b. 2) Which route is listed?
b. 3) How does a router handle a packet destined for a network
that is not listed in the routing table?
Part 2 Step 3
a. What command did you use?
Part 3 Step 1
a. 1) How many interfaces on R1 and R2 are configured with IP
addresses and in the “up” and “up” state?
a. 2) What part of the interface configuration is NOT displayed
in the command output?
a. 3) What commands can you use to verify this part of the
configuration?
b. 1) How many connected routes (uses the C code) do you see
on each router?
b. 2) How many EIGRP routes (uses the D code) do you see on
each router?
b. 3) If the router knows all the routes in the network, then the
number of connected routes and dynamically learned routes
(EIGRP) should equal the total number of LANs and WANs.
3. How many LANs and WANs are in the topology?
b. 4) Does this number match the number of C and D routes
shown in the routing table?
Ping Table:
Ping From Device IP
Ping to Device IP
Results
PC1
PC4
R2
PC2
__MACOSX/LAB3/._Lab 3 Answer Sheet(1).docx
LAB3/Lab 3.pka
__MACOSX/LAB3/._Lab 3.pka
LAB3/Lab 3 Instructions(1).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 3 Instructions
Packet Tracer:
[Adapted from Cisco Networking Academy Intro to Networking
6.4.3.3]
Overview
4. In this activity, you will use various show commands to display
the current state of the router. You will then use the Addressing
Table to configure router Ethernet interfaces. Finally, you will
use commands to verify and test your configurations.
Note: The routers in this activity are partially configured. Some
of the configurations are not covered in this course, but are
provided to assist you in using verification commands.
Part 1: Display Router Information
Step 1: Display interface information on R1.
Note: Click a device and then click the CLI tab to access the
command line directly. The console password is cisco. The
privileged EXEC password is class.
Answer questions Part1 Step 1. a. and b. in your Lab 3 Answer
Sheet
c. Enter the command to display the statistics for the Serial
0/0/0 interface on R1 and answer questions c1) c2) in your Lab
3 Answer Sheet.
d. Enter the command to display the statistics for the
GigabitEthernet 0/0 interface and answer questions d1) d2) d3).
Step 2: Display a summary list of the interfaces on R1.
Answer questions Step 2 a. in your Lab 3 Answer Sheet.
b. Enter the command on each router and answer questions Part
2 b. 1), b. 2), b. 3).
Step 3: Display the routing table on R1.
Answer the question Step 3 a. in your Lab 3 Answer Sheet.
b. Enter the command on R1 and answer questions Step 3 b. 1),
b. 2), b. 3) in your Lab 3 Answer Sheet.
Part 2: Configure Router Interfaces
Step 1: Configure the GigabitEthernet 0/0 interface on R1.
a. Enter the following commands in bold to address and activate
the GigabitEthernet 0/0 interface on R1:
R1(config)# interface gigabitethernet 0/0
R1(config-if)# ip address 192.168.10.1 255.255.255.0
R1(config-if)# no shutdown
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed
state to up
5. %LINEPROTO-5-UPDOWN: Line protocol on Interface
GigabitEthernet0/0, changed state to up
b. It is good practice to configure a description for each
interface to help document the network information. Configure
an interface description indicating to which device it is
connected.
R1(config-if)# description LAN connection to S1
c. R1 should now be able to ping PC1.
R1(config-if)# end
%SYS-5-CONFIG_I: Configured from console by console
R1# ping 192.168.10.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.10.10, timeout is 2
seconds: .!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 0/2/8
ms
Step 2: Configure the remaining Gigabit Ethernet Interfaces on
R1 and R2.
a. Use the information in the Addressing Table to finish the
interface configurations for R1 and R2. For each interface, do
the following:
1) Enter the IP address and activate the interface.
2) Configure an appropriate description.
b. Verify interface configurations.
Step 3: Back up the configurations to NVRAM.
Save the configuration files on both routers to NVRAM. Answer
question Part 2 Step 3 a. in your Lab 3 Answer Sheet.
Part 3: Verify the Configuration
Step 1: Use verification commands to check your interface
configurations.
a. Use the show ip interface brief command on both R1 and R2
to quickly verify that the interfaces are configured with the
correct IP address and active. Answer questions Part 3 Step 1 a.
1), a. 2), a. 3) in your Lab 3 Answer Sheet.
b. Use the show ip route command on both R1 and R2 to view
the current routing tables . Answer questions Part 3 Step 1 b. 1),
6. b. 2), b. 3), b. 4) in your Lab 3 Answer Sheet.
Note: If your answer is “no”, then you are missing a required
configuration. Review the steps in Part 2.
Step 2: Test end-to-end connectivity across the network.
You should now be able to ping from any PC to any other PC on
the network. In addition, you should be able to ping the active
interfaces on the routers. For example, the following should
tests should be successful:
Complete the Ping Output in your Lab 3 Answer Sheet.
Note: For simplicity in this activity, the switches are not
configured; you will not be able to ping them.
Page 3 of 3
__MACOSX/LAB3/._Lab 3 Instructions(1).docx
LAB2/Lab 2 Answer Sheet(1).docx
Liberty University
CSIS 331
Lab 2 Answer Sheet
Complete the table.
Device
Interface
IP Address
Subnet Mask
VLAN1
VLAN1
NIC
7. NIC
Fill in the blanks/Answer Questions (Please use different font
color to show answers):
1. Switch 1 Name:
2. Switch 2 Name:
3. PC 1 Name:
4. PC 2 Name:
5. Console Line Password:
6. Secret Password:
7. What command encrypts all text passwords?
8. What word needed to be in the message-of-the-day (MOTD)
Banner?
9. What command did you use to save the running-
configuration?
10. Why do you think it is important to document Address
Tables and verify connectivity?
Ping Output:
Ping From Device IP
Ping to Device IP
Results
PC1
PC2
PC2
PC1
__MACOSX/LAB2/._Lab 2 Answer Sheet(1).docx
8. LAB2/Lab 2 PT.pka
__MACOSX/LAB2/._Lab 2 PT.pka
LAB2/Lab 2 Instructions(3).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 2 Instructions
(Names of devices may vary)
Packet Tracer - Skills Integration Challenge
Addressing Table (Address Table will vary)
Device
Interface
IP Address
Subnet Mask
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
Objectives
Configure hostnames and IP addresses on two Cisco
9. Internetwork Operating System (IOS) switches using the
command-line interface (CLI).
Use Cisco IOS commands to specify or limit access to
the device configurations.
Use IOS commands to save the running configuration.
Configure two host devices with IP addresses.
Verify connectivity between the two PC end devices.
Scenario
As a recently hired LAN technician, your network manager has
asked you to demonstrate your ability to configure a small LAN.
Your tasks include configuring initial settings on two switches
using the Cisco IOS and configuring IP address parameters on
host devices to provide end-to-end connectivity. You are to use
two switches and two hosts/PCs on a cabled and powered
network.
Requirements (Switch information may vary)
Use a console connection to access each switch.
Name _________ and ________ switches.
Use the ________ password for all lines.
Use the ________ secret password.
Encrypt all clear text passwords.
Include the word warning in the message-of-the-day
(MOTD) Banner.
Configure addressing for all devices according to the
Addressing Table.
Save your configurations.
Verify connectivity between all devices.
Note: Click Check Results to see your progress. Click Reset
Activity to generate a new set of requirements. If you click on
this before you complete the activity, all configurations will be
lost.
Page 2 of 2
__MACOSX/LAB2/._Lab 2 Instructions(3).docx
10. LAB1/Lab 1 PT-5.pka
__MACOSX/LAB1/._Lab 1 PT-5.pka
LAB1/Lab 1 Instructions-1.docx
BMIS 330
Liberty University BMIS 331
Liberty University
CSIS 331
Lab 1 Instructions
Packet Tracer: Initial Configurations
[Adapted from Cisco Networking Academy Network
Fundamentals and Intro to Networking]
Overview:
Packet Tracer (PT) is a network simulator that allows you to
create a simulated network, configure the devices in the
network, test the network, and examine the traffic in the
network. The first step in creating a simulated network in
Packet Tracer is to place the devices in the Logical Workplace
and connect them together.
When Packet Tracer starts, it presents a logical view of the
network in Realtime mode. The main part of the Packet Tracer
interface is the Logical Workspace. This is the large blank area
where devices can be placed and connected.
The lower left portion of the PT interface, below the yellow bar,
is the portion of the interface that you use to select and place
devices into the Logical Workplace. The first box in the lower
left contains symbols that represent groups of devices. As you
move the mouse pointer over these symbols, the name of the
group appears in the text box in the center. When you click on
one of these symbols, the specific devices in the group appear
in the box to the right. As you point to the specific devices, a
description of the device appears in the text box below the
specific devices.
11. Adding a Device or Connection:
To add a device to the Logical Workplace, click on the specific
device symbol in the center toolbox, point to where you want to
place the device in the Logical Workplace (the pointer becomes
a crosshair), and click. You can also drag and drop devices and
connections from this toolbox into the Logical Workplace.
Deleting a Device:
To delete a device from the Logical Workplace, select the
device by left-clicking on it. Then, click the “X” button on the
toolbox that appears on the right-hand side of the screen.
Note: When you click on the device to initially select it, a
dialog box like the one below may appear.
Close this dialog box and proceed to click the “X” (Delete)
button on the toolbox. The pointer becomes an “X”, and you are
prompted to delete the selected device. Click “Yes.”
After you click the “X” (Delete) button on the toolbox, you
remain in Delete mode. That is, while in this mode, every
subsequent device you click will be deleted. It is therefore
important that after you perform a deletion, you click the Select
button on the toolbox. This action takes you out of Delete mode.
Pressing the [Esc] key also takes you out of Delete mode.
Configuring Initial Switch Settings
Background
In this activity, you will perform basic switch configurations.
You will secure access to the command-line interface (CLI) and
12. console ports using encrypted and plain text passwords. You
will also learn how to configure messages for users logging into
the switch. These banners are also used to warn unauthorized
users that access is prohibited.
Part 1: Verify the Default Switch Configuration
Step 1: Enter privileged EXEC mode.
You can access all switch commands from privileged EXEC
mode. However, because many of the privileged commands
configure operating parameters, privileged access should be
password-protected to prevent unauthorized use. The privileged
EXEC command set includes those commands contained in user
EXEC mode, as well as the configure command through which
access to the remaining command modes are gained.
a. Double Click the Packet Tracer file to open the Lab. You will
two windows. The second window is the activity listed below.
Do not answer the questions. Follow the activity to complete the
configurations. Click S1 and then the CLI tab. Press Enter.
b. Enter privileged EXEC mode by entering the enable
command:
Switch> enable
Switch#
Notice that the prompt changed in the configuration to reflect
privileged EXEC mode.
Step 2: Examine the current switch configuration.
a. Enter the show running-config command.
Switch# show running-config
Part 2: Create a Basic Switch Configuration
Step 1: Assign a name to a switch.
To configure parameters on a switch, you may be required to
move between various configuration modes. Notice how the
prompt changes as you navigate through the switch. Type all
commands in bold pressing Enter when complete.
Switch# configure terminal
Switch(config)# hostnameS1
13. S1(config)# exit
S1#
Step 2: Secure access to the console line. To secure access to
the console line, access config-line mode and set the console
password to letmein. Type all commands in bold pressing Enter
when complete.
S1# configure terminal
S1(config)# line console 0
S1(config-line)# password letmein
S1(config-line)# login
S1(config-line)# exit
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Step 3: Verify that console access is secured.
Exit privileged mode to verify that the console port password is
in effect.
S1# exit
Switch con0 is now available
Press RETURN to get started.
User Access Verification Packet
Password:
S1>
Note: If the switch did not prompt you for a password, then you
did not configure the login parameter in Step 2.
Step 4: Secure privileged mode access.
Set the enable password to c1$c0. This password protects access
to privileged mode. Type all commands in bold and then press
enter.
Note: The 0 in c1$c0 is a zero, not a capital O. This password
will not grade as correct until after you encrypt it in Step 8.
S1> enable
S1# configure terminal
S1(config)# enable password c1$c0
S1(config)# exit
14. %SYS-5-CONFIG_I: Configured from console by console
S1#
Step 5: Verify that privileged mode access is secure.
a. Enter the exit command again to log out of the switch.
b. Press Enter key and you will now be asked for a password:
User Access Verification
Password:
c. The first password is the console password you configured
for line con 0. Enter this password to return to user EXEC
mode.
d. Enter the command to access privileged mode.
e. Enter the second password you configured to protect
privileged EXEC mode.
f. Verify your configurations by examining the contents of the
running-configuration file by typing the command in bold below
and pressing Enter key:
S1# show running-config
Notice how the console and enable passwords are both in plain
text. This could pose a security risk if someone is looking over
your shoulder.
Step6: Configure an encrypted password to secure access to
privileged mode.
The enable password should be replaced with the newer
encrypted secret password using the enable secret command. Set
the enable secret password to itsasecret. Type all commands in
bold and then press enter.
S1# config t
S1(config)# enable secret itsasecret
S1(config)# exit
S1#
Note: The enable secret password overrides the enable
password. If both are configured on the switch, you must enter
the enable secret password to enter privileged EXEC mode.
Step 7: Verify that the enable secret password is added to the
configuration file.
a. Verify the new enable secret password is configured by
15. examining the contents of the running-configuration file by
typing the command in bold below and pressing Enter key:
S1# show running-config
Note: You can abbreviate show running-config as S1# show run
Step 8: Encrypt the enable and console passwords.
As you noticed in Step 7, the enable secret password was
encrypted, but the enable and console passwords were still in
plain text. We will now encrypt these plain text passwords using
the service password-encryption command. Type all commands
in bold below and pressing Enter key.
S1# config t
S1(config)# service password-encryption
S1(config)# exit
Part 3: Configure a MOTD Banner
Step 1: Configure a message of the day (MOTD) banner.
The Cisco IOS command set includes a feature that allows you
to configure messages that anyone logging onto the switch sees.
These messages are called message of the day, or MOTD
banners. Enclose the banner text in quotations or use a delimiter
different from any character appearing in the MOTD string.
S1# config t
S1(config)# banner motd "This is a secure system. Authorized
Access Only!"
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Part 4: Save Configuration Files to NVRAM
Step 1: Verify that the configuration is accurate using the show
run command.
Step 2: Save the configuration file.
You have completed the basic configuration of the switch. Now
back up the running configuration file to NVRAM to ensure that
the changes made are not lost if the system is rebooted or loses
power.
S1# copy running-config startup-config
Destination filename [startup-config]?[Enter]
16. Building configuration... [OK]
Step 3: Examine the startup configuration file from Part 4 Step
2. Copy and paste it into your Lab 1 Answer Sheet
Part 5: Configure S2
You have completed the configuration on S1. You will now
configure S2. If you cannot remember the commands, refer to
Parts 1 to 4 for assistance.
Configure S2 with the following parameters:
a. Name device: S2
b. Protect access to the console using the letmein password.
c. Configure an enable password of c1$c0 and an enable secret
password of itsasecret.
d. Configure a message to those logging into the switch with the
following message: Authorized access only. Unauthorized
access is prohibited and violators will be prosecuted to the full
extent of the law.
e. Encrypt all plain text passwords.
f. Ensure that the configuration is correct.
g. Save the configuration file to avoid loss if the switch is
powered down.
Afterward you have completed the configurations click on the
Check Results Button in the second window. . Then click the
Assessment Items Tab and ensure you have all GREEN CHECK
MARKS
Part 6: Save your Packet Tracer configuration.
On the File menu, select Save. You will be prompted to save
your configuration as a Packet Tracer Network file (*.pkt). The
naming convention used in this class will be:
[your first initial + your last name] + “_Lab” (do not include the
quotation marks) + the number of the lab]
For example, Joe Smith will save his file for Lab 1 using the
filename “JSmith_Lab1”. Packet Tracer will automatically
append the .pkt file extension to the file name if “Packet Tracer
17. Network File” is selected from the “Save as type” dropdown
list.
Note that when you exit Packet Tracer, you will likely be
prompted to save your changes again (even if you have made no
additional changes). Click “Yes” to save changes again, and
Packet Tracer will close.
To re-open an existing Packet Tracer file that you have created,
you can double-click the file name in Windows Explorer. This
will automatically launch Packet Tracer, and your PKT file will
be opened. Alternately, you can launch Packet Tracer, select
File | Open…, and navigate to the Packet Tracer File you want
to open.
Deliverables:
Submit your assignment by attaching your PKT file and Lab
Answer Sheet to the appropriate assignment link in Blackboard.
Page 1 of 14
__MACOSX/LAB1/._Lab 1 Instructions-1.docx
LAB1/Lab 1 Answer Sheet(1)-1.docx
Liberty University
CSIS 331
Lab 1 Answer Sheet
On Switch S1 type and press Enter.
S1# copy running-config startup-config
S1# show running-config
Copy and paste Switch S1 Config Here.
On Switch S2 type and press Enter.
S2# copy running-config startup-config