SlideShare a Scribd company logo
1 of 18
LAB3/Lab 3 Answer Sheet(1).docx
Liberty University
CSIS331
Lab 3 Answer Sheet
Submit this completed document with your completed and saved
packet tracer in the link provided in Blackboard.
Part 1: Questions.
Step 1:
a. Which command displays the statistics for all interfaces
configured on a router?
b. Which command displays the information about the Serial
0/0/0 interface only?
c. 1) What is the IP address configured on R1?
c. 2) What is the bandwidth on the Serial 0/0/0 interface?
d. 1) What is the IP address on R1?
d. 2) What is the MAC address of the GigabitEthernet 0/0
interface?
d. 3) What is the bandwidth on the GigabitEthernet 0/0
interface?
Step 2. Questions.
a. Which command displays a brief summary of the current
interfaces, statuses, and IP addresses assigned to them?
b. 1) How many serial interfaces are there on R1 and R2?
b. 2) How many Ethernet interfaces are there on R1 and R2?
b. 3) Are all the Ethernet interfaces on R1 the same? If no,
explain the difference(s).
Step 3: Display the routing table on R1.
a. What command displays the content of the routing table?
b. 1) How many connected routes are there (uses the C code)?
b. 2) Which route is listed?
b. 3) How does a router handle a packet destined for a network
that is not listed in the routing table?
Part 2 Step 3
a. What command did you use?
Part 3 Step 1
a. 1) How many interfaces on R1 and R2 are configured with IP
addresses and in the “up” and “up” state?
a. 2) What part of the interface configuration is NOT displayed
in the command output?
a. 3) What commands can you use to verify this part of the
configuration?
b. 1) How many connected routes (uses the C code) do you see
on each router?
b. 2) How many EIGRP routes (uses the D code) do you see on
each router?
b. 3) If the router knows all the routes in the network, then the
number of connected routes and dynamically learned routes
(EIGRP) should equal the total number of LANs and WANs.
How many LANs and WANs are in the topology?
b. 4) Does this number match the number of C and D routes
shown in the routing table?
Ping Table:
Ping From Device IP
Ping to Device IP
Results
PC1
PC4
R2
PC2
__MACOSX/LAB3/._Lab 3 Answer Sheet(1).docx
LAB3/Lab 3.pka
__MACOSX/LAB3/._Lab 3.pka
LAB3/Lab 3 Instructions(1).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 3 Instructions
Packet Tracer:
[Adapted from Cisco Networking Academy Intro to Networking
6.4.3.3]
Overview
In this activity, you will use various show commands to display
the current state of the router. You will then use the Addressing
Table to configure router Ethernet interfaces. Finally, you will
use commands to verify and test your configurations.
Note: The routers in this activity are partially configured. Some
of the configurations are not covered in this course, but are
provided to assist you in using verification commands.
Part 1: Display Router Information
Step 1: Display interface information on R1.
Note: Click a device and then click the CLI tab to access the
command line directly. The console password is cisco. The
privileged EXEC password is class.
Answer questions Part1 Step 1. a. and b. in your Lab 3 Answer
Sheet
c. Enter the command to display the statistics for the Serial
0/0/0 interface on R1 and answer questions c1) c2) in your Lab
3 Answer Sheet.
d. Enter the command to display the statistics for the
GigabitEthernet 0/0 interface and answer questions d1) d2) d3).
Step 2: Display a summary list of the interfaces on R1.
Answer questions Step 2 a. in your Lab 3 Answer Sheet.
b. Enter the command on each router and answer questions Part
2 b. 1), b. 2), b. 3).
Step 3: Display the routing table on R1.
Answer the question Step 3 a. in your Lab 3 Answer Sheet.
b. Enter the command on R1 and answer questions Step 3 b. 1),
b. 2), b. 3) in your Lab 3 Answer Sheet.
Part 2: Configure Router Interfaces
Step 1: Configure the GigabitEthernet 0/0 interface on R1.
a. Enter the following commands in bold to address and activate
the GigabitEthernet 0/0 interface on R1:
R1(config)# interface gigabitethernet 0/0
R1(config-if)# ip address 192.168.10.1 255.255.255.0
R1(config-if)# no shutdown
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed
state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface
GigabitEthernet0/0, changed state to up
b. It is good practice to configure a description for each
interface to help document the network information. Configure
an interface description indicating to which device it is
connected.
R1(config-if)# description LAN connection to S1
c. R1 should now be able to ping PC1.
R1(config-if)# end
%SYS-5-CONFIG_I: Configured from console by console
R1# ping 192.168.10.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.10.10, timeout is 2
seconds: .!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 0/2/8
ms
Step 2: Configure the remaining Gigabit Ethernet Interfaces on
R1 and R2.
a. Use the information in the Addressing Table to finish the
interface configurations for R1 and R2. For each interface, do
the following:
1) Enter the IP address and activate the interface.
2) Configure an appropriate description.
b. Verify interface configurations.
Step 3: Back up the configurations to NVRAM.
Save the configuration files on both routers to NVRAM. Answer
question Part 2 Step 3 a. in your Lab 3 Answer Sheet.
Part 3: Verify the Configuration
Step 1: Use verification commands to check your interface
configurations.
a. Use the show ip interface brief command on both R1 and R2
to quickly verify that the interfaces are configured with the
correct IP address and active. Answer questions Part 3 Step 1 a.
1), a. 2), a. 3) in your Lab 3 Answer Sheet.
b. Use the show ip route command on both R1 and R2 to view
the current routing tables . Answer questions Part 3 Step 1 b. 1),
b. 2), b. 3), b. 4) in your Lab 3 Answer Sheet.
Note: If your answer is “no”, then you are missing a required
configuration. Review the steps in Part 2.
Step 2: Test end-to-end connectivity across the network.
You should now be able to ping from any PC to any other PC on
the network. In addition, you should be able to ping the active
interfaces on the routers. For example, the following should
tests should be successful:
Complete the Ping Output in your Lab 3 Answer Sheet.
Note: For simplicity in this activity, the switches are not
configured; you will not be able to ping them.
Page 3 of 3
__MACOSX/LAB3/._Lab 3 Instructions(1).docx
LAB2/Lab 2 Answer Sheet(1).docx
Liberty University
CSIS 331
Lab 2 Answer Sheet
Complete the table.
Device
Interface
IP Address
Subnet Mask
VLAN1
VLAN1
NIC
NIC
Fill in the blanks/Answer Questions (Please use different font
color to show answers):
1. Switch 1 Name:
2. Switch 2 Name:
3. PC 1 Name:
4. PC 2 Name:
5. Console Line Password:
6. Secret Password:
7. What command encrypts all text passwords?
8. What word needed to be in the message-of-the-day (MOTD)
Banner?
9. What command did you use to save the running-
configuration?
10. Why do you think it is important to document Address
Tables and verify connectivity?
Ping Output:
Ping From Device IP
Ping to Device IP
Results
PC1
PC2
PC2
PC1
__MACOSX/LAB2/._Lab 2 Answer Sheet(1).docx
LAB2/Lab 2 PT.pka
__MACOSX/LAB2/._Lab 2 PT.pka
LAB2/Lab 2 Instructions(3).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 2 Instructions
(Names of devices may vary)
Packet Tracer - Skills Integration Challenge
Addressing Table (Address Table will vary)
Device
Interface
IP Address
Subnet Mask
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
Objectives
Configure hostnames and IP addresses on two Cisco
Internetwork Operating System (IOS) switches using the
command-line interface (CLI).
Use Cisco IOS commands to specify or limit access to
the device configurations.
Use IOS commands to save the running configuration.
Configure two host devices with IP addresses.
Verify connectivity between the two PC end devices.
Scenario
As a recently hired LAN technician, your network manager has
asked you to demonstrate your ability to configure a small LAN.
Your tasks include configuring initial settings on two switches
using the Cisco IOS and configuring IP address parameters on
host devices to provide end-to-end connectivity. You are to use
two switches and two hosts/PCs on a cabled and powered
network.
Requirements (Switch information may vary)
Use a console connection to access each switch.
Name _________ and ________ switches.
Use the ________ password for all lines.
Use the ________ secret password.
Encrypt all clear text passwords.
Include the word warning in the message-of-the-day
(MOTD) Banner.
Configure addressing for all devices according to the
Addressing Table.
Save your configurations.
Verify connectivity between all devices.
Note: Click Check Results to see your progress. Click Reset
Activity to generate a new set of requirements. If you click on
this before you complete the activity, all configurations will be
lost.
Page 2 of 2
__MACOSX/LAB2/._Lab 2 Instructions(3).docx
LAB1/Lab 1 PT-5.pka
__MACOSX/LAB1/._Lab 1 PT-5.pka
LAB1/Lab 1 Instructions-1.docx
BMIS 330
Liberty University BMIS 331
Liberty University
CSIS 331
Lab 1 Instructions
Packet Tracer: Initial Configurations
[Adapted from Cisco Networking Academy Network
Fundamentals and Intro to Networking]
Overview:
Packet Tracer (PT) is a network simulator that allows you to
create a simulated network, configure the devices in the
network, test the network, and examine the traffic in the
network. The first step in creating a simulated network in
Packet Tracer is to place the devices in the Logical Workplace
and connect them together.
When Packet Tracer starts, it presents a logical view of the
network in Realtime mode. The main part of the Packet Tracer
interface is the Logical Workspace. This is the large blank area
where devices can be placed and connected.
The lower left portion of the PT interface, below the yellow bar,
is the portion of the interface that you use to select and place
devices into the Logical Workplace. The first box in the lower
left contains symbols that represent groups of devices. As you
move the mouse pointer over these symbols, the name of the
group appears in the text box in the center. When you click on
one of these symbols, the specific devices in the group appear
in the box to the right. As you point to the specific devices, a
description of the device appears in the text box below the
specific devices.
Adding a Device or Connection:
To add a device to the Logical Workplace, click on the specific
device symbol in the center toolbox, point to where you want to
place the device in the Logical Workplace (the pointer becomes
a crosshair), and click. You can also drag and drop devices and
connections from this toolbox into the Logical Workplace.
Deleting a Device:
To delete a device from the Logical Workplace, select the
device by left-clicking on it. Then, click the “X” button on the
toolbox that appears on the right-hand side of the screen.
Note: When you click on the device to initially select it, a
dialog box like the one below may appear.
Close this dialog box and proceed to click the “X” (Delete)
button on the toolbox. The pointer becomes an “X”, and you are
prompted to delete the selected device. Click “Yes.”
After you click the “X” (Delete) button on the toolbox, you
remain in Delete mode. That is, while in this mode, every
subsequent device you click will be deleted. It is therefore
important that after you perform a deletion, you click the Select
button on the toolbox. This action takes you out of Delete mode.
Pressing the [Esc] key also takes you out of Delete mode.
Configuring Initial Switch Settings
Background
In this activity, you will perform basic switch configurations.
You will secure access to the command-line interface (CLI) and
console ports using encrypted and plain text passwords. You
will also learn how to configure messages for users logging into
the switch. These banners are also used to warn unauthorized
users that access is prohibited.
Part 1: Verify the Default Switch Configuration
Step 1: Enter privileged EXEC mode.
You can access all switch commands from privileged EXEC
mode. However, because many of the privileged commands
configure operating parameters, privileged access should be
password-protected to prevent unauthorized use. The privileged
EXEC command set includes those commands contained in user
EXEC mode, as well as the configure command through which
access to the remaining command modes are gained.
a. Double Click the Packet Tracer file to open the Lab. You will
two windows. The second window is the activity listed below.
Do not answer the questions. Follow the activity to complete the
configurations. Click S1 and then the CLI tab. Press Enter.
b. Enter privileged EXEC mode by entering the enable
command:
Switch> enable
Switch#
Notice that the prompt changed in the configuration to reflect
privileged EXEC mode.
Step 2: Examine the current switch configuration.
a. Enter the show running-config command.
Switch# show running-config
Part 2: Create a Basic Switch Configuration
Step 1: Assign a name to a switch.
To configure parameters on a switch, you may be required to
move between various configuration modes. Notice how the
prompt changes as you navigate through the switch. Type all
commands in bold pressing Enter when complete.
Switch# configure terminal
Switch(config)# hostnameS1
S1(config)# exit
S1#
Step 2: Secure access to the console line. To secure access to
the console line, access config-line mode and set the console
password to letmein. Type all commands in bold pressing Enter
when complete.
S1# configure terminal
S1(config)# line console 0
S1(config-line)# password letmein
S1(config-line)# login
S1(config-line)# exit
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Step 3: Verify that console access is secured.
Exit privileged mode to verify that the console port password is
in effect.
S1# exit
Switch con0 is now available
Press RETURN to get started.
User Access Verification Packet
Password:
S1>
Note: If the switch did not prompt you for a password, then you
did not configure the login parameter in Step 2.
Step 4: Secure privileged mode access.
Set the enable password to c1$c0. This password protects access
to privileged mode. Type all commands in bold and then press
enter.
Note: The 0 in c1$c0 is a zero, not a capital O. This password
will not grade as correct until after you encrypt it in Step 8.
S1> enable
S1# configure terminal
S1(config)# enable password c1$c0
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Step 5: Verify that privileged mode access is secure.
a. Enter the exit command again to log out of the switch.
b. Press Enter key and you will now be asked for a password:
User Access Verification
Password:
c. The first password is the console password you configured
for line con 0. Enter this password to return to user EXEC
mode.
d. Enter the command to access privileged mode.
e. Enter the second password you configured to protect
privileged EXEC mode.
f. Verify your configurations by examining the contents of the
running-configuration file by typing the command in bold below
and pressing Enter key:
S1# show running-config
Notice how the console and enable passwords are both in plain
text. This could pose a security risk if someone is looking over
your shoulder.
Step6: Configure an encrypted password to secure access to
privileged mode.
The enable password should be replaced with the newer
encrypted secret password using the enable secret command. Set
the enable secret password to itsasecret. Type all commands in
bold and then press enter.
S1# config t
S1(config)# enable secret itsasecret
S1(config)# exit
S1#
Note: The enable secret password overrides the enable
password. If both are configured on the switch, you must enter
the enable secret password to enter privileged EXEC mode.
Step 7: Verify that the enable secret password is added to the
configuration file.
a. Verify the new enable secret password is configured by
examining the contents of the running-configuration file by
typing the command in bold below and pressing Enter key:
S1# show running-config
Note: You can abbreviate show running-config as S1# show run
Step 8: Encrypt the enable and console passwords.
As you noticed in Step 7, the enable secret password was
encrypted, but the enable and console passwords were still in
plain text. We will now encrypt these plain text passwords using
the service password-encryption command. Type all commands
in bold below and pressing Enter key.
S1# config t
S1(config)# service password-encryption
S1(config)# exit
Part 3: Configure a MOTD Banner
Step 1: Configure a message of the day (MOTD) banner.
The Cisco IOS command set includes a feature that allows you
to configure messages that anyone logging onto the switch sees.
These messages are called message of the day, or MOTD
banners. Enclose the banner text in quotations or use a delimiter
different from any character appearing in the MOTD string.
S1# config t
S1(config)# banner motd "This is a secure system. Authorized
Access Only!"
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Part 4: Save Configuration Files to NVRAM
Step 1: Verify that the configuration is accurate using the show
run command.
Step 2: Save the configuration file.
You have completed the basic configuration of the switch. Now
back up the running configuration file to NVRAM to ensure that
the changes made are not lost if the system is rebooted or loses
power.
S1# copy running-config startup-config
Destination filename [startup-config]?[Enter]
Building configuration... [OK]
Step 3: Examine the startup configuration file from Part 4 Step
2. Copy and paste it into your Lab 1 Answer Sheet
Part 5: Configure S2
You have completed the configuration on S1. You will now
configure S2. If you cannot remember the commands, refer to
Parts 1 to 4 for assistance.
Configure S2 with the following parameters:
a. Name device: S2
b. Protect access to the console using the letmein password.
c. Configure an enable password of c1$c0 and an enable secret
password of itsasecret.
d. Configure a message to those logging into the switch with the
following message: Authorized access only. Unauthorized
access is prohibited and violators will be prosecuted to the full
extent of the law.
e. Encrypt all plain text passwords.
f. Ensure that the configuration is correct.
g. Save the configuration file to avoid loss if the switch is
powered down.
Afterward you have completed the configurations click on the
Check Results Button in the second window. . Then click the
Assessment Items Tab and ensure you have all GREEN CHECK
MARKS
Part 6: Save your Packet Tracer configuration.
On the File menu, select Save. You will be prompted to save
your configuration as a Packet Tracer Network file (*.pkt). The
naming convention used in this class will be:
[your first initial + your last name] + “_Lab” (do not include the
quotation marks) + the number of the lab]
For example, Joe Smith will save his file for Lab 1 using the
filename “JSmith_Lab1”. Packet Tracer will automatically
append the .pkt file extension to the file name if “Packet Tracer
Network File” is selected from the “Save as type” dropdown
list.
Note that when you exit Packet Tracer, you will likely be
prompted to save your changes again (even if you have made no
additional changes). Click “Yes” to save changes again, and
Packet Tracer will close.
To re-open an existing Packet Tracer file that you have created,
you can double-click the file name in Windows Explorer. This
will automatically launch Packet Tracer, and your PKT file will
be opened. Alternately, you can launch Packet Tracer, select
File | Open…, and navigate to the Packet Tracer File you want
to open.
Deliverables:
Submit your assignment by attaching your PKT file and Lab
Answer Sheet to the appropriate assignment link in Blackboard.
Page 1 of 14
__MACOSX/LAB1/._Lab 1 Instructions-1.docx
LAB1/Lab 1 Answer Sheet(1)-1.docx
Liberty University
CSIS 331
Lab 1 Answer Sheet
On Switch S1 type and press Enter.
S1# copy running-config startup-config
S1# show running-config
Copy and paste Switch S1 Config Here.
On Switch S2 type and press Enter.
S2# copy running-config startup-config
S2# show running-config
Copy and paste Switch S2 Config Here.
__MACOSX/LAB1/._Lab 1 Answer Sheet(1)-1.docx

More Related Content

Similar to LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx

Lab 9 instructions
Lab 9 instructionsLab 9 instructions
Lab 9 instructionstrayyoo
 
©LWTAOB© 2013 Cisco andLab – O.docx
©LWTAOB© 2013 Cisco andLab – O.docx©LWTAOB© 2013 Cisco andLab – O.docx
©LWTAOB© 2013 Cisco andLab – O.docxLynellBull52
 
Ecet 340 Teaching Effectively--tutorialrank.com
Ecet 340 Teaching Effectively--tutorialrank.comEcet 340 Teaching Effectively--tutorialrank.com
Ecet 340 Teaching Effectively--tutorialrank.comSoaps97
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1Tai Lam
 
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdfCCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdfngombeemmanuel
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz studentYaser Rahmati
 
Lab view the switch mac address table lab - view the switch
Lab   view the switch mac address table lab - view the switchLab   view the switch mac address table lab - view the switch
Lab view the switch mac address table lab - view the switchADDY50
 
Cisco labs practical4
Cisco labs practical4Cisco labs practical4
Cisco labs practical4Tai Lam
 
Ccna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 AnswersCcna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 AnswersCCNA4Answers
 
Ccna discovery
Ccna discoveryCcna discovery
Ccna discoveryccnaguide
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answersccna4discovery
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
 
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02Abhilash Kuniyil
 
Sca n skills assess eigrp - student trng - exam-1
Sca n skills assess   eigrp - student trng - exam-1Sca n skills assess   eigrp - student trng - exam-1
Sca n skills assess eigrp - student trng - exam-1rafa1976
 

Similar to LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx (20)

Activy tecnologi and instructions
Activy tecnologi and instructionsActivy tecnologi and instructions
Activy tecnologi and instructions
 
Lab 9 instructions
Lab 9 instructionsLab 9 instructions
Lab 9 instructions
 
©LWTAOB© 2013 Cisco andLab – O.docx
©LWTAOB© 2013 Cisco andLab – O.docx©LWTAOB© 2013 Cisco andLab – O.docx
©LWTAOB© 2013 Cisco andLab – O.docx
 
Ecet 340 Teaching Effectively--tutorialrank.com
Ecet 340 Teaching Effectively--tutorialrank.comEcet 340 Teaching Effectively--tutorialrank.com
Ecet 340 Teaching Effectively--tutorialrank.com
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1
 
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdfCCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
 
200-301-demo.pdf
200-301-demo.pdf200-301-demo.pdf
200-301-demo.pdf
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
 
Ccna dumps
Ccna dumpsCcna dumps
Ccna dumps
 
Lab view the switch mac address table lab - view the switch
Lab   view the switch mac address table lab - view the switchLab   view the switch mac address table lab - view the switch
Lab view the switch mac address table lab - view the switch
 
Cisco labs practical4
Cisco labs practical4Cisco labs practical4
Cisco labs practical4
 
Ccna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 AnswersCcna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 Answers
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
Ccna discovery
Ccna discoveryCcna discovery
Ccna discovery
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
 
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
Labpractice1 configuringbasicroutingandswitchingwithanswer-121214084802-phpapp02
 
Sca n skills assess eigrp - student trng - exam-1
Sca n skills assess   eigrp - student trng - exam-1Sca n skills assess   eigrp - student trng - exam-1
Sca n skills assess eigrp - student trng - exam-1
 

More from croysierkathey

1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docxcroysierkathey
 
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docxcroysierkathey
 
1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docxcroysierkathey
 
1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docxcroysierkathey
 
1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docxcroysierkathey
 
1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docxcroysierkathey
 
1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docxcroysierkathey
 
1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docxcroysierkathey
 
1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docxcroysierkathey
 
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docxcroysierkathey
 
1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docxcroysierkathey
 
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docxcroysierkathey
 
1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docxcroysierkathey
 
1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docxcroysierkathey
 
1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docxcroysierkathey
 
1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docxcroysierkathey
 
1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docxcroysierkathey
 
1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docxcroysierkathey
 
1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docxcroysierkathey
 
1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docxcroysierkathey
 

More from croysierkathey (20)

1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx
 
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
 
1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx
 
1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx
 
1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx
 
1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx
 
1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx
 
1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx
 
1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx
 
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
 
1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx
 
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
 
1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx
 
1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx
 
1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx
 
1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx
 
1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx
 
1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx
 
1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx
 
1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

LAB3Lab 3 Answer Sheet(1).docxLiberty UniversityCSIS331La.docx

  • 1. LAB3/Lab 3 Answer Sheet(1).docx Liberty University CSIS331 Lab 3 Answer Sheet Submit this completed document with your completed and saved packet tracer in the link provided in Blackboard. Part 1: Questions. Step 1: a. Which command displays the statistics for all interfaces configured on a router? b. Which command displays the information about the Serial 0/0/0 interface only? c. 1) What is the IP address configured on R1? c. 2) What is the bandwidth on the Serial 0/0/0 interface? d. 1) What is the IP address on R1? d. 2) What is the MAC address of the GigabitEthernet 0/0 interface? d. 3) What is the bandwidth on the GigabitEthernet 0/0 interface? Step 2. Questions. a. Which command displays a brief summary of the current interfaces, statuses, and IP addresses assigned to them? b. 1) How many serial interfaces are there on R1 and R2? b. 2) How many Ethernet interfaces are there on R1 and R2?
  • 2. b. 3) Are all the Ethernet interfaces on R1 the same? If no, explain the difference(s). Step 3: Display the routing table on R1. a. What command displays the content of the routing table? b. 1) How many connected routes are there (uses the C code)? b. 2) Which route is listed? b. 3) How does a router handle a packet destined for a network that is not listed in the routing table? Part 2 Step 3 a. What command did you use? Part 3 Step 1 a. 1) How many interfaces on R1 and R2 are configured with IP addresses and in the “up” and “up” state? a. 2) What part of the interface configuration is NOT displayed in the command output? a. 3) What commands can you use to verify this part of the configuration? b. 1) How many connected routes (uses the C code) do you see on each router? b. 2) How many EIGRP routes (uses the D code) do you see on each router? b. 3) If the router knows all the routes in the network, then the number of connected routes and dynamically learned routes (EIGRP) should equal the total number of LANs and WANs.
  • 3. How many LANs and WANs are in the topology? b. 4) Does this number match the number of C and D routes shown in the routing table? Ping Table: Ping From Device IP Ping to Device IP Results PC1 PC4 R2 PC2 __MACOSX/LAB3/._Lab 3 Answer Sheet(1).docx LAB3/Lab 3.pka __MACOSX/LAB3/._Lab 3.pka LAB3/Lab 3 Instructions(1).docx Liberty University CSIS331 Liberty University CSIS 331 Lab 3 Instructions Packet Tracer: [Adapted from Cisco Networking Academy Intro to Networking 6.4.3.3] Overview
  • 4. In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations. Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands. Part 1: Display Router Information Step 1: Display interface information on R1. Note: Click a device and then click the CLI tab to access the command line directly. The console password is cisco. The privileged EXEC password is class. Answer questions Part1 Step 1. a. and b. in your Lab 3 Answer Sheet c. Enter the command to display the statistics for the Serial 0/0/0 interface on R1 and answer questions c1) c2) in your Lab 3 Answer Sheet. d. Enter the command to display the statistics for the GigabitEthernet 0/0 interface and answer questions d1) d2) d3). Step 2: Display a summary list of the interfaces on R1. Answer questions Step 2 a. in your Lab 3 Answer Sheet. b. Enter the command on each router and answer questions Part 2 b. 1), b. 2), b. 3). Step 3: Display the routing table on R1. Answer the question Step 3 a. in your Lab 3 Answer Sheet. b. Enter the command on R1 and answer questions Step 3 b. 1), b. 2), b. 3) in your Lab 3 Answer Sheet. Part 2: Configure Router Interfaces Step 1: Configure the GigabitEthernet 0/0 interface on R1. a. Enter the following commands in bold to address and activate the GigabitEthernet 0/0 interface on R1: R1(config)# interface gigabitethernet 0/0 R1(config-if)# ip address 192.168.10.1 255.255.255.0 R1(config-if)# no shutdown %LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
  • 5. %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to up b. It is good practice to configure a description for each interface to help document the network information. Configure an interface description indicating to which device it is connected. R1(config-if)# description LAN connection to S1 c. R1 should now be able to ping PC1. R1(config-if)# end %SYS-5-CONFIG_I: Configured from console by console R1# ping 192.168.10.10 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.10.10, timeout is 2 seconds: .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 0/2/8 ms Step 2: Configure the remaining Gigabit Ethernet Interfaces on R1 and R2. a. Use the information in the Addressing Table to finish the interface configurations for R1 and R2. For each interface, do the following: 1) Enter the IP address and activate the interface. 2) Configure an appropriate description. b. Verify interface configurations. Step 3: Back up the configurations to NVRAM. Save the configuration files on both routers to NVRAM. Answer question Part 2 Step 3 a. in your Lab 3 Answer Sheet. Part 3: Verify the Configuration Step 1: Use verification commands to check your interface configurations. a. Use the show ip interface brief command on both R1 and R2 to quickly verify that the interfaces are configured with the correct IP address and active. Answer questions Part 3 Step 1 a. 1), a. 2), a. 3) in your Lab 3 Answer Sheet. b. Use the show ip route command on both R1 and R2 to view the current routing tables . Answer questions Part 3 Step 1 b. 1),
  • 6. b. 2), b. 3), b. 4) in your Lab 3 Answer Sheet. Note: If your answer is “no”, then you are missing a required configuration. Review the steps in Part 2. Step 2: Test end-to-end connectivity across the network. You should now be able to ping from any PC to any other PC on the network. In addition, you should be able to ping the active interfaces on the routers. For example, the following should tests should be successful: Complete the Ping Output in your Lab 3 Answer Sheet. Note: For simplicity in this activity, the switches are not configured; you will not be able to ping them. Page 3 of 3 __MACOSX/LAB3/._Lab 3 Instructions(1).docx LAB2/Lab 2 Answer Sheet(1).docx Liberty University CSIS 331 Lab 2 Answer Sheet Complete the table. Device Interface IP Address Subnet Mask VLAN1 VLAN1 NIC
  • 7. NIC Fill in the blanks/Answer Questions (Please use different font color to show answers): 1. Switch 1 Name: 2. Switch 2 Name: 3. PC 1 Name: 4. PC 2 Name: 5. Console Line Password: 6. Secret Password: 7. What command encrypts all text passwords? 8. What word needed to be in the message-of-the-day (MOTD) Banner? 9. What command did you use to save the running- configuration? 10. Why do you think it is important to document Address Tables and verify connectivity? Ping Output: Ping From Device IP Ping to Device IP Results PC1 PC2 PC2 PC1 __MACOSX/LAB2/._Lab 2 Answer Sheet(1).docx
  • 8. LAB2/Lab 2 PT.pka __MACOSX/LAB2/._Lab 2 PT.pka LAB2/Lab 2 Instructions(3).docx Liberty University CSIS331 Liberty University CSIS 331 Lab 2 Instructions (Names of devices may vary) Packet Tracer - Skills Integration Challenge Addressing Table (Address Table will vary) Device Interface IP Address Subnet Mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 Objectives Configure hostnames and IP addresses on two Cisco
  • 9. Internetwork Operating System (IOS) switches using the command-line interface (CLI). Use Cisco IOS commands to specify or limit access to the device configurations. Use IOS commands to save the running configuration. Configure two host devices with IP addresses. Verify connectivity between the two PC end devices. Scenario As a recently hired LAN technician, your network manager has asked you to demonstrate your ability to configure a small LAN. Your tasks include configuring initial settings on two switches using the Cisco IOS and configuring IP address parameters on host devices to provide end-to-end connectivity. You are to use two switches and two hosts/PCs on a cabled and powered network. Requirements (Switch information may vary) Use a console connection to access each switch. Name _________ and ________ switches. Use the ________ password for all lines. Use the ________ secret password. Encrypt all clear text passwords. Include the word warning in the message-of-the-day (MOTD) Banner. Configure addressing for all devices according to the Addressing Table. Save your configurations. Verify connectivity between all devices. Note: Click Check Results to see your progress. Click Reset Activity to generate a new set of requirements. If you click on this before you complete the activity, all configurations will be lost. Page 2 of 2 __MACOSX/LAB2/._Lab 2 Instructions(3).docx
  • 10. LAB1/Lab 1 PT-5.pka __MACOSX/LAB1/._Lab 1 PT-5.pka LAB1/Lab 1 Instructions-1.docx BMIS 330 Liberty University BMIS 331 Liberty University CSIS 331 Lab 1 Instructions Packet Tracer: Initial Configurations [Adapted from Cisco Networking Academy Network Fundamentals and Intro to Networking] Overview: Packet Tracer (PT) is a network simulator that allows you to create a simulated network, configure the devices in the network, test the network, and examine the traffic in the network. The first step in creating a simulated network in Packet Tracer is to place the devices in the Logical Workplace and connect them together. When Packet Tracer starts, it presents a logical view of the network in Realtime mode. The main part of the Packet Tracer interface is the Logical Workspace. This is the large blank area where devices can be placed and connected. The lower left portion of the PT interface, below the yellow bar, is the portion of the interface that you use to select and place devices into the Logical Workplace. The first box in the lower left contains symbols that represent groups of devices. As you move the mouse pointer over these symbols, the name of the group appears in the text box in the center. When you click on one of these symbols, the specific devices in the group appear in the box to the right. As you point to the specific devices, a description of the device appears in the text box below the specific devices.
  • 11. Adding a Device or Connection: To add a device to the Logical Workplace, click on the specific device symbol in the center toolbox, point to where you want to place the device in the Logical Workplace (the pointer becomes a crosshair), and click. You can also drag and drop devices and connections from this toolbox into the Logical Workplace. Deleting a Device: To delete a device from the Logical Workplace, select the device by left-clicking on it. Then, click the “X” button on the toolbox that appears on the right-hand side of the screen. Note: When you click on the device to initially select it, a dialog box like the one below may appear. Close this dialog box and proceed to click the “X” (Delete) button on the toolbox. The pointer becomes an “X”, and you are prompted to delete the selected device. Click “Yes.” After you click the “X” (Delete) button on the toolbox, you remain in Delete mode. That is, while in this mode, every subsequent device you click will be deleted. It is therefore important that after you perform a deletion, you click the Select button on the toolbox. This action takes you out of Delete mode. Pressing the [Esc] key also takes you out of Delete mode. Configuring Initial Switch Settings Background In this activity, you will perform basic switch configurations. You will secure access to the command-line interface (CLI) and
  • 12. console ports using encrypted and plain text passwords. You will also learn how to configure messages for users logging into the switch. These banners are also used to warn unauthorized users that access is prohibited. Part 1: Verify the Default Switch Configuration Step 1: Enter privileged EXEC mode. You can access all switch commands from privileged EXEC mode. However, because many of the privileged commands configure operating parameters, privileged access should be password-protected to prevent unauthorized use. The privileged EXEC command set includes those commands contained in user EXEC mode, as well as the configure command through which access to the remaining command modes are gained. a. Double Click the Packet Tracer file to open the Lab. You will two windows. The second window is the activity listed below. Do not answer the questions. Follow the activity to complete the configurations. Click S1 and then the CLI tab. Press Enter. b. Enter privileged EXEC mode by entering the enable command: Switch> enable Switch# Notice that the prompt changed in the configuration to reflect privileged EXEC mode. Step 2: Examine the current switch configuration. a. Enter the show running-config command. Switch# show running-config Part 2: Create a Basic Switch Configuration Step 1: Assign a name to a switch. To configure parameters on a switch, you may be required to move between various configuration modes. Notice how the prompt changes as you navigate through the switch. Type all commands in bold pressing Enter when complete. Switch# configure terminal Switch(config)# hostnameS1
  • 13. S1(config)# exit S1# Step 2: Secure access to the console line. To secure access to the console line, access config-line mode and set the console password to letmein. Type all commands in bold pressing Enter when complete. S1# configure terminal S1(config)# line console 0 S1(config-line)# password letmein S1(config-line)# login S1(config-line)# exit S1(config)# exit %SYS-5-CONFIG_I: Configured from console by console S1# Step 3: Verify that console access is secured. Exit privileged mode to verify that the console port password is in effect. S1# exit Switch con0 is now available Press RETURN to get started. User Access Verification Packet Password: S1> Note: If the switch did not prompt you for a password, then you did not configure the login parameter in Step 2. Step 4: Secure privileged mode access. Set the enable password to c1$c0. This password protects access to privileged mode. Type all commands in bold and then press enter. Note: The 0 in c1$c0 is a zero, not a capital O. This password will not grade as correct until after you encrypt it in Step 8. S1> enable S1# configure terminal S1(config)# enable password c1$c0 S1(config)# exit
  • 14. %SYS-5-CONFIG_I: Configured from console by console S1# Step 5: Verify that privileged mode access is secure. a. Enter the exit command again to log out of the switch. b. Press Enter key and you will now be asked for a password: User Access Verification Password: c. The first password is the console password you configured for line con 0. Enter this password to return to user EXEC mode. d. Enter the command to access privileged mode. e. Enter the second password you configured to protect privileged EXEC mode. f. Verify your configurations by examining the contents of the running-configuration file by typing the command in bold below and pressing Enter key: S1# show running-config Notice how the console and enable passwords are both in plain text. This could pose a security risk if someone is looking over your shoulder. Step6: Configure an encrypted password to secure access to privileged mode. The enable password should be replaced with the newer encrypted secret password using the enable secret command. Set the enable secret password to itsasecret. Type all commands in bold and then press enter. S1# config t S1(config)# enable secret itsasecret S1(config)# exit S1# Note: The enable secret password overrides the enable password. If both are configured on the switch, you must enter the enable secret password to enter privileged EXEC mode. Step 7: Verify that the enable secret password is added to the configuration file. a. Verify the new enable secret password is configured by
  • 15. examining the contents of the running-configuration file by typing the command in bold below and pressing Enter key: S1# show running-config Note: You can abbreviate show running-config as S1# show run Step 8: Encrypt the enable and console passwords. As you noticed in Step 7, the enable secret password was encrypted, but the enable and console passwords were still in plain text. We will now encrypt these plain text passwords using the service password-encryption command. Type all commands in bold below and pressing Enter key. S1# config t S1(config)# service password-encryption S1(config)# exit Part 3: Configure a MOTD Banner Step 1: Configure a message of the day (MOTD) banner. The Cisco IOS command set includes a feature that allows you to configure messages that anyone logging onto the switch sees. These messages are called message of the day, or MOTD banners. Enclose the banner text in quotations or use a delimiter different from any character appearing in the MOTD string. S1# config t S1(config)# banner motd "This is a secure system. Authorized Access Only!" S1(config)# exit %SYS-5-CONFIG_I: Configured from console by console S1# Part 4: Save Configuration Files to NVRAM Step 1: Verify that the configuration is accurate using the show run command. Step 2: Save the configuration file. You have completed the basic configuration of the switch. Now back up the running configuration file to NVRAM to ensure that the changes made are not lost if the system is rebooted or loses power. S1# copy running-config startup-config Destination filename [startup-config]?[Enter]
  • 16. Building configuration... [OK] Step 3: Examine the startup configuration file from Part 4 Step 2. Copy and paste it into your Lab 1 Answer Sheet Part 5: Configure S2 You have completed the configuration on S1. You will now configure S2. If you cannot remember the commands, refer to Parts 1 to 4 for assistance. Configure S2 with the following parameters: a. Name device: S2 b. Protect access to the console using the letmein password. c. Configure an enable password of c1$c0 and an enable secret password of itsasecret. d. Configure a message to those logging into the switch with the following message: Authorized access only. Unauthorized access is prohibited and violators will be prosecuted to the full extent of the law. e. Encrypt all plain text passwords. f. Ensure that the configuration is correct. g. Save the configuration file to avoid loss if the switch is powered down. Afterward you have completed the configurations click on the Check Results Button in the second window. . Then click the Assessment Items Tab and ensure you have all GREEN CHECK MARKS Part 6: Save your Packet Tracer configuration. On the File menu, select Save. You will be prompted to save your configuration as a Packet Tracer Network file (*.pkt). The naming convention used in this class will be: [your first initial + your last name] + “_Lab” (do not include the quotation marks) + the number of the lab] For example, Joe Smith will save his file for Lab 1 using the filename “JSmith_Lab1”. Packet Tracer will automatically append the .pkt file extension to the file name if “Packet Tracer
  • 17. Network File” is selected from the “Save as type” dropdown list. Note that when you exit Packet Tracer, you will likely be prompted to save your changes again (even if you have made no additional changes). Click “Yes” to save changes again, and Packet Tracer will close. To re-open an existing Packet Tracer file that you have created, you can double-click the file name in Windows Explorer. This will automatically launch Packet Tracer, and your PKT file will be opened. Alternately, you can launch Packet Tracer, select File | Open…, and navigate to the Packet Tracer File you want to open. Deliverables: Submit your assignment by attaching your PKT file and Lab Answer Sheet to the appropriate assignment link in Blackboard. Page 1 of 14 __MACOSX/LAB1/._Lab 1 Instructions-1.docx LAB1/Lab 1 Answer Sheet(1)-1.docx Liberty University CSIS 331 Lab 1 Answer Sheet On Switch S1 type and press Enter. S1# copy running-config startup-config S1# show running-config Copy and paste Switch S1 Config Here. On Switch S2 type and press Enter. S2# copy running-config startup-config
  • 18. S2# show running-config Copy and paste Switch S2 Config Here. __MACOSX/LAB1/._Lab 1 Answer Sheet(1)-1.docx