CSCO 220 Modules 9 and 10 Lab Packet-QoS and Network Management
docx
keyboard_arrow_up
School
College of Southern Nevada *
*We aren’t endorsed by this school
Course
220
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
29
Uploaded by DCOLEMAN2000
Module 9 -- QoS
Module 10 – Network Management
For some of this packet you will need to have access to your account on the
Netacad website
.
This is a long assignment packet so you are awarded twice the points of normal.
Grading Rubric
Your Score
Packet complete, answers correct, submitted on-time.
10
Packet complete, answers mostly correct, submitted
on-time.
8
Packet mostly complete, answers mostly correct,
submitted on-time.
4
Packet mostly complete, answers mostly correct,
submitted late.
2
For the Packet Tracer exercises located below, go to the Netacad link, click on it and go
to the module this lab packet applies to. Click on the section where the Packet Tracer
activity is located, download the Packet Tracer activity and follow the instructions
included with the Packet Tracer activity
Perform any Netlab assignments listed below, be sure to post your answers in RED
Post a Packet Tracer screen shot ONLY of the name of the lab and the completion
score (not the network or anything else). Make the screenshot the width of the page so I
can easily read it using my grading software
Packet Tracer 10.1.5-Use CDP to Map a Network. Post a screenshot of the completion screen
below, make it the width of the page.
Packet Tracer 10.2.6-Use LLDP to Map a Network. Post a screenshot of the completion screen
below, make it the width of the page.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
1
of
29
CSCO 220
Packet Tracer 10.3.4-Configure and Verify NTP.
Post a screenshot of the completion screen
below, make it the width of the page.
Netlab 10.4.10-Reseach Network Monitoring Software. Post your answers in red.
1.
Objectives
Part 1: Survey Your Understanding of Network Monitoring
Part 2: Research Network Monitoring Tools
Part 3: Select a Network Monitoring Tool
2.
Background / Scenario
Network monitoring is needed for any sized network. Proactively monitoring the network
infrastructure can assist network administrators with their day-to-day duties. The wide
variety of networking tools available vary in cost, depending on the features, number of
network locations and number of nodes supported.
In this lab, you will conduct research on available network monitoring software. You will
gather information on software products and features of those products. You will investigate
one product in greater detail and list some of the key features available.
3.
Required Resources
PC with internet access
4.
Instructions
Survey Your Understanding of Network Monitoring
Describe network monitoring as you understand it. Give an example of how it might be
used in a production network.
Network monitoring is done typically using a tool or set of tools that aid in troubleshooting,
monitoring, and modifying devices within their network. Reports, performance graphs,
network mapping of topologies, etc. can be part of the software tool. A network
administrator may decide to set up an email alert when packet loss on a router exceeds a
certain limit.
Place your answers here.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
2
of
29
Research Network Monitoring Tools
Research and find three network monitoring tools.
List the three tools that you found.
SolarWinds Network Performance Monitor, ManageEngine OpManager, Fortra Intermapper
Network Monitoring Software
Place your answers here.
Complete the following form for the network monitoring tools selected.
Vendor
Product Name
Features
SolarWinds -
https://www.solarwinds.com/
SolarWinds Network
Performance Monitor
Network performance
testing, network device
monitoring, Network device
discovery, Network device
scanning, LAN monitoring,
router traffic monitoring,
network discovery, network
mapping, packet analysis,
packet sniffing, SNMP
monitoring, SNMP scanning,
SNMP testing, switch
monitoring
ManageEngine -
https://www.manageengine.c
om/
ManageEngine OpManager
Network monitoring,
physical/virtual server
monitoring, wireless network
monitoring, WAN monitoring,
Cisco ACI monitoring,
storage monitoring,
distributed network
monitoring, network
visualization, fault
management
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
3
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Vendor
Product Name
Features
Fortra
-
https://www.fortra.com/
Intermapper Network
Monitoring Software
Network management, smart
alerting, network capacity
planning, AWS monitoring
Ntop -
https://www.ntop.org/
ntopng
Device templates, graph
templates, data
sources/templates/profiles
ITRS -
https://www.itrsgroup.com/
ITRS OP5 Monitor
SNMP network monitoring,
API monitoring, network
performance reporting
Select a Network Monitoring Tool
Select one or more monitoring tools from your research.
From your research, identify one or more tools you would choose for monitoring your
network. List the tools and explain your reasons for choosing them, including specific
features that you consider important.
SolarWinds Network Performance Monitor – I choose this because of the number of
options to choose from when analyze and troubleshooting different networks. All of the
feature of this tool are very important. But if I had to choose a few, I think I would consider
network performance testing, packet analysis, and packet sniffing to be most important.
Place your answers here.
Investigate the PRTG network monitoring tool.
Search the internet for the terms Paessler and PRTG, and look for a feature list. Give
examples of some of the features that you found for PRTG in the space provided below.
Distributed monitoring, automatic network discovery, real-time alerting
5.
Reflection Question
Based on your research, what conclusions have you reached regarding network monitoring
software?
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
4
of
29
Choosing the right products from networking monitoring is crucial.
Packet Tracer 10.6.10-Backup Configuration Files.
Post a screenshot of the completion
screen below, make it the width of the page.
Netlab 10.6.11-Use Tera Term to Manage Router Configuration Files. Post your answers in red.
Topology
6.
Topology
7.
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default
Gateway
R1
G0/0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
8.
Objectives
Part 1: Configure Basic Device Settings
Part 2: Use Terminal Emulation Software to Create a Backup Configuration File
Part 3: Use a Backup Configuration File to Restore a Router and Switch
Configuration
9.
Background / Scenario
It is a recommended best practice to maintain backup configuration files for routers and
switches in the event that they need to be restored to a previous configuration. Terminal
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
5
of
29
emulation software can be used to easily back up or restore a router or switch configuration
file.
In this lab, you will:
Use Tera Term to back up a router running-configuration file.
Erase the router startup configuration file.
Reload the router.
Restore the missing router configuration from the backup configuration file.
Note
: The routers used with CCNA hands-on labs are Cisco 4221 with Cisco IOS XE
Release 16.9.4 (universalk9 image). The switches used in the labs are Cisco Catalyst
2960s with Cisco IOS Release 15.2(2) (lanbasek9 image). Other routers, switches, and
Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the
commands available and the output produced might vary from what is shown in the labs.
Refer to the Router Interface Summary Table at the end of the lab for the correct interface
identifiers.
Note
: Ensure that the routers and switches have been erased and have no startup
configurations. If you are unsure contact your instructor.
10.Required Resources
1 Router (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or
comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
1 PC (Windows with a terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology Ethernet cables as shown in the topology
Configure Basic Device Settings
In Part 1, you will set up the network topology and configure basic settings, such as the
interface IP addresses, device access, and passwords on the router.
Cable the network as shown in the topology.
Attach the devices as shown in the topology and cable as necessary.
Configure the PC-A network settings according to the Addressing Table.
Configure basic settings for the router.
Open configuration window
Assign a device name to the router.
Disable DNS lookup to prevent the router from attempting to translate incorrectly entered
commands as though they were host names.
Assign
class
as the privileged EXEC encrypted password.
Assign
cisco
as the console password and enable login.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
6
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assign
cisco
as the VTY password and enable login.
Encrypt the plaintext passwords.
Create a banner that warns anyone accessing the device that unauthorized access is
prohibited.
Configure interfaces as listed in the table above.
Save the running configuration to the startup configuration file.
Close configuration window
Configure basic settings for the switch.
Open configuration window
Assign a device name to the switch.
Disable DNS lookup to prevent the router from attempting to translate incorrectly entered
commands as though they were host names.
Assign
class
as the privileged EXEC encrypted password.
Assign
cisco
as the console password and enable login.
Assign
cisco
as the VTY password and enable login.
Encrypt the plaintext passwords.
Create a banner that warns anyone accessing the device that unauthorized access is
prohibited.
Shut down all unused interfaces
Configure interface VLAN 1 as specified in the table above.
Save the running configuration to the startup configuration file.
Close configuration window
Create a Backup Configuration File
In Tera Term or other terminal emulation program, you can create a log of your commands
and output to a device via a connection. In this part, you will record your interaction with a
device using the logging feature of Tera Term.
Note
: If Tera Term is not installed, you can download the latest version from a number of
internet sites. Simply search for a Tera Term download.
Create a log file.
Open configuration window
Connect to the router via Serial connection in Tera Term as necessary. In the New Connection
window, select the
Serial
radio button and the appropriate communications port for your PC
(i.e., COM1).
From the
File
menu, choose
Log…
, and save the
teraterm.log
file to the Desktop. Ensure that
the
Append
and
Plain text
check boxes are enabled (checked).
The Tera Term log file will create a record of every command issued and every output
displayed.
Note
: You can use this feature to capture the output from several commands in
sequence and use it for network documentation purposes. For example, you could issue
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
7
of
29
the
show version
,
show ip interface brief
, and
show running-config
commands to
capture information about the router.
Display the router running-configuration.
Use the console password to log in to the router.
Enter privileged EXEC mode.
From privileged EXEC mode enter the
show running-config
command.
Continue pressing the space bar when
--More--
is displayed until you see the router R1#
prompt return.
From the
File
menu, choose
Show Log Dialog
. Click
Close
to end the log session.
Note
: You can also copy and paste the text from the Tera Term window directly into a text
editor.
Use a Backup Configuration File to Restore a Router and Switch Configuration
Erase the router startup-configuration and reload it.
From privileged EXEC mode erase the startup configuration.
R1#
erase startup-config
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
[OK]
Erase of nvram: complete
Reload the router.
R1#
reload
Proceed with reload? [confirm]
At the System Configuration Dialog prompt, type
no
; a router prompt displays, indicating an
unconfigured router.
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]:
Press RETURN to get started!
<output omitted>
Router>
Enter privileged EXEC mode and enter a
show running-config
command to verify that all of
the previous configurations were erased.
Edit the saved configuration backup file to prepare it for restoring the router configuration.
To restore the router configuration from a saved running configuration backup file, you must
edit the text.
Open the
teraterm.log
text file.
Remove each instance of
--More--
in the text file.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
8
of
29
Note
: The
--More--
was generated by pressing the Spacebar when displaying the
running configuration.
Delete the initial lines of the backup configuration file, so that the first line starts with the first
configuration command as shown below.
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
In the lines for interface GigabitEthernet0/0/1, insert a new line to enable the interface.
interface GigabitEthernet0/0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
Change to:
interface GigabitEthernet0/0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
no shutdown
After you have made all of the edits to the backup configuration file, save your changes to
filename
R1-config-backup
.
Note
: When saving the file, an extension such as
.txt
, may be added to the filename
automatically.
Restore the router configuration.
You can restore the edited running configuration directly to the console terminal in router
global configuration mode, and the configurations are entered as if they were commands
entered individually at the command prompt.
From the Tera Term console connection to the router, enter global configuration mode.
From the
File
menu, select
Send file…
.
Locate
R1-config-backup
and select
Open
.
Save the running configuration to the startup configuration file.
R1#
copy running-config startup-config
Verify the new running configuration.
Close configuration window
Backup and restore the switch.
Go back to the beginning of Part 2 and follow the same steps to backup and restore the
switch configuration.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
9
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11. Reflection Question
Why do you think it is important to use a text editor instead of a word processor to copy and
save your command configurations?
A word processor could possibly add special control characters to the text making it difficult
to use to restore the router.
pe your answers here.
12.Router Interface Summary Table
Router
Model
Ethernet Interface
#1
Ethernet Interface
#2
Serial Interface
#1
Serial Interface
#2
1800
Fast Ethernet 0/0
(F0/0)
Fast Ethernet 0/1
(F0/1)
Serial 0/0/0
(S0/0/0)
Serial 0/0/1
(S0/0/1)
1900
Gigabit Ethernet
0/0 (G0/0)
Gigabit Ethernet
0/1 (G0/1)
Serial 0/0/0
(S0/0/0)
Serial 0/0/1
(S0/0/1)
2801
Fast Ethernet 0/0
(F0/0)
Fast Ethernet 0/1
(F0/1)
Serial 0/1/0
(S0/1/0)
Serial 0/1/1
(S0/1/1)
2811
Fast Ethernet 0/0
(F0/0)
Fast Ethernet 0/1
(F0/1)
Serial 0/0/0
(S0/0/0)
Serial 0/0/1
(S0/0/1)
2900
Gigabit Ethernet
0/0 (G0/0)
Gigabit Ethernet
0/1 (G0/1)
Serial 0/0/0
(S0/0/0)
Serial 0/0/1
(S0/0/1)
4221
Gigabit Ethernet
0/0/0 (G0/0/0)
Gigabit Ethernet
0/0/1 (G0/0/1)
Serial 0/1/0
(S0/1/0)
Serial 0/1/1
(S0/1/1)
4300
Gigabit Ethernet
0/0/0 (G0/0/0)
Gigabit Ethernet
0/0/1 (G0/0/1)
Serial 0/1/0
(S0/1/0)
Serial 0/1/1
(S0/1/1)
Note
: To find out how the router is configured, look at the interfaces to identify the type of
router and how many interfaces the router has. There is no way to effectively list all the
combinations of configurations for each router class. This table includes identifiers for the
possible combinations of Ethernet and Serial interfaces in the device. The table does not
include any other type of interface, even though a specific router may contain one. An example
of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that
can be used in Cisco IOS commands to represent the interface.
End of document
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
10
of
29
Netlab 10.6.12-Use TFTP, Flash and USB to Manage Configuration Files. Post your answers in
red.
Topology
13.Topology
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default
Gateway
R1
G0/0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Use TFTP to Back Up and Restore the Switch Running Configuration
Part 3 Use TFTP to Back Up and Restore the Router Running Configuration
Part 4: Back Up and Restore Running Configurations Using Router Flash Memory
Part 5: (Optional) Use a USB Drive to Back Up and Restore the Running
Configuration
Background / Scenario
Cisco networking devices are often upgraded or swapped out for a number of reasons. It is
important to maintain backups of the latest device configurations, as well as a history of
configuration changes. A TFTP server is often used to backup configuration files and IOS
images in production networks. A TFTP server is a centralized and secure method used to
store the backup copies of the files and restore them as necessary. Using a centralized
TFTP server, you can back up files from many different Cisco devices.
In addition to a TFTP server, most of the current Cisco routers can back up and restore files
locally from CompactFlash (CF) memory or a USB flash drive. The CF is a removable
memory module that has replaced the limited internal flash memory of earlier router
models. The IOS image for the router resides in the CF memory, and the router uses this
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
11
of
29
IOS Image for the boot process. With the larger size of the CF memory, additional files can
be stored for backup purposes. A removable USB flash drive can also be used for backup
purposes.
In this lab, you will use TFTP server software to back up the Cisco device running
configuration to the TFTP server. You can edit the file using a text editor and copy the new
configuration back to a Cisco device. The instructions here for the TFTP server
configuration and operation are generic and there may be some differences in terminology
with your TFTP server software.
Note
: The routers used with CCNA hands-on labs are Cisco 4221 with Cisco IOS XE
Release 16.9.4 (universalk9 image). The switches used in the labs are Cisco Catalyst
2960s with Cisco IOS Release 15.2(2) (lanbasek9 image). Other routers, switches, and
Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the
commands available and the output produced might vary from what is shown in the labs.
Refer to the Router Interface Summary Table at the end of the lab for the correct interface
identifiers.
Note
: Ensure that the routers and switches have been erased and have no startup
configurations. If you are unsure contact your instructor.
Required Resources
1 Router (Cisco 4221 with Cisco IOS XE Release 16.9.3 universal image or
comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
1 PC (Windows with a terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
USB flash drive (Optional)
14.Instructions
Build the Network and Configure Basic Device Settings
In Part 1, you will set up the network topology and configure basic settings, such as the
interface IP addresses for router R1, switch S1 and PC-A.
Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.
Configure basic settings for the router.
Open configuration window
Assign a device name to the router.
Disable DNS lookup to prevent the router from attempting to translate incorrectly entered
commands as though they were host names.
Assign
class
as the privileged EXEC encrypted password.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
12
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assign
cisco
as the console password and enable login.
Assign
cisco
as the VTY password and enable login.
Encrypt the plaintext passwords.
Create a banner that warns anyone accessing the device that unauthorized access is
prohibited.
Configure interfaces as listed in the table above.
Save the running configuration to the startup configuration file.
Note
: Use the question mark (
?
) to help with the correct sequence of parameters
needed to execute this command.
Close configuration window
Configure basic settings for the switch.
Open configuration window
Assign a device name to the switch.
Disable DNS lookup to prevent the router from attempting to translate incorrectly entered
commands as though they were host names.
Assign
class
as the privileged EXEC encrypted password.
Assign
cisco
as the console password and enable login.
Assign
cisco
as the VTY password and enable login.
Encrypt the plaintext passwords.
Create a banner that warns anyone accessing the device that unauthorized access is
prohibited.
Shut down all unused interfaces.
Configure interface VLAN 1 as specified in the table above.
Save the running configuration to the startup configuration file.
Note
: Use the question mark (
?
) to help with the correct sequence of parameters
needed to execute this command.
Close configuration window
Verify connectivity from PC-A.
Ping from PC-A to S1.
Ping from PC-A to R1.
If the pings are not successful, troubleshoot the basic device configurations before
continuing.
Use TFTP to Back Up and Restore the Switch Running Configuration
Verify connectivity to switch S1 from PC-A.
The TFTP application uses the UDP Layer 4 transport protocol, which is encapsulated in an
IP packet. For TFTP file transfers to function, there must be Layer 1 and 2 (Ethernet, in this
case) and Layer 3 (IP) connectivity between the TFTP client and the TFTP server. The LAN
topology in this lab uses only Ethernet at Layers 1 and 2. However, TFTP transfers can also
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
13
of
29
be accomplished over WAN links that use other Layer 1 physical links and Layer 2
protocols. As long as there is IP connectivity between the client and server, as
demonstrated by ping, the TFTP transfer can take place. If the pings are not successful,
troubleshoot the basic device configurations before continuing.
Note
: A common misconception is that you can TFTP a file over the console connection.
This is not the case because the console connection does not use IP. The TFTP transfer
can be initiated from the client device (router or switch) using the console connection, but
there must be IP connectivity between the client and server for the file transfer to take
place.
Start the TFTP server.
Start the TFTP program on PC-A. Ensure that the TFTP program is using a directory that
you have WRITE permission for, such as a folder on your desktop.
Explore the copy command on a Cisco device.
Console into switch S1 and, from the privileged EXEC mode prompt, enter
copy ?
to display
the options for source or “from” location and other available copy options. You can specify
flash:
or
flash0:
as the source. However, if you simply provide a filename as the source,
flash0:
is assumed and is the default. Note that
running-config
is also an option for the
source location.
Open configuration window
S1#
copy ?
/erase
Erase destination file system.
/error
Allow to copy error file.
/noverify
Don't verify image signature before reload.
/verify
Verify image signature before reload.
bs:
Copy from bs: file system
cns:
Copy from cns: file system
flash:
Copy from flash: file system
ftp:
Copy from ftp: file system
http:
Copy from http: file system
https:
Copy from https: file system
logging
Copy logging messages
null:
Copy from null: file system
nvram:
Copy from nvram: file system
rcp:
Copy from rcp: file system
running-config
Copy from current system configuration
scp:
Copy from scp: file system
startup-config
Copy from startup configuration
system:
Copy from system: file system
tar:
Copy from tar: file system
tftp:
Copy from tftp: file system
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
14
of
29
tmpsys:
Copy from tmpsys: file system
vb:
Copy from vb: file system
xmodem:
Copy from xmodem: file system
ymodem:
Copy from ymodem: file system
Use the
?
to display the destination options after a source file location is chosen. The
flash:
file system for S1 is the source file system in this example.
S1#
copy flash: ?
flash:
Copy to flash: file system
ftp:
Copy to ftp: file system
http:
Copy to http: file system
https:
Copy to https: file system
null:
Copy to null: file system
nvram:
Copy to nvram: file system
rcp:
Copy to rcp: file system
running-config
Update (merge with) current system configuration
scp:
Copy to scp: file system
startup-config
Copy to startup configuration
system:
Copy to system: file system
tftp:
Copy to tftp: file system
tmpsys:
Copy to tmpsys: file system
vb:
Copy to vb: file systesystem
Transfer the running-config file from switch S1 to TFTP server on PC-A.
From the privileged EXEC mode on the switch, enter the
copy running-config tftp:
command. Provide the remote host address of the TFTP server (PC-A), 192.168.1.3. Press
Enter to accept default destination filename (
s1-confg
) or provide your own filename. The
exclamation marks (
!!
) indicate the transfer process is in progress and is successful.
S1#
copy running-config tftp:
Address or name of remote host []?
192.168.1.3
Destination filename [s1-confg]?
!!
1465 bytes copied in 0.663 secs (2210 bytes/sec)
S1#
The TFTP server may also displays transfer progress.
Note
: If you do not have permission to write to the current directory that is used by the
TFTP server, the following error message displays:
S1#
copy running-config tftp:
Address or name of remote host []?
192.168.1.3
Destination filename [s1-confg]?
%Error opening tftp://192.168.1.3/s1-confg (Permission denied)
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
15
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Note
: Other issues, such as a firewall blocking TFTP traffic, can prevent the TFTP
transfer. Please check with your instructor for further assistance.
Check the directory on the TFTP server (usually the default directory for the TFTP server
software) to verify that the file was transferred successfully. Your TFTP server may have a
dialog for this, or you can simply use the File Explorer provided by your Operating System.
Create a modified switch running configuration file.
The saved running configuration file,
s1-confg
, can also be restored to the switch by using
the
copy
command from the switch. The original or a modified version of the file can be
copied to the flash file system of the switch.
Navigate to the TFTP directory on PC-A by using the file system of PC-A, and then locate the
s1-confg
file. Open this file using a text editor program, such as WordPad.
With the file open, locate the
hostname S1
line. Replace
S1
with
Switch1
. Delete all the self-
generated crypto keys, as necessary. A sample of the keys is displayed below. These keys are
not exportable and can cause errors while updating the running configuration.
crypto pki trustpoint TP-self-signed-1566151040
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1566151040
revocation-check none
rsakeypair TP-self-signed-1566151040
!
!
crypto pki certificate chain TP-self-signed-1566151040
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D
43657274
<output omitted>
E99574A6 D945014F B6FE22F3 642EE29A 767EABF7 403930CA D2C59E23
102EC12E
02F9C933 B3296D9E 095EBDAF 343D17F6 AF2831C7 6DA6DFE3 35B38D90
E6F07CD4
40D96970 A0D12080 07A1C169 30B9D889 A6E2189C 75B988B9 0AF27EDC
6D6FA0E5
CCFA6B29 729C1E0B 9DADACD0 3D7381
quit
Save this file as a plain text file with a new filename,
Switch1-confg.txt
, in this example.
Note
: When saving the file, an extension, such as
.txt
, may be added to the filename
automatically.
If your TFTP software has the option, use it to show the contents of its directory to verify that
the file is present.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
16
of
29
Copy the modified running configuration file from the TFTP server to switch S1.
From the privileged EXEC mode on the switch, enter the
copy tftp running-config
command.
Provide the remote host address of the TFTP server, 192.168.1.3. Enter the new filename,
Switch1-confg.txt
. The exclamation mark (!) indicates the transfer process is in progress and
is successful.
S1#
copy tftp: running-config
Address or name of remote host []?
192.168.1.3
Source filename []?
Switch1-confg.txt
Destination filename [running-config]?
Accessing tftp://192.168.1.3/Switch1-confg.txt...
Loading Switch1-confg.txt from 192.168.1.3 (via Vlan1): !
[OK - 1580 bytes]
[OK]
1580 bytes copied in 9.118 secs (173 bytes/sec)
*Mar
1 00:21:16.242: %PKI-4-NOAUTOSAVE: Configuration was modified.
Issue
"write memory" to save new certificate
*Mar
1 00:21:16.251: %SYS-5-CONFIG_I: Configured from tftp://192.168.1.3/Switch1-
confg.txt by console
Switch1#
After the transfer has completed, the prompt has changed from S1 to Switch1, because
the running configuration is updated with the
hostname Switch1
command in the
modified running configuration.
Enter the
show running-config
command to examine running configuration file.
Switch1#
show running-config
Building configuration...
Current configuration : 3062 bytes
!
! Last configuration change at 00:09:34 UTC Mon Mar 1 1993
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Switch1
!
boot-start-marker
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
17
of
29
boot-end-marker
<output omitted>
close configuration window
Note
: This procedure merges the running-config from the TFTP server with the current
running-config in the switch or router. If changes were made to the current running-
config, the commands in the TFTP copy are added. Alternatively, if the same command
is issued, it updates the corresponding command in the switch or router current running-
config.
If you want to completely replace the current running-config with the one from the TFTP
server, you must erase the switch startup-config and reload the device. You will then
need to configure the VLAN 1 management address, so there is IP connectivity
between the TFTP server and the switch.
Use TFTP to Back Up and Restore the Router Running Configuration
The backup and restore procedure from Part 3 can also be performed with a router. In Part
4, the running configuration file will be backed up and restored using a TFTP server.
Verify connectivity to router R1 from PC-A.
If the pings are not successful, troubleshoot the basic device configurations before
continuing.
Transfer the running configuration from router R1 to TFTP server on PC-A.
Open configuration window
From the privileged EXEC mode on R1, enter the
copy running-config tftp
command.
Provide the remote host address of the TFTP server, 192.168.1.3, and accept the default
filename.
Verify that the file has been transferred to the TFTP server.
Restore the running configuration file to the router.
Erase the startup-config file on the router.
Reload the router.
Configure the G0/0/1 interface on the router with an IP address 192.168.1.1.
Verify connectivity between the router and PC-A.
Use the
copy
command to transfer the running-config file from the TFTP server to the router.
Use
running-config
as the destination.
Verify the router has updated the running-config.
Close configuration window
Back Up and Restore Configurations Using Router Flash Memory
Current generation Cisco routers do not have internal flash memory. The flash memory for
these routers uses CompactFlash (CF) memory. The use of CF memory allows for more
available flash memory and easier upgrades without the need to open the router case.
Besides storing the necessary files, such as IOS images, the CF memory can store other
files, such as a copy of the running configuration. In Part 5, you will create a backup copy of
the running configuration file and save it on the USB memory on the router.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
18
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Note
: If the router does not use CF, the router may not have enough flash memory for
storing the backup copy of running configuration file. You should still read through the
instructions and become familiar with the commands.
Display the router file systems.
The
show file systems
command displays the available file systems on the router. The
flash0:
file system is the default file system on this router as indicated by the asterisk (*)
symbol (at the beginning of the line). The
flash0:
file system can also be referenced using
the name
flash:
. The total size of the
flash0:
is approximately 7GB with about 6GB
available. Currently
flash0:
and
nvram:
are the only available file systems.
Open configuration window
R1#
show file systems
File Systems:
Size(b)
Free(b)
Type
Flags
Prefixes
-
-
opaque
rw
system:
-
-
opaque
rw
tmpsys:
*
7194652672
6299918336
disk
rw
bootflash: flash:
1804468224
1723789312
disk
ro
webui:
-
-
opaque
rw
null:
-
-
opaque
ro
tar:
-
-
network
rw
tftp:
-
-
opaque
wo
syslog:
33554432
33543116
nvram
rw
nvram:
-
-
network
rw
rcp:
-
-
network
rw
ftp:
-
-
network
rw
http:
-
-
network
rw
scp:
-
-
network
rw
sftp:
-
-
network
rw
https:
-
-
opaque
ro
cns:
Question:
Where is the startup-config file located?
nvram:
Note
: Verify there is at least 1 MB (1,048,576 bytes) of free space. If there is not
enough space in the flash memory, please contact your instructor for further
instructions. You can determine the size of flash memory and space available using the
show flash
or
dir flash:
command at the privileged EXEC prompt.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
19
of
29
Copy the router running configuration to flash.
A file can be copied to flash by using the
copy
command at the privileged EXEC prompt. In
this example, the file is copied into
flash0:
, because there is only one flash drive available
as displayed in the previous step, and it is also the default file system. The
R1-running-
config-backup
file is used as the filename for the backup running configuration file.
Note
: Remember that filenames are case-sensitive in the IOS file system.
Copy the running configuration to flash memory.
R1#
copy running-config flash:
Destination filename [running-config]?
R1-running-config-backup
2169 bytes copied in 0.968 secs (2241 bytes/sec)
Use
dir
command to verify the running-config has been copied to flash.
R1#
dir flash:
Directory of bootflash:/
11
drwx
16384
Aug 2 2019 04:15:13 +00:00
lost+found
370945
drwx
4096
Sep 25 2019 20:17:11 +00:00
.installer
338689
drwx
4096
Aug 2 2019 04:15:55 +00:00
.ssh
217729
drwx
4096
Aug 2 2019 04:17:59 +00:00
core
379009
drwx
4096
Sep 25 2019 20:19:13 +00:00
.prst_sync
80641
drwx
4096
Aug 2 2019 04:16:09 +00:00
.rollback_timer
161281
drwx
4096
Aug 2 2019 04:16:11 +00:00
gs_script
112897
drwx
77824
Sep 25 2019 20:23:03 +00:00
tracelogs
362881
drwx
4096
Aug 23 2019 17:19:54 +00:00
.dbpersist
298369
drwx
4096
Aug 2 2019 04:16:41 +00:00
virtual-instance
12
-rw-
30
Sep 25 2019 20:19:13 +00:00
throughput_monitor_params
8065
drwx
4096
Aug 2 2019 04:17:55 +00:00
onep
13
-rw-
35
Sep 25 2019 20:20:19 +00:00
pnp-tech-time
249985
drwx
4096
Aug 20 2019 17:40:11 +00:00
Archives
14
-rw-
64414
Sep 25 2019 20:20:28 +00:00
pnp-tech-discovery-summary
15
-rw-
3509
Sep 25 2019 20:24:32 +00:00
R1-running-config-backup
17
-rw-
5032908
Sep 19 2019 14:16:23 +00:00
isr4200_4300_rommon_1612_1r_SPA.pkg
18
-rw-
517153193
Sep 21 2019 04:24:04 +00:00
isr4200-
universalk9_ias.16.09.04.SPA.bin
7194652672 bytes total (6299643904 bytes free)
Use the
more
command to view the running-config file in flash memory. Examine the file
output and scroll to the Interface section. Notice the
no shutdown
command is not included
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
20
of
29
with the GigabitEthernet0/1. The interface is shut down when this file is used to update the
running configuration on the router.
R1#
more flash:R1-running-config-backup
<output omitted>
interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
<output omitted>
Erase the startup configuration and reload the router.
Restore the running configuration from flash.
Verify the router has the default initial configuration.
Copy the saved running-config file from flash to update the running-config.
Router#
copy flash:R1-running-config-backup running-config
Use the
show ip interface brief
command to view the status of the interfaces. The interface
GigabitEthernet0/1 was not enabled when the running configuration was updated, because it is
administratively down.
R1#
show ip interface brief
Interface
IP-Address
OK? Method Status
Protocol
GigabitEthernet0/0/0
unassigned
YES unset
administratively down down
GigabitEthernet0/0/1
192.168.1.1
YES TFTP
administratively down down
Serial0/1/0
unassigned
YES unset
administratively down down
Serial0/1/1
unassigned
YES unset
administratively down down
Close configuration window
The interface can be enabled using the
no shutdown
command in the interface
configuration mode on the router.
Another option is to add the
no shutdown
command for the GigabitEthernet0/0/1
interface to the saved file before updating the router running configuration file. This will
be done in Part 5 using a saved file on a USB flash drive.
Note
: Because the IP address was configured by using a file transfer, TFTP is listed
under the Method heading in the
show ip interface brief
output.
(Optional) Use a USB Drive to Back Up and Restore the Running Configuration
This instruction set cannot be executed on Netlab equipment, this has been included so
that you can see how the process works. Please complete the two questions at the end.
A USB flash drive can be used to backup and restore files on a router with an available
USB port. One USB port is available on the 4221 routers.
Note
: USB ports are not available on all routers, but you should still become familiar with
the commands.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
21
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Note
: Some ISR G1 routers (1841, 2801, or 2811) use File Allocation Table (FAT) file
systems, which results in a maximum size limit for the USB flash drives that can be used in
this part of the lab. The recommended maximum size for an ISR G1 is 4 GB. If you receive
the following message, the file system on the USB flash drive may be incompatible with the
router or the capacity of the USB flash drive may have exceeded maximum size of the FAT
file system on the router.
*Feb
8 13:51:34.831: %USBFLASH-4-FORMAT: usbflash0 contains unexpected values
in partition table or boot sector.
Device needs formatting before use!
Insert a USB flash drive into a USB port on the router.
Notice the message on the terminal when inserting the USB flash drive.
*
Sep 24 23:00:33.242: %IOSD_INFRA-6-IFS_DEVICE_OIR: Device usb0 added
Verify that the USB flash file system is available.
Open configuration window
R1#
show file systems
File Systems:
Size(b)
Free(b)
Type
Flags
Prefixes
-
-
opaque
rw
system:
-
-
opaque
rw
tmpsys:
*
7194652672
6297677824
disk
rw
bootflash: flash:
256589824
256577536
disk
rw
usb0:
1804468224
1723789312
disk
ro
webui:
-
-
opaque
rw
null:
-
-
opaque
ro
tar:
-
-
network
rw
tftp:
-
-
opaque
wo
syslog:
33554432
33543116
nvram
rw
nvram:
-
-
network
rw
rcp:
-
-
network
rw
ftp:
-
-
network
rw
http:
-
-
network
rw
scp:
-
-
network
rw
sftp:
-
-
network
rw
https:
-
-
opaque
ro
cns:
Copy the running configuration file to the USB flash drive.
Use the
copy
command to copy the running configuration file to the USB flash drive.
R1#
copy running-config usb0:
Destination filename [running-config]?
R1-running-config-backup.txt
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
22
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2198 bytes copied in 0.708 secs (3105 bytes/sec)
List the file on the USB flash drive.
Use the
dir
command (or
show
command) on the router to list the files on the USB flash
drive. In this sample, a flash drive was inserted into USB port 0 on the router.
R1#
dir usb0:
Directory of usb0:/
6
-rwx
3539
Sep 25 2019 20:41:58 +00:00
R1-running-config-backup.txt
3
drwx
4096
Sep 24 2019 13:32:26 +00:00
System Volume Information
256589824 bytes total (256573440 bytes free)
Erase the startup-config and reload the router.
Modify the saved file.
Remove the USB drive from the router.
Router#
*Sep 24 23:00:27.674: %IOSD_INFRA-6-IFS_DEVICE_OIR: Device usb0 removed
Insert the USB drive into the USB port of a PC.
Modify the file using a text editor. The
no shutdown
command is added to the
GigabitEthernet0/0/1 interface. Save the file as a plain text file on to the USB flash drive.
interface GigabitEthernet0/0/1
ip address 192.168.1.1 255.255.255.0
no shutdown
duplex auto
speed auto
Remove the USB flash drive from the PC safely.
Restore the running configuration file to the router.
Insert the USB flash drive into a USB port on the router. Notice the port number where the
USB drive has been inserted if there is more than one USB port available on the router.
*
Sep 24 23:00:33.242: %IOSD_INFRA-6-IFS_DEVICE_OIR: Device usb0 added
List the files on the USB flash drive.
R1#
dir usb0:
Directory of usb0:/
6
-rwx
3539
Sep 25 2019 20:41:58 +00:00
R1-running-config-backup.txt
3
drwx
4096
Sep 24 2019 13:32:26 +00:00
System Volume Information
256589824 bytes total (256573440 bytes free)
Copy the running configuration file to the router.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
23
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Router#
copy usb0:R1-running-config-backup.txt running-config
Destination filename [running-config]?
2344 bytes copied in 0.184 secs (12739 bytes/sec)
R1#
Verify that the GigabitEthernet0/1 interface is enabled.
R1#
show ip interface brief
Interface
IP-Address
OK? Method Status
Protocol
GigabitEthernet0/0/0
unassigned
YES unset
administratively down down
GigabitEthernet0/0/1
192.168.1.1
YES TFTP
up
up
Serial0/1/0
unassigned
YES unset
administratively down down
Serial0/1/1
unassigned
YES unset
administratively down down
The G0/1 interface is enabled because the modified running configuration included the
no shutdown
command.
Close configuration window
Reflection Questions
1.
What command do you use to copy a file from the flash to a USB drive?
copy flash:filename usb0:
Type your answers here.
2.
What command do you use to copy a file from the USB flash drive to a TFTP server?
copy usb0:filename tftp:
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
24
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
15.Router Interface Summary Table
Router
Model
Ethernet Interface
#1
Ethernet Interface
#2
Serial Interface
#1
Serial Interface
#2
1800
Fast Ethernet 0/0
(F0/0)
Fast Ethernet 0/1
(F0/1)
Serial 0/0/0
(S0/0/0)
Serial 0/0/1
(S0/0/1)
1900
Gigabit Ethernet
0/0 (G0/0)
Gigabit Ethernet
0/1 (G0/1)
Serial 0/0/0
(S0/0/0)
Serial 0/0/1
(S0/0/1)
2801
Fast Ethernet 0/0
(F0/0)
Fast Ethernet 0/1
(F0/1)
Serial 0/1/0
(S0/1/0)
Serial 0/1/1
(S0/1/1)
2811
Fast Ethernet 0/0
(F0/0)
Fast Ethernet 0/1
(F0/1)
Serial 0/0/0
(S0/0/0)
Serial 0/0/1
(S0/0/1)
2900
Gigabit Ethernet
0/0 (G0/0)
Gigabit Ethernet
0/1 (G0/1)
Serial 0/0/0
(S0/0/0)
Serial 0/0/1
(S0/0/1)
4221
Gigabit Ethernet
0/0/0 (G0/0/0)
Gigabit Ethernet
0/0/1 (G0/0/1)
Serial 0/1/0
(S0/1/0)
Serial 0/1/1
(S0/1/1)
4300
Gigabit Ethernet
0/0/0 (G0/0/0)
Gigabit Ethernet
0/0/1 (G0/0/1)
Serial 0/1/0
(S0/1/0)
Serial 0/1/1
(S0/1/1)
Note
: To find out how the router is configured, look at the interfaces to identify the type of
router and how many interfaces the router has. There is no way to effectively list all the
combinations of configurations for each router class. This table includes identifiers for the
possible combinations of Ethernet and Serial interfaces in the device. The table does not
include any other type of interface, even though a specific router may contain one. An example
of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that
can be used in Cisco IOS commands to represent the interface.
End of document
Netlab 10.6.13-Reseach Password Recovery Procedures. Post your answers in red.
Topology
16.Objectives
Part 1: Research the Configuration Register
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
25
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Identify the purpose of the configuration register.
Describe router behavior for different configuration register values.
Part 2: Document the Password Recovery Procedure for a Specific Cisco Router
Research and record the process for password recovery on a specific Cisco router.
Answer questions based on the researched procedure.
17.Background / Scenario
The purpose of this lab is to research the procedure for recovering or resetting the enable
password on a specific Cisco router. The enable password protects access to privileged
EXEC and configuration mode on Cisco devices. The enable password can be recovered,
but the enable secret password is encrypted and would need to be replaced with a new
password.
In order to bypass a password, a user must be familiar with the ROM monitor (ROMMON)
mode, as well as the configuration register setting for Cisco routers. ROMMON is basic CLI
software stored in ROM that can be used to troubleshoot boot errors and recover a router
when an IOS is not found.
In this lab, you will begin by researching the purpose and settings of the configuration
register for Cisco devices. You will then research and detail the exact procedure for
password recovery for a specific Cisco router.
18.Required Resources
Device with internet access
19.Instructions
Research the Configuration Register
To recover or reset an enable password, a user will utilize the ROMMON interface to
instruct the router to ignore the startup configuration when booting. When booted, the user
will access privilege EXEC mode, overwrite the running configuration with the saved startup
configuration, recover or reset the password, and restore the router’s boot process to
include the startup configuration.
The router’s configuration register plays a vital role in the process of password recovery. In
the first part of this lab, you will research the purpose of a router’s configuration register
and the meaning of certain configuration register values.
Describe the purpose of the configuration register.
Questions:
What is the purpose of the configuration register?
The purpose of the configuration register is to change router behavior (how the router
boots, options for booting, console speed, etc.).
Type your answers here.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
26
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
What command changes the configuration register in global configuration mode?
config-register
What command changes the configuration register in ROMMON mode?
confreg
Determine configuration register values and their meanings.
Questions:
Research and list the router behavior for the following configuration register values.
0x2102
Ignores break.
Boots into ROM if initial boot fails.
Load the CISCO IOS software image from Flash memory.
Load the startup configuration.
Use a console speed of 9600 baud.
Use console messages to show the boot sequence.
0x2142
Ignore break.
Boots into ROM if initial boot fails.
Uses a console speed of 9600 baud.
Ignore the contents of NVRAM (ignores configuration).
What is the difference between these two configuration register values?
The 0x2102 setting is for normal router operation. The 0x2142 setting bypasses the start-
up configuration allowing a user to recover or reset the enable password.
Type your answers here.
Document the Password Recovery Procedure for a Specific Cisco Router
For Part 2, you will describe the exact procedure for recovering or resetting a password
from a specific Cisco router and answer questions based on your research. Your instructor
will provide you with the exact router model to research.
Detail the process to recover a password on a specific Cisco router.
Research and list the steps and commands that you need to recover or reset the enable or
enable secret password from your Cisco router. Summarize the steps in your own words.
Recovering the 2900 integrated services router password
1)
Turn off router.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
27
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2)
Remove compact flash card from back of the router.
3)
Turn on router.
4)
Reinsert compact flash card once router is on Rommon mode.
5)
Type
confreg 0x2142
at rommon 1> prompt to boot from Flash.
6)
Type
reset
at rommon 2> prompt.
7)
Type
no
after each setup question or press
Ctrl-C
to skip the setup procedure.
8)
Type
enable
at Router> prompt.
9)
Type
configure memory
or
copy startup-config running-config
to copy NVRAM into
memory.
10)
Type
show run
11)
Type
conf t
12)
Type
enable secret <password>
to change enable secret password.
13)
Type
no shutdown
for each interface used (Type
show ip int brief
to display each
interface that is “up”).
14)
Type
config-register <configuration_register_setting>
15)
Type
end
to leave configuration mode.
16)
Type
copy run start
to commit changes.
Answer questions about the password recovery procedure.
Using the process for password recovery, answer the following questions.
Questions:
Describe how to find the current setting for your configuration register.
Use
show version
command.
Describe the process for entering ROMMON mode.
On the Cisco router:
1)
Turn on router.
2)
Press
Ctrl-Break
continuously while router is booting.
3)
Press
Break
when router starts booting.
What commands do you need to enter the ROMMON interface?
confreg 0x2142
What message would you expect to see when the router boots?
“Would you like to enter the initial configuration dialog?
[yes/no]:
Why is it important to load the startup configuration into the running configuration?
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
28
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
To avoid losing recent changes.
Why is it important to change the configuration register back to the original value after
recovering password?
So the router doesn’t ignore the startup configuration.
20.Reflection Question
Why is it of critical importance that a router be physically secured to prevent unauthorized
access?
Because the password recovery procedure can only be performed using a console
connection, which requires direct physical access to the device, preventing unauthorized
users access to the physical device is a crucial part of an overall security plan.
Packet Tracer 10.7.6-Use TFTP Serve to Upgrade a Cisco IOS Image. Post a screenshot of
the completion screen below, make it the width of the page.
Packet Tracer 10.8.1-Configure CDP, LLDP, and NTP. Post a screenshot of the completion
screen below, make it the width of the page.
© 2023 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page
29
of
29
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Recommended textbooks for you

A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L

A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningLINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE LA+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage Learning

A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L

A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning