...in at the console. Which command defines the password that you had to enter to access privileged mode? d. The password command, if it’s configured 2. An engineer had formerly configured a Cisco router to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration? C. A transport input ssh command in vty config mode 3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco router: Banner login this is the login banner Which of the following are true about what occurs the next time a user logs in from the console? D. The banner text “Login banner configured, no text defined” is displayed. 4. Which of the following features would you typically expect to be associated with the router CLI, but not with the switch CLI? C. The ip address dhcp command 5. You just bought two Cisco routers for use in a lab, connecting each router to a different LAN switch with their Fa0/0 interfaced. You also connected the two routers’ serial interfaces using a back-to-back cable. Which of the following steps is not required to be able to forward IP on both routers’ interfaces? c. Configuring the clock rate command on one router’s serial interface 6. The output of the show ip interface brief command on R1 lists interface status codes of “down” and “down”...
Words: 1179 - Pages: 5
...to FastEthernet 0/24 Save the switch changes Hide Details Save the hostname Save the FastEthernet 0/1 description Save the FastEthernet 0/2 description Save the FastEthernet 0/3 description Save the FastEthernet 0/24 description Change the router hostname to SFO Add a description to FastEthernet0/0 Add a description to Serial 0/1/0 Add a description to Serial 0/1/1 Save the router changes Hide Details Save the hostname Save the FastEthernet 0/0 description Save the Serial 0/1/0 description Save the Serial 0/1/1 description Explanation Use the following commands to complete these tasks: Press Enter Switch>enable Switch#configure terminal Switch(config)#hostname Branch1 Branch1(config)#interface FastEthernet0/1 Branch1(config-if)#description Wrk1 Branch1(config-if)#interface FastEthernet0/2 Branch1(config-if)#description Wrk2 Branch1(config-if)#interface FastEthernet0/3 Branch1(config-if)#description Wrk3 Branch1(config-if)#interface FastEthernet0/24 Branch1(config-if)#description Default gateway Branch1(config-if)#exit Branch1(config)#exit Branch1#copy running-config startup-config Use similar commands on the router to modify the hostname and the interface descriptions. Task Summary Actions you were required to perform Configure 7y%pirt as the enable password Configure opo63!m@ as the enable secret Save the changes to the startup-config Hide Details Save the enable password ...
Words: 15973 - Pages: 64
...address assigned to the router for that segment is also displayed below. What do you think the problem is with the configuration of this host? PC “ipconfig /all” output (summarized) Ethernet adapter Local Area Connection: Physical Address. . . . . . . . . : 00-AB-C5-00-00-00 DHCP Enabled. . . . . . . . . . . : No IPv4 Address. . . . . . . . . . . : 192.168.40.9 Subnet Mask . . . . . . . . . . . : 255.255.255.128 Default Gateway . . . . . . . . . : 192.168.40.254 DNS Servers . . . . . . . . . . . : 8.8.8.8 Router “show ip interface brief” Router# show ip interface brief Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 192.168.40.254 YES NVRAM up up Answer: The problem is that either the IP address is wrong or the subnet mask is wrong. That is because the 192.168.40.9 IP address is not in the same subnet as the default gateway IP address (192.168.40.254). Changing the subnet mask to 255.255.255.0 or changing the IP address to 192.168.40.129 – 192.168.40.253 would resolve the problem. The ping command can be used to check for connectivity, and it was. The tracert command could have been used to see where the ping failed. Scenario 2: One user complains of lack of connectivity to certain resources outside of their directly connected network. The output of the “ipconfig /all” command is below. The IP address configuration for that interface on the router for that segment is also...
Words: 1499 - Pages: 6
...are manually configured by using the switchport port-security mac-address mac-address interface configuration command, stored in the address table, and added to the switch running configuration. Dynamic secure MAC addresses-These are dynamically configured, stored only in the address table, and removed when the switch restarts. Sticky secure MAC addresses-These are dynamically configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, when the switch restarts, the interface does not need to dynamically reconfigure them. You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter the switchport port-security mac-address sticky interface configuration command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. The interface adds all the sticky secure MAC addresses to the running configuration. The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you...
Words: 9957 - Pages: 40
...implemented features of Cisco router and switches by using a simple, small office scenario as a case study. Typical of a small organization is there are departments for financial matters, marketing and sales and one or more managers. The personnel in each of these areas has specific computer functions and data needs with some being in common such as Internet access and others being necessarily limited to certain workers such as access to financial data. Let’s assume we’re a consulting firm that’s been hired to design this network and as the the first step we have met with the key managers to develop a list of criteria for each department in regards to computer resources, security and performance. In our meeting we agreed to the following goals. Network Design Goals and Numbers Overall: A reasonable level of network security. This particular business isn’t subject to any set of specific regulations such as HIPAA but management well understands that good security practices are both a sound investment in protecting the company’s IT assets, the company image and as a deterrent against legal proceedings. It was agreed that the following basic security procedures are to be implemented. - Centralized anti-virus on a server that can “push-out” anti-virus software to all client machines on the network and can monitor and update those clients as needed. - Only those services that are required in general will be permitted to pass through the various router interfaces and all others will...
Words: 1674 - Pages: 7
...CCNA Portable Command Guide Second Edition Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided...
Words: 64092 - Pages: 257
...CCNA Notes Introduction Cisco offers two options for obtaining the CCNA certification: Pass Exam 640-802 OR Pass Exam 640-822 AND Exam 640-816 While you can use these notes to prepare for either exam, the notes are geared towards passing the single exam. I recommend you study all of the material and take the single exam option rather than taking two exams. Cisco Device Icons The following table lists the specific icons Cisco uses to represent network devices and connections. Represents Icon Hub Bridge Switch Router Access point Network cloud Ethernet connection Serial Line connection Wireless connection Virtual Circuit The OSI Model As you study this section, answer the following questions: What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives: 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach ...
Words: 73801 - Pages: 296
... Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP Routing with Connected, Static, and RIP-2 Routes 44 Unit 5: IP Troubleshooting and EIGRP 53 Unit 6: Subnet Design 62 Unit 7: Advanced IP Routing Topics and OSPF 69 Unit 8: Advanced IP Topics 79 Unit 9: LANs 88 Unit 10: WANs 98 Unit 11: Course Review and Final Examination 107 COURSE SUPPORT...
Words: 22068 - Pages: 89
...CMIT 350 WAN and SOHO Skills Implementation UMUC Winter 2015 Springfield Site Configuration: Required Implementation: Device hostnames, banners, secured passwords and spanning tree protocol. * Device Configurations: Implement device hostnames to match the xACME educational topology labels. Provide a template and sample configuration for the MOTD banner and login banner (wording and implementation) for one of the switches. Keep this generic, as it will be implemented on all switches in the xACME educational topology. Lastly, include the configuration steps for implementing device passwords on both console port (out-of-band communications) and VTY (Telnet/in-band communications). All passwords should be encrypted. Required Implementation: Configure all devices hostnames as per the xACME topology Configure encrypted passwords (console and Telnet ports) on all devices Configure MOTD and Login banner for one of the switches Create Server VLANS, Faculty VLANS, Instructional VLANS and Administrative VLANs on all switches Assign ports to VLANs on all switches Assign mode of access of VLANS Configure trunks between switches Make Switch1 as primary root bridge for all VLANs Configure security to protect from bogus BPDUs Configure Hostname: 1. Enable 2. Router# configure terminal 3. Router(config)#hostname (SpringfieldSw1, SpringfieldSw2, SpringfieldSw3, SpringfieldSw4) 4. End 5. Copy run start Creating Passwords: 1. Conf t 2...
Words: 3539 - Pages: 15
...CCNA Portable Command Guide Second Edition Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author...
Words: 64092 - Pages: 257
...layer-1 and layer-2 * Physical connectivity to the host to connected. Ethernet connection should indicate electrical connectivity with some type of LED indicator light. * Verify OS detecting network interface correctly by verifying drivers installed correctly and OS display the interface as “connected” * If you have access to switching infrastructure ensure that host is assigned to the proper VLAN with the correct interface switching type (access or trunk) * Verify layer-3 * Verify IP address assignment configuration with “ipconfig /all” command on MS Windows OSs * IP address and mask correctly assigned? * Default gateway; is the host on the same IP subnet as the default gateway? * Attempt to ping default gateway, * If successful host has layer-3 connectivity to directly connection network * If unsuccessful attempt to ping other host on directly connected IP subnet * If host is having issues with pinging hosts on directly connected network, verify ARP resolution by using the command ”arp –a” command. This command displays all the dynamic ARP resolutions. If no ARP entries present the host may have hidden layer-2 issues. * Verify IP connectivity to remote networks * Review IP default gateway and static routes * “ipconfig /all” for Windows hosts for default gateway * “netstat –rn” for Window host routing table * Unit 7 will expand the...
Words: 1729 - Pages: 7
...Table of Contents Acknowledgement 2 Table of Figures 4 Introduction 5 IP Address Configuration 6 Packet Tracer Simulation 8 Router Configuration 9 Computer Configuration 12 Server Configuration 13 Floor Plan 14 Product analysis 15 Switch 15 Cable 16 Router 17 Workstation 18 Project Cost 19 Conclusion 20 Reference list 21 Table of Figures Figure 1: Author’s work 8 Figure 2: Author’s work 14 Figure 4: Cat6 Straight Cables (Monoprice.com, 2014) 16 Figure 5: Cisco 4451-X ISR (Cisco.com, 2014) 17 Figure 6: HP Z230 Workstation (HP.com, 2014) 18 Figure 7: Author’s work 19 Introduction The purpose of this project is to analyze the company’s old system and design the newly proposed network system. The IP address configurations of the network have been displayed with detail, as well as the router configurations, computer configurations and server configurations. A network simulation has been designed through the Packet Tracer software in order to prove that the system works flawlessly. Also, an accurately designed floor plan is available showing the cabling throughout the building. Finally, the networking devices used in the system are analyzed and recommendations have been made by the author. IP Address Configuration Network Name | IP Address Range | Broadcast Address | Network Address | Subnet | Audley – Doctors | 192.168.0.2 – 192.168.0.126 | 192.168.0.127 | 192.168.0.0 | /25 | Audley - Admin | 192.168.0.130 –...
Words: 2307 - Pages: 10
...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: Network Fundamentals course as part of an official Cisco Networking Academy Program. Activity 1.1.1: Using Google Earth™ to View the World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions...
Words: 60675 - Pages: 243
...ITT Technical Institute NT2640 IP Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics...
Words: 2573 - Pages: 11
...03 May 2014 Networking Basics NETWORKS Networks are made up of a basic personal computer, network interface card (NIC), hub, switch, or router. NIC card communicates to the rest of the computer. The NIC card connects the modem to the computer electrically. The NIC has a logic board that relays information to the computer. The NIC card figures out the speed at which information is sent from the computer to the internet. The network can potentially use a hub. Although a hub is rarely used, it divides the connection of a signal between multiple computers. A switch divides multiple computers into separate groupings based on logical or security requirements. The switch usually divide or regroup the computers in the same subnet or local area network (LAN). The router is normally used to transfer data between physical networks. The router transfer the signal to the appropriate place. All this information is transferred around to these different places using a specific language called protocols. Protocols are a format that transmits data between devices. Standards are agreed upon beforehand. For instance, internet protocol version four (IPV4) allows computers to communicate over the internet. (McQuerry, 2008). WAN, LANs, MANs LAN, wide area network (WAN), and metropolitan area network (MAN) are typical types of networks used. LAN is a network that connects computers in small building, offices, and single family homes with network media. LAN can transmit...
Words: 1141 - Pages: 5