14.3.5 Packet Tracer – Basic Router Configuration Review Answers
Packet Tracer – Basic Router Configuration Review (Answers Version)
Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Addressing Table
Device |
Interface |
IP Address / Prefix |
Default Gateway |
R2 |
G0/0/0 |
10.0.4.1 /24 |
N/A |
R2 |
G0/0/0 |
2001:db8:acad:4::1 /64 |
N/A |
R2 |
G0/0/0 |
fe80::2:a |
N/A |
R2 |
G0/0/1 |
10.0.5.1 /24 |
N/A |
R2 |
G0/0/1 |
2001:db8:acad:5::1 /64 |
N/A |
R2 |
G0/0/1 |
fe80::2:b |
N/A |
R2 |
S0/1/0 |
10.0.3.2 /24 |
N/A |
R2 |
S0/1/0 |
2001:db8:acad:3::2 /64 |
N/A |
R2 |
S0/1/0 |
fe80::1:c |
N/A |
R2 |
S0/1/1 |
209.165.200.225 /30 |
N/A |
R2 |
S0/1/1 |
2001:db8:feed:224::1/64 |
N/A |
R2 |
S0/1/1 |
fe80::1:d |
N/A |
PC1 |
NIC |
10.0.1.10 /24 |
10.0.1.1 |
PC1 |
NIC |
2001:db8:acad:1::10 /64 |
fe80::1:a |
PC2 |
NIC |
10.0.2.10 /24 |
10.0.2.1 |
PC2 |
NIC |
2001:db8:acad:2::10 /64 |
fe80::1:b |
PC3 |
NIC |
10.0.4.10 /24 |
10.0.4.1 |
PC-3 |
NIC |
2001:db8:acad:4::10 /64 |
fe80::2:a |
PC4 |
NIC |
10.0.5.10 /24 |
10.0.5.1 |
PC-4 |
NIC |
2001:db8:acad:5::10 /64 |
fe80::2:b |
Objectives
Part 1: Configure Devices and Verify Connectivity
- Assign static IPv4 and IPv6 addresses to the PC interfaces.
- Configure basic router settings.
- Configure the router for SSH.
- Verify network connectivity.
Part 2: Display Router Information
- Retrieve hardware and software information from the router.
- Interpret the startup configuration.
- Interpret the routing table.
- Verify the status of the interfaces.
Background / Scenario
This activity requires you to configure the R2 router using the settings from the Addressing Table and the specifications listed. The R1 router and the devices connected to it have been configured. This is a comprehensive review of previously covered IOS router commands. In Part 1, you will complete basic configurations and interface settings on the router. In Part 2, you will use SSH to connect to the router remotely and utilize the IOS commands to retrieve information from the device to answer questions about the router. For review purposes, this lab provides the commands necessary for specific router configurations.
Instructions
Part 1: Configure Devices and Verify Connectivity
Step 1: Configure the PC interfaces.
- Configure the IPv4 and IPv6 addresses on PC3 as listed in the Addressing Table.
- Configure the IPv4 and IPv6 addresses on PC4 as listed in the Addressing Table.
Step 2: Configure the router.
Open configuration window
- On the R2 router, open a terminal. Move to privileged EXEC mode.
router> enable
- Enter configuration mode.
router# configure terminal
- Assign a device name of R2 to the router.
router(config)# hostname R2
- Configure c1sco1234 as the encrypted privileged EXEC mode password.
R2(config)#enable secret c1sco1234
- Set the domain name of the router to ccna-lab.com.
R2(config)# ip domain–name ccna-lab.com
- Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as though they were host names.
R2(config)# no ip domain lookup
- Encrypt the plaintext passwords.
R2(config)# service password-encryption
- Configure the username SSHadmin with an encrypted password of 55Hadm!n.
R2(config)# username SSHadmin secret 55Hadm!n
- Generate a set of crypto keys with a 1024 bit modulus.
R2(config)# crypto key generate rsa
- Assign cisco as the console password, configure sessions to disconnect after six minutes of inactivity, and enable login. To prevent console messages from interrupting commands, use the logging synchronous command.
R2(config)# line console 0
R2(config-line)# password cisco
R2(config-line)# logging synchronous
R2(config-line)# exec-timeout 6 0
R2(config-line)# login
- Assign cisco as the vty password, configure the vty lines to accept SSH connections only, configure sessions to disconnect after six minutes of inactivity, and enable login using the local database.
R2(config)# line vty 0 4
R2(config-line)# password cisco
R2(config-line)# exec-timeout 6 0
R2(config-line)# transport input ssh
R2(config-line)# login local
- Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
R2(config)# banner motd $ WARNING Authorized Users Only! $
- Enable IPv6 Routing.
R2(config)# ipv6 unicast-routing
- Configure all four interfaces on the router with the IPv4 and IPv6 addressing information from the addressing table above. Configure all four interfaces with descriptions. Activate all four interfaces.
R2(config)# interface g0/0/0
R2(config-if)# description Connection to S3
R2(config-if)# ip address 10.0.4.1 255.255.255.0
R2(config-if)# ipv6 address fe80::2:a link-local
R2(config-if)# ipv6 address 2001:db8:acad:4::1/64
R2(config-if)# no shutdown
R2(config)# interface g0/0/1
R2(config-if)# description Connection to S4
R2(config-if)# ip address 10.0.5.1 255.255.255.0
R2(config-if)# ipv6 address fe80::2:b link-local
R2(config-if)# ipv6 address 2001:db8:acad:5::1/64
R2(config-if)# no shutdown
R2(config)# interface s0/1/0
R2(config-if)# description Link to R1
R2(config-if)# ip address 10.0.3.2 255.255.255.0
R2(config-if)# ipv6 address fe80::1:c link-local
R2(config-if)# ipv6 address 2001:db8:acad:3::2/64
R2(config-if)# no shutdown
R2(config-if)# interface s0/1/1
R2(config-if)# description Link to Internet
R2(config-if)# ip address 209.165.200.225 255.255.255.252
R2(config-if)# ipv6 address fe80::1:d link-local
R2(config-if)# ipv6 address 2001:db8:feed:224::1/64
R2(config-if)# no shutdown
- Save the running configuration to the startup configuration file.
R2# copy running-config startup-config
Close configuration window
Step 3: Verify network connectivity.
- Using the command line at PC3, ping the IPv4 and IPv6 addresses for PC4.
Question:
Were the pings successful?
Type your answers here.
Yes
- From the CLI on R2 ping the S0/1/1 address of R1 for both IPv4 and IPv6. The addresses assigned to the S0/1/1 interface on R1 are:
IPv4 address = 10.0.3.1
IPv6 address = 2001:db8:acad:3::1
Question:
Were the pings successful?
Type your answers here.
Yes
From the command line of PC3 ping the ISP address 209.165.200.226.
Question:
Were the pings successful?
Type your answers here.
Yes, the PC is using the default gateway router to forward the traffic.
From PC3 attempt to ping an address on the ISP for testing, 64.100.1.1.
Question:
Were the pings successful?
Type your answers here.
No, routing has not been configured on the router so only local connected networks are accessible. No default route is set on router R2.
- From the command line of PC3 open an SSH session to the R2 G0/0/0 IPv4 address and log in as SSHadmin with the password 55Hadm!n.
C:\> ssh -l SSHadmin 10.0.4.1
Password:
Question:
Was remote access successful?
Type your answers here.
Yes
Part 2: Display Router Information
In Part 2, you will use show commands from an SSH session to retrieve information from the router.
Step 1: Establish an SSH session to R2.
From the command line of PC3 open an SSH session to the R2 G0/0/0 IPv6 address and log in as SSHadmin with the password 55Hadm!n.
Step 2: Retrieve important hardware and software information.
Open configuration window
- Use the show version command to answer questions about the router.
R2# show version
Cisco IOS XE Software, Version 03.16.05.S – Extended Support Release
Cisco IOS Software, ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version Version 15.5 (3)S5, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Thu 19-Jan-17 11:24 by mcpre
Cisco IOS-XE software, Copyright (c) 2005-2017 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License (“GPL”) Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or “License Notice” file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
ROM: IOS-XE ROMMON
Router uptime is 8 hours, 27 minutes, 40 seconds
Uptime for this control processor is 8 hours, 27 minutes, 40 seconds
System returned to ROM by power-on
System image file is “bootflash:/isr4300-universalk9.03.16.05.S.155-3.S5-ext.SPA.bin”
Last reload reason: PowerOn
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
Suite License Information for Module:’esg‘
——————————————————————————–
Suite Suite Current Type Suite Next reboot
——————————————————————————–
FoundationSuiteK9 None None None
securityk9
appxk9
AdvUCSuiteK9 None None None
uck9
cme – srst
cube
Technology Package License Information:
————————————————————————
Technology Technology-package Technology-package
Current Type Next reboot
————————————————————————
appxk9 None None None
uck9 None None None
securityk9 securityk9 Permanent securityk9
ipbase ipbasek9 Permanent ipbasek9
security securityk9 Permanent securityk9
ipbase ipbasek9 Permanent ipbasek9
cisco ISR4321/K9 (1RU) processor with 1687137K/6147K bytes of memory.
Processor board ID FLM2041W2HD
2 Gigabit Ethernet interfaces
2 Serial interfaces
32768K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
3223551K bytes of flash memory at bootflash:.
Configuration register is 0x2102
Questions:
What is the name of the IOS image that the router is running?
Type your answers here.
Image version isr4300-universalk9.03.16.05.S.155-3.S5-ext.SPA.bin.
How much non-volatile random-access memory (NVRAM) does the router have?
Type your answers here.
32768K bytes of NVRAM.
How much Flash memory does the router have?
Type your answers here.
3223551K bytes of flash memory.
- The show commands often provide multiple screens of outputs. Filtering the output allows a user to display certain sections of the output. To enable the filtering command, enter a pipe (|) character after a show command, followed by a filtering parameter and a filtering expression. You can match the output to the filtering statement by using the include keyword to display all lines from the output that contain the filtering expression. Filter the show version command, using show version | include register to answer the following question.
R2# show version | include register
Configuration register is 0x2102
Question:
What is the boot process for the router on the next reload?
Type your answers here.
Answers may vary. In most cases (0x2102), the router will undergo a normal boot, load the IOS from the Flash memory, and load the startup configuration from the NVRAM if present. If the config register is 0x2142, the router will bypass the startup config and begin at the user-mode command prompt. If the initial boot fails, the router goes into ROMMON mode.
Step 3: Display the running configuration.
Use the show running-config command on the router to answer the following questions filtering for lines containing the word “password”.
R2# show running-config | include password
service password-encryption
password 7 0822455D0A16
password 7 0822455D0A16
Question:
How are passwords presented in the output?
Type your answers here.
Passwords are encrypted due to the service password-encryption command.
Use the show running-config | begin vty command.
R2# show running-config | begin vty
line vty 0 4
exec-timeout 6 0
password 7 0822455D0A16
login local
transport input ssh
Question:
What is the result of using this command?
Type your answers here.
A user receives the running configuration output beginning with the line that includes the first instance of the filtering expression.
Note: A more specific command would be show running-config | section vty; however, the current version of Packet Tracer does not support the section filtering command.
Step 4: Display the routing table on the router.
Use the show ip route command on the router to answer the following questions.
R2# show ip route
Codes: L – local, C – connected, S – static, R – RIP, M – mobile, B – BGP
D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area
N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2
E1 – OSPF external type 1, E2 – OSPF external type 2, E – EGP
i – IS-IS, L1 – IS-IS level-1, L2 – IS-IS level-2, ia – IS-IS inter area
* – candidate default, U – per-user static route, o – ODR
P – periodic downloaded static route
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 6 subnets, 2 masks
C 10.0.3.0/24 is directly connected, Serial0/1/0
L 10.0.3.2/32 is directly connected, Serial0/1/0
C 10.0.4.0/24 is directly connected, GigabitEthernet0/0/0
L 10.0.4.1/32 is directly connected, GigabitEthernet0/0/0
C 10.0.5.0/24 is directly connected, GigabitEthernet0/0/1
L 10.0.5.1/32 is directly connected, GigabitEthernet0/0/1
209.165.200.0/24 is variably subnetted, 2 subnets, 2 masks
C 209.165.200.224/30 is directly connected, Serial0/1/1
L 209.165.200.225/32 is directly connected, Serial0/1/1Questions:
Question:
What code is used in the routing table to indicate a directly connected network?
Type your answers here.
The C designates a directly connected subnet. An L designates a local interface. Both answers are correct.
How many route entries are coded with a C code in the routing table?
Type your answers here.
4
Step 5: Display a summary list of the interfaces on the router.
- Use the show ip interface brief command on the router to answer the following question.
R2# show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0/0 10.0.4.1 YES manual up up
GigabitEthernet0/0/1 10.0.5.1 YES manual up up
Serial0/1/0 10.0.3.2 YES manual up up
Serial0/1/1 209.165.200.225 YES manual up up
Vlan1 unassigned YES unset administratively down down
Questions:
What command changed the status of the Gigabit Ethernet ports from administratively down to up?
Type your answers here.
no shutdown
What filtering command would you use to display only the interfaces with addresses assigned?
Type your answers here.
show ip interface brief | exclude unassigned
- Use the show ipv6 int brief command to verify IPv6 settings on R2.
R2# show ipv6 interface brief
GigabitEthernet0/0/0 [up/up]
FE80::2:A
2001:DB8:ACAD:4::1
GigabitEthernet0/0/1 [up/up]
FE80::2:B
2001:DB8:ACAD:5::1
Serial0/1/0 [up/up]
FE80::1:C
2001:DB8:ACAD:3::2
Serial0/1/1 [up/up]
FE80::1:D
2001:DB8:FEED:224::1
Vlan1 [administratively down/down]
Unassigned
Question:
What is the meaning of the [up/up] part of the output?
Type your answers here.
The [up/up] status reflects the Layer 1 and Layer 2 status of the interface and does not rely on Layer 3 for status.
Close configuration window
End of document
Answer Scripts
Router R2
enable
configure terminal
service password-encryption
hostname R2
enable secret 5 $1$mERr$8fT8JFfxitttQEg7btAoQ.
ipv6 unicast-routing
username SSHadmin secret 5 $1$mERr$MCjOzJZmK//VUxTKHsS1K1
no ip domain-lookup
ip domain-name ccna-lab.com
interface GigabitEthernet0/0/0
description Link to LAN 3
ip address 10.0.4.1 255.255.255.0
ipv6 address FE80::2:A link-local
ipv6 address 2001:DB8:ACAD:4::1/64
no shutdown
interface GigabitEthernet0/0/1
description Link to LAN 4
ip address 10.0.5.1 255.255.255.0
ipv6 address FE80::2:B link-local
ipv6 address 2001:DB8:ACAD:5::1/64
no shutdown
interface Serial0/1/0
description Link to R1
ip address 10.0.3.2 255.255.255.0
ipv6 address FE80::1:C link-local
ipv6 address 2001:DB8:ACAD:3::2/64
no shutdown
interface Serial0/1/1
description Link to Internet
ip address 209.165.200.225 255.255.255.252
ipv6 address FE80::1:D link-local
ipv6 address 2001:DB8:FEED:224::1/64
no shutdown
banner motd ^C
***********************************************
WARNING: Unauthorized access is prohibited!
***********************************************
line con 0
exec-timeout 6 0
password 7 0822455D0A16
logging synchronous
login
line vty 0 4
exec-timeout 6 0
password 7 0822455D0A16
login local
transport input ssh
end