2.9.2 Lab – Basic Switch and End Device Configuration Answers Full 100% 2023 2024

This is Cisco 2.9.2 Lab – Basic Switch and End Device Configuration Answers Full 100% 2023 2024 for Cisco CCNA 1 v7 ITN v7.02.

Lab – Basic Switch and End Device Configuration (Answers Version)

Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only.

Topology

In the topology, PC-A is connected to S1 via f0/6. PC-B is connected to S2 via F0/6. S1 and S2 are connected to each via F0/1.

Addressing Table

Device

Interface

IP Address

Subnet Mask

S1

VLAN 1

192.168.1.1

255.255.255.0

S2

VLAN 1

192.168.1.2

255.255.255.0

PC-A

NIC

192.168.1.10

255.255.255.0

PC-B

NIC

192.168.1.11

255.255.255.0

Objectives

  • Set Up the Network Topology
  • Configure PC Hosts
  • Configure and Verify Basic Switch Settings

Background / Scenario

In this lab, you will build a simple network with two hosts and two switches. You will also configure basic settings including hostname, local passwords, and login banner. Use show commands to display the running configuration, IOS version, and interface status. Use the copy command to save device configurations.

You will apply IP addressing for this lab to the PCs and switches to enable communication between the devices. Use the ping utility to verify connectivity.

Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs.

Note: Make sure that the switches have been erased and have no startup configurations. Refer to Appendix A for the procedure to initialize and reload a switch.

Required Resources

  • 2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
  • 2 PCs (Windows with terminal emulation program, such as Tera Term)
  • Console cables to configure the Cisco IOS devices via the console ports
  • Ethernet cables as shown in the topology

Answers Note: The Ethernet ports on the 2960 switches are autosensing and will accept either a straight-through or a cross-over cable for all connections. If the switches used in the topology are other than the 2960 model, then it is likely that a cross-over cable will be needed to connect the two switches.

Instructions

Step 1:Set Up the Network Topology

In this step, you will cable the devices together according to the network topology.

  1. Power on the devices.

Power on all devices in the topology. The switches do not have a power switch; they will power on as soon as you plug in the power cord.

  1. Connect the two switches.

Connect one end of an Ethernet cable to F0/1 on S1 and the other end of the cable to F0/1 on S2. You should see the lights for F0/1 on both switches turn amber and then green. This indicates that the switches have been connected correctly.

  1. Connect the PCs to their respective switches.

Connect one end of the second Ethernet cable to the NIC port on PC-A. Connect the other end of the cable to F0/6 on S1. After connecting the PC to the switch, you should see the light for F0/6 turn amber and then green, indicating that PC-A has been connected correctly.

Connect one end of the last Ethernet cable to the NIC port on PC-B. Connect the other end of the cable to F0/18 on S2. After connecting the PC to the switch, you should see the light for F0/18 turn amber and then green, indicating that the PC-B has been connected correctly.

  1. Visually inspect network connections.

After cabling the network devices, take a moment to carefully verify the connections to minimize the time required to troubleshoot network connectivity issues later.

Step 2:Configure PC Hosts

  1. Configure static IP address information on the PCs according to the Addressing Table.

In PC-A, navigate to the Control Panel. In the Category view, under the Network and Internet heading, click View Network status and tasks > click Change adapter settings.

Note: There are other ways in Windows to navigate to the adapter settings.

Right-click the desired network adaptor and select Properties.

Select the Internet Protocol Version 4 (TCP/IPv4) and click Properties.

Select Use the following IP address. Enter the IP address for PC-A (192.168.1.10) and subnet mask (255.255.255.0) as listed in the IP addressing table. You can leave default gateway blank at this time because there is no router attached to the network. Click OK to continue. Click Close to exit the Properties window.

Repeat the previous steps to assign the IP address information for PC-B.

  1. Verify PC settings and connectivity.

From PC-A, open a Command Prompt to verify the PC settings and connectivity using the ipconfig /all command at the prompt.

C:\Users\Student> ipconfig /all

Windows IP Configuration

Host Name . . . . . . . . . . . . : PC-A

Primary Dns Suffix. . . . . . . :

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Ethernet0:

Connection-specific DNS Suffix. :

Description . . . . . . . . . . . : Intel(R) 82574L Gigabit Network Connection

Physical Address. . . . . . . . . : 00-05-56-B3-86-BA

DHCP Enabled. . . . . . . . . . . : No

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe80::a4b0:503d:84f4:f467%6(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.1.10(Preferred)

Subnet Mask . . . . . . . . . . . : 255.255.255.255

Default Gateway . . . . . . . . . :

DHCPv6 IAID . . . . . . . . . . . : 50334761

DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-24-EA-06-D5-00-50-56-B3-86-BA

DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1

fec0:0:0:ffff::2%1

fec0:0:0:ffff::3%1

NetBIOS over Tcpip. . . . . . . . : Enabled

To test the connectivity to PC-B, enter ping 192.168.1.11 at the prompt. The ping should be successful. If not, troubleshoot as necessary.

C:\Users\Student> ping 192.168.1.11

Pinging 192.168.1.11 with 32 bytes of data:

Reply from 192.168.11: bytes=32 time<1ms TTL=128

Reply from 192.168.11: bytes=32 time<1ms TTL=128

Reply from 192.168.11: bytes=32 time<1ms TTL=128

Reply from 192.168.11: bytes=32 time<1ms TTL=128

Ping statistics for 192.168.1.11:

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

Answers Note: If your student did not get a reply from PC-B, it may be necessary to disable the PC firewall to ping between PCs. (Navigate to Control Panel > click System and Security > click Windows Firewall > click Turn Windows Firewall on or off > click Turn off Windows Firewall (not recommended).

Answers Note: If the first ICMP packet times out, this could be a result of the PC resolving the destination address. This should not occur if you repeat the ping as the address is now cached.

Step 3:Configure and Verify Basic Switch Settings

  1. Console into the switch. Enter the global configuration mode.

Open Configuration Window

Establish a console connection to the switch from PC-A using Tera Term.

You can access all switch commands in privileged EXEC mode. The privileged EXEC command set includes those commands contained in user EXEC mode, as well as the configure command through which access to the remaining command modes are gained. Enter privileged EXEC mode by entering the enable command.

Switch> enable

Switch#

The prompt changed from Switch> to Switch# which indicates privileged EXEC mode.

Use the configuration terminal command to enter configuration mode.

Switch# configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Switch(config)#

The prompt changed to reflect global configuration mode.

  1. Give the switch a name according to the Addressing Table.

Use the hostname command to change the switch name to S1.

Switch(config)# hostname S1

  1. Prevent unwanted DNS lookups.

To prevent the switch from attempting to translate incorrectly entered commands as though they were hostnames, disable the Domain Name System (DNS) lookup.

S1(config)# no ip domain-lookup

  1. Enter local passwords. Use class as the privileged EXEC password and cisco as the password for console access.

To prevent unauthorized access to the switch, configure passwords.

S1(config)# enable secret class

S1(config)# line con 0

S1(config-line)# password cisco

S1(config-line)# login

S1(config-line)# exit

  1. Configure and enable the SVI according to the Addressing Table.

S1(config)# interface vlan 1

S1(config-if)# ip address 192.168.1.1 255.255.255.0

S1(config-if)# no shut

  1. Enter a login MOTD banner to warn about unauthorized access.

A login banner, known as the message of the day (MOTD) banner, should be configured to warn anyone accessing the switch that unauthorized access will not be tolerated.

The banner motd command requires the use of delimiters to identify the content of the banner message. The delimiting character can be any character as long as it does not occur in the message. For this reason, symbols, such as the #, are often used.

S1(config)# banner motd #

Enter TEXT message. End with the character ‘#’.

Unauthorized access is strictly prohibited and prosecuted to the full extent of the law. #

S1(config)# exit

  1. Save the configuration.

Use the copy command to save the running configuration to the startup file on non-volatile random access memory (NVRAM).

S1# copy running-config startup-config

Destination filename [startup-config]? [Enter]

Building configuration…

[OK]

S1#

  1. Display the current configuration.

The show running-config command displays the entire running configuration, one page at a time. Use the spacebar to advance paging. The commands configured in Steps a – h are highlighted below.

S1# show running-config

Building configuration…

Current configuration : 1409 bytes

!

! Last configuration change at 03:49:17 UTC Mon Mar 1 1993

!

version 15.0

no service pad

service timestamps debug datetime msec

service timestamps log datetime msec

no service password-encryption

!

hostname S1

!

boot-start-marker

boot-end-marker

!

enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2

!

no aaa new-model

system mtu routing 1500

!

no ip domain-lookup

<output omitted>

interface Vlan 1

ip address 192.168.1.1 255.255.255.0

ip http server

ip http secure-server

!

banner motd ^C

Unauthorized access is strictly prohibited and prosecuted to the full extent of the law. ^C

!

line con 0

password cisco

login

line vty 0 4

login

line vty 5 15

login

!

end

  1. Display the IOS version and other useful switch information.

Use the show version command to display the IOS version that the switch is running, along with other useful information. Again, you will need to use the spacebar to advance through the displayed information.

S1# show version

Cisco IOS Software, C2960 Software (C2960-LANBASEK9-M), Version 15.0(2)SE, RELEASE SOFTWARE (fc1)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2012 by Cisco Systems, Inc.

Compiled Sat 28-Jul-12 00:29 by prod_rel_team

ROM: Bootstrap program is C2960 boot loader

BOOTLDR: C2960 Boot Loader (C2960-HBOOT-M) Version 12.2(53r)SEY3, RELEASE SOFTWARE (fc1)

S1 uptime is 1 hour, 38 minutes

System returned to ROM by power-on

System image file is “flash:/c2960-lanbasek9-mz.150-2.SE.bin

This product contains cryptographic features and is subject to United

States and local country laws governing import, export, transfer and

use. Delivery of Cisco cryptographic products does not imply

third-party authority to import, export, distribute or use encryption.

Importers, exporters, distributors and users are responsible for

compliance with U.S. and local country laws. By using this product you

agree to comply with applicable laws and regulations. If you are unable

to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to

[email protected].

cisco WS-C2960-24TT-L (PowerPC405) processor (revision R0) with 65536K bytes of memory.

Processor board ID FCQ1628Y5LE

Last reset from power-on

1 Virtual Ethernet interface

24 FastEthernet interfaces

2 Gigabit Ethernet interfaces

The password-recovery mechanism is enabled.

64K bytes of flash-simulated non-volatile configuration memory.

Base ethernet MAC Address: 0C:D9:96:E2:3D:00

Motherboard assembly number: 73-12600-06

Power supply part number: 341-0097-03

Motherboard serial number: FCQ16270N5G

Power supply serial number: DCA1616884D

Model revision number: R0

Motherboard revision number: A0

Model number: WS-C2960-24TT-L

System serial number: FCQ1628Y5LE

Top Assembly Part Number: 800-32797-02

Top Assembly Revision Number: A0

Version ID: V11

CLEI Code Number: COM3L00BRF

Hardware Board Revision Number: 0x0A

Switch Ports ModelSW VersionSW Image

—— —– —–———-———-

*1 26WS-C2960-24TT-L15.0(2)SEC2960-LANBASEK9-M

Configuration register is 0xF

  1. Display the status of the connected interfaces on the switch.

To check the status of the connected interfaces, use the show ip interface brief command. Press the spacebar to advance to the end of the list.

S1# show ip interface brief

InterfaceIP-AddressOK? Method StatusProtocol

Vlan1192.168.1.1YES unsetupup

FastEthernet0/1unassignedYES unsetupup

FastEthernet0/2unassignedYES unsetdowndown

FastEthernet0/3unassignedYES unsetdowndown

FastEthernet0/4unassignedYES unsetdowndown

FastEthernet0/5unassignedYES unsetdowndown

FastEthernet0/6unassignedYES unsetupup

FastEthernet0/7unassignedYES unsetdowndown

FastEthernet0/8unassignedYES unsetdowndown

FastEthernet0/9unassignedYES unsetdowndown

FastEthernet0/10unassignedYES unsetdowndown

FastEthernet0/11unassignedYES unsetdowndown

FastEthernet0/12unassignedYES unsetdowndown

FastEthernet0/13unassignedYES unsetdowndown

FastEthernet0/14unassignedYES unsetdowndown

FastEthernet0/15unassignedYES unsetdowndown

FastEthernet0/16unassignedYES unsetdowndown

FastEthernet0/17unassignedYES unsetdowndown

FastEthernet0/18unassignedYES unsetdowndown

FastEthernet0/19unassignedYES unsetdowndown

FastEthernet0/20unassignedYES unsetdowndown

FastEthernet0/21unassignedYES unsetdowndown

FastEthernet0/22unassignedYES unsetdowndown

FastEthernet0/23unassignedYES unsetdowndown

FastEthernet0/24unassignedYES unsetdowndown

GigabitEthernet0/1unassignedYES unsetdowndown

GigabitEthernet0/2unassignedYES unsetdowndown

Close Configuration Window.

  1. Configure switch S2.

Repeat the previous steps for Switch S2. Make sure the hostname is configured as S2.

  1. Record the interface status for the following interfaces.

Interface

S1 Status

S1 Protocol

S2 Status

S2 Protocol

F0/1

Up

Up

Up

Up

F0/6

Up

Up

Down

Down

F0/18

Down

Down

Up

Up

VLAN 1

Up

Up

Up

Up

  1. From a PC, ping S1 and S2. The pings should be successful.
  2. From a switch, ping PC-A and PC-B. The pings should be successful.

Reflection Question

Why some FastEthernet ports on the switches are up and others are down?

Type your answers here.

The FastEthernet ports are up when cables are connected to the ports unless they were manually shutdown by the administrators. Otherwise, the ports would be down.

What could prevent a ping from being sent between the PCs?

Wrong IP address, media disconnected, switch powered off or ports administratively down, firewall.

End of Document

Device Configs

Switch S1 (complete)

S1#sh run

Building configuration…

Current configuration : 1514 bytes

version 15.0

no service pad

service timestamps debug datetime msec

service timestamps log datetime msec

no service password-encryption

!

hostname S1

boot-start-marker

boot-end-marker

!

enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2

!

no aaa new-model

system mtu routing 1500

!

no ip domain-lookup

!

spanning-tree mode pvst

spanning-tree extend system-id

!

vlan internal allocation policy ascending

!

interface FastEthernet0/1

!

interface FastEthernet0/2

!

interface FastEthernet0/3

!

interface FastEthernet0/4

!

interface FastEthernet0/5

!

interface FastEthernet0/6

!

interface FastEthernet0/7

!

interface FastEthernet0/8

!

interface FastEthernet0/9

!

interface FastEthernet0/10

!

interface FastEthernet0/11

!

interface FastEthernet0/12

!

interface FastEthernet0/13

!

interface FastEthernet0/14

!

interface FastEthernet0/15

!

interface FastEthernet0/16

!

interface FastEthernet0/17

!

interface FastEthernet0/18

!

interface FastEthernet0/19

!

interface FastEthernet0/20

!

interface FastEthernet0/21

!

interface FastEthernet0/22

!

interface FastEthernet0/23

!

interface FastEthernet0/24

!

interface GigabitEthernet0/1

!

interface GigabitEthernet0/2

!

interface Vlan1

ip address 192.168.1.1 255.255.255.0

!

ip http server

ip http secure-server

!

banner motd ^C

Unauthorized access is strictly prohibited and prosecuted to the full extent of the law. ^C

!

line con 0

password cisco

login

line vty 0 4

login

line vty 5 15

login

end

Switch S2 (complete)

S2# sh run

Building configuration…

Current configuration : 1514 bytes

!

version 15.0

no service pad

service timestamps debug datetime msec

service timestamps log datetime msec

no service password-encryption

!

hostname S2

!

boot-start-marker

boot-end-marker

!

enable secret 4 06YFDUHH61wAE/kLkDq9BGho1QM5EnRtoyr8cHAUg.2

!

no aaa new-model

system mtu routing 1500

!

no ip domain-lookup

!

spanning-tree mode pvst

spanning-tree extend system-id

!

vlan internal allocation policy ascending

!

interface FastEthernet0/1

!

interface FastEthernet0/2

!

interface FastEthernet0/3

!

interface FastEthernet0/4

!

interface FastEthernet0/5

!

interface FastEthernet0/6

!

interface FastEthernet0/7

!

interface FastEthernet0/8

!

interface FastEthernet0/9

!

interface FastEthernet0/10

!

interface FastEthernet0/11

!

interface FastEthernet0/12

!

interface FastEthernet0/13

!

interface FastEthernet0/14

!

interface FastEthernet0/15

!

interface FastEthernet0/16

!

interface FastEthernet0/17

!

interface FastEthernet0/18

!

interface FastEthernet0/19

!

interface FastEthernet0/20

!

interface FastEthernet0/21

!

interface FastEthernet0/22

!

interface FastEthernet0/23

!

interface FastEthernet0/24

!

interface GigabitEthernet0/1

!

interface GigabitEthernet0/2

!

interface Vlan1

ip address 192.168.1.2 255.255.255.0

!

ip http server

ip http secure-server

!

banner motd ^C

Unauthorized access is strictly prohibited and prosecuted to the full extent of the law. ^C

line con 0

password cisco

login

line vty 0 4

login

line vty 5 15

login

end

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments