14.3.5 Packet Tracer - Basic Router Configuration Review

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hi friends welcome to world in this video we are going to discuss ccna version 7 packet tracer activity basic router configuration review before coming to this activity friends if you like to get any ccna project support or ccna version 7 online classes you can contact our team using our website link you will get from the description below and also if you like to get this type of technical videos in future consider subscribing and also don't forget to enable that bell icon near to the subscribe button so that you will get notification message whenever we upload a new video now coming back to this packet tracer activity here we can see our addressing table we have ipv4 as well as ipv6 addresses just will go through the objectives in part one configure a devices and verify connectivity assign static ipv4 and ipv6 addresses to the pc interfaces then configure basic router settings then configure the router for ssh then verify network connectivity in part 2 display router information retrieve hardware and software information from the router then interpret the startup configuration interpret the routing table and finally verify the status of the interfaces coming to the background this activity requires you to configure the r2 router using the settings from the addressing table and the specifications are listed the r1 router and the devices connected to it have been configured this is a comprehensive review of a previously covered ios router commands okay that's fine in part one we will complete the basic configurations and interface settings on the router then in part two we will use ssh to connect to the router remotely and utilize the ios commands to retrieve information from the device to answer questions about the router for review purposes this lab provides the commands necessary for specific router configurations instructions part one configure a devices and verify connectivity step one configure the pc interfaces configure the ipv4 and ipv6 addresses on pc3 as listed in the addressing table coming to our topology here we can see pc1 pc2 pc3 and pc4 so we will go to pc3 and we will assume ipv4 and ipv6 addresses as per the addressing table so here we will go to our addressing table and here we can see pc3 and it's ipv4 and ipv6 addresses we will go to desktop and click on ip configuration and here we will update the details here is the ip address then we can see submit to mask here they given the prefixes 24 that means we have to edit this default to something to mask okay then it's a default gateway also we will set its ipv6 configuration here we can see it's ipv6 address then it's a prefix 64. also we have to set it's a default gateway ipv6 gateway in the same way configure the ipv4 and ipv6 addresses on pc4 as listed in the addressing table so here we can see pc4 then we will go to our addressing table pc4 ipv4 address coming to desktop iep configuration we have to change its uh to mask slash 24 also we will set its default gateway now we will set its ipv6 address prefix slash 64. now it's ipv6 gateway now we will go to step 2 configure the router on the r2 router open a terminal move it to privileged exit mode then enter configuration mode then assign a device name of r2 to the router coming to the topology here we can see our router r2 we'll click on this r2 then go to cli here we will give no enable configure terminal and we can set the hostname as specified r2 and here we can see this is a default uh router name it is router changed it to r2 next is configure c1 sco1234 has encrypted privileged exit mode password that means enable secret just i will copy this password then coming to r2 so we can give the command enable secret then that password next is set the domain name of the router to ccna dash lab.com and also disable dns lookup to prevent the router from attempting to translate incorrectly entered commands as uh though they were host names okay so first of all we will set this a domain name coming to r2 here we have the command ip domain name and here is the domain name also we will disable domain lookup now ip domain lookup then encrypt the plain text passwords yes we have to use the service password dash encryption command in global configuration mode so here we'll give that service password dash encryption then configure the username ssh admin with an encrypted password of 55h just i will copy this password okay so we will create this username with this encrypted password in this router r2 username ssh admin and we will give a secret it's here we already copied let me verify it yes then press enter then generate a set of crypto keys with a one zero two four bit modulus so coming to r2 here we will give that command crypto key generate generate rsa correct and here we can see how many bits in the modulus so as per the instruction it's one zero two four you can press enter again so we can see this ssh enabled 1.99 has been enabled then as in cisco as the console password configure sessions to disconnect after six minutes of inactivity and enable login to prevent console messages from interrupting commands so use the login synchronous command we will do that coming to r2 here we will go to line console 0 then we will set the password as specified cisco then we have to give the login command also we have to set exec timeout so i'll put a question mark here and we can see exit timeout you will set in minutes so they specified six timeout in minutes it's six we will enable logging synchronous next is async cisco as the vty password configure the vtv lines to accept ssh connections only configure sessions to disconnect after six minutes of inactivity and enable login using the local database that is the user name and password we created coming to r2 exit then we will go to line vty 0 to 15 and here we will give we will set the password a cisco then we will give a login local using a local database we will give this also we have to set exec timeout six minutes and also the specified we have to use only ssh connections you have to transport input ssh next is create a banner that wants anyone accessing the device that anotherized access is prohibited okay we will do that banner mr td message of the day so we have to exit from the server tv mode i mean this line mode and we have to go to banner um or td then we have to set the message we will start with the delimiter we will give warning and authorized access is prohibited also we have to end with the same delimiter what we started its double quote then press enter then enable ipv6 routing yes we know that by default router is not for wedding ipv6 so we have to enable it in global configuration mode i will go to r2 ipv6 unicast rooting next is configure all four interfaces on the router with ipv4 and ipv6 addressing information from the addressing table above configure all four interfaces with the descriptions then activate all four interfaces so what are those four interfaces here we can see uh they connected to to a serial and two ethernet so here we can verify a gigabit ethernet zero slot zero slash one then gigabit a third zero slot zero slot zero this is a serial let me verify it serial zero slash one slash zero and your serial zero slash one slash one here we can see our addressing table uh and device r2 its interfaces and its ip address so first of all we will configure this interface g 0 slash 0 with ipv4 then ipv6 addresses so coming to r2 we will go to this interface interface g 0 0 0 then we have to set the description also right we'll set the description coming to this topology we can see this g 0 0 0 is connecting to s 3 so we'll give description as uh lan 2 s3 or i can give connecting to s3 s3 right then we will set the ip address that is ipv4 address just we can copy and paste here then we have to give it to mask prefix the given slash 24 that means 255.255.255.0 also we will set ipv6 address it's here then we have to add this prefix also press enter now we will set ipv6 address link local actress right yeah link a local now we have to activate this interface using no shutdown command now we can see the link between this r2 and as3 is up now we will configure this interface that is a g 0 0 1 we will exit from this interface even we can go without exit anyways interface g 0 0 1 and we will set a description we can say connecting to vs4 correct then we will set the ip address then submit to mask also we will set ipv6 address we have to copy till here including its prefix also we have to set a link local address oh we have to give a space link local now we will activate this interface now shutdown and here we can see the link between this router r2 and s4 is up next we will configure this serial interface so serial 0 slash 1 0 which is connecting to this r1 exit interface serial zero slash one slash zero we will set the iep address then it's submitted to mask also we will set its ipv6 address just copy and paste it also we will set a link local lectures link local now we have to activate this interface also we will set a description connecting to r1 now coming to the fourth interface there is a serial zero slash one slash one which is connecting to this internet exit then go to that interface serial zero slash one slash one we will set the description first connecting to internet we will let's set the iep address then here they given the prefix slash 30 that means to mask is this 2 5 2. now we will set this ipv6 address also we have to set ipv6 link local address then we will activate this interface using this command no shutdown we can see this link between this router r2 and this internet is up then save the running configuration to the startup configuration file okay just to give end and we will give a copy running config we can give in short run startup config we can give in short start press enter destination file name startup config we will save the save in this default file name so just press enter now we will go to step three verify network connectivity using the command line at pc3 ping the ipv4 and ipv6 addresses for pc4 where the ping is successful we will check that we will go to pc3 and we will bring to this pc4 so just will get its ipv4 and ipv6 actress pc for ipv4 address it's here just i will copy it then coming to pc3 we'll go to command prompt ping to pc4 here is that a pc4 ip address we are waiting for the replies request timed out and here we can see we get the replies it's working now we will copy this pc for ipv6 address again coming back to pc3 ping to pc4 using its ipv6 address and we can see we get the replace yes the ping uh succeeded now from the cli on r2 ping the serial zero slash one slash one address of r1 for both ipv4 and ipv6 the addresses ascend to the serial zero slash one slash one interfaces uh interface on r1 are ipv4 actions they're given here ipv6 address also they're given here we will go to this device r2 and we will ping to these addresses just i will copy this ipv4 address coming to r2 from a privileged exit mode we will ping to this address and here we can see success rate is hundred percent also we will ping to its ipv6 address ping to ipv6 address we can see success rate is hundred percent where are the pings successful yes successful from the command line of pc3 ping the isp attract that is 209.1 so just i will copy this address and we will go to pc3 then we will ping to this address and we can see we get the replies it's working were the things successful yes successful from pc3 attempt to ping an address on the isp for testing uh to this address again coming back to pc3 we will ping to that address and it says destination host unreachable where the ping successful no it's failed because this network is a remote network for this router r2 and they may not configure any uh dynamic or static routing next is from the command line of pc3 open an ssh session to the r2 g0 r0 ipv4 address and the login and ssh admin with this password we have to give this command ssh space dash l l is for login then ssh admin then we have to give its a target we can do that we will go to pc3 ssh space dash l space then we have to specify the user ssh admin then we have to give its ips and here it's prompted for the password password is here i will copy and paste it and here we can see be able to access r2 also here we can see that the banner mod td reset warning another is to access is prohibited well so remote access successful yes successful now we will go to party to display our order information in part two we will use the show commands from an ssh session to retrieve information from the router coming to step 1 establish an ssh session to r2 from the command line of pc3 open an ssh session to the r2 g0 0 0 ipv6 address and login as uh ssh admin with this password here we are going to use ipv6 address okay to go to this router r2 we will get the ip address r2 g0 r0 we will get its ipv6 address then coming to pc3 here we will exit from this r2 ssh space dash l space username is ssh admin then we have to give the target ipv6 address and we can see it's prompted for the password let me get the password okay and here we can see we able to access this router r2 coming to step two retrieving important hardware and software information use the show version command to answer questions about the router okay we will use this command show version what is the name of the ios image that the router is running so we'll give this a show version command we'll give enable uh password we set let me check that we set this password as a privilege exit password okay and here we have to give the command show version okay and coming to the top here we can see the details version and here we can see system image file is this is the file name with the extension dot bin next question is how much non-volatile random access memory that is nvram does the router have so coming to our router so coming down here we can see three two seven six eight k bytes it is kilobytes of non-volatile configuration memory then how much flash memory does the router have okay there is so we can see that the flash memory here we can see it's a three double two three double five one k bytes of flash memory the show commands often provide multiple screens of outputs filtering the output allows a user to display certain sections of the output to enable the filtering command enter a pipe character after a show command here we can see that symbol followed by a filtering parameter and a filtering expression we can match the output to the filtering statement by using the include keyword to display all lines from the output that contain the filtering expression filter the show version command using show version then this pipeline include a register to answer the following question what is the boot process for the router on the next reload so we will give this a show command on r2 okay we have to give you the password we given the password as cisco enable we can have to get that password now we are going to give this a show command show version then pipeline include register and here we can see configuration register is 0x2102 now coming to step 3 display the running configuration use the show running config command on the router to answer the following questions filtering for lines containing the word password okay we can do that we have to give a show running config even we can give in short then we have to use this pipeline include password coming to the questions how our passwords are presented in the output so here we can see all the passwords are encrypted uh we given a service password dash encryption so that all the plain text passwords will be encrypted next we will try this so use the show running config pipeline begin vty command show running config and pipeline begin vty and here we can see we get the result from this line vty all the configuration after that what is the result of using this command yeah uh here we have seen we get the result the output from this align vty they given a note here a more specific command would be show running config pipeline section vty however the current version of packet tracer does not support the section filtering command okay just we can try this show running config instead of begin we will give a section and we can see it's working here with this latest packet tracer version now coming to step four display the routing table on the router use the show iep root command on the router to answer the following questions you will give show ip row and here we can see our routing table what code is used in the routing table to indicate a directly connected network it's obviously a c right connected we can see it c c is for connector actually all these are show commands we have to execute in this pc3 using this um ssh session okay even now we can see that here like this so just again i will give you the password so this is only for understanding this ssh okay nothing else so again if i give enable it will prompt for the password yes here we can give that show command we will look at the same output show ip root and here we can see this c c is for connector then how many root entries are coded with a c code in the routing table so we can count it one two three and four it's four next we will go to step five display a summary list of the interfaces on the router use the show iep interface brief command on the router to answer the following question question is this what command changed the status of the gigabit ethernet ports from administratively down to up yeah it's obviously no shutdown command so we will give this a short command here in this pc3 show iep interface brief and here we can see these interfaces are up g0001 serial 0 1 0 serial 0 1 1 and we can see this vlan one it's administratively down and we given no should on command to bring these interfaces up what filtering command would you use to display only the interfaces with addresses assigned so we can use same using a pipeline section command we can do that i will show it so running config the news pipeline we can give a section then interface right we can give interface and we can see each interface and its iphones be configured serial 0 1 0 serial 0 1 1 yes finally use the show ipv6 interface brief command to verify ipv6 settings on r2 what is the meaning of the up part of the output yeah this is actually first up is tyrus and the second is protocol so we will check that show ipv6 interface brief and here we can see that up first one is tires and this is protocol okay that's all in this packet tracer activity that is a basic router configuration review just to be recall all the basic settings here we can see our completion status it's 100 percent now dear friends if you have any doubt any suggestions regarding this packet tracer activity please comment below or you can contact our team using our website and if you like your video give a thumb and share with all your friends stay tuned and we will meet again with the next video thank you
Info
Channel: Tech Acad
Views: 23,584
Rating: undefined out of 5
Keywords: CISCO, CISCO Certification, CCNA, Routing and Switching, Packet Tracer, CISCO Router, CCNAv7, Basic CISCO Router Configuration
Id: ZGGc5QPeUHo
Channel Id: undefined
Length: 37min 6sec (2226 seconds)
Published: Sun Aug 02 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.