0% found this document useful (0 votes)
5 views

labReport3_1611042

The document outlines the lab report for an experiment on initial router configuration, focusing on enabling remote login via TELNET and SSH. It includes detailed instructions on using Cisco Packet Tracer, CLI commands for configuring routers and switches, and testing connectivity through ping and remote access commands. The report documents the configuration steps and results of the experiment, demonstrating successful remote access to the devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

labReport3_1611042

The document outlines the lab report for an experiment on initial router configuration, focusing on enabling remote login via TELNET and SSH. It includes detailed instructions on using Cisco Packet Tracer, CLI commands for configuring routers and switches, and testing connectivity through ping and remote access commands. The report documents the configuration steps and results of the experiment, demonstrating successful remote access to the devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Name: AFSA JABIN

ID: 1721250
Course ID: CSC430L
Section: 2
Subject: CSC430 LAB REPORT 3

Experiment Name: Initial Router


Configuration
Objective:

1. Enable Remote login for the router with TELNET/SSH


2. Remote login to a router from workstation

Tools and Materials:

For our experiment, we will be using the Cisco Packet Tracer


software to simulate the workings.

Instructions:

Connect Router1 and Router2 using cable and access router CLI
from the Workstation terminal emulator software:

CLI commands on the SWITCH:

C2960 Boot Loader (C2960-HBOOT-M) Version 12.2(25r)FX,


RELEASE SOFTWARE (fc4)
Cisco WS-C2960-24TT (RC32300) processor (revision C0) with
21039K bytes of memory.
2960-24TT starting...
Base ethernet MAC Address: 00E0.F765.DA14
Xmodem file system is available.
Initializing Flash...
flashfs[0]: 1 files, 0 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 64016384
flashfs[0]: Bytes used: 4414921
flashfs[0]: Bytes available: 59601463
flashfs[0]: flashfs fsck took 1 seconds.
...done Initializing Flash.

Boot Sector Filesystem (bs:) installed, fsid: 3


Parameter Block Filesystem (pb:) installed, fsid: 4

Loading "flash:/2960-lanbase-mz.122-25.FX.bin"...
####################################################
###################### [OK]
Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706

Cisco IOS Software, C2960 Software (C2960-LANBASE-M),


Version 12.2(25)FX, RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Wed 12-Oct-05 22:05 by pt_team
Image text-base: 0x80008098, data-base: 0x814129C4

Cisco WS-C2960-24TT (RC32300) processor (revision C0) with


21039K bytes of memory.

24 FastEthernet/IEEE 802.3 interface(s)


2 Gigabit Ethernet/IEEE 802.3 interface(s)

63488K bytes of flash-simulated non-volatile configuration


memory.
Base ethernet MAC Address : 00E0.F765.DA14
Motherboard assembly number : 73-9832-06
Power supply part number : 341-0097-02
Motherboard serial number : FOC103248MJ
Power supply serial number : DCA102133JA
Model revision number : B0
Motherboard revision number : C0
Model number : WS-C2960-24TT
System serial number : FOC1033Z1EY
Top Assembly Part Number : 800-26671-02
Top Assembly Revision Number : B0
Version ID : V02
CLEI Code Number : COM3K00BRA
Hardware Board Revision Number : 0x01

Switch Ports Model SW Version SW Image


------ ----- ----- ---------- ----------
* 1 26 WS-C2960-24TT 12.2 C2960-LANBASE-M

Cisco IOS Software, C2960 Software (C2960-LANBASE-M),


Version 12.2(25)FX, RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Wed 12-Oct-05 22:05 by pt_team

Press RETURN to get started!

Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int vlan 1
Switch(config-if)#ip address 192.168.1.2 255.255.255.0
Switch(config-if)#no shutdown

Switch(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up

Switch con0 is now available

Press RETURN to get started.

%LINK-5-CHANGED: Interface FastEthernet0/2, changed state


to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface


FastEthernet0/2, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1,


changed state to up

%LINK-5-CHANGED: Interface FastEthernet0/1, changed state


to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface


FastEthernet0/1, changed state to up
Switch>enable
Switch#config t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int vlan 1
Switch(config-if)#192.168.1.2 255.255.255.0
^
% Invalid input detected at '^' marker.
Switch(config-if)#ip address 192.168.1.2 255.255.255.0
Switch(config-if)#no shutdown
Switch(config-if)#
Switch(config-if)#do ping 192.168.1.1

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max =
0/0/0 ms

Switch(config-if)#username sajid password 1234


Switch(config)#line vty 0 15
Switch(config-line)#login local
Switch(config-line)#transport input telnet
Switch(config-line)#ip domain-name cisco.com
Switch(config)#crypto key generate rsa
% Please define a hostname other than Switch.
Switch(config)#hostname SW1
SW1(config)#crypto key generate rsa
The name for the keys will be: SW1.cisco.com
Choose the size of the key modulus in the range of 360 to 2048
for your
General Purpose Keys. Choosing a key modulus greater than
512 may take
a few minutes.

How many bits in the modulus [512]: 1024


% Generating 1024 bit RSA keys, keys will be non-exportable...
[OK]

SW1(config)#line vty 0 15
*Mar 1 0:52:31.101: %SSH-5-ENABLED: SSH 1.99 has been
enabled
SW1(config-line)#login local
SW1(config-line)#transport input ssh
SW1(config-line)#exec-timeout 5
SW1(config-line)#exit
SW1(config)#ip ssh version 2

CLI command on Router:

Self decompressing the image :


####################################################
###################### [OK]
Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706

Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-


M), Version 12.4(15)T1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Image text-base: 0x60080608, data-base: 0x6270CD50

This product contains cryptographic features and is subject to


United
States and local country laws governing import, export, transfer
and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use
encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this
product you
agree to comply with applicable laws and regulations. If you are
unable
to comply with U.S. and local laws, return this product
immediately.

A summary of U.S. laws governing Cisco cryptographic products


may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending


email to
export@cisco.com.
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of
memory.
Processor board ID FTX0947Z18E
M860 processor: part number 0, mask 49
2 FastEthernet/IEEE 802.3 interface(s)
2 Low-speed serial(sync/async) network interface(s)
191K bytes of NVRAM.
63488K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-
M), Version 12.4(15)T1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team

--- System Configuration Dialog ---

Would you like to enter the initial configuration dialog?


[yes/no]: no

Press RETURN to get started!

Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int fa 0/1
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#no shutdown

Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state
to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface


FastEthernet0/1, changed state to up

Router(config-if)#do ping 192.168.1.2

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 192.168.1.2, timeout is 2
seconds:
..!!!
Success rate is 60 percent (3/5), round-trip min/avg/max =
0/2/8 ms

Router(config-if)#do ping 192.168.1.2

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 192.168.1.2, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max =
0/0/0 ms

Router(config-if)#

Router con0 is now available

Press RETURN to get started.

Router>enable
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int fa 0/1
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#do ping 192.168.1.2

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 192.168.1.2, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max =
0/0/0 ms

Router(config-if)#username sajid password 1234


Router(config)#line vty 0 15
Router(config-line)#login local
Router(config-line)#transport input ?
all All protocols
none No protocols
ssh TCP/IP SSH protocol
telnet TCP/IP Telnet protocol
Router(config-line)#transport input telnet
Router(config-line)#exit
Router(config)#ip domain-name cisco.com
Router(config)#
Router#
%SYS-5-CONFIG_I: Configured from console by console

Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#crypto key generate rsa
The name for the keys will be: R1.cisco.com
Choose the size of the key modulus in the range of 360 to 2048
for your
General Purpose Keys. Choosing a key modulus greater than
512 may take
a few minutes.
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...
[OK]

R1(config)#line vty 0 15
*Mar 1 0:55:49.136: %SSH-5-ENABLED: SSH 1.99 has been
enabled
R1(config-line)#login local
R1(config-line)#transport input rsh
^
% Invalid input detected at '^' marker.
R1(config-line)#transport input ssh
R1(config-line)#exec-timeout 5
R1(config-line)#
R1(config-line)#exit
R1(config)#ip ssh version 2
R1(config)#

PC command promt
Packet Tracer PC Command Line 1.0
C:\>192.168.1.2
Invalid Command.

C:\>ping 192.168.1.2

Pinging 192.168.1.2 with 32 bytes of data:

Request timed out.


Reply from 192.168.1.2: bytes=32 time<1ms TTL=255
Reply from 192.168.1.2: bytes=32 time<1ms TTL=255
Reply from 192.168.1.2: bytes=32 time<1ms TTL=255
Ping statistics for 192.168.1.2:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

C:\>ping 192.168.1.1

Pinging 192.168.1.1 with 32 bytes of data:

Reply from 192.168.1.1: bytes=32 time<1ms TTL=255


Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255

Ping statistics for 192.168.1.1:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

C:\>telnet 192.168.1.2
Trying 192.168.1.2 ...Open

User Access Verification

Username: afsa
Password:
% Login invalid

Username: afsa
Password:
Switch>enable
% No password set.
Switch>exit
[Connection to 192.168.1.2 closed by foreign host]
C:\>telnet 192.168.1.1
Trying 192.168.1.1 ...Open

User Access Verification

Username: afsa
Password:
Router>

[Connection to 192.168.1.1 closed by foreign host]


C:\>
C:\>ssh -l afsa 192.168.1.2

Password:

SW1>exit

[Connection to 192.168.1.2 closed by foreign host]


C:\>ssh --l afsa 192.168.1.1
Invalid Command.

C:\>ssh -l afsa 192.168.1.1

Password:

R1>

[Connection to 192.168.1.1 closed by foreign host]


C:\>

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy