You are on page 1of 6

9.5.1.

2 Packet Tracer - Putting it All Together

Addressing Table
Device Interface IP Address
R1 G0/1 209.165.201.1
S1 VLAN 1 209.165.201.2
Server NIC 209.165.201.30
NO Device Configuration
1 Basic configuration
2
Configure the device name according to the Addressing Table
3

4 Configure the IP address on G0/1 interface according to the IP


5 addressing table and enable the interface.
6
Create a banner that warns anyone accessing the device that
7 unauthorized access is prohibited. Make
8
9 Assign cisco as the console password and enable login.
10 Router R1
11 Assign class as the encrypted privileged EXEC mode password
12 Encrypt all plaintext passwords.
13 Configure SSH on R1:
14 Set the domain name to networking.pka
15
Generate a 1024-bit RSA key.
16
17 Create a user with a username admin with password cisco123
18
Configure the VTY lines for SSH access.
19
20 Use the local user profiles for authentication.
22 Basic configuration
23
24 Configure the device name according to the Addressing Table.
25 Switch S1
26 Configure the IP address of the switch on SVI interface according to the
27 IP addressing table and enable the interface.
Switch S1

Configure the IP address of the switch on SVI interface according to the


IP addressing table and enable the interface.
28
t All Together

Subnet Mask Default Gateway


255.255.255.224 N/A
255.255.255.224 N/A
255.255.255.224 209.165.201.1
Commands
c configuration
configure t
hostname R1

interface g0/1

ip add 209.165.201.1 255.255.255.224


no shutdown

banner motd $Warning$

line con 0
password cisco
login
enable secret class
service password-encryption
gure SSH on R1:
ip domain-name networking.pka
crypto key generate rsa
1024
username admin password cisco123
line vty 0 4
transport input ssh
login local
c configuration
enable
configure t
hostname S1

interface vlan 1

ip address 209.165.201.2 255.255.255.224


no shutdown
enable

configure t
hostname R1

interface g0/1

ip add 209.165.201.1 255.255.255.224


no shutdown

banner motd $Warning: Unauthorized access is prohibited!!$

line con 0 ·
password cisco · Assign class as the e
login · Encrypt all plaintext p
enable secret class
service password-encryption
ip domain-name networking.pka Configure SSH on R1:
crypto key generate rsa · Set the domain name
1024 · Generate a 1024-bit R
username admin password cisco123 · Create a user with a u
line vty 0 4 · Configure the VTY lin
transport input ssh · Use the local user pro
login local
Switch S1
configure t
hostname S1
interface vlan 1
ip address 209.165.201.2 255.255.255.224

no shutdown
· Assign class as the encrypted privileged EXEC mode password.
· Encrypt all plaintext passwords.

nfigure SSH on R1:


· Set the domain name to networking.pka
· Generate a 1024-bit RSA key.
· Create a user with a username admin with password cisco123
· Configure the VTY lines for SSH access.
· Use the local user profiles for authentication.

You might also like