You are on page 1of 5

DELA CRUZ, CHARLES KEVIN M.

BS CPE – 3C

LABORATORY NO. 7

Performing Initial Switch Config.

First, open tracer and build a Topology Diagram as shown above.


After building the Topology Diagram, then next is to set-up the 1841 Customer Router & ISP Router

Go to “Physical” - “WIC-1T” turn off switch drag the unit and turn it back on. Furthermore, complete the
configuration at the Serial 0/0/0 and FastEthernet 0/0

After tuning the Customer Router and ISP Router, now you can set-up the Server & PC (Gateway + Ip
Address) to the both sides
On the first process, our objective is to configure the router hostname by typing at the terminal pane
enable to command the router to execute it and after that is to configure the terminal by typing
“configure terminal” to execute the command and after that the system reads it and allows it to change
the hostname.

After entering the configuration we can now able to set password and secret password for our router

And console it by typing console 0 to set it by the default for entry to access the router. Furthermore,
after setting the password to cisco123, we configured it to password-encryption to secure your
password to anyone who are trying to address your password. By typing the banner command you can
see at the first line you typed string. Lastly after logging-in you can now access the router.
After configuring router hostname, password and banner messages, we can now verify the router
configuration by exiting at your terminal session at router. First, log-in with password-encryption or
secret password cisco123

Reflection

1. Which Cisco IOS CLI commands did you use the most?

Cisco IOS CLI command I used the most is banner motd it is just like $display at the Verilog design or
printf at java to display the numbers or letters you want to see at your very screen.
2. How can you make the customer router password more secure?

I make the customer router more secured by configuring passwords, console password and password-
encryption to make your confidential information be secured.

You might also like