2.2.3.4 Packet Tracer - Configuring Initial Switch Settings PDF
2.2.3.4 Packet Tracer - Configuring Initial Switch Settings PDF
2.2.3.4 Packet Tracer - Configuring Initial Switch Settings PDF
Topology
Objectives
Part 1: Verify the Default Switch Configuration
Part 2: Configure a Basic Switch Configuration
Part 3: Configure a MOTD Banner
Part 4: Save Configuration Files to NVRAM
Part 5: Configure S2
Background
In this activity, you will perform basic switch configurations. You will secure access to the command-line
interface (CLI) and console ports using encrypted and plain text passwords. You will also learn how to
configure messages for users logging into the switch. These banners are also used to warn unauthorized
users that access is prohibited.
b.
Notice that the prompt changed in the configuration to reflect privileged EXEC mode.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 6
show running-config
5) Why does the switch respond with startup-config is not present?
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2 of 6
b.
c.
The first password is the console password you configured for line con 0. Enter this password to return to
user EXEC mode.
d.
e.
Enter the second password you configured to protect privileged EXEC mode.
f.
Step 7: Verify that the enable secret password is added to the configuration file.
a.
Enter the show running-config command again to verify the new enable secret password is configured.
Note: You can abbreviate show running-config as
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 3 of 6
$1$mERr$ILwq/b7kc.7X/ejA4Aosn0
c.
Why is the enable secret password displayed differently from what we configured?
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 4 of 6
cop ru st
show config
Are all the changes that were entered recorded in the file?
yes
Part 5: Configure S2
You have completed the configuration on S1. You will now configure S2. If you cannot remember the
commands, refer to Parts 1 to 4 for assistance.
Configure S2 with the following parameters:
a. Name device: S2
b.
c.
d.
Configure a message to those logging into the switch with the following message:
Authorized access only. Unauthorized access is prohibited and violators
will be prosecuted to the full extent of the law.
e.
f.
g.
Save the configuration file to avoid loss if the switch is powered down.
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 5 of 6
Question
Location
Possible
Points
Step 2b, q1
Step 2b, q2
Step 2b, q3
Step 2b, q4
Step 2b, q5
Part 1 Total
Part 2: Create a Basic
Switch Configuration
10
Step 2
Step 7b
Step 7c
Step 8
Part 2 Total
Step 1, q1
Step 1, q2
Part 3 Total
Step 2
Step 3, q1
Step 3, q2
Part 4 Total
72
Total Score
2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Earned
Points
100
Page 6 of 6