Note : You can abbreviate show running-config as
Step 7: Verify that the enable secret password is added to the configuration file.Įnter the show running-config command again to verify the new enable secret password is configured. If both are configured on the switch, you must enter the enable secret password to enter privileged EXEC mode. Note : The enable secret password overrides the enable password. Set the enable secret password to itsasecret. The enable password should be replaced with the newer encrypted secret password using the enable secret command. Step 6: Configure an encrypted password to secure access to privileged mode. This could pose a security risk if someone is looking over your shoulder or obtains access to config files stored in a backup location.
Notice that the console and enable passwords are both in plain text. Verify your configuration by examining the contents of the running-configuration file:.Enter the second password you configured to protect privileged EXEC mode.Enter the command to access privileged mode.Enter this password to return to user EXEC mode. The first password is the console password you configured for line con 0.Press and you will now be asked for a password:.Enter the exit command again to log out of the switch.S1 # Step 5: Verify that privileged mode access is secure. %SYS-5-CONFIG_I: Confi gured from console by console This password will not grade as correct until after you encrypt it in Step 8. Note : The 0 in c1$c0 is a zero, not a capital O. This password protects access to privileged mode. Note : If the switch did not prompt you for a password, then you did not configure the login parameter in Step 2. Step 3: Verify that console access is secured.Įxit privileged mode to verify that the console port password is in effect. In order for the password checking process to work, it requires both the login and password commands. %SYS-5-CONFIG_I: Configured from console by console Įnter config uration commands, one per line. T o secure access to the console line, access config-line mode and set the console password to letmein. S1# Step 2: Secure access to the console line. Notice how the prompt changes as you navigate through the switch. To configure parameters on a switch, you may be required to move between various configuration modes. Part 2: Create a Basic Switch Configuration Step 1: Assign a name to a switch. It displays this message because the configuration file was not saved to NVRAM. Why does the switch respond with “ startup-config is not present? ” Which command will display the current contents of non-volatil e random-access memory (NVRAM)?
What is the range of values shown for the vty lines? How many Gigabit Ethernet i nterfaces does the switch have? How many Fast Ethernet i nterfaces does the switch have? Step 2: Examine the current switch configuration. Notice that the prompt changed to reflect privileged EXEC mode.
The privileged EXEC command set includes the commands available in user EXEC mode, many additional commands, and the configure command through which access to the configuration modes is gained. However, because many of the privileged commands configure operating parameters, privileged access should be password-protect ed to prevent unauthorized use. You can access all switch commands from privileged EXEC mode. Instructions Part 1: Verify the Default Switch Configuration Step 1: Enter privileged EXEC mode. The switch can then be configured to boot to IOS version 15.0, if that version is required. If required, the IOS version can be updated from a file server in the Packet Tracer topology. Note: In Packet Tracer, the Catalyst 2960 switch use s IOS version 12.2 by default. These message banners are also used to warn unauthorized users that access is prohibited.
You will also learn how to configure messages for users logging into the switch. Y ou will secure access to the command-line interface ( CLI ) and console ports using encrypted and plain text passwords. In this activity, you will perform basic switch configuration tasks. Part 5: Configure S2 Background / Scenario Part 4: Save Configuration Files to NVRAM Part 2: Configure a Basic Switch Configuration Part 1: Verify the Default Switch Configuration Packet Tracer – Configure Initial Switch Settings (Answers Version)Īnswers Note : Red font color or g ray highlights indicate text that appears in the Answers copy only.