Router Report

Embed Size (px)

DESCRIPTION

CISCO ROUTER 2600 SERIES

Citation preview

  • FINAL LAB REPORT ON ROUTER 1

    Contents

    INTRODUCTION: ............................................................................................................................................ 3

    WHAT HAPPENS WHEN ROUTER IS ON AND EXECUTED ............................................................... 4

    ROUTER CONFIGURATION AND COMPONENTS ............................................................................... 5

    EXTERNAL ROUTER CONFIGURATION SOURCES ........................................................................ 5

    ROUTER'S INTERNAL CONFIGURATION COMPONENTS ............................................................. 6

    ROUTER MEMORY ORGANIZATION .................................................................................................... 7

    HOW ROUTERS WORK .................................................................................................................................. 8

    LIKE A POSTAL SYSTEM OR COURIER ........................................................................................................ 9

    ROUTER MODES ............................................................................................................................................ 9

    ROUTER INTERFACES ........................................................................................................................... 10

    ROUTING PROTOCOL ............................................................................................................................ 11

    TYPES OF ROUTING PROTOCOL ..................................................................................................... 12

    OTHER TYPES OF ROUTING PROTOCOL ....................................................................................... 12

    TYPES OF ROUTERS: .............................................................................................................................. 13

    BROADBAND ROUTERS: ................................................................................................................... 13

    WIRELESS ROUTERS: ......................................................................................................................... 13

    OTHER TYPE ROUTERS: .................................................................................................................... 14

    EDGE ROUTER: ................................................................................................................................ 14

    SUBSCRIBER EDGE ROUTER: ...................................................................................................... 14

    INTER-PROVIDER BORDERS ROUTER: ...................................................................................... 14

    CORE ROUTER ..................................................................................................................................... 14

    ROUTER IN TODAYS INTERNET CONNECTION ............................................................................... 15

    WHY WE CHOOSE CISCO ROUTERS? ................................................................................................. 15

    DIFFERENCE BETWEEN A SERVER AND A ROUTER ...................................................................... 16

    APPLICATION AND PURPOSES OF ROUTERS ................................................................................... 18

    APPLICATIONS .................................................................................................................................... 18

    PURPOSES ............................................................................................................................................. 18

    ADVANTAGE AND DISADVANTAGE OF ROUTERS ....................................................................................... 18

  • FINAL LAB REPORT ON ROUTER 2

    ADVANTAGE: ...................................................................................................................................... 18

    EASILY SHARED INTERNET ......................................................................................................... 18

    SECURITY AND ADAPTABILITY ................................................................................................. 18

    DISADVANTAGE: ................................................................................................................................ 19

    COMPLICATED SETUP ................................................................................................................... 19

    DATA OVERHEAD .......................................................................................................................... 19

    CONCLUSION ........................................................................................................................................... 19

    COMMAND OF CISCO ROUTER 2600 SERIES ............................................................................................... 20

    LAB CODE FOR CISCO ROUTER CONFIGURATION ................................................................................... 20

    SOME DESCRIPTION OF CISCO ROUTE COMMAND FOR DIFFERENT CONFIGURATION MODES ............ 22

  • FINAL LAB REPORT ON ROUTER 3

    INTRODUCTION: A router is Special type of computer device that connect and allow communication between

    two networks and forwards data packets between computer network creating an

    overlay internetwork.

    A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its

    ultimate destination. Then, using information in its routing table or routing policy, it directs the

    packet to the next network on its journey.

    Routers perform the "traffic directing" functions on the internet. Routers operate at

    physical, data link and network layer of OSI model.

  • FINAL LAB REPORT ON ROUTER 4

    WHAT HAPPENS WHEN ROUTER IS ON AND EXECUTED

    There are four major phases to the boot up process:

    1. Performing the POST

    Power-On Self-Test (POST)

    When the router is powered on, software on the ROM chip conducts the POST.

    During this self-test, the router executes diagnostics from ROM on several hardware

    components including the CPU, RAM, and NVRAM.

    After the POST has been completed, the router executes the bootstrap program.

    2. Loading the bootstrap program

    After the POST, the bootstrap program is copied from ROM into RAM.

    Once in RAM, the CPU executes the instructions in the bootstrap program.

    The main task of the bootstrap program is to locate the Cisco IOS and load it into RAM.

    3. Locating and loading the Cisco IOS software

    The IOS is typically stored in flash memory.

    Note: Once the IOS begins to load, you may see a string of pounds signs (#) while the

    image decompresses.

    ############################

    4. Locating and loading the startup configuration file or entering setup mode

    Bootstrap program searches for the startup configuration file, known as startup-config,

    in NVRAM.

    File is copied into RAM as the running configuration file, running-config.

    If the startup configuration file cannot be located, then we enter setup mode.

  • FINAL LAB REPORT ON ROUTER 5

    ROUTER CONFIGURATION AND COMPONENTS

    1) External router configuration sources 2) Routers Internal Configuration Components

    EXTERNAL ROUTER CONFIGURATION SOURCES

    You can configure a router from many external locations such as:

    From the console terminal during its installation

    Via modem by using the auxiliary port

    From Virtual Terminals 0-4, after it has been installed on the network

    From a TFTP server on the network

  • FINAL LAB REPORT ON ROUTER 6

    ROUTER'S INTERNAL CONFIGURATION COMPONENTS

    Router contains the operating system, Flash memory, NVRAM and processor. High level

    routers contain the Application Specific Integrated Circuits to perform parallel processing. A

    router is also act as a gateway that connects LAN with the internet .

  • FINAL LAB REPORT ON ROUTER 7

    RAM/DRAM -- stores routing tables, ARP cache, fast-switching cache, packet buffering

    (shared RAM), and packet hold queues; RAM also provides temporary and/or running

    memory for a router's configuration file while the router is powered; RAM content is lost

    during a power down or restart.

    NVRAM -- non-volatile RAM stores the router's backup/startup configuration file; NVRAM

    content is retained during power down or restart.

    Flash -- erasable, reprogrammable ROM (EPROM)that holds the operating system image

    and microcode; Flash memory enables software updates without removing and replacing

    processor chips; Flash content is retained during power down or restart; Flash memory

    can store multiple versions of IOS software.

    ROM -- contains power-on diagnostics, a bootstrap program, and operating system software;

    software upgrades in ROM require removing and replacing chips on the router's motherboard

    ROUTER MEMORY ORGANIZATION

  • FINAL LAB REPORT ON ROUTER 8

    HOW ROUTERS WORK A router passes data between multiple networks. It works at the layer 3 (the network link

    layer), which means that it must be able to understand the data packets so that it can route them

    to their destination.

    Routers attempt to send packets from their source to their destination in the fastest way possible,

    which is not always the absolute shortest path.

    On a network, packets with destinations on the LAN go directly from the sending machine to the

    destination machine without any intermediaries. However, if the destination address of a packet

    is outside the LAN, the sending machine sends it to the router, which the sending machine knows

    as the default gateway, and has no further interaction with that packet.

    When the router receives a packet destined for a point outside the LAN, it looks to see if it has a

    route to get the packet to that destination network. If it does (or if it has a default gateway of its

    own), it will send the packet to the next stop.

  • FINAL LAB REPORT ON ROUTER 9

    LIKE A POSTAL SYSTEM OR COURIER Routing between a LAN and a wide-area network (WAN) is like a postal system or a courier

    network. A package traveling from New York to San Francisco might travel through a hub in

    Memphis or Chicago and be re-sorted in Reno before heading to its final destination. If the

    package had to be hand-delivered quickly, you could do that, but the cost would increase

    significantly, and hopefully, the package won't get routed the long way around, because that

    tends to be inefficient and difficult to trace.

    In the same manner, routers send packets according to the available routes between networks and

    try to determine the shortest possible route at any given time.

    How does a router do this? Well, inside a router is a set of data called routing tables. Routing

    tables include:

    All possible routes the router is aware of Information on which connections lead to

    particular groups of addresses

    Priorities for connections to be used Rules for handling both routine and special cases of

    traffic

    Routing tables are dynamic they are updated by routing protocols such as Routing

    Information Protocol (RIP) or Open Shortest Path First (OSPF) that constantly pass messages

    between routers. The router consults them to determine whether or not it has a route to a

    particular destination address.

    ROUTER MODES

    User EXEC mode -- User can view some information about the router, but cannot make changes.

    Privileged EXEC mode -- This mode supports the debugging and testing commands, detailed

    examination of the router, manipulation of configuration files, and access to configuration

    modes.

    Setup mode -- This mode presents an interactive prompted dialog at the console that helps the

    new user create a first-time basic configuration.

    Global configuration mode -- This mode implements powerful one-line commands that perform

    simple configuration tasks.

    Other configuration modes -- These modes provide more detailed multiple-line configurations.

    RXBoot mode -- This is the maintenance mode that you can use, among other things, to recover

    from lost passwords.

  • FINAL LAB REPORT ON ROUTER 10

    ROUTER INTERFACES

    There are two major groups of router interfaces

    LAN Interfaces:

    1: Are used to connect router to LAN network

    2: Has a layer 2 MAC address

    3: Can be assigned a Layer 3 IP address

    4: Usually consist of an RJ-45 jack

    WAN Interfaces:

    1: Are used to connect routers to external networks that interconnect LANs.

    2: Depending on the WAN technology, a layer 2 address may be used.

    3: Uses a layer 3 IP address

  • FINAL LAB REPORT ON ROUTER 11

    ROUTING PROTOCOL

    Each router has a priori knowledge only of networks attached to it directly. A routing protocol

    shares this information first among immediate neighbors, and then throughout the network. This

    way, routers gain knowledge of the topology of the network.

    Router is a network communication device that is used to connect logically and physically

    different networks. It can be used in the Ethernet, FDDI, Token Ring, ATM, Frame Relay, ISDN

    and other types of the LAN/WAN. Router contains and maintains the routing table that has the

    information of the adjacent routers and other connected networking devices. Router selects the

    shortest possible path to send the data packets at the destination. It is an intelligent device that can

    connect ATM with Frame Relay, ISDN with Frame Relay, SONET with ATM or any other two

    dissimilar networks.

  • FINAL LAB REPORT ON ROUTER 12

    Router uses different protocols such as RIP (Routing Information Protocol), OSPF (Open

    Shortest Path First) and BGP and IGRP (Interior Gateway Routing Protocol) and EIGRP

    (Enhanced Interior Gateway Routing Protocol. Routing protocols specifies that how routers will

    communicate with each other in the WAN.

    TYPES OF ROUTING PROTOCOL

    There are two primary routing protocol types although many different routing protocols defined

    with those two types. Link state and distance vector protocols comprise the primary types .

    Distance vector protocols advertise their routing table to all directly connected neighbors at

    regular frequent intervals using a lot of bandwidth and are slow to converge. When a route

    becomes unavailable, all router tables must be updated with that new information. The problem

    is with each router having to advertise that new information to its neighbors, it takes a long time

    for all routers to have a current accurate view of the network. Distance vector protocols use fixed

    length subnet masks which aren't scalable.

    Link state protocols advertise routing updates only when they occur which uses bandwidth

    more effectively. Routers don't advertise the routing table which makes convergence faster. The

    routing protocol will flood the network with link state advertisements to all neighbor routers per

    area in an attempt to converge the network with new route information. The incremental change

    is all that is advertised to all routers as a multicast LSA update. They use variable length subnet

    masks, which are scalable and use addressing more efficiently.

    OTHER TYPES OF ROUTING PROTOCOL

    Although there are many types of routing protocols, three major classes are in widespread use

    on IP networks:

    Interior gateway routing via link state routing protocols, such as OSPF and IS-IS.

    Interior gateway routing via distance vector routing protocols, such

    as RIPv2, IGRP and EIGRP.

    Exterior gateway routing. The Border Gateway Protocol (BGP), a path vector routing

    protocol, is the routing protocol used on the Internet for exchanging traffic between

    Autonomous Systems.

  • FINAL LAB REPORT ON ROUTER 13

    TYPES OF ROUTERS:

    There are several types of routers in the market.

    BROADBAND ROUTERS:

    Broadband routers can do different types of things. Broadband routers can be used to connect

    computers or to connect to the Internet.

    If you connect to the internet through phone and using Voice over IP technology (VOIP) then

    you need broadband router. These are often a special type of modem (ADSL) that will have both

    Ethernet and phone jacks.

    WIRELESS ROUTERS:

    Wireless routers create a wireless signal in your home or office. So, any PC within range of

    Wireless routers can connect it and use your Internet.

    In order to secure your Wireless routers, you simply need to come secure it with password or get

    your IP address. Then, you'll log on into your router with the user ID and passwords will that

    come with your router. A network device that combines a router, switch and Wi-Fi access point

    (Wi-Fi base station) in one box. Wireless routers provide a convenient way to connect a small

    number of wired and any number of wireless computers to the Internet.

  • FINAL LAB REPORT ON ROUTER 14

    OTHER TYPE ROUTERS:

    EDGE ROUTER:

    This type of router are placed at the edge of the ISP network, they are normally configured to

    external protocol like BGP (Border gateway protocol) to another BGP of other ISP or large

    organization.

    SUBSCRIBER EDGE ROUTER:

    This type of router belongs to an end user (enterprise) organization. Its configured to broadcast

    external BGP to its providers.

    INTER-PROVIDER BORDERS ROUTER:

    This type of router is for Interconnecting ISPs, this is a BGP speaking router that maintains BGP

    sessions with other BGP speaking routers in other providers.

    CORE ROUTER

    A router that resides within the middle or backbone of the LAN network rather than at its

    periphery. In some instances, a core router provides a step down back bone, interconnecting the

    distribution routers from multiple building of a campus (LAN), or Large enterprise Location

    (WAN). They tend to be optimized for a high bandwidth. A core router is a router that

    forwards packets to computer hosts within a network but not between networks). A core router

    is sometimes contrasted with an edge router, which routes packets between self-contained

    network and other outside networks along a network backbone.

  • FINAL LAB REPORT ON ROUTER 15

    ROUTER IN TODAYS INTERNET CONNECTION

    Routers are typically dedicated hardware devices, use of software-based routers has grown

    increasingly common. Routers are very common today in every network area, this is mainly

    because every network these days connect to some other network, whether it's the Internet or

    some other remote site. Routers get their name from what they do. Which is route data from one

    network to another. Routers capture the information that come through broadband connection via

    a modem and deliver it to your computer The router choose route for the packet so that you

    receive the information. Routers are multiport devices and more sophisticated as compared to

    repeaters and bridges. Routers also support filtering bridges. Like bridges, they are self -

    learning, as they can communicate their existence to other devices and can

    learn of the existence of new routers, nodes and LAN segments.

    WHY WE CHOOSE CISCO ROUTERS?

    For many years, Cisco's 2600 and 3600 series line served as the standard Cisco routers for a

    midsize business' network. In fact, most organizations still use these models todayeven though

    Cisco discontinued both lines more than a year ago.

    Evaluating and weighing the following eight criteria can help to figure out which router best fits

    for a person needs:

  • FINAL LAB REPORT ON ROUTER 16

    Performance

    Cisco used to rate its routers by how many packets per second the router could forward. For

    example, a Cisco 2610 or 2612 series router can forward an estimated 15,000 packets per second

    using fast-switching; a Cisco 7500 series router can forward an estimated 2 million packets per

    second.

    Upgradability

    Router processors are rarely upgradeable, so this refers primarily to RAM and Flash.

    Expandability

    This refers to the number of WAN and LAN interfaces supported by the router. The router

    usually has a default number of interfacesbut some routers, such as the 3600 series, have none.

    So, pay attention to the number of interfaces you can add on top of the default.

    Supported software features

    For example, you might need a router to support a certain interface or a VoIP feature.

    Manageability

    How easy or difficult is it to manage the router? Does the router come with a GUI interface, or is

    it command line only? Is there an interface that allows you to manage multiple routers to help

    ease the management burden as the enterprise grows?

    Redundancy

    Does the router offer the necessary redundancy for working at a critical point in the network?

    Some redundancy examples include hot-swappable power supplies or high-availability routing

    protocols such as HSRP or VRRP.

    DIFFERENCE BETWEEN A SERVER AND A ROUTER

    A server is a system or computer that manages access and responds to requests on a network.

    There are many types of servers: print, file, web, game, mail, and various others. Pretty much

    any computer could function as a server. Sometimes a computer works as a dedicated server,

    meaning that is its only function. At other times, a computer can function as a server but also be

    used for other tasks. In basic terms, a server will store files or data and a user or client will

    request that data. The users computer connects and sends a request to the server, which then

    responds by sending the requested data back. This is how pretty much the whole World Wide

    Web works, along with most email services, although on a much grander and complicated scale.

  • FINAL LAB REPORT ON ROUTER 17

    A router works as a connection between two or more networks. When you use a router in your

    home, you are creating a connection from a public network to a private network.

    All computers must have an address, much like a house or residence must have an address. No

    two computers can have the same address, and in your home, each computer has their own,

    private address. However, when connecting to the Internet, the computer will use the address of

    the router, which is a public address. The router allows multiple computers and devices to

    connect to the Internet using one public address. If it did not work this way, there would not be

    enough addresses available for everyone to be on the Internet at once!

    As far as adding a server to a home office, it would depend on what kind of server you would

    like to setup. If you are looking to have computers connected to the Internet through the server,

    you would likely still need a router. If you use multiple computers in your family, a server at

    home can be beneficial. It could be used to perform backups, to store all your pictures, videos,

    and media in one central location. All computers would then have access to all files. It could be

    set up as a print server to allow one printer to be used by multiple computers. There are other

    uses, as well.

    One thing to remember about a server is that it must always be on to be effective. However, it

    does not have to be a current, up to date computer. It can have older hardware and does not have

  • FINAL LAB REPORT ON ROUTER 18

    to be a fast computer, depending on the use. It could even be set up without an Internet

    connection, if you are using it for a file server or for backing up your systems. All it would take

    is some knowledge in how to set up a home network.

    APPLICATION AND PURPOSES OF ROUTERS

    APPLICATIONS

    It is used to create a network with remote access to private networks.

    It enables Private networks to be inter-networked with other networks such as the

    Internet.

    Companies to create their own networks in customers' premises to eliminate reliance on

    the end customers' network.

    Routers are useful to provide security in military transmissions that require highly secure

    lines by using Hop-count Algorithm.

    PURPOSES

    Need of firewall features to isolate networks and provide security for private networks.

    Recovery of TCP/IP protocols from the local Ethernet protocols which are routed over

    PPP protocols for transferring data information over GSM, GPRS and PSTN networks.

    Routers are used to reduce traffic load through the network.

    ADVANTAGE AND DISADVANTAGE OF ROUTERS

    ADVANTAGE:

    EASILY SHARED INTERNET

    One of the biggest reasons for using a router is to connect multiple users to the Internet.

    Connecting to the Internet requires a publicly-unique IP address. As such, Internet providers

    typically only offer a single IP address or charge fees for large amounts of publicly routable

    addresses. The solution is to add a router with network address translation enabled. Connecting

    to the Internet through a router with NAT allows the router to use the single public IP address

    and a series of UDP ports to share the connection. Without NAT, connecting a large organizations computers to the Internet becomes virtually impossible.

    SECURITY AND ADAPTABILITY

    Connecting an Internet modem directly to a PC exposes that PC to a host of security issues.

    Furthermore, expanding a direct-connection network becomes complicated without the addition

    of switches or a router and communicating between the individual PCs becomes difficult. Using

    a router as an intermediary between the outside network of the Internet and the inside

    network of your organization provides a scalable environment that is also, to a degree, easier to

    secure. A router is not a replacement for a firewall or anti -malware measures,

    but its an important first step towards a largely secure network

    environment .

  • FINAL LAB REPORT ON ROUTER 19

    DISADVANTAGE:

    COMPLICATED SETUP

    The router requires NAT to be set up. In addition, each computer must be assigned a private IP

    address that is typically organized by a DHCP server. This is required for the simplest

    connections.

    Connecting to additional IP-based networks adds additional complication in the form of routing

    tables -- a table that describes the best route for reaching a desired network.

    If IP telephony or video services are to be running on the IP network, youll also need to

    consider quality of service configurations.

    DATA OVERHEAD

    Unlike a point-to-point layer 2 link, routers add additional IP-based headers. These headers

    include information such as source and destination addresses, UDP information and checksums.

    These headers are attached to every payload of data. Large pieces of data are typically broken

    into thousands of smaller headers, making this header data consume a percentage of the total

    available bandwidth.

    CONCLUSION

    Modern routers are very complex hardware and software systems with demanding requirements

    and constraints. To achieve carrier class converged networks, router software and hardware

    architecture is going to have to evolve to better achieve scale and reliability

  • FINAL LAB REPORT ON ROUTER 20

    COMMAND OF CISCO ROUTER 2600 SERIES

    LAB CODE FOR CISCO ROUTER CONFIGURATION ENTER

    Password: cisco

    Router> enable

    Password: class

    Router# erase start

    Router# reload

    Would you like to enter config dialog? [Yes/No] No

    ..

    Router> enable

    Router# config t

    Router(config)# hostname Lab-A

    Lab-A(config)# enable secret class

    Lab-A(config)# line console 0

    Lab-A(config-line)# login

    Lab-A(config-line)# password cisco

    Lab-A(config-line)# line vty 0 4

    Lab-A(config-line)# login

    Lab-A(config-line)# password cisco

    Lab-A(config-line)# exit

    ..

    Lab-A(config)# interface f0/0

    Lab-A(config-if)# ip addr 192.5.5.1 255.255.255.0

    Lab-A(config-if)# desc connection to hub A

  • FINAL LAB REPORT ON ROUTER 21

    Lab-A(config-if)# no shutdown

    Lab-A(config-if)# interface f0/0

    Lab-A(config-if)# ip addr 205.7.5.1 255.255.255.0

    Lab-A(config-if)# desc connection to switch 1

    Lab-A(config-if)# no shutdown

    Lab-A(config)# interface S0/0

    Lab-A(config-if)# ip addr 201.100.11.1 255.255.255.0

    Lab-A(config-if)# desc connection to Lab-B

    Lab-A(config-if)# clock rate 64000

    Lab-A(config-if)# no shutdown

    Lab-A(config)# exit

    ..

    Lab-A(config)# router rip

    Lab-A(config-router)# network 192.5.5.0 network 205.7.5.0 network 201.100.11.0

    Lab-A(config-router)# exit

    Lab-A(config)# ip host Lab-A 192.5.5.1 205.7.5.1 201.100.11.1

    Lab-A(config)# ip host Lab-B 219.17.100.1 199.6.13.1 201.100.11.2

    Lab-A(config)# ip host Lab-C 223.8.151.1 204.204.7.1 199.6.13.2

    Lab-A(config)# ip host Lab-D 210.93.105.1 204.204.7.2

    Lab-A(config)# ip host Lab-E 210.93.105.2

    Lab-A(config)# Banner motd

    #Warning - unauthorized access may result in legal action.#

    Lab-A(config)# exit

    ..

    Lab-A# show run

  • FINAL LAB REPORT ON ROUTER 22

    Lab-A copy run start

    Lab-A# show ip route

    Lab-A# disable

    Completed Tasks

    SOME DESCRIPTION OF CISCO ROUTE COMMAND FOR DIFFERENT CONFIGURATION MODES

    Line configuration mode

    This mode is used to configure lines like console, vty and auxiliary. There are main types

    of line that are configured.

    (i) Console

    router(config)#line console 0

    (ii) Auxiliary

    router(config)#line aux 0

    (iii) Telnet or vty

    router(config)#line vty 0 4

    Interface configuration mode

    This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc.

    Router(config)#interface

    Router(config)#interface serial 1

    Routing configuration mode

    1.Hostname 2. Secret password 3.Line console login 4. Line console password 5. Line vty Login 6. Line vty password 7. E0 IP 8. E0 up 9. E1 IP 10. E1 up 11. S0 IP 12. S0 clock rate (DCE) 13. S0 up 14. Routing Protocol 15. Network 1 16. Network 2 17 Network 3 18. IP Host Lab_A 19. IP Host Lab_B 20. IP Host Lab_C 21 . IP Host Lab_D 22. . IP Host Lab_E.

  • FINAL LAB REPORT ON ROUTER 23

    This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc.

    Router(config)#router []

    Router(config)#router rip

    Router(config)#router eigrp 10

    Configuring Password

    There are five types of password available in a router

    (1) Console Password

    router#configure terminal

    router(config)#line console 0

    router(config-line)#password

    router(config-line)#login

    router(config-line)#exit

    to erase password do all steps with no command.

    (2) Vty Password

    router>enable

    router#configure terminal

    router(config)#line vty 0 4

    router(config-line)#password

    router(config-line)#login

    router(config-line)#exit

    (3) Auxiliary Password

    router#configure terminal

    router(config)#line Aux 0

    router(config-line)#password

    router(config-line)#login

    router(config-line)#exit

    (4) Enable Password

    router>enable

    router#configure terminal

    router(config)#enable password

    router(config)#exit

    (5) Enable Secret Password

    Enable Password is the clear text password.

    Router>enable

    Router#configure terminal

  • FINAL LAB REPORT ON ROUTER 24

    Router(config)#enable secret

    Router(config)#exit

    Managing Configuration

    There are two types of configuration present in a router

    (1) Startup Configuration

    (2) Running Configuration

    (1) Startup configuration is stored in the NVRAM. Startup configuration is used to save

    settings in a router. Startup configuration is loaded at the time of booting in to the Primary RAM.

    (2) Running Configuration is present in the Primary RAM wherever we run a command for

    configuration, this command is written in the running configuration.

    To save configuration

    Router#copy running-configuration startup-configuration

    Or

    Router#write

    To erase old configuration

    Router#erase startup-configuration

    Configuring HostName

    Router#configure t

    Router(config) #hostname

    Configuration Interfaces

    Interfaces configuration is one of the most important part of the router configuration. By

    default, all interfaces of Cisco router are in disabled mode. We have to use different commands

    as our requirement to enable and configure the interface.

    Configuring IP, Mask and Enabling the Interface

    Router#configure terminal

    Router(config)#interface

    Router(config-if)#ip address

    Router(config-if)#no shutdown

    Router(config-if)#exit

  • FINAL LAB REPORT ON ROUTER 25

    Configuring secondary IP

    Router#config terminal

    Router(config)#interface FOR EXAMPLE interface f0/0

    Router(config-if)#IP address 192.168.10.5 255.255.255.0

    Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary

    Router(config-if)#no shutdown (to enable the interface because they always shutdown)

    Router(config-if)#exit

    Router#show run (to display secondary IP)

    Configuring Banners

    Banners are just a message that can appear at different prompts according to the type.

    Different banners are: -

    Message of the day (motd)

    This banner appear at every access method

  • FINAL LAB REPORT ON ROUTER 26