Premium Essay

Cisco Router Hardware & Software Discovery

In:

Submitted By kraggnbull
Words 277
Pages 2
Lab #1 – Assessment Worksheet
Cisco Router Hardware & Software Discovery

1. What Cisco “show” command displays various information and details about the router or switch such as Model #, flash memory, RAM, IOS version and physical interfaces? Show Version

2. During the Instructor’s TELNET session to LAN Switch 1 and LAN Switch 2 – what was the captured terminal password for LAN Switch 1 and LAN Switch 2?

Cisco

3. What is the size of the IOS file used for the Cisco 28xx Routers?

239Kb

4. What is the command used to enter the global configuration mode for interfaces on a Cisco Router or Switch?

Router>enable

5. The default hexadecimal value of the configuration register setting for the Cisco 28xx Router is?

0x2102

6. What are the specific settings for the configuration hexadecimal value 0x2102?

-ignores break
-boots into ROM if initial boot fails
-9600 console baud rate default value for most platforms

7. What is the key sequence used to interrupt the boot sequence of a router and initiate the password recovery sequence?

Pause/Break key on the keyboard

8. Using the password recovery process how can you break the router boot sequence to see the router saved passwords and what can you do in that mode.

Ctrl – C to skip to the initial setup procedure to view, change and delete passwords

9. What is the command used to back up the running-config file to TFTP?

“copy running – config TFTP”

10. What process takes place if the command “copy tftp running-config” is entered?

The command lets you merge your back up config on a TFTP server with your running config

Lab #1 Screen

Similar Documents

Free Essay

Aircraft Solutions

... Table of Contents Executive Summary ……………………………………………………………………..1 Company Overview ……………………………………………………………………..1 Assessment ……………………………………………………………………………….2 Security Vulnerabilities …………………………………………………………............2 A Hardware Firewall Vulnerability …………………………………………………....2 A Software Policy Vulnerability ………………………………………………………..3 Recommended Solutions ………………………………………………………………..5 A Hardware Firewall Solution …………………………………………………...........5 A Software Policy Solution …………………………………………………………….6 Impact on Business Processes …………………………………………………………6 Budget …………………………………………………………………………………....7 Summary ………………………………………………………………………………....9 References ………………………………………………………………………………10   Aircraft Solutions Executive Summary Aircraft Solutions (AS) desired a security assessment to highlight the company’s vulnerabilities. AS is a highly esteemed leader in the design and component manufacturing enterprise those solutions can be used within the business applicability of the electronics, commercial, defense and aerospace industries. There were discovered hardware and software vulnerability of non-firewall at the commercial division and software policy updates. The solutions that will be presented are to purchase a firewall system and update the policy update timeframe within the standards that will be introduced from the company that will be recommended to purchase the firewall system from. Company...

Words: 2065 - Pages: 9

Premium Essay

Erp Implementation

...Recommendations CISCO Systems, Inc. Table of Contents Table of Contents 1 Background and Scope 2 ERP Implementation scenario 2 Situation Analysis 3 Conclusion and Recommendations 4 Background and Scope Cisco System, Inc is a Computer Technologies company that was founded in 1984. The company’s primary product is the “router.” The router is hardware and software that control Intranet and Internet traffic. With the growth of the Internet, Cisco products became in high demand. In 1997 Cisco was ranked among the top five companies in return on revenues and on assets. Cisco has been classified in the same category of successful companies as Microsoft and Intel. With the growth of Cisco, their computer systems were unable to handle the increase volume. The Cisco legacy system was a Unix-Based software package that supported its operations of: Financial; Manufacturing; and Order Entry. The system lacked reliability and the ability to expand. Eventually in January 1994, Cisco’s legacy computer system malfunctioned corrupting Cisco’s central database. The company was practically shutdown for two days. As Cisco struggle to recovered from the major shutdown, the company realized that they needed to act quickly and elected to implement an ERP system. Little over a year later, Cisco successfully implemented an ERP system from Oracle. This report has been requested by and prepared for Mr. Peter Solvik, chief information officer CIO) at Cisco System, Inc. Mr. Solvik...

Words: 1835 - Pages: 8

Free Essay

Student Ccna Syllabus

...and Study Guide CISCO SYSTEMS NETWORKING Academy CCNA 2 Chapter 1 WANs and Routers One major characteristic of a wide-area network (WAN) is that the network operates beyond the local LAN's geographic scope. It uses the services of carriers, such as regional Bell operating companies (RBOCs), Sprint, and MCI. WANs use serial connections of various types to access bandwidth over wide-area geographies. By definition, the WAN connects devices that are separated by wide areas. WAN devices include the following: • • • • • • Routers, which offer many services, including internetworking and WAN interface ports Switches, which connect to WAN bandwidth for voice, data, and video communication Modems, which interface voice-grade services and channel service units/digital service units Channel service units/data service units (CSUs/DSUs) that interface T1/E1 services and Terminal Adapters/Network Termination 1 (TA/NT1s) TA/NT1s that interface Integrated Services Digital Network (ISDN) services Communication servers, which concentrate on dial-in and dial-out user communication Concept Questions 1. A WAN is used to interconnect local-area networks (LANs) that are typically separated by a large geographic area. A WAN operates at the OSI reference model physical and data link layers. The WAN provides for the exchange of data packets/frames between routers/bridges and the LANs that they support. Draw a WAN that includes three LANs. 1 of 116 CCNA 2 Chapter 1 WANs and Routers 2. Compare and...

Words: 23437 - Pages: 94

Free Essay

Kamote Kayo

...Project in Data Communication Helen Grace A. Fernandez 201011542 February 9, 2011 Contents 1 Reaction to the Game 2 Description of Hardware 2.1 First Generation . . . . . . . . . 2.1.1 1G Base Station . . . . . 2.1.2 Copper Node . . . . . . . 2.1.3 Coax Node . . . . . . . . 2.1.4 Optical Node . . . . . . . 2.1.5 20 RAS 5850s . . . . . . . 2.1.6 WAN Switch IGX MGX 2.1.7 WAN Switch BPX . . . . 2.1.8 Router 7200 . . . . . . . . 2.1.9 Router 7500 . . . . . . . . 2.1.10 ONS 15454 . . . . . . . . 2.1.11 Mobile Switch MSC . . . 2.1.12 Cable Headend Analog . 2.1.13 Cable Headend Digital . 2.1.14 Telephone Switch . . . . 2.1.15 Second Generation . . . . 2.1.16 50 WiFi Base Stations . 2.1.17 25 MSPPs . . . . . . . . . 2.1.18 10 CMTS UBRs . . . . . 2.1.19 50 DSLAMs . . . . . . . . 2.1.20 25 MWRs . . . . . . . . . 2.1.21 20 Cat2000 Switches . . 2.1.22 Router 7600 . . . . . . . . 2.1.23 Router 10000 . . . . . . . 2.1.24 Router 12000 . . . . . . . 1 8 10 10 10 12 13 14 15 16 17 18 20 22 23 24 25 26 27 28 29 30 31 32 33 34 36 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 35981 - Pages: 144

Free Essay

Capstone

...professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to meet the demands of continued success. table of contents: Staff …………………………………………………………………………………………………………………………………………. 3 Network Requirements ……………………………………………………………………………………………………………. 4 WAN Design …………………………………………………………………………………………………………………………… 12 LAN Design ……………………………………………………………………………………………………………………………. 26 Structured Cabling …………………………………………………………………………………………………………………. 28 Hardware...

Words: 18593 - Pages: 75

Premium Essay

Hello

...Securing Cisco Routers (SECR) Glossary A AAA ABEND Access Access attacks Authentication, Authorization, Accounting. Allows all facets of user security to be defined on a central server. Abnormal END. Abnormal termination of software. 1.) In dealing with network security it is an all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual...

Words: 23221 - Pages: 93

Free Essay

Cisco

...Cisco Systems ERP – Case Study Andree Grecchi Hawai’i Pacific University 2/19/2014 IS 6005 Professor: Ken Rossi Table of Contents Who is Cisco? 2 Prehistorical Infrastructure 4 Seeking for a new start 4 Evaluation 6 Conclusion 7 References 8 Who is Cisco? Cisco is one of the most powerful and successful corporation in the IP network industry. In the fiscal 2013 their revenue totaled $48.6 billion and their Net Income was $10.0 billion (Cisco 2013 Annual Report). Cisco focuses on delivering products and services that consists in integrated networks for all forms of communication and IT. They provide their customers with an integrated architectural approach that gathers application-specific integrated circuits (ASICs) software, hardware, and services. In December 1984 Cisco Systems Inc. was founded by two computer scientist at the Stanford University, Len Bosack and Sandy Lerner, husband and wife. The two lovers wanted to communicate by email from their respective offices, but at the time different local area protocols communications didn’t exist. As a result the first multi-protocol router came out. Since then Cisco lead the networking market allowing “the transportation of voice, data and video within buildings, across campuses and around the world” (Cisco 2013 Annual Report. P.1). This is possible thanks to the routers, its core technology. A router is a device that joins multiple networks together, it allows the connection...

Words: 1508 - Pages: 7

Free Essay

Admin Distance & Junos Route Preferences

...NT2640 Cisco IOS Admin Distances & Juniper JUNOS Route Preferences Introduction Most routing protocols have metric structures and algorithms that are not compatible with other protocols. In a network with multiple routing protocols, the exchange of route information and the capability to select the best path across the multiple protocols are critical. Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. Prerequisites Requirements Cisco recommends that you have knowledge of these topics: * Basics of the routing process. Refer to Routing Basics. Components Used This document is not restricted to specific software and hardware versions. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Select the Best Path Administrative distance is the first criterion that a router uses to determine which routing protocol to use if two protocols provide route information for the same destination. Administrative distance is a measure of the trustworthiness of the source of the routing information. Administrative distance has only local significance, and is not advertised in routing updates...

Words: 1535 - Pages: 7

Premium Essay

Vulnerability in Information

...CHAPTER 1 Vulnerabilities, Threats, and Attacks Upon completion of this chapter, you should be able to answer the following questions: ■ ■ What are the basics concepts of network security? What are some common network security vulnerabilities and threats? ■ ■ What are security attacks? What is the process of vulnerability analysis? Key Terms This chapter uses the following key terms. You can find the definitions in the glossary at the end of the book. Unstructured threats Structured threats External threats Internal threats Hacker Cracker Phreaker Spammer Phisher page 21 page 21 page 21 page 21 page 21 page 20 page 20 page 20 page 21 White hat Black hat page 21 page 21 page 28 page 28 Dictionary cracking Brute-force computation Trust exploitation Port redirection page 28 page 29 page 30 Man-in-the-middle attack Social engineering Phishing page 30 page 30 2 Network Security 1 and 2 Companion Guide The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individuals, businesses, and governments risk losing that asset. Network security is the process by which digital information assets...

Words: 13317 - Pages: 54

Premium Essay

Computer

...THEORY The correct answer(s): D What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP Novell-ether is the default LAN encapsulation. Novell-ether is 802.3. The correct answer(s): A What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP For two routers to exchange IGRP routes they must be configured with the same autonomous system number. The correct answer(s): C The following is partial output from a routing table, identify the 2 numbers in the square brackets; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' A.) 100 = metric, 1300 = administrative distance B.) 100 = administrative distance, 1300 = hop count C.) 100 = administrative distance, 1300 = metric D.) 100 = hop count, 1300 = metric The first number is the Administrative distance and the seconds number is the metric. In this case it is an IGRP metric. The correct answer(s): A B C Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's Routing loops can be prevented by split horizon, poison reverse and holddown times. The other two choices relate to Link State. The correct answer(s): A Which statement is true regarding full duplex? A.) Allows for transmission and receiving...

Words: 23850 - Pages: 96

Free Essay

Capstone Final Documentation

..... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications solutions for various companies since 2005. Cornerstone Communications has throughout the years stayed on top of current networking trends and technologies to ensure reliability and extensive network lifetimes for our customers. Our clients range all across the northeastern states of the U.S. Cornerstone Communications mission to its customers is to provide them a network resolution...

Words: 7795 - Pages: 32

Premium Essay

Alksdjf

...Edition Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall...

Words: 64092 - Pages: 257

Free Essay

Cisco 200 Series Smart Switches

...Sheet Cisco 200 Series Switches Cisco Small Business Build a Powerful, Easy-to-Use Basic Business Network at an Affordable Price The key to succeeding in today’s competitive business environment is investing resources wisely – knowing how to separate the essential from the extraneous and get the most value for your dollars. As the backbone of your business and productivity applications, the small business network clearly falls into the “essential” category. But that doesn’t mean you need the most advanced feature set on the market. ® With Cisco 200 Series Switches, you can achieve business-class network security and performance without paying for advanced network management features that you will not need. When you need a reliable solution to share network resources and connect computers, printers, and servers, but low cost is a top priority, Cisco 200 Series Switches provide the ideal solution. Figure 1. Cisco 200 Series Switches Cisco 200 Series Switches Cisco 200 Series Switches (Figure 1) are a series of affordable smart switches that combine powerful network performance and reliability with the essential network management features you need for a solid business network. These expandable Fast Ethernet or Gigabit Ethernet switches provide basic management, security, and quality-of-service (QoS) features beyond those of an unmanaged or consumer-grade switch, at a lower cost than managed switches. And with an easy-to-use web user interface, Cisco Discovery...

Words: 4820 - Pages: 20

Premium Essay

Ccna

...Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and...

Words: 64092 - Pages: 257

Free Essay

Test

...IPV6 IN DE REALITEIT Stijn Willems Promotoren Dhr. A. Geraerts Dhr. J. Cleuren Cegeka XIOS Hogeschool Limburg Bachelorproef academiejaar 2010-2011 2 IPV6 IN DE REALITEIT Stijn Willems Promotoren Dhr. A. Geraerts Dhr. J. Cleuren Cegeka XIOS Hogeschool Limburg Systemen & Netwerken Bachelorproef academiejaar 2010-2011 XIOS Hogeschool Limburg Universitaire Campus – Gebouw H – 3590 Diepenbeek Cegeka Universiteitslaan 9 – 3500 Hasselt 4 Dankbetuiging Deze scriptie is het eindstadium van mijn professionele bacheloropleiding Toegepaste Informatica aan de XIOS Hogeschool Limburg. Om mijn kennis en vaardigheden in praktijk om te zetten, heeft Cegeka mij de kans gegeven een boeiend stageproject uit te werken. Verschillende mensen hebben hun steentje bijgedragen aan dit eindwerk. Graag zou ik deze mensen willen bedanken voor hun steun en kennis die ze mij hebben toevertrouwd. In de eerste plaats zou ik graag mijn bedrijfspromotor, Andy Geraerts, willen bedanken voor de tijd die hij voor mij heeft vrijgemaakt. Zijn begeleiding en steun hebben mij veel bijgebracht. Verder zou ik graag mijn stagepromotor, Johan Cleuren, willen bedanken voor de steun en het vertrouwen tijdens de realisatie van deze scriptie. Graag richt ik ook een dankwoordje aan alle werknemers van de afdeling Network & Security voor de aangename werksfeer. Mijn bijzondere dank gaat uit naar mijn ouders. Zij hebben mij de kans gegeven om deze opleiding te volgen en hebben mij...

Words: 8346 - Pages: 34