2.5.5 Packet Tracer Configure Initial Switch Settings Converter
2.5.5 Packet Tracer Configure Initial Switch Settings Converter
Objectives
Part 1: Verify the Default Switch Configuration
Part 2: Configure a Basic Switch
Configuration Part 3: Configure a MOTD
Banner
Part 4: Save Configuration Files to NVRAM
Part 5: Configure S2
Background / Scenario
In this activity, you will perform basic switch configuration tasks. You will secure access to the command-line
interface (CLI) and console ports using encrypted and plain text passwords. You will also learn how to
configure messages for users logging into the switch. These message banners are also used to warn
unauthorized users that access is prohibited.
Note: In Packet Tracer, the Catalyst 2960 switch uses IOS version 12.2 by default. If required, the IOS
version can be updated from a file server in the Packet Tracer topology. The switch can then be configured to
boot to IOS version 15.0, if that version is required.
Instructions
2015 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of www.netacad.com
Packet Tracer - Configure Initial Switch Settings
Which command will display the current contents of non-volatile random-access memory (NVRAM)?
show startup-configuration
Why does the switch respond with “startup-config is not present?”
It displays this message because the configuration file was not saved to
NVRAM. It is currently only located in RAM.
Note: If the switch did not prompt you for a password, then you did not configure the login parameter in Step
2.
2015 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of www.netacad.com
Step 4: Secure privileged mode access.
Set the enable password to c1$c0. This password protects access to privileged mode.
Note: The 0 in c1$c0 is a zero, not a capital O. This password will not grade as correct until after you encrypt
it in Step 8.
S1> enable
S1# configure terminal
S1(config)# enable password c1sc0
S1(config)# exit
%SYS-5-CONFIG_I: Configured from console by console
S1#
Step 7: Verify that the enable secret password is added to the configuration file.
Enter the show running-config command again to verify the new enable secret password is configured.
Note: You can abbreviate show running-config as
S1# show run
What is displayed for the enable secret password?
$1$mERr$ILwq/b7kc.7X/ejA4Aosn0
Why is the enable secret password displayed differently from what we configured?
The enable secret is shown in encrypted form, whereas the enable password is
in plain text.
Step 8: Encrypt the enable and console passwords.
As you noticed in Step 7, the enable secret password was encrypted, but the enable and console
passwords were still in plain text. We will now encrypt these plain text passwords using the service
password-encryption command.
S1# config t
S1(config)# service password-encryption
S1(config)# exit
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text
or in encrypted form? Explain.
The service password-encryption command encrypts all current and future
passwords.
What is the shortest, abbreviated version of the copy running-config startup-config command?
cop r s
Part 5: Configure S2
You have completed the configuration on S1. You will now configure S2. If you cannot remember the
commands, refer to Parts 1 to 4 for assistance.
Configure S2 with the following parameters:
a. Device name: S2
b. Protect access to the console using the letmein password.
c. Configure an enable password of c1sc0 and an enable secret password of itsasecret.
d. Configure an appropriate message to those logging into the switch.
e. Encrypt all plain text passwords.
f. Ensure that the configuration is correct.
g. Save the configuration file to avoid loss if the switch is powered down.
Switch> enable
Switch# config t
Switch(config)# hostname S2
S2(config)# line console 0
S2(config-line)# password letmein
S2(config-line)# login
S2(config)# service password-encryption