11.3.4.6 Lab - Using the CLI to Gather Network Device Information
Lab – Using the CLI to Gather Network Device
Information
Topology
Addressing Table
Device
|
Interface
|
IP Address
|
Subnet Mask
|
Default Gateway
|
R1
|
G0/1
|
192.168.1.1
|
255.255.255.0
|
N/A
|
Lo0
|
209.165.200.225
|
255.255.255.224
|
N/A
|
S1
|
VLAN 1
|
192.168.1.11
|
255.255.255.0
|
192.168.1.1
|
PC-A
|
NIC
|
192.168.1.3
|
255.255.255.0
|
192.168.1.1
|
Objectives
Part 1: Set Up Topology and
Initialize Devices
Part 2: Configure Devices and Verify
Connectivity
Part 3: Gather Network Device
Information
Background / Scenario
Documenting a working network is one of
the most important tasks a network professional can perform. Having proper
documentation of IP addresses, model numbers, IOS versions, ports used, and
testing security, can go a long way in helping to troubleshoot a network.
In this lab, you will build a small
network, configure the devices, add some basic security, and then document the
configurations by issuing various commands on the router, switch and PC to
gather your information.
Note: The routers used with CCNA hands-on labs
are Cisco 1941 Integrated Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3
(universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release
15.0(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can
be used. Depending on the model and Cisco IOS version, the commands available
and output produced might vary from what is shown in the labs. Refer to the
Router Interface Summary Table at the end of this lab for the correct interface
identifiers.
Note: Make sure that the routers and switches have been erased and have
no startup configurations. If you are unsure, contact your instructor.
Required Resources
·
1 Router (Cisco 1941 with Cisco
IOS Release 15.2(4)M3 universal image or comparable)
·
1 Switch (Cisco 2960 with Cisco
IOS Release 15.0(2) lanbasek9 image or comparable)
·
1 PC (Windows 7 or 8 with
terminal emulation program, such as Tera Term)
·
Console cables to configure the
Cisco IOS devices via the console ports
·
Ethernet cables as shown in the
topology
Part 1: Set Up the Topology and Initialize Devices
In Part 1, you will set up the network
topology, clear any configurations if necessary, and configure basic settings
on the router and switch.
Step 1: Cable the network as shown in the topology.
a.
Attach the devices as shown in
the topology and cable as necessary.
b.
Power on all devices in the
topology.
Step 2: Initialize and reload the router and the switch.
Part 2: Configure Devices and Verify Connectivity
In Part 2, you will set up the network
topology and configure basic settings on the router and switch. Refer to the topology
and Addressing Table at the beginning of this lab for device names and address
information.
Step 1: Configure the IPv4 address for the PC.
Configure the IPv4 address, subnet mask,
and default gateway address for PC-A based on the Addressing Table.
Step 2: Configure the router.
a.
Console into the router and
enter privileged EXEC mode.
b.
Set the correct time on the
router.
c.
Enter global configuration
mode.
1)
Assign a device name to the
router based on the topology and Addressing Table.
2)
Disable DNS lookup.
3)
Create a MOTD banner that warns
anyone accessing the device that unauthorized access is prohibited.
4)
Assign class as the privileged EXEC encrypted password.
5)
Assign cisco as the console password and enable console login access.
6)
Encrypt clear text passwords.
7)
Create a domain name of cisco.com for SSH access.
8)
Create a user named admin with a secret password of cisco for SSH access.
9)
Generate a RSA modulus key. Use
1024 for the number of bits.
d.
Configure VTY line access.
1)
Use the local database for
authentication for SSH.
2)
Enable SSH only for login
access.
e.
Return to global configuration
mode.
1)
Create the Loopback 0 interface
and assign the IP address based on the Addressing Table.
2)
Configure and activate
interface G0/1 on the router.
3)
Configure interface descriptions
for G0/1 and L0.
4)
Save the running configuration
file to the startup configuration file.
Step 3: Configure the switch.
a.
Console into the switch and
enter privileged EXEC mode.
b.
Set the correct time on the
switch.
c.
Enter global configuration
mode.
1)
Assign a device name on the
switch based on the topology and Addressing Table.
2)
Disable DNS lookup.
3)
Create a MOTD banner that warns
anyone accessing the device that unauthorized access is prohibited.
4)
Assign class as the privileged EXEC encrypted password.
5)
Encrypt the clear text
passwords.
6)
Create a domain name of cisco.com for SSH access.
7)
Create a user named admin with a secret password of cisco for SSH access.
8)
Generate an RSA key. Use 1024 for the number of bits.
9)
Create and activate an IP
address on the switch based on the topology and Addressing Table.
10) Set the default gateway on the switch.
11) Assign cisco as the console
password and enable console login access.
d.
Configure VTY line access.
1)
Use local database for
authentication for SSH.
2)
Enable SSH only for login
access.
3)
Save the running configuration
file to the startup configuration file.
e.
Enter proper mode to configure
interface descriptions for F0/5 and F0/6.
Step 4: Verify network connectivity.
a.
From a command prompt on PC-A,
ping the S1 VLAN 1 IP address. Troubleshoot your physical and logical
configurations if the pings were not successful.
b.
From the PC-A command prompt, ping your default gateway IP address on R1. Troubleshoot
your physical and logical configurations if the pings were not successful.
c.
From the PC-A command prompt, ping the loopback interface on R1. Troubleshoot your physical and logical configurations if the pings
were not successful.
d.
Console back into the switch and ping the G0/1 IP address on R1. Troubleshoot your
physical and logical configurations if the pings were not successful.
Part 3: Gather Network Device Information
In Part 3, you will use a variety of
commands to gather information about the devices on your network, as well as
some performance characteristics. Network documentation is a very important
component of managing your network. Documentation of both physical and logical
topologies is important, as is verifying platform models and IOS versions of
your network devices. Having knowledge of the proper commands to gather this
information is essential for a network professional.
Step 1: Gather information on R1 using IOS commands.
One of the most basic steps is to gather
information on the physical device, as well as information on the operating
system.
a.
Issue the appropriate command
to discover the following information:
Router Model: __Cisco 1941 Router________________________________
IOS Version: _______15.2(4)M3___________________________
Total RAM: _______512MB___________________________
Total NVRAM: _______255K bytes___________________________
Total Flash
Memory: _____250880K bytes_____________________________
IOS Image File: ___c1900-universalk9-mz.SPA.152-4.M3.bin _______________________________
Configuration
Register: ____0x2102______________________________
Technology
Package: _________ipbasek9_________________________
What command did you issue to gather the
information?
______The show version command can be used from either the user EXEC or
privileged EXEC prompt._______________________________________________________
b.
Issue the appropriate command
to display a summary of important information about the router interfaces.
Write down the command and record your results below.
Note: Only record interfaces that have
IP addresses.
____The
show ip interface brief command can be used from either the user EXEC or
privileged EXEC prompt.
Interface
IP-Address OK? Method Status
Protocol
GigabitEthernet0/1
192.168.1.1 YES NVRAM up up
Loopback0
209.165.200.225 YES NVRAM up up
<some output omitted>________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
c.
Issue the appropriate command
to display the routing table. Write down the command and record your results
below.
_______The show ip route command can be used from either the user EXEC
or privileged EXEC prompt.
192.168.1.0/24 is variably
subnetted, 2 subnets, 2 masks
C 192.168.1.0/24 is
directly connected, GigabitEthernet0/1
L 192.168.1.1/32 is
directly connected, GigabitEthernet0/1
209.165.200.0/24 is
variably subnetted, 2 subnets, 2 masks
C 209.165.200.224/27 is
directly connected, Loopback0
L 209.165.200.225/32 is
directly connected, Loopback0 _____________________________________________________________________________
d.
What command would you use to
display the Layer 2 to Layer 3 mapping of addresses on the router? Write down
the command and record your results below.
__________The show arp command can be used from either the user
EXEC or privileged EXEC prompt.
Protocol Address Age (min) Hardware Addr Type
Interface
Internet 192.168.1.1 –
30f7.0da3.1821 ARPA GigabitEthernet0/1
Internet 192.168.1.3 0
c80a.a9fa.de0d ARPA GigabitEthernet0/1
Internet 192.168.1.11 2
0cd9.96d2.34c0 ARPA GigabitEthernet0/1 __________________________________________________________________________
e.
What command would you use to
see detailed information about all the interfaces on the router or about a
specific interface? Write down the command below.
___The show interfaces command
can be used from either the user EXEC or privileged EXEC prompt. _________________________________________________________________________________
f.
Cisco has a very powerful
protocol that operates at Layer 2 of the OSI model. This protocol can help you
map out how Cisco devices are connected physically, as well as determining
model numbers and even IOS versions and IP addressing. What command or commands
would you use on router R1 to find out information about switch S1 to help you complete
the table below?
Device ID
|
Local Interface
|
Capability
|
Model #
|
Remote Port ID
|
IP Address
|
IOS Version
|
S1.cisco.com
|
G 0/1
|
Switch
|
WS-2960-24TT-L
|
F 0/5
|
192.168.1.11
|
15.0(2)SE1
|
The show cdp
neighbors detail command can be used from either the user EXEC or privileged
EXEC prompt.
g.
A very elementary test of your
network devices is to see if you can telnet into them. Remember, Telnet is not a
secure protocol. It should not be enabled in most cases. Using a Telnet client,
such as Tera Term or PuTTY, try to telnet to R1 using the default gateway IP address.
Record your results below.
___Tera Term Output: Connection refused. ________________________________________________________________________________
h.
From PC-A, test to ensure that SSH
is working properly. Using an SSH client, such as Tera Term or PuTTY, SSH into
R1 from PC-A. If you get a warning message regarding a different key, click Continue. Log in with the appropriate username
and password you created in Part 2. Were you successful?
__yes_________________________________________________________________________________
The various passwords configured on your router should be as strong and protected as
possible.
Note: The passwords used for our lab (cisco and class)
do not follow the best practices needed for strong passwords. These passwords
are used merely for the convenience of performing the labs. By default, the
console password and any vty passwords configured would display in clear text
in your configuration file.
i.
Verify that all of your
passwords in the configuration file are encrypted. Write down the command and
record your results below.
Command: __The
show running-config or show run command can be used from the privileged EXEC
prompt.______________________________________________
Is the console password encrypted? _____yes_____________________
Is the SSH password encrypted? _____________yes________________
Step
2: Gather information on S1 using IOS commands.
Many of the commands that you used on R1
can also be used with the switch. However, there are some differences with some
of the commands.
a.
Issue the appropriate command
to discover the following information:
Switch Model: _WS-C2960-24TT-L_________________________________
IOS Version: ____15.0(2)SE1______________________________
Total NVRAM: _____
64K_____________________________
IOS Image File: ______c2960-lanbasek9-mz.150-2.SE1.bin____________________________
What command did you issue to gather the
information?
____The show version command can be used from either the user EXEC or
privileged EXEC prompt._________________________________________________________
b.
Issue the appropriate command to display a summary of status information
about the switch interfaces. Write down the command and record your results below.
Note: Only record active interfaces.
____The show ip interface brief command can be used from either the user
EXEC or privileged EXEC prompt.
Interface
IP-Address OK? Method
Status Protocol
Vlan1
192.168.1.11 YES NVRAM up up
FastEthernet0/5 unassigned YES unset
up up
FastEthernet0/6
unassigned YES unset up up
<some output omitted> ________________________________________________________________________________
c.
Issue the appropriate command to
display the switch MAC address table. Record the dynamic type
MAC addresses only in the space below.
____The
show mac address-table command can be used from either the user EXEC or
privileged EXEC prompt.
Mac Address
Table
——————————————-
Vlan Mac
Address Type Ports
—- ———– ——–
—–
1 30f7.0da3.1821 DYNAMIC
Fa0/5
1 c80a.a9fa.de0d DYNAMIC
Fa0/6 _______________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
d.
Verify that Telnet VTY access is disabled on S1. Using a Telnet client, such as Tera Term or PuTTY, try to telnet to
S1 using the 192.168.1.11 address. Record your results below.
__Tera
Term Output: Connection refused. _________________________________________________________________________________
e.
From PC-A, test to ensure that SSH is working properly. Using an SSH
client, such as Tera Term or PuTTY, SSH into S1 from PC-A. If you get a warning message regarding
a different key, click Continue. Log in with an appropriate username and password. Were you successful?
___yes________________________________________________________________________________
f.
Complete the table below with information about router R1 using the appropriate command or
commands necessary on S1.
Device Id
|
Local Interface
|
Capability
|
Model #
|
Remote Port ID
|
IP Address
|
IOS Version
|
R1.cisco.com
|
F 0/5
|
Router
|
CISCO1941/K9
|
G 0/1
|
192.168.1.1
|
15.2(4)M3
|
The
show cdp neighbors detail command can be used from
either the user EXEC or privileged EXEC prompt.
g.
Verify that all of your passwords in the configuration file
are encrypted. Write down the command and record your results below.
Command: _The
show running-config or show run command can be used
from the privileged EXEC prompt. _______________________________________________
Is the console password encrypted?
____yes______________________
Step
3: Gather
information
on PC-A.
Using various Windows utility commands,
you will gather information on PC-A.
a.
From the PC-A command prompt,
issue the ipconfig /all command and
record your answers below.
What is the PC-A IP address?
______192.168.1.3______________________________________________________________________________
What is the PC-A subnet mask?
_______255.255.255.0_____________________________________________________________________________
What is the PC-A default gateway address?
________192.168.1.1____________________________________________________________________________
What is the PC-A MAC address?
______Answers will vary. ______________________________________________________________________________
b.
Issue the appropriate command
to test the TCP/IP protocol stack with the NIC. What command did you use?
______C:\> ping 127.0.0.1
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128 ______________________________________________________________________________
c.
Ping the loopback interface of R1 from the PC-A command prompt. Was the ping successful?
_____yes_______________________________________________________________________________
d.
Issue the appropriate command on PC-A to trace the list of
router hops for packets originating from PC-A to the loopback interface on R1.
Record the command and output below. What command did
you use?
__C:\>
tracert 209.165.200.225
Tracing route to 209.165.200.225
over a maximum of 30 hops
1 1 ms
1 ms 1 ms 209.165.200.225
Trace complete. __________________________________________________________________________________
____________________________________________________________________________________
e.
Issue the appropriate command on PC-A to find the Layer 2 to Layer 3 address mappings held on your NIC. Record your answers below. Only record
answers for the 192.168.1.0/24 network. What command did you use?
___C:\>
arp –a
Interface: 192.168.1.3 — 0xb
Internet
Address Physical Address Type
192.168.1.1 30-f7-0d-a3-18-21 dynamic
192.168.1.11 0c-d9-96-d2-34-c0 dynamic
192.168.1.255 ff-ff-ff-ff-ff-ff static _________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Reflection
Why is it important to document your
network devices?
_______Having the proper information including: IP addresses,
physical port connections, IOS versions, copies of configuration files, and the
amount of memory storage, can greatly aid you when troubleshooting and
performing network baseline tests. Having good documentation can also help you
recover from network outages and replacing equipment when necessary.________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Router Interface Summary Table
Router Interface Summary
|
Router Model
|
Ethernet Interface #1
|
Ethernet Interface #2
|
Serial Interface #1
|
Serial Interface #2
|
1800
|
Fast Ethernet 0/0 (F0/0)
|
Fast Ethernet 0/1 (F0/1)
|
Serial 0/0/0 (S0/0/0)
|
Serial 0/0/1 (S0/0/1)
|
1900
|
Gigabit Ethernet 0/0 (G0/0)
|
Gigabit Ethernet 0/1 (G0/1)
|
Serial 0/0/0 (S0/0/0)
|
Serial 0/0/1 (S0/0/1)
|
2801
|
Fast Ethernet 0/0 (F0/0)
|
Fast Ethernet 0/1 (F0/1)
|
Serial 0/1/0 (S0/1/0)
|
Serial 0/1/1 (S0/1/1)
|
2811
|
Fast Ethernet 0/0 (F0/0)
|
Fast Ethernet 0/1 (F0/1)
|
Serial 0/0/0 (S0/0/0)
|
Serial 0/0/1 (S0/0/1)
|
2900
|
Gigabit Ethernet 0/0 (G0/0)
|
Gigabit Ethernet 0/1 (G0/1)
|
Serial 0/0/0 (S0/0/0)
|
Serial 0/0/1 (S0/0/1)
|
Note: To find out how the router is configured, look at the interfaces
to identify the type of router and how many interfaces the router has. There
is no way to effectively list all the combinations of configurations for each
router class. This table includes identifiers for the possible combinations
of Ethernet and Serial interfaces in the device. The table does not include
any other type of interface, even though a specific router may contain one.
An example of this might be an ISDN BRI interface. The string in parenthesis
is the legal abbreviation that can be used in Cisco IOS commands to represent
th
e interface.
|
http://erdoganakbiyik.blogspot.com/https://www.youtube.com/channel/UCDsUnmBfVdEPkcC8FlzPKcg