Академический Документы
Профессиональный Документы
Культура Документы
Router>ena
Router#conf
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#line console 0
Router(config-line)#pass letmein
Router(config-line)#login
Router(config-line)#exit
Router(config)#enable pass cisco ->no se encripta la contraseña
Router(config)#enable sec itsasecret -> se encripta la contraseña EXEC privilegiado
Router(config)#banner motd
Router(config)#banner motd "Unauthorized access is strictly prohibited"
Router(config)#service password-encryption
Router(config)#host R1
R1#copy running-config startup-config
S1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
S1(config)#ip de
S1(config)#ip default-gateway 192.168.10.1
S1(config)#exit
S1#copy ru
S1#copy running-config s
S1#copy running-config startup-config
S2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
S2(config)#inter vlan 1
S2(config-if)#ip add 192.168.11.2 255.255.255.0
S2(config-if)#
S2(config-if)#exit
S2(config)#
S2(config)#exit
S2#copy ru
S2#copy running-config st
S2#copy running-config startup-config
Reto de habilidades de integración
Router>ena
Router#show ru
Router#conf t
Router(config)#host Floor14
Floor14(config)#line console 0
Floor14(config-line)#pass cisco
Floor14(config-line)#login
Floor14(config-line)#exit
Floor14(config)#line vty 0 15
Floor14(config-line)#pass cisco
Floor14(config-line)#login Room-146(config-line)#pass cisco
Floor14(config-line)#exit Room-146(config-line)#login
Floor14(config)#ena sec class Room-146(config-line)#
Floor14(config)#service pas Room-146(config-line)#exit
Floor14(config)#service password- Room-146(config)#ena sec class
encryption Room-146(config)#service
Floor14(config)#ban Room-146(config)#service p
Floor14(config)#banner mo Room-146(config)#service password-
Floor14(config)#banner motd "Hola" encryption
Floor14(config)#inter g0/0 Room-146(config)#ba
Floor14(config-if)#ip add 172.14.5.1 Room-146(config)#banner mo
255.255.255.0 Room-146(config)#banner motd "Hola"
Floor14(config-if)#no shu Room-146(config)#
Floor14(config-if)# Room-146(config)#ip default-gateway
Floor14(config-if)#inter g0/1 172.14.10.1
Floor14(config-if)#ip add 172.14.10.1 Room-146(config)#exit
255.255.255.0 Room-146#
Floor14(config-if)#no shu Room-146#conf t
Floor14(config-if)# Enter configuration commands, one per
Floor14(config-if)#exit line. End with CNTL/Z.
Floor14(config)#exit Room-146(config)#inter vlan 1
Floor14# Room-146(config-if)#ip add 172.14.10.35
Floor14#copy running-config startup- 255.255.255.0
config Room-146(config-if)#no shu
Room-146(config-if)#exit
Switch>ena Room-146(config)#exit
Switch#conf t Room-146#copy running-config startup-
Switch(config)#host Room-146 config
Room-146(config)#line console 0
Room-146(config-line)#pass cisco
Room-146(config-line)#login
Room-146(config-line)#exit
Room-146(config)#line vty 0 15
Subnetting Escenario 1 (Cuando se hace subnetting
la porción de hosts más grande para comenzar)
2^3= 8 Subredes
2^5= 32 Hosts para cada subred
192.168.100.0/27 Subred 0
192.168.100.32/27 Subred 1
192.168.100.64/27 Subred 2
192.168.100.96/27 Subred 3
192.168.100.128/27 Subred 4
R1>ena
R1#conf t
R1(config)#inter giga0/0
R1(config-if)#ip add 192.168.100.1
255.255.255.224
R1(config-if)#no shu
R1(config-if)#
R1(config-if)#inter giga0/1
R1(config-if)#ip add 192.168.100.33
255.255.255.224
R1(config-if)#no shu
S3>ena
S3#conf t
S3(config)#inter vlan1
S3(config-if)#ip add 192.168.100.66
255.255.255.224
S3(config-if)#no shu
S3(config-if)#exit
S3(config)#
S3(config)#ip de
S3(config)#ip default-gateway
192.168.100.65
Subnetting Escenario 2
2^4= 16 Subredes
2^4=16 Hosts
172.31.1.0/28
172.31.1.16/28
172.31.1.32/28
172.31.1.48/28
172.31.1.64/28
172.31.1.80/28
172.31.1.96/28
R1>ena S3>ena
R1#conf t S3#show ru
R1(config)#inter giga0/0 S3#conf t
R1(config-if)#ip add 172.31.1.1 S3(config)#inter vlan1
255.255.255.240 S3(config-if)#ip add 172.31.1.34
R1(config-if)#no shu 255.255.255.240
R1(config-if)# S3(config-if)#no shu
R1(config-if)# S3(config-if)#
R1(config-if)#exit S3(config-if)#exit
R1(config)# S3(config)#ip de
R1(config)#inter se0/0/0 S3(config)#ip default-gateway
R1(config-if)#ip add 172.31.1.65 172.31.1.33
255.255.255.240
R1(config-if)#no shu
R1(config-if)#
R1(config-if)#clock rate 64000
R1(config-if)#exit
R2>ena
R2#conf t
R2(config)#inter gig0/0
R2(config-if)#ip add 172.31.1.17
255.255.255.240
R2(config-if)#no shu
Diseño e implementación de un esquema de
direccionamiento VLSM
Building1>ena
Building1#conf t
Building1(config)#inter giga0/1
Building1(config-if)#ip add 192.168.72.0/26
192.168.72.97 255.255.255.224
192.168.72.64/27
Building1(config-if)#no shu
Building1(config-if)#inter giga0/0 192.168.72.96/27
Building1(config-if)#ip add
192.168.72.129 255.255.255.240 192.168.72.128/28
Building1(config-if)#no shu 192.168.72.144/30
ASW-3>ena 192.168.72.148/
ASW-3#conf t
ASW-3(config)#inter vlan1
ASW-3(config-if)#ip add 192.168.72.66
255.255.255.224
ASW-3(config-if)#no shu
ASW-3(config-if)#
ASW-3(config-if)#exit
ASW-3(config)#
ASW-3(config)#ip de
ASW-3(config)#ip default-gateway
192.168.72.65
Skills Integration Challenge
Switch>ena
Switch#conf t
Switch(config)#host Room-146
Room-146(config)#line console 0
Room-146(config-line)#pass xAw6k
Room-146(config-line)#login
Room-146(config-line)#line vty 0 15
Configuring SSH
Packet Tracer PC Command Line 1.0
C:\>telnet 10.10.10.2
Trying 10.10.10.2 ...Open
Password: S1#
S1>ena S1#exit
Password: C:\>telnet 10.10.10.2
Password: Trying 10.10.10.2 ...Open
S1#copy
S1#copy ru [Connection to 10.10.10.2 closed by
S1#copy running-config s foreign host]
S1#copy running-config startup-config C:\>telnet 10.10.10.2
Destination filename [startup-config]? Trying 10.10.10.2 ...Open
Building configuration...
[OK] C:\>ssh -l administrator 10.10.10.2
S1#conf t Open
S1(config)#service pas Password:
S1(config)#service password-encryption
S1(config)#ip dom S1>ena
S1(config)#ip domain- Password:
S1(config)#ip domain-n Password:
S1(config)#ip domain-name netacad.pka Password:
S1(config)#crypto key generate rsa S1#
The name for the keys will be:
S1.netacad.pka
Choose the size of the key modulus in the
range of 360 to 2048 for your
General Purpose Keys. Choosing a key
modulus greater than 512 may take
a few minutes.
Remote-Site1(config)#inter g0/0
Remote-Site1(config-if)#no shu
Remote-Site1(config-if)#ip add
172.31.103.1 255.255.255.224
Remote-Site1(config-if)#exit
Remote-Site1(config)#
Remote-Site1(config)#inter g0/1
Remote-Site1(config-if)#ip add
172.31.103.33 255.255.255.224
Remote-Site1(config-if)#no shu
Sw3(config)#inter vlan1
Sw3(config-if)#ip add 172.31.103.66 255.255.255.240
Sw3(config-if)#no shu
Sw3(config-if)#
Sw3(config-if)#exit
Sw3(config)#ip default-gateway 172.31.103.65
172.31.103.0/27
172.31.103.32/27
172.31.103.64/28
172.31.103.80/28
172.31.103.96/30
172.31.103.100/30
Configuring IPv4 Route Summarization - Scenario 1
172.31.157.0
172.31.157.96
172.31.157.64
172.31.157.00000000
172.31.157.01100000
172.31.157.01000000
---------------------------
172.31.157.0/25
255.255.255.128
HQ
172.22.64.0
172.22.66.0
172.22.01000000.0
172.22.01000010.0
------------------------
172.22.64.0/22
255.255.252.0
B1
172.22.70.0
172.22.70.128 HQ(config)#ip route 172.22.70.0
172.22.70.00000000 255.255.255.0 Serial0/0/0
172.22.70.10000000 HQ(config)#ip route 172.22.68.0
------------------------- 255.255.254.0 172.22.71.6
172.22.70.0/24 Branch1(config)#ip route 198.0.0.0
255.255.255.0 255.255.255.252 Serial0/0/0
Branch1(config)#ip route 172.22.71.4
B2 255.255.255.252 Serial0/0/0
172.22.68.0 Branch1(config)#ip route 172.22.64.0
172.22.69.0 255.255.252.0 172.22.71.1
Branch1(config)#ip route 172.22.68.0
172.22.01000100.0 255.255.254.0 172.22.71.1
172.22.01000101.0
----------------------- Branch2(config)#ip route 198.0.0.0
255.255.255.252 Serial0/0/1
172.22.68.0/23
Branch2(config)#ip route 172.22.71.0
255.255.254.0
255.255.255.252 Serial0/0/1
ISP Branch2(config)#ip route 172.22.70.0
255.255.255.0 Serial0/0/1
172.22.64.0 Branch2(config)#ip route 172.22.64.0
172.22.70.0 255.255.252.0 172.22.71.5
172.22.68.0
ISP(config)#ip route 172.22.64.0
172.22.01000000.0 255.255.248.0 198.0.0.2
172.22.01000110.0
172.22.01000100.0
-----------------------
172.22.64.0/21
255.255.248.0
Configuring a Floating Static
Route
Una ruta estática flotante que se utiliza
como ruta de respaldo. Esta ruta tiene una
distancia administrativa configurada
manualmente mayor que la de la ruta
principal y, por lo tanto, no aparece en la
tabla de routing hasta que la ruta principal
falla.
Edge_Router(config)# ip route 0.0.0.0 0.0.0.0 s0/0/0
Edge_Router(config)# ip route 0.0.0.0 0.0.0.0 s0/0/1 5
Configuring RIPv2
R1(config)#router rip
R1(config-router)#version 2
R1(config-router)#net 192.168.1.0
R1(config-router)#net 192.168.2.0
R1(config-router)#net 64.100.0.0
R1(config-router)#no auto-summary
R1(config-router)#default-information
originate
R1(config-router)#passive-interface g0/0
R1(config-router)#exit
R1(config)#ip route 0.0.0.0 0.0.0.0 s0/0/1
R1(config)#router eigrp 1
R1(config-router)#net 172.16.1.0
0.0.0.255
R1(config-router)#net 192.168.10.4
0.0.0.3
R1(config-router)#net 172.16.3.0 0.0.0.3
R1(config-router)#no auto-summary
R1(config-router)#passive-interface g0/0
2) CHAD
Notice that one of the options is <cr> (carriage return). In other words, you can
press Enter and the statement would permit all TCP traffic. However, we are only permitting
FTP traffic; therefore, enter theeq keyword, followed by a question mark to display the
available options. Then, enter ftp and pressEnter.
The prompt changes. You are now in extended named ACL configuration mode. All devices on
the PC2LAN need TCP access. Enter the network address, followed by a question mark.
S3(config)#vlan 10
S3(config-vlan)#name Faculty/Staff
S3(config-vlan)#vlan 20
S3(config-vlan)#name Students
S3(config-vlan)#vlan 30
S3(config-vlan)#name Guest(Default)
S3(config-vlan)#vlan 99
Configuring Trunks
S1(config)#inter range g0/1-2
S1(config-if-range)#swit
S1(config-if-range)#switchport mode tru
S1(config-if-range)#switchport mode trunk
S1(config-if-range)#switchport trunk native vlan
99
S1(config-if-range)#switchport trunk allowed
vlan 10,20,30,99
S2(config)#inter g0/1
S2(config-if)#switchport trunk native vlan 99
S2(config-if-range)#switchport trunk allowed
vlan 10,20,30,99
S3(config)#inter g0/2
S3(config-if)#switchport trunk native vlan 99
S3(config-if-range)#switchport trunk allowed vlan 10,20,30,99
R2(config)#ipv6 unicast-routing
R2(config)#ipv6 router ospf 10
R2(config-rtr)#router
R2(config-rtr)#router-id 2.2.2.2
R2(config-rtr)#end
R2#clear ipv6 ospf process
R2#conft
R2(config)#inter g0/0
R2(config-if)#ipv6 os
R2(config-if)#ipv6 ospf 10 area 0
R2(config-if)#inter s0/0/0
R2(config-if)#ipv6 ospf 10 area 0
R2(config-if)#inter s0/0/1
R2(config-if)#ipv6 ospf 10 area 0
R3(config)#ipv6 unicast-routing
R3(config)#ipv6 router ospf 10
R3(config-rtr)#router-id 3.3.3.3
R3(config-rtr)#exit
R3(config)#inter g0/0
R3(config-if)#ipv6 ospf 10 area 0
R3(config-if)#inter s0/0/0
R3(config-if)#ipv6 ospf 10 area 0
R3(config-if)#inter s0/0/1
R3(config-if)#ipv6 ospf 10 area 0
Configuring DHCP Using Cisco IOS
R2(config)#ip dhcp excluded-address 192.168.10.1 192.168.10.10
R2(config)#ip dhcp excluded-address 192.168.30.1 192.168.30.10
R2(config)#ip dhcp pool R1-LAN
R2(dhcp-config)#net 192.168.10.0 255.255.255.0
R2(dhcp-config)#default-router 192.168.10.1
R2(dhcp-config)#dns-server 192.168.20.254
R2(dhcp-config)#exi
R2(config)#ip dhcp pool R3-LAN
R2(dhcp-config)#net 192.168.30.0 255.255.255.0
R2(dhcp-config)#default-router 192.168.30.1
R2(dhcp-config)#dns-server 192.168.20.254
R2(dhcp-config)#exit
R2(config)#inter g0/1
R2(config-if)#ip add dhcp
R2(config-if)#no shu
R2(config-if)#no shutdown
R1#conf t
R1(config)#inter g0/0
R1(config-if)#ip helper-address 10.1.1.2
R3#conf t
R3(config)#inter gi0/0
R3(config-if)#ip helper-address 10.2.2.2
Configuring GRE
RA(config)#inter tunnel 0
RA(config-if)#ip add 10.10.10.1 255.255.255.252
RA(config-if)#tunnel source s0/0/0
RA(config-if)#tunnel destination 209.165.122.2
RA(config-if)#
RA(config-if)#tunnel mode gre ip
RA(config-if)#no shu
RA(config-if)#no shutdown
RA(config-if)#exit
RA(config)#ip route 192.168.2.0 255.255.255.0 10.10.10.2
RB(config)#inter tunnel 0
RB(config-if)#ip add 10.10.10.2 255.255.255.252
RB(config-if)#tunnel source s0/0/0
RB(config-if)#tunnel destination 64.103.211.2
RB(config-if)#tunnel mode gre ip
RB(config-if)#no sh
RB(config-if)#exit
RB(config)#ip route 192.168.1.0 255.255.255.0 10.10.10.1