Question

In: Computer Science

Note: If the switch did not prompt you for a password, then you did not configure...

Note: If the switch did not prompt you for a password, then you did not configure the login parameter in Step 2.

Step 4:     Secure privileged mode access.

Set the enable password to c1$c0. This password protects access to privileged mode.

Note: The 0 in c1$c0 is a zero, not a capital O. This password will not grade as correct until after you encrypt it in Step 8.

S1> enable

S1# configure terminal

S1(config)# enable password c1$c0

S1(config)# exit

%SYS-5-CONFIG_I: Configured from console by console

S1#

Step 5:     Verify that privileged mode access is secure.

a.     Enter the exit command again to log out of the switch.

b.    Press <Enter> and you will now be asked for a password:

User Access Verification

Password:

c.     The first password is the console password you configured for line con 0. Enter this password to return to user EXEC mode.

d.    Enter the command to access privileged mode.

e.     Enter the second password you configured to protect privileged EXEC mode.

f.     Verify your configurations by examining the contents of the running-configuration file:

S1# show running-config

Notice how the console and enable passwords are both in plain text. This could pose a security risk if someone is looking over your shoulder.

Step 6:     Configure an encrypted password to secure access to privileged mode.

The enable password should be replaced with the newer encrypted secret password using the enable secret command. Set the enable secret password to itsasecret.

S1# config t

S1(config)# enable secret itsasecret

S1(config)# exit

S1#

Note: The enable secret password overrides the enable password. If both are configured on the switch, you must enter the enable secret password to enter privileged EXEC mode.

Step 7:     Verify that the enable secret password is added to the configuration file.

a.     Enter the show running-config command again to verify the new enable secret password is configured.

Note: You can abbreviate show running-config as

S1# show run

b.    What is displayed for the enable secret password?

c.     Why is the enable secret password displayed differently from what we configured?

Step 8:     Encrypt the enable and console passwords.

As you noticed in Step 7, the enable secret password was encrypted, but theenable and console passwords were still in plain text. We will now encrypt these plain text passwords using the service password-encryptioncommand.

S1# config t

S1(config)# service password-encryption

S1(config)# exit

If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypted form? Explain.

Part 3:     Configure a MOTD Banner

Step 1:     Configure a message of the day (MOTD) banner.

The Cisco IOS command set includes a feature that allows you to configure messages that anyone logging onto the switch sees. These messages are called message of the day, or MOTD banners. Enclose the banner text in quotations or use a delimiter different from any character appearing in the MOTD string.

S1# config t

S1(config)# banner motd "This is a secure system.Authorized Access Only!"

S1(config)# exit

%SYS-5-CONFIG_I: Configured from console by console

S1#

1)     When will this banner be displayed?

2)     Why should every switch have a MOTD banner?

Part 4:     Save Configuration Files to NVRAM

Step 1:     Verify that the configuration is accurate using the show run command.

Step 2:     Save the configuration file.

You have completed the basic configuration of the switch. Now back up the running configuration file to NVRAM to ensure that the changes made are not lost if the system is rebooted or loses power.

S1# copy running-config startup-config

Destination filename [startup-config]?[Enter]

Building configuration...

[OK]

What is the shortest, abbreviated version of the copy running-config startup-config command?

Step 3:     Examine the startup configuration file.

Which command will display the contents of NVRAM?

Are all the changes that were entered recorded in the file?

Part 5:     Configure S2

You have completed the configuration on S1. You will now configure S2. If you cannot remember the commands, refer to Parts 1 to 4 for assistance.

Configure S2 with the following parameters:

a.     Name device: S2

b.    Protect access to the console using the letmein password.

c.     Configure an enable password of c1$c0 and an enable secret password of itsasecret.

d.    Configure a message to those logging into the switch with the following message:

Authorized access only. Unauthorized access is prohibited and violators will be prosecuted to the full extent of the law.

e.     Encrypt all plain text passwords.

f.     Ensure that the configuration is correct.

g.    Save the configuration file to avoid loss if the switch is powered down.

Suggested Scoring Rubric

Activity Section

Question Location

Possible Points

Earned Points

Part 1: Verify the Default Switch Configuration

Step 2b, q1

2

Step 2b, q2

2

Step 2b, q3

2

Step 2b, q4

2

Step 2b, q5

2

Part 1 Total

10

Part 2: Create a Basic Switch Configuration

Step 2

2

Step 7b

2

Step 7c

2

Step 8

2

Part 2 Total

8

Part 3: Configure a MOTD Banner

Step 1, q1

2

Step 1, q2

2

Part 3 Total

4

Part 4: Save Configuration Files to NVRAM

Step 2

2

Step 3, q1

2

Step 3, q2

2

Part 4 Total

6

Packet Tracer Score

72

Total Score

100

Solutions

Expert Solution

What is displayed for the enable secret password?
yes it will because its not encrypted bunch of symbols

Why is the enable secret password displayed differently from what we configured?
it is encrypted within those symbols

If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypted form?

they will be displayed a plain text because the command is not a always a running command

When will this banner be displayed?

when the user gets on the switch


Why should every switch have a MOTD banner?

it keeps the user updated on whats going on

if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and we can edit and change the answers if you argue, thanks :)


Related Solutions

Write a program using the switch statement to calculate geometric quantities. Prompt the user to enter...
Write a program using the switch statement to calculate geometric quantities. Prompt the user to enter a radius. Then present a menu of choices for quantities to be calculated from that radius:                         A         Area of a Circle                         C         Circumference of a Circle                         S          Surface Area of a Sphere                         V         Volume of a Sphere Prompt the user to enter the character corresponding to the quantity to be calculated. Use a switch statement to handle the calculations. Use...
If you forget your password for a website and you click [Forgot my password], sometimes the...
If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.
Switch gears and find the CAFR of a college or university.  Note: it may be hard to...
Switch gears and find the CAFR of a college or university.  Note: it may be hard to find one for private institutions.     What funds does this institution use regularly and for what purposes?
A symmetric password is used to encrypt an insurance policy PDF. You discover that the password...
A symmetric password is used to encrypt an insurance policy PDF. You discover that the password is always 7 characters long. The first two digits is the state abbreviation (e.g. New Jersey is NJ) and the last 5 digits is the zip code where the insurance policy is created. Using brute force, how many possible combinations are there?
Prompt: Using the following assumptions, create the project budget. Note that this is a two -...
Prompt: Using the following assumptions, create the project budget. Note that this is a two - year budget, so you will need to show both years. Also, calculate the initial ROI for this project. You do not have to consider the time value of money In this problem. § § Assume that Blazer reevaluates the sales potential of this project, and realizes that it will likely only sell half as many new units per year than it initially expected when...
At the command prompt, type cd etc and press Enter. What error message did you receive...
At the command prompt, type cd etc and press Enter. What error message did you receive and why?
choose a note-taking strategy and answer the following questions: What note-taking strategy did you select? Why?...
choose a note-taking strategy and answer the following questions: What note-taking strategy did you select? Why? How will the note-taking strategy you selected help you study? How does this compare to other note-taking strategies you looked at this week? Your Discussion should be at least 250 words in length, but not more than 750 words. Use APA citations and references for the textbook and any other sources used. Be sure to attach your notes on the chapter to your discussion...
you will create an IFTTT account and then select and configure one of the provided Applets....
you will create an IFTTT account and then select and configure one of the provided Applets. Deliverables for this homework are: A Word Document that contains: A screen shot of the successful account creation A screen shot of the configured Applet A detailed description of the Applet; what Services, Triggers and Actions are used and why you choose this Applet.
Goal: in this lab, you will learn to configure sudo to allow a user mrussell to...
Goal: in this lab, you will learn to configure sudo to allow a user mrussell to change password for users. Please follow the steps and answer all the questions at the end of the lab instruction. In the Linux machine ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. For this part you will need a 2nd normal user (non-root) account. If you don't have an account for "auser" with password “room1202” yet, you can create one by running (as room1202): $ sudo useradd -c "A User"...
how do you configure the percent composition of a simple and fractional distillation of cyclohexane and...
how do you configure the percent composition of a simple and fractional distillation of cyclohexane and toluene simple 69C fractional 68C
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT