PART PART 1:
VERIFY VERI FY THE DEFAULT DEFAULT SWITCH CONFIGURATION CONF IGURATION
Step 2: b. Answe t!e "#$$#w%n& '(est%#ns: H#w )*n+ F*stEt!enet %nte"*,es -#es t!e sw%t,! !*e/
24 FastEthernet H#w )*n+ G%&*b%t Et!enet %nte"*,es -#es t!e sw%t,! !*e/
2 Gigabit Ethernet interfaces W!*t %s t!e *n&e #" *$(es s!#wn "# t!e t+ $%nes/
0-4 and 5-15 W!%,! ,#))*n- w%$$ -%sp$*+ t!e ,(ent ,#ntents #" n#n0#$*t%$e *n-#)0 *,,ess )e)#+ NVRA3/
Switch#show startup-conguration W!+ -#es t!e sw%t,! esp#nesp#n- w%t! st*t(p0,#n4& %s n#t pesent/
because the start up conguration hasn't been saed !et PART PART 2:
CREATE A 5ASIC SWITCH CONFIGURATION CONF IGURATION
Step 2: W!+ %s t!e $#&%n ,#))*n- e'(%e-/
So that the user wi"" be propted with a "ogin re$uest% re$uest% &ithout it the user won't be ab"e to access the router% Step 6: b.
W!*t %s -%sp$*+e- "# t!e en*b$e se,et p*ssw#-/ p*ssw#-/
5 (1(E)r(*+w$,b.c%/,e4osn0 ,.
W!+ %s t!e en*b$e se,et p*ssw#- -%sp$*+e- -%7eent$+ "#) w!*t we ,#n4&(e-/
because it is an autoatica""! encr!pted password Step 8: I" +#( ,#n4&(e *n+ )#e p*ssw#-s #n t!e sw%t,!9 w%$$ t!e+ be -%sp$*+e- %n t!e ,#n4&(*t%#n 4$e *s p$*%n tet # %n en,+pte- "#)/ Ep$*%n w!+/
he! wi"" be disp"a!ed as p"ain te3t% *f * wanted passwords to be reencr!pted * wou"d need to re-enter the serice password-encr!ption coand% PART ;:
CONFIGURE A OTD 5ANNER
Step 1: W!en w%$$ t!%s b*nne be -%sp$*+e-/
his banner wi"" be disp"a!ed when he user rst gets onto the router% W!+ s!#($- ee+ sw%t,! !*e * OTD b*nne/
o update users on arious actiities and to warn against un-authori6ed access% PART <:
SAVE CONFIGURATION FILES TO NVRA
Step 2: W!*t %s t!e s!#test9 *bbe%*te- es%#n #" t!e ,#p+ (nn%n&0,#n4& st*t(p0 ,#n4& ,#))*n-/
cop! run start Step ;: W!%,! ,#))*n- w%$$ -%sp$*+ t!e ,#ntents #" NVRA/
show startup-conguration Ae *$$ t!e ,!*n&es t!*t wee entee- e,#-e- %n t!e 4$e/
7es