Setting Router Passwords

In: Computers and Technology

Submitted By tlantz
Words 898
Pages 4
Unit 3 Labs
Lab 9: Setting Router Passwords
Step 4. Configure the router to require a password of ciscopress when connecting through the console. To do so, start by issuing the line con 0 configuration command, which moves you to console line configuration mode. What does the command prompt look like after using this command? The command line now says: Router(config-line)#
Step 11. Press Enter. Does the router prompt you for a password? Does the password ciscopress work? Yes and yes
Step 12. Use the enable command to move from user mode to enable mode. Which of the two passwords (fred or barney) works? Which configuration command did you use to con- figure that password? Barney was the password that worked, and enable secret barney

Lab 10: Configuring Router IP Settings
Step 4. Use the show ip interface brief command to view all interfaces. Which interfaces have an IP address configured? What are the addresses and the corresponding masks? None of the interfaces have an IP address configured
Step 10. Use the show ip interface brief command to view all interfaces. Is the router’s Fa0/0 IP address now listed? What is the IP address? Yes the IP address is now listed. The IP address is 10.1.1.4
Step 11. Confirm that R1’s Fa0/0 interface is working by pinging PC1 (10.1.1.1). Did the command output imply that R1 can send packets to and from PC1? Yes it implies that R1 can send packets

Lab 22: Terminal History

Step 5. Press Up Arrow again to bring up your show ip route connected command. Press Backspace to remove the connected keyword, and replace it with rip. What does this command show you? Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 -…...

Similar Documents

Cn1 - Cisco Router Vietnamese

...Höôùng daãn caáu hình caùc chöùc naêng cô baûn cuûa Cisco router HÖÔÙNG DAÃN CAÁU HÌNH CAÙC TÍNH NAÊNG CÔ BAÛN CHO CISCO ROUTER MUÏC LUÏC 1 Khaùi nieäm veà Router .................................................................................................. 3 1.1 Nhieäm vuï vaø phaân loaïi......................................................................................... 3 Nhieäm vuï: ..................................................................................................... 3 Phaân loaïi....................................................................................................... 3 1.1.1 1.1.2 1.2 Caùc khaùi nieäm cô baûn veà Router vaø cô cheá routing............................................. 5 Nguyeân taéc hoaït ñoäng cuûa Router – ARP Protocol: ..................................... 5 Moät soá khaùi nieäm cô baûn............................................................................... 7 1.2.1 1.2.2 2 Khaùi nieäm veà caáu hình Router. ................................................................................. 13 2.1 2.2 Caáu truùc router. ................................................................................................. 14 Caùc mode config ............................................................................................... 16 3 Caáu hình caùc tính naêng chung cuûa router. ............................................................... 19 3.1 3.2 Moät soá quy taéc veà trình baøy caâu......

Words: 25755 - Pages: 104

It242 Toolwire Week 6 Router Configuration

...Week 6 ToolWire – Router Configuration Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit ! version 12.1 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Router ! enable secret 5 $1$Q6ge$0JRjt.FY5EX2YNqRsgxTW. enable password cisco ! ! ! ! ! memory-size iomem 15 ip subnet-zero ! ! ! ! ! ! interface FastEthernet0/0 ip address 10.0.1.1 255.255.255.0 speed auto half-duplex no mop enabled ! interface Serial0/0 no ip address shutdown ! interface FastEthernet0/1 ip address 10.0.2.1 255.255.255.0 speed auto half-duplex no mop enabled ! interface Serial0/1 no ip address shutdown ! ...

Words: 2122 - Pages: 9

Router Instructions

...Cisco E4200 Router Configuration Network Address Translation Network Address Translation (NAT) is used to convert internal IP addresses into public IP addresses. This allows multiple devices on our customer’s networks to access the internet through one of public IP addresses provided by their internet service provider. The following steps will walk you through configuring the Cisco E4200 Router to perform NAT from the web browser based utility page. 1. Click the Advance Routing link in the Setup menu. 2. Click the Enabled radio button on the NAT line to activate NAT and click the Save Settings button at the bottom of the page. Packet Filtering Configuring our client’s router to conduct packet filtering will add an additional layer of security for their network. Advanced packet filtering is conducted by creating rules that either allow or reject incoming traffic based on protocol type and port number. The Cisco E4200 comes with pre-configured rules that conduct very general packet inspection. The following steps will outline how to configure the Cisco E4200 Router to perform packet filtering from the web browser based utility page. 1. Click the Security link from the menu. 2. Click the Enabled radio buttons for IPv4 and IPv6 SPI Firewall Protection. Default Gateway Installing a router for our customers will make it their Default Gateway to their ISP. A default Gateway is used to route internet traffic to and from the hosts on the......

Words: 332 - Pages: 2

Routers

...By: Dick Gilbert Routers A router is a network layer device responsible for routing traffic between subnetwork that make up a data internetwork . A subnetwork is defined as a collection of network resources that can be reached without needing to go through a router. A internetwork a collection of two or more subnetworks connected using routers. The role of a router is pretty simple. It receives packets transmitted by end stations and routes them through the internetwork to the right subnetwork. Routers can also perform more advanced functions if the network layer protocol supports those functions. Most of them have the ability to fragment packets. Routers also provide some congestion control capablilties .Routers can be fairly sophisticated packet filters. Some people sometimes mistake routing for bridging. Routing is also a network layer function. Routers operate on packets and choices based on the network layer address. Bridging is a data link layer function. Bridges operate on frames and make filtering and forwarding choices based on the media access control address. Packets ride within frames and are the transmission unit used to get a message from one end station to another anywhere in the internetwork. If two end stations are in the same subnetwork , the packet will be placed in a frame by the transmitter and sent across the subnetwork to......

Words: 369 - Pages: 2

Week 5 Router Prompts

...Router Prompt Exercise User EXEC: Router> Privileged EXEC: Router# Global Configuration: Router(config)# Line Configuration: Router(config-map-class)# Interface Configuration: Router(config-if)# Router configuration: Router(config-line) Basic Configuration Exercise 1.) Router(config)#hostname AUS 2.) AUS#enable password class AUS#enable secret class 3.) The encrypted one serves as the pass and no both do not need to be used infact secret takes precedence 4.) AUS#conf t AUS(config)#line con 0 AUS(config-line)#login AUS(config-line)#password cisco AUS(config-line)#line aux 0 AUS(config-line)#password cisco 5.) AUS(config-line)#login AUS(config-line)#line vty 0 4 AUS(config-line)#password cisco 6.) Service password-encryption 7.) Encryption is weak with the service password-encryption and is easily broken 8.) AUS(config)#interface s0/0 AUS(config-if)#ip address 172.16.4.251 255.255.255.0 AUS(config-if)#no shutdown AUS(config-if)#end or clock rate 64000 ::may change:: 9.) AUS(config)#interface fast Ethernet 0/0 AUS(config-if)#ip config 172.16.1.251 255.255.255.0 AUS(config-if)#no shutdown 10.) Router rip network 10.0.0.0 255.0.0.0 11.) NVRAM copy running-config startup-config 12.) Show startup-config 13.) Router(config)#hostname AUS DFW(config)#enable secret class DFW#conf t DFW(config)#line con 0 DFW(config-line)#login DFW(config-line)#password cisco DFW(config-line)#line aux......

Words: 425 - Pages: 2

Routers

...Routers Term Paper INTRODUCTION Router is a hardware device designed to take incoming packets, analyzing the packets and then directing them to the appropriate locations, moving the packets to another network, converting the packets to be moved across a different network interface, dropping the packets, or performing any other number of other actions. In the picture to the down, is a Linksys BEFSR11 router and is what most home routers look like. [pic] A router has a lot more capabilities than other network devices such as a hub or a switch that are only able to perform basic network functions. For example, a hub is often used to transfer data between computers or network devices, but does not analyze or do anything with the data it is transferring. Routers however can analyze the data being sent over a network, change how it is packaged and send it to another network or over a different network. For example, routers are commonly used in home networks to share a single Internet connection with multiple computers. [pic] In the above example of a home network there are two different examples of a router, the router and the wireless router. As can be seen in the example the router is what allows all the computers and other network devices access the Internet. Below are some additional examples of different types of routers used in a large network. Brouter Short for Bridge Router, a "brouter" is a......

Words: 569 - Pages: 3

Wan Routers Exam

...1. Give basic explanation of what router do -A hardware device designed to take incoming packets, analyzing the packets and then directing them to the appropriate locations, moving the packets to another network, converting the packets to be moved across a different type of network interface, dropping the packets, or performing any other number of other types of actions 2. know the differece between crossover, straight through, and rollover cable Straight through- pins are the same on both sides Use a straight-through cable when: -. Connecting a router to a hub -. Connecting a computer to a swtich -. Connecting a LAN port to a switch, hub, or computer This allows for two devices to communicate at the same time. Unlike straight-through cables, we use crossover cables to connect like devices. -. Connecting a computer to a router -. Connecting a computer to a computer -. Connecting a router to a router -. Connecting a switch to a switch -. Connecting a hub to a hub Rollover cables essentially have one end of the cable wired exactly opposite from the other. -Rollover cables, also called Yost cables, usually connect a device to a router or switch’s console port. This allows a programmer to make a connection to the router or switch, and program it as needed. 3. Know what the backbone network is in relation to frame relay -Frame Relay often serves to connect local area networks (LANs) with major backbones as well as on public wide-area networks (WANs)......

Words: 1838 - Pages: 8

Cisco Router Hardware & Software Discovery

...Lab #1 – Assessment Worksheet Cisco Router Hardware & Software Discovery 1. What Cisco “show” command displays various information and details about the router or switch such as Model #, flash memory, RAM, IOS version and physical interfaces? Show Version 2. During the Instructor’s TELNET session to LAN Switch 1 and LAN Switch 2 – what was the captured terminal password for LAN Switch 1 and LAN Switch 2? Cisco 3. What is the size of the IOS file used for the Cisco 28xx Routers? 239Kb 4. What is the command used to enter the global configuration mode for interfaces on a Cisco Router or Switch? Router>enable 5. The default hexadecimal value of the configuration register setting for the Cisco 28xx Router is? 0x2102 6. What are the specific settings for the configuration hexadecimal value 0x2102? -ignores break -boots into ROM if initial boot fails -9600 console baud rate default value for most platforms 7. What is the key sequence used to interrupt the boot sequence of a router and initiate the password recovery sequence? Pause/Break key on the keyboard 8. Using the password recovery process how can you break the router boot sequence to see the router saved passwords and what can you do in that mode. Ctrl – C to skip to the initial setup procedure to view, change and delete passwords 9. What is the command used to back up the running-config file to TFTP? “copy running – config TFTP” 10. What process takes place...

Words: 277 - Pages: 2

Cisco Routers

...to protect your Cisco router Daniel B. Cid daniel@underlinux.com.br Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the way people think about security. Companies are spending thousand of dollars on new security devices, but forgetting the basic, the first line of defense: the border router. Although a lot of people may think that routers don’t need to be protect, they are completely wrong. A lot of secure problems appear all time against this kind of device and most of them are vulnerable. Some information about some common security problems found on Cisco Routers, can be read on the text “Exploiting Cisco Routers”, available at: http://www.securityfocus.com/infocus/1734 In this article I will give you 8 steps, easy to follow, to minimize your Cisco router exposure by turning off some unused services, applying some access control and applying some security options available on that. 12345678- Control Access to your router; Restrict telnet access to it; Block Spoof/Malicious packets; Restrict SNMP; Encrypt all passwords; Disable all unused services; Add some security options; Log everything; 1- Control Access to your router The first thing to do is apply some rules to restrict all external access to some ports of the router. You can block all ports, but it is not always necessary. These commands bellow will protect your router against some......

Words: 1100 - Pages: 5

Password Security

... [pic] Password Security And Other Effective Authentication Methods [pic] Table of Contents Introduction 1 User Accounts 1 Account and Password Policy 2 Password Attacks 4 Authentication Methods and Password Management 5 Public Key Infrastructure 6 Single Sign-On (SSO) 6 One-Time Password (OTP) Tokens 7 Biometrics 7 Fingerprints 7 Face Scans 7 Retina Scans 7 Iris Scans 7 Palm Scans 8 Hand Geometry 8 Heart Patterns 8 Voice Pattern Recognition 8 Signature Dynamics 8 Keystroke Patterns 8 Password Managers 8 Conclusion 9 Bibliography 10 Introduction Human beings are arguably the weakest link in computer and information security. People pose such a significant threat to their own computer networks and personal information simply because they don’t keep password security in the forefront of their mind. This is one of the reasons passwords are considered a poor security mechanism. Still, passwords are the most common method for user authentication on computer systems and websites. Passwords are so easily hacked and used to steal personal information such as bank account credentials, credit card numbers, etcetera, contributing to the significant growth of identity theft, most of which could be prevented by using strong passwords and not writing them down. End user education on more secure authentication methods such as strong password creations and two factor authentication can help to improve cyber security...

Words: 2777 - Pages: 12

Password Strength Is Not Password Security

...Password Strength is not Password Security Kevin Marino November 11, 2013 MSCC697, Regis University Professor Garcia Password Strength is not Password Security When password security becomes the topic of conversation it generally focuses on how strong a password is and whether or not the user reuses a password across multiple sites. While these aspects can affect password security, there are certain measures that the server side of the authentication process can implement to increase security without the user changing their habits. This approach would solve many of the security problems that authentication servers are facing. The goal of this study is to determine a set of best practices that can be implemented to increase security without the intervention of the user. While passwords may not be around forever, due to the introduction of new authentication hardware, they will be around until one of these hardware become mainstream and readily available to the general public. These practices will offer greater security until that time comes. User authentication in today's world generally requires a user name and a password. Though the strength of the user's password is generally seen as the base line for security, the authenticating server can implement certain security measures that can compensate for weak passwords. One main factor for considering different security measures is the advancement of brute force attack......

Words: 1960 - Pages: 8

Router Ospf

...R1> R1>en Password: R1#show run Building configuration... Current configuration : 963 bytes ! version 12.3 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname R1 ! ! ! enable secret 5 $1$XA/N$cs9QtuPIK5Y/RcThoNug2. ! ! ! ! ! ! ip cef no ipv6 cef R1#show run Building configuration... Current configuration : 963 bytes ! version 12.3 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname R1 ! ! ! enable secret 5 $1$XA/N$cs9QtuPIK5Y/RcThoNug2. ip cef no ipv6 cef ip ssh version 1 no ip domain-lookup spanning-tree mode pvst interface Loopback0 ip address 10.1.1.1 255.255.255.255 ! interface FastEthernet0/0 ip address 172.16.1.17 255.255.255.240 duplex auto speed auto ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 ip address 192.168.10.1 255.255.255.252 clock rate 64000 ! interface Serial0/0/1 ip address 192.168.10.5 255.255.255.252 ! interface Serial0/1/0 no ip address clock rate 2000000 shutdown ! interface Vlan1 no ip address shutdown ! ip classless ! ip flow-export version 9 ! ! ! ! ! ! ! line con 0 password cisco login ! line aux 0 ! line vty 0 4 password cisco login ! ! ! end R1#conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router ospf......

Words: 2242 - Pages: 9

Passwords

...A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access. The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword. Sentries would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user may require passwords for many purposes: logging in to computer accounts, retrieving e-mail from servers, accessing programs, databases, networks, web sites, and even reading the morning newspaper online. Despite the name, there is no need for passwords to be actual words; indeed passwords which are not actual words may be harder to guess, a desirable property. Some passwords are formed from multiple words and may more accurately be called a passphrase. The term passcode is sometimes used when the secret information is purely numeric, such as the personal identification number (PIN) commonly used for ATM access. Passwords are generally short enough to be easily memorized and typed. Authentication by password is less secure than authentication which uses......

Words: 253 - Pages: 2

Lkt2 Task 2 - Router Config Guide

...Configuration Guide ACTIONTEC MI424-WR Rev. D Firmware v4.0.16.1.56.0.10.14.4 Contents Overview of MI424-WR 3 Minimum System Requirements 3 Network Address Translation (NAT) 4 What is NAT? 4 How Does NAT Work? 4 NAT Configuration for MI424-WR 5 1. Log into router 5 2. Configure NAT 5 Packet Filtering for MI424-WR 6 What is Packet Filtering 6 Overview of MI424-WR The Actiontec MI424-WR Wireless Router is a multifunctional network device in a single box. It not only has a basic routing feature set that includes VPN, NAT, and DHCP services, it also includes some advanced features such as QoS. The MI424-WR is also a 4-port Fast Ethernet switch providing full duplex speeds of up to 100Mbits. In addition to its wired connections, it also serves as a wireless access point using wireless B and G protocols, including basic and advanced encryption methods such as WEP and WPA2. Finally, the MI424-WR additionally provides other enterprise-level security services. There is a fully customizable firewall with Intrusion Detection, DoS protection, DMZ Hosting, and Stateful Packet Inspection. With this multitude of features, the MI424-WR has been designed to be the central point of any SOHO network. Minimum System Requirements * Broadband Internet service via a RJ-45 or Coax Connection * (Any DSL modem, Cable modem or Network that uses Ethernet or Coax) * Windows 98SE, Me, 2000, XP, Vista, 7, Mac OS 9+, OS 10+, Linux, Unix * PC with an......

Words: 1982 - Pages: 8

Wireless Router

...Wireless Router While exploring my text book for a topic for my term paper I chose a subject that I have recently been involved with. Several of us have configured and installed a basic home wireless network. In many homes today it is very popular to have a wireless router installed in your home office creating a connection of convenience to the internet. Installing a wireless router is relatively easy. At the beginning of this semester I had to replace my old wireless router due to an electrical surge through my Ethernet port from my modem. While looking into the purchase of a new wireless router I came across the Cisco Valet Plus Wireless Router. The purpose of this paper is to provide the manufactures specification for the Cisco Valet Plus Wireless Router, the function, the appearance, the operation, and the pros and cons of this device. I chose the Cisco Valet Plus Router Based on the specifications listed on the products exterior package. What caught my attention were the Data Link Protocol; Ethernet, Gigabit Ethernet, IEEE 802.11b, IEEE 802.11n, IEEE802.11g, Fast Ethernet, and the data transfer rate 300 Mbps. In today’s day and age it seems the speed and efficiency is very necessary and takes priority in our daily lives. The frequency band is 2.4 GHz. A feature that I have never seen offered in a wireless router is the Anti-Malware protection, Wi-Fi Protected Setup (WPS), URL Filtering, Domain blocking, and Parental control. This is the first wireless router......

Words: 1198 - Pages: 5