Vous êtes sur la page 1sur 26

FINAL LAB REPORT ON ROUTER

1


Cont ents

INTRODUCTION: ............................................................................................................................................ 3
WHAT HAPPENS WHEN ROUTER IS ON AND EXECUTED ............................................................... 4
ROUTER CONFIGURATION AND COMPONENTS ............................................................................... 5
EXTERNAL ROUTER CONFIGURATION SOURCES ........................................................................ 5
ROUTER'S INTERNAL CONFIGURATION COMPONENTS ............................................................. 6
ROUTER MEMORY ORGANIZATION .................................................................................................... 7
HOW ROUTERS WORK .................................................................................................................................. 8
LIKE A POSTAL SYSTEM OR COURIER ........................................................................................................ 9
ROUTER MODES ............................................................................................................................................ 9
ROUTER INTERFACES ........................................................................................................................... 10
ROUTING PROTOCOL ............................................................................................................................ 11
TYPES OF ROUTING PROTOCOL ..................................................................................................... 12
OTHER TYPES OF ROUTING PROTOCOL ....................................................................................... 12
TYPES OF ROUTERS: .............................................................................................................................. 13
BROADBAND ROUTERS: ................................................................................................................... 13
WIRELESS ROUTERS: ......................................................................................................................... 13
OTHER TYPE ROUTERS: .................................................................................................................... 14
EDGE ROUTER: ................................................................................................................................ 14
SUBSCRIBER EDGE ROUTER: ...................................................................................................... 14
INTER-PROVIDER BORDERS ROUTER: ...................................................................................... 14
CORE ROUTER ..................................................................................................................................... 14
ROUTER IN TODAYS INTERNET CONNECTION ............................................................................... 15
WHY WE CHOOSE CISCO ROUTERS? ................................................................................................. 15
DIFFERENCE BETWEEN A SERVER AND A ROUTER ...................................................................... 16
APPLICATION AND PURPOSES OF ROUTERS ................................................................................... 18
APPLICATIONS .................................................................................................................................... 18
PURPOSES ............................................................................................................................................. 18
ADVANTAGE AND DISADVANTAGE OF ROUTERS ....................................................................................... 18
FINAL LAB REPORT ON ROUTER
2

ADVANTAGE: ...................................................................................................................................... 18
EASILY SHARED INTERNET ......................................................................................................... 18
SECURITY AND ADAPTABILITY ................................................................................................. 18
DISADVANTAGE: ................................................................................................................................ 19
COMPLICATED SETUP ................................................................................................................... 19
DATA OVERHEAD .......................................................................................................................... 19
CONCLUSION ........................................................................................................................................... 19
COMMAND OF CISCO ROUTER 2600 SERIES ............................................................................................... 20
LAB CODE FOR CISCO ROUTER CONFIGURATION ................................................................................... 20
SOME DESCRIPTION OF CISCO ROUTE COMMAND FOR DIFFERENT CONFIGURATION MODES ............ 22



FINAL LAB REPORT ON ROUTER
3

INTRODUCTION:
A router is Special type of computer device that connect and allow communication between
two networks and forwards data packets between computer network creating an
overlay internetwork.
A router is connected to two or more data lines from different networks. When a data packet
comes in one of the lines, the router reads the address information in the packet to determine its
ultimate destination. Then, using information in its routing table or routing policy, it directs the
packet to the next network on its journey.
Routers perform the "traffic directing" functions on the internet. Routers operate at
physical, data link and network layer of OSI model .




FINAL LAB REPORT ON ROUTER
4

WHAT HAPPENS WHEN ROUTER IS ON AND EXECUTED
There are four major phases to the boot up process:
1. Performi ng t he POST
Power-On Self-Test (POST)
When the router is powered on, software on the ROM chip conducts the POST.
During this self-test, the router executes diagnostics from ROM on several hardware
components including the CPU, RAM, and NVRAM.
After the POST has been completed, the router executes the bootstrap program.
2. Loading the bootstrap program
After the POST, the bootstrap program is copied from ROM into RAM.
Once in RAM, the CPU executes the instructions in the bootstrap program.
The main task of the bootstrap program is to locate the Cisco IOS and load it into RAM.
3. Locati ng and l oading t he Cisco IOS software
The IOS is typically stored in flash memory.
Note: Once the IOS begins to load, you may see a string of pounds signs (#) while the
image decompresses.
############################
4. Locati ng and l oading t he st art up confi gurati on fil e or entering set up mode
Bootstrap program searches for the startup configuration file, known as startup-config,
in NVRAM.
File is copied into RAM as the running configuration file, running-config.
If the startup configuration file cannot be located, then we enter setup mode.
FINAL LAB REPORT ON ROUTER
5


ROUTER CONFIGURATION AND COMPONENTS
1) External router configuration sources 2) Routers Internal Configuration Components
EXTERNAL ROUTER CONFIGURATION SOURCES
You can configure a router from many external locations such as:
From the console terminal during its installation
Via modem by using the auxiliary port
From Virtual Terminals 0-4, after it has been installed on the network
From a TFTP server on the network
FINAL LAB REPORT ON ROUTER
6



ROUTER'S INTERNAL CONFIGURATION COMPONENTS
Router contains the operating system, Flash memory, NVRAM and processor. High level
routers contain the Application Specific Integrated Circuits to perform parallel processing. A
router is also act as a gateway that connects LAN with the internet .

FINAL LAB REPORT ON ROUTER
7

RAM/DRAM -- stores routing tables, ARP cache, fast-switching cache, packet buffering
(shared RAM), and packet hold queues; RAM also provides temporary and/or running
memory for a router's configuration file while the router is powered; RAM content is lost
during a power down or restart.
NVRAM -- non-volatile RAM stores the router's backup/startup configuration file; NVRAM
content is retained during power down or restart.
Flash -- erasable, reprogrammable ROM (EPROM)that holds the operating system image
and microcode; Flash memory enables software updates without removing and replacing
processor chips; Flash content is retained during power down or restart; Flash memory
can store multiple versions of IOS software.
ROM -- contains power-on diagnostics, a bootstrap program, and operating system software;
software upgrades in ROM require removing and replacing chips on the router's motherboard

ROUTER MEMORY ORGANIZATION



FINAL LAB REPORT ON ROUTER
8

HOW ROUTERS WORK
A router passes data between multiple networks. It works at the layer 3 (the network link
layer), which means that it must be able to understand the data packets so that it can route them
to their destination.

Routers attempt to send packets from their source to their destination in the fastest way possible,
which is not always the absolute shortest path.
On a network, packets with destinations on the LAN go directly from the sending machine to the
destination machine without any intermediaries. However, if the destination address of a packet
is outside the LAN, the sending machine sends it to the router, which the sending machine knows
as the default gateway, and has no further interaction with that packet.
When the router receives a packet destined for a point outside the LAN, it looks to see if it has a
route to get the packet to that destination network. If it does (or if it has a default gateway of its
own), it will send the packet to the next stop.


FINAL LAB REPORT ON ROUTER
9

LIKE A POSTAL SYSTEM OR COURIER

Routing between a LAN and a wide-area network (WAN) is like a postal system or a courier
network. A package traveling from New York to San Francisco might travel through a hub in
Memphis or Chicago and be re-sorted in Reno before heading to its final destination. If the
package had to be hand-delivered quickly, you could do that, but the cost would increase
significantly, and hopefully, the package won't get routed the long way around, because that
tends to be inefficient and difficult to trace.
In the same manner, routers send packets according to the available routes between networks and
try to determine the shortest possible route at any given time.
How does a router do this? Well, inside a router is a set of data called routing tables. Routing
tables include:
All possible routes the router is aware of Information on which connections lead to
particular groups of addresses
Priorities for connections to be used Rules for handling both routine and special cases of
traffic
Routing tables are dynamic they are updated by routing protocols such as Routing
Information Protocol (RIP) or Open Shortest Path First (OSPF) that constantly pass messages
between routers. The router consults them to determine whether or not it has a route to a
particular destination address.
ROUTER MODES
User EXEC mode-- User can view some information about the router, but cannot make changes.
Privileged EXEC mode -- This mode supports the debugging and testing commands, detailed
examination of the router, manipulation of configuration files, and access to configuration
modes.
Setup mode-- This mode presents an interactive prompted dialog at the console that helps the
new user create a first-time basic configuration.
Global configuration mode -- This mode implements powerful one-line commands that perform
simple configuration tasks.
Other configuration modes -- These modes provide more detailed multiple-line configurations.
RXBoot mode-- This is the maintenance mode that you can use, among other things, to recover
from lost passwords.
FINAL LAB REPORT ON ROUTER
10


ROUTER INTERFACES
There are two major groups of router interfaces
LAN Int erfaces:
1: Are used to connect router to LAN network
2: Has a layer 2 MAC address
3: Can be assigned a Layer 3 IP address
4: Usually consist of an RJ-45 jack
WAN Int erfaces:
1: Are used to connect routers to external networks that interconnect LANs.
2: Depending on the WAN technology, a layer 2 address may be used.
3: Uses a layer 3 IP address
FINAL LAB REPORT ON ROUTER
11


ROUTING PROTOCOL
Each router has a priori knowledge only of networks attached to it directly. A routing protocol
shares this information first among immediate neighbors, and then throughout the network. This
way, routers gain knowledge of the topology of the network.
Router is a network communication device that is used to connect logically and physically
different networks. It can be used in the Ethernet, FDDI, Token Ring, ATM, Frame Relay, ISDN
and other types of the LAN/WAN. Router contains and maintains the routing table that has the
information of the adjacent routers and other connected networking devices. Router selects the
shortest possible path to send the data packets at the destination. It is an intelligent device that can
connect ATM with Frame Relay, ISDN with Frame Relay, SONET with ATM or any other two
dissimilar networks.

FINAL LAB REPORT ON ROUTER
12

Router uses different protocols such as RIP (Routing Information Protocol), OSPF (Open
Shortest Path First) and BGP and IGRP (Interior Gateway Routing Protocol) and EIGRP
(Enhanced Interior Gateway Routing Protocol. Routing protocols specifies that how routers will
communicate with each other in the WAN.
TYPES OF ROUTING PROTOCOL
There are two primary routing protocol types although many different routing protocols defined
with those two types. Link state and di stance vector protocols comprise the
pri mary types.

Distance vector protocols advertise their routing table to all directly connected neighbors at
regular frequent intervals using a lot of bandwidth and are slow to converge. When a route
becomes unavailable, all router tables must be updated with that new information. The problem
is with each router having to advertise that new information to its neighbors, it takes a long time
for all routers to have a current accurate view of the network. Distance vector protocols use fixed
length subnet masks which aren't scalable.
Link state protocols advertise routing updates only when they occur which uses bandwidth
more effectively. Routers don't advertise the routing table which makes convergence faster. The
routing protocol will flood the network with link state advertisements to all neighbor routers per
area in an attempt to converge the network with new route information. The incremental change
is all that is advertised to all routers as a multicast LSA update. They use variable length subnet
masks, which are scalable and use addressing more efficiently.
OTHER TYPES OF ROUTING PROTOCOL
Although there are many types of routing protocols, three major classes are in widespread use
on IP networks:
Interior gateway routing via link state routing protocols, such as OSPF and IS-IS.
Interior gateway routing via distance vector routing protocols, such
as RIPv2, IGRP and EIGRP.
Exterior gateway routing. The Border Gateway Protocol (BGP), a path vector routing
protocol, is the routing protocol used on the Internet for exchanging traffic between
Autonomous Systems.






FINAL LAB REPORT ON ROUTER
13

TYPES OF ROUTERS:
There are several types of routers in the market.
BROADBAND ROUTERS:
Broadband routers can do different types of things. Broadband routers can be used to connect
computers or to connect to the Internet.
If you connect to the internet through phone and using Voice over IP technology (VOIP) then
you need broadband router. These are often a special type of modem (ADSL) that will have both
Ethernet and phone jacks.
WIRELESS ROUTERS:
Wireless routers create a wireless signal in your home or office. So, any PC within range of
Wireless routers can connect it and use your Internet.
In order to secure your Wireless routers, you simply need to come secure it with password or get
your IP address. Then, you'll log on into your router with the user ID and passwords will that
come with your router. A network device that combines a router, switch and Wi-Fi access point
(Wi-Fi base station) in one box. Wireless routers provide a convenient way to connect a small
number of wired and any number of wireless computers to the Internet.

FINAL LAB REPORT ON ROUTER
14

OTHER TYPE ROUTERS:
EDGE ROUTER:
This type of router are placed at the edge of the ISP network, they are normally configured to
external protocol like BGP (Border gateway protocol) to another BGP of other ISP or large
organization.
SUBSCRIBER EDGE ROUTER:
This type of router belongs to an end user (enterprise) organization. Its configured to broadcast
external BGP to its providers.
INTER-PROVIDER BORDERS ROUTER:
This type of router is for Interconnecting ISPs, this is a BGP speaking router that maintains BGP
sessions with other BGP speaking routers in other providers.

CORE ROUTER
A router that resides within the middle or backbone of the LAN network rather than at its
periphery. In some instances, a core router provides a step down back bone, interconnecting the
distribution routers from multiple building of a campus (LAN), or Large enterprise Location
(WAN). They tend to be optimized for a high bandwidth. A core router is a router that
forwards packets to computer hosts within a network but not between networks). A core router
is sometimes contrasted with an edge router, which routes packets between self-contained
network and other outside networks along a network backbone.
FINAL LAB REPORT ON ROUTER
15


ROUTER IN TODAYS INTERNET CONNECTION
Routers are typically dedicated hardware devices, use of software-based routers has grown
increasingly common. Routers are very common today in every network area, this is mainly
because every network these days connect to some other network, whether it's the Internet or
some other remote site. Routers get their name from what they do. Which is route data from one
network to another. Routers capture the information that come through broadband connection via
a modem and deliver it to your computer The router choose route for the packet so that you
receive the information. Routers are multiport devices and more sophisticated as compared to
repeaters and bridges. Routers also support filtering bridges. Like bridges, they are self -
learning, as they can communi cate thei r existence to other devi ces and can
learn of the exi stence of new routers, nodes and LAN segments.
WHY WE CHOOSE CISCO ROUTERS?
For many years, Cisco's 2600 and 3600 series line served as the standard Cisco routers for a
midsize business' network. In fact, most organizations still use these models todayeven though
Cisco discontinued both lines more than a year ago.
Evaluating and weighing the following eight criteria can help to figure out which router best fits
for a person needs:

FINAL LAB REPORT ON ROUTER
16

Performance
Cisco used to rate its routers by how many packets per second the router could forward. For
example, a Cisco 2610 or 2612 series router can forward an estimated 15,000 packets per second
using fast-switching; a Cisco 7500 series router can forward an estimated 2 million packets per
second.

Upgradability
Router processors are rarely upgradeable, so this refers primarily to RAM and Flash.

Expandability
This refers to the number of WAN and LAN interfaces supported by the router. The router
usually has a default number of interfacesbut some routers, such as the 3600 series, have none.
So, pay attention to the number of interfaces you can add on top of the default.

Supported software features
For example, you might need a router to support a certain interface or a VoIP feature.

Manageability
How easy or difficult is it to manage the router? Does the router come with a GUI interface, or is
it command line only? Is there an interface that allows you to manage multiple routers to help
ease the management burden as the enterprise grows?

Redundancy
Does the router offer the necessary redundancy for working at a critical point in the network?
Some redundancy examples include hot-swappable power supplies or high-availability routing
protocols such as HSRP or VRRP.
DIFFERENCE BETWEEN A SERVER AND A ROUTER
A server is a system or computer that manages access and responds to requests on a network.
There are many types of servers: print, file, web, game, mail, and various others. Pretty much
any computer could function as a server. Sometimes a computer works as a dedicated server,
meaning that is its only function. At other times, a computer can function as a server but also be
used for other tasks. In basic terms, a server will store files or data and a user or client will
request that data. The users computer connects and sends a request to the server, which then
responds by sending the requested data back. This is how pretty much the whole World Wide
Web works, along with most email services, although on a much grander and complicated scale.
FINAL LAB REPORT ON ROUTER
17


A router works as a connection between two or more networks. When you use a router in your
home, you are creating a connection from a public network to a private network.

All computers must have an address, much like a house or residence must have an address. No
two computers can have the same address, and in your home, each computer has their own,
private address. However, when connecting to the Internet, the computer will use the address of
the router, which is a public address. The router allows multiple computers and devices to
connect to the Internet using one public address. If it did not work this way, there would not be
enough addresses available for everyone to be on the Internet at once!
As far as adding a server to a home office, it would depend on what kind of server you would
like to setup. If you are looking to have computers connected to the Internet through the server,
you would likely still need a router. If you use multiple computers in your family, a server at
home can be beneficial. It could be used to perform backups, to store all your pictures, videos,
and media in one central location. All computers would then have access to all files. It could be
set up as a print server to allow one printer to be used by multiple computers. There are other
uses, as well.
One thing to remember about a server is that it must always be on to be effective. However, it
does not have to be a current, up to date computer. It can have older hardware and does not have
FINAL LAB REPORT ON ROUTER
18

to be a fast computer, depending on the use. It could even be set up without an Internet
connection, if you are using it for a file server or for backing up your systems. All it would take
is some knowledge in how to set up a home network.
APPLICATION AND PURPOSES OF ROUTERS

APPLICATIONS
It is used to create a network with remote access to private networks.
It enables Private networks to be inter-networked with other networks such as the
Internet.
Companies to create their own networks in customers' premises to eliminate reliance on
the end customers' network.
Routers are useful to provide security in military transmissions that require highly secure
lines by using Hop-count Algorithm.
PURPOSES
Need of firewall features to isolate networks and provide security for private networks.
Recovery of TCP/IP protocols from the local Ethernet protocols which are routed over
PPP protocols for transferring data information over GSM, GPRS and PSTN networks.
Routers are used to reduce traffic load through the network.

ADVANTAGE AND DISADVANTAGE OF ROUTERS
ADVANTAGE:
EASILY SHARED INTERNET
One of the biggest reasons for using a router is to connect multiple users to the Internet.
Connecting to the Internet requires a publicly-unique IP address. As such, Internet providers
typically only offer a single IP address or charge fees for large amounts of publicly routable
addresses. The solution is to add a router with network address translation enabled. Connecting
to the Internet through a router with NAT allows the router to use the single public IP address
and a series of UDP ports to share the connection. Without NAT, connecting a large organizations
computers to the Internet becomes virtually impossible.

SECURITY AND ADAPTABILITY
Connecting an Internet modem directly to a PC exposes that PC to a host of security issues.
Furthermore, expanding a direct-connection network becomes complicated without the addition
of switches or a router and communicating between the individual PCs becomes difficult. Using
a router as an intermediary between the outside network of the Internet and the inside
network of your organization provides a scalable environment that is also, to a degree, easier to
secure. A router is not a replacement for a firewall or anti -malware measures,
but its an i mportant fi rst step towards a l argely secure network
envi ronment.
FINAL LAB REPORT ON ROUTER
19

DISADVANTAGE:
COMPLICATED SETUP
The router requires NAT to be set up. In addition, each computer must be assigned a private IP
address that is typically organized by a DHCP server. This is required for the simplest
connections.
Connecting to additional IP-based networks adds additional complication in the form of routing
tables -- a table that describes the best route for reaching a desired network.
If IP telephony or video services are to be running on the IP network, youll also need to
consider quality of service configurations.
DATA OVERHEAD
Unlike a point-to-point layer 2 link, routers add additional IP-based headers. These headers
include information such as source and destination addresses, UDP information and checksums.
These headers are attached to every payload of data. Large pieces of data are typically broken
into thousands of smaller headers, making this header data consume a percentage of the total
available bandwidth.
CONCLUSION
Modern routers are very complex hardware and software systems with demanding requirements
and constraints. To achieve carrier class converged networks, router software and hardware
architecture is going to have to evolve to better achieve scale and reliability


















FINAL LAB REPORT ON ROUTER
20

COMMAND OF CISCO ROUTER 2600 SERIES

LAB CODE FOR CISCO ROUTER CONFIGURATION
ENTER
Password: cisco
Router> enable
Password: class
Router# erase start
Router# reload
Would you like to enter config dialog? [Yes/No] No
..
Router> enable
Router# config t
Router(config)# hostname Lab-A
Lab-A(config)# enable secret class
Lab-A(config)# line console 0
Lab-A(config-line)# login
Lab-A(config-line)# password cisco
Lab-A(config-line)# line vty 0 4
Lab-A(config-line)# login
Lab-A(config-line)# password cisco
Lab-A(config-line)# exit
..
Lab-A(config)# interface f0/0
Lab-A(config-if)# ip addr 192.5.5.1 255.255.255.0
Lab-A(config-if)# desc connection to hub A
FINAL LAB REPORT ON ROUTER
21

Lab-A(config-if)# no shutdown
Lab-A(config-if)# interface f0/0
Lab-A(config-if)# ip addr 205.7.5.1 255.255.255.0
Lab-A(config-if)# desc connection to switch 1
Lab-A(config-if)# no shutdown
Lab-A(config)# interface S0/0
Lab-A(config-if)# ip addr 201.100.11.1 255.255.255.0
Lab-A(config-if)# desc connection to Lab-B
Lab-A(config-if)# clock rate 64000
Lab-A(config-if)# no shutdown
Lab-A(config)# exit
..
Lab-A(config)# router rip
Lab-A(config-router)# network 192.5.5.0 network 205.7.5.0 network 201.100.11.0
Lab-A(config-router)# exit
Lab-A(config)# ip host Lab-A 192.5.5.1 205.7.5.1 201.100.11.1
Lab-A(config)# ip host Lab-B 219.17.100.1 199.6.13.1 201.100.11.2
Lab-A(config)# ip host Lab-C 223.8.151.1 204.204.7.1 199.6.13.2
Lab-A(config)# ip host Lab-D 210.93.105.1 204.204.7.2
Lab-A(config)# ip host Lab-E 210.93.105.2
Lab-A(config)# Banner motd
#Warning - unauthorized access may result in legal action.#
Lab-A(config)# exit
..
Lab-A# show run
FINAL LAB REPORT ON ROUTER
22

Lab-A copy run start
Lab-A# show ip route
Lab-A# disable
Completed Tasks








SOME DESCRIPTION OF CISCO ROUTE COMMAND FOR DIFFERENT CONFIGURATION MODES

Line configuration mode
This mode is used to configure lines like console, vty and auxiliary. There are main types
of line that are configured.
(i) Console
router(config)#line console 0
(ii) Auxiliary
router(config)#line aux 0
(iii) Telnet or vty
router(config)#line vty 0 4


Interface configuration mode
This mode is used to configure router interfaces. For e.g:- Ethernet, Serial, BRI etc.

Router(config)#interface <type> <number>
Router(config)#interface serial 1

Routing configuration mode
1.Hostname 2. Secret password
3.Line console login 4. Line console password
5. Line vty Login 6. Line vty password
7. E0 IP 8. E0 up
9. E1 IP 10. E1 up
11. S0 IP 12. S0 clock rate (DCE)
13. S0 up 14. Routing Protocol
15. Network 1 16. Network 2
17 Network 3 18. IP Host Lab_A
19. IP Host Lab_B 20. IP Host Lab_C
21 . IP Host Lab_D 22. . IP Host Lab_E.
FINAL LAB REPORT ON ROUTER
23

This mode is used to configure routing protocol like RIP, EIGRP, OSPF etc.

Router(config)#router <protocol> [<option>]
Router(config)#router rip
Router(config)#router eigrp 10

Configuring Password
There are five types of password available in a router
(1) Console Password
router#configure terminal
router(config)#line console 0
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit

to erase password do all steps with no command.

(2) Vty Password
router>enable
router#configure terminal
router(config)#line vty 0 4
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit

(3) Auxiliary Password
router#configure terminal
router(config)#line Aux 0
router(config-line)#password <word>
router(config-line)#login
router(config-line)#exit
(4) Enable Password
router>enable
router#configure terminal
router(config)#enable password <word>
router(config)#exit


(5) Enable Secret Password
Enable Password is the clear text password.

Router>enable
Router#configure terminal
FINAL LAB REPORT ON ROUTER
24

Router(config)#enable secret <word>
Router(config)#exit
Managing Configuration
There are two types of configuration present in a router
(1) Startup Configuration
(2) Running Configuration

(1) Startup configuration is stored in the NVRAM. Startup configuration is used to save
settings in a router. Startup configuration is loaded at the time of booting in to the Primary RAM.
(2) Running Configuration is present in the Primary RAM wherever we run a command for
configuration, this command is written in the running configuration.

To save configuration
Router#copy running-configuration startup-configuration
Or
Router#write

To erase old configuration
Router#erase startup-configuration

Configuring HostName
Router#configure t
Router(config) #hostname <name>

Configuration Interfaces
Interfaces configuration is one of the most important part of the router configuration. By
default, all interfaces of Cisco router are in disabled mode. We have to use different commands
as our requirement to enable and configure the interface.

Configuring IP, Mask and Enabling the Interface
Router#configure terminal
Router(config)#interface <type> <no>
Router(config-if)#ip address <ip> <mask>
Router(config-if)#no shutdown
Router(config-if)#exit
FINAL LAB REPORT ON ROUTER
25




Configuring secondary IP
Router#config terminal
Router(config)#interface <type> <no> FOR EXAMPLE interface f0/0
Router(config-if)#IP address 192.168.10.5 255.255.255.0
Router(config-if)#IP address 192.168.10.18 255.255.255.0 secondary
Router(config-if)#no shutdown (to enable the interface because they always shutdown)
Router(config-if)#exit
Router#show run (to display secondary IP)
Configuring Banners
Banners are just a message that can appear at different prompts according to the type.
Different banners are: -

Message of the day (motd)
This banner appear at every access method


FINAL LAB REPORT ON ROUTER
26

Vous aimerez peut-être aussi