CCNA1 Practice Final – CLI command answers

By | November 30, 2013

CCNA1 Practice Final – CLI command answers

R1

router> enable
router# configure terminal
router(config)# hostname R1
R1(config)# banner motd “No unauthorized access allowed!”
R1(config)# service password-encryption
R1(config)# security passwords min-length 10
R1(config)# enable secret class12345
R1(config)# username admin secret danscourses
R1(config)# ip ssh version 2
R1(config)# ip domain-name danscourses.com
R1(config)# crypto key generate rsa modulus[512] 1024
R1(config)# interface GigabitEthernet0/0
R1(config-if)# ip address 192.168.4.65 255.255.255.192
R1(config-if)# ipv6 address FE80::1 link-local
R1(config-if)# ipv6 address 2001:DB8:CCCC:1::1/6
R1(config-if)# no shutdown
R1(config-if)# interface GigabitEthernet0/1
R1(config-if)# ip address 192.168.4.193 255.255.255.240
R1(config-if)# ipv6 address FE80::1 link-local
R1(config-if)# ipv6 address 2001:DB8:CCCC:2::1/64
R1(config-if)# no shutdown
R1(config-if)# exit
R1(config)# line con 0
R1(config-line)# exec-timeout 5 0
R1(config-line)# login local
R1(config-line)# line vty 0 4
R1(config-line)# exec-timeout 5 0
R1(config-line)# login local
R1(config-line)# transport input ssh
R1(config-line)#exit
R1(config-line)#copy run start

S1

switch> enable
switch# configure terminal
switch(config)# hostname S1
S1(config)# banner motd “No unauthorized access allowed!”
S1(config)# service password-encryption
S1(config)# enable secret class12345
S1(config)# username admin secret danscourses
S1(config)# ip ssh version 2
S1(config)# ip domain-name danscourses.com
S1(config)# crypto key generate rsa modulus[512] 1024
S1(config)# interface vlan 1
S1(config-if)# ip address 192.168.4.126 255.255.255.192
S1(config-if)# no shut
S1(config-if)# exit
S1(config)# ip default-gateway 192.168.4.65
S1(config)# line con 0
S1(config-line)# exec-timeout 5 0
S1(config-line)# login local
S1(config-line)# line vty 0 4
S1(config-line)# exec-timeout 5 0
S1(config-line)# login local
S1(config-line)# transport input ssh>
S1(config-line)# line vty 5 15
S1(config-line)# exec-timeout 5 0
S1(config-line)# login local
S1(config-line)# transport input ssh
S1(config-line)# exit
S1(config-line)# copy run start

S2

switch> enable
switch# configure terminal
switch(config)# hostname S2
S2(config)# banner motd “No unauthorized access allowed!”
S2(config)# service password-encryption
S2(config)# enable secret class12345
S2(config)# username admin secret danscourses
S2(config)# ip ssh version 2
S2(config)# ip domain-name danscourses.com
S2(config)# crypto key generate rsa
modulus[512] 1024
S2(config)# interface vlan 1
S2(config-if)# ip address 192.168.4.206 255.255.255.240
S2(config-if)# no shut
S2(config-if)# exit
S2(config)# ip default-gateway 192.168.4.193
S2(config)# line con 0
S2(config-line)# exec-timeout 5 0
S2(config-line)# login local
S2(config-line)# line vty 0 4
S2(config-line)# exec-timeout 5 0
S2(config-line)# login local
S2(config-line)# transport input ssh>
S2(config-line)# line vty 5 15
S2(config-line)# exec-timeout 5 0
S2(config-line)# login local
S2(config-line)# transport input ssh
S2(config-line)# exit
S2(config-line)# copy run start