lLab 10‐2: Connecting to CISCO Equipment - rune-seregina/net-150-sp24 GitHub Wiki
In this lab, I used my knowledge of Cisco's simulation tool, packet tracer, and applied it to real hardware devices by configuring a CISCO router using Putty. This involved switching between modes, changing and saving configuration settings, and configuring a specific interface.
- We had several issues with our router, including routers booting in the wrong mode, Putty not recognizing keyboard input, and accidentally booting up a switch. Eventually, we acquired a working router and found our issue to lie in our USB/Serial Console cable, which we switched out to eventually get the lab to work. Some other minor issues involved trying to execute commands in the wrong mode, and to solve this in the future I included a comprehensive explanation of each mode at the bottom of this page.



Screenshot #4: Output from the show interface command that displays the interface hardware (MAC) address (in xxxx.xxxx.xxxx hex format) and the IP address/mask you set (192.168.3.133)



- Find COM # for USB Serial Port in Device Manager > Open putty.exe > Connection type Serial + COM #
- "enable", prompt should change to Router#
- "?" to see all available commands in current modes
- "?" also shows what to input next in a command
- command hierarchy prompts:
-
- Router> User Exec - basic monitoring commands
-
- Router# privileged exec - all commands
-
- Router(config)# Global configuration commands
-
-
- Router(config-if)# interface level commands within global config
-
-
-
- Router(config-router)# engine level commands within global config
-
-
-
- Router(config-line)# line level commands within global config
-
- tab autocompletes commands once you start typing! (eg. "inter + tab" makes interface)
- "configure terminal" or "config t"
- "exit" to go back to privileged
- "show running-config" or "show run"
- "no [configuration to be removed]" eg. "no hostname"
- copy running-config startup-config" or "copy run start"
- privileged mode > "reload"
- "do" runs commands in privileged mode