What are the 6 steps to reset a password to recover a lost router password?

What are the 6 steps to reset a password to recover a lost router password?



Step 11. Type config t.

Step 12. Type enable secret password to change the enable secret password. 

Step 13. Issue the no shutdown command on every interface that you want to use. 

Step 14. Type config-register configuration_register_setting. 

R1(config)#config-register 0x2102

Step 15. Press Ctrl-Z or type end. 

Step 16. Type copy run start to commit the changes.


What are the 2 steps to access NVRM to recover a lost router password?

What are the 2 steps to access NVRM to recover a lost router password?



Step 9: Type copy start run to copy the startup config into memory. 

Step 10: Type show run. 

In this configuration, the shutdown command appears under all interfaces. 

You can now see the passwords (enable password, enable secret, vty, console passwords) either in encrypted or unencrypted format. 

You can reuse unencrypted passwords. 

You must change encrypted passwords to a new password.

What are the 4 steps to bypass the startup to recover a lost router password?

What are the 4 steps to bypass the startup to recover a lost router password?



Step 5: Type confreg 0x2142 at the 

rommon 1> prompt. 

This causes the router to bypass the startup configuration where the forgotten enable password is stored.

Step 6: Type reset at the rommon 2> prompt. 

The router reboots, but ignores the saved configuration.

Step 7: Type no after each setup question, or press Ctrl-C to skip the initial setup procedure.

Step 8: Type enable at the Router> prompt. 

This puts you into enable mode, and you should be able to see the Router# prompt

What are the 4 steps to prepare the device to recover a lost router password?

What are the 4 steps to prepare the device to recover a lost router password?



Step 1: Connect to the console port.

Step 2: If you have access to user EXEC mode. 

Type show version at the prompt, and record the configuration register setting. 

The configuration register is usually set to 0x2102. 

If you can no longer access user EXEC, you can assume it is set to 0x2102.

Step 3: Use the power switch to turn off the router, and then turn the router back on.

Step 4: Press Break on the terminal keyboard within 60 seconds of power up to put the router into ROMmon.

What is used to add a time stamp to a debug message.

What is used to add a time stamp to a debug message. 



This feature provide information about when debug elements occurred and the duration of time between events

service timestamps


displays the CPU use for each process. 

This data can influence decisions about using a debug command if it indicates that the production system is too heavily used for adding a debug command.

show processes


disables all debug commands

no debug all


displays debug output and system error messages for the current terminal and session. 

When you Telnet to a device and issue a debug command, you will not see output unless this commands is entered.

terminal monitor

What are the 5 considerations when using the debug command?

What are the 5 considerations when using the debug command?



Answer: (1) debug gets CPU priority (2) debug can help resolve persistent issues, outweighing its effect on network performance (3) debug can generate too much output (4) Different debugs generate different output formats (5) plan to use the debug command


What are the 4 steps of using xmodem to restore an IOS image?

What are the 4 steps of using xmodem to restore an IOS image?



Step 1. Connect the PC of the system administrator to the console port on the affected router.

Step 2. Boot the router and issue the xmodem command at the ROMmon command prompt. 

Step 3: For sending a file using HyperTerminal, select Transfer > Send File. 

Step 4: Browse to the location of the IOS image you want to transfer and choose the Xmodem protocol. 

Click Send. A dialog box appears displaying the status of the download. It takes several seconds before the host and the router begin transferring the information.

The download time could be dramatically improved if you change the connection speed of HyperTerminal and the router from 9600 b/s to 115000 b/s.

When the transfer is complete, the router automatically reloads with the new Cisco IOS.


How does Xmodem work?

How does Xmodem work?



allows a system administrator who has a copy of the Cisco IOS image on a PC can restore it to the router by making a console connection between the PC and the router and running Xmodem from HyperTerminal.

The file transfer is accomplished

What are the 3 steps to restore an IOS

What are the 3 steps to restore an IOS



Step 1: Connect the devices

Step 2: Boot the router and set the ROMmon variables

Step 3: Enter the tftpdnld command at the prompt

What is the process of upgrading a system to a newer software version?

What is the process of upgrading a system to a newer software version?



(1) Use the copy tftp: flash: command to download the new image from the network TFTP server.

(2) Erasing flash makes room for the new image. Erase flash, if there is not sufficient flash memory for more than one Cisco IOS image. 

(3) Each exclamation point (!) means that one UDP segment has successfully transferred

What are the three steps to copy an IOS image from flash to the network TFTP server?

What are the three steps to copy an IOS image from flash to the network TFTP server?



Step 1. Ping the TFTP server to make sure you have access to it.

Step 2. Verify that the TFTP server has sufficient disk space for the Cisco IOS image. 

Step 3. Copy current system image from the router to TFTP server, using the copy flash: tftp: command in privileged EXEC mode.


What is the process of updating a router?

What is the process of updating a router?



(1) Shut down all interfaces not needed to perform the update (2) Back up the current operating system and the current configuration file to a TFTP server (3) Load the update for either the operating system or the configuration file (4) Test to confirm that the update works properly. If the tests are successful, you can then re-enable the interfaces you disabled. If the tests are not successful, back out the update, determine what went wrong, and start again.


What are the five parts of the cisco file naming conventions?

What are the five parts of the cisco file naming conventions?



(1) First part identities the platform on which the image runs (2) Send part specifies the feature set (3) indicates where the image runs and if the file is compressed. (4) version number (5) file extension.


What is the four phase migration process to simplify network operations and management?

What is the four phase migration process to simplify network operations and management?



(1) Plan: Set goals, identify resources, profile network hardware and software, and create a schedule for migrating to new releases. 

(2) Design: Choose new Cisco IOS releases and create a strategy for migrating to the new releases. 

(3) Implement: Schedule and execute the migration. 

(4) Operate: Monitor the migration progress and make backup copies of images that are running on your network.


Copy the running config from RAM to the startup config in NVRAM
copy system:running-config nvram:startup-config

Copy running config from RAM to a remote location:
R2# copy running-config tftp:
R2# copy system:running-config tftp:

Copy config from a remote source to the running config
R2# copy tftp: running-config
R2# copy tftp: system:running-config

Copy config from a remote source to the startup config
R2# copy tftp: startup-config
R2# copy tftp: nvram:startup-config

What 3 items are contained in the Firewall policies in the configuration overview area?

What 3 items are contained in the Firewall policies in the configuration overview area?



(1) If a firewall is in place, it displays 

(2) The number of trusted (inside) interfaces, untrusted (outside) interfaces and DMZ interfaces. 

(3) It also displays the name of the interface to which a firewall has been applied, and if the NAT rule has been applied to this interface.


What is contained in the interfaces and connections overview area?

What is contained in the interfaces and connections overview area?



(1)The number of connections that are up and down, 

(2) The total number of LAN and WAN interfaces present in the router

(3) The number of LAN and WAN interfaces currently configured on the router. 

(4) DHCP information

What commands do you use to encrypt OSPF?

What commands do you use to encrypt OSPF?



interface s0/0/0

ip ospf message-digest-key 1 md5 cisco

ip ospf authentication message-digest

exit

router ospf 10 

area 0 authentication message-digest

What commands do you use to encrypt EIGRP?

What commands do you use to encrypt EIGRP?



key chain EIGRP_KEY

key 1

key-string cisco

exit

interface s0/0/0

ip authetncation mode eigrip 1 md5

ip authentication key-chain eigrp 1 EIGRP_KEY

What is contained in the router area in the SDM page?

What is contained in the router area in the SDM page?



(1) Host Name (2) Hardware (2a) Hardware: shows the router model number, the available and total amounts of RAM and Flash memory available. (3) Software (3a) describes the Cisco IOS software and Cisco SDM versions running on the router. (4) Feature Availability bar (4a) found across the bottom of this tab, shows the features available in the Cisco IOS image that the router is using


What information does the CISCO SDM home overview page display?

What information does the CISCO SDM home overview page display?



(1) Tool Bar (1a) Below the menu bar, it has the SDM wizards and modes you can select (2) Router Information (2a) The current mode is displayed on the left side under the tool bar (3) Configuration overview (3a) Summarizes the configuration settings


How do you start the CISCO SDM?

How do you start the CISCO SDM?



(1) use HTTPS and put the IP address of the router into the browser. 

(2) When the username and password dialog box appears, enter the username and password for the privileged (privilege level 15) account. 

(3) After the launch page appears a signed Cisco SDM Java applet appears which must remain open while Cisco SDM is running.


What 4 steps must you do to be able to successfully install SDM?

What 4 steps must you do to be able to successfully install SDM?



Answer: (1) Access the router CISCO CLI interface using Telnet or the console connection (2) Enable the HTTP and HTTPS servers on the router (3) Create a user account defined with privilege level 15 (4) Configure SSH and Telnet for local login and privilege level 15


What functions does the CISCO SDM smart wizard provide?

What functions does the CISCO SDM smart wizard provide?



(1_ Guide users step-by-step through router and security configuration workflow by systematically configuring LAN and WAN interfaces, firewall, IPS and VPNs.

(2) intelligently detect incorrect configurations and propose fixes, such as allowing DHCP traffic through a firewall if the WAN interface is DHCP-addressed.


If remote access is required, your options are what two things?

If remote access is required, your options are what two things?



Answer: (1) Establish a dedicated management network (1a) This could be accomplished using a management VLAN or by using an additional physical network (2) Encrypt all traffic between the administrator computer and the router (2a) only permit the administration host IP address to initiate an SSH connection to the routers in the network.


What are 6 good password practices?

What are 6 good password practices?


Answer: 


(1) Do not write passwords down & leave them in places such as your desk or on your monitor 


(2) Avoid dictionary words, names, phone numbers and dates 


(3)Combine letters, numbers and symbols. Include at least one lowercase letter, uppercase letter, digit and special character 


(4) Deliberately misspell a password 


(5) Make passwords lengthy (minimum of eight characters). 

(6) Change passwords as often as possible

What are the six steps to safeguard a router?

What are the six steps to safeguard a router?



Answer: (1) manager router security (2) Secure remote administrative access to routers (3) Logging router activity (4) Secure vulnerable router services and interfaces (5) Secure Routing protocols (6) Control and filter network traffic


What are 4 Router security issue solutions?

What are 4 Router security issue solutions?



Answer: (1) Physical security (2) Update the router IOS whenever advisable (3) Backup the router configuration and IOS (4) Harden the router to eliminate the potential abuse of unused ports and services


What roles can CISCO routers act as in SSH?

What roles can CISCO routers act as in SSH?



Answer: (1) SSH Client (1a) As a client, a router can SSH to another router (2) SSH Server (2a) As a server, a router can accept SSH client connections


What are the five steps to configure SSH Security?

What are the five steps to configure SSH Security?



Answer: (1) Set Router Parameters (1a) Configure the router hostname (2) Set the domain name (2a) Enter the ip domain-name cisco.com command (3) Generate Asymmetric Keys (3a) Create a key that the router uses to encrypt its SSH management traffic with the crypto key generate rsa command (4) Configure Local Authentication and VTY (5) Configure SSH timeouts and retries


What are 8 services which should typically be disabled?

What are 8 services which should typically be disabled?



Answer: (1) CDP (1a) no cdp run (2) Source routing (2a) no ip source-route (3) Small services such as echo, discard, and chargen (3a) no service tcp-small-servers (4) finger (4a) no service finger (5) BOOTP (5a) no ip bootp server (6) HTTP (6a) no ip http server (7) Remote Configuration (7a) no service config (8) SNMP (8a) no snmp-server