04
04
Aim: Configure the switch to secure the port and Telnet from unauthorized users. Analyze enable secret
and password login commands in detail.
First shown in image, we have connected routers with switch at for providing internet
connection and one pc is connected with switch for internet usage at port Fast-Ethernet.
Below shown screen is terminal of CLI (Command Line Interface) where we can configure and
operate different devices using different commands.
First “Router>” shows that we are currently in user mode where we do not have such
privileges to change any configurations any device connected with router.
So for configuration purpose first we uses command “enable”, by which we can transfer from
user mode to privilege mode. Here in privilege mode, we some privileges by which we can
show current running configurations and many more things.
For configuring router, we should transfer to configuration mode where we can shift through
“config t” command.
The “enable secret” command is used to set password for other user to prevent changes
without permission and for security reasons.
When we set password by “enable secret” command, after exiting to user mode when we try
to enter in privilege mode we want to enter password to enter otherwise we cannot enter in
privilege mode.
For exiting from configuration mode to privilege mode, we uses “exit” command and for
privilege to user mode same command is used.
Marwadi University
Faculty of Engineering and Technology
Department of Information and Communication Technology
Subject: Computer Aim: Configure the switch to secure the port and Telnet from
Networks (01CT0503) unauthorized users. Analyze enable secret and password login commands
in detail.
Experiment No: 04 Date:07-08-2023 Enrolment No: 92100133062
Marwadi University
Faculty of Engineering and Technology
Department of Information and Communication Technology
Subject: Computer Aim: Configure the switch to secure the port and Telnet from
Networks (01CT0503) unauthorized users. Analyze enable secret and password login commands
in detail.
Experiment No: 04 Date:07-08-2023 Enrolment No: 92100133062
In below shown code, “line vty” command is used to set password to set any device virtually
and which can operate it from any place. For this we first limits number of devices for remote
access and then we set one password for security of information
Last we used “login” command, which is used to stop the user from start writing command
until he/she enters correct password.
The “line console” command is used to set password at the starting of the cli screen. When you
enter in screen, you must enter password to enter in user mode.
See in below image, when we try to entre in user mode is shows “Enter Password” for user
authentication.
There is also good feature in this tool that if we enter password, it does not shows password
on screen.
When you enter password enter and press enter, if password is correct then you enters in user
mode otherwise it will not allow you to enter in user mode.
Here, we have used command “int g0/0/0”, which us used to configure pin Gigabit 0/0/0.
We have set the IP address of g0/0/0 by using command “ip add” as 10.0.0.1 and subnet as
255.0.0.0.
The command "no shutdown" enables the interface to move from administration down status to
UP. The interface f0/1 status changes from administration down to u
Marwadi University
Faculty of Engineering and Technology
Department of Information and Communication Technology
Subject: Computer Aim: Configure the switch to secure the port and Telnet from
Networks (01CT0503) unauthorized users. Analyze enable secret and password login commands
in detail.
Experiment No: 04 Date:07-08-2023 Enrolment No: 92100133062
Below shown image is to set IP address of end device and to set destination address for that
device.
The IP address of end device is set to 10.0.0.2 and subnet mask is by default set to 255.0.0.0.
We have set default gateway (destination IP address) of router which is 10.0.0.1.
Marwadi University
Faculty of Engineering and Technology
Department of Information and Communication Technology
Subject: Computer Aim: Configure the switch to secure the port and Telnet from
Networks (01CT0503) unauthorized users. Analyze enable secret and password login commands
in detail.
Experiment No: 04 Date:07-08-2023 Enrolment No: 92100133062
Now, after setting IP address of end device and router, we start our communication with
router from other place wirelessly.
For that first from end device, we select desktop and there is command prompt option.
In command prompt, first we want to check whether the connection with router is established
or not. For that we use command “ping”, by which we can check the connectivity of device.
The “ping” command will send a 32 bit packet to the device to which we want to connect and
wait for some time to check whether the connection is done or not. If our system receives an
acknowledge signal by that device, then connection is established else not.
The other command we have used is “telnet”, by which we can enter in user mode from any
other place and can configure the other device.
The only thing we require is IP address of that particular device to which we want to
communicate.
Marwadi University
Faculty of Engineering and Technology
Department of Information and Communication Technology
Subject: Computer Aim: Configure the switch to secure the port and Telnet from
Networks (01CT0503) unauthorized users. Analyze enable secret and password login commands
in detail.
Experiment No: 04 Date:07-08-2023 Enrolment No: 92100133062
Here after accessing router, we uses command “show running-config” which will display all
running configurations of that device but for executing that first we want to enter in privilege
mode or configuration mode.
We can also notice that all other passwords we set can be seen using this command but only
password will be hidden which is protected by “enable secret” command. That shows that
“enable secret” has more privacy “line vty password” and “line console password”.
Marwadi University
Faculty of Engineering and Technology
Department of Information and Communication Technology
Subject: Computer Aim: Configure the switch to secure the port and Telnet from
Networks (01CT0503) unauthorized users. Analyze enable secret and password login commands
in detail.
Experiment No: 04 Date:07-08-2023 Enrolment No: 92100133062
Conclusion:
After completing my this practical task, I got to know the way how connection can established
with other device wirelessly and how can we check the connectivity of our device with others.
Also got to know how to configure any wireless connected device remote place.