1 00:00:07,870 --> 00:00:09,440 This is a troubleshooting lab. 2 00:00:10,150 --> 00:00:18,310 Can you believe it? The previous administrator at your company was fired and he was the only one who 3 00:00:18,310 --> 00:00:21,430 knew the passwords of these devices. 4 00:00:22,090 --> 00:00:30,160 Unfortunately, the company doesn't have a document with company passwords locked in a safe or stored 5 00:00:30,160 --> 00:00:31,360 somewhere securely. 6 00:00:32,210 --> 00:00:39,270 The passwords of these devices were only known by the now fired network administrator 7 00:00:39,610 --> 00:00:41,800 and you need to fix this. 8 00:00:42,480 --> 00:00:50,750 So in this lab, you need to do a password reset on router 1, router 2, and switch 1. 9 00:00:51,370 --> 00:00:57,720 You need to reset the enable passwords of router 1, router 2 and the switch to Cisco. 10 00:00:58,420 --> 00:01:01,510 Now, that in itself is not a good advice for the real world. 11 00:01:02,050 --> 00:01:07,330 In the real world, you obviously going to use a better password than Cisco 12 00:01:07,600 --> 00:01:16,000 but for this lab, that's sufficient. Now to help you I've added links to Cisco, documentation for the 13 00:01:16,000 --> 00:01:16,780 real world 14 00:01:17,260 --> 00:01:24,820 you should learn to use Google as well as the Cisco documentation for troubleshooting and networks. 15 00:01:25,480 --> 00:01:31,390 This first document is a troubleshooting guide for the Cisco 4000 series Integrated Services Router 16 00:01:31,900 --> 00:01:36,280 and the second link is recovering from a lost or forgotten password 17 00:01:37,520 --> 00:01:43,220 on the 3560 software configuration guide documentation. 18 00:01:44,490 --> 00:01:49,800 So use the documentation to help you if you're not sure how to recover a password. 19 00:01:50,550 --> 00:01:58,740 Now, one thing to note is that Packet Tracer doesn't fully support all the options for password recovery 20 00:01:59,160 --> 00:02:00,690 on a Cisco switch 21 00:02:01,140 --> 00:02:06,390 but I've tried to make it as close as possible to a real world example. 22 00:02:06,960 --> 00:02:14,730 So if you need to watch the next video where I demonstrate how to solve the lab, the router password 23 00:02:14,730 --> 00:02:20,330 recovery will be as per the documentation on the Cisco website. 24 00:02:20,940 --> 00:02:26,820 So use this to help you if you're not sure how to recover passwords. 25 00:02:29,030 --> 00:02:35,690 By, for instance, going into ROM Monitor and changing the configuration register, but for the switch 26 00:02:35,870 --> 00:02:40,820 the documentation on Cisco's website is excellent and will help you a lot 27 00:02:41,360 --> 00:02:46,580 but you may need to watch my video to get it to work fully in Packet Tracer. 28 00:02:47,900 --> 00:02:55,010 Now, once you've recovered the passwords, make sure that you restore the device configurations. 29 00:02:55,550 --> 00:02:58,970 So don't lose the device configurations. 30 00:02:59,450 --> 00:03:07,850 You should be able to bypass the secret and enable passwords on the devices and restore the configuration. 31 00:03:08,570 --> 00:03:11,180 On router 1 we are using an enable password. 32 00:03:11,450 --> 00:03:18,700 So you need to set that to Cisco, on router 2 end the switch set the secret password to Cisco. 33 00:03:19,220 --> 00:03:22,280 So make sure that you reset the right password. 34 00:03:22,760 --> 00:03:29,510 In the real world, you want to use secret passwords and not enable passwords, but for the lab and 35 00:03:29,510 --> 00:03:33,030 for studying, we'll do an example of both. 36 00:03:33,590 --> 00:03:39,800 So again, make sure that device configurations are restored and that devices can ping the loop 37 00:03:39,800 --> 00:03:40,280 backs. 38 00:03:41,150 --> 00:03:47,930 Verify also that when devices are reloaded, configurations are restored using the new passwords. 39 00:03:48,710 --> 00:03:55,310 So click on power cycle devices once you think you've got everything working and make sure that the 40 00:03:55,310 --> 00:04:03,590 devices reboot, configurations are loaded correctly, and that the passwords are set to Cisco per these 41 00:04:03,590 --> 00:04:04,400 instructions. 42 00:04:05,150 --> 00:04:11,750 So can you complete the lab? Download the attached packet, tracer file and see if you can complete 43 00:04:11,840 --> 00:04:12,770 the lab yourself. 44 00:04:13,430 --> 00:04:17,209 Otherwise, watch the next video where I complete this lab.