Need help for CCNA Questions for Practical. What are the steps I need to take to do these commands in the configuration window?

Device configuration

Frisco Router configuration:

Name the router as Frisco as shown in the topology

Set the minimum length for passwords as 9 characters

Disable DNS look up

Configure message of the day banner as "Warning!! Login is restricted to authorized users only"

Set Encrypted privileged EXEC password as "ccna1enpass"

To prevent brute-force login attacks, block login attempts for 60 seconds if there are three failed login attempts within 30 seconds

Configure console access password as "ccna1conpass"

Extend the EXEC timeout default of 10 minutes to 30 minutes for the console port

Set login on vty lines 0 thru 4 to use local database and to accept SSH connections only

Switch configuration: SW1

Name the switch for LAN-A as SW1 as shown in the topology

Disable DNS look up

Configure message of the day banner as "Warning!! Login is restricted to authorized users only"

Set Encrypted privileged EXEC password as "class"

To prevent brute-force login attacks, block login attempts for 60 seconds if there are three failed login attempts within 30 seconds

Configure console access password as "cisco"

Set login on vty lines to use password as "cisco"

Switch configuration: SW2

Name the switch for LAN-B as SW2 as shown in the topology

Disable DNS look up

Set Encrypted privileged EXEC password as "class"

Configure console access password as "cisco"

Set login on vty lines to use password as "cisco"

IPv4 Addressing Assignment:

1. Frisco router’s interfaces will be assigned the first IP address

G0/0/1 (LAN-A) _____________________

G0/0/0 (LAN-B) _____________________

Switches SW1 and SW2 will be assigned the second IP address

SW1 (SVI in LAN-A) _____________________

SW1 (Default Gateway) _____________________

SW2(SVI in LAN-B) _____________________

SW2(Default Gateway) _____________________

3 PC-A and PC-B can be assigned with any valid IP address in each

of their respective subnets. Configure Default Gateways as well.

Test and Verify IPv4 End-to-End Connectivity

- Use PING to test and verify reachability among all devices

- PC-A and PC-B both should be able to telnet into SW1 and SW2

- PC-A and PC-B both should NOT be able to telnet into Frisco

Configure Security Services on Frisco router

- Configure Frisco router for SSH remote access. Use "itcc1314.com" as ip domain name

- Create an administrative user in the local database:

Username: admin

Password: adminccna1

- Configure vty ports 0 thru 4 to permit only SSH access(pre-configured in Part 2)

- Set login on vty ports 0 thru 4 to use local database(pre-configured in Part 2)

- Generate RSA crypto key with 2048 bits modulus

- Verify remote access from PC-A and PC-B to Frisco router using SSH client

Configure IPv6 Addressing using SLACC

Given an IPv6 global unicast network address of 2001:DB8:ACAD::/48, configure IPv6 addresses for the Gigabit interfaces on Frisco.

Your given IPv6 network address of 2001:DB8:ACAD::/48 is subnetted into two more subnets for LAN-A and LAN-B, you can make use of the 4th Hextet (16-bit subnet IDs) as follows:

2001:DB8:ACAD:ABCD::/64 (assign to LAN-A)

2001:DB8:ACAD:DCBA::/64 (assign to LAN-B)

After you completed the manual assignment of IPv6 GUA address to the router interfaces (use the first IPv6 global unicast host address for each subnet), the router will automatically assign a link-local address using the EUI-64 method.

Reconfigure the link-local addresses for both

G0/0/0 and G0/0/1 on the router to override the default link-local address automatically assigned by the EUI-64 method.

Reconfigure to FE80::1 as the link-local address on both router interfaces.

The end devices must be set as "Auto Config" in order to configure its own IPv6 global unicast address from SLACC. Record the IPv6 global unicast address for each of the end devices:

IPv6 address for PC-A __________________________________

IPv6 address for PC-B __________________________________

Use PING to verify IPv6 end-to-end reachability.

Verify SSH remote access from the PCs using IPv6 addressing.