SlideShare a Scribd company logo
Cisco Internetworking Operating System (IOS)
Cisco IOS (originally Internetwork Operating
System) is software used on most Cisco Systems
routers and current Cisco network switches.
(Earlier switches ran CatOS.) IOS is a package of
routing, switching, internetworking and
telecommunications functions integrated into a
multitasking operating system.
The first IOS was written by William Yeager in
1986.
CLI – Command Line Interface
There are different ways to configure a router but
most often, the first place we would connect to is
the console port. The console port is usually an RJ-
45 (8 Pin Modular) connection.
We can also connect to a Cisco router through an auxiliary port but for that we need a modem.
The third way to connect to a Cisco router is in-band, through the program Telnet.
Bringing Up a Router
When we first bring up a Cisco router, it will run a power on self-test (POST). If it passes, it will then
looks for and load the Cisco IOS from flash memory-- if an IOS file is present. After that, the IOS loads
and looks for a valid configuration--the startup-config, that’s stored by default in non-volatile RAM, or
NVRAM.
If there isn’t a configuration in NVRAM, the router will go in to set up mode, a step by step process to
help you configure the router. You can also enter setup mode at any time from the command line by
typing the command setup from something called privilege mode.
Flash Memory – Flash memory is electronically erasable programmable read-only memory—an
EEPROM.
The Pound signs (#) are telling us that the IOS is being decompressed into RAM. After it is decompressed
into RAM, the IOS is loaded and starts running the router.
After the interface status messages appear and we press enter the Router > prompt will appear. This is
called user exec mode (User mode). And it’s mostly used to view statistics, but it’s also a steppingstone
to logging into privileged mode.
Cisco Internetworking Operating System (IOS)
We can only view and change the configuration of a Cisco router in privileged exec mode, which we can
enter with the enable command.
At first we see Press “Enter” to start
Router > (User Mode)
Router > enable
Router# (Privileged Mode)
To exit from this mode we type here exit or disable or logout
Router# exit
Router>
(Ctrl+C) Exit
To configure from CLI, you can make global changes to the router by typing configure-terminal, which
puts you in global configuration mode and changes what’s known as the running-config.
You can type config from the privileged-mode prompt then just press enter to take the default of
terminal.
Router#config t
Router (config) # (configure mode)
To make changes to an interface, we use the interface command from global configuration mode.
Router (config) #int fa0/0
Router (config-if) #
Sub Interfaces
Sub Interfaces allow you to create logical interfaces within the router. The prompt then changes to
Router (config-subif) #
Router (config-if) int fa0/0.1
Router (config-subif) #
Line Commands
To configure user-mode passwords, use the line command. The prompt then becomes
Router (config-line) #
Router # config t
Router (config) # line console 0
Router (config-line) # password Cisco
Cisco Internetworking Operating System (IOS)
The line console 0 command is known as a major command (also called a global command) and any
command typed from the (config-line) prompt is known as a subcommand.
Routing Protocol Configurations
To configure routing protocols such as RIP and EIGRP, use the prompt (config-router) #.
Router # config t
Router (config) #router rip
Router (config) # version 2
Router (config-router) #
We can use the Cisco advanced editing features to help us to configure the router. If we type in a
question mark at any prompt we will be given a list of all the commands available from that prompt.
Router #?
By typing the clock? We will get a list of the next possible parameters and what they do.
Router# clock?
Router# clock set?
Router# clock set 10:30:10 10 28 Aug
Use the show history command to see the last 10 commands that were entered on the router
Router# show his
The show version command will provide basic configuration for the system hardware as well as the
software version, the names and sources of configuration files, and the boot images.
Router# show version
To check the running config
Router# show run
To check the serial interface
Router# show serial 0/0/0
We can set the identity of the router with hostname command.
Router# config t
Router (config) #hostname Cisco
Cisco (config) #
Cisco Internetworking Operating System (IOS)
A banner is more than just a little cool-one very good reason for having a banner is to give any and all
who dare attempt to telnet or dial into your internetwork a little security notice.
Router (config) # banner motd @unauthorized access prohibited@
Other type of banner
1. Incoming banner,
2. Login banner.
Setting Passwords
There are five passwords used to secure your Cisco routers. Console, auxiliary, telnet, enable and enable
secret.
Two passwords are used to set your enable password that’s used to secure privileged mode. This will
prompt a user for a password when the enable command is used.
The other three are used to configure a password when user mode is accessed either through the
console port, through the aux port or via telnet.
We set the enable passwords from global configuration mode
Router (config) # enable password cisco
Sets the enable password on older, pre 10.3 systems, and isn’t ever used if an enable secret is set.
Secret – Is the newer, encrypted password that overrides the enable password if it’s set.
Use -tacas- this tells the router to authenticate through a TACACS server.
Router (config) #enable secret CCNA
User mode passwords are assigned by using the line command
Router (config) #line vty 0 4
# Password ccnp
#login
Aux-sets the user-mode password for the auxiliary port. It’s usually used for attaching a modem to the
router, but it can be used as a console as well.
Console - Sets a console user-mode password.
Vty sets a telnet password on the router. If this password isn’t set then telnet can’t be used by default.
Cisco Internetworking Operating System (IOS)
To configure the auxiliary password go in to global configuration mode and type line aux? You can see
here that you only get a choice of 0-0.
Router#config t
Router (config) #line aux 0
Router (config-line) #password ccnp
Router (config-line) #login
Router #sh run
Through this command we see all passwords but if we want to change or encrypt all passwords format
then we run this command
Router (config) #service password encryption
For turn off this command
Router (config) #no service password encryption
Descriptions– Setting the descriptions on an interface is helpful to the administrator and like the
hostname only locally significant.
Router (config-if) #description sales LAN
Router Interfaces
Interfaces configuration is one of the most important router configurations, because without interfaces
a router is pretty much a completely useless object. Plus interfaces configurations must be totally
precise to enable communication with other devices. Some of the configurations used to configure an
interface are network layer addresses, media type, bandwidth and other administrator command.
Configure an IP address on an interface
Router (config) #int e0
Router (config-if) #Ip add 192.168.10.10 255.255.255.0
Router (config-if) #no shut
We configure a DCE serial interface with the clock rate command.
Router (config) #int s0/0
Router (config-if) #clock rate 64000
Router (config-if) #bandwidth 64
We can manually save the file from DRAM to NVRAM by using the copy run command.
We can delete the startup config file by using the erase startup config command.
Cisco Internetworking Operating System (IOS)
Router # erase startup-config
To restart the router via command
Router# reload
Save? (yes/no) n
Ping – Ping is packet Internet Groper, a programme that uses ICMP Echo requests and replies. Ping
sends a packet to a remote host, and if that host responds, means that the host is alive.
Trace route – Uses ICMP with IP time to live (TTL) time outs to track the path a packet takes through an
internetwork, in contrast to Ping, which just finds the host and responds. And Trace route can also be
used with multiple protocols.
 Verifying with the show interface Command
Router#show int fa0/0
Router#show int s0/0
Another important configuration to notice is the keepalive, which is 10 seconds by default, each router
sends a keepalive message to its neighbor every 10 seconds, and if both routers aren’t configured for
the same keepalive time, it won’t work.
We can clear the counters on the interface by typing the command clear counters.
Router#clear counters s0/0
MTU – Maximum Transmission Unit (1500 bytes by default)
Using the “show ip int” brief command.
This command provides a quick overview of the routers interfaces including the logical address and
status.
Router#show ip int brief
 Show protocols command
The show protocols command is a really helpful command you’d use in order to see the quick status of
layers 1 and 2 of each interface as well as the ip address used.
 Using the show Controllers Command
The show controllers command displays information about the physical interfaces itself. It will also give
you the type of serial cable plugged in to a serial port. Usually this will only be a DTE cable that plugs in
to a type of Data Service Unit (DSU).
Cisco Internetworking Operating System (IOS)
Router#show controllers serial 0/0
Router#show controllers serial 0/1
Notice that serial 0/0 has a DTE cable, whereas the serial 0/1 connection has a DCE cable. Serial 0/1
would have to provide clocking with the clock rate command. Serial 0/0 would get its clocking from the
DSU.
 Understand the sequence of what happens when you power on a router
When you first bring up a cisco router it will run a power on self-test (post), and if that passes, it will
then look for and load the Cisco IOS from flash memory, if a file is present the IOS then proceeds to load
and looks for a valid configuration in NV RAM called the Startup-config. If no file is present in NV RAM,
the router will go into setup mode.
Set up mode is automatically started if a router boots and no startup – config is in NV RAM. We can also
bring up set up mode by typing setup from the privileged mode.
Understand the difference between user mode and privileged mode. User mode provides a command
line interface with very few available commands by default. User mode does not allow the configuration
to be viewed or changed. Privileged mode allows a user to both view and change the configuration of a
router. You can enter privileged mode by typing the command enable.
 Remember what the command show version Provides
The show version command will provide basic configuration for the system hardware as well as the
software version, the names and sources of configuration files, the config-register setting and the boot
images.
 Remember the diff between the enable password and enable secret password
Both of these passwords are used to gain access into privileged mode. However, the enable secret is
newer and is always encrypted by default. Also, if you set the enable password and then set the enable
secret, only the enable secret will be used.
If we type show int serial 0 and see that is down, line protocol is down, this will be considered a physical
layer problem. If you see it as up, line protocol is down, then you have a data link layer problem.
 Using the Pipe
This Pipe (|) allows s to wade through all the configurations or other long outputs and get straight to our
goods fast.
Router#show run | begin interface
Router#show Ip route | include 192.168.1.1
Cisco Internetworking Operating System (IOS)
 For SSH Login
Router#host cisco
Cisco#conf t
Cisco (config) #Ip domain name cisco.com
#username R1 password cisco123
#crypto key generate rsa general-keys modulus 1024
#ssh version 2
#line vty 0 4
#transport input ssh telnet
#login local

More Related Content

What's hot

CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
Packet Tracer: Load Balancing with GLBP and FHRP
Packet Tracer: Load Balancing with GLBP and FHRPPacket Tracer: Load Balancing with GLBP and FHRP
Packet Tracer: Load Balancing with GLBP and FHRP
Rafat Khandaker
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
Nil Menon
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
RaghulR21
 
Cisco ios overview
Cisco ios overviewCisco ios overview
Cisco ios overview
NetProtocol Xpert
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
Respa Peter
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
MohamedJafar5
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
Josue Wuezo
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
BOURY1
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 

What's hot (20)

CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
Packet Tracer: Load Balancing with GLBP and FHRP
Packet Tracer: Load Balancing with GLBP and FHRPPacket Tracer: Load Balancing with GLBP and FHRP
Packet Tracer: Load Balancing with GLBP and FHRP
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Cisco ios overview
Cisco ios overviewCisco ios overview
Cisco ios overview
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
VLANs_Module_3.pptx
VLANs_Module_3.pptxVLANs_Module_3.pptx
VLANs_Module_3.pptx
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 

Viewers also liked

Operating system
Operating systemOperating system
Operating system
Yudha Arif Budiman
 
OSPF (open shortest path first) part ii
OSPF (open shortest path first) part  iiOSPF (open shortest path first) part  ii
OSPF (open shortest path first) part ii
Netwax Lab
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
Netwax Lab
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
Netwax Lab
 
OSPF Route Filtering
OSPF Route FilteringOSPF Route Filtering
OSPF Route Filtering
Netwax Lab
 
STP Protection
STP ProtectionSTP Protection
STP Protection
Netwax Lab
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
Netwax Lab
 
IP Address
IP AddressIP Address
IP Address
Netwax Lab
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Netwax Lab
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iii
Netwax Lab
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
Netwax Lab
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
Netwax Lab
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
Netwax Lab
 
TCP Intercept
TCP InterceptTCP Intercept
TCP Intercept
Netwax Lab
 
119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut
nicolelemmimg
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF Configuration
Netwax Lab
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
Netwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
Netwax Lab
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
Netwax Lab
 

Viewers also liked (20)

Operating system
Operating systemOperating system
Operating system
 
OSPF (open shortest path first) part ii
OSPF (open shortest path first) part  iiOSPF (open shortest path first) part  ii
OSPF (open shortest path first) part ii
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
OSPF Route Filtering
OSPF Route FilteringOSPF Route Filtering
OSPF Route Filtering
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 
IP Address
IP AddressIP Address
IP Address
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iii
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
TCP Intercept
TCP InterceptTCP Intercept
TCP Intercept
 
119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF Configuration
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
 

Similar to Cisco Internetworking Operating System (ios)

CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glanceVikas Raut
 
Ccna command
Ccna commandCcna command
Ccna command
Sudhir Maherwal
 
10 Command Line quan trọng để giao tiếp với Cisco IOs
10 Command Line quan trọng để giao tiếp với Cisco IOs10 Command Line quan trọng để giao tiếp với Cisco IOs
10 Command Line quan trọng để giao tiếp với Cisco IOs
Nhóc Nhóc
 
OSWAN.pptx
OSWAN.pptxOSWAN.pptx
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorialIT Tech
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
Betselove
 
C C N A Day2
C C N A  Day2C C N A  Day2
C C N A Day2
darulquthni
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
VISHNU N
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
anilinvns
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)
Netwax Lab
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)
IT Tech
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
sayedatif
 
Ncat ccna cheat sheet
Ncat ccna cheat sheetNcat ccna cheat sheet
Ncat ccna cheat sheet
EZREIG OMAR
 
ccna cheat_sheet
ccna cheat_sheetccna cheat_sheet
ccna cheat_sheet
Guntaka Reddy
 
Cisco Commands
Cisco CommandsCisco Commands
Cisco Commands
Fredrick Hall
 
cisco ccna cheat_sheet
cisco ccna cheat_sheetcisco ccna cheat_sheet
cisco ccna cheat_sheet
Guntaka Reddy
 
introduction-to-cisco-routers basic .ppt
introduction-to-cisco-routers basic .pptintroduction-to-cisco-routers basic .ppt
introduction-to-cisco-routers basic .ppt
nazeem1977
 
introduction-to-cisco-routers.ppt
introduction-to-cisco-routers.pptintroduction-to-cisco-routers.ppt
introduction-to-cisco-routers.ppt
RobelTsada
 

Similar to Cisco Internetworking Operating System (ios) (20)

CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glance
 
Ccna command
Ccna commandCcna command
Ccna command
 
10 Command Line quan trọng để giao tiếp với Cisco IOs
10 Command Line quan trọng để giao tiếp với Cisco IOs10 Command Line quan trọng để giao tiếp với Cisco IOs
10 Command Line quan trọng để giao tiếp với Cisco IOs
 
OSWAN.pptx
OSWAN.pptxOSWAN.pptx
OSWAN.pptx
 
Mod11
Mod11Mod11
Mod11
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
 
C C N A Day2
C C N A  Day2C C N A  Day2
C C N A Day2
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
 
Ncat ccna cheat sheet
Ncat ccna cheat sheetNcat ccna cheat sheet
Ncat ccna cheat sheet
 
ccna cheat_sheet
ccna cheat_sheetccna cheat_sheet
ccna cheat_sheet
 
Cisco Commands
Cisco CommandsCisco Commands
Cisco Commands
 
cisco ccna cheat_sheet
cisco ccna cheat_sheetcisco ccna cheat_sheet
cisco ccna cheat_sheet
 
introduction-to-cisco-routers basic .ppt
introduction-to-cisco-routers basic .pptintroduction-to-cisco-routers basic .ppt
introduction-to-cisco-routers basic .ppt
 
introduction-to-cisco-routers.ppt
introduction-to-cisco-routers.pptintroduction-to-cisco-routers.ppt
introduction-to-cisco-routers.ppt
 

More from Netwax Lab

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
Netwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Netwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
Netwax Lab
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
Netwax Lab
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
Netwax Lab
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
Netwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
Netwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
Netwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
Netwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
Netwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
Netwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
Netwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
Netwax Lab
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
Netwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
Netwax Lab
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
Netwax Lab
 
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP ii
Netwax Lab
 

More from Netwax Lab (20)

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
 
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP ii
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
QADay
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Cisco Internetworking Operating System (ios)

  • 1. Cisco Internetworking Operating System (IOS) Cisco IOS (originally Internetwork Operating System) is software used on most Cisco Systems routers and current Cisco network switches. (Earlier switches ran CatOS.) IOS is a package of routing, switching, internetworking and telecommunications functions integrated into a multitasking operating system. The first IOS was written by William Yeager in 1986. CLI – Command Line Interface There are different ways to configure a router but most often, the first place we would connect to is the console port. The console port is usually an RJ- 45 (8 Pin Modular) connection. We can also connect to a Cisco router through an auxiliary port but for that we need a modem. The third way to connect to a Cisco router is in-band, through the program Telnet. Bringing Up a Router When we first bring up a Cisco router, it will run a power on self-test (POST). If it passes, it will then looks for and load the Cisco IOS from flash memory-- if an IOS file is present. After that, the IOS loads and looks for a valid configuration--the startup-config, that’s stored by default in non-volatile RAM, or NVRAM. If there isn’t a configuration in NVRAM, the router will go in to set up mode, a step by step process to help you configure the router. You can also enter setup mode at any time from the command line by typing the command setup from something called privilege mode. Flash Memory – Flash memory is electronically erasable programmable read-only memory—an EEPROM. The Pound signs (#) are telling us that the IOS is being decompressed into RAM. After it is decompressed into RAM, the IOS is loaded and starts running the router. After the interface status messages appear and we press enter the Router > prompt will appear. This is called user exec mode (User mode). And it’s mostly used to view statistics, but it’s also a steppingstone to logging into privileged mode.
  • 2. Cisco Internetworking Operating System (IOS) We can only view and change the configuration of a Cisco router in privileged exec mode, which we can enter with the enable command. At first we see Press “Enter” to start Router > (User Mode) Router > enable Router# (Privileged Mode) To exit from this mode we type here exit or disable or logout Router# exit Router> (Ctrl+C) Exit To configure from CLI, you can make global changes to the router by typing configure-terminal, which puts you in global configuration mode and changes what’s known as the running-config. You can type config from the privileged-mode prompt then just press enter to take the default of terminal. Router#config t Router (config) # (configure mode) To make changes to an interface, we use the interface command from global configuration mode. Router (config) #int fa0/0 Router (config-if) # Sub Interfaces Sub Interfaces allow you to create logical interfaces within the router. The prompt then changes to Router (config-subif) # Router (config-if) int fa0/0.1 Router (config-subif) # Line Commands To configure user-mode passwords, use the line command. The prompt then becomes Router (config-line) # Router # config t Router (config) # line console 0 Router (config-line) # password Cisco
  • 3. Cisco Internetworking Operating System (IOS) The line console 0 command is known as a major command (also called a global command) and any command typed from the (config-line) prompt is known as a subcommand. Routing Protocol Configurations To configure routing protocols such as RIP and EIGRP, use the prompt (config-router) #. Router # config t Router (config) #router rip Router (config) # version 2 Router (config-router) # We can use the Cisco advanced editing features to help us to configure the router. If we type in a question mark at any prompt we will be given a list of all the commands available from that prompt. Router #? By typing the clock? We will get a list of the next possible parameters and what they do. Router# clock? Router# clock set? Router# clock set 10:30:10 10 28 Aug Use the show history command to see the last 10 commands that were entered on the router Router# show his The show version command will provide basic configuration for the system hardware as well as the software version, the names and sources of configuration files, and the boot images. Router# show version To check the running config Router# show run To check the serial interface Router# show serial 0/0/0 We can set the identity of the router with hostname command. Router# config t Router (config) #hostname Cisco Cisco (config) #
  • 4. Cisco Internetworking Operating System (IOS) A banner is more than just a little cool-one very good reason for having a banner is to give any and all who dare attempt to telnet or dial into your internetwork a little security notice. Router (config) # banner motd @unauthorized access prohibited@ Other type of banner 1. Incoming banner, 2. Login banner. Setting Passwords There are five passwords used to secure your Cisco routers. Console, auxiliary, telnet, enable and enable secret. Two passwords are used to set your enable password that’s used to secure privileged mode. This will prompt a user for a password when the enable command is used. The other three are used to configure a password when user mode is accessed either through the console port, through the aux port or via telnet. We set the enable passwords from global configuration mode Router (config) # enable password cisco Sets the enable password on older, pre 10.3 systems, and isn’t ever used if an enable secret is set. Secret – Is the newer, encrypted password that overrides the enable password if it’s set. Use -tacas- this tells the router to authenticate through a TACACS server. Router (config) #enable secret CCNA User mode passwords are assigned by using the line command Router (config) #line vty 0 4 # Password ccnp #login Aux-sets the user-mode password for the auxiliary port. It’s usually used for attaching a modem to the router, but it can be used as a console as well. Console - Sets a console user-mode password. Vty sets a telnet password on the router. If this password isn’t set then telnet can’t be used by default.
  • 5. Cisco Internetworking Operating System (IOS) To configure the auxiliary password go in to global configuration mode and type line aux? You can see here that you only get a choice of 0-0. Router#config t Router (config) #line aux 0 Router (config-line) #password ccnp Router (config-line) #login Router #sh run Through this command we see all passwords but if we want to change or encrypt all passwords format then we run this command Router (config) #service password encryption For turn off this command Router (config) #no service password encryption Descriptions– Setting the descriptions on an interface is helpful to the administrator and like the hostname only locally significant. Router (config-if) #description sales LAN Router Interfaces Interfaces configuration is one of the most important router configurations, because without interfaces a router is pretty much a completely useless object. Plus interfaces configurations must be totally precise to enable communication with other devices. Some of the configurations used to configure an interface are network layer addresses, media type, bandwidth and other administrator command. Configure an IP address on an interface Router (config) #int e0 Router (config-if) #Ip add 192.168.10.10 255.255.255.0 Router (config-if) #no shut We configure a DCE serial interface with the clock rate command. Router (config) #int s0/0 Router (config-if) #clock rate 64000 Router (config-if) #bandwidth 64 We can manually save the file from DRAM to NVRAM by using the copy run command. We can delete the startup config file by using the erase startup config command.
  • 6. Cisco Internetworking Operating System (IOS) Router # erase startup-config To restart the router via command Router# reload Save? (yes/no) n Ping – Ping is packet Internet Groper, a programme that uses ICMP Echo requests and replies. Ping sends a packet to a remote host, and if that host responds, means that the host is alive. Trace route – Uses ICMP with IP time to live (TTL) time outs to track the path a packet takes through an internetwork, in contrast to Ping, which just finds the host and responds. And Trace route can also be used with multiple protocols.  Verifying with the show interface Command Router#show int fa0/0 Router#show int s0/0 Another important configuration to notice is the keepalive, which is 10 seconds by default, each router sends a keepalive message to its neighbor every 10 seconds, and if both routers aren’t configured for the same keepalive time, it won’t work. We can clear the counters on the interface by typing the command clear counters. Router#clear counters s0/0 MTU – Maximum Transmission Unit (1500 bytes by default) Using the “show ip int” brief command. This command provides a quick overview of the routers interfaces including the logical address and status. Router#show ip int brief  Show protocols command The show protocols command is a really helpful command you’d use in order to see the quick status of layers 1 and 2 of each interface as well as the ip address used.  Using the show Controllers Command The show controllers command displays information about the physical interfaces itself. It will also give you the type of serial cable plugged in to a serial port. Usually this will only be a DTE cable that plugs in to a type of Data Service Unit (DSU).
  • 7. Cisco Internetworking Operating System (IOS) Router#show controllers serial 0/0 Router#show controllers serial 0/1 Notice that serial 0/0 has a DTE cable, whereas the serial 0/1 connection has a DCE cable. Serial 0/1 would have to provide clocking with the clock rate command. Serial 0/0 would get its clocking from the DSU.  Understand the sequence of what happens when you power on a router When you first bring up a cisco router it will run a power on self-test (post), and if that passes, it will then look for and load the Cisco IOS from flash memory, if a file is present the IOS then proceeds to load and looks for a valid configuration in NV RAM called the Startup-config. If no file is present in NV RAM, the router will go into setup mode. Set up mode is automatically started if a router boots and no startup – config is in NV RAM. We can also bring up set up mode by typing setup from the privileged mode. Understand the difference between user mode and privileged mode. User mode provides a command line interface with very few available commands by default. User mode does not allow the configuration to be viewed or changed. Privileged mode allows a user to both view and change the configuration of a router. You can enter privileged mode by typing the command enable.  Remember what the command show version Provides The show version command will provide basic configuration for the system hardware as well as the software version, the names and sources of configuration files, the config-register setting and the boot images.  Remember the diff between the enable password and enable secret password Both of these passwords are used to gain access into privileged mode. However, the enable secret is newer and is always encrypted by default. Also, if you set the enable password and then set the enable secret, only the enable secret will be used. If we type show int serial 0 and see that is down, line protocol is down, this will be considered a physical layer problem. If you see it as up, line protocol is down, then you have a data link layer problem.  Using the Pipe This Pipe (|) allows s to wade through all the configurations or other long outputs and get straight to our goods fast. Router#show run | begin interface Router#show Ip route | include 192.168.1.1
  • 8. Cisco Internetworking Operating System (IOS)  For SSH Login Router#host cisco Cisco#conf t Cisco (config) #Ip domain name cisco.com #username R1 password cisco123 #crypto key generate rsa general-keys modulus 1024 #ssh version 2 #line vty 0 4 #transport input ssh telnet #login local