SlideShare a Scribd company logo
1 of 19
Download to read offline
Cisco Confidential 
1 
© 2012 Alim Besari 
Network Simulation 
Cisco Packet Tracer 
By : Aldi Nor Fahrudin 
The introduction of Cisco routers 
and CLI Cisco IOS
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
2
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
3 
I worked on layer three, 
determine the path and the 
data packet delivery
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
4 
CISCO IOS merupakan sistem operasi 
berbasis teks (Command Line Interface) 
yang berjalan pada perangkat Cisco 
yang menyediakan fungsi routing dan 
switching.
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
5 
Flash memory berfungsi untuk menyimpan IOS image, di ibaratkan harddisk pada PC. 
RAM digunakan untuk menyimpan running config yaitu konfigurasi yang sedang berjalan 
pada router. Konten pada RAM akan hilang jika router mati atau reboot. 
NVRAM digunakan untuk menyimpan startup config yang merupakan file backup konfigurasi 
pada router. Jika running config tidak di copy ke NVRAM, pada saat 
routerreboot maka router akan kembali ke kondisi dimana router belum 
di konfigurasi. 
ROM berfungsi menyimpan program bootstrap yang disebut ROM Monitor 
(ROMmon) yang bertugas menjalankan POST (Power On Self Test).
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
6 
1 ) Router di hidupkan, kemudian program bootstrap pada ROM (ROMmon) 
akan menjalankan POST (Power-On Self Test). 
2) Router memuat IOS image dari Flash memory. Jika IOS image tidak ada di Flash memory, 
selanjutnya router akan memuat IOS dari TFTP Server. Jika ke TFTP Server gagal, 
router akan mencari di ROM.
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
7 
3) Setelah IOS ditemukan, IOS akan di load ke RAM.
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
8 
4) IOS memuat file konfigurasi (startup config) dari NVRAM. Jika startup config tidak 
ditemukan di NVRAM, router akan memuat konfigurasi dari TFTP Server. Jika startup 
config benar-benar tidak ditemukan router akan memasuki Setup mode 
(Initial Configuration Mode) yaitu kondisi dimana router belum dikonfigurasi.
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
9 
user EXEC mode 
2) user EXEC mode hanya memiliki perintah-perintah terbatas. Biasanya hanya 
meliputi perintah-perintah yang bersifat monitoring atau view 
1) User EXEC tidak mengijinkan user untuk melakukan perubahan konfigurasi pada router 
user privileged EXEC mode 
privileged EXEC mode berisi perintah untuk akses ke router. Mode ini dapat digunakan 
untuk mengkonfigurasi password.Dan biasanya mode ini sering digunakan oleh 
administrator untuk perintah-perintah yang bersifat konfigurasi dan manajemen Global
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
10 
Cara berpindah acces user level dari exec mode ke 
privileged exec mode
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
11 
Semua konfigurasi CLI akan merubah router ke global configuration atau global 
config. Global config adalah mode konfigurasi paling utama. Global config digunakan 
dalam router untuk menjalankan perintah-perintah konfigurasi. Prompt yang ditunjukkan 
pada mode global config
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
12
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
13
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
14
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
15
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
16
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
17
© 2011 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
Cisco Confidential 
© 2011 Cisco and/or its affiliates. All rights reserved. 
18 
1 ) buat topologi seperti gambar berikut 
2) Config cisco melalui console pada PC0 
3) Set hostname router sesuai nama kalian 
4) Create password previladge user execmode sesuai 
NIM kalian dan kemudian lakukan enkripsi 
5) Set IP fastethernet0/0 192.168.80.1 
6) Set IP fastethernet0/1 192.168.90.1 
7) Set IP PC0 satu network dengan fastethernet0/0 
pada router 
8) Set IP PC1 satu network dengan fasethernet0/1 
pada router 
9) Test ping dari Router ke PC0 dan PC1 begitupun 
sebalinya 
10) Pastikan konfigurasi tersimpan pada NVRAM 
11) Good Luck ..  
Thank you. 
by : Aldi Nor Fahrudin

More Related Content

What's hot

Cisco Ios Suneet
Cisco Ios SuneetCisco Ios Suneet
Cisco Ios Suneetguest575e9c
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall NetProtocol Xpert
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configurationCisco asa active,active failover configuration
Cisco asa active,active failover configurationIT Tech
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Duane Bodle
 
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessBasic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessHarris Andrea
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco routerIT Tech
 
5.3.1.2 packet tracer skills integration challenge instructions
5.3.1.2 packet tracer   skills integration challenge instructions5.3.1.2 packet tracer   skills integration challenge instructions
5.3.1.2 packet tracer skills integration challenge instructionsJose Luis Heredia
 
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...Cisco Russia
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pixangelitoh11
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACLfaust0
 
Cisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslCisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslIT Tech
 

What's hot (18)

CCNA Icnd110 s06l02
CCNA Icnd110 s06l02CCNA Icnd110 s06l02
CCNA Icnd110 s06l02
 
Cisco Ios Suneet
Cisco Ios SuneetCisco Ios Suneet
Cisco Ios Suneet
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall
 
Unidade3 roteiro proxy
Unidade3 roteiro proxyUnidade3 roteiro proxy
Unidade3 roteiro proxy
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configurationCisco asa active,active failover configuration
Cisco asa active,active failover configuration
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
 
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessBasic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet Access
 
CCNA Icnd110 s06l03
CCNA Icnd110 s06l03CCNA Icnd110 s06l03
CCNA Icnd110 s06l03
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
Icnd210 s08l01
Icnd210 s08l01Icnd210 s08l01
Icnd210 s08l01
 
Icnd210 s04l03
Icnd210 s04l03Icnd210 s04l03
Icnd210 s04l03
 
5.3.1.2 packet tracer skills integration challenge instructions
5.3.1.2 packet tracer   skills integration challenge instructions5.3.1.2 packet tracer   skills integration challenge instructions
5.3.1.2 packet tracer skills integration challenge instructions
 
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACL
 
Icnd210 s06l01
Icnd210 s06l01Icnd210 s06l01
Icnd210 s06l01
 
Cisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslCisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcsl
 
Icnd210 s07l03
Icnd210 s07l03Icnd210 s07l03
Icnd210 s07l03
 

Viewers also liked

Learning Computer Network Through Network Simulation Program
Learning Computer Network Through Network Simulation ProgramLearning Computer Network Through Network Simulation Program
Learning Computer Network Through Network Simulation ProgramI Putu Hariyadi
 
Network Simulation
Network SimulationNetwork Simulation
Network Simulationlohch3
 
Intelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network SimulationIntelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network Simulationcatherine roussey
 
Roessler, Hafner - Modelling and Simulation in Industrial Applications: Apply...
Roessler, Hafner - Modelling and Simulation in Industrial Applications: Apply...Roessler, Hafner - Modelling and Simulation in Industrial Applications: Apply...
Roessler, Hafner - Modelling and Simulation in Industrial Applications: Apply...Vienna Data Science Group
 
Curriclum Vitae - Adi Prayitno
Curriclum Vitae - Adi PrayitnoCurriclum Vitae - Adi Prayitno
Curriclum Vitae - Adi PrayitnoAdi Prayitno
 
Setting local domain di virtual host
Setting local domain di virtual hostSetting local domain di virtual host
Setting local domain di virtual hostFgroupIndonesia
 
Bastion host topologi jaringan
Bastion host topologi jaringanBastion host topologi jaringan
Bastion host topologi jaringanMunir Putra
 
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osModul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osEen Pahlefi
 
Virtual host and certificate authority
Virtual host and certificate authorityVirtual host and certificate authority
Virtual host and certificate authorityAhmad Sayuti
 
Presentation Progress TA
Presentation Progress TA Presentation Progress TA
Presentation Progress TA Arif Wahyudi
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan serverDedi Dwianto
 
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...Een Pahlefi
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security RiskDedi Dwianto
 
Konfigurasi Access Point menjadi Repeater dan WDS
Konfigurasi Access Point menjadi Repeater dan WDSKonfigurasi Access Point menjadi Repeater dan WDS
Konfigurasi Access Point menjadi Repeater dan WDSmfaad
 
MUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration AnalystMUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration AnalystFajar Nugroho
 
Trend Kejahatan Cyber 2015
Trend Kejahatan Cyber 2015Trend Kejahatan Cyber 2015
Trend Kejahatan Cyber 2015Dedi Dwianto
 

Viewers also liked (20)

Learning Computer Network Through Network Simulation Program
Learning Computer Network Through Network Simulation ProgramLearning Computer Network Through Network Simulation Program
Learning Computer Network Through Network Simulation Program
 
Network Simulation
Network SimulationNetwork Simulation
Network Simulation
 
Intelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network SimulationIntelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network Simulation
 
Roessler, Hafner - Modelling and Simulation in Industrial Applications: Apply...
Roessler, Hafner - Modelling and Simulation in Industrial Applications: Apply...Roessler, Hafner - Modelling and Simulation in Industrial Applications: Apply...
Roessler, Hafner - Modelling and Simulation in Industrial Applications: Apply...
 
Curriclum Vitae - Adi Prayitno
Curriclum Vitae - Adi PrayitnoCurriclum Vitae - Adi Prayitno
Curriclum Vitae - Adi Prayitno
 
Networking recap
Networking recapNetworking recap
Networking recap
 
Setting local domain di virtual host
Setting local domain di virtual hostSetting local domain di virtual host
Setting local domain di virtual host
 
Bastion host topologi jaringan
Bastion host topologi jaringanBastion host topologi jaringan
Bastion host topologi jaringan
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik osModul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
Modul mengamankan jaringan menggunakan arp reply only menggunakan mikrotik os
 
Virtual host and certificate authority
Virtual host and certificate authorityVirtual host and certificate authority
Virtual host and certificate authority
 
Sosialisasi kurikulum 2016
Sosialisasi kurikulum 2016Sosialisasi kurikulum 2016
Sosialisasi kurikulum 2016
 
Presentation Progress TA
Presentation Progress TA Presentation Progress TA
Presentation Progress TA
 
Ancaman & kelemahan server
Ancaman & kelemahan serverAncaman & kelemahan server
Ancaman & kelemahan server
 
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...
Modul mengamankan jaringan dhcp server menggunakan arp reply only menggunakan...
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Trouble shooting windows
Trouble shooting windowsTrouble shooting windows
Trouble shooting windows
 
Konfigurasi Access Point menjadi Repeater dan WDS
Konfigurasi Access Point menjadi Repeater dan WDSKonfigurasi Access Point menjadi Repeater dan WDS
Konfigurasi Access Point menjadi Repeater dan WDS
 
MUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration AnalystMUM Middle East 2016 - System Integration Analyst
MUM Middle East 2016 - System Integration Analyst
 
Trend Kejahatan Cyber 2015
Trend Kejahatan Cyber 2015Trend Kejahatan Cyber 2015
Trend Kejahatan Cyber 2015
 

Similar to Konfigurasi dasar Cisco Router

Ex 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenEx 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenĐô GiẢn
 
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1.docx
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1.docx© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1.docx
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1.docxLynellBull52
 
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 20133 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013Puppet
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Netwax Lab
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeAhmed Habib
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
Ccna day2-140715152313-phpapp02
Ccna day2-140715152313-phpapp02Ccna day2-140715152313-phpapp02
Ccna day2-140715152313-phpapp02Sachin Morya
 
Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2AIRTEL
 
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSПоиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSCisco Russia
 
Foreman-and-Puppet-for-Openstack-Audo-Deployment
Foreman-and-Puppet-for-Openstack-Audo-DeploymentForeman-and-Puppet-for-Openstack-Audo-Deployment
Foreman-and-Puppet-for-Openstack-Audo-Deploymentyating yang
 

Similar to Konfigurasi dasar Cisco Router (20)

Ex 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chenEx 1 chapter11-configure-network-tony_chen
Ex 1 chapter11-configure-network-tony_chen
 
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1.docx
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1.docx© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1.docx
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1.docx
 
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 20133 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013
3 Years of Puppet at Cisco: The Secrets to Our Success - PuppetConf 2013
 
CCNA_ITN_Chp2_.pptx
CCNA_ITN_Chp2_.pptxCCNA_ITN_Chp2_.pptx
CCNA_ITN_Chp2_.pptx
 
C C N A Day2
C C N A  Day2C C N A  Day2
C C N A Day2
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)
 
Routerfundaments gurwinder
Routerfundaments gurwinderRouterfundaments gurwinder
Routerfundaments gurwinder
 
CCNA Security 05- securing the management plane
CCNA Security 05- securing the management planeCCNA Security 05- securing the management plane
CCNA Security 05- securing the management plane
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA CHAPTER 5 BY jetarvind kumar madhukar
CCNA CHAPTER 5 BY jetarvind kumar madhukarCCNA CHAPTER 5 BY jetarvind kumar madhukar
CCNA CHAPTER 5 BY jetarvind kumar madhukar
 
Ccna day2
Ccna day2Ccna day2
Ccna day2
 
Ccna 2
Ccna 2Ccna 2
Ccna 2
 
Ccna day2
Ccna day2Ccna day2
Ccna day2
 
Ccna day2-140715152313-phpapp02
Ccna day2-140715152313-phpapp02Ccna day2-140715152313-phpapp02
Ccna day2-140715152313-phpapp02
 
Ccna day2
Ccna day2Ccna day2
Ccna day2
 
Ccna day2
Ccna day2Ccna day2
Ccna day2
 
Ccna PPT2
Ccna PPT2Ccna PPT2
Ccna PPT2
 
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSПоиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
 
Foreman-and-Puppet-for-Openstack-Audo-Deployment
Foreman-and-Puppet-for-Openstack-Audo-DeploymentForeman-and-Puppet-for-Openstack-Audo-Deployment
Foreman-and-Puppet-for-Openstack-Audo-Deployment
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Konfigurasi dasar Cisco Router

  • 1. Cisco Confidential 1 © 2012 Alim Besari Network Simulation Cisco Packet Tracer By : Aldi Nor Fahrudin The introduction of Cisco routers and CLI Cisco IOS
  • 2. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 2
  • 3. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 3 I worked on layer three, determine the path and the data packet delivery
  • 4. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 4 CISCO IOS merupakan sistem operasi berbasis teks (Command Line Interface) yang berjalan pada perangkat Cisco yang menyediakan fungsi routing dan switching.
  • 5. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 5 Flash memory berfungsi untuk menyimpan IOS image, di ibaratkan harddisk pada PC. RAM digunakan untuk menyimpan running config yaitu konfigurasi yang sedang berjalan pada router. Konten pada RAM akan hilang jika router mati atau reboot. NVRAM digunakan untuk menyimpan startup config yang merupakan file backup konfigurasi pada router. Jika running config tidak di copy ke NVRAM, pada saat routerreboot maka router akan kembali ke kondisi dimana router belum di konfigurasi. ROM berfungsi menyimpan program bootstrap yang disebut ROM Monitor (ROMmon) yang bertugas menjalankan POST (Power On Self Test).
  • 6. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 6 1 ) Router di hidupkan, kemudian program bootstrap pada ROM (ROMmon) akan menjalankan POST (Power-On Self Test). 2) Router memuat IOS image dari Flash memory. Jika IOS image tidak ada di Flash memory, selanjutnya router akan memuat IOS dari TFTP Server. Jika ke TFTP Server gagal, router akan mencari di ROM.
  • 7. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 7 3) Setelah IOS ditemukan, IOS akan di load ke RAM.
  • 8. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 8 4) IOS memuat file konfigurasi (startup config) dari NVRAM. Jika startup config tidak ditemukan di NVRAM, router akan memuat konfigurasi dari TFTP Server. Jika startup config benar-benar tidak ditemukan router akan memasuki Setup mode (Initial Configuration Mode) yaitu kondisi dimana router belum dikonfigurasi.
  • 9. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 9 user EXEC mode 2) user EXEC mode hanya memiliki perintah-perintah terbatas. Biasanya hanya meliputi perintah-perintah yang bersifat monitoring atau view 1) User EXEC tidak mengijinkan user untuk melakukan perubahan konfigurasi pada router user privileged EXEC mode privileged EXEC mode berisi perintah untuk akses ke router. Mode ini dapat digunakan untuk mengkonfigurasi password.Dan biasanya mode ini sering digunakan oleh administrator untuk perintah-perintah yang bersifat konfigurasi dan manajemen Global
  • 10. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 10 Cara berpindah acces user level dari exec mode ke privileged exec mode
  • 11. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 11 Semua konfigurasi CLI akan merubah router ke global configuration atau global config. Global config adalah mode konfigurasi paling utama. Global config digunakan dalam router untuk menjalankan perintah-perintah konfigurasi. Prompt yang ditunjukkan pada mode global config
  • 12. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 12
  • 13. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 13
  • 14. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 14
  • 15. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 15
  • 16. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 16
  • 17. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 17
  • 18. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 18 1 ) buat topologi seperti gambar berikut 2) Config cisco melalui console pada PC0 3) Set hostname router sesuai nama kalian 4) Create password previladge user execmode sesuai NIM kalian dan kemudian lakukan enkripsi 5) Set IP fastethernet0/0 192.168.80.1 6) Set IP fastethernet0/1 192.168.90.1 7) Set IP PC0 satu network dengan fastethernet0/0 pada router 8) Set IP PC1 satu network dengan fasethernet0/1 pada router 9) Test ping dari Router ke PC0 dan PC1 begitupun sebalinya 10) Pastikan konfigurasi tersimpan pada NVRAM 11) Good Luck ..  
  • 19. Thank you. by : Aldi Nor Fahrudin